content
stringlengths
1
15.9M
\section{Introduction} \label{sec:intro} \vspace{-0.4cm} The Least Absolute Shrinkage and Selection Operator (LASSO) \cite{tibshirani1996regression} is a powerfull method to recover a \textit{k-sparse} unknown signal ${\bf x}_0$ $\in \mathbb{R}^{n}$ from noisy linear measurements: ${\bf y} = {\bf H} {\bf x}_{0} + {\bf z} \in \mathbb{R}^{m}$, where $ {\bf H} \in \mathbb{R}^{m \times n}$ is the measurement matrix, and ${\bf z} \in \mathbb{R}^{m}$ is the noise vector. In this paper, we assume that ${\bf H}$ is not perfectly known, and we only have a noisy version of it that is denoted by ${\bf A}$. Then, the LASSO solves the following convex optimization proplem: \vspace{-0.25cm} \begin{equation} \label{LASSO_1} \hat{{\bf x}}= \text{arg} \ \underset{{{\bf x}}}{\operatorname{\min}} \ \frac{1}{2}|| {\bf y} - {\bf A} {\bf x} ||^{2} + \lambda || {\bf x} ||_1, \end{equation} where $|| \cdot ||$ and $|| \cdot ||_1$ denote the $\ell_2$-norm and the $\ell_1$-norm respectively, and $\lambda \geq 0$ is the regularization parameter that balances between the deviation of ${\bf A} \hat{{\bf x}}$ from the observations ${\bf y}$ on one side, and the sparsity of the solution as promoted by the $\ell_1$-norm on the other side. Problems of the form of (\ref{LASSO_1}) have many different diverse applications in science and engineering such as image processing \cite{ting2009sparse}, machine learning \cite{bishop2006pattern}, wireless communications \cite{gui2012improved}, etc.. The LASSO has been studied from different prespectives over the years. In recent years, the asymptotic exact characterization of the estimation performance gained a lot of interest. General performance metrics have been introduced such as the mean squared error and the probability support recovery. The first well-known bounds on the estimation performance of the lasso were order-wise in nature \cite{candes2006stable, candes2007dantzig, bickel2009simultaneous, negahban2009unified}. The Approximate Message Passing (AMP) framework has been used in \cite{donoho2009message, bayati2011dynamics, bayati2012lasso} to derive precise asymptotic analysis of the LASSO performance under the assumptions of iid Gaussian sensing matrix ${\bf A}$. A recently developed framework, that is based on the Convex Gaussian Min-max Theorem (CGMT) \cite{thrampoulidis2016precise}, has been used in a series of works to precisely evaluate the estimation performance of non-smooth regularized convex estimators under noisy iid Gaussian measurements (including the LASSO) \cite{thrampoulidis2016precise,thrampoulidis2015regularized, stojnic2013framework,thrampoulidis2015precise, abbasi2016general}. However, these results assume that the measurement matrix ${\bf A}$ is perfectly known. In many practical applications it is reasonable to expect uncertainty in the linear measurement matrix ${\bf A}$ due to, e.g., imperfections in the signal acquisition hardware, model mismatch, estimation errors \cite{rosenbaum2010sparse}. In this paper, we consider the additive uncertainty model: ${\bf A} = \sqrt{1-\epsilon^2} {\bf H} + \epsilon \hbox{\boldmath$\Omega$},$ where ${\bf H}$ is known and $\hbox{\boldmath$\Omega$}$ is an unknown error matrix and $\epsilon^2\in [0,1)$ is the variance of the error. Such model is commonly used in communication theory and known as imperfect Channel State Information (CSI) \cite{zenaidi2016performance}. In this work, we derive precise asymptotic predictions of the \textit{mean squared error} and the \textit{support recovery} of the LASSO under the presence of uncertainties in the measurement matrix that has iid Gaussian entries (both ${\bf H}$ and $\hbox{\boldmath$\Omega$}$ have iid Gaussian entries). The Gaussianity assumption of the entries of ${\bf A}$ is met in a wide range of applications such as MIMO application for Rayleigh fading model. The analysis is based on the CGMT framework and is performed when the problem dimensions $m$, $n$ and $k$ all grow simultaneously to infinity at fixed rates. Although our analysis is asymptotic in nature, numerical simulations show that our theoretical predictions are valid even for a few dozens of the problem dimensions. \vspace{-0.5cm} \section{Problem Setup} \vspace{-0.2cm} \subsection{Performance Metrics} \vspace{-0.3cm} Finding a good estimate is an application dependent, since different applications require different desired properties of $\hat{{\bf x}}$. This results in a need for a variety of different performance metrics. Here we discuss some of them.\\ \textbf{Mean squared error (MSE)}: A natural and heavily used measure of performance is the reconstruction \textit{mean squared error}, which measures the deviation of $\hat{{\bf x}}$ from the true signal ${\bf x}_0$. Formally, the MSE is defined as MSE $:= \frac{1}{n}|| \hat{{\bf x}} - {\bf x}_0 ||^2$.\\ \textbf{Support Recovery}: In the problem of sparse recovery, a natural measure of performance that is used in many applications (e.g. parameter selection in regression, sparse approximation, structure estimation in graphical models \cite{wainwright2009sharp}) is the support recovery, which is defined as identifying whether an entry of ${\bf x}_0$ is on the support (i.e. non-zero), or it is off the support (i.e. zero). The decison is based on the LASSO solution $\hat{{\bf x}}$: we say the $i^{th}$ entry of $\hat{{\bf x}}$ is on the support if $| \hat{{\bf x}}_{i}| \geq \xi$, where $\xi > 0$ is a user-defined hard threshold on the entries on $\hat{{\bf x}}.$ In Theorem \ref{LASSO_on/off}, we precisely predict the \textit{per-entry} rate of successful on-support and off-support recovery. Formaly, let \begin{subequations}\label{supp} \begin{align} \Phi_{\xi,\text{on}}(\hat{{\bf x}}) = \frac{1}{k} \sum_{i \in S({\bf x}_0)} \mathbbm{1}_{\{| \hat{{\bf x}}_{i}| \geq \xi \}}\\ \Phi_{\xi,\text{off}}(\hat{{\bf x}}) = \frac{1}{n-k} \sum_{i \notin S({\bf x}_0)} \mathbbm{1}_{\{| \hat{{\bf x}}_{i}| \leq \xi \}}, \end{align} \end{subequations} where $\mathbbm{1}_{\{\mathcal{B} \}}$ is the indicator function of a set $\mathcal{B}$, and $S({\bf x}_0)$ is the support of ${\bf x}_0$, i.e. the set of the non-zero entries of ${\bf x}_0$. \subsection{Working Assumptions} \label{w_A} The unkown signal ${\bf x}_{0} \in \mathbb{R}^{n}$ is a $k$-sparse signal, i.e. only $k$ of its entries are sampled iid from a distribution $ p_{X_0}$ which has zero mean and unit variance ($\mathbb{E}[X_0^2] = 1$), and the remaining entires are zeros. For the measurement matrix ${\bf A}$, we consider the following additive uncertainty model: ${\bf A} = \gamma {\bf H} + \epsilon \hbox{\boldmath$\Omega$},$ where ${\bf H}, \hbox{\boldmath$\Omega$} \in \mathbb{R}^{m \times n}$ both have entries iid $\mathcal{N}(0,1/n)$, and $\epsilon^2 \in [0,1)$ is the variance of the error such that $\gamma^2 +\epsilon^2 = 1$. The noise vector ${\bf z} \in \mathbb{R}^{m}$ has entries iid $\mathcal{N}(0,\sigma_{{\bf z}}^2)$. The analysis is performed when the system dimensions ($m$, $n$ and $k$) grow simultaneously large at fixed ratios: $\frac{m}{n} \longrightarrow \delta \in (0,\infty)$, and $\frac{k}{n} \longrightarrow \kappa \in (0,1).$ Under these settings, the Signal to Noise Ratio (SNR) becomes SNR :=$\kappa/\sigma_{{\bf z}}^2.$ \vspace{-0.4cm} \subsection{Notation} \vspace{-0.2cm} Throughout this paper, we use boldface letters to represent vectors and matrices. We use the standard notation $\mathbb{P[\cdot]}$ and $\mathbb{E[\cdot]}$ to denote probability and expectation. We write $X \sim p_X$ to denote that a random variable $X$ has a probability density/mass function $p_X$. In particular, $ H \sim \mathcal{N}(\mu, \sigma^2)$ implies that $H$ has Gaussian distribution of mean $\mu$ and variance $\sigma^2$. $\phi(x)$ and $Q(x)$ denote the pdf of a standard normal distribution and its associated Q-function respectively. For $a, \lambda \in \mathbb{R}$, such that $\lambda > 0$, we define the following functions:\\ The soft-thresholding operator: $\eta(a;\lambda)$ = $\text{arg min}_{x}$ $\frac{1}{2}(x-a)^2 + \lambda |x|$, which can be written: \vspace{-0.3cm} \begin{equation}\label{soft_TH} \eta(a ; \lambda) = \begin{cases} a - \lambda & ,\text{if} \ a > \lambda \\ 0 & ,\text{if} \ |a| \leq \lambda \\ a + \lambda & ,\text{if} \ a < -\lambda. \end{cases} \end{equation} and its optimal value $e(a;\lambda) =\text{min}_{x} \frac{1}{2}(x-a)^2 + \lambda |x|$ \vspace{-0.3cm} \begin{equation} e(a ; \lambda) = \begin{cases} \lambda a - \frac{1}{2} \lambda^2 & ,\text{if} \ a > \lambda \\ \frac{1}{2} a^2 & ,\text{if} \ |a| \leq \lambda \\ -\lambda a - \frac{1}{2} \lambda^2 & ,\text{if} \ a < -\lambda . \end{cases} \end{equation} Finaly, we write ``$\overset{P}{\longrightarrow} $" to designate convergence in probability. \vspace{-0.3cm} \section{Main Results} \label{sec:Results} \vspace{-0.4cm} This section summarizes our main results on the precise analysis of the mean squared error and the probability of support recovery of the LASSO. \vspace{-0.2cm} \begin{theorem}[LASSO MSE]\label{LASSO_mse} Fix $\lambda > 0$, and let $\hat{{\bf x}}$ be a minimizer of the LASSO problem in (\ref{LASSO_1}), where ${\bf A}, {\bf z}$ and ${\bf x}_0$ satisfy the working assumptions of Section \ref{w_A}. Then it holds in probability: \vspace{-0.3cm} \begin{align} &\lim_{n\to\infty} \frac{1}{n} || \hat{{\bf x}} - {\bf x}_0 ||^2 = \delta \tau_{*}^2 - \sigma_{{\bf z}}^2 \nonumber \\ &+2(\gamma -1)\mathbb{E}_{\underset{H \sim \mathcal{N}(0,1)}{X_0 \sim p_{X_0}} } \biggr[\eta \biggr(\gamma X_0 + \tau_* H ; \frac{2 \lambda \tau_*}{\beta_*} \biggl) X_0 \biggl] , \end{align} where $(\tau_*,\beta_*)$ is the unique solution to the following: \vspace{-0.3cm} \begin{align} \label{optimal_t_b} &\underset{\tau > 0}{\operatorname{\min}} \ \underset{\beta > 0}{\operatorname{\max}} \ D(\tau, \beta ):= \frac{ \beta \tau }{2} (\delta -1) + \frac{ \beta \sigma_{{\bf z}}^2 }{2 \tau} - \frac{ \beta^2}{4} \nonumber \\ &+ \frac{ \beta \epsilon^2 \kappa}{2 \tau} + \frac{\beta}{\tau} \cdot \mathbb{E}_{X_0,H} \biggr[e \biggr(\gamma X_0 + \tau H ; \frac{2 \lambda \tau}{\beta} \biggl) \biggl]. \end{align} \end{theorem} \vspace{-0.1cm} $\tau_*$ and $\beta_*$ can be efficiently computed by writing the first order optimality conditions, i.e. $\nabla_{(\tau,\beta)} D(\tau, \beta ).$ The proof of Theorem \ref{LASSO_mse} is based on the CGMT framework and is deferred to Section \ref{Proof}.\\ The following Theorem precisely characterizes the support recovery metrics introduced in (\ref{supp}). \vspace{-0.15cm} \begin{theorem}[Probability of support recovery]\label{LASSO_on/off} Under the same settings of Theorem \ref{LASSO_mse} and for any fixed $\xi>0$, it holds in probability that: \vspace{-0.4cm} \begin{equation*} \lim_{n\to\infty} \Phi_{\xi,on}(\hat{{\bf x}}) = \mathbb{P} [\bigl | \eta (\gamma X_0 + \tau_* H ; \frac{2 \lambda \tau_*}{\beta_*} ) \bigr | \geq \xi ], \end{equation*} \vspace{-0.3cm} and \begin{equation*} \lim_{n\to\infty} \Phi_{\xi,\text{off}}(\hat{{\bf x}}) = \mathbb{P} [ \bigl| \eta (\tau_* H ; \frac{2 \lambda \tau_*}{\beta_*} ) \bigr| \leq \xi ] = 1 -2 Q \biggl(\frac{\xi}{\tau_*} + \frac{2 \lambda}{\beta_*}\biggr). \end{equation*} \end{theorem} \vspace{-0.2cm} The proof of Theorem \ref{LASSO_on/off} is also based on the CGMT and largely follows the proof of Theorem \ref{LASSO_mse} and is omitted for space limitations. \vspace{-0.5cm} \section{Numerical Results} \vspace{-0.3cm} For illustration, we focus only on the case where ${\bf x}_0$, has enties that are sampled from sparse Bernoulli distribution. i.e. most of the entries of ${\bf x}_0$ are zeros and few are equal to 1. The mean squared error of the LASSO is predicted by Theorem \ref{LASSO_mse}, and the particular term $\mathbb{E} [e (\gamma X_0 + \tau H ; \chi)]$, for $\tau>0$ in (\ref{optimal_t_b}) can be expressed as: \vspace{-0.3cm} \begin{equation*} \kappa \int e(\gamma + \tau h; \chi) \phi(h) d h + (1 - \kappa) \int e(\tau h; \chi) \phi(h) d h. \end{equation*} Figure \ref{mse_Fig} shows the accuracy of the mean squared error of the LASSO as predicted by Theorem \ref{LASSO_mse}. \\ \textbf{Remark} (Optimal Tuning): from Figure \ref{mse_Fig}, we can see that there is a value of regularizer $\lambda$ for which the MSE is minimized.\\ The prediction of theorem \ref{LASSO_on/off} for the support recovery compaired with the numerical simulations is shown in Figure \ref{on_off_Fig}. For the on-support recovery, the term $\mathbb{P} [\bigl | \eta (\gamma X_0 + \tau_* H ; \frac{2 \lambda \tau_*}{\beta_*} ) \bigr | \geq \xi ] = Q(\frac{\xi +\gamma}{\tau_*}+ \frac{2 \lambda}{\beta_*}) + Q(\frac{\xi - \gamma}{\tau_*}+ \frac{2 \lambda}{\beta_*}) $ for the sparse Bernoulli case. Both figures show the high accuracy of our predictions. \begin{figure} \input{mse03.tex} \caption{\scriptsize {The MSE performance of the LASSO. Theoretical prediction from Theorem \ref{LASSO_mse}. For simulations $\kappa =0.1, \epsilon^2= 0.1,\delta = 0.8,n=256$, SNR = 0.5, and the data are averaged over 50 independent realizations of problem.}}% \label{mse_Fig} \end{figure} \begin{figure} \input{on_off_Fig.tex} \caption{\scriptsize {Probability of scucessful on-support and off-support entries for two problem setup. The theoretical prediction (Solid and dashed lines) comes from Theorem \ref{LASSO_on/off}. For the simulations (Squares and Circles), we used $n = 256$, SNR= 0.5, $\xi= 10^{-3}, \kappa = 0.1,\epsilon^2 =0.2,$ and the data are averaged over 50 independent realizations of problem. For solid lines and squares and circles, we used $\delta= 0.8$, while for dashed lines and empty squares and circles $\delta= 1.2$.} }% \label{on_off_Fig} \end{figure} \vspace{-0.6cm} \section{Proof Outline} \label{Proof} \vspace{-0.3cm} In this section, we provide a proof outline of Theorem \ref{LASSO_mse}. For clarity, the steps of the proof are in divided into different subsections. \vspace{-0.5cm} \subsection{Convex Gaussian Min-max Theorem (CGMT)} \vspace{-0.25cm} We first need to state the key ingredient of the analysis which is the Convex Gaussian Min-max Theorem CGMT. Here, we just recall the statement of the theorem, and we refer the reader to \cite{thrampoulidis2016precise} for the complete technical requirements. Consider the following two min-max problems, which we refer to as the Primary Optimization (PO) and the Auxiliary Optimization (AO) problems: \begin{subequations} \begin{align}\label{P,AO} &\Phi({\bf G}) := \underset{{\bf w} \in \mathcal{S}_{w}}{\operatorname{\min}} \ \underset{{\bf u} \in \mathcal{S}_{u}}{\operatorname{\max}} \ {\bf u}^{T} {\bf G} {\bf w} + \psi( {\bf w}, {\bf u}), \\ &\phi({\bf g}, {\bf h}) := \underset{{\bf w} \in \mathcal{S}_{w}}{\operatorname{\min}} \ \underset{{\bf u} \in \mathcal{S}_{u}}{\operatorname{\max}} \ || {\bf w} || {\bf g}^{T} {\bf u} - || {\bf u} || {\bf h}^{T} {\bf w} + \psi( {\bf w}, {\bf u}), \label{AA2} \end{align} \end{subequations} where ${\bf G} \in \mathbb{R}^{m \times n}, {\bf g} \in \mathbb{R}^{m}, {\bf h} \in \mathbb{R}^n, \mathcal{S}_w \subset \mathbb{R}^n, \mathcal{S}_u \subset \mathbb{R}^m$ and $\psi : \mathbb{R}^n \times \mathbb{R}^m \mapsto \mathbb{R}$. Denote by ${\bf w}_{\Phi} := {\bf w}_{\Phi}({\bf G}) $ and ${\bf w}_{\phi} := {\bf w}_{\phi}( {\bf g}, {\bf h})$ any optimal minimizers of (\ref{P,AO}) and (\ref{AA2}) respectively. Let $\mathcal{S}_w, \mathcal{S}_u$ be convex, $\psi({\bf w},{\bf u})$ be convex-concave continuous on $\mathcal{S}_w \times \mathcal{S}_u$, and ${\bf G}, {\bf g}$ and ${\bf h} $ all have \textit{iid} standard normal entries. Let $\mathcal{S}$ be any arbitrary open subset of $\mathcal{S}_w $. Then, if $\lim_{n \rightarrow \infty} \mathbb{P}[{\bf w}_{\phi} \in \mathcal{S}] = 1,$ it also holds $\lim_{ n \rightarrow \infty} \mathbb{P}[{\bf w}_{\Phi} \in \mathcal{S}] = 1.$ \vspace{-0.3cm} \subsection{Identifying the (PO) and the (AO)} \vspace{-0.3cm} For convenience, we consider the vector ${\bf w} := \gamma {\bf x} - {\bf x}_0 $, then the problem in (\ref{LASSO_1}) can be reformulated in terms of ${\bf w}$ as: \vspace{-0.35cm} \begin{equation}\label{Lasso_w} \hat{{\bf w}} = \text{arg} \ \underset{{\bf w}}{\operatorname{\min}} \ || {\bf H} {\bf w} + \frac{\epsilon}{\gamma} \hbox{\boldmath$\Omega$}({\bf w}+ {\bf x}_0)-{\bf z} ||^2 + \frac{2 \lambda}{\gamma} || {\bf w} + {\bf x}_0 ||_1. \end{equation} The problem in (\ref{Lasso_w}) is still not a form of a (PO) of the CGMT, so first we need to write it in form that suits the CGMT. To do so, we first express the loss function of (\ref{Lasso_w}) in its dual form through the Fenchel conjugate, $|| {\bf H} {\bf w} + \frac{\epsilon}{\gamma} \hbox{\boldmath$\Omega$} ({\bf w}+ {\bf x}_0)-{\bf z} ||^2$ $= \max_{{\bf u}} \sqrt{n} {\bf u}^T ({\bf H} {\bf w} + \frac{\epsilon}{\gamma} \hbox{\boldmath$\Omega$} ({\bf w}+ {\bf x}_0)-{\bf z}) - \frac{n}{4} || {\bf u} ||^2$. The dual variable ${\bf u}$ is scaled by a factor $\sqrt{n}$ to have a proper normalization that guarantees the convergence afterwards. Hence, the problem in (\ref{Lasso_w}) is equivalent to the following: \vspace{-0.26cm} \begin{align}\label{LASSO-PO1} &\underset{{\bf w}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \ \sqrt{n} {\bf u}^T {\bf H} {\bf w} +\frac{\sqrt{n} \epsilon}{\gamma} {\bf u}^T \hbox{\boldmath$\Omega$} ({\bf w}+ {\bf x}_0) -\sqrt{n} {\bf u}^T {\bf z} \nonumber \\ & - \frac{n}{4} || {\bf u} ||^2 + \frac{2 \lambda}{\gamma} || {\bf w} + {\bf x}_0 ||_1. \end{align} The above problem is in the form of a (PO) of the CGMT. Therefore, we can define its corresponding (AO) as: \vspace{-0.3cm} \begin{align}\label{L_AO1} &\underset{{\bf w}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \ || {\bf w} || {\bf g}^T {\bf u} - || {\bf u} || {\bf h}^T {\bf w} +\frac{\sqrt{n} \epsilon}{\gamma} {\bf u}^T \hbox{\boldmath$\Omega$} ({\bf w}+ {\bf x}_0) - \frac{n}{4} || {\bf u} ||^2 \nonumber \\ & - \sqrt{n} {\bf u}^T {\bf z} + \frac{2 \lambda}{\gamma} || {\bf w} + {\bf x}_0 ||_1. \end{align} \vspace{-0.95cm} \subsection{Simplifying the (AO)} \vspace{-0.25cm} The next step is to show that the (AO1) as it appears in (\ref{L_AO1}) can be transformed to a Scalar Optimization (SO) problem. Since the vectors ${\bf g}$ and ${\bf h}$ are independent, $ || {\bf w} || {\bf g}^T {\bf u} - \sqrt{n} {\bf u}^T {\bf z} \buildrel d\over= \sqrt{|| {\bf w} ||^2 + n \sigma_{{\bf z}}^2}{\bf g}^T {\bf u}$. Therefore, (\ref{L_AO1}) is equivalent to \begin{align}\label{simpleAO1} &\underset{{\bf w}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \ \sqrt{|| {\bf w} ||^2 + n \sigma_{{\bf z}}^2}{\bf g}^T {\bf u} - || {\bf u} || {\bf h}^T {\bf w} - \frac{n}{4} || {\bf u} ||^2 \nonumber \\ & +\frac{\sqrt{n} \epsilon}{\gamma} {\bf u}^T \hbox{\boldmath$\Omega$} ({\bf w}+ {\bf x}_0) + \frac{2 \lambda}{\gamma} || {\bf w} + {\bf x}_0 ||_1. \end{align} Now, it is more convenient to work with ${\bf x}$ instead of ${\bf w}$, \begin{align}\label{PO22} &\underset{{\bf x}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \sqrt{n} \epsilon {\bf u}^T \hbox{\boldmath$\Omega$} {\bf x} + \sqrt{|| \gamma {\bf x} - {\bf x}_0 ||^2 + n \sigma_{{\bf z}}^2}{\bf g}^T {\bf u} \nonumber \\ & - || {\bf u} || {\bf h}^T (\gamma {\bf x} - {\bf x}_0) - \frac{n}{4} || {\bf u} ||^2 + 2 \lambda || {\bf x} ||_1. \end{align} The optimization problem in (\ref{PO22}) can be seen as another primary optimization problem (PO2). Hence, we can define another auxiliary optimization problem (AO2) that corresponds to the new (PO2). First, let ${\bf r} \in \mathbb{R}^m$ and ${\bf s} \in \mathbb{R}^n$ be standard Gaussian vectors, then the (AO2) can be defined as: \vspace{-0.25cm} \begin{align}\label{AO2} & \underset{{\bf x}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \ \epsilon || {\bf x} || {\bf r}^{T} {\bf u} - \epsilon || {\bf u} || {\bf s}^{T} {\bf x} + \sqrt{|| \gamma {\bf x} - {\bf x}_0 ||^2 + n \sigma_{{\bf z}}^2}{\bf g}^T {\bf u} \nonumber \\ & - || {\bf u} || {\bf h}^T (\gamma {\bf x} - {\bf x}_0) - \frac{n}{4} || {\bf u} ||^2 + 2 \lambda || {\bf x} ||_1. \end{align} Since ${\bf r}$ and ${\bf g}$ are independent standard Gaussian vectors, with abuse of notation, we have the following: \vspace{-0.15cm} \begin{equation*} \epsilon || {\bf x} || {\bf r}^{T} {\bf u} + \sqrt{|| \gamma {\bf x} - {\bf x}_0 ||^2 + n \sigma_{{\bf z}}^2}{\bf g}^T {\bf u} \end{equation*} \begin{equation*} \buildrel d\over= \sqrt{ || {\bf x} ||^2 + || {\bf x}_0 ||^2 -2\gamma {\bf x}_{0}^{T} {\bf x} + n \sigma_{{\bf z}}^2 }{\bf g}^T {\bf u}. \end{equation*} Therefore, the (AO2) becomes: \vspace{-0.2cm} \begin{align}\label{firstAO2} &\underset{{\bf x}}{\operatorname{\min}} \ \underset{{\bf u}}{\operatorname{\max}} \ \sqrt{ || {\bf x} ||^2 + || {\bf x}_0 ||^2 -2\gamma {\bf x}_{0}^{T} {\bf x} + n \sigma_{{\bf z}}^2 } {\bf g}^T {\bf u} - \frac{n}{4} || {\bf u} ||^2 \nonumber \\ & - || {\bf u}|| (\epsilon {\bf s} + \gamma {\bf h})^{T} {\bf x} + ||{\bf u}|| {\bf h}^{T} {\bf x}_0 + 2\lambda || {\bf x} ||_1. \end{align} Fixing the norm of ${\bf u}$ to $\beta: =|| {\bf u} ||$, we can easily optimize over its direction by aligning it with ${\bf g}$. Then the (AO2) simplifies to: \vspace{-0.45cm} \begin{align} &\underset{\beta \geq 0}{\operatorname{\max}} \ \underset{{\bf x}}{\operatorname{\min}} \ \sqrt{n} \beta \sqrt{ \frac{1}{n}(|| {\bf x} ||^2 + || {\bf x}_0 ||^2 -2\gamma {\bf x}_{0}^{T} {\bf x}) + \sigma_{{\bf z}}^2} || {\bf g} || \nonumber \\ & - \beta (\epsilon {\bf s} + \gamma {\bf h})^{T} {\bf x} + \beta {\bf h}^{T} {\bf x}_0 - \frac{n \beta^2}{4} + 2 \lambda || {\bf x} ||_1. \end{align} To have a separable optimization problem, we use the following identity: $\sqrt{\chi} = \underset{\alpha > 0}{\operatorname{\min}} \ \frac{\alpha}{2} + \frac{\chi}{2 \alpha},$ where $\chi = \frac{1}{n}( ||{\bf x} ||^2 + || {\bf x}_0 ||^2 - 2 \gamma {\bf x}_{0}^T {\bf x} ) + \sigma_{{\bf z}}^2$. Also, define $\tau :=\frac{\sqrt{n} \alpha}{|| {\bf g} ||}$, and $\tilde{{\bf h}} := \epsilon {\bf s} + \gamma {\bf h}$. This yields the following optimization problem: \begin{align}\label{AA23} &\underset{\tau > 0}{\operatorname{\min}} \ \underset{\beta > 0}{\operatorname{\max}} \ \frac{ \beta \tau || {\bf g} ||^2}{2} + \frac{n \beta \sigma_{{\bf z}}^2 }{2 \tau} - \frac{n \beta^2}{4} + \frac{\beta}{\gamma} (\tilde{{\bf h}} - \epsilon {\bf s})^{T} {\bf x}_0 \nonumber \\ &+\frac{\beta}{\tau} \biggr( \sum_{i = 1}^{n} \frac{\epsilon^2}{2} {\bf x}_{0,i}^2 - \gamma \tilde{{\bf h}}_i {\bf x}_{0,i} - \frac{\tau^2}{2} \tilde{{\bf h}}_{i}^2 \biggl) \nonumber \\ &+ \frac{\beta}{\tau} \biggr( \sum_{i = 1}^{n} \underset{{\bf x}_i}{\operatorname{\min}} \ \frac{1}{2} ( {\bf x}_i - \gamma {\bf x}_{0,i} - \tau \tilde{{\bf h}}_i)^2 + \frac{2 \lambda \tau}{\beta} |{\bf x}_i| \biggl). \end{align} The optimization over ${\bf x}_i$ can be solved in a closed-form expression using the soft-thresholding operator, which is exactly the function defined in (\ref{soft_TH}). Then, the above optimization problem simplifies to the following Scalar Optimization (SO) problem: \vspace{-0.35cm} \begin{align}\label{AO22} &\underset{\tau > 0}{\operatorname{\min}} \ \underset{\beta > 0}{\operatorname{\max}} \ \tilde{D}(\tau,\beta,{\bf g},{\bf h}) := \frac{ \beta \tau || {\bf g} ||^2}{2} + \frac{n \beta \sigma_{{\bf z}}^2 }{2 \tau} - \frac{n \beta^2}{4} \nonumber \\ &+\frac{\beta}{\tau} \biggr( \sum_{i = 1}^{n} \frac{\epsilon^2}{2} {\bf x}_{0,i}^2 - \gamma {\bf h}_i {\bf x}_{0,i} - \frac{\tau^2}{2} {\bf h}_{i}^2 \biggl) \nonumber \\ &+ \frac{\beta}{\gamma} {\bf h}^{T} {\bf x}_0 + \frac{\beta}{\tau} \sum_{i = 1}^{n} e \biggr( \gamma {\bf x}_{0,i} + \tau {\bf h}_i ; \frac{2 \lambda \tau}{\beta} \biggl). \end{align} \vspace{-0.95cm} \subsection{Probabilistic asymptotic analysis of the (SO) problem} \vspace{-0.25cm} After simplifiying the (AO2) as in (\ref{AO22}), we are now in a position to analyze its limiting behavior. First, we need to properly normalize the objective function in (\ref{AO22}) by dividing it by $n$. Then, using the WLLN, we have: $\frac{1}{n} || {\bf g} ||^2 \overset{P}{\longrightarrow} \delta, \frac{1}{n} || {\bf h} ||^2 \overset{P}{\longrightarrow} 1$, $\frac{1}{n} || {\bf x}_0||^2 \overset{P}{\longrightarrow} \kappa $ and $\frac{1}{n} {\bf h}^T {\bf x}_0 \overset{P}{\longrightarrow} 0$. Also, using the WLLN, it can be shown that for all $\tau>0$ and $\beta > 0$, $\frac{1}{n} \sum_{i = 1}^{n} e ( \gamma {\bf x}_{0,i} + \tau {\bf h}_{i} ; \frac{2 \lambda \tau}{\beta} )\overset{P}{\longrightarrow} \mathbb{E} [ e ( \gamma X_{0} + \tau H ; \frac{2 \lambda \tau}{\beta} ) ]$, and $\frac{1}{n} \sum_{i=1}^{n} \tilde{{\bf x}}_i \overset{P}{\longrightarrow} \mathbb{E}[ \eta (\gamma X_0 + \tau H ; \frac{2 \lambda \tau}{\beta})]$, where $\tilde{{\bf x}}$ is the solution of (AO2) defined in (\ref{firstAO2}). Therefore, the point-wise convergence in $\tau$ and $\beta$ of the objective function in (\ref{AO22}) is the quantity $ D(\tau, \beta)$ defined in Theorem \ref{LASSO_mse}. Furthermore, it is possible to show that with probability one, the functions $\tau \mapsto {\operatorname{\max}}_{\beta>0} \tilde{D}(\tau,\beta,{\bf g}, {\bf h})$ and $\tau \mapsto {\operatorname{\max}}_{\beta>0} D(\tau,\beta)$ are convex in $\tau$. Hence, it is possible to show using theorem 2.7 in \cite{newey1994large} that $\tau_n({\bf g},{\bf h}) \overset{P}{\longrightarrow} \tau_*$. \vspace{-0.45cm} \subsection{Applying the CGMT} \vspace{-0.25cm} We prove that the quantities $\hat{{\bf x}} - {\bf x}_0$ and $\tilde{{\bf x}} - {\bf x}_0$ are concentarted in the same set. Formally, for any fixed $\zeta > 0$, we define the set: $\mathcal{S} = \bigl \{ {\bf v}: \bigl| \frac{1}{n}|| {\bf v} ||^2 - M(\tau_*,\beta_*) \bigr| < \zeta \bigr\}$, where $M(\tau_*,\beta_*) = \delta \tau_*^2 - \sigma_{{\bf z}}^2 +2(\gamma -1) \mathbb{E}[ \eta (\gamma X_0 + \tau_* H ; \frac{2 \lambda \tau_*}{\beta_*}) X_0]$, and $\tau_*$ and $\beta_*$ are as defined in Theorem \ref{LASSO_mse}. Let $\check{{\bf x}}$ be the solution of (AO1) defined in (\ref{PO22}). The error can be written as: $|| \tilde{{\bf x}} - {\bf x}_0 ||^2 = || \tilde{{\bf w}} ||^2 + 2(\gamma - 1) \tilde{{\bf x}}^T {\bf x}_0$. Recall that $\tau_n({\bf g},{\bf h}) = \frac{\sqrt{n}}{||{\bf g}||} \sqrt{\frac{1}{n} || \tilde{{\bf w}} ||^2 + \sigma_{{\bf z}}^2}$. Using $\tau_n({\bf g},{\bf h}) \overset{P}{\longrightarrow} \tau_*$, we find $\frac{|| \tilde{{\bf w}}||^2}{n} \overset{P}{\longrightarrow} \delta \tau_*^2 - \sigma_{{\bf z}}^2$. Also, it can be shown that $\frac{1}{n}\tilde{{\bf x}}^T {\bf x}_0 \overset{P}{\longrightarrow} \mathbb{E}[ \eta (\gamma X_0 + \tau_* H ; \frac{2 \lambda \tau_*}{\beta_*}) X_0]$. Putting all the results together, it can be shown that $\frac{1}{n} || \tilde{{\bf x}} - {\bf x}_0 ||^2 \overset{P}{\longrightarrow} M(\tau_*,\beta_*)$. This proves that for any $\zeta$, $\tilde{{\bf x}} - {\bf x}_0 \in \mathcal{S}$ with probability one. Then, we conclude using the CGMT that $\check{{\bf x}} - {\bf x}_0 \in \mathcal{S}$ with probability one. A second application of the CGMT is needed to conclude that $\hat{{\bf x}} - {\bf x}_0 \in \mathcal{S}$ with probability one and is omitted for space considerations. This completes the proof of Theorem \ref{LASSO_mse}. \vspace{-0.4cm} \section{Conclusion} \vspace{-0.35cm} In this paper, we proposed a precise asymptotic analysis of the MSE and the probability of support recovery of the LASSO under imperfect Gaussian measurement matrix assumptions. Although our analysis is asymptotic in nature, numerical simulations show that our theoretical predictions are valid even for a few dozens of the problem dimensions. \vfill\pagebreak \bibliographystyle{IEEEbib} \nocite{*}
\section{Introduction: Conformal Weyl gravity and null geodesics} Conformal Weyl gravity (CWG) was born of an attempt to unify gravity and electromagnetism based on the principle of local invariance of a manifold, described by the metric $g_{\mu \nu}(x)$, under the change \begin{equation} \label{f1} g_{\mu \nu}(x)\rightarrow\Omega^2(x)\,g_{\mu \nu}(x), \end{equation}where $\Omega(x)$ is a smooth, strictly positive function \cite{W17,W18A,W18B,B21}. The CWG theory can be obtained from the conformally invariant action \begin{equation} \label{action} I_W=2\,\alpha_w \, \int {\rm d}^4 x\,\sqrt{-g}\, \left[ R_{\mu \nu}\,R^{\mu \nu}-\frac{1}{3} \left(R^{\mu }_{\mu}\right)^2\right], \end{equation} where $\alpha_w$ is a dimensionless parameter chosen to be positive if (\ref{action}) is a positive definite Euclidean action. The vacuum field equations associated with this action are solved by the static, spherically symmetric line element given by \cite{riegert84,MK89,MK91,MK91B,MK94} \begin{equation} {\rm d}\tilde{s}^{2}=-B(\tilde{r})\,{\rm d}\tilde{t}^{2}+\frac{{\rm d}\tilde{r}^{2}}{B(\tilde{r})}+ \tilde{r}^{2}({\rm d}\tilde{\theta}^{2}+\sin^{2}\tilde{\theta}\, {\rm d}\tilde{\phi}^{2}), \label{metrweyl} \end{equation} where the coordinates are defined in the range $-\infty < \tilde{t} < \infty$, $\tilde{r}\geq0$, $0\leq\tilde{\theta}\leq\pi$, $0\leq\tilde{\phi}\leq 2\pi$, and the lapse function $B(\tilde{r})$ is given by \begin{equation} B(\tilde{r})=1-\frac{\tilde{\beta}\,(2-3\tilde{\beta}\,\tilde{\gamma})}{\tilde{r}}-3\tilde{\beta}\,\tilde{\gamma}+\tilde{\gamma} \tilde{r} - \tilde{k} \tilde{r}^{2}. \label{lpasweyl} \end{equation} Here $\tilde{\beta}$, $\tilde{k}$ and $\tilde{\gamma}$ are positive constants associated with the central mass, cosmological constant and the measurements of the departure of the Weyl theory from the Einstein - de Sitter, respectively. Clearly, taking the limit $\tilde{\gamma}=0=\tilde{k}$ recovers the Schwarzschild case so that we can identify $\tilde{\beta} = M$. A study of the basis and properties, together with applications of the motion of massive and massless particles in this geometry can be found, for example, in \cite{edery98,PI04,PII04,sultana10,sultana12,vo13,said13,said,Lu12,Payandeh:2012mj}, and can be obtained using the standard Lagrange procedure \cite{chandra,COV05,shutz,OSLV11,jaklitsch,VSOC13,Halilsoy:zva,LSV11}, which allows a Lagrangian $\mathcal{L}$ to be associated with the metric and then, the equation of motion to be obtained from the Lagrange's equations \begin{equation} \dot{\Pi}_{q} - \frac{\partial \mathcal{L}}{\partial q} = 0, \label{lageq} \end{equation} where $\Pi_{q} = \partial \mathcal{L}/\partial \dot{q}$ are the conjugate momenta to the coordinate $q$, and the dot denotes a derivative with respect to the affine parameter $\tau$ along the geodesic. Thus, in Sec. \ref{TTSEc}, and following the procedure performed by Klemm \cite{klemm98}, we perform analytical continuations to obtain a non-trivial topology associated with toroidal topological black holes coming from CWG. In particular, we focus on the toroidal AdS black hole. Other studies associated with topological black holes can be found, for example, in Refs. \cite{olivera,ligeia}, among others. Then we obtain the conserved quantities together with the equations of motion for massless particles on these manifolds. In Sec. \ref{RMTT} the radial motion is analyzed for photons going to spatial infinite or to the singularity, while Sec. \ref{AMTT} is devoted to obtaining analytically the trajectory for photons with non-zero angular momentum, for which we employ an analysis in terms of Jacobi elliptic functions. In Sec. \ref{SETT} we apply the methods outlined by Sakurai, Tartaglia, Rizzi \& Ruggiero, among others, to obtain an analogy to the Aharanov-Bohm effect to describe the Sagnac effect for this space-time. Finally, in Sec. \ref{STT} we conclude and summarize our results. \section{Toroidal topology}\label{TTSEc} In order to obtain a toroidal topological black hole, we perform the following analytical continuation of the metric (\ref{metrweyl}): \begin{eqnarray} \nonumber &&\tilde{t} \rightarrow \sqrt{\alpha}\,t, \quad \tilde{r}\rightarrow \frac{r}{\sqrt{\alpha}},\quad \tilde{\phi}\rightarrow \phi,\\ \nonumber && \tilde{\theta}\rightarrow \sqrt{\alpha}\,\theta, \quad \tilde{\beta} \rightarrow \frac{\beta}{\sqrt{\alpha}}, \quad \tilde{\gamma} \rightarrow \frac{\gamma}{\sqrt{\alpha}},\quad \tilde{k} \rightarrow k. \end{eqnarray} Then, by taking the limit $\alpha \rightarrow 0$, the line element becomes \begin{equation} \label{metrtoroidal} {\rm d}s^2=-B(r)\,{\rm d}t^{2}+\frac{{\rm d}r^{2}}{B(r)}+r^{2}({\rm d}\theta^{2}+\theta^{2}\,{\rm d}\phi^{2}), \end{equation} with the lapse function \begin{equation} \label{laptoroidal} B(r)=\frac{3\,\beta^2\,\gamma}{r}-3\,\beta\gamma+\gamma\,r-k\,r^2. \end{equation} In this case, it is possible to prove that the metric induced on the spacelike surface of constant $t$ and $r$ corresponds to a compact orientable surface with genus $g=1$, i.e., a torus, so the topology of this four-dimensional manifold becomes $\mathbb{R}^2\times S^1\times S^1$ \cite{klemm98}. Therefore, performing $\gamma=-2\eta/L$, $\beta=\sqrt{L/3}$, $k=-1/\ell^2$, and then evaluating at the limit $L\rightarrow\infty$, the lapse function becomes \begin{equation} \label{lapsads}B(r)=-\frac{2\eta}{r}+\frac{r^2}{\ell^2}, \end{equation}which for $\eta>0$ describes the AdS uncharged static toroidal black hole \cite{lemos,huang,mann97,brill,vanzo,maeda,astorino} with the event horizon placed at \begin{equation} \label{horiz}r_+=(2\,\eta\, \ell^2)^{1/3}.\end{equation} The vanished Lagrangian associated with the photons that move on this manifold can be expressed as \begin{equation} \label{lagr}\mathcal{L}=-\frac{1}{2} B(r) \dot{t}^2+\frac{1}{2}\frac{\dot{r}^2}{B(r)}+\frac{1}{2}r^2 (\dot{\theta}^2+\theta^2\,\dot{\phi}^2)=0. \end{equation} Conversely, the toroidal metric given by Eqs. (\ref{metrtoroidal}) and (\ref{lapsads}) admits the following Killing vectors field: \begin{itemize} \item the {\it time-like Killing vector} $\chi=\partial_t$ is related to the {\rm stationarity} of the metric. The conserved quantity is given by \begin{equation} \label{energy} g_{\mu \nu}\,\chi^{\mu}\,u^{\nu}=-B(r)\,\dot{t}=-\sqrt{E} \end{equation} where $E$ is a constant of motion that cannot be associated with the total energy of the test particle because this metric is not asymptotically flat. \item the most general \textit{space-like Killing vector} is given by \begin{equation} \vec{\chi}= \left(A\,\cos \phi+B\,\sin \phi \right)\,\partial_{\theta} +\left[C-A\frac{\,\sin \phi}{\theta}+B\,\frac{\cos \phi}{\theta}\right]\,\partial_{\phi}, \end{equation} where $A$, $B$ and $C$ are arbitrary constants. Is easy to see that it is a linear combination of the three Killing vectors \begin{eqnarray}\nonumber &&\chi_1=\partial_{\phi},\\ \nonumber &&\chi_2= \cos \phi\, \partial_{\theta}-\frac{\sin \phi}{\theta}\,\partial_{\phi},\\ \nonumber && \chi_3=\sin \phi\, \partial_{\theta}+\frac{\cos \phi}{\theta} \partial_{\phi} \end{eqnarray} which are the angular momentum operators for this space-time. The conserved quantities are given by \begin{eqnarray}\label{cca0} g_{\alpha \beta }\,\chi_{1}^{\alpha}\,u^{\beta} &=&r^{2}\,\theta^2\,\dot{\phi} =L_1, \\ \label{cca1} g_{\alpha \beta }\,\chi_{2}^{\alpha}\,u^{\beta} &=&r^{2}\,(\cos\phi\,\dot{\theta}-\theta\,\sin\phi\,\dot{\phi}) =L_2, \\ \label{cca2} g_{\alpha \beta }\,\chi_{3}^{\alpha}\,u^{\beta} &=& r^{2}\,(\sin\phi\,\dot{\theta}+\theta\, \cos\phi\,\dot{\phi}) =L_3, \end{eqnarray} where $L_1$, $L_2$ and $L_3$ are constants associated with the angular momentum of the particles. \end{itemize} It is interesting to point out that Eqs. (\ref{cca1}) and (\ref{cca2}) implies that \begin{equation} \label{defj}J^2\equiv L_2^2+L_3^2=r^4 (\dot{\theta}^2+\theta^2\,\dot{\phi}^2), \end{equation}such that, if we focus our attention on the invariant plane $\theta=\theta_0$, so $\dot{\theta}=0$, we get that $L_1=\theta_0 \,J$. Thus, using Eqs. (\ref{energy}) and (\ref{defj}) in Eq. (\ref{lagr}) we obtain the radial equation of motion corresponding to the one-dimensional problem \begin{equation} \dot{r}^{2}=E-\mathcal{V}(r), \label{lagrhyp} \end{equation} where $\mathcal{V}(r)$ is the {effective potential} defined as \begin{equation} \label{effpot} \mathcal{V}(r)=J^2\,\frac{B(r)}{r^2}\equiv J^2 \,V(r). \end{equation} Here $V(r)=B(r)/r^2$ is the {\it effective potential per unit of $J^2$}. On the other hand, without lack of generality we choose $\theta_0=1$ and combining Eqs (\ref{defj}) and (\ref{lagrhyp}), we obtain the angular motion equation \begin{equation} \left(\frac{1}{r^2}\frac{dr}{d\phi}\right)^{2}= \frac{1}{b^2}-V(r)=\frac{2\,\eta}{r^3}-\left(\frac{1}{\ell^2}-\frac{1}{b^2}\right), \label{radialpolareq} \end{equation} where $b=J/\sqrt{E}$ is the impact parameter. \begin{figure}[h!] \includegraphics[width=.45\textwidth]{effpot.eps} \caption{Graphs of the topological toroidal effective potential as a function of the radial coordinate. The critical impact parameter $b_c$ corresponds to the value of $b$ at $r\rightarrow \infty$.}\label{pot} \end{figure} In Fig. \ref{pot} we have plotted the effective potential (per unit of $J^2$) as a function of the radial coordinate. In the next sections the motion of massless particles will be analyzed analytically by integration of the equations of motion. \section{Radial Motion}\label{RMTT} Radial motion corresponds to a trajectory with null angular momentum $J=0$, so photons fall toward the singularity or to the spatial infinite. From Eq. (\ref{effpot}) we can see that photons in radial motion have a null effective potential $\mathcal{V}(r)=0$, so that Eqs. (\ref{energy}) and (\ref{lagrhyp}) become \begin{equation} \frac{dr}{d\tau}=\pm \sqrt{E}, \label{mr.1} \end{equation} and \begin{equation} \frac{\textrm{d}r}{dt}=\pm B(r)=\pm\frac{1}{\ell^2}\left(\frac{r^3-r_+^3}{r}\right), \label{mr.2} \end{equation}where the sign $-$ ($+$) corresponds to photons falling to the event horizon (spatial infinite). Assuming that $t=\tau=0$ at $r=r_i$, then a straightforward integration of Eq. (\ref{mr.1}) leads to \begin{equation} \label{tau}\tau(r)=\pm\frac{r-r_i}{\sqrt{E}}, \end{equation}while an integration of Eq. (\ref{mr.2}) becomes \begin{eqnarray} \nonumber t(r)=&&\pm \frac{\ell^2}{\sqrt{3}\,r_+}\left\{\arctan\left(\frac{2r+r_+}{\sqrt{3}\,r_+}\right)-\arctan\left(\frac{2r_i+r_+}{\sqrt{3}\,r_+}\right)+\right.\\ \label{t} &&\left.+\log\left[\frac{r_i^3-r_+^3}{r^3-r_+^3}\left(\frac{r-r_+}{r_i-r_+}\right)^3 \right]\right\}. \end{eqnarray} Obviously, in the proper system photons cross the event horizon in a finite time $\tau(r_+)\equiv\tau_+=(r_i-r_+)/\sqrt{E}$ and, eventually, arrive to the singularity in a finite time $\tau(0)\equiv\tau_0=r_i/\sqrt{E}$. Also, they eternally approach the spatial infinite i. e., $\tau(\infty)\rightarrow \infty$. On the other hand, an observer at $r_i$ sees that photons take an infinite coordinate-time even to arrive at $r_+$, while it takes a finite coordinate-time even to arrive at the spatial infinite, given by \begin{equation} \label{tinf}t_{\infty}=\frac{\ell^2}{\sqrt{3}\,r_+}\left\{\frac{\pi}{2}-\arctan\left(\frac{2r_i+r_+}{\sqrt{3}\,r_+}\right)+\log\left[\frac{r_i^3-r_+^3}{(r_i-r_+)^3} \right]\right\}. \end{equation}The existence of this time is due to the presence of the cosmological term on the toroidal topology and depends on the position of the observer $r_i$. A similar feature was reported before by Villanueva \& V\'asquez, but in the context of Lifshitz black holes \cite{Villanueva:2013gra}. The behavior of both proper and coordinate time is shown in Fig. \ref{temp}. \begin{figure}[!h] \begin{center} \includegraphics[width=80mm]{temp.eps} \end{center} \caption{Temporal null geodesics for radial motion described by Eqs. (\ref{tau}) and (\ref{t}). This shows some equivalence with its spherical counterpart previously studied by Cruz et al. \cite{COV05} for photons moving to $r_+$. The novel result appears for photons moving to infinite in which, as is measured by an observer in $r_i$, it takes a finite coordinate time $t_{\infty}$ to reach infinite. This feature was reported before by Villanueva \& V\'asquez but in the context of Lifshitz space-times \cite{Villanueva:2013gra}.} \label{temp} \end{figure} \section{Angular Motion}\label{AMTT} This section is devoted to studying the angular motion of the test particles ($J\neq 0$), which depends on the value of the impact parameter $b$. From Fig. \ref{pot} we can see that there are two distinct regions separated by the critical impact parameter $b_c=\ell$. Thus, if $b>b_c$ the motion will be confined with a turning point, {\it the apoastron distance} $r_t$, placed at \begin{equation} \label{rt}r_t(b)=\frac{r_+}{\left[1-\left(\frac{b_c}{b}\right)^2\right]^{1/3}}, \end{equation}whereas if $b<b_c$ does not exist the turning point, and the motion is unbound with a negative characteristic distance (without physical meaning), the magnitude of which is \begin{equation}r_D(b)=\frac{r_+}{\left[\left(\frac{b_c}{b}\right)^2-1\right]^{1/3}}. \label{rd}\end{equation} Both distances, $r_t$ and $r_D$, play an important role in the determination of trajectories because they depend strongly on the impact parameter $b$ (see Figs. \ref{rtfig} and \ref{rdfig}). \subsection{Confined motion} Returning to the general Eq. (\ref{radialpolareq}), we first consider the case when the impact parameter lies between $b_c<b<\infty$, so using the variable $u=1/r$ with $u_t=1/r_t$, we can write \begin{eqnarray} \nonumber \frac{{\rm d}u}{{\rm d}\phi}&=&\pm \sqrt{2\,\eta}\,\sqrt{u^3-u_t^3}\\\label{raduq} &=&\pm \sqrt{2\,\eta}\,\sqrt{(u-u_t)\left[\left(u+\frac{u_t}{2}\right)^2+\frac{3\, u_t^2}{4}\right]}. \end{eqnarray}Using the substitution \begin{equation} \label{subs1}u=u_t\,\left(\sqrt{3}\,\cot^2 \frac{\xi}{2}+1\right), \end{equation} where the range of $u$ is $u_t\leq u<\infty$, and the corresponding range of $\xi$ is $\xi_t=\pi\leq \xi<2\pi$, Eq. (\ref{raduq}) can be reduced to the elliptic form \begin{eqnarray} \nonumber& \pm& \alpha_1\,\int_{\phi_t}^{\phi}{\rm d}\phi'=\int_{\pi}^{\xi}\frac{{\rm d}\varphi}{\sqrt{1-k_1^2\,\sin^2 \varphi}}\\\label{phiu} &=&\int_{0}^{\xi}\frac{{\rm d}\varphi}{\sqrt{1-k_1^2\,\sin^2 \varphi}}-\int^{\pi}_{0}\frac{{\rm d}\varphi}{\sqrt{1-k_1^2\,\sin^2 \varphi}}, \end{eqnarray}where \begin{equation} \label{modk}\alpha_1= \sqrt{2\sqrt{3}\,\eta\,u_t},\qquad k_1=\sqrt{\frac{2-\sqrt{3}}{4}}. \end{equation} So, we may write the solution for $\phi$ as \begin{equation} \label{solthet}\pm \alpha_1\, \phi=2K(k_1)-F(\xi, k_1), \end{equation}where $K(k)$ and $F(\psi, k)$ are the complete and incomplete elliptic integrals of the first kind, respectively, and we have assumed that $\phi_t=0$. Therefore, by using some formulas and identities of the Jacobian elliptic functions, we can write the equation of the trajectory as \begin{equation} \label{trayrt}r(\phi, b)=\frac{r_t(b)}{1+\sqrt{3}\,\textrm{tn}^2\left(\frac{\alpha_1(b)\,\phi}{2}, k_1\right)\,\textrm{dn}^2\left(\frac{\alpha_1(b)\,\phi}{2}, k_1\right)}, \end{equation}where tn$(x, k)$ and dn$(x, k)$ are Jacobi's elliptic functions (see \ref{app:jef} and Refs. \cite{byrd,hancock,Armitage}). Obviously, this trajectory depends on the impact parameter and is shown in Fig. \ref{conf} for photons falling from $r_t$. \begin{figure}[!h] \begin{center} \includegraphics[width=83mm]{rt.eps} \end{center} \caption{Plot for the turning point or {\it apoastron}, $r_t$ as a function of the impact parameter $b$. The validity of this function is in $b_c<b<\infty$.} \label{rtfig} \end{figure} \begin{figure}[!h] \begin{center} \includegraphics[width=75mm]{conf.eps} \end{center} \caption{Polar plot for a confined trajectory of photons from a distance $r_t$.} \label{conf} \end{figure} \subsection{Unbounded motion} We now consider the case when the impact parameter lies between $0<b<b_c$, which means that the real root is a negative one $r_n\equiv-r_D$, where $r_D$ is given by Eq. (\ref{rd}), so there is no turning point. Obviously, this negative root lacks physical interpretation, but it is important for determining the shape of the trajectory. Therefore, making $u=1/r$ again with $u_D=1/r_D$, the Eq. of motion (\ref{radialpolareq}) can be written as \begin{eqnarray} \nonumber \frac{{\rm d}u}{{\rm d}\phi}&=&\pm \sqrt{2\,\eta}\,\sqrt{u^3+u_D^3}\\\label{unbound} &=&\pm \sqrt{2\,\eta}\,\sqrt{(u+u_D)\left[\left(u-\frac{u_D}{2}\right)^2+\frac{3\, u_D^2}{4}\right]}. \end{eqnarray} In order to integrate Eq. (\ref{unbound}), we now make the substitution \begin{equation} \label{cv2}u=u_D\left(\sqrt{3}\,\cot^2 \frac{\xi}{2}-1\right), \end{equation}where the range is \begin{eqnarray} \label{rang1} &&u\rightarrow 0\quad ({\rm infinity}), \quad \xi_{\infty}=\arccos\left(-\frac{2-\sqrt{3}}{2}\right),\\ \label{rang2}&&u\rightarrow \infty \quad ({\rm singularity}), \quad \xi_{s}=\pi, \end{eqnarray} so the quadrature becomes \begin{eqnarray} \nonumber &&\pm \alpha_2\,\int_{\phi_{\infty}}^{\phi}{\rm d}\phi'=\int_{\xi_{\infty}}^{\xi}\frac{{\rm d}\varphi}{\sqrt{1-k_2^2\,\sin^2 \varphi}}\\\label{phiun} &=&\int_{0}^{\xi}\frac{{\rm d}\varphi}{\sqrt{1-k_2^2\,\sin^2 \varphi}}-\int^{\xi_{\infty}}_{0}\frac{{\rm d}\varphi}{\sqrt{1-k_2^2\,\sin^2 \varphi}}, \end{eqnarray}with \begin{equation} \label{modku}\alpha_2= \sqrt{2\sqrt{3}\,\eta\,u_D},\qquad k_2=\sqrt{\frac{2+\sqrt{3}}{4}}. \end{equation}Note from Eqs. (\ref{modk}) and (\ref{modku}) that the module of one trajectory corresponds to the complementary module of the other, $k_1=\sqrt{1-k_2^2}=k'_2$ and $k_2=\sqrt{1-k_1^2}=k'_1$. Therefore, assuming that $\phi_{\infty}=0$ we may write \begin{equation} \label{unbthe}\pm \alpha_2\,\phi=F(\xi, k_2)-F(\xi_{\infty}, k_2), \end{equation}which implies that the trajectory now is described by the polar equation \begin{equation} \label{radunb}r(\phi, b)=\frac{r_D(b)}{\sqrt{3}\,{\rm cs}^2(\Theta, k_2) \,{\rm nd}^2(\Theta, k_2)-1},\end{equation} where cs$(x, k)$ and nd$(x, k)$ are Jacobi's elliptic functions (see \ref{app:jef}), and the phase $\Theta$ is given by \begin{equation} \label{phas}\Theta=\frac{F(\xi_{\infty}, k_2)-\alpha_2(b)\,\phi}{2}. \end{equation}In Fig. \ref{unbfig} we have plotted the unbounded trajectory (\ref{radunb}) for photons coming from infinite. \begin{figure}[!h] \begin{center} \includegraphics[width=83mm]{rd.eps} \end{center} \caption{Plot for the modulus of the real negative root $r_D$ as a function of the impact parameter associated with the unbounded motion of photons, i.e. $0<b<b_c$.} \label{rdfig} \end{figure} \begin{figure}[!h] \begin{center} \includegraphics[width=75mm]{unb.eps} \end{center} \caption{Polar plot for the unbounded trajectory, Eq. (\ref{radunb}), followed by photons whose impact parameter lies between $0<b<b_c$.} \label{unbfig} \end{figure} \section{The Sagnac effect}\label{SETT} In this section we describe the Sagnac effect \cite{sagnac} by applying the formalism developed by Sakurai \cite{sakurai}, Tartaglia \cite{tartaglia}, Rizzi \& Ruggiero \cite{rizzirugg04,Rizzi:2003bf,Rizzi:2003uc,ruggiero05}, among others, to the exterior space-time of the topoloical toroidal black hole. This approach was used to calculate this effect in the exterior space-time to an uncharged spherical symmetric black hole in Conformal Weyl gravity \cite{sultana14}. For the non-rotating toroidal metric given by Eqs. (\ref{metrtoroidal}) and (\ref{lapsads}) written in the usual Schwarzschild--like coordinates ($ct', r', \theta', \phi'$): \begin{eqnarray} \nonumber {\rm d}s^2&=&-\left(-\frac{2\eta}{r'}+\frac{r'^2}{\ell^2}\right)\,c^2{\rm d}t'^{2}+\frac{{\rm d}r'^{2}}{\left(-\frac{2\eta}{r'}+\frac{r'^2}{\ell^2}\right)}+\\\label{metrtoroidal2} &&+r'^{2}({\rm d}\theta'^{2}+\theta'^{2}\,{\rm d}\phi'^{2}), \end{eqnarray}so the transformation to the azimuthal frame of the rotating platform \begin{equation} \label{plat}ct=ct',\quad r=r',\quad \theta=\theta',\quad \phi=\phi'-\Omega t', \end{equation}where $\Omega$ is the constant angular velocity of the physical frame, yields the metric (after setting $r=R$ and $\theta=1$) \begin{eqnarray} \nonumber {\rm d}s^2&=&-\left(-\frac{2\eta}{R}+\frac{R^2}{\ell^2}-\frac{\Omega^2 R^2}{c^2}\right)\,{\rm d}(ct)^{2}+R^{2}{\rm d}\phi^{2}+\\\label{metrtoroidal3} &&+2\frac{\Omega}{c}\,R^2\,{\rm d}\phi\,{\rm d}(ct). \end{eqnarray} Therefore, the non-zero components of the unit vector $\gamma^{\alpha}$ along the trajectory $r=R$ are given by \begin{eqnarray} \label{gammafunc1} \gamma^t&=&\frac{1}{\sqrt{-g_{tt}}}=\gamma_J,\\ \label{gammafunc2} \gamma_t&=&-\sqrt{-g_{tt}}=-\gamma_J^{-1},\\ \label{gammafunc3} \gamma_{\phi}&=&g_{\phi t}\,\gamma^t=\frac{\Omega}{c}\,R^2\,\gamma_J, \end{eqnarray} where \begin{equation} \label{gaj}\gamma_J=\left[R^2\left(\frac{1}{\ell^2}-\frac{\Omega^2}{c^2}\right)-\frac{2\eta}{R}\right]^{-1/2}. \end{equation}In terms of this component, the gravito-electric and gravito-magnetic potentials are given by \begin{eqnarray} \label{pot1}\phi^G&=&-c^2\,\gamma^t=-c^2\,\gamma_J,\\ \label{pot2}A_{\phi}^G&=&c^2 \frac{\gamma_{\phi}}{\gamma_t}=- c\,\Omega\, R^2\, \gamma_J^2. \end{eqnarray}As was shown in \cite{Rizzi:2003uc}, it is possible to express the phase shift and time delay between light beams detected by a co-moving observer on the interferometer in terms of the gravito-magnetic induction field, $\vec{B}^G=\vec{\nabla}\times \vec{A}^G$, by means of the expressions \begin{equation} \label{delph}\Delta \Phi=\frac{2\, \epsilon\, \gamma_t}{\hbar\,c^3}\int_{S}\vec{B}^G \cdot {\rm d}\vec{S}=\frac{2\, \epsilon\, \gamma_t}{\hbar\,c^3}\int_{\zeta(S)}\vec{A}^G \cdot {\rm d}\vec{r}, \end{equation}and \begin{equation} \label{delt}\Delta \tau=\frac{2\gamma_t}{c^3}\int_{S}\vec{B}^G \cdot {\rm d}\vec{S}=\frac{2 \gamma_t}{c^3}\int_{\zeta(S)}\vec{A}^G \cdot {\rm d}\vec{r}, \end{equation}where $\epsilon$ is the relative energy of the photon as measured in the interferometer. \begin{figure}[!h] \begin{center} \includegraphics[width=85mm]{om.eps} \end{center} \caption{Plot for the maximum angular velocity $\Omega_R$ as a function of the radius of the orbit $R$ for an interferometer in the Sagnac effect.} \label{om} \end{figure} Therefore, the phase shift turns out to be \begin{equation} \label{shift1}\Delta \Phi=\frac{4\pi \epsilon}{\hbar c}\frac{\tilde{\Omega}R}{\sqrt{1-\tilde{\Omega}^2-\frac{r_+^3}{R^3}}}, \end{equation}while the time delay turns out to be \begin{equation} \label{shift2}\Delta \tau=\frac{4\pi }{c}\frac{\tilde{\Omega}R}{\sqrt{1-\tilde{\Omega}^2-\frac{r_+^3}{R^3}}}, \end{equation}where $\tilde{\Omega}=\Omega/\Omega_{\ell}$ is the dimensionless angular velocity, and $\Omega_{\ell}\equiv c/\ell$. Thus, from this last equation, we can see that if $\Omega=0$, i.e., performing a measure of the propagation time in a non-rotating frame, no Sagnac effect arises. Also, there is an upper limit for the angular velocity $\Omega_R$ related to the radius of the orbit $R$ (see Fig. \ref{om}) given by \begin{equation} \label{condrw}\Omega<\Omega_R \equiv \Omega_{\ell}\,\sqrt{1-\left(\frac{r_+}{R}\right)^3}. \end{equation} \section{Summary}\label{STT} In this paper we have studied the null structure of the geodesics for a toroidal topological space-time which surrounds a black hole in the conformal Weyl gravity. First, we obtained an explicit behavior of radial photons to conclude that, while no changes in the motion to the singularity with respect to the Schwarzschild anti-de Sitter counterpart is found, there is a non-trivial coordinate time $t_{\infty}$ for the description of the motion to the spatial infinite (see Eq. (\ref{tinf})). A similar result was obtained by Villanueva \& V\'asquez but in the context of the Lifshitz space-time \cite{Villanueva:2013gra}. Next, following the standard Lagrangian procedure, we have obtained analytically the trajectories of the confined and unbounded angular motion for photons in terms of Jacobi elliptic functions, Eqs. (\ref{trayrt}) and (\ref{radunb}), and then we have shown our results in Fig. \ref{conf} and Fig. \ref{unbfig}, respectively. Obviously, these trajectories depend on the impact parameter $b$ and, due to the topology, always fall to the singularity, which is a characteristic of AdS space-times. Finally, the Sagnac effect has been studied for this topological space-time. Our result is consistent with those obtained previously in other geometries in the sense that no Sagnac effect arises for a non-rotating frame. In addition, we have found a strong condition for its existence, which depends on the theory's parameters $\{\eta, \ell\}$ (in $r_+$ and $\Omega_{\ell}$) as well as on the radius of the circular orbit $R$. This condition is given in Eq. (\ref{condrw}), c.f. \begin{equation} \nonumber \Omega<\Omega_R \equiv \Omega_{\ell}\,\sqrt{1-\left(\frac{r_+}{R}\right)^3}, \end{equation}for which the upper limit for the angular velocity $\Omega_R$ was plotted in Fig. \ref{om} as a function of the radius $R$. Finally, our study provides a simple physical visualization of the null trajectories and their main issues, and complements other studies carried out in the standard and/or trivial topology \cite{vo13,sultana14}.
\section{Introduction} \label{sec:introduction} Randomized experiments are often considered the ``gold standard" of scientific investigations because, on average, randomization balances all potential confounders, both observed and unobserved \citep{krause2003random}. However, many have noted that randomized experiments can yield ``bad allocations,'' where some covariates are not well-balanced across treatment groups \citep{seidenfeld1981levi,lindley1982role,papineau1994virtues,rosenberger2008handling}. Covariate imbalance among different treatment groups complicates the interpretation of estimated causal effects, and thus covariate adjustments are often employed, typically through regression or other comparable methods. However, it would be better to prevent such covariate imbalances from occurring before treatment is administered, rather than depend on assumptions for covariate adjustment post-treatment which may not hold \citep{freedman2008regression}. One common experimental design tool is blocking, where units are first grouped together based on categorical covariates, and then treatment is randomized within these groups. However, blocking is less intuitive when there are non-categorical covariates. A more recent experimental design tool that prevents covariate imbalance and allows for non-categorical covariates is the rerandomization scheme of \cite{morgan2012rerandomization}, where units are randomized until a prespecified level of covariate balance is achieved. Rerandomization has been discussed as early as R.A. Fisher (e.g., see \cite{fisher1992arrangement}), and more recent works (e.g., \cite{cox2009randomization}, \cite{bruhn2009pursuit}, and \cite{worrall2010evidence}) recommend rerandomization. \cite{morgan2012rerandomization} formalized these recommendations in treatment-versus-control settings and was one of the first works to establish a theoretical framework for rerandomization schemes. Since \cite{morgan2012rerandomization}, several extensions have been made. \cite{morgan2015rerandomization} developed rerandomization for treatment-versus-control experiments where there are tiers of covariates that vary in importance; \cite{branson2016improving} extended rerandomization to $2^K$ factorial designs; and \cite{ernst2017sequential} developed a rerandomization scheme for sequential designs. Finally, \cite{li2018asymptotic} established asymptotic results for the rerandomization schemes considered in \cite{morgan2012rerandomization} and \cite{morgan2015rerandomization}, and \cite{li2020rerandomization} established asymptotic results for regression adjustment combined with rerandomization. All of these works focus on using an omnibus measure of covariate balance---the Mahalanobis distance \citep{mahalanobis1936generalised}---during the rerandomization scheme. The Mahalanobis distance is well-known within the matching and observational study literature, where it is used to find subsets of the treatment and control that are similar \citep{rubin1974multivariate,rosenbaum1985constructing,gu1993comparison,rubin2000combining}. The Mahalanobis distance is particularly useful in rerandomization schemes because (1) it is symmetric in the treatment assignment, which leads to unbiased estimators of the average treatment effect under rerandomization; and (2) it is equal-percent variance reducing if the covariates are ellipsoidally symmetric, meaning that rerandomization using the Mahalanobis distance reduces the variance of all covariate mean differences by the same percentage \citep{morgan2012rerandomization}. However, the Mahalanobis distance is known to perform poorly in matching for observational studies when covariates are not ellipsoidally symmetric, there are strong collinearities among the covariates, or there are many covariates \citep{gu1993comparison,olsen1997multivariate,stuart2010matching}. One reason for this is that matching using the Mahalanobis distance places equal importance on balancing all covariates as well as their interactions \citep{stuart2010matching}, and this issue also occurs in rerandomization schemes that use the Mahalanobis distance. This issue was partially addressed by \cite{morgan2015rerandomization}, who proposed an extension of \cite{morgan2012rerandomization} that incorporates tiers of covariates that vary in importance, such that the most important covariates receive the most variance reduction. However, this requires researchers to specify an explicit hierarchy of importance for the covariates, which might be difficult, especially when the number of covariates is large. Furthermore, it is unclear how to conduct current rerandomization schemes if collinearity is so severe that the covariance matrix of covariates is degenerate, and thus the Mahalanobis distance is undefined. As an alternative, we consider a rerandomization scheme using a modified Mahalanobis distance that inflates the eigenvalues of the covariates' covariance matrix to alleviate collinearities among the covariates, which has connections to ridge regression \citep{hoerl1970ridge}. Such a quantity has remained largely unexplored in the literature. First we establish several theoretical properties about this quantity, as well as several properties about a rerandomization scheme that uses this quantity. We show through simulation that a rerandomization scheme that incorporates this modified criterion can be beneficial in terms of variance reduction when there are strong collinearities among the covariates. In particular, this rerandomization scheme automatically specifies a hierarchy of importance based on the eigenstructure of the covariates, which can be useful when researchers are unsure about how much importance they should place on each covariate when designing a randomized experiment. We also discuss how this modified Mahalanobis distance connects to other criteria, such as principal components and the Euclidean distance. Because the rerandomization literature has focused almost exclusively on the Mahalanobis distance, this work also contributes to the literature by exploring the use of other criteria besides the Mahalanobis distance for rerandomization schemes. The remainder of this paper is organized as follows. In Section \ref{sec:notation}, we introduce the notation that will be used throughout the paper. In Section \ref{sec: review}, we review the rerandomization scheme of \cite{morgan2012rerandomization}. In Section \ref{s:ridgeRerandomization}, we outline our proposed rerandomization approach and establish several theoretical properties of this approach, as well as several theoretical properties about the modified Mahalanobis distance. In Section \ref{s:simulations}, we provide simulation evidence that suggests that our rerandomization approach is often preferable over other rerandomization approaches, particularly in high-dimensional or high-collinearity settings. In Section \ref{s:discussion}, we conclude with a discussion of future work. \section{Notation} \label{sec:notation} We use the colon notation $\lambda_{1:K} = (\lambda_1,...,\lambda_K)\in\mathbb{R}^K$ for tuples of objects, and we let $f(\lambda_{1:K}) = (f(\lambda_1),...,f(\lambda_K))$ for any univariate function $f:\mathbb{R}\rightarrow\mathbb{R}$. We respectively denote by $\mathbf{I}_N$ and $\mathbf{1}_N$ the $N\times N$ identity matrix and the $N$-dimensional column vector whose coefficients are all equal to $1$. Given a matrix $A$, we denote by $A_{ij}$ its $(i,j)$-coefficient, $A_{i\bullet}$ its $i$-th row, $A_{\bullet j}$ its $j$-th column, $A^\top$ its transpose, and $\text{tr}(A)$ its trace when $A$ is square. Given two symmetric matrices $A$ and $B$ of the same size, we write $A>B$ (resp.\! $A\geq B$) if the matrix $A-B$ is positive definite (resp.\! semi-definite). Let $\mathbf{x}$ be the $N\times K$ matrix representing $K$ covariates measured on $N$ experimental units. Let $W_i = 1$ if unit $i$ is assigned to treatment and 0 otherwise, and let $\mathbf{W} = (W_1\,\dots\, W_N)^\top$. Unless stated otherwise, we will focus on completely randomized experiments \citep[see Definition 4.2]{imbens2015causal} with a fixed number of $N_T$ treated units and $N_C=N-N_T$ control units. For a given assignment vector $\mathbf{W}$, we define $\bar{\mathbf{x}}_T = N_T^{-1\,} \mathbf{x}^\top \mathbf{W}$ and $\bar{\mathbf{x}}_C = N_C^{-1\,}\mathbf{x}^\top\left(\mathbf{1}_N-\mathbf{W}\right)$ as the respective covariate mean vectors within treatment and control. For completely randomized experiments, the covariance matrix of the covariate mean differences is $\mathbf{\Sigma} = \cov{\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C\,|\,\mathbf{x}} = N N_T^{-1}N_C^{-1} S^2_{\mathbf{x}}$, where $S^2_{\mathbf{x}} = (N-1)^{-1}(\mathbf{x}-\mathbf{1}_N\bar{\mathbf{x}}_N)^\top(\mathbf{x}-\mathbf{1}_N\bar{\mathbf{x}}_N)$ is the sample covariance matrix of $\mathbf{x}$ with $\bar{\mathbf{x}}_N = N^{-1} \mathbf{1}_N^\top \mathbf{x}$ \citep{morgan2012rerandomization}. Throughout, we use $\mathbf{\Sigma}$ to refer to this fixed covariance matrix, and we assume $\mathbf{\Sigma}>0$. The spectral decomposition ensures that $\mathbf{\Sigma}$ is diagonalizable with eigenvalues $\lambda_1\geq ... \geq\lambda_K>0$. Let $\mathbf{\Gamma}$ be the orthogonal matrix of corresponding eigenvectors, so that we may write $\mathbf{\Sigma} = \mathbf{\Gamma}\diag{\lambda_{1:K}}\mathbf{\Gamma}^\top$, where $\diag{\lambda_{1:K}}$ denotes the $K\times K$ diagonal matrix whose $(k,k)$-coefficient is $\lambda_k$. Thus, $\mathbf{\Sigma}$ and its eigenstructure are available in closed-form, and the latter coincides with the eigenstructure of $S^2_{\mathbf{x}}$ up to a scaling factor. We let $\chi_{K}^2$ denote a chi-squared distribution with $K$ degrees of freedom, $\mathbb{P}(\chi_{K}^2\leq a)$ its cumulative distribution function (CDF) evaluated at $a\in\mathbb{R}$, and $q_{\chi_{K}^2}(p)$ its $p$-quantile for $p\in(0,1)$. \section{Review of Rerandomization} \label{sec: review} {We follow the potential outcomes framework \citep{rubin1990comment,rubin2005causal}, where each unit $i$ has fixed potential outcomes $Y_i(1)$ and $Y_i(0)$, which denote the outcome for unit $i$ under treatment and control, respectively.} Thus, the observed outcome for unit $i$ is $y_i^{obs} = W_i Y_i(1) + (1 - W_i)Y_i(0)$. Define $\mathbf{y}^{obs} = (y_1^{obs} \,\dots\, y_N^{obs})^\top$ as the vector of observed outcomes. We focus on the average treatment effect as the causal estimand, defined as \begin{align} \tau = \frac{1}{N} \sum_{i=1}^N [Y_i(1) - Y_i(0)] \label{eqn:ateEstimand}. \end{align} Furthermore, we focus on the mean-difference estimator \begin{align} \hat{\tau} = \bar{\mathbf{y}}_T - \bar{\mathbf{y}}_C\,, \label{eqn:meanDiffEstimator} \end{align} where $\bar{\mathbf{y}}_T = N_T^{-1}\mathbf{W}^\top\mathbf{y}^{obs}$ and $\bar{\mathbf{y}}_C = N_C^{-1}(\mathbf{1}_N-\mathbf{W})^\top\mathbf{y}^{obs}$ are the average treatment and control outcomes, respectively. When conducting a randomized experiment, ideally we would like $\bar{\mathbf{x}}_T$ and $\bar{\mathbf{x}}_C$ to be close; otherwise, the estimator $\hat{\tau}$ could be confounded by imbalances in the covariate means. \cite{morgan2012rerandomization} focused on a rerandomization scheme using the Mahalanobis distance to ensure that the covariate means are reasonably balanced for a particular treatment assignment. The Mahalanobis distance between the treatment and control covariate means is defined as \begin{equation} \begin{aligned} M &= (\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)^\top \mathbf{\Sigma}^{-1}(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C), \label{eqn:md} \end{aligned} \end{equation} where the dependence of $M$ on the assignment vector $\mathbf{W}$ is implicit through $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$. \cite{morgan2012rerandomization} suggest randomizing units to treatment and control by performing independent draws from the distribution of $\mathbf{W}\,|\,\mathbf{x}$ until $M \leq a$ for some threshold $a \geq 0$. Hereafter, we refer to this procedure of randomizing units until $M \leq a$ as \textit{rerandomization}. The expected number draws until the first acceptable randomization is equal to $1/p_a$, where $p_a = \mathbb{P}(M \leq a\,|\,\mathbf{x})$ is the probability that a particular realization of $\mathbf{W}$ yields a Mahalanobis distance $M$ less than or equal to $a$. Thus, fixing $p_a$ effectively allocates an expected computational budget and induces a corresponding threshold $a$: the smaller the acceptance probability $p_a$, the smaller the threshold $a$ and thus the more balanced the two groups, but the larger the expected computational cost of drawing an acceptable $\mathbf{W}$. For example, to restrict rerandomization to the ``best'' 1\% randomizations, one would set $p_a = 0.01$, which implicitly sets $a$ equal to the $p_a$-quantile of the distribution of $M$ given $\mathbf{x}$. If one assumes $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x} \sim \mathcal{N}(0, \mathbf{\Sigma})$, then $M\,|\,\mathbf{x} \sim \chi^2_K$, so that $a$ can be chosen equal to the $p_a$-quantile of a chi-squared distribution with $K$ degrees of freedom. The assumption $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}\sim\mathcal{N}(0,\mathbf{\Sigma})$ can be justified by invoking the finite population Central Limit Theorem \citep{erdos1959central,li2017general}. When the distribution of $M\,|\,\mathbf{x}$ is unknown, one can approximate it via Monte Carlo by simulating independent draws of $M\,|\,\mathbf{x}$ and setting $a$ to the $p_a$-quantile of $M$'s empirical distribution. \cite{morgan2012rerandomization} established that the mean-difference estimator $\hat{\tau}$ under this rerandomization scheme is unbiased in estimating the average treatment effect $\tau$, i.e., that $\E{\hat{\tau}\,|\,\mathbf{x},M\leq a} = \tau$. Furthermore, they also established that under rerandomization, if $N_T=N_C$ and $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x} \sim \mathcal{N}(0, \mathbf{\Sigma})$, then not only are the covariate mean differences centered at $0$, i.e., $\E{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x},M\leq a} = 0$, but also they are more closely concentrated around $0$ than they would be under randomization. More precisely, \cite{morgan2012rerandomization} proved that \setlength{\jot}{10pt} \begin{align} \cov{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x},M\leq a} &= v_a \cov{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x}}, \\ \text{ with }\; v_a &= \frac{\mathbb{P}(\chi^2_{K+2} \leq a)}{\mathbb{P}(\chi^2_K \leq a)} \in(0,1). \label{eqn:va} \end{align} Therefore, under their assumptions, rerandomization using the Mahalanobis distance reduces the variance of each covariate mean difference by $100(1 - v_a)\%$ compared to randomization. \cite{morgan2012rerandomization} call this last property \textit{equally percent variance reducing} (EPVR). Thus, using the Mahalanobis distance for rerandomization can be quite appealing, but \cite{morgan2012rerandomization} rightly point out that non-EPVR rerandomization schemes may be preferable in settings with covariates of unequal importances. This is in part addressed by \cite{morgan2015rerandomization}, who developed a rerandomization scheme that incorporates tiers of covariates that vary in importance. However, this requires researchers to specify an explicit hierarchy of covariate importance, which may not be immediately clear, especially when the number of covariates is large. Furthermore, if there are strong collinearities amongst covariates such that $\mathbf{\Sigma}$ is degenerate and thus the $M$ in (\ref{eqn:md}) is undefined, then it is unclear how one should conduct the rerandomization scheme of \cite{morgan2012rerandomization} and its extensions \citep{morgan2015rerandomization,branson2016improving,li2018asymptotic,li2020rerandomization}. \section{Ridge Rerandomization} \label{s:ridgeRerandomization} As an alternative, we consider a modified Mahalanobis distance, defined as \begin{equation} M_{\lambda} = (\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C )^\top (\mathbf{\Sigma} + \lambda\; \mathbf{I}_K)^{-1} (\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C) \label{eqn:ridgeMD} \end{equation} for some prespecified $\lambda\geq 0$. Guidelines for choosing $\lambda$ will be provided in Section \ref{ss:guidelinesALambda}. The eigenvalues of $\mathbf{\Sigma}$ in \eqref{eqn:ridgeMD} are inflated in a way that is reminiscent of ridge regression \citep{hoerl1970ridge}. For this reason, we will refer to the quantity $M_{\lambda}$ as the \textit{ridge Mahalanobis distance}. To our knowledge, the ridge Mahalanobis distance has remained largely unexplored, except for \cite{kato1999handwritten}, who used it in an application for a Chinese and Japanese character recognition system. Our proposed rerandomization scheme, referred to as \textit{ridge rerandomization}, involves using the ridge Mahalanobis distance in place of the standard Mahalanobis distance within the rerandomization framework of \citet{morgan2012rerandomization}. In other words, one randomizes the assignment vector $\mathbf{W}$ until $M_{\lambda}\leq a_\lambda$ for some threshold $a_\lambda\geq0$. In order to make a fair comparison between rerandomization and ridge rerandomization, we will fix the expected computational cost of ridge rerandomization by calibrating the respective thresholds so that \begin{equation} \mathbb{P}(M_\lambda \leq a_\lambda\,|\,\mathbf{x})=\mathbb{P}(M \leq a\,|\,\mathbf{x})=p_a. \label{eqn:computational_budget} \end{equation} Thus, fixing $p_a$ implicitly determines the pair $(\lambda,a_\lambda)$, so that for every fixed $\lambda\geq 0$ and $p_a\in(0,1)$ corresponds a unique $a_\lambda$ that satisfies \eqref{eqn:computational_budget}. As we will discuss in Section \ref{ss:connections}, the ridge Mahalanobis distance alleviates collinearity among the covariate mean differences by placing higher importance on the directions that account for the most variation. In that section we also discuss how ridge rerandomization encapsulates a spectrum of other standard rerandomization schemes. But first, in Section \ref{ss:propertiesOfRidgeRerandomization} we establish several theoretical properties of ridge rerandomization for some prespecified $(\lambda, a_{\lambda})$, and in Section \ref{ss:guidelinesALambda} we provide guidelines for specifying $(\lambda, a_{\lambda})$. In Section \ref{ss:inference}, we discuss how to conduct inference for the average treatment effect $\tau$ after ridge rerandomization is used to design a randomized experiment. \subsection{Properties of Ridge Rerandomization} \label{ss:propertiesOfRidgeRerandomization} The following theorem establishes that, on average, the covariate means in the treatment and control groups are balanced under ridge rerandomization, and that $\hat{\tau}$ is an unbiased estimator of $\tau$ under ridge rerandomization. \begin{theorem}[Unbiasedness under ridge rerandomization] \label{thm:covariateUnbiased} Let $\lambda\geq 0$ and $a_{\lambda} \geq 0$ be some prespecified constants. If $N_T = N_C$, then \begin{equation*} \mathbb{E}[\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C \,|\,\mathbf{x}, M_{\lambda} \leq a_{\lambda}] = 0 \end{equation*} and \begin{equation*} \mathbb{E}[\hat{\tau} \,|\,\mathbf{x}, M_{\lambda} \leq a_{\lambda}] = \tau. \end{equation*} \end{theorem} \noindent Theorem \ref{thm:covariateUnbiased} is a particular case of Theorem 2.1 and Corollary 2.2 from \cite{morgan2012rerandomization}. Theorem \ref{thm:covariateUnbiased} follows from the symmetry of $M_{\lambda}$ in treatment and control, in the sense that both assignments $\mathbf{W}$ and $(\mathbf{1}_N-\mathbf{W})$ yield the same value of $M_\lambda$. From \cite{morgan2012rerandomization}, we even have the stronger result that $\mathbb{E}[\bar{V}_T - \bar{V}_C \,|\,\mathbf{x}, M_{\lambda} \leq a_{\lambda}] = 0$ for any covariate $V$, regardless of whether $V$ is observed or not. Now we establish the covariance structure of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$ under ridge rerandomization. To do this, we first derive the exact distribution of $M_{\lambda}$. The following lemma establishes that if we assume $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}\sim\mathcal{N}(0,\mathbf{\Sigma})$, then $M_\lambda$ is distributed as a weighted sum of $K$ independent $\chi^2_1$ random variables, where the sizes of the weights are ordered in the same fashion as the sizes of the eigenvalues of $\mathbf{\Sigma}$. \begin{lemma}[Distribution of $M_{\lambda}$] \label{lemma:ridgeMDDistribution} Let $\lambda\geq 0$ be some prespecified constant. If $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}\sim\mathcal{N}(0,\mathbf{\Sigma})$, then \begin{equation} \label{eq:weighted_sum} M_{\lambda}\,|\,\mathbf{x} \;\;\sim\;\; \sum_{j=1}^K \frac{\lambda_j}{\lambda_j + \lambda} Z_j^2 \end{equation} where $Z_1,...,Z_K \stackrel{\text{i.i.d.}}{\sim} N(0, 1)$ and $\lambda_1 \geq \dots \geq \lambda_K>0$ are the eigenvalues of $\mathbf{\Sigma}$. \end{lemma} \noindent The proof of Lemma \ref{lemma:ridgeMDDistribution} is provided in the Appendix; see Section \ref{ss:proofLemmaRidgeMDDistribution}. Under the Normality assumption, the representation in \eqref{eq:weighted_sum} provides a straightforward way to simulate independent draws of $M_\lambda$, despite its CDF being typically intractable and requiring numerical approximations \citep[e.g., see][ and references therein]{bodenham2016comparison}. Using Lemma \ref{lemma:ridgeMDDistribution}, we can derive the covariance structure of $\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C$ under ridge rerandomization, as stated by the following theorem. \begin{theorem}[Covariance structure under ridge rerandomization] \label{thm:ridgeRerandomizationCovariance} Let $\lambda \geq 0$ and $a_{\lambda} \geq 0$ be some prespecified constants. If $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}\sim\mathcal{N}(0,\mathbf{\Sigma})$ and $N_T = N_C$, then \begin{equation} \emph{\text{Cov}}(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x},M_{\lambda}\leq a_{\lambda}) = \boldsymbol{\Gamma} \emph{\textbf{Diag}}((\lambda_k\, d_{k,\lambda})_{1\leq k \leq K}) \boldsymbol{\Gamma}^\top \label{eqn:covariance_ridge} \end{equation} where $\boldsymbol{\Gamma}$ is the orthogonal matrix of eigenvectors of $\mathbf{\Sigma}$ corresponding to the ordered eigenvalues $\lambda_1 \geq \dots \geq \lambda_K > 0$, and for all $k=1,...,K$, \begin{equation} d_{k,\lambda} = \mathbb{E}\left[ Z_k^2 \,\left|\, \sum_{j=1}^K \frac{\lambda_j}{\lambda_j + \lambda} Z_j^2 \leq a_{\lambda} \right.\right] \label{eqn:diagonal_coeff_ridge} \end{equation} with $Z_1,...,Z_K \stackrel{\text{i.i.d.}}{\sim} N(0,1)$. \end{theorem} \noindent The proof of Theorem \ref{thm:ridgeRerandomizationCovariance} is in the Appendix in Section \ref{ss:proofTheoremRidgeRerandomizationCovariance}. The quantities $d_{k,\lambda}$ are intractable functions of $\lambda$ and $a_{\lambda}$ and thus need to be approximated numerically, as explained in Section \ref{ss:calibration_alambda}. Conditioning on $M_\lambda\leq a_\lambda$ in \eqref{eqn:diagonal_coeff_ridge} effectively constrains the magnitude of the positive random variables $Z_k^2$. Since the weights $\lambda_k(\lambda_k+\lambda)^{-1}$ of their respective contributions to $M_\lambda$ are positive and non-increasing with $k=1,...,K$, we may conjecture that $0<d_{1,\lambda}\leq \dots \leq d_{K,\lambda}<1$. Possible directions for a proof may make use of Proposition 2.1 from \citet{palombi2013note} and Equation (A.1) from \citet{palombi2017numerical}. Using the above results, we can now compare randomization, rerandomization, and ridge rerandomization. Under the assumptions stated in Theorem \ref{thm:ridgeRerandomizationCovariance}, the covariance matrices of $\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C$ under randomization, rerandomization, and ridge rerandomization can be respectively written as \begin{align} \cov{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x}} &= \boldsymbol{\Gamma} \diag{(\lambda_k)_{1\leq k \leq K}} \boldsymbol{\Gamma}^\top, \label{eqn:randomizationVarianceReduction} \\ \cov{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x},M \leq a} &= \boldsymbol{\Gamma} \diag{(\lambda_k \,v_a)_{1\leq k \leq K}} \boldsymbol{\Gamma}^\top, \label{eqn:rerandomizationVarianceReduction} \\ \cov{\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C\,|\,\mathbf{x},M_\lambda \leq a_\lambda} &= \boldsymbol{\Gamma} \diag{(\lambda_k \,d_{k,\lambda})_{1\leq k \leq K}} \boldsymbol{\Gamma}^\top. \label{eqn:ridgererandomizationVarianceReduction} \end{align} where \eqref{eqn:rerandomizationVarianceReduction} follows from Theorem 3.1 in \cite{morgan2012rerandomization} with $v_a\in(0,1)$, and \eqref{eqn:ridgererandomizationVarianceReduction} follows from Theorem \ref{thm:ridgeRerandomizationCovariance} with $d_{k,\lambda}\in(0,1)$ defined in \eqref{eqn:diagonal_coeff_ridge}. If we define new covariates $\mathbf{x}^*$ as the principal components of the original ones, i.e., $\mathbf{x}^* = \mathbf{x}\boldsymbol{\Gamma}$, then \eqref{eqn:rerandomizationVarianceReduction} and \eqref{eqn:ridgererandomizationVarianceReduction} respectively yield \begin{equation} \var{(\bar{\mathbf{x}}^*_{T} - \bar{\mathbf{x}}^*_{C})_k\,|\,\mathbf{x},M \leq a} = v_a \;\var{(\bar{\mathbf{x}}^*_{T} - \bar{\mathbf{x}}^*_{C})_k\,|\,\mathbf{x}} \label{eq:var_rerand_pc} \end{equation} and \begin{equation} \var{(\bar{\mathbf{x}}^*_{T} - \bar{\mathbf{x}}^*_{C})_k\,|\,\mathbf{x},M_\lambda \leq a_\lambda} = d_{k,\lambda} \;\var{(\bar{\mathbf{x}}^*_{T} - \bar{\mathbf{x}}^*_{C})_k\,|\,\mathbf{x}} \label{eq:var_ridegrerand_pc} \end{equation} for all $k=1,...,K$, where $(\bar{\mathbf{x}}^*_{T} - \bar{\mathbf{x}}^*_{C})_k$ is the $k$-th \textit{principal component mean difference} between the treatment and control groups, i.e., the $k$-th coefficient of $\boldsymbol{\Gamma}^\top(\bar{\mathbf{x}}_{T}-\bar{\mathbf{x}}_{C})$. From \eqref{eq:var_rerand_pc} we see that rerandomization reduces the variances of the principal component mean differences equally by $100(1-v_a)\%$ and is thus EPVR for the principal components, as well as for the original covariates, as discussed in Section \ref{sec: review}. On the other hand, ridge rerandomization reduces these variances by unequal amounts: the variance of the $k$-th principal component mean difference is reduced by $100(1-d_{k,\lambda})\%$, {and because typically $0<d_{1,\lambda}\leq\dots\leq d_{K,\lambda}<1$, ridge rerandomization places more importance on the first principal components.} Translating \eqref{eq:var_ridegrerand_pc} back to the original covariates yields the following corollary, which establishes that ridge rerandomization is always preferable over randomization in terms of reducing the variance of each covariate mean difference. \begin{corollary}[Variance reduction for ridge rerandomization] \label{cor:varReductionRidgeRerandomization} Under the assumptions of Theorem \ref{thm:ridgeRerandomizationCovariance}, ridge rerandomization reduces the variance of the $k$-th covariate mean difference $(\bar{\mathbf{x}}_{T} - \bar{\mathbf{x}}_{C})_k$ by $100 \left(1 - v_{k,\lambda} \right)\%$, where \begin{align} v_{k,\lambda} = \frac{\left(\boldsymbol{\Gamma} \emph{\textbf{Diag}}\left((\lambda_j \,d_{j,\lambda})_{1\leq j \leq K}\right)\boldsymbol{\Gamma}^\top\right)_{kk}}{\mathbf{\Sigma}_{kk}} \label{eqn:vLambdaAK} \end{align} satisfies $v_{k,\lambda}\in(0,1)$, so that \begin{equation} \emph{\text{Var}}\left((\bar{\mathbf{x}}_{T} - \bar{\mathbf{x}}_{C})_k\,|\,\mathbf{x},M_\lambda \leq a_\lambda\right) \;<\; \emph{\text{Var}}\left((\bar{\mathbf{x}}_{T} - \bar{\mathbf{x}}_{C})_k\,|\,\mathbf{x}\right). \end{equation} \end{corollary} \noindent The proof of Corollary \ref{cor:varReductionRidgeRerandomization} is provided in the Appendix; see Section \ref{ss:proofTheoremVarianceReductionBound}. Reducing the variance of the covariate mean differences is beneficial for precisely estimating the average treatment effect if the outcomes are correlated with the covariates. For example, Theorem 3.2 of \cite{morgan2012rerandomization} establishes that---under several assumptions, including additivity of the treatment effect---rerandomization reduces the variance of $\hat{\tau}$ defined in (\ref{eqn:meanDiffEstimator}) by $100(1 - v_a)R^2$ percent, where $R^2$ denotes the squared multiple correlation between the outcomes and the covariates. Now we establish how the variance of $\hat{\tau}$ behaves under ridge rerandomization. In the rest of this section, we assume---as in \cite{morgan2012rerandomization}---that the treatment effect is additive. Without loss of generality, for all $i=1,...,N$, we can write the outcome of unit $i$ as \begin{equation} Y_i(W_i) = \beta_0 + \mathbf{x}_{i\bullet}\boldsymbol{\beta} + \tau W_i + \epsilon_i \label{eq:regression_outcome} \end{equation} {where $\beta_0 + \mathbf{x}\boldsymbol{\beta}$ is the projection of the potential outcomes $\mathbf{Y}(0)=(Y_1(0) \dots Y_N(0))^\top$ onto the linear space spanned by $(\mathbf{1}, \mathbf{x})$, and $\epsilon_i\in\mathbb{R}$ captures any misspecification of the linear relationship between the outcomes and $\mathbf{x}$. Let $\bar{\boldsymbol{\epsilon}}_T = N_T^{-1}\mathbf{W}^\top\boldsymbol{\epsilon}$ and $\bar{\boldsymbol{\epsilon}}_C = N_C^{-1}(\mathbf{1}_N-\mathbf{W})^\top\boldsymbol{\epsilon}$, where $\boldsymbol{\epsilon} = (\epsilon_1 \dots \epsilon_N)^\top$. Theorem \ref{thm:variancePercentReductionRidgeRerandomizationComparison} below establishes that the variance of $\hat{\tau}$ under ridge rerandomization is always less than or equal to the variance of $\hat{\tau}$ under randomization. Thus, ridge rerandomization always leads to a more precise treatment effect estimator than randomization. \begin{theorem} \label{thm:variancePercentReductionRidgeRerandomizationComparison} Under the assumptions of Theorem \ref{thm:ridgeRerandomizationCovariance}, if $(\bar{\boldsymbol{\epsilon}}_T - \bar{\boldsymbol{\epsilon}}_C)$ is conditionally independent of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$ given $\mathbf{x}$, and if there is an additive treatment effect, then \begin{equation} \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x}) - \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x},M_{\lambda} \leq a_{\lambda}) \;=\; \boldsymbol{\beta}^\top \boldsymbol{\Gamma} \emph{\textbf{Diag}} \left((\lambda_k \left(1 - d_{k,\lambda} \right))_{1\leq k \leq K} \right) \boldsymbol{\Gamma}^\top \boldsymbol{\beta} \nonumber \end{equation} so that we have \begin{align} \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x},M_{\lambda} \leq a_{\lambda}) \;\leq\; \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x})\,, \nonumber \end{align} where the equality holds if and only if $\boldsymbol{\beta}= \mathbf{0}_K$ in \eqref{eq:regression_outcome}. \end{theorem} \noindent The proof of Theorem \ref{thm:variancePercentReductionRidgeRerandomizationComparison} is in the Appendix; see Section \ref{ss:proofTheoremVariancePercentReductionRidgeRerandomizationComparison}. The conditional independence assumption was also leveraged in the proof of Theorem 3.2 in \cite{morgan2012rerandomization}. The fact that ridge rerandomization performs better than randomization is arguably a low bar, because this is the purpose of any rerandomization scheme. The following corollary quantifies how ridge rerandomization performs compared to the rerandomization scheme of \cite{morgan2012rerandomization}. \begin{corollary} \label{corr:varianceReductionRerandomizationRidgeRerandomizationComparison} Under the assumptions of Theorem \ref{thm:variancePercentReductionRidgeRerandomizationComparison}, the difference in variances of $\hat{\tau}$ between rerandomization and ridge rerandomization is \begin{align} \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x},M \leq a) - \emph{\text{Var}}(\hat{\tau}\,|\,\mathbf{x},M_{\lambda} \leq a_{\lambda}) \;=\; \boldsymbol{\beta}^\top \boldsymbol{\Gamma} \emph{\textbf{Diag}} \left((\lambda_k \left(v_a - d_{k,\lambda} \right))_{1\leq k \leq K} \right) \boldsymbol{\Gamma}^\top \boldsymbol{\beta}. \nonumber \end{align} \end{corollary} \noindent It is not necessarily the case that $d_{k,\lambda} \leq v_a$ for all $k = 1,\dots,K$, and so it is not guaranteed that ridge rerandomization will perform better or worse than rerandomization in terms of treatment effect estimation. Ultimately, the comparison of rerandomization and ridge rerandomization depends on $\boldsymbol{\beta}$, which is typically not known until after the experiment has been conducted. However, in Section \ref{ss:comparingTreatmentEffectEstimation}, we provide some heuristic arguments for when ridge rerandomization would be preferable over rerandomization, along with simulation evidence that confirms these heuristic arguments. In particular, we demonstrate that ridge rerandomization is preferable over rerandomization when there are strong collinearities among the covariates. We also discuss a ``worst-case scenario'' for ridge rerandomization, where $\boldsymbol{\beta}$ is specified such that ridge rerandomization should perform worse than rerandomization in terms of treatment effect estimation accuracy. In order to implement ridge rerandomization, researchers must specify the threshold $a_{\lambda}\geq 0$ and the regularization parameter $\lambda\geq 0$. The next section provides guidelines for choosing these parameters. \subsection{Guidelines for choosing $a_{\lambda}$ and $\lambda$} \label{ss:guidelinesALambda} For ridge rerandomization, we recommend starting by specifying an acceptance probability $p_{a}\in(0,1)$, which then binds $\lambda$ and $a_\lambda$ together via the identity \eqref{eqn:computational_budget}. Once $p_a$ is fixed, there exists a uniquely determined threshold $a_\lambda\geq 0$ for each $\lambda\geq 0$ such that $\mathbb{P}(M_\lambda\leq a_\lambda\,|\,\mathbf{x}) = p_a$. As in \cite{morgan2012rerandomization}, acceptable treatment allocations under ridge rerandomization are generated by randomizing units to treatment and control until $M_{\lambda} \leq a_{\lambda}$. Thus, a smaller $p_{a_{\lambda}}$ leads to stronger covariate balance according to $M_{\lambda}$ at the expense of computation time. The only choice that remains after fixing $p_a$ is the regularization parameter $\lambda\geq 0$. Section \ref{ss:calibration_alambda} details how $a_\lambda$ is automatically calibrated once we fix $p_a$ and $\lambda$. The choice of $\lambda$ is investigated in Section \ref{sss:choiceoflambda}, after discussing how to assess the performance of ridge rerandomization in Section \ref{ss:approximation_dk}. \subsubsection{Calibration of $a_\lambda$} \label{ss:calibration_alambda} Given $p_a$ and $\lambda$, we can choose to set $a_\lambda$ equal to the $p_a$-quantile of the quadratic form $Q_\lambda$ defined by \begin{equation} Q_\lambda = \sum_{k=1}^K \frac{\lambda_k}{\lambda_k+\lambda} Z_k^2 \label{eq:quadraticform} \end{equation} where $Z_1,...,Z_K\stackrel{\text{i.i.d.}}{\sim}\mathcal{N}(0,1)$. Such a choice of $a_\lambda$ is a good approximation of the $p_a$-quantile of $M_\lambda$, especially when $N$ is large enough for $(\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C)\,|\,\mathbf{x}$ to be approximately Normal, as motivated by Lemma \ref{lemma:ridgeMDDistribution}. Let $F_{Q_\lambda}(q) = \mathbb{P}(Q_\lambda\leq q)$ denote the CDF of $Q_\lambda$. Since $Q_\lambda$ is a weighted sum of independent $\chi_1^2$ variables, its characteristic function $\phi_{Q_\lambda}$ is given by $\phi_{Q_\lambda}(t) = \prod_{k=1}^{K}[1-2i\lambda_k(\lambda_k+\lambda)^{-1}t]^{-1/2}$, which can then be inverted to yield \begin{equation*} F_{Q_\lambda}(q) = \lim_{U\to+\infty}F_{Q_\lambda,U}(q) \end{equation*} where \begin{equation} F_{Q_\lambda,U}(q)= \frac{1}{2} - \frac{1}{\pi}\int_{0}^{U}\;\frac{\sin\left(\frac{1}{2}\left[-t\,q + \sum_{k=1}^{K}\arctan\left(\frac{\lambda_k}{\lambda_k+\lambda}\,t\right)\right]\right)}{t\;\prod_{k=1}^{K}\left[1+\left(\frac{\lambda_k}{\lambda_k+\lambda}\right)^2t^2\right]^{1/4}}\;dt \end{equation} as detailed in Equation (3.2) of \citet{imhof1961computing}. In practice, for any fixed $U\geq 0$, $F_{Q_\lambda,U}(q)$ can be computed with arbitrary precision and at a negligible cost by using any (deterministic) univariate numerical integration scheme. We can then approximate $F_{Q_\lambda}(q)$ with $F_{Q_\lambda,U}(q)$ by choosing $U$ large enough. As explained in \citet{imhof1961computing}, the approximation tends to improve as the number of covariates $K$ increases, and one can guarantee a truncation error of at most $\xi>0$ in absolute value by choosing $U_\xi = [\xi\,\pi\,(K/2)\prod_{k=1}^{K}\sqrt{\lambda_k(\lambda_k+\lambda)^{-1}}]^{-2/K}$. Computationally cheaper but less accurate alternatives to approximate $F_{Q_\lambda}$ are discussed in \citet{bodenham2016comparison}. Finally, we approximate the $p_a$-quantile of $Q_\lambda$ by \begin{equation} \hat{a}_{\lambda} = \inf\{q\in\mathbb{R}:F_{Q_\lambda,U_\xi}(q)\geq p_a\} \label{eq:quantile_approx} \end{equation} i.e., the $p_a$-quantile of $F_{Q_\lambda,U}$. The hat on $\hat{a}_\lambda$ only reflects the distributional approximation of $M_\lambda$ by $Q_\lambda$, whereas the errors due to numerical integration and truncation can be regarded as virtually nonexistent compared to the Monte Carlo errors involved in the later approximations of $v_{k,\lambda}$. In the simulations of Section \ref{s:simulations}, we will use $\xi = 10^{-4}$ by default. \subsubsection{Approximation of $d_{k,\lambda}$ and $v_{k,\lambda}$} \label{ss:approximation_dk} We will use Corollary \ref{cor:varReductionRidgeRerandomization} and Theorem \ref{thm:ridgeRerandomizationCovariance} as a proxy for how ridge rerandomization improves the variance of each covariate mean difference as compared to rerandomization. We would like to set $(\lambda,a_\lambda)$ so that the $d_{k,\lambda}$'s defined in \eqref{eqn:diagonal_coeff_ridge} are small, in a sense to be made precise in the next section. To achieve this, we would need to compute $d_{k,\lambda}$ for all $k=1,...K$, which involves intractable conditional expectations. By considering $n$ simulated sets of $K$ independent variables $\widetilde{Z}_{ij}\stackrel{\text{i.i.d.}}{\sim}\mathcal{N}(0,1)$ for $i=1,..,n$ and $j=1,..,K$, the expectations appearing in \eqref{eqn:diagonal_coeff_ridge} can be consistently estimated via Monte Carlo, for all $k = 1,...,K$, by \begin{equation} \hat{d}_{k,\lambda,n} = \frac{1}{\sum_{i=1}^n\mathds{1}(M_\lambda^{(i)}\,\leq\, \hat{a}_{\lambda})} \sum_{i=1}^n \widetilde{Z}_{ik}^{\,2}\,\mathds{1}(M_\lambda^{(i)}\,\leq\, \hat{a}_{\lambda}) \label{eq:approxMonteCarlo_dk} \end{equation} with $M_\lambda^{(i)} = \sum_{j=1}^K \lambda_k(\lambda_k+\lambda)^{-1}\widetilde{Z}_{ij}^{\,2}$ and $\hat{a}_{\lambda}$ defined in \eqref{eq:quantile_approx}, where $\mathds{1}(A)$ denotes the indicator function of an event $A$. Using \eqref{eq:approxMonteCarlo_dk}, we can then estimate $v_{k,\lambda}$ from Corollary \ref{cor:varReductionRidgeRerandomization} consistently as $n\to +\infty$, for all $k = 1,...,K$, by \begin{equation} \hat{v}_{k,\lambda,n} = \frac{\left(\boldsymbol{\Gamma} {\textbf{Diag}}\left((\lambda_j \,\hat{d}_{j,\lambda,n})_{1\leq j \leq K}\right)\boldsymbol{\Gamma}^\top\right)_{kk}}{\mathbf{\Sigma}_{kk}} \label{eqn:approx_vLambdaAK} \end{equation} For simplicity, we will regard the computational cost of generating $nK$ independent Normal variables as negligible compared to the expected cost of generating $1/p_a$ successive random assignment vectors and testing the acceptability of each assignment, since the former can be done in parallel at virtually the same cost as generating one single Normal random variable. \subsubsection{Choosing $\lambda$} \label{sss:choiceoflambda} In this section, assume that $p_a$ has been fixed. Note that choosing $\lambda = 0$ corresponds to rerandomization using the Mahalanobis distance. Thus, we would only choose some $\lambda > 0$ if it is preferable over rerandomization, in the following sense. There are many metrics that could be used for comparing rerandomization and ridge rerandomization; for simplicity, we focus on the average percent reduction in variance across covariate mean differences. Arguably, one rerandomization scheme is preferable over another if it is able to achieve a higher average reduction in variance across covariates. Thus, ideally, we would only choose a particular $\lambda>0$ if $K^{-1}\sum_{k=1}^K v_{k,\lambda}< v_a$. In practice, we will use the criterion \begin{align} \frac{1}{K} \sum_{k=1}^K \hat{v}_{k,\lambda,n} \;<\; v_a \label{eqn:ridgeLambdaInequality} \end{align} \noindent where $v_a$ and $\hat{v}_{k,\lambda,n}$ are respectively defined in \eqref{eqn:va} and \eqref{eqn:approx_vLambdaAK}, with $a$ being set to $q_{\chi_{K}^2}(p_a)$, i.e., the choice of $a$ as recommended by \cite{morgan2012rerandomization}. Proving the existence of some $\lambda>0$ such that \eqref{eqn:ridgeLambdaInequality} holds is challenging, so we propose the following iterative procedure for choosing such a $\lambda>0$ if it exists. The procedure relies on \eqref{eqn:va}, \eqref{eq:quantile_approx}, and \eqref{eqn:approx_vLambdaAK}, where the auxiliary Normal variables $\widetilde{Z}_{ij}$ only need to be simulated once and can then be reused when testing different values of $\lambda$. \\\\ \noindent\fbox{% \parbox{\textwidth}{% \vspace*{0.2cm} \textbf{ Procedure for finding a desirable $\lambda\geq 0$} \begin{enumerate} \item Specify $p_a\in(0,1)$, $n\geq 1$, $\delta>0$, and $\varepsilon>0$. \item Initialize $\lambda = 0$ and $\Lambda = \emptyset$. \item While $|(\lambda+\delta)\hat{a}_{\lambda+\delta} - \lambda\hat{a}_{\lambda}|>\varepsilon$: \begin{itemize} \item Set $\lambda = \lambda + \delta$. \item If $\;\displaystyle\frac{1}{K} \sum_{k=1}^K \hat{v}_{k,\lambda,n} \;<\; \frac{\mathbb{P}(\chi_{K+2}^2\;\leq\; q_{\chi_{K}^2}(p_a))}{p_a}$, then set $\Lambda = \Lambda\cup\{\lambda\}$. \end{itemize} \item If $\Lambda=\emptyset$, then return $\lambda = 0$. \\ Else, define $c_k = \lambda_k^2\,(\sum_{j=1}^{K}\lambda_j^2)^{-1}$ for all $k=1,...,K$, and return: \begin{equation} \lambda_\star = \operatorname*{argmin}_{\lambda\in\Lambda}\left(\;\sum_{k=1}^{K}c_k\,\hat{d}^{\,2}_{k,\lambda,n}-\left(\sum_{k=1}^{K}c_k\,\hat{d}_{k,\lambda,n}\right)^2\;\right). \label{eq:best_lambda} \end{equation} \end{enumerate} }} \\\\\\ The justification of our proposed procedure stems from the following facts. By definition, we have $\mathbb{P}(M_\lambda\leq a_\lambda\,|\,\mathbf{x})=p_a$ for all $\lambda\geq 0$. By taking the limit as $\lambda\to+\infty$ under the assumptions of Lemma \ref{lemma:ridgeMDDistribution}, we get \begin{equation*} p_a = \lim_{\lambda\to+\infty}\mathbb{P}\left(\sum_{k=1}^{K}\frac{\lambda_k}{\lambda_k+\lambda}Z_k^2\leq a_\lambda\right) = \lim_{\lambda\to+\infty}\mathbb{P}\left(\sum_{k=1}^{K}\lambda_kZ_k^2\leq \lambda \,a_\lambda\right) \end{equation*} so that \begin{equation} \lambda\,a_\lambda\quad\xrightarrow[\lambda\to+\infty]{}\quad q^*(p_a) \label{eq:limit_lambda_a} \end{equation} where $q^*(p_a)$ is the $p_a$-quantile of the distribution of $\sum_{k=1}^{K}\lambda_kZ_k^2$. This in turn implies that, for all $k=1,...,K$, we have \begin{equation} v_{k,\lambda}\quad\xrightarrow[\lambda\to+\infty]{}\quad \frac{\left(\boldsymbol{\Gamma} {\textbf{Diag}}\left((\lambda_j \,d^*_{j})_{1\leq j \leq K}\right)\boldsymbol{\Gamma}^\top\right)_{kk}}{\mathbf{\Sigma}_{kk}} \label{eq:limit_vk} \end{equation} where $d_k^* = \E{Z_k^2|\sum_{k=1}^{K}\lambda_kZ_k^2\leq q^*(p_a)}$ for all $k=1,...,K$. Since the limits in \eqref{eq:limit_vk} are strictly positive, this shows that increasing $\lambda$ beyond a certain value will no longer yield any practical gain. This is in line with the intuition that the ridge Mahalanobis distance degenerates to the Euclidean distance when $\lambda\to+\infty$, as discussed further in Section \ref{ss:connections}. Thus, in practice, it is sufficient to search for $\lambda$ only over a bounded range of values. The lower bound $\lambda=0$ corresponds to rerandomization with the standard Mahalanobis distance; the upper bound is determined dynamically via Step 3, which is guaranteed to stop in finite time by using an argument similar to \eqref{eq:limit_lambda_a}. The step size $\delta$ can be chosen as a fraction of the smallest strictly positive gap between consecutive eigenvalues, i.e., $\min\{\lambda_k-\lambda_{k-1}:k=1,...,K \text{ such that }\lambda_k>\lambda_{k-1}\}$ with the convention $\lambda_0=0$. Finally, among all the acceptable $\lambda$'s satisfying \eqref{eqn:ridgeLambdaInequality}, Step 4 returns the $\lambda_\star$ that aims at altering the conditional covariance structure of $(\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C)$ the least, in the sense of minimizing the distance between $\cov{\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C|\mathbf{x},M_\lambda\leq \hat{a}_\lambda}$ and the linear span of $\mathbf{\Sigma}$, i.e., \begin{equation*} \lambda_\star = \operatorname*{argmin}_{\lambda\in\Lambda}\left(\min_{c\in\mathbb{R}}\,{\left\|c\mathbf{\Sigma}-\boldsymbol{\Gamma} {\textbf{Diag}}\left((\lambda_j \,\hat{d}_{j,\lambda,n})_{1\leq j \leq K}\right)\boldsymbol{\Gamma}^\top\right\|}\;\right) \end{equation*} where $\|\mathbf{\Sigma}\| = \sqrt{\text{tr}(\mathbf{\Sigma}^\top \mathbf{\Sigma})} = \sum_{k=1}^K \lambda_k^2$ stands for the Frobenius norm. The inner minimization can be written as \begin{equation*} \min_{c\in\mathbb{R}}\left(\sum_{k=1}^{K}\lambda_k^2\left(c-\hat{d}_{k,\lambda,n}\right)^2\right) \end{equation*} which is attained at $c_\star = \sum_{k=1}^{K}c_k\,\hat{d}_{k,\lambda,n}$ with $c_k = \lambda_k^2\,(\sum_{j=1}^{K}\lambda_j^2)^{-1}$ for all $k=1,...,K$, thus yielding \eqref{eq:best_lambda}. The outer minimization is then straightforward since the set $\Lambda$ of candidates is finite by construction. We elaborate on why we choose a $\lambda_\star$ that alters the conditional covariance structure of $(\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C)$ the least in Section \ref{ss:connections}. When the set $\Lambda$ is empty, we simply return $\lambda=0$ (which corresponds to typical rerandomization), although the following heuristic argument illustrates why we would expect the existence of at least one $\lambda$ such that (\ref{eqn:ridgeLambdaInequality}) holds. The rerandomization scheme of \cite{morgan2012rerandomization} spreads the benefits of variance reduction across all $K$ covariates equally; however, note that the term $v_a = {\mathbb{P}(\chi^2_{K+2} \leq q_{\chi_{K}^2}(p_a))}/p_a$ is monotonically increasing in the number of covariates $K$ for a fixed acceptance probability $p_a$. A consequence of this is that if one can instead determine a smaller set of $K_e<K$ covariates that is most relevant, then that smaller set of covariates can benefit from a greater variance reduction than what would be achieved by considering all $K$ covariates. As we mentioned at the end of Section \ref{sec: review}, this idea was partially addressed in \cite{morgan2015rerandomization}, which extended the rerandomization scheme of \cite{morgan2012rerandomization} to allow for tiers of covariate importance specified by the researcher, such that the most important covariates receive the most variance reduction. Ridge rerandomization, on the other hand, automatically specifies a hierarchy of importance based on the eigenstructure of the covariate mean differences. To provide intuition for this idea, consider a simple case where the smallest $(K - K_e)$ eigenvalues $\lambda_{K_e+1},...,\lambda_K$ are all arbitrarily close to $0$. In this case, we can find $\lambda>0$ such that ${\lambda_j}({\lambda_j+\lambda})^{-1}\approx 1$ for the $K_e$ largest eigenvalues and ${\lambda_j}({\lambda_j+\lambda})^{-1}\approx 0$ for the remaining $K - K_e$ eigenvalues, so that $M_{\lambda}$ would be approximately distributed as $\chi_{k_{e}}^2$ with an effective number of degrees of freedom $K_e$ strictly less than $K$. For some fixed acceptance probability $p_a\in(0,1)$ and corresponding thresholds $a_e = q_{\chi_{K_e}^2}(p_a)$ and $a = q_{\chi_{K}^2}(p_a)$, we would then have \begin{align} v_{a_e} = \frac{\mathbb{P}(\chi^2_{K_e+2} \leq q_{\chi_{K_e}^2}(p_a))}{p_a} \;<\; \frac{\mathbb{P}(\chi^2_{K+2} \leq q_{\chi_{K}^2}(p_a))}{p_a} = v_a \end{align} since $p_a$ is fixed and $K_e < K$. The relative variance reduction for ridge rerandomization would then be $(1 - v_{a_e})$ for the first $K_e$ principal components---which in this simple example make up the total variation in the covariate mean differences---while the relative variance reduction for rerandomization would be $(1 - v_a)<(1-v_{a_e})$ for the $K$ covariates. Thus, in this case, ridge rerandomization would achieve a greater variance reduction on a lower-dimensional representation of the covariates than typical rerandomization. This heuristic argument also hints that our method has connections to a principal-components rerandomization scheme, where one instead balances on some lower dimension of principal components rather than on the covariates themselves. We discuss this point further in Section \ref{ss:connections}. \subsection{Connections to Other Rerandomization Schemes} \label{ss:connections} Ridge rerandomization has connections to other rerandomization schemes. Ridge rerandomization requires specifying the parameter $\lambda$; thus, consider two extreme choices of $\lambda$: \begin{enumerate} \item $\lambda = 0$: $M_{\lambda} = M$, i.e., $M_{\lambda}$ corresponds to the Mahalanobis distance. \item $\lambda \to+ \infty$: $M_\lambda \approx \lambda^{-1}\|\bar{\mathbf{x}}_T-\bar{\mathbf{x}}_C\|^2$, i.e., $M_{\lambda}$ tends to a scaled Euclidean distance. \end{enumerate} Thus, for any finite $\lambda > 0$, the distance defined by $M_{\lambda}$ can be regarded as a compromise between the Mahalanobis and Euclidean distances. Rerandomization using the Euclidean distance is similar to a rerandomization scheme that places a separate caliper on each covariate, which was proposed by \cite{moulton2004covariate}, \cite{maclure2006measuring}, \cite{bruhn2009pursuit}, and \cite{cox2009randomization}. However, \cite{morgan2012rerandomization} note that such a rerandomization scheme is not affinely invariant and does not preserve the correlation structure of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$ across acceptable randomizations. See \cite{morgan2012rerandomization} for a full discussion of the benefits of using affinely invariant rerandomization criteria. As discussed in Section \ref{sss:choiceoflambda}, our proposed procedure aims for larger variance reductions of important covariate mean differences while mitigating the perturbation of the correlation structure of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$. As an illustration, consider a randomized experiment where $N_T = N_C = 50$ units are assigned to treatment and control; and furthermore, where there are two correlated covariates, generated as $x_{1j} \stackrel{\text{i.i.d.}}{\sim} N(0,1)$ and $x_{2j} \stackrel{\text{i.i.d.}}{\sim} N(x_{1i}, 1)$ for $j = 1,...,N$. Figure \ref{fig:covariateMeanDifferenceDistributionPlot} shows the distribution of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}$ across 1000 randomizations, rerandomizations (with $p_a = 0.1$), ridge rerandomizations (with $p_a = 0.1$ and $\lambda = 0.005$), and rerandomizations using the Euclidean distance instead of the Mahalanobis distance. All three rerandomization schemes reduce the variance of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)_k\,|\,\mathbf{x}$ for $k\in\{1,2\}$, compared to randomization; however, rerandomization using the Euclidean distance destroys the correlation structure of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}$, while rerandomization and ridge rerandomization largely maintain it. This provides further motivation for Step 4 of the procedure presented in Section \ref{sss:choiceoflambda}. \begin{figure}[H] \centering \includegraphics[width=\linewidth]{covariateMeanDifferenceDistributionPlot.pdf} \caption{Distribution of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)\,|\,\mathbf{x}$ under randomization, rerandomization (with $p_a = 0.1$), ridge rerandomization (with $p_a = 0.1$ and $\lambda = 0.005$), and rerandomization using the Euclidean distance. Note the difference in scale for the randomization plot for ease of comparison.} \label{fig:covariateMeanDifferenceDistributionPlot} \end{figure} Furthermore, as discussed in Sections \ref{ss:propertiesOfRidgeRerandomization} and \ref{sss:choiceoflambda}, ridge rerandomization can be regarded as a ``soft-thresholding" version of a rerandomization scheme that would focus solely on the first $K_e<K$ principal components of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$. A ``hard-thresholding" rerandomization scheme would use a truncated version $M_{K_e}$ of the Mahalanobis distance, defined as \begin{equation*} M_{K_e} = (\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)^\top \hat{\boldsymbol{\Sigma}}_{K_e}^{-1} (\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C) \end{equation*} with \begin{equation*} \boldsymbol{\Sigma}_{K_e} = \boldsymbol{\Gamma}\diag{(\lambda_1,...,\lambda_{K_e},0,...,0)}\boldsymbol{\Gamma}^\top \end{equation*} i.e., $\boldsymbol{\Sigma}_{K_e}$ artificially sets the smallest $(K-K_e)$ eigenvalues of $\boldsymbol{\Sigma}$ to $0$. This scheme would then be EPVR for the first $K_e$ principal components of $(\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C)$---although not necessarily EPVR for the original covariates themselves---but would effectively ignore the components associated with the smallest $(K-K_e)$ eigenvalues of $\boldsymbol{\Sigma}$. Therefore, ridge rerandomization is a flexible experimental design strategy that encapsulates a class of rerandomization schemes, thus making it worth further investigation in future work. We expand on this point in Section \ref{s:discussion}. \subsection{Conducting Inference After Ridge Rerandomization} \label{ss:inference} Here we outline how to conduct inference for the average treatment effect after ridge rerandomization has been used to conduct an experiment. In general, there are Neymanian, Bayesian, and randomization-based modes of inference for analyzing randomized experiments \citep{imbens2015causal}. The Neymanian mode of inference relies on asymptotic approximations for the variance of the mean-difference estimator $\hat{\tau}$; such results are well-established for completely randomized experiments \citep{splawa1990application}, paired experiments \citep{imai2008variance}, blocked experiments \citep{miratrix2013adjusting,pashley2017insights}, and randomized experiments with stages of random sampling \citep{branson2019sampling}. In a seminal paper, \cite{li2018asymptotic} derived many asymptotic results for rerandomized experiments (as discussed in \cite{morgan2012rerandomization}), thereby establishing Neymanian inference for such experiments. The results therein rely on various properties of the Mahalanobis distance, which---as established by our results---differ from the properties of the ridge Mahalanobis distance. As a consequence, the theory developed in \cite{li2018asymptotic} cannot be readily applied to ridge rerandomized experiments, and a promising line of future work is deriving asymptotic results for ridge rerandomized experiments. Asymptotic results could also be used to establish Bayesian inference for such experiments, which would be particularly useful given that one's preference for rerandomization or ridge rerandomization may depend on their prior knowledge of $\boldsymbol{\beta}$, as suggested by Corollary \ref{corr:varianceReductionRerandomizationRidgeRerandomizationComparison}. Addressing these complications is beyond the scope of this paper. Instead, we focus on randomization-based inference, because it can be readily applied to ridge rerandomization. Randomization-based inference focuses on inverting sharp null hypotheses that define the relationship between the potential outcomes in terms of treatment effects. The most common null hypothesis is that of an additive treatment effect $\tau$, such that the hypothesis $H_0^{\tau}: Y_i(1) = Y_i(0) + \tau$ holds for all $i=1,\dots,N$. Confidence intervals derived from inverting this hypothesis were first established by \cite{hodges1963estimates} and have since been popularized for analyzing randomized experiments (e.g., see \cite{rosenbaum2002overt} and \cite{imbens2015causal}). Here we briefly review how to obtain randomization-based confidence intervals for completely randomized experiments, and then we extend them to ridge rerandomized experiments. As first proposed by \cite{hodges1963estimates}, a valid randomization-based confidence interval is the set of $\tau$ such that we fail to reject $H_0^{\tau}$; such inversion of a hypothesis is a classical way to obtain a confidence set \citep{kempthorne1969behaviour}. To obtain a valid $p$-value for $H_0^{\tau}$, a key insight is that, if $H_0^{\tau}$ holds, then one has full knowledge of the potential outcomes for all units: If we observe the outcome under control for a particular unit, we know that the outcome under treatment for that unit is simply the observed outcome plus $\tau$. As a result, for any hypothetical randomization, a test statistic---such as the mean difference estimator, $\hat{\tau}$---can be computed. To obtain a $p$-value for $H_0^{\tau}$ under randomization, one follows this simple three-step procedure: \begin{enumerate} \item Generate many hypothetical randomizations, $\mathbf{w}^{(1)},\dots,\mathbf{w}^{(M)}$, by permuting the observed treatment indicator. \item Compute a test statistic $t(\mathbf{w}, \mathbf{x}, \mathbf{y})$, such as the mean-difference estimator, across the randomizations $\mathbf{w}^{(1)},\dots,\mathbf{w}^{(M)}$ assuming $H_0^{\tau}$ is true. \item Compute the randomization-based $p$-value, defined as \begin{align} p = \frac{1 + \sum_{m=1}^M \mathds{1} \left( |t(\mathbf{w}^{(m)}, \mathbf{x}, \mathbf{y})| > |t^{obs}| \right)}{M+1} \end{align} \end{enumerate} where $t^{obs}$ is the observed test statistic and $\mathds{1}(\cdot)$ denotes the indicator function. The additional 1 in the numerator and the denominator induces a very small amount of bias in order to validly control the Type 1 error rate and is a standard correction for randomization test $p$-values \citep{phipson2010permutation}. Modern statistical software allows one to readily invert $H_0^{\tau}$ after Step 1 is completed (in Section \ref{s:simulations}, we will use the \texttt{R} package \texttt{ri} \citep{aronow2012ri} to do this), thereby producing randomization-based confidence intervals. This makes the extension to ridge rerandomization quite straightforward: In Step 1, one generates many hypothetical \textit{ridge} rerandomizations (instead of randomizations), and then proceeds as usual to conduct randomization-based inference. This is identical to the approach discussed in \cite{morgan2012rerandomization} for obtaining confidence intervals under rerandomization, except using hypothetical ridge rerandomizations instead of hypothetical rerandomizations. This can also be viewed as inverting a \textit{conditional} randomization test, where we condition on the fact that the ridge rerandomization balance criterion has been fulfilled \citep{hennessy2016conditional,branson2019randomization}. As we shall see in Section \ref{s:simulations}, confidence intervals for ridge rerandomized experiments are much more precise than intervals for completely randomized experiments, and often more precise than intervals for rerandomized experiments, especially in high dimensional and/or collinearity settings. \section{Simulations} \label{s:simulations} We now provide simulation evidence that supports the hueristic argument presented in Section \ref{ss:guidelinesALambda} and suggests when ridge rerandomization is an effective experimental design strategy. First, we will consider conducting an experiment where covariates are linearly related with the outcome, and then we will consider when they are nonlinearly related. Throughout, we will compare rerandomization and ridge rerandomization in terms of (1) their ability to balance covariates, (2) their ability to produce precise treatment effect estimators, and (3) their ability to produce precise confidence intervals. We find that ridge rerandomization is particularly preferable over rerandomization in high-dimensional or high-collinearity settings. \subsection{Simulation Setup} \label{ss:simulationSetup} Consider $N = 100$ units, 50 of which are to be assigned to treatment and 50 are to be assigned to control. Let $\mathbf{x}$ be a $N \times K$ covariate matrix, generated as \begin{align} \mathbf{x} \sim \mathcal{N} \left( \begin{pmatrix} 0 \\ \vdots \\ 0 \end{pmatrix}, \begin{pmatrix} 1 & \rho & \cdots & \rho \\ \rho & 1 & \cdots & \rho \\ \vdots & \vdots & \ddots & \vdots \\ \rho & \rho & \cdots & 1 \end{pmatrix} \label{eqn:manyCovariatesModel} \right) \end{align} where $0 \leq \rho < 1$. The parameter $\rho$ corresponds to the correlation among the covariates. Furthermore, let $Y_i(1)$ and $Y_i(0)$ be the potential outcomes under treatment and control, respectively, for unit $i$, generated as \begin{equation} \begin{aligned} Y_i(0) &\sim N \left( \mathbf{x} \boldsymbol{\beta}, 1 \right) \label{eqn:manyCovariatesPotentialOutcomesModel} \\ Y_i(1) &= Y_i(0) + \tau \end{aligned} \end{equation} For this simulation study, we set the treatment effect to be $\tau = 1$. In the above, the covariates are linearly related with the outcome; we conduct additional simulations where covariates are nonlinearly related with the outcome in Section \ref{ss:simsNonlinear}. Across simulations, we consider number of covariates $K \in \{10,\dots,90\}$ and correlation parameter $\rho \in \{0, 0.1,\dots,0.9\}$. We discuss choices for $\boldsymbol{\beta}$ in Section \ref{ss:comparingTreatmentEffectEstimation}. We also considered data-generating processes where covariances varied among covariates and where there are an uneven number of units assigned to treatment and control (i.e., unbalanced designs). However, the results for these other scenarios were largely the same as those for the above data-generating process, and so for ease of exposition we focus on results for the case where the covariates are generated from (\ref{eqn:manyCovariatesModel}) and the potential outcomes are generated from (\ref{eqn:manyCovariatesPotentialOutcomesModel}). We will consider three experimental design strategies for assigning units to treatment and control: \begin{enumerate} \item \textbf{Randomization}: Randomize $50$ units to treatment and $50$ to control. \item \textbf{Rerandomization}: Randomize $50$ units to treatment and $50$ to control until $M \leq a$, where $M$ is the Mahalanobis distance defined in (\ref{eqn:md}). \item \textbf{Ridge Rerandomization}: Randomize $50$ units to treatment and $50$ to control until $M_{\lambda} \leq a_{\lambda}$, where $M_{\lambda}$ is the ridge Mahalanobis distance defined in (\ref{eqn:ridgeMD}). \end{enumerate} For each choice of $K$, $\rho$, and $\boldsymbol{\beta}$, we ran randomization, rerandomization, and ridge rerandomization 1000 times. For rerandomization and ridge rerandomization, we set $p_a = 0.1$, which corresponds to randomizing within the 10\% ``best'' randomizations according to the Mahalanobis distance and ridge Mahalanobis distance, respectively. Furthermore, for ridge rerandomization, we used the procedure in Section \ref{sss:choiceoflambda} for selecting $\lambda$, with $n = 1000$, $\delta = 0.01$, and $\epsilon = 10^{-4}$. The value $\lambda = 0.01$ was selected for most $K$ and $\rho$, and occasionally $\lambda = 0.02$ was selected. First, in Section \ref{ss:comparingCovariateBalance}, we compare how these three methods balanced the covariates $\mathbf{x}$, and so the $\boldsymbol{\beta}$ parameter in (\ref{eqn:manyCovariatesPotentialOutcomesModel}) is irrelevant for this section. Then, in Section \ref{ss:comparingTreatmentEffectEstimation}, we compare the accuracy of treatment effect estimators and precision of confidence intervals for each method; in this case, the specification of $\boldsymbol{\beta}$ is consequential. \subsection{Comparing Covariate Balance Across Randomizations} \label{ss:comparingCovariateBalance} First, we computed the covariate mean differences across each randomization, rerandomization, and ridge rerandomization. Figure \ref{fig:ridgeVSrerandPlotVarReduction} shows how much rerandomization and ridge rerandomization reduced the variance of $\bar{\mathbf{x}}_T - \bar{\mathbf{x}}_C$ (averaged across covariates) compared to randomization for data generated from (\ref{eqn:manyCovariatesModel}). For rerandomization, the average variance reduction decreases as $K$ increases (an observation previously made in \cite{morgan2012rerandomization}), and it stays largely the same across values of $\rho$ for fixed $K$. As for ridge rerandomization, the average variance reduction also decreases as $K$ increases, but the average variance reduction increases as $\rho$ increases, i.e., as there is more collinearity in $\mathbf{x}$. Finally, the right-hand plot in Figure \ref{fig:ridgeVSrerandPlotVarReduction} shows that ridge rerandomization has a higher average variance reduction than rerandomization; furthermore, the advantage of ridge rerandomization over rerandomization increases in both $K$ and $\rho$. This suggests that ridge rerandomization may be particularly preferable over rerandomization in the presence of many covariates and/or high collinearity among covariates, which is intuitive given the motivation of ridge regression \citep{hoerl1970ridge}. \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{ridgeVSrerandPlotVarReduction2020.pdf}} \caption{Variance reduction averaged across covariates for rerandomization and ridge rerandomization, as well as their difference (ridge rerandomization minus rerandomization, i.e., the second plot minus the first).} \label{fig:ridgeVSrerandPlotVarReduction} \end{figure} \subsection{Comparing Treatment Effect Estimation Accuracy Across Randomizations} \label{ss:comparingTreatmentEffectEstimation} Reducing the variance of each covariate mean difference leads to more precise treatment effect estimates if the covariates are related to the outcome, as in (\ref{eqn:manyCovariatesPotentialOutcomesModel}). The extent to which the covariates are related to the outcome depends on the $\boldsymbol{\beta}$ parameter. Theorem \ref{thm:variancePercentReductionRidgeRerandomizationComparison} guarantees that ridge rerandomization will improve inference for the average treatment effect, compared to randomization, regardless of $\boldsymbol{\beta}$. However, Corollary \ref{corr:varianceReductionRerandomizationRidgeRerandomizationComparison} establishes that $\boldsymbol{\beta}$ dictates whether rerandomization or ridge rerandomization will perform better in terms of treatment effect estimation accuracy. First we will consider a $\boldsymbol{\beta}$ where the covariates are equally related to the outcome, and in this case ridge rerandomization performs better than rerandomization. Then, we will consider a $\boldsymbol{\beta}$ which---according to our theoretical results---should put ridge rerandomization in the worst light as compared to rerandomization. \subsubsection{One Choice of $\boldsymbol{\beta}$} Consider $\boldsymbol{\beta} = \mathbf{1}_K$. Because the covariates have been standardized to have the same scale, such a $\boldsymbol{\beta}$ implies that all of the covariates are equally important in affecting the outcome. For each of the 1000 randomizations, rerandomizations, and ridge rerandomizations generated for each $K \in \{10,\dots,90\}$ and $\rho \in \{0, 0.1,\dots,0.9\}$, we computed the mean-difference estimator $\hat{\tau}$. Then, we computed the MSE of $\hat{\tau}$ across the 1000 randomizations, rerandomizations, and ridge rerandomizations for each $K$ and $\rho$. Figure \ref{fig:ridgeVSrerandTreatmentEffectMSE} shows the MSE of rerandomization and ridge rerandomization relative to the MSE of randomization. A lower relative MSE represents a more accurate treatment effect estimator, compared to how that estimator would behave under randomization. \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandTreatmentEffectMSE2020.pdf}} \caption{Relative MSE of $\hat{\tau} = \bar{y}_T - \bar{y}_C$ under rerandomization and ridge rerandomization (relative to randomization) when $\boldsymbol{\beta} = \mathbf{1}_K$ in (\ref{eqn:manyCovariatesPotentialOutcomesModel}), as well as the difference in relative MSE between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandTreatmentEffectMSE} \end{figure} Three observations can be made about Figure \ref{fig:ridgeVSrerandTreatmentEffectMSE}. First, both rerandomization and ridge rerandomization reduce the MSE of $\hat{\tau}$ compared to randomization: the relative MSE for both methods is always less than 1. Second, for rerandomization, the relative MSE stays constant across values of $\rho$ and decreases as $K$ decreases. Meanwhile, for ridge rerandomization, the relative MSE decreases as $\rho$ increases and $K$ decreases. Third, for this choice of $\boldsymbol{\beta}$, ridge rerandomization reduces the MSE of the treatment effect estimator more so than rerandomization, especially when $K$ and/or $\rho$ is large. These last two observations reflect the variance reduction behavior observed in Figure \ref{fig:ridgeVSrerandPlotVarReduction}. Meanwhile, for each randomization, rerandomization, and ridge rerandomization, we generated a 95\% confidence interval for the average treatment effect using the procedure outlined in Section \ref{ss:inference}. Regardless of the procedure used, coverage was near 95\%. This is unsurprising, because these intervals were constructed by inverting randomization tests that are valid for their corresponding assignment mechanism; see \cite{edgington2007randomization} and \cite{good2013permutation} for classical results on the validity of randomization tests. However, the width of these intervals differed across these three procedures: Figure \ref{fig:ridgeVSrerandCI} compares the relative average interval length (compared to randomization) for rerandomization and ridge rerandomization. For the first two plots in Figure \ref{fig:ridgeVSrerandCI}, a number closer to 1 indicates intervals that are closer in length to intervals under randomization. Meanwhile, for the right-most plot in Figure \ref{fig:ridgeVSrerandCI}, a more negative number indicates more narrow confidence intervals for ridge rerandomization, as compared to rerandomization. The qualitative results are identical to the previous results: Ridge rerandomization tends to provide narrower confidence intervals as the covariates' dimension and/or collinearity increases. \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandCI2020.pdf}} \caption{Relative average confidence interval width under rerandomization and ridge rerandomization (relative to randomization) when $\boldsymbol{\beta} = \mathbf{1}_K$ in (\ref{eqn:manyCovariatesPotentialOutcomesModel}), as well as the difference between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandCI} \end{figure} \subsubsection{A Choice of $\boldsymbol{\beta}$ where Ridge Rerandomization has the Least Competitive Advantage over Rerandomization} \label{sss:badBeta} As can be seen by Corollary \ref{corr:varianceReductionRerandomizationRidgeRerandomizationComparison}, there may exist $\boldsymbol{\beta}$ where rerandomization performs better than ridge rerandomization. {To assess how poorly ridge rerandomization can perform compared to rerandomization,} now we will specify a $\boldsymbol{\beta}$ that puts ridge rerandomization in the worst light when comparing it to rerandomization in terms of treatment effect estimation accuracy. {Under the assumptions of Corollary \ref{corr:varianceReductionRerandomizationRidgeRerandomizationComparison}, the difference in treatment effect estimation accuracy between rerandomization and ridge rerandomization is given by $\Delta = \boldsymbol{\beta}^\top \boldsymbol{\Gamma} {\textbf{Diag}} \left((\lambda_k \left(v_a - d_{k,\lambda} \right))_{1\leq k \leq K} \right) \boldsymbol{\Gamma}^\top \boldsymbol{\beta}$, which can be artificially minimized with respect to $\boldsymbol{\beta}$, subject to some constraint on $\boldsymbol{\beta}$ for the minimum to exist, e.g., $\|\boldsymbol{\beta}\|\leq 1$. If $d_{k,\lambda}<v_a$ for all $k=1,...,K$, then ridge rerandomization dominates rerandomization since $\Delta>0$ for all $\boldsymbol{\beta}\neq 0$, and these schemes are only tied when $\Delta=0$ for $\boldsymbol{\beta}=0$, i.e., the covariates are uncorrelated with the outcomes. In other cases, we can define $\boldsymbol{\beta}^* = \boldsymbol{\Gamma}_{\bullet k^*}$ where $\boldsymbol{\Gamma}_{\bullet k^*}$ is the $k^*$-th column of $\boldsymbol{\Gamma}$ and $k^*=\operatorname{argmin}_{1\leq k \leq K}(v_a - d_{k,\lambda})$. We would typically have $k^*=K$ when the $d_{k,\lambda}$'s are non-increasing. By construction, $\boldsymbol{\beta}^*$ minimizes $\Delta$ over $\{\boldsymbol{\beta}\in\mathbb{R}^K:\|\boldsymbol{\beta}\|\leq 1\}$ and yields $\Delta<0$ as negative as possible. This is equivalent to $\boldsymbol{\beta}$ being in the direction that accounts for the least variation in the covariates. While such a case is unlikely, we consider such a $\boldsymbol{\beta}$ to see how much worse ridge rerandomization performs as compared to rerandomization in this scenario.} Figure \ref{fig:ridgeVSrerandTreatmentEffectMSEBadBeta} shows the relative MSE (as compared to randomization) for rerandomization and ridge rerandomization for this specification of $\boldsymbol{\beta}$. Interestingly, there are occasions where rerandomization and ridge rerandomization have relative MSEs greater than 1, i.e., when they perform worse than randomization in terms of treatment effect estimation accuracy. At first this may be surprising, especially when findings from \cite{morgan2012rerandomization} guarantee that rerandomization should perform better than randomization. However, in this case, $\boldsymbol{\beta}$ is in the direction of the last principal component of the covariate space, meaning that the covariates have nearly no relationship with the outcomes. Thus, the relative MSE that we see in the first two plots of Figure \ref{fig:ridgeVSrerandTreatmentEffectMSEBadBeta} is more or less the behavior we would expect if we compared 1000 randomizations to 1000 other randomizations. Furthermore, from the third plot in Figure \ref{fig:ridgeVSrerandTreatmentEffectMSEBadBeta}, we can see that rerandomization occasionally performs better than ridge rerandomization---particularly when $K$ is small---but the differences in relative MSE across simulations are somewhat centered around zero. Meanwhile, Figure \ref{fig:ridgeVSrerandCIBadBeta} compares the relative average confidence interval length for rerandomization and ridge rerandomization, and the qualitative results are largely the same as the relative MSE results: Rerandomization and ridge rerandomization are fairly comparable, but rerandomization tends to provide slightly narrower confidence intervals for low-dimensional covariates. Note that this specification of $\boldsymbol{\beta}$ is a unit vector. We could have scaled $\boldsymbol{\beta}$ arbitrarily large, and, as a result, the differences in the last plots of Figure \ref{fig:ridgeVSrerandTreatmentEffectMSEBadBeta} and \ref{fig:ridgeVSrerandCIBadBeta} could have been made arbitrarily large. Thus, ridge rerandomization can perform much worse than rerandomization when $\boldsymbol{\beta}$ exhibits particularly large effects in the direction of the last principal component of the covariate space, especially when the number of covariates is small. Practically speaking, such a scenario is unlikely, but it is a scenario that researchers should acknowledge and consider when comparing rerandomization and ridge rerandomization. \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandTreatmentEffectMSEBadBeta2020.pdf}} \caption{Relative MSE of $\hat{\tau} = \bar{y}_T - \bar{y}_C$ under rerandomization and ridge rerandomization (relative to randomization) for the $\boldsymbol{\beta}$ such that ridge rerandomization has the least competitive advantage over rerandomization, as well as the difference in relative MSE between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandTreatmentEffectMSEBadBeta} \end{figure} \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandCIBadBeta2020.pdf}} \caption{Relative average confidence interval width under rerandomization and ridge rerandomization (relative to randomization) for the $\boldsymbol{\beta}$ such that ridge rerandomization has the least competitive advantage over rerandomization, as well as the difference between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandCIBadBeta} \end{figure} \subsection{Additional Simulations: Considering Nonlinearity} \label{ss:simsNonlinear} In the above simulations, we generated the potential outcomes to be linearly related with the covariates. This may be considered a ``well-specified'' case, because ridge rerandomization only aims to balance the first moments of the covariates. In this section, we consider the same simulation setup as Section \ref{ss:simulationSetup}, except instead of using (\ref{eqn:manyCovariatesPotentialOutcomesModel}) to generate the potential outcomes, we use the following model: \begin{equation} \begin{aligned} Y_i(0) &\sim N \left( \exp(\mathbf{x}) \boldsymbol{\beta}, 1 \right) \label{eqn:manyCovariatesPotentialOutcomesMisspecifiedModel} \\ Y_i(1) &= Y_i(0) + \tau \end{aligned} \end{equation} where $\exp(\mathbf{x})$ denotes the matrix of values $e^{\mathbf{x}}$. Again we set $\tau = 1$ and $\boldsymbol{\beta} = \mathbf{1}_K$ and consider $K \in \{10,\dots,90\}$ and $\rho \in \{0, 0.1,\dots,0.9\}$. This alternative model does not affect rerandomization and ridge rerandomization's ability to balance covariates, but it does affect their ability to precisely estimate treatment effects. Figure \ref{fig:ridgeVSrerandTreatmentEffectMSEMisspecified} compares the relative MSE (compared to randomization) of rerandomization and ridge rerandomization, and Figure \ref{fig:ridgeVSrerandCIMisspecified} does the same for relative average confidence interval length. Although ridge rerandomization does not have as clear of an advantage over rerandomization in this misspecified scenario, it still tends to perform better than rerandomization in high-dimensional and high-collinearity settings. Furthermore, both rerandomization and ridge rerandomization still provide more precise inference for the average treatment effect compared to randomization, although not as much as when the potential outcomes were generated from a linear model. This is because the covariates still have some linear relationship with the covariates, and thus one can still obtain more precise estimators and intervals for the average treatment effect by balancing the first moments of the covariates \citep{li2018asymptotic}. In short, the results presented here are largely the same as the previous results, where the potential outcomes were linearly related with the covariates. \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandTreatmentEffectMSEMisspecified2020.pdf}} \caption{Relative MSE of $\hat{\tau}$ under rerandomization and ridge rerandomization (relative to randomization) when $\boldsymbol{\beta} = \mathbf{1}_K$ in (\ref{eqn:manyCovariatesPotentialOutcomesMisspecifiedModel}), as well as the difference in relative MSE between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandTreatmentEffectMSEMisspecified} \end{figure} \begin{figure}[H] \centerline{\includegraphics[width=\linewidth]{rerandVSRidgeRerandCIMisspecified2020.pdf}} \caption{Relative average confidence interval width under rerandomization and ridge rerandomization (relative to randomization) when $\boldsymbol{\beta} = \mathbf{1}_K$ in (\ref{eqn:manyCovariatesPotentialOutcomesMisspecifiedModel}), as well as the difference between the two (i.e., the second plot minus the first).} \label{fig:ridgeVSrerandCIMisspecified} \end{figure} \subsection{Summary of Simulation Results} Importantly, the effectiveness of rerandomization or ridge rerandomization in balancing the covariates does not depend on the covariates' relationship with the outcomes. In other words, the variance reduction results in Figure \ref{fig:ridgeVSrerandPlotVarReduction} do not depend on $\boldsymbol{\beta}$, whereas the treatment effect estimation accuracy results in Figures \ref{fig:ridgeVSrerandTreatmentEffectMSE} and \ref{fig:ridgeVSrerandTreatmentEffectMSEBadBeta} and confidence interval results in Figures \ref{fig:ridgeVSrerandCI} and \ref{fig:ridgeVSrerandCIBadBeta} do. From Figure \ref{fig:ridgeVSrerandPlotVarReduction} we see that ridge rerandomization appears to generally be more effective than rerandomization in balancing covariates in high-dimensional or high-collinearity settings, and from Figures \ref{fig:ridgeVSrerandTreatmentEffectMSE} and Figure \ref{fig:ridgeVSrerandCI} we see that this can result in more precise treatment effect estimators and confidence intervals. These results also hold when the outcome is nonlinearly related with the covariates, as discussed in Section \ref{ss:simsNonlinear}. However, from Section \ref{sss:badBeta}, we see that there are cases where rerandomization can perform better than ridge rerandomization in terms of treatment effect estimation. In particular, if the relationship between the covariates and the outcome is strongly in the direction of the last principal component of the covariate space, rerandomization can perform arbitrarily better than ridge rerandomization, especially when there are only a few number of covariates. In general, the comparison between rerandomization and ridge rerandomization depends on the relationship between the covariates and the outcomes, which is typically not known until after the experiment is conducted. In summary, these simulations suggest that ridge rerandomization is often preferable over rerandomization by targeting the directions that best explain variation in the covariates rather than the covariates themselves. If the covariates are related to the outcomes (linearly or nonlinearly), ridge rerandomization appears to be an appealing experimental design strategy when there are many covariates and/or highly collinear covariates. \section{Discussion and Conclusion} \label{s:discussion} The rerandomization literature has focused on experimental design strategies that utilize the Mahalanobis distance. Starting with \cite{morgan2012rerandomization} and continuing with works such as \cite{morgan2015rerandomization}, \cite{branson2016improving}, \cite{ernst2017sequential}, and \cite{li2018asymptotic}, many theoretical results have been established for rerandomization schemes using the Mahalanobis distance. However, the Mahalanobis distance is known to not perform well in high dimensions or when there are strong collinearities among covariates---settings which the current rerandomization literature has not addressed. To address experimental design settings where there are many covariates or strong collinearities among covariates, we presented a rerandomization scheme that utilizes a modified Mahalanobis distance. This modified Mahalanobis distance inflates the eigenvalues of the covariance matrix of the covariates, thereby automatically placing a hierarchy of importance among the covariates according to their principal components. Such a quantity has remained largely unexplored in the literature. We established several theoretical properties of this modified Mahalanobis distance, as well as properties of a rerandomization scheme that uses it---an experimental design strategy we call ridge rerandomization. These results establish that ridge rerandomization preserves the unbiasedness of treatment effect estimators and reduces the variance of covariate mean differences. If the covariates are related to the outcomes of the experiment, ridge rerandomization will yield more precise treatment effect estimators than randomization. Furthermore, we conducted a simulation study that suggests that ridge rerandomization is often preferable over rerandomization in high-dimensional or high-collinearity scenarios, which is intuitive given ridge rerandomization's connections to ridge regression. This modified Mahalanobis distance represents a class of rerandomization criteria, which has connections to principal components and the Euclidean distance. This motivates future work for rerandomization schemes that utilize other criteria. In particular, our theoretical results establish that the benefit of our class of rerandomization schemes over typical rerandomization depends on the covariates' relationship with the outcomes, which usually is not known until after the experiment has been conducted. However, if researchers have prior information about the relationship between the covariates and the outcomes, this information may be useful in selecting rerandomization criteria. An interesting line of future work is further exploring other classes of rerandomization criteria, as well as demonstrating how prior outcome information can be used to select useful rerandomization criteria when designing an experiment. \bibliographystyle{apa-good}
\section{Introduction} Fractional differential operators are non-local operators with many applications in science and technology and interesting mathematical properties; a discussion of some of their features can be found, e.g., in \cite{di-nezza-palatucci-valdinoci12}. The nonlocal nature of such operators implies for numerical discretizations that the resulting system matrices are fully populated. Efficient matrix compression techniques are therefore necessary. Various data-sparse representations of (discretizations) of classical integral operators have been proposed in the past. We mention techniques based on multipole expansions, panel clustering, wavelet compression techniques, the mosaic-skeleton method, the adaptive cross approximation (ACA) method, and the hybrid cross approximation (HCA); we refer to \cite{faustmann-melenk-praetorius15b} for a more detailed literature review in the context of classical boundary element methods (BEM). In fact, many of these data-sparse methods may be understood as specific incarnations of ${\ensuremath{\mathcal{H}}}$-matrices, which were introduced in \cite{Hackbusch99,GrasedyckHackbusch,GrasedyckDissertation,hackbusch15} as blockwise low-rank matrices. Although many of the above mentioned techniques were originally developed for applications in BEM the underlying reason for their success is the so-called ``asymptotic smoothness'' of the kernel function, which is given for a much broader class of problems. We refer to \cite{doelz-harbrecht-schwab17} and references therein, where the question of approximability is discussed for pseudodifferential operators. Discretizations of integral versions of the fractional Laplacian such as the one considered in the present paper, \eqref{eq:integral-fractional-laplacian}, are therefore amenable to data-sparse representations with $O(N \log^\beta N)$ complexity, where $N$ is the matrix size and $\beta \ge 0$. This compressibility has recently been observed in \cite{zhao-hu-cai-karniadakis17} and in \cite{ainsworth-glusa17}, where an analysis and implementation of a panel clustering type matrix-vector multiplication for the stiffness matrix is presented. It is the purpose of the present paper to show that also the inverse of the stiffness matrix of a discretization of the integral version of the fractional Laplacian can be represented in the $\ensuremath{\mathcal{H}}$-matrix format, using the same underlying block structure as employed to compress the stiffness matrix. One reason for studying the compressibility of the inverses (or the closely related question of compressibility of the $LU$-factors) are recent developments in fast (approximate) arithmetic for data-sparse matrix formats. For example, $\ensuremath{\mathcal{H}}$-matrices come with an (approximate) arithmetic with log-linear complexity, which includes, in particular, the (approximate) inversion and factorization of matrices. These (approximate) inverses/factors could either be used as direct solvers or as preconditioners, as advocated, for example, in a BEM context in \cite{bebendorf05,Grasedyck05,Grasedyck08,leborne-grasedyck06,grasedyck-kriemann-leborne08} and in \cite{li-mao-song-wang-karniadakis18} in the context of fractional differential equations. We point out that the class of $\ensuremath{\mathcal{H}}$-matrices is not the only one for which inversion and factorizations algorithms have been devised. Related to ${\ensuremath{\mathcal{H}}}$-matrices and its arithmetic are ``hierarchically semiseparable matrices'', \cite{xia13,xia-chandrasekaran-gu-li09,li-gu-wu-xia12} and the idea of ``recursive skeletonization'', \cite{ho-greengard12,greengard-gueyffier-martinsson-rokhlin09,ho-ying13}; for discretizations of PDEs, we mention \cite{ho-ying13,gillman-martinsson13,schmitz-ying12,martinsson09}, and particular applications to boundary integral equations are \cite{martinsson-rokhlin05,corona-martinsson-zorin13,ho-ying13a}. The underlying structure of our proof is similar to that in \cite{faustmann-melenk-praetorius15b,faustmann-melenk-praetorius15c} for the classical single layer and hypersingular operators of BEM. There, it is exploited that these operators are traces of potentials, i.e., they are related to functions that solve an elliptic PDE. The connection of \cite{faustmann-melenk-praetorius15b,faustmann-melenk-praetorius15c} with the present article is given by the works of \cite{CaffarelliS_07, stinga-torrea10,caffarelli-stinga16}, which show that fractional powers of certain elliptic operators posed in $\ensuremath{\mathbb{R}}^d$ can be realized as the Dirichlet-to-Neumann maps for (degenerate) PDEs posed in $\ensuremath{\mathbb{R}}^{d+1}$. \subsection{The fractional Laplacian and the Caffarelli-Silvestre extension} In this section, we briefly introduce the fractional Laplacian; the discussion will remain somewhat formal as the pertinent function spaces (e.g., $H^s_0(\ensuremath{\mathbb{R}}^d; \Omega)$) and lifting operators (e.g., $\ensuremath{\mathcal{L}}$) will be defined in subsequent sections. For $s \in (0,1)$, the fractional Laplacian in full space $\ensuremath{\mathbb{R}}^d$ is classically defined through the Fourier transform, $(-\Delta u)^{s}:= {\mathcal F}^{-1} \left(|\xi|^{2s} {\mathcal F}(u)\right)$. As discussed in the survey \cite{kwasnicki17}, several equivalent definitions are available. For example, for suitable $u$, a pointwise characterization is given in terms of a principal value integral: $$ (-\Delta u)^s(x) = C(d,s)\, \text{P.V.} \int_{\ensuremath{\mathbb{R}}^d} \frac{u(x) - u(y)}{|x - y|^{d+2s}}\,dy, \qquad C(d,s):= 2^{2s}s \frac{\Gamma(s+d/2)}{\pi^{d/2}\Gamma(1-s)}. $$ Caffarelli and Silvestre \cite{CaffarelliS_07} characterized this operator as the Dirichlet-to-Neumann operator of a (degenerate) elliptic PDE. That is, they proved \begin{equation} \label{eq:CS} C(d,s) (-\Delta u)^s (x) = - \lim_{x_{d+1} \rightarrow 0+} x_{d+1}^{1-2s} \partial_{x_{d+1}} (\ensuremath{\mathcal{L}} u)(x,x_{d+1}), \qquad x \in \ensuremath{\mathbb{R}}^d, \end{equation} where the \emph{extension} $\ensuremath{\mathcal{L}} u$ is a function on the half-space $\ensuremath{\mathbb{R}}^{d+1}_+:= \{(x,x_{d+1})\,|\, x \in \ensuremath{\mathbb{R}}^d, x_{d+1} > 0\}$ and solves \begin{equation} \label{eq:lifting} \operatorname*{div} (x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u) = 0 \qquad \mbox{ in $\ensuremath{\mathbb{R}}^{d+1}_+$}, \qquad \operatorname*{tr} \ensuremath{\mathcal{L}} u = u. \end{equation} In weak form, the combination of \eqref{eq:CS} and \eqref{eq:lifting} therefore yields \begin{equation} \int_{\ensuremath{\mathbb{R}}^{d+1}_+} x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u \cdot \nabla \ensuremath{\mathcal{L}} v = C(d,s) \int_{\ensuremath{\mathbb{R}}^d} (-\Delta u)^s v \qquad \forall v \in C^\infty_0(\ensuremath{\mathbb{R}}^{d+1}). \end{equation} For suitable $u$, $v$, we also have \begin{align} \label{eq:def-fractional-a} \int_{\ensuremath{\mathbb{R}}^{d+1}_+} x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u \cdot \nabla \ensuremath{\mathcal{L}} v &= C(d,s) \int_{\ensuremath{\mathbb{R}}^d} (-\Delta u)^s v \\ \label{eq:def-fractional-b} & = \frac{C(d,s)}{2} \int_{\ensuremath{\mathbb{R}}^d \times \ensuremath{\mathbb{R}}^d} \frac{(u(x) - u(y))(v(x) - v(y))}{|x - y|^{d+2s}}\,dx\,dy, \end{align} which is a form that is amenable to Galerkin discretizations. The fractional Laplacian on a \emph{bounded} domain $\Omega \subset \ensuremath{\mathbb{R}}^d$ can be defined in one of several \emph{non-equivalent} ways. We consider the \emph{integral fractional Laplacian} with the exterior ``boundary'' condition $u \equiv 0$ in $\Omega^c$, which reads, cf., e.g., the discussions in \cite{AcostaB_17,ainsworth-et-al18} \begin{equation} \label{eq:integral-fractional-laplacian} (-\Delta u)_I^s(x) = C(d,s) \text{P.V.} \int_{\ensuremath{\mathbb{R}}^d} \frac{u(x) - u(y)}{|x - y|^{d+2s}}\,dy, \qquad x \in \Omega \end{equation} and the understanding that $u = 0$ on $\Omega^c$. Important for the further developments is that this version of the fractional Laplacian still admits the interpretation \eqref{eq:CS} as a Dirichlet-to-Neumann map for arguments $u \in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$ (see \eqref{eq:def-Hs0} ahead). In particular, for $u$, $v \in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$ the representations \eqref{eq:def-fractional-a} and \eqref{eq:def-fractional-b} are both valid. \subsection{Notation} Let $\ensuremath{\mathbb{R}}^{d+1}_+ = \ensuremath{\mathbb{R}}^d\times (0,\infty)$ be the upper half-space. We will identify its boundary $\ensuremath{\mathbb{R}}^{d} \times \{0\}$ with $\ensuremath{\mathbb{R}}^d$. More generally, if necessary, we will identify subsets $\omega \subset \ensuremath{\mathbb{R}}^d$ with $\omega \times \{0\} \subset \ensuremath{\mathbb{R}}^{d+1}$. For measurable subset $M$ of $\ensuremath{\mathbb{R}}^d$, we will use standard Lebesgue and Sobolev spaces $L^2(M)$ and $H^1(M)$. Sobolev spaces of non-integer order $s\in(0,1)$ are defined via the Sobolev-Slobodecki norms \begin{align*} \norm{u}{H^s(M)}^2 = \norm{u}{L^2(M)}^2 + \snorm{u}{H^s(M)}^2 = \norm{u}{L^2(M)}^2 + \int_{M}\int_{M} \frac{\abs{u(x)-u(y)}^2}{\abs{x-y}^{d+2s}}\,dxdy. \end{align*} We will work in particular with the Hilbert space \begin{align} \label{eq:def-Hs0} H^s_0(\ensuremath{\mathbb{R}}^d;\Omega) := \left\{ u\in H^s(\ensuremath{\mathbb{R}}^d)\mid u\equiv 0 \text{ on } \ensuremath{\mathbb{R}}^d\setminus\overline\Omega \right\}. \end{align} \section{Main results} \subsection{Model problem and discretization} For a polyhedral Lipschitz domain $\Omega\subset\ensuremath{\mathbb{R}}^d$ and $s\in(0,1)$, we are interested in calculating the trace $u$ on $\Omega \subset \ensuremath{\mathbb{R}}^d$ of a function $\ensuremath{\mathbf{u}}$ defined on $\ensuremath{\mathbb{R}}^{d+1}_+$, where $\ensuremath{\mathbf{u}}$ solves \begin{align}\label{eq:dirichlet} \begin{split} -{\rm div} \left( x_{d+1}^{1-2s} \nabla \ensuremath{\mathbf{u}} \right) &= 0 \quad\text{ in } \ensuremath{\mathbb{R}}^{d+1}_+,\\ - \lim_{x_{d+1} \rightarrow 0+} x_{d+1}^{1-2s} \partial_{x_{d+1}} \ensuremath{\mathbf{u}} &= f \quad\text{ on } \Omega,\\ \ensuremath{\mathbf{u}} &= 0 \quad\text{ on } \ensuremath{\mathbb{R}}^d\setminus\Omega. \end{split} \end{align} Our variational formulation of~\eqref{eq:dirichlet} is based on the spaces $H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$: Find $u\in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$ such that \begin{align}\label{eq:dirichlet:var} \int_{\ensuremath{\mathbb{R}}^{d+1}_+} x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u \cdot \nabla \ensuremath{\mathcal{L}} v\,dx = \int_\Omega f v\,dx \quad\text{ for all } v\in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega). \end{align} Here, $\ensuremath{\mathcal{L}}$ is the \textit{harmonic extension} operator associated with the PDE given in~\eqref{eq:dirichlet}. It has already appeared in \eqref{eq:lifting} and is formally defined in \eqref{eq:def-lL}. We will show in Section~\ref{sec:cont} ahead that the left-hand side of the above equation introduces a bounded and elliptic bilinear form. Hence, the Lax-Milgram Lemma proves that the variational formulation~\eqref{eq:dirichlet:var} is well-posed. Given a quasiuniform mesh $\ensuremath{\mathcal{T}}_h$ on $\Omega$ with mesh width $h$, we discretize problem \eqref{eq:dirichlet:var} using the conforming finite element space \begin{align*} \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h) := \left\{ u\in C(\ensuremath{\mathbb{R}}^d) \mid \operatorname{supp} u \subset \overline\Omega \mbox{ and } u|_K \in {\mathcal P}_1\forall K \in \ensuremath{\mathcal{T}}_h\right\} \subset H^s_0(\ensuremath{\mathbb{R}}^d;\Omega), \end{align*} where ${\mathcal P}_1$ denote the space of polynomials of degree $1$. We emphasize that $\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$ is the ``standard'' space of piecewise linear functions on $\Omega$ that are extended by zero outside $\Omega$. Obviously, there is a unique solution $u_h\in \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$ of the linear system \begin{align}\label{eq:discrete} \int_{\ensuremath{\mathbb{R}}^{d+1}_+} x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u_h \cdot \nabla \ensuremath{\mathcal{L}} v_h\,dx = \int_\Omega f v_h\,dx \quad\text{ for all } v_h\in\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h). \end{align} If we consider the nodal basis $(\psi_j)_{j=1}^N$ of $\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$, we can write equation~\eqref{eq:discrete} as \begin{align*} \ensuremath{\mathbf{A}} \ensuremath{\mathbf{x}} = \ensuremath{\mathbf{b}}. \end{align*} Our goal is to derive an $\ensuremath{\mathcal{H}}$-matrix representation of the inverse $\ensuremath{\mathbf{A}}^{-1}$. \begin{remark} Computationally, the bilinear form \eqref{eq:discrete} is not easily accessible. One possibility is to employ \eqref{eq:def-fractional-b}. For this representation of the bilinear form, the entries of the stiffness matrix $\ensuremath{\mathbf{A}}$ can be computed, \cite{AcostaBB_17,ainsworth-glusa17}. \hbox{}\hfill\rule{0.8ex}{0.8ex} \end{remark} \subsection{Blockwise low-rank approximation} Let us introduce the necessary notation. Let $\ensuremath{\mathcal{I}} = \left\{ 1,\dots,N \right\}$ be the set of indices of the nodal basis $(\psi_j)_{j=1}^N$ of $\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$. A \textit{cluster} $\tau$ is a subset of $\ensuremath{\mathcal{I}}$. For a cluster $\tau$, we say that $B_{R_\tau}^0\subset\ensuremath{\mathbb{R}}^d$ is a \textit{bounding box} if \begin{itemize} \item[(i)] $B_{R_\tau}^0$ is a hyper cube with side length $R_\tau$, \item[(ii)] ${\rm supp}(\psi_j)\subset B_{R_\tau}^0$ for all $j\in\tau$. \end{itemize} For an \textit{admissibility parameter} $\eta>0$, a pair of cluster $(\tau,\sigma)$ is called $\eta$-admissible, if there exist bounding boxes $B_{R_\tau}^0$ of $\tau$ and $B_{R_\sigma}^0$ of $\sigma$ such that \begin{align} \label{eq:admissiblity} \max \left\{ \mathrm{diam}(B_{R_\tau}^0), \mathrm{diam}(B_{R_\sigma}^0) \right\} \leq \eta\, {\rm dist} \left( B_{R_\tau}^0, B_{R_\sigma}^0 \right). \end{align} The next theorem is the first main result of this work. For two admissible clusters, the associated matrix block of the inverse $\ensuremath{\mathbf{A}}^{-1}$ of the matrix associated to the linear system of problem~\eqref{eq:dirichlet} can be approximated by low-rank matrices with an error that is exponentially small in the rank. \begin{theorem}\label{thm:approx:blocks} Let $\eta>0$ be a fixed admissibility parameter and $q\in(0,1)$. Let $(\tau,\sigma)$ be a cluster pair with $\eta$-admissible bounding boxes. Then, for each $k\in\ensuremath{\mathbb{N}}$, there exist matrices $\ensuremath{\mathbf{X}}_{\tau\sigma}\in\ensuremath{\mathbb{R}}^{\abs{\tau}\times r}$ and $\ensuremath{\mathbf{Y}}_{\tau\sigma}\in\ensuremath{\mathbb{R}}^{\abs{\sigma}\times r}$ with rank $r\leq C_{\rm dim}(2+\eta)^{d+1}q^{-(d+1)}k^{d+2}$ such that \begin{align}\label{thm:approx:blocks:eq} \norm{\ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma} - \ensuremath{\mathbf{X}}_{\tau\sigma}\ensuremath{\mathbf{Y}}_{\tau\sigma}^{\top}}{2} \leq C_{\rm apx} N^{\frac{1+d}{d}} q^k. \end{align} The constants $C_{\rm dim}$ and $C_{\rm apx}$ depend only on $d$, $\Omega$, the shape-regularity of $\ensuremath{\mathcal{T}}_h$, and on $s$. \end{theorem} Theorem~\ref{thm:approx:blocks} shows that individual blocks of $\ensuremath{\mathbf{A}}^{-1}$ can be approximated by low-rank matrices. $\ensuremath{\mathcal{H}}$-matrices are blockwise low-rank matrices where the blocks are organized in a tree structure, which affords the fast arithmetic of $\ensuremath{\mathcal{H}}$-matrices. The block cluster tree is based on a tree structure for the index set $\ensuremath{\mathcal{I}}$, which we described next. \begin{definition}[cluster tree] A \emph{cluster tree} with \emph{leaf size} $n_{\rm leaf} \in \mathbb{N}$ is a binary tree $\mathbb{T}_{\ensuremath{\mathcal{I}}}$ with root $\mathcal{I}$ such that for each cluster $\tau \in \mathbb{T}_{\ensuremath{\mathcal{I}}}$ the following dichotomy holds: either $\tau$ is a leaf of the tree and $\abs{\tau} \leq n_{\rm leaf}$, or there exist so called sons $\tau'$, $\tau'' \in \mathbb{T}_{\ensuremath{\mathcal{I}}}$, which are disjoint subsets of $\tau$ with $\tau = \tau' \cup \tau''$. The \emph{level function} ${\rm level}: \mathbb{T}_{\ensuremath{\mathcal{I}}} \rightarrow \mathbb{N}_0$ is inductively defined by ${\rm level}(\ensuremath{\mathcal{I}}) = 0$ and ${\rm level}(\tau') := {\rm level}(\tau) + 1$ for $\tau'$ a son of $\tau$. The \emph{depth} of a cluster tree is ${\rm depth}(\mathbb{T}_{\ensuremath{\mathcal{I}}}) := \max_{\tau \in \mathbb{T}_{\ensuremath{\mathcal{I}}}}{\rm level}(\tau)$. \end{definition} \begin{definition}[far field, near field, and sparsity constant] A partition $P$ of $\ensuremath{\mathcal{I}} \times \ensuremath{\mathcal{I}}$ is said to be based on the cluster tree $\mathbb{T}_{\ensuremath{\mathcal{I}}}$, if $P \subset \mathbb{T}_{\ensuremath{\mathcal{I}}}\times\mathbb{T}_{\ensuremath{\mathcal{I}}}$. For such a partition $P$ and fixed admissibility parameter $\eta > 0$, we define the \emph{far field} and the \emph{near field} as \begin{equation}\label{eq:farfield} P_{\rm far} := \{(\tau,\sigma) \in P \; : \; (\tau,\sigma) \; \text{is $\eta$-admissible}\}, \quad P_{\rm near} := P\backslash P_{\rm far}. \end{equation} The \emph{sparsity constant} $C_{\rm sp}$, introduced in \cite{HackbuschKhoromskij2000a,HackbuschKhoromskij2000b,GrasedyckDissertation}, of such a partition is defined by \begin{equation}\label{eq:sparsityConstant} C_{\rm sp} := \max\left\{\max_{\tau \in \mathbb{T}_{\ensuremath{\mathcal{I}}}}\abs{\{\sigma \in \mathbb{T}_{\ensuremath{\mathcal{I}}} \, : \, \tau \times \sigma \in P_{\rm far}\}}, \max_{\sigma \in \mathbb{T}_{\ensuremath{\mathcal{I}}}}\abs{\{\tau \in \mathbb{T}_{\ensuremath{\mathcal{I}}} \, : \, \tau \times \sigma \in P_{\rm far}\}}\right\}. \end{equation} \end{definition} The following Theorem~\ref{th:Happrox} shows that the matrix $\ensuremath{\mathbf{A}}^{-1}$ can be approximated by blockwise rank-$r$ matrices at an exponential rate in the block rank $r$: \begin{theorem}\label{th:Happrox} Fix the admissibility parameter $\eta > 0$. Let a partition $P$ of ${\ensuremath{\mathcal{I}}} \times {\ensuremath{\mathcal{I}}}$ be based on a cluster tree $\mathbb{T}_{\ensuremath{\mathcal{I}}}$. Then, there is a blockwise rank-$r$ matrix $\mathbf{B}_{\mathcal{H}}$ such that \begin{equation} \|\ensuremath{\mathbf{A}}^{-1} - \mathbf{B}_{\mathcal{H}}\|_2 \leq C_{\rm apx} C_{\rm sp} N^{(d+1)/d} \operatorname*{depth} (\mathbb{T}_{\ensuremath{\mathcal{I}}}) e^{-br^{1/(d+2)}}. \end{equation} The constant $C_{\rm apx}$ depends only on $\Omega$, $d$, the shape regularity of the quasiuniform triangulation $\mathcal{T}_h$, and on s, while the constant $b>0$ additionally depends on $\eta$. \end{theorem} \begin{proof} As it is shown in \cite{GrasedyckDissertation}, \cite[Lemma~{6.32}]{hackbusch15}, norm bounds for a block matrix that is based on a cluster tree can be inferred from norm bounds for the blocks. This allows one to prove Theorem~\ref{th:Happrox} based on the results of Theorem~\ref{thm:approx:blocks} (see, e.g., the proof of \cite[Thm.~{2}]{FMP_NumerMath_15} for details). \end{proof} \begin{remark} For quasiuniform meshes with $\mathcal{O}(N)$ elements, typical clustering strategies such as the ``geometric clustering'' described in \cite{hackbusch15} lead to fairly balanced cluster trees $\mathbb{T}_{\ensuremath{\mathcal{I}}}$ with $\operatorname*{depth} \mathbb{T}_{\ensuremath{\mathcal{I}}} = \mathcal{O}(\log N)$ and a sparsity constant $C_{\rm sp}$ that is bounded uniformly in $N$. We refer to~\cite{HackbuschKhoromskij2000a,HackbuschKhoromskij2000b,GrasedyckDissertation,hackbusch15} for the fact that the memory requirement to store $\mathbf{B}_{\mathcal{H}}$ is $\mathcal{O}\big((r+n_{\rm leaf}) N \log N\big)$. \hbox{}\hfill\rule{0.8ex}{0.8ex} \end{remark} \section{The Beppo-Levi space $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+$)}\label{sec:cont} In the present section, we formulate a functional framework for the lifting operator $\ensuremath{\mathcal{L}}$ of \eqref{eq:lifting}. We will work in the Beppo-Levi space \begin{align*} \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+) := \left\{ \ensuremath{\mathbf{u}} \in \ensuremath{\mathcal{D}}'(\ensuremath{\mathbb{R}}^{d+1}_+) \mid \nabla \ensuremath{\mathbf{u}} \in L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+) \right\} \end{align*} of all distributions $\ensuremath{\mathcal{D}}'(\ensuremath{\mathbb{R}}^{d+1}_+)$ having all first order partial derivatives in $L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ for \begin{equation} \label{eq:alpha} \alpha=1-2s \in (-1,1), \end{equation} where this last space is defined as the set of measurable functions $\ensuremath{\mathbf{u}}$ such that \begin{align*} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 = \int_{\ensuremath{\mathbb{R}}^{d+1}_+} x_{d+1}^\alpha\abs{\ensuremath{\mathbf{u}}(x)}^2\,dx < \infty. \end{align*} We denote by $L_{\alpha,\rm{bdd}}^2(\ensuremath{\mathbb{R}}^{d+1}_+)$ the set of functions that are in $L_\alpha^2$ on every bounded subset of $\ensuremath{\mathbb{R}}^{d+1}_+$. By $ \operatorname*{tr}: C^{\infty}(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\rightarrow C^{\infty}(\ensuremath{\mathbb{R}}^d)$ we denote the trace operator $( \operatorname*{tr}\,\ensuremath{\mathbf{u}})(x_1, \dots, x_d) := \ensuremath{\mathbf{u}}(x_1, \dots, x_d, 0)$. The following result, which is an extension to weighted spaces of the well-known result~\cite[Cor.~{2.1}]{DenyL_55}, shows that the distributions in $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ are actually functions. Its proof will be given below in Section~\ref{section:tech}. \begin{lemma}\label{thm:bl} For $\alpha\in(-1,1)$ there holds $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+) \subset L_{\alpha,\rm{bdd}}^2(\ensuremath{\mathbb{R}}^{d+1}_+)$. Furthermore, for $\alpha \in [0,1)$ one has $\ensuremath{\mathbf{u}} \in L^2_{0,{\rm bdd}}(\ensuremath{\mathbb{R}}^{d+1}_+)$. \end{lemma} We additionally define the space \begin{align*} \ensuremath{\mathcal{B}}^s(\ensuremath{\mathbb{R}}^d) := \left\{ u\in L^2_{\rm loc}(\ensuremath{\mathbb{R}}^d) \mid \snorm{u}{H^s(\ensuremath{\mathbb{R}}^d)}<\infty \right\}. \end{align*} From now on, we fix a hypercube $K := K'\times (0,b_{d+1})$, $K' = \prod_{j=1}^d (a_j,b_j)$. Then, using Lemma~\ref{thm:bl}, one can show that $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ and $\ensuremath{\mathcal{B}}^s(\ensuremath{\mathbb{R}}^d)$ are Hilbert spaces when endowed with the norms \begin{align} \label{eq:norm-BL1} \norm{\ensuremath{\mathbf{u}}}{\ensuremath{\mathcal{B}}^1_{\alpha}(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 := \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(K)}^2 + \norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 \quad\text{ and }\quad \norm{u}{\ensuremath{\mathcal{B}}^s(\ensuremath{\mathbb{R}}^d)}^2 := \norm{u}{L^2(K')}^2 + \snorm{u}{H^s(\ensuremath{\mathbb{R}}^d)}^2. \end{align} There holds the following density result, which can be found for bounded domains in~\cite[Thm.~{11.11}]{Kufner_85} even for higher Sobolev regularity. In the present case of first order regularity and unbounded domains, we give a short proof below in Section~\ref{section:tech}. \begin{lemma}\label{lem:bl:dense} For $\alpha\in(-1,1)$ the set $C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ is dense in $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. \end{lemma} The trace operator can be extended to the spaces $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ as will also be shown below in Section~\ref{section:tech}. Analogous trace theorems in Sobolev spaces on smooth and bounded domains are given for $s=1/2$ in~\cite[Prop.~{1.8}]{CabreT_10}, and for $s\in(0,1)\setminus\frac{1}{2}$ in~\cite[Prop.~{2.1}]{CapellaDDS_11}. \begin{lemma}\label{lem:bl:trace} For $\alpha\in(-1,1)$, the trace operator is a bounded linear operator $ \operatorname*{tr}: \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+) \rightarrow \ensuremath{\mathcal{B}}^s(\ensuremath{\mathbb{R}}^d)$, where $s$ is given by \eqref{eq:alpha}. \end{lemma} We define the Hilbert space $\ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+) := \ker( \operatorname*{tr})$. The following Poincar\'e inequality holds on this space. The proof will be given below in Section~\ref{section:tech}. \begin{cor}\label{cor:poincare} For all $\ensuremath{\mathbf{u}}\in\ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+)$, there holds \begin{align*} \norm{\ensuremath{\mathbf{u}}}{\ensuremath{\mathcal{B}}^1_{\alpha}(\ensuremath{\mathbb{R}}^{d+1}_+)} \lesssim \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{align*} \end{cor} For a function $u\in H^s(\ensuremath{\mathbb{R}}^d)$, we define the \textit{minimum norm extension} or \textit{harmonic extension} $\ensuremath{\mathcal{L}} u\in \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ as \begin{align} \label{eq:def-lL} \ensuremath{\mathcal{L}} u = \argmin_{\substack{ \ensuremath{\mathbf{u}} \in \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\\ \operatorname*{tr}\,\ensuremath{\mathbf{u}} = u}} \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{align} We can characterize $\ensuremath{\mathcal{L}} u$ by \begin{align}\label{eq:minnorm:var} \begin{split} \int_{\ensuremath{\mathbb{R}}^{d+1}_+}x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{L}} u \cdot \nabla \ensuremath{\mathbf{v}}\,dx &= 0 \quad\text{ for all } \ensuremath{\mathbf{v}} \in \ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+),\\ \operatorname*{tr} \ensuremath{\mathcal{L}} u &= u. \end{split} \end{align} In view of the previous developments the minimum norm extension exists uniquely and satisfies \begin{align}\label{eq:1} \norm{\ensuremath{\mathcal{L}} u}{\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \lesssim \norm{u}{H^s(\ensuremath{\mathbb{R}}^d)}. \end{align} Indeed, the minimum norm extension can be written $\ensuremath{\mathcal{L}} u = \ensuremath{\mathcal{E}} u + \ensuremath{\mathbf{u}}$, where $\ensuremath{\mathcal{E}} u$ is the operator from Lemma~\ref{lem:ext}, and $\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+)$ is given by \begin{align*} \int_{\ensuremath{\mathbb{R}}^{d+1}_+}x_{d+1}^{1-2s} \nabla \ensuremath{\mathbf{u}} \cdot \nabla \ensuremath{\mathbf{v}}\,dx = -\int_{\ensuremath{\mathbb{R}}^{d+1}_+}x_{d+1}^{1-2s} \nabla \ensuremath{\mathcal{E}} u \cdot \nabla \ensuremath{\mathbf{v}}\,dx \quad\text{ for all } \ensuremath{\mathbf{v}} \in \ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+). \end{align*} This equation is uniquely solvable due to the Lax-Milgram theorem and Corollary~\ref{cor:poincare}, and this also implies the stability~\eqref{eq:1}. Due to~\eqref{eq:minnorm:var}, we see that a variational form of our original problem~\eqref{eq:dirichlet} is actually given by~\eqref{eq:dirichlet:var}. Next, we show that problem~\eqref{eq:dirichlet:var} is well-posed. We mention that ellipticity has already been shown in~\cite[eq.~(3.7)]{CaffarelliS_07} using Fourier methods. \begin{lemma}\label{lem:dirichlet:var} Problem~\eqref{eq:dirichlet:var} has a unique solution $u\in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$, and \begin{align*} \norm{u}{H^s(\ensuremath{\mathbb{R}}^d)} \lesssim \norm{f}{H^{-s}(\Omega)}, \end{align*} where $H^{-s}(\Omega)$ is the dual space of $H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$. \end{lemma} \begin{proof} Due to~\cite[Prop.~2.4]{AcostaB_17}, there holds the Poincar\'e inequality $\norm{u}{L^2(\Omega)}\lesssim \snorm{u}{H^s(\ensuremath{\mathbb{R}}^d)}$ for all $u\in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$. We conclude that $\norm{u}{H^s(\ensuremath{\mathbb{R}}^d)}\lesssim \snorm{u}{H^s(\ensuremath{\mathbb{R}}^d)}$ for all $u\in H^s_0(\ensuremath{\mathbb{R}}^d;\Omega)$. Combining this Poincar\'e inequality with the trace estimate~\eqref{lem:trace:eq1}, we obtain the ellipticity of the bilinear form on the left-hand side of~\eqref{eq:dirichlet:var}. The continuity of this bilinear form follows from~\eqref{eq:1}. \end{proof} \subsection{Technical details and proofs}\label{section:tech} Define the Sobolev space $H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ as the space of functions $\ensuremath{\mathbf{u}}$ such that \begin{align*} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 + \norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 < \infty. \end{align*} We start with a density result, whose proof is based on ideas from~\cite[Thm.~11.11]{Kufner_85}. \begin{lemma}\label{lem:density} For $\alpha\in(-1,1)$, the space $C^{\infty}(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ is dense in $H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. \end{lemma} \begin{proof} By \cite[Thm.~1]{GoldshteinU_09} the space $C^\infty(\ensuremath{\mathbb{R}}^{d+1}_+)\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ is dense in $H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. Hence, without loss of generality, we may assume that $\ensuremath{\mathbf{u}}\in C^\infty(\ensuremath{\mathbb{R}}^{d+1}_+)\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. For $h>0$, define the function $\ensuremath{\mathbf{u}}_h$ by \begin{align*} \ensuremath{\mathbf{u}}_h(x_1,\dots,x_{d+1}):= \begin{cases} \ensuremath{\mathbf{u}}(x_1,\dots,x_{d+1}) & \text{ if } h<x_{d+1}\\ \ensuremath{\mathbf{u}}(x_1,\dots,h) & \text{ if } x_{d+1}\leq h. \end{cases} \end{align*} By construction, $\ensuremath{\mathbf{u}}_h\in C(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ and \begin{align}\label{lem:density:eq2} \begin{split} \norm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{u}}_h}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 = \norm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{u}}_h}{H^1_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2 &= \norm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{u}}_h}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2 + \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2\\ &\lesssim \norm{\ensuremath{\mathbf{u}}}{H^1_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2 + \norm{\ensuremath{\mathbf{u}}_h}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2. \end{split} \end{align} By Lebesgue Dominated Convergence, we have $\lim_{h \rightarrow 0} \norm{\ensuremath{\mathbf{u}}}{H^1_\alpha(\ensuremath{\mathbb{R}}^d\times (0,h))} = 0$. Hence, we focus on showing $\lim_{h \rightarrow 0} \norm{\ensuremath{\mathbf{u}}_h}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times (0,h))} = 0$. To that end, we use a 1D trace inequality: For $v \in C^1(0,\infty)$ we have $v(h) = v(y) - \int_{h}^y v^\prime(t)\,dt$ so that \begin{align*} \int_{y=h}^{h+1} y^\alpha v^2(h)\,dy &\leq 2 \int_{y=h}^{h+1} y^\alpha v^2(y) \,dy + 2 \int_{y=h}^{h+1} y^\alpha \left| \int_{t=h}^y |v^\prime(t)|\,dt\right|^2\,dy\\ &\lesssim \|v\|^2_{L^2_\alpha(h,h+1)} + \int_{y=h}^{h+1} y^\alpha y^{1-\alpha} \int_{t=h}^{h+1} t^\alpha |v^\prime(t)|^2\,dt\,dy \lesssim \|v\|^2_{L^2_\alpha(h,h+1)} + \|v^\prime\|^2_{L^2_\alpha(h,h+1)}. \end{align*} Since there exists $C > 0$ such that for $h \in (0,1]$, we have $C^{-1} \leq \int_{h}^{h+1} t^\alpha\,dt \leq C$, we can conclude \begin{align} \label{eq:1d-trace} |v(h)|^2 \leq C^2_{\rm trace} \left[ \|v\|^2_{L^2_\alpha(h,h+1)} + \|v^\prime\|^2_{L^2_\alpha(h,h+1)} \right]. \end{align} With this, we estimate \begin{align*} \norm{\ensuremath{\mathbf{u}}_h}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times(0,h))}^2 &= \int_0^h x_{d+1}^\alpha\int_{y\in\ensuremath{\mathbb{R}}^d}\ensuremath{\mathbf{u}}_h(y,h)^2\, dy\, dx_{d+1} = h^{\alpha+1} \int_{y\in\ensuremath{\mathbb{R}}^d}\ensuremath{\mathbf{u}}(y,h)^2\, dy\\ &\stackrel{\eqref{eq:1d-trace}}{\leq} C^2_{\rm trace} h^{\alpha+1} \norm{\ensuremath{\mathbf{u}}}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d}\times(h,h+1))}^2 \leq C^2_{\rm trace} h^{\alpha+1} \norm{\ensuremath{\mathbf{u}}}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_{+})}^2. \end{align*} As $\alpha+1>0$ we conclude that $\lim_{h \rightarrow} \norm{\ensuremath{\mathbf{u}}_h}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times (0,h))} = 0$. Since $\ensuremath{\mathbf{u}}_h$ is only piecewise smooth, we perform, as a last step, a mollification step. The above shows that, given $\varepsilon>0$, we can fix $h$ such that \begin{align}\label{lem:density:eq3} \norm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{u}}_h}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \leq \varepsilon. \end{align} Next, for $0<\delta<h/4$ define the function \begin{align*} \widetilde \ensuremath{\mathbf{u}}_\delta := \begin{cases} \rho_{\delta} \star \ensuremath{\mathbf{u}}_h & h/2 < x_{d+1}\\ \ensuremath{\mathbf{u}}_h & x_{d+1}\leq h/2. \end{cases} \end{align*} Then, $\widetilde \ensuremath{\mathbf{u}}_\delta\in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$, cf.~\cite{GoldshteinU_09}, and \begin{align}\label{lem:density:eq4} \norm{\ensuremath{\mathbf{u}}_h-\widetilde \ensuremath{\mathbf{u}}_\delta}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} = \norm{\ensuremath{\mathbf{u}}_h-\rho_\delta \star \ensuremath{\mathbf{u}}_h}{H^1_\alpha(\ensuremath{\mathbb{R}}^d\times(h/2,\infty))}. \end{align} Note that $h$ is already fixed. Standard results about mollification, cf., e.g.,~\cite{GoldshteinU_09}, show that the term $\norm{\ensuremath{\mathbf{u}}_h-\rho_\delta \star \ensuremath{\mathbf{u}}_h}{H^1_\alpha(\ensuremath{\mathbb{R}}^d\times(h/2,\infty))}$ converges to zero for $\delta\rightarrow 0$. Hence, choosing $\delta$ small enough, we obtain from~\eqref{lem:density:eq3} and~\eqref{lem:density:eq4} that $\norm{\ensuremath{\mathbf{u}}-\widetilde \ensuremath{\mathbf{u}}_\delta}{H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}\leq 2\varepsilon$, which proves the result. \end{proof} Next, we show that the trace operator $ \operatorname*{tr}$ extends continuously to weighted Sobolev spaces. \begin{lemma}\label{lem:mult:trace} Let $\alpha\in(-1,1)$. The trace operator $ \operatorname*{tr}$ has a unique extension as linear and bounded operator $H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\rightarrow L^2(\ensuremath{\mathbb{R}}^d)$, and there holds the multiplicative trace inequality \begin{align}\label{lem:mult:trace:eq} \norm{ \operatorname*{tr}\, \ensuremath{\mathbf{u}}}{L^2(\Omega)} \leq C_{\rm tr} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(\Omega_+)}^{(1-\alpha)/2} \cdot \norm{\partial_{d+1} \ensuremath{\mathbf{u}}}{L^2_\alpha(\Omega_+)}^{(1+\alpha)/2}, \end{align} for all measurable subsets $\Omega\subseteq\ensuremath{\mathbb{R}}^d$, where $\Omega_+ := \Omega\times (0,\infty)$. The constant $C_{\rm tr}$ does not depend on $\Omega$. \end{lemma} \begin{proof} In order to prove all statements of the lemma, we note that due to Lemma~\ref{lem:density}, it is sufficient to show the estimate~\eqref{lem:mult:trace:eq} for smooth functions $\ensuremath{\mathbf{u}}\in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. We may also assume that $\ensuremath{\mathbf{u}}$ is supported by $\ensuremath{\mathbb{R}}^d \times (0,1)$. Using the abreviation $v(x) = \ensuremath{\mathbf{u}}(x_1,\dots,x_d,x)$, we note that due to H\"older's inequality \begin{align*} \abs{v(0)} &\leq \abs{v(y)} + \abs{\int_0^y v'(t)\,dt} \lesssim \abs{v(y)} + y^{(1-\alpha)/2} \norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}. \end{align*} A one-dimensional trace inequality and a scaling argument show for $y > 0$ \begin{align*} \abs{v(y)}^2 &\lesssim y^{-1} \int_y^{2y} \abs{v(t)}^2\,dt + y \int_y^{2y} \abs{v'(t)}^2\,dt. \end{align*} For $t\in(y,2y)$ we have $1\leq y^{-\alpha} t^\alpha$ if $\alpha\in [0,1)$ and $1 \leq 2^{-\alpha} y^{-\alpha} t^\alpha$ if $\alpha \in (-1,0)$, and we conclude \begin{align*} \abs{v(y)}^2 &\lesssim y^{-1-\alpha}\norm{v}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}^2 + y^{1-\alpha}\norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}^2. \end{align*} If $\norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)} \ne 0$, we set $y = \norm{v}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)} \cdot \norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}^{-1}$ and get \begin{align} \label{eq:1D-trace} \abs{v(0)}^2 \lesssim \norm{v}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}^{1-\alpha}\cdot\norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)}^{1+\alpha}. \end{align} We note that \eqref{eq:1D-trace} is also valid if $\norm{v'}{L^2_\alpha(\ensuremath{\mathbb{R}}_+)} = 0$ since our assumption $\operatorname{supp} \ensuremath{\mathbf{u}} \in \ensuremath{\mathbb{R}}^d \times [0,1]$ implies in this degenerate case $v \equiv 0$. Integrating $\ensuremath{\mathbf{u}}(\cdot,0)$ over $\Omega$ and using \eqref{eq:1D-trace} shows~\eqref{lem:mult:trace:eq}. \end{proof} \begin{lemma}\label{lem:trace} Let $\alpha\in(-1,1)$ and $s$ be given by \eqref{eq:alpha}. The trace operator $ \operatorname*{tr}$ is bounded as $ \operatorname*{tr}: H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\rightarrow H^s(\ensuremath{\mathbb{R}}^d)$, and \begin{align}\label{lem:trace:eq1} \snorm{ \operatorname*{tr}\,\ensuremath{\mathbf{u}}}{H^s(\ensuremath{\mathbb{R}}^d)} \lesssim \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{align} \end{lemma} \begin{proof} Due to Lemma~\ref{lem:density}, it suffices to show~\eqref{lem:trace:eq1} for $\ensuremath{\mathbf{u}}\in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. Combining~\eqref{lem:trace:eq1} with Lemma~\ref{lem:mult:trace} then proves that $ \operatorname*{tr}: H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\rightarrow H^s(\ensuremath{\mathbb{R}}^d)$ is bounded. Upon writing $y = x + r \phi$ with polar coordinates $r > 0$, $\phi\in S^{d-1}:=\partial B_1(0) \subset \ensuremath{\mathbb{R}}^d$, we obtain with the triangle inequality and symmetry arguments \begin{align*} \snorm{ \operatorname*{tr}\,\ensuremath{\mathbf{u}}}{H^s(\ensuremath{\mathbb{R}}^d)}^2 &= \int_{\ensuremath{\mathbb{R}}^d}\int_{\ensuremath{\mathbb{R}}^d} \frac{\abs{\ensuremath{\mathbf{u}}(x,0)-\ensuremath{\mathbf{u}}(y,0)}^2}{\abs{x-y}^{d+2s}} \,dy\,dx \lesssim \int_{\ensuremath{\mathbb{R}}^d}\int_{\ensuremath{\mathbb{R}}^d} \frac{\abs{\ensuremath{\mathbf{u}}(\tfrac{x+y}{2},\tfrac{\abs{x-y}}{2})-\ensuremath{\mathbf{u}}(x,0)}^2}{\abs{x-y}^{d+2s}} \,dy\,dx\\ &\sim \int_x \int_{\phi \in S^{d-1}}\int_{r=0}^\infty \frac{\abs{\ensuremath{\mathbf{u}}(x + \tfrac{r}{2}\phi,\tfrac{r}{2})-\ensuremath{\mathbf{u}}(x,0)}^2}{r^{1+2s}}\,dr\,d\phi\,dx. \end{align*} The fundamental theorem of calculus gives \begin{align*} \ensuremath{\mathbf{u}}(x + \tfrac{r}{2}\phi,\tfrac{r}{2})-\ensuremath{\mathbf{u}}(x,0) = \int_0^{r} \nabla_{x} \ensuremath{\mathbf{u}}(x + \tfrac{y}{2} \phi,\tfrac{y}{2})\cdot \phi + \partial_{d+1}\ensuremath{\mathbf{u}}(x+\tfrac{y}{2}\phi,\tfrac{y}{2})\,dy, \end{align*} and the weighted Hardy inequality from~\cite[I, Thm.~9.16]{Zygmund_02}, cf. also~\cite[(1.1)]{Muckenhoupt_72}, then implies \begin{align*} \int_{r=0}^\infty \frac{\abs{\ensuremath{\mathbf{u}}(x+\tfrac{r}{2}\phi,\tfrac{r}{2})-\ensuremath{\mathbf{u}}(x,0)}^2}{r^{1+2s}}\,dr \lesssim \int_{r=0}^\infty r^{1-2s} \abs{\nabla_{x} \ensuremath{\mathbf{u}}(x+\tfrac{r}{2}\phi,\tfrac{r}{2}) \cdot \phi+ \partial_{d+1}\ensuremath{\mathbf{u}}(x+\tfrac{r}{2}\phi,\tfrac{r}{2})}^2. \end{align*} Hence, \begin{align*} \snorm{ \operatorname*{tr}\,\ensuremath{\mathbf{u}}}{H^s(\ensuremath{\mathbb{R}}^d)}^2 \lesssim \int_{x\in\ensuremath{\mathbb{R}}^d}\int_{\phi \in S^{d-1}} \int_{r=0}^\infty r^{1-2s} \abs{\nabla \ensuremath{\mathbf{u}}(x+\tfrac{r}{2}\phi,\tfrac{r}{2})}^2\,dr\,d\phi\,dx \lesssim \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2, \end{align*} which proves~\eqref{lem:trace:eq1}. \end{proof} Next, we will show that the trace operator $ \operatorname*{tr}: H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\rightarrow H^s(\ensuremath{\mathbb{R}}^d)$ is actually onto. To that end, we generalize ideas from~\cite{Gagliardo_57}. \begin{lemma}\label{lem:ext} Let $\alpha\in(-1,1)$ and $s$ be given by \eqref{eq:alpha}. There exists a bounded linear operator $\ensuremath{\mathcal{E}}:H^s(\ensuremath{\mathbb{R}}^d)\rightarrow H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ that is a right-inverse of the trace operator $ \operatorname*{tr}$. Furthermore, there exists a constant $C>0$ such that for all $h>0$ it holds \begin{align*} \norm{\ensuremath{\mathcal{E}} u}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times (0,h))} \leq C h^{1-s}\norm{u}{L^2(\ensuremath{\mathbb{R}}^d)}. \end{align*} \end{lemma} \begin{proof} Let $\rho\in C^\infty_0(\ensuremath{\mathbb{R}}^d)$ and $\eta\in C^\infty(\ensuremath{\mathbb{R}})$ with $\operatorname*{supp} \eta \subset (-1,1)$ and $\eta\equiv 1$ in $(-1/2,1/2)$. We denote a point in $\ensuremath{\mathbb{R}}^{d+1}_+$ by $(x,t)$ with $x\in\ensuremath{\mathbb{R}}^{d}$. Define the extension operator as the mollification $\ensuremath{\mathcal{E}} u (x,t) := \eta(t) \rho_t \star u(x)$, where $\rho_t(y) := t^{-d} \rho(y/t)$. Since $\norm{\rho_t\star u}{L^2(\ensuremath{\mathbb{R}}^d)}\lesssim \norm{u}{L^2(\ensuremath{\mathbb{R}}^d)}$ uniformly in $t > 0$ (cf., e.g., \cite[Thm.~{2.29}]{adams-fournier03}), we immediately obtain the postulated estimate \begin{align*} \norm{\ensuremath{\mathcal{E}} u}{L^2_\alpha(\ensuremath{\mathbb{R}}^d\times (0,h))}^2 \leq \norm{\eta}{L^{\infty}}^2 \int_0^h t^\alpha \norm{\rho_t\star u}{L^2(\ensuremath{\mathbb{R}}^d)}^2\,dt \lesssim h^{2(1-s)} \norm{u}{L^2(\ensuremath{\mathbb{R}}^d)}^2. \end{align*} Since $\eta$ is compactly supported, this also shows $\norm{\ensuremath{\mathcal{E}} u}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \lesssim \norm{u}{L^2(\ensuremath{\mathbb{R}}^d)}$. For the desired statement that $\ensuremath{\mathcal{E}}:H^s(\ensuremath{\mathbb{R}}^d)\rightarrow H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ is bounded it is sufficient to prove \begin{align*} \norm{\nabla_{x}(\rho_t\star u)}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 + \norm{\partial_t (\rho_t\star u)}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}^2 \lesssim \snorm{u}{H^s(\ensuremath{\mathbb{R}}^d)}^2. \end{align*} To that end, we calculate \begin{align*} \partial_t (\rho_t\star u)(x) &= -d t^{-d-1}\int_{\ensuremath{\mathbb{R}}^d} u(y) \rho\left( \frac{x-y}{t} \right)\,dy - t^{-d-2} \int_{\ensuremath{\mathbb{R}}^d} u(y) \nabla\rho \left( \frac{x-y}{t} \right)\cdot(x-y)\,dy. \end{align*} Integration by parts shows $\int_{\ensuremath{\mathbb{R}}^d} \nabla \rho(z)\cdot z\,dz = -d$, which yields \begin{align*} -d t^{-d-1}\int_{\ensuremath{\mathbb{R}}^d} \rho\left( \frac{x-y}{t} \right)\,dy = -d t^{-1} &= t^{-d-2} \int_{\ensuremath{\mathbb{R}}^d} \nabla\rho \left( \frac{x-y}{t} \right) \cdot (x-y)\,dy. \end{align*} Hence, we can write \begin{align*} \begin{split} \partial_t (\rho_t \star u)(x) &= -d t^{-d-1}\int_{\ensuremath{\mathbb{R}}^d} [u(y)-u(x)] \rho\left( \frac{x-y}{t} \right)\,dy\\ &\qquad- t^{-d-2} \int_{\ensuremath{\mathbb{R}}^d} [u(y)-u(x)] \nabla\rho \left( \frac{x-y}{t} \right)\cdot(x-y)\,dy. \end{split} \end{align*} Next, we calculate for $1\leq j\leq d$ \begin{align*} \partial_{x_j} (\rho_t\star u)(x) = t^{-d-1} \int_{\ensuremath{\mathbb{R}}^d} u(y) \left( \partial_{x_j} \rho \right)\left( \frac{x-y}{t} \right)\,dy. \end{align*} Integration by parts also shows that $\int (\partial_{x_j}\rho)(z)\,dz=0$, which yields \begin{align*} \partial_{x_j} (\rho_t\star u)(x) = t^{-d-1} \int_{\ensuremath{\mathbb{R}}^d} [u(y)-u(x)] \left( \partial_{x_j} \rho \right)\left( \frac{x-y}{t} \right)\,dy. \end{align*} Due to the support properties of $\rho$, we conclude \begin{align*} \abs{\partial_t (\rho_t\star u)(x)} + \abs{\nabla_x (\rho_t\star u)(x)} \lesssim t^{-d-1} \int_{B_t(x)} \abs{u(x)-u(y)}\,dy, \end{align*} where $B_r(x)\subset \ensuremath{\mathbb{R}}^d$ denotes the ball of radius $t$ centered at $x$. Using polar coordinates and Hardy's inequality gives \begin{align*} & \int_{0}^\infty t^\alpha \left( \abs{\partial_t (\rho_t\star u)(x)}^2 + \abs{\nabla_x (\rho_t\star u)(x)}^2 \right) \,dt \lesssim \int_{0}^\infty t^\alpha \left( t^{-d-1}\int_{B_t(x)} \abs{u(y)-u(x)}\,dy \right)^2\,dt\\ &\quad \leq \int_0^\infty \left( t^{-1} \int_{B_t(x)} \frac{\abs{u(y)-u(x)}}{\abs{x-y}^{d-\alpha/2}}\,dy \right)^2\,dt = \int_0^\infty \left( t^{-1} \int_{B_t(0)} \frac{\abs{u(x)-u(x-z)}}{\abs{z}^{d-\alpha/2}}\,dz \right)^2\,dt \\ &\quad = \int_0^\infty \left( t^{-1} \int_{r=0}^t \int_{\phi \in S^{s-1}} \frac{\abs{u(x)-u(x-r\phi))}}{r^{1-\alpha/2}}\,d\phi\,dr \right)^2\,dt \\ & \quad \lesssim \int_{t=0}^\infty \left( \int_{\phi\in S^{d-1}} \frac{\abs{u(x)-u(x-t\phi))}}{t^{1-\alpha/2}}\,d\phi\right)^2\,dt \leq \int_{\ensuremath{\mathbb{R}}^d} \frac{\abs{u(x)-u(y)}^2}{\abs{x-y}^{d+2s}}\,dy. \end{align*} Integrating this estimate over $x\in\ensuremath{\mathbb{R}}^d$ concludes the proof. \end{proof} We are in position to prove Lemma~\ref{thm:bl}. \begin{proof}[Proof of Lemma~\ref{thm:bl}] The proof follows a standard procedure. Since it involves functions in a half-space, we present some details. \emph{Step 1:} Let $\rho \in C^\infty_0(\ensuremath{\mathbb{R}}^{d+1})$ be a symmetric, non-negative function with $\operatorname{supp} \rho \subset B_1(0)$ and set $\rho_\varepsilon(x):= \varepsilon^{-d} \rho(x/\varepsilon)$. Introduce the translation operator $\tau_h$ by $\tau_h \varphi(x):= \varphi(x - h e_{d+1})$ with $e_{d+1} = (0,0,\ldots,0,1) \in \ensuremath{\mathbb{R}}^{d+1}$. Define for $\varepsilon > 0$ the smoothing operator $\ensuremath{\mathcal{A}}_\varepsilon$ by $ \ensuremath{\mathcal{A}}_\varepsilon \varphi = \rho_\varepsilon \star (\tau_{2\varepsilon} \varphi) $ and the regularized distribution $\ensuremath{\mathbf{u}}_\varepsilon$ by $$ \langle \ensuremath{\mathbf{u}}_\varepsilon,\varphi\rangle:= \langle \ensuremath{\mathbf{u}}, \ensuremath{\mathcal{A}}_\varepsilon \varphi\rangle = \langle \ensuremath{\mathbf{u}}, \rho_\varepsilon \star (\tau_{2\varepsilon} \varphi)\rangle, $$ where we view $\varphi \in \ensuremath{\mathcal{D}}(\ensuremath{\mathbb{R}}^{d+1}_+)$ as an element of $\varphi \in \ensuremath{\mathcal{D}}(\ensuremath{\mathbb{R}}^{d+1})$ in the canonical way. Note that $\ensuremath{\mathbf{u}}_\varepsilon \in C^\infty(\ensuremath{\mathbb{R}}^{d+1}_+)$ by standard arguments and $\operatorname{supp} \ensuremath{\mathbf{u}}_\varepsilon \subset \ensuremath{\mathbb{R}}^{d} \times (\varepsilon,\infty)$. We also note that \begin{equation} \lim_{\varepsilon \rightarrow 0} \langle \ensuremath{\mathbf{u}}_\varepsilon ,\varphi\rangle = \langle \ensuremath{\mathbf{u}} ,\varphi\rangle \qquad \forall \varphi \in \ensuremath{\mathcal{D}}(\ensuremath{\mathbb{R}}^{d+1}_+). \end{equation} \emph{Step 2:} For $\alpha \in [0,1)$, we claim \begin{equation} \|x_{d+1}^{-\alpha/2} \ensuremath{\mathcal{A}}_\varepsilon(x_{d+1}^{\alpha/2} \varphi)\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)} \leq \|\varphi\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)} \qquad \forall \varphi \in \ensuremath{\mathcal{D}}(\ensuremath{\mathbb{R}}^{d+1}_+). \end{equation} To see this, we start by noting \begin{equation} \label{eq:supp} \sup_{\substack{(x,z)\\ x > \varepsilon,\, -\varepsilon <z <\varepsilon,\, x - 2 \varepsilon -z > 0}} x^{-\alpha/2} (x-2\varepsilon - z)^{\alpha/2} \leq 1. \end{equation} We observe $x_{d+1}^{\alpha/2} \varphi \in \ensuremath{\mathcal{D}}(\ensuremath{\mathbb{R}}^{d+1}_+)$ and $\operatorname*{supp} \ensuremath{\mathcal{A}}_\varepsilon( x_{d+1}^{\alpha/2} \varphi) \subset \ensuremath{\mathbb{R}}^d \times (\varepsilon,\infty)$ and write \begin{align*} x_{d+1}^{-\alpha/2} \ensuremath{\mathcal{A}}_\varepsilon(x_{d+1}^{\alpha/2} \varphi)(x) = x_{d+1}^{-\alpha/2} \int_{z \in B_\varepsilon(0)} \rho_\varepsilon(z) (x_{d+1} - 2\varepsilon - z_{d+1})^{\alpha/2} \varphi(x-2\varepsilon e_{d+1}-z)\,dz. \end{align*} {}From \eqref{eq:supp} and $\rho_\varepsilon \ge 0$ we get \begin{align*} \|x_{d+1}^{-\alpha/2} \ensuremath{\mathcal{A}}_\varepsilon( x_{d+1}^{\alpha/2} \varphi)\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)} &\leq \|\ensuremath{\mathcal{A}}_\varepsilon \varphi\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)} \leq \|\varphi\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{align*} \emph{Step 3:} For $\alpha \in [0,1)$ we have for every $\varepsilon >0$ \begin{equation} \label{eq:grad-uepsilon} \|\nabla \ensuremath{\mathbf{u}}_\varepsilon\|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \leq C \|\nabla \ensuremath{\mathbf{u}}\|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{equation} To see \eqref{eq:grad-uepsilon}, fix a bounded open $\omega \subset \ensuremath{\mathbb{R}}^{d+1}_+$. We compute for $\varphi \in \ensuremath{\mathcal{D}}(\omega)$ and $\varepsilon > 0$, noting that $x_{d+1}^{\alpha/2} \varphi \in \ensuremath{\mathcal{D}}(\omega)$, \begin{align*} \left| \langle x_{d+1}^{\alpha/2}\nabla \ensuremath{\mathbf{u}}_\varepsilon , \varphi\rangle \right| & = \left| \langle \nabla \ensuremath{\mathbf{u}}_\varepsilon , x_{d+1}^{\alpha/2}\varphi\rangle\right| = \left| - \langle \ensuremath{\mathbf{u}}_\varepsilon , \nabla( x_{d+1}^{\alpha/2}\varphi)\rangle\right| \\ &= \left| - \langle \ensuremath{\mathbf{u}}, \ensuremath{\mathcal{A}}_\varepsilon \nabla( x_{d+1}^{\alpha/2}\varphi)\rangle\right| = \left| - \langle \ensuremath{\mathbf{u}}, \nabla( \ensuremath{\mathcal{A}}_\varepsilon( x_{d+1}^{\alpha/2}\varphi))\rangle\right| = \left| \langle \nabla \ensuremath{\mathbf{u}}, \ensuremath{\mathcal{A}}_\varepsilon( x_{d+1}^{\alpha/2}\varphi)\rangle\right| \\ & \leq \|\nabla \ensuremath{\mathbf{u}} \|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \|x_{d+1}^{-\alpha/2} \ensuremath{\mathcal{A}}_\varepsilon (x_{d+1}^{\alpha/2} \varphi)\|_{L^2(\ensuremath{\mathbb{R}}^{d+1}_+)} \stackrel{\text{Step 2}}{\leq} \|\nabla \ensuremath{\mathbf{u}}\|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \|\varphi\|_{L^2(\omega)}. \end{align*} Combining this with the observation \begin{equation} \label{eq:grad-uepsilon-10} \|x_{d+1}^{\alpha/2} \nabla \ensuremath{\mathbf{u}}_\varepsilon\|_{L^2(\omega)} = \sup_{\varphi \in \ensuremath{\mathcal{D}}(\omega)} \frac{\langle x_{d+1}^{\alpha/2} \nabla \ensuremath{\mathbf{u}}_\varepsilon,\varphi\rangle}{\|\varphi\|_{L^2(\omega)}} \end{equation} gives us $\|\nabla \ensuremath{\mathbf{u}}_\varepsilon\|_{L^2_\alpha(\omega)} \leq \|\nabla \ensuremath{\mathbf{u}}\|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}$. The claim \eqref{eq:grad-uepsilon} now follows since $\omega$ is arbitrary. \emph{Step 4:} For $\alpha \in (-1,0]$ we have for every bounded open $\omega \subset \ensuremath{\mathbb{R}}^{d+1}_+$ the existence of $C_\omega > 0$ such that for $\varepsilon \in (0,1]$ \begin{align*} \|\nabla \ensuremath{\mathbf{u}}_\varepsilon\|_{L^2(\omega)} \leq C_\omega \|\nabla \ensuremath{\mathbf{u}}\|_{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)}. \end{align*} The proof follows by inspecting the procedure of Step~2 and essentially using Step~2 with $\alpha = 0$ there. \emph{Step 5:} Steps~3 and 4 show that $\ensuremath{\mathbf{u}} \in H^1_{\rm loc}(\ensuremath{\mathbb{R}}^{d+1}_+)$: Fix a bounded, open and connected $\omega \subset \ensuremath{\mathbb{R}}^{d+1}_+$. Fix a $\varphi \in \ensuremath{\mathcal{D}}(\omega)$ with $(\varphi,1)_{L^2(\omega)} \ne 0$. Exploiting the norm equivalence $$ \|v\|_{H^1(\omega)} \sim \|\nabla v\|_{L^2(\omega)} + |(\varphi,v)_{L^2(\omega)}| \qquad \forall v \in H^1(\omega) $$ we infer from Steps~3, 4, and the observation $\lim_{\varepsilon\rightarrow 0} (\ensuremath{\mathbf{u}}_\varepsilon,\varphi)_{L^2(\omega)} = \langle \ensuremath{\mathbf{u}},\varphi\rangle$ that $(\ensuremath{\mathbf{u}}_\varepsilon)_{\varepsilon \in (0,1]}$ is uniformly bounded in $H^1(\omega)$. Thus, a subsequence converges weakly in $H^1(\omega)$ and strongly in $L^2(\omega)$ to a limit, which is the representation of the distribution $\ensuremath{\mathbf{u}}$ on $\omega$. \emph{Step 6:} Claim: For any bounded open $\omega \subset \ensuremath{\mathbb{R}}^{d+1}_+$ we have $\ensuremath{\mathbf{u}} \in L^2_\alpha(\omega)$. It suffices to show norm bounds for bounded open sets of the form $\omega = \omega^0 \times (0,1)$ with $\omega^0 \subset \ensuremath{\mathbb{R}}^d$. For that, consider again the regularized functions $\ensuremath{\mathbf{u}}_\varepsilon$ and assume, additionally (with the aid of a cut-off function), that $\ensuremath{\mathbf{u}}_\varepsilon(x,x_{d+1}) = 0$ for $x_{d+1} \ge 1$ and $x \in \ensuremath{\mathbb{R}}^d$. Then for $x_{d +1} \in (0,1)$ we have \begin{align} \label{eq:lemma-BL1-fct-10} \ensuremath{\mathbf{u}}_\varepsilon(x,x_{d+1}) = - \int_{x_{d+1}}^1 \partial_{d+1} \ensuremath{\mathbf{u}}_\varepsilon(x,t)\,dt. \end{align} For $\alpha \in (-1,0]$, we square, multiply by $x_{d+1}^\alpha$, and integrate to get \begin{align*} \|\ensuremath{\mathbf{u}}_\varepsilon\|^2_{L^2_\alpha(\omega)} \leq C \|\partial_{d+1} \ensuremath{\mathbf{u}}_\varepsilon \|^2_{L^2(\omega)}. \end{align*} Since $\|\partial_{d+1} \ensuremath{\mathbf{u}}_\varepsilon \|_{L^2(\omega)}$ can be controlled uniformly in $\varepsilon \in (0,1]$ by Steps~4, 5 the proof is complete for $\alpha \in (-1,0]$. For $\alpha \in [0,1)$, we square \eqref{eq:lemma-BL1-fct-10}, use a Cauchy-Schwarz inequality on the right-hand side and integrate to get \begin{align*} \|\ensuremath{\mathbf{u}}_\varepsilon\|^2_{L^2(\omega)} \leq C_\alpha \|\partial_{d+1} \ensuremath{\mathbf{u}}_\varepsilon\|^2_{L^2(\omega)}. \end{align*} Again, Steps~3, 5 allows us to control the right-hand side uniformly in $\varepsilon$. \end{proof} \begin{proof}[Proof of Lemma~\ref{lem:bl:dense}] We choose an open cover $\left( U_j \right)_{j\in\ensuremath{\mathbb{N}}}$ of $\ensuremath{\mathbb{R}}^{d+1}_+$ by bounded sets and a partition of unity $\left( \psi_j \right)_{j\in\ensuremath{\mathbb{N}}}$ subordinate to this cover. For $\ensuremath{\mathbf{u}}\in\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ we have $\ensuremath{\mathbf{u}}\psi_j\in H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$, and according to Lemma~\ref{lem:density}, $\ensuremath{\mathbf{u}}\psi_j$ can be approximated to arbitrary accuracy by a function $\varphi_j\in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ in the norm of $H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$ and hence also in the norm of $\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. By construction, only a finite number of $\varphi_j$ overlap, and hence $\sum_{j=0}^\infty \varphi_j \in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})\cap \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)$. \end{proof} \begin{proof}[Proof of Lemma~\ref{lem:bl:trace}] Using an appropriate cut-off function, this is a simple consequence of Lemmas~\ref{lem:bl:dense}, \ref{lem:mult:trace}, and~\ref{lem:trace}. \end{proof} \begin{proof}[Proof of Corollary~\ref{cor:poincare}] Due to the density result of Lemma~\ref{lem:bl:dense} and the definition of the trace operator, it suffices to show \begin{align*} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(K)} \lesssim \norm{ \operatorname*{tr}\,\ensuremath{\mathbf{u}}}{L^2(K')} + \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(K)} \end{align*} for all $\ensuremath{\mathbf{u}}\in C^\infty(\overline{\ensuremath{\mathbb{R}}^{d+1}_+})$. Using the abbreviation $v(x) = \ensuremath{\mathbf{u}}(x_1,\dots,x_d,x)$, we note that due to H\"older's inequality, \begin{align*} \abs{v(x)}^2 &\lesssim \abs{v(0)}^2 + \abs{\int_0^x v'(t)\,dt}^2 \lesssim \abs{v(0)}^2 + x^{1-\alpha} \norm{v'}{L^2_\alpha(0,b_{d+1})}^2. \end{align*} Multiplying the last equation by $x^\alpha$ and integrating over $K$ finishes the proof. \end{proof} \section{$\mathcal{H}$-matrix approximability} For any subset $D\subset{\ensuremath{\mathbb{R}}^{d+1}_+}$ define the space \begin{align*} \ensuremath{\mathcal{H}}_h(D) := \{ \ensuremath{\mathbf{u}} \in H^1_\alpha(D) \mid & \exists \widetilde\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+), \operatorname*{tr}\,\widetilde\ensuremath{\mathbf{u}} \in\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h) \subset H^s_0(\ensuremath{\mathbb{R}}^d;\Omega) \text{ such that } \ensuremath{\mathbf{u}}|_D = \widetilde\ensuremath{\mathbf{u}}|_D,\\ &a(\widetilde\ensuremath{\mathbf{u}},\ensuremath{\mathbf{v}}) = 0 \text{ for all } \ensuremath{\mathbf{v}}\in \ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+) \} \end{align*} and the space with additional orthogonality \begin{align*} \ensuremath{\mathcal{H}}_{h,0}(D) := \{ \ensuremath{\mathbf{u}} \in H^1_\alpha(D) \mid & \exists \widetilde\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+), \widetilde\ensuremath{\mathbf{u}}\in\ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h) \subset H^s_0(\ensuremath{\mathbb{R}}^d;\Omega) \text{ such that } \ensuremath{\mathbf{u}}|_D = \widetilde\ensuremath{\mathbf{u}}|_D,\\ &a(\widetilde\ensuremath{\mathbf{u}},\ensuremath{\mathbf{v}}) = 0 \text{ for all } \ensuremath{\mathbf{v}}\in \ensuremath{\mathcal{B}}^1_{\alpha,0}(\ensuremath{\mathbb{R}}^{d+1}_+)\\ &\text{ and all } \ensuremath{\mathbf{v}} \in \ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\text{ with } \operatorname*{tr}\,\ensuremath{\mathbf{v}} \in \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h) \subset H^s_0(\ensuremath{\mathbb{R}}^d;\Omega) \text{ and } {\rm supp}( \operatorname*{tr}\,\ensuremath{\mathbf{v}})\subset \overline D\cap\ensuremath{\mathbb{R}}^d \}. \end{align*} Define the cubes with side length $R$ (henceforth called ``box'') by \begin{align}\label{eq:dif:hbox} B_R:= B_R^0\times (0,R)\subset\ensuremath{\mathbb{R}}^{d+1}. \end{align} We say that two boxes $B_{R_1}$ and $B_{R_2}$ are concentric if their projections on $\ensuremath{\mathbb{R}}^d$, i.e., the corresponding cubes $B_{R_1}^0$ and $B_{R_2}^0$, share the same barycenter and are concentric. For $h>0$, we define on $H^1_\alpha(B_R)$ the norm \begin{align*} \enorm{\ensuremath{\mathbf{u}}}_{h,R}^2 := \left( \frac{h}{R} \right)^2 \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(B_R)}^2 + \frac{1}{R^2} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_R)}^2. \end{align*} We have the following Caccioppoli-type inequality. \begin{lemma}\label{lem:caccioppoli} Let $\Omega\subset\ensuremath{\mathbb{R}}^d$ be a Lipschitz domain. Let $R\in (0,8\,\mathrm{diam}(\Omega))$, $\delta \in (0,1)$, and $h>0$ be such that $16h \leq \delta R$. Let $B_R$ and $B_{(1+\delta)R}$ be two concentric boxes. Then, there exists a constant $C>0$ depending only on $\Omega$, $d$, and the $\gamma$-shape regularity of $\ensuremath{\mathcal{T}}_h$, such that for all $\ensuremath{\mathbf{u}} \in \ensuremath{\mathcal{H}}_{h,0}(B_{(1+\delta)R})$ it holds \begin{align}\label{eq:caccioppoli} \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(B_R)} \leq C \frac{1+\delta}{\delta} \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\delta)R}. \end{align} \end{lemma} \begin{proof} In the proof, various boxes will appear. They will always be assumed to be concentric to $B_R$. Choose a function $\eta \in W^{1,\infty}(\ensuremath{\mathbb{R}}^{d+1})$ with $( \operatorname*{tr}\eta)|_\Omega\in \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$, $\eta \equiv 1$ on $B_R$, ${\rm supp}(\eta) \subset B_{(1+\delta/4)R}$, $0\leq\eta\leq 1$, and $\norm{\nabla \eta}{\infty} \lesssim \left( \delta R \right)^{-1}$. We calculate \begin{align*} \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(B_R)}^2 \leq \norm{\nabla (\eta \ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}^2 &= \int_{B_{(1+\delta)R}}x_{d+1}^\alpha \nabla (\eta\ensuremath{\mathbf{u}})\cdot\nabla(\eta\ensuremath{\mathbf{u}})\,dx\\ &= \int_{B_{(1+\delta)R}} x_{d+1}^\alpha \ensuremath{\mathbf{u}}^2 \left( \nabla\eta \right)^2\,dx + \int_{B_{(1+\delta)R}} x_{d+1}^\alpha \nabla\ensuremath{\mathbf{u}} \cdot\nabla(\eta^2\ensuremath{\mathbf{u}})\,dx. \end{align*} We first deal with the last integral on the right-hand side. Due to the support properties of $\eta$ and the orthogonality properties of space $\ensuremath{\mathcal{H}}_{h,0}(B_{(1+\delta)R})$, we see \begin{align*} \int_{B_{(1+\delta)R}} x_{d+1}^\alpha \nabla\ensuremath{\mathbf{u}} \cdot\nabla(\eta^2\ensuremath{\mathbf{u}})\,dx &= \int_{(1+\delta)R} x_{d+1}^\alpha \nabla\ensuremath{\mathbf{u}} \cdot\nabla \left( \widetilde\eta\ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))\right)\,dx\\ &\leq \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} \cdot \norm{\nabla \left( \widetilde\eta\ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))\right)}{L^2_\alpha(B_{(1+\delta)R})} \end{align*} where $\widetilde\eta$ is a cut-off function with support contained $B_{(1+3\delta/4)R}^0 \times (0,3\delta R/4)$ and $\widetilde\eta\equiv 1$ on $B_{(1+\delta/2)R}^0\times (0,\delta R/2)$, such that $\norm{\nabla \widetilde\eta}{\infty} \lesssim (\delta R)^{-1}$. Furthermore, $I_h:C(\overline{\Omega})\cap H^1_0(\Omega) \rightarrow S^{1}_0(\ensuremath{\mathcal{T}}_h) $ is the usual nodal interpolation operator (extended by zero outside $\Omega$). Then, using Lemma~\ref{lem:ext}, we obtain \begin{align*} & \norm{\nabla \left( \widetilde\eta\ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))\right)}{L^2_\alpha(B_{(1+\delta)R})} \\ & \quad \leq \norm{\nabla \left( \ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))\right)}{L^2_\alpha(B_{(1+\delta)R})} + \left( \delta R \right)^{-1} \norm{\ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))}{L^2_\alpha(B_{(1+3\delta/4)R})}\\ &\quad \lesssim \norm{ \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})- I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})}{H^s(\ensuremath{\mathbb{R}}^d)} + \left( \delta R \right)^{-s} \norm{ \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})- I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})}{L^2(\ensuremath{\mathbb{R}}^d)}. \end{align*} For $r\in[0,1]$ it holds \begin{align}\label{lem:cacc:eq4} \norm{ \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})- I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})}{H^r(\ensuremath{\mathbb{R}}^d)}^2 \lesssim h^{4-2r} \sum_{K\in\ensuremath{\mathcal{T}}_h} \snorm{ \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})}{H^2(K)}^2, \end{align} and a short calculation, cf.~\cite{FMP_NumerMath_15}, and an inverse estimate show that \begin{align*} \snorm{ \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}})}{H^2(K)}^2 &\lesssim \frac{1}{(\delta R)^2} \norm{\nabla \operatorname*{tr}(\eta \ensuremath{\mathbf{u}})}{L^2(K)}^2 + \frac{1}{(\delta R)^4} \norm{ \operatorname*{tr} \ensuremath{\mathbf{u}}}{L^2(K)}^2\\ &\lesssim \frac{h^{2s-2}}{(\delta R)^2} \norm{ \operatorname*{tr} (\eta \ensuremath{\mathbf{u}})}{H^s(K)}^2 + \frac{1}{(\delta R)^4} \norm{ \operatorname*{tr} \ensuremath{\mathbf{u}}}{L^2(K)}^2. \end{align*} By the support properties of $\eta$, the sum in~\eqref{lem:cacc:eq4} extends over elements $K\cap B_{(1+\delta/4)R}\neq\emptyset$. As $h\leq (\delta R)/16$, it holds $\bigcup_{K\cap B_{(1+\delta/4)R}^0\neq\emptyset}K \subset B_{(1+\delta/2)R}^0$. Then, using $h/(\delta R)\leq 1$, we conclude that \begin{align*} \norm{\nabla \left( \widetilde\eta\ensuremath{\mathcal{E}}( \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}) - I_h \operatorname*{tr}(\eta^2\ensuremath{\mathbf{u}}))\right)}{L^2_\alpha(B_{(1+\delta)R})} \lesssim \frac{h}{\left( \delta R \right)}\norm{ \operatorname*{tr} (\eta \ensuremath{\mathbf{u}})}{H^s(\ensuremath{\mathbb{R}}^d)} + \frac{h^{2-s}}{(\delta R)^2}\norm{ \operatorname*{tr} \ensuremath{\mathbf{u}}}{L^2(B_{(1+\delta/2)R}^0)}. \end{align*} Choosing a cut-off function $\eta_2$ with $\eta_2\equiv 1$ on $B_{(1+\delta/2)R}$ and support contained in $B_{(1+3\delta/4)R}$ and employing the multiplicative trace inquality from Lemma~\ref{lem:mult:trace} we see \begin{align*} \norm{ \operatorname*{tr} \ensuremath{\mathbf{u}}}{L^2(B_{(1+\delta/2)R}^0)} &\leq \norm{ \operatorname*{tr}(\eta_2\ensuremath{\mathbf{u}})}{L^2(B_{(1+3\delta/4)R}^0)} \leq C_{\rm tr} \norm{\eta_2\ensuremath{\mathbf{u}}}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1})}^{s} \norm{\nabla (\eta_2\ensuremath{\mathbf{u}})}{L^2_\alpha(\ensuremath{\mathbb{R}}^{d+1})}^{1-s}\\ &\lesssim \frac{1}{(\delta R)^{1-s}}\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} + \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^s\norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^{1-s}. \end{align*} Together with the boundedness of the trace operator asserted in Lemma~\ref{lem:trace}, i.e., $\norm{ \operatorname*{tr}( \eta\ensuremath{\mathbf{u}})}{H^s(\ensuremath{\mathbb{R}}^d)} \lesssim \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} + \norm{\nabla(\eta\ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}$, this implies \begin{align*} \int_{B_{(1+\delta)R}} x_{d+1}^\alpha \nabla\ensuremath{\mathbf{u}} \cdot\nabla(\eta^2\ensuremath{\mathbf{u}})\,dx &\lesssim \norm{\nabla \ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} \cdot \Bigl( \frac{h}{\delta R}\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} + \frac{h}{\delta R}\norm{\nabla(\eta\ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}\\ &+ \frac{h^{2-s}}{(\delta R)^{2+(1-s)}}\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} + \frac{h^{2-s}}{(\delta R)^2}\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^s\norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^{1-s} \Bigr). \end{align*} The four products on the right-hand side are estimated with Young's inequality: the first three ones using the form $ab \leq \varepsilon a^2 + \frac{1}{4\varepsilon}b^2$, and the last one with exponents $\frac{2}{2-s}$ and $\frac{2}{s}$. We conclude that there are positive constants $C_1$ and $C_2$ such that \begin{align*} \norm{\nabla (\eta \ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}^2 \leq C_1\frac{1}{(\delta R)^2}\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^2 + C_2\frac{h^2}{(\delta R)^2} \norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^2 + \frac{1}{2}\norm{\nabla(\eta\ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}^2. \end{align*} Subtracting the last term from the left-hand side finishes the proof. \end{proof} Denote by $\Pi_{h,R}:\left( H^1_\alpha(B_R),\enorm{\cdot}_{h,R} \right) \rightarrow\left( \ensuremath{\mathcal{H}}_{h,0}(B_R),\enorm{\cdot}_{h,R} \right)$ the orthogonal projection. For $\ensuremath{\mathcal{K}}_H$ a shape-regular triangulation of $\ensuremath{\mathbb{R}}^{d+1}_+$ of mesh width $H$, denote by $\Pi_H:H^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)\rightarrow\ensuremath{\mathcal{S}}^1(\ensuremath{\mathcal{K}}_H)$ the operator from~\cite{NochettoOS_16}. \begin{lemma}\label{lem:aprox:1} Let $\delta \in (0,1)$ and $R\in(0,4\,\mathrm{diam}(\Omega))$ be such that $16h \leq \delta R$. Let $B_R$, $B_{(1+\delta)R}$, and $B_{(1+2\delta)R}$ be three concentric boxes. Let $\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{H}}_{h,0}(B_{(1+2\delta)R})$ and suppose that $16H\leq \delta R$. Let $\eta \in C^\infty_0(\ensuremath{\mathbb{R}}^{d+1})$ with ${\rm supp}(\eta) \subset B_{(1+\delta)R}$ and $\eta= 1$ on $B_R$. Then it holds \begin{enumerate}[(i)] \item \label{item:lem:approx:1-i} $(\ensuremath{\mathbf{u}} - \Pi_{h,R}\Pi_H (\eta \ensuremath{\mathbf{u}}))|_{B_R}\in \ensuremath{\mathcal{H}}_{h,0}(B_R)$; \item \label{item:lem:approx:1-ii} $\enorm{\ensuremath{\mathbf{u}}-\Pi_{h,R}\Pi_H(\eta\ensuremath{\mathbf{u}})}_{h,R} \leq C_{\rm app}\frac{1+2\delta}{\delta}\left( \frac{h}{R}+\frac{H}{R} \right)\enorm{u}_{h,(1+2\delta)R}$; \item \label{item:lem:approx:1-iii} $\dim W \leq C_{\rm app} \left( \frac{(1+2\delta)R}{H} \right)^{d+1}$, where $W := \Pi_{h,R}\Pi_H\eta \ensuremath{\mathcal{H}}_{h,0}(B_{(1+2\delta)R})$. \end{enumerate} \end{lemma} \begin{proof} To see (\ref{item:lem:approx:1-i}), note that if $\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{H}}_{h,0}(B_{(1+2\delta)R})$, then $\ensuremath{\mathbf{u}}\in \ensuremath{\mathcal{H}}_{h,0}(B_{R})$, and $\Pi_{h,R}$ maps into $\ensuremath{\mathcal{H}}_{h,0}(B_{R})$. To see (\ref{item:lem:approx:1-ii}), first note that due to the support properties of $\eta$ and the fact that $\Pi_{h,R}$ is the orthogonal projection, it holds \begin{align*} \enorm{\ensuremath{\mathbf{u}} - \Pi_{h,R}\Pi_H(\eta\ensuremath{\mathbf{u}})}_{h,R}^2 = \enorm{\Pi_{h,R}(\eta\ensuremath{\mathbf{u}} - \Pi_H(\eta\ensuremath{\mathbf{u}}))}_{h,R}^2 \leq \enorm{\eta\ensuremath{\mathbf{u}} - \Pi_H(\eta\ensuremath{\mathbf{u}})}_{h,R}^2. \end{align*} Furthermore, due to the approximation properties of $\Pi_H$ given in~\cite[Thm.~5.4]{NochettoOS_16}, we obtain \begin{align*} \enorm{\eta\ensuremath{\mathbf{u}} - \Pi_H(\eta\ensuremath{\mathbf{u}})}_{h,R}^2 &= \frac{h^2}{R^2} \norm{\nabla (\eta\ensuremath{\mathbf{u}}-\Pi_H(\eta\ensuremath{\mathbf{u}}))}{L^2_\alpha(B_R)}^2 + \frac{1}{R^2} \norm{\eta\ensuremath{\mathbf{u}}-\Pi_H(\eta\ensuremath{\mathbf{u}})}{L^2_\alpha(B_R)}^2\\ &\lesssim \left( \frac{h^2}{R^2} + \frac{H^2}{R^2} \right) \norm{\nabla(\eta\ensuremath{\mathbf{u}})}{L^2_\alpha(B_{(1+\delta)R})}^2\\ &\lesssim \left( \frac{h^2}{R^2} + \frac{H^2}{R^2} \right) \left( \frac{1}{\delta^2R^2} \norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^2 + \norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^2 \right). \end{align*} Applying Lemma~\ref{lem:caccioppoli} with $\widetilde\delta = \delta/(1+\delta)$ and $\widetilde R = (1+\delta)R$, i.e., $(1+\widetilde\delta)\widetilde R=(1+2\delta)R$, shows \begin{align*} \norm{\nabla\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})}^2 \lesssim \frac{(1+2\delta)^2}{\delta^2} \enorm{\ensuremath{\mathbf{u}}}_{h,(1+2\delta)R}^2. \end{align*} Together with the trivial estimate $\norm{\ensuremath{\mathbf{u}}}{L^2_\alpha(B_{(1+\delta)R})} \leq (1+2\delta)R \enorm{\ensuremath{\mathbf{u}}}_{h,(1+2\delta)R}$ we conclude (\ref{item:lem:approx:1-ii}). Statement (\ref{item:lem:approx:1-iii}) follows from the local definition of the operator $\Pi_H$. \end{proof} \begin{lemma}\label{lem:aprox:2} Let $q,\kappa\in (0,1)$, $R\in(0,2\,\mathrm{diam}(\Omega))$, and $k\in\ensuremath{\mathbb{N}}$. Assume \begin{align}\label{lem:aprox:2:condition} h \leq \frac{\kappa qR}{64 k\max\left\{ 1,C_{\rm app} \right\}}, \end{align} where $C_{\rm app}$ is the constant from Lemma~\ref{lem:aprox:1}. Then, there exists a finite dimensional subspace $\widehat W_k$ of $\ensuremath{\mathcal{H}}_h(B_{(1+\kappa)R})$ with dimension $\dim \widehat W_k \leq C_{\rm dim} \left( \frac{1+\kappa^{-1}}{q} \right)^{d+1} k^{d+2}$ such that for every $\ensuremath{\mathbf{u}}\in\ensuremath{\mathcal{H}}_{h,0}(B_{(1+\kappa)R})$ it holds \begin{align*} \min_{\ensuremath{\mathbf{v}}\in \widehat W_k} \enorm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{v}}}_{h,R} \leq q^k \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\kappa)R}. \end{align*} \end{lemma} \begin{proof} Define $H:=\frac{\kappa qR}{64k\max\left\{ 1,C_{\rm app} \right\}}$, then $h\leq H$. Define $\delta_j:=\kappa \frac{k-j}{k}$ for $j=0,\dots, k$. This yields $\kappa=\delta_0>\delta_1>\dots>\delta_k=0$. Now we will repeatedly apply Lemma~\ref{lem:aprox:1} $k$ times, with $\widetilde R_j = (1+\delta_j)R$ and $\widetilde\delta_j = \frac{1}{2k(1+\delta_j)}$. This can be done, as $\widetilde R_j\leq 4\,\mathrm{diam}(\Omega)$, $\widetilde\delta_j<1/2$, and \begin{align*} 16 H \leq \frac{R}{4 k\max\left\{ 1,C_{\rm app} \right\}} \leq \frac{R}{2 k (1+\delta_j)} = \widetilde\delta_j R\leq \widetilde\delta_j \widetilde R_j. \end{align*} Note that $(1+2\widetilde\delta_j)\widetilde R_j = (1+\delta_{j-1})R$. The first application of Lemma~\ref{lem:aprox:1} yields a function $\ensuremath{\mathbf{w}}_1$ in a subspace $\widehat W_1$ of $\ensuremath{\mathcal{H}}_h(B_{(1+\delta_1)R})$ with $\dim W_1 \leq C_{\rm app}\left( \frac{(1+\kappa)R}{H} \right)^{d+1}$ such that \begin{align*} \enorm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{w}}_1}_{h,(1+\delta_1)R} \leq 2C_{\rm app} \frac{1+2\widetilde\delta_1}{\widetilde\delta_1}\frac{H}{\widetilde R_1} \enorm{\ensuremath{\mathbf{u}}}_{h,(1+2\widetilde\delta_1)\widetilde R_1} = 8C_{\rm app} \frac{kH}{R} \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\delta_0)R} \leq q \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\delta_0)R}. \end{align*} As $\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{w}}_1\in \ensuremath{\mathcal{H}}_h(B_{(1+\delta_1)R})$, a second application of Lemma~\ref{lem:aprox:1} yields a function $\ensuremath{\mathbf{w}}_2$ in a subspace $W_2$ of $\ensuremath{\mathcal{H}}_h(B_{(1+\delta_2)R})$ such that \begin{align*} \enorm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{w}}_1-\ensuremath{\mathbf{w}}_2}_{h,(1+\delta_2)R} \leq q \enorm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{w}}_1}_{h,(1+\delta_1)R} \leq q^2 \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\delta_0)R}. \end{align*} Applying $k$ times Lemma~\ref{lem:aprox:1}, we obtain a function $\ensuremath{\mathbf{v}}=\sum_{j=1}^k \ensuremath{\mathbf{w}}_j$ that is an element of the subspace $V_k :=\sum_{j=1}^k W_j$ of $\ensuremath{\mathcal{H}}_h(B_R)$ and fulfills $\enorm{\ensuremath{\mathbf{u}}-\ensuremath{\mathbf{v}}}_{h,R} \leq q^k \enorm{\ensuremath{\mathbf{u}}}_{h,(1+\kappa)R}$. \end{proof} \begin{proposition}\label{prop:main} Let $\eta>0$ be a fixed admissibility parameter and $q\in (0,1)$. Let $(\tau,\sigma)$ be a cluster pair with admissible bounding boxes $B_{R_\tau}^0$ and $B_{R_\sigma}^0$, that is, $\eta\,{\rm dist} \left( B_{R_\tau}^0, B_{R_\sigma}^0 \right)\geq \mathrm{diam}\left( B_{R_\tau}^0 \right)$. Then, for each $k\in\ensuremath{\mathbb{N}}$ there exists a space $V_k\subset \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)$ with $\dim V_k\leq C_{\rm dim}(2+\eta)^{d+1}q^{-(d+1)}k^{d+2}$ such that if $f\in L^2(\Omega)$ with ${\rm supp}(f)\subset B_{R_\sigma}^0\cap\Omega$, the solution $u_h$ of~\eqref{eq:discrete} satisfies \begin{align}\label{prop:main:eq} \min_{v \in V_k} \norm{u_h - v}{L^2(B_{R_\tau}^0)} \leq C_{\rm box} h^{-1}q^k \norm{f}{L^2(B_{R_\sigma}^0)}. \end{align} \end{proposition} \begin{proof} Set $\kappa := (1+\eta)^{-1}$. We distinguish two cases. \begin{enumerate} \item \textbf{Condition~\eqref{lem:aprox:2:condition} is satisfied with $R=R_\tau$:} As ${\rm dist}(B_{R_\tau},B_{R_\sigma}) \geq \eta^{-1}\mathrm{diam}(B_{R_\tau})=\eta{-1}\sqrt{d}R_\tau$, we conclude \begin{align*} {\rm dist}(B_{(1+\kappa)R_\tau},B_{R_\sigma}) \geq {\rm dist}(B_{R_\tau},B_{R_\sigma}) - \kappa R_\tau \sqrt{d} = \sqrt{d}R_\tau \frac{1}{\eta(1+\eta)}>0, \end{align*} hence $\ensuremath{\mathcal{L}} u_h \in \ensuremath{\mathcal{H}}_{h,0}(B_{(1+\kappa)R})$. Lemma~\ref{lem:aprox:2} implies that there is a space $\widehat W_k$ with \begin{align*} \min_{\ensuremath{\mathbf{v}}\in \widehat W_k} \enorm{\ensuremath{\mathcal{L}} u_h-\ensuremath{\mathbf{v}}}_{h,R_\tau} \leq q^k \enorm{\ensuremath{\mathcal{L}} u_h}_{h,(1+\kappa)R_\tau}. \end{align*} Now \begin{align*} \enorm{\ensuremath{\mathcal{L}} u_h}_{h,(1+\kappa)R_\tau} \lesssim (1+\frac{1}{R_\tau})\norm{\ensuremath{\mathcal{L}} u_h}{\ensuremath{\mathcal{B}}^1_\alpha(\ensuremath{\mathbb{R}}^{d+1}_+)} \lesssim (1+\frac{1}{R_\tau}) \norm{\Pi f}{L_2(\Omega)}, \end{align*} where the last estimate follows from~\eqref{eq:1} and Lemma~\ref{lem:dirichlet:var}. On the other hand, employing an appropriate cut-off function and the multiplicative trace estimate of Lemma~\ref{lem:mult:trace} shows \begin{align*} \norm{u_h - \operatorname*{tr}\,\ensuremath{\mathbf{v}}}{L^2(B_{R_\tau}^0)} \lesssim \frac{1}{R_\tau} \norm{\ensuremath{\mathcal{L}} u_h - \ensuremath{\mathbf{v}}}{L^2_\alpha(B_{R_\tau})} + \norm{\nabla ( \ensuremath{\mathcal{L}} u_h - \ensuremath{\mathbf{v}})}{L^2_\alpha(B_{R_\tau})} \lesssim \frac{R_\tau}{h} \enorm{\ensuremath{\mathcal{L}} u_h -\ensuremath{\mathbf{v}}}_{h,R_\tau}. \end{align*} Combining the last three chains of estimates, we get the desired result if we set $V_k := \operatorname*{tr}\,\widehat W_k$. \item \textbf{Condition~\eqref{lem:aprox:2:condition} is not satisfied with $R=R_\tau$:} We select $V_k := \left\{ v|_{B_{R_\tau}^0} \mid v \in \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h) \right\}$. The minimum in~\eqref{prop:main:eq} is then zero and \begin{align*} \dim V_k \lesssim \left( \frac{R_\tau}{h} \right)^d \leq \left( \frac{64 k \max\left\{ 1,C_{\rm app} \right\}}{\kappa q} \right)^d \lesssim k^d(1+\eta)^d q^{-d}. \end{align*} \end{enumerate} \end{proof} \begin{proof}[Proof of Theorem~\ref{thm:approx:blocks}] Suppose first that $C_{\rm dim}(2+\eta)^{d+1}q^{-(d+1)}k^{d+2} \geq \min\left\{ \abs{\tau},\abs{\sigma} \right\}$. In the case $\min\left\{ \abs{\tau},\abs{\sigma} \right\}=\abs{\tau}$ we set $\ensuremath{\mathbf{X}}_{\tau\sigma}=\ensuremath{\mathbf{I}}\in\ensuremath{\mathbb{R}}^{\abs{\tau}\times\abs{\tau}}$ and $\ensuremath{\mathbf{Y}}_{\tau\sigma} = \ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma}^\top$. If $\min\left\{ \abs{\tau},\abs{\sigma} \right\}=\abs{\sigma}$, we set $\ensuremath{\mathbf{X}}_{\tau\sigma} = \ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma}$ and $\ensuremath{\mathbf{Y}}_{\tau\sigma} = \ensuremath{\mathbf{I}}\in\ensuremath{\mathbb{R}}^{\abs{\sigma}\times\sigma}$. Now suppose that $C_{\rm dim}(2+\eta)^{d+1}q^{-(d+1)}k^{d+2} < \min\left\{ \abs{\tau},\abs{\sigma} \right\}$. For a cluster $\tau\subset\ensuremath{\mathcal{I}}$ we define $\ensuremath{\mathbb{R}}^\tau := \left\{ \ensuremath{\mathbf{x}}\in\ensuremath{\mathbb{R}}^N\mid \ensuremath{\mathbf{x}}_j = 0\; \forall j\notin \tau \right\}$. According to~\cite{ScottZ_90}, there exist linear functionals $\lambda_i$ such that $\lambda_i(\psi_j)=\delta_{ij}$, and \begin{align}\label{thm:approx:blocks:eq1} \norm{\lambda_i(w)\psi_i}{L_2(\Omega)} \lesssim \norm{w}{L_2({\rm supp}(\psi_i))}, \end{align} where the hidden constant depends only on the shape-regularity of $\ensuremath{\mathcal{T}}_h$. Define \begin{align*} \Phi_\tau: \begin{cases} \ensuremath{\mathbb{R}}^\tau \rightarrow \ensuremath{\mathcal{S}}^1_0(\ensuremath{\mathcal{T}}_h)\\ \ensuremath{\mathbf{x}} \mapsto \sum_{j\in\tau}\ensuremath{\mathbf{x}}_j\psi_j \end{cases} \quad\text{ and }\quad \Lambda_\tau: \begin{cases} L_2(\Omega)\rightarrow \ensuremath{\mathbb{R}}^\tau\\ w\mapsto \ensuremath{\boldsymbol{w}} \end{cases}, \end{align*} where $\ensuremath{\boldsymbol{w}}_j = \lambda_j(w)$ for $j\in\tau$ and $\ensuremath{\boldsymbol{w}}_j=0$ else. Note that $h^{d/2}\norm{\ensuremath{\mathbf{x}}}{2}\sim\norm{\Phi_\tau(\ensuremath{\mathbf{x}})}{L_2(\Omega)}$ for $\ensuremath{\mathbf{x}}\in\ensuremath{\mathbb{R}}^\tau$, and that $\Phi_\tau\circ\Lambda_\tau$ is bounded in $L_2(\Omega)$. For $\Lambda_\ensuremath{\mathcal{I}}^\star$ the adjoint of $\Lambda_\ensuremath{\mathcal{I}}$, this implies $\norm{\Lambda_\ensuremath{\mathcal{I}}^\star}{\ensuremath{\mathbb{R}}^N\rightarrow L_2(\Omega)}\lesssim h^{-d/2}$. Let $V_k$ be the space of Proposition~\ref{prop:main}. We define the columns of $\ensuremath{\mathbf{X}}_{\tau\sigma}$ to be a orthogonal basis of the space $\left\{ \Lambda_\tau w \mid w\in V_k \right\}$ and $\ensuremath{\mathbf{Y}}_{\tau\sigma} := \ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma}^\top \ensuremath{\mathbf{X}}_{\tau\sigma}$. The ranks of $\ensuremath{\mathbf{X}}_{\tau\sigma}$ and $\ensuremath{\mathbf{Y}}_{\tau\sigma}$ are then bounded by $C_{\rm dim}(2+\eta)^{d+1}q^{-(d+1)}k^{d+2}$. Now, for $\ensuremath{\mathbf{b}}\in\ensuremath{\mathbb{R}}^\sigma$, set $f := \Lambda_\ensuremath{\mathcal{I}}^\star\left( \ensuremath{\mathbf{b}} \right)$. This yields $b_i = \vdual{f}{\psi_i}_{\Omega}$ and ${\rm supp}(f)\subset \overline{B_{R_\sigma}\cap\Omega}$. According to Proposition~\ref{prop:main}, there exists an element $v\in V_k$ such that $\norm{u_h - v}{L_2(B_{R_\tau}^0\cap\Omega)} \lesssim h^{-1}q^k \norm{f}{L_2(B_{R_\sigma}^0)}$. This implies \begin{align*} \norm{\Lambda_\tau u_h - \Lambda_\tau v}{2} &\lesssim h^{-d/2}\norm{\Phi_\tau\circ\Lambda_\tau(u_h-v)}{L_2(\Omega)} \lesssim h^{-d/2}\norm{u_h - v}{L_2(B_{R_\tau}^0\cap\Omega)}\\ &\lesssim h^{-1-d/2}q^k \norm{f}{L_2(B_{R_\sigma}^0)} \lesssim h^{-1-d}q^k\norm{\ensuremath{\mathbf{b}}}{2}. \end{align*} For $\ensuremath{\mathbf{z}} := \ensuremath{\mathbf{X}}_{\tau\sigma}\ensuremath{\mathbf{X}}_{\tau\sigma}^\top\Lambda_\tau u_h$ it holds \begin{align*} \norm{\Lambda_\tau u_h - \ensuremath{\mathbf{z}}}{2} \leq \norm{\Lambda_\tau u_h - \Lambda_\tau v}{2} \lesssim h^{-1-d}q^k\norm{\ensuremath{\mathbf{b}}}{2}. \end{align*} As $\Lambda_\tau u_h = \ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma}\ensuremath{\mathbf{b}}|_\sigma$, we obtain \begin{align*} \norm{(\ensuremath{\mathbf{A}}^{-1}|_{\tau\times\sigma} - \ensuremath{\mathbf{X}}_{\tau\sigma}\ensuremath{\mathbf{Y}}_{\tau\sigma}^\top)\ensuremath{\mathbf{b}}|_\sigma}{2} \lesssim N^{\frac{1+d}{d}} q^k \norm{\ensuremath{\mathbf{b}}}{2}. \end{align*} As $\ensuremath{\mathbf{b}}\in\ensuremath{\mathbb{R}}^\sigma$ was arbitrary, the result follows. \end{proof} \section{Numerical experiments} We provide numerical experiments in two space dimensions, i.e., $d=2$, that confirm our theoretical findings. The indices $\ensuremath{\mathcal{I}}$ of the standard basis of the space $S^1_0(\ensuremath{\mathcal{T}}_h)$ based on a quasiuniform triangulation of $\Omega$, are organized in a cluster tree $\mathbb{T}_{\ensuremath{\mathcal{I}}}$ that is obtained by a geometric clustering, i.e., bounding boxes are split in half perpendicular to their longest edge until the corresponding clusters are smaller than $n_{\rm leaf}=20$. The block cluster tree is based on that cluster tree using the admissibility parameter $\eta=2$. In order to calculate a blockwise rank-$r$ approximation $\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r$ of $\ensuremath{\mathbf{A}}^{-1}$, we compute the densely populated system matrix $\ensuremath{\mathbf{A}}$ using the MATLAB code presented in~\cite{AcostaBB_17}. On admissible cluster pairs, we compute a rank-$r$ approximation of the corresponding matrix block by singular value decomposition. We carried out experiments for $s\in\left\{ 0.25, 0.5, 0.75 \right\}$ on a square and an L-shaped domain. On the square, we use a coarse mesh of 2674 elements, resulting in 358 admissible and 591 non-admissible blocks, and a fine mesh of 17130 elements, resulting in 5234 admissible and 5486 non-admissible blocks. On the L-shaped domain, we use a mesh of 6560 elements, resulting in 640 admissible and 1332 non-admissible blocks. Note that for a fixed mesh and cluster tree, Theorem~\ref{th:Happrox} predicts $\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}\lesssim e^{-br^{1/4}}$. However, in our experiments we observe that the error behaves like $\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2} \sim e^{-10 r^{1/3}}$. Hence, we will plot the error logarithmically over the third root of the block rank $r$, and include the reference curve $e^{-10 r^{1/3}}$. \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_2674_025_ref.eps} \caption{Square domain, $s=0.25$, 2674 elements.} \label{sc025} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_17130_025_ref.eps} \caption{Square domain, $s=0.25$, 17130 elements.} \label{sf025} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_2674_05_ref.eps} \caption{Square domain, $s=0.5$, 2674 elements.} \label{sc05} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_17130_05_ref.eps} \caption{Square domain, $s=0.5$, 17130 elements.} \label{sf05} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_2674_075_ref.eps} \caption{Square domain, $s=0.75$, 2674 elements.} \label{sc075} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{square_17130_075_ref.eps} \caption{Square domain, $s=0.75$, 17130 elements.} \label{sf075} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{L_6560_025_ref.eps} \caption{L-shaped domain, $s=0.25$, 6560 elements.} \label{l025} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{L_6560_05_ref.eps} \caption{L-shaped domain, $s=0.5$, 6560 elements.} \label{l05} \end{figure} \begin{figure}[htb] \centering \psfrag{err}{$\norm{\ensuremath{\mathbf{A}}^{-1}-\ensuremath{\mathbf{B}}_{\ensuremath{\mathcal{H}}}^r}{2}$} \psfrag{ref}{$\exp(-10r^{1/3})$} \includegraphics[width=\textwidth]{L_6560_075_ref.eps} \caption{L-shaped domain, $s=0.75$, 6560 elements.} \label{l075} \end{figure} \section{Conclusions and extensions} We have shown that the inverse $\ensuremath{\mathbf{A}}^{-1}$ of the stiffness matrix $\ensuremath{\mathbf{A}}$ of a Galerkin discretization of the fractional Laplacian can be approximated at an exponential rate in the block rank by $\ensuremath{\mathcal{H}}$-matrices, using the standard admissibility criterion \eqref{eq:admissiblity}. The following extensions are possible: \begin{itemize} \item We restricted our analysis to the discretization by piecewise linears. However, the analysis generalizes to approximation by piecewise polynomials of fixed degree $p$. \item We focussed on the approximability of $\ensuremath{\mathbf{A}}^{-1}$ in the $\ensuremath{\mathcal{H}}$-format. Computationally attractive are also factorizations such as $\ensuremath{\mathcal{H}}$-LU or $\ensuremath{\mathcal{H}}$-Cholesky factorizations. The ability to find an approximate $\ensuremath{\mathbf{A}} \approx L_{\ensuremath{\mathcal{H}}} U_{\ensuremath{\mathcal{H}}}$ has been shown for (classical) FEM discretizations in \cite{Bebendorf07,FMP_NumerMath_15} and for non-local BEM matrices in \cite{faustmann-melenk-praetorius15b,faustmann-melenk-praetorius15c} with techniques that generalize to the present case of the fractional Laplacian. \item Related to $\ensuremath{\mathcal{H}}$-matrices is the format of $\ensuremath{\mathcal{H}}^2$-matrices discussed in \cite{HackbuschKhoromskijSauter,BoermBuch,hackbusch15,Boerm}. Using the techniques employed in \cite{Boerm,FMP_NumerMath_15,faustmann-melenk-praetorius15b,faustmann-melenk-praetorius15c}, one may also show that $\ensuremath{\mathbf{A}}^{-1}$ can be approximated by $\ensuremath{\mathcal{H}}^2$-matrices at an exponential rate in the block rank. \end{itemize} \bibliographystyle{abbrv}
\section{Introduction}
\section{INTRODUCTION} In recent years, BCI has been one of the most interesting biomedical engineering research fields. For patients suffering from stroke, it is very meaningful to provide a communication method to deliver brain messages and commands to the external world except from the normal nerve-muscle output pathway \cite{wolpaw2002brain}. Due to the natural and non-intrusive characteristics, most BCI systems select the EEG signal as input. Event-related desyn-chronization/synchronization (ERD/ERS) is the Rhythmic activity of EEG. The changes of ERD/ERS induced by Motor Imagery (MI) has been widely used in many BCI systems. The very aim of EEG signal processing in BCI system is translating raw EEG signals into the class of these signals. In addition, EEG-based BCI can be considered as a complex pattern recognition system which includes several critical steps, signal acquisition, preprocess, feature extraction, classification, control external devices and feedback. If the EEG signal is decoded correctly, it can be translated into commands to control external equipments such as rehabilitation devices \cite{lew2006non} or other devices \cite{doud2011continuous}. In order to improve the accuracy of EEG classification, a lot of related work has been carried out. The performance of a pattern recognition like system depends on both the features selected and the classification algorithms employed. A great variety of features have been proposed to used in BCI such as Band Powers (BP) \cite{kaiser2011first}, Power Spectral Density (PSD) values \cite{waldert2009review}, iterative two-dimensional nearest feature line (INFL) and so on. In recent years, the common spatial pattern (CSP) \cite{ramoser2000optimal} has been proved to be an expressive feature of EEG signals. A lot of related work has been proposed such as CSSP \cite{lemm2005spatio}, CSSSP \cite{dornhege2006combined}, FBCSP \cite{ang2008filter}, WCSP \cite{mousavi2011wavelet} and SCSSP \cite{aghaei2016separable}. Moreover, many machine learning techniques such as naive Bayes, K-NN, SVM, LDA, ANN, and Deep Learning \cite{jirayucharoensak2014eeg} have been applied as BCI classifiers. Although the number of research studies on EEG-based BCI has been great increasing in past decades, it is very difficult to decode the useful information from EEG signal in a reliable and efficient way. Most of traditional methods focus on a particular feature only which limited the efficiency of BCI. The rest of this paper is organized as follows. Our algorithm will be introduced in Section 2. In Section 3, experimental results and performance analysis are provided. Finally, the conclusions will be given in Section 4. \section{Method} \begin{figure}[thpb] \centering \includegraphics[width=3.25in]{algorithmprofile.pdf} \caption{Skeleton of our algorithm} \label{our algorithm profile} \end{figure} In this paper, we divide the algorithm into three main stages. The skeleton of our algorithm (stage1-stage3) is schematically illustrated in Fig. \ref{our algorithm profile}. Due to the mass noise in the EEG signal, the preprocess stage is very significant for the following stages. The second stage called feature extraction and classification. In this stage, we extract the spatial features and spectral features, and then use a appropriate classifier called linear discriminant analysis (LDA) to decode the information from these signals. The last stage is fusion processing that obtain the final classification result from the above stages. \subsection{Preprocess} The signals from the different channels correspond to the different functional regions of the human brain. In order to have a positive effect in the subsequent classification algorithm, select some special channels in carefully to obtain a better signal-noise ratio \cite{xu2013channel}. In addition, the begin and end portions of the signal segment have been cut off to further improve the signal-to-noise ratio. Wavelets denoising has been proven to be a powerful tool for removing noise from digital signals. We utilize the wavelet transform with symlets wavelet for improving the signal-noise ratio, and use variant of the first option as threshold selection rule compare to the universal threshold $\sigma \sqrt{2ln(\cdot )}$ that uses in many other BCI systems. The experiments results show that heursure threshold selection rule can yield better results following the steps discussed in the following subsections. Independent component analysis (ICA) is an effective algorithm for finding fundamental factors or components from a composite signal. FastICA \cite{delorme2004eeglab} is a widely used ICA-like algorithm, which can be more efficient than traditional conventional gradient descent methods. Therefore, we apply the fastICA algorithm to remove noises from other parts of the body and reduce dimension of these signals. At the end of the preprocessing, the butter-worth filter has been used as a bandpass filter to remove high-order noise in the signal. \subsection{Feature extraction} To improve the accuracy of classification, we use the common spatial pattern of spatial information \cite{ramoser2000optimal} and statistical values of wavelet transform coefficients as the spectral information. For extracting spectral information, discrete wavelet transform (DWT) has been applied to each fragment in each channel \cite{robinson2013eeg}. In our work, the symlet wavelets have been used as the mother wavelet to generate the wavelet coefficients. We can simply use the mean and variance of each fragment as an approximation of the spectral feature to obtain the statistical features of spectral information. \subsection{Classification} The classification stage in the BCI system is intended to label the feature vector. We use LDA to classify spatial information and spectral information \cite{lotte2007review} \cite{liu2015uncorrelated}. The purpose of LDA is to separate the training feature vectors representing different classes using the hyperplane to obtain the smallest intraclass dispersion and the maximum interclass dispersion. \begin{eqnarray} \begin{aligned} \hat{\varphi} & = \mathrm{argmax} ~J_{fisher}(\varphi) \\ & = \mathrm{argmax} ~\frac{{\varphi}^{T} S_b \varphi}{{\varphi}^{T} S_w \varphi} \end{aligned} \end{eqnarray} where $S_b$ is the discrete degree between classes, $S_w$ is the discrete degree within the class and $\hat{\varphi}$ is the optimal projection matrix. Naturally, LDA can achieve good result on unseen data, and also good results can be obtained in practical applications. \subsection{Fusion} To overcome the limitations and shortcomings of conventional EEG classification algorithms, we use a fusion algorithm based on Bayesian-decision \cite{daunizeau2007symmetrical} to fuse the results of multiple classifiers in different aspects. In a normalized BCI system, there is no favoritism of any class, so we choose the 0-1 lost function to minimize the total error risk. Then Bayesian rule with the smallest error rate using the 0-1 lost function can be formulated as: \begin{eqnarray} \begin{aligned} \hat{j} & = \underset{j \in C} {\mathrm{argmax}} ~P(\omega_i|x) \\ & = \underset{j \in C} {\mathrm{argmax}} ~P(x|\omega_j)P(\omega_j) \end{aligned} \end{eqnarray} where $\hat{j}$ is the class with the largest possible and $P(\omega_i|x)$ is the probability of classified as $i$ which determined by one classifier. Assuming that there are $R$ EEG classifiers which independent of each other and suppose there is no favoritism of any class, the fusion rule will be rewritten as follow: \begin{eqnarray} \begin{aligned} \label{multiply_classifiers_reduct} \hat{j} & = \underset{j \in C} {\mathrm{argmax}} ~P(\omega_j|x_1,x_2,...,x_R)\\ & = \underset{j \in C} {\mathrm{argmax}} ~{P(x_1,x_2,...,x_R|\omega_j)P(\omega_j)} \\ & = \underset{j \in C} {\mathrm{argmax}} ~{P(\omega_j) \prod_{i=1}^{R}{P(x_i|\omega_j)}} \\ & = \underset{j \in C} {\mathrm{argmax}} ~{P(\omega_j) \prod_{i=1}^{R}{\frac{P(\omega_j|x_i) * p(x_i)}{P(\omega_j)}}} \\ & = \underset{j \in C} {\mathrm{argmax}} ~{P^{-(R-1)}(\omega_j) \prod_{i=1}^{R}{P(\omega_j|x_i)}} \end{aligned} \end{eqnarray} Suppose that there is only tiny difference between $P(\omega_k)$ and $P(\omega_k|x_j)$, which means: \begin{equation} \label{tiny_different_between} P(\omega_k|x_j) = P(\omega_k)(1+\delta_{kj}), ~~\delta_{kj} << 1 \end{equation} Ignore items with order greater than 2, then Eq. \eqref{multiply_classifiers_reduct} can be revised as: \begin{eqnarray} \begin{aligned} \hat{j} & = \underset{j \in C} {\mathrm{argmax}} ~{P^{-(R-1)}(\omega_j) \prod_{i=1}^{R}{P(\omega_j|x_i)}}\\ & = \underset{j \in C} {\mathrm{argmax}} ~{P(\omega_j) \prod_{i=1}^{R}{ (1+\delta_{kj}) }} \\ & \approx \underset{j \in C} {\mathrm{argmax}} ~{P(\omega_j) (1+\sum_{k=1}^{R}{\delta_{kj}}) } \end{aligned} \end{eqnarray} We use the accuracy obtained on the validation set as the confidence level of the classifier and set the weight of the classifier to a transformation of the confidence level by a $tan$ like function. Then introduce a scaling factor $s$ to enhance this validity, and the weight $W_i$ will be determined to: \begin{eqnarray} \begin{aligned} W_i^{'} &= ( sign(C_i-\frac{1}{2}) ) \frac{(\frac{1}{2} - \left | C_i-\frac{1}{2} \right |) (s-1)} {s} \\ W_i &= \tan{ \left( \frac{\pi}{2} \left( C_i + W_i^{'} \right) \right) } \end{aligned} \end{eqnarray} where $s \geq 1$ is the scaling factor and $C_i$ is the confidence of the classifier calculated from the validation set. As we have derived in equation \ref{tiny_different_between}, assume that each class has the same prior probability in our work. The following equation is then used to determine the final fusion result. \begin{eqnarray} \begin{aligned} \hat{j} & = \underset{j \in C} {\mathrm{argmax}} ~P(\omega_j|x_1,x_2,...,x_R)\\ & = \underset{j \in C} {\mathrm{argmax}} ~P(\omega_j) \sum_{i=1}^{R}{ W_i P(\omega_j|x_i) } \end{aligned} \end{eqnarray} where $W_i$ is the weight of the classifier estimated in the above steps, and $R$ is the number of classifiers. \section{EXPERIMENT} We performed our experiments at the data set IVa that provided by BCI competitions \uppercase\expandafter{\romannumeral3}. This data set contains 118 channels of EEG sampled signals which divided into five subjects (with named aa, al, av, aw, ay). Each subject contains 280 segments of data. The label of each piece of data shows that the subject is doing motor image by performing one of the following three movements: (L) left hand, (R) right hand, (F) right foot. First of all, we choose the 21 channels (CP6, CP4, CP2, C6, C4, C2, FC6, FC4, FC2, CPZ, CZ, FCZ, CP1, CP3, CP5, C1, C3, C5, FC1, FC3, FC5) from the data set. Second, we carry out the above-mentioned preprocess operation. The influence of preprocessing step on frequency spectrum is shown in Fig. \ref{fig:experiment_preprocess}. This figure clearly shows that our preprocessing operation is useful for feature extraction and classification. Moreover, it can be seen that the useful part of signal after preprocess is concentrated at 8-30 Hz. \begin{figure} \centering \subfigure[before]{ \label{fig:experiment_preprocess:before} \includegraphics[width=2.4in]{before_filter-eps-converted-to.pdf}} \hspace{1in} \subfigure[after]{ \label{fig:experiment_preprocess:after} \includegraphics[width=2.4in]{after_filter-eps-converted-to.pdf}} \caption{Frequency power variation in preprocess} \label{fig:experiment_preprocess} \end{figure} The accuracy of classification algorithm can be calculated simply by: \begin{equation} accuracy = \frac{N_{right}}{N_{testset}} \end{equation} The experimental results show that our work achieved better result than other algorithms such as PSD, INFL, CSP, CSSP. Experimental results are shown in Table \ref{table: experiment result of different algorithms compare}, and these results demonstrate that our algorithm can achieve a better accuracy in most cases and obtain the best mean value and acceptable variance value. \begin{table}[h!] \caption{The experimental results (\%) obtained from each subject using different algorithms} \label{table: experiment result of different algorithms compare} \begin{center} \begin{tabular}{||c | c cl c c||} \hline ~ & PSD & INFL & CSP & CSSP & Our Work \\ [0.5ex] \hline\hline aa & 64.29 & 75.89 & 71.43 & 77.68 & \textbf{85.27} \\ \hline al & 82.14 & 83.93 & 94.64 & 96.43 & \textbf{100} \\ \hline av & 55.10 & 58.16 & 61.22 & 63.27 & \textbf{69.89} \\ \hline aw & 65.18 & 82.14 & 89.28 & \textbf{90.63} & 85.71 \\ \hline ay & 75.00 & 84.92 & 73.02 & 79.37 & \textbf{82.34} \\ \hline mean & 68.34 & 77.00 & 77.92 & 81.48 & \textbf{84.64} \\ \hline var & \textbf{87.3}& 98.67& 150.73& 131.54& 92.06\\ [1ex] \hline \end{tabular} \end{center} \end{table} \begin{figure} \centering \subfigure[segment size of signal]{ \includegraphics[width=1.56in]{parameters_itertor_1-eps-converted-to.pdf} \label{figure:parameter_iterator:a} } \vspace{0in} \hspace{0in} \subfigure[dimension of ICA]{ \includegraphics[width=1.56in]{parameters_itertor_2-eps-converted-to.pdf} \label{figure:parameter_iterator:b} } \subfigure[size of CSP]{ \includegraphics[width=1.56in]{parameters_itertor_3-eps-converted-to.pdf} \label{figure:parameter_iterator:c} } \vspace{0in} \hspace{0in} \subfigure[order of butter-worth filter]{ \includegraphics[width=1.56in]{parameters_itertor_4-eps-converted-to.pdf} \label{figure:parameter_iterator:d} } \caption{Accuracy curves obtained using different parameter values} \label{figure:parameter_iterator} \end{figure} In order to optimize the parameters of the algorithm in the experiments, reasonable range of each parameter in our algorithm has been pointed. The classification accuracy results with different parameter values are shown in Fig. \ref{figure:parameter_iterator}, and these figures can indicate the following items: \begin{itemize} \item EEG segment size of the reasonable range is 140-240, which means that we should choose the middle of the motor image signal with the length of 1.4s-2.4s. \item The best value for the ICA dimension is 16. \item The reasonable size of CSP seems not easy to determined, but the appropriate value in most situations is between 2 and 3. \item The reasonable order of butter-worth filter can be determined as 5-6. \end{itemize} \begin{table}[h!] \caption{Comparison of experiment results (\%) between our fusion classifier and basic spatial classifier} \label{table: compare use fusion} \begin{center} \begin{tabular}{||c | c c||} \hline ~ & Basic spatial classifier & Our fusion classifier \\ [0.5ex] \hline\hline aa & 83.48 & \textbf{85.27} \\ \hline al & 97.32 & \textbf{100} \\ \hline av & 60.20 & \textbf{69.89} \\ \hline aw & 80.13 & \textbf{85.71} \\ \hline ay & 78.17 & \textbf{82.34} \\ \hline mean & 79.86 & \textbf{84.64} \\ \hline var & 141.48 & \textbf{92.06} \\ [1ex] \hline \end{tabular} \end{center} \end{table} For the fusion stage, we compare the accuracy of our fusion classifier with the basic CSP classifier, and the results are shown in Table \ref{table: compare use fusion}. Then, try to optimize the scale factor in the fusion algorithm and find that the reasonable range for this parameter can be determined as 1.4-2.4. These results show that our fusion algorithm plays a positive role in classification. \section{CONCLUSIONS} Realizing the information exchange between the brain and the computer based on EEG signal is still a challenge in signal processing and biomedical engineering. In this paper, our algorithm has been proposed to overcome the limitations and shortcomings of conventional EEG classification algorithms with multiple features. The signal is preprocessed to improve quality, represented by multiple features in different aspects, and fed to LDA classifiers. The results of these classifiers is to determine the final classification result of the signal by our fusion algorithm. Experimental results have shown that the proposed approach in this paper is an effective way to classify EEG signal in a BCI system. \section{ACKNOWLEDGE} This work was supported by the National Natural Fund: 91420302 and 91520201. Thanks to the organizers of the BCI competition \uppercase\expandafter{\romannumeral3} to publish their datasets. \addtolength{\textheight}{-12cm} \bibliographystyle{unsrt}
\section*{Methods} The system was modeled by the finite element method, using the commercially available software COMSOL \cite{33}. \section*{Acknowledgements} The authors thank N. Engheta for discussions and E. Shkondin for providing TiN characterization data. \section*{Author contributions statement} All authors conceived the problem. L.V. designed the structures, performed simulations and data analysis. All authors discussed the results and wrote the manuscript. \section*{Competing Interests} The authors declare no competing interests. \newpage \begin{figure}[H] \centering \includegraphics[scale=0.3]{Fig1.png} \caption{\textbf{Design concept of an ENZ quantum network and 3D simulations of the bent waveguide filled with ENZ material}.(a) Illustration of a QE (cyan) enclosed by a dielectric cylinder (dark blue), embedded in an ENZ waveguide with variable cross section (red), showing the possibility of interaction between distant QEs through the supercoupling effect. (b) The structure is composed of spherical air cavities, of radius 110 nm, embedded in the ENZ material, of $2 \mu m$ height and with a quantum emitter at the center (blue arrow). The normalized electric field profile is coded by the color scheme. For better visualization the gold layer is not displayed.c) Top view with a cut line linking the two cavities(red), (d) Electric field profile along the cut line. \label{Fig1}} \end{figure} \begin{figure}[H] \centering \includegraphics[scale=0.4]{fig2.png} \caption{\textbf{Coupling of two emitters}.Decay rate due to coupling of two dipoles normalized by the free space decay rate, as a function of the frequency normalized by the plasma frequency $\omega_p$. The dipoles were located in cavities with a 2 $\mu m$ distance from each other. \label{Figcoupling}} \end{figure} \begin{figure}[H] \centering \includegraphics[scale=0.15]{fig3.png}\advance\rightskip-2cm \centering \caption{\textbf{2D ENZ Quantum Network}. 2D simulations of an electric field emitted by a point source, placed inside the middle cavity, and phase distribution in a ENZ network. (a) Normalized electric field of a quantum emitter placed at the center of the network, represented by the blue arrow.(b) Phase distribution of the magnetic field $H_z$. \label{Fig2}} \end{figure} \begin{figure}[H] \includegraphics[scale=0.25]{fig4.png} \centering \caption{\textbf{Illustration of a dense ENZ quantum network}.The electromagnetic field is artistically depicted by the red color. The blue circle represents the radius of coherence for a quantum emitter placed on its center. The coherence and entanglement properties can only be preserved within the circle. Although the signal can propagate further this limit, quantum information would be lost due to decoherence. \label{Fig3}} \end{figure} \begin{figure}[H] \centering \includegraphics[scale=0.3]{Fig5.png}\par \caption{\textbf{Comparison between air and ENZ waveguides}.(a) Normalized (to the amplitude of the point source) electric field, as a function of the distance from the middle cavity, for an ENZ network (blue) and air network (black), both with the same number of cavities. \label{Fig4}} \end{figure} \begin{figure}[H] \includegraphics[scale=0.4]{Fig6.png} \centering \caption{\textbf{Excitation of gold nanodiscs inside the ENZ network}.Normalized electric field distribution of an ENZ network with gold discs placed inside each cavity, showing a dipolar excitation response to the QE radiation. The blue arrow represents the QE position. \label{Fig5}} \end{figure} \newpage
\section{Introduction} In $\Lambda$CDM Cosmology, Dark Matter halos are rarely spherical, their shapes controlled by the environment and the accretion history \citep[][]{Frenk1988,Dubinski1991,Warren1992,Colberg1999,Allgood2006,Bett2007,Hahn2007}. At the early stages of the halo assembly, the shape is typically prolate and aligned with the narrow filaments, via which the mass is supplied, but with passing of time, halos can become triaxial or even oblate, as the feeding filaments swell and the direction of accretion changes \citep[e.g.][]{Cole1996,Tormen1997,Altay2006,Vera-Ciro2011,Libeskind2013}. This metamorphosis does not necessarily imply that the memory of the early halo configuration is completely erased. Instead, at redshift zero, the history of the Dark Matter halo evolution may be deciphered by studying how its shape changes with Galactocentric radius \citep[e.g.][]{Hayashi2007,Vera-Ciro2011}. Note however, that inclusion of baryons \citep[see e.g.][]{Kaza2004,Gnedin2004,Debattista2008,Abadi2010} or adaptation of a different Dark Matter model \citep[e.g.][]{Avila2001,Dave2001,Mayer2002,Peter2013} can affect the details of some of the above calculations. While the behavior of Dark Matter halos shows several coherent trends, stellar halos appear to display a wider diversity, linked to the strong suppression of star formation in low-mass Dark Matter clumps \citep[see e.g.][]{Bullock2005, Cooper2010}. One of the important corollaries of the above stochasticity is the expectation that the bulk of the (accreted) stellar halo of a Milky Way-like galaxy is contributed by a small number of massive dwarf galaxies \citep[see e.g.][]{DeLucia2008,Deason2013}. The picture therefore emerges in which the most massive halo progenitors not only can define the shape of the stellar halo \citep[see][]{Deason2013} but also set its overall metallicity \citep[][]{Deason2016,DSouza2018}. It is difficult to produce stellar halos without invoking (at least some of) the processes that lead to formation of stars. The inclusion of baryonic physics tends to alter the shapes of the resulting stellar halos significantly. For examples, the inner portions of the stellar halos built up with semi-analytic machinery are often prolate \citep[see e.g.][]{Cooper2010}, while hydro-dynamical simulations deliver mostly oblate shapes \citep[e.g.][]{Monachesi2018}. The prevalence of the oblate shapes in the simulated stellar halos is sometimes linked to the significant contribution of so-called in-situ component \citep[][]{Benson2004,Zolotov2009,McCarthy2012,Tissera2013,Cooper2015}. Early attempts to gauge the properties of the Milky Way's stellar halo had to rely on the small number of tracers and/or sparse sky coverage \citep[][]{Preston1991,Reid1993,Sluis1998,Morrison2000,Siegel2002}. Recently, thanks to the availability of wide-area deep imaging data, the shape of the Milky Way's stellar halo has been the focus of many studies \citep[e.g.][]{Newberg2006, Bell2008, JuricVOD, Sesar2011,deasonhalo,xuehalo,Iorio18}. While surveys like the SDSS \citep[see][]{SDSSdr12} do provide a much broader view of the halo \citep[see e.g.][]{Carollo2007, Carollo2010}, large swathes of the sky are still missing, leaving portions of the inner Galaxy unmapped. Most recently, the \textit{Gaia} mission \citep[see][]{Gaia} has provided the first all-sky view of the Galactic halo. By combining the variability statistics from \textit{Gaia} DR1 with the color information from \textit{Gaia} and 2MASS, \citet{Iorio18} built a sample of $\sim$22,000 RR Lyrae covering most of the celestial sphere, except for narrow regions close to the Galactic plane. Using these old and metal-poor pulsating stars and taking advantage of largely un-interrupted view of the Galaxy, they were able to test a wide range of stellar halo models. In this Paper, we aim to use the \textit{Gaia} DR2 RR Lyrae stars to get both closer to the centre of the Milky Way and to go further beyond the reach of the \citet{Iorio18} analysis by linking the RR Lyrae density evolution with their kinematics. Our study is motivated by the recent discovery of tidal debris from what appears to be an ancient major merger event \citep[][]{BelokurovSa,MySa,Helmi18} Identified first in the Solar neighborhood, this debris cloud, sometimes referred to as the ``Gaia Sausage'' has recently been shown to dominate the Galactic stellar halo, stretching from regions in the Milky Way's bulge to near and past the halo's break radius around $20-30$ kpc \citep[see][]{Deason18,Simion18,Lancaster}. Additional evidence has been found in the studies of the detailed chemical abundances of the nearby halo stars \citep[see][]{Hayes18,Haywood2018,Mack18}. While many pieces of the ``Gaia Sausage'' have already been reported in the literature, here we attempt to provide the first comprehensive map of this {\it largest halo sub-structure}. The kinematic portion of our study is complementary to the work of \citet{Wegg18}, who recently used a sample of PanSTARRS1 RR Lyrae stars to constrain the shape of the inner portion of the Galactic gravitational potential. This Paper is organized as follows. Section~\ref{sec:sample} describes the construction of the clean sample of \textit{Gaia} DR2 RR Lyrae stars. In Section~\ref{sec:slice} we show how these objects can be used to slice the Galactic halo to reveal the remnant of a large dwarf galaxy buried close to the Milky Way's centre. In Section~\ref{sec:disc} we complement the spatial analysis with an all-sky RR Lyrae kinematic map and we discuss the implications of our discovery. Finally, we summarise the conclusions of this work in Section\ \ref{sec:conclusions}. \section{The \textit{Gaia} DR2 RR Lyrae sample} \label{sec:sample} \subsection{RR Lyrae stars in \textit{Gaia} DR2} The \textit{Gaia} DR2 catalogue \citep{GaiaDR2,Gaia} contains 550,737 variable stars, among which more than 200,000 are classified as RR Lyrae (RRL) stars \citep{GaiaVariable}. In the \textit{Gaia} data, the RRL stars are spread across separate catalogues: some are in the tables reporting the results of the general variability analysis (e.g. \texttt{vari\_classifier\_result} and \texttt{vari\_time\_series\_statistics}); others can be found in the SOS (Specific Object Studies, \citealt{Clementini}) table \texttt{vari\_rrlyrae}. For further details on the variable stars classification and analysis in \textit{Gaia} DR2 please see \cite{GaiaVariable}. About half of the RRL stars are shared between the SOS and the other tables, thus in order to merge all classified RRL stars into one final sample, we joined the table \texttt{vari\_classifier\_result} and the table \texttt{vari\_rrlyrae} using the \textit{source\_id} unique identifier of each star. The final sample contains 228,853 RRL stars ($\sim77\%$ RRab, $\sim21 \%$ RRc and $~\sim2\%$ RRd). Finally, this table containing all of the Gaia DR2 RRL stars, was merged with the main \texttt{gaia\_source} catalogue, thus complementing the RRL positions with photometry and astrometry. The top-left panel of Fig.\ \ref{fig:allsky} shows the distribution of the RRL stars in our sample as a function of the Galactic coordinates $(\ell, b)$. A number of genuine as well as spurious objects stand out against the underlying diffuse distribution of stars. These include the Magellanic Clouds, the Sagittarius dwarf galaxy and its tails, a number of other dwarf spheroidal satellites and globular clusters, together with over-densities close to the Galactic plane. In order to study the broad-brush properties of the stellar halo, we first attempt to clean the sample and remove RRL stars belonging to the most obvious compact structures, including both bona fide satellites as well as data artefacts and contaminants. The following section describes in detail the selection cuts applied to clean the \textit{Gaia} DR2 RRL sample. \subsection{Cleaning} \begin{figure*} \centering \centerline{\includegraphics[width=0.95\textwidth]{img/allsky_square_final.pdf}} \caption[]{All-sky RR Lyrae density maps in Galactic coordinates ($\ell,b$). \textbf{Top-left:} original sample of stars classified as RR Lyrae in \textit{Gaia} DR2. \textbf{Top-right:} clean sample of RR Lyrae stars used in this work. \textbf{Bottom-left:} objects filtered from the original sample using a combination of photometric and astrometric selection cuts. \textbf{Bottom-right:} stars in the original sample belonging to known globular clusters, dwarf spheroidal satellites, the Sagittarius dwarf and a part of its stream and the Magellanic Clouds. The numbers in brackets in the title of each panel indicate the dynamic range of the grey-scale map; the number in the top-left corner indicates the total number of stars in each panel.} \label{fig:allsky} \end{figure*} {\bf Artefacts and contaminants.} The percentage of contaminants in the \textit{Gaia} DR2 RRL sample has been estimated in \cite{GaiaVariable} and in \cite{Clementini} using auxiliary catalogues. They found a low level of contaminants ($5\%$-$15\%$) except in the region of the bulge and in the area close to the Galactic disc where the contamination level appears to increase up to many tens of per cent. The contaminants in these crowded fields are predominantly eclipsing binaries and blended sources, with a tiny number of spurious detections due to misclassified variable stars \citep{GaiaVariable}. To cull the majority of the likely contaminants we only keep objects that satisfy the following selection criteria: \begin{itemize} \item $AEN<0.25$, \item $BRE<1.5$, \item $E(B-V)<0.8$. \end{itemize} The cut on the \textit{astrometric\_excess\_noise}, $AEN$, eliminates unresolved stellar binaries, blends and galaxies \citep[see e.g.~][]{Koposov17} as their astrometric behavior deviates from that of the single point sources \citep[see][]{Lind}. The \textit{phot\_bp\_rp\_excess\_factor}, $BRE$, represents the ratio between the combined flux in the \textit{Gaia} $BP$ and $RP$ bands and the flux in the $G$ band, and thus by design is large for blended sources \citep[see][]{EvansGaia}. Finally, we remove stars in regions with high reddening, $E(B-V)$ \citep[according to][]{dustext}, for which the dust extinction correction is likely unreliable (see Sec.\ \ref{sec:dust}). {\bf Globular clusters and dwarf satellites.} We have removed all stars within twice the half-light radius of all known globular clusters listed in \cite{Globularcluster}. Concerning the dwarf spheroidal satellites, we excluded all stars within an angular distance of $0.5^\circ$ from the centre of Carina, Ursa Minor and Hercules, $0.3^\circ$ from Leo I and Leo II, and $1^\circ$ from Sculptor, Fornax, Draco and Sextans. {\bf Sagittarius dwarf.} First, we selected all stars with $|\tilde{B}-\tilde{B}_\te{Sgr}|<10^\circ$ and $|\tilde{\Lambda} - \tilde{\Lambda}_\te{Sgr}|<50^\circ$, where $\tilde{B}$ and $\tilde{\Lambda}$ are the latitude and longitude in the coordinate system aligned with the Sagittarius stream as defined in \cite{BelokurovSgr} and $\tilde{B}_\te{Sgr}=4.24^\circ$ and $\tilde{\Lambda}_\te{Sgr}=-1.55^\circ$ represent the position of the Sagittarius dwarf. Then, among the selected objects, we got rid of all stars with a proper motion relative to Sagittarius lower than $1.3 \ \te{mas} \ \te{yr}^{-1}$, using the dwarf's proper motion as reported in \cite{HelmiGaia}. These spatial and kinematical selection cuts appear to be effective in removing the Sagittarius dwarf and the initial portions of its tails, as demonstrated in Fig.\ \ref{fig:allsky}. We have decided against extending the filter to the rest of the Sagittarius stream ($|\tilde{\Lambda} - \tilde{\Lambda}_\te{Sgr}|>50^\circ$) to avoid over-cleaning our sample at large Galactic latitudes. {\bf Magellanic Clouds.} In order to identify (and remove) the stars that belong to the Clouds, we selected all objects within an angular distance of $16^\circ$ ($12^\circ$) from the LMC (SMC). Of these, only the stars with proper motion relative to the LMC or to the SMC lower than $5 \ \te{mas} \ \te{yr}^{-1}$ with respect to the values reported in \cite{LMCpm} were retained for further consideration. Given the expected $G$ magnitude of the RRL stars at the distance of the LMC and SMC \citep{Belokurov17}, we required the Magellanic stars to have $18.5<G<20$ ($G$ corrected for the extinction, see Sec.~\ref{sec:dust}). Finally, in order to avoid the crowded central part of the Clouds, we selected all stars within $5^\circ$ from the LMC and SMC centre, independently of their proper motions and $G$ magnitudes. The stars that survived all of the selection cuts above were removed from our RRL sample. The sky distribution of the likely artefacts discarded by the astrometric and the photometric cuts described above is shown in the bottom-left panel of Fig.\ \ref{fig:allsky}. As expected, most of the contaminants are located close to the Galactic plane, while others can be found in the crowded regions of the Magellanic Clouds and the Sagittarius dwarf galaxy. The distribution of the (removed) stars projected to lie within known Galactic satellites (globular clusters, dwarf galaxies) is shown in the bottom right-panel. The stellar density distribution in the final clean sample containing $\sim$93,000 RRL stars is shown in the top-right panel. \section{Galactic halo shape with \textit{Gaia} DR2 RR Lyrae} \label{sec:slice} \subsection{RR Lyrae distances} \label{sec:dust} \label{sec:dist} In the analysis presented below, we use a left-handed Cartesian reference frame $(x,y,z)$ centred in the Galactic centre as defined in \cite{Iorio18}. In this reference frame, the Sun is at $(8,0,0) \ \te{kpc}$. Despite the photometric variability, RRL stars have an almost constant absolute magnitude in the visual \citep[see e.g.][]{Catelan2004}. Thus having measured the apparent magnitudes $G$ (corrected for the dust extinction), we can directly estimate the heliocentric distances as \begin{equation} \log\left(\frac{D_\odot}{\te{kpc}}\right)=\frac{G-M_G}{5}-2. \label{eq:amag} \end{equation} Before applying Eq.\ \ref{eq:amag}, we correct the observed apparent magnitudes for the dust extinction and estimate $M_G$ exploiting the stars in our sample with robust parallax measurements. {\bf Dust extinction.} The $G$ band absorption $A_{G}=k_GE(B-V)$ for the RRab stars has been estimated in the SOS \citep{Clementini} through the empirical relation derived by \cite{piersimoni}. We used these stars to directly estimate the extinction coefficient $k_{G}=A_{G}/E(B-V)$, where the reddening $E(B-V)$ is obtained from the maps of \cite{dustext}. The derived $k_{G}$ distribution shows a narrow peak at $1<k_{G}<3.4$. We fit a Gaussian model to the measurements of stars inside this $k_{G}$ range taking into account the errors with the help of the extreme deconvolution technique \citep[ED,][]{extreme}. The best-fit centroid is at $k_{G}=2.27$, i.e. a value slightly lower compared to that reported previously \citep[e.g.][]{Belokurov17}. To summarise, the observed apparent magnitudes of all stars in our sample have been corrected using $A_{G}=2.27E(B-V)$. \begin{figure} \centering \centerline{\includegraphics[width=\columnwidth]{img/Zslice_LMC_final_square.pdf}} \caption[]{RR Lyrae density projected onto $x-y$ plane for three pairs of $z$ slabs. The two slabs in each pair are positioned symmetrically with respect to the Galactic plane. The $z$ range is reported in the title of each panel. Yellow star indicates the position of the Sun ($x=8$ kpc, $y=z=0$ kpc). Dynamic range of the greyscale map is given in brackets in the bottom-right corner in each panel. Blue lines indicate the orientation of the major axis of the triaxial stellar halo model described in \protect\cite{Iorio18}. The red arrows point out the location of the Hercules-Aquila Cloud (HAC) and the Virgo Over-Density (VOD).} \label{fig:Zslice} \end{figure} {\bf Absolute magnitude in the $G$ band.} Inverting Eq.\ \ref{eq:amag} and using the parallax $\varpi$, the absolute magnitude can be estimated as \begin{equation} M_{G}=G + 5\log \varpi -10 . \label{eq:dist} \end{equation} We selected 837 stars from the clean sample i) with robust estimates of the parallax ($\varpi/\delta \varpi>10$) and ii) located in regions where the correction for dust extinction is almost negligible, i.e. $E(B-V)<0.1$. Before using Eq.\ \ref{eq:dist}, we corrected the parallaxes for the offset $\varpi=0.029$ reported in \cite{Lind18} \citep[see also][]{Muraveva18}. The estimated $M_{G}$ distribution exhibits a narrow peak for $|M_G|<1.5$. As in the case of the reddening coefficient described above, the distribution was modeled as a Gaussian taking into account the errors in $\varpi$ using the ED machinery. The best-fit centroid is at $M_G=0.64$ and the best-fit dispersion is $\sigma_{M_G}=0.25$. We estimated the possible systematic effects repeating the analysis considering only the stars classified as RRab ($M_G=0.64$) or RRc ($M_G=0.60$) in the SOS and considering only the metal poor $\te{[Fe/H]}<-1.0$ ($M_G=0.58$) and the metal rich $\te{[Fe/H]}>-1.0$ ($M_G=0.72$) stars\footnote{We used the metallicities reported in the SOS catalogue, see \cite{Clementini} for further details}. We also repeated the analysis not correcting for the parallax offset ($M_G=0.45$) or using the distance estimated from the parallaxes in \cite{Bailer18} ($M_G=0.66$). Overall all the systematic differences are within the measured spread in $M_G$. For the rest of the paper, we consider $M_G=0.64$ for all the stars in our clean sample. Note that a difference in magnitude of 0.25 corresponds to an uncertainty in distance of $\sim$1 kpc for a star at 10 kpc and $\sim$4 kpc for a star at 50 kpc. Using apparent magnitudes corrected for dust extinction and applying the assumed (constant) value of the absolute magnitude, we estimated the distance (Eq.\ \ref{eq:amag}) and the Galactocentric Cartesian $(x,y,z)$ coordinates of each RRL star in our clean sample. \begin{figure*} \centering \centerline{\includegraphics[width=0.95\textwidth]{img/P_I18.pdf}} \caption[]{Three different projections of RR Lyrae density in the inner halo. Normalized star-counts ($N/N_\te{tot}$) are shown projected onto the principal planes in Galactic coordinates. Only stars with $5<|z/\te{kpc}|<30$ are included. The \textit{Gaia} DR2 data (triaxial model) are shown as a greyscale map and blue contours (orange contours, see text for details). The contours are at $N/N_\te{tot}= (0.5, 1, 2, 4)\times10^{-4}$. {\bf Left-hand:} $x-y$ plane, the black ellipse has a major-to-minor axial ratio of $p=1.3$ and the major axis ($a=19.5\ \te{kpc}$) is tilted by $21^\circ$ with respect to the $y$-axis. {\bf Middle:} $x-z$ plane density of stars within the ellipse shown in the left-hand panel; {\bf Right-hand:} $y-z$ plane density of stars within the ellipse shown in the left-hand panel.} \label{fig:View} \end{figure*} \subsection{Slicing the halo} \label{sec:distribution} Fig.\ \ref{fig:Zslice} shows the distribution of stars in the Galactic $x-y$ plane in different $z$-slices. Close to the Galactic disc ($0<|z/\te{kpc}|<5$), the distribution of stars is symmetric with respect to the Galactic plane and most of the stars can be found within 10 kpc from the Galactic centre. At the intermediate heights ($5<|z/\te{kpc}|<10$), the distribution preserves the semblance of symmetry with respect to the Galactic plane, but the bulk of the stars is now arranged within an elongated structure of roughly ellipsoidal shape. The major axis of this structure is tilted by about $70^\circ$ (anti-clockwise) with respect to the Galactic $x$-axis. At even larger heights ($10<|z/\te{kpc}|<30$), two over-dense regions are clearly visible: one above the Galactic plane in the quadrant with positive $x$ and negative $y$ and one below the Galactic plane, in the quadrant with negative $x$ and positive $y$. The structure above the Galactic plane is the Virgo Over-Density \citep[VOD,][]{VivasVOD, NewbergVOD, DuffauVOD, JuricVOD, BonacaVOD}, while the one below is the Hercules-Aquila Cloud \citep[HAC,][]{BelokurovHAC,SimionHAC}. Note that these two striking over-densities appear to lie at very similar distances from the Galactic centre. Apart from the VOD and the HAC, other minor substructures can be seen in the last two $z$-slices: a circular overdensity of stars centred at $x\sim-30$ kpc above the Galactic plane and a feeble overdensity strip between $x\sim15$ kpc and $x\sim40$ kpc below the Galactic plane. Both of these are the remaining portions of the Sagittarius stream at large (in absolute values) Galactic latitudes (see Sec.\ \ref{sec:sample}). We stress that the residuals of the Sagittarius stream cannot be responsible of the elongated structure shown in Fig.\ \ref{fig:Zslice}, in fact, the signature of the stream runs almost exactly perpendicular to it, both above and below the Galactic plane. The possible random and systematic errors due to the assumption of a constant $M_G$ act akin to spatial smoothing (of the order of $1-4$ kpc) in the distribution of stars shown in Fig.\ \ref{fig:Zslice}. This smearing effect should not have any preferential direction, thus we expect that, in the ideal case of perfect distance measurements, the elongated density structure ought to emerge even more clearly. In conclusion, we believe that the shape and the orientation of the RRL distribution shown in Fig.\ \ref{fig:Zslice} represent faithfully the intrinsic properties of the inner Galactic stellar halo. The presence of a similar elongated density distribution of stars in the halo was claimed previously by \cite{Newberg2006} and, most recently by \cite{Iorio18} who used shallower ($G<17.1$) sample of RRL star candidates from~ \textit{Gaia} DR1. The best halo model reported in \cite{Iorio18} is triaxial with a flattening along the direction normal to the Galactic disc and the major axis lying in the Galactic plane. The direction of the major axis is overplotted in the $x-y$ density maps in Fig.\ \ref{fig:Zslice}. Evidently, the ellipsoid's orientation inferred by \cite{Iorio18} is compatible with the elongation of the RRL distribution at intermediate heights and is aligned with the direction connecting the VOD and the HAC structures. Fig.~\ref{fig:View} presents a detailed comparison between the data and the model similar to that introduced in \cite{Iorio18}. The left-hand panel of the Figure shows the $x-y$ projection of the distribution of the inner halo stars with $5<|z/$kpc$|<30$. The middle (giving the $x-z$ view) and right-hand ($y-z$) panels only concern the 21,269 stars within the cylinder with $5<|z/$kpc$|<30$ and the base shown as a black ellipse in the left panel of the Figure. The stellar distributions in the last two planes are clearly different. In particular, the iso-density contours in the $x-z$ plane are not aligned with the Galactic axes. It is interesting to explore whether the distribution of stars whose projections on the three principal planes shown in Fig.\ \ref{fig:View} can be reproduced by a smooth triaxial halo model. For this purpose, we over-plot the iso-density contours of the best-fit model labeled SPL-TR$^{qv}$ in \cite{Iorio18}. The original model is triaxial, with the major axis lying in the Galactic plane and the minor axis pointing along the Galactic z-axis. The ratio of major to intermediate axis is 1.27 and the flattening along the vertical direction (i.e. minor axis) decreases with the elliptical radius (i.e. the halo becomes more spherical). In order to describe better the tilted distribution of stars in $x-z$ plane, the model was modified by adding a rotation around the major axis of $\beta=20^\circ$ (see \citealt{Iorio18} for a detailed description of the tilt angles formalism). Curiously, this model is similar to the best-fit triaxial halo model found in \cite{Newberg2006}, except for the variation of the vertical flattening. The match between the data and the model is impressive, especially considering that the fit was performed exploiting only a limited portion of the halo's volume \citep{Newberg2006,Iorio18}. Note, however, that according to the left-hand panel in Fig.\ \ref{fig:View}, it is not possible to reproduce the double peak in the projection of the density onto the $x-y$ plane. These two off-centered over-densities correspond to the VOD and the HAC. Overall, the picture that emerges from Fig.\ \ref{fig:Zslice} and Fig.\ \ref{fig:View} is that of a triaxial stellar halo, misaligned with respect to the $x$-axis and possibly misaligned with respect to the Galactic plane. The latter statement is less certain due to the presence of two large stellar over-densities, the VOD (in the Galactic North) and the HAC (in the South). These large and diffuse Clouds nonetheless appear to be connected to the stellar halo's ellipsoid, being arranged approximately along its major axis. \begin{figure*} \centering \centerline{\includegraphics[width=0.9\textwidth]{img/Mul_Mub_oo_row2_fix.pdf}} \caption[]{Galactic proper motion distributions in the \textit{Gaia} DR2 RR Lyrae sample and 3 different halo models. Isotropic ({\bf bottom-left panel}), tangentially anisotropic ({\bf bottom-middle panel}) and radially anisotropic ({\bf bottom-right panel}) models are shown. These can be compared to the observed ($\mu_\ell$, $\mu_b$) distributions given in the {\bf top-right panel}. Only stars in the clean sample with $5<|z/\te{kpc}|<30$ and located within the ellipse shown in the left-hand panel of Fig.\ \ref{fig:View} are considered ($N$$\sim$21,000). The model proper motions are obtained by assigning to each star in our sample a Galactocentric spherical velocity $(V_\te{r}, V_\theta, V_\phi)$ randomly drawn from the corresponding distributions shown in the {\bf top-left panel}. The model histograms are acquired by taking the averaging deviation of 10,000 model realisations. The dispersion of this realisation set is negligible (less than $1\%$ at the histogram peaks) and it is not shown. All proper motions have been corrected for the Solar reflex motion \citep{rsunsch}.} \label{fig:PM} \end{figure*} \section{Anatomy of an ancient major merger} \label{sec:disc} Confronted with the image of the stretched, likely triaxial inner stellar halo as revealed in Figures ~\ref{fig:Zslice} and ~\ref{fig:View}, it is difficult to envisage a scenario in which such a structure emerges naturally as a result of multiple randomly oriented accretion events. On the other hand, major mergers tend to produce exactly such a configuration of debris - an ellipsoid elongated in the direction of the collision \citep[e.g.][]{Moore2004,Cooper2010}. Even if the post-merger halo is nearly axi-symmetric e.g. prolate, the shape can evolve with time, under the influence of the growing baryonic component \citep[see e.g.][]{Debattista2008,Bryan2013,Tomassetti2016}. Coincidentally, weighty evidence for an old accretion event of a massive satellite on a low angular momentum orbit has recently been uncovered in the Milky Way \citep[see][]{BelokurovSa,MySa,Helmi18,Haywood2018}. The give-away sign that the object that merged with the Galaxy was massive is the metallicity distribution of its tidal debris which reaches [Fe/H]$\sim-1$ (or perhaps, even higher). The independent confirmation of the progenitor's high mass comes from the discovery of a large number of Globular Clusters likely associated with the event \citep[e.g.][]{MyGC,Kraken}. The geometry of the impact can be gleaned from the orbital anisotropy of the accreted stars: typical values of $\beta\sim 0.9$ (the extreme stretching of the velocity ellipsoid gained this halo component the name ``Gaia Sausage'') correspond to eccentricities not too far from 1. This head-on collision appears to have sprayed stars all over the Milky Way, dominating the stellar halo out to $\sim30$ kpc as evidenced from the recent studies of the orbital properties of a variety of halo tracers across a wide range of Galactocentric distances \citep[][]{Bird2018,Deason18,Lancaster}. Finally, using a sample of RRL stars with radial velocities, \cite{Simion18} found that the HAC and VOD can also be linked to this event, representing some of the less mixed portions of its tidal debris. In the face of the evidence above, the obvious question is whether some or most of the stars in the triaxial structure revealed here (see Sec.\ \ref{sec:distribution}) belong to the ``Gaia Sausage''. With this conjecture in mind, we set out to explore the kinematics of the RRL stars in the inner portions of the Milky Way's halo. \begin{figure*} \centering \centerline{\includegraphics[width=0.95\textwidth]{img/Pcoff_final.pdf}} \caption[]{Pearson correlation coefficient of the Galactic proper motion components ($\mu_\ell, \mu_b$) as a function of the sky position in Galactic coordinates for the three models (isotropic, {\bf top-left panel}; tangentially anisotropic, {\bf top-right panel}; radially anisotropic, {\bf bottom-left panel} and the data {\bf bottom-right panel}). Only the stars in the clean sample with $5<|z/\te{kpc}|<30$ and located within the black ellipse shown in the left-hand panel of Fig.\ \protect\ref{fig:View} ($N$$\sim$21,000) are considered. The underlying model velocity distributions are shown in the top-left panel of Fig.\ \protect\ref{fig:PM}. The maps of the model correlation have been obtained by averaging the results of 10,000 model realisations. The mean dispersion of the model realisations ($\sigma \rho_{\mu_\ell,\mu_\te{b}}\sim0.25$) is compatible with the level of random fluctuations displayed by the data. The proper motions have been corrected for the Solar reflex motion. The gray regions indicate bins without stars. } \label{fig:PMmap} \end{figure*} \subsection{RR Lyrae kinematics} \label{sec:kine} \label{sec:kinem} Unfortunately, with only the proper motions measurements at our disposal, we cannot directly study the orbital properties of the RRL stars in our sample. Recently \cite{Wegg18} circumvented this limitation using a sample of PanSTARRS1 RRL stars in \textit{Gaia} DR2 and marginalising over the unknown line-of-sight velocity component. In this work, we decided to use a simpler, but nonetheless effective and illuminating approach. In particular, we compare the observed proper motions distributions to the predictions of several simplified halo models. More precisely, we generate mock proper motions values for the stars in our sample assuming i) complete orbital isotropy, ii) high radial anisotropy (similar to the ``Gaia Sausage'') as well as iii) strong tangential anisotropy. The model velocity distributions in Galactocentric spherical coordinates are shown in the top-left panel of Fig.\ \ref{fig:PM}. The isotropic model is composed of Gaussian velocity distributions with $\sigma_\theta=\sigma_\phi=\sigma_\te{r}=120\ \te{km} \ \te{s}^{-1}$. The radially anisotropic model is inspired by that used in \citet{Necib18} and \citet{Lancaster}. Namely, the $V_\te{r}$ distribution contains two Gaussians with peaks at $V_\te{r}=\pm 160\ \te{km} \ \te{s}^{-1}$ and $\sigma_\te{r}=130\ \te{km} \ \te{s}^{-1}$, while the $V_\theta$ and $V_\phi$ distribution are single Gaussians centred in 0 and with $\sigma_\theta=\sigma_\phi=30\ \te{km} \ \te{s}^{-1}$. Therefore, this model corresponds to the extreme orbital anisotropy of $\beta\sim0.96$, similar to that observed for the ``Gaia Sausage'' stars \citep{Belokurov17,MySa,Simion18}. The tangentially biased model uses Gaussian velocity distributions with $\sigma_\theta=\sigma_\phi=100\ \te{km} \ \te{s}^{-1}$ and $\sigma_\te{r}=40\ \te{km} \ \te{s}^{-1}$, these values are arbitrary and have been set to reproduce a strong tangential anisotropy ($\beta=-5.25$) maintaining roughly the same velocity range of the isotropic and radially anisotropic models (see Fig.\ \ref{fig:PM}). Note, however, that $\beta$ of our tangentially anisotropic model is somewhat lower (signifying a stronger anisotropy) than the lowest anisotropy estimates based on stellar tracers in the Milky Way stellar halo. \citep[see e.g.\ ][]{Kafle12,CKIII}. In the analysis that follows, we focus only on the $\sim$21,000 stars belonging to the triaxial structure highlighted in Sec.\ \ref{sec:distribution}, i.e. those within the region with $5<|z/ \te{kpc}|<30$ and inside the black ellipse shown in the left-hand panel of Fig.\ \ref{fig:View}. In practice, for each RRL star in our sample, we draw $(V_\te{r}, V_\theta, V_\phi)$ randomly from the distributions discussed above. Then, given the fully defined positions and velocity vectors, we derive the model proper motions ($\mu_\ell, \mu_b$). The final model predictions (see below) are obtained by averaging over 10,000 model realisations. Armed with the halo models, we compress the kinematic information into two simple plots. First, as shown in Fig.\ \ref{fig:PM} we compare the 1-D distributions of $\mu_\ell$ and $\mu_b$ across the entire sample of stars considered. From isotropic, through tangentially to radially anisotropic models, the proper motion distributions become narrower. The thinnest peak belongs to the distribution predicted by the radially anisotropic model, which also possesses sizeable wings. For the isotropic and the tangential case, the shapes of the $\mu_\ell$ and the $\mu_b$ histograms are indistinguishable. However, for the radially biased model, the distributions of the two proper motion components are clearly different: the $\mu_b$ histogram is more peaked with respect to that of $\mu_\ell$. Most importantly, there is a strikingly good match between the radially biased model and the data shown in the top-right panel of Fig.\ \ref{fig:PM}. Fig.\ \ref{fig:PMmap} extends the comparison from 1-D to 2-D, i.e. demonstrates the behavior of the three models and the data as a function of the position on the sky. Here we show the evolution of the Pearson correlation coefficient $\rho_{\mu_\ell,\mu_b}$\footnote{$\rho_{\mu_\ell,\mu_b}=\te{cov}(\mu_\ell,\mu_b)/\sigma_{\mu_\ell}\sigma_{\mu_b}$, where $\te{cov}(\mu_\ell,\mu_b)$ is the proper motions covariance and $\sigma_{\mu_\ell}$ and $\sigma_{\mu_b}$ are the proper motion standard deviations.} in bins of Galactic coordinates. The thus calculated correlation can be interpreted as the characteristic direction of motion on the plane of the sky. No preferred direction is expected for the isotropic model as confirmed in the top-left panel of Fig.\ \ref{fig:PMmap}. In spherical polars, the velocity ellipsoids of the tangentially and radially biased models are rotated by $\pi/2$ with respect to each other. As the top-right and the bottom-left panels demonstrate, even in the absence of the third velocity component, the stretching and the orientation of the velocity ellipsoid can be deduced from its projection on the sky (for reasonably nearby stars as those considered here). In the presence of strong orbital anisotropy, the proper motions are heavily correlated. The sign of the correlation depends on sky position and changes every $90^\circ$ both in $\ell$ and $b$ creating the characteristic \vir{red-blue} patterns visible in the top-right and bottom-left panels of the Fig.\ \ref{fig:PMmap}. Without any doubt, the observed pattern of the RRL motion shown in the bottom-right panel matches that of the radially-anisotropic model (bottom-left). We stress that the predictions of our simple kinematical models have converged, i.e. they do not change when the number of realisations is increased. In particular, the dispersion of the model representations is negligible in Fig.\ \ref{fig:PM} (less than $1\%$ at the histograms peaks) and the mean dispersion in the correlation maps in Fig.\ \ref{fig:PMmap} ($\sigma_{\rho_{\mu_\ell,\mu_\te{b}}}\sim0.25$) is compatible with the level of random signal oscillation shown in the data. In fact, even when using a single realisation the relevant features shown in Fig.\ \ref{fig:PM} and Fig.\ \ref{fig:PMmap} are still evident, although the overall proper motion distributions and correlation maps appear noisier. \begin{figure*} \centering \centerline{\includegraphics[width=0.9\textwidth]{img/VlVbr_ED.pdf}} \caption[]{Distributions of the transverse velocities along the direction of the Galactic longitude ($V_\ell$, blue histograms) and latitude ($V_b$, orange histograms) for the RR Lyrae stars in the clean sample. The panels show the velocity distributions in different radial bins as reported in the title of each panel together with the number of stars ($N$) in the bin. The velocities have been corrected for the Solar reflex motion \citep{rsunsch}. The error bars in the top-left corners indicate the median velocity errors in each bin (blue-dot for $V_\ell$, orange-square for $V_b$). The velocity errors have been estimated by means of Monte Carlo simulations taking into account the observed proper motion errors and the estimated dispersion in the RR Lyrae absolute magnitude distribution (see Sec.\ \ref{sec:dist}). The dashed lines represent the results of Extreme Deconvolution Gaussian fits \citep{extreme} taking into account the errors on $V_\ell$ and $V_b$. } \label{fig:VlVbr} \end{figure*} \subsection{Radial trends} This sub-section explores the dependence of the RRL kinematics on the Galactocentric distance. In particular, we replicate the analysis presented above using sub-samples of RRL in different Galactocentric distance $r$ bins. Given the (maximal) spatial blurring due to the uncertainties in the distance estimate (Sec.\ \ref{sec:dist}), the minimal size of a distance bin is 4 kpc. For each radial bin, we show both the 1-D distributions of the transverse velocities derived from the~\textit{Gaia} DR2 proper motions (Fig.\ \ref{fig:VlVbr}) and the 2-D maps of the correlation coefficient of the RRL proper motions on the sky (Fig.\ \ref{fig:Pcoffr}). {\bf Velocity distributions evolution.} The amplitude of the proper motion depends both on the velocity of a star as well as its distance from the observer (Eq.\ \ref{eq:dist}). Therefore, we convert the proper motions into physical velocities $V_\ell=K\mu_\ell D_\odot$ and $V_b=K\mu_b D_\odot$ to track changes in kinematics across a wide range of $r$. Here, $V_\ell$ and $V_b$ are the velocities along the direction of the Galactic longitude and Galactic latitude and $K \approx 4.70$ is the conversion factor from $\te{mas} \ \te{kpc} \ \te{yr}^{-1}$ to $\te{km} \ \te{s}^{-1}$. The distributions of $V_\ell$ and $V_b$ as a function of the Galactocentric distance are given in Fig.\ \ref{fig:VlVbr}. In the bin closest to the Galactic center, the two distributions are almost identical, in agreement with the isotropic model (see the bottom-left panel in Fig.\ \ref{fig:PM}). At the intermediate radii ($4<r/\te{kpc}<30$), the $V_\ell$ and $V_b$ distributions become progressively narrower; moreover, significant differences between $V_b$ and $V_\ell$ histograms start to appear. Thus, the kinematics of the RRL stars in this radial range appears compatible with the expectation from the radially anisotropic model (see the bottom-right panel in Fig.\ \ref{fig:PM}). Beyond $30$ kpc, the trend is reversed: the $V_\ell$ and $V_b$ distributions become broader and barely distinguishable, in agreement with the isotropic model. Please note that some of the broadening in the last bin is driven by large velocity errors for these distant and faint stars ($G\gtrsim18.8$, see the error-bars in the top-left corner of each panel). To illustrate the effect of error-blurring on the shape of the velocity histograms, we deconvolve the distributions using the ED technique \citep[][]{extreme}. The resulting deconvolved distributions are shown as dashed lines in Fig.\ \ref{fig:VlVbr}. In the first four bins, i.e. for $r<30$ kpc, the difference between the observed and deconvolved distributions is minuscule. In the last two radial bins, the mismatch is more noticeable but still minor. We conclude that the change in the shape of the transverse velocity distribution with radius is dictated primarily by the change in the overall anisotropy of the stellar halo. We have checked that the model distributions of the transverse velocities do not substantially change their behavior as a function of $r$. Therefore, we confirm that the radial evolution shown in Fig.\ \ref{fig:VlVbr} is not compatible with a single kinematic model. Instead, the data displays a rapid transition from isotropy to radial anisotropy at small radii around 4 kpc. There appears to be another transition, at larger distances, beyond 30 kpc, where even though the velocity errors grow substantially, the RRL motions resemble those generated by the isotropic model. {\bf Correlation coefficient evolution.} The change from the orbital isotropy to the radial anisotropy (and back) is not only apparent in the amplitudes of the transversal velocities shown in Fig. \ref{fig:VlVbr} but it is also reflected in the directions of RRL motions displayed in Fig.\ \ref{fig:Pcoffr}. The Figure reproduces the map shown in the bottom-right panel of Fig.\ \ref{fig:PMmap} but now as a function of the Galactocentric distance. The red-blue pattern typical of the streaming along the radial direction (see the bottom-left panel in Fig.\ \ref{fig:PMmap}) is already noticeable in the innermost bin, albeit with a small amplitude. Between 4 and 20 kpc this pattern becomes much more pronounced (see the bottom-right panel of Fig.\ \ref{fig:PMmap} for comparison). Outside of 20 kpc, especially in the last two bins, the correlation coefficient maps lose their coherence quickly, displaying a mix of random orientations. The patterns at higher distances should be interpreted with caution, as the growing velocity errors in these bins will act to destroy intrinsic correlations, especially the low-amplitude ones. \begin{figure*} \centering \centerline{\includegraphics[width=1.0\textwidth]{img/Pcoffr.pdf}} \caption[]{Same as Fig.\ \ref{fig:PMmap}, but considering all RR Lyrae stars in the clean sample in different radials bins as reported in the title of each panel together with the number of stars in the bin. The gray regions indicate bins without stars. Note that the strongest negative correlation (dark blue color) in the fourth radial bin (20-30 kpc) is supplied by the remaining portion of the Sgr trailing stream.} \label{fig:Pcoffr} \end{figure*} In conclusion, Fig.\ \ref{fig:VlVbr} and Fig.\ \ref{fig:Pcoffr} confirm that between 4 and 20-30 kpc from the Galactic centre most of the stars have proper motions compatible with a model with a strong radial anisotropy. Outside of this region, the distribution of proper motions appears to behave similar to the isotropic or, perhaps much less radially biased, model. This kind of radial trend is expected if the inner halo is dominated by highly eccentric orbits ($e>0.8$). In this case, along most of the orbital path, the star's velocity is predominantly in the radial component. However, close to the turn-around points, namely the pericentre and the apocentre, the radial component of the velocity rapidly decreases to 0. Of course, the synchronized change in the orbital anisotropy in large portions of the halo is only possible if the halo is dominated by the tidal debris from a single accretion event. In this case, the stars naturally possess similar orbital properties, thus causing the whole halo's anisotropy to change quickly around their pericentres and apocentres. Our finding of the switch in the orbital properties of the stellar halo around 4 kpc is in good agreement with the detection of the anisotropy change at similar distances presented in \citet{Wegg18} and with the estimate of the pericenters of the stars belonging to the Hercules-Aquila and Virgo Clouds in \citet{Simion18}. The decay of the correlation between the proper motion components beyond 30 kpc is in agreement with the marked anisotropy decrease measured at similar distances by \citet{Bird2018} and \citet{Lancaster}. This behavior can be explained by the traversal of the apocentric pile-up of a large number of stars sharing a common progenitor as described in \citet{Deason18}. Moreover, the evolution of the RRL orbital anisotropy with Galactocentric distance appears to correlate well with the change in the mixture of RRL periods and amplitudes \citep[see][]{Unmixing}. Together with these earlier works, out study gives further support to the hypothesis of \citet{Deason2013} in which the observed stellar halo density break can be linked to the last apocentre of a massive progenitor galaxy, whose tidal debris engulfed the inner Milky Way. \subsection{Signature of an ancient major merger?} The simple analysis presented in this Section suggests that the orbits of the bulk of the RRL stars in the inner halo of the Milky Way (including the HAC and the VOD) are highly eccentric, in line with the local measurements of the ``Gaia Sausage''\citep[see][]{BelokurovSa,MySa,Helmi18}. The exact fraction of RRL stars in our sample that can be associated with this structure is uncertain. Recent studies have shown that the fraction of the inner halo population with strong anisotropy is certainly larger than $50\%$ \citep{Lancaster} and can be as high as $70\%$ \citep{Mack18}. We repeated the analysis described in Sec.\ \ref{sec:kine} considering a mixed model with both isotropic and strong radially anisotropic velocity distributions. We found that the magnitude of the red-blue patterns shown by the data in Fig.\ \ref{fig:PMmap} are qualitatively reproduced when the fraction of stars belonging to the anisotropic population is larger than $70\%$. Interestingly, several works have shown that, during mergers, large numbers of stars in the pre-existing disc can be heated to more eccentric and energetic orbits forming an in-situ population in the inner halo \citep[e.g.][]{Purcell10,Font11}. Although the kinematic properties of this kicked-up population may resemble those of the accreted debris \citep[see e.g.\ ][]{DiMatteo11,JB17}, the in-situ stars tend to maintain a good fraction of their initial (positive) $z$-angular momentum \citep[see e.g.\ ][]{Haywood2018}. Since the $z$-angular momentum of the \vir{Gaia Sausage} stars is typically very low or negative \citep[see][]{BelokurovSa,MySa,Helmi18}, we envisage that the contribution of the heated disc stars to our sample is likely minimal. We therefore conclude that the triaxial structure uncovered in Sec. \ref{sec:slice} is mostly composed of the tidal debris from this ancient massive merger. While glimpses of the ``Gaia Sausage'' have recently been found outside of the Solar neighborhood \citep[see][]{Deason18,Lancaster,Simion18}, ours is the first comprehensive 3-D map of this gigantic debris structure which completely dominates the inner stellar halo. There exists an additional corollary worth pondering about. Depending on the exact time of accretion and the mass of the progenitor galaxy, the ``Gaia Sausage'' might also be contributing a significant fraction of the Dark Matter content in the inner part of the Milky Way. If the merger delivered some $10^{11} M_{\odot}$ of Dark Matter - which is not far off most currently available estimates \citep[see][]{BelokurovSa, Helmi18, Mack18} - then its portion of the local Dark Matter budget can be gauged as follows. Using the above progenitor mass and the triaxial model described in the previous Section, the Dark Matter density at the Solar (elliptical) radius due to the ``Gaia Sausage'' is $\sim7\times10^{-4}$ M$_{\odot}$pc$^{-3}$. This is approximately $10\%$ of the local Dark Matter density \citep[see][]{Bovy2012}. Quite probably, however, this is a lower bound as the density in the central parts of the debris cloud is over-estimated by our parametric model (see the left-hand panel of Fig.~\ref{fig:View}). Naturally, we expect a depletion in density at distances inward of the pericentre. A different estimate can be obtained by noticing that within 30 kpc, i.e. inside the apocentre of the ``Gaia Sausage'', the MW mass is estimated to be $\sim2.5 \times 10^{11}$M$_{\odot}$ \citep[see e.g.][]{Gibbons2014,Williams2017,Posti2018}, of which at least $0.5 \times 10^{11}$M$_{\odot}$ can be attributed to the baryonic component \citep[see][]{McMillan2017}. Therefore, the Dark Matter contribution associated with the principal component of the stellar halo can be $\sim50\%$ within 30 kpc. In this regard, it is curious that the direction of the major axis of the triaxial stellar halo described in this work is close (within $20^\circ$) to the direction of the major axis of the triaxial Dark Matter halo model found by \cite{LM}. Although the details of the axial ratios show some difference (the Dark Matter shortest axis is not on the direction normal to the Galactic plane), the \vir{amount} of triaxiality as measured by the triaxiality parameter $T$\footnote{$T=\frac{1-b^2/a^2}{1-c^2/a^2}$, where $a,b,c$ are the longest, intermediate and shortest axes, respectively.} is very similar. While the exact orientation of the Dark Matter halo with respect to the Galactic disk as suggested by \cite{LM} is not stable, the triaxial Dark Matter halo and the baryonic disk can co-exist happily if the disk's spin is allowed to be misaligned with respect to the principal planes of the potential \citep[see][]{Victor2013}. This misalignment can be induced, for example, by gas accretion at later times as demonstrated in \citet{Victor2015}. \section{Conclusions} \label{sec:conclusions} In this paper, we take advantage of the most comprehensive sample of RRL stars to date, i.e. the one supplied by the \textit{Gaia} DR2, to study the shape of the Galactic stellar halo. In order to assemble a dataset with sensible and stable completeness and purity, we had to get rid of more than a half of the original total of $\sim230,000$ objects. While this may sound scary, remember that the estimated contamination of the \textit{Gaia} DR2 sample shoots up to $\sim 50\%$ in the bulge area \citep[see][]{GaiaVariable}. For our investigations, we have only kept RRL stars that possess well-behaved colors and astrometry. Additionally, we do not consider objects residing in small-scale over-densities, i.e. known Milky Way satellites and globular clusters. However, even after all these cuts, we are left with nearly 93,000 RRL stars across the entire sky, from the inner several kpc to the distant outskirts - a dataset unprecedented in its richness and reach. For the very first time, we produce detailed maps of the RRL density distribution in the inner Milky Way (see Fig.~\ref{fig:Zslice}). Slicing the Galaxy at different Galactic heights, we reveal the evolution of the halo shape from nearly spherical (close to the Galaxy's centre) to clearly triaxial further out. Despite several obvious asymmetries and large-scale over-densities visible in these maps, the overall structure of the halo appears to be well-described by the SPL-TR$^{qv}$ model of \citet{Iorio18}. In this model, the major axis lies in the Galactic plane rotated by $\sim70^{\circ}$ (anti-clockwise) away from the Galactic $x$-axis, i.e. pointing approximately in the direction of the Magellanic Clouds. The ratio of the major to intermediate axis is $p=1.3$, but the ratio of the minor axis (aligned with the Galactic $z$ axis) to major one changes with distance from the Milky Way centre (from $q\sim0.5$ to $q\sim0.8$). The clearest deviations from the above model are the Virgo Over-Density and the Hercules-Aquila Cloud, which protrude far in the vertical direction on the opposite sides of the Galactic plane. As we have demonstrated in Section~\ref{sec:distribution} and Fig.~\ref{fig:View}, the SPL-TR$^{qv}$ model of \cite{Iorio18} can be adjusted slightly to encompass both HAC and VOD. This is achieved by bringing its intermediate axis out of the Galactic plane by $\sim20^{\circ}$. From the slices presented in Fig.~\ref{fig:Zslice} it is now easy to judge the whereabouts of the HAC and VOD with respect to the Milky Way's centre and to each other. These debris clouds appear to be aligned with the major axis of the triaxial structure discussed above. The first clues that HAC and VOD may actually be part of the same accretion event have already been presented by \citet{Simion18}, who calculated the orbital properties of a sub-sample of RRL stars residing in these over-densities. Given that both structures appear to be dominated by stars on extremely eccentric orbits, \citet{Simion18} conclude that HAC and VOD represent unmixed portions of an ancient massive head-on collision also known as the ``Gaia Sausage''. In an attempt to test this hypothesis, we have studied the kinematics of the inner halo RRL stars as reflected in their proper motions. We claim that across a wide range of distances from the Sun, the halo's velocity ellipsoid can be gleaned from its projection on the celestial sphere. Our results are in good agreement with an earlier analysis of the RRL proper motion data of \citet{Wegg18}. Compared to the above study, while we do not attempt to model the shape of the velocity ellipsoid, we do obtain a broader view of the global kinematic patterns in the Galactic halo. Accordingly, contrasting the observed amplitudes and directions of the RRL proper motions within $\sim30$ kpc from the Galactic centre with simple kinematic models, we show that the entire inner halo is dominated by stars on highly eccentric orbits. We interpret the stretched appearance and the extreme radial anisotropy of the inner halo as the tell-tale signs of a low angular momentum collision with a massive satellite \citep[see e.g.\ ][]{Brook03}, thus associating the bulk of the RRL stars within 30 kpc with the so-called ``Gaia Sausage'' merger event \citep[][]{BelokurovSa,MySa,Haywood2018,Helmi18}. By tracking the change in the behavior of the RRL proper motions with Galactocentric distance, we place constraints on the pericentre ($\lesssim 4$ kpc) and the apocentre (20-40 kpc) of this enormous tidal debris cloud. The fact that today it appears to be squashed vertically (in the direction perpendicular to the Galactic disc) agrees well with the predictions of numerical simulations of the Dark Matter halo evolution in the presence of baryons \citep[][]{Kaza2004,Gnedin2004,Debattista2008,Abadi2010}. In terms of local Dark Matter density, we have estimated the contribution of the ``Gaia Sausage'' to be between $10\%$ and $50\%$. A curious conundrum is starting to emerge in which a clearly triaxial stellar halo needs to be reconciled with multiple recent reports of a near spherical inner Dark Matter halo \citep[][]{Bowden2015,Bovy2016,Wegg18}, a measurement itself in tension with the results from numerical simulations which do not produce perfect sphericity \citep[e.g.][]{Kaza2010,Victor2015}. The spatio-kinematic information uncovered here will help constrain the total mass as well as the time of accretion of the ``Gaia Sausage'' progenitor, and thus understand the role this event played in the life of the Milky Way. \section*{Acknowledgements} The authors thank Wyn Evans, Victor Debattista, Andrew Cooper, Sergey Koposov, Iulia Simion, Alis Deason for most illuminating discussions which helped to improve this manuscript. G.I. is supported by the Royal Society Newton International Fellowship. The research leading to these results has received funding from the European Research Council under the European Union's Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement n. 308024. This work has made use of data from the European Space Agency (ESA) mission {\it Gaia} (\url{https://www.cosmos.esa.int/gaia}), processed by the {\it Gaia} Data Processing and Analysis Consortium (DPAC, \url{https://www.cosmos.esa.int/web/gaia/dpac/consortium}). Funding for the DPAC has been provided by national institutions, in particular the institutions participating in the {\it Gaia} Multilateral Agreement. \bibliographystyle{mnras}
\section{Introduction} The stable matching problem is of crucial importance for the game theory. In an instance of a maximum cardinality stable matching problem we are given a bipartite graph $G=(A\cup B, E)$ with bipartition $A$ and $B$. Following the standard terminology, we refer to $A$ as men and $B$ as women. For $a\in A$, we define $N(a)$ to be the subset of nodes in $B$ adjacent to $a$ in $G$; analogously we define $N(b)$ for $b\in B$. Each person $c\in A\cup B$ has strict preferences over $N(c)$. A matching $M$ is called a \emph{stable matching} if there are no $a\in A$ and $b\in B$ such that $a$ is either unmatched or prefers $b$ to the woman he is matched to by $M$ and $b$ is either unmatched or prefers $a$ to the man she is matched to by $M$. Clearly, if a matching $M$ is not stable, then it contains a pair $(a,b)$, $a\in A$, $b\in B$ satisfying the above conditions; such a pair $(a,b)$ is called a \emph{blocking pair} for $M$. In their seminal work, Gale and Shapley developed a polynomial running time algorithm to find a stable matching~\cite{GaleShapley62}. Moreover, since all stable matchings have the same cardinality~\cite{GaleSotomayor85}, the algorithm of Gale and Shapley finds a maximum cardinality stable matching in polynomial running time. The situation changes when the people are allowed to have \emph{ties}. In the case of ties, stable matchings for the same instance of a problem can have different cardinalities. Moreover, it is $\mathcal{NP}$-hard to find a maximum cardinality stable matching even when there are ties of size two only~\cite{Manlove}. In this case, it is $\mathcal{NP}$-hard to approximate the maximum cardinality of a stable matching with a constant factor smaller than $21/19$ and UGC (Unique Game Conjecture)-hard to approximate with a constant factor smaller than $4/3$~\cite{Yanagisawa}. We would like to say that the maximum cardinality stable matching problem with ties appears in diverse situations and thus approximation algorithms for different variants of this problem were extensively studied \cite{Bauckholt, HuangKavitha2015, Iwamaetal07, Iwamaetal14, Kiraly11, algorithms, LP18, mcdermid_first_approx, paluch_original}. To the best of our knowledge, the algorithm with a currently best approximation factor for the maximum cardinality stable matching problem with ties of size two is due to Huang and Kavitha~\cite{HuangKavitha2015}. In their paper, Huang and Kavitha provided an approximation algorithm for this problem and showed that the approximation factor of their algorithm is at most $10/7$. \subsection*{Our Contribution} In this paper, we give a tight analysis of the approximation algorithm given by Huang and Kavitha~\cite{HuangKavitha2015} for the maximum cardinality stable matching problem with ties of size two, demonstrating an improved $4/3$-approximation bound. Notably, any polynomial running time algorithm with a smaller approximation factor than $4/3$ would automatically lead to refutation of the Unique Game Conjecture~\cite{Yanagisawa}. To obtain our result we use a new charging scheme. In contrast to the charging scheme in~\cite{HuangKavitha2015}, our charging scheme is ``local". In particular, the charging scheme in~\cite{HuangKavitha2015} creates charges from paths and distributes the charges along paths (using so called ``good paths"), distributing the charges ``globally". The charging scheme in~\cite{HuangKavitha2015} for the algorithm for the problem with \emph{ties of size two} closely follows the original charging scheme in~\cite{HuangKavitha2015} for the algorithm for the problem with \emph{one-sided ties}. Recently, the charging scheme for the problem with one-sided ties was substantially modified by Bauckholt, Pashkovich and Sanit\`{a} in~\cite{Bauckholt}, where the modified charging scheme still has a ``global" nature and distributes the charges along paths but in a more nuanced way (using so called ``path jumps", ``matching jumps" and ``matching jumps with exception") than the original charging scheme in~\cite{HuangKavitha2015}. However, it is not clear whether the original charging scheme in~\cite{HuangKavitha2015} or new ideas coming from the modified charging scheme in~\cite{Bauckholt} could lead to a better analysis of the algorithm for the problem with ties of size two. Our charging scheme is different from the two charging schemes above, in particular it is local and therefore it is much simpler to work with. To implement our charging scheme, we need to know only the local structure of the output matching, local structure of an optimal matching, and local structure of accepted proposals at the end of the algorithm. \emph{To sum up, in our charging scheme nodes get charges only from the proposals involving them, while in the charging schemes in~\cite{Bauckholt} and \cite{HuangKavitha2015} the charges come from paths and are distributed to nodes along paths.} A detailed comparison of our approach with approaches from~\cite{Bauckholt} and~\cite{HuangKavitha2015} can be found in Appendix. \section{Algorithm by Huang and Kavitha} \label{section:algorithm} First, let us describe the algorithm by Huang and Kavitha~\cite{HuangKavitha2015}. The description of the algorithm closely follows the description of the algorithm by Huang and Kavitha~\cite{HuangKavitha2015} for the maximum cardinality stable matching problem with one-sided ties from~\cite{Bauckholt}. A stable matching is computed in two phases. In the first phase, which is the proposal phase, men (in arbitrary order) make proposals to women, while women accept, bounce, forward, or reject proposals. In the second phase, we consider a graph based on the proposals at the end of the first phase, which in its turn leads to an output stable matching. Before we describe the algorithm by Huang and Kavitha~\cite{HuangKavitha2015}, let us introduce the following notions related to preferences. Let $a\in A$ and $a'\in A$ be on the preference list of $b\in B$; i.e., $a$ and $a'$ are in $N(b)$. Then we can compare $a$ and $a'$ from the perspective of $b$. If \(a\) and \(a'\) are tied on the list of \(b\), we say \(b\) is \emph{indifferent} between them, denoted by \(a \simeq_b a'\). Further, if $b$ ranks $a$ strictly higher than $a'$ on her preference list, then we say that $b$ \emph{(strongly) prefers} $a$ to $a'$, denoted by $a >_b a'$; otherwise, we say that $b$ \emph{weakly prefers} $a'$ to $a$, denoted by $a' \geq_b a$. In other words, if $b$ weakly prefers $a'$ to $a$ then $b$ is either indifferent between $a$ and $a'$ or strongly prefers $a'$ to $a$. Analogously, we define \emph{indifference} $b'\simeq_a b$, \emph{weak preference} $b'\geq_a b$, and \emph{(strong) preference} $b'>_a b$ for men over women. \subsubsection*{Proposals} Each man $a\in A$ has two proposals $p^1_a$ and $p^2_a$. Initially, both $p^1_a$ and $p^2_a$ are offered to the first woman on $a$'s list. At each moment of the algorithm every man has one of the following three \emph{statuses}: \emph{basic}, \emph{$1$-promoted}, and \emph{$2$-promoted}. Each man keeps a rejection history to record the women who have rejected him in his current status. If a proposal $p^i_a$, $i=1,2$ is rejected by a woman $b$ on $a$'s list, then the proposal $p^i_a$ goes to a most preferred woman on $a$'s list who has not rejected $a$ in his current status. In the case when there is no woman on $a$'s list who has not rejected $a$ in his current status, the man $a$ changes his status as described below or stops making proposals. If the man $a$ changes his status, his rejection history is emptied and $a$ starts making proposals again by proposing to a most preferred woman on his list. Note that in the case where there are two most preferred women on $a$'s list who have not rejected him in his current status, the man $a$ breaks the tie arbitrarily. Each man $a\in A$ starts as a basic man. If every woman in $N(a)$ rejects a proposal of $a$ at least once, the man $a$ becomes $1$-promoted. If afterwards every woman in $N(a)$ again rejects a proposal of $a$ as a $1$-promoted man at least once, the man $a$ becomes $2$-promoted. Finally, if every woman in $N(a)$ rejects a proposal of $a$ as a $2$-promoted man at least once, the man $a$ stops making proposals. \subsubsection*{Proposals' Acceptance} A woman $b$, who gets a proposal $p^i_a$ from a man $a$, always accepts it if at the moment $b$ holds at most one proposal excluding $p^i_a$. Otherwise, $b$ tries to make a \emph{bounce} step, and if the bounce step is not successful, $b$ tries to make a \emph{forward} step. \begin{itemize} \item \emph{Bounce step:} So the woman $b$ at the moment holds two proposals, $p^{i'}_{a'}$ and $p^{i''}_{a''}$, and receives a third proposal $p^{i}_{a}$. If for some $\alpha\in \{a,a',a''\}$ there exists a woman $\beta$ such that $b\simeq_{\alpha}\beta$ and at the moment $\beta$ holds at most one proposal, then a proposal from $\alpha$ to $b$ is bounced to $\beta$ and the bounce step is called \emph{successful}. \item \emph{Forward step:} So the woman $b$ at the moment holds two proposals, $p^{i'}_{a'}$ $p^{i''}_{a''}$, and receives a proposal $p^{i}_{a}$. If two of the proposals in $\{p^i_a,\,p^{i'}_{a'},\, p^{i''}_{a''}\}$ are from the same man $\alpha$ and there exists a woman $\beta$ distinct from $b$ such that $b\simeq_\alpha \beta$ and $\beta$ has not rejected $\alpha$ in his current status, then a proposal $p^1_\alpha$ from $\alpha$ to $b$ is forwarded to $\beta$ and the forward step is called \emph{successful}. \end{itemize} If $b$ holds proposals $p^{i'}_{a'}$ and $p^{i''}_{a''}$ and receives a different proposal $p^i_a$, but both the bounce and forward steps are not successful, then $b$ rejects any of the \emph{least desirable proposals} as defined below, breaking ties arbitrarily.{ \it Note that a proposal of a man which is bounced or forwarded is not considered as rejected, so there is no update of the rejection history for any of the men during the bounce or forward steps.} For a woman $b$, proposal $p^i_a$ is superior to $p^{i'}_{a'}$ if one of the following is true \begin{itemize} \item $b$ prefers $a$ to $a'$. \item $b$ is indifferent between $a$ and $a'$; $a$ is currently $2$-promoted while $a'$ is not $2$-promoted. \item $b$ is indifferent between $a$ and $a'$; $a$ is currently $1$-promoted while $a'$ is basic. \end{itemize} A proposal $p^i_a$ is a \emph{least desirable proposal} among a set of proposals that a woman $b$ has if it is not superior to any of the proposals from which the woman $b$ selects two proposals to keep. There is also a special case for the rejection step. Assume that $b$ holds two proposals $p^{i'}_{a'}$, $p^{i''}_{a''}$ and receives a different proposal $p^i_a$, where $a\simeq_b a'\simeq_b a''$ and the promotion statuses of $a$, $a'$, and $a''$ are the same. Clearly, since the ties are of size $2$, we have that two of the three proposals $p^i_a$, $p^{i'}_{a'}$, and $p^{i''}_{a''}$ are from the same man. In this special case, $b$ rejects one of the proposals from this man. \subsubsection*{The output matching} Let $G'$ be the bipartite graph with the node set $A\cup B$ and the edge set $E'$, where $E'$ consists of the edges $(a,b)$, $a\in A$, and $b\in B$ such that at the end of the algorithm $b$ holds a proposal from $a$. Note for the sake of exposition that we allow $G'$ to contain two parallel edges of the form $(a,b)$, $a\in A$ and $b\in B$, when at the end of the algorithm $b$ holds two proposals from $a$. Clearly, the degree of a node in $G'$ is at most two, since each man has at most two proposals and each woman is holding at most two proposals at any point in time. Let $M$ be a maximum cardinality matching in $G'$ where all degree two nodes of $G'$ are matched. In~\cite{HuangKavitha2015}, it was shown that the matching $M$ is a stable matching in the graph $G$. \begin{theorem}[\cite{HuangKavitha2015}] The total number of proposals made during the algorithm is~$O(|E|)$ and the output matching is a stable matching in $G=(A\cup B, E)$. \end{theorem} \section{Tight Analysis} \label{sec:tight_analysis} Let $\textsf{OPT}$ be a stable matching with the maximum cardinality, and let \(M\) be a stable matching output by the algorithm. If $b\in B$ is matched with $a\in A$ in $\textsf{OPT}$, we use the following notation: $\textsf{OPT}(b):= a$ and $\textsf{OPT}(a):= b$. Similarly, if $b\in B$ is matched with $a\in A$ in $M$, we use the notation $M(b):= a$ and $M(a):=b$. For the sake of exposition we also define $M(a):=\varnothing$, $M(b):=\varnothing$, $\textsf{OPT}(a):=\varnothing$, and $\textsf{OPT}(b):=\varnothing$ when $a$ is not matched by $M$, $b$ is not matched by $M$, $a$ is not matched by $\textsf{OPT}$, and $b$ is not matched by $\textsf{OPT}$, respectively. Recall that for every $a\in A$ and $b\in N(a)$ we have $b>_a\varnothing$. Similarly, for every $b\in B$ and $a\in N(b)$ we have $a>_b\varnothing$. A woman $b\in B$ is called \emph{successful} if she holds two proposals at the end of the algorithm, i.e., $b$ is successful if the degree of $b$ in $G'$ is two. Similarly, a man $a\in A$ is \emph{successful} if both of his proposals are accepted at the end of the algorithm, i.e., $a$ is successful if the degree of $a$ in $G'$ is two. We call a person \emph{unsuccessful} if that person is not \emph{successful}. Further, if during the algorithm a woman rejected a proposal, we call her \emph{popular}; otherwise, we call her \emph{unpopular}. The next remark follows directly from the algorithm of Huang and Kavitha~\cite{HuangKavitha2015} and helps to understand the bouncing step better. \begin{remark}\label{rem:bouncing_step} Let $a\in A$ and $b, b'\in B$ be such that at the end of the algorithm $b$ holds a proposal from $a$, $b'$ is unsuccessful, and $b'\simeq_a b$. Then $b$ is unpopular. \end{remark} \begin{proof} If at some point during the algorithm $b$ rejected a proposal, then at that point $b$ had no proposal for a successful bouncing step. Thus, at any later time point if $b$ received a new proposal that could be successfully bounced, then this new proposal would have been bounced. This contradicts the fact that at the end of the algorithm $b$ has a proposal from $a$, which can be successfully bounced. \end{proof} \subsection{Inputs and Outputs} Inputs and outputs are central objects for our charging scheme, i.e. for defining a cost of a node in $G$. Given a woman $b\in B$, we say that an edge $e$ incident to $b$ in $G'$ is an \emph{input to $b$} if $e$ is not in $\textsf{OPT}$ and not in $M$. Given a man $a\in A$, an \emph{output from $a$} is an edge $e$ incident to $a$ in $G'$ such that $e$ is not in $\textsf{OPT}$ and not in $M$. In other words, an edge $(a,b)$ in $G'$ is an input to $b\in B$ and an output from $a\in A$ if $(a,b)$ is not in $\textsf{OPT}+M$, otherwise the edge $(a,b)$ is neither input nor output. Note that if in $G'$ there are two parallel edges $e_1$ and $e_2$ of the form $(a,b)$, then $M$ must contain the edge $(a,b)$. In this case, one of the parallel edges $\{e_1, e_2\}$ is associated with $M$, while the other is counted as an input and an output unless $\textsf{OPT}$ also contains $(a,b)$, in which case it is associated with $\textsf{OPT}$. An input $(a,b)$ to $b\in B$ is called a \emph{bad input} if one of the following is true: \begin{itemize} \item $b$ is popular and \(a >_b \textsf{OPT}(b)\). \item $b$ is popular and \(a \simeq_b \textsf{OPT}(b)\), but $\textsf{OPT}(b)$ is unsuccessful. \end{itemize} An input $(a,b)$ to $b\in B$ is a \emph{good input} to \(b\) if it is not a bad input. In other words, an input $(a,b)$ to $b\in B$ is a \emph{good input} if one of the following is true: \begin{itemize} \item \(b\) is unpopular. \item \(b\) is popular and \(\textsf{OPT}(b) >_b a\). \item \(b\) is popular and \(\textsf{OPT}(b) \simeq_b a\), and \(\textsf{OPT}(b)\) is successful. \end{itemize} An output $(a,b)$ from a man $a$ is called a \emph{bad output} if one of the following is true: \begin{itemize} \item \(b >_a \textsf{OPT}(a)\) and \(a\) is not $2$-promoted. \item \(b \simeq_a \textsf{OPT}(a)\), but \(\textsf{OPT}(a)\) is unsuccessful. \end{itemize} A \emph{good output} from a man \(a\) is an output \((a,b)\) that is not a bad output. In other words, an output $(a,b)$ from $a\in A$ is a \emph{good output} if one of the following is true: \begin{itemize} \item \(b >_a \textsf{OPT}(a)\) and \(a\) is $2$-promoted. \item \(b \simeq_a \textsf{OPT}(a)\) and \(\textsf{OPT}(a)\) is successful. \item \(b <_a \textsf{OPT}(a)\). \end{itemize} \begin{lemma}\label{lem:double_bad} There is no edge which is both a bad input and a bad output. \end{lemma} \begin{proof} Assume that an edge \((a,b)\), $a\in A$, $b\in B$ is both a bad input to \(b\) and a bad output from \(a\). From the definitions of bad inputs and bad outputs, we have that one of the following is true \begin{enumerate}[label*=\roman*.] \item \label{case1_lem:double_bad} \(a >_b \textsf{OPT}(b)\); \(b >_a \textsf{OPT}(a)\). \item \label{case2_lem:double_bad} \(a \simeq_b \textsf{OPT}(b)\) and \(\textsf{OPT}(b)\) is unsuccessful; \(b >_a \textsf{OPT}(a)\) and \(a\) is not $2$-promoted. \item \label{case3_lem:double_bad} \(b \simeq_a \textsf{OPT}(a)\) and \(\textsf{OPT}(a)\) is unsuccessful; \(b\) is popular. \end{enumerate} In Case~\eqref{case1_lem:double_bad}, the edge $(a,b)$ is a blocking pair for $\textsf{OPT}$, contradicting the stability of $\textsf{OPT}$. In Case~\eqref{case2_lem:double_bad}, since \(\textsf{OPT}(b)\) is unsuccessful, \(\textsf{OPT}(b)\) is 2-promoted and was rejected by $b$ in that status. On the other hand, \(a \simeq_b \textsf{OPT}(b)\), $a$ is not $2$-promoted, and at the end of the algorithm $b$ holds a proposal from $a$, contradicting the fact that $b$ rejected a proposal from $\textsf{OPT}(b)$ when he was $2$-promoted. In Case~\eqref{case3_lem:double_bad}, we have a contradiction to Remark~\ref{rem:bouncing_step} where $b':=\textsf{OPT}(a)$. \end{proof} \begin{corollary}\label{cor:total_effectiveness} The number of good inputs is not smaller than the number of bad outputs. \end{corollary} \begin{proof} Let us assume the contrary, i.e., let us assume that the number of bad outputs is larger than the number of good inputs. Then there is an edge in $G'$ which is a bad input and is not a good output. In other words, there is an edge which is both a bad input and a bad output, contradicting Lemma~\ref{lem:double_bad}. \end{proof} \subsection{Cost, Effectiveness} For a man $a\in A$, we define his \emph{cost} as follows: \[ \textsf{cost}(a):=\begin{cases} \deg(a)+1&\text{if}\quad a \quad\text{has a bad output}\\ \deg(a)&\text{otherwise} \end{cases}\,, \] For a woman $b\in B$, we define her \emph{cost} as follows \[ \textsf{cost}(b):=\begin{cases} \deg(b)-1&\text{if}\quad b \quad\text{has a good input}\\ \deg(b)& \text{otherwise} \end{cases}\,, \] where $\deg$ denotes the degree of the corresponding node in $G'$. Note that if $G'$ has two parallel edges $(a,b)$, then we have $\deg(a)=\deg(b)=2$. For a node set $S\subseteq A\cup B$, we define the \emph{cost} of $S$ as the sum of costs of all the nodes in $S$, i.e., \[ \textsf{cost}(S):=\sum_{v\in S}\textsf{cost}(v)\,, \] and the \emph{effectiveness} of $S$ as the number of good inputs to the nodes in $S$ minus the number of bad outputs from the nodes in $S$, i.e., \[ \textsf{effect}(S):= \sum_{v\in S}\deg(v)-\textsf{cost}(S)\,. \] \begin{lemma}\label{lem:3cost} Let \(a\in A\) and \(b\in B\) be such that \(\textsf{OPT}(a) = b\). Then \(\textsf{cost}(\{a,b\}) \geq 2\) holds. Moreover, if $\deg(a)\geq 1$, then \(\textsf{cost}(\{a,b\}) \geq 3\) holds. \end{lemma} \begin{proof} One of the following is true: \begin{enumerate}[label*=\roman*.] \item \label{case0_lem:3cost} $\deg(a)=0$. \item \label{case1_lem:3cost} $\deg(a)\leq 1$ and $\deg(b)\leq 1$. \item \label{case2_lem:3cost} $\deg(a) = 2$ and $\deg(b)=0$. \item \label{case3_lem:3cost} $\deg(a) = 2$ and $\deg(b)\geq 1$. \item \label{case4_lem:3cost} $\deg(a) = 1$, $\deg(b) = 2$ and $b$ has a bad input or no input. \item \label{case5_lem:3cost} $\deg(a) = 1$, $\deg(b) = 2$ and $b$ has a good input. \end{enumerate} In Case~\eqref{case0_lem:3cost}, $a$ is unsuccessful. Since $(a,b)$ is an edge in $G$, $b$ rejected a proposal from $a$ at least once and so $b$ is popular. Thus, there are two distinct edges $(a',b)$, $(a'',b)$ in $G'$ such that $a\leq_b a'$ and $a\leq_b a''$. It is straightforward to check that neither $(a',b)$ nor $(a'',b)$ is a good input. Thus we have $\textsf{cost}(b)= 2$, implying the desired inequality of $\textsf{cost}(\{a,b\})\geq \textsf{cost}(b)=2$. In Case~\eqref{case1_lem:3cost}, $a$ is unsuccessful. Since $(a,b)$ is an edge in $G$, $b$ rejected a proposal from $a$ at least once and so $b$ is popular. However, $\deg(b)\leq1$ and so $b$ is not popular, contradiction. In Case~\eqref{case2_lem:3cost}, $a$ did not ever propose to $b$ during the algorithm. Thus in $G'$ there are two distinct edges $(a,b')$ and $(a,b'')$ with $b\leq_a b'$, $b\leq_a b''$. Since $\deg(b)=0$, one of the edges $(a,b')$, $(a,b'')$ is neither in $M$ nor in $\textsf{OPT}$, giving rise to a bad output from $a$. Thus, we have $\textsf{cost}(a)= 3$, implying $\textsf{cost}(\{a,b\})=3\geq 3$. In Case~\eqref{case3_lem:3cost}, we have \[ \textsf{cost}(\{a,b\})=\underbrace{\textsf{cost}(a)}_{\geq \deg(a)=2}+ \underbrace{\textsf{cost}(b)}_{\geq 1} \geq 2+1= 3\,, \] providing the desired inequality. In Case~\eqref{case4_lem:3cost}, we have \[ \textsf{cost}(\{a,b\})=\underbrace{\textsf{cost}(a)}_{\geq \deg(a)=1}+ \underbrace{\textsf{cost}(b)}_{= \deg(b)=2} \geq 1+2=3\,, \] providing the desired inequality. In Case~\eqref{case5_lem:3cost}, $a$ is unsuccessful. Since $(a,b)$ is an edge in $G$, $b$ rejected a proposal from $a$ at least once and so $b$ is popular. Let $(a',b)$ be the good input to $b$. Since $b$ rejected a proposal from $a$, we have that $a'\geq_b a$. Thus $b$ is popular, $\textsf{OPT}(b)=a$ is unsuccessful, and $a'\geq_b a$, showing that the input $(a',b)$ is a bad input, contradiction. \end{proof} \subsection{Connected components in $\textsf{OPT}+M$} In this section, we start to relate the ratio between $|\textsf{OPT}|$ and $|M|$ to the ratios between $|\textsf{OPT}\cap C|$ and $\textsf{cost}(C)$ for connected components in $\textsf{OPT}+M$. For simplicity of exposition, isolated nodes in $\textsf{OPT}+M$ are considered by us as connected components in $\textsf{OPT}+M$. \begin{lemma}\label{lem:low_cost} If \(|\textsf{OPT}| / |M| > 4/3\), then there exists a connected component \(C\) in \(\textsf{OPT} + M\) with \(\textsf{cost} (C) < 3 |\textsf{OPT} \cap C|\). \end{lemma} \begin{proof} Assume for contradiction that \(|\textsf{OPT}| / |M| > 4/3\) and that \(\textsf{cost} (C) \geq 3 |\textsf{OPT} \cap C|\) for all components \(C\). Then, we have \[ \sum_{C \in \textsf{OPT} + M} \textsf{cost} (C) \geq 3|\textsf{OPT}|\,, \] where the summation goes over the connected components in $\textsf{OPT} + M$. On the other side, $M$ is a maximum cardinality matching in the graph $G'=(A\cup B, E')$, where each node in $G'$ has degree at most $2$. Hence, \[ |M|\geq |E'|/2=\sum_{v\in A\cup B}\deg(v)/4\,. \] Moreover, we have \[ \sum_{C \in \textsf{OPT} + M} \textsf{effect}(C)=\textsf{effect}(A\cup B)\geq 0\,, \] where the inequality is due to Corollary~\ref{cor:total_effectiveness}. Combining the inequalities above, we obtain \begin{align*} 4|M|\geq \sum_{v\in A\cup B}\deg(v)-\textsf{effect}(A\cup B)=\textsf{cost}(A\cup B)=\sum_{C \in \textsf{OPT} + M} \textsf{cost} (C) \\\geq 3|\textsf{OPT}|\,, \end{align*} contradiction. \end{proof} \begin{remark}\label{rem:trivial_component} Let \(C\) be a connected component of $M+\textsf{OPT}$ which consists of a single node. Then we have \(\textsf{cost} (C) \geq 3 |\textsf{OPT} \cap C|\). \end{remark} \subsubsection{Alternating Paths, Alternating Cycles and $\textsf{OPT}$-Augmenting Paths}\label{sec:alternating_opt_augmenting} The following corollary of Lemma~\ref{lem:3cost} establishes an upper bound on the number of $\textsf{OPT}$ edges in a connected component of $M+\textsf{OPT}$ in terms of the component's cost, applying only to alternating paths, alternating cycles, and $\textsf{OPT}$-augmenting paths. Note that an edge which is in both $M$ and $\textsf{OPT}$ is considered by us to be a trivial alternating cycle if it corresponds to two parallel edges in~$G'$. \begin{corollary}\label{cor:nonaug} Let \(C\) be a connected component of $M+\textsf{OPT}$ that is an alternating path, alternating cycle, or $\textsf{OPT}$-augmenting path. Then we have \(\textsf{cost} (C) \geq 3 |\textsf{OPT} \cap C|\). \end{corollary} \begin{proof} Let \(C\) be a connected component of $M+\textsf{OPT}$ which is an alternating path, alternating cycle, or $\textsf{OPT}$-augmenting path. Then one of the following is true: \begin{enumerate}[label*=\roman*.] \item \label{case1_cor:nonaug} $C$ is an $\textsf{OPT}$-augmenting path of the form $a_0-b_1-\ldots-a_k-b_{k+1}$. \item \label{case2_cor:nonaug} $C$ is an alternating cycle of the form $a_1-b_1-\ldots-a_k-b_k-a_1$, where $(a_1,b_1)\in \textsf{OPT}$. \item \label{case3_cor:nonaug} $C$ is an alternating path of the form $b_1-a_1-\ldots-b_k-a_{k}-b_{k+1}$, where $a_1\in A$ and $(a_1,b_1)\in \textsf{OPT}$. \item \label{case4_cor:nonaug} $C$ is an alternating path of the form $a_1-b_1-\ldots-a_k-b_{k}-a_{k+1}$, where $a_1\in A$ and $(a_1,b_1)\in \textsf{OPT}$. \end{enumerate} In Cases~\eqref{case1_cor:nonaug}, \eqref{case2_cor:nonaug} and \eqref{case3_cor:nonaug}, by Lemma~\ref{lem:3cost}, for each $i=1,\ldots,k$ we have $\textsf{cost}(\{a_i,b_i\})\geq 3$. Thus, we have the desired inequality: \[ \textsf{cost} (C)\geq\sum_{i=1}^k \underbrace{\textsf{cost}(\{a_i,b_i\})}_{\geq 3} \geq 3 k=3 |\textsf{OPT} \cap C|\,. \] In Case~\eqref{case4_cor:nonaug}, by Lemma~\ref{lem:3cost}, for each $i=2,\ldots,k$ we have $\textsf{cost}(\{a_i,b_i\})\geq 3$ and also $\textsf{cost}(\{a_1,b_1\})\geq 2$. Since $\textsf{cost}(a_{k+1})\geq 1$, we have the desired inequality: \[ \textsf{cost} (C)=\underbrace{\textsf{cost}(a_{k+1})}_{\geq 1}+\underbrace{\textsf{cost}(\{a_1,b_1\})}_{\geq 2}+\sum_{i=2}^k \underbrace{\textsf{cost}(\{a_i,b_i\})}_{\geq 3}\geq 3 k=3 |\textsf{OPT} \cap C|\,. \] \end{proof} The next remark is an immediate consequence of Lemma~\ref{lem:3cost}. \begin{remark} An edge $(a,b)$ that exists in both $M$ and $\textsf{OPT}$ defines a connected component $C$ in $M+\textsf{OPT}$. If $(a,b)$ does not correspond to a parallel edge in $G'$, then $\textsf{cost}(C)\geq 3 =3| C\cap \textsf{OPT}|$. \end{remark} \subsubsection{$M$-Augmenting Path} In this section, we study connected components in $M+\textsf{OPT}$ which are $M$-augmenting paths. First, we state the result of Huang and Kavitha~\cite{HuangKavitha2015}, showing that there exists no $M$-augmenting path of length $1$ or of length $3$ in $M+\textsf{OPT}$. \begin{lemma}[\cite{HuangKavitha2015}] \label{lemma:three_path_original_paper} There is no $M$-augmenting path in $M+ \textsf{OPT}$ of length $1$ or of length $3$. \end{lemma} Now let us consider $M$-augmenting paths in $M+\textsf{OPT}$ of length at least~$5$. Given an $M$-augmenting path of the form $a_0-b_0-a_1-\ldots-a_k-b_k$ with $a_0\in A$, for $i=0,\ldots,k-1$ we say that \emph{$b_i$ points right} if one of the following is true: \begin{itemize} \item \(a_{i+1}>_{b_i} a_i\). \item \(a_{i+1}\simeq_{b_i} a_i\) and at the end of the algorithm \(a_{i+1}\) is not basic. \end{itemize} \begin{lemma}\label{lem:interior} Let $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. Then for every $i=1,\ldots, k-1$, at least one of the following is true: \begin{enumerate} \item \label{case1_lem:interior_state} \(\textsf{cost}(\{a_i, b_i\}) \geq 4\). \item \label{case2_lem:interior_state} \(b_i\) rejected a proposal from \(a_i\) during the algorithm and $b_i$ points right. \item \label{case3_lem:interior_state} \(b_{i-1}\) did not reject any proposals from \(a_{i-1}\) during the algorithm. \item \label{case4_lem:interior_state} at the end of the algorithm, \(a_i\) is basic and \(b_{i-1} >_{a_i} b_i\). \end{enumerate} \end{lemma} \begin{proof} Clearly, the edges \((a_{i}, b_{i-1})\) and \((a_{i+1}, b_i)\) exist in \(G'\) since these edges exist in \(M\). Thus we have \(\deg(a_i)\geq 1\) and \(\deg(b_i)\geq 1\). Moreover, since the edge \((a_i,b_i)\) exists in \(G\), at least one of the following is true: \(\deg(a_i)\geq 2\) or \(\deg(b_i)\geq 2\). Hence, it is enough to consider the following cases: \begin{enumerate}[label*=\roman*.] \item \label{case0_lem:interior} \(\deg(a_i) = 1\) and \(\deg(b_i)=2\). \item \label{case1_lem:interior} \(\deg(a_i) = 2\). \begin{enumerate}[label*=\roman*.] \item\label{case10_lem:interior} $b_i$ rejected a proposal from $a_i$ during the algorithm. \begin{enumerate}[label*=\roman*.] \item\label{case101_lem:interior} $b_i$ has no good input. \item\label{case102_lem:interior} $b_i$ has a good input. \end{enumerate} \item\label{case11_lem:interior} there is an edge \((a_i, b_i)\) in $G'$. \item\label{case13_lem:interior} $a_i$ has a bad output. \item\label{case14_lem:interior} $a_i$ has a good output; $b_i$ did not reject any proposals from $a_i$ during the algorithm. \end{enumerate} \end{enumerate} We would like to note that while the above cases are not mutually exclusive, they cover all the possibilities. In Case~\eqref{case0_lem:interior}, \(a_i\) is unsuccessful. Thus, $b_i$ rejected a proposal from $a_i$ as a $2$-promoted man. On the other hand, at the end of the algorithm $b_i$ has a proposal from $a_{i+1}$, implying \eqref{case2_lem:interior_state}. In Case~\eqref{case101_lem:interior}, we have $\deg(b_i)=2$, since $b_i$ rejected a proposal from $a_i$ during the algorithm. Since $b_i$ has no good input, we have $\textsf{cost}(b_i)=\deg(b_i)=2$. Thus, we have \[ \textsf{cost}(\{a_i,b_i\})=\underbrace{\textsf{cost}(a_i)}_{\geq \deg(a_i)=2}+\underbrace{\textsf{cost}(b_i)}_{=2}\geq 4\,, \] implying~\eqref{case1_lem:interior_state}. In Case~\eqref{case102_lem:interior}, $b_i$ is popular, since $b_i$ rejected a proposal during the algorithm. Let $(a',b_i)$ be a good input to $b_i$. Since $(a',b_i)$ is a good input to $b_i$, we have $a_i\geq_{b_i}a'$ and $a'\neq a_i$. Since during the algorithm $b_i$ rejected a proposal from $a_i$, but at the end of the algorithm has proposals from $a_{i+1}$ and $a'$, we have $a_i\leq_{b_i}a_{i+1}$ and $a_i\leq_{b_i}a'$. Because $a_i\geq_{b_i}a'$ and $a_i\leq_{b_i}a'$, we have $a_i\simeq_{b_i}a'$. Since $a_i\leq_{b_i}a_{i+1}$, $a_i\simeq_{b_i}a'$, $a'\neq a_i$ and ties are of size $2$, we either have $a_i<_{b_i}a_{i+1}$ or $a'= a_{i+1}$. If we have $a_i<_{b_i}a_{i+1}$, then \eqref{case2_lem:interior_state} holds. If $a'= a_{i+1}$ then at some point $b_i$ rejected a proposal of $a_i$ while at the end of the algorithm $b_i$ holds two proposals of $a_{i+1}$. If $a_{i+1}$ is basic, this contradicts the special case for the rejection step, because $a_i\simeq_{b_i}a_{i+1}$. Then $a_{i+1}$ is not basic, implying that $b_i$ points right and thus \eqref{case2_lem:interior_state}. In Case~\eqref{case11_lem:interior}, \(\textsf{cost}(a_i) = 2\) and \(\textsf{cost}(b_i) = 2\), so \(\textsf{cost}(\{a_i, b_i\}) =4\), implying~\eqref{case1_lem:interior_state}. In Case~\eqref{case13_lem:interior}, we have $\textsf{cost}(b_i)\geq 1$, since $b_i$ is matched by $M$ and hence $\deg(b_i) \geq 1$. We also have $\textsf{cost}(a_i)=\deg(a_i)+1=3$, since $a_i$ has a bad output. Thus, $\textsf{cost}(\{a_i,b_i\})=\textsf{cost}(a_i)+\textsf{cost}(b_i)\geq 4$, showing \eqref{case1_lem:interior_state}. In Case~\eqref{case14_lem:interior}, let $(a_i,b')$ be the good output from $a_i$. Since $b_i$ did not reject any proposals from $a_i$ during the algorithm, we have that $a_i$ is basic and also that $b_i\leq_{a_i}b_{i-1}$ and $b_i\leq_{a_i}b'$ hold. Since $a_i$ is basic and $(a_i,b')$ is a good output from $a_i$, we have that $b'\neq b_i$ and $b_i\geq_{a_i}b'$, and thus $b_i\simeq_{a_i}b'$. Since $b'\neq b_i$, $b_i\simeq_{a_i}b'$, $b_i\leq_{a_i}b_{i-1}$, and ties are of size two, we have $b_i<_{a_i}b_{i-1}$, implying~\eqref{case4_lem:interior_state}. \end{proof} \begin{corollary}\label{cor:induction} Let $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. Then, for every $i=1,\ldots, k-1$ such that \(\textsf{cost}(\{a_i, b_i\}) = 3\), we have that if \(b_{i-1}\) rejected a proposal from \(a_{i-1}\) during the algorithm and \(b_{i-1}\) points right, then \(b_i\) rejected a proposal from \(a_i\) during the algorithm and \(b_i\) points right. \end{corollary} \begin{proof} By Lemma~\ref{lem:interior}, we have that at least one of the following statements is true: \begin{enumerate}[label*=\roman*.] \item \label{case1_cor:induction} \(\textsf{cost}(\{a_i, b_i\}) \geq 4\). \item \label{case2_cor:induction} \(b_i\) rejected a proposal from \(a_i\) during the algorithm and $b_i$ points right. \item \label{case3_cor:induction} \(b_{i-1}\) did not reject any proposal from \(a_{i-1}\) during the algorithm. \item \label{case4_cor:induction} at the end of the algorithm \(a_i\) is basic and \(b_{i-1} >_{a_i} b_i\). \end{enumerate} In Case~\eqref{case1_cor:induction}, we have a contradiction to \(\textsf{cost}(\{a_i, b_i\}) =3\). In Case~\eqref{case3_cor:induction}, we have a contradiction to the fact that \(b_{i-1}\) rejected a proposal from \(a_{i-1}\) during the algorithm. Let us consider Case~\eqref{case4_cor:induction}. Since $a_i$ is basic and $b_{i-1}$ points right, we have \(a_i >_{b_{i-1}} a_{i-1}\). Thus, we have \(a_i >_{b_{i-1}} a_{i-1}\) and \(b_{i-1} >_{a_i} b_i\), showing that \((a_i, b_{i-1})\) is a blocking pair for \(\textsf{OPT}\), contradicting the stability of $\textsf{OPT}$. In Case~\eqref{case2_cor:induction}, we obtain the desired statement immediately. \end{proof} \begin{lemma}\label{lem:start} Let $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. Then, we have \(\textsf{cost}(\{a_0, b_0\}) \geq 2\). Moreover, \(b_0\) rejected a proposal from \(a_0\) during the algorithm and \(b_0\) points right. \end{lemma} \begin{proof} Clearly, \(a_0\) is not matched by \(M\) and so \(a_0\) is unsuccessful. Thus, \(b_0\) rejected a proposal from \(a_0\) as a $2$-promoted man. Hence, $b_0$ is popular and if $(a,b_0)$ is an edge in $G'$ then $a\geq_{b_0} a_0=\textsf{OPT}(b_0)$. This demonstrates that \(b_0\) has no good input, and so \(\textsf{cost}(\{a_0, b_0\}) \geq \textsf{cost}(b_0) = 2\). Now, at some point during the algorithm $b_0$ rejected a proposal from $a_0$ as a $2$-promoted man, but at the end of the algorithm $b_0$ has a proposal from $a_1$, showing that $b_0$ points right and finishing the proof. \end{proof} \begin{remark}\label{rem:lastfour} Let $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. Then, we have \(\textsf{cost}(\{a_k,b_k\}) \geq 3\). \end{remark} \begin{proof} Clearly, $b_k$ is not matched by $M$ and so $b_k$ is unsuccessful. Hence, $a_k$ is basic and $a_k$ is successful. If at the end of the algorithm $b_k$ holds a proposal from $a_k$, then $b_k$ has no input. Thus, $\textsf{cost}(b_k)=\deg(b_k)=1$ and $\textsf{cost}(a_k)=\deg(a_k)=2$, showing that $\textsf{cost}(\{a_k,b_k\})\geq 3$. If at the end of the algorithm $b_k$ holds no proposal from $a_k$, then $a_k$ has an output $(a_k,b')$ with $b'\geq_{a_k} b_k$. Thus, $(a_k,b')$ is a bad output, implying that $\textsf{cost}(a_k)=\deg(a_k)+1=3$. \end{proof} \begin{lemma}\label{lem:end} Let $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. If \(b_{k-2}\) rejected a proposal from \(a_{k-2}\) during the algorithm and \(b_{k-2}\) points right, then \(\textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, b_k\}) \geq 7\). \end{lemma} \begin{proof} For the proof of the lemma it is enough to consider following cases \begin{enumerate}[label*=\roman*.] \item \label{case1_lem:end} $b_{k-1}$ did not reject any proposals from $a_{k-1}$ during the algorithm. \item \label{case2_lem:end} $b_{k-1}$ rejected a proposal from $a_{k-1}$ during the algorithm. \begin{enumerate}[label*=\roman*.] \item \label{case21_lem:end} there are two parallel edges \((a_k, b_{k-1})\) in $G'$. \item \label{case22_lem:end} there is an edge \((a_{k-1}, b_{k-1})\) in $G'$. \item \label{case23_lem:end} there is an edge $(a',b_{k-1})$ in $G'$ such that $a'\neq a_{k-1}$ and $a'\neq a_k$. \end{enumerate} \end{enumerate} In Case~\eqref{case1_lem:end}, since $b_{k-1}$ did not reject any proposal from $a_{k-1}$ during the algorithm, we have that $a_{k-1}$ is basic and $M(a_{k-1})=b_{k-2}\geq_{a_{k-1}} b_{k-1}$. Since $a_{k-1}$ is basic and $b_{k-2}$ points right, we have $a_{k-1}>_{b_{k-2}} a_{k-2}$. Moreover, we have $b_{k-2}\leq_{a_{k-1}} b_{k-1}$, since otherwise $(a_{k-1},b_{k-2})$ is a blocking pair for $\textsf{OPT}$, contradicting the stability of $\textsf{OPT}$. Because $b_{k-2}\geq_{a_{k-1}} b_{k-1}$ and $b_{k-2}\leq_{a_{k-1}} b_{k-1}$ hold, we have $b_{k-2}\simeq_{a_{k-1}} b_{k-1}$. The forwarding step excludes the possibility of $b_{k-2}$ having two proposals from $a_{k-1}$ at the end of the algorithm while also having rejected a proposal at some point during the algorithm. On the other hand, we have that $a_{k-1}$ is basic and by the statement of the lemma $b_{k-2}$ rejected a proposal from $a_{k-2}$ during the algorithm, showing that there exists an edge $(a_{k-1},b')$ in $G'$ such that $b'\neq b_{k-2}$. Since $b_{k-1}$ did not reject any proposal from $a_{k-1}$ during the algorithm, we have $b'\geq_{a_{k-1}} b_{k-1}$. Now, because $b'\geq_{a_{k-1}} b_{k-1}$, $b_{k-2}\simeq_{a_{k-1}} b_{k-1}$, $b'\neq b_{k-2}$, and ties are of size two, we have that either $b'=b_{k-1}$ or $b'>_{a_{k-1}} b_{k-1}$. If $b'=b_{k-1}$, we have $\textsf{cost}(a_{k-1})=\deg(a_{k-1})=2$ and $\textsf{cost}(b_{k-1})=\deg(b_{k-1})=2$, implying the desired inequality \[ \textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, b_k\})\geq \underbrace{\textsf{cost}(a_{k-1})}_{= 2}+\underbrace{\textsf{cost}(b_{k-1})}_{=2}+\underbrace{\textsf{cost}(\{a_k,b_k\})}_{\substack{\geq 3\\\text{by Remark~\ref{rem:lastfour}}}}\geq7\,. \] If $b'>_{a_{k-1}} b_{k-1}$, then $(a_{k-1},b')$ is a bad output from $a_{k-1}$, because $a_{k-1}$ is basic. Hence, $\textsf{cost}(a_{k-1})=\deg(a_{k-1})+1=3$ and $\textsf{cost}(b_{k-1})\geq 1$, since $b_{k-1}$ is matched by $M$. This also gives us the desired inequality \[ \textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, b_k\})\geq \underbrace{\textsf{cost}(a_{k-1})}_{= 3}+\underbrace{\textsf{cost}(b_{k-1})}_{\geq 1}+\underbrace{\textsf{cost}(\{a_k,b_k\})}_{\substack{\geq 3\\\text{by Remark~\ref{rem:lastfour}}}}\geq 7\,. \] In Case~\eqref{case21_lem:end}, since at the end of the algorithm $b_{k-1}$ holds two proposals from $a_k$, who is basic, and at some point of the algorithm $b_{k-1}$ rejected a proposal from $a_{k-1}$, we have that $a_k\geq _{b_{k-1}} a_{k-1}$. The special case of the rejection step excludes the possibility that $a_k\simeq _{b_{k-1}} a_{k-1}$, implying that $a_k> _{b_{k-1}} a_{k-1}$. However, $b_k$ is unsuccessful and there is an edge $(a_k,b_{k-1})$ in $G'$, hence $a_k$ is basic and $b_{k-1}\geq_{a_k} b_k$. If $b_{k-1}>_{a_k} b_k$, then $(a_k, b_{k-1})$ is a blocking pair for $\textsf{OPT}$, contradicting the stability of $\textsf{OPT}$. Thus, we have $b_{k-1}\simeq_{a_k} b_k$. But by Remark~\ref{rem:bouncing_step}, $b_{k-1}\simeq_{a_k} b_k$ and $\deg(b_k)=1$ together with the bouncing step excludes the possibility that $b_{k-1}$ rejects any proposal during the algorithm and also holds two proposals from $a_k$ at the end, contradiction. In Case~\eqref{case22_lem:end}, we have $\textsf{cost}(a_{k-1})=\deg(a_{k-1})=2$ and $\textsf{cost}(b_{k-1})=\deg(b_{k-1})=2$, implying the desired inequality \[ \textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, b_k\})\geq \underbrace{\textsf{cost}(a_{k-1})}_{= 2}+\underbrace{\textsf{cost}(b_{k-1})}_{=2}+\underbrace{\textsf{cost}(\{a_k,b_k\})}_{\substack{\geq3\\\text{by Remark~\ref{rem:lastfour}}}}\geq7\,. \] In Case~\eqref{case23_lem:end}, since at the end of the algorithm $b_{k-1}$ has proposals from $a'$ and $a_{k}$ and at some point of the algorithm $b_{k-1}$ rejected a proposal from $a_{k-1}$, we have $a_k \geq_{b_{k-1}} a_{k-1}$ and $a' \geq_{b_{k-1}} a_{k-1}$. Since $a'\neq a_{k-1}$ and $a'\neq a_k$ and ties are of size two, we have either $a_k >_{b_{k-1}} a_{k-1}$ or $a' >_{b_{k-1}} a_{k-1}$. If $a_k >_{b_{k-1}} a_{k-1}$, then we have $b_{k-1}\leq_{a_k} b_k$, since otherwise $(a_k, b_{k-1})$ is a blocking pair for $\textsf{OPT}$, contradicting the stability of $\textsf{OPT}$. On the other side, $b_k$ is unsuccessful and an edge $(a_k, b_{k-1})$ exists in $G'$, so we have $b_{k-1}\geq_{a_k} b_k$. Thus, we have $b_{k-1}\simeq_{a_k} b_k$. However, by Remark~\ref{rem:bouncing_step}, $b_{k-1}\simeq_{a_k} b_k$ and $\deg(b_k)=1$ together with the bouncing step exclude the possibility that $b_{k-1}$ rejects any proposal during the algorithm but at the end of the algorithm has a proposal from $a_k$, contradiction. Let us now consider the case when $a' >_{b_{k-1}} a_{k-1}$ and $a_k \simeq_{b_{k-1}} a_{k-1}$. Then $(a', b_{k-1})$ is a bad input to $b_{k-1}$, because $a'\neq a_{k-1}$, $a'\neq a_k$, $a' >_{b_{k-1}} a_{k-1}$ and $b_{k-1}$ rejected a proposal during the algorithm. Hence, we have $\textsf{cost}(b_{k-1})=\deg(b_{k-1})=2$. Also due to the fact that $a_k \simeq_{b_{k-1}} a_{k-1}$ and the fact that at the end of the algorithm $b_{k-1}$ has a proposal from $a_k$ as a basic man, we have that $a_{k-1}$ is successful. Since $a_{k-1}$ is successful, we have $\textsf{cost}(a_{k-1})\geq \deg(a_{k-1})=2$, implying the desired inequality \[ \textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, b_k\})\geq \underbrace{\textsf{cost}(a_{k-1})}_{\geq 2}+\underbrace{\textsf{cost}(b_{k-1})}_{=2}+\underbrace{\textsf{cost}(\{a_k,b_k\})}_{\substack{\geq3\\\text{by Remark~\ref{rem:lastfour}}}}\geq7\,. \] \end{proof} \begin{lemma}\label{lem:aug} Let \(C\) be a connected component of $M+\textsf{OPT}$ which is an $M$-augmenting path of length at least $5$. Then, we have \(\textsf{cost} (C) \geq 3 |\textsf{OPT} \cap C|\). \end{lemma} \begin{proof} Let $C$ be of the form $a_0-b_0-a_1-\ldots-a_k-b_k$ be an $M$-augmenting path in $M+ \textsf{OPT}$ of length $2k+1$, $k\geq 2$, where $a_0\in A$. Then, we have \begin{align*} \textsf{cost}(C)=\underbrace{\textsf{cost}(\{a_0,b_0\})}_{\substack{\ge 2\\\text{by Lemma~\ref{lem:start}}}}+\sum_{i=1}^{k-1} \underbrace{\textsf{cost}(\{a_i,b_i\})}_{\substack{\ge 3\\\text{by Lemma~\ref{lem:3cost}}}}+ \underbrace{\textsf{cost}(\{a_k,b_k\})}_{\substack{\ge 3\\\text{by Remark~\ref{rem:lastfour}}}}\geq 2+3(k-2)+3\\=3k-1=3|\textsf{OPT}|-1\,. \end{align*} By Lemma~\ref{lem:start} and Corollary~\ref{cor:induction}, the above inequality is tight only if for each $i=0,\ldots,k-2$ we have that \(b_i\) rejected a proposal from \(a_i\) during the algorithm and $b_i$ points right. However, in that case, we have $\textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, a_k\})\geq 7$ by Lemma~\ref{lem:end}, implying the desired inequality \begin{align*} \textsf{cost}(C)=\underbrace{\textsf{cost}(\{a_0,b_0\})}_{\substack{\ge 2\\\text{by Lemma~\ref{lem:start}}}}+\sum_{i=1}^{k-2} \underbrace{\textsf{cost}(\{a_i,b_i\})}_{\substack{\ge 3\\\text{by Lemma~\ref{lem:3cost}}}}+ \underbrace{\textsf{cost}(\{a_{k-1}, b_{k-1}, a_k, a_k\})}_{\ge7}\geq\\ 2+3(k-3)+7=3k=3|\textsf{OPT}|\, \end{align*} and finishing the proof. \end{proof} Our main theorem directly follows from Remark~\ref{rem:trivial_component}, Corollary~\ref{cor:nonaug}, Lemma~\ref{lem:low_cost}, Lemma~\ref{lemma:three_path_original_paper} and Lemma~\ref{lem:aug}. \begin{theorem}\label{thm:main} \(|\textsf{OPT}| / |M| \leq 4/3\). \end{theorem} The next example demonstrates that the bound in Theorem~\ref{thm:main} is tight. In the description of this example we closely follow the description style from~\cite{Bauckholt}. \begin{example} In Figure~\ref{figure: tight_instance}, the circle nodes represent men and the square nodes represent women. The solid lines represent the edges in $G'$. The arrow tips indicate the preferences of each person. For example, $b_0$ has double-tipped arrows pointing to $a_1$ and $a_3$ and a single-tipped arrow pointing to $a_0$, so $b_0$ is indifferent between $a_1$ and $a_3$ and prefers both to $a_0$. It is straightforward to verify that there exists a unique maximum cardinality stable matching, namely $\textsf{OPT}=\{(a_0,b_0), (a_1,b_1), (a_2,b_2), (a_3,b_3)\}$. We can prove that there exists an execution of the algorithm with the above intermediate graph $G'$. Hence, for this execution one of the possible outputs is the matching $M=\{(a_1,b_0), (a_2, b_1),(a_3, b_3)\}$, leading to the ratio $|\textsf{OPT}| / |M| = 4/3$. \begin{figure} \begin{center} \begin{tikzpicture}[scale=1.7] \tikzstyle{every node}=[rectangle, fill = black!30!white, draw = black, minimum size = 8pt, line width = 0.7pt] \tikzstyle{edge}=[> = angle 90, shorten >= 2pt, shorten < = 2pt, line width = 0.7pt] \tikzstyle{man}=[circle] \node[label=below:$a_0$, man] (a0) at (0, 0) {}; \node[label=below:$a_1$, man] (a1) at (1, 0) {}; \node[label=below:$a_2$, man] (a2) at (2, 0) {}; \node[label=below:$a_3$, man] (a3) at (3, 0) {}; \node[label=$b_0$] (b0) at (0, 1) {}; \node[label=$b_1$] (b1) at (1, 1) {}; \node[label=$b_2$] (b2) at (2, 1) {}; \node[label=$b_3$] (b3) at (3, 1) {}; \draw[edge, dashed, >-<] (b0) -- (a0); \draw[edge, >>-<] (b0) -- (a1); \draw[edge, >-<] (b1) -- (a1); \draw[edge, >-<<] (b1) -- (a2); \draw[edge, dashed, >-<] (b2) -- (a2); \draw[edge, >-<<] (b3) -- (a2); \draw[edge, >-<] (b3) -- (a3); \draw [edge, >>-<] (b0) to [out=225, in=90] (-.5,0) to [out=270, in=225] (a3); \end{tikzpicture} \end{center} \caption{An instance for which the algorithm in~\cite{HuangKavitha2015} outputs a stable matching $M$ with $|\textsf{OPT}| / |M| = 4/3$. } \label{figure: tight_instance} \end{figure} \end{example} \begin{proof} Let us provide an execution of the algorithm leading to the above intermediate graph $G'$. \begin{itemize} \item $a_3$ proposes to $b_3$; $b_3$ accepts. \item $a_3$ proposes to $b_0$; $b_0$ accepts. \item $a_2$ proposes to $b_3$; $b_3$ accepts. \item $a_2$ proposes to $b_1$; $b_1$ accepts. \item $a_1$ proposes to $b_1$; $b_1$ accepts. \item $a_1$ proposes to $b_0$; $b_0$ accepts. \item $a_0$ starts to propose to $b_0$, but each time $a_0$ makes a proposal, the proposal is rejected. $a_0$ gives up. \end{itemize} \end{proof} \section*{Acknowledgements} We would like to thank Laura Sanit\`{a} for suggesting us the maximum cardinality stable matching problem with ties of size two. \bibliographystyle{plain} \newpage
\section{Introduction} A Multilayer Perceptron is a multidimensional universal function approximator \cite{cybenko1989approximation} that learns a mapping between an input and an output. However, the black box problem stresses that it is ordinarily a challenge to understand what the network exactly learns. One advantage of classical handcrafted approaches is to be able to guarantee a perfectly predictable behavior. This is critical for some areas like medicine or aviation. Deep Neural Networks (DNN) inherit some issues of Multilayer Perceptron and particularly the black box problem. However, is it possible to obtain a more explainable AI based on DNN? Our motivation is to propose some methods and properties that help users and designers to understand more formally the behavior of DNNs. In this article our main contributions are the followings: \begin{itemize} \item We propose a new methodology that is the Psychophysics on Deep Neural Networks. \item We formalize and quantify some important properties of the Deep Neural Networks. \item We show an extensive experimental comparison illustrating that the mentioned properties are followed by eight state-of-the-art deep neural networks. \item We propose a new strategy, called Deepception, based on the formalized properties and capable of fooling a deep neural network, even if its architecture is unknown. \end{itemize} \begin{figure}[t] \centering \includegraphics[width=1\linewidth]{first_page.png} \caption{Depiction of the Deepception's pipeline. It uses all the four properties reported in this paper: the local, spatial, cumulative and activation-inhibition properties. We extract a sub-part of the opponent image called the patch. Then, we insert the patch into the target at positions where it is imperceptible to human eyes. The resulting perturbed image is misclassified by the Deep Neural Network.} \label{fig:first_Page} \end{figure} \section{Related works} Deep neural networks exhibit the best performances for image classification with different datasets like ImageNet\cite{deng2009imagenet,ILSVRC15,krizhevsky2012imagenet,simonyan2014very,he2016deep} or Pascal VOC for recognition and detection \cite{ren2015faster}. However, one of the principal limitations is the lack of understanding of what the networks are really learning. This is usually referred as the black box problem. This problem leads to some limitations. One is related to the reliability of the probability. As pointed out by Gal and Gharamani (2016) \cite{gal2016dropout} the standard deep learning tools designed for regression and classification do not effectively capture model uncertainty. They argue that the probability, that is the output of the network, cannot be considered as the confidence of the model. However, for some critical software like autopilot or medical software, it is a requirement to have an accurate estimation of this uncertainty. Another limitation is related to predictability. It is indeed very difficult to understand why some objects are recognized and others are not. To illustrate this issue, Nguyen et al. (2015) \cite{nguyen2015deep} show that some abstract geometric patterns could lead the network to recognize an object not present in the image. They also show that a periodic pattern is sufficient to mislead a deep neural network. The fooling is also a critical issue. It is shown that with a small magnitude adversarial noise, it is possible to change the ranking of the classes \cite{moosavi2016deepfool,moosavi2016universal,lin2017tactics}. Even a random noise can provoke the same effect \cite{fawzi2016robustness}. In the classical scientific approach, scientists are able to quantify and understand some parameters or properties that have an important impact on the results. Deep neural networks are more complex and the non-linearity of the processes seems to prevent any thorough analysis. Some studies address this question of black box by visualizing the filters of the networks \cite{zeiler2014visualizing}. Other ones visualize and analyze the different layers of the network, to discover the pixel that have a more relevant impact on the classification \cite{yosinski2015understanding,binder2016analyzing,nguyen2016multifaceted,samek2017evaluating}. These approaches are not using patches and can be considered as neurophysiological approaches for DNN in our formalism. This paper uses a totally different approach based on methodological reductionism. The goal is to identify some fundamental properties of deep neural networks. This novel approach can be compared to Psychophysics \cite{fechner1860elemente,stevens1960psychophysics,henn1975ernst}. The observation of thresholds of perception related to physical stimuli is replaced by the monitoring of the probability score of a class related to the manipulation of some visual inputs. One consequence is that no prior knowledge about the architecture of the network is required and the method can be applied to any deep neural network. \section{Our approach} In this paper, we formalize some properties that have an important impact on DNNs: \begin{itemize} \item An image can be sub-divided into a group of regions responding at different levels of probability. The size of the patch is related to the probability. We called it: the Local property. \item When an identical patch is positioned at different locations of an image, its probability varies. We called it: the Spatial property. \item The repetition of the same patch can increase (or decrease) the probability of recognition of an object. This repetition can be added at different location of the image. We called it: the Cumulative property. \item Cumulative property can have an activator or inhibitor behavior related to the location of the next patch. This location of activation and inhibition is not related to the initial spatial probability with one patch. We called it: the Activation-Inhibition property. \end{itemize} \section{Methodology} The psychophysical-driven approach proposed in this paper highlights the existence of the four properties. Our strategy is to modify a physical aspect of the image inserted into the deep neural network and observe how its probability varies accordingly to the modification we made. The main concern of this study is the relationship between the network's input and its output. Consequently, the approach presented in this paper does not require a prior knowledge of the targeted deep neural network architecture. \subsection{Deep neural networks models} In order to investigate the generalization of the four properties, we decide to run the experiments on eight state-of-the-art deep neural networks applied to Pascal VOC 2007 and ILSVRC 2012 ImageNet datasets. We consider the following architectures on \textbf{Pascal VOC 2007} three MatConvnet pre-trained networks: Caffenet, VGG16 and VGGM12\footnote{Their mean Average Precisions are 57.3\%, 67.3\% and 59.4\% respectively.}. We refer to this ensemble of models as "Fast-RCNN networks". On \textbf{ILSVRC 2012 ImageNet}, we consider five MatConvnet pre-trained networks: GoogleLeNet, ResNet152, Vgg-f, Vgg-Verydeep-16 and Vgg-Verydeep-19\footnote{Their top-1 error rates are 34.2\%, 23\%, 41.1\%, 28.5\% and 28.7\% respectively.}. We call this set of models "ImageNet networks" throughout the paper. \subsection{Object categories} We choose from Internet the images of objects used in the experiments. They are all grayscale images. This paper is dealing with two different architectures of deep neural networks: Pascal VOC 2007 and ILSVRC 2012 ImageNet. Consequently, it is important to take objects belonging to two distinct sets of categories. The categories chosen for Pascal are: \textit{bird, person, cat, cow, dog, horse, sheep, airplane, bicycle, bus, car, motorbike, train, bottle, chair, dining table, potted plant, sofa, tv monitor, boat.} For ImageNet, we pick a subset of the 1000 categories of ImageNet. These 20 categories are displayed in the Figure \ref{fig:patches}. We take a subset because processing the entire set would be computationally expensive. However, we respect the same object-type proportions than the Pascal categories: eight categories correspond to biological objects (i.e. bison, daisy or bald eagle) and twelve are manufactured (i.e. airliner, bullet train or cab). The patches are extracted with the following method. For the 8 deep neural networks and the 20 selected categories, we choose four different grayscale images. To minimize the effects related to the size of the images, we start by resizing the input images 600x600 pixels if the DNN is a Fast-RCNN network and 224x224 pixels if it is an ImageNet networks. We create several sliding cropping windows which sizes depend on the tested DNN and do not overlap each other: 50x50,100x100,150x150, 200x200 pixels If the DNN is a Fast-RCNN network and 37x37, 56x56, 75x75, 112x112 pixels if the DNN is an ImageNet one. The deep neural network assigns a probability and a label each cropped patch. Then, the algorithm selects among all the patches extracted from the four images, the one having the best probability for the category of the object. In the end of the process, we will have in total 20 patches for each DNN. Figure \ref{fig:patches} gives an example of extracted patches for the VGG-VDD-19 network and their probability. \section{Results} \subsection{Local property} A patch is a sub-part of the image. It has two principal characteristics: a size and a probability belonging to a specific category. Different patches have different probabilities. This is illustrated in Figure \ref{fig:patches} were we display after an exhaustive research the patches that answered with the highest probability. A second observation is that the probability for a given patch is not scale invariant (see Figure \ref{fig:scale}). Moreover this probability is very different if the patch is resized before being sent to the network (Figure \ref{fig:scale}) with a range between 5 and 99 percent or if the patch is not resized and sent with all the other pixel put at zero (Figure \ref{fig:add_pixel_pixel_surf}) with a range between 0.6 and 1.5 $10^{-4}$. \begin{figure}[t] \centering \includegraphics[width=0.8\linewidth,height=3.5cm]{patches.png} \caption{Patches extracted by our system using the VGG-VDD-19 network. The labels underneath correspond to the classes they belong to. Most of them are not directly recognizable by a human.} \label{fig:patches} \end{figure} \begin{figure} \centering \subfloat[Fast-RCNN CNNs]{% \includegraphics[width=0.5\linewidth]{probas_fast.pdf}% \label{fig:pascal_scale}% }\hfill \subfloat[ImageNet CNNs]{% \includegraphics[width=0.5\linewidth]{probas_imagenet.pdf}% \label{fig:imagenet_scale}% } \caption{Average probabilities of the patches for each deep neural network for different scales.} \label{fig:scale} \end{figure} Figure \ref{fig:scale} shows how the average probability of the patches vary according to their sizes. Bigger patches have higher probabilities, however it is still possible with a relatively small patch to obtain an important probability. For the rest of the experiments, we decided to take patches of size 150x150 and 56x56 pixels for the Fast-RCNN networks and ImageNet respectively. We chose these sizes because they are challenging to recognize by humans, and at the same time, correctly detected by the DNNs. \subsection{Spatial property} To demonstrate whether DNNs answer differently for different location of the patch inside an image, we create a black image (i.e. all the pixels have values equal to zero) of size 600x600 pixels (if we use a Faster-RCNN network) or 224x224 pixels (if we are using an ImageNet network). Then, we add in a pixel-wise fashion the patch by the corresponding region of the black image where it should be positioned. We iterate until we reach the end of the image. We decided to perform on one image a dense mapping to observe the effect of location on the probability. The patch is a 150X150 patch of a cat detected initially at 99\% by the Fast-RCNN-VGG16 network. This procedure takes a long time and cannot be performed on many images. Figure \ref{fig:add_pixel_pixel_surf} gives an interesting evaluation of how extreme the differences of probability can be. With the same patch, the range of probability was from 0.6 and 1.5 $10^{-4}$. The ratio between the maximum and minimum is 3769 (i.e. the maximum probability is 3769 times higher than the minimum probability). \begin{figure}[H] \centering \includegraphics[width=0.7\linewidth,height=3.5cm]{add_pixel_surf.pdf} \caption{Evolution of the probability according to a (150X150) patch position on the 600x600 black image. The high ratio ($Proba_{max}/Proba_{min}$),3769,indicates that Fast-RCNN-VGG16 is sensitive to the spatial property.} \label{fig:add_pixel_pixel_surf} \end{figure} To be more exhaustive and to test more networks, we decided to run this experiment on many images and with many patches but less densely (no overlap of the patch), i.e. 16 positions for a 150X150 patch on a 600X600 image. The max-min ratio for different networks can be observed in Table \ref{tab:spatial_table}. For some categories, deep neural networks are very sensitive to the spatial property. Notice that a state-of-the-art neural network as ResNet-152 can be extremely sensitive to the spatial property. For the 'moped' category, the maximum probability is 10000 higher than the minimum. Using this procedure, we observe that all the ratios between the region that maximize and minimize the patch probability are always higher than 1. We report in Table \ref{tab:spatial_table} the average ratios for all the deep neural networks. We can notice that there are different degrees of sensitivity to the spatial property. However, the most sensitive DNN to the spatial property is ResNet-152. In that case, the maximum probability is 2262 times higher than the lowest. \begin{table}[t] \begin{center} \begin{tabular}{c c c c} \Xhline{2.5\arrayrulewidth} {\scriptsize Deep neural network} & {\scriptsize Avg. Ratio} & {\scriptsize Avg. Maximum} & {\scriptsize Avg. Minimum} \\ \hline {\scriptsize Fast-RCNN-CaffeNet} & {\scriptsize156.98} & {\scriptsize 0.0047} & {\scriptsize 0.00003}\\ {\scriptsize Fast-RCNN-VGG16} & {\scriptsize 572.35} & {\scriptsize 0.0007} & {\scriptsize 0.000001}\\ {\scriptsize Fast-RCNN-VGGM12} & {\scriptsize 1237.35} & {\scriptsize 0.0005} & {\scriptsize 0.0000004}\\ {\scriptsize Vgg-f} & {\scriptsize 20.15} & {\scriptsize 0.0003} & {\scriptsize 0.00002}\\ {\scriptsize GoogleLeNet} & {\scriptsize 60.11} & {\scriptsize 0.0017} & {\scriptsize 0.00003}\\ {\scriptsize Vgg-VDD-19} & {\scriptsize 208.54} & {\scriptsize 0.0023} &{\scriptsize 0.00001}\\ {\scriptsize Vgg-VDD-16} & {\scriptsize 161.57} & {\scriptsize 0.0034} &{\scriptsize 0.00002}\\ {\scriptsize ResNet-152} & {\scriptsize 2262.53} & {\scriptsize 0.0115} &{\scriptsize 0.000005}\\ \Xhline{2.5\arrayrulewidth} \end{tabular} \end{center} \caption{Averages of the ratios and gains for the spatial, activation and inhibition experiments.} \label{tab:spatial_table} \end{table} \subsection{Cumulative Property and Activation-Inhibition Property} In this section, the aim is to show that the addition of the same patch many times will change the probability of detection. We decided to work with a black image of size 600x600 or 224x224 pixels accordingly to the used deep neural network. Then, the image is divided into 16 non-overlapping areas of dimensions 150x150 or 56x56 pixels each. We begin by placing the patch inside the area that maximizes the probability. Afterwards, we look for an additional patch position that increases the probability and add the patch again. We keep performing this operation while the probability is increasing after a new placement. Because we wanted to show the Activation-Inhibition effect, we apply the same algorithm for inhibition. Obviously, instead of looking for the areas that increase the overall probability, we search for the areas making the overall probability decrease. The gain is defined as the relation between the first best positioning and the final probability: $Gain.Prob_{init}=Prob_{final} $. It is superior to 1 for activation and inferior to 1 for inhibition. Figure \ref{fig:activation_inhibition} reports the gains for all the tested categories and DNNs. For both types of neural networks, the gains are always higher than 1. This means that the final probability will always be increased after a sequence of patch placement compared to one single position. Furthermore, it is also possible to decrease the probability of the class. Figure \ref{fig:activation_inhibition} proves the probability of placing multiple patches can decrease the probability. We show with these experiments that it is possible to change the probability of recognition by adding new patches (cumulative property). But we also show that an oriented strategy of placement of the patch can increase or decrease the probability (activation-inhibition property). \begin{figure*} \centering \subfloat[Activation Fast-RCNN]{% \includegraphics[width=0.24\linewidth,height=4.5cm]{gains_activation_fast.pdf}% \label{fig:gains_activations_fast}% \subfloat[Inhibition Fast-RCNN]{% \includegraphics[width=0.24\linewidth,height=4.5cm]{gains_inhibition_fast.pdf}% \label{fig:gains_inhibition_fast}% \subfloat[Activation ImageNet]{% \includegraphics[width=0.24\linewidth,height=4.5cm]{gains_activation_imagenet.pdf}% \label{fig:gains_activations_imagenet}% \subfloat[Inhibition ImageNet]{% \includegraphics[width=0.24\linewidth,height=4.5cm]{gains_inhibition_imagenet.pdf}% \label{fig:gains_inhibitions_imagenet}% } \caption{Gains for the activation and inhibition experiments. All the gains are higher than one in the case of activation and lower than one in the case of inhibition. Consequently, it means that all the deep neural networks follow both properties independently of the patch.} \label{fig:activation_inhibition} \end{figure*} \subsection{Deceiving a deep neural network: Deepception} To show a practical usage of the properties we highlighted, we decided to design a new type of fooling algorithm called Deepception. This algorithm has the particularity to be independent from the architecture, thanks to our psychophysic approach. We need simply an access to the input (image) and the output of the network (probability of recognition) to deceive the DNN. It means that our approach can even deceive an unknown DNN that is on a server. The idea is that we can pick some local patches (local property) that have by themselves a high probability of recognition for a given class. And we insert these patches in a targeted image (that belongs to another class) to fool the DNN (see Figure \ref{fig:first_Page}). We design a specific cost function (equation \ref{eq:cost}) that encourages the fooling by estimating the probability for different spatial insertions. Here, we take advantage of the cumulative and activation-inhibition property. The inserted normalized patches are made transparent to not be perceptible by humans. In order to do so, the patch is multiplied by transparency coefficient $\tau$. This resulting patch, called the decoy, is multiplied with the weaker RGB channel. The cost function is: \begin{equation} \underset{N,L \in \mathbb{N}}{\mathrm{Argmin}} (P_{t} ), \qquad stopping \quad criterion \quad P_{t}>P_{i} \label{eq:cost} \end{equation} Where N represents the number of patches and L the location of the patches, $P_{t}$ represents the probability of the targeted class. This targeted class is the initial class of the image. $P_{i}$ is the probability of each of the other classes. We report the results of Deepception on a subset of ImageNet consisting of 100 randomly selected images\footnote{Images were selected by randomly drawing ILSVRC2012 images (i.e. integers from [1, 100]), using the randperm function of the scientific computing environment Matlab after initializing Matlab random number generator seed with 0.}. We limit the experiment to 100 randomly selected images to obtain fair results that can be computed in a reasonable amount of time. This was inspired by recent approaches \cite{metzen2017detecting}. We take the patches from figure \ref{fig:patches} and generate the decoys displayed in Figure \ref{fig:decoys}. These decoys are not perceptible by humans. We decided to observe the capacity of fooling of Deepception with 20 decoys (Figure \ref{fig:stds}). We observed a linear relation between standard deviation of the decoys and their fooling abilities. For this reason we designed 2 different gaussian noises (std=100 and 150). And we observed that a gaussian noise alone cannot provide the same fooling as our decoys. \begin{figure}[H] \centering \includegraphics[width=0.8\linewidth,height=4.0cm]{output.pdf} \caption{Total number of fooled images versus the standard deviations of the decoys. The transparency is equal to 4. Red cross are the gaussian noise.} \label{fig:stds} \end{figure} We decided to apply our Deepception approach to a pre-trained VGG-VDD-19 DNN. The mountain-bike patch is chosen as a decoy because its exhibit high performance (high probability and high standard deviation). \begin{figure}[t] \centering \includegraphics[width=0.8\linewidth,height=3.05cm]{vgg19_decoys.png} \caption{Decoys generated from the patches exposed in Figure \ref{fig:patches}} \label{fig:decoys} \end{figure} \subsubsection{Influence of different parameters of Deepception} Firstly, we fix the grid size to 4x4 and test 5 transparency levels to see how the fooling ratio varies. Figure \ref{fig:transparency_sizes}.a demonstrates the higher the transparency gets, the lower the fooling ratio will be. \begin{figure}[t] \subfloat[]{ \includegraphics[width=0.5\linewidth]{ratios_transparency.pdf} } \subfloat[]{ \includegraphics[width=0.5\linewidth]{occurrences_sizes.pdf} } \caption{(a) Fooling ratio on the validation set versus the decoy transparency. (b) Number of images fooled by positioning a single patch for different grid sizes.} \label{fig:transparency_sizes} \end{figure} Transparency coefficient $\tau=4$ seems to be the optimal value for the 100 validation images. At this level of transparency, the decoy is unrecognizable to a human eye. Furthermore, the fooling ratio of 30\% for a 4x4 grid is acceptable. Consequently, we decide to fix $\tau=4$. We want to study how many images are fooled with the first decoy placement. Figure \ref{fig:transparency_sizes}.b shows the number of images which have been fooled only by one decoy. Then, we investigate whether there is a relation between the initial probability of a target image and the number of times it gets fooled applying $\tau=4$ . Figure \ref{fig:nbFooled_nbDecoys}.b shows this relation actually exists between both variables. Another important factor is how the number of decoys inserted inside the target, affects the performances. Figure \ref{fig:nbFooled_nbDecoys}.a reports these results for different grid sizes. The higher the number of inserted decoys gets, the higher the number of fooled image will be. \begin{figure} \centering \subfloat[]{ \includegraphics[width=0.40\linewidth]{figures_publication-figure11.pdf} } \subfloat[]{ \includegraphics[width=0.5\linewidth,height=3.0cm]{avg_foolings.pdf} } \caption{(a)Total number of fooled target images versus the number of inserted decoys. (b) Average of the targets' initial probabilities versus the number of foolings. } \label{fig:nbFooled_nbDecoys} \end{figure} \subsection{Comparison between Deepception and Universal Adversarial Perturbation} With a better understanding of the important parameters for Deepception, we decided to compare our results with a Universal Adversarial Perturbation \cite{moosavi2017universal}. \begin{figure} \centering \includegraphics[width=1.0\linewidth]{comparison.png} \caption{ Examples of perturbed images and the categories they belong to. Top row: Universal Adversarial Perturbation. Bottom row: our approach, Deepception. Zoom for a better visualization.} \label{fig:foolings} \end{figure} Some examples of fooled images by Deepception are illustrated in Figure \ref{fig:foolings}. The Top row illustrates Universal Adversarial Perturbation \cite{moosavi2017universal} and the Bottom row is Deepception, our approach. It can be seen that our approach is even less visible than the Universal Adversarial Perturbation. We choose VGG-VDD-19 as the targeted deep neural network for the comparison. Therefore, we download from the Universal Adversarial Perturbations authors' online repository the pre-computed perturbation for this network ( 10,000 images of the ILSVRC 2012 \cite{ILSVRC15} training set). Afterwards, we randomly select 100 images from the ILSVRC 2012 validation dataset and apply Deepception and the Universal Perturbation. For the 100 randomly selected images, the fooling ratios of Deepception and Universal Adversarial Perturbations are 88\% and 75\% respectively. Figure \ref{fig:foolings} allows a visual comparison between the outputs of both methods. It is worthy noting that contrary to Universal Adversarial Perturbation, our approach does not need to be trained on a specific network. \section{Discussion} This paper, formalized and analyzed some properties of DNNs. One of these properties can be considered as logical inferences of former studies. For instance, it is possible to partially infer the local property, based on related studies on deconvolutional networks \cite{noh2015learning}, or visualization \cite{durand2017wildcat}, showing that some specific locations of an image respond better than others. But these works are mainly pixel based and did not study the effect of the patch size as we did. Other properties are more challenging to intuit. For instance, it is important to note that the spatial property reported here, is not related to an interaction between the patch and the content of the image because we show the effect in an image filled by zeros, excluding the patch. This property highlights that DNNs are not totally translation invariant. However, the cumulative property allows to reinterpret the work of Nguyen et al. (2014) \cite{nguyen2015deep} and the reason why repeating a pattern from an object inside an image, increases its probability of being detected. Moreover, this paper exposes that repeating the pattern is not a sufficient condition to increase its probability of detection. In fact, it must be repeated at very specific locations of the image: the activating positions. Otherwise, the probability of detecting the object will not increase. Consequently, we highlighted a phenomenon that, at the best of our knowledge, no paper has reported yet: the activating-inhibitory property. The validation of these properties on Pascal VOC07 and ImageNet with different types of network proves that they can be generalized. We also showed that contrary to a repetitive pattern, activation and inhibition are not mandatorily contiguous. The patch can benefit of the cumulative effect even with a sparse spatial distribution. This work also provides a new way of measuring the performance of a DNN: the ratio between minimum and maximum probability (for the same patch). The ratio should be equal to 1 to have a perfect translation-invariant networks. This measure can be optimized in the future to obtain more robust networks. We can observe that DNNs like Fast-RCNN-VGG16 or Resnet, which have proved to have state-of-the-art performances on the Pascal VOC07 and ImageNet datasets, are sensitive to patch translations. Their high ratio is meaning there is a big gap of probability between two different positions inside the image. Some possible interpretation of the spatial property can be done based on "DNN neurophysiologist" studies of Bau et al. \cite{bau2017network} and Zhang et al. \cite{zhang2017interpretable}. The authors studied the activation of some high-level semantic units based on their receptive field. Our local property can be interpreted as the tendency of a given network to not be able to obtain many receptive fields that will cover uniformly the image. A conjoint framework combining psychophysics and neurophysiologist approach remains to be developed but has a great potential. The second part of this study took advantage of the exposed properties. We proposed a new fooling approach called Deepception. Unlike Universal Adversarial Perturbation (UAP), our approach uses structured patches from another class that are hidden in the image and are able to fool the network. We showed a fooling ratio of 88\% on the VGG-VDD-19 network compared to the 85\% obtained by UAP on the same network \cite{moosavi2017universal}. An fundamental difference of our approach compared to classical approaches is that we do not need to have a prior knowledge of the network's architecture. We simply need to be able to send an input and an access to the probability. Another difference is also the sparsity. In many cases, we can fool the network only with 1 patch (it represents $1/16$ th of the image). The advantage is that very localized patch could be more difficult to perceive by a human than a widespread fooling noise. We also tested that our effect is stronger with a structured patch rather than using a simple Gaussian noise. And even if we show that variance impacts the capacity of fooling the target, a Gaussian noise with high variance is not better for fooling compared with a decoy selected with our technique. We observed also that the same decoy can be utilized to fool different images. Our approach exhibits a good generality. Indeed, when a decoy is selected with a given network, it can be employed to fool many other images of the same network. \section{Conclusion} In this article we used a "Psychophysic" approach applied to Artificial Intelligence in the realm of "Neurophysiologists". We did not study the internal architectures of the networks, but we made some deductions by modifying the input and analyzing the resulting probability. We think this approach can have some benefit and we propose some properties allowing to rank the networks and explaining their high performances. With a practical application, a software called Deepception, we demonstrated that the properties analyzed in this work can help designing new methods for deep neural networks' fooling. {\small \bibliographystyle{named}
\section{Introduction} \label{sec:introduction} Neutron stars in accreting X-ray binaries are known to exhibit phenomena associated with unstable nuclear burning on their surfaces. At present we know of 111 such systems\footnote{https://personal.sron.nl/\textasciitilde jeanz/bursterlist.html} \citep{2017arXiv171206227G}. These objects produce hydrogen and helium-powered thermonuclear X-ray flashes, also known as Type I X-ray bursts \citep{2006csxs.book..113S}, as well as the longer and rarer ``superbursts,'' likely powered by carbon burning \citep{2002ApJ...566.1045S, 2001ApJ...559L.127C}. A much smaller number of objects, five at present count, have shown low-frequency ($\approx 7-10$ mHz) oscillations very likely associated with the transition from stable to unstable burning, known as marginally stable nuclear burning \citep{2007ApJ...665.1311H, 2017arXiv171206227G}. \cite{2001A&A...372..138R} reported the first detections of mHz quasiperiodic oscillations (QPOs) in three accreting neutron star systems, 4U 1608$-$52, 4U 1636$-$536, and Aql X-1. They argued that the mHz oscillations were very likely associated with the neutron star surface and not the accretion flow. They also showed that they only occur within a narrow range of X-ray luminosity. Since then, mHz oscillations have also been reported from 4U 1323$-$619 \citep{2012AAS...21924903S}, and the 11 Hz pulsar IGR J17480$-$2446 in the globular cluster Terzan 5 \citep{2012ApJ...748...82L}. We note that this object showed different behavior in its mHz oscillations compared to the others. During its outburst in 2011, as the flux increased, the recurrence time of bursts steadily decreased to about 3 minutes, finally appearing as oscillations in the light curve with this period. These oscillations also appeared at a much higher inferred accretion rate than in the other mHz sources \citep{2012ApJ...748...82L, 2017arXiv171206227G}. \cite{2002ApJ...567L..67Y} found that the frequency of kilohertz QPOs are anticorrelated with the brightness of the mHz oscillations in 4U 1608$-$52, and because this relationship is opposite to the positive correlation of kHz QPO frequency with X-ray luminosity typically seen, argued that the flux variation associated with the mHz QPO must arise on the neutron star surface and not within the accretion flow. \cite{2008ApJ...673L..35A} reported on extensive {\it Rossi X-ray Timing Explorer} ({\it RXTE}) observations of 4U 1636$-$536 that revealed a close connection between the mHz oscillations and the occurrence of X-ray bursts. They found that, during intervals of mHz oscillations, as the frequency drifted down and dropped below about 7.5 mHz, the oscillations faded and X-ray bursting resumed, and, similarly to \cite{2001A&A...372..138R}, they found no mHz oscillations immediately following the X-ray bursts. More recently, \cite{2015MNRAS.454..541L} also studied episodes of mHz QPOs in 4U 1636$-$536 using {\it XMM-Newton} and {\it RXTE} data. Similarly to \cite{2008ApJ...673L..35A}, they found frequency drift of the mHz oscillations, and suggested the drift time-scale may be set by cooling of the deeper layers, as was previously argued by \cite{2009A&A...502..871K} based on hydrodynamic calculations of helium burning with rotational mixing. \cite{2016MNRAS.463.2358L} found that the bursts that occurred immediately after an episode of mHz oscillations preferentially showed a rising light curve shape with so-called positive ``convexity.'' Such bursts show fast rise times, and this has been linked to a burst ignition location at or near the star's rotational equator \citep{2008MNRAS.383..387M, 2007ApJ...657L..29C}. Thus, \cite{2016MNRAS.463.2358L} argued that these bursts, and the burning responsible for the mHz QPOs, may occur at the neutron star equator. \cite{2016ApJ...831...34S} reported results from phase-resolved spectroscopy of the mHz oscillations in 4U 1636$-$536 obtained with {\it XMM-Newton}. They found an approximately constant color temperature with pulse phase of $\approx 0.7$ keV that they associated with the neutron star surface, and argued that the oscillations result from a variation in the surface emitting area and not the temperature. They derived a surface emitting area consistent with that expected for a neutron star. The physics relevant to marginally stable burning was recognized early on by \cite{1983ApJ...264..282P}, and has been further elucidated by \cite{2007ApJ...665.1311H}. As the helium burning stability boundary is approached, the temperature dependence of the nuclear heating rate almost precisely balances that of the cooling rate. The result is a slow, quasiperiodic mode of burning, with the oscillation period given approximately by the geometric mean of the accretion and thermal time-scales. For typical neutron star parameters and the relevant accretion rates, this gives an oscillation period close to 2 min, which is in good agreement with the range of oscillation frequencies reported for the mHz oscillations. Theory predicts that for unstable burning associated with helium ignition, the boundary between stable and unstable burning should occur at local accretion rates close to the Eddington rate \citep{1998ASIC..515..419B}. The fact that observational indications based on estimates of the X-ray luminosity suggest the onset of stability at accretion rates closer to $\approx1/10$ of the Eddington rate remains a major puzzle \citep{1988MNRAS.233..437V, 2003A&A...405.1033C}. It has been suggested that confinement of the accreted fuel, and/or rotational mixing of the fuel to greater column depths could alleviate this apparent discrepancy \citep{2009A&A...502..871K}. The fact that the mHz oscillations associated with marginal stability occur at a well defined local accretion rate makes them, in principle, a particularly important probe of the accretion rate. \cite{2014ApJ...787..101K} found that the range of accretion rates in which marginally stable oscillations can occur was also sensitive to the nuclear reaction rates. Moreover, \cite{2007ApJ...665.1311H} showed that the oscillation frequency associated with marginal stability is sensitive to the hydrogen mass fraction in the accreted fuel, as well as the surface gravity. Thus, a more detailed understanding of these oscillations could lead to new probes of these quantities. The accreting neutron star binary GS 1826$-$238{} (hereafter, GS 1826{}) is in many ways a prototype, having earned the moniker ``clocked burster,'' for producing bursts with extreme regularity \citep{1999ApJ...514L..27U}. The recurrence times of these regular bursts were shown to match well the predictions of theory for mixed H/He bursts \citep{2004ApJ...601..466G}, and the light curve shapes were accurately modeled using theoretical calculations of rapid-proton (rp)-process burning of approximately solar composition fuel \citep{2007ApJ...671L.141H}, hence, it has also been referred to as the ``text-book'' burster. Indeed, the bursts were so uniform in their properties that \cite{2012ApJ...749...69Z} used them as ``standard candles'' to place constraints on the mass and radius of the neutron star. The ``clocked'' bursts all occurred, however, while GS 1826{} was in a ``hard'' spectral state. This is typically diagnosed with the use of X-ray colors \citep{2006csxs.book...39V}. Based on this, GS 1826{} is classified as an ``atoll'' source, and the hard state is also referred to as the ``island'' state. Interestingly, \cite{2016ApJ...818..135C} recently reported on observations of GS 1826{} in 2014 June with {\it Swift} and {\it NuSTAR} during a soft spectral state, including the detection of several X-ray bursts. They found that in this spectral state the X-ray burst recurrence times were no longer regular, and the bursts themselves also differed from the hard state bursts, being generally shorter in duration. These findings are indicative of a lower hydrogen fraction in the fuel, and suggest an additional source of stable burning occurs at the higher accretion rates in the soft state. They also detected the first photospheric radius expansion (PRE) burst from GS 1826{}, and used it to estimate the distance as $5.7 \pm 0.2$ kpc (assuming isotropic emission). Since then, the source has mostly remained in a soft state. In this paper we report the discovery with {\it NICER} of mHz oscillations from GS 1826{} that are very likely associated with marginally stable burning. The plan of the paper is as follows. We begin with a description of the observations and present the detection of mHz oscillations, and an X-ray burst. Next, we explore the source accretion state by studying the X-ray colors, showing that the source was in a soft, ``banana'' state in the color - color diagram \citep{1989A&A...225...79H}. Next we study the average mHz pulse profile, and present the results of phase-resolved spectroscopy. We conclude with a brief summary and discussion of the implications of our findings for models of marginally stable burning and for constraining the neutron star properties of GS 1826{}. \section{NICER Observations} \label{sec:observations} {\it NICER} was installed on the International Space Station ({\it ISS}) in 2017 June, and provides low background, high throughput ($\approx 1900$ cm$^2$ at 1.5 keV), fast timing observations across the $0.2 - 12$ keV X-ray band \citep{2012SPIE.8443E..13G}. {\it NICER} achieves an absolute timing precision of $\approx 100$ ns with the aid of a GPS receiver. {\it NICER} observed GS 1826{} as part of a science team program with a major goal to detect and study X-ray bursts. Observations were obtained in the periods 2017 June 20 - 29, July 11 - 13 and September 9 - 15. Relevant ``observation IDs'' (obsids) include $00503101nn$ and $10503101mm$, where $nn$ runs from 01 to 14 and $mm$ from 01 to 16. We used {HEASOFT} version 6.23 and NICERDAS version 2018-03-01\_V003 to process the data, and we applied the standard filtering criteria, which includes time intervals with a pointing offset $<0.015^{\circ}$ \footnote{We note that obsids $0050310101-05$, inclusive, were obtained with an offset pointing of 0.03$^{\circ}$, which nominally violates the standard filtering criterion. However, this offset simply reduces the count rate modestly but does not otherwise effect our results, so we included these data in our analysis.}, bright Earth limb angles $> 40^{\circ}$, dark Earth limb angles $>30^{\circ}$, and outside the South Atlantic Anomaly (SAA). This resulted in a total good exposure of 18, 6 and 10 ks for the June, July, and September epochs, respectively. \subsection{mHz QPOs and an X-ray Burst} We found that a few data intervals showed enhanced backgrounds at energies above $\approx 8$ keV, so to mitigate this we restricted the timing analysis to events with energies less than 7.5 keV. We note that, because the observed count rate is decreasing with energy, only $\approx 0.5 \%$ of all observed events have energies greater than this limit. We computed light curves for each epoch using events in the range $0.4 - 7.5$ keV. Figure 1 shows the resulting light curve, where the time axis is broken up into three panels, one each for the June, July, and September exposures, respectively. We identified a thermonuclear X-ray burst that occurred on 2017 June 22 at 22:31:42 UTC (labelled in Figure 1). The burst shows a hardness ratio evolution consistent with photospheric radius expansion (PRE), and also shows a shorter-duration light curve that differs from those of the hard state, ``clocked'' bursts \citep{2004ApJ...601..466G, 2007ApJ...671L.141H}, but is similar to bursts recently observed from GS 1826{} in a high (soft) spectral state \citep{2016ApJ...818..135C}. We note that the publicly available data from the {\it Monitor of All-sky X-ray Image} ({\it MAXI}) and the {\it Swift} {\it Burst Alert Telescope} ({\it BAT}), are consistent with GS 1826{} being predominantly in a soft spectral state from about 2016 December to the present. We will present a detailed spectral study of this burst in a subsequent paper. Visual inspection of the light curves from the first two dwells of the September data epoch (these dwells are the first in the right-most panel of Figure 1, and are also labelled ``mHz QPO'') suggested the presence of apparent pulsations with a few minute period. The light curves of these dwells in the $0.4 - 7.5$ keV band, binned at 10 s, are shown in Figure 2. Pulses are rather clearly evident ``by eye.'' To explore this apparent variability more quantitatively we computed power spectra using continuous intervals of 2200 s for each of these dwells. We again used events in the $0.4 - 7.5$ keV band, and sampled the light curves at 8192 Hz. The resulting power spectra, normalized as in \cite{1983ApJ...266..160L}, are shown in Figure 3, where the black and red curves correspond to the first and second dwells, respectively. Both spectra show strong, narrow peaks near 8 mHz, a frequency consistent with the few minute separation of pulses evident in Figure 2. These peaks are highly significant, for pure Poisson noise the chance probability to exceed a power value of 200 is $3.7 \times 10^{-44}$. From the power spectra shown in Figure 3 we estimate fractional amplitudes (rms) in the $0.4 - 7.5$ keV band for the first and second dwells of $0.79\%$ and $0.95\%$, respectively. These values for the frequency and amplitude are largely consistent with those previously reported for mHz oscillations in other sources \citep{2001A&A...372..138R}. The mHz signal power from the first dwell is confined to a single Fourier bin, being effectively coherent over the length of the interval. The Fourier frequency of this bin is 8.18 mHz. In the second dwell the peak power shifts down one Fourier bin, and significant power is spread over a few bins. This suggests a downward drift in the oscillation frequency from the first to second dwell. To quantify this drift we oversampled the power spectrum for each dwell by padding the light curve to 8000 s using the mean count rate determined from the good exposure (2200 s). We then found the mHz frequency associated with the peak power in each spectrum. From the frequency separation, $\Delta\nu$, of the peak power values we estimate a frequency drift rate of $\Delta\nu / \Delta t \approx -0.3$ mHz hr$^{-1}$. Previous studies of mHz oscillations indicate that the frequency can both increase and decrease with time, and that the frequency drift rate can vary \citep{2014MNRAS.445.3659L, 2015MNRAS.454..541L, 2008ApJ...673L..35A}. The best-studied object in this regard is 4U 1636$-$536. The rate of decrease we estimate here for GS 1826{} does not appear to be inconsistent with previous reports \citep{2008ApJ...673L..35A}, that is, one can find time intervals reported in the literature for 4U 1636$-$536 which have approximately similar drift rates (see, for example, Figure 4 in Lyu et al 2015). After identifying the strong mHz pulsations described above, we also searched for similar signals in the remaining data. We note that many of the other individual dwells have exposures that are shorter than those of the 2017 September dwells with strong mHz oscillations. So, not all observations are equally sensitive to such oscillations. Nevertheless, we searched for additional signals by computing power spectra of all dwells with exposures equal to or longer than 750 s ($0.4 - 7.5$ keV band). We detected mHz oscillation signals near 8 mHz in three other dwells, while for the remainder no signal was detected, and we obtain upper limits ($90\%$ confidence) to an oscillation in the 7 - 9 mHz frequency band that range from approximately $0.3 - 0.5\%$ (rms), with the precise value depending on the count rate and exposure of the particular dwell. Figure 4 shows power spectra from these three additional dwells with mHz oscillations. The spectra are labelled with the start date (MJD) of the dwell, and the number in parenthesis indicates the corresponding day in Figure 1. The successive spectra are displaced vertically by 100 for clarity. From figure bottom to top we estimate fractional amplitudes (rms) of $0.60$, $0.85$ and $0.65 \%$. We also searched for mHz oscillations in the immediate aftermath of the X-ray burst detected on 2017 June 22, but no mHz signal was detected in a power spectrum computed from a 600 s interval ($0.4 - 7.5$ keV) following the burst. The upper limit on the amplitude is $0.5 \%$ (rms). Finally, we did not detect mHz oscillations in any of the dwells preceding the X-ray burst. \subsection{Spectral State} To further explore the accretion state context of the mHz oscillations we calculated color - color and hardness - intensity diagrams for all the data. We computed both a ``soft'' and ``hard'' color. For the former we determine the ratio of count rates in the bands $1.8 - 3.5$ and $0.5 - 1.8$ keV, while for the latter we use $5.2 - 6.8$ and $3.5 - 5.2$ keV. For the intensity we compute the count rate from $0.5 - 6.8$ keV. We computed colors and intensities using 32 s intervals for all the data. Figures 5 and 6 show the resulting color - color, and hardness - intensity diagrams, respectively. In both figures the blue (triangle) symbols represent data obtained from the two September epoch intervals when strong mHz oscillations were present, and the red (diamond) symbols were obtained from intervals immediately following the X-ray burst. A characteristic error bar is also shown in each plot to indicate the statistical precision. To further elucidate the relationship between the spectral colors and mHz oscillations we computed colors for all dwells in which oscillations were detected, as well as some of the longer dwells with no detections, and only upper limits. The colors measured for all of these dwells are shown in Figure 7, where the red diamond symbols represent those with upper limits, the blue square symbols those with mHz oscillation detections, and the size of the blue symbols is proportional to the oscillation amplitude (rms). The X-ray colors are defined in the same way as in Figure 5. These results suggest that the presence and amplitude of mHz oscillations is related to position in the color - color diagram, and therefore the mass accretion rate, as dwells with the highest amplitudes seem to occur preferentially at the higher values of soft and hard color. Such behavior is theoretically predicted for mHz oscillations associated with marginally stable burning \citep{2007ApJ...665.1311H}, as they are only evident close to the mass accretion rate at which burning stabilizes. It may be that we are seeing such a transition in Figure 7, since mHz oscillations are not detected at the lowest inferred accretion rates (the lower left portion of the color - color diagram). However, it is also possible that this behavior is similar to that seen in 4U 1636$-$536, where mHz oscillations can ``come and go'' while on the ``banana'' branch \citep{2008ApJ...673L..35A}. The present data are too sparse to be conclusive, and more observations will be needed to distinguish between these two possibilities. \section{Properties of mHz Oscillations} Since the power spectra (Figure 3) from the two 2017 September dwells with strong mHz oscillations are consistent with rather coherent oscillations during these intervals, we computed phases for all events in each of these dwells separately using the frequencies corresponding to the peak Fourier power obtained from each dwell. To combine the two dwells we first found a constant phase offset for the 2nd dwell that maximized the $Z_1^2$ signal power of the sum of both dwells \citep{1983A&A...128..245B}. The resulting phase folded pulse profile in the $0.4 - 7.5$ keV band is shown in Figure 8. We fit a model of the form $A + B\sin(\phi -\phi_0)$ and find an amplitude $B/A = 1.12 \pm 0.05 \%$. The fit is good with a minimum $\chi^2 = 11.0$ for 13 degrees of freedom, and the best fitting model is also plotted in Figure 8 (red curve). To explore the energy dependence we also computed profiles for different energy bands and then fit them with the same model as above. Figure 9 shows the derived amplitudes, $B/A$, and phases, $\phi_0$, versus energy. The amplitude shows a modest increase from about $0.7 \%$ at 1 keV to $\approx 2 \%$ at 7 keV. There is no strong evidence for a variation in $\phi_0$ with energy. To explore the pulse-phase spectrum we extracted two spectra, from regions around the pulse minimum and maximum. The phase ranges used for these extractions are indicated by the dashed and dash-dotted vertical lines in Figure 8, respectively. In each case we used a range of pulse phase equal to 0.25 cycles, so that each spectrum has an exposure of $0.25\times(2(2200)) = 1100$ s. We used XSPEC version 12.9.1 with version 1.02 of the {\it NICER} instrument response, and we fit the spectra in the range $0.6 - 9$ keV. We use a model comprised of thermal comptonization ({\it comptt} in XSPEC) for the persistent accretion-driven emission and a black body ({\it bbodyrad} in XSPEC) to capture the neutron star thermal emission \citep{2016ApJ...818..135C, 2008ApJ...681..506T}. To model Galactic absorption we employ the {\it tbabs} model with abundances from \cite{2000ApJ...542..914W}, and we fix (freeze) the value of $n_{H} = 0.4 \times 10^{22}$ cm$^{-2}$ based on prior measurements, since the source is in the same (soft) state \citep{2016ApJ...818..135C, 2010A&A...521A..79P}. We employ a background spectrum extracted from {\it NICER} observations of {\it RXTE} background field number 5 \citep{2006ApJS..163..401J}, but we note that the spectrum is strongly source dominated across the fitted band. Finally, we add a $1\%$ systematic error to accommodate current uncertainties in the {\it NICER} response. As with many X-ray spectral modeling efforts, there is often no single, unique approach. The same is true in this case. In order to model either individual phase-resolved spectrum we find that both of the spectral components discussed above are required. However, the data do not have sufficient statistical quality to simultaneously fit for all parameters and determine unambiguously whether either of the components alone is associated with the mHz modulation. That is, one can either fix the persistent component ({\it comptt}) to be the same between the phase maximum and minimum spectra, or one can fix the black body ({\it bbodyrad}) component. Given the statistical quality of the present spectra one can achieve a similarly good fit using either approach. Below, we explore the approach that the persistent emission is not strongly affected by the mHz oscillation, and assume that the difference between the two spectra is accounted for by the black body component. This appears reasonable given the modest $1 - 2\%$ amplitude of the modulation, and the theoretical suggestion that such oscillations arise from the neutron star surface. However, we emphasize that this approach places constraints on the black body component {\it under the assumption that it is the varying component}, but it does not demonstrate unambiguously that it is the varying component. Thus, we carry out a joint fit to both the minimum and maximum phase spectra, keeping the {\it comptt} parameters and the column depth, $n_H$, tied together, but allowing the black body parameters to vary independently between the two spectra. \begin{table*} \renewcommand{\arraystretch}{1.15} \caption{Phase-resolved spectral fits for GS 1826{} } \scalebox{0.95}{ \begin{tabular}{cccc} \tableline\tableline Component & Parameter & Spectrum & Spectrum \\ & & minimum & maximum \\ \tableline {\bf tbabs} & $n_{H}$ ($10^{22}$ cm$^{-2}$) & $0.4$ & tied \\ {\bf compTT} & $kT_0$ (keV) & $0.095 \pm 0.014$ & tied \\ & $kT_e$ (keV) & $2.03 \pm 0.04$ & tied \\ & $\tau$ & $8.4 \pm 0.1$ & tied \\ & {\it norm} & $1.88 \pm 0.20$ & tied \\ {\bf bbodyrad} & $kT$ (keV) & $0.684 \pm 0.006$ & $0.701 \pm 0.005$ \\ & $K$ ({\it norm}) & $603.7 \pm 14.3$ & $599.0 \pm 13.1$ \\ \tableline \end{tabular}} \tablecomments{Parameter uncertainties are given at $1\sigma$ confidence, and those with no quoted uncertainty were held fixed at the indicated value. } \end{table*} We find this model provides a reasonable description of the observed spectra, with a reduced $\chi^2_r \approx 1.01$ ($\chi^2 = 1698$ with 1676 degrees of freedom). The largest remaining residuals are centered near 2.3 keV, and this feature is associated with a known instrumental edge (see \citet{2018ApJ...858L...5L} for further discussion of the {\it NICER} spectral response). Our spectral results are summarized in Table 1. Figure 10 shows the unfolded, photon spectra, including the individual model components (top), and the fit residuals (bottom). The mean (unabsorbed) flux in the $0.6$ - $9$ keV band is $6.90 \pm 0.01 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$. For the comptonization component parameters we find results that are qualitatively similar to \cite{2016ApJ...818..135C}, but differ somewhat in the details. For the black body components we find that the fitted normalizations are consistent with remaining constant from pulse minimum to maximum, with a mean value of $K_{avg} = 601.3$. This normalization corresponds to an area, assuming a spherical emitting source and isotropic emission, with radius $R = (K_{avg} d_{10}^{2} )^{1/2} = 13.98$ km, where $d_{10}$ is the distance in units of 10 kpc, and we have assumed $d = 5.7$ kpc \citep{2016ApJ...818..135C}. We note that this estimate ignores any atmospheric color corrections. Applying such a correction would increase the inferred radius by a factor of $f_c^2 = (T_c / T_{eff})^2$, where $T_c$ and $T_{eff}$ are the color (measured) and effective temperatures, respectively, and $f_c$ is the so-called hardening factor. Based on model atmosphere calculations, $f_c$ is likely to fall within the range from $\approx 1.2 - 1.5$ \citep{2016ApJ...832..102M, 2011A&A...527A.139S}, resulting in an increase in inferred radius by a factor of $\approx 1.4 - 2.2$. However, given the other assumptions and uncertainties, the value is at least approximately consistent with expectations for surface emission from a neutron star. For the spectra at maximum and minimum oscillation phase we find temperature values of $kT = 0.701 \pm 0.005$ keV, and $kT = 0.684 \pm 0.006$ (both $1\sigma$ confidence), respectively. This suggests that the flux modulation associated with the mHz oscillation appears to be consistent with a change in the surface temperature, $kT$, of the neutron star thermal emission. However, we note that these values differ only at the $\approx 3\sigma$ level, and more data are needed to demonstrate this conclusively. \section{Discussion} We report the detection with {\it NICER} of mHz oscillations in GS 1826{} for the first time. The oscillation properties are generally consistent with those of the mHz QPOs observed in 4U 1608$-$52, 4U 1636$-$536, Aql X-1, and 4U 1323$-$619. The {\it NICER} data were obtained while GS 1826{} was in a soft spectral state, as indicated by both {\it MAXI} \citep{2011PASJ...63S.635S} and {\it Swift/BAT} \citep{2013ApJS..209...14K} long-term monitoring from about 2015 December to the present. Indeed, the current long-term trend appears to be a slow but steady increase in the 2 - 10 keV flux (based on the {\it MAXI} data), and very weak hard X-ray flux (from {\it Swift}-BAT). Our spectral color analysis appears consistent with this conclusion as well. The observed behavior (Figures 5, 6 and 7) appears consistent with GS 1826{} tracing out a portion of the so-called ``banana'' branch in the color - intensity diagram during the {\it NICER} observations. The mass accretion rate is generally inferred to increase from left to right along the arc of the ``banana.'' To further test this we extracted spectra from several intervals which populate the lower left portion of the color - color diagram (see Figure 7), in order to estimate their fluxes and compare with the mean flux measured during the September epoch intervals with strong mHz oscillations (see \S 2.2 above). We find these spectra can be fit with the same model described above, and we find the unabsorbed flux ($0.6$ - $9$ keV) in the range from $5.0 - 5.2 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$, supporting the conclusion that the X-ray flux, and therefore mass accretion rate, increases from lower left to upper right in the color - color diagram (Figure 7). Assuming the X-ray luminosity can be written as, \begin{equation} L_x = \frac{GM \dot M}{(1+z)R} = 4\pi d^2 f_x \; , \end{equation} where $M$, $R$, $(1+z) = (1 - 2GM/c^2 R)^{-1/2}$, and $f_x$ are the neutron star mass, radius, surface redshift, and X-ray flux respectively, we estimate an average mass accretion rate, $\dot M$, for the September dwells with mHz oscillations of $\dot M = 0.18 \dot M_{Edd}$, where we have assumed $M = 1.4 M_{\odot}$, $R = 10$ km, $d = 5.7$ kpc, and $\dot M_{Edd} = 1.7 \times 10^{-8} M_{\odot}$ yr$^{-1}$. This estimate also assumes that the accretion luminosity is radiated isotropically. Previous studies have shown that mHz oscillations can be associated with bursting activity. For example, \cite{2008ApJ...673L..35A} found episodes of mHz oscillations in 4U 1636$-$536 with decreasing frequency, and when the frequency dropped below about 7.5 mHz the oscillations faded and bursting resumed; however, such behavior was not associated with {\it all} X-ray bursts (see their Figure 3). Indeed, the data for 4U 1636$-$536 suggest that intervals of mHz oscillations can come and go without an obvious trigger, as long as the source is in the appropriate accretion state, indicated by its position on the banana branch or in the transition to the banana branch (see Altamirano et al. 2008, Figure 1). For GS 1826{} we find no evidence for mHz oscillations after the X-ray burst on 22 June, which at face value is consistent with the behavior seen in 4U 1636$-$536. However, we emphasize that the present data are very sparse around the time of the X-ray burst. The only thing we can say with certainty is that we did not detect mHz oscillations in any of the {\it NICER} dwells preceeding the X-ray burst or immediately after it. Our results suggest the following long term behavior in GS 1826{}. Prior to 2014 the source was almost exclusively in the hard state, with typical accretion rates lower than indicated by the present {\it NICER} observations. For example, comparing long term variations in the persistent X-ray flux--a reasonable proxy for mass accretion rate--we find from \cite{2004ApJ...601..466G} that the $2.5 - 25$ keV persistent (absorbed) flux from {\it RXTE} observations was $2.2 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$ on July 29, 2002. Based on the {\it NICER} spectral modeling for the 2017 September epochs described above we estimate a flux in the same band of $4.5 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$, a factor of two or so higher. In making this estimate we note that we have extrapolated the best-fit {\it NICER} model (Table 1) to 25 keV, that is, outside of {\it NICER}'s nominal bandpass. However, the (absorbed) flux measured by {\it NICER} in the $2.5 - 9$ keV band is $3.6 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$, which is already significantly larger than the $2.5 - 25$ keV {\it RXTE} flux. Since the $2.5 - 9$ keV {\it NICER} flux measurement is a firm lower bound to the $2.5 - 25$ keV flux, this strongly suggests that the flux measured by {\it NICER} in 2017 September {\it in the same band} is significantly higher than the July 2002 flux measured with {\it RXTE}. This provides further support to the notion that the apparent long-term increase in X-ray flux likely represents an increasing mass accretion rate. While in the hard state the source was extensively observed with {\it RXTE}, but no mHz QPOs were ever observed. As the source continued to brighten and soften, the accretion rate became large enough to enter the accretion regime where mHz oscillations are observed in other LMXBs (see, for example, Altamirano et al. 2008, Figure 1). This overall behavior appears consistent with the observations of the mHz QPOs in 4U 1636$-$536, 4U 1608$-$52 and Aql X-1, and suggests we are seeing the same phenomenon in GS 1826{}. More observations of GS 1826{} in its soft, higher accretion rate state will be needed to determine if it shows the full range of mHz oscillation phenomenology evident in other sources, including a closer connection with X-ray bursts. There have been some reports of QPOs not linked with marginally stable burning, but with similar frequencies. In some of those cases the accretor is known or strongly suspected to be a black hole and not a neutron star. Examples are the QPOs identified in the black hole candidates H1743$-$322 \citep{2012ApJ...754L..23A}, and LMC X-1 \citep{2014MNRAS.445.4259A}. In the case of H1743$-$322, the QPOs are seen in a hard spectral state, whereas the mHz QPOs reported here occur in the soft state of GS 1826{}. For LMC X-1 the observed QPO frequencies are higher, at $\approx 27$ mHz, than any previously reported mHz oscillation associated with marginally stable burning. Based on this it appears unlikey to us that the mHz oscillations observed in GS 1826{} are related to these QPOs. Several accreting millisecond X-ray pulsars have also occasionally shown episodes of QPOs with mHz frequencies during some outbursts, an example being the 8 mHz ``flaring'' observed in IGR J00291+5934 \citep{2017MNRAS.466.3450F}. In those QPOs, however, the modulation amplitude was $> 10\%$ (rms) for photon energies less than 2 keV, which is substantially larger than is found for the mHz oscillations linked to marginally stable burning. Morever, the energy spectrum softened at the peak of these flares, which is opposite to the behavior indicated in GS 1826{}. This argues rather strongly that the mHz oscillations reported here from GS 1826{} are not related to these mHz ``flaring'' QPOs. As discussed in \S 2.1 the oscillations reported here from GS 1826{} have a rather high quality factor, that is, they appear to be rather coherent over the intervals they are observed. We emphasize, however, that these intervals ($\approx 2$ ks) are relatively short compared to the hours-long time-scales over which mHz QPO frequencies have been observed to drift in several sources \citep{2015MNRAS.454..541L, 2008ApJ...673L..35A}. Additionally, current modeling of marginally stable burning can produce quite regular trains of mHz pulses, with the limiting factor here likely being temporal variations of the mass accretion rate \citep{2007ApJ...665.1311H, 2014ApJ...787..101K}. Based on these arguments we think that the relatively high coherence seen in the mHz oscillations reported here is not inconsistent with their connection to marginally stable burning. Figure 9 shows the energy dependence of the fractional (sinusoidal) modulation amplitude of the mHz oscillations in GS 1826{}. From about $1 - 3$ keV an increasing trend is rather clear, with an apparent flattening above 3 keV. This appears to be at least qualitatively similar to the behavior seen in IGR J17480$-$2446--which shows an increasing trend in rms amplitude from about $2.5 - 10$ keV based on {\it RXTE} data \citep{2012ApJ...748...82L}--but opposite to that reported for 4U 1608$-$52 and 4U 1636$-$536 by \cite{2001A&A...372..138R}, also using {\it RXTE}. However, some caution is warranted here due to the different bandpasses of {\it NICER} and {\it RXTE}, as well as the extent to which uncertainties in backgrounds could influence derived amplitudes. A closer comparison of the energy dependence of the mHz oscillations reported here with {\it NICER}, and those detected with {\it XMM-Newton} should prove useful, as these instruments have more closely matched bandpasses. We extracted spectra as a function of mHz pulsation phase, and find that they are consistent with the modulation being produced by a variation in the temperature of a thermal (black body) component at an effectively constant emitting area, though we emphasize again that this is not a unique spectral interpretation (see discussion in \S 3 above). Assuming a spherical emitting source and isotropic emission, the fitted black body normalization implies a radius of $R \approx 14$ km. Given uncertainties in the source distance, the exact nature of the continuum describing the persistent emission, the extent to which disk reprocessing is present, as well as our neglect of color corrections, this value should only be taken as roughly indicative of the surface area associated with the mHz oscillations, and definitely not a precise measurement. The evidence that the oscillating flux can be associated with a thermal (black body) component with an area approximately consistent with that for a neutron star provides support for the interpretation of the oscillations as due to marginally stable nuclear burning; however, more data will be needed to establish this definitively. We note that \cite{2016ApJ...831...34S} reached different conclusions from a study of the phase-resolved spectra of mHz oscillations from 4U 1636$-$536. They argued that the flux modulation resulted from a variation in the emitting area at approximately constant temperature. While this is at odds with current theory, which finds that the temperature oscillates \citep{2007ApJ...665.1311H}, we emphasize that current theoretical calculations of marginally stable burning are all one dimensional, so they essentially do not explore the possibility of variations in the burning area. Here we point out that there are several physical effects that suggest that lateral variations in the burning should be included in future modeling. For example, \cite{2007ApJ...665.1311H} showed that the oscillations associated with marginal stability occur in a very narrow range of mass accretion rates, $\dot m$, for a given surface gravity. They found the oscillations were present in a range of only $1\%$ of the critical accretion rate. Note that it is the {\it local} accretion rate that is relevant for the nuclear burning. For a fast spinning neutron star the variations in effective surface gravity from equator to pole can result in a latitudinal change in the local accretion rate. \cite{2007ApJ...657L..29C} used this effect to explore the extent to which ignition of thermonuclear bursts could preferentially occur at different latitudes. However, this process would appear to be relevant for marginally stable burning as well, as a greater than $1\%$ variation in the local accretion rate with latitude could influence the range of stellar latitudes for which marginally stable oscillations could occur. Indeed, this appears to be a possible mechanism for limiting the marginally stable burning to a belt in latitude \citep{2016MNRAS.463.2358L}. As a rough guide, a star rotating at 582 Hz (close to the inferred spin frequency for 4U 1636$-$536), and with a mass of $1.4 M_{\odot}$ and equatorial radius of 10 km, would have an $\approx 11\%$ increase in effective surface gravity from equator to pole, using the results of \cite{2014ApJ...791...78A}. This is certainly large enough to have a significant effect on the local accretion rate at the level required to influence marginally stable burning. Interestingly, for a spin rate of 11 Hz, appropriate for IGR J17480$-$2446 in Terzan 5, the variations in surface gravity are $< 0.004 \%$ equator to pole, and thus latitudinal variations would likely be negligible for such a slow spinner. This could perhaps account for some of the observed differences in the mHz oscillations of IGR J17480$-$2446 and fast spinners like 4U 1608$-$52, 4U 1636$-$536, and Aql X-1. As pointed out by \cite{2007ApJ...665.1311H}, the critical accretion rate for marginally stable oscillations is itself a function of surface gravity, so the occurrence of oscillations, and their properties, will in principle depend on both effects; however, this discussion highlights that such latitudinal dependencies of the burning are likely, at least for fast spinners, and should be considered in future modeling of marginally stable oscillations. \cite{2007ApJ...665.1311H} argued that the oscillation frequency associated with marginally stable burning should be sensitive to the neutron star surface gravity, which is proportional to $M/R^2$, and the mass fraction of hydrogen in the accreted matter (see their Figure 9). While their results on this score were based on one-zone models, the good overall agreement between predictions of their one-zone models and multi-zone hydrodynamic calculations with the KEPLER code \citep{2007ApJ...665.1311H}, suggests that these dependencies are robust. This is particularly promising for GS 1826{} because of the extensive theoretical modeling already done on the ``clocked'' bursts \citep{2007ApJ...671L.141H, 2018ApJ...860..147M}, which suggests a near solar composition for the accreted fuel. Interestingly, the bursts observed so far at the higher accretion rates associated with the soft spectral state have shorter durations, and several have reached higher peak fluxes, as is evidenced by the occurrence of PRE. These are both good indications of depletion of hydrogen in the fuel compared to the hard-state, ``clocked'' bursts. This suggests that additional theoretical modeling of the soft state bursts, coupled with further comparisons to the ``clocked'' bursts, could place tighter constraints on the hydrogen fraction present in the fuel during episodes of mHz oscillations. It might then be possible to provide more robust limits on the neutron star surface gravity from measurements of the mHz oscillations. \acknowledgments This work was supported by NASA through the {\it NICER} mission and the Astrophysics Explorers Program. This research also made use of data and/or software provided by the High Energy Astrophysics Science Archive Research Center (HEASARC), which is a service of the Astrophysics Science Division at NASA/GSFC and the High Energy Astrophysics Division of the Smithsonian Astrophysical Observatory. DA acknowledges support from the Royal Society. SG acknowledges the support of the Centre National d'Etudes Spatiales (CNES). We thank the anonymous referee for their efforts. \facility{NICER, ADS, HEASARC} \bibliographystyle{aasjournal}
\section{Introduction} When facing choices to invest in various funds (whether mutual or hedge funds), it is quite common to compare their Sharpe ratio in order to rank funds. This indicator aims at measuring performance for a given risk. This eponymous ratio established by \cite{Sharpe_1966} is a simple number easy to understand. It computes the ratio of the excess return over the strategy standard deviation. However, the elements to compute the Sharpe ratio, namely, the expected returns and the volatilities are unknown numbers and need to be estimated statistically. This means that the Sharpe ratio used by funds is subject to be error prone because of statistical estimation error. In a seminal paper, \cite{Lo_2002} derive explicit expressions for the statistical distribution of the Sharpe ratio using standard asymptotic theory under several sets of assumptions (independent normally distributed - and identically distributed returns). This is interesting as it provides intuition of potential bias and correction to apply to get an unbiased estimator. However, the results are provided as asymptotic results. It could be interested to derive or extend result to the non asymptotic distribution. This is precisely the contribution of this paper. First, we extend provide the exact distribution of the Sharpe ratio for independent normally distributed return. We show that under these conditions, the Sharpe ratio statistic is a non centered Student distribution whose characteristics have been widely studied by statisticians, up to a rescaling factor. Results of \cite{Lo_2002} are easily derived as the limit of our results when the sample size tends to be large. We also study the asymptotic efficiency of the Sharpe ratio statistics and provide exact distribution under AR(1) normal process conditions. We examine finally the impact of compounding effect for computing the Sharpe ratio. The standard square root rule is questionable as soon as there is autocorrelation or homoscedasticity. \section{Primer on Student distribution}\label{Student} \subsection{Historical anecdote: why Student?} The Student t-distribution has been widely studied in statistics. Originally derived as a posterior distribution in 1876 by \cite{Helmert_1876} and \cite{Luroth_1876} as well as in a more general form as Pearson Type IV distribution in \cite{Pearson_1985}, the Student distribution was really popularized by William Sealy Gosset in \cite{Student_1908}. There is various interpretations why this distribution has been published under the pseudonym 'Student'. Gosset, an Oxford graduate, worked at the Guinness Brewery in Dublin, Ireland. He was interested in testing small samples – for instance, he wanted to test the chemical properties of barley where sample sizes might be as few as 3. The main version of the origin of the pseudonym is that Gosset's employer, Guiness, preferred staff to use pen names to keep secret their inventions. So when publishing scientific papers, instead of their real name, scientist used different names to hide their identity. Gosset chose the name "Student". Posterity kept this name for the distribution. Another version is that Guinness was reluctant to make public to their competitors their usage of the t-test to determine the quality of raw materials. All in all, Gosset's most noteworthy achievement is now called Student's, rather than Gosset's, t-distribution. \subsection{Assumptions} If $X, ..., X_n$ are independent and identically distributed as a normal distribution with mean $\mu$ and variance $\sigma^2$, then the empirical average \[ \bar{X} = \frac {1} {n} \sum_{i=1}^n X_i \] follows also a normal distribution. The empirical (Bessel-corrected) variance \[ \hat{\sigma}^2 = \frac 1 {n-1} \sum_{i=1}^n (X_i - \bar X)^2 \] follows (up to the renormalizing term $n-1$) a Chi Square distribution with $n-1$ degree of freedom. The t- statistic defined as \begin{equation}\label{tstatistic} \frac{ \bar X - \mu_0} {\hat{\sigma} / \sqrt{n}} = \sqrt{n} \,\,\, \frac{ \bar X - \hat \mu_0} { \hat{\sigma} } \end{equation} has a Student's t-distribution with $n-1$ degrees of freedom. If the variables $(X_i)_{i=1..n}$ have a mean $\mu$ different from $\mu_0$, the distribution is referred to as a non-central t-distribution with non centrality parameter given by \begin{equation} \eta = \sqrt n \quad \frac{\mu - \mu_0}{\sigma} \end{equation} It is simply the expectation of the estimator. The centered and non centered Student distribution are very well known. Extension to weaker condition for the t-statistics has been widely studied. \cite{Mauldon_1956} raised the question for which pdfs the t-statistic as defined by \ref{tstatistic} is t-distributed with $n - 1$ degrees of freedom. This characterization problem can be generalized to the one of finding all the pdfs for which a certain statistic possesses the property which is a characteristic for these pdfs. \cite{Kagan_1973}, \cite{Bondesson_1974} and \cite{Bondesson_1983} to cite a few tackled Mauldon’s problem. \cite{Bondesson_1983} proved the necessary and sufficient condition for a t-statistic to have Student’s t-distribution with $n - 1$ degrees of freedom for all sample sizes is the normality of the underlying distribution. It is not necessary that $X_1,...,X_n$ is an independent sample. Indeed consider $X_1,...,X_n$ as a random vector $X_n = (X_1,...,X_n)^T$ each component of which having the same marginal distribution function, $F(·)$. \cite{Efron_1969} has pointed out that the weaker condition of symmetry can replace the normality assumption. Later, \cite{Fang_2001} showed that if the vector $X_n$ has a spherical distribution, then the t-statistic has a t-distribution. A possible extension of Mauldon’s problem is to find all $F(·)$ for which the Student’s t-statistic has the t-distribution with $n - 1$ degrees of freedom. Another extension is to determine the distribution of the t-statistic under weaker conditions. \\ \\ \subsection{A few properties} Its cumulative distribution function can be expressed in closed form (see for instance \cite{Lenth_1989}) as follows: \begin{equation} F_{n-1 ,\eta }(x)= \begin{cases}{ \tilde{F}}_{n-1 ,\eta }(x),&{\mbox{if }}x\geq 0;\\ 1-{\tilde {F}}_{{n-1 ,-\eta }}(x),&{\mbox{if }}x<0, \end{cases} \end{equation} \noindent where ${\tilde {F}}_{n-1 ,\eta}(x)=\Phi (-\eta ) + \frac {1}{2} \sum _{j=0}^{\infty }\left[p_{j}I_{y}\left(j+{\frac {1}{2}},{\frac {n-1 }{2}}\right)+q_{j}I_{y}\left(j+1,{\frac {n-1 }{2}}\right)\right]$, \\ $I_{y}\,\!(a,b)$ is the regularized incomplete beta function,\\ $y=\frac {x^{2}}{x^{2}+n-1 }$,\\ $p_{j}=\frac{1}{j!} \exp \left\{-{\frac {\eta ^{2}}{2}}\right\}\left({\frac {\eta ^{2}}{2}}\right)^{j}$,\\ $q_{j}={\frac{\eta }{{\sqrt {2}}\Gamma (j+3/2)}}\exp \left\{-{\frac {\eta ^{2}}{2}}\right\}\left({\frac {\eta ^{2}}{2}}\right)^{j}$,\\ and $\Phi$ is the cumulative distribution function of the standard normal distribution. \\\\ Its probability density function can be expressed in several forms. The most common form (as implemented in R) is the following: \begin{equation} f(x)={ \begin{cases}{\frac {n-1 }{x}}\left\{F_{{n+1,\eta }}\left(x{\sqrt {1+{\frac {2}{n-1 }}}}\right)-F_{{n-1 ,\eta }}(x)\right\},&{\mbox{if }}x\neq 0;\\{\frac {\Gamma ({\frac {n}{2}})}{{\sqrt {\pi n-1 }}\Gamma ({\frac {n-1 }{2}})}}\exp \left(-{\frac {\eta ^{2}}{2}}\right),&{\mbox{if }}x=0. \end{cases}} \end{equation} \noindent In general, the kth raw moment of the non-central t-distribution is \begin{equation} {\mbox{E}}\left[T^{k}\right]={ \begin{cases}\left({\frac {n-1 }{2}}\right)^{{{\frac {k}{2}}}}{\frac {\Gamma \left({\frac {n-1-k}{2}}\right)}{\Gamma \left({\frac {n-1}{2}}\right)}}{\mbox{exp}}\left(-{\frac {\eta ^{2}}{2}}\right){\frac {d^{k}}{d\eta ^{k}}}{\mbox{exp}}\left({\frac {\eta ^{2}}{2}}\right),&{\mbox{if }}n-1 >k;\\{\mbox{Does not exist}},&{\mbox{if }}n-1 \leq k.\\\end{cases}} \end{equation} \subsection{Lower moments}\label{Lower_moments} In particular, for $n > 3$, the mean and variance of the non-central t-distribution are defined and given by \begin{equation} \begin{aligned} \mathbb{E} \left[T\right] &= \eta {\sqrt {{\frac {n-1 }{2}}}}{\frac {\Gamma ( \frac{n-2}{2}) }{\Gamma ( \frac{n-1}{2} )}} = \eta \,\, k_n \\ Var\left[T\right] &= \frac {(n-1) (1+\eta ^{2})}{n-3}-E\left[T\right] ^{2} \end{aligned} \end{equation} \noindent where we have defined the constant $k_n = {\sqrt {{\frac {n-1 }{2}}}}{\frac {\Gamma ( \frac{n-2}{2} )}{\Gamma ( \frac{n-1}{2})}}$. A good approximation for $k_n$ (related to the Wallis ratio $\frac {1}{\sqrt \pi} \frac{\Gamma ( n+1 / 2)}{\Gamma ( n + 1 )} $) is $1 + \frac{3}{4n} +\frac{25}{32 n^2} + O (n^{-3})$ (see \cite{Digital_Library_Maths}). More on the Wallis ratio and multiple approximations can be for instance found in \cite{MORTICI2010}, \cite{Guo2013}, \cite{Qi_2015}, \cite{Lin_2017}). Another good approximation is $ \frac{1}{ 1 - \frac{ 3}{4n - 5}}$. Instead of the constant $k_n$, it is quite common in statistical control litterature (see \cite{Duncan_1986} for instance) to use another constant called $c_4(n)$ (since there exists table for it) defined as follows \begin{eqnarray} c_4(n) = \sqrt {\frac{2}{n-1}} {\frac {\Gamma( \frac{n}{2})}{\Gamma ( \frac{n-1}{2})}} \end{eqnarray} Using the traditional property of the Gamma function $\Gamma(n+1) = n \Gamma(n)$, it is immediate to see that $k_n = \frac{n-1}{n-2} c_4(n)$. \subsection{Asymptotic distribution}\label{Asymptotic_distribution} When $n$ tends to infinity, the t-distribution denoted by $t$ tends to a normal distribution denoted by $N( \eta, \sigma) $ whose parameters are the first two moment of the non centered Student distribution. A better approximation is provided by \cite{Walk_2007} which states that \begin{equation}\label{Walk_result} \frac{t (1- \frac 1 {4(n-1)}) - \eta }{ \sqrt{1 + \frac{t^2}{2 (n-1) }} } \rightarrow N(0, 1) \end{equation} \section{Application to the Sharpe ratio} \subsection{Non central distribution} Let us apply these result to the eponymous Sharpe ratio denoted in the sequel (SR). Recall that it is defined as the ratio of expected excess return ($\bar R - R_f$) over the risk free rate $R_f$ to its standard deviation, $\sigma$: \begin{equation} SR = \frac{\bar R - R_f}{\sigma} \end{equation} The Sharpe ratio is simply the t-statistic divided by $\sqrt n$. In other terms, $\sqrt n SR $ follows a (centered or not) Student distribution \textbf{under the explicit assumption that the returns are normally distributed according to a normal distribution with mean $\boldsymbol{\mu_R = \bar R}$, variance $\boldsymbol{\sigma^2}$ and are i.i.d.}. Because $\bar R$ and $\sigma$ are unobservable, they are estimated using historical data as the population moments of the returns' distribution. Hence, given historical returns $(R_1, R_2,..., R_n)$, the standard estimator for the Sharpe ratio (SR) is given by \begin{equation} \widehat{SR} = \frac{\hat{ \bar R} - R_f}{\hat \sigma} \end{equation} where \begin{equation} \hat{ \bar R } =\frac{\sum_{i=1}^n R_i }{n} \end{equation} \begin{equation} \hat \sigma = \sqrt{\frac { \sum_{i=1}^n \left( R_i - \hat{ \bar R} \right)^2 }{ n-1}} \quad \text{or equivalently} \quad \hat \sigma = \sqrt{\frac { \sum_{i=1}^n \left(R_i ^2 - \hat{ \bar R}^2 \right) }{ n-1}} \end{equation} Precomputing $\hat{ \bar R }$ avoids a double summation in the definition of the volatility estimator. The $n-1$ divisor is for the estimator to be unbiased. Hence, the formula for SR in terms of the individual returns $\left( R_i \right)_{i=1..n}$ is given by: \begin{equation} \widehat{SR} = \frac{\sqrt{n-1} \sum_{i=1}^n \left( R_i - R_f \right) }{ n \sqrt{\sum_{i=1}^n \left( R_i - \hat{ \bar R} \right)^2 } } \end{equation} An immediate application of the results of section \ref{Student} \, shows that $\sqrt n SR $ follows a non-central t-distribution with degree of freedom $n-1$. The non-centrality parameter $\mu$ is given by \begin{equation} \eta = \sqrt n \; \frac{\mu_R - R_f}{\sigma} = \sqrt n \; SR_{\infty} \end{equation} where the theoretical Sharpe ratio $SR_{\infty}$ is defined as $SR_{\infty} = \frac{\mu_R - R_f}{\sigma}$. Section \ref{Student} \, provides the exact distribution of the SR. This result that is quite basic is surprisingly almost absents in the financial literature although it was alluded in \cite{Miller_1978}. It is not for instance mentioned or noted in \cite{Lo_2002}. This result although simple is powerful yet as it provides various results for the Sharpe ratio. \begin{itemize} \item First, it provides the real distribution (and leads obviously to the asymptotic distribution as the asymptotic distribution of the non-central t-distribution). \item Second, all results for the t-statistic are directly transposable to SR, meaning we get for free any results about test, moments, cumulative distribution and cumulative density functions. \item Third, as we are able to compute moments, we can immediately see that SR is biased estimator \end{itemize} \subsection{Moments}\label{Sharpe_moment} We have in particular that the moments of the Sharpe ratio estimator are immediately provided by \begin{eqnarray}\label{SR_M1} \mathbb E \left[SR \right] &= &SR_{\infty} \; {\sqrt {{\frac {n-1 }{2 }}}}{\frac {\Gamma ((n-2)/2)}{\Gamma (n-1 /2)}} \\ & = & SR_{\infty} \; k_n \end{eqnarray} and \begin{eqnarray}\label{SR_M2} Var\left[SR \right] &= &\frac{(n-1) (1+SR_{\infty} ^{2})}{n-3}-E\left[SR \right] ^{2} \end{eqnarray} Equation \ref{SR_M1} implies in particular that the empirical SR is biased with a bias term given by $k_n$, which is a result already noted in \cite{Miller_1978} and \cite{JobsonKorbie_1981}. As the constant $k_n$ is larger than one and multiplicative, the empirical Sharpe ratio will overestimate $SR_{\infty}$ when positive, and underestimate when negative. For one year of data and monthly data point, the bias $k_12$ is about 1.08, indicating an overestimation of 8 percents. We provide below in table \ref{tab:bias} the computation of bias for various value of $n$. The bias decreases rapidly as $n$ increases and is below 2 percents after roughly 3 years. \begin{table}[H] \centering \caption{Sharpe ratio biais} \begin{tabular}{l | rrrrrrrr} \toprule n & 3 & 6 & 12 & 24 & 36 & 48 & 60 & 120 \\ \midrule \midrule bias & 1.772 & 1.189 & 1.075 & 1.034 & 1.022 & 1.016 & 1.013 & 1.006 \\ \bottomrule \end{tabular \label{tab:bias \end{table \subsection{A few results} Using previous results \ref{Sharpe_moment}, we have the following result that extends the result of \cite{Lo_2002} \begin{proposition}\label{prop:1} SR under normal i.i.d. returns assumption is asymptotically normal in $n$ with standard deviation $\sigma_{IID,1}$ given by \begin{equation}\label{SIID_1} \sigma_{IID,1} = \sqrt{ 1+ \frac{ SR_{\infty} ^2} {2} } \end{equation} Another asymptotic approximation for the standard deviation (that is better for small n) is given by \begin{equation} \sigma_{IID,2} = \sqrt{ \frac{1+ \frac{ SR_{\infty} ^2} {2} } {1- 1 / n}} \end{equation} Last but not least, a more precise estimation of the standard deviation is given by \begin{equation} \sigma_{IID,3} = \frac{ \sqrt{ 1 + \frac{ SR_{\infty} ^2} {2 (1-1/n)} }}{1 - \frac{1}{4 (n-1)}} \end{equation} The proposition means from a distribution point of view the following \begin{equation}\label{eq:asymptotic_distribution} \sqrt n ( \hat{SR} - SR_{\infty} ) \rightarrow N(0, \sigma_{IID,i}) \end{equation} for $i=1$ to 3 depending on which version of the asymptotic standard deviation is used, where in the equation \eqref{eq:asymptotic_distribution} the normal distribution is parametrized in terms of the standard deviation. \end{proposition} \begin{proof} Immediate using previous results and given in \ref{proof:1} \end{proof} Proposition \ref{prop:1} provides tighter bound for the asymptotic distribution than the one provided in \cite{Lo_2002}. In particular, it states that the $1- \alpha$ confidence interval for the empirical Sharpe ratio $\hat {SR}$ is given by \begin{equation} \hat {SR} \pm q_{\alpha / 2} \sigma_{IID,i} \end{equation} for $i=1$ to 3 where $q_{\alpha/2}$ is the $\alpha / 2$ quantile of the normal distribution in the asymptotic case. In the non asymptotic case, one needs to use the quantile of the non centered distribution. It is enlightening to compare the various estimator of the variance of SR. We provide in table \ref{tab:variance3} the computation of these volatilities for various values of $SR$ and $n$ according to formula $\sigma_{IID,3}$ For reference, we have also provided in appendix computation according to formula $\sigma_{IID,1}$ respectivly $\sigma_{IID,2}$ in table \ref{tab:variance1} and \ref{tab:variance2} as well as the difference with our best estimator of the variance of the Sharpe ratio. \begin{table}[H] \centering \caption{Asymptotic variance for SR according to formula $\sigma_{IID,3}$} \begin{tabular}{|r|rrrrrrrr|} \toprule \multicolumn{1}{|l|}{SR} & 12 & 24 & 36 & 48 & 60 & 125 & 250 & 500 \\ \midrule \midrule 0.5 & 0.308 & 0.217 & 0.177 & 0.153 & 0.137 & 0.095 & 0.067 & 0.047 \\ 0.75 & 0.330 & 0.232 & 0.189 & 0.164 & 0.146 & 0.101 & 0.072 & 0.051 \\ 1 & 0.359 & 0.252 & 0.205 & 0.177 & 0.159 & 0.110 & 0.078 & 0.055 \\ 1.25 & 0.393 & 0.275 & 0.224 & 0.194 & 0.173 & 0.120 & 0.084 & 0.060 \\ 1.5 & 0.431 & 0.301 & 0.245 & 0.212 & 0.189 & 0.131 & 0.092 & 0.065 \\ 1.75 & 0.472 & 0.329 & 0.267 & 0.231 & 0.206 & 0.143 & 0.101 & 0.071 \\ 2 & 0.515 & 0.359 & 0.291 & 0.252 & 0.225 & 0.155 & 0.110 & 0.078 \\ 2.25 & 0.560 & 0.390 & 0.316 & 0.273 & 0.244 & 0.169 & 0.119 & 0.084 \\ 2.5 & 0.606 & 0.421 & 0.342 & 0.296 & 0.264 & 0.182 & 0.129 & 0.091 \\ 2.75 & 0.654 & 0.454 & 0.369 & 0.318 & 0.284 & 0.196 & 0.139 & 0.098 \\ 3 & 0.702 & 0.487 & 0.395 & 0.341 & 0.305 & 0.210 & 0.149 & 0.105 \\ \bottomrule \end{tabular \label{tab:variance3 \end{table An interesting feature of SR variance is that it decreases asymptotically as $\frac{ 1 } { n }$ or equivalently as $\frac{ 1 } { n }$. SR variance is quite large as for instance for an empirical Sharpe ratio of 1 and 12 month of data, the variance represents almost .36 or 36\% of it. If we take a quantile of 97.5\% whose student quantile is 2.201 (for 11 degree of freedom) as opposed to the normal well known quantile of 1.96, this implies that our Sharpe ratio lies between $1 \pm 2.201\times 0.359$ which provides as boundaries that the empirical Sharpe lies between $[ 0.210, 1.790 ]$. This is very wide range and shows the imprecision of the Sharpe. Even for longer maturities like 5 years, the range is still wide: $1 \pm 2.00 \times 0.159 = [ 0.682, 1.318 ]$. \subsection{Efficiency of the empirical Sharpe ratio} Using the Frechet Darmois Cramer Rao inequality, we can prove the following result that shows that the empirical SR is asymptotically efficient in the sense that it achieves the Cramer Rao bound \begin{proposition}\label{prop:2} under normal i.i.d. returns assumption, the estimator resulting from the empirical SR and the empirical variance is asymptotically efficient, meaning that it achieves the lower bound in terms of Cramer Rao bound given by \begin{equation} CRB = \frac{1}{n} { \left( \begin{array}{cc} 1+ SR_{\infty}^2 / 2 & -SR_{\infty} \sigma^2 \\ -SR_{\infty} \sigma^2 & 2 \sigma^4 \end{array} \right) } \end{equation} \end{proposition} \begin{proof} Given in \ref{proof:2} \end{proof} \subsection{Weaker conditions} \cite{Lo_2002}, \cite{Mertens_2002} and later \cite{Christie_2005} derived the asymptotic distribution of the Sharpe ratio under the more relaxed assumption of stationarity and ergodicity. \cite{Opdyke_2007} interestingly showed that the derivation provided by \cite{Christie_2005} under the non-IID returns condition was in fact identical to the one provided by \cite{Mertens_2002}. \cite{Liu_2012} and \cite{Qi_2018} improved approximation accuracy to order $O(n^{-3/2})$ . \subsection{Sample SR under AR(1) assumptions} \subsubsection{Exact distribution for normal AR(1)} The i.i.d. normal assumption for the return is far from being verified in practice. A more realistic set-up is to assume that the returns follow an AR(1) process defined as follows: \begin{equation}\label{AR_assumptions} \left\{ { \begin{array}{l l l l } R_t & = & \mu + \epsilon_t & \quad t \geq 1 ; \\ \epsilon_t & = & \rho \epsilon_{t-1} + \sigma v_t & \quad t \geq 2 ; \end{array} } \right. \end{equation} where $v_t$ is an independent white noise processes (i.i.d. variables with zero mean and unit constant variance). To assume a stationary process, we impose \begin{equation} \lvert {\rho} \rvert \leq 1 \end{equation} It is easy to check that equation \ref{AR_assumptions} is equivalent to \begin{equation} \begin{array}{l l l l } R_t & = & \mu + \rho ( R_{t-1} - \mu )+ \sigma v_t & \quad t \geq 2 ; \end{array} \end{equation} We can also easily check that the variance and covariance of the returns are given by \begin{equation}\label{moment2} \begin{array}{l l l l } V(R_t) & = & \frac {\sigma^2} {1-\rho^2} \; \;\;\;\; \text{for} \; t \geq 1 \\ Cov(R_t, R_u ) & = & \frac {\sigma^2 \rho^{ \lvert {t -u} \rvert }} {1-\rho^2} \; \;\;\;\; \text{for} \; t,u \geq 1 \end{array} \end{equation} Both expressions in \ref{moment2} are independent of time $t$ and the covariance only depends on $\lvert {t -u} \rvert$ implying that $R_t$ is a stationary process. If we now look at the empirical SR under these assumptions, it should converge to \begin{equation} \frac{ \mathbb{E}[{R_t}] - R_f } { \sqrt {var(R_t)}} = \frac{ \mu - R_f}{\sqrt { \frac{ \sigma^2 }{ 1- \rho^2}}} \end{equation} \subsubsection{Impact of sub-sampling} Another interesting feature that was first mentioned in \cite{Lo_2002}, is the impact of computing annual Sharpe using monthly data. This can be formalized as follows: Let us define the $q$ period return as \begin{equation} R_t(q) \equiv R_t + R_{t-1} + \ldots+ R_{t-q+1} \end{equation} where in our definition, we have ignored the effects of compounding for computational efficiency\footnote{Of course, the exact expression for compounding returns is $ R_t(q) \equiv \prod_{i=0}^{q-1}( 1 + R_{t-j} )-1$. But the sake of clarity, we can ignore the compounding effect in our section as this will be second order effect. Equally, we could use log or continuously compounded returns defined as $\log(P_t/P_{t-1})$ in which case, our definition would be exact }. We are interested in measuring effect of auto correlation and heteroscedasticity of returns on the Sharpe ratio and the impact of using for instance monthly return for computing annual Sharpe. Let us denote by $SR(q)$ the SR computed with $q$ period returns. Its limit is defined as follows: \begin{eqnarray} SR(q) & = & \frac{ \mathbb{E}[ R_t(q) ] - R_{f}}{ \sqrt{ Var[R_t(q)] } } \end{eqnarray} Let us denote the returns mean by $\mu$, the auto correlation by $\rho_{u,v} = Corr(R_{u}, R_{v})$ and the returns variance by $\sigma_{\infty}^2 = \lim_{t \rightarrow \infty} Var[R_t]$. It is interesting to see the linkage between the $q$ period SR denoted by $SR(q)$ and the regular SR denoted by $ SR = \frac{ \mu - R_{f}}{ \sigma_{\infty} } $. This is the subject of the following proposition \begin{proposition}\label{prop:3} The ratio between the $q$ period returns $SR(q)$ and the regular SR is the following: \begin{equation}\label{SRq_eq1} \frac{SR(q)}{SR} = \frac{q \sigma_{\infty} }{ \sqrt{ \sum_{i=0}^{q-1} \sigma^2_{t-i} + 2 \sum_{k=1}^{q-1} \sum_{i = 0 }^{q-1-k } \rho_{t-i, t-i-k} \sigma_{t-i} \sigma_{t-i-k} } } \end{equation} If the return process is stationary with a constant variance $\sigma^2 = Var[R_t] =\sigma_{\infty}^2 $ and stationary correlation denoted by $\rho_{v-u} = Corr( R_{u},R_{v})$, this relationship simplifies to \begin{equation}\label{SRq_eq2} \frac{SR(q)}{SR}= \sqrt{ \frac{ q} { 1 + 2 \sum_{k=1}^{q-1} (q-k) \rho_{k} } } \end{equation} If in addition, the returns follow an AR(1) process $\rho_k=\rho^k$, equation \ref{SRq_eq2} becomes \begin{equation}\label{SRq_eq3} \frac{SR(q)}{SR} = \sqrt{ \frac{ q} { 1 + \frac{ 2 \rho }{ 1-\rho} \left( 1 - \frac{ 1 - \rho^q}{q (1-\rho)} \right) } } \end{equation} If the returns are non correlated ($\rho_k=0$), equation \ref{SRq_eq3} becomes \begin{equation}\label{SRq_eq4} \frac{SR(q)}{SR} = \sqrt{ q} \end{equation} The last equation is the so called square root rule that states that the annual Sharpe is equal to $\sqrt{12}$ the monthly Sharpe. \end{proposition} \begin{proof} Given in \ref{proof:3} \end{proof} A numerical result is provided in table \ref{tab:compoudingSharpe}. Proposition \ref{prop:3} is important as it shows that the compounding effect (computing annual Sharpe with monthly return) can have some large impact when using the square root rule to convert the monthly Sharpe to the annual Sharpe in presence of autocorrelation and heteroscedasticity. \section{Conclusion} Even if Sharpe ratio is the norm of funds financial analysis, we have shown that its empirical estimate has various bias that makes its usage for ranking questionable. Generally, there is well reported literature that Sharpe ratios are skewed to the left, fat tailed and very sensitive to small samples (see \cite{Goetzmann_2012}). Not surprisingly, the bias are highly influenced by the statistical properties of the returns time series (and in particular auto-correlation and heteroscedasticy). Our work extends previous results in terms of the real distribution of the empirical Sharpe ratio and give as a by-product standards results obtained in the Sharpe ratio financial literature. This work advocates for more substantial analysis when ever comparing funds and in particular a good understanding of investment style to identify potential skew and autocorrelation in fund presented performance monthly returns. This also encourages to use various other performance ratios to analyze deeply funds performance. \clearpage
\section{Introduction} Young stars are often surrounded by circumstellar dust debris disks or rings. These consist of solid bodies, such as planetesimals and comets, as well as large amounts of dust and small amounts of gas. Small dust grains with a broad size distribution are generated in steady collisions of solid bodies and perhaps by the evaporation of comets. Debris disks are usually recognized by infrared (IR) excess on top of the spectral energy distribution (SED) of the stellar photosphere because of the thermal emission of the heated dust grains \citep[see, e.g.,][for a review]{Wyatt2008, Matthews2014}. In scattered light, debris disks are usually very faint, i.e., $> 10^3$ times fainter than the host star, and therefore they are difficult to image. To date, several dozen debris disks have been spatially resolved in various wavelength bands, from visible to millimeter, using various space and ground-based telescopes. These data provide important constraints on the debris disk morphologies \citep[e.g.,][]{Moerchen2010, Schneider2014, Choquet2016, Olofsson2016, Bonnefoy2017}. In the absence of imaging data, the location of the bulk of dust in the system can be inferred from the grain temperature derived by SED modeling. Based on modeling results, most debris disks have been found to harbor warm dust, meaning that the temperature of small grains lies between 100 and approximately 300 K \citep[e.g.,][]{Moor2006, Trilling2008, Chen2011, Morales2011}. Cold debris reside far away from the host star where their temperature does not exceed 100 K. The prominent analogs to warm and cold dust belts are the main asteroid belt at 2-3.5 au and the Kuiper belt between 30 and 48 au in the solar system \citep{Wyatt2008}. Aside from this, several stars with hot disks have been found \citep{Wyatt2007, Fujiwara2009} based on the IR excess with an estimate temperature above 300 K. The stars that possess hot dust are very interesting targets because the submicron-sized grains at a small small distance from a star could be a signpost for transient collision events. HD 172555 (HIP 92024, HR 7012) is one of the most studied objects among these special stellar systems \citep{Cote1987, Schuetz2005, Chen2006, Wyatt2007a, Lisse2009, Smith2012, Riviere-Marichalar2012, Johnson2012, Kiefer2014, Wilson2016, Grady2018}. \begin{table*} \caption[]{Log of observations with the atmospheric conditions for each run.} \centering \label{Settings} \renewcommand{\arraystretch}{1.3} \begin{tabular}{cccccccccc} \hline \hline Date&Observation & Field & & \multicolumn{4}{c}{Observing conditions (on average)} \\\cline{5-8} &identification$^1$ & offset [$^\circ$] & & Airmass & Seeing ["] & Coherence time [ms] & Wind speed [ms$^{-1}$] \\ \hline \hline \noalign{\smallskip} 2015-06-21&OBS172\_0004-0036 & 0 & &1.32& 1.39 &1.1 & 7.9\\ 2015-06-26&OBS177\_0010-0042 & 120 & &1.31 & 0.78 &3.5 & 6.7\\ 2015-07-12&OBS193\_0049-0081 & 60 & &1.33 & 1.41 &0.9 & 1.8\\ 2015-09-06&OBS249\_0028-0060 & 0 & &1.35 & 0.93 &3.8 & 9.0\\ 2015-09-06&OBS249\_0061-0094 & 60 & &1.47 & 1.11 &3.4 & 8.7\\ 2015-09-07&OBS250\_0002-0034 & 120 & &1.55 & 2.01 &1.0 & 16.1\\ \hline \hline \noalign{\smallskip} \end{tabular} \begin{flushleft} {\bf Notes.} $^{(1)}$ The observation identification corresponds to the fits-file header keyword ``origname'' without prefix ``SPHERE\_ZIMPOL\_''. The first three digits give the day of the year followed by the four-digit observation number. \\ Instrument setup for the deep imaging mode: Fast polarimetry, VBB filter, derotator mode P2, coronagraph V\_CLC\_MT\_WF, and total exposure time for each run 42.7 min. \\ Instrument setup for the flux calibration mode: Fast polarimetry, VBB filter, density filter ND2, derotator mode P2, and total exposure time for each run 14.4 s.\end{flushleft} \end{table*} HD 172555 is a V = 4.8$^{m}$, A7V star \citep{Hog2000, Gray2006} at a distance of $28.33\pm 0.19$ pc \citep{GaiaCollaboration2016} and a member of the $\beta$ Pictoris moving group. The deduced age for the group is $23\pm3$ Myr \citep{Mamajek2014}. HD 172555 has a K5Ve low mass companion CD-64 1208, separated by more than 2000~au or 71.4$''$ \citep{Torres2006}. The Infrared Astronomical Satellite (IRAS) identified HD 172555 as a Vega-like star that has a large IR excess with an effective temperature of 290~K \citep{Cote1987}. Mid-infrared (mid-IR) spectroscopy from the ground \citep{Schuetz2005} and 5.5-35 $\mu$m spectroscopy obtained with the \textit{Spitzer} Infrared Spectrograph (IRS) show very pronounced SiO features \citep[][their Fig. 2(d)]{Chen2006} indicating large amounts of submicron sized crystalline silicate grains with high temperatures (> 300 K). \cite{Lisse2009} proposed, based on the spectral analysis of mineral features, that the IR-excess emission originates from a giant collision of large rocky planetesimals similar to the event that could have created the Earth-Moon system. Until now, only one resolved image of the HD 172555 debris disk existed that was obtained in the Qa band ($\lambda_c=18.30\, \mu$m, $\Delta\lambda=1.52\, \mu$m; hereafter Q band) with TReCS (Thermal-Region Camera Spectrograph) at Gemini South telescope and described by \citet{Smith2012}. They detected extended emission after subtraction of a standard star point spread function (PSF), which is consistent with an inclined disk with an orientation of the major axis of $\theta=120^{\circ}$, an inclination of $\approx75^{\circ}$, and a disk outer radius of 8 au. In Si-5 filter ($\lambda_c=11.66\, \mu$m, $\Delta\lambda=1.13\, \mu$m; hereafter N band) data, the disk was not detected. Combining these results with the visibility functions measured with the MID-infrared Interferometric instrument (MIDI), \cite{Smith2012} concluded that the warm dust radiating at $\sim$10 $\mu$m is located inside 8 au from the star or inside the detected 18 $\mu$m emission. The proximity of the host star and strong excess in the mid-IR \citep[$L_{\rm {IR}}/L_{\ast}=7.2\cdot 10^{-4}$;][]{Mittal2015} from hot dust, makes HD 172555 an excellent, yet challenging, object for the search of scattered light. In this paper, we report the first detection of scattered light from the hot debris disk around HD 172555 with polarimetric differential imaging (PDI). We present the PDI data from 2015 taken with ZIMPOL (Zurich IMaging POLarimeter; Schmid et al. 2018, submitted) at the Very Large Telescope (VLT) in Chile. The ZIMPOL instrument provides high contrast imaging polarimetry, coronagraphy with a small inner working angle of $\sim$0.1$''$, and high spatial resolution of $\sim$25 mas. The next section presents the available data together with a brief description of the instrument. Section 3 describes the data reduction and Section 4 the obtained results. Section 5 includes analysis of the observed disk morphology and photometry. For the interpretation of the data we calculated three-dimensional (3D) disk models for spatial distribution of dust to put constraints on the geometric parameters of the disk and to estimate the flux cancellation effects in the Stokes $Q$ and $U$ parameters. In Sect.~\ref{Discussion}, we compare our results with previous TReCS and MIDI observations \citep{Smith2012}. We also investigate the possible presence of a very compact dust scattering component that would not be detectable in our data. We conclude and summarize our findings in Sect. \ref{s_Summary}. \section{Observations} \label{Observations} Observations of HD 172555 were taken in service or queue mode during six runs in 2015 as part of the open time program 095.C-192 using ZIMPOL, the visual subsystem of the SPHERE (Spectro-Polarimetric High-contrast Exoplanet REsearch) instrument. The SPHERE instrument was developed for high contrast observations in the visual and near-IR spectral range and includes an extreme adaptive optics (AO) system and three focal plane instruments for differential imaging \citep[][Schmid et al. 2018, submitted]{Beuzit2008, Kasper2012,Dohlen2006,Fusco2014}. The ZIMPOL polarimetry is based on a modulation-demodulation technique and our observations of HD 172555 in the VBB filter were carried out in the fast modulation mode using field stabilization, which is also known as the P2 derotator mode. The ZIMPOL modulation technique measures the opposite polarization states of incoming light quasi-simultaneously and with the same pixels such that differential aberrations between $I_\perp$ and $I_\parallel$ are minimized. Fast modulation means a polarimetric cycle frequency of 967.5~Hz, which is obtained with a ferro-electric liquid crystal (FLC) and a polarization beam splitter in front of the demodulating CCD detector. The high detector gain of 10.5 e$^-$/ADU allows broadband observations with high photon rates without pixel saturation and ensures high sensitivity at small angular separations at the expense of a relative high readout noise. The ZIMPOL VBB or RI filter used ($\lambda_c=735$~nm, $\Delta\lambda=290$~nm) covers the R band and I band. Polarimetric data were taken in coronagraphic mode using the Lyot coronagraph V\_CLC\_MT\_WF with a diameter of 155 mas. The mask is semi-transparent such that the central star is visible as faint PSF in the middle of attenuation region if the stellar PSF is of good quality (good AO corrections) and well centered on the mask. Short flux calibrations (the star was offset from the coronagraphic mask) with detector integration time (DIT) of 1.2 s and total exposure time of 14.4~s were also taken in each run using the neutral density filter ND2 with a transmission of about 0.87\% for the VBB filter to avoid heavy saturation of the PSF peak. The ZIMPOL instrument is equipped with two detectors/cameras, cam1 and cam2, which both have essentially the same field of view of $3.6''\times 3.6''$. The format of the processed frame is $1024\times 1024$ pixels, where one pixel corresponds to $3.6\times 3.6$ mas on sky. The spatial resolution of our data provided by the AO-system is about $25$~mas. The HD 172555 data were taken at three different sky orientations on the CCD detectors with position angle (PA)\ offsets of $0^{\circ},\ 60^{\circ}$ and $120^{\circ}$ with respect to sky north. For each field orientation, eight polarimetric QU cycles were recorded consisting each of four consecutive exposures of the Stokes linear polarization parameters $+Q, -Q, +U$ and $-U$ using half-wave plate (HWP) offset angles of 0$^{\circ}$, 45$^\circ$, 22.5$^\circ$, and 67.5$^\circ$, respectively. For each exposure, eight frames with DIT of 10~s were taken and this yields a total integration of 10~s $\times$ 8 frames $\times$ 4 exposures $\times$ 8 cycles or $\sim$42.7 minutes. Because of a timing error in the control law \citep[see][]{Maire2016} of the derotator during the first three runs performed in June 2015, the program was re-executed in August and September 2015. However, it turned out that this timing error was so small, that it does not significantly affect the imaging of an extended source at small separation. Therefore none of the six disk observations for HD 172555 are degraded by this effect. All our deep polarimetric observations of HD 172555 are listed in Table\,\ref{Settings} together with the observing conditions, which have an important impact on the data quality. \section{Data reduction}\label{data} \begin{figure*} \centering \includegraphics[width=17.5cm]{I_Q_U_v2.pdf} \caption{Polarimetric differential imaging data of HD 172555 with the VBB filter (590-880 nm). The $8\times 8$ binned images show polarized flux computed as Stokes $I$ (left column), $Q_\varphi$ (middle column), and $U_\varphi$ (right column) parameters. Top row: Observation OBS177\_0010-0042 (see Table \ref{Settings} for the observational conditions) data averaged over 8 QU cycles. Middle row: Observation OBS249\_0028-0060 data averaged over 6 QU cycles. Bottom row: Average of the data presented in the top and middle rows. The position of the star is denoted by a yellow asterisk. White arrows point out quasi-static speckles from the AO system. In all images north is up and east is to the left. The color bars show the counts per binned pixel. \label{QphiUphi} } \end{figure*} The data were reduced with the SPHERE-ZIMPOL data reduction pipeline developed at ETH Zurich. We applied very similar procedures as in \citet{Engler2017} using flux normalization before polarimetric combination of the data. For high contrast polarimetry at small separations from the star an accurate centering and the correction of the ZIMPOL polarimetric beam-shift are important (Schmid et al. 2018, submitted). The stellar position behind the mask should be determined with a precision higher than 0.3 pixels, otherwise the final image shows strong offset residuals disturbing the detection of a faint polarimetric signal. For the fine centering we fitted a 2D Gaussian function using a central subimage with a radius of eight pixels containing the stellar light spot transmitted through a semitransparent coronagraphic focal plane mask. The output of the data reduction pipeline consists of images of the intensity or Stokes $I$ and the Stokes $Q$ and $U$ fluxes, where $Q=I_0-I_{90}$ is positive for a linear polarization in N-S-direction and $U=I_{45}-I_{135}$ is positive for a polarization in NE-SW direction. For the data analysis, we transformed the $Q$ and $U$ images into a tangential or azimuthal polarization images $Q_\varphi$ and $U_\varphi$, locally defined with respect to the central light source. This transformation is useful for an optically thin circumstellar scattering region because the polarization signal is mainly in the $Q_\varphi$ component, while $U_\varphi$ should be zero \citep[e.g.,][see also Appendix \ref{s_modeling_app}]{Schmid2006}. During the data reduction, it turned out that an accurate centering of our HD 172555 images is difficult and not possible for a substantial portion of our data because several runs suffered from mediocre atmospheric conditions with a seeing $>1''$ and therefore strongly reduced AO performance. Because of this problem only data from the best night 177 (2015-06-26; see Table~\ref{Settings}) with an average seeing of $0.78''$ and most data from the second best night 249 (2015-09-06) with seeing of $0.93''$ could be used for our high contrast polarimetry. Figure~\ref{IQU} shows the Stokes $I$, $Q,$ and $U$ images of these data sets in comparison with the reduced data from the other observing runs that were affected by poor observing conditions. To have a higher S/N per resolution element, images were $8 \times 8$ (Fig. \ref{QphiUphi}) binned for the data analysis and modeling. In Fig.~\ref{Qphi} we used a smaller binning ($6 \times 6$) to preserve the spatial information and to have a more detailed picture of the disk. \begin{figure*} \includegraphics[width=17cm]{Qphi_177_rot25_contours-40_110.pdf} \centering \caption{$Q_\varphi$ image (a) and isophotal contours of polarized light intensity overlying the $Q_\varphi$ image (b). The original data (OBS177\_0010-0042) were $6\times 6$ binned to highlight the disk shape and to reduce the photon noise level. The position of the star is indicated by a yellow asterisk. White brackets in the top panel show the boundaries of two rectangular areas where the counts were summed up to retrieve the total polarized flux of the disk (see Sect. \ref{Contrast}). Image (b) is smoothed via a Gaussian kernel with $\sigma_{\rm kernel} =$ 3 px. The isophotal contours show levels of the surface brightness with approx. 25, 40, and 50 counts per binned pixel (from the lowest to the highest contour). Arrows "A" and "B" mark the location of the increased surface brightness, which could indicate the radius of the planetesimal belt. The $x$-axis coincides with the disk axis at estimated PA $\theta_{\rm disk}=112^{\circ}$ (see Sect. \ref{Data Analysis}). The color bar shows the surface brightness in counts per binned pixel. \label{Qphi}} \end{figure*} \section{Features in the reduced data}\label{s_Results} The top row of Figure \ref{QphiUphi} shows the main results of our data reduction, i.e., the mean intensity or Stokes $I$, Stokes $Q_\varphi$, and $U_\varphi$ images using all eight cycles of the best night. The second row shows the same for six out of eight cycles from the second best night. The bottom row is the mean of these data. The quality of the data can be easily recognized in the coronagraphic intensity images. These images show, for the best night (top), a much weaker halo and a weaker speckle ring at a separation of about $r\approx 0.35''$ than for the second best night (middle). For all other nights the disturbing light halo and speckles from the central star are even stronger (see Fig.~\ref{IQU}). Also clearly visible in Fig.~\ref{QphiUphi} is the rotated speckle pattern in the top $I$ image, which was taken with a field orientation of $120^\circ$, with respect to the middle $I$ image taken without field orientation offset or $0^\circ$. In the latter image two strong quasi-static speckles from the AO system (indicated with white arrows) are located left and right from the central source on the speckle ring. The same speckles are rotated in the top image by 120$^\circ$ because of the applied field rotation. The $Q_\varphi$ image from the best night in the top row shows a positive signal or tangential polarization for regions just ESE and WNW from the coronagraphic mask and some noisy features at the location of the two strong speckles. The corresponding $U_\varphi$ image is also noisy but shows no predominant extended feature as seen in $Q_\varphi$. The same ESE--WNW extension is also present in the $Q_\varphi$ image of the second best night, but now the disturbing strong speckles are adding noise in the E-W direction, particularly well visible in the $U_\varphi$ image. Besides this, both $Q_\varphi$ and $U_\varphi$ for the second best night show a quadrant pattern that is typical for a not perfectly corrected component from the telescope polarization. The following analysis of the disk morphology and modeling are based on the $Q_\varphi$ image in the top row obtained under the best observing conditions because these data are the least affected by noise. The fact that we see the same kind of extended feature in the ESE-WNW orientation in both data sets (from the best and second best nights), while other features can clearly be associated with instrumental effects, strongly supports an interpretation that this is a real detection of the debris dust around HD 172555. This is further supported by the fact that the orientation and extent of the detected feature coincides at least roughly with the disk detection reported previously by \citet{Smith2012} based on imaging in the mid-IR. In our image there is a prominent bright spot located below the coronagraphic mask. Most likely it is a spurious feature originating from image jitter and the temporal leakage of light of the central star from behind the coronagraphic mask. It is seen more particularly in 177 data set, which argues against this being a real feature. A final remark on the data quality. Our data look noisy and are affected by not well corrected instrumental effects. However, we note that the signals in the $Q_\varphi$ and $U_\varphi$ images are at a very low level of 0.001 of the signal in the intensity frame or the surface brightness in the $Q_\varphi$ image is on the order $10^{-5}$ of the expected peak flux of the central star for a separation of $<0.3$~arcsec. The detection of this faint target requires very high contrast polarimetry at small angular separation. Not all instrumental effects are understood and can be calibrated at this level of sensitivity yet. \begin{figure*} \centering \includegraphics[width=16cm]{SB_profile_177_bg_modem_v3_orange_sym.jpeg} \caption{Radial polarized flux profile measured in the $Q_\varphi$ image per $0.029''(\Delta x) \times 0.290''(\Delta y)$ bin (red solid line) compared with profiles of the best-fitting models and background. The background above (green solid line) and below (light green dotted line) the disk midplane and the background in the $U_\varphi$ image (black solid line) are calculated as explained in Sect.~\ref{Data Analysis}. The upper limit is set for the polarized flux per bin for the disk regions beyond $r= 0.53''$. The arrows "A" and "B" point to the surface brightness peaks. } \label{f_SB_profile} \end{figure*} \section{Analysis} \label{Data Analysis} \subsection{Disk position angle and morphology} \label{s_PA} To determine the PA of the disk $\theta_{\rm disk}$, we varied the position of the disk major axis in the range from $\theta_{\rm disk}=105^\circ$ to $\theta_{\rm disk}=125^\circ$ with a step of 0.5$^\circ$. Each time the $Q_\varphi$ image was rotated by $\theta_{\rm disk}-90^{\circ}$ clockwise to place the disk major axis horizontally and then we determined the difference between the left side and the mirrored right side of the image. The minimum residual flux corresponding to the best match between disk sides is achieved at $\theta_{\rm disk}= 113.5^{\circ}$ for the data set from 2015-06-26 (night 177) and at PA $= 116.5^{\circ}$ for the data set from 2015-09-06 (night 249). We adopted the PA equal $\theta_{\rm disk}=114^{\circ} \pm 3^{\circ}$. This PA should be corrected for the ZIMPOL True North offset of $-2^{\circ}$, which means the preprocessed image must be rotated by $2^{\circ}$ clockwise. The final PA of the disk is, therefore, $\theta_{\rm disk}=112^{\circ} \pm 3^{\circ}$ north over east (NoE), where the indicated uncertainty includes associated systematic errors. For the following data analysis, the $Q_\varphi$ image was rotated by $24^{\circ}$ clockwise, including the correction for the True North offset, to place the disk major axis horizontally. We introduced an $x-y$ disk coordinate system with the star at the origin and the $+x$ coordinate along the derived disk major axis in WNW direction and the $y$ coordinate perpendicular to this with the positive axis toward NNE ($\theta =22^\circ$) as shown in Fig. \ref{Qphi}(b). The observed $Q_\varphi$ flux image shows areas of enhanced surface brightness at the separations $|x|\simeq 0.1-0.3''$ but located about $0.04''$ above the $x$-axis and this up-down asymmetry is reflected clearly in the surface brightness contours shown in Fig. \ref{Qphi}(b). \begin{table*} \caption[]{Disk model parameters. \label{t_results}} \centering \begin{tabular}{l|cccc|cc} \hline \hline \noalign{\smallskip} \multirow{ 2}{*}{Optimized parameter} &\multicolumn{4}{c|}{Grid model} & \multicolumn{2}{c}{MCMC model} \\ & Range & Step & Min $\chi^2_\nu$ & Mean value & Range & Best-fit value \\ \hline \noalign{\smallskip} Position angle $\theta_{\rm disk}$, deg & (...) & (...) & (...) & (...) & [109, 114]& 112.3$^{+1.5}_{-1.5}$ \\[5pt] Radius of 'belt' $r_0$, arcsec (au) & [0.21, 0.42] & 0.0175 & 0.38 & 0.36$^{+0.06}_{-0.06}$ $\left(10.3^{+1.7}_{-1.7}\right)$ &[0.25, 0.50]& 0.40$^{+0.06}_{-0.06}$ $\left(11.3^{+1.7}_{-1.7}\right)$ \\[5pt] Scale height $H_0$, arcsec (au) &[0.00, 0.1] & 0.02 & 0.04 & 0.05$^{+0.04}_{-0.04}$ $\left(1.36^{+1.23}_{-1.23}\right)$ &[0.00, 0.1]& 0.02$^{+0.01}_{-0.01}$ $\left(0.6^{+0.3}_{-0.3}\right)$ \\[5pt] Inner radial index $\alpha_{\rm in}$ &[0, 6] & 1 & 3 & 3.5$^{+3.3}_{-3.3}$ & [0, 6]& 2.3$^{+0.8}_{-0.6}$ \\[5pt] Outer radial index $\alpha_{\rm out}$ & [-11, 0] & 1 & -7 & -6.8$^{+5.7}_{-5.7}$ & [-20, 0]& -9.8$^{+2.5}_{-4.1}$ \\[5pt] Flare index $\beta$ & [0.25, 1.50] & 0.25 & 0.25 & 0.45$^{+2.75}_{-2.75}$ & [0.0, 1.0] & 0.4$^{+0.4}_{-0.3}$ \\[5pt] Inclination $i$, deg & [96, 111] & 1 & 105 & 103.5$^{+8.2}_{-8.2}$ &[96, 111]& 103.8$^{+1.7}_{-1.7}$ \\[5pt] HG parameter $g_{\rm sca}$ & [0.2, 1.0]& 0.1 & 0.6 & $0.64^{+0.38}_{-0.38}$ & [0.2, 1.0] & $0.74^{+0.08}_{-0.10}$ \\[5pt] Scaling factor $A_p$ & (...) & (...) & 1.1 & $0.9^{+12.36}_{-12.36}$ & (...) & $2.8^{+0.8}_{-0.9}$ \\[5pt] \noalign{\smallskip} \hline \hline \noalign{\smallskip} \end{tabular} \end{table*} \begin{figure}[h] \centering \includegraphics[width=8cm]{model_sym_orange.pdf} \caption{Comparison of the grid model with the $Q_\varphi$ image. (\textbf{a}): $Q_\varphi$ image after 8x8 binning. (\textbf{b}): Image of the best-fitting grid model convolved with the instrumental PSF. (\textbf{c}): Residual image obtained after subtraction of the PSF-convolved grid model image ({\bf b}) from the $Q_\varphi$ image ({\bf a}). Color bar shows flux in counts per binned pixel. \label{model}} \end{figure} Figure \ref{f_SB_profile} shows the profile for the polarized flux along the $x$-axis measured in bins of $\Delta x=29$~mas and integrated in the $y$-direction from $ y= -0.13''$ to $y=+0.16''$. Our data show a higher flux closer to the star with a maximum flux inside $r=0.3''$ and two small brightness peaks at $|x|\approx 0.3''$ (8.5 au) indicated with arrows "A" and "B" in Figs.~\ref{Qphi}(b) and \ref{f_SB_profile}. Figure \ref{f_SB_profile} also includes background profiles determined below and above the disk major axis by summing up the counts from $ y= -0.42''$ to $y=-0.13''$ (light green dotted line) and from $ y= +0.16''$ to $y=+0.45''$ (green solid line). The disk flux is at least twice as high as the background, except for a small region around $x\approx +0.23''$ where the background is particularly high. The origin of the enhanced background below the disk midplane is unclear. The errors on flux per bin were calculated from the variance of the sum of pixel values in bins assuming a sample of normal random variables. The uncertainty of the pixel value is given by the standard deviation of the flux distribution (counts per pixel) computed in concentric annuli in the $Q_\varphi$ image (excluding the area containing the disk flux) to take into account the radial dependence of the data variance. As an additional noise estimator, we measured the background in the $U_\varphi$ image (black solid line in Fig.~\ref{f_SB_profile}) in the same areas where the polarized flux of the disk was measured in the $Q_\varphi$ image. The polarized scattered light from the disk is detected up to a radial distance of $r\sim 0.8''$. Beyond $r=0.3''$, the polarized flux per x-bin is less than 8 ct/s. \subsection{Modeling the observed disk flux} \label{Modelling} We modeled the spatial distribution of dust in HD 172555 disk with the 3D single scattering code presented in \citet{Engler2017}. The disk geometry is described by a radius $r_0$, where the radial distribution of the grain number density has a maximum, and by inner and outer radial power-law falloffs with exponents $\alpha_{\rm in}$ and $\alpha_{\rm out}$, respectively. For the vertical distribution we adopt the simpler Lorentzian profile instead of the exponential profile. The former profile has already been used for this purpose \citep[e.g.,][]{Krist2005} and has an advantage that it is described with one parameter less. The Lorentzian profile is given by \[f_L(h)=a_L{\left[ 1 + \left(\frac{h}{H(r)}\right)^2\right]}^{-1} ,\] where $h$ is the height above the disk midplane and $a_L$ is the peak number density of grains in the disk midplane. The scale height of the disk $H(r)$ is defined as a half width at half maximum of the vertical profile at radial distance $r$ and scales as in $H(r)=H_0 \, (r/r_0)^\beta$. \\ The parameters of the model are the PA of the disk $\theta_{\rm disk}$, the radius of the planetesimal belt $r_0$, inner $\alpha_{\rm in}$ and outer $\alpha_{\rm out}$ power law exponents, scale height $H_0$, flare exponent $\beta$, inclination angle $i$, Henyey-Greenstein (HG) scattering asymmetry parameter $g_{\rm sca}$ and the scaling factor $A_p$. The scattering phase function for the polarized flux $f_{\rm p} \, (\theta, g_{\rm sca})$ is the product $f_{\rm p} \, (\theta, g_{\rm sca}) = HG (\theta, g_{\rm sca})\cdot p_{\rm Ray}(\theta)$ of the HG function and the Rayleigh scattering function (see Fig.~8 in \citet{Engler2017}). We assume that the debris disk is optically thin and neglect multiple scattering. The HG parameter has only positive values ($0\leqslant g_{\rm sca} \leqslant 1 $) assuming that the dust particles are predominately forward-scattering as inferred from imaging polarimetry of other highly inclined debris disks \citep[e.g.,][]{Olofsson2016, Engler2017}. This means that the brighter side of the disk is the near side and the inclination higher than 90$^\circ$ defines a disk with its near side toward north as in the case of the HD 172555 disk. To simplify the model computation, we adopt the same grain properties everywhere in the disk. The average scattering cross section per particle is a free parameter included in the scaling factor $A_p$. The $Q_\varphi$ model image is calculated from the combination of the PSF convolved images of the Stokes parameters $Q$ and $U$. The individual steps of the modeling procedure are described and illustrated in Appendix \ref{s_modeling_app}. To find parameters of the model that best fits the $Q_\varphi$ image (Fig.~\ref{model}a), we took a twofold approach: first, we fitted the data with models drawn from a parameter grid and second we used the Markov chain Monte Carlo (MCMC) technique. \subsubsection{Grid of models} \label{s_Grid} We define an extensive parameter grid of $\sim$10$^4$ models and calculate a synthetic $Q_\varphi$ image for each model. The explored parameter space and steps of linear sampling are given in Table~\ref{t_results}, Cols. 2 and 3. In this first modeling approach, the disk PA is set to $\theta_{\rm disk}=112^\circ$, which is the PA value found in the previous section (Sect.~\ref{s_PA}). The flux scaling factor $A_p$ is treated as a free parameter for each model and is obtained by minimizing the $\chi^2$ for the fit of the $Q_\varphi$ model image to the data. The reduced $\chi_\nu^2$ metric is estimated as follows: \begin{equation} \label{eq_chi2} \chi^2_{\nu} = \frac{1}{\nu}\sum_{i=1}^{N_{\rm data}} \frac{\left[ F_{i,\, {\rm data}}- A_p\cdot F_{i,\, {\rm model}}(\vec{p})\right]^2 }{ \sigma_{i,\, {\rm data}}^2} ,\end{equation} where $N_{\rm data}$ is a number of pixels used to fit the data, $F_{i,\, {\rm data}}$ is the flux measured in pixel $i$ with an uncertainty $\sigma_{i,\, {\rm data}}$, and $F_{i,\, {\rm model}}(\vec{p})$ is the modeled flux of the same pixel. The degree of freedom of the fit is denoted by $\nu = N_{\rm data}-N_{\rm par}$, where $N_{\rm par}$ represents the number of model parameters $\vec{p}=(p_{1}, p_{2}, ..., p_{N_{rm par}})$. To be less affected by single pixel noise and to speed up this procedure, we reduce the number of pixels of the original $Q_\varphi$ image (Fig. \ref{Qphi}(a)) by $8\times 8$ binning and select a rectangular image fitting area with a length of 63 and width of 19 binned pixels (1.83$'' \times 0.55''$; Fig. \ref{model}(a)) centered on the star. A round area with radius of 2.5 binned pixels covering the coronagraph and a few pixels around this region are excluded from the fitting procedure. The minimum $\chi^2_\nu =1.17$ is achieved for the model with parameters listed in Col.~4 of Table~\ref{t_results}. Considering all the models that fit the observations well and have a $\chi^2_\nu < 2,$ we derive the parameter distribution and fit a Gaussian for each model parameter (see Fig.~\ref{Hist}). We adopt the mean values of the parameter distribution as the best-fitting model presented in Col.~5 of Table~\ref{t_results}. The errors on the mean parameters are given by the 68~\% confidence interval derived for the respective distribution. \subsubsection{MCMC modeling} \label{s_MCMC modeling} We use the parameters of the best-fitting model from the parameter grid (Sect.~\ref{s_Grid}) as a starting point for the MCMC run. To perform this analysis, we employed the Python module $ emcee$ by \cite{Foreman-Mackey2013}, which implements affine invariant MCMC sampler suggested by \cite{Good2010}. The uniform priors are defined as specified in Col.~6 of Table~\ref{t_results}. Contrary to the modeling with a grid of parameters (Sect.~\ref{s_Grid}), the PA $\theta_{\rm disk}$ is allowed to vary. For the run of the standard ensemble sampler, 1000 walkers are initialized to perform a random walk with 2000 steps. The posterior distributions of the parameters shown in Fig.~\ref{f_mcmc} are obtained discarding the burn-in phase of 400 walker steps. The mean fraction of the accepted steps within the chain is 0.342 and the maximum autocorrelation time of parameter samples is 90 steps. This indicates a good convergence and stability of the chain by the end of the MCMC run \citep{Foreman-Mackey2013}. A set of the most probable parameters, which are considered to be the parameters of the best-fitting MCMC model, is listed in Col.~7 of Table~\ref{t_results}. These parameters are derived as the 50th percentile of the posterior distribution. Their lower and upper uncertainties are quoted based on the 16th and 84th percentiles of the samples, respectively. Figure~\ref{f_mcmc} demonstrates the degeneracy between some of the model parameters, for instance, between HG parameter $g_{\rm sca}$ and inclination of the disk $i$ or scale height $H_0$. \subsubsection{Modeling results} \label{s_modeling results} The MCMC sampling result for the PA of the disk is essentially the same as the PA we found by subtracting one disk side from the other (Sect.~\ref{s_PA}). Regarding other parameters, the best-fitting grid model (Table \ref{t_results} Col. 5) and the MCMC model (Table \ref{t_results} Col. 7) are consistent with each other. They indicate a disk radius $r_0$ between 10 and 12 au and a disk inclination of $\approx$103.5$^\circ$. The scale height of the vertical profile $H_0$ is 10 to 20 times smaller than the radius of the disk. According to the MCMC model, the outer density falloff is at least steeper than about $\alpha_{\rm out}= -7$. It is not clear whether the disk is cleared inside $r_0$ because the inner radial index $\alpha_{\rm in}$ is smaller than 3. Both models indicate a relatively high asymmetry parameter for scattering $g_{\rm sca} \approx 0.7$. This result could be affected by a higher surface brightness, which we observe inside $r=0.2''$. The flare index $ \beta$ is the only parameter that remains unconstrained in both modeling methods (grid and MCMC) showing a tendency to be 0. Both models fit the $Q_\varphi$ image equally well according to the $\chi^2_{\nu}$ metric: the grid model has a $\chi^2_{\nu} = 1.20$ ($\nu = 1152$) and the MCMC model has a $\chi^2_{\nu} = 1.19$ ($\nu = 1151$). The residual images of both models show no noticeable differences. Therefore, in Fig.~\ref{model}, we show only the grid model in comparison to the $Q_\varphi$ image. Also, the radial profiles for the polarized flux of both models, which are calculated in the same bins as in the $Q_\varphi$ image (Fig.~\ref{model}(a)), are qualitatively very similar (cf. yellow solid and dotted lines in Fig.~\ref{f_SB_profile}a). \subsubsection{Modeling cancellation effect} \label{s_cancelation effect} The synthetic image of the best-fitting model (Fig. \ref{model}(b)) is important for a correction of the polarized flux due to the extended instrument PSF. One effect is the loss of polarization signal because parts of it are outside the flux integration aperture. The second and more important effect for compact sources is the polarization cancellation effect where the positive and negative $Q$ flux features in the Stokes $Q$ image, and similar for Stokes $U$, cancel each other substantially if their separation is not much larger than the PSF. As described in \cite{Schmid2006} and \cite{Avenhaus2014}, this can easily cause a reduction of the measurable polarization flux by a factor of two or more, depending on the source geometry and PSF structure. We determine the total polarized flux for our best-fit model before and after convolution with the instrument PSF and derive for the cancellation effect a factor of 0.61 for our observations of the HD 172555 debris disk. In addition we find that only 82~\% of the polarized flux of the convolved images fall into the rectangular disk-flux measuring areas indicated by the white corners in Fig. \ref{Qphi}, while 4~\% of the flux is covered by the coronagraphic mask near the star and 14~\% of the polarized flux are distributed in a very low surface brightness halo further out. \begin{figure*} \centering \includegraphics[width=17cm]{SED_LF_v2.jpeg} \caption{Photometry of the star and disk together with the blackbody SED fits. \label{f_SED_LF}} \end{figure*} \subsection{Measured polarized flux contrast of the disk} \label{Contrast} To compare the polarized flux from the disk with the stellar flux we first derive the expected count rates of the star in the coronagraphic image, if there were no coronagraph hiding its PSF peak. This is obtained with the flux frames where the star is offset from the coronagraphic mask. We use two flux measurements from the nights when we obtained good results (177 and 249) and derive a mean count rate for the central star of $(4.36 \pm 0.08)\cdot10^5$ counts per second (ct/s) per ZIMPOL arm by summing up all counts registered within the aperture with a radius of $1.5''$ (413 pixels). Then we correct with a factor of 1.007 for the coronagraph attenuation at a distance of 0.35$''$ from the stellar PSF peak and a factor of $\sim$115 to account for the mean transmission of the neutral density filter ND2.0 in the VBB filter. We obtain an average count rate of $(5.00\pm 0.14)\cdot10^7$ ct/s per ZIMPOL arm for the expected flux of the central star for observation in the fast polarimetry mode with the pupil mask but without correction for the attenuation by the focal plane mask or ND2.0 filter. For the disk, we derive the total polarized flux by summing up all the counts in two rectangular areas indicated with white brackets in Fig. \ref{Qphi}(a), from $|x|=0.08''$ to 0.77$''$ along the major axis and from $y= -0.13''$ to 0.16$''$ perpendicular to it. The innermost regions with radial separations $|x|<0.08''$ are largely hidden behind the coronagraphic mask, and therefore they are not included in this estimate. The total polarized flux in the VBB filter after the modulation-demodulation efficiency calibration amounts to $780\pm150$ (ESE side, left) and $760 \pm150$ (WNW side, right) ct/s and per ZIMPOL arm. Therefore, the total net flux obtained by integrating over abovementioned areas is $1540\pm300$ ct/s per ZIMPOL arm. \\ This measured flux must still be corrected for the polarimetric cancellation effects to get a value for the intrinsic polarized flux. Because of the limited spatial resolution of our data, the polarization in the positive and negative $Q$ regions is reduced since signals with opposite signs overlap and cancel each other. We quantified this effect and calculated correction factors using our best-fit model (see description in the last paragraph of Sect. \ref{Modelling}). Taking into account the PDI efficiency, which causes the reduction of disk polarized flux by a factor of $\sim$1.7 and correction factor for the aperture size (see Sect. \ref{Modelling}), the total polarized flux of the disk is at least twice as large as the total net flux and is equal to $3100\pm600$ ct/s per ZIMPOL arm. This flux corresponds to the intrinsic modeled polarized flux compatible with our observation. With this value, the lower limit for the ratio of the disk total polarized flux to the stellar flux is $(F_{\rm pol})_{\rm disk}/F_{\rm \ast} \geqslant (6.2 \pm 0.6)\cdot 10^{-5}$ (cf. with the ratio $(F_{\rm pol})_{\rm disk}/F_{\rm \ast} = 3.1\cdot 10^{-5}$ obtained for the net flux $(F_{\rm pol})_{\rm disk} = 1540$ ct/s). \subsection{Polarimetric flux} \label{s_Star_flux} To check our photometry, we compare the measured stellar flux with the stellar magnitudes from the literature. The stellar count rate of $(4.36\pm 0.08)\cdot10^5$ ct/s per ZIMPOL arm before correction for the transmission of the neutral density filter can be converted to the photometric magnitude $m$(VBB) \citep{Schmid2017} as follows: \[m(\mathrm{VBB}) = -2.5 \log (\mathrm{ct/s})-\mathrm{am}\cdot k_1(\mathrm{VBB})-m_{\mathrm{mode}}+ \mathit{z}p_{\mathrm{ima}}(\mathrm{VBB}) ,\] where am~$=1.3$ is the airmass, $ k_1(\mathrm{VBB})=0.086^m$ is the filter coefficient for the atmospheric extinction, $\mathit{z}p_{\mathrm{ima}}(\mathrm{VBB})=24.61^m$ is the photometric zero point for the VBB filter, and $m_{\mathrm{mode}}= 5.64^m$ is an offset to the zero point, which accounts for the instrument configuration, pupil stop (STOP1\_2), neutral density filter ND2.0, and the fast polarimetry detector mode. For HD 172555 we derive a magnitude $m(\mathrm{VBB})$ = 4.68$^m \pm 0.03^m$ (indicated with a black asterisk in Fig.~\ref{f_SED_LF}). This value is in good agreement with the Johnson photometric magnitude in R band $m(\mathrm{R})$ = $4.887^m \pm 0.023^m $ and I band $m(\mathrm{I}) = 4.581^m \pm 0.025^m $ \citep{Johnson1966}. For the estimated above ratio of the disk total polarized flux to stellar flux $(F_{\rm pol})_{\rm disk}/F_{\rm \ast} \geqslant (6.2 \pm 0.6)\cdot 10^{-5}$, disk magnitude in the VBB filter is $mp_{\mathrm{disk}}(\mathrm{VBB})$ = 15.20$^m \pm$ 0.37$^m$ (indicated with a blue asterisk in Fig.~\ref{f_SED_LF}). At radial separation of $r \approx 0.3''$ indicated with arrows "A" and "B" in Figs.~\ref{Qphi}(b) and \ref{f_SB_profile}, the peak surface brightness is $\sim$15~ct/s per binned pixel (0.029$'' \times 0.029''$) and corresponds to the ${\rm SB} \mathrm{_{peak}(VBB)} = 13.3^m \pm 0.3^m$ arcsec$^{-2}$ or surface brightness contrast for the polarized flux of ${\rm SB} \mathrm{_{peak}(VBB)} - m \mathrm{_{star}(VBB)} = 8.62$ mag arcsec$^{-2}$. \section{Discussion} \label{Discussion} \subsection{Comparison with thermal light detection and interferometry} \label{s_Smith} The disk geometry is consistent with the $18~\mu$m image presented in \cite{Smith2012}. They found two lobes of extended emission along PA $= 110^\circ$ with a separation of about $0.4''$ from the star and a flux of $105$~mJy. On top of this, they measured a roughly seven times stronger (732~mJy) unresolved dust component and a stellar flux of 202~mJy. In the N-band image the dust was not resolved by \citet{Smith2012}, but their N-band MIDI interferometry resolved the dust fully, putting it at separations between $>0.035''$ and $<0.27''$ ($1-8$~au). Therefore, we also expect that a lot of polarized light from the dust scattering contributes to the signal inside the inner working angle of the SPHERE/ZIMPOL observations at $0.12''$, which cannot be measured. The disk modeling of the infrared flux by \citet{Smith2012} yields a disk with radius $r=0.27''$ and width $dr= 1.2r,$ which is equivalent to the ring with constant surface brightness between $0.1''$ and $0.4''$, inclined at 75$^\circ$ to the line of sight and at PA$= 120^\circ$ for the disk major axis. We confirm these parameters with our observation and can provide more stringent parameters for the inclination and the disk orientation because of the higher spatial resolution of our data. Also the disk extension agrees, but it is not clear whether the scattered light emission and thermal emission should show the same radial flux distributions. In Fig.~\ref{f_SED_LF}, we compare the flux distribution $\lambda F_{\lambda}$ from the stellar photosphere with the thermal emission of the disk and the polarized flux distribution measured in this work. Photometric data points of HD 172555 are listed in Table~\ref{t_SED} and plotted as green diamonds in Fig.~\ref{f_SED_LF}, which also includes a $Spitzer$/IRS spectrum\footnote{downloaded from http://www.stsci.edu/~cchen/irsdebris.html}. The stellar spectral flux density is approximated by a Planck function for the star temperature of 7800 K \citep{Riviere-Marichalar2012}. A black asterisk (labeled VBB) denotes the stellar magnitude measured in the VBB (this work). The near-IR aperture photometry of HD 172555 in the N and Q bands (green diamonds at 11.7 and 18.3 $\mu$m), performed by \citet{Smith2012} using TReCS imaging data, is indicated by capital letters `$N$' and `$Q$'. The thermal flux from the disk is shown as a blackbody emission with the temperature of 329 K found by \cite{Riviere-Marichalar2012} (orange solid line). The net polarized flux measured in the $Q_\varphi$ image (Sect.~\ref{Contrast}) is indicated by a light blue asterisk (labeled with '$I_{pol}=Q_\varphi$'), and the polarized flux corrected for the polarimetric cancellation effects and aperture size is indicated by a blue asterisk in this figure. The blue dotted line shows an approximate curve for the SED of the polarized light obtained by scaling down the SED of the star. Using our best-fitting grid model we roughly estimated the scattered flux from the disk (averaged over full solid angle) in the VBB filter. This conversion neglects the contribution from the diffracted light and assumes that the maximum polarization fraction of the phase function for the polarized flux is $p_{\rm max}= 0.3$. This value is denoted with a yellow asterisk and labeled '<$I_{sca}$>'. We used this magnitude as a proxy for the scattered flux of the disk to compare it with the maximum thermal flux of the disk at $\lambda = 10$ $\mu$m and thus to estimate a kind of the disk albedo. We obtain <$I_{sca}$>$\,(p_{\rm max}= 0.3)$/$\lambda F_{\lambda}\,$($\lambda = 10$ $\mu$m) = 0.54, which should be considered as a very rough estimate for this ratio. The lower and upper limits on the scattered flux $I_{sca}$, shown in Fig.~\ref{f_SED_LF}, are obtained assuming maximum polarization fraction $p_{\rm max}= 0.1$ (for the upper limit) and $p_{\rm max}= 0.7$ (for the lower limit). \begin{table} \caption[]{Photometry of HD 172555. \label{t_SED}} \centering \begin{tabular}{lcccc} \hline \hline \noalign{\smallskip} Filter & Wavelength & Flux density & Error & Ref.\\ & ($\mu$m) & (Jy) & (Jy) & \\ \hline \noalign{\smallskip} Johnson $B$ & 0.44 & 53.87 & 0.94 & 1 \\[5pt] Johnson $V$ & 0.55 & 38.45 & 0.53 & 1 \\[5pt] Johnson $R$ & 0.7 & 33.40 & 0.71 & 1\\[5pt] Johnson $I$ & 0.9 & 35.74 & 0.82 & 1 \\[5pt] Si-5 ($N$) & 11.7 & 1.120 & 0.067 & 2 \\[5pt] Qa ($Q$) & 18.3 & 1.039 & 0.085 & 2 \\[5pt] PACS70 & 70 & 0.191 & 0.005 & 3 \\[5pt] PACS100 & 100 & 0.089 & 0.003 & 3 \\[5pt] PACS160 & 160 & 0.036 & 0.02 & 3 \\[5pt] \noalign{\smallskip} \hline \hline \noalign{\smallskip} \end{tabular} \begin{flushleft} {\bf References.} (1) \citet{Johnson1966}; (2) \cite{Smith2012}; (3) \cite{Riviere-Marichalar2012}. \end{flushleft} \end{table} \begin{figure*} \centering \includegraphics[width=16cm]{model_hidden_v3_minmax_corr.pdf} \caption{Model of the small debris disk that could be hidden behind the coronagraphic mask. The model parameters correspond to those of the mean model (Table \ref{t_results}) except the radius of the belt and scale height of the dust vertical distribution, which are reduced by a factor of 5. ({\bf a}) $Q_\varphi$ image of the debris disk model showing the polarized intensity before being convolved with the instrumental PSF. ({\bf b}) $Q_\varphi$ image of the debris disk model showing the polarized intensity after convolution with the instrumental PSF. The black circle denotes the edge of the coronagraphic mask. ({\bf c}) $U_\varphi$ image of the model demonstrating nonzero $U_\varphi$ signal appearing after convolution of the Stokes $Q$ and $U$ parameters with the instrumental PSF. The color bars show counts per pixel. \label{f_hidden}} \end{figure*} \subsection{Hidden source of thermal emission } According to the mid-IR observations of \cite{Smith2012}, most of the dust is located inside 8~au, down to 1~au. Therefore, we investigate with model calculations whether a strong but compact source of scattered light could be present, which is not detectable in our data because of the limited resolution and inner working angle limit of the used coronagraph. The occulting spot in our coronagraphic data has a radius $r\sim0.08''$ (2.27 au). We model a small disk with a radius of 2 au (0.07$''$) with exactly the same geometric morphology as the best-fit grid model derived in Sect~\ref{Modelling}, but just smaller by a factor of 5. This small disk is shown als $Q_\varphi$ image in Fig.~\ref{f_hidden}(a), together with the convolved $Q_\varphi$ image with the size of the coronagraphic mask indicated in Fig.~\ref{f_hidden}(b). First, we notice a large difference between $Q_\varphi$ intrinsic polarized flux and the convolved polarized flux of a factor of 2.5 because of the very strong polarimetric cancellation for such a compact disk. Then, there is another factor 2.67 between the total convolved polarized flux from the disk and the convolved polarized flux that falls into the rectangular measuring areas of our observations shown in Fig.~\ref{Qphi}(a) because a major region of the polarization signal is hidden by the coronagraphic mask. Thus, only about 15~\% of the polarized flux produced by an inner compact disk would contribute to our measurement. We measure a net flux of 1540 ct/s in the measuring area of our observation and estimate that it is not possible to recognize an inner disk in our data, which contributes less than 150 ct/s to our measurement. Thus, an unseen compact disk with the geometry as described above and an intrinsic polarized flux of 6.675 x 150 ct/s could be present without being in conflict with our observations and even more scattered light could be hidden for a more compact inner disk. \subsection{Comparison between polarized flux and thermal emission} \label{s_Lambda parameter} To characterize the scattering albedo of the dust, we compute the $\Lambda$ parameter describing the ratio of the fractional polarized light flux to fractional infrared luminosity excess of the disk \citep{Engler2017}, i.e., \begin{displaymath} \Lambda = {(F_{\rm pol})_{\rm disk}/F_{\rm \ast} \over L_{\mathrm{IR}}/L_{\ast}}, \end{displaymath} where the ratio of total polarized flux of the disk to the stellar flux for HD 172555 is $(F_{\rm pol})_{\rm disk}/F_{\rm \ast} \geqslant (6.2 \pm 0.6)\cdot 10^{-5}$ (Sect. \ref{Contrast}). Adopting the ratio of the disk infrared luminosity to stellar luminosity $L_{\rm {IR}}/L_{\ast}$ equal to $7.2\cdot 10^{-4}$ \citep{Mittal2015}, we obtain a lower limit for $\Lambda \geqslant 0.086$. This value is slightly smaller than the $\Lambda$ parameters we have estimated for the F star HIP 79977 and the M star AU Mic ($\Lambda_{\rm HIP\, 79977}=0.11$ and $\Lambda_{\rm AU\, Mic}=0.55$) in \citet{Engler2017}. \section{Summary} \label{s_Summary} In this paper, we presented images of polarized scattered light from the debris disk around HD 172555 obtained in the VBB filter using differential polarimetry. We found that the observed polarized intensity is consistent with an axisymmetric dust distribution, which can be interpreted as a parent belt of planetesimals or disk with a radius in the range between 0.3$''$ (8.5 au) and 0.4$''$ (11.3 au). We analysed the disk structure and obtained the following results: \begin{itemize} \item The PA for the disk major axis is $\theta_{\rm disk} = 112.3^{\circ} \pm 1.5^{\circ}$ on the sky. \item The disk emission is slightly shifted in NNE direction from the star indicating that the front side or forward-scattering part of the disk is on the NNE side. The observed dust distribution can be described with the HG asymmetry parameter $g\approx0.7$ and disk inclination $\approx103.5^{\circ}$. \item Data analysis and modeling results do not suggest the clearing of the inner disk regions (inside $r=0.3''$). \item The total disk magnitude in polarized flux in the VBB filter is $mp_{\mathrm{disk}}(\mathrm{VBB})$ = 15.20$^m \pm$ 0.37$^m$ and the stellar flux is $m(\mathrm{VBB})$ = 4.68$^m \pm 0.03^m$. This gives a disk to star contrast $(F_{\rm pol})_{\rm disk}/F_{\rm \ast}$ of $(6.2 \pm 0.6)\cdot 10^{-5}$. The measured peak surface brightness of the polarized light is ${\rm SB} \mathrm{_{peak}(VBB)} = 13.3^m \pm 0.3^m$ arcsec$^{-2}$. This corresponds to a surface brightness contrast of ${\rm SB} \mathrm{_{peak}(VBB)} - m \mathrm{_{star}(VBB)} = 8.62$ mag arcsec$^{-2}$. \item When compared with the fractional infrared luminosity of the disk using the $\Lambda$ parameter, the fractional polarized light flux in the VBB filter makes up $\sim 9\%$. \end{itemize} Our data demonstrate high sensitivity and ability of ZIMPOL to resolve the polarized light from the hot debris around a nearby A star as close as $0.1''$ or $\sim$3 au. It would be worth reobserving HD172555 in the I band without the coronagraph. Additional observations of this target under excellent observing conditions, i.e., seeing $\leqslant 0.7$, airmass $\leqslant 1.4$, coherence time $ \geqslant 3.5$ ms, and wind speed $>3$ m/s, to avoid the low wind effect (see SPHERE Manual) and with different offsets of the sky field on the detector would allow us to better distinguish between the instrumental features in the PSF and the real astrophysical signal. In the VBB filter the speckle ring extends from $0.30''$ to $0.45''$ and overlaps the region of interest. In the I band, the speckle ring is further outside of $\sim0.40''$ and the achievable contrast is higher under optimal observing conditions even if the amount of photons received in the I band is a factor of 0.6 lower than in the VBB. Moreover, noncoronagraphic data taken with I band are more suitable for the measurement of the beam shift between the two orthogonal polarization states and, hence, the correction of the beamshift effect (Schmid et al. 2018, submitted) is much easier. Such observation may also allow us to probe the innermost dust in the HD 172555 system. \begin{acknowledgements} We would like to thank the referee for many thoughtful comments that helped to improve this paper. This work is supported by the Swiss National Science Foundation through grant number 200020 - 162630. \end{acknowledgements} \bibliographystyle{aa}
\section{Introduction} Character-level modeling of natural language text is challenging, for several reasons. First, the model must learn a large vocabulary of words ``from scratch''. Second, natural text exhibits dependencies over long distances of hundreds or thousands of time steps. Third, character sequences are longer than word sequences and thus require significantly more steps of computation. In recent years, strong character-level language models typically follow a common template \cite{conf/interspeech/MikolovKBCK10,extensionsmikolov,sundermeyer2012lstm}. A recurrent neural net (RNN) is trained over mini-batches of text sequences, using a relatively short sequence length (e.g.~200 tokens). To capture context longer than the batch sequence length, training batches are provided in sequential order, and the hidden states from the previous batch are passed forward to the current batch. This procedure is known as ``truncated backpropagation through time'' (TBTT), because the gradient computation doesn't proceed further than a single batch \cite{werbos1990backpropagation}. A range of methods have arisen for unbiasing and improving TBTT \cite{tallec2017unbiasing,ke2017sparse}. While this technique gets good results, it adds complexity to the training procedure, and recent work suggests that models trained in this manner don't actually make ``strong'' use of long-term context. For example \newcite{khandelwal2018lm} find that a word-based LSTM language model only effectively uses around 200 tokens of context (even if more is provided), and that word order only has an effect within approximately the last 50 tokens. In this paper, we show that a non-recurrent model can achieve strong results on character-level language modeling. Specifically, we use a deep network of transformer self-attention layers \cite{NIPS2017_7181} with causal (backward-looking) attention to process fixed-length inputs and predict upcoming characters. The model is trained on mini-batches of sequences from random positions in the training corpus, with no information passed from one batch to the next. Our primary finding is that the transformer architecture is well-suited to language modeling over long sequences and could replace RNNs in this domain. We speculate that the transformer's success here is due to its ability to ``quickly'' propagate information over arbitrary distances; by comparison, RNNs need to learn to pass relevant information forward step by step. We also find that some modifications to the basic transformer architecture are beneficial in this domain. Most importantly, we add three auxiliary losses, requiring the model to predict upcoming characters (i) at intermediate sequence positions, (ii) from intermediate hidden representations, and (iii) at target positions multiple steps in the future. These losses speed up convergence, and make it possible to train deeper networks. \section{Character Transformer Model} Language models assign a probability distribution over token sequences $t_{0:L}$ by factoring out the joint probability as follows, where $L$ is the sequence length: \begin{equation} \Pr(t_{0:L}) = P(t_0) \prod_{i=1}^{L} \Pr(t_i|t_{0:i-1}), \end{equation} To model the conditional probability $\Pr(t_i|t_{0:i-1})$, we train a transformer network to process the character sequence $t_{0:i-1}$. Transformer networks have recently showed significant gains in tasks that require processing sequences accurately and efficiently. Our character-level transformer architecture has 64 transformer layers. Following \newcite{NIPS2017_7181}, by ``transformer layer'' we mean a block containing a multihead self-attention sub-layer followed by a feed-forward network of two fully connected sub-layers. For more details on the transformer architecture, refer to \newcite{NIPS2017_7181} and the \texttt{tensor2tensor} library\footnote{\texttt{https://github.com/tensorflow/tensor2tensor}}. To ensure that the model's predictions are only conditioned on past characters, we mask our attention layers with a causal attention, so each position can only attend leftward. This is the same as the ``masked attention'' in the decoder component of the original transformer architecture used for sequence-to-sequence problems \cite{NIPS2017_7181}. Figure \ref{figure:transformer} shows our initial model with the causal attention mask limiting information flow from left to right. Each character prediction is conditioned only on the characters that appeared earlier. \input{figures/transformer_fig} \subsection{Auxiliary Losses} \label{section:aux} Our network is, to our knowledge, deeper than any transformer network discussed in previous work. In initial experiments, we found training a network deeper than ten layers to be challenging, with slow convergence and poor accuracy. We were able to deepen the network to better effect through the addition auxiliary losses, which sped up convergence of the training significantly. We add several types of auxiliary losses, corresponding to intermediate positions, intermediate layers, and non-adjacent targets. We hypothesize that these losses not only speed up convergence but also serve as an additional regularizer. During training, the auxiliary losses get added to the total loss of the network with discounted weights. Each type of auxiliary loss has its own schedule of decay. During evaluation and inference time, only the prediction of the final position at the final layer is used. One consequence of this approach is that a number of the network parameters are only used during training\textemdash specifically, the parameters in the output classification layers associated with predictions made from intermediate layers and predictions over non-adjacent targets. Thus, when listing the number of parameters in our models, we distinguish between ``training parameters'' and ``inference parameters''. \subsubsection{Multiple Positions} First, we add prediction tasks for each position in the final layer, extending our predictions from one per example to $|L|$ (sequence length). Note, predicting over all sequence positions is standard practice in RNN-based approaches. However in our case, since no information is passed forward across batches, this is forcing the model to predict given smaller contexts---sometimes just one or two characters. It is not obvious whether these secondary training tasks should help on the primary task of predicting with full context. However, we find that adding this auxiliary loss speeds up training and gives better results (see Ablation Experiments below). Figure \ref{figure:multiple_positions} illustrates the task of predicting across all sequence positions. We add these losses during training without decaying their weights. \input{figures/multiple_positions_fig} \subsubsection{Intermediate Layer Losses} \label{section:intermediate_layer_losses} In addition to the final prediction layer, we add predictions made from the output of each intermediate transformer layer. As with the final layer, we add predictions for all intermediate positions in the sequence (see Figure \ref{figure:layer_losses}). Lower layers are weighted to contribute less and less to the loss as training progresses. If there are $n$ layers total, then the $l^{th}$ intermediate layer stops contributing any loss after finishing $l/2n$ of the training. This schedule drops all intermediate losses after half of the training is done. \input{figures/layer_losses_fig} \subsubsection{Multiple Targets} At each position in the sequence, the model makes two (or more) predictions of future characters. For each new target we introduce a separate classifier. The losses of the extra targets get weighted by a multiplier of 0.5 before being added to their corresponding layer loss. \input{figures/multiple_targets_fig} \subsection{Positional Embeddings} \label{section:positional} In the basic transformer network described in \newcite{NIPS2017_7181}, a sinusoidal timing signal is added to the input sequence prior to the first transformer layer. However, as our network is deeper (64 layers), we hypothesize that the timing information may get lost during the propagation through the layers. To address this, we replace the timing signal with a learned per-layer positional embedding added to the input sequence before each transformer layer. Specifically, the model learns a unique 512-dimensional embedding vector for each of the $L$ context positions within each of $N$ layers, giving a total of $L \times N \times 512$ additional parameters. We are able to safely use positional embeddings for our task, as we don't require the model to generalize to longer contexts than those seen during training. \section{Experimental Setup} \subsection{Datasets} For evaluation we focus mainly on \texttt{text8}{}~\cite{mahoney}. This dataset consists of English Wikipedia articles, with superfluous content removed (tables, links to foreign language versions, citations, footnotes, markup, punctuation). The remaining text is processed to use a minimal character vocabulary of 27 unique characters---lowercase letters \texttt{a} through \texttt{z}, and space. Digits are replaced by their spelled-out equivalents, so ``\texttt{20}'' becomes ``\texttt{two zero}''. Character sequences not in the range [a-zA-Z] are converted to a single space. Finally, the text is lowercased. The size of the corpus is 100M characters. Following \newcite{mikolov2012subword} and \newcite{zhang2016architectural}, we split the data into 90M characters for train, 5M characters for dev, and 5M characters for test. To aid in comparison with other recent approaches, we also evaluate our model on \texttt{enwik8}{}~\cite{mahoney} which is 100M bytes of unprocessed Wikipedia text, including markup and non-Latin characters. There are 205 unique bytes in the dataset. Following \newcite{chung2015gated}, and as in \texttt{text8}{}, we split the data into 90M, 5M and 5M for training, dev and test respectively. \subsection{Training} \comment{ \todo{Any discussion on less heads working better for some reason?} } Compared to most models based on transformers~\cite{NIPS2017_7181,DBLP:journals/corr/abs-1803-05573}, our model is very deep, with 64 transformer layers and each layer using two attention heads. Each transformer layer has a hidden size of 512 and a filter size of 2048. We feed our model sequences of length 512. Each item in the sequence represents a single byte (or equivalently, one character in \texttt{text8}{}) which gets replaced by its embedding, a vector of size 512. We add to the byte embeddings a separate learned positional embedding for each of the 512 token positions, as described in the Positional Embeddings section above. We do the same addition at each layer activation throughout the network. The positional embeddings are not shared across the layers. With two predictions per position, each layer learns to predict 1024 characters. Because we are primarily interested in predicting the immediately following character (one step away), we halve the loss of predicting characters two steps away. The prediction layers are logistic regression layers over the full 256 outputs (the number of unique bytes). To demonstrate the generality of the model, we always train and predict over all 256 labels, even on datasets that cover a smaller vocabulary. Despite this, we found that in practice the model never predicted a byte value outside of the ones observed in the training dataset. The model has approximately 235 million parameters, which is larger than the number of characters in the \texttt{text8}{} training corpus. To regularize the model, we apply dropout in the attention and ReLU layers with a probability of 0.55. We use the momentum optimizer with 0.99 momentum. The learning rate is fixed during training to 0.003. We train our model for 4 million steps, with each step processing a batch of 16 randomly selected sequences. We drop the intermediate layer losses consecutively, as described in the Intermediate Layer Losses section above. Starting from the first layer, after every $62.5$K ($=4$M$\times \frac{1}{2*64}$) steps, we drop the losses introduced by the next layer. According to this schedule, after training is halfway complete, only the final layer losses are present. \begin{table}[tb] \centering \resizebox{0.5\textwidth}{!}{ \begin{tabular}{l|rr|r} & \multicolumn{2}{c|}{Parameters ($\times 10^6$)} & \\ Model & train & inference & bpc \\ \hline LSTM~\cite{DBLP:journals/corr/CooijmansBLC16} & - & - & 1.43 \\ BN-LSTM~\cite{DBLP:journals/corr/CooijmansBLC16} & - & - & 1.36 \\ HM-LSTM~\cite{chung2016hierarchical} & 35 & 35 & 1.29 \\ Recurrent Highway~\cite{DBLP:journals/corr/ZillySKS16} & 45 & 45 & 1.27 \\ mLSTM~\cite{krause2016multiplicative} & 45 & 45 & 1.27 \\ \textsc{T12}\ (ours) & 44 & 41 & \textbf{1.18} \\ \textsc{T64}~(ours) & 235 & 219 & \textbf{1.13} \\ \midrule mLSTM + dynamic eval~\cite{krause2017dynamic} & 45 & - & 1.19 \\ \end{tabular}} \caption{Comparison of various models on \texttt{text8}{} test.} \label{tab:final_eval_text8} \end{table} \begin{table}[tb] \centering \begin{tabular}{r|rr|rr} & \multicolumn{2}{c|}{bpc} & \multicolumn{2}{c}{Accuracy (\%)}\\ Context & dev & test & dev & test\\ \hline 32 & 1.25 & 1.34 & 72.8 & 71.1\\ 64 & 1.17 & 1.26 & 74.8 & 73.0\\ 128 & 1.12 & 1.20 & 76.1 & 74.4 \\ 256 & 1.09 & 1.16 & 76.9 & 75.3 \\ 512 & 1.06 & 1.13 & 77.3 & 75.9 \\ \end{tabular} \caption{Bits per character (bpc) and accuracy of our best model on \texttt{text8}{} dev and test, for different context lengths.} \label{tab:best} \end{table} \begin{table}[tb] \centering \resizebox{0.5\textwidth}{!}{ \begin{tabular}{l|rr|r} & \multicolumn{2}{c|}{Parameters ($\times 10^6$)} & \\ Model & train & inference & bpb \\ \hline FS-LSTM-4~\cite{mujika2017fast} & 47 & - & 1.25 \\ % mLSTM~\cite{krause2016multiplicative} & 46 & - & 1.24 \\ cmix v13~\cite{cmix} & - & - & 1.23 \\ % \textsc{T12}\ (ours) & 44 & 41 & \textbf{1.11} \\ % \textsc{T64}~(ours) & 235 & 219 & \textbf{1.06} \\ % \midrule mLSTM + dynamic eval~\cite{krause2017dynamic} & 46 & - & 1.08 \\ \end{tabular} } \caption{Comparison of various models on \texttt{enwik8}{} test.} \label{tab:final_eval_enwik8} \end{table} \subsection{Evaluation} At inference time, we use the model's prediction at the final position of the final layer to compute the probability of a character given a context of 512 characters. There is no state passed between predictions as would be the case with RNN models, so for each character predicted we have to process the context from scratch. Because there is no reused computation from previous steps, our model requires expensive computational resources for evaluation and inference. We measure the performance of training checkpoints (roughly every 10,000 steps) by evaluating bits per character (bpc) over the entire the validation set, and save the parameters that perform the best. Our best model is achieved after around 2.5 million steps of training, which takes 175 hours on a single Google Cloud TPU v2. % \section{Results} We report the performance of our best model (\textsc{T64}) on the validation and test sets. Table~\ref{tab:final_eval_text8} compares our models against several recent results. On the test set, we achieve a new state of the art, 1.13 bpc. This model is 5x larger than previous models, which necessitated aggressive dropout rates of 0.55. For better comparison with smaller models, we also train a smaller model (\textsc{T12}) with 41M parameters. This model consists of 12 layers, and trained for 8M steps, with a reduced dropout rate of 0.2. All other settings were left the same as \textsc{T64}{}. Our smaller model still outperforms previous models, achieving 1.18 bpc on the test dataset. Increasing the depth of the network from 12 layers to 64 improved the results significantly, with the auxiliary losses enabling the training to better utilize the depth of the network. Note, our models do not use dynamic evaluation~\cite{krause2017dynamic}, a technique that adjusts model weights at test time by training on test data. Table \ref{tab:best} shows the performance of our model given different context sizes. We are able to achieve state-of-the-art results once the context increases beyond 128 characters, with the best performance of 1.06 bpc at 512 characters. As expected, the model performs better when it is given more context. However this trend levels off after 512 characters; we do not see better results using a context of 1024. Using the same hyperparameters and training procedure for \texttt{text8}{}, we also train and evaluate the \textsc{T12}{} and \textsc{T64}{} architectures on \texttt{enwik8}{} (see Table \ref{tab:final_eval_enwik8}). Note, several previous authors discuss ``bits per character'' on \texttt{enwik8}{} but are in fact reporting bits per byte. Without retuning for this dataset, our models still achieve state-of-the-art performance. \subsection{Ablation Experiments} \label{section:ablation} To better understand the relative importance of the several modifications we proposed, we run an ablation analysis. We start from our best model \textsc{T64}{} and then remove one modification at a time. For example, when we disable \emph{Multiple Positions}, the model gets trained with only the last position loss for each layer. This corresponds to calculating \{$L(t_4\mid t_{0:3})$, $L(t_5\mid t_{0:3})$\} in the example shown in Figure \ref{figure:multiple_targets} for both the first and the second layers. When disabling \emph{Positional Embeddings}, we add the default transformer sinusoidal timing signal before the first layer. \begin{table}[ht] \centering \begin{tabular}{l|c|c} Description & bpc & $\Delta$bpc \\ \hline \textsc{T64}{} (Baseline) & 1.062 & - \\ \textsc{T64}{} w/out Multiple Positions & 2.482 & 1.420 \\ \textsc{T64}{} w/out Intermediate Layer Losses & 1.158 & 0.096 \\ \textsc{T64}{} w/out Positional Embeddings & 1.069 & 0.007 \\ \textsc{T64}{} w/out Multiple Targets & 1.068 & 0.006 \\ \textsc{T64}{} w/ SGD Optimizer & 1.065 & 0.003 \end{tabular} \caption{Evaluation of \textsc{T64}\ on \texttt{text8}\ dev with context set to 512. Disabling each feature or loss lowers the quality of the model. The biggest win comes from adding multiple positions and intermediate layers losses.} \label{tab:my_label} \end{table} \comment{ \begin{table}[ht] \centering \begin{tabular}{l|r} Description & bpc \\ \hline \textsc{T64}{} & 1.062 \\ \midrule \textsc{T64}{} without Multiple Positions & 2.482 \\ \textsc{T64}{} without Intermediate Layer Losses & 1.158 \\ \textsc{T64}{} without Multiple Targets & 1.068 \\ \textsc{T64}{} without Positional Embeddings & 1.069 \\ \textsc{T64}{} with SGD Optimizer & 1.065 \end{tabular} \caption{Evaluation of \textsc{T64}\ on \texttt{text8}\ dev with context set to 512. Disabling each feature or loss lowers the quality of the model. The biggest win comes from adding multiple positions and intermediate layers losses.} \label{tab:my_label} \end{table} } For the ablation experiments, we reuse the hyperparameters from our best model to avoid a prohibitively expensive parameter search for each ablation. The only exception is the SGD experiment, where we vary the learning rate. The analysis shows that the biggest advantage comes from multiple positions and intermediate layers losses. Predicting all the intermediate positions leads to significant speed up in convergence, since the model sees more effective training examples per batch. Adding losses at the intermediate layers acts in the same spirit by forcing more predictions per training step. Finally, we replace momentum with SGD as our optimizer, using a range of learning rates (0.3, 0.1, 0.03, 0.01, 0.003, 0.001). This ablation shows that SGD produces competitive models, with learning rate 0.1 giving the best performance. Despite the depth of our network, SGD is able to train the network efficiently with the help of our auxiliary losses. \subsection{Comparison with Word-Level Models} To understand how byte-level language models perform in comparison to word-level language models, we train \textsc{T64}{} on the \texttt{lm1b}{} corpus \cite{chelba2013one}. For \texttt{lm1b}, we use the standard train/test split of the preprocessed corpus, where out-of-vocab words have been replaced with \texttt{UNK}, to allow comparison to previous work on word and word-piece models. We report word perplexity (\texttt{ppl}) by converting bits-per-byte (\texttt{bpb}) into \texttt{ppl}\footnote{For this test set, $ppl = 2 ^ {bpb * 826189 / 159658}$, where 826,189 is the number of bytes and 159,658 is the number of tokens.}. During training we use the second shard (01) of the heldout dataset as a dev set, as the first shard (00) is the test. Given this is a significantly larger dataset than \texttt{text8}{}, we set all dropouts to zero. Table \ref{tab:lm1b} shows a gap in performance between the two classes of language models. This comparison can serve as a starting point for researching possible ways to bridge the gap. \begin{table}[tb] \centering \begin{tabular}{ll|rr} Type & Model & bpb & ppl \\ \hline Word & \newcite{DBLP:journals/corr/JozefowiczVSSW16} & - & 23.7 \\ Byte & \textsc{T64}{} & 1.03 & 40.6 \\ \end{tabular} \caption{Performance of \textsc{T64}{} on the \texttt{lm1b}{} test set.} \label{tab:lm1b} \end{table} \subsection{Qualitative Analysis} To probe the strengths and weaknesses of our best model (\textsc{T64}), we run the model forward, starting with the seed sequence of 512 characters in Figure \ref{fig:completions}, taken from the \texttt{text8}{} test set. Figure \ref{fig:predictions} shows several per-character metrics for the model's predictions over the true continuation of this seed text. At each position, we measure i) the model's prediction entropy in bits across all 256 output classes, ii) its loss---the negative log probability of the target label, i.e.~the ``bits per character'' for this position, and iii) the rank of the target in the list of output classes sorted by likelihood. Unsurprisingly, the model is least certain when predicting the first character of a word, and becomes progressively more confident and correct as subsequent characters are seen. \begin{figure}[tb] \hspace{-15pt} \begin{tabular}{p{0.5\textwidth}} \multicolumn{1}{c}{\textbf{\small Seed}} \\ \vspace{-8.0pt} \corpus{mary was not permitted to see them or to speak in her own defence at the tribunal she refused to offer a written defence unless elizabeth would guarantee a verdict of not guilty which elizabeth would not do although the casket letters were accepted by the inquiry as genuine after a study of the handwriting and of the information contained therein and were generally held to be certain proof of guilt if authentic the inquiry reached the conclusion that nothing was proven from the start this could have been pr} \\ \multicolumn{1}{c}{\textbf{\small Word Completions}} \\ \vspace{-8.0pt} \corpus{proven, proved, proof, prevented, presented, problematic, probably, provided, practical, provoked, preceded, predicted, previously, presumed, praised, proposed, practicable, produced, present, preserved, precisely, prior, protected, probable, prompted, proofed, properly, practiced, prohibited, profound, preferable, proceeded, precise, predictable, practically, prevalent} \end{tabular} \caption{A seed sequence of 512 characters taken from the \texttt{text8}{} test set, and all word completions assigned cumulative probability above 0.001 to follow the seed, in order from most likely (0.529) to least likely (0.001).} \label{fig:completions} \end{figure} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{figures/predictions_fig.png} \caption{Per-character entropy, loss and rank assigned by \textsc{T64}{} after seeding on the 512 character sequence from Figure \ref{fig:completions}.} \label{fig:predictions} \end{figure*} To investigate the degree to which our model prefers actual English words over non-existent words, we compute the likelihood the model assigns to all continuations after the seed. We cut off continuations when they reach a space character, or when the total probability of the continuation falls below 0.001. Figure \ref{fig:completions} shows the entire set of word completions, in order of probability, where the initial \texttt{pr-} from the seed is repeated for readability. Note that these are all real or plausible (\texttt{proofed}) English words, and that even short but bad continuations like \texttt{prz} are assigned a lower cumulative probability than long realistic word completions like \texttt{predictable}. We expect that the transformer self-attention should make it easy for our model to copy sequences observed in the context over long distances (up to the context size of 512 characters). To test this expectation, we corrupt the seed and continuation from above by introducing a fake name \texttt{zjakdmu bmijwxn}. Specifically, we change the first occurrence of \texttt{elizabeth} in the seed to \texttt{zjakdmu bmijwxn}, and the second occurrence to \texttt{she}. Similarly, in the continuation, we change \texttt{elizabeth} to \texttt{zjakdmu bmijwxn}. The resulting distance between the two occurrences of the fake name is 434 characters. Figure \ref{fig:copy1} confirms that the model can successfully copy over this long distance. While the initial \texttt{z} in \texttt{zjakdmu} is unexpected, the model immediately chooses to copy the remainder of this word from the context, as opposed to predicting any real \texttt{z-} words learned during training. Similarly, while the model is somewhat unsure whether the fake surname \texttt{bmijwxn} will appear (assigning the initial \texttt{b} a rank of two), it immediately picks up on the correspondence after the \texttt{b} is observed, correctly predicting the remainder of the fake surname. For comparison, Figure \ref{fig:copy2} shows how the model would rank the targets in our fake continuation if the original seed with \texttt{elizabeth} were used. This confirms that the fake name is not predictable based on knowledge gained through training, and is indeed being copied from the preceding context. \begin{figure*}[ht] \centering \begin{subfigure}[b]{\textwidth} \centering \includegraphics[width=\textwidth]{figures/predictions_fig2.png} \caption{Continuing after the modified seed (including the fake name 434 characters away).} \label{fig:copy1} \end{subfigure} \begin{subfigure}[b]{\textwidth} \includegraphics[width=\textwidth]{figures/predictions_fig3.png} \caption{Continuing after the original seed from Figure \ref{fig:completions}.} \label{fig:copy2} \end{subfigure} \caption{Per-character rank assigned by \textsc{T64}{} to a fake continuation, after being seeded on either (a) the fake context where \texttt{elizabeth} is replaced with \texttt{zjakdmu bmijwxn}, or (b) the original context.} \end{figure*} \comment{ As further corroboration, we observe that the learned attention masks within the transformer self-attention layer often display ``diagonal streaks'', as in Figure \ref{fig:copy_attention}, where a later sequence attends backward one-to-one onto an earlier sequence. \begin{figure}[!htbp] \centering \includegraphics[scale=0.6]{figures/copy.png} \caption{The multihead attention mask within a transformer layer of an early development model, showing which query positions (on the y-axis) are attending to which key positions (on the x-axis), for a single example from the validation set. The black triangle reflects the restriction that each position can only attend leftward. The diagonal green streaks indicate that one attention head has learned to attend backward in an aligned one-to-one mapping onto a previous sequence. Across several such examples, we observe that each position is attending back to the character \emph{following} itself in a previous occurrence of the same phrase.} \label{fig:copy_attention} \end{figure} } \begin{table}[h!] \begin{tabular}{p{0.45\textwidth}} \multicolumn{1}{c}{\textbf{\small Seed}} \\\hline \vspace{-8.0pt} \corpus{\tvtick{}Computational neuroscience\tvtick{}\ is an interdisciplinary field which draws on [[neuroscience]], [[computer science]], and [[applied mathematics]]. It most often uses mathematical and computational techniques such as computer [[simulation]]s and [[mathematical model]]s to understand the function of the [[nervous system]].\newline{}The field of computational neuroscience began with the work of [[Andrew Huxley]], [[Alan Hodgkin]], and [[David Marr]]. The results of Hodgkin and Huxley\svtick{}s pioneering work in developing } \\\hline \end{tabular} \begin{tabular}{l|p{0.35\textwidth}} Sample 1 & {\small \emph{computational neuroscience were chronicled in \dvtick[[Is Mathematics Anything I Could Learn?]]\dvtick. (ISBN 0826412246). Computational }} \\ Sample 2 & {\small \emph{neuroscience concerned neurological auraria and the inherited ability to communicate and respond to environmental destruction - }} \\ Sample 3 & {\small \emph{the model were published in 1982 and 1983 respectively, and the subsequent work on the field began its graduate program with [[M}} \\ \vspace{-6pt} & \\ Truth & {\small \emph{the voltage clamp allowed them to develop the first mathematical model of the [[action potential]]. David Marr\svtick{}s work focuses on}} \end{tabular} \caption{Samples generated by \textsc{T64}{}, seeded with text from the \texttt{enwik9}{} dev set, using a sampling temperature of 1.0.} \label{tab:gen} \end{table} \subsection{Generation} For generating samples using our language model, we train on a larger and less processed dataset, \texttt{enwik9}{} \cite{mahoney}. We split \texttt{enwik9}{} into 900M, 50M and 50M for training, dev and test. Using the dev dataset to tune our dropout, we find that dropout=0.1 performs the best. On the test dataset, \textsc{T64}{} achieves 0.85 \texttt{bpb}. Table \ref{tab:gen} shows different generated samples following the seed text, using a sampling temperature of 1.0. \section{Related Work} Character-level modeling has shown promise in many areas such as sentiment analysis~\cite{DBLP:journals/corr/RadfordJS17}, question answering~\cite{kenter2018byte} and classification~\cite{DBLP:journals/corr/ZhangZL15}, and is an exciting area due to its simplicity and the ability to easily adapt to other languages. Neural network based language modeling has been heavily researched since its effectiveness was shown by \newcite{Bengio:2003:NPL:944919.944966}. By far, the most popular architecture in this area is the RNN and variants, first studied in \newcite{conf/interspeech/MikolovKBCK10}. Much of the progress in this area has been made by mitigating the vanishing gradients problem~\cite{hochreiter2001gradient} by architectures such as LSTMs~\cite{LSTM}, GRU~\cite{DBLP:journals/corr/ChoMGBSB14}, Recurrent Highway Networks~\cite{DBLP:journals/corr/ZillySKS16}, Unitary RNNs~\cite{DBLP:journals/corr/ArjovskySB15} and others. This is an issue that transformers do not have, due to attention allowing short paths to all inputs. Methods of normalizing activation functions, such as Batch Normalization~\cite{DBLP:journals/corr/IoffeS15,DBLP:journals/corr/abs-1708-02182} and Layer Normalization~\cite{2016arXiv160706450L} have also demonstrated improvements on language modeling tasks. As with this work, progress has been made with discovering ways to regularize sequential architectures, with techniques such as Recurrent Dropout~\cite{DBLP:journals/corr/ZarembaSV14,2015arXiv151205287G} and Zoneout~\cite{krueger2016zoneout,rocki2016surprisal}. A closely related architecture is the Neural Cache Model~\cite{DBLP:journals/corr/GraveJU16}, where the RNN is allowed to attend to all of its previous hidden states at each step. Another similar model is used in~\cite{DBLP:journals/corr/DanilukRWR17} where a key-value attention mechanism similar to transformers is used. Both approaches show improvements on word level language modeling. Memory Networks~\cite{DBLP:journals/corr/WestonCB14} have a similarity to the transformer model in design as it also has layers of attention for processing a fix memory representing the input document and has been shown to be effective for language modeling in \cite{sukhbaatar2015end}. ByteNet~\cite{kalchbrenner2016neural}, which is related but uses layers of dilated convolutions rather than attention, showed promising results on byte level language modeling. Gated Convolutional Networks~\cite{DBLP:journals/corr/DauphinFAG16} was an early non-recurrent model to show superior performance on word level language modeling. Language models are not usually very deep due to computational constraints of training RNNs, and this also limits the number of parameters. The transformer architecture allowed us to build very deep (64 layer) models with a large number of parameters. A recent CNN model for text classification~\cite{DBLP:journals/corr/ConneauSBL16} at 29 layers is considered deep in the NLP community. A Sparsely-Gated Mixture-of-Experts Layer~\cite{DBLP:journals/corr/ShazeerMMDLHD17} allowed language modeling experiments with a greatly increased number of parameters by only accessing a small portion of parameters every time step, showing a reduction in bits per word. In Exploring the Limits of Language Modeling~\cite{DBLP:journals/corr/JozefowiczVSSW16}, an increase in the number of parameters was achieved by mixing character-level and word level models, using specialized softmaxes and using a large amount of computational resources to train. IndRNN~\cite{DBLP:journals/corr/abs-1803-04831} uses a simplified RNN architecture that allows deeper stacking with 21-layers, achieving near SOTA character-level language modeling. Fast-Slow Recurrent Neural Networks~\cite{mujika2017fast} also achieved near SOTA by increasing the number of recurrent steps for each character processed. \section{Conclusion} Character language modeling has been dominated by recurrent network approaches. In this paper, we show that a network of 12 stacked transformer layers achieves state-of-the-art results on this task. We gain further improvements in quality by deepening the network to 64 layers, utilizing capacity and depth efficiently. The use of auxiliary losses at intermediate layers and positions is critical for reaching this performance, and these losses allow us to train much deeper transformer networks. Finally, we analyze the behavior of our network and find that it is able to exploit dependencies in structure and content over long distances, over 400 characters apart. \fontsize{9.5pt}{10.5pt} \selectfont \bibliographystyle{aaai}
\section{Introduction} The radio technological revolution for wireless communication has already started. In past decade the wireless communications have been revolutionized in many folds and variety of new applications has been developed. As a result, we are witnessing game-changing applications such as smart home, industrial application and control, traffic safety and control, remote surgery, and 4K/8K video broadcasting, etc. Fig. \ref{fig:5gnetwork} shows the 5G use cases in mmWave beamforming system. This promises to change the way the wireless services use to communicate and deliver. The next generation wireless technology, popularly known as fifth generation (5G), promises to deliver new levels of capability and efficiency by supporting a diverse range of applications of future which can change the way we live, work, and communicate with each other; and able to cater many consumer needs. \par The 3rd Generation Partnership Project (3GPP) envisioned a diverse set of usage scenarios and applications driven by massive devices, low cost, low energy, both low latency and high reliability, and very high availability. The International Telecommunication Union (ITU) has classified 5G mobile network services into three categories, viz., eMBB (enhanced Mobile Broadband), mMTC (massive Machine-Type Communications), and uRLLC (Ultra-Reliable and Low-Latency Communications)~\cite{IMTVision}. Meanwhile, the emergence of the unprecedented Internet of Things (IoT) services and applications have attracted much attention in both industry and academia. \begin{wrapfigure}{r}{0.6\textwidth} \centering \includegraphics[width=0.6\textwidth]{figure-1.jpg} \caption{5G millimeter-wave beamforming system for IoT applications.} \label{fig:5gnetwork} \end{wrapfigure} Providing unprecedented radio access capacity to these massive IoT applications, millimeter-wave (mmWave) communications \cite{ZPi2011}\cite{Yilmaz2016} is emerging as one of the key enablers. However, there exist multiple challenges spanning from the physical infrastructure to the communication protocol design, to enable mmWave communications to support IoT applications. As the density of wireless devices increases and requirements of all their applications changes drastically, it becomes more challenging to provide them connectivity within the stipulated amount of time to deliver the needs. With the increase of device density, the data traffic also grows exponentially, as a result, the conventional wireless technologies preliminarily show their incompetence because of limited bandwidth \cite{Kong2017}. In this context, mmWave technology shows its potential to address this problem. However, to fully exploit mmWave capability to achieve the 5G use case target, much needed to be studied. \par The goal of this article is to provide an overview of these challenges and discuss the most promising solutions to enable mmWave 5G networks to support massive IoT services and applications. \section{Millimeter-Wave-Enabled IoT Systems} The mmWave 5G wireless network is targeting to support the broad range of vertical services categorized by eMBB, mMTC and uRLLC by a unifying technical framework. We will briefly discuss the high-level requirements and challenges for these three service categories of 5G mmWave-enabled IoT applications. We will focus our discussion on the issues related to directional transmission over mmWave bands, high mobility scenarios, ultra-dense deployments, and the last but not least, communication/computing requirements to support diverse IoT applications. \subsection{eMBB} Following the ITU's IMT 2020 Vision \cite{IMTVision}, the need to deliver gigabit mobile broadband, otherwise known as eMBB, is one of three distinct 5G use cases. It aims to deliver up to 10-Gbps peak throughput, 1-Gbps throughput in high mobility, and up to 10,000x total network traffic. In recent past, research in this direction has already been demonstrated that it can reach such high data rates. It is anticipated that the much-discussed mmWave technology and massive multiple-input and multiple-output, or MIMO will play a critical role to achieve this outrageous target. eMBB is targeting services such as seamless ultra-high speed data access in both indoors and outdoors, high-resolution multimedia streaming on high mobility scenarios, real-time big data delivery, and AR/VR applications. Recent study, Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast Update \cite{Cisco2017}, shows the average consumer's smartphone alone is expected to go from consuming 1.6 GB of data per month today to close to 7 GB of data per month in 2021. In order to achieve this increase in capacity over the current 4G systems, 5G NR offers fiber-like speeds with uniform experience for both download and upload, even in challenging environment or at the cell edge. However, mmWave cellular comes with challenges which need to be addressed to achieve the target. We focus on two critical areas such as user mobility scenarios and resources for communication/computation. \par A recent study on IoT-Cloud supported vehicular system for sharing multi-gigabit data about the surrounding environment and real-time object recognition is discussed in \cite{Kong2017}. This system is designed for both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications over the mmWave band. To fully realized the vehicular mmWave system and provide these services during mobility requires lower latency and light network congestion to process the data streams and user requests in near real-time \cite{Yang2017}. In this aspect, it is a recent research trend to bring the computing capability and services to the network edges \cite{Shih2017}. Thus, combining the edge computing and cloud will work as an enabler for the mmWave 5G ecosystem to realize eMBB services and beyond. Edge computing has the strong capability for analyzing and planning for equipment responsible for communication and resource allocation. Numerous prospective challenges in accomplishing the mmWave broadband have been established and discussed in \cite{ZPi2011}. Solutions for some of those issues were also investigated. For example, to reduce the outage probability during user mobility and maintain uninterrupted service continuity in the mmWave platform, the author in \cite{ChunHan2017} proposed a joint scheduling and power allocation framework for 5G network. Thus, to achieve this goal, the control signaling, efficient allocation of communication/computation resources are the key enabler. \begin{wrapfigure}{r}{0.5\textwidth} \centering \includegraphics[width=0.45\columnwidth]{figure-3.jpg} \caption{Integrated access/backhauling to enable eMBB services.} \label{fig:mmWCloud} \end{wrapfigure} In \cite{MiEdge2017}, the 5G-MiEdge - Millimeter-wave Edge - architecture, which combines mmWave access/backhauling with MEC to enable eMBB services with the efficient allocation of communication/computation resources. Motivated by \cite{r2-164130}, we give a hybrid architecture example as shown in Fig.~\ref{fig:mmWCloud}, to enable giga-bit eMBB services. The centralized communication and storage cloud can be moved to the edge access points to provide flexible management of radio signaling and computing. Computation offloading is a key strategy to move the computation burden from resource-hungry mobile devices to more powerful fixed servers. Computation offloading and edge server will greatly benefit both the mmWave radio access and backhaul. In this hybrid architecture, the gigabit eMBB application data processing can be performed on the edge-cloud to reduce computation, and integrated access/backhauling can provide coordinated and cooperative communication-intensive. In the similar direction, the MiEdge has shown how a joint allocation of communication and computation resources can provide considerable advantages with respect to disjoint strategies. \par Recently, VR/AR applications have received a significant recognition. The VR applications connect to a VR data-center, called VR server (VRS), as shown in Fig.~\ref{fig:arvr}, in order to receive massive VR data. The network infrastructure should be capable of providing ultra-high-speed data communication to transmit massive VR content without lag to multiple users in crowded areas e.g. in trains, airports or other congested indoor areas. As we discussed previously, for massive data delivery mmWave communication technologies, using steerable and directive beams, are best suited for its capability and efficiency. However, unfortunately, the VR devices will suffer from three major challenges in a mmWave based VR network such as huge energy consumption during massive data transmission; set of interference from the neighbor mmWave VR transmitter due to high density and multi-link communications. Thus, providing truly VR experiences is a key challenge. However, the challenges can be met by applying successive interference management scheme, but this, of course, requires additional complexity and it goes beyond the scope of this paper. \begin{wrapfigure}{r}{0.5\textwidth} \centering \includegraphics[width=0.45\columnwidth]{figure-4.jpg} \caption{Illustrative mmWave-based VR network.} \label{fig:arvr} \end{wrapfigure} Fully exploiting mmWave to realize eMBB and beyond, requires significant changes at multiple layers of the protocol stack are required to reach the phenomenal objective. Recently, 3GPP has approved way forward on overall 5G~NR eMBB workplan~\cite{RP-170741}, which is expected to enabling deployments as early as 2019. \subsection{uRLLC} The mmWave 5G supported IoT systems also aims to deliver critical information with high reliability, which can be defined as by a very low rate of lost packets. Such applications involve requirements on high reliability and low latency for delivering data, not necessarily with high throughput, forming thus the concept of uRLLC. For example, remote access including natural disaster, healthcare, military communications, industrial communication, as well as automotive applications which require high precision. For these applications, reliability is a critical factor over the guaranteed End-to-End (E2E) throughput. However, the very low latency can be a quite varying requirement ranging from below 1 ms E2E to multiple seconds. On the other hand, reliability could be important for an application dealing with sensitive data. For example, reliability stands as the first important factor when dealing with medical data or medical equipment in real-time. Since the applications' success rate relies on the transmission guarantee within a bounded latency limit. Thus, mmWave 5G design for IoT system should be flexible to be able to address a range of uRLLC services concerning different latency and reliability requirements. \par While the mmWave bands have been recognized as a promising candidate technology to support massive peak data rates for providing E2E services, realizing the ultra-low-latency while maintaining service reliability pose significant challenges for system design. The mmWave wireless links are considered as highly unreliable due to its unfavorable propagation characteristics as its transmitting beam can be obstructed very easily. Thus, many suspects, it may impact on the transmission reliability and latency. We focus on two critical areas such as core network design and mobility management. \par For achieving uRLLC in 5G mmWave cellular networks, we need to revisit the legacy cellular network design from its core itself. The E2E services in cellular networks suffer delay primarily from the packet routing via the core network. To reduce this E2E delay, the core network function needs to be moved closer to the edge devices \cite{YJKu2017}. Technologies such as MEC \cite{Dama2017} \cite{Corcoran2016}, Software Defined Networking~(SDN), and Fog-Radio Access Network~(F-RAN) \cite{Shih2017} are the three recent trends which can bring the efficient computing capability to the edge of the network to meet the needs of uRLLC applications. As a result, efficient utilization of processing resources to meet the communications and computing requirements becomes an issue worthy of discussion. In addition to this, integrated access and backhaul simplify the deployment of small cells which require fully flexible resource allocation between radio access and backhaul. \par In order to support uRLLC in high mobility scenarios, the following requirements must be satisfied \cite{r2-164130}: \begin{itemize} \item {\bf Handover}: Seamlessly migrating from one radio link to another without interruption is important. The network must always ensure to provide a connection within the network or when switching to another available network without interrupting service. It should also ensure that no packets are lost or delayed during handover. \item {\bf Redundant Links}: To provide ultra-reliability, redundant transmissions are required on both the radio link and through the network infrastructure. The redundant links should be provided through different radio access nodes and may be provided through different access points. \item {\bf Transmission Schemes}: Robust transmission scheme providing simultaneous transmission across multiple radio access links must be supported. These should include both coordinated and uncoordinated transmission. \end{itemize} As we mentioned previously, one of the major diminishing factors of mmWave communications is that the unreliable channel, depending on the intensity of physical blocking. Thus, the most effective strategy to counteract blocking is to enable multi-link communications via multiple radio access links. By doing so, the user can transmit/receive towards/from multiple radio access points, also known as Transmission Reception Point or multi-TRP, depending on their status. Here, inspired by \cite{r2-164130}, we give an example multiple TRP (multi-TRP) transmission during user mobility as shown in Fig.~\ref{fig:multitrp}. With a similar scenario, \cite{ChunHan2017} proposed an integrated framework is to reduce the outage probability while maintaining seamless service continuity by serving UE with multiple-beam simultaneously. \begin{wrapfigure}{r}{0.5\textwidth} \centering \includegraphics[width=0.45\columnwidth]{figure-5.jpg} \caption{Multi-TRP transmission for service connectivity and reliability. Serving-cluster is shown as dotted circle. TRP: Transmission Reception Point} \label{fig:multitrp} \end{wrapfigure} \par In mmWave high mobility scenarios and in ultra-dense deployments, it is highly likely, UE will undergo frequent handover which will impact both the reliability and latency requirements due to handover interruption time and possible radio link failure (RFL). Thus, it is important to ensure that the user is always-on connectivity for seamless handover. One way to achieve is that the user is served by at least one TRP at all times with strong received power. However, it is not only sufficient providing the connectivity but also ensure the required application data is available at the target TRP before a handover is initiated. For example, integrating edge cloud with the radio access points could be one potential solution, as previously shown in Fig.~\ref{fig:mmWCloud}. In order to satisfy ultra-high reliability and to guard against potential RLFs, it may be necessary to use redundant links on both the radio access and through the network infrastructure. In this case, for DL and UL transmission, data is available at multiple TRPs for communication with the UE. \subsection{mMTC} The Global Mobile Data Traffic Forecast Update \cite{Cisco2017} predicts, there will be 11.6 billion mobile-connected devices by 2021, including Machine-to-Machine (M2M) modules$-$exceeding the world's projected population at that time (7.8 billion). Besides, by 2021, a 5G connection will generate 4.7 times more traffic than the average 4G connection. Traditionally, the cellular networks or short-range network (e.g. WLAN) have been designed to support a moderate number of devices with wide coverage and mobility support. mMTC is the basis for connectivity in IoT, which allows for infrastructure management, environmental monitoring, and healthcare applications. For example, smartphone applications for healthcare integration with fitness devices; vehicular technology: mobile network integrating with roadside units, popularly known as V2X; Smart/green building integration, etc. \par As the number of devices increases exponentially, the diversity in communication pattern is more visible which will change the communication and computing dynamics of the system design. However, in this scenario, among these massive number of devices, not all devices will be in an active mode for all the time. For a device to be connected to the network or not, will largely be depended on the application or service type the device uses. Hence, a large number of devices will be in different mode, e.g idle mode, transmit mode, receive mode. The main challenge in mMTC is flexible and efficient connectivity for a massive number of devices sending varying packet sizes (e.g. very short packets, long packet, burst packets. etc), which has not been done adequately in cellular systems designed for human-type communications. Thus, primary the challenges in mMTC are due to the massive number of uncoordinated connections for uplink/downlink communication. As in a massive heterogeneous device centric network, UE with diverse transmission pattern will be connected to the network with different access mechanism on the same carrier or on different carriers. To ensure a smooth communication transitions between these diverse devices, the framework should include both coordinated and uncoordinated transmission schemes. Since, the inception of the cellular network, it has been designed for the voice services or uniform services assuming synchronous uplink and downlink requirements. However, those assumptions do not hold today. \par In order to support the massive number of devices with diverse communication pattern and requirements, aggressive technologies breaking the barrier of mmWave transmission needed to be investigated. \section{System Evaluation} We demonstrate the performance of the multi-TRP mmWave framework supporting both uRLLC and eMBB applications by conducting experiments through simulations. An illustration of the network model is shown in Fig.~\ref{fig:multitrp}. The network consists of serving TRPs and non-serving TRPs, and a UE is moving through the edge of multiple cells. The UE can receive from several TRPs at which UE received signal strength above a threshold. This simultaneous reception can be achieved by proper beamforming at UE side to mitigate interference. The number of simultaneous reception links depends on the number of UE antenna panels and the number of RF chains in UEs. The figure illustrates three cells with a user performing handover while moving with varying vehicular speed. In this example, multiple cells are providing redundant downlink connectivity to the user. The redundant links help the user to maintain the service connectivity while meeting service requirements. \begin{wrapfigure}{r}{0.5\textwidth} \centering \includegraphics[width=0.4\columnwidth]{figure-6.eps} \caption{The average rate of reception failure.} \label{fig:outage} \end{wrapfigure} Fig.~\ref{fig:outage} illustrates the simulation result of the average rate of reception failure where the UE is served by multiple TRPs (e.g. two in this sample study), simultaneously. The simulation result shows the multi-TRP transmission framework always performs better than the single-TRP. The result demonstrates the redundant transmission towards UE can improve the transmission-reception failure rate, thus reliability. Further computing capability at the TRPs could help to improve the latency by reducing the round trip time. Additionally, if an added number of TRPs are further considered to serve the UE, the trends of this two curve will improve further. The multi-TRP mmWave framework also produces several interesting research directions worth for further study. \section{Summary and Discussion} The mmWave band is promising a new generation of wide-area cellular networks to support massive IoT applications of future. However, will require significant changes at multiple layers of the protocol stack to reach the phenomenal objective. In this article, we have introduced the high-level requirements of three 5G use cases. In the following, we will discuss the potential issues for mmWave in consumer devices under the 5G framework for facilitating massive IoT services of the future. We categorized our discussion into four type, described below. \par \emph{Short Range}: There are several mechanisms by which the consumer's end devices can access the IoT ecosystem. However, we specifically focus where the short-range wireless technologies are used. 60 GHz Wi-Fi is among the prominent access technology for IoT. The existing mmWave standards fail to fully exploit the potential advantages of short-range mmWave technology as they are designed to support limited number devices and also limited to point-to-point short-range and fixed wireless access. There is a need to redefine the whole design framework to address the IoT specific issues such as collision-aware hybrid resource allocation frameworks with on-demand control messages, the advantages of a collision notification message, and the potential of multihop communication to provide reliable mmWave connections. \emph{Access Technology}: 5G is composed of both low-frequency (e.g. LTE) band and ultra-high frequency (e.g. mmWave) band devices. These two carriers with different physical characteristics support different access mechanism. The different career leads to different multiplexing schemes or channel access mechanism. Thus, 5G should ensure the coexistence of multiple standards. For the case of preemption to schedule, a service over LTE in DL where the resources of it can overlap with resources of ongoing/scheduled for mmWave supported service, a mechanism to avoid serious performance degradation should be considered. Mobilizing mmWave requires a new system design with tight integration with LTE or sub-6 GHz. \emph{Mobility}: The challenges posing in mobilizing mmWave due to the high path loss and susceptibility to blockage. As we discussed previously, the smart beamforming and beam tracking is crucial to increase coverage and minimize interference so as to realize the mmWave opportunity for mobility scenario. With both line-of-sight and non-line-of-sight coverage, we will see diverse mobility pattern or scenario such as indoor mobility, outdoor mobility, and eNB handover. To drive mmWave to support in mobility scenario intelligent beam search and tracking algorithms are key for coordinated scheduling and interference management. Seamless mobility across different mmWave access technology is also another worth discussing issue. \emph{Other}: Besides these discussed potential problems, mmWave supported IoT also encounter many other problems as well. Here, we will highlight few of them. Enabling mmWave directional communications requires highly complex antenna processing functions and computation capability to perform directional reference signaling and scheduling. Thus, handheld devices require high battery-powered consumption. As a result, UE power saving design would be one of the most important metrics for 5G networks to see. Recently, interest in the coexistence of multiple technologies such as WiFi and LTE are emerging. However, this scope is not limited to LTE/WiFi rather likely to become a major point of discussion in the 5G ecosystem. Besides, it will be interesting to study the new risks and security threats \cite{Puthal2017} that we will be facing in 5G networks. \par The unifying 5G mmWave framework to support massive IoT applications produces several promising research directions. These above-discussed potential issues are important future research directions. \section*{Acknowledgment} This work was financially supported by the Ministry of Science and Technology of Taiwan under Grants MOST 105-2622-8-002-002, and sponsored by MediaTek Inc., Hsin-chu, Taiwan. \section*{About The Authors} \par {\noindent \bf Biswa P. S. Sahoo} (<EMAIL>) is currently pursuing the Ph.D. degree with the Graduate Institute of Electrical Engineering, National Taiwan University, Taiwan. \par {\noindent \bf Ching-Chun Chou} (<EMAIL>) is currently a Postdoctoral Fellow with the Department of Electrical Engineering, National Taiwan University, Taiwan. \par {\noindent \bf Chung-Wei Weng} (<EMAIL>) is currently a Research Assistant with the Wireless Mobile Network Laboratory, Department of Electrical Engineering, National Taiwan University, Taiwan. \par {\noindent \bf Hung-Yu Wei} (<EMAIL>) is currently a professor with the Department of Electrical Engineering and the Graduate Institute of Communication Engineering, National Taiwan University, Taiwan.
\section{Introduction} \label{intro} One of the main challenges in robotics is to enable robots to interact with a dynamically changing environment and to perform different tasks with minimal prior knowledge. It requires the robot to perceive the environment, understand the context of the tasks, and make decisions accordingly. Traditional methods rely on accurate manual modeling for each task, such as visual SLAM systems for navigation \cite{mur2015orb}. In contrast, deep learning based methods simplify the need of manual modeling. They directly learn a policy that maps a sensor input to a corresponding control command. Because of the advance of deep learning models, especially convolutional neural networks (CNNs), learning control commands directly from environmental images becomes feasible \cite{Lecun2015deep}. However, literature imitation learning solutions can only learn one task per model. This prevents robots from executing complex actions. For example, if the robot is asked to fetch a cup in the kitchen, it needs to decompose the task into a few sub-tasks such as \textit{goto}, \textit{traverse}, and \textit{fetch}. In this work, we propose a framework that solves the two navigation problems with only one model, \textit{goto} and \textit{traverse}. The framework is called \textit{\textbf{S}hared \textbf{M}ulti-task \textbf{I}mitation \textbf{L}earning (SMIL)}, which gives robots the ability to perform different navigation tasks in indoor environments. The framework is based on the multi-task learning (MTL) \cite{caruana1998multitask} and aims at solving task agnostic problem of imitation learning. Although MTL has been researched for a long time, multi-task imitation learning has rarely been researched until recently \cite{hausman2017multi, duan2017one}. The proposed framework uses a shared CNN to learn an environment model that extracts environmental features. Different sub-task policies are represented by a multi-headed fully connected network whose inputs are from the last layer of the shared CNN. While current literature solutions such as the work \cite{codevilla2017end} do not consider the relevance between the sub-tasks, our proposed framework rather makes use of the relevant information among sub-tasks. In order to solve poor generalization and distribution mismatch problems, we apply off-policy imitation learning \cite{laskey2017dart}, data augmentation, and dropout \cite{srivastava2014dropout} during training. During testing, the framework switches between sub-policies based on human navigation commands. Our contributions are as below: \begin{itemize} \item We propose a new network architecture that leverages task relationships by summing up activations from sub-policies. \item Off-policy learning procedure is used to train our framework. \item Dropout and image augmentation are used to improve generalization. \end{itemize} In the rest of this paper, Section \ref{sec:related} reviews the related work of the imitation learning and multi-task learning. Our solution \textit{SMIL} framework is described in Section \ref{sec:smil} including the network architecture and detailed training procedure. Next, Section~\ref{ref:exp} presents extensive performance evaluations of {\it SMIL} in real indoor environments. The conclusion and future work are presented in Section~\ref{sec:con}. \section{Related Work}\label{sec:related} Learning based algorithms have been applied to a variety of robotics control problems. These algorithms can learn an end-to-end controller directly from data. For example, in \cite{Zhu2016Target}, reinforcement learning is used to train a siamese neural network to navigate to a target position. Similarly, the work \cite{mirowski2016learning} uses auxiliary losses to train a reinforcement learning agent to navigate through complex maze environments. In contrast to reinforcement learning, imitation learning has been applied to many real-world applications such as robotic grasping \cite{Laskey2016Robot}, UAV flight control \cite{giusti2016machine}, self-driving cars \cite{bojarski2016end}, and rope manipulation \cite{nair2017combining}. The above mentioned algorithms only consider completing one task at a time, but this is not enough for many robotic tasks. Therefore, we target on the idea of multi-task learning (MTL) \cite{ruder2017overview}. Researchers have proposed a learning architecture that uses one single model to jointly learn image classification, speech recognition, and translation problems and yielded encouraging results\cite{kaiser2017one}. Long et. al. place a matrix prior to fully connected layers in a CNN to learn the relations of multiple tasks \cite{long2015learning}. Multi-task imitation learning has drawn attentions in recent years including learning multiple tasks together \cite{hausman2017multi, codevilla2017end} or one-shot learning \cite{santoro2016one, finn2017one, duan2017one}. Among these works, two works \cite{codevilla2017end, hausman2017multi} are most similar to ours. Hausman et. al. propose a multi-model imitation learning framework that separates video segments into different skill trajectories and imitate the demonstrated skills jointly\cite{hausman2017multi}. In \cite{codevilla2017end}, the authors propose a framework that learns sub-policies using a multi-headed network in the autonomous driving setting. However, these works have not considered the relevant information among tasks. Our proposed framework learns the relationships across tasks by combining learned features across sub-policies. By learning these relationships, the model is able to yield a more general representation of various navigation tasks. \section{Shared Multi-task Imitation Learning}\label{sec:smil} In this section, we first formally define the problem of imitation learning and multi-task imitation learning. Next, we present our deep learning network architecture. Finally, our training procedure is described in detail. \subsection{Problem Formulation} To formally define the problem, let $\mathcal{X}$ and $\mathcal{Y}$ denote recorded observations and corresponding expert control commands respectively. A pair of ($\mathcal{X}^k$, $\mathcal{Y}^k$) is defined as the $k$-th {\it demonstration} of a robot. To simplify the notation, we assume the environment is Markovian; namely the current observation includes all history information of the environment. \subsubsection{Traditional Imitation Learning} In the traditional imitation learning setting, the demonstrations are associated with a single task. Thus, $\mathcal{X} = \{ \mathcal{X}^1, \mathcal{X}^2, ..., \mathcal{X}^n\}$ and $\mathcal{Y} = \{ \mathcal{Y}^1, \mathcal{Y}^2, ..., \mathcal{Y}^n\}$ represent $n$ demonstrations of the task. The imitation learning aims to learn a policy that maps an observation to a probability distribution of control command $\pi: \mathcal{X} \rightarrow \pi(\mathcal{Y}; \theta)$, where $\theta$ denotes the parameters of a weight vector, e.g. neural network. The parameters $\theta$ can be found by solving a maximum-likelihood estimation (MLE) problem: $\theta^* = \underset{\theta}{\argmax}\sum_{n=1}^{N} \pi({\mathcal{Y}^n|\mathcal{X}^n; \theta})$. If the policy $\pi$ is Gaussian and it is parameterized by a weight vector $\theta$, the MLE objective can be transformed into a $l2$ regression problem: $\theta^* = \underset{\theta}{\argmin}\frac{1}{N}\sum_{n=1}^{N}|| \pi({\mathcal{X}^n; \theta}) -\mathcal{Y}^n ||_2^2 $. In our system, we assume the policy is Gaussian thus we use the $l2$ objective to optimize the parameters $\theta$. \subsubsection{Multi-Task Imitation Learning} In the multi-task imitation learning setting, observations $\mathcal{X}$ and the corresponding control commands $\mathcal{Y}$ are representing more than a single task in demonstrations. Instead, they consist of multiple demonstrated tasks and are denoted as $\mathcal{X} = \{X_1, X_2, ... X_i\}$ and $\mathcal{Y} = \{Y_1, Y_2, ..., Y_i\}$, where $X_i = \{X_i^1, X_i^2, ..., X_i^n\}$ and $Y_i = \{Y_i^1, Y_i^2, ..., Y_i^n\}$ represent the observations and control commands of task $i$. It should be noted that although here we use the same number of demonstrations across tasks to simplify the notations, it is not required to be the same. In addition, we introduce the concept of task embedding denoted as $T= \{T_1, T_2, ... T_i\}$. Similar to word embedding\cite{levy2014neural}, the task embedding is a feature vector for each task that embeds the high-level representations into a low-dimensional space.Therefore, the policy $\pi$ maps observations $\mathcal{X}$ and task embedding $T$ to a distribution of control command $\mathcal{Y}$ and is formulated as $\pi: \{\mathcal{X}, T\} \rightarrow \pi(\mathcal{Y}; \theta)$. Instead of minimizing the objective for one task, multi-task imitation learning aims to find a set of parameters that are to be optimized over multiple tasks: \begin{equation}\label{eq:mtil} \theta^* = \underset{\theta}{\argmin}\frac{1}{I}\frac{1}{N}\sum_{i=1}^{I}\sum_{n=1}^{N}|| \pi({\mathcal{X}^n_i, T_i; \theta}) -\mathcal{Y}^n_i ||_2^2, \end{equation} where $I$ is the number of tasks. \subsection{Network Architecture} With the multi-task imitation learning problem formulated as above, we have designed a \textit{\textbf{S}hared \textbf{M}ulti-task \textbf{I}mitation \textbf{L}earning} (SMIL) framework that learns to perform four tasks based on human commands. This framework is shown in Fig. \ref{fig:multi_headed_shared}, which consists of two modules: image feature extractor and shared multi-headed policy, which will be explained in details in the following. \begin{figure*}[h] \centering \hspace{0.2in} \includegraphics[width=7in]{./figures/multi_headed_shared.png} \caption{An illustration of SMIL framework. An image observation is first passed through a ResNet-18 to extract features. The features are then passed through a linear classifier as well as a shared multi-headed policy to predict environment labels and control commands.} \label{fig:multi_headed_shared} \end{figure*} \subsubsection{Image Feature Extractor} The image feature extractor is a fine-tuned and pre-trained ResNet-18 by excluding the classifier layer in the original ResNet-18, but preserving the average pooling layer. It is used to project raw image inputs to a low-dimensional feature space and is denoted as $f = I(x, \theta_I)$, where $f\in \mathbb{R}^{1\times 1 \times 512}$ is the extracted feature vector, $x$ is the input image, and $\theta_I$ is the parameter set of ResNet-18. The idea of using pre-trained model has been extensively researched by the literature and it is proven to have faster convergence than training from scratch \cite{huh2016makes}. The feature vector $f$ is then flattened and passed to the shared multi-headed policy to generate control commands. In addition, to learn a more general representation of indoor environments, image feature extractor also predicts which indoor environment the robot is currently in: $p = E(f)$, where $E$ represents a linear classifier. In our case, it predicts two class labels: hallway and classroom. Environment prediction is jointly trained with control commands. \subsubsection{Shared Multi-headed Policy} The shared multi-headed policy learns shared knowledge across tasks as well as task specific knowledge. As shown in Figure \label{fig:multi_headed_shared}, the shared multi-headed policy consists of three parts: switch operation, addition operation, and sub-policies represented by fully connected layers. In our case, we define four tasks to be learned: {\it traverse hallway, traverse classroom, to hallway,} and {\it to classroom}. We denote the shared multi-headed policy as $a = \pi(f, T; \theta_{\pi})$, where $\theta_\pi = \{\mathcal{W}^1, ..., \mathcal{W}^4\}$ is the parameter of the entire policy and $\mathcal{W}^i$ is the parameter set of the $i$th sub-policy. It takes two inputs, extracted features $f$ from the image feature extractor module and task embedding $T$, and gives the output of the control commands $a$ corresponding to a specific task. In our case, since we have four tasks, we denote the task embedding $T$ as a 4-dimensional one-hot vector\cite{codevilla2017end}. It is used to determine the sub-policy to be activated. Note that $T$ can also be learned in an unsupervised way \cite{hausman2017multi}. The action space is two-dimensional: acceleration and steering angle. Each sub-policy is a three-layer fully connected neural network. Because the tasks are highly correlated, it is useful to learn the task relationship through which the activated sub-policy can exploit useful information from other sub-policies. For example, the hallway navigation sub-policy can leverage obstacle avoidance knowledge learned by the classroom navigation sub-policy because classroom is a more complicated environment with different types of obstacles. Formally, denote $\mathcal{W}^i_l$ the set of parameters at layer $l$ in $i$-th sub-policy and $h^i_l = g_l(\mathcal{W}^{i^T}_lx^i_l)$ the corresponding output, where function $g_l(\cdot)$ denotes a non-linear function and $x^i_l$ is the input of that layer. Our network uses ReLU for the first two layers' non-linear functions and an identity function for the last layer. The input to first layers of the sub-policy networks is the extracted features $f$ from the image feature extractor module. The information across sub-policies is shared by using an addition operation that combines all the outputs from the second layers of each sub-policy network: \begin{equation}\label{eq:add} j = \sum_{i=1}^{L}{h^i_2}, \end{equation} where $L$ is the total number of tasks. Although the literature has shown that higher layers learn more task specific features that are difficult to transfer \cite{yosinski2014transferable} , we choose to share the information from the second layers, because the tasks are highly correlated and the learned features are easier to transfer over sub-policies. After the addition operation, the task embedding $T$ selects a sub-policy to use via a switch operation. The switch operation routes the output from the addition operation to the final layer of the selected sub-policy. The final output will be: \begin{equation} a = h_3^t = g_3^t(W_3^t j). \end{equation} This design enables each sub-policy to learn the task specific controls in the final layer as well as to share knowledge through the addition operation across different sub-policies. \subsection{Training Procedure} It is important to train the multi-task imitation learning framework for high performance. We employ three different training techniques to train a robust SMIL framework: dropout, data augmentation, and noise injection. Because \textit{SMIL} predicts steering angle and acceleration, which are real-valued numbers, we use mean squared error ($MSE$) as the loss function during the training. \subsubsection{Dropout and Data Augmentation} As opposed to \cite{tobin2017domain} that is designed for single task frameworks, our goal is to train a robust SMIL framework that is able to perform in different environments from real-world experience, instead of learning from images generated by a hand-engineered simulator. It is necessary to collect images from diverse indoor environments to prevent a deep learning model from overfitting, but collecting data is time consuming. Hence, we use data augmentation and dropout \cite{srivastava2014dropout} to train a robust model. For data augmentation, we randomly apply contrast change, Gaussian noise, pixel dropout, random cropping, and horizontal flip (steering angle is also flipped). Different augmentation strategies are shown in Fig. \ref{fig:aug}. Dropout is used to prevent model overfitting by randomly zeroing out an neuron's activation. In addition, dropout can also stabilize the performance of the robot. Because of the addition operation, the norm of activation input to the final layer is possible to be very large and yields the outputs of very different control commands. Dropout is only added to the first and second layers of sub-policies. \begin{figure}[htp] \begin{center} \begin{tabular}{cc} \includegraphics[scale=0.14]{./figures/original.png}& \includegraphics[scale=0.14]{./figures/crop_dp.png}\\ \includegraphics[scale=0.14]{./figures/noise_contrast.png}& \includegraphics[scale=0.14]{./figures/crop.png} \end{tabular} \end{center} \caption{An illustration of randomly chosen augmentation strategies. From left to right are original, random cropping and pixel dropout, additive Gaussian noise and contrast changing, and more aggressive random cropping.} \label{fig:aug} \end{figure} \subsubsection{Noise Injection} Distribution mismatch between the supervised training and the robot learning is an essential problem in imitation learning: because the human operator is proficient in demonstrating tasks, there are no demonstrations of recovering from dangerous or erroneous states. As a result, the robot does not know how to correct itself in experiencing these abnormal states. We explore the off-policy training for the SMIL framework to address this issue, where the robot learns from another policy. We employ the noise injection approach \cite{laskey2017dart}, which injects an optimized Gaussian noise to an expert policy to maximize the probability of a human demonstrator making the same mistakes as the robot. Given a robot policy $\pi_{\theta}$, an expert policy $\pi^*$, DART algorithm \cite{laskey2017dart} aims to find a covariance matrix of Gaussian noise that maximizes the probability of expert taking the robot policy: \begin{align} \begin{split} \Sigma^* = \underset{\Sigma}{\argmin} \ E_{p(\upxi|\pi^*,\Sigma)} -\sum_{t=0}^{T-1}log[\pi*(\pi_{\theta}|x_t, \Sigma)] \end{split} \end{align} where $\upxi$ means trajectories encountered by executing the expert policy with noise injected and $\Sigma$ is the covariance matrix. A shrinkage estimation is then utilized to scale the covariance matrix and derive a closed form solution: \begin{align} \begin{split} &\Sigma^{\alpha} = \frac{\alpha}{Ttr(\Sigma^*)}\Sigma^*; \ \\ &\Sigma^*=\frac{1}{T}E_{p(\upxi|\pi^*,\Sigma)}\sum^{T-1}_{t=0}(\pi_{\theta}(x_t) - \pi^*(x_t))(\pi_{\theta}(x_t)-\pi^*(x_t))^T \end{split} \end{align} where $\alpha$ is the prior knowledge of the final error of the robot policy on the training dataset. This algorithm is best used in an iterative approach, so we collect expert demonstrations for $k$ iterations and update the covariance matrix at the start of every iteration except for the first iteration with the covariance matrix as 0. In our case, we found $\alpha=2$ gives the best results, which is reasonable because we normalize value of steering angle and acceleration between -1 and 1, and the largest $MSE$ should not exceed 4. \section{Performance Evaluation}\label{ref:exp} We have implemented our framework and elevated in real world environments. Our experiments have been designed to answer the following questions: \begin{enumerate} \item Is the shared task representation (the addition operation) necessary to the multi-task imitation learning when the tasks are highly correlated? \item What is the performance difference of the multi-headed sub-policy framework compared to a single-headed policy? \item Does the environment prediction task improve the performance? \item Are data augmentation and dropout important to the model generalization and robustness? \end{enumerate} \subsection{Testbed, Experiment Environment} Our framework is implemented into an iRobot Create2 robot. The linear speed of this robot is in the range of -0.5 m/s to 0.5 m/s and the angular velocity is in the range of -4.5 rad/s to 4.5 rad/s, where a negative linear speed represents moving backward and a negative angular speed represents going right. The only sensory data we used are RGB images from a ZED Stereo camera. The valid depth estimation is between 0.5m and 20m. We use a NVIDIA Jetson TX2 as the main computation resource to do inference. We have extensively evaluated our solution in a real environment: the Robert Bell Hall building at Ball State University. To test the generalization, we have trained the robot in the third floor but tested the robot on the first floor of Robert Bell building. The geometric and color appearances are very different in these two environments. The testing and training scenes are presented in Fig. \ref{fig:smil_exp}. \begin{figure}[t] \begin{tabular}[c]{cc} \begin{subfigure}[c]{0.23\textwidth} \centering \includegraphics[width=1.5in, height=1.0in]{./figures/{rb1_hallway}.png} \caption{Robert Bell first floor hallway.} \end{subfigure}& \begin{subfigure}[c]{0.23\textwidth} \centering \includegraphics[width=1.5in, height=1.0in]{./figures/{rb3_hallway}.JPG} \caption{Robert Bell third floor hallway.} \end{subfigure}\\ \begin{subfigure}[c]{0.23\textwidth} \centering \includegraphics[width=1.5in, height=1.0in]{./figures/{rb1_cls}.png} \caption{Robert Bell first floor classroom.} \end{subfigure}& \begin{subfigure}[c]{0.23\textwidth} \centering \includegraphics[width=1.5in, height=1.0in]{./figures/{rb3_cls}.png} \caption{Robert Bell third floor classroom.} \end{subfigure} \end{tabular} \caption{Training environments (b) and (d) have different geometric and color appearances as testing environments (a) and (c).} \label{fig:smil_exp} \end{figure} \subsection{Task Description} We have evaluated our framework on four correlated tasks that are described in Table \ref{tb:task}. Since classroom indoor environments contain fewer free space and are far more complex compared to hallway environments, we set less constraints on classroom related task, i.e. traverse classroom and to hallway. The goal of these four tasks is to simulate the robot in a multi-task decision making environment, where it is required to go to different indoor locations based on human command. \begin {table*}[t] \vspace{0.1in} \caption{Task Description}\label{tb:task} \centering \scalebox{0.97}{ \begin{tabular}{c|c|c|c} \textbf{Task}&\textbf{Task Description}&\textbf{Time Limit}&\textbf{Failure Condition}\\ \hline \hline Traverse Hallway& \makecell{The robot is initialized \\in hallway at a fixed position.\\ It is asked to traverse hallway \\ without collision within the time limit.} &1 min&\makecell{If the robot collides into obstacles, \\we count it as a failure. \\If it goes into classroom, \\we count it as a failure.}\\ \hline Traverse classroom&\makecell{The robot is initialized \\in classroom at the door position. \\It is asked to traverse classroom \\ without collision within the time limit}&30 sec&\makecell{Because classroom is highly complex, \\we give the robot one more chance\\ in this task. If the robot collides into \\ obstacles, we reroute it back to \\ free space. If the robot collides\\ again, we count it as a failure. \\In addition, if it goes outside \\ of the classroom, we count it \\ as a failure. }\\ \hline To classroom&\makecell{The robot is initialized \\in hallway at a fixed position that is 15 meters \\away from a classroom. \\ It needs to go from the \\classroom to the hallway.}&2min& \makecell{If the robot can not complete \\the task within time limit or \\ collide into obstacles, we count\\ it as a failure. In addition, if the \\robot passes two nearest classrooms \\ from its initial position, it is a failure.}\\ \hline To hallway&\makecell{The robot is initialized \\in a classroom at the furthest corner \\away from the door. \\ It needs to go through \\the classroom to the hallway.}&1 min&\makecell{If the robot can not complete \\ the task within time limit or \\ collide into obstacles, we count it as \\ a failure. Same as traverse \\ classroom, we give the robot a \\ second chance.}\\ \hline \end{tabular} } \end{table*} \subsection{Experiment Configurations} A variety of baselines have been designed to evaluate the performance. We compare the $SMIL$ full architecture with five baselines: \begin{itemize} \item \textbf{Multi-headed network}: this model uses the same architecture without the shared learning representation (with the addition operation excluded). \item \textbf{Plain network}: this is the traditional imitation learning approach, where there is one single network that maps the input to output control commands. It is not aware of the multi-task setting. \item \textbf{$SMIL$ w/o data augmentation}: this baseline excludes data augmentation in training. \item \textbf{$SMIL$ w/o dropout}: this baseline removes dropout at the first and second layers of sub-policies. \item \textbf{$SMIL$ w/o environment prediction}: this model does not predict environment class labels. \end{itemize} We use the same hyper-parameters to train each baseline network across all the tasks. We use stochastic gradient descent (SGD) optimizer with a learning rate of 0.01 and a decay factor of 10 for every 5 epochs. We train each network for 30 epochs with a batch size of 256. For the $SMIL$ framework and multi-headed network, we split training examples of each task evenly in each batch. We train the plain network on all the training data. The plain network is task-agnostic, so we do not inform it which task to perform explicitly. We set the weight decay to 0.0005. For the networks that use dropout, we set the dropout rate as 0.2 implying that with the probability of $20\%$, a neuron's activation will be set to 0. We have conducted 10 experiments for each task and recorded the success rate and the averaged time duration with standard deviation for each experiment as shown in Table \ref{tb:success_rate} and Fig. \ref{fig:time}. \begin{table*}[t] \centering \vspace{0.3in} \caption{Success Rate} \label{tb:success_rate} \scalebox{1.2}{ \begin{tabular}{c|c|c|c|c} &Traverse Hallway&Traverse Classroom&To Classroom&To Hallway\\ \hline \hline $\textbf{\textit{SMIL}}$&$\textbf{80\%}$&$\textbf{60\%}$&$\textbf{70\%}$&$\textbf{60\%}$\\ Multi-headed&$50\%$&$30\%$&$50\%$&$40\%$\\ Plain&$50\%$&$30\%$&$20\%$&$0\%$\\ $SMIL$ w/o augmentation&$40\%$&$30\%$&$40\%$&$30\%$\\ $SMIL$ w/o dropout&$30\%$&$30\%$&$50\%$&$40\%$\\ $SMIL$ w/o environment&$70\%$&$50\%$&$50\%$&$50\%$\\ \hline \end{tabular} } \end{table*} \begin{figure*}[htp] \centering \includegraphics[scale=0.32]{./figures/Time_Duration.png} \caption{Averaged time duration and standard deviation for each task. For traverse hallway/classroom task, The higher the averaged time duration means the the robot gets less collision. For to hallway/classroom tasks, the lower the averaged time duration means the faster the robot completes the task.} \label{fig:time} \end{figure*} \subsection{Overall Comparisons} As we can observe from Table \ref{tb:success_rate} and Fig. \ref{fig:time}, in terms of the success rate, it is clear that our model, $SMIL$, achieves the best performance across all the tasks. In terms of time duration, our model is able to maintain the longest averaged travels among all other models in traverse tasks. It needs slightly more time to complete to classroom task. This is because some baseline models complete all easy runs that take less time, e.g. the classrooms that are in the robot's field of view, but failed difficult runs that take longer time. \subsection{Comparisons on Model Architectures} The comparisons address the first three questions at the beginning of this section. We can draw three conclusions: \textbf{First}, the first floor has more obstacles than the third floor, which is used for training. Thus, it is necessary to reuse the knowledge learned from traverse classroom task while performing traverse hallway task. By comparing $SMIL$ and multi-headed network on traverse hallway task, we observe that $SMIL$ is able to reuse obstacle avoidance knowledge from traverse classroom sub-policy. \textbf{Second}, from the result, we observe that it is necessary to add the environment prediction auxiliary task to provide additional training single to the image feature extractor, which allows the image feature extractor to learn a more robust representation. \textbf{Third}, although the plain network is trained on all the data that contains 80,000 images, it still fails tremendously especially on the tasks of {\it to classroom/hallway}. This is because the mode averaging \cite{bishop1994mixture} and inaccurate labeling cause bias to the network. The tasks of {\it to classroom/hallway} inherit a different mode from that in the {\it traverse classroom/hallway} tasks and they are more difficult because the robot needs to avoid obstacles and find the targeted place. Since the plain network is trained on all tasks, it is possible that the plain network ignores differences across each task and thus yield a poor policy. In addition, it is task-agnostic, so it can not respond to human command. \subsection{Comparison on generalization and robustness} This comparison answers the fourth question: both dropout and data augmentation are necessary to train a robust model. By removing any of them, the robot has the similar performance. In terms of the success rate, after adding both methods, the robot's performance is almost doubled. It shows that these two methods are complementary to each other. Dropout prevents the robot from aggressive turning caused by large activations from the addition operation. By augmenting the training dataset, the trained model learns to ignore geometric difference and different lighting effects. \section{Conclusion}\label{sec:con} In this paper, we propose a deep multi-task shared imitation learning framework, \textit{SMIL}, that can learn to work on multiple tasks with multiple sub-policies by learning the relations shared among these policies/tasks. Compared to the plain neural network, this framework allows the robot to follow human instructions. In addition, by leveraging the task relations, this framework is highly robust to new environments and produces the best results over all baselines. We have evaluated our framework in a real environment that is different from the training environment. The results show its robustness and great generalization to new environments. \bibliographystyle{abbrv}
\section{Introduction} Characterizing the nuclear properties of galaxies in the local Universe, that is, establishing the mass dependence of the relative frequency of active galactic nuclei (AGN) ionized by supermassive black holes with respect to HII region-like nuclei excited by young stars, or with respect to galaxies ionized by old stars, is an urgent task of today's research in astrophysics (see e.g., Kauffmann et al. 2003b, hereafter K03). There is a clear need to establish the frequency of AGNs of various types, in different environments, locally and from a cosmological perspective, to improve our understanding of galaxy assembly. As Boselli et al. (2010) pointed out, observing the local Universe is relevant because it represents the endpoint of galaxy evolution, providing important boundary conditions to models and simulations. Galaxies can only be completely characterized at low-redshift or by multifrequency observations. Moreover, dwarf galaxies can only be observed locally. In recent years, considerable effort has been made to select representative samples of galaxies, like SINGS (Kennicutt et al. 2003), the recent KINGFISH (Kennicutt et al. 2011), and VNGS (Bendo et al. 2012), to study the properties of the local Universe. In recent years, the $Herschel$ Reference Survey (HRS) (Boselli et al. 2010a) has become a benchmark for the representation of the properties of local galaxies (Hughes, T. M. et al. 2013, Boquien et al. 2014, Ciesla et al. 2016), and has therefore become a reference for comparing observations of local galaxies with those of increasing redshift (Bassett et al. 2017, Fossati et al. 2017, Schreiber et al. 2016) or resulting from simulations (Cattaneo et al. 2017, Fontanot et al. 2017, Lagos et al. 2016). The HRS has been observed with SPIRE (250, 350, 500 $\mu$m) (Ciesla et al. 2012, 2013) and with PACS (100, 160 $\mu$m) (Cortese et al. 2014) on board $Herschel$: At D $\leq$ 30 Mpc the angular resolution of SPIRE ($4$ arcmin) allows us to resolve the different galaxy components, such as nuclei, bulges, discs and spiral arms. The HRS is a volume-limited sample and is $k-band$ selected, therefore, by design, it is suitable for statistical studies of the multifrequency properties of local galaxies. Many surveys have been done to cover the whole sample in different bands: FUV and NUV photometry obtained from GALEX is reported by Cortese et al. (2012); 24-160 $\mu$m photometry from MIPS is given by Bendo et al. (2012); Spitzer/IRAC photometry is reported by Ciesla et al. (2014); Boselli et al. (2014) report the gas properties (HI and CO) of the HRS, whereas Boselli et al. (2015, hereafter B15) describe an H$\alpha$ imaging survey of the full HRS. Finally Boselli et al. (2013) give the integrated (drift-mode) spectroscopy of the HRS. Conversely no systematic information is available from the literature on the nuclear spectroscopic classification of the HRS, a task that we tackle in this paper. Not all the 322 galaxies constituting the HRS have been observed spectroscopically so far (only 277/322 objects). In this paper we complete the HRS by presenting new nuclear long-slit spectroscopy for 45 galaxies, 25 of which in the whole optical range (from H$\beta$ to [SII]) and 20 only in the red band near H$\alpha$. Generally, the classification of galaxies based on their optical nuclear spectra is performed using the BPT (Baldwin, Phillips \& Terlevich, 1981) diagnostic diagram, which requires the measurement of different spectral lines: H$\beta$, [OIII]$\lambda$5007, H$\alpha$, [NII]$\lambda$6583.4 and [SII]$\lambda$6717,6731. In this diagram AGNs are distinguished from HII-region-like nuclei using the ratio [NII]/H$\alpha$, while strong AGNs (sAGN) can be separated from the weaker (weak AGNs or wAGN) low-ionization nuclear emission-line region (LINERs, Heckman et al. 1980) using the ratio [OIII]/H$\beta$. There is also a recent two-line diagnostic diagram, named WHAN, which is based only on the [NII]/H$\alpha$ ratio combined with the equivalent width (EW) of the H$\alpha$ line. It was introduced by Cid Fernandes et al. (2010, 2011) to divide both strong and weak AGNs from $fake$ $AGNs$, namely the retired galaxies (RET), whose ionization mechanism is probably provided by an old stellar population (Capetti \& Baldi 2011). Using the BPT and the WHAN diagrams, we obtain a robust determination of the frequency of AGNs in a complete sample of local late-type galaxies (LTGs) and compare it with the frequency of HII-region-like nuclei as a function of stellar mass.\\ Moreover the comparison between the nuclear spectral classification and the one determined on the global galactic scale provides information about how galaxy properties change from the nuclear to the outer regions. The issue is hotly debated and only spectroscopy obtained with Integral Field Units (IFU) such as MaNGA (Belfiore et al. 2016, 2017; Sanchez et al. 2017), CALIFA (S{\'a}nchez et al. 2016) and SAMI (Richards et al. 2016) will bring the issue to an end. These surveys have confirmed previous claims that regions of low ionization conditions can in fact extend to the bulges of galaxies and even further, mimicking the presence of AGNs, being in fact due to old post-AGB stars.\\ We compare the global with the nuclear properties of HRS galaxies adopting a method similar to Moustakas et al. (2010) who used long-slit spectroscopy, while Iglesias-P{\'a}ramo et al. (2013, 2016) adopted the two-dimensional (2D) spectroscopy. The availability of the global properties of HRS galaxies allows us to test the program of Brinchmann et al. (2004, hereafter B04) who claimed that a satisfactory estimate of the global star formation rate (SFR) of galaxies in the local Universe ($z<0.2$) can be achieved using SDSS fiber spectroscopy, once corrected for aperture effects using SDSS photometry (e.g., cmodel - fiber colors), both quantities being available for hundreds of thousands of local galaxies thanks to the SDSS. \\ The paper is structured as follows: in section 2 we describe the sample, in section 3 we outline the data reduction, in section 4 we present the results, and in section 5 the discussion and conclusions. A description of the tables provided is given in the appendix. Standard cosmology is assumed, with H$_{0}$ = 73 km/s/Mpc.\\ The spectroscopic data presented in this work, as well as those collected at other frequencies, are available to the community through the HeDaM database (http://hedam.lam.fr/HRS/). \section{The sample} \label{sample} The sample of galaxies analyzed in this work is the $Herschel$ Reference Survey (HRS) (Boselli et al. 2010a; the reader should refer to this paper to find the catalog names of HRS galaxies). It consists of a volume limited (15 $<$ $Dist$ $<$ 25 Mpc) sample of 322 galaxies, located in the sky region in the ranges 10h17m < R.A.(2000) < 14h43m and -6$^o$ < dec < 60$^o$ (see Fig. \ref{atlas}), of which 64 are early-type galaxies (ETGs: E, S0 and S0a) and 258 are late-type galaxies (LTGs: Sa-Sd-Im-BCD).\footnote{With respect to the original sample given in Boselli et al. (2010a), we revised the morphological classification for some HRS galaxies: HRS-032, HRS-090, HRS-202, HRS-229 and HRS-291 become ETGs, while HRS-256 becomes LTG. After this revision, the LTGs are 254 and the ETGs are 68. In this work we use this new number for our analysis.} All LTGs with a 2MASS K band total magnitude K$_{Stot}$ $\leq$12 mag have been selected and all ETGs with K$_{Stot}$ $\leq$8.7 mag have been included. The stellar mass range of HRS galaxies is: 5x10$^{8}$ $\leq$ $\rm M_{\ast}$ $\leq$ 10$^{11.3}$ $\rm M_{\odot}$. The sample spans a large range of environments: it includes the Virgo cluster, many galaxy groups, as well as isolated objects. In the Virgo cluster region ($12$h<R.A.<$13$h and 0$^o$<dec<18$^o$), the sample includes all galaxies with vel < $3000$ km/s and those belonging to cluster A, the North (N) and East (E) clouds, the southern extension (S; at $17$ Mpc) and Virgo B ($23$ Mpc), where the subgroup membership has been taken from Gavazzi et al. ($1999$a). The W and M clouds, at a distance of $32$ Mpc, have been excluded. In the sky projection map of Fig. \ref{atlas}, the Virgo cluster region, which includes 148 HRS objects from Virgo A, Virgo B, the N and E clouds and the S extension, is easily recognizable as the density enhancement at RA$\simeq$190 and Dec$\simeq$10. \subsection{Data from the literature} Most of HRS nuclear optical spectra were found in the literature. In particular, 163 spectra were downloaded in FITS format from the SDSS DR13 and DR12 database (Albareti et al. 2016); 114 spectra were found in the NASA/IPAC Extragalactic Database (NED) and 104 of these are taken from Ho et. al (1997). For these galaxies, the double spectrograph on the Hale 5m telescope at Palomar Observatory yielded simultaneous spectral coverage of $\sim$4230-5110$\rm \dot{A}$ and $\sim$6210-6860$\rm \dot{A}$, with a spectral resolution of $\sim$4$\rm \dot{A}$ in the blue and $\sim$2.5$\rm \dot{A}$ in the red. We joined the blue and red spectra by projecting them on a common wavelength solution and by performing a linear interpolation between the average flux of the last ten pixels of the blue spectrum and the first ten of the red spectrum. HRS-070, 072, 209, 265, 275, 288 and 284 have been observed with the 3.9m Anglo Australian Telescope (AAT) by Jones et al. (2009). HRS-193 was observed by Falco et al. 2000 with the Z-Machine at Mt. Hopkins 1.5m telescope (Arizona). HRS-251 was observed by Kim \& Veilleux (1995) with the 2.2m telescope at the University of Hawaii. HRS-271 is part of the work of Jansen et al. (2000) who observed 196 nearby galaxies with the FAST instrument at Tillinghast 1.5m telescope on Mt. Hopkins. Finally the remaining 45 spectra were observed by us with the 1.52m Cassini telescope at Loiano (Bologna) and their spectrum is published for the first time in this paper. Filled symbols in Fig. \ref{atlas} represent these 45 HRS targets. \begin{figure*} \centering \includegraphics[angle=0, scale=0.7]{fig1.eps} \vspace{-0.7cm} \caption{Sky projection of the full HRS survey (empty symbols) and the subsample of 45 targets whose nuclear spectra were observed with the Cassini Telescope (filled blue).} \label{atlas} \end{figure*} \section{Long-slit nuclear spectroscopy: observations and data reduction} Nuclear spectroscopic observations of 45 HRS galaxies that were found neither in the SDSS spectroscopic catalog nor within the NED database, were obtained by us during several observing campaigns from 2000 to 2017 using the Bologna Faint Object Spectrograph and Camera (BFOSC, Gualandi \& Merighi 2001) mounted on the 152cm F/8 Cassini Telescope located in Loiano, belonging to the Observatory of Bologna. Following the work of Gavazzi et al. 2011, 2013, these are long-slit spectra taken through a slit of 2 arcsec width and 12.6 arcmin length, combined with an intermediate-resolution red-channel grism (G8; $R$ $\sim$ 2200) covering the 6100 - 8200 \AA ~portion of the spectrum containing the $\rm H\alpha$, [NII], and [SII] lines. Twenty-five of these galaxies were also observed with the same instrument during six nights in April and May, 2017, (see Table \ref{Tobs} for details), using a blue-channel grism (G7) providing ($R$ $\sim$ 1400) cover from 4200 to 6600 \AA~. The observing log of these 45 galaxies is given in Table \ref{Tobs}.\\ BFOSC is equipped with a back illuminated EEV LN/1300-EB/1 CCD detector of 1300x1340 pixels, reaching 90\% QE near 5500 \AA ~and 70\% QE near 4000 \AA. For the spatial scale of 0.58 arcsec/pixel, and a dispersion of 8.8 nm/mm, the resulting spectra have a resolution of 1.6 ~\AA/pix for G8 and a dispersion of 11 nm/mm, with a resolution of 1.9 ~\AA/pix for G7.\\ Exposures of 2-7 minutes (G8) and 7-15 min (G7) were repeated typically three times to remove cosmic ray hits. The slit was generally set in the E-W direction and the typical seeing conditions at Loiano ranged from 1.5 to 2.5 arcsec. The wavelength calibration was secured by means of frequent exposures of a He-Ar hollow-cathode lamp and was further refined using bright OH sky lines. The spectrograph response (sensitivity function) was obtained by daily exposures of the stars Feige34 and Hz44 (Massey et al. 1988). The spectra were not flux calibrated, and measurements of the lines EW were derived, along with flux ratios of adjacent lines, namely [OIII]/H$\beta$, [NII]/H$\alpha$ and [SII]/H$\alpha$.\\ The spectra were reduced using standard IRAF procedures. To derive the wavelength calibration we used the tasks $identify$, $reidentify$, and $fitcoord$ on the hollow-cathode lamp exposures, and the 2D wavelength solution was transferred to the galaxy exposures by means of the task $transform$. After verification of the wavelength calibration on several known sky lines, the sky was subtracted using $background$. One-dimensional (1D) nuclear spectra were extracted from the 2D images using $apsum$, adopting an aperture of 10 pixel width (5.8 arcsec). We adopt this value for the aperture to be consistent with Ho et al. (1997), who extracted (red) spectra from an aperture of 4.1 arcsec. The 1D spectra were response-calibrated using the median sensitivity function of each night. After normalization to the flux in the interval 6400-6500 $\mbox{\AA}$ the spectra were Doppler shifted to $\lambda_0$: each redshift was taken from NED and then applied to the galaxy spectrum using $dopcor$. For the galaxies observed with both the G7 and G8 grisms, the blue and red spectra were joined using the task $scombine$.\\ Plots of the nuclear spectra obtained at Loiano are divided among Figures \ref{spectra} and \ref{spectra1} in the Appendix. Out of 19 spectra taken with the G8 grism, 8 can be found in Gavazzi et al. (2011, 2013). The remaining 11 are given in Figure \ref{spectra1} and are published for the first time in this paper. 25 spectra observed with both the G7 and G8 grisms are shown in Figure \ref{spectra} of the appendix.\footnote{Actually 26 spectra are shown. The additional, HRS-110, is a combination of a red spectrum taken at Loiano and a spectrum from the SDSS (DR7), whose red part near H$\alpha$ was ruined.}\\ The Balmer hydrogen lines are affected by stellar absorption, thus they have been corrected for this effect for proper use in the diagnostic diagrams.\\ We homogeneously corrected the 26 spectra that we took at Loiano with the G7+G8 grisms, the spectra downloaded from SDSS, the spectra observed by Ho et al. (1997) and the spectra downloaded from the NED database using the GANDALF fitting code (Gas AND Absorption Line Fitting, Sarzi et al. 2006; Falcon-Barroso et al. 2006) complemented by the Penalize Pixel-Fitting code (Cappellari \& Emsellem, 2004) to simultaneously model the stellar continuum and the emission lines in individual pixels. Consistently with B15, we used the $MILES$ stellar library (Vazdekis et al. 2010). GANDALF is a simultaneous emission and absorption line fitting algorithm designed to separate the relative contribution of the stellar continuum from that of the nebular emission in the spectra of nearby galaxies, while measuring the gas emission and kinematics. This code implements the pPXF method, which combines and adjusts the observed spectra of several stars of all spectral type to the stellar continuum to quantify and remove the underlying absorption. GANDALF was run several times, adjusting the algorithm input parameters, especially on spectra of Ho et al. (1997), because of the presence of the 1000\AA~ gap in these spectra (see section \ref{sample} for details). \\ For the remaining 19 galaxies observed at Loiano with the G8 grism, the insufficient spectral coverage prevents GANDALF from converging. For these galaxies, a statistical absorption correction was applied according to the following procedure. We took a sample of about 5000 galaxies from Consolandi et al. (2016) and constructed their color-stellar mass diagram in Figure \ref{colmag}. For these 5000 galaxies, we downloaded the absorption correction to H$\alpha $ from SDSS ($GalSpecLine$) and constructed a mean correction in nine bins of stellar mass and color (see Table \ref{Thalpha}) that we applied to the spectra according to each bin of mass and color. The $g$ and $i$ magnitudes for these HRS galaxies were taken from Cortese et al. (2012) and were subsequently corrected for Galactic extinction using the Cardelli et al. (1989) reddening curve; the value of stellar mass is from B15. The resulting H$\alpha$ correction is consistent with the correction obtained using the GANDALF analysis for the individual spectra.\\ \begin{figure} \centering \includegraphics[angle=0, scale=0.4]{fig2.ps} \vspace{-0.7cm} \caption{The color-stellar mass relation for a complete sample of galaxies in the Coma and Local supercluster from Consolandi et al. (2016), subdivided into nine bins of stellar mass and color. In these bins we compute the average SDSS continuum correction to H$\alpha$ (see Table \ref{Thalpha}).} \label{colmag} \end{figure} \begin{table} \centering \caption{Continuum correction to H$\alpha$ EW as derived from the color-mass relation of Figure \ref{colmag}.} \begin{tabular}{|c||c|c|c|} \hline & 8 $\leq$ $\rm M_{\ast}$ < 9 & 9 $\leq$ $\rm M_{\ast}$ $\leq$ 10 & 10 < $\rm M_{\ast}$ $\leq$ 11 \\ \hline 0.8< g-i $\leq$ 1.2 & 1.94 $\pm$ 0.41 & 1.91 $\pm$ 0.29 & 1.81 $\pm$ 0.24 \\ \hline 0.4 $\leq$ g-i $\leq$ 0.8 & 2.43 $\pm$ 0.63 & 2.25 $\pm$ 0.45 & 1.98 $\pm$ 0.32 \\ \hline g-i < 0.4 & 2.57 $\pm$ 0.63 & 2.48 $\pm$ 0.51 & - \\ \hline \end{tabular} \label{Thalpha} \end{table} \section{Spectral classification} \label{res} The determination of the spectral properties of HRS galaxies in this paper is based on four indicators (three versions of the BPT and the WHAN diagram) which exploit the ratio of [OIII]/H$\beta$ on [NII]/H$\alpha$ or [SII]/H$\alpha$ or occasionally on the [OI]/H$\alpha$ using the BPT diagnostic diagram, and on the ratio [NII]/H$\alpha$ versus the H$\alpha$ EW, using the WHAN diagram, which holds when the blue emission lines are not available. These diagnostics only classify galaxies with emission lines. Therefore galaxies classified as passive (PAS, showing only absorption lines) or post-starburst (PSB, showing the Balmer series in absorption) have been added a posteriori, by inspecting their spectra by eye.\\ According to Kobulnicky et al. (2003), the ratio of the two adjacent lines can be derived using the equivalent widths instead of the line fluxes.\\ In order to perform a robust spectral classification, we do not classify integrated and nuclear spectra with signal-to-noise ratio (S/N) of H$\alpha$ and H$\beta$ <3. With such a threshold, 48 nuclear spectra (marked with the letter "d" in Table \ref{Tclass}) and 36 integrated spectra (letter "b" in Table \ref{Tclass}) were not classified according to the BPT diagrams. Instead, all nuclear spectra could be classified according to the WHAN diagram and only 8 integrated spectra (marked with letters "b,c" in Table \ref{Tclass}) were excluded from this classification.\\ In the following spectral analysis we refer always to the LTGs subsample, because their statistic is complete (both nuclear and integrated). As far as concerns the ETGs subsample, 50 integrated spectra were not observed by Boselli et al. (2013): this subsample was not considered in our statistical analysis when we compare the nuclear to the integrated classification. Therefore we refer the reader to a sample of 360 ETGs from the ATLAS3D whose nuclear spectra are given in Gavazzi et al. (2018) for the properties of ETGs.\\ Figure \ref{nuc} gives the nuclear classification of HRS galaxies according to the BPT diagnostic diagram based on the [NII]/H$\alpha$ ratio (217 objects), on the [SII]/H$\alpha$ ratio (217 objects), on the [OI]/H$\alpha$ ratio (101 objects) and according to the WHAN diagram (288 objects). Approximately 30 additional galaxies with no emission lines, not included among the 217 nor 288 classified objects, were classified as PAS or PSB. \\ The region labeled HII (blue) lies to the left of the dotted line defined by K03, while the region occupied by AGNs (red) is to the right of the broken line of Kewley et al. (2001) in both the NII]/H$\alpha$ (first panel) and in the [OI]/H$\alpha$ diagrams (third panel). In between the two lines an intermediate region defines the position of the Transition objects (TRAN) (pink). The second panel gives the BPT diagnostic using the ratio [SII]/H$\alpha$. Here the straight line (from Kewley et al. 2006) separates Seyfert (SEY, in red) from $LINERs$ (LIN, in pink). The fourth panel of Fig. \ref{nuc} shows the WHAN diagnostic: the different spectral classification and separations between them are from Gavazzi et al. (2011). In this diagram galaxies are divided into five spectral types: HII-regions (blue), sAGN (red), wAGN (pink), RET (green) and PAS. \\ Using the same diagnostic criteria, Figure \ref{int} gives the BPT and WHAN classifications for integrated spectra with available emission lines, according to the S/N threshold.\\ In our analysis we refer always to AGNs as TRAN+AGN, LIN+SEY, and sAGN+wAGN. We adopted this definition for the AGNs spectral class to be able to compare our results with those of K03, who defined as AGNs all galaxies beyond the left line in the BPT ([NII]/H$\alpha$) diagram. In specific cases we refer only to "pure" AGNs, namely galaxies above the curve defined by Kewley et al. (2001) in the BPT ([NII]/H$\alpha$) diagram. Also, galaxies classified as PAS or PSB (and RET in the WHAN diagnostic) are always held together.\\ \begin{figure*} \centering {\includegraphics[width=4.4cm]{fig3a.ps}}{\includegraphics[width=4.4cm]{fig3b.ps}}{\includegraphics[width=4.4cm]{fig3c.eps}} {\includegraphics[width=4.4cm]{fig3d.ps}} \vspace{-0.5cm} \caption{Nuclear diagnostic diagrams for the whole HRS sample limited to emission-line objects with S/N ratio > 3. In the left BPT diagram the broken separation line between AGNs (red) and TRAN (pink) galaxies is from Kewley et al. (2001), while the dotted separation line between TRAN (pink) and HII region-like nuclei (blue) is from K03. In the second BPT diagram the extreme starburst classification line is from Kewley et al. (2001), while the separation between LINER (pink) and SEY (red) is from Kewley et al. (2006). We note that the pink filled symbols refer to different types of objects in the three diagrams. The third panel reports the BPT diagram for the minority of galaxies (101) with [OI] in emission. In the WHAN diagram the separations between the different classes are from Gavazzi et al. (2011).} \label{nuc} \end{figure*} \begin{figure*} \centering {\includegraphics[width=5.9cm]{fig4a.ps}}{\includegraphics[width=5.9cm]{fig4b.ps}}{\includegraphics[width=5.9cm]{fig4c.ps}} \vspace{-0.5cm} \caption{Integrated diagnostic diagrams for emission-line objects with S/N ratio > 3. Broken separations in the diagrams are the same as in Fig. \ref{nuc}.} \label{int} \end{figure*} \begin{figure*} \centering {\includegraphics[width=7.5cm]{fig5a.ps}}{\includegraphics[width=7.5cm]{fig5b.ps}} \vspace{-0.5cm} \caption{BPT diagrams for 164 HRS objects that have both the nuclear and integrated classification available in the [OIII]/H$\beta$ vs. [NII]/H$\alpha$ diagram. The separation lines are the same as in Figure \ref{nuc}.} \label{BPT} \end{figure*} \begin{figure*} \centering \subfigure[AGNs] {\includegraphics[width=5.9cm]{fig6a.ps}} \hspace{0.5mm} \subfigure[Transition] {\includegraphics[width=5.9cm]{fig6b.ps}} \hspace{0.5mm} \subfigure[HII regions] {\includegraphics[width=5.9cm]{fig6c.ps}} \vspace{-0.3cm} \caption{Migration from nuclear (filled symbols) to integrated (empty symbols) in the $BPT$ diagram.} \label{transition} \end{figure*} \begin{figure*} \centering {\includegraphics[width=7.5cm]{fig7a.ps}}{\includegraphics[width=7.5cm]{fig7b.ps}} \vspace{-0.5cm} \caption{BPT diagrams for 164 galaxies that have the ratios [OIII]/H$\beta$ and [SII]/H$\alpha$ available both from the nuclear and integrated spectra. The dotted separation lines are the same as in Figure \ref{nuc}.} \label{bptSII} \end{figure*} \begin{figure*} \centering {\includegraphics[width=7.5cm]{fig8a.ps}}{\includegraphics[width=7.5cm]{fig8b.ps}} \vspace{-0.5cm} \caption{WHAN diagrams for 244 galaxies with the ratios [NII]/H$\alpha$ and H$\alpha$ EW available both from nuclear and integrated spectra. The separations are the same as in Figure \ref{nuc}.} \label{whan} \end{figure*} \noindent Despite the different populations and classification criteria, the WHAN and the BPT nuclear diagnostics give consistent results (see Table \ref{statnuc}). Hereafter two different percentages are always reported, one is the value resulting from one of the [NII]/H$\alpha$ or [SII]/H$\alpha$ BPT diagrams and the other is from the WHAN diagram. Between 53 and 64\% of the nuclear spectra are HII region-like nuclei. The remaining percentage is divided between AGNs (21-27\%) and PAS (15-21\%). The "pure" AGNs are half of the AGNs percentage: 7-13\%. These are galaxies ionized by a SMBH.\\ Restricting to the 254 LTGs alone, the statistics is altered (see right columns of Table \ref{statnuc}): the HII-regions increase to 67-77\%; the AGNs become 21-27\%; and the PAS spectra decrease to 2-7\%. The latter class includes two PSB galaxies: HRS-116 and HRS-195. These two objects show a late-type morphology, with a central bulge and spiral arms, but the SF activity has been stopped suddenly. Also HRS-164 is a LTG with a PAS spectrum: its morphology shows a strong barred structure in the center, but it is an old and red object.\\ A comparison between the nuclear and integrated spectral classifications can be performed among the subsample of HRS galaxies with available nuclear and integrated classification (see Fig. \ref{BPT}, Fig. \ref{bptSII}, and Fig. \ref{whan}); the subsample is reported in Table \ref{statcomb}. This comparison provides information about how the excitation properties of galaxies change from the center to the outskirts. As can be seen in the three figures, AGNs represent 18-26 \% in the nuclear spectra; while in the integrated they decrease to 4-11\%. HII-regions are 59-71\% in the nuclear classification, becoming 69-84\% among the integrated spectra. PAS (including PSB) and RET are 11-15\% in the nuclear spectra, becoming 12-20\% in the integrated spectra. Altogether, the two diagnostics give consistently that the integrated spectra contain $\sim$ 10\% more HII-region-like spectra than the nuclear ones, together with 10\% less AGNs. PAS spectra have an equal frequency: they are 11-15\% in the nuclear classification, becoming 12-20\% in the integrated one. Figure \ref{transition} gives a graphical representation of the migration from nuclear to integrated classification, separately for the various spectral classes. Filled symbols refer to the position of nuclear spectra in the BPT ([NII]/H$\alpha$) diagram, while empty symbols give the position of integrated spectra in the same diagram. Unsurprisingly, only three nuclear AGNs remain AGNs in the integrated classification; all the remaining ones end up as TRAN or HII-regions. All but four nuclear TRAN become HII-regions in the integrated spectra. All but two nuclear HII-regions remain integrated HII-regions. We must highlight that the integrated statistics is biased toward the LTGs, because not all the integrated spectra were taken for the ETGs by Boselli et al. (2013) (only 18/68).\\ \begin{table*} \centering \caption{The frequency of the different types of nuclear spectra in the whole HRS sample (left) and among the 254 LTGs (right), including galaxies a posteriori classified as passive or post-starburst.} \begin{tabular}{|c|c|} \hline & AGN $34$ $(13\%)$ \\ & TRAN $31$ $(12\%)$ \\ BPT ([NII]/H$\alpha$) $255/322$ & HII $152$ $(60\%)$ \\ & PAS $36$ $(14\%)$ \\ & PSB $2$ $(1\%)$ \\ \cline{1-2} \hline & SEY $23$ $(9\%)$ \\ & LIN $30$ $(12\%)$ \\ BPT ([SII]/H$\alpha$) $255/322$ & HII $164$ $(64\%)$ \\ & PAS $36$ $(14\%)$ \\ & PSB $2$ $(1\%)$ \\ \cline{1-2} \hline & sAGN $24$ $(7\%)$ \\ & wAGN $63$ $(20\%)$ \\ WHAN $322/322$ & HII $171$ $(53\%)$ \\ & RET $28$ $(9\%)$ \\ & PAS $34$ $(11\%)$ \\ & PSB $2$ $(1\%)$ \\ \cline{1-2} \end{tabular}\qquad \begin{tabular}{|c|c|} \hline & AGN $26$ $(13\%)$ \\ & TRAN $27$ $(13\%)$ \\ BPT ([NII]/H$\alpha$) $206/254$ & HII $149$ $(72\%)$ \\ & PAS $2$ $(1\%)$ \\ & PSB $2$ $(1\%)$ \\ \cline{1-2} \hline & SEY $20$ $(10\%)$ \\ & LIN $24$ $(11\%)$ \\ BPT ([SII]/H$\alpha$) $206/254$ & HII $158$ $(77\%)$ \\ & PAS $2$ $(1\%)$ \\ & PSB $2$ $(1\%)$ \\ \cline{1-2} \hline & sAGN $21$ $(8\%)$ \\ & wAGN $47$ $(19\%)$ \\ WHAN $254/254$ & HII $168$ $(67\%)$ \\ & RET $14$ $(6\%)$ \\ & PAS $2$ $(0.5\%)$ \\ & PSB $2$ $(0.5\%)$ \\ \cline{1-2} \end{tabular} \label{statnuc} \end{table*} \begin{table*} \centering \caption{Statistics of integrated and nuclear spectra for HRS galaxies with line ratios available both from the nuclear and integrated spectra, including galaxies a posteriori classified as passive or post-starburst.} \begin{tabular}{|c|c|c|} \hline \multicolumn{1}{|c|}{} & \multicolumn{1}{|c|}{Nuclear} & \multicolumn{1}{|c|}{Integrated} \\ \hline & AGN $15$ $(8\%)$ & AGN $3$ $(2\%)$ \\ BPT ([NII]/H$\alpha$) & TRAN $20$ $(11\%)$ & TRAN $11$ $(6\%)$ \\ $185/322$ & HII $129$ $(70\%)$ & HII $148$ $(79\%)$ \\ & PAS $19$ $(10\%)$ & PAS $23$ $(13\%)$ \\ & PSB $2$ $(1\%)$ & \\ \hline \hline & SEY $16$ $(9\%)$ & SEY $3$ $(2\%)$ \\ BPT ([SII]/H$\alpha$) & LIN $16$ $(9\%)$ & LIN $3$ $(2\%)$ \\ $185/322$ & HII $132$ $(71\%)$ & HII $156$ $(84\%)$ \\ & PAS $19$ $(10\%)$ & PAS $23$ $(12\%)$ \\ & PSB $2$ $(1\%)$ & \\ \hline \hline & sAGN $22$ $(8\%)$ & sAGN $8$ $(3\%)$ \\ WHAN & wAGN $46$ $(18\%)$ & wAGN $20$ $(8\%)$ \\ $264/322$ & HII $155$ $(59\%)$ & HII $182$ $(69\%)$ \\ & RET $20$ $(7\%)$ & RET $21$ $(8\%)$ \\ & PAS $18$ $(7\%)$ & PAS $32$ $(12\%)$ \\ & PSB $2$ $(1\%)$ & \\ \hline \end{tabular} \label{statcomb} \end{table*} \subsection{Mass and environment dependence} Figure \ref{histo} shows the distribution of the different nuclear spectral type fractions for HRS late-type galaxies as a function of the stellar mass (from B15) with the respective error bars, computed using the WHAN diagram (left) and the BPT ([NII]/H$\alpha$) diagnostic (right). The number of galaxies in each specific mass bin is reported in parentheses. In spite of the different classification criteria, WHAN and BPT diagrams give consistent dependence of the nuclear spectral properties from stellar mass, excluding PAS spectra because their statistics in the LTG subsample is very small (only 4 objects). As shown in Fig. \ref{histo}, nuclear HII regions (blue) are exclusively found among galaxies with $\rm M_{\ast}$ < $10^{9.5}$ $\rm M_{\odot}$ (90$\pm$9\%), and then their fraction decreases with increasing stellar mass. On the contrary, the frequency of AGNs (red) (including TRAN, black) is low, at $\rm M_{\ast}$ < $10^{9.5}$ $\rm M_{\odot}$ (8$\pm$2\%) and increases significantly with stellar mass, reaching 66$\pm$14\% above $10^{10.0}$ $\rm M_{\odot}$, suggesting that approximately two thirds of the late-type galaxies in the local Universe, at that stellar mass value, contain an AGN or at least a TRAN object.\\ This also suggests that there is a clear dependency of the nuclear ionization source from galaxy stellar mass: less-massive galaxies are more likely to contain a nucleus ionized by young stellar population, compared to more-massive galaxies, which contain an AGN or a TRAN object.\\ Moreover previous works, such as K03, demonstrate that the AGNs fraction continues to grow at higher stellar mass. We conclude that even on nuclear scales, LTG galaxies suffer from decreasing SFR with increasing mass, a "downsizing" behavior, reinforcing the early claim by Gavazzi et al. (1996). \\ \begin{figure*} \centering {\includegraphics[width=8.5cm]{fig9a.ps}}{\includegraphics[width=8.5cm]{fig9b.ps}} \caption{Distribution of nuclear spectral type fractions for LTGs as a function of the stellar mass, using the classification provided by the WHAN (left) and by the BPT ([NII]/H$\alpha$) (right) diagram.} \label{histo} \end{figure*} \subsection{Star formation: the Brinchmann 04 program} \label{Br04} Understanding the physical processes that drive SF and the rate at which galaxies form stars is crucial for the study of galaxy evolution. In recent decades, the available multiwavelength observations, from X-rays to radio bands, have been used to define a set of SF indicators. The most frequently used are: the UV continuum, nebular recombination lines (primarily H$\alpha$), far-IR dust emission, and the synchrotron radio continuum at 21 cm (Kennicutt 1983). Only the comparison of two or more SF indicators provides reliable measure of the SFR in galaxies.\\ Many works in the literature proposed to compute the SFR directly from nuclear spectroscopy. Whether or not the global SF properties of nearby galaxies can be extrapolated from the available SDSS fiber spectroscopy ($aperture$ $correction$ problem) is still debated. \\ \noindent In this section, we test for the HRS galaxies the global SFR derived by B04 from SDSS nuclear spectra with the H$\alpha$-derived SFR of B15. B04 proposed a method to extrapolate the global SFR of local galaxies from SDSS nuclear spectra using aperture correction based on photometric optical colors. Summarizing, B04 computed the SFR of AGNs and TRAN objects from the 4000 \AA~ break and for HII-regions from a global emission-line estimate obtained by fitting Charlot \& Longhetti (2001) models to the nuclear spectra for galaxies belonging to the SDSS database. These values were corrected using an estimate of the external color of galaxies derived from the difference in color between the $cModel$ magnitude (the magnitude based on the best-fitting of the exponential and de Vaucouleurs models in the $r$ band, Abazajian et al. 2004) and the $fiber$ magnitude (the magnitude in 3-arcsec-diameter SDSS fiber radius). The global SFR is obtained by adding the external to the nuclear SFR. Both the stellar mass and SFR in B04 are computed assuming a Kroupa (2001) IMF. B04 data are available through the SDSS database ($galSpecExtra$ table) for 205186 galaxies with $z$<0.1 in the sky region corresponding to the one covered by the HRS. Figure \ref{sfr} represents the relation between the stellar mass and the log(SFR$_{total}$) for the aforementioned SDSS galaxies (see contours). The appearance of the galaxy main sequence is evident, separated by a cloud of quenched galaxies, a factor of one hundred less star forming. \\ Among galaxies listed in galSpecExtra we found the data for 38 HRS galaxies. For these we plot the value derived by B04 with open symbols. Conversely the filled symbols represent the SFR obtained by B15 directly from the H$\alpha$ integrated photometry (corrected to transform from Salpeter 1955 to Kroupa 2001 IMF). The filled symbols precisely overlap the galaxies SF main sequence (SFMS). On the contrary, most B04 SFR estimates are at least a factor of one hundred less than the actual integrated values. In particular, for three galaxies, the B04 value is smaller by a factor of one hundred; for eight galaxies, the B04 value is smaller by a factor of between ten and one hundred. The logarithmic mean deviation between B04 and B15 SFR estimations is 0.7. However we must highlight that the B04 study includes SDSS galaxies with $0.005 < z < 0.22$, while the HRS comprises galaxies with $cz<3000 ~km ~s^{-1}$, therefore suffering from more severe aperture correction than B04. \begin{figure} \centering \includegraphics[width=8.5cm]{fig10.ps} \caption{The relation between the stellar mass and the global SFR as computed by B04 (contours). Open symbols represent 38 HRS galaxies computed by B04 (dotted line represents the best fit to these data), while filled symbols are the integrated SFR derived for them by B15 using H$\alpha$ integrated photometry (solid line is the best fit to these data). The filled symbols precisely overlap the SFMS of galaxies in the local Universe; instead the value of SFR estimated by B04 is underestimated and does not follow the SFMS trend.} \label{sfr} \end{figure} \section{Discussion and conclusions} \label{summary} In this paper we have used the BPT and the WHAN diagnostic diagrams to derive the nuclear spectral classification of galaxies belonging to the HRS, a statistically representative magnitude and volume limited sample of 322 local galaxies, spanning a wide range in morphology and stellar mass, and belonging to different environments. The determination of the relative frequency of AGNs versus other spectral classes, for example, HII region-like, PAS, and RET, in a statistically complete sample of local galaxies is important to discriminate the source of ionization in the nuclear region of galaxies (e.g., black holes vs. young or old stars). \\ We present new nuclear long-slit spectroscopy of 45 HRS galaxies, which, added to the ones available form the literature, gives a complete nuclear spectroscopic census of all HRS galaxies more massive than $10^{8.5}$$\rm M_\odot$. The completeness of the observations allows us to make a statistical analysis of the spectroscopic nuclear properties of this sample.\\ We note that, after checking that using different diagnostics does not change the global statistics, we separated the different spectral classes by means of only the BPT(NII/Ha). We separated AGNs from HII and TRAN objects following the prescriptions of Kewley et al. (2001) and K03. Our main results can be summarized as follow: \\ \begin{figure*} \centering {\includegraphics[width=8.5cm]{fig11a.eps}}{\includegraphics[width=8.5cm]{fig11b.eps}} \caption{Mass distributions of the $mode$ of four different nuclear spectral classifications for the late-type HRS galaxies inside the Virgo cluster (left) and outside it (right).} \label{frac} \end{figure*} 1) As for the whole HRS sample about half of the nuclear spectra (53-64\%) are HII region-like nuclei, while AGNs (including TRAN) represent 21-27\% and PAS (including RET) spectra make up 15-21\%. Restricting to the 254 LTGs, the percentage of AGNs+TRAN varies between 22\% and 27\%, the fraction of HII-regions increases to 67-77\%, and PAS (including RET) spectra represent a mere 1-7\%. However, the classification schemes provided by the various diagnostics cannot be fully reconciled: for example, the class "Transition" exists only in the classic BPT diagram, and the division between strong and weak AGNs is provided only by the WHAN diagram; the same applies to the classification of retired galaxies (that were identified by Cid Fernandez et al. (2011) as presently inactive nuclei, previously ionized by post-AGB stars). Moreover, the scatter between the various classifications appears large, as it was also concluded, in particular for LINERs, by Balmaverde \& Capetti (2014) who compared HST high spatial- and spectral-resolution observations of low-luminosity AGNs with ground-based lower-resolution spectra. To reduce as much as possible the inconsistencies of the individual spectral classification schemes, we evaluate the $mode$ between the four classifications in Figure \ref {nuc}. In order to find a criterion for reliable classification, we select all galaxies whose $mode$ is consistently provided by at least three methods (we note that spectra in which emission lines are absent, no matter if they were considered RET in the WHAN, PSB (poststarbust) or purely passive (PAS), were reclassified by hand as PAS, and therefore their $mode$ classification is PAS with four votes). In the end, 195 targets out of 264 LTG galaxies have their $mode$ composed of three coherent classifications. In order to study a possible environmental dependence of these frequencies we plot the mass distributions of the spectral fractions in Fig. \ref{frac}, separately inside (left panel) and outside (right panel) the Virgo cluster (projected distance from M87 equal to two virial radii, assuming that the virial radius of the Virgo cluster is 1.7 Mpc from Boselli \& Gavazzi 2006). From Fig. \ref{frac} it is clear that the dependency of the nuclear spectral types on galaxy stellar mass remain visible also observing galaxies in different environments. However, no significant environmental dependence is found for the AGN frequency: among galaxies with $\rm M_{\ast}$ $\geq$ $10^{10.0}$ $\rm M_{\odot}$ they are consistent with 30$\pm$7\% inside or outside the Virgo cluster. In both environments the decrease of the frequency of HII region-like nuclei with increasing stellar mass is compensated by a combined increase of the fraction of AGNs and of passive nuclei (including those previously classified as RET that are known to derive from post AGB stars). 2) Regarding the comparison between the nuclear and the integrated classification, as expected, the fraction of AGNs+TRAN integrated spectra is significantly lower than in the nuclei; they are only 4-11\% instead of 18-26\% ($\sim$10\% lower). This decrease is compensated by an equal increase of HII region-like spectra (from 59-71\% in the nuclear to 69-84\% in the integrated classification). There is no significant change from the nuclear to the integrated classification in the percentage of PAS (including RET) spectra. This confirms previous results by Moustakas et al. (2006, 2010) and Iglesias-P{\'a}ramo et al. (2013, 2016) who found that the relative fraction of star-forming galaxies versus AGNs is a strong function of the integrated light enclosed by the spectroscopic aperture. Iglesias-P{\'a}ramo et al. (2013, 2016) observed 104 spiral galaxies in the CALIFA survey with an IFS, finding that the H$\alpha$ flux and the H$\alpha$ EW increase from the nucleus to the outer regions of galaxies with no dependence on galaxy inclination and stellar mass. Furthermore, Moustakas et al. (2010) provided optical nuclear, circumnuclear, and semi-integrated spectra of 65 galaxies in SINGS (Kennicutt et al. 2003), finding that the fraction of the sample classified as AGNs decreases by $\sim$30\% as the light fraction increases by $\sim$50\%, with a corresponding increase in the fraction of galaxies classified as HII-regions. Finally, Belfiore et al. (2016), who studied the spatially resolved excitation properties of the ionized gas for 646 galaxies belonging to SDSS-IV MaNGA, concluded that the excitation properties of galaxies change from the center to the outskirts in a very complex way. As the coverage of ETGs in the HRS is incomplete, we refer the reader to Gavazzi et al. (2018) who analyze the nuclear properties of a sample of 360 ETGs from the ATLAS3D. 3) Restricting to the 254 LTGs, we computed the spectral classes distribution as a function of stellar mass. The percentage of HII regions is inversely proportional to the stellar mass (90\% for galaxies with $\rm M_{\ast}$ < $10^{9.5}$ $\rm M_{\odot}$) while that of AGNs (including TRAN) is directly proportional. We find that approximately two thirds (66\%) of spiral galaxies in the local Universe ($z$<0.03) with $\leq$ $\rm M_{\ast}$ > $10^{10.0}$ $\rm M_{\odot}$ contain an AGN or a TRAN object, that is, a nucleus not ionized by a young stellar population (O and B stars), but ionized by a supermassive black hole or old post-AGB stars. Our result is consistent with K03 who examined the properties of the host galaxies of 22623 AGNs with 0.02<$z$<0.3 selected from the SDSS. First of all, we note that K03 defines AGNs as all galaxies that lie to the right of the line defined by K03 in the BPT diagram, so we can compare our results on AGNs+TRAN to these. K03 found that AGNs reside almost exclusively in massive galaxies: between 3x$10^{10}$ $\rm M_{\odot}$ and $10^{11}$ $\rm M_{\odot}$ , they represent 50\% at very low redshift ($z\sim$0.02). More recently, Sanchez et al. (2017) remarks that AGNs are hosted in the most massive galaxies, namely mostly ETGs or early-type spirals, with an important bulge.\\ 4) Restricting to the 254 LTGs we also computed the spectral type distribution as a function of environment, considering that 148 HRS galaxies belong to the Virgo cluster. No significant environmental dependence is found for AGNs (including TRAN): for galaxies with $\rm M_{\ast}$ $\geq$ $10^{9.0}$ they are consistent with $\sim$33\% inside the Virgo cluster and with $\sim$30\% outside it. Similar results are obtained restricting to the "pure" AGNs, at the same stellar mass; they reach $\sim$13\% inside the Virgo cluster and $\sim$14\% outside it. These results suggest that AGNs, including or excluding TRAN objects, exist with similar frequencies in clusters and in the field. Both inside and outside Virgo, the frequency of AGNs found in this work is higher than the percentage found by Marziani et al. (2017) in the WINGS survey (Fasano et al. 2006) and by B04 in the SDSS. However, after inspection of the individual AGN spectra in this work (prior and after the GANDALF correction) we found that the classification of 4 out of 26 AGN spectra is highly uncertain, making the above difference insignificant. \noindent 5) B15 computed the SFR for the HRS galaxies. Thirty-eight of these are also part of B04. The SFR derived from the global measurements (both spectroscopic and imaging) for this set of 38 HRS galaxies is inconsistent with the value obtained by B04 with his aperture-corrected method: the former being in most cases two orders of magnitude larger than the values of B04. This confirms previous results by Richards et al. (2015) who tested the B04 method for 1212 galaxies belonging to the SAMI Galaxy survey (Croom et al. 2012). Richards et al. (2015) conclude that the nuclear spectrum is not representative of the properties of the entire galaxy, mainly because of the different dust content: H$\alpha$/H$\beta$ ratio (extinction) decreases from the center towards larger radii; therefore, galaxies with different morphology require different dust attenuation corrections. Similar results have been obtained by Iglesias-P{\'a}ramo et al. (2013) who confirmed that local star-forming galaxies observed through a small aperture are misclassified as quiescent if the aperture-correction method is based only on the nuclear properties, because the fraction of a galaxy covered by a fixed aperture varies with redshift. We maintain that the B04 aperture-correction method does not provide a robust extrapolation of the global SFR for local galaxies ($z$<0.03). \begin{acknowledgements} This research has made use of the GOLDmine database (Gavazzi et al. 2003, 2014b) and of the NASA/IPAC Extragalactic Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration. Funding for the Sloan Digital Sky Survey (SDSS) and SDSS-II has been provided by the Alfred P. Sloan Foundation, the Participating Institutions, the National Science Foundation, the U.S. Department of Energy, the National Aeronautics and Space Administration, the Japanese Monbuk agakusho, and the Max Planck Society, and the Higher Education Funding Councill for England. The SDSS Web site is http://www.sdss.org/. The SDSS is managed by the Astrophysical Research Consortium (ARC) for the Participating Institutions.The Participating Institutions are the American Museum of Natural History, Astrophysical Institute Potsdam, University of Basel, University of Cambridge, Case Western Reserve University, The University of Chicago, Drexel University, Fermilab, the Institute for Advanced Study, the Japan Participation Group, The Johns Hopkins University, the Joint Institute for Nuclear Astrophysics, the Kavli Institute for Particle Astrophysics and Cosmology, the Korean Scientist Group, the Chinese Academy of Sciences (LAMOST), Los Alamos National Laboratory, the Max-Planck-Institute for Astronomy (MPIA), the Max-Planck-Institute for Astrophysics (MPA), New Mexico State University, Ohio State University, University of Pittsburgh, University of Portsmouth, Princeton University, the United States Naval Observatory, and the University of Washington. \end{acknowledgements}
\section{Introduction} An element $w$ of a Coxeter group is said to be {\em fully commutative} if any reduced word for $w$ can be obtained from any other by interchanges of adjacent commuting generators. In \cite{Stem96}, Stembridge classified the Coxeter groups that have finitely many fully commutative elements. His results completed the work of Fan \cite{Fan1996} and Graham \cite{Graham} who had obtained such a classification for the simply-laced types and had shown that the fully commutative elements parameterize natural bases for the corresponding quotients of Hecke algebras. In type $A_n$, the quotients are isomorphic to the Temperley--Lieb algebras (see \cite{Jones1987}). Fan and Stembridge also enumerated the set of fully commutative elements. In particular, they showed the following. \begin{prop}[\cite{Fan1996,Stem98}]\label{full comm count} Let $C_n$ be the $n^\textrm{th}$ Catalan number, i.e. $C_n = \frac{1}{n+1}{2n\choose n}$. Then the numbers of fully commutative elements in the Coxeter groups of types $A_n$, $B_n$ and $D_n$ are given as follows: $$ \begin{cases} C_{n+1} & \text{ if the type is } A_n, \\ (n+2) \, C_{n}-1 & \text{ if the type is } B_n, \\ \frac{n+3}{2} \, C_{n}-1 & \text{ if the type is } D_n. \end{cases} $$ \end{prop} This paper is concerned with the complex reflection groups $G(d,r,n)$, where $d,r, n \in \mathbb Z_{>0}$ such that $r|d$. These groups are generated by complex reflections and have the Coxeter groups of types $A_{n-1}$, $B_n$ and $D_n$ as special cases. As the complex reflection groups can be presented by analogues of simple reflections and braid relations, one can attempt to generalize the notion of full commutativity to these groups. However, a direct generalization using the usual set of braid relations does not work even for $G(d,1,n)$ if $d\ge 3$. A breakdown comes from the fact that some reduced words may not be connected to others strictly using braid relations. In this paper, we overcome the difficulty and define fully commutative elements for $G(d,1,n)$, by proving that a slightly extended set of braid relations connects all the reduced words for an element of $G(d,1,n)$. (See Example \ref{ex-over}.) The next task is to describe and enumerate all the fully commutative elements, and we take the approach of the paper \cite{FL14} where the first and third named authors studied fully commutative elements of the Coxeter group of type $D_n$. More precisely, we decompose the set of fully commutative elements into natural subsets, called {\em collections}, according to their canonical words, and group them together into {\em packets} $\mathcal{P}(n,k)$, $0 \le k \le n$, so that all the collections in a packet have the same cardinality. We show that the number of fully commutative elements in any collection belonging to the packet $\mathcal{P}(n,k)$ is equal to the Catalan triangle number $C(n,k)$. Then the total number of fully commutative elements in $G(d,1,n)$ can be written as \begin{equation} \label{eq-11} \sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = d(d-1)\mathfrak{F}_{n,n-2}(d) +(2d-1)C_n -(d-1), \end{equation} where $|\mathcal{P}(n,k)|$ is the number of collections in the $(n,k)$-packet and $\mathfrak{F}_{n,k}(x)$ is the Catalan triangle polynomial defined by \begin{align} \label{eq: n,k Cat tr pol} \mathfrak{F}_{n,k}(x) & = \sum_{s=0}^{k} C(n,s)x^{k-s}. \end{align} When $d=2$, the group $G(2,1,n)$ is isomorphic to the Coxeter group of type $B_n$, and our definition of fully commutative elements coincides with the usual definition for Coxeter groups, and we recover the known number $(n+2)\, C_n-1$ from \eqref{eq-11}. Our method for proofs exploits combinatorics of canonical words and establishes bijections among collections. In particular, we realize the Catalan triangle (Table \ref{CT}) using collections of fully commutative elements. For the group $G(d,r,n)$, $r >1$, we fix an embedding into $G(d,1,n)$ and define $w \in G(d,r,n)$ to be fully commutative if its image under the embedding is fully commutative in $G(d,1,n)$. The main benefit of this definition is that the decomposition into collections and packets still works without any complications, and we obtain complete description and enumeration of fully commutative elements for all $G(d,r,n)$. On the other hand, a drawback of this definition is that some fully commutative elements in the Coxeter group of type $D_n$ or $G(2,2,n)$ are not fully commutative in $G(2,1,n)$ after being embedded. That is, the usual definition of full commutativity for $D_n$ is not compatible with the new definition. Though it is not clear at the present, an intrinsic definition of full commutativity for $G(d,r,n)$, $r>1$, which does not use an embedding, may be found. For such a definition, precise information about a complete set (or Gr{\" o}bner--Shirshov basis) of relations would be very helpful. We leave it as a future direction. The organization of this paper is as follows. In Section \ref{first} we determine canonical words for the elements of the complex reflection groups. In the next section, we define fully commutative elements. Section \ref{ch:D} is devoted to a study of decomposition of the set of fully commutative elements into collections and packets for $G(d,1,n)$. In Section \ref{sec-gddn}, we consider the packets of $G(d,r,n)$. The next section provides some examples, and the final section is an appendix with the list of reduced words for $G(3,3,3)$. \section{Canonical forms} \label{first} \subsection{Complex reflection groups} For positive integers $d$ and $n$, let $G(d,1,n)$ be the group generated by the elements $s_1,s_2 \cdots, s_{n}$ with defining relations: \begin{subequations} \begin{align} s_n^d&=s_i^2=1 \quad &\mbox{for}\ 1\le i \le n-1, \label{eq:order1} \allowdisplaybreaks \\ s_is_j&=s_js_i \quad &\mbox{for}\ j+1 < i \le n, \label{eq:cm1}\allowdisplaybreaks \\ s_{i+1}s_is_{i+1}&=s_is_{i+1}s_i \quad &\mbox{for}\ 1\le i \le n-2, \label{eq:b1} \allowdisplaybreaks \\ s_ns_{n-1}s_ns_{n-1}&=s_{n-1}s_ns_{n-1}s_n. \label{eq:l1} \end{align} \end{subequations} Then the group $G(d,1,n)$ is a complex reflection group which is isomorphic to the wreath product of the cyclic group $\mathbb Z\slash d \mathbb Z$ and the symmetric group $S_n$. The corresponding diagram is given by $$ \xymatrix@R=0.5ex@C=4ex{ *{\circled{\phantom{$d$}}}<3pt> \ar@{-}[r]_<{ \ 1} &*{\circled{\phantom{$d$}}}<3pt> \ar@{-}[r]_<{ \ 2} & {} \ar@{.}[r]_>{ \ \ \qquad n-2} & *{\circled{\phantom{$d$}}}<3pt> \ar@{-}[r]_>{ \ \ \qquad n-1} &*{\circled{\phantom{$d$}}}<3pt>\ar@{=}[r]_>{ \qquad n} &*{\circled{$d$}}<3pt> } $$ For each $d \ge 2$ and $n \ge 3$, let $G(d,d,n)$ be the complex reflection group generated by the elements $\tilde s_1,\tilde s_2 \cdots, \tilde s_{n}$ with defining relations: \begin{subequations} \begin{align} \tilde s_i^2&= 1=(\tilde s_n\tilde s_{n-1})^d \quad &\mbox{for}\ 1\le i \le n, \allowdisplaybreaks \\ \tilde s_i\tilde s_j&=\tilde s_j\tilde s_i \quad &\mbox{for}\ j+1 < i \le n-1, \label{eq:cm2} \allowdisplaybreaks\\ \tilde s_n\tilde s_j & =\tilde s_j\tilde s_n & \text{for } j \le n-3, \allowdisplaybreaks \\ \tilde s_{i+1}\tilde s_i\tilde s_{i+1}&=\tilde s_i\tilde s_{i+1}\tilde s_i \quad &\mbox{for}\ 1\le i \le n-2, \label{eq:b2} \allowdisplaybreaks \\ \tilde s_n \tilde s_{n-2} \tilde s_n & = \tilde s_{n-2} \tilde s_n \tilde s_{n-2}, \\ (\tilde s_n\tilde s_{n-1}\tilde s_{n-2})^2 &=(\tilde s_{n-2}\tilde s_n\tilde s_{n-1})^2. \label{eq:l2} \end{align} \end{subequations} The corresponding diagram is the following. \[ \begin{tikzpicture}[x=2cm, scale=.5] \foreach \x in {-1.5, 0,1.5,3} \draw[xshift=\x] (\x,0) circle (3 mm); \draw (4.5,1.5) circle (3 mm); \draw (4.5,-1.5) circle (3 mm); \draw (-1.35,0) --(-0.15,0); \draw (1.67,0)--(2.87,0); \draw[dotted, thick] (0.2,0) -- (1.3,0); \foreach \y in {1.5} \draw (3.3,0.1)--(4.4,0.1) (3.3,-0.1)--(4.4,-0.1); \draw (3.2,0.1)--(4.35,1.5) (3.2,-0.1)--(4.35,-1.5); \draw (4.5,1.24) -- (4.5,-1.25); \draw (4.5,0) node[right]{\scriptsize $d$}; \draw (-1.5,-.3) node[below]{\scriptsize $1$}; \draw (0,-.3) node[below]{\scriptsize $2$}; \draw (1.5,-.3) node[below]{\scriptsize $n-3$}; \draw (3,-.3) node[below]{\scriptsize $n-2$}; \draw (4.5,1.8) node[above]{\scriptsize $n$}; \draw (4.5,-1.8) node[below]{\scriptsize $n-1$}; \end{tikzpicture} \] Note that the complex reflection groups $G(2,1,n)$ and $G(2,2,n)$ are the Coxeter groups of types $B_n$ and $D_n$ respectively. For $r\ | \ d$ and $e=d/r$, let $G( d,r ,n)$ be the complex reflection group generated by the elements $\tilde s_1,\tilde s_2 \cdots, \tilde s_{n}, \tilde s$ with defining relations: \begin{subequations} \begin{align} \tilde s^e=\tilde s_i^2&= 1 \quad &\mbox{for}\ 1\le i \le n, \allowdisplaybreaks\\ \tilde s_i\tilde s_j&=\tilde s_j\tilde s_i \quad &\mbox{for}\ j+1 < i \le n-1, \label{eq:cm3} \allowdisplaybreaks\\ \tilde s\ts_j & =\tilde s_j\tilde s & \text{for } j \le n-2, \allowdisplaybreaks\\ \tilde s_n\tilde s_j & =\tilde s_j\tilde s_n & \text{for } j \le n-3, \allowdisplaybreaks\\ \tilde s_{i+1}\tilde s_i\tilde s_{i+1}&=\tilde s_i\tilde s_{i+1}\tilde s_i \quad &\mbox{for}\ 1\le i \le n-2, \label{eq:b3} \allowdisplaybreaks\\ \tilde s \tilde s_{n} \tilde s_{n-1} &= \tilde s_{n} \tilde s_{n-1} \tilde s \allowdisplaybreaks\\ \tilde s_n \tilde s_{n-2} \tilde s_n & = \tilde s_{n-2} \tilde s_n \tilde s_{n-2}, \allowdisplaybreaks\\ (\tilde s_n\tilde s_{n-1}\tilde s_{n-2})^2 &=(\tilde s_{n-2}\tilde s_n\tilde s_{n-1})^2 \\ \tilde s \tilde s_{n} (\tilde s_{n-1}\tilde s_{n})^{r-1} &= \tilde s_{n-1} \tilde s. \label{eq:l3} \end{align} \end{subequations} \subsection{Canonical reduced words for $G(d,1,n)$} An expression $s_{i_1} \cdots s_{i_r} \in G(d,1,n)$ will be identified with the word $[i_1, \dots, i_r]$ in the alphabet $I := \{1, 2, \dots, n \}$. For $1\leq i ,j \leq n$, we define the words $s_{ij}$ by: $$ s_{ij} = \left\{ \begin{array}{ll} ~[i, i-1, \hdots, j] & \text{ if } i > j, \\ ~[i] & \text{ if } i = j, \\ ~[~] & \textrm{ if } i<j , \end{array} \right. $$ where $[~]$ denotes the empty word or the identity element of $G(d,1,n)$. We will often write $s_{ii}=s_i$. We also define \[ s^{(k)}_{nj} =s_n^k s_{n-1,j} \qquad \text{ for } k \ge 1.\] The following lemmas are useful to obtain a canonical form of the elements of $G(d,1,n)$. \begin{lemma} \label{lem-GS-Grd1} The following relations hold in $G(d,1,n)$: \begin{subequations} \begin{align} s_{ij}s_{i}& =s_{i-1}s_{ij} & & \text{ for } j < i \le n-1 , \label{eq:s} \allowdisplaybreaks \\ s^{(k_1)}_{n,n-1} \, s^{(k_2)}_{n,n-1}& =s_{n-1}s^{(k_2)}_{nj}s^{k_1}_{n} & & \text{ for } k_1, k_2\ge 1. \label{eq:nt} \end{align} \end{subequations} \end{lemma} \begin{proof} Since the relations \eqref{eq:s} can be checked easily, we only prove the relations \eqref{eq:nt}. We first establish \begin{equation} \label{eq:tss} s_{n,n-1} \, s^{(k)}_{n,n-1} =s_{n-1}s^{(k)}_{n,n-1}s_{n} \qquad \text{ for } k\ge 1. \end{equation} When $k=1$, it is just the defining relation \eqref{eq:l1}. For $k\ge 2$, we use induction on $k$ and obtain \begin{align*} s_{n,n-1} \, s^{(k)}_{n,n-1} &= s_{n,n-1} \, s^{(k-1)}_{n,n-1} s_{n-1}s_ns_{n-1} &(\text{using $s_{n-1}^2=1$)} \allowdisplaybreaks\\ &=s_{n-1} s^{(k-1)}_{n,n-1} s_n s_{n-1}s_ns_{n-1} &(\text{induction)} \allowdisplaybreaks \\ &= s_{n-1} s^{(k-1)}_{n,n-1} s_{n-1}s_ns_{n-1}s_n &(\text{using \eqref{eq:l1})} \allowdisplaybreaks\\ &= s_{n-1}s^{(k)}_{n,n-1}s_{n}. \end{align*} Next we prove \[ s^{(k_1)}_{n,n-1} \, s^{(k_2)}_{n,n-1} = s_{n-1} s^{(k_2)}_{n,n-1} s^{k_1}_n \quad \text{ for } k_1,k_2 \ge 1. \] The case $k_1=1$ is obtained above, and when $k_1 \ge 2$, we see \begin{align*} s^{(k_1)}_{n,n-1} \, s^{(k_2)}_{n,n-1} &= s_ns^{(k_1-1)}_{n,n-1} \, s^{(k_2)}_{n,n-1} = s_{n,n-1} s^{(k_2)}_{n,n-1} \, s^{k_1-1}_{n} &(\text{induction)} \allowdisplaybreaks\\ &=s_{n-1} s^{(k_2)}_{n,n-1} s^{k_1}_n &(\text{relation \eqref{eq:tss}}). \end{align*} \end{proof} \begin{lemma} \label{lem-only} The following relations hold in $G(d,1,n)$: \begin{align} s^{(k_1)}_{nj} \, s^{(k_2)}_{nj}& =s_{n-1}s^{(k_2)}_{nj}s^{(k_1)}_{n, j+1} & \text{ for } j\le n-1 \text{ and } k_1, k_2\ge 1. \label{eq:t} \end{align} Moreover, these relations are derived from \eqref{eq:cm1}, \eqref{eq:b1} and \eqref{eq:nt}. \end{lemma} \begin{proof} When $j=n-1$, it is \eqref{eq:nt}. We use downward induction on $j$, and obtain \begin{align*} s^{(k_1)}_{nj}\, s^{(k_2)}_{nj} &= s^{(k_1)}_{n, j+1} s^{(k_2)}_{n, j+2} s_j s_{j+1} s_j = s^{(k_1)}_{n, j+1} s^{(k_2)}_{n, j+2} s_{j+1} s_{j} s_{j+1} & (\text{relations \eqref{eq:cm1}, \eqref{eq:b1}}) \allowdisplaybreaks \\ &= s^{(k_1)}_{n, j+1} s^{(k_2)}_{n, j+1} s_{j} s_{j+1} = s_{n-1} s^{(k_2)}_{n, j+1} s^{(k_1)}_{n,j+2} s_{j} s_{j+1} & (\text{induction}) \allowdisplaybreaks \\ &=s_{n-1} s^{(k_2)}_{n j} s^{(k_1)}_{n,j+1} & (\text{relation \eqref{eq:cm1}}). \end{align*} \end{proof} Let $\mathcal R$ be the following set of relations: \begin{subequations} \begin{align} s_n^d&=s_i^2=1 & \text{ for }\ 1\le i \le n-1, \label{eq:order-1} \allowdisplaybreaks\\ s_is_j&=s_js_i &\text{ for }\ j+1 < i \le n, \label{eq:cm-1} \allowdisplaybreaks\\ s_{ij}s_{i}& =s_{i-1}s_{ij} & \text{ for } j < i \le n-1 , \label{eq:s-1} \allowdisplaybreaks\\ s^{(k_1)}_{nj} \, s^{(k_2)}_{nj}& =s_{n-1}s^{(k_2)}_{nj}s^{(k_1)}_{n, j+1} & \text{ for } j\le n-1 \text{ and } k_1, k_2\ge 1. \label{eq:t-1} \end{align} \end{subequations} \begin{prop} \label{ccan} Using only the relations in $\mathcal R$, any element of the group $G(d,1,n)$ can be uniquely written in the following reduced form \begin{equation} \label{eq:ccan} s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} \end{equation} where $1 \le i_p \leq p+1$ for $1 \le p \le n-1$, and $1\leq j_1<j_2<\cdots<j_\ell\leq n$ for $\ell\geq0$, and $1\le k_p \le d-1$ for $1 \le p \le \ell$. \end{prop} \begin{proof} Consider $w \in G(d,1,n)$ and an expression of $w$ written in generators. Let $\ell$ be the number of occurrences of $s_n^k$ in the expression of $w$ for various $k$'s, where $k$ is maximal for each occurrence, i.e., if $w= \cdots s_i s_n^k s_j \cdots$, then $i \neq n$ and $j \neq n$. If $\ell =0$ then $w$ is an element of the subgroup of type $A_{n-1}$ and it is well known that one can use only the relations (without $s_n$) in $\mathcal R$ to obtain the reduced form \eqref{eq:ccan}. (See, for example, \cite{Bokut2001}.) Assume that $\ell >0$. Then we can write \[ w=w_1 s_n^k s_{1p_1}s_{2p_2}\cdots s_{n-1p_{n-1}}, \] where $s_n^k$ is the last occurrence of a power of $s_n$ in the expression of $w$. By the commutativity relation \eqref{eq:cm-1}, we have \[ w= w_1 s_{1p_1}s_{2p_2}\cdots s_{n-2p_{n-2}} s_n^k s_{n-1p_{n-1}}= w_2 \, s_{np_{n-1}}^{(k)}, \] where we set $w_2=w_1 s_{1p_1}s_{2p_2}\cdots s_{n-2p_{n-2}}$. By induction, the element $w_2$ can be written in the form \eqref{eq:ccan}, and we have \[ w=s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_{\ell-1})}_{n j_{\ell-1}} s_{np_{n-1}}^{(k)} . \] If $j_{\ell-1} < p_{n-1}$ or $j_{\ell-1}=n$ then we are done. If $j_{\ell-1} \ge p_{n-1}$ and $j_{\ell-1} < n$ then we use the relations \eqref{eq:cm-1} and \eqref{eq:t-1} to obtain \begin{align} s^{(k_{\ell-1})}_{n j_{\ell-1}} s_{np_{n-1}}^{(k)} & = s^{(k_{\ell-1})}_{n j_{\ell-1}} s_{nj_{\ell-1}}^{(k)} s_{j_{\ell-1}-1, p_{n-1}} \nonumber \\ &= s_{n-1} s_{nj_{\ell-1}}^{(k)} s^{(k_{\ell-1})}_{n, j_{\ell-1}+1} s_{j_{\ell-1}-1, p_{n-1}} = s_{n-1} s_{n p_{n-1}}^{(k)} s_{n, j_{\ell-1}+1}^{(k_{\ell-1})} . \label{eq:lo} \end{align} Using \eqref{eq:lo}, we rewrite $w$ and apply the induction hypothesis again. We repeat this process until we get the canonical form \eqref{eq:ccan} in a finite number of steps. Now we claim that the number of the canonical words is exactly $n!\cdot d^n$. Indeed, since each $i_p$ runs over the set $\{ 1,\cdots, p+1\}$, there are $2\cdot 3 \cdots n = n!$ choices for the part $s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}$. Now for the part $s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell}$ with the conditions $1\leq j_1<j_2<\cdots<j_\ell\leq n$ ($\ell\geq0$) and $1 \le k_p \le d-1$, we just need to consider the number of forms $s^{(k_1)}_{n1}s^{(k_2)}_{n2}\cdots s^{(k_\ell)}_{nn}$ with each $k_p$ running over the set $\{0,1,\cdots, d-1\}$, setting $s^{(0)}_{nj_p}=1$ for convenience. In this way, this part has $d^n$ elements. Thus altogether, we have $n!\cdot d^{n}$ canonical words as claimed. We recall that $n! \cdot d^n$ is the order of $G(d,1,n)$. Thus we have shown that every element of $G(d,1,n)$ is uniquely written in the canonical form \eqref{eq:ccan}. \end{proof} \begin{remark} Proposition \ref{ccan} shows that $\mathcal R$ is a Gr{\" o}bner--Shirshov basis for the group $G(d,1,n)$. See \cite{Bokut2001} for details about Gr{\" o}bner--Shirshov bases. For the group $G(2,1,n)$, which is the Coxeter group of type $B_n$, the canonical form \eqref{eq:ccan} is obtained by Bokut and Shiao \cite[Lemma 5.2]{Bokut2001}. A different canonical form for the group $G(d,1,n)$ can be found in \cite{BM,KLLO,Sh}. \end{remark} \begin{dfn} The set of canonical words in \eqref{eq:ccan} for $G(d,1,n)$ will be denoted by $\mathcal W(d,1,n)$. The left factor $s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}$ of a canonical word will be called the \textit{prefix}, and similarly the right factor $s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2} \cdots s^{(k_\ell)}_{nj_\ell}$ will be called the \textit{suffix} of the reduced word. Given a reduced word $\boldsymbol{w}$ in the canonical form, we will denote by $\bw_0$ the prefix of $\boldsymbol{w}$ and by $\bw'$ the suffix, and write $\boldsymbol{w} = \bw_0 \bw'$. \end{dfn} \subsection{Canonical reduced words for $G(d,d,n)$} \label{sec-g} For $1\leq i \leq n-1$, we define the words $\tilde s_{ij}$ in the same way as with $s_{ij}$ using the generators $\tilde s_i$. When $i=n$, we define \begin{equation} \label{eq:conv} \tilde s_{nj} = \left\{ \begin{array}{ll} ~[n, n-2, \hdots, j] & \textrm{ if } j\leq n-2, \\ ~[n] & \textrm{ if } j=n,n-1, \\ ~[~] & \textrm{ if } j>n. \end{array} \right.\end{equation} The group $G(d,d,n)$ can be embedded into $G(d,1,n)$ as a subgroup of index $d$. Indeed, we define $\iota: G(d,d,n) \rightarrow G(d,1,n)$ by \[ \iota (\tilde s_n) = s_n^{d-1} s_{n-1} s_n \quad \text{ and } \quad \iota (\tilde s_i)=s_i \text{ for }1 \le i \le n-1 . \] Then one can check that $\iota$ is a well-defined group homomorphism. Furthermore, we have the following lemma. \begin{lemma} \label{lem-tilde} The homomorphism $\iota$ is an embedding and its image consists of the elements whose canonical words are in the set \[\{ s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} \in \mathcal W(d,1,n): k_1+k_2+ \cdots +k_\ell \equiv 0 \, (\text{mod }d) \}.\] This set of reduced words will be denoted by $\mathcal W(d,d,n)$. \end{lemma} \begin{proof} Since $\iota (\tilde s_n)= s_{n,n-1}^{(d-1)} s_n$, it is clear from \eqref{eq:t-1} that the elements in the image of $\iota$ have reduced forms in $\mathcal W(d,d,n)$. We count the number of elements in $\mathcal W(d,d,n)$ and find that it is $n! \cdot d^{n-1}$ which is equal to the order of $G(d,d,n)$. Thus $\iota$ is an embedding. \end{proof} The preimage of an element with a reduced word in $\mathcal W(d,d,n)$ can be found in the following way. We note that \[ \iota (\tilde s_n \tilde s_{n-1})^k = s_{n-1} s_{n,n-1}^{(k)} s_n^{d-k} \] and \begin{align} s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2} & = s_{n-1}s_{n-1} s_{n,n-1}^{(k_1)} s_n^{d-k_1} s_n^{k_1} s_{n-2,j_1} s_{nj_2}^{(k_2)} \nonumber \\ &= \iota(\tilde s_{n-1}) \, \iota(\tilde s_n\tilde s_{n-1})^{k_1} \, \iota(\tilde s_{n-2,j_1}) \, s_{nj_2}^{(k_1+k_2)} \nonumber \\ &= \iota(\tilde s_{n-1}\tilde s_{n})^{k_1} \, \iota(\tilde s_{n-1,j_1}) \, s_{nj_2}^{(k_1+k_2)}. \label{eq:scm-1} \end{align} Using \eqref{eq:scm-1} repeatedly, we can write \[ s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} = \iota(\tilde w) s_{nj_\ell}^{(k_1+k_2+\cdots + k_\ell)} = \iota(\tilde w \tilde s_{n-1,j_\ell}) \] for some $\tilde w \in G(d,d,n)$ with the condition $k_1+k_2+ \cdots +k_\ell \equiv 0 \, (\text{mod }d)$. From now on, the group $G(d,d,n)$ will be identified with the image of $\iota$ and the set $\mathcal W(d,d,n)$ will be the set of {\em canonical words} for $G(d,d,n)$. As in the case of $G(d,1,n)$, we write $\boldsymbol{w}=\bw_0 \bw' \in \mathcal W(d,d,n)$ as a product of the prefix $\bw_0$ and the suffix $\bw'$. \begin{remark} One can try to obtain canonical words for $G(d,d,n)$ without using an embedding into $G(d,1,n)$. However, we find that a natural set of {\em reduced} words thus obtained is not compatible with the packet decomposition defined in Section \ref{sec-gddn}. See Appendix for $G(3,3,3)$ as an example. \end{remark} \subsection{Canonical reduced words for $G(d,r,n)$} \label{sec-gr} The group $G(d,r,n)$ can be embedded into $G(d,1,n)$ as a subgroup of index $r$. Indeed, we define $\tau: G(d,r,n) \rightarrow G(d,1,n)$ by \[ \tau (\tilde s) = s_n^r, \quad \tau (\tilde s_n) = s_n^{d-1} s_{n-1} s_n \quad \text{ and } \quad \tau (\tilde s_i)=s_i \text{ for }1 \le i \le n-1 . \] Then one can check that $\tau$ is a well-defined group homomorphism. \begin{lemma} \label{lem-tilde-r} The homomorphism $\tau$ is an embedding and its image consists of the elements whose canonical words are in the set \[ \mathcal W(d,r,n) :=\{ s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} \in \mathcal W(d,1,n): k_1+k_2+ \cdots +k_\ell \equiv 0 \, (\text{mod }r) \}. \] \end{lemma} \begin{proof} Since $\tau (\tilde s_n)= s_{n,n-1}^{(d-1)} s_n$ and $\tau (\tilde s)= s_n^{r}$, it is clear that the image of $\tau$ is contained in $\mathcal W(d,r,n)$. One sees that the number of elements in $\mathcal W(d,r,n)$ is $n! \cdot d^{n}/r$ which is equal to the order of $G(d,r,n)$. Thus $\tau$ is an embedding. \end{proof} As with the map $\iota$ for $G(d,d,n)$, we have \begin{align} s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2} & = \tau(\tilde s_{n-1}\tilde s_{n})^{k_1} \, \tau(\tilde s_{n-1,j_1}) \, s_{nj_2}^{(k_1+k_2)}. \label{eq:scm-1-r} \end{align} Using \eqref{eq:scm-1-r} repeatedly, we can write \[ s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} = \tau(\tilde w) s_{nj_\ell}^{(k_1+k_2+\cdots + k_\ell)} = \tau(\tilde w \, \tilde s^k \, \tilde s_{n-1,j_\ell}) \] for some $\tilde w \in G( d,r ,n)$ and $k \in \mathbb Z_{\ge 0}$ with the condition $k_1+k_2+ \cdots +k_\ell \equiv 0 \, (\text{mod }r)$. From now on, the group $G(d,r,n)$ will be identified with the image of $\tau$ and an element of the set $\mathcal W(d,r,n)$ will be called a {\em canonical word}. As in the case of $G(d,1,n)$, a canonical word $\boldsymbol{w}$ will be written as $\boldsymbol{w} = \bw_0 \bw'$, where $\bw_0$ is the prefix and $\bw'$ the suffix of $\boldsymbol{w}$. \section{Fully commutative elements} \label{sec-fc} \subsection{Case $G(d,1,n)$} In this subsection, let $W \coloneqq G(d,1,n)$ be the complex reflection group defined in the previous section, with $S\coloneqq \{ s_1,\ldots,s_{n-1},s_n\} $ the set of generators and the defining relations in \eqref{eq:order1}, \eqref{eq:cm1}, \eqref{eq:b1} and \eqref{eq:l1}. We consider the free monoid $S^\star$ consisting of all finite length words $w=s_{i_1}s_{i_2}\cdots s_{i_\ell}$ with $s_{i_j} \in S$. The multiplication in $S^\star$ is defined by the concatenation \[(s_{i_1}\cdots s_{i_\ell})\cdot(s_{m_1}\cdots s_{m_t})= s_{i_1}\cdots s_{i_\ell}s_{m_1}\cdots s_{m_t}.\] We define a binary relation $\approx$ on $S^\star$ generated by the relations \begin{subequations} \begin{align} s_is_j&=s_js_i \quad &\mbox{for}\ j+1 < i \le n, \label{eq:cm-2} \allowdisplaybreaks \\ s_{i+1}s_is_{i+1}&=s_is_{i+1}s_i \quad &\mbox{for}\ 1\le i \le n-2, \label{eq:b-2} \allowdisplaybreaks \\ s^{k_1}_ns_{n-1}s^{k_2}_ns_{n-1}&=s_{n-1}s^{k_2}_ns_{n-1}s^{k_1}_n \quad &\mbox{for}\ 1\le k_1, k_2 <d. \label{eq:l-2} \end{align} \end{subequations} Define $R(w) \subset S^\star$ to be the set of reduced expressions for $w \in W$. Here, as usual, a reduced expression is a word of minimal length for $w$. \medskip The following proposition is a generalization of Matsumoto's Theorem and is crucial to define fully commutative elements. \begin{prop} \label{prop-rw} For any $w \in W$, the set $R(w)$ has exactly one equivalence class under $\approx$. \end{prop} \begin{proof} Suppose that $\boldsymbol{w} \in R(w)$. We will show that $\boldsymbol{w}$ is related to the canonical word in $\mathcal W(d,1,n)$ under $\approx$. We follow the proof of Proposition \ref{ccan}. Let $\ell$ be the number of occurrences of $s_n^k$ in $\boldsymbol{w}$ for various $k$'s, where $k$ is maximal for each occurrence. If $\ell=0$ then $\boldsymbol{w}$ is a reduced word of an element of the subgroup of type $A_{n-1}$ and one can use only the relations \eqref{eq:cm-2} and \eqref{eq:b-2} to obtain the canonical word by Matsumoto's Theorem. Assume $\ell >0$. Then the proof of Proposition \ref{ccan} shows that the relations \eqref{eq:cm-1} and \eqref{eq:t-1} are used to obtain the canonical word. As the relation \eqref{eq:cm-1} is nothing but \eqref{eq:cm-2}, we have only to check if the relation \eqref{eq:t-1} is derived from \eqref{eq:cm-2}, \eqref{eq:b-2} and \eqref{eq:l-2}. That is already done in Lemma \ref{lem-only}. \end{proof} \begin{ex} \label{ex-over} Consider $W=G(3,1,2) = <s_1, s_2 \,|\, s_2^3=s_1^2=1,\ s_2s_1s_2s_1=s_1s_2s_1s_2 >$. Then the two reduced expressions $s_2s_1s_2^2s_1$ and $s_1s_2^2s_1s_2$ represent the same element in $W$. One cannot be transformed into the other, using only the defining braid relations \eqref{eq:cm1}, \eqref{eq:b1} and \eqref{eq:l1}. However, under $\approx$, the two expressions are related through \eqref{eq:l-2}. \end{ex} We define a weaker binary relation $\sim$ on $S^\star$ generated by the relations \eqref{eq:cm-2} only. The equivalence classes under this relation are called {\it commutativity classes}. This gives the decomposition of $R(w)$ into commutativity classes: $$ R(w) = \mathcal C_1 \dot\cup \ \mathcal C_2 \cdots \dot\cup \ \mathcal C_\ell.$$ \begin{dfn} We say that $w \in W$ is {\em fully commutative} if $R(w)$ consists of a single commutativity class; i.e., any reduced word for $w$ can be obtained from any other solely by use of the braid relations that correspond to commuting generators. \end{dfn} Throughout this paper, a subword always means a subword with all its letters in consecutive positions. We obtain the following lemma which is an analogue of Proposition 2.1 in \cite{Stem96}. \begin{lemma} \label{lem-fc} An element $w\in W$ is fully commutative if and only if no member of $R(w)$ contains $s_{i+1}s_is_{i+1}$, $1 \le i \le n-2$, or $s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1}$, $1 \le k_1, k_2 <d$, as a subword. \end{lemma} \begin{proof} We will prove the contrapositive. If a word $\boldsymbol{w} \in R(w)$ has such a subword, the word $\boldsymbol{w}$ cannot be transformed into the canonical form only using commutative relations. Thus $w$ cannot be fully commutative. Conversely, if $w$ is not fully commutative, there must be a word $\boldsymbol{w} \in R(w)$ to which one of the relations in \eqref{eq:b-2} and \eqref{eq:l-2} is applied. Then we see that there exists a word $\boldsymbol{w}_1$ obtained from $\boldsymbol{w}$, which has $s_{i+1}s_is_{i+1}$, $1 \le i \le n-2$, or $s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1}$, $1 \le k_1, k_2 <d$, as a subword. \end{proof} The following proposition provides a practical criterion for full commutativity. \begin{prop} \label{pro-strong} An element $w\in W$ is fully commutative if and only if there exists $\boldsymbol{w} \in R(w)$ whose commutativity class has no member that has as a subword any of the following \begin{subequations} \begin{align} &s_{i+1}s_is_{i+1}, & &s_{i}s_{i+1}s_{i}& (1 \le i \le n-2), \label{rlis} \allowdisplaybreaks\\ &s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1},& & s_{n-1}s_n^{k_1}s_{n-1}s_n^{k_2} & (1 \le k_1, k_2 <d). \label{rlis-1} \end{align} \end{subequations} \end{prop} \begin{proof} Assume that $w$ is fully commutative. Consider $\boldsymbol{w} \in R(w)$. Then by Lemma \ref{lem-fc}, the word $\boldsymbol{w}$ does not contain $s_{i+1}s_is_{i+1}$, $1 \le i \le n-2$, or $s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1}$, $1 \le k_1, k_2 <d$, as a subword. Moreover, $\boldsymbol{w}$ cannot contain $s_is_{i+1}s_i$, $1 \le i \le n-2$, or $s_{n-1}s_n^{k_1}s_{n-1}s_n^{k_2}$, $1 \le k_1, k_2 <d$, either. If it does, we obtain $\boldsymbol{w}_1 \in R(w)$ from $\boldsymbol{w}$ by applying \eqref{eq:b-2} or \eqref{eq:l-2}, which contains $s_{i+1}s_is_{i+1}$, $1 \le i \le n-2$, or $s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1}$, $1 \le k_1, k_2 <d$. That is a contradiction. Thus any $\boldsymbol{w} \in R(w)$ does not contain any of the words in \eqref{rlis} and \eqref{rlis-1}. Conversely, assume that there exists $\boldsymbol{w} \in R(w)$ whose commutativity class $\mathcal C$ has no member that contains any of the words in \eqref{rlis} and \eqref{rlis-1}. Then neither of \eqref{eq:b-2} or \eqref{eq:l-2} can be applied to any of the member of $\mathcal C$, and we must have $\mathcal C =R(w)$. Thus, by definition, $w$ is fully commutative. \end{proof} As in Section \ref{first}, an expression $s_{i_1} \cdots s_{i_r} \in W$ will be identified with the word $[i_1, \dots, i_r]$. For $w \in W$, let $\boldsymbol{w} =[i_1, \dots, i_r] \in R(w)$. Define $\{i,i+1 \}$-sequence of $\boldsymbol{w}$ to be the sequence of $i$'s and $i+1$'s obtained by ignoring all entries of $\boldsymbol{w}$ different from $i$ and $i+1$. For example, the $\{1,2\}$-sequence of $\boldsymbol{w}=[1,2,1,3,4,3,2]$ is $[1,2,1,2]$. We have the following useful lemma due to Kleshchev and Ram. \begin{lemma}[\cite{KR}] \label{lem-kr} The reduced words $\boldsymbol{w}$ and $\boldsymbol v$ are in the same commutativity class if and only if their $\{i, i+1\}$-sequences coincide for each $i=1,2, \dots, n-1$. \end{lemma} Combining Proposition \ref{pro-strong} and Lemma \ref{lem-kr}, we can easily check whether an element $w$ is fully commutative or not. In Proposition \ref{ccan}, we prove that any element of $W$ can be written as \begin{equation} \label{eqn-canonical} s_{1i_1}s_{2i_2}\cdots s_{n-1i_{n-1}}s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell} \end{equation} where $1 \le i_p \leq p+1$ for $1 \le p \le n-1$, and $1\leq j_1<j_2<\cdots<j_\ell\leq n$ for $\ell\geq0$, and $1 \le k_p \le d-1$ for $1 \le p \le \ell$. Here we write \[ s^{(k)}_{nj} =s_n^k s_{n-1,j} =s_n^k s_{n-1}\ldots s_{j}\qquad \text{ for } k \ge 1\,\,\text{ and}\,\,\, j \le n. \] Recall that the part $ s^{(k_1)}_{nj_1}s^{(k_2)}_{nj_2}\cdots s^{(k_\ell)}_{n j_\ell}$ in the canonical form \eqref{eqn-canonical} is called its suffix. Now we prove the following proposition. \begin{prop} \label{every suffix} Every suffix is a fully commutative element. \end{prop} \begin{proof} By Proposition \ref{pro-strong}, we have only to show that no member in the commutative class of a suffix contains as a subword any of the words in \eqref{rlis} and \eqref{rlis-1}. By Lemma \ref{lem-kr}, we need only to investigate relative positions of a letter $p$ and their neighbors $p-1$ and $p+1$. Assume that $1 \le p \le n-2$. Every consecutive occurrence of $p$ in a suffix is of the form \begin{equation} \label{repeat} [p, p-1, \ldots j_p, n^{k_p}, \ldots, p+1, p, \ldots, j_{p+1}] \quad \text{ with } \ j_p < j_{p+1} < p+1.\end{equation} Thus the word $s_p s_{p+1}s_p$ or $s_{p+1} s_p s_{p+1}$ cannot appear in any suffix or in any member of its commutative class. Similarly, if $p=n-1$, then the word $s_{n-1}s_{n-2}s_{n-1}$ or $s_{n-2}s_{n-1}s_{n-2}$ cannot appear, as the only difference is that $p+1=n$ may be repeated in \eqref{repeat}. Finally, one sees that the words $s_{n-1}s_n^{k_1}s_{n-1}s_n^{k_2}$ or $s_n^{k_1}s_{n-1}s_n^{k_2}s_{n-1}$ cannot appear in any suffix or in its commutative class. Hence our assertion follows. \end{proof} \subsection{Cases $G(d,d,n)$ and $G(d,r,n)$} Recall that we fixed embeddings of $G(d,d,n)$ and $G(d,r,n)$ into $G(d,1,n)$ and that these groups are identified with the images of the embeddings. \begin{dfn} Let $W= G(d,d,n)$ or $G(d,r,n)$ be considered as a subgroup of $G(d,1,n)$ through the embedding $\iota$ or $\tau$ defined in Section \ref{first}, respectively. An element $w$ of $W$ is called {\em fully commutative} if $w$ is fully commutative as an element of $G(d,1,n)$. \end{dfn} As mentioned in the introduction, this definition of fully commutative elements coincides with the usual definition for the Coxeter groups of type $B_n$ when $d=2$, $r=1$. On the other hand, it is not compatible with the usual definition for the Coxeter groups of type $D_n$ when $d=2$, $r=2$. This will be made more clear in the following sections. \section{Packets in $G(d,1,n)$}\label{ch:D} \subsection{Collections} The words in $\mathcal {W}(d,1,n)$ which correspond to fully commutative elements will be called {\it fully commutative} and will be grouped based on their suffixes. \begin{dfn} A {\em collection} $\coll{n}{\bw'} \subset \mathcal {W}(d,1,n)$ labeled by a suffix $\bw'$ is defined to be the set of fully commutative words in $\mathcal {W}(d,1,n)$ whose suffix is $\bw'$. \end{dfn} As in the case of type $D$ studied in \cite{FL14}, some of the collections have the same number of elements as we will prove in the rest of this subsection. The proofs are essentially the same as in the case of type $D$, and we will only sketch the proofs, referring the reader to \cite{FL14} for more detailed proofs. \begin{lemma}\label{type2} For a fixed $k$, $0\leq k \leq n-2$, any collection labeled by a suffix of the form \begin{equation} \label{ff} s^{(t_1)}_{n k+1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell}\quad (\ell \ge 2) \end{equation} has the same set of prefixes. In particular, these collections have the same number of elements. \end{lemma} \begin{proof} Let $\boldsymbol{w}'$ be a suffix of the form \eqref{ff}. Then $\boldsymbol{w}'$ has the suffix $\boldsymbol{w}_1:=s^{(t_1)}_{n\, k+1} s_{n}$ as a subword, and any prefix appearing in the collection $\coll{n}{\boldsymbol{w}'}$ also appears in $\coll{n}{\boldsymbol{w}_1}$. Conversely, assume that $\bw_0$ is a prefix of a fully commutative word appearing in the collection $\coll{n}{\boldsymbol{w}_1}$. Since the prefix and suffix of a fully commutative word are individually fully commutative, we only assume that there is some letter $r \le n-1$ which appears in both $\bw_0$ and $\bw'$. From the condition $$1\leq j_1<j_2<\cdots<j_\ell\leq n$$ on the suffix $\bw'$, we see that the letter $r$ also appears in $\boldsymbol{w}_1$. Then the full commutativity of $\boldsymbol{w}_0\boldsymbol{w}_1$ implies that of $\bw_0 \bw'$, and $\bw_0$ is a prefix of $\bw'$. \end{proof} \begin{prop}\label{type size} For $1 \leq k\le n-2$, the collection labeled by the suffix $s^{(t')}_{nk}$, $1 \le t' <d$, has the same number of elements as any of the collections labeled by the suffix of the form $$s^{(t_1)}_{n k+1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell}\quad (\ell \ge 2). $$ \end{prop} \begin{proof} Let $\boldsymbol{w}_1= s^{(t_1)}_{n \, k+1}s_{n}$ and $\boldsymbol{w}_2=s^{(t')}_{nk}$. By Lemma \ref{type2}, it is enough to establish a bijection between the collections $\coll{n}{\boldsymbol{w}_1}$ and $\coll{n}{\boldsymbol{w}_2}$. We define a map $\sigma: \coll{n}{\boldsymbol{w}_2} \to \coll{n}{\boldsymbol{w}_1}$ as follows. Suppose that $ \bw_0$ is the prefix of the word $\boldsymbol{w}=\bw_0 \boldsymbol{w}_2=\bw_0 [n^{t'}, n-1, \dots , k] \in \coll{n}{\boldsymbol{w}_2}$, and let $r$ be the last letter of $\bw_0$. Then by the condition of full commutativity, we must have $r<k$ or $r=n-1$. If $r <k$ we simply define $\sigma(\boldsymbol{w})=\bw_0 \boldsymbol{w}_1$. If $r=n-1$, we take $m\geq k$ to be the smallest letter such that the string $[m, m+1, \hdots, n-1]$ is a right factor of $\bw_0$. Then we have $\boldsymbol{w}=s_{1i_1}\cdots s_{m-1i_{m-1}} s_ms_{m+1} \cdots s_{n-1} \boldsymbol{w}_2$, and we define $$ \sigma(\boldsymbol{w}) = s_{1i_1}\cdots s_{m-1i_{m-1}}s_{mk}\boldsymbol{w}_1. $$ Then we have $\sigma(\coll{n}{\boldsymbol{w}_2})\subset \coll{n}{\boldsymbol{w}_1}$. Now we define a map $\eta:\coll{n}{\boldsymbol{w}_1} \to \coll{n}{\boldsymbol{w}_2}$. Suppose that $\boldsymbol{w} = \bw_0\boldsymbol{w}_1=\bw_0[n^{t_1}, n-1, \hdots, k+1, n] \in \coll{n}{\boldsymbol{w}_1}$, and let $r$ be the last letter of $\bw_0$. Then by the condition of full commutativity, we must have $1\le r \le k$. If $r<k$, then we define $\eta(\bw_0 \boldsymbol{w}_1)=\bw_0 \boldsymbol{w}_2$. If $r=k$, then the final non-empty segment of the prefix is $s_{mk}$ for some $m$ with $k \leq m \leq n-1$. We define \[\eta(\boldsymbol{w}) =\eta( s_{1i_1}\cdots s_{m-1i_{m-1}}s_{mk}\boldsymbol{w}_1)= s_{1i_1}\cdots s_{m-1i_{m-1}}s_{m}s_{m+1} \cdots s_{n-1} \boldsymbol{w}_2. \] One sees that $\eta(\coll{n}{\boldsymbol{w}_1}) \subset \coll{n}{\boldsymbol{w}_2}$, and that $\eta$ is both a left and a right inverse of $\sigma$. \end{proof} \begin{lemma}\label{type size2} The collections labeled by the suffixes $s^{t}_{n}$ and $s^{(t)}_{n, n-1}$ $(1 \le t <d)$ all have the same set of prefixes. \end{lemma} \begin{proof} Assume that $\bw_0$ is a prefix of $s^{t}_n$ or $s^{(t)}_{n, n-1}$, i.e., $\bw_0 s^{t}_n$ or $\bw_0 s^{(t)}_{n, n-1}$ is fully commutative. Then replacing the suffix with any of the suffixes $s^{t'}_{n}$ and $s^{(t')}_{n, n-1}$ $(1 \le t' <d)$ does not affect full commutativity. \end{proof} \subsection{Packets} \label{sec-pac} The results in the previous subsection lead us to the following definition. \begin{dfn} \label{dfn-lp} For $0 \le k \le n$, we define the {\em $(n,k)$-packet} of collections: \begin{itemize} \item The $(n,0)$-packet is the set of collections labeled by suffixes of the form \[s^{(t_1)}_{n1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell}\quad (\ell \ge 2).\] \item The $(n,k)$-packet, $1\le k \le n-2$, is the set of collections labeled by $s^{(t)}_{nk}$ or suffixes of the form $s^{(t_1)}_{n\, k+1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell}\quad (\ell \ge 2)$. \item The $(n,n-1)$-packet contains the collections labeled by $s^{(t)}_n=[n^t]$ or $s^{(t)}_{n,n-1}=[n^t,n-1]$. \item The $(n,n)$-packet contains only the collection labeled by the empty suffix $[~]$. \end{itemize} We will denote the $(n,k)$-packet by $\mathcal{P}(n,k)$. As an example, Table~\ref{G213-packets} shows all of the packets in the case of $G(2,1,3)$ (or $B_3$). \end{dfn} \begin{table} \pgfdeclarelayer{background} \pgfdeclarelayer{foreground} \pgfsetlayers{background,main,foreground} \tikzstyle{coll} = [draw, very thick, fill=white, rectangle, rounded corners, inner sep=18pt, inner ysep=15pt, minimum height=2in] \tikzstyle{fancytitle} =[fill=black, text=white] \[ \begin{tikzpicture}[font=\footnotesize] \node[coll,minimum height=.6cm, inner sep = 2mm] (C4213){ \begin{minipage}{.2\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2,1,3]}$}\\[2mm] $[3,2,1,3]$ \end{center} \end{minipage} }; \node[coll, minimum height=.6cm, right of=C4213, xshift=3cm, inner sep = 2mm] (C42132){ \begin{minipage}{.2\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2,1,3,2]}$}\\[2mm] $[3,2,1,3,2]$ \end{center} \end{minipage} }; \node[coll, minimum height=.6cm, right of=C42132, xshift=3cm, inner sep = 2mm] (C421324){ \begin{minipage}{.2\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2,1,3,2,3]}$}\\[2mm] $[3,2,1,3,2,3]$ \end{center} \end{minipage} }; \node[coll, below of=C4213, yshift=-1.8cm, xshift=.85cm, minimum height=1cm, inner sep = 2mm] (C421){ \begin{minipage}{.35\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2,1]}$}\\[2mm] \begin{multicols}{3} $[3,2,1]$\\[2pt] $[2,3,2,1]$\\[2pt] \columnbreak $[1,2,3,2,1]$\\[2pt] \end{multicols} \end{center} \end{minipage} }; \node[coll, right of=C421, xshift=5.5cm, minimum height=1cm, inner sep=2mm] (C423){ \begin{minipage}{.35\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2,3]}$}\\[2mm] \begin{multicols}{3} $[3,2,3]$\\[2pt] $[1,3,2,3]$\\[2pt] $[2,1,3,2,3]$\\[2pt] \end{multicols} \end{center} \end{minipage} }; \node[coll, below of=C42132, yshift=-4.8cm, minimum height=1cm, inner sep=3mm] (C42){ \begin{minipage}{.65\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3,2]}$}\\[2mm] \begin{multicols}{5} $[3,2]$\\[2pt] $[2,3,2]$\\[2pt] $[1,3,2]$\\[2pt] $[2,1,3,2]$\\[2pt] $[1,2,3,2]$\\[2pt] \end{multicols} \end{center} \end{minipage} }; \node[coll, below of=C42, yshift=-1cm, minimum height=1cm, inner sep=3mm] (C4){ \begin{minipage}{.65\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[3]}$}\\[2mm] \begin{multicols}{5} $[3]$\\[2pt] $[2,3]$\\[2pt] $[1,3]$\\[2pt] $[2,1,3]$\\[2pt] $[1,2,3]$\\[2pt] \end{multicols} \end{center} \end{minipage} }; \node[coll, below of=C4, yshift=-2cm, minimum height=1cm, inner sep=3mm] (C){ \begin{minipage}{.65\textwidth}\begin{center} \underline{$\mathbf c^{3}_{[~]}$}\\[2mm] \begin{multicols}{5} $[~]$\\[2pt] $[2]$\\[2pt] $[1]$\\[2pt] $[2,1]$\\[2pt] $[1,2]$\\[2pt] \end{multicols} \end{center} \end{minipage} }; \begin{pgfonlayer}{background} \path (C4213.north -| C.west)+(-.5cm,.4cm) node (ul1) {}; \path (C421324.south -| C.east)+(.5cm,-.3cm) node (lr1) {}; \draw[very thick, rounded corners, fill=black!20] (ul1) rectangle (lr1); \node[fancytitle, xshift=.5cm, anchor=west] at (ul1) (P1title) {$\mathcal P(3,0)$}; \path (C421.north -| C.west)+(-1cm,.4cm)node (ul2) {}; \path (C423.south -| C.east)+(1.2cm,-.3cm) node (lr2) {}; \draw[very thick, rounded corners, fill=black!20] (ul2) rectangle (lr2); \node[fancytitle, xshift=.5cm, anchor=west] at (ul2) (P2title) {$\mathcal P(3,1)$}; \path (C42.north -| C.west)+(-.5cm,.4cm)node (ul3) {}; \path (C4.south -| C.east)+(.5cm,-.3cm) node (lr3) {}; \draw[very thick, rounded corners, fill=black!20] (ul3) rectangle (lr3); \node[fancytitle, xshift=.5cm, anchor=west] at (ul3) (P3title) {$\mathcal P(3,2)$}; \path (C.north west)+(-.5cm,.4cm)node (ul5) {}; \path (C.south east)+(.5cm,-.3cm) node (lr5) {}; \draw[very thick, rounded corners, fill=black!20] (ul5) rectangle (lr5); \node[fancytitle, xshift=.5cm, anchor=west] at (ul5) (P5title) {$\mathcal P(3,3)$}; \end{pgfonlayer} \end{tikzpicture} \] \caption{The packets of $G(2,1,3)$}\label{G213-packets} \end{table} We record the main property of a packet as a corollary. \begin{cor} \label{num} The collections in a fixed packet $\mathcal{P}(n,k)$ have the same number of elements. \end{cor} \begin{proof} The assertion follows from Lemma \ref{type2}, Proposition \ref{type size} and Lemma \ref{type size2}. \end{proof} We count the number of collections in a packet and obtain: \begin{prop} \label{prop-d-1} The size of the packet $\mathcal{P}(n,k)$ of $G(d,1,n)$ is $$ \left | \mathcal{P}(n,k) \right| = \left\{\begin{array}{cl} (d^{n-1}-1)(d-1) & \textrm{ if } k = 0, \\ d^{n-k-1}(d-1) & \textrm{ if } 1\le k \le n-2, \\ 2(d-1) & \textrm{ if } k= n-1, \\ 1 & \textrm{ if } k= n. \\ \end{array} \right. $$ Hence we have $ \sum_{k=0}^n \left | \mathcal{P}(n,k) \right| = d^{n}$. \end{prop} \begin{proof} Assume that $k=0$. We consider the expression \[s^{(k_1)}_{n1}s^{(k_2)}_{n2}s^{(k_3)}_{n3}\cdots s^{(k_{n-1})}_{n,n-1} s^{k_n}_{n}.\] The conditions for $(n,0)$-packet allows $k_1$ to vary from $1$ to $d-1$ and $k_i$ $(2 \le i \le n)$ from $0$ to $d$ except the case $k_2=k_3=\cdots =k_n=0$. Thus the total number of collections in $\mathcal{P}(n,0)$ is $(d-1) (d^{n-1}-1)$. Similar arguments can be applied to the other packets $\mathcal{P}(n,k)$ for $1 \le k \le n-1$, and it is clear that there is only one collection in $\mathcal{P}(n,n)$. The total sum can be checked straightforwardly. \end{proof} \subsection{Catalan's Triangle} In this subsection, we will compute the size of a collection in a given packet, and thereby classify and enumerate all the fully commutative elements. As in the case of type $D$ studied in \cite{FL14}, the sizes of collections are given by {\it Catalan triangle numbers} $C(n,k)$ which are defined by \begin{equation} \label{cat form} C(n,k) = \frac{(n+k)!(n-k+1)}{k!(n+1)!} \end{equation} for $n \geq 0$ and $0 \leq k \leq n$. The numbers form the {\em Catalan Triangle} in Table \ref{CT} to satisfy the rule: \begin{equation}\label{sum rule} C(n,k) = C(n,k-1)+C(n-1,k), \end{equation} where all entries outside of the range $0\leq k \leq n$ are considered to be $0$. One also sees that \begin{equation} \label{ccc} C_n=C(n, n-1)=C(n,n) , \end{equation} where $C_n$ is the $n^{\textrm{th}}$ Catalan number. \begin{table}[h] \[\begin{array}{ccccccccc} 1\\ 1 & 1\\ 1 & 2 & 2\\ 1 & 3 & 5 & 5\\ 1 & 4 & 9 & 14 & 14\\ 1 & 5 & 14 & 28 & 42 & 42\\ 1 & 6 & 20 & 48 & 90 & 132 & 132\\ 1 & 7 & 27 & 75 & 165 & 297 & 429 & 429\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots& \ddots\\ \end{array} \] \caption{Catalan Triangle} \label{CT} \end{table} \begin{lemma} \label{diag} For $n\geq 3$, the size of each collection in the packets $\mathcal{P}(n,n)$ and $\mathcal{P}(n,n-1)$ is equal to the Catalan number $C_n$. \end{lemma} \begin{proof} The proof of Lemma \ref{type size2} shows that prefixes in a collection belonging to one of the packets $\mathcal{P}(n,n)$ and $\mathcal{P}(n,n-1)$ are exactly fully commutative words of type $A_{n-1}$, the total number of which is well known to be the Catalan number $C_n$. \end{proof} The following theorem is an extension of Theorem 2.12 in \cite{FL14} from the case of $D_n$ to $G(d,1,n)$. The proof is similar to that of type $D_n$, and we refer the reader to \cite{FL14} for more details. \begin{thm} \label{main D} Assume that $n\ge 3$ and $0\le k \le n$. Then any collection in the packet $\mathcal{P}(n,k)$ contains exactly $C(n,k)$ elements. \end{thm} \begin{proof} We have already proved the cases when $k=n$ and $n-1$ in Lemma~\ref{diag}. Now consider the packet $\mathcal{P}(n,0)$, which consists of the collections labeled by the suffixes $$s^{(t_1)}_{n1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell} \ \ (\ell \ge 2).$$ By Lemma \ref{type2}, it is enough to consider the collection $\bf{c}$ labeled by $s^{(t_1)}_{n1}s_{n}$. If a word $\boldsymbol{w} \in \bf{c}$ contains a non-empty prefix $\bw_0$ ending with the letter $r$ for $1\leq r \leq n-1$, then the word $\boldsymbol{w}$ contains, as a right factor, $[ r, n, n-1,\dots, r+1, r, \dots, 1, n]$ which contradicts full commutativity. Thus the collection $\bf{c}$, and hence every collection in $\mathcal{P}(n,0)$, contains only the suffix itself. Thus we have $C(n,0)=1$. For the other cases, we will combinatorially (or bijectively) realize the identity \eqref{sum rule}. One can see that any collection in the packet $\mathcal{P}(3,k)$ contains exactly $C(3,k)$ elements for $0 \le k \le 3$. The case $G(2,1,3)$ is given in Table \ref{G213-packets} and the case $G(3,1,3)$ in the second example of Section \ref{sec:ex}. Thus the assertion of the theorem is true for $n=3$, and we will proceed by induction with the base cases $k=0$ or $n=3$. Further, by Corollary \ref{num}, it is enough to consider a single collection in each of the packets. Assume that $n \ge 4$ and $1 \leq k \leq n-2$. We define \begin{align*} & \boldsymbol{w}_1= s_{nk}s_{n}=[n, n-1, \dots, k, n], \quad \boldsymbol{w}_2=s_{nk}=[n, n-1, \dots , k], \\ & \boldsymbol{w}_3= [n-1, n-2, \dots , k] . \end{align*} Then $\coll{n}{\boldsymbol{w}_1} \in \mathcal{P}(n, k-1)$, $\coll{n}{\boldsymbol{w}_2} \in \mathcal{P}(n, k)$ and $\coll{n-1}{\boldsymbol{w}_3} \in \mathcal{P}(n-1, k)$. We will give an explicit bijection from $\coll{n}{\boldsymbol{w}_1}\cup\coll{n-1}{\boldsymbol{w}_3}$ to $\coll{n}{\boldsymbol{w}_2}$. Define a map $\varphi_1: \coll{n}{\boldsymbol{w}_1} \to \coll{n}{\boldsymbol{w}_2}$ by $$ \varphi_1(\bw_0 \boldsymbol{w}_1) = \varphi(\bw_0 [n, n-1, \dots , k, n] )= \bw_0 \boldsymbol{w}_2 = \bw_0 [n, n-1, \dots , k] , $$ and another map $\varphi_2: \coll{n-1}{\boldsymbol{w}_3} \to \coll{n}{\boldsymbol{w}_2}$ by $$\varphi_2(\bw_0\boldsymbol{w}_3) = \bw_0 s_{n-1} \boldsymbol{w}_2= \bw_0 s_{n-1} [ n, n-1, n-2, \dots, k].$$ Then it can be checked that the maps $\varphi_1$ and $\varphi_2$ are well defined ant that the images are disjoint. Finally, combining $\varphi_1$ and $\varphi_2$, we define a map $\varphi: \coll{n}{\boldsymbol{w}_1}\cup\coll{n-1}{\boldsymbol{w}_3} \to \coll{n}{\boldsymbol{w}_2}$, i.e. the restriction of $\varphi$ to $\coll{n}{\boldsymbol{w}_1}$ is $\varphi_1$ and the restriction of $\varphi$ to $\coll{n-1}{\boldsymbol{w}_3}$ is $\varphi_2$. Conversely, define the map $\rho: \coll{n}{\boldsymbol{w}_2} \to \coll{n}{\boldsymbol{w}_1}\cup\coll{n-1}{\boldsymbol{w}_3}$ to be given by the rule: $$ \rho(\bw_0\boldsymbol{w}_2) = \rho(\bw_0 [n, n-1, \dots , k]) = \left\{\begin{array}{ll} \bw_0 [ n-2, \dots, k] \in \coll{n-1}{\boldsymbol{w}_3}, & \textrm{ if } \bw_0 \textrm{ ends with } n-1, \\ \bw_0 \boldsymbol{w}_1 \in \coll{n}{\boldsymbol{w}_1}, & \textrm{ otherwise.} \end{array}\right. $$ One can check that the map $\rho$ is well defined. Now one can see that $\rho$ is the two-sided inverse of $\varphi$. In particular, if we restrict $\rho$ to the words whose prefixes end with $n-1$, then we obtain the inverse for $\varphi_2$, while if we restrict to the prefixes not ending in $n-1$, we have the inverse for $\varphi_1$. This establishes, for each $k$, \[ |\coll{n}{\boldsymbol{w}_2}| = |\coll{n}{\boldsymbol{w}_1}|+|\coll{n-1}{\boldsymbol{w}_3}| ,\] which is the same identity as \eqref{sum rule} inductively. This proves that $|\coll{n}{\boldsymbol{w}_2}|=C(n,k)$ as desired. \end{proof} Let us recall the Catalan triangle polynomial introduced in \cite[Definition 2.11]{LO16C}: \begin{dfn} For $0 \le k \le n$, we define the {\em Catalan triangle polynomial} $\mathfrak{F}_{n,k}(x)$ by \begin{align} \label{eq: n,k Cat tr pol2} \mathfrak{F}_{n,k}(x) & = \sum_{s=0}^{k} C(n,s)x^{k-s}. \end{align} \end{dfn} We need some special values of the polynomial $\mathfrak{F}_{n,k}(x)$. \begin{lemma}\cite[Corollary 2.9]{LO16C} For $0 \le k <n$, we have \begin{equation} \label{eq-fnk2} \mathfrak{F}_{n,k}(2) = \matr{n+1+k}{k}. \end{equation} \end{lemma} In light of the above lemma, the numbers $\mathfrak{F}_{n,k}(d)$, $d >2$, can be considered as a certain generalization of binomial coefficients. Interestingly, we need $\mathfrak{F}_{n,n-2}(d)$ to write a formula for the number of fully commutative elements in $G(d,1,n)$ in the following corollary. This is also the case for $G(d,r,n)$. See Corollaries \ref{cor-dd} and \ref{cor-dr}. \begin{cor} \label{cor-end} For $n\ge 3$, the number of fully commutative elements of $G(d,1,n)$ is equal to \begin{equation} \label{eqn-end} \sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = d(d-1)\mathfrak{F}_{n,n-2}(d) +(2d-1)C_n -(d-1).\end{equation} \end{cor} In particular, when $d=2$, we recover the result of \cite{Stem96} on $B_n$-type using \eqref{eq-fnk2}: $$\sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = 2\matr{2n-1}{n-2}+ 3C_n -1 = (n+2) C_n-1. $$ \begin{proof} The assertion follows from Proposition \ref{prop-d-1} and the definitions. \end{proof} \section{Packets in $G(d,r,n)$} \label{sec-gddn} In this section, we assume that $ 1\le r \le d$ and $r|d$. Thus the family of groups $G(d,r,n)$ includes the case $G(d,d,n)$. The results will be presented for $G(d,d,n)$ first for simplicity, and then will be generalized to the case $G(d,r,n)$. \medskip Recall that we consider $G(d,r,n)$ as a subgroups of $G(d,1,n)$ through the embedding $\tau$, and that Lemma \ref{lem-tilde-r} describes the elements of $G(d,r,n)$. We define the {\em packets of $G(d,r,n)$} to be those of $G(d,1,n)$ which are contained in $G(d,r,n)$. \begin{prop} \label{prop-d-d} The size of the packet $\mathcal{P}(n,k)$ of $G(d,d,n)$ is $$ \left | \mathcal{P}(n,k) \right| = \left\{\begin{array}{cl} d^{n-k-2}(d-1) & \textrm{ if } 0\le k \le n-2, \\ 1 & \textrm{ if } k= n. \\ \end{array} \right. $$ Hence we have $ \sum_{k=0}^n \left | \mathcal{P}(n,k) \right| = d^{n-1}$. \end{prop} \begin{proof} We use Lemma \ref{lem-tilde} to determine which packets of $G(d,1,n)$ in Definition \ref{dfn-lp} are contained in $G(d,d,n)$. Clearly, the $(n,n-1)$-packet cannot occur in $G(d,d,n)$, and there is still only one collection in the $(n,n)$-packet. For $0 \le k \le n-2$, the suffixes $s^{(t)}_{nk}$ cannot appear in $G(d,d,n)$ and the number of suffixes of the form $s^{(t_1)}_{n\, k+1}s^{(t_2)}_{nj_2}s^{(t_3)}_{nj_3}s^{(t_4)}_{nj_4}\cdots s^{(t_\ell)}_{nj_\ell}$ $(\ell \ge 2)$ that appear in $G(d,d,n)$ is $d^{n-k-2}(d-1)$. \end{proof} More generally, we have the following. \begin{prop} \label{prop-d-r} The size of the packet $\mathcal{P}(n,k)$ of $G(d,r,n)$ is $$ \left | \mathcal{P}(n,k) \right| = \left\{\begin{array}{cl} \dfrac{d^{n-1}}{r} (d-1) - \left(\dfrac{d}{r}-1 \right) & \textrm{ if } k=0, \\ \dfrac{d^{n-k-1}}{r} (d-1) & \textrm{ if } 1\le k \le n-2, \\ 2 \left(\dfrac{d}{r}-1 \right) & \textrm{ if } k= n-1, \\ 1 & \textrm{ if } k= n. \\ \end{array} \right. $$ Hence we have $ \sum_{k=0}^n \left | \mathcal{P}(n,k) \right| = d^n/r$. \end{prop} \begin{proof} We use Lemma \ref{lem-tilde-r} to determine which packets of $G(d,1,n)$ in Definition \ref{dfn-lp} are contained in $G(d,r,n)$. Clearly, there is still only one collection in the $(n,n)$-packet. For the $(n,n-1)$-packet, each of $s^{(t)}_n$ and $s^{(t)}_{n,n-1}$ has $\frac d r-1$ possibilities to satisfy the conditions $t \equiv 0\ (\mathrm{mod}\ r)$ and $1\le t <d$. As for the $(n,0)$-packet, we consider the expression \[s^{(k_1)}_{n1}s^{(k_2)}_{n2}s^{(k_3)}_{n3}\cdots s^{(k_{n-1})}_{n,n-1} s^{k_n}_{n}.\] Then $k_1$ varies from $1$ to $d-1$ and $k_i$ $(2 \le i \le n-1)$ from $0$ to $d$ and then $k_n$ has $d/r$ choices, except the cases that $k_1 \equiv 0$ $(\mathrm{mod}\ r)$ and $k_2=k_3=\cdots =k_n=0$. Thus the total number of collections in $\mathcal{P}(n,0)$ is $\dfrac{d^{n-1}}{r} (d-1) - \left(\dfrac{d}{r}-1 \right)$. The sizes of $(n,k)$-packets for $1 \le k \le n-2$ can be checked similarly. \end{proof} \begin{cor} \label{cor-dd} The number of fully commutative elements in the group $G(d,d,n)$ is equal to \begin{equation} \label{eqn-end2} \sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = (d-1)\mathfrak{F}_{n,n-2}(d)+ C_n.\end{equation} \end{cor} In particular, when $d=2$, we obtain from \eqref{eq-fnk2} \begin{equation} \label{eq:above} \sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = \matr{2n-1}{n-2} + C_n = \dfrac{n-1}{2} C_n + C_n = \dfrac{n+1}{2} C_n. \end{equation} \begin{remark} The number $\frac{n+1}{2} C_n$ in \eqref{eq:above} is different from the number $\frac{n+3}{2} C_{n}-1$ of fully commutative elements of type $D_n$ considered in \cite{Stem98,FL14} without embedding $\iota$. Thus our definition of fully commutative elements of $G(2,2,n)$ is not equivalent to that of $D_n$ in \cite{Stem98,FL14}. See the first example in Section \ref{sec:ex} for more details. \end{remark} \begin{remark} Let $c(x)=\dfrac {1 -\sqrt{1-4x}}{2x}$ be the generating function of the Catalan numbers $C_n$. The generating function of the numbers of fully commutative elements in $G(d,d,n)$ is given by \[ \frac{1-(d-1)\, x \, c(x)}{1-d\, x \, c(x)} .\] \end{remark} \begin{cor} \label{cor-dr} The number of fully commutative elements in the group $G(d,r,n)$ is equal to \begin{equation} \label{eqn-endr} \sum_{k=0}^n C(n,k) \left | \mathcal{P}(n, k) \right | = \dfrac{d(d-1)}{r} \mathfrak{F}_{n,n-2}(d) +\left( \dfrac{2d}{r} -1 \right)C_n - \left (\dfrac d r -1 \right ). \end{equation} \end{cor} \section{Examples} \label{sec:ex} (1) The group $G(2,2,n)$ is isomorphic to the Coxeter group of type $D_n$ which has its own definition of fully commutative elements without invoking the embedding $\iota$ into $G(2,1,n)$. For example, the element $\tilde s_3 \tilde s_4 \tilde s_2 \tilde s_1 \in G(2,2,4)$ is fully commutative before being embedded into $G(2,1,4)$, but we have \[ \iota ( \tilde s_3 \tilde s_4 \tilde s_2 \tilde s_1 ) = s_3 s_4 s_3 s_4 s_2 s_1 , \] which is not fully commutative in $G(2,1,4)$. The number of fully commutative elements of $D_4$ (without embedding) is 48, whereas the number of fully commutative elements of $G(2,2,4)$ (after being embedded) is 35. (2) The group $G(3,1,3)$ has 59 fully commutative elements. We list them below in packets and collections. \begin{center} \begin{tabular}{|c|c|c|} \hline Packets & \text{ Collections} & $C(3,k)$\\ \hline $\mathcal P(3,0)$ & $ \begin{array}{llll} \mathbf{c}_{[3,2,1,3]}, & \mathbf{c}_{[3,2,1,3^2]}, & \mathbf{c}_{[3,2,1,3,2]}, & \mathbf{c}_{[3,2,1,3,2,3]}, \\ \mathbf{c}_{[3,2,1,3,2,3^2]}, & \mathbf{c}_{[3,2,1,3^2,2]}, & \mathbf{c}_{[3,2,1,3^2,2,3]}, & \mathbf{c}_{[3,2,1,3^2,2,3^2]},\\ \mathbf{c}_{[3^2,2,1,3]}, & \mathbf{c}_{[3^2,2,1,3^2]}, & \mathbf{c}_{[3^2,2,1,3,2]}, & \mathbf{c}_{[3^2,2,1,3,2,3]},\\ \mathbf{c}_{[3^2,2,1,3,2,3^2]}, & \mathbf{c}_{[3^2,2,1,3^2,2]}, & \mathbf{c}_{[3,2,1,3^2,2,3]}, & \mathbf{c}_{[3,2,1,3^2,2,3^2]} \end{array}$ & 1\\ \hline $\mathcal P(3,1)$ & $ \begin{array}{rl} \mathbf{c}_{[3,2,3]} \hskip - 0.2 cm & = \{{ s_3s_2s_3},{ s_1 s_3s_2s_3},{ s_2s_1 s_3s_2s_3}\} \\ \mathbf{c}_{[3,2,3^2]} \hskip - 0.2 cm &=\{{ s_3s_2s_3^2},{ s_1 s_3s_2s_3^2},{ s_2s_1 s_3s_2s_3^2}\} \\ \mathbf{c}_{[3^2,2,3]} \hskip - 0.2 cm &=\{{ s_3^2s_2s_3},{ s_1 s_3^2s_2s_3},{ s_2s_1 s_3^2s_2s_3}\} \\ \mathbf{c}_{[3^2,2,3^2]} \hskip - 0.2 cm &=\{{ s_3^2s_2s_3^2},{ s_1 s_3^2s_2s_3^2},{ s_2s_1 s_3^2s_2s_3^2}\} \\ \mathbf{c}_{[3,2,1]} \hskip - 0.2 cm &=\{{ s_3s_2s_1},{ s_2 s_3s_2s_1},{ s_1s_2 s_3s_2s_1}\} \\ \mathbf{c}_{[3^2,2,1]}&=\{{ s_3^2s_2s_1},{ s_2 s_3^2s_2s_1},{ s_1s_2 s_3^2s_2s_1}\} \end{array}$ & 3 \\ \hline $\mathcal P(3,2)$ & $ \begin{array}{rl} \mathbf{c}_{[3]} \hskip - 0.2 cm & =\{{ s_3},{ s_1 s_3},{ s_2 s_3},s_1s_2{ s_3},s_2s_1{ s_3} \} \\ \mathbf{c}_{[3^2]} \hskip - 0.2 cm & =\{{ s_3^2},{ s_1 s_3^2},{ s_2 s_3^2},s_1s_2{ s_3^2},s_2s_1{ s_3^2} \}\\ \mathbf{c}_{[3,2]} \hskip - 0.2 cm & =\{{ s_3s_2},{ s_1 s_3s_2},{ s_2 s_3s_2},s_1s_2{ s_3s_2},s_2s_1{ s_3s_2} \}\\ \mathbf{c}_{[3^2,2]} \hskip - 0.2 cm & =\{{ s_3^2s_2},{ s_1 s_3^2s_2},{ s_2 s_3^2s_2},s_1s_2{ s_3^2s_2},s_2s_1{ s_3^2s_2} \} \end{array}$ & 5 \\ \hline $\mathcal P(3,3)$ & $ \mathbf{c}_{[]}=\{{ [~]},{ s_1},{ s_2},{ s_1s_2}, { s_2s_1} \}$ &5 \\ \hline \end{tabular} \end{center} \medskip (3) The set of reduced words for the group $G(3,3,3)$ is given in Appendix. To the canonical words, one applies the embedding $\iota: G(3,3,3) \hookrightarrow G(3,1,3)$ and sees that the group has 17 fully commutative elements. We list them all below, where we write $[i_1i_2 \dots i_k]$ for $\tilde s_{i_1}\tilde s_{i_2} \cdots \tilde s_{i_k} \in G(3,3,3)$ and $\langle i_1i_2 \dots i_k \rangle$ for $s_{i_1}s_{i_2} \cdots s_{i_k} \in G(3,1,3)$. \begin{align*} [ ] & \longmapsto \langle \rangle, & [1] & \longmapsto \langle 1 \rangle, & [2] & \longmapsto \langle 2 \rangle, \\ [3] & \longmapsto \langle 3^223 \rangle,& [12] & \longmapsto \langle 12 \rangle , & [13] & \longmapsto \langle 13^223 \rangle , \\ [21] &\longmapsto \langle 21 \rangle , & [31] & \longmapsto \langle 3^2231 \rangle= \langle 3^2213 \rangle , & [213] & \longmapsto \langle 213^223 \rangle, \\ [232] &\longmapsto \langle 23^2232 \rangle = \langle 323^2 \rangle , & [312] &\longmapsto \langle 3^22132 \rangle, & [1232] & \longmapsto \langle 123^2232 \rangle = \langle 1323^2 \rangle, \\ [2321] & \longmapsto \langle 3213^2 \rangle, & [12132] & \longmapsto \langle 21 32 3^2 \rangle, & [13123] &\longmapsto \langle 3^2213^223^2 \rangle, \\ [23121] &\longmapsto \langle 3213^22 \rangle, & [23213] &\longmapsto \langle 321323 \rangle. \end{align*} The $(3,0)$-packet has $6$ collections, each of which has only one element: \[ \mathcal{P}(3,0) = \left \{ \{\langle 3^2213 \rangle \}, \{ \langle 3^22132 \rangle \}, \{\langle 3213^2 \rangle \}, \{\langle 3^2213^223^2 \rangle\} ,\{ \langle 3213^22 \rangle \}, \{ \langle 321323 \rangle \} \right \}. \] There are 2 collections in the $(3,1)$-packet, each of which has 3 elements: \[ \mathcal{P}(3,1) = \left \{ \{ \langle 3^223 \rangle, \langle 13^223 \rangle , \langle 213^223 \rangle\}, \{ \langle 323^2 \rangle , \langle 1323^2 \rangle, \langle 21 32 3^2 \rangle \} \right \}. \] Recall that there is no $(3,2)$-packet. There is only one collection in the $(3,3)$-packet and it has 5 elements: \[ \mathcal{P}(3,3) = \left \{ \{ \langle \rangle, \langle 1 \rangle, \langle 2 \rangle, \langle 12 \rangle , \langle 21 \rangle \} \right \}. \] All together we have \[ 1 \times 6 + 3 \times 2 + 5 \times 1 =17. \] \begin{remark} Before taking the embedding $G(3,3,3) \hookrightarrow G(3,1,3)$, we may want to say that the element $\tilde s_2 \tilde s_3=[23]$ is fully commutative. After the embedding, we have \[ [23] \longmapsto \langle 23^2 23 \rangle ,\] and the element is not fully commutative. \end{remark} \section{Appendix: reduced words for $G(3,3,3)$ without an embedding} \label{sec-app} In this appendix, we write $[i_1i_2 \dots i_k]$ for $\tilde s_{i_1}\tilde s_{i_2} \cdots \tilde s_{i_k}$. \begin{lemma} \label{lem-rere} The following relations hold in $G(3,3,3)$: \begin{equation*} \begin{array}{llll} [31232]=[13123], & [32131]=[23213], & [213121]=[131213], & [213123]=[131231], \\ [213213]=[132132], & [231213]=[123121], & [231231]=[123123], & [232132]=[132131], \\ [312131]=[121312], & [312132]=[121321], & [312312]=[123123], & [321321]=[132132] . \end{array} \end{equation*} \end{lemma} \begin{proof} All the relations are derived from the defining relations. For example, we have the defining relation $[313]=[131]$. Multiplying both sides by $\tilde s_2 \tilde s_3$ from the right, we obtain \[ [31323]=[31232]=[13123] ,\] where we use another defining relation $[323]=[232]$. Thus we obtain $[31232]=[13123]$. \end{proof} \begin{prop} \label{prop-rw 333} A set of reduced words for $G(3,3,3)$ is given by \[ \begin{array}{lllllllll} [\ ], \\ [1], & [2], & [3], \\ [12], & [13], & [21], & [23], & [31], & [32] \\ [121], & [123], & [131], & [132], & [213], & [231], & [232], & [312], & [321], \\ [1213], & [1231], & [1232], & [1312], & [1321], & [2131], \\ [2132], & [2312], & [2321], & [3121], & [3123], & [3213], \\ [12131], & [12132], & [12312], & [12321], & [13121], & [13123], & [13213], & [21312], \\ [21321], & [23121], & [23123], & [23213], & [31213], & [31231], & [32132], \\ [121312], & [121321], & [123121], & [123123], & [123213],& [131213], & [131231], & [132132] . \end{array} \] \end{prop} \begin{proof} We set an ordering $1<2<3$ on the alphabet $I=\{1,2,3 \}$ and use the degree-lexicographic ordering on the set of words on $I$. Then one can see that the words in the list above do not contain as a subword any of the leading words of the defining relations for $G(3,3,3)$ and of the relations of Lemma \ref{lem-rere}. Further it can be checked that the list has all the words with this property. The number of words in the list is $54$, which is exactly the order of $G(3,3,3)$. Thus it follows from the Gr{\" o}bner--Shirshov basis theory that the list is a set of reduced words for $G(3,3,3)$. \end{proof} \vskip 1 cm
\section*{Acknowledgements} The authors are thankful to A. Saa for valuable criticisms and suggestions, to G. Dotti, M. M. Guzzo, O. L. G. Peres and M. G. Rodrigues for useful discussions, and to CNPq for financial support. SC is grateful to P. C. de Holanda and F. Sobreira for the hospitality at UNICAMP.
\section{Introduction} \subsection{Motivation and related literature} \begin{wrapfigure}{r}{0.3\textwidth} \begin{center} \begin{tikzpicture} \tikzset{>=latex} \node[circle,draw, inner sep=0pt, scale=0.7, fill=red!20](1) at (0,2.5){$\mu_X(x_1)$}; \node[circle,draw, inner sep=0pt, scale=0.7, fill=red!20](2) at (-1.5,0){$\mu_X(x_2)$}; \node[circle,draw, inner sep=0pt, scale=0.7, fill=red!20](3) at (1.5,0){$\mu_X(x_3)$}; \path[->] (1) edge [loop above, min distance = 5mm] node[above right]{$a$}(1); \path[->] (2) edge [loop, out=240, in = 210, min distance = 5mm] node[below]{$b$}(2); \path[->] (3) edge [loop, out=300,in=330, min distance = 5mm] node[below]{$c$}(3); \path[->] (1) edge [bend left,in=180,out=0] node[above,pos=0.5]{$d$} (2); \path[->] (2) edge [bend left] node[above,pos=0.5]{$e$} (1); \path[->] (1) edge [bend left] node[above,pos=0.5]{$f$} (3); \path[->] (3) edge [bend left,out=0,in=180] node[above,pos=0.5]{$g$} (1); \path[->] (2) edge [ bend left] node[below,pos=0.5]{$h$} (3); \path[->] (3) edge [bend left] node[above,pos=0.5]{$i$} (2); \node at (0,-1){$X$}; \end{tikzpicture} \end{center} \captionsetup{width=\linewidth} \caption{The networks in this work have asymmetric pairwise weights and a significance value for each node.} \label{fig:nets-header} \end{wrapfigure} Advances in data mining are beginning to lead to the acquisition of large networks that are directed, weighted, and possibly even signed \cite{newman2010networks}. In light of the ready availability of such data, a natural problem is to devise methods for comparing network datasets. These methods in turn lead to a wide range of applications. An example is the \emph{network retrieval task}: given a database of networks and a query network, return an ordered list of the networks in the database that are most similar to the query. Additionally, because there may be redundant data in the networks that are not relevant to the query, one may wish to impose a notion of significance to certain substructures of the query network. The task then is to retrieve networks which are similar to the query network both globally and also at the scale of relevant substructures. While there has been some work in devising directed, weighted analogues of conventional network analysis tools such as edge overlap and clustering coefficients, we are more interested in pairwise comparison of individual networks. The intuitive idea behind this comparison is to search for the best possible alignment of edges (according to weights) while simultaneously aligning nodes with similar significance. Techniques based on optimal transport (OT) provide an elegant solution to this problem by endowing a network with a probability measure. The user adjusts the measure to signify important network substructures and to smooth out the effect of outliers. This approach was adopted in \cite{hendrikson} to compare various real-world network datasets modeled as \emph{metric measure (mm) spaces}---metric spaces equipped with a probability measure. This work was based in turn on the formulation of the \emph{Gromov-Wasserstein (GW) distance} between mm spaces presented in \cite{dgh-sm, dghlp}. Specifically, this setting considered triples $(X,d_X,\mu_X)$ where $(X,d_X)$ is a compact metric space and $\mu_X$ is a Borel probability measure. Exact computation of GW distances amounts to solving a nonconvex quadratic program. Towards this end, the computational techniques presented in \cite{dgh-sm, dghlp} included both readily-computable lower bounds and an alternate minimization scheme for reaching a local minimum of the GW objection function. This alternate minimization scheme involved solving successive linear optimization problems, and was used for the computations in \cite{hendrikson}. An alternative definition of the GW distance due to Sturm (the \emph{transportation} formulation) appeared in \cite{sturm2006geometry}, although this formulation is less amenable to practical computations than the one in \cite{dgh-sm} (the \emph{distortion} formulation). Both the transportation and distortion formulations were studied carefully in \cite{dgh-sm, dghlp,sturm2012space}. It was further observed by Sturm in \cite{sturm2012space} that the definition of the (distortion) GW distance can be extended to \emph{gauged measure spaces} of the form $(X,\hat{d}_X,\mu_X)$. Here $X$ is a Polish space, $\hat{d}_X$ is a symmetric $L^2$ function on $X\times X$ (that does not necessarily satisfy the triangle inequality), and $\mu_X$ is a Borel probability measure on $X$. These results are particularly important in the context of the current paper. From here on, we always refer to the distortion formulation of the GW distance. Sturm's work in \cite{sturm2012space} showed that while the collection of isomorphism classes of metric measure spaces is not complete, elements in its completion can be represented by triples $(X,\tilde{d}_X,\mu_X)$ where $X,\mu_X$ are as above, and $\tilde{d}_X$ is a symmetric, measurable, square integrable function satisfying the triangle inequality almost everywhere. He further showed that the ambient space of gauged measure spaces, which is interpreted as being ``more linear" due to giving up the triangle inequality, admits explicit descriptions of geometric properties. In Sturm's work, symmetry is desirable because, for example, it allows an easy definition of open balls, whose volume growth is of theoretical interest (the asymmetric case would require ``forward-open" and ``backward-open" balls). However, practical data is often characterized by lack of symmetry, e.g. inhibitory/excitatory effects in neurons, unidirectional gene regulation in cell signaling pathways, and human migration between countries. The asymmetric case is of primary interest in the current work. From now on, we reserve the term \emph{network} for network datasets that cannot necessarily be represented as metric spaces, unless qualified otherwise. An illustration is provided in Figure \ref{fig:nets-header}. Already in \cite{hendrikson}, it was observed that numerical computation of GW distances worked well for comparing graph-structured data even when the underlying datasets failed to be metric. This observation was further developed in \cite{pcs16}, where the focus from the outset was to compute the GW distance (and related discrepancies) between arbitrary matrices, i.e. what we refer to as finite networks. While the experiments of \cite{pcs16} were on symmetric datasets, their implementations remain valid and theoretically justified even on matrices that do not satisfy symmetry. We emphasize this point in the current work, and extend from matrices to the continuous setting. Thus this work should be viewed as a theoretical complement to \cite{pcs16}. On the computational front, the authors of \cite{pcs16} directly attacked the nonconvex optimization problem by considering an \emph{entropy-regularized} form of the GW distance (ERGW) following \cite{s16}, and using a projected gradient descent algorithm based on results in \cite{benamou2015iterative,s16}. This approach was also used (for a generalized GW distance) on graph-structured datasets in \cite{vayer2019optimal}. It was pointed out in \cite{vayer2019optimal} that the ERGW approach occasionally requires a large amount of regularization to obtain convergence, and that this could possibly lead to over-regularized solutions. A different approach, developed in \cite{dgh-sm,dghlp}, considers the use of lower bounds on the GW distance as opposed to solving the full GW optimization problem. This is a practical approach for many use cases, in which it may be sufficient to simply obtain lower bounds for the GW distance. One of the lower bounds in \cite{dgh-sm} involved linearizing the GW objective by decoupling the alignment term into two separate terms (thus removing the quadratic dependence), and optimizing over each term separately (referred to as the \emph{Third Lower Bound} (\ref{inv:TLB})). This approach was also used in \cite{schmitzer2013modelling}, with a further relaxation of one of the marginal terms. As a complement to the alternate minimization scheme of \cite{dghlp} and the ERGW scheme of \cite{pcs16}, our numerical experiments are carried out using the lower bound approach, specifically the (\ref{inv:TLB}). This is certainly faster than alternate minimization (see \cite{hendrikson} for computational aspects), but potentially slower than the ERGW scheme of \cite{pcs16}. However, it has the benefit of not needing any parameter tuning, which is an issue with entropic regularization. This makes it useful for exploratory network data analysis. \subsection{Contributions} We adopt the setting of networks $(X,\omega_X,\mu_X)$, where $X$ is a Polish space, $\mu_X$ is a Borel probability measure, and $\omega_X$ is any measurable, integrable function on $X\times X$ (decoupled from the topology of $X$ beyond Borel measurability). Using the GW distance formulation, we define and develop a metric structure on the ``space of networks". The crux of this construction is that many of the critical theoretical developments in \cite{dgh-sm, dghlp, sturm2012space} rely on measure-theoretic properties and not metric properties, hence they extend to the ambient space of networks. Certain interpretations and results cannot carry over: typically these are the statements involving volumes of open balls, which are hard to define in the asymmetric setting. The main algorithms of \cite{pcs16, s16} for computing local minima of the ERGW objective do carry over to the network setting. To complement these algorithms, we adapt ideas from \cite{dgh-sm, dghlp} to obtain network invariants/features that yield a hierarchy of lower bounds on the network GW distance. The lower bounds arise from satisfying a certain stability property, and are computed by solving (at most) a linear program. In experiments, we focus particularly on the (\ref{inv:TLB}) from \cite{dgh-sm}. We strengthen some of the inequalities in the lower bound hierarchy to equalities (Theorem \ref{thm:stab-push}). As a consequence, we see that the (\ref{inv:TLB}), which involves solving an ensemble of OT problems over a Polish space $X\times Y$, can be computed by solving OT problems over $\mathbb{R}$ (\ref{inv:RTLB}). These can be directly computed via closed-form solutions. We also define a network Gromov-Prokhorov (GP) distance, propose a new class of invariants (the ``sublevel/superlevel size functions"), and use the GP distance to show that these new invariants satisfy a notion of \emph{interleaving} stability typically arising in the field of applied topology. We exhibit the theoretical utility of these invariants by using them to distinguish between spheres of different dimensions. Finally, we illustrate our constructions on some highly asymmetric networks (both simulated and real). Our code and datasets are available on \url{https://github.com/samirchowdhury/GWnets}. \subsection{Organization of the paper} In the following section, we define some notation and terms that will be used throughout the paper. \S\ref{sec:dist-net} contains details about couplings and the network Gromov-Wasserstein and Gromov-Prokhorov distances. In \S\ref{sec:lbounds} we present network invariants along with stability results. We conclude with experiments in \S\ref{sec:exp}. Appendix \ref{sec:computation} contains additional notes on computations. \subsection{Notation and basic terminology} We write $\mathbb{R}_+$ to denote the nonnegative reals. The indicator function of a set $S$ is denoted $\mathbf{1}_S$. Given a topological space $X$ (always a Polish space in this paper, and always equipped with the Borel $\sigma$-field $\borel(X)$), we will write $\operatorname{Prob}(X)$ to denote the collection of Borel probability measures on $X$. The \emph{support} of $\mu_X \in \operatorname{Prob}(X)$, denoted $\operatorname{supp}(\mu_X)$ (or $\operatorname{supp}(X)$ when the context is clear) is the set of $x\in X$ such that every open neighborhood of $x$ has positive measure. Unless specified otherwise, we will always deal with fully supported measures. The Lebesgue measure on the reals will be denoted by $\mathscr{L}$. The product $\sigma$-field on $X \times Y$, denoted $\borel(X\times Y)$, is defined as the $\sigma$-field generated by the measurable rectangles $A \times B$, where $A \in \borel(X)$ and $B \in \borel(Y)$. The product measure $\mu_X \otimes \mu_Y$ is defined on the measurable rectangles by writing \[\mu_X \otimes \mu_Y(A \times B) := \mu_X(A)\mu_X(B), \text{ for all $A \in \borel(X)$ and for all $B \in \borel(Y)$.}\] Given a Borel space $(X,\mu_X)$ and a Borel measurable function $f:X \r \mathbb{R}$, we write $\norm{f}_p:= (\int\! |f|^p \, d \mu_X)^{1/p}$ for $p \in [1,\infty)$, and $\norm{f}_\infty:=\inf\{M \in [0,\infty] : \mu_X(|f|> M) = 0\}$ for $p = \infty$. For each $p \in [1,\infty]$, $L^p = L^p(\mu_X)$ consists of the Borel measurable functions $f$ with $\left\| f \right\|_p < \infty$. Given a measurable real-valued function $f: X \r \mathbb{R}$ and $t \in \mathbb{R}$, we will occasionally write $\{f \leq t \}$ to denote the set $\{ x \in X : f(x) \leq t \}$. Given $(X,\mu_X)$, $Y$, and a Borel-measurable map $f: X \r Y$, the pushforward of $\mu_X$ via $f$ is the measure defined by $f_*\mu(A):= \mu(f^{-1}[A])$ for any measurable subset of $Y$. \section{Computation via entropic regularization} \label{sec:computation} Entropic regularization (ER), as used in \cite{cuturi2013sinkhorn} and further developed in \cite{benamou2015iterative, s16, pcs16, vayer2019optimal}, can be used in an iterative algorithm that approximates a local minimum of the GW objective \cite{s16,pcs16}. In this section, we describe some heuristics that we found useful when applying ER-based techniques on network data. The main issue that we deal with is the following: initializing an ER-objective for networks having very different edge weights may create cost matrices with values below machine precision, which causes computations to blow up. A related issue that we found was the problem of ``entropic bias", which can be dealt with using well-understood techniques \cite{feydy2019}. We first explain the notion of entropic regularization and associated difficulties with numerical stability. Throughout this section, we write $M$ to denote a cost matrix depending on the edge weights of networks $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$. This $M$ could be the GW objective, as in \cite{pcs16}, or one of the lower bound matrices from Theorem \ref{thm:stab-push}. \subsection{Numerical stability of entropic regularization} \label{sec:entropy-geometry} Let $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$ be networks with $|X| = m$, $|Y| = n$. For a general $m\times n$ cost matrix $M$, one may consider the entropically regularized optimal transport problem below, where $\lambda \geq 0 $ is a regularization parameter and $H$ denotes entropy: \begin{align*} \inf_{p \in \mathscr{C}(\mu_X,\mu_Y)}\sum_{i,j}M_{ij}p_{ij} - \frac{1}{\lambda}H(p), \qquad H(m) = - \sum_{i,j}p_{ij}\log p_{ij}. \end{align*} As shown in \cite{cuturi2013sinkhorn}, the solution to this problem has the form $\operatorname{diag}(a)*K*\operatorname{diag}(b)$, where $K:= e^{ - \lambda M}$ is a kernel matrix and $a,b$ are nonnegative scaling vectors in $\mathbb{R}^m, \mathbb{R}^n$, respectively. Here $*$ denotes matrix multiplication, and exponentiation is performed elementwise. An approximation to this solution can be obtained by iteratively scaling $K$ to have row and column sums equal to $\mu_X$ and $\mu_Y$, respectively, and iterating until convergence. This is described in Algorithm \ref{alg:sinkhorn}. \begin{algorithm} \caption{Sinkhorn algorithm \cite{cuturi2013sinkhorn}} \label{alg:sinkhorn} \begin{algorithmic} \Procedure{sinkhorn}{$M,\lambda, mA,mB$} \Comment{$M$ an $m\times n$ cost matrix, $mA,mB$ prob. measures} \State $a \gets 1_m$, $b \gets 1_n$ \Comment{scaling updates, initialize as all-ones vectors} \State $K_{ij} \gets {\exp}(-\lambda M_{ij})$ \Comment{initialize kernel} \Repeat \State $b\gets mB./(K'a)$, $a \gets mA./(Kb)$ \Until{convergence} \State \Return{$\operatorname{diag}(a)K\operatorname{diag}(b)$} \EndProcedure \end{algorithmic} \end{algorithm} As pointed out in \cite{schmitzer2019stabilized, chizat2018scaling, chizat-thesis}, using a large value of $\lambda$ (corresponding to a small regularization) leads to numerical instability, where values of $K$ can go below machine precision and entries of the scaling udpates $a,b$ can also blow up. For example, Matlab will interpret $e^{-1000}$ as 0, which is a problem with even a moderate choice of $\lambda = 200$ and $M_{ij} = 50$. Theoretically, it is necessary to have $K$ be a positive matrix for the Sinkhorn algorithm to converge to the correct output \cite{sinkhorn1964relationship, sinkhorn1967diagonal}. Practitioners use a range of techniques to deal with the numerical instability, e.g. occasionally ``absorbing" extreme values of $a,b$ into the kernel $K$ (log-domain absorption), or gradually updating $\lambda$ after starting with a conservative value (see \cite{chizat-thesis} for more details). Specifically in the network setting, initializing the kernel matrix $K$ can be tricky due to the wide range of edge weights in the dataset: both within a network and between different networks. For example, in the migration network database, the migration into a large country like the USA is separated by several orders of magnitude from that of a smaller country, such as Austria. Furthermore, migration values differ significantly between years, e.g. between 1960 and 2000. As discussed in \cite{chizat-thesis}, many entries of the stabilized kernel obtained as above could be below machine precision, but the entries corresponding to those on which the optimal plan is supported are likely to be above the machine limit. Indeed, this sparsity may even be leveraged for additional computational tricks. The techniques for stabilizing the entropy regularized OT problem are not the focus of our work, but because these considerations naturally arose in our computational experiments, we describe some strategies we undertook that are complementary to the techniques available in the current literature. In order to provide a perspective complementary to that presented in \cite{chizat-thesis}, we impose the requirement that \emph{all} entries of the kernel matrix remain above machine precision. \medskip \noindent \textbf{Initializing in the log domain.} A simple adaptation of the ``log domain absorption" step referred to above yields a ``log initialization" method that works well in most cases for initializing $K$ to have values above machine precision. To explain this method, we first present an algorithm (Algorithm \ref{alg:sinkhorn-log}) for the log domain absorption method. We follow the presentation provided in \cite{chizat-thesis}, making notational changes as necessary. \begin{algorithm} \caption{Sinkhorn with partial log domain steps} \label{alg:sinkhorn-log} \begin{algorithmic} \Procedure{sinkhornLog}{$M,\lambda, mA,mB$} \Comment{$M$ an $m\times n$ cost matrix, $mA,mB$ prob. measures} \State $a \gets 1_m$, $b \gets 1_n$ \Comment{scaling updates} \State $u \gets 0_m$, $v \gets 0_n$ \Comment{log domain storage of large $a,b$} \State $K_{ij} \gets {\exp}(\lambda(-M_{ij} + u_i + v_j))$ \Comment{initialize kernel} \While{stopping criterion not met} \State $b\gets mB./(K'a)$ \State $a \gets mA./(Kb)$ \If{$\max(\max(a),\max(b)) > \texttt{threshold}$} \State $u \gets u + (1/\lambda)\log(a)$ \Comment{store $a,b$ in $u,v$} \State $v \gets v + (1/\lambda)\log(b)$ \State $K_{ij} \gets {\exp}(\lambda(-M_{ij} + u_i + v_j))$ \Comment{absorb $a,b$ into $K$} \State $a \gets 1_m$, $b \gets 1_n$ \Comment{after absorption, reset $a,b$} \EndIf \EndWhile \State \Return{$\operatorname{diag}(a)K\operatorname{diag}(b)$} \EndProcedure \end{algorithmic} \end{algorithm} Notice that in Algorithm \ref{alg:sinkhorn-log}, $K$ might already have values below machine precision at initialization. To circumvent this, we can add a preprocessing step that yields a stable initialization of $K$. This is outlined in Algorithm \ref{alg:log-initial}. An important point to note about Algorithm \ref{alg:log-initial} is that the user needs to choose a function \texttt{decideParam($\a,\b$)} which returns a ``translation factor" $\gamma$, where $\a$ and $\b$ are as stated in the algorithm. This number $\gamma$ should be such that $\exp(-\lambda\b + 2\lambda\gamma)$ is above machine precision, but $\exp(-\lambda\a + 2\lambda\gamma)$ is not too large. The crux of Algorithm \ref{alg:log-initial} is that by choosing large initial scaling vectors $a,b$ and immediately absorbing them into the log domain, the extreme values of $M$ are canceled out before exponentiation. \begin{algorithm} \caption{Log domain initialization of $K$} \label{alg:log-initial} \begin{algorithmic} \Procedure{logInitialize}{$M,\lambda$} \Comment{$M$ an $m\times n$ cost matrix} \State $\alpha \gets \min(M)$, $\beta \gets \max(M)$ \Comment{scan $M$ for max and min values} \State $\gamma \gets \texttt{decideParam($\a,\b$)}$ \Comment{\texttt{decideParam} is an independent function} \State $a \gets {\exp}(-\lambda\gamma) 1_m$, $b \gets \texttt{exp}(-\lambda\gamma) 1_n$ \State $u \gets 0_m$, $v \gets 0_n$ \State $K_{ij} \gets {\exp}(\lambda(-M_{ij} + \gamma+ \gamma))$ \Comment{$K$ is stably initialized} \State perform rest of \Call{sinkhornLog}{} as usual \EndProcedure \end{algorithmic} \end{algorithm} \medskip \noindent \textbf{A geometric interpretation in the $p=2$ case.} The preceding initialization method has its limitations: depending on how far $\min(M),\max(M)$ are spread apart, the log initialization step might not be able to yield an initial kernel $K$ that has all entries above machine precision and below the machine limit. In such a case, one recourse is to choose a different value of $\lambda$. Thus when given a database of networks $X_1,\ldots, X_n$ and cost matrices arising from comparing these networks, one may need to choose $\lambda_{ij} = \lambda_{ji}$ for each pair $\{X_i,X_j\}$. It turns out that these potentially different $\lambda$ values can be related to a global $\lambda^*$ value by rescaling the networks in a geometric manner, using observations from \cite{sturm2012space}. This is described below. In what follows, we always have $p=2$. \subsubsection{Sturm's cosine rule construction} Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$. Recall from Example \ref{ex:1-pt-dnp} that $\dnt(X,N_1(0)) = \tfrac{1}{2}\operatorname{size}_2(X)$. Define $s:=\tfrac{1}{2}\operatorname{size}_2(X,\omega_X,\mu_X)$, $t:=\tfrac{1}{2}\operatorname{size}_2(Y,\omega_Y,\mu_Y)$. For an optimal coupling $\mu \in \mathscr{C}(\mu_X,\mu_Y)$, we have: \begin{align} \dnt(X,Y)^2 &= \frac{1}{4} \int\int \omega_X(x,x')^2 + \omega_Y(y,y')^2 - 2\omega_X(x,x')\omega_Y(y,y') \, d\mu(x,y)\, d\mu(x',y') \nonumber \\ &= s^2 + t^2 - \frac{1}{2}\int\int \omega_X(x,x') \omega_Y(y,y')\, d\mu(x,y)\, d\mu(x',y'), \label{eq:dn-quadratic-1} \end{align} where the first equality holds because $|a-b|^2 = \langle a-b, a-b \rangle = |a|^2 + |b|^2 - 2ab$ for all $a,b\in \mathbb{R}$, and the last equality holds because $\omega_X(x,x'), \omega_Y(y,y')$ do not depend on $\mu_Y,\mu_X$, respectively. Sturm \cite[Lemma 4.2]{sturm2012space} observed the following ``cosine rule" structure. Define \begin{align} \omega_X' := \frac{\omega_X}{2s}, \qquad \omega_Y' := \frac{\omega_Y}{2t}. \label{eq:scaling-reference} \end{align} Then $\operatorname{size}_2(X,\omega'_X) = \frac{1}{2s}\operatorname{size}_2(X,\omega_X) = 1 = \frac{1}{2t}\operatorname{size}_2(Y,\omega_Y) = \operatorname{size}_2(Y,\omega'_Y)$. A geometric fact about this construction is that $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$ lie on geodesic rays connecting $\mathcal{X}:= (X,\omega_X',\mu_X)$ and $\mathcal{Y}:= (Y,\omega_Y',\mu_Y)$ respectively to $N_1(0)$. Actually, once $(X,\omega_X,\mu_X)$ and $(Y,\omega_Y,\mu_Y)$ are chosen, the geodesic rays are automatically defined to be given by the scalar multiples of $\omega_X,\omega_Y$. Then we independently define $\mathcal{X}$ and $\mathcal{Y}$ to be representatives of the weak isomorphism class of networks at $\dnt$ distance $1/2$ from $N_1(0)$ that lie on these geodesics. We illustrate a related situation in Figure \ref{fig:scaling}, and refer the reader to \cite{sturm2012space} for further details. Implicitly using this geometric fact, we fix $\mathcal{X}, \mathcal{Y}$ as above and treat $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$ as $2s$ and $2t$-scalings of $\mathcal{X}$ and $\mathcal{Y}$, respectively (i.e. such that Equation \ref{eq:scaling-reference} is satisfied). Then we have: \begin{align} &4\dnt((X,\omega_X,\mu_Y),(Y,\omega_X,\mu_Y))^2 - 4s^2 - 4t^2 \nonumber \\ &= \int\int 4s^2 \omega'_X(x,x')^2 + 4t^2 \omega'_Y(y,y')^2 - 8st \omega'_X(x,x')\omega'_Y(y,y') \, d\mu(x,y)\, d\mu(x',y') - 4s^2 - 4t^2 \nonumber \\ &= 4s^2 \operatorname{size}_2(X,\omega'_X)^2+ 4t^2 \operatorname{size}_2(Y,\omega'_Y)^2 - 4s^2 - 4t^2 - 8st \int\int \omega'_X(x,x')\omega'_Y(y,y') \, d\mu(x,y)\, d\mu(x',y') \nonumber \\ &= -8st\int\int\omega_X'(x,x')\omega_Y'(y,y')\, d\mu(x,y)\, d\mu(x',y'), \label{eq:dn-quadratic-2} \end{align} where the last equality holds because $\operatorname{size}_2(X,\omega'_X) = 1 = \operatorname{size}_2(Y,\omega'_Y)$. Since $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y)$ were $2s,2t$-scalings of $\mathcal{X}$ and $\mathcal{Y}$ for arbitrary $s,t > 0$, this shows in particular that the quantity \[(1/2st)\left( \dnt((X,\omega_X,\mu_Y),(Y,\omega_Y,\mu_Y))^2 - s^2 -t^2\right) \tag{cosine rule}\] depends only on the reference networks $\mathcal{X}$ and $\mathcal{Y}$, and is independent of $s$ and $t$. \subsubsection{Interpretation of $\lambda$ and rescaling} \label{sec:lambda-rescaling} Suppose now that we are in a setting where $\lambda^* > 0$, $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$, and a cost matrix $M$ depending on $\omega_X,\omega_Y$ are all fixed. Suppose also that $e^{-\lambda^*M}$ contains values below machine precision, and $\lambda_{XY} > 0$ is such that $e^{-\lambda_{XY}M}$ has all values above machine precision. Then one may define $M^* := \frac{\lambda_{XY}}{\lambda^*}M$, so that $e^{-\lambda^*M^*} = e^{-\lambda_{XY}M}$. Here $M^*$ is a rescaled cost matrix, and in typical use cases, it is the cost matrix obtained from rescaled weights $\omega_X', \omega_Y'$. For example, if $M = \omega_X\omega_Y$ (as in the integrand of Equation \ref{eq:dn-quadratic-1}, also see \cite{pcs16}), then $M^* = \omega_X'\omega_Y'$, where $\omega_X'$, $\omega_Y'$ are rescaled from $\omega_X$, $\omega_Y$ by $\sqrt{\lambda_{XY}/\lambda^*}$. By the observations from \cite{sturm2012space} presented above, these rescalings are compatible with the geometry of $(\mathcal{N},\dnt)$, in the sense that the rescaled networks lie on geodesics connecting the original networks to the basepoint $N_1(0)$. This is illustrated in Figure \ref{fig:scaling}. See \cite{sturm2012space} for more details about the geodesic structure of gauged measure spaces; the analogous results hold for $(\mathcal{N},\dnt)$. \begin{figure}[h] \centering \def0.4\textwidth{0.4\textwidth} \input{scaling.pdf_tex} \caption{Interaction between the entropic regularization parameter and rescalings, cf. \S\ref{sec:lambda-rescaling}. Choosing a regularization parameter $\lambda_{XY}$ depending on the edge weights of $X$ and $Y$ is essentially the same as using a fixed parameter $\lambda^*$ with (edge-weight) rescaled versions $\mathcal{X}, \mathcal{Y}$ of $X$ and $Y$. Here $\mathcal{X}$, $\mathcal{Y}$ live on geodesic rays connecting $N_1(0)$ to $X$ and $Y$. The letters $s,\sigma,t,\t$ represent $\dnt$-distances.} \label{fig:scaling} \end{figure} \section{Discussion} \label{sec:discussion} We have presented the GW distance as a valid pseudometric on the space of all directed, weighted networks. The crux of this approach is that even though the GW distance was originally formulated for metric measure spaces, the structure of the GW distance automatically forces a metric structure on networks. This yields the insight that the metric structure on the ``space of spaces" is not inherited from the metric on the ground spaces. In particular, while there are several metrics on networks that are combinatorial in nature and hence hard to compute/sensitive to outliers, this GW metric is considerably more relaxed. The OT-based network invariants that we have presented yield lower bounds on the GW distance which at most involve linear programming, and hence are readily computable. Finally, we tested our methods on a range of network datasets. The SBM network model that we defined for these tests will likely yield useful benchmarks for such network methods in future applications. \medskip \noindent \textbf{Acknowledgments} This project was supported by NSF grants IIS-1422400, DMS-1723003, and TRIPODS-1740761. We are especially grateful to the anonymous reviewers for their detailed feedback and comments, and also to Justin Solomon for useful insights regarding computation. \section{The structure of measure networks} \label{sec:dist-net} We will always assume that our measures are fully supported, unless explicitly said otherwise. \subsection{Networks and isomorphism} \begin{definition} A \emph{(measure) network} is a triple $(X,\omega_X,\mu_X)$ where $X$ is Polish, $\mu_X$ is a fully supported Borel probability measure, and $\omega_X$ is a bounded measurable function on $X^2$. The naming convention arises from the case when $X$ is finite; in such a case, we can view the pair $(X,\omega_X)$ as a complete directed graph with asymmetric real-valued edge weights that is further equipped with node significance values given by $\mu_X$, cf. Figure \ref{fig:nets-header}. Accordingly, the points of $X$ are called \emph{nodes}, pairs of nodes are called \emph{edges}, and $\omega_X$ is called the \emph{edge weight function} of $X$. The collection of all measure networks will be denoted $\mathcal{N}$. \end{definition} \begin{remark}[Network data] A large class of objects---including metric spaces, manifolds (Riemannian or Finslerian), and similarity/kernel matrices \cite{pcs16}---can be viewed as networks. Network datasets arising in the sciences typically satisfy the regularity assumptions needed to fit the preceding definition. We point out one caveat: network datasets in the wild are often incomplete, i.e. $\omega_X$ is not fully defined on $X\times X$. In such cases, one needs to preprocess the data (see e.g. \cite{kumar2016edge}) to make it fit within our framework. In many other use cases, however, network datasets are complete by construction. For example, in gene regulatory network inference \cite{sanguinetti2019gene}, the only data that can be measured are gene expression levels. In the corresponding network, the nodes are genes and the edge weights are gene dependencies that are \emph{estimated} from the expression levels. The resulting edge weight function is thus completely determined. \end{remark} \begin{remark} Sturm has studied symmetric, $L^2$ versions of measure networks (called \emph{gauged measure spaces}) in \cite{sturm2012space}, and we point to his work as an excellent reference on the geometry of such spaces. Our motivation comes from studying network datasets, hence the difference in our naming conventions. \end{remark} When defining any type of distance between networks, as we eventually will, it is necessary to first decide which networks should be viewed as being at 0-distance. We make these choices now. The information contained in a network should be preserved under relabeling. Additionally, if a node is split into multiple nodes, all with the same incoming and outgoing edge weights, the information in the network remains unchanged. Conversely, if multiple nodes have the same incoming/outgoing edge weights, then they can be merged together without information loss. We formalize these ideas via the following notions of \emph{isomorphism}. \begin{definition}[Strong isomorphism] To say $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$ are \emph{strongly isomorphic} means that there exists a Borel measurable bijection $\varphi: X \r Y$ (with Borel measurable inverse $\varphi^{-1}$) such that \begin{itemize} \item $\omega_X(x,x') = \omega_Y(\varphi(x),\varphi(x'))$ for all $x, x' \in X$, and \item $\varphi_*\mu_X = \mu_Y$. \end{itemize} We will denote a strong isomorphism between measure networks by $X \cong^s Y$. \end{definition} The following definition is a relaxation of strong isomorphism. \begin{definition}[Weak isomorphism] \label{defn:weak-isom} $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$ are \emph{weakly isomorphic}, denoted $X\cong^w Y$, if there is a Borel probability space $(Z,\mu_Z)$ with measurable maps $f:Z \r X$ and $g:Z \r Y$ such that \begin{itemize} \item $f_*\mu_Z = \mu_X$, $g_*\mu_Z = \mu_Y$, and \item $\norm{f^*\omega_X - g^*\omega_Y}_\infty = 0$. \end{itemize} Here $f^*\omega_X:Z \times Z \r \mathbb{R}$ is the pullback weight function given by the map $(z,z') \mapsto \omega_X(f(z),f(z'))$. The map $g^*\omega_Y$ is defined analogously. Note that these pullbacks are measurable. Figure \ref{fig:wisom-nets} provides an illustration. \end{definition} \begin{figure}[b] \begin{center} \begin{tikzpicture}[every node/.style={font=\footnotesize}] \node[draw,ellipse, fill=orange!20, minimum width= 7mm,minimum height= 11 mm] (4) at (-1,-0.25) {}; \node[inner sep = 0pt, minimum size = 3mm] (1) at (-1,0){$a$}; \node[inner sep = 0pt, minimum size = 3mm] (2) at (-1,-0.5){$b$}; \node[draw,circle,fill=purple!20] (3) at (0.5,-0.25){$c$}; \node[draw,circle,fill=orange!20] (5) at (4,-0.25){$u$}; \node[draw,fill=purple!20, ellipse, minimum width= 7mm,minimum height= 11 mm] (8) at (5.5,-0.25) {}; \node[inner sep = 0pt, minimum size = 3mm,] (6) at (5.5,0){$v$}; \node[inner sep = 0pt, minimum size = 3mm] (7) at (5.5,-0.5){$w$}; \node[draw,fill=orange!20,ellipse, minimum width= 7mm,minimum height= 11 mm] (9) at (9,-0.25){}; \node[draw,fill=purple!20,ellipse, minimum width= 7mm,minimum height= 11 mm] (10) at (10.5,-0.25){}; \node[inner sep = 0pt, minimum size = 3mm] (11) at (9,0){$p$}; \node[inner sep = 0pt, minimum size = 3mm] (12) at (9,-0.5){$q$}; \node[inner sep = 0pt, minimum size = 3mm] (13) at (10.5,0){$r$}; \node[inner sep = 0pt, minimum size = 3mm] (14) at (10.5,-0.5){$s$}; \path[->] (4) edge [loop left, min distance = 5mm] node[above left]{$2$}(4); \path[->] (3) edge [loop right, min distance = 5mm] node[below right]{$3$}(3); \path[->] (4) edge [bend left] node[above]{$1$} (3); \path[->] (3) edge [bend left] node[below]{$1$} (4); \path[->] (5) edge [loop left, min distance = 5mm] node[above left]{$2$}(5); \path[->] (8) edge [loop right, min distance = 5mm] node[below right]{$3$}(8); \path[->] (5) edge [bend left] node[above]{$1$} (8); \path[->] (8) edge [bend left] node[below]{$1$} (5); \path[->] (9) edge [loop left, min distance = 5mm] node[above left]{$2$}(9); \path[->] (10) edge [loop right, min distance = 5mm] node[below right]{$3$}(10); \path[->] (9) edge [bend left] node[above]{$1$} (10); \path[->] (10) edge [bend left] node[below]{$1$} (9); \node at (-1,-1.5) {$\omega_X(a,b,c) = \mattres{2}{2}{1}{2}{2}{1}{1}{1}{3}$, $\mu_X = \vecthree{\frac{1}{4}}{\frac{1}{4}}{\frac{1}{2}}$}; \node at (4.5,-1.5) {$\omega_Y(u,v,w) = \mattres{2}{1}{1}{1}{3}{3}{1}{3}{3}$, $\mu_Y = \vecthree{\frac{1}{2}}{\frac{1}{4}}{\frac{1}{4}}$}; \node at (10,-1.5) {$\omega_Z(p,q,r,s) = \left( \begin{smallmatrix} 2 & 2 & 1 & 1\\ 2 & 2 & 1 & 1\\ 1 & 1 & 3 & 3\\ 1 & 1 & 3 & 3\\ \end{smallmatrix} \right) $, $\mu_Z = \vecfour{\frac{1}{4}}{\frac{1}{4}}{\frac{1}{4}}{\frac{1}{4}}$}; \end{tikzpicture} \caption{Weakly isomorphic networks $X,Y,Z$. Note that $Z$ maps surjectively onto $X$ and $Y$, and this surjection induces compatible pushforward measures and pullback weight functions, as required by Definition \ref{defn:weak-isom}.} \label{fig:wisom-nets} \end{center} \vspace{-.2in} \end{figure} \begin{remark}[Interpretation for real data] According to the notion of weak isomorphism, two nodes $x,x'$ are informally the same if they have the same ``internal perception", i.e. $\omega_X(x,x) = \omega_X(x,x') = \omega_X(x',x) = \omega_X(x',x')$, and the same external perception, i.e. all the incoming and outgoing edge weights are the same. A relaxation would be to say that $x,x'$ are $\varepsilon$-similar if, for $\varepsilon > 0$, \[\max(\left\| \omega_X(x,\cdot) - \omega_X(x',\cdot) \right\|_\infty, \left\| \omega_X(\cdot,x) - \omega_X(\cdot,x') \right\|_\infty) < \varepsilon.\] The network stochastic block model in \S\ref{sec:sbm-net} describes networks that admit partitions into $\varepsilon$-similar blocks. \end{remark} \begin{example}\label{ex:simple-networks} Networks with one or two nodes will be very instructive in providing examples and counterexamples, so we introduce them now with some special terminology. \begin{itemize} \item By $N_1(a)$ we will refer to the network with one node $X = \set{p}$, a weight $\omega_X(p,p) = a$, and the Dirac measure $\mu_X = \d_p$. \item By $N_2(\mattwo{a}{b}{c}{d}, \a, \b)$ we will mean a two-node network with node set $X = \set{p,q}$, and weights and measures given as follows: \begin{align*} \omega_X(p,p) = a & \qquad \mu_X(\set{p}) = \a\\ \omega_X(p,q) = b & \qquad \mu_X(\set{q}) = \b\\ \omega_X(q,p) = c \\ \omega_X(q,q) = d \end{align*} \item Given a $k$-by-$k$ matrix $\Sigma\in \mathbb{R}^{k\times k}$ and a $k\times 1$ vector $v\in\mathbb{R}^{k}_+$ with sum $1$, we automatically obtain a network on $k$ nodes that we denote as $N_k(\Sigma,v)$. Notice that $N_k(\Sigma,v)\cong^s N_\ell(\Sigma',v')$ if and only if $k=\ell$ and there exists a permutation matrix $P$ of size $k$ such that $\Sigma'=P\,\Sigma\,P^T$ and $Pv = v'$. \end{itemize} \end{example} \noindent \textbf{Notation.} Even though $\mu_X$ takes sets as its argument, we will often omit the curly braces and use $\mu_X(p,q,r)$ to mean $\mu_X(\set{p,q,r})$. We wish to define a notion of distance on $\mathcal{N}$ that is compatible with isomorphism. A natural analog is the Gromov-Wasserstein distance defined between metric measure spaces \cite{dgh-sm}. To adapt that definition for our needs, we first recall the definition of a measure coupling. \subsection{Couplings and the distortion functional} Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y)$ be two measure networks. A \emph{coupling} between these two networks is a probability measure $\mu$ on $X\times Y$ with marginals $\mu_X$ and $\mu_Y$, respectively. Stated differently, couplings satisfy the following property: \[\mu(A \times Y) = \mu_X(A) \; \text{and} \; \mu(X \times B) = \mu_Y(B), \text{ for all $A \in \borel(X)$ and for all $B \in \borel(Y)$.}\] The collection of all couplings between $(X,\omega_X,\mu_X)$ and $(Y,\omega_Y,\mu_Y)$ will be denoted $\mathscr{C}(\mu_X,\mu_Y)$, abbreviated to $\mathscr{C}$ when the context is clear. Couplings are also referred to as \emph{transport plans}. \begin{example}[Product coupling] \label{ex:product-coupling} Let $(X,\omega_X,\mu_X), \ (Y,\omega_Y,\mu_Y) \in \mathcal{N}$. The set $\mathscr{C}(\mu_X,\mu_Y)$ is always nonempty, because the \emph{product measure} $\mu:= \mu_X \otimes \mu_Y$ is always a coupling between $\mu_X$ and $\mu_Y$. \end{example} \begin{example}[1-point coupling]\label{ex:1-pt-coupling} Let $(X,\omega_X,\mu_X) \in \mathcal{N}$, and let $Y = N_1(a)$ be a network on a single point $\{p\}$. Then there exists a unique coupling $\mu = \mu_X \otimes \d_p$ between $\mu_X$ and $\delta_p$. \end{example} \begin{example}[Diagonal coupling] \label{ex:diag-coupling} Let $(X,\omega_X,\mu_X) \in \mathcal{N}$. The \emph{diagonal coupling $\Delta$} between $\mu_X$ and itself is the transport plan that sends each point to itself, and is defined by writing \[\Delta(A\times B) := \int_{X} \mathbf{1}_{A\times B}(x,x) \, d\mu_X(x) \qquad \text{ for all } A, B\in \borel(X).\] To see that this is a coupling, let $A\in \borel(X)$. Then, \[\Delta(A\times X) = \int_{X} \mathbf{1}_{A\times X}(x,x) \, d\mu_X(x) = \int_{X}\mathbf{1}_{A}(x) \, d\mu_X(x) = \mu_X(A),\] and similarly $\Delta(X\times A) = \mu_X(A)$. Thus $\Delta \in \mathscr{C}(\mu_X,\mu_X)$. \end{example} Now we turn to the notion of the \emph{distortion} of a coupling. Let $(X,\omega_X,\mu_X),(Y,\omega_Y,\mu_Y)$ be two measure networks. Next let $\mu\in\mathscr{C}(\mu_X,\mu_Y)$, and consider the probability space $(X\times Y)^2$ equipped with the product measure $\mu\otimes \mu$. For each $p \in [1,\infty]$ the $p$-distortion of $\mu$ is defined as $\dis_p(\mu) := \left\| \omega_X - \omega_Y \right\|_p$. For $p \in [1,\infty)$, this is written as: \begin{align*} \dis_p(\mu) & = \left( \int_{X\times Y}\int_{X\times Y}|\omega_X(x,x') - \omega_Y(y,y')|^p \, d \mu(x,y) \, d\mu(x',y') \right)^{1/p}. \end{align*} For $p = \infty$, this becomes: \[\dis_p(\mu) := \esssup |\omega_X - \omega_Y|.\] We end by introducing the Wasserstein distance \cite[\S7]{ambrosio2008gradient}, which metrizes the topology of narrow convergence that we introduce below. Let $(X,d_X)$ be a Polish space, let $p \in [1,\infty]$, and let $\mu,\nu \in \operatorname{Prob}(X)$ be such that $\left\| d_X(x_0,\cdot) \right\|_{L^p(\t)} < \infty$ for $\t \in \{ \mu,\nu \}$ and some $x_0 \in X$. The \emph{pth Wasserstein distance} between $\mu,\nu$ is defined to be: \[W_p(\mu,\nu) := \inf_{\t \in \mathscr{C}(\mu,\nu)} \left\| d_X \right\|_{L^p(\t)}.\] \subsection{Optimality of couplings in the network setting} We now collect some results about probability spaces. Let $X$ be a Polish space. A subset $P \subseteq \operatorname{Prob}(X)$ is said to be \emph{tight} if for all $\varepsilon > 0$, there is a compact subset $K_\varepsilon \subseteq X$ such that $\mu_X(X\setminus K_\varepsilon) \leq \varepsilon$ for all $\mu_X \in P$. A sequence $(\mu_n)_{n\in \mathbb{N}} \in \operatorname{Prob}(X)^\mathbb{N}$ is said to \emph{converge narrowly} to $\mu_X \in \operatorname{Prob}(X)$ if \[\lim_{n \r \infty} \int_X f \, d\mu_n = \int_X f \,d\mu_X \qquad \text{ for all } f \in C_b(X),\] the space of continuous, bounded, real-valued functions on $X$. Narrow convergence is induced by a distance \cite[Remark 5.1.1]{ambrosio2008gradient}, in particular by $W_p$ when $X$ is bounded, hence the convergent sequences in $\operatorname{Prob}(X)$ completely determine a topology on $\operatorname{Prob}(X)$. This topology on $\operatorname{Prob}(X)$ is called the \emph{narrow topology}. In some references \cite{sturm2012space}, narrow convergence (resp. narrow topology) is called \emph{weak convergence} (resp. \emph{weak topology}). A further consequence of having a metric on $\operatorname{Prob}(X)$ \cite[Remark 5.1.1]{ambrosio2008gradient} is that singletons are closed. This simple fact will be used below. \begin{theorem}[Prokhorov, \cite{ambrosio2008gradient} Theorem 5.1.3] Let $X$ be a Polish space. Then $P\subseteq \operatorname{Prob}(X)$ is tight if and only if it is relatively compact, i.e. its closure is compact in $\operatorname{Prob}(X)$. \end{theorem} \begin{lemma}[Lemma 4.4, \cite{villani2008optimal}] \label{lem:tightness-couplings} Let $X,Y$ be two Polish spaces, and let $P_X \subseteq \operatorname{Prob}(X)$, $P_Y \subseteq \operatorname{Prob}(Y)$ be tight in their respective spaces. Then the set $\mathscr{C}(P_X,P_Y) \subseteq \operatorname{Prob}(X\times Y)$ of couplings with marginals in $P_X$ and $P_Y$ is tight in $\operatorname{Prob}(X\times Y)$. \end{lemma} \begin{lemma}[Compactness of couplings; Lemma 1.2, \cite{sturm2012space}] \label{lem:compactness-couplings} Let $X,Y$ be two Polish spaces. Let $\mu_X \in \operatorname{Prob}(X)$, $\mu_Y \in \operatorname{Prob}(Y)$. Then $\mathscr{C}(\mu_X,\mu_Y)$ is compact in $\operatorname{Prob}(X\times Y)$. \end{lemma} \begin{proof} The singletons $\{\mu_X\}$, $\{ \mu_Y\}$ are closed and of course compact in $\operatorname{Prob}(X)$, $\operatorname{Prob}(Y)$. Hence by Prokhorov's theorem, they are tight. Now consider $\mathscr{C}(\mu_X,\mu_Y) \subseteq \operatorname{Prob}(X\times Y)$. Since this is obtained by intersecting the preimages of the continuous projections onto the marginals $\mu_X$ and $\mu_Y$, we know that it is closed. Furthermore, $\mathscr{C}(\mu_X,\mu_Y)$ is tight by Lemma \ref{lem:tightness-couplings}. Then by another application of Prokhorov's theorem, it is compact. \qedhere \end{proof} The following lemma appeared for symmetric weight functions in the $L^2$ case in \cite{sturm2012space}, along with a slightly different proof using parametrizations by the unit interval. The proof is actually simpler in the network setting because we do not need to enforce symmetry of the approximating functions. \begin{lemma}[Continuity of the distortion functional] \label{lem:cont-distortion-intervals} Let $1\leq p < \infty$, and let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$. The distortion functional $\dis_p$ is continuous on $\mathscr{C}(\mu_X,\mu_Y)$. For $p = \infty$, $\dis_\infty$ is lower semicontinuous. \end{lemma} \begin{proof} First suppose $p \in [1,\infty)$. We will construct a sequence of continuous functionals that converges uniformly to $\dis_p$. Since the uniform limit of continuous functions is continuous, this will show that $\dis_p$ is continuous. Bounded continuous functions are dense in $L^p$ (in our setting of Polish spaces with finite measures, see e.g. \cite[\S7.2]{folland1999real}), so for each $n \in \mathbb{N}$, we pick continuous, bounded functions $\omega_X^n \in L^p(\mu_X^{\otimes 2})$ and $\omega_Y^n \in L^p(\mu_Y^{\otimes 2})$ such that \[\left\| \omega_X - \omega_X^n \right\|_{L^p(\mu_X \otimes \mu_X)} \leq 1/n, \qquad \left\| \omega_Y - \omega_Y^n \right\|_{L^p(\mu_Y \otimes \mu_Y)} \leq 1/n.\] For each $n \in \mathbb{N}$, define the functional $\dis_p^n:\mathscr{C}(\mu_X,\mu_Y) \r \mathbb{R}_+$ by $\dis_p^n(\nu):= \left\| \omega_X^n - \omega_Y^n \right\|_{L^p(\nu \otimes \nu)}$. Note that $\left| \omega_X^n - \omega_Y^n \right|^p \in C_b((X\times Y)^2)$. We claim that $\dis_p^n$ is continuous. Since the narrow topology on $\operatorname{Prob}(X \times Y)$ is induced by a distance \cite[Remark 5.1.1]{ambrosio2008gradient}, it suffices to show sequential continuity. Let $\nu \in \mathscr{C}(\mu_X,\mu_Y)$, and let $(\nu_m)_{m\in \mathbb{N}}$ be a sequence in $\mathscr{C}(\mu_X,\mu_Y)$ converging narrowly to $\nu$. Then in fact $\nu_m \otimes \nu_m$ converges narrowly to $\nu\otimes \nu$ \cite[Theorem 2.8]{billingsley1999convergence}. Thus we have \begin{align*} \lim_{m\r \infty} \dis_p^n(\nu_m) & = \lim_{m\r \infty} \left( \int_{ (X\times Y)^2 } \left| \omega^n_X- \omega^n_Y\right|^p d\nu_m \otimes d\nu_m\right)^{1/p}\\ &= \left( \int_{ (X\times Y)^2 } \left| \omega^n_X- \omega^n_Y\right|^p d\nu \otimes d\nu\right)^{1/p} = \dis_p^n(\nu). \end{align*} Here the second equality follows from the definition of convergence in the narrow topology and the fact that the integrand is bounded and continuous. This shows sequential continuity (hence continuity) of $\dis_p^n$. Finally, we show that $(\dis_p^n)_{n \in \mathbb{N}}$ converges to $\dis_p$ uniformly. Let $\mu \in \mathscr{C}(\mu_X,\mu_Y)$. Then, \begin{align*} \left| \dis_p(\mu) - \dis_p^n(\mu) \right| &= \left| \left\| \omega_X - \omega_Y \right\|_{L^p(\nu \otimes \nu)} - \left\| \omega_X^n - \omega_Y^n \right\|_{L^p(\nu \otimes \nu)} \right| \\ & \leq \left\| \omega_X - \omega_X^n \right\|_{L^p(\mu_X \otimes \mu_X)} + \left\| \omega_Y - \omega_Y^n \right\|_{L^p(\mu_Y \otimes \mu_Y)} \leq 2/n. \end{align*} But $\mu \in \mathscr{C}(\mu_X,\mu_Y)$ was arbitrary. This shows that $\dis_p$ is the uniform limit of continuous functions, hence is continuous. Here the first inequality followed from Minkowski's inequality. Now suppose $p = \infty$. Let $\mu \in \mathscr{C}(\mu_X,\mu_Y)$ be arbitrary. Recall that because we are working over probability spaces, Jensen's inequality can be used to show that for any $1 \leq q \leq r < \infty$, we have $\dis_q(\mu) \leq \dis_r(\mu)$. Moreover, we have $\lim_{q \r \infty}\dis_q(\mu) = \dis_\infty(\mu)$. The supremum of a family of continuous functions is lower semicontinuous. In our case, $\dis_\infty = \sup \{\dis_q : q \in [1,\infty)\}$, and we have shown above that all the functions in this family are continuous. Hence $\dis_\infty$ is lower semicontinuous. \end{proof} \begin{definition}[Optimal couplings] Let $(X,\omega_X,\mu_X),(Y,\omega_Y,\mu_Y) \in \mathcal{N}$, and let $p \in [1,\infty]$. A coupling $\mu \in \mathscr{C}(\mu_X,\mu_Y)$ is \emph{optimal} if $\dis_p(\mu) = \inf_{\nu \in \mathscr{C}(\mu_X,\mu_Y)}\dis_p(\nu)$. \end{definition} \begin{theorem} \label{thm:opt-coup} Let $(X,\omega_X,\mu_X)$ and $(Y,\omega_Y,\mu_Y)$ be two measure networks, and let $p \in [1,\infty]$. Then there exists an optimal coupling, i.e. a minimizer for $\dis_p(\cdot)$ in $\mathscr{C}(\mu_X,\mu_Y)$. \end{theorem} \begin{proof} The result follows from Lemmas \ref{lem:compactness-couplings} and \ref{lem:cont-distortion-intervals}, because lower semicontinuity and compactness are sufficient to guarantee that $\dis_p$ achieves its infimum on $\mathscr{C}(\mu_X,\mu_Y)$, for any $p \in [1,\infty]$. \qedhere \end{proof} \subsection{The network Gromov-Wasserstein distance} For each $p \in [1,\infty]$, we define: \[\dnp(X,Y):=\frac{1}{2}\min_{\mu\in\mathscr{C}(\mu_X,\mu_Y)}\dis_p(\mu) \qquad \text{for each } (X,\omega_X,\mu_X),(Y,\omega_Y,\mu_Y) \in \mathcal{N}. \] Here we implicitly use Theorem \ref{thm:opt-coup} to write $\min$ instead of $\inf$. As we will see below, $\dnp$ is a legitimate pseudometric on $\mathcal{N}$. The structure of $\dnp$ is analogous to a formulation of the \emph{Gromov-Wasserstein distance} between metric measure spaces \cite{dghlp, sturm2012space}. \begin{remark}[Boundedness of $\dnp$] Recall from Example \ref{ex:product-coupling} that for any $X,Y\in \mathcal{N}$, $\mathscr{C}(\mu_X,\mu_Y)$ always contains the product coupling, and is thus nonempty. A consequence is that $\dnp(X,Y)$ is bounded for any $p \in [1,\infty]$. Indeed, by taking the product coupling $\mu:= \mu_X \otimes \mu_Y$ we have $\dnp(X,Y)\leq \frac{1}{2}\dis_p(\mu) < \infty$. \end{remark} In some simple cases, we obtain explicit formulas for computing $\dnp$. \begin{example}[Easy examples of $\dnp$] \label{ex:1-pt-dnp} Let $a, b \in \mathbb{R}$ and consider the networks $N_1(a)$ and $N_1(b)$. The unique coupling between the two networks is the product measure $\mu = \d_x \otimes \d_y$, where we understand $x,y$ to be the nodes of the two networks. Then for any $p \in [1, \infty]$, we obtain: \[ \dnp(N_1(a),N_1(b)) = \frac{1}{2}\dis_p(\mu) = |\omega_{N_1(a)}(x,x) - \omega_{N_1(b)}(y,y)| = |a-b|.\] Let $(X,\omega_X,\mu_X)\in \mathcal{N}$ be any network and let $N_1(a)=(\{y\},a)$ be a network with one node. Once again, there is a unique coupling $\mu = \mu_X\otimes \d_y$ between the two networks. For any $p \in [1,\infty)$, we obtain: \[\dnp(X,N_1(a))=\frac{1}{2}\dis_p(\mu) = \frac{1}{2} \left(\int_{X}\int_X \left| \omega_X(x,x') - a \right|^p d\mu_X(x)d\mu_X(x') \right)^{1/p}.\] For $p = \infty$, we have $\dnp(X,N_1(a)) = \esssup \left( \frac{1}{2}|\omega_X - a| \right).$ \end{example} \begin{remark}\label{rem:weak-isom} $\dnp$ is not necessarily a metric modulo strong isomorphism. This can be seen from Figure \ref{fig:wisom-nets}. \end{remark} The definition of $\dnp$ is sensible in the sense that it captures the notion of a distance: \begin{theorem}\label{thm:dnp} For each $p \in [1,\infty]$, $\dnp$ is a pseudometric on $\mathcal{N}$. \end{theorem} \begin{proof}[Proof of Theorem \ref{thm:dnp}] Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y), (Z,\omega_Y,\mu_Y) \in \mathcal{N}$. It is clear that $\dnp(X,Y) \geq 0$. Taking the diagonal coupling (see Example \ref{ex:diag-coupling}) shows $\dnp(X,X) = 0$. For symmetry, notice that for any $\mu \in \mathscr{C}(\mu_X,\mu_Y)$, we can define $\widetilde{\mu} := f_*\mu$, where $f:X\times Y \r Y\times X$ is the map $(x,y) \mapsto (y,x)$. Then $\dis_p(\mu)=\dis_p(\widetilde{\mu})$, and this will show $\dnp(X,Y)=\dnp(Y,X)$. Note that we are overloading notation here: there are implicitly two $\dis_p$ functions, with different domains, for $\mu$ and $\widetilde{\mu}$, respectively. Finally, we need to check the triangle inequality. Let $\mu_{12} \in \mathscr{C}(\mu_X,\mu_Y)$ and $\mu_{23} \in \mathscr{C}(\mu_Y,\mu_Z)$ be couplings such that $2\dnp(X,Y) = \dis_p(\mu_{12}) $ and $2\dnp(Y,Z) = \dis_p(\mu_{23}) $ (using Theorem \ref{thm:opt-coup}). By the standard gluing lemma (Lemma 1.4 in \cite{sturm2012space}, also Lemma 7.6 in \cite{villani2003topics}), we obtain a probability measure $\mu \in \operatorname{Prob}(X\times Y\times Z)$ with marginals $\mu_{12}, \mu_{23}$, and a marginal $\mu_{13}$ that is a coupling between $\mu_X$ and $\mu_Z$. This coupling is not necessarily optimal. Then we have: \begin{align*} 2\dnp(X,Z) &\leq \dis_p(\mu_{13})\\ &=\left\| \omega_X - \omega_Y + \omega_Y - \omega_Z\right\|_{L^p(\mu \otimes \mu)}\\ &\leq \left\| \omega_X - \omega_Y \right\|_{L^p(\mu \otimes \mu)} + \left\| \omega_Y - \omega_Z \right\|_{L^p(\mu \otimes \mu)}\\ &= \left\| \omega_X - \omega_Y \right\|_{L^p(\mu_{12} \otimes \mu_{12})} + \left\| \omega_Y - \omega_Z \right\|_{L^p(\mu_{23} \otimes \mu_{23})} = 2 \dnp(X,Y)+2\dnp(Y,Z) \end{align*} The second inequality above follows from Minkowski's inequality. This proves the triangle inequality. \end{proof} \begin{remark} This result and its proof are analogous to the related results for gauged and metric measure spaces \cite{dghlp, sturm2012space}. The observation here is that the metric structure on $\mathcal{N}$ is not inherited from its elements, but is rather enforced by the structure of $\dnp$. This is in contrast, for example, to the Wasserstein distance $W_p$, which inherits its metric structure from an underlying metric space. \end{remark} It remains to discuss the precise pseudometric structure of $\dnp$. The following result is analogous to a statement about \emph{homomorphisms} in \cite{sturm2012space}; again, the proof is purely measure-theoretic and hence applies to the asymmetric setting. \begin{theorem}[Pseudometric structure of $\dnp$] \label{thm:dnp-pseudo} Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$, and let $p \in [1,\infty]$. Then $\dnp(X,Y) = 0$ if and only if $X \cong^w Y$. \end{theorem} \begin{proof}[Proof of Theorem \ref{thm:dnp-pseudo}] Fix $p \in [1,\infty)$. For the backward direction, suppose there exist $(Z,\mu_Z)$ and measurable maps $f:Z \r X$ and $g:Z \r Y$ satisfying the conditions of Definition \ref{defn:weak-isom}. Let $\mu:= (f,g)_*\mu_Z$. Then $\mu \in \mathscr{C}(\mu_X,\mu_Y)$, and we have: \begin{align*} 2\dnp(X,Y) \leq \left( \int_{(X\times Y)^2} \left| \omega_X - \omega_Y \right|^p \, d\mu\, d\mu \right)^{1/p} = \left( \int_{Z^2} \left| f^*\omega_X - g^*\omega_Y\right|^p \, d \mu_Z\, d\mu_Z\right)^{1/p} = 0. \end{align*} Here the first equality is by the change of variables formula. The case $p = \infty$ is similar. For the forward direction, let $\mu \in \mathscr{C}(\mu_X,\mu_Y)$ be an optimal coupling with $\dis_p(\mu) = 0$ (Theorem \ref{thm:opt-coup}). Define $Z:= X\times Y$, $\mu_Z:= \mu$. Then the projection maps $\pi_X:Z \r X$ and $\pi_Y:Z \r Y$ are measurable. We also have $(\pi_X)_*\mu = \mu_X$ and $(\pi_Y)_*\mu =\mu_Y$. Since $\dis_p(\mu) = 0$, we also have $\norm{(\pi_X)^*\omega_X - (\pi_Y)^*\omega_Y}_\infty = \norm{\omega_X - \omega_Y}_\infty = 0$. The $p=\infty$ case is proved analogously. This concludes the proof. \qedhere \end{proof} \begin{remark} A result analogous to Theorem \ref{thm:dnp-pseudo} holds for networks without measure equipped with a Gromov-Hausdorff-type network distance \cite{dn-part1}. The ``tripod structure" $X \leftarrow Z \r Y$ described above is much more difficult to obtain in the setting of \cite{dn-part1}. This highlights an advantage of the measure-theoretic setting of the current paper. \end{remark} \subsection{Additional constructions} We briefly digress to discuss some theoretical connections to the framework presented above. The first of these is the notion of parametrization, which is used in the setting of mm-spaces to define Gromov's box distance \cite{gromov-book}. The second is an explicit development of an alternative distance between networks based on the Gromov-Prokhorov distance between mm-spaces \cite{greven2009convergence}. This in turn leads to interesting and novel lower bounds on the $d_{\mathcal{N} \!,\infty}$-distance between spheres (see \S\ref{sec:sphere-lbounds}). \subsubsection{Interval representation} \label{sec:interval-rep} We now record a standard result about mm-spaces that remains valid in the network setting. Let $(X,\omega_X,\mu_X) \in \mathcal{N}$. Because $X$ is Polish and $\mu_X(X) = 1$, the pair $(X,\mu_X)$ admits a \emph{parameter}, i.e. a (not necessarily unique) surjective Borel-measurable map $\rho:I=[0,1] \r X$ such that $\rho_*\mathscr{L} = \mu_X$ \cite[Lemma 4.2]{shioya2016metric}. Here $\mathscr{L}$ denotes Lebesgue measure. By pulling back $\omega_X$, we get a triple $(I, \rho^*\omega_X, \mathscr{L}) \in \mathcal{N}$. Note that by construction, $(X,\omega_X,\mu_X)$ is weakly isomorphic to its parameter. Parametrizations allow one to define a version of Gromov's box distance \cite{gromov-book} for networks. Computing the box distance leads to difficult combinatorial problems and is not the focus of this paper, but we point to it as a source of interesting theoretical problems. In parametrized form, a network is a measurable, integrable function on the unit square. If the edge weight function is normalized and centered to be in $[0,1]$, then a network corresponds to a \emph{graphon} \cite{lovasz2012large}. \subsubsection{The network Gromov-Prokhorov distance} We now formulate a network distance analogous to the \emph{Gromov-Prokhorov} distance between mm-spaces \cite{greven2009convergence}. This will be used to prove subsequent results. Let $\a \in [0,\infty)$. For any $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y) \in \mathcal{N}$, we write $\mathscr{C} := \mathscr{C}(\mu_X,\mu_Y)$ and define: \[ \dgp(X,Y) :=\frac{1}{2} \inf_{\mu \in \mathscr{C}} \inf \{ \varepsilon > 0 : \mu\otimes\mu \left( \{x,y,x',y' \in (X\times Y)^2 : \left| \omega_X(x,x') - \omega_Y(y,y') \right| \geq \varepsilon \} \right) \leq \a\varepsilon\}. \] \begin{theorem} \label{thm:gp-metric} For each $\a \in [0,\infty)$, $\dgp$ is a pseudometric on $\mathcal{N}$. \end{theorem} \begin{proof} Let $(X,\omega_X,\mu_X),(Y,\omega_Y,\mu_Y), (Z,\omega_Z,\mu_Z) \in \mathcal{N}$. The proofs that $\dgp(X,Y) \geq 0$, $\dgp(X,X) = 0$, and that $\dgp(X,Y) = \dgp(Y,X)$ are analogous to those used in Theorem \ref{thm:dnp}. Hence we only check the triangle inequality. Let $\varepsilon_{XY} > 2\dgp(X,Y)$, $\varepsilon_{YZ} > 2\dgp(Y,Z)$, and let $\mu_{XY}, \mu_{YZ}$ be couplings such that \begin{align*} \mu_{XY}^{\otimes 2} \left( \{(x,y,x',y') : \left| \omega_X(x,x') - \omega_Y(y,y') \right| \geq \varepsilon_{XY} \}\right) &\leq \a\varepsilon_{XY},\\ \mu_{YZ}^{\otimes 2} \left( \{(y,z,y',z') : \left| \omega_Y(y,y') - \omega_Z(z,z') \right| \geq \varepsilon_{YZ} \}\right) &\leq \a\varepsilon_{YZ}. \end{align*} For convenience, define: \begin{align*} A&:= \{((x,y,z),(x',y',z')) \in (X\times Y \times Z)^2 : \left| \omega_X(x,x') - \omega_Y(y,y') \right| \geq \varepsilon_{XY} \}\\ B&:= \{((x,y,z),(x',y',z')) \in (X\times Y \times Z)^2 : \left| \omega_Y(y,y') - \omega_Z(z,z') \right| \geq \varepsilon_{YZ} \}\\ C&:=\{((x,y,z),(x',y',z')) \in (X\times Y \times Z)^2 : \left| \omega_X(x,x') - \omega_Z(z,z') \right| \geq \varepsilon_{XY} + \varepsilon_{YZ}\}. \end{align*} Next let $\mu$ denote the probability measure with marginals $\mu_{XY}, \mu_{YZ}$, and a marginal $\mu_{XZ}\in \mathscr{C}(\mu_X,\mu_Z)$ obtained from gluing $\mu_{XY}$ and $\mu_{YZ}$ (cf. Lemma 7.6 in \cite{villani2003topics}). We need to show: \[\mu_{XZ}^{\otimes 2}\left( (\pi_X,\pi_Z)(C) \right) \leq \a(\varepsilon_{XY} + \varepsilon_{YZ}).\] To show this, it suffices to show $C \subseteq A \cup B$, because then we have $\mu^{\otimes 2}(C) \leq \mu^{\otimes 2}(A) + \mu^{\otimes 2}(B)$ and consequently \begin{align*} \mu_{XZ}^{\otimes 2}\left( (\pi_X,\pi_Z)(C) \right) = \mu^{\otimes 2}(C) \leq \mu^{\otimes 2}(A) + \mu^{\otimes 2}(B) &= \mu_{XY}^{\otimes 2}\left( (\pi_X,\pi_Y)(A) \right) + \mu_{YZ}^{\otimes 2}\left( (\pi_Y,\pi_Z)(B) \right)\\ &\leq \a(\varepsilon_{XY} + \varepsilon_{YZ}). \end{align*} Let $((x,y,z),(x',y',z')) \in (X\times Y\times Z)^2 \setminus (A \cup B)$. Then we have \[\left| \omega_X(x,x') - \omega_Y(y,y') \right| < \varepsilon_{XY} \text{ and } \left| \omega_Y(y,y') - \omega_Z(z,z') \right| < \varepsilon_{YZ}.\] By the triangle inequality, we then have: \[ \left| \omega_X(x,x') - \omega_Z(z,z') \right| \leq \left| \omega_X(x,x') - \omega_Y(y,y') \right| + \left| \omega_Y(y,y') - \omega_Z(z,z') \right| < \varepsilon_{XY} + \varepsilon_{YZ}.\] Thus $((x,y,z),(x',y',z')) \in (X\times Y\times Z)^2 \setminus C$. This shows $C \subseteq A \cup B$. The preceding work shows that $2\dgp(X,Z) \leq \varepsilon_{XY} + \varepsilon_{YZ}$. Since $\varepsilon_{XY} > 2\dgp(X,Y)$ and $\varepsilon_{YZ} > 2\dgp(Y,Z)$ were arbitrary, it follows that $\dgp(X,Z) \leq \dgp(X,Y) + \dgp(Y,Z)$. \end{proof} The next lemma follows by unpacking the definitions of the GP and GW distances. \begin{lemma}[Relation between GP and GW] \label{lem:gp-gw} Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$. We always have: \[\dgpzero(X,Y) = d_{\mathcal{N} \!,\infty}(X,Y).\] \end{lemma} \section{Invariants and lower bounds} \label{sec:lbounds} As already remarked, finite networks can be regarded as square matrices equipped with a probability measure on the columns (equivalently, the rows). This was the setting of \cite{pcs16}. Theorem \ref{thm:dnp} completes the theoretical justification behind using the GW distance to compare matrices, as carried out (at least for symmetric matrices) in \cite{pcs16}. We now study a variety of network invariants, which can also be thought of as network features. Informally, a network invariant is a compressed representation of the network satisfying the following compatibility property: if two networks are the same in the sense of $\dnp$, then their invariants should also be ``the same". The invariants we consider are functions $\iota: (\mathcal{N},\dnp) \r (\mathcal{I},d_{\mathcal{I}})$, where $(\mathcal{I},d_{\mathcal{I}})$ is some pseudometric space. Such invariants translate the original problem of computing GW over the ``space of networks" to computing $d_{\mathcal{I}}$ over spaces $\mathcal{I}$ with more regular geometry, e.g. the real line. Translating the problem to a simpler space is done in a controlled manner. One such form of control is \emph{Lipschitz stability}: an invariant $\iota$ is \emph{Lipschitz-stable} if there exists a Lipschitz constant $L_{\iota}$ such that \[ d_{\mathcal{I}}(\iota(X),\iota(Y)) \leq L_{\iota} \cdot \dnp(X,Y), \tag*{for all $X,Y \in \mathcal{N}.$}\] In Section \ref{sec:lip-stable}, we present Lipschitz-stable invariants. In Section \ref{sec:int-stable}, we present a different notion of control that we refer to as \emph{interleaving stability} as well as associated invariants. \begin{remark} Asymmetry arises in a significant way in this section: for most of our network invariants, we obtain ``outgoing" and ``incoming" versions, based on our choice of functions $\omega_X(x,\cdot)$ or $\omega_X(\cdot,x)$. The network interpretation can be framed in terms of hubs (nodes with high outgoing edge weights) and authorities (nodes with high incoming edge weights) \cite{kleinberg1999authoritative}. \end{remark} \subsection{A hierarchy of lower bounds for $\dnp$} \label{sec:lip-stable} Following \cite{dgh-sm,dghlp}, we now produce a hierarchy of lower bounds for $\dnp$, namely the First Lower Bound (FLB), Second Lower Bound (SLB), and Third Lower Bound (TLB). These are obtained by linearizing the GW objective and/or pushing forward the problem into the real line. Each of these bounds itself has an associated pushforward into the real line, which we denote by adding a prefix $\mathbb{R}$-. Because we are in the asymmetric setting, the FLB, TLB, and their $\mathbb{R}$-versions decouple into ``incoming" and ``outgoing" versions. In Remark \ref{rem:conn-lb-invar}, we will show (using Theorem \ref{thm:stab-push}) that these lower bounds are in fact obtained as Lipschitz stability conditions on certain network invariants. The hierarchy is illustrated in the following diagram, where the arrows indicate (possibly non-strictly) decreasing complexity. \begin{center} \begin{tikzpicture} \node (size) at (-3,0){$\operatorname{size}$}; \node (FLB) at (0,0){FLB}; \node (TLB) at (3,0){TLB}; \node (GW) at (6,0){GW}; \node (SLB) at (9,0){SLB}; \node (rFLB) at (0,-1){$\mathbb{R}$-FLB}; \node (rTLB) at (3,-1){$\mathbb{R}$-TLB}; \node (rSLB) at (9,-1){$\mathbb{R}$-SLB}; \draw (GW) edge[->] (SLB); \draw (GW) edge[->] (TLB); \draw (TLB) edge[->] (rTLB); \draw (FLB) edge[->] (rFLB); \draw (SLB) edge[->] (rSLB); \draw (TLB) edge[->] (FLB); \draw (FLB) edge[->] (size); \end{tikzpicture} \end{center} We now derive these relationships. Let $p\in [1,\infty]$. Start by fixing one pair of coordinates in the $\dnp$ integrand. Then we obtain the \emph{(outgoing) joint eccentricity function} $\operatorname{ecc}^{\operatorname{out}}_{p,X,Y}:X\times Y \r \mathbb{R}_+$ defined by \begin{align} \operatorname{ecc}^{\operatorname{out}}_{p,X,Y}(s,t):= \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)}\left\| \omega_X(s,\cdot) - \omega_Y(t,\cdot)\right\|_{L^p(\mu)}, \qquad (s,t) \in X\times Y. \tag{JE} \label{eq:JE} \end{align} Note that $\omega_X(s,\cdot)$ and $\omega_Y(t,\cdot)$ are both measurable \cite[Proposition 2.34]{folland1999real}. Switching the arguments above produces the \emph{incoming joint eccentricity function}. Taking the norm of an individual term gives the \emph{(outgoing) eccentricity function} $\operatorname{ecc}^{\operatorname{out}}_{p,X}:X \r \mathbb{R}_+$: \begin{align} \operatorname{ecc}^{\operatorname{out}}_{p,X}(s):= \left\| \omega_X(s,\cdot) \right\|_{L^p(\mu_X)}, \qquad s \in X. \tag{E} \label{eq:E} \end{align} Flipping the arguments above produces the \emph{incoming eccentricity function}. The norm of the preceding function is the \emph{$p$th $\operatorname{size}$ function} $\operatorname{size}_p : \mathcal{N} \r \mathbb{R}_+$: \begin{align} \operatorname{size}_p(X):= \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X} \right\|_{L^p(\mu_X)} = \left\| \omega_X \right\|_{L^p(\mu_X \otimes \mu_X)}. \tag{Sz} \label{eq:Sz} \end{align} The size function is easily seen to be a network invariant: it compresses all the information in a network into a single real number. Theorem \ref{thm:stab-push} below shows that this compression occurs in a quantitatively stable manner. Notice that $\operatorname{size}_p$ can be computed exactly via a formula, and this computation is extremely cheap. Despite its simplicity, it can be very helpful as a first step in comparing networks. From a procedural perspective, given a network comparison task, one could compute $\operatorname{size}_p$ for different networks and compare these values to gain a coarse understanding of the discrepancies between the networks. A priori, the connections between Equations (\ref{eq:E}) and (\ref{eq:JE}) to network invariants are somewhat unclear. We will use Theorem \ref{thm:stab-push} to clarify these connections in Remark \ref{rem:conn-lb-invar}, but we present the statements now for convenience. It will turn out that the invariant associated to Equation (\ref{eq:E}) is the map that takes a network $X$ to the distribution $( \operatorname{ecc}^{\operatorname{out}}_{p,X})_*\mu_X$ over $\mathbb{R}$. The metric between distributions will be taken to be $W_p$, i.e. the codomain of this invariant is $(\operatorname{Prob}(\mathbb{R}), W_p)$. Next, the invariant associated to Equation (\ref{eq:JE}) will turn out to be the map that takes $X$ to the distribution over distributions of $\omega_X(x,\cdot)$. Specifically, it will be the pushforward of $\mu_X$ under the map $x \mapsto \omega_X(x,\cdot)_*\mu_X $. The codomain of this invariant will be $(\operatorname{Prob}(\operatorname{Prob}(\mathbb{R})), W_p)$, where the ground metric on $\operatorname{Prob}(\mathbb{R})$ is also taken to be $W_p$. As a related construction, we note that given any $(X,\omega_X,\mu_X)$, taking a pushforward of $\mu_X^{\otimes 2}$ via $\omega_X$ yields a distribution over $\mathbb{R}$. This produces yet another invariant whose codomain is $(\operatorname{Prob}(\mathbb{R}), W_p)$. \begin{remark}[Local and global invariants] Let $(X,\omega_X,\mu_X \in \mathcal{N}$. Both the $\operatorname{size}_p$ and $(\omega_X)_*(\mu_X \otimes \mu_X)$ invariants are examples of \emph{global} invariants, in the sense that they incorporate data from the network without any reference to particular nodes in the network. In contrast, $(\operatorname{ecc}^{\operatorname{out}}_{p,X})_*\mu_X$ and $(x \mapsto \omega_X(x,\cdot)_*\mu_X)_*\mu_X$ incorporate information at the level of individual nodes within the network, and constitute examples of \emph{local} invariants. \end{remark} We now state the main theorem of this section, which provides a hierarchy of lower bounds for $\dnp$. \begin{theorem}[Hierarchy of lower bounds] \label{thm:stab-push} Let $(X,\omega_X,\mu_X), (Y,\omega_Y,\mu_Y) \in \mathcal{N}$, and let $p\in [1,\infty]$. Let $C:X\times Y \r \mathbb{R}$ denote a cost matrix with entries $C(x,y) := W_p \left( \omega_X(x,\cdot)_*\mu_X, \omega_Y(y,\cdot)_*\mu_Y \right)$. Then we have the following statements about Lipschitz stability, for $p \in [1,\infty]$: \begin{align} 2\dnp(X,Y) &= \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)}\dis_p(\mu) = \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| \omega_X - \omega_Y \right\|_{L^p(\mu^{\otimes 2})} \nonumber\\ &\geq \inf_{\mu,\nu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| \omega_X - \omega_Y \right\|_{L^p(\nu \otimes \mu)} \nonumber\\ & \hspace{1.5in} = \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X,Y} \right\|_{L^p(\mu)} \label{inv:TLB} \tag{TLB}\\ & \hspace{1.5in}= \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| C \right\|_{L^p(\mu)} \label{inv:RTLB} \tag{$\mathbb{R}$-TLB}\\ & \geq \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)}\left\| \operatorname{ecc}^{\operatorname{out}}_{p,X} - \operatorname{ecc}^{\operatorname{out}}_{p,Y} \right\|_{L^p(\mu)} \label{inv:FLB} \tag{FLB}\\ & \hspace{1.5in} =W_p\left( (\operatorname{ecc}^{\operatorname{out}}_{p,X})_*\mu_X, (\operatorname{ecc}^{\operatorname{out}}_{p,Y})_*\mu_Y \right). \label{inv:RFLB} \tag{$\mathbb{R}$-FLB} \\ &\geq \left| \operatorname{size}_p(X) - \operatorname{size}_p(Y) \right| \label{inv:SzLB} \tag{SzLB}\\ 2\dnp(X,Y) &\geq \inf \left \{\left\| \omega_X - \omega_Y \right\|_{L^p(\mu)} : \mu \in \mathscr{C}(\mu_X^{\otimes 2}, \mu_Y^{\otimes 2}) \right \} \tag{SLB} \label{inv:SLB} \\ &= W_p \left( (\omega_X)_*\mu_X^{\otimes 2}, (\omega_Y)_*\mu_Y^{\otimes 2} \right). \tag{$\mathbb{R}$-SLB} \label{inv:RSLB} \end{align} Moreover, analogous bounds hold for the $\operatorname{ecc}^{\operatorname{in}}$ variants as well. \end{theorem} \begin{remark} The inequalities in Theorem \ref{thm:stab-push} appeared in the context of metric measure spaces as the First, Second, and Third Lower Bounds and their pushforwards in \cite{dgh-sm}. In the asymmetric context of the current paper, we obtain outgoing/incoming versions of the (\ref{inv:TLB}) and (\ref{inv:FLB}) inequalities. The main development of the current paper is that we have equalities (\ref{inv:FLB})=(\ref{inv:RFLB}), (\ref{inv:SLB})=(\ref{inv:RSLB}), and (\ref{inv:TLB})=(\ref{inv:RTLB}). The equality (\ref{inv:TLB})=(\ref{inv:RTLB}) is especially important. A priori, each computation of $\operatorname{ecc}^{\operatorname{out}}_{p,X,Y}(x,y)$ involves an OT problem that can be solved via linear programming methods. The equality (\ref{inv:TLB})=(\ref{inv:RTLB}) shows that this quantity is actually equal to the solution of an OT problem over the real line, which has a closed form solution. Finally we note that in the discrete case, all of the aforementioned equalities follow from \cite[Proposition 4.5]{schmitzer2013modelling}. The current theorem proves the equalities in the general setting. \end{remark} \begin{remark}[Connecting lower bounds to network invariants] \label{rem:conn-lb-invar} The (\ref{inv:TLB}) lower bound arises by solving an OT problem with Equation (\ref{eq:JE}) as a cost matrix, and the (\ref{inv:FLB}) lower bound arises by solving an OT problem with a difference of terms described by Equation (\ref{eq:E}) as a cost matrix. By virtue of the equalities (\ref{inv:FLB})=(\ref{inv:RFLB}), (\ref{inv:SLB})=(\ref{inv:RSLB}), and (\ref{inv:TLB})=(\ref{inv:RTLB}), these lower bounds arise precisely as Lipschitz stability conditions on the network invariants described prior to the statement of Theorem \ref{thm:stab-push}. \end{remark} Before proving Theorem \ref{thm:stab-push}, we introduce some terminology from \cite[\S14A]{kechris1995classical}. A subset $A$ of a Polish space $X$ is \emph{analytic} if it is the continuous image of a Polish space $Y$. Equivalently, $A$ is analytic if there exists a Polish space $Y$ and a Borel subset $B\subseteq X\times Y$ such that $A = \pi_X(B)$, where $\pi_X$ is the canonical projection. Any Borel measurable map $f:X \r Y$, where $Y$ is Polish, maps analytic sets to analytic sets \cite[Proposition 14.4]{kechris1995classical}. \begin{lemma}[Lemma 2.2, \cite{varadarajan1963groups}] \label{lem:pushforward-analytic} Let $X,Y$ be analytic subsets of Polish spaces equipped with the relative Borel $\sigma$-fields. Let $f:X \r Y$ be a surjective, Borel-measurable map. Then for any $\nu \in \operatorname{Prob}(Y)$, there exists $\mu \in \operatorname{Prob}(X)$ such that $\nu = f_*\mu$. \end{lemma} The next lemma states that pushforwards of couplings are exactly the couplings between the pushforwards. This was shown in the special case of discrete spaces in \cite[Proposition 4.5]{schmitzer2013modelling}. \begin{lemma} \label{lem:distrib-invar} Let $X,Y$ be Polish, and let $f:X \r \mathbb{R}$ and $g: Y \r \mathbb{R}$ be measurable. Let $T:X\times Y \r \mathbb{R}^2$ be the map $(x,y) \mapsto (f(x),g(y))$. Then we have: \begin{align} T_*\mathscr{C}(\mu_X,\mu_Y) &= \mathscr{C}(f_*\mu_X,g_*\mu_Y). \label{eq:push-coupling} \intertext{ Consequently, we have:} W_p( f_*\mu_X, g_*\mu_Y) &= \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| f - g \right\|_{L^p(\mu)}. \label{eq:push-coupling-eq} \end{align} \end{lemma} \begin{proof}[Proof of Lemma \ref{lem:distrib-invar}] Let $\mu \in \mathscr{C}(\mu_X,\mu_Y)$. It is standard \cite[7.1.6]{ambrosio2008gradient} that $T_*\mu \in \mathscr{C}(f_*\mu_X,g_*\mu_Y)$, and hence $W_p( f_*\mu_X, g_*\mu_Y) \leq \left\| f - g \right\|_{L^p(\mu)}.$ For the ``$\supseteq$" containment of Equation (\ref{eq:push-coupling}), let $\nu \in \mathscr{C}(f_*\mu_X, g_*\mu_Y)$. The map $T = (f,g)$ is measurable because $f$, $g$ are measurable. Next note that $X\times Y$ is Polish and hence analytic. Because $X\times Y$ is analytic and $T:X\times Y \r \mathbb{R}^2$ is a measurable map between Polish spaces, the image $T(X\times Y)$ is analytic \cite[Proposition 14.4]{kechris1995classical}. The map $T:X\times Y \r T(X\times Y)$ is surjective by construction. Then Lemma \ref{lem:pushforward-analytic} applies to the map $T:X\times Y \r T(X\times Y)$ and the restriction $\nu |_{T(X\times Y)} \in \operatorname{Prob}(T(X\times Y))$. Thus we obtain $\sigma \in \mathscr{C}(\mu_X,\mu_Y)$ such that $T_*\sigma = \nu |_{T(X\times Y)}$. Finally note that $\nu$ is completely determined by its restriction to $T(X\times Y)$: for any $Z \in \borel(\mathbb{R}^2)$, we have $\nu(Z) = \nu(Z\cap T(X\times Y))$. Since $\nu |_{T(X\times Y)}$ determines $\nu$, the existence of $\sigma$ such that $T_*\sigma = \nu |_{T(X\times Y)}$ suffices to show the $\supseteq$ containment. The equality $W_p( f_*\mu_X, g_*\mu_Y) = \left\| f - g \right\|_{L^p(\mu)}$ follows immediately. For Equation (\ref{eq:push-coupling-eq}), note that by a change of variables we have ($d_\mathbb{R}$ is just the standard distance on $\mathbb{R}$): \[ \left\| d_\mathbb{R} \right\|_{L^p(T_*\mu)} = \left\| f - g \right\|_{L^p(\mu)}\] Let $\nu \in \mathscr{C}(f_*\mu_X, g_*\mu_Y)$. By the preceding work, $\nu = T_*\sigma$ for some $\sigma \in \mathscr{C}(\mu_X,\mu_Y)$. Hence we have: \[W_p( f_*\mu_X, g_*\mu_Y) = \inf_{\nu \in \mathscr{C}(f_*\mu_X, g_*\mu_Y)} \left\| d_\mathbb{R} \right\|_{L^p(\nu)} = \inf_{\mu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| f - g \right\|_{L^p(\mu)}. \qedhere\] \end{proof} \begin{proof}[Proof of Theorem \ref{thm:stab-push}] Inequality (\ref{inv:TLB}) holds because $\nu$ is allowed to vary and thus we infimize over a larger set. Next fix $(x,y) \in X\times Y$. Applying Lemma \ref{lem:distrib-invar} Equation (\ref{eq:push-coupling-eq}), we have \[ C(x,y) = W_p\left( \omega_X(x,\cdot)_*\mu_X, \omega_Y(y,\cdot)_*\mu_Y \right) = \inf_{\nu \in \mathscr{C}(\mu_X,\mu_Y)} \left\| \omega_X(x,\cdot) - \omega_Y(y,\cdot) \right\|_{L^p(\nu)} = \operatorname{ecc}^{\operatorname{out}}_{p,X,Y}(x,y).\] This proves (\ref{inv:TLB})=(\ref{inv:RTLB}). Next, for any $\nu \in \mathscr{C}(\mu_X,\mu_Y)$, we have by Minkowski's inequality: \[\left\| \omega_X(x,\cdot) - \omega_Y(y,\cdot) \right\|_{L^p(\nu)} \geq \left| \left\| \omega_X(x,\cdot) \right\|_{L^p(\nu)} - \left\| \omega_Y(y,\cdot) \right\|_{L^p(\nu)} \right| = \left| \operatorname{ecc}^{\operatorname{out}}_{p,X}(x) - \operatorname{ecc}^{\operatorname{out}}_{p,Y}(y) \right|\] This shows (\ref{inv:TLB})$\geq$(\ref{inv:FLB}). The equality (\ref{inv:FLB})=(\ref{inv:RFLB}) follows by another application of Lemma \ref{lem:distrib-invar}. Next, for any $\mu \in \mathscr{C}(\mu_X,\mu_Y)$, another application of Minkowski's inequality yields: \[ \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X} - \operatorname{ecc}^{\operatorname{out}}_{p,Y} \right\|_{L^p(\mu)} \geq \left| \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X} \right\|_{L^p(\mu)} - \left\| \operatorname{ecc}^{\operatorname{out}}_{p,Y} \right\|_{L^p(\mu)} \right| = \left| \operatorname{size}_p(X) - \operatorname{size}_p(Y) \right|.\] This shows (\ref{inv:FLB})$\geq$(\ref{inv:SzLB}). Finally for (\ref{inv:SLB}), let $\mu$ denote the minimizer of $\dis_p$ (invoking Theorem \ref{thm:opt-coup}) and define $\sigma:= \mu \otimes \mu$. Then $\sigma \in \mathscr{C}(\mu_X^{\otimes 2}, \mu_Y^{\otimes 2})$. Hence \[ 2\dnp(X,Y) = \left\| \omega_X - \omega_Y \right\|_{L^p(\mu\otimes \mu)} = \left\| \omega_X - \omega_Y \right\|_{L^p(\sigma)} \geq \inf_{\nu \in \mathscr{C}(\mu_X^{\otimes 2}, \mu_Y^{\otimes 2})} \left\| \omega_X - \omega_Y \right\|_{L^p(\nu)} .\] This shows (\ref{inv:SLB}). The equality (\ref{inv:SLB})=(\ref{inv:RSLB}) follows by applying Lemma \ref{lem:distrib-invar} Equation (\ref{eq:push-coupling-eq}) with $f = \omega_X$ and $g = \omega_Y$. \qedhere \end{proof} \subsection{Interleaving stable invariants} \label{sec:int-stable} We now present a novel family of invariants that satisfies a different type of stability. Let $(X,\omega_X,\mu_X) \in \mathcal{N}$, and let $p \in [1,\infty]$. For each $t \in \mathbb{R}$ and $x \in X$, define the quantity \[ \operatorname{ecc}^{\operatorname{out}}_{p,X}(x,t) := \left\| \omega_X(x,\cdot) \mathbf{1}_{ \{\omega_X(x,\cdot) \leq t\}} \right\|_{L^p(\mu_X)}.\] This is an overload of notation, but the meaning should be clear from the presence of the second parameter. Note that $\{\omega_X(x,\cdot) \leq t \}$ is measurable, and so $\mathbf{1}_{ \{\omega_X(x,\cdot) \leq t\}}$ is measurable. Hence the integral is well-defined. \begin{remark} For a metric space $(X,d_X,\mu_X)$, the quantity $\left\| \mathbf{1}_{ \{d_X(x,\cdot) \leq t\}} \right\|^p_{L^p(\mu_X)}$ is just the measure of the ball of radius $t$ centered at $x$. \end{remark} Next, the $p$th \emph{sublevel} size function is defined for each $(X,\omega_X,\mu_X) \in \mathcal{N}$ and $t \in \mathbb{R}$ by writing \begin{align} \operatorname{subSize}_{p,t}(X) = \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X}(\cdot,t) \right\|_{L^p(\mu_X)}. \tag{subSz} \label{eq:subSz} \end{align} This function is a network invariant. Note that by the Fubini-Tonelli theorem, we can also write $\operatorname{subSize}_{p,t}(X) = \left\| \omega_X \mathbf{1}_{ \{\omega_X \leq t \} } \right\|_{L^p(\mu_X \otimes \mu_X)}$. Both formulations are used below. \begin{example} In \cite[Example 5.7]{dghlp}, it was shown that the \emph{$1$-diameter} invariant (referred to as $\operatorname{size}_1$ in this paper) does not discriminate between spheres of different dimensions. Specifically, it was shown that \[ \operatorname{size}_1(\mathbb{S}^n) = \frac{\pi}{2} \tag*{for any $n \in \mathbb{N}.$}\] We now show via explicit computations that the map $t \mapsto \operatorname{subSize}_{1,t}$ does distinguish between spheres. For each $n \in \mathbb{N}$, let $\mathbb{S}^n$ denote the $n$-sphere with the geodesic metric and normalized volume measure. For each $n \in \mathbb{N}$, let $S_n$ denote the surface area of $\mathbb{S}^n$. We have: \[S_1 = 2\pi, \, S_2 = 4\pi,\, S_3 = 2\pi^2, \, S_4 = \frac{8}{3}\pi^2.\] The following formula gives $\operatorname{subSize}$ for $\mathbb{S}^n$, $n \in \mathbb{N}$. \begin{proposition} \label{prop:p-subdiam} Fix $p \in [1,\infty)$. Let $n \in \mathbb{N}$, $n \geq 2$, and $0 \leq t \leq \pi$. Then, \[\operatorname{subSize}_{p,t}(\mathbb{S}^n)^p = \frac{S_{n-1}}{S_n}\int_0^t \varphi^p \sin^{n-1}(\varphi)\, d\varphi. \] For $n = 1$, we have: \[\operatorname{subSize}_{p,t}(\mathbb{S}^1)^p = \frac{t^{p+1}}{(p+1)\pi}. \] \end{proposition} By applying this result, we obtain $\operatorname{subSize}_{1,t}(\mathbb{S}^1) = \frac{t^2}{2\pi}$ and $\operatorname{subSize}_{1,t}(\mathbb{S}^2) = \frac{\sin(t) - t\cos(t)}{2}$, where $0 \leq t \leq \pi$. Plots of these functions are provided in Figure \ref{fig:s1-s2}. Note that by having access to the functions, instead of just the function values at $t = \pi$ (which corresponds to the prior $\operatorname{size}_1$ result of \cite[Example 5.7]{dghlp}), we are able to distinguish between spheres of different dimensions. An interesting consequence of the preceding result, along with the result that $\operatorname{size}_1(\mathbb{S}^n) = \frac{\pi}{2}$ for all $n \in \mathbb{N}$, is the following identity for $n \geq 2$: \begin{align} \frac{S_{n-1}}{S_n} \int_{0}^\pi \varphi \sin^{n-1}(\varphi) \,d\varphi = \frac{\pi}{2}. \end{align} In particular, this identity and the formula in Proposition \ref{prop:p-subdiam} explain why the 1-diameter (i.e. $\operatorname{size}_1$) cannot distinguish between spheres, and why $\operatorname{subSize}_{1,t}$ is able to do so. \begin{proof}[Proof of Proposition \ref{prop:p-subdiam}] Let $n = 1$. We obtain the formula as a line integral. Let $r(\theta) = (\cos \theta, \sin \theta)$ be a parametrization of the circle, where $\theta \in [0,2\pi)$. Using symmetry, we have the following for $0 \leq t \leq \pi$: \begin{align*} \operatorname{subSize}_{p,t}(\mathbb{S}^1)^p = \frac{2}{S_1} \int_0^t \theta^p \| r'(\theta)\| \, d\theta = \frac{2}{S_1} \left. \frac{\theta^{p+1}}{p+1}\right\rvert_0^t = \frac{t^{p+1}}{(p+1)\pi}. \end{align*} Next let $n \geq 2$. In hyperspherical coordinates, the area element of $\mathbb{S}^n$ is given by \[ \sin^{n-1}(\varphi_1) \sin^{n-2}(\varphi_2)\cdots \sin(\varphi_{n-1}) \, d\varphi_1 d\varphi_2 \cdots d\varphi_{n},\] where the limits of integration are $[0,\pi]$ for $\varphi_1,\ldots, \varphi_{n-1}$, and $[0,2\pi]$ for $\varphi_n$. As an example, we have: \[ \operatorname{subSize}_{p,t}(\mathbb{S}^2)^p = \frac{1}{S_2} \int_0^{2\pi} \int_0^t \varphi_1^p\sin \varphi_1 \, d\varphi_1 d\varphi_2.\] Generalizing to larger values of $n$, we have: \begin{align*} \operatorname{subSize}_{p,t}(\mathbb{S}^n)^p &= \frac{1}{S_n} \int_{\varphi_n = 0}^{2\pi} \int_{\varphi_{n-1} = 0}^\pi \cdots \int_{\varphi_1 = 0}^t \varphi_1^p \, \sin^{n-1}(\varphi_1) \sin^{n-2}(\varphi_2) \cdots \sin (\varphi_{n-1}) \, d\varphi_1 d\varphi_2 \cdots d\varphi_n\\ &= \frac{S_{n-1}}{S_n} \int_{\varphi_1 = 0}^t \varphi_1^p \, \sin^{n-1}(\varphi_1) \, d\varphi_1. \qedhere \end{align*} \end{proof} \end{example} Having motivated $\operatorname{subSize}$ by at least a theoretical application, we now proceed to its stability. \begin{theorem}[Interleaving stability of $\operatorname{subSize}$] \label{thm:subsz-stab} Let $p\in [1,\infty]$, $t\in \mathbb{R}$ and let $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y) \in \mathcal{N}$. Define $\varepsilon:= \dgpzero(X,Y)$. Then we have the following interleaving stability: \begin{align*} \operatorname{subSize}_{p,t}(X) & \leq \varepsilon + \operatorname{subSize}_{p,t+\varepsilon}(Y),\\ \operatorname{subSize}_{p,t}(Y) & \leq \varepsilon + \operatorname{subSize}_{p,t+\varepsilon}(X). \end{align*} \end{theorem} \begin{proof} We show the first statement. Invoking Lemma \ref{lem:gp-gw}, we write $\varepsilon=d_{\mathcal{N} \!,\infty}(X,Y)$. Using Theorem \ref{thm:opt-coup}, let $\mu\in \mathscr{C}(\mu_X,\mu_Y)$ be an optimal coupling for which $d_{\mathcal{N} \!,\infty}(X,Y)=\varepsilon$ is achieved. Let $B:= \{(x,y,x',y') \in (X\times Y)^2 : \left| \omega_X(x,x') - \omega_Y(y,y') \right| \geq \varepsilon\}$. Let $G$ denote the complement of $B$, i.e. $G := \{(x,y,x',y') \in (X\times Y)^2 : \left| \omega_X(x,x') - \omega_Y(y,y') \right| < \varepsilon\}$. By the definition of $\varepsilon$, we have $\mu^{\otimes 2}(B) = 0$, and hence $\mu^{\otimes 2}(G) = 1$. Also define $H:= G \cap \left( \{\omega_X \leq t\} \times Y^2 \right)$. Then we have: \begin{align} \operatorname{subSize}_{p,t}(X) &= \left\| \operatorname{ecc}^{\operatorname{out}}_{p,X}(\cdot,t) \right\|_{L^p(\mu_X)} = \left\| \omega_X \mathbf{1}_{ \{\omega_X \leq t \} } \right\|_{L^p(\mu_X^{\otimes 2})} = \left\| \omega_X \mathbf{1}_{ \{\omega_X \leq t \} \times Y^2 } \right\|_{L^p(\mu^{\otimes 2})} \nonumber\\ &= \left\| \omega_X \mathbf{1}_{H} \right\|_{L^p(\mu^{\otimes 2})} = \left\| \left( \omega_X - \omega_Y + \omega_Y \right) \mathbf{1}_{H} \right\|_{L^p(\mu^{\otimes 2})} \nonumber \\ &\leq \left\| \left( \omega_X - \omega_Y \right) \mathbf{1}_H \right\|_{L^p(\mu^{\otimes 2})} + \left\| \omega_Y \mathbf{1}_{H} \right\|_{L^p(\mu^{\otimes 2})} \nonumber \\ & < \varepsilon + \left\| \omega_Y \mathbf{1}_{ \{ \omega_Y \leq t+\varepsilon \}} \right\|_{L^p(\mu_Y^{\otimes 2})} = \varepsilon + \operatorname{subSize}_{p,t+\varepsilon}(Y). \label{eq:subsz-1} \end{align} Here the third equality holds because $\mu$ is a coupling measure, and the fourth equality holds because $\mu^{\otimes 2}(G) = 1$. The first inequality holds by Minkowski's inequality. The first part of the second inequality holds because $|\omega_X(x,x') - \omega_Y(y,y)| < \varepsilon$ on $H$, and the second part holds because $\omega_Y(y,y') \leq \omega_X(x,x') + \varepsilon \leq t+\varepsilon$ on $H$. Finally note that repeating the argument with the roles of $X$ and $Y$ switched completes the proof. \end{proof} \begin{remark} While not applied in the current paper, we may also consider a \emph{superlevel} size function $\operatorname{sup}^w_{p,t}(X):= \left\| \omega_X \mathbf{1}_{\{\omega_X \geq t \}} \right\|_{L^p(\mu_X\otimes \mu_X)}$. In the setup of Theorem \ref{thm:subsz-stab}, this invariant satisfies the following interleaving stability: \begin{align*} \operatorname{sup}^w_{p,t}(X) &\leq \varepsilon + \operatorname{sup}^w_{p,t-\varepsilon}(Y) \\ \operatorname{sup}^w_{p,t}(Y) &\leq \varepsilon + \operatorname{sup}^w_{p,t-\varepsilon}(X). \end{align*} To see this, note that the proof of Theorem \ref{thm:subsz-stab} carries through until the step in Inequality (\ref{eq:subsz-1}). In this case, for any $(x,y,x',y') \in H$ we have $\omega_Y(y,y') > \omega_X(x,x') - \varepsilon \geq t - \varepsilon$, thus $\mathbf{1}_H$ reduces to $\mathbf{1}_{ \{ \omega_Y \geq t- \varepsilon\}}$. \end{remark} \subsubsection{Lower bounds for spheres} \label{sec:sphere-lbounds} Fix $n, m \in \mathbb{N}$. We now invoke Theorem \ref{thm:subsz-stab} to obtain lower bounds on $\dgpzero(\mathbb{S}^n,\mathbb{S}^m)$. The explicit value of $\dgpzero(\mathbb{S}^n,\mathbb{S}^m)$ is unknown in the existing literature, even for $n=1,\, m=2$. Consider the family $\mathfrak{F}:= \{ f:[0,\pi] \r \mathbb{R}_+ : f \text { increasing} \}.$ For each $f \in \mathfrak{F}$ and $\varepsilon \in [0,\pi]$, define $f^\varepsilon$ by writing, for each $t \in [0,\pi]$, \[f^\varepsilon(t) := \begin{cases} f(t+\varepsilon) + \varepsilon &: t+\varepsilon \in [0,\pi]\\ f(\pi) + \varepsilon &: \text{ otherwise.} \end{cases} \] Next define the \emph{interleaving distance} $d_{\operatorname{I}}$ on $\mathfrak{F}$ by writing, for each $f,g \in \mathfrak{F}$, \[ d_{\operatorname{I}}(f,g) := \inf\{ \varepsilon \geq 0 : f \leq g^\varepsilon \text{ and } g \leq f^\varepsilon\}.\] This $d_{\operatorname{I}}$ is a pseudometric on $\mathfrak{F}$. Next, for $p \in [1,\infty)$, Define $f_p,g_p:[0,\pi] \r \mathbb{R}$ by writing: \[ f_p(t):= \operatorname{subSize}_{p,t}(\mathbb{S}^n), \qquad g_p(t):= \operatorname{subSize}_{p,t}(\mathbb{S}^m) \tag*{for all $t \in [0,\pi].$}\] Define $\eta:= \dgpzero(\mathbb{S}^n, \mathbb{S}^m)$. Applying Theorem \ref{thm:subsz-stab}, we have $f_p \leq g_p^\eta$ and $g_p \leq f_p^\eta$. Thus $\dgpzero(\mathbb{S}^n,\mathbb{S}^m) \geq d_{\operatorname{I}}(f_p,g_p)$. Moreover, by the triangle inequality of $d_{\operatorname{I}}$, we have \[\dgpzero(\mathbb{S}^n,\mathbb{S}^m) \geq d_{\operatorname{I}}(f_p,g_p) \geq \left| d_{\operatorname{I}}(f_p,h) - d_{\operatorname{I}}(h,g_p) \right|,\] for arbitrary $h \in \mathfrak{F}$. In particular, setting $h \equiv 0$, we have $d_{\operatorname{I}}(f_p,h) = \operatorname{subSize}_{p,\pi}(\mathbb{S}^n) = \operatorname{size}_p(\mathbb{S}^n)$ and $d_{\operatorname{I}}(g_p,h) = \operatorname{subSize}_{p,\pi}(\mathbb{S}^m) = \operatorname{size}_p(\mathbb{S}^m)$. Thus we obtain a $\operatorname{size}_p$ bound: \[\dgpzero(\mathbb{S}^n, \mathbb{S}^m) \geq \left| \operatorname{size}_p(\mathbb{S}^n) - \operatorname{size}_p(\mathbb{S}^m) \right|.\] This bound can be easily improved using different choices of $h \in \mathfrak{F}$. Using the explicit formula of Proposition \ref{prop:p-subdiam}, we are able to computationally obtain lower bounds on $\dgpzero(\mathbb{S}^n, \mathbb{S}^m)$. Set $p=1$, $n=1$, and $m=2$. Then $f_1(t) = \frac{t^2}{2\pi}$ and $g_1(t) = \frac{\sin(t) - t\cos(t)}{2}$. Plots of $f_1$ and $g_1$ are shown in Figure \ref{fig:s1-s2}. Through Matlab simulations, we find $\dgpzero(\mathbb{S}^1, \mathbb{S}^2) = d_{\mathcal{N} \!,\infty}(\mathbb{S}^1,\mathbb{S}^2) \geq d_{\operatorname{I}}(f_1,g_1) \geq \mathbf{0.17}$. To contrast this with a previously known lower bound, we refer to \cite[Remark 5.16]{dghlp}, where the lower bound $\dnt(\mathbb{S}^1,\mathbb{S}^2) \geq 0.0503$ was obtained. Because $d_{\mathcal{N} \!,\infty} \geq \dnt$, this previously known lower bound yields $d_{\mathcal{N} \!,\infty}(\mathbb{S}^1,\mathbb{S}^2) \geq 0.0503$. Our new lower bound of $0.17$ improves this threefold. \begin{figure} \centering \begin{minipage}[t]{0.35\textwidth} \includegraphics[width=\textwidth]{figs/S1-S2.pdf} \end{minipage} \begin{minipage}[t]{0.35\textwidth} \includegraphics[width=\textwidth]{figs/S1-S2-shift.pdf} \end{minipage} \caption{\textbf{Left:} Plots of $f_1$ and $g_1$ as described in \S\ref{sec:sphere-lbounds}. \textbf{Right:} Plots of $f_1,\, g_1,$ and a shifted version of $f_1$.} \label{fig:s1-s2} \end{figure} \section{Experiments} \label{sec:exp} \subsection{Computational aspects} Numerical experiments in \cite{dgh-sm, hendrikson} involved using an alternate optimization procedure to estimate a local minimum of the GW objective. The methods in \cite{s16, pcs16} used an entropically regularized GW objective (ERGW) which led to fast algorithms. These methods remain valid in the setting of (possibly asymmetric) networks. To complement the existing literature, in this section we present the use of the (\ref{inv:TLB}) lower bound to compute dissimilarities between asymmetric networks. By virtue of the equality (\ref{inv:TLB})=(\ref{inv:RTLB}), this lower bound can be computed by solving a single general OT problem over a cost matrix obtained by solving OT problems over the real line. This is practical because OT problems over $\mathbb{R}$ have closed form solutions, with the caveat that computing all these OT problems is still the main bottleneck in computations. In comparable demonstrations, the ERGW of \cite{pcs16} is orders of magnitude faster, but a standard warning about ERGW is that it is prone to numerical infeasibility issues (see Appendix \ref{sec:computation}). For networks of several hundred nodes, the (\ref{inv:RTLB}) can be computed exactly at reasonable speed, i.e in less than a minute in Matlab on a 2.3 GHz Intel i5 CPU with 8 GB memory. Our experiments show that (\ref{inv:RTLB}) works well in discriminating networks. Next we review the formula for computing OT over $\mathbb{R}$ (see \cite[Remark 2.19]{villani2003topics}) . Let networks $(X,\omega_X,\mu_X)$, $(Y,\omega_Y,\mu_Y)$ and measurable functions $f:X \r \mathbb{R}$, $g:Y \r \mathbb{R}$ be given. In the $\operatorname{ecc}^{\operatorname{out}}$ setting, $f = \omega_X(x,\cdot)_*\mu_X$ and $g = \omega_Y(y,\cdot)_*\mu_Y$. Then let $F, G: \mathbb{R} \r [0,1]$ denote the cumulative distribution functions of $f$ and $g$: \begin{align*} F(t) := \mu_X( \{x \in X: f(x) \leq t\}), \qquad G(t):= \mu_Y( \{y \in Y : g(y) \leq t \}). \end{align*} The generalized inverses $F^{-1}:[0,1] \r \mathbb{R}$, $G^{-1}:[0,1] \r \mathbb{R}$ are given as: \begin{align*} F^{-1}(t) := \inf\{ u \in \mathbb{R} : F(u) \geq t\}, \qquad G^{-1}(t) := \inf\{ u \in \mathbb{R} : G(u) \geq t\}. \end{align*} Then for $p \geq 1$, one has: \begin{align} \inf_{\mu \in \mathscr{C}(f_*\mu_X, g_*\mu_Y)} \int_{\mathbb{R} \times \mathbb{R}} |a - b|^p \, d\mu(a,b) = \int_0^1 | F^{-1}(t) - G^{-1}(t) |^p \, d t. \label{eq:OT-R} \end{align} For $p = 1$, one obtains a reformulation that incurs lower computational cost, at least in a naive implementation: \begin{align} \inf_{\mu \in \mathscr{C}(f_*\mu_X, g_*\mu_Y)} \int_{\mathbb{R} \times \mathbb{R}} |a - b| \, d\mu(a,b) = \int_{\mathbb{R}} | F(t) - G(t) | \, d t. \label{eq:OT-R-p1} \end{align} In our experiments, we computed both the $\operatorname{ecc}^{\operatorname{out}}$ and $\operatorname{ecc}^{\operatorname{in}}$ versions of (\ref{inv:RTLB}) and take their maximum as the lower bound. All computations were done for $p=2$. For Wasserstein distance computations, we used the \texttt{mexEMD} code accompanying \cite{pcs16}. Our code and data are available on \url{https://github.com/samirchowdhury/GWnets}. In a prior version of this paper, before the equality (\ref{inv:TLB})=(\ref{inv:RTLB}) was proved in full generality, we were faced with the problem of solving an ensemble of OT problems over the space $X\times Y$. At the time, we resorted to using entropic regularization to compute the (\ref{inv:TLB}) in a reasonable amount of time. A priori this could also have been done by directly solving the associated linear programs, using e.g. \texttt{mexEMD}. While entropic regularization is not used in the current paper, we briefly report on these prior approaches in Appendix \ref{sec:computation}. \subsection{The network stochastic block model} \label{sec:sbm-net} We now describe a generative model for random networks, based on the popular stochastic block model for sampling random graphs \cite{abbe2017community}. The current network SBM model we describe is a composition of Gaussian distributions. However, the construction can be adjusted easily to work with other distributions. Fix a number of \emph{communities} $N \in \mathbb{N}$. For $1\leq i,j \leq N$, fix a mean $\mu_{ij}$ and a variance $\sigma^2_{ij}$. This collection $\mathcal{G}:= \{\mathcal{N}(\mu_{ij},\sigma^2_{ij}) : 1\leq i,j\leq N \}$ of $N^2$ independent Gaussian distributions comprise the network SBM. To sample a random network $(X,\omega_X)$ of $n$ nodes from this SBM, start by fixing $n_i \in \mathbb{N}, 1\leq i \leq N$ such that $\sum_i n_i = n$. For $1\leq i \leq N$, let $X_i$ be a set with $n_i$ points. Define $X:= \cup_{i=1}^n X_i$. Next sample each node weight as $\omega_X(x,x') \sim \mathcal{N}(\mu_{ij},\sigma^2_{ij})$, where $x \in X_i$ and $x' \in X_j$. Finally, the pair $(X,\omega_X)$ is equipped with the uniform measure $\mu_X$ that assigns a mass of $1/n$ to each point. We now describe the specifics of two experiments on clustering a collection of network SBMs. \subsection{Experiment: SBMs from cycle networks.} \label{sec:exp-sbm-community} Let $N \in \mathbb{N}$, and let $v=[v_1,\ldots, v_N]$ be an $N\times 1$ vector. Define the right-shift operator $\rho$ by $\rho([v_1,\ldots,v_N]) = [v_N,v_1,\ldots, v_{N-1}]$. The \emph{cycle network} $G_N(v)$ is defined to be the $N$-node network whose weight matrix is given by $[v^T, \rho(v)^T, (\rho^2(v))^T,\ldots, (\rho^{N-1}(v))^T]$. The cycle network definition appears elsewhere in the literature, see e.g. \cite{pph}. An illustration is provided in Figure \ref{fig:cyc6}. \begin{figure} \begin{center} \begin{tikzpicture}[every node/.style={font=\footnotesize}] \begin{scope}[draw] \node[circle,draw](1) at (-1,1.5){$x_1$}; \node[circle,draw](2) at (1,1.5){$x_2$}; \node[circle,draw](3) at (1.75,0){$x_3$}; \node[circle,draw](4) at (1,-1.5){$x_4$}; \node[circle,draw](5) at (-1,-1.5){$x_5$}; \node[circle,draw](6) at (-1.75,0){$x_6$}; \end{scope} \begin{scope}[draw] \path[->] (1) edge [bend left=20] node[above,pos=0.5]{$1$} (2); \path[->] (2) edge [bend left=20] node[above right,pos=0.5]{$1$} (3); \path[->] (3) edge [bend left=20] node[below right,pos=0.5]{$1$} (4); \path[->] (4) edge [bend left=20] node[above,pos=0.5]{$1$} (5); \path[->] (5) edge [bend left=20] node[below left,pos=0.5]{$1$} (6); \path[->] (6) edge [bend left=20] node[above left,pos=0.5]{$1$} (1); \end{scope} \begin{scope}[xshift=6cm] \draw[step=0.5cm,color=gray] (-1.5,-1.5) grid (1.5,1.5); \node at (-1.25,+1.75) {$x_1$}; \node at (-0.75,+1.75) {$x_2$}; \node at (-0.25,+1.75) {$x_3$}; \node at (+0.25,+1.75) {$x_4$}; \node at (+0.75,+1.75) {$x_5$}; \node at (+1.25,+1.75) {$x_6$}; \node at (-1.75,+1.25) {$x_1$}; \node at (-1.75,+0.75) {$x_2$}; \node at (-1.75,+0.25) {$x_3$}; \node at (-1.75,-0.25) {$x_4$}; \node at (-1.75,-0.75) {$x_5$}; \node at (-1.75,-1.25) {$x_6$}; \node at (-1.25,+1.25) {$0$}; \node at (-0.75,+1.25) {$1$}; \node at (-0.25,+1.25) {$2$}; \node at (+0.25,+1.25) {$3$}; \node at (+0.75,+1.25) {$4$}; \node at (+1.25,+1.25) {$5$}; \node at (-1.25,+0.75) {$5$}; \node at (-0.75,+0.75) {$0$}; \node at (-0.25,+0.75) {$1$}; \node at (+0.25,+0.75) {$2$}; \node at (+0.75,+0.75) {$3$}; \node at (+1.25,+0.75) {$4$}; \node at (-1.25,+0.25) {$4$}; \node at (-0.75,+0.25) {$5$}; \node at (-0.25,+0.25) {$0$}; \node at (+0.25,+0.25) {$1$}; \node at (+0.75,+0.25) {$2$}; \node at (+1.25,+0.25) {$3$}; \node at (-1.25,-0.25) {$3$}; \node at (-0.75,-0.25) {$4$}; \node at (-0.25,-0.25) {$5$}; \node at (+0.25,-0.25) {$0$}; \node at (+0.75,-0.25) {$1$}; \node at (+1.25,-0.25) {$2$}; \node at (-1.25,-0.75) {$2$}; \node at (-0.75,-0.75) {$3$}; \node at (-0.25,-0.75) {$4$}; \node at (+0.25,-0.75) {$5$}; \node at (+0.75,-0.75) {$0$}; \node at (+1.25,-0.75) {$1$}; \node at (-1.25,-1.25) {$1$}; \node at (-0.75,-1.25) {$2$}; \node at (-0.25,-1.25) {$3$}; \node at (+0.25,-1.25) {$4$}; \node at (+0.75,-1.25) {$5$}; \node at (+1.25,-1.25) {$0$}; \end{scope} \end{tikzpicture} \end{center} \caption{A cycle network on 6 nodes corresponding to the weight matrix obtained by right-shifting the vector $[0,1,2,3,4,5]^T$. Note that the weights are highly asymmetric.} \label{fig:cyc6} \end{figure} In our first experiment on network SBMs, we started with an $N\times 1$ vector of means $v$ and used this to generate $G_N(v)$. We then used $G_N(v)$ as the matrix of means. To keep the experiment simple, we fixed the matrix of variances to be the $N\times N$ matrix whose entries are all $5$s. We made 5 choices of $v$, and sampled 10 networks for each choice. The objective was then to see how well the (\ref{inv:RTLB}) could split the collection of 50 networks into 5 classes corresponding to the 5 different community structures. The different parameters used in our experiments are listed in Table \ref{tab:sbm-means}. \begin{table} \centering \begin{minipage}{0.45\linewidth} \tabcolsep=0.2cm \begin{tabular}{|c||c|c|c|} \hline Class \# & $N$ & $v$ & $n_i$ \\ \hline 1 & 5 & [0,25,50,75,100] & 10 \\ \hline 2 & 5 & [0,50,100,150, 200] & 10 \\ \hline 3 & 5 & [0,25,50,75,100] & 20 \\ \hline 4 & 2 & [0,100] & 25 \\ \hline 5 & 5 & [-100,-50,0,50,100] & 10\\ \hline \end{tabular} \end{minipage} \begin{minipage}{0.2\linewidth} \tabcolsep=0.15cm \begin{tabular}{c} Sample cycle network of means \end{tabular} \begin{tabular}{|c|c|c|c|c|} \hline 0 & 25 & 50 & 75 & 100 \\ \hline 100 & 0 & 25 & 50 & 75 \\ \hline 75 & 100 & 0 & 25 & 50\\ \hline 50 & 75 & 100 & 0 & 25 \\ \hline 25 & 50 & 75 & 100 & 0\\ \hline \end{tabular} \end{minipage} \medskip \caption{\textbf{Left:} The five classes of SBM networks corresponding to the experiment in \S\ref{sec:exp-sbm-community}. $N$ refers to the number of communities, $v$ refers to the vector that was used to compute a table of means via $G_5(v)$, and $n_i$ is the number of nodes in each community. \textbf{Right:} $G_5(v)$ for $v = [0,25,50,75,100]$.} \label{tab:sbm-means} \end{table} Class 1 is our reference; compared to this reference, class 2 differs in its edge weights, class 3 differs in the number of nodes in each community, class 4 differs in the number of communities, and class 5 differs by having a larger proportion of negative edge weights. The (\ref{inv:RTLB}) results in Figure \ref{fig:tlb-sbm-dissim} show that classes 1 and 3 are treated as being very similar, whereas the other classes are all mutually well-separated. This is consistent, because $\dn$ is not sensitive to the size of the networks (cf. Theorem \ref{thm:dnp-pseudo}). One interesting suggestion arising from this experiment is that the (\ref{inv:RTLB}) can be used for network simplification: given a family of networks which are all at low (\ref{inv:RTLB}) distance to each other, it may be reasonable to retain only the smallest network in the family as the ``minimal representative" network. \begin{figure} \centering \begin{minipage}[t]{0.45\textwidth} \includegraphics[width=\textwidth]{figs/sbm_tlb.pdf} \end{minipage} \begin{minipage}[t]{0.45\textwidth} \includegraphics[width=\textwidth]{figs/sbm_two_tlb.pdf} \end{minipage} \caption{\textbf{Left:} TLB dissimilarity matrix for SBM community networks in \S\ref{sec:exp-sbm-community}. Classes 1 and 3 are similar, even though networks in Class 3 have twice as many nodes as those in Class 1. Classes 2 and 5 are most dissimilar because of the large difference in their edge weights. Class 4 has a different number of communities than the others, and is dissimilar to Classes 1 and 3 even though all their edge weights are in comparable ranges. \textbf{Right:} (\ref{inv:RTLB}) dissimilarity matrix for two-community SBM networks in \S\ref{sec:exp-sbm-two}.} \label{fig:tlb-sbm-dissim} \end{figure} \subsection{Experiment: Two-community SBMs with sliding means} \label{sec:exp-sbm-two} \begin{table} \centering \begin{tabular}{|c||c|c|c|} \hline Class \# & $N$ & $v$ & $n_i$ \\ \hline 1 & 2 & [0,0] & 10 \\ \hline 2 & 2 & [0,5] & 10 \\ \hline 3 & 2 & [0,10] & 10 \\ \hline 4 & 2 & [0,15] & 10 \\ \hline 5 & 2 & [0,20] & 10\\ \hline \end{tabular} \medskip \caption{Two-community SBM networks as described in \S\ref{sec:exp-sbm-two}.} \label{tab:sbm-two} \end{table} Having understood the interaction of the (\ref{inv:RTLB}) with network community structure, we next investigated how the (\ref{inv:RTLB}) behaves with respect to edge weights. In our second experiment, we used a $2\times 1$ means vector $v$, and varied $v$ as $[0,0],[0,5],\ldots,[0,20]$ (see Table \ref{tab:sbm-two}). The SBM means were then given by $G_2(v)$ for the various choices of $v$. The variances were fixed to be the all 5s matrix. The edge weight histograms of the resulting SBM networks then looked like samples from two Gaussian distributions, with one of the Gaussians sliding away from the other. Finally, we normalized each network by its largest weight in absolute value, so that its normalized edge weights were in $[-1,1]$. The purpose of this experiment was to test the performance of (\ref{inv:RTLB}) on SBMs coming from a mixture of Gaussians. Note that normalization ensures that simpler invariants such as the $\operatorname{size}$ invariant would likely fail in this setting. The (\ref{inv:RTLB}) still performs reasonably well in this setting, as illustrated by the dissimilarity matrix in Figure \ref{fig:tlb-sbm-dissim}. The linear color gradient is consistent with the ``sliding means" network structure. \subsection{Experiment: Real migration networks} \label{sec:exp-migration} For an experiment involving real-world networks, we compared global bilateral migration networks produced by the World Bank \cite{worldbank, ozden2011earth}. The data consists of 10 networks, each having 225 nodes corresponding to countries/administrative regions. The $(i,j)$-th entry in each network is the number of people living in region $i$ who were born in region $j$. The 10 networks comprise such data for male and female populations in 1960, 1970, 1980, 1990, and 2000. When extracting the data, we removed the entries corresponding to refugee populations, the Channel Islands, the Isle of Man, Serbia, Montenegro, and Kosovo, because the data corresponding to these regions was incomplete/inconsistent across the database. We assigned uniform mass to the nodes. The result of applying the (\ref{inv:RTLB}) to this dataset is illustrated in Figure \ref{fig:tlb-migration}. To better understand the dissimilarity matrix, we also computed its single linkage dendrogram. The dendrogram suggests that between 1960 and 1970, both male and female populations had quite similar migration patterns. Within these years, however, migration patterns were more closely tied to gender. This effect is also seen between 1980 and 1990, although male migration in 1990 is more divergent. Finally, migration rates are similar for both male and female populations in 2000, and they are different from migration patterns in prior years. The labels in the dissimilarity matrix are as follows: 1-5 correspond to ``f-1960'' through ``f-2000'', and 6-10 correspond to ``m-1960'' through ``m-2000''. The color gradient in the dissimilarity matrix suggests that within each gender, migration patterns change in a way that is parametrized by time. This reflects the shifts in global technological and economical forces which make migration attractive and/or necessary with time. \begin{figure} \centering \begin{minipage}[t]{0.45\textwidth} \includegraphics[width=\textwidth]{figs/mig_tlb_mat.pdf} \end{minipage} \begin{minipage}[t]{0.45\textwidth} \includegraphics[width=\textwidth]{figs/mig_tlb_dendro.pdf} \end{minipage} \caption{Result of applying the (\ref{inv:RTLB}) to the migration networks in \S\ref{sec:exp-migration}. \textbf{Left:} Dissimilarity matrix. Nodes 1-5 correspond to female migration from 1960-2000, and nodes 6-10 correspond to male migration from 1960-2000. \textbf{Right:} Single linkage dendrogram. Notice that overall migration patterns change in time, but within a time period, migration patterns are grouped according to gender.} \label{fig:tlb-migration} \end{figure}
\section{INTRODUCTION} \label{sec:intro} The cosmic microwave background (CMB) has emerged as one of the most powerful probes of the early universe. Measurements of temperature anisotropies on the level of ten parts per million have brought cosmology into a precision era, and have placed tight constraints on the fundamental properties of the Universe\cite{Planck2018}. Beyond temperature anisotropies, CMB polarization anisotropies not only enrich our understanding of our cosmological model, but could potentially provide clues to the very beginning of the universe via the detection (or non-detection) of primordial gravitational waves. To provide a complete picture of cosmology, measurements at multiple frequencies of both large and small angular scales are important. This is the goal of the Simons Observatory (SO). SO will field a 6\,m diameter crossed Dragone\cite{Dragone1978} large aperture telescope (LAT) coupled to the large aperture telescope receiver (LATR) (Sec. \ref{sec:lat}). The LAT is designed to have a large field of view (FOV)\cite{Niemack2016,Parshley2018} (7.2$^\circ$ at 90 GHz) capable of supporting a cryostat with up to 19 tubes, each containing three lenses and a focal plane of detector arrays (henceforth optics tubes). To reduce the development risk of such a large cryostat, the LATR is designed with capacity for 13 optics tubes. During the initial deployment, we plan to populate seven optics tubes with three detector wafers in each for a total of over 30,000 detectors. Note that each optics tube could be upgraded to support four wafers for a $\sim$33\% increase in the number of detectors per optics tube. With this upgrade and the deployment of 19 optics tubes, the LAT focal plane could support roughly 125,000 detectors at 90/150\,GHz. SO will also deploy an array of 42 cm aperture small aperture telescopes (SATs) with seven detector wafers in each coupled to over 30,000 detectors (Sec. \ref{sec:sat}). SO will observe with three frequency pairs in order to observe the CMB peak signal and constrain polarized foreground contamination from galactic synchotron and dust emission at lower and higher frequencies. The SO frequency bands are: 27/39 GHz, low frequency(LF); 90/150 GHz, mid-frequency(MF); and 220/270 GHz, ultra-high frequency(UHF). The LATR will initially be populated with four MF optics tubes, two UHF optics tubes, and one LF optics tube, while the SAT array will initially be composed of two MF SATs and one UHF SAT with a fourth LF SAT to follow. Details of the SO observing strategy with the two classes of telescope can be found in Stevens et al. 2018\cite{Stevens2018}. A description of the sensitivity calculator used to optimize the SO instrument design appears in Hill et al. 2018\cite{Hill2018}. Details of the calibration strategy planned for SO can be found in Bryan et al. 2018\cite{Bryan2018}. Additional details of the forecasting studies which led to the SO instrument configuration as well as a more in depth description of the observatory will be in a pair of papers in preparation. In this paper we will introduce the basic design of the detector systems, telescopes, and receivers, many of which are discussed in more detail in a set of complementary papers referenced herein. Sec. \ref{sec:sat} describes the SAT in additional detail as this paper serves as the most comprehensive reference for the SAT instrument description. \section{Sensor technology} \label{sec:sensors} \input{UFMFigure} SO uses AlMn transition-edge sensor (TES)\cite{Li2016} bolometers fabricated on 150\,mm diameter silicon wafers with two demonstrated technologies for radio frequency (RF) coupling (Fig. \ref{fig:ufm}): lenslet coupled sinuous antennas\cite{Suzuki2012} and horn coupled orthomode transducers (OMTs)\cite{Mcmahon2012, Choi2018, Simon2016, Henderson2016}. The bolometer arrays with sinuous antennas will be fabricated at the University of California - Berkeley (UCB) while the ones with OMTs will be fabricated at the National Institute of Standards and Technology (NIST)\cite{Duff2016}. The TESs are read out with microwave SQUID multiplexing ($\mu$mux) \cite{Mates2011, Dober2017} which has been demonstrated in the MUSTANG2 camera\cite{Dicker2014}. The focal plane and readout architecture were chosen to optimize sensitivity with a balance of technology development, cost risk, and schedule risk. Additional details on the feedhorn development and lenslet development for SO are presented in Simon et al. 2018\cite{Simon2018} and Beckman et al. 2018\cite{Beckman2018}, respectively. Each detector pixel has four bolometers to sense two orthogonal polarizations in each of the two frequency bands. The TESs are tuned to have a $T_c\approx160$\,mK. More details of the systematics associated with both detector array types and a discussion of readout associated crosstalk can be found in Crowley et al. 2018\cite{Crowley2018}. \subsection{Microwave multiplexing readout electronics} The $\mu$mux readout technology is capable of reading out thousands of detectors on a single pair of RF lines. The high multiplexing factor vastly simplifies the cabling for the detectors which must penetrate a vacuum shell and multiple radiation shields. Additional details of the $\mu$mux system can be found in Dober et al. 2017\cite{Dober2017} and Henderson et al. 2018\cite{Henderson2018}. The detector wafer and readout components are stacked together in a universal focal plane module (UFM) which has RF connectors for the RF input and output signals as well as a single connector for flux modulation and TES bias lines. The detector biasing and cryogenic readout components comprise several dozen silicon chips and a stack of three silicon wafers which mount behind the detector wafer as shown in the middle image of Fig.~\ref{fig:ufm}. UFMs will be tested as independent units prior to installation into three wafer or seven wafer focal plane arrays (FPAs) for the LATR or SAT, respectively as shown in Fig. \ref{fig:ufm}. More details on the UFM assembly can be found in Ho et al. 2018\cite{Ho2018}. \section{Large aperture telescope} \label{sec:lat} \input{LATFigure} A crossed Dragone design concept was chosen for the SO LAT. The LAT design is nearly identical to that of the Cerro Chajnantor Atacama Telescope prime (CCATp)\cite{Parshley2018_2}. CCATp allowed SO to build off their existing development, reducing the schedule risk for delivery of the LAT. Both the SO LAT and CCATp will be built by Vertex Antennentechnik GmbH\footnote{Vertex Antennentechnik GmbH, Duisburg, Germany} with the LAT delivery to the SO site scheduled for 2020. Details of the design can be found in Parshley et al. 2018\cite{Parshley2018} and an overview is shown in Fig. \ref{fig:telescope}. The refractive reimaging optics for each optics tube are composed of three silicon lenses with machined metamaterial antireflection (AR) surface layers\cite{Datta2013}. Details of the optimization of the LAT optical design appear in Dicker et al. 2018\cite{Dicker2018}. The optical design was optimized using ZEMAX and a full analysis of systematics effects carried out using ZEMAX and GRASP. Some of the effects studied encompassed tolerancing, pointing errors, optical distortions, beam ellipticity, cross polar response, instrumental polarization rotation, and sidelobe pickup. Additional details on the systematics studies of the LAT optical design can be found in Gallardo et al. 2018\cite{Gallardo2018}. \subsection{Large aperture telescope receiver} \input{LATR_XSection} The LATR is designed around 13 tightly spaced optics tubes. The optics tubes couple to a 4\,K stage which cools the first lens and optics tube body. A 1\,K stage cools the second and third lens and Lyot stop, with the detector array coupled to a 100\,mK stage. The optics tubes are modular and capable of being inserted from the back of the cryostat while it is mounted on the telescope. The LATR has stages cooled to 80\,K, 40\,K, and 4\,K by pulse tube coolers and 1\,K and 100\,mK stages cooled by a Bluefors dilution refrigerator\footnote{Bluefors Cryogenics, Helsinki, Finland}. An overview of the receiver and optics tube design is shown in Fig. \ref{fig:latr_1}. More details about the mechanical and cryogenic design of the receiver can be found in Zhu et al. 2018\cite{Zhu2018} and Orlowski-Scherer et al. 2018\cite{Orlowski-Scherer2018}. Simulations were also run on the cool down process for the LATR which predict it will take up to a month to reach base temperatures without an effective heat switch strategy as described in Coppi et al. 2018\cite{Coppi2018}. Note that the first light camera for CCATp will share many elements of the LATR design. Details of the CCATp seven optics tube receiver can be found in Vavagiakis et al. 2018\cite{Vavagiakis2018}. \section{Small aperture telescope} \label{sec:sat} \input{SATArray} The SO SAT is designed to observe CMB polarization signals on degree angular scales, where a faint peak in the parity-odd polarization signal, over four orders of magnitude smaller than CMB temperature anisotropies, is predicted to occur. The SAT science goals require a deep survey area with impeccable systematics control. Optimizing the throughput of the SAT provided the simplest path to maximizing mapping speed which resulted in a short focal length system with a large FOV (35$^\circ$) that couples to seven 150\,mm detector wafers. The SAT design increases mapping speed by cooling the aperture stop and lenses to 1\,K. The SAT receiver will also house a continuously rotating cryogenic half-wave plate (CHWP) between the receiver window and first lens to modulate the polarized signal to allow for additional systematics control. \subsection{Optical design} The large focal plane area combined with restrictions from the CHWP and lenses on the aperture stop size formed the principal constraints on the optical design. The location of the CHWP in front of the aperture stop (see Sec. \ref{sec:chwp}) effectively determined the stop size as the sapphire used to make the CHWP has a maximum diameter of 55\,cm. Given that the stop is coupled to the 1\,K thermal stage while the CHWP is mounted to the warmer 40\,K thermal stage, 42\,cm in diameter was determined to be the largest stop diameter possible, taking spacing and mounting requirements into consideration. The thermal and optical constraints on the system effectively narrowed down the possible optical designs for the SAT. We decided to use a design with three silicon lenses, with metamaterial AR surfaces as our primary option. However, the cryogenic volume is sized to accommodate a hybrid three-lens design which achieves slightly better performance by combining two silicon lenses with a 65\,cm diameter alumina lens. A direct benefit of intentionally increasing the size of the optics volume in diameter was the ability to place radially deep 1\,K baffles along the entire tube length which will effectively control the sidelobe response. Additional performance optimization of the optical design was done to include the effects of filters, especially the alumina filters, and the ultra high molecular weight (UHMWPE) window. The left panel of Fig. \ref{fig:sat} shows the position of the lenses within a MF SAT. \subsection{Platform} \label{sec:platform} The SAT platform is designed to allow rotation around the boresight axis for additional systematics controls. The operational tilt range of $<40^\circ$ from vertical of a pulse tube cooler (PTC) allows a boresight rotation of +/- 75$^\circ$ at a pointing angle higher than 50$^\circ$ above the horizon. The constraints on boresight rotation range combined with azimuth and elevation pointing requirements drive the pointing platform design and manufacture, which is part of future work not included in this paper. \subsection{SAT cryogenic receiver} \input{SAT_XSection} The optical design and cryogenic tilt angle determined the overall structure of the SAT receiver. The SAT receiver is composed of a primary cylindrical volume surrounding the optics tube and focal plane combined with a secondary volume to accommodate the cryogenic systems as shown in Fig. \ref{fig:sat}. The CHWP requires an additional space in front of the optics tube for mounting and operation. The readout systems for the detectors also require a dedicated electronics port in the side of the cryostat that presented a significant design challenge to ensure appropriate thermal coupling, cable routing, and component mounting for the readout chain operational requirements. The design temperature of each stage was determined by the detector and optical requirements. The SAT uses a Cryomech PT420 to cool a 40\,K stage and a 4\,K stage and a Bluefors SD400 to cool a 1\,K and 100\,mK stage. The 40\,K stage is used primarily as a radiation shield, an intercept stage for conductive elements, and to remove optical IR loading through the window. Additionally, the 40\,K stage couples to the CHWP which requires an operational temperature below its superconducting transition temperature of 90\,K (see section \ref{sec:chwp}). The 4\,K volume is an additional shield layer that surrounds the components providing the thermal distribution from the DR's 1\,K and 0.1\,K stages. The 1\,K stage cools the aperture stop and lenses as well as providing an additional intercept stage to conductive elements that go to 100\,mK. The 100\,mK stage cools the FPA. A primary design goal for the receiver was to keep the overarching mechanical design concept as simple as possible which we accomplished with a set of mechanical trusses coupling different temperature stages near their respective centers of mass along the vertical axis. A two layer G10 tab Vierendeel truss\cite{Wickersheimer1976} connects the vacuum shell to the 40\,K and 4\,K stages providing a rigid coupling that is designed to accommodate the differential thermal contraction between the layers. The truss builds on the experience of the POLARBEAR-2 truss\cite{Inoue2016} combined with the successful tab structure implemented in SPIDER\cite{Gudmundsson2015}. Thermally isolating mechanical connections between the 4\,K stage and 1\,K optics tube and between the 1\,K optics tube and the 100\,mK focal plane are provided by two additional truss structures that utilize pultruded carbon fiber tubes to provide mechanical support and thermal isolation. \subsubsection{Thermal model and cooling configuration} \label{sec:thermal} \input{LoadingTable} The SAT cooling system design necessitated a detailed thermal model that could account for all sources of thermal loading on each of the stages. The majority of the model is encapsulated in an excel spreadsheet capable of performing calculations for all loading types except the loading through the optical path, which was estimated using a separate python script. The total thermal loading estimates for each stage dictated our overall cooling strategy. Previous experiments have found estimates using the described methods are typically lower than observed as they do not account for many of the imperfections inherent to a physical cryogenic system, including necessary gaps in the multi layer insulation (MLI) blankets, limited information on cryogenic material properties, thermal gradients across stages, and non-ideal filter performance. We have designed the cryogenic system to have twice as much cooling power available compared to estimated loading power to provide sufficient overhead. The predicted loading for the SAT is shown in Table \ref{tab:loading} along with the anticipated cooling power provided by the PT420 and the SD400 units. \subsubsection{Cryogenic half-wave plate} \label{sec:chwp} The SAT includes a continuously rotating sapphire CHWP\cite{Hill2018_2} which modulates the polarization signal from the sky in order to control for a number of systematics\cite{Kusaka2018}. The CHWP is cooled by the first cryogenic stage to minimize the loading on the system. A study of systematics associated with the SO CHWP itself is presented in Salatino et al. 2018\cite{Salatino2018}. The CHWP is placed on the nominal 40\,K stage as close to the aperture as possible to better minimize the amount of instrumental polarization leakage that is modulated into the science band. The only receiver components between the CHWP and the sky are the UHMWPE window, two thin film metal-mesh IR blocking filters\cite{Ade2006}, and the first alumina filter. \section{Conclusion} We have presented an overview of the principal components of SO as well as their current status and the design choices that led to our final instrument configuration. SO is on target to begin scientific observations of the CMB with the LAT and SAT starting in the year 2021. Future publications will detail the performance of the various components as they are built and tested. SO will be one of the most sensitive broadband, wide angular scale, CMB survey instruments to date. With its initial deployment of over 60,000 detectors, SO will provide an important step forward in CMB science and pave the way for future millimeter wave experiments such as CMB-S4\cite{S4sci, S4tech}.
\section{Introduction}} \vspace{-0.5mm} \noindent \IEEEPARstart{R}{ecently}, the demand for \textit{big-data} processing has promoted the popularity of cloud computing platforms due to their reliability, scalability and security~\cite{ref:bigdataRise,ref:BigdataIOT,ref:BidDataService,big2,big3,big1}. Handling Big-data applications requires unique system-level design since these applications, more than often, cannot be processed via a single PC, server, or even a datacenter (DC). To this end, modern parallel and distributed processing systems (e.g., Apache/Twitter Storm~\cite{ref:ApapcheStorm}, GraphLab \cite{ref:HadoopWebsite}, IBM InfoSphere \cite{bookIBM}, MapReduce~\cite{onlinemapreduce}) are developed. In this work, we propose a framework for allocating big-data applications represented via \textit{graph jobs} in geo-distributed cloud networks ({GDCN}s), explicitly considering the power consumption of the DCs. In the graph job model, each node denotes a sub-task of a big-data application while the edges impose the required communication constraints among the sub-tasks. One of the common examples of processing graph jobs is receiving data from Twitter and counting the number of times a hashtag is mentioned, to keep an ordered list of the most commonly mentioned hashtags. Each step of the process is carried on in a so-called processing element, and it's these elements that enforce the separation of each logical step of the process (e.g. receiving updates, extracting hashtags, counting hashtags, ordering hastag count list) and allow the execution of the process on a distributed platform~\cite{Yahoos4}. In this context, a graph job is formed by viewing each element as a node and data exchange requirement between the elements as edges. As the sizes of the problem and graph jobs increase, one can imagine that a coalition of multiple DCs achieved through GDCNs is required for the execution of the graph jobs. \subsection{Related Work} There is a body of literature devoted to task and resource allocation in contemporary cloud networks, e.g.,~\cite{ref:allocation1,ref:allocation5,extref1,extref2,extref3,kaewpuang2013framework,ref:DGLB,survey,extra1,extra4}, {\color{black} where the topology of the graph job is not explicitly considered into their model}. In~\cite{ref:allocation1}, the task placement and resource allocation plan for embarrassingly parallel jobs, which are composed of a set of independent tasks, is addressed to minimize the job completion time. To this end, three algorithms named TaPRA, TaPRA-fast, and OnTaPRA are proposed, which significantly reduce the job execution time as compared to the state-of-the-art algorithms. In~\cite{ref:allocation5}, the multi-resource allocation problem in cloud computing systems is addressed through a mechanism called DRFH, where the resource pool is constructed from a large number of heterogeneous servers containing various number of \textit{slots}. It is shown that DRFH leads to much higher resource utilization with considerably shorter job completion times. {\color{black} In \cite{extref1}, the authors develop an online job scheduling algorithm to distribute incoming workloads across multiple DCs targeting energy cost minimization with fairness consideration subject to job delay requirements. They demonstrate that the solution of their online algorithm, which is solely based on current job queue lengths, server availability and electricity prices, is close to the offline optimal performance with future information. In~\cite{extref2}, distribution of the incoming workload among multiple DCs and adjustment of the service rates of the cloud servers are addressed aiming to reduce the power consumption cost. In \cite{extref3}, the problem of directing the client requests to an appropriate DC efficiently and sending back the response packets to the client through one of the available links in the network is formulated as a workload management optimization problem. To tackle the problem, the authors propose a distributed algorithm inspired by the alternating direction method of multipliers. } In~\cite{kaewpuang2013framework}, a resource allocation scheme is proposed resulting in efficient utilization of the resources while increasing the revenue of the mobile cloud service providers. One of the pioneer works addressing resource allocation in {GDCN}s {\color{black} considering the power consumption state of the DCs} is~\cite{ref:DGLB}, where a distributed algorithm, called DGLB, is proposed for real-time geographical load balancing. A good survey of the current state of the art is given in~\cite{survey}. Also, there is a body of literature utilizing swarm-based algorithms to perform the job allocation in cloud networks, e.g., \cite{extra1,extra4}. None of the above works has considered allocation of big-data jobs composed of multiple sub-tasks requiring certain communication constraints among their sub-tasks. Allocation of big-data jobs represented by graph structures is a complicated process entailing more delicate analysis. Among limited literature, references~\cite{zhou,ref:javad,ref:javad2} are most relevant, which focus on minimizing the cost incurred by utilizing the links among the adjacent DCs while neglecting the power consumption and the status of the utilized DCs. In~\cite{zhou}, a heuristic algorithm is developed to match the vertices of graph jobs to the idle slots of the cloud servers considering the cost of using the communication infrastructure of the network to handle the data flows among the sub-tasks. Using a similar system model in~\cite{ref:javad,ref:javad2}, the authors developed randomized algorithms for the same purpose. As compared to the heuristic approach of~\cite{zhou}, the authors of~\cite{ref:javad,ref:javad2} also demonstrate the optimality of their proposed algorithms through a theoretical approach. However, the algorithms used in these references are developed for a fixed network cost configuration, i.e., the cost of job execution using the same allocation strategy is fixed throughout the time. Also, as mentioned in~\cite{ref:nonpr}, the randomized algorithms proposed in~\cite{ref:javad,ref:javad2} suffer from long convergence time. In summary, the system model and the algorithms proposed in~\cite{zhou,ref:javad,ref:javad2} suffer from the following three limitations. i) The proposed algorithms are impractical in scenarios that the job allocation needs to be performed with respect to a time varying network cost configuration. ii) The proposed methods are impractical for large-scale networks. This is due to the fact that efficient handling of the NP-complete sub-graph isomorphism problem, which is a prerequisite to identify feasible allocations for graph jobs, is not directly addressed in these works (see Section~\ref{sec:Large}). iii) The proposed system models do not capture the power consumption of the utilized DCs. This is despite the fact that in {{GDCN}}s, the execution cost is mainly determined by the real-time power consumption of the DCs~\cite{ref:powerDCsurvey}. Hence, an applicable allocation framework should be capable of fast allocation of incoming graph jobs to the {{GDCN}}s considering the effect of allocation on the current DCs' power consumption state. Also, with the rapid growth in the size of cloud networks, adaptability to large-scale {GDCN}s is a must for such a framework. These are the main motivations behind this work. \subsection{Contributions} The main goal of this paper is to provide a framework for graph job allocation in {GDCN}s with various scales. Our main contributions can be summarized as follows: \noindent 1) We formulate the problem of graph job allocation in {GDCN}s considering the incurred power consumption on the cloud network. \noindent 2) We propose a centralized approach to solve the problem suitable for small-scale cloud networks. \noindent 3) We design a distributed algorithm for allocation of graph jobs in medium-scale {{GDCN}}s, using the DCs' processing power in parallel. \noindent 4) For large-scale {{GDCN}}s, given the huge size of the strategy set, and extremely slow convergence of the distributed algorithm, we introduce the idea of \textit{cloud crawling}. In particular, we propose a fast method to address the NP-complete \textit{sub-graph isomorphism problem}, which is one of the major challenges for graph job allocation in cloud networks. In this regard, we propose a novel low-complexity (decentralized) sub-graph isomorphism extraction algorithm for a cloud crawler to identify ``potentially good" strategies for customers while traversing a {GDCN}. \noindent 5) For large-scale {GDCN}s, considering the suggested strategies of cloud crawlers, we find the best suggested strategies for the customers under adaptive and fixed pricing of the DCs in a distributed fashion. To this end, we model proxy agents' behavior in a {GDCN}, based on which we propose two online learning algorithms inspired by the concept of ``regret" in the bandit problem~\cite{ref:gambler,ref:regretmatching}. This paper is organized as follows. Section~\ref{sec:systModel} includes system model. Section~\ref{sec:Small} contains a sub-optimal approach for graph job allocation in small-scale {GDCN}s. A distributed graph job allocation mechanism for medium-scale {GDCN}s is presented in Section \ref{sec:Medium}. Cloud crawling along with online learning algorithms for large-scale {GDCN}s are presented in Section~\ref{sec:Large}. Simulation results are given in section~\ref{sec:Simu}. Finally, Section~\ref{sec:concl} concludes the paper. \section{System Model}\label{sec:systModel} \noindent A {GDCN} comprises various DCs connected through communication links. Inside each DC, there is a set of fully-connected cloud servers each consisting of multiple fully-connected \textit{slots}. Without loss of generality, we assume that all the cloud servers have the same number of slots. Each slot corresponds to the same bundle of processing resources which can be utilized independently. Since all the slots belonging to the same DC are fully-connected, we consider a DC as a collection of slots directly in our study.\footnote{The number of cloud servers does not play a major role in our study except in the energy consumption models.} It is assumed that a DC provider (DCP) is in charge of DC management. Abstracting each DC to a \textit{node} and a communication link between two DCs as an \textit{edge}, a {{GDCN}} with $n_d$ DCs can be represented as a graph $G_D=(\mathcal{D},\mathcal{E}_D)$, where $\mathcal{D}=\{d^1,\cdots,d^{n_d}\}$ denotes the set of nodes and $\mathcal{E}_D$ represents the set of edges. Henceforth, $G_D$ is assumed to be \textit{connected}; however, due to the geographical constraints, $G_D$ may not be a complete graph. Let $\mathcal{S}^i=\{S^i_1,\cdots,S^i_{|\mathcal{S}^i|}\}$ denote the set of slots belonging to DC $d^i$. The existence of a connection between two DCs leads to the communication capability between all of their slots. Consequently, two slots are called \textit{adjacent} if and only if both belong to the same DC or there exists a link between their corresponding DCs. Let ${\color{black}\mathcal{E}_S}$ denote the set of edges between the adjacent slots, where $(S^i_k,S^j_m)\in {\color{black}\mathcal{E}_S}$ if and only if $i=j, \forall k\neq m$ or $(d^i,d^j)\in \mathcal{E}_D, \forall k,m$. We define the \textit{aggregated network graph} as $G=(\mathcal{V}_S,{\color{black}\mathcal{E}_S})$, where $\mathcal{V}_S=\cup_{i=1}^{n_d} \mathcal{S}^i$ and $|\mathcal{V}_S|= \sum_{i=1}^{n_d} |\mathcal{S}^i|$. Let $\mathcal{J}=\{Gjob_1, Gjob_2,\cdots,Gjob_J\}$, denote the set of all possible types of the graph jobs in the system, each of which is considered as a graph $Gjob_j=(\mathcal{V}_j,\mathcal{E}_j)$. Each node of a graph job requires one slot from a DC to get executed. It is assumed that $\mathcal{V}_j=\{v^1_j,\cdots,v^{n_j}_j\}$, and $\forall (m,n):1\leq m \neq n \leq n_j$, $\left(v^m_j,v^n_j\right) \in \mathcal{E}_j$ if and only if the nodes $v^m_j$ and $v^n_j$ need to be executed using two adjacent slots of the {{GDCN}}. {\color{black} Similar to~\cite{ref:javad,ref:javad2,zhou}, we assume that allocation of all the nodes is required during the execution of the respective job.} The system model is depicted in Fig.~\ref{diag:sysmodel}. For the small- and medium-scale {GDCN}s, the {GDCN} network is assumed to be in charge of finding adequate allocations for the incoming graph jobs from proxy agents (PAs)~(\hspace{-1.59mm} \cite{ref:agent,Ali:twoStage,Ali:option}), which act as trusted parties between the {GDCN} and the customers. In these cases, each graph job is allocated through either a centralized controller or a distributed algorithm utilizing the communication infrastructure between the DCs (see Section~\ref{sec:Medium}). For large-scale {GDCN}s, cloud crawlers are introduced to explore the {GDCN} to provide a set of suggested strategies for the PAs. Afterward, PAs allocate their graph jobs with respect to the utility of the suggested strategies (see Section~\ref{sec:Large}). The following definitions are introduced to facilitate our subsequent derivations. \begin{definition} A \textbf{feasible mapping} between a $Gjob_j$ and the {{GDCN}} is defined as a mapping $f_j:\mathcal{V}_j \mapsto \mathcal{V}_S$, which satisfies the communication constraints of the graph job. This implies that $\forall (m,n): 1\leq m \neq n \leq |\mathcal{V}_j|$, if $(v^m_j,v^{n}_j)\in \mathcal{E}_j$, then $\left(f_j(v^m_j),f_j(v^{n}_j)\right)\in {\color{black}\mathcal{E}_S}$. Let $\mathcal{F}_j = \{f^1_j, \cdots, f^{|\mathcal{F}_j|}_j\}$ denote the set of all feasible mappings for the $Gjob_j$. \end{definition} \begin{definition} For a $Gjob_j$, a \textbf{mapping vector} associated with a feasible mapping $f^k_j\in \mathcal{F}_j $ is defined as a vector $\mathbf{M}_j|_{f^k_j} =[m^1_j|_{f^k_j},\cdots,m^{n_d}_j|_{f^k_j}]\in (\mathbb{Z}^+ \cup \{0\})^{n_d}$, where $m^i_j|_{f^k_j}$ denotes the number of used slots from DC $d^i$. Mathematically, $m^i_j|_{f^k_j}=\sum_{l=1}^{|\mathcal{V}_j|} \mathbf{1}_{\{f^k_j(v^l_j)\in \mathcal{S}^i\}}$, where $\mathbf{1}_{\{.\}}$ represents the indicator function. Let $\mathcal{M}_j=\{ \mathbf{M}_j|_{f^1_j},\cdots, \mathbf{M}_j|_{f^{|\mathcal{F}_j|}_j} \}$ denote the set of all mapping vectors for the $Gjob_j$. \end{definition} Finding a feasible allocation/mapping between a graph job and a {GDCN} is similar to the \textit{sub-graph isomorphism problem} in graph theory~\cite{subgraphNPcomplete}. Some examples of feasible allocations for a graph job with three nodes considering a {GDCN} with four DCs each consisting of four slots is depicted in Fig.~\ref{fig:iso}. {\color{black} Our aim is to allocate big-data driven applications, e.g., computation intensive big-data applications~\cite{zhou} or data streams~\cite{ref:javad,ref:javad2}, to {GDCN}s. Due to the nature of these applications, the jobs usually stay in the system so long as they are not terminated. This work can be considered as a real-time allocation of graph jobs to the system, where we find the best currently possible assignment considering the current network status. Hence, we deliberately omit the time index from the following discussions.} Inspired by~\cite{ref:powerInfo,ref:powerDCsurvey}, we model the power consumption upon utilizing $s$ slots of $d^i$ comprising $N^i$ cloud servers each with idle power consumption $P^i_{idle}$ as: \vspace{-2mm} \begin{equation}\label{eq:powerPrice0} \eta^i N^i \left( \sigma^i \left(\frac{s}{|\mathcal{S}^i|}\right)^{\alpha^i}+P^i_{idle} \right), \alpha^i\geq 2. \end{equation} In this model, $\eta^i$ is the so-called \textit{Power Usage Effectiveness}, which is the ratio between the total power usage (including cooling, lights, UPS, etc.) and the power consumed by the IT-equipment of a DC, and $\sigma^i$ is chosen in such a way that $\sigma^i+P^i_{idle}$ determines the peak power consumption of a cloud sever $P^i_{max}$ inside $d^i$. Also, $\alpha^i$ is a DC-related constant. Subsequently, we define the incurred cost of executing a graph job with type $j$ allocated according to the feasible mapping vector $\mathbf{M}_j=[m^1_j,\cdots,m^{n_d}_j]$ as follows: \vspace{-2mm} \begin{equation}\label{eq:powerPrice} \Scale[0.98]{\displaystyle \sum_{i=1}^{n_d} \xi^i \eta^i N^i \left( \sigma^i \left(\frac{{L}^i+m^i_{j}}{|\mathcal{S}^i|}\right)^{\alpha^i}+P^i_{idle} \right) + \sum_{i=1}^{n_d} \xi^i \nu^i m^i_j,} \end{equation} where ${L}^i$ is the original load of DC $d^i$, $\nu^i$ indicates the I/O incurred power of using the communication infrastructure of DC $d^i$ per slot, and $ \xi^i$ is the ratio between the cost and power consumption, which is dependent on the DC's location and infrastructure design. The I/O cost is considered to be proportional to the number of used slots since the data generated at each DC is correlated with that number, and that data should be exchanged using the I/O infrastructure either among adjacent DCs or between DCs and the users. {\color{black} Note than Eq.~\eqref{eq:powerPrice0} and Eq.~\eqref{eq:powerPrice} do not capture the order of the slots used in each DC and assume that the utilization of a slot from every server in a DC requires the same power consumption. However, in reality some servers might be in the idle mode, which need more power to boot and execute the process. Since each DC may contain tens of servers, considering the status of each server increases the dimension of the problem significantly, which makes the problem intractable even in small-scale GDCNs. Also, obtaining the status of all the servers in all the DCs is challenging. Addressing these issues is out of the scope of this paper and left as a future work. In this paper, we assume that after allocation of the graph jobs to the GDCN and sending the information to the respective DCs, each DC manager makes an internal decision about the effective usage of the servers' slots considering the status of the servers. } \begin{figure*}[t] \minipage{13cm} \vspace{-2mm} \includegraphics[width=130mm,height=70mm]{Figures/cloud_gdcn7.pdf} \caption{System model for graph job allocation in {GDCN}s with various scales.} \label{diag:sysmodel} \endminipage\hfill \vspace{-5mm} \quad \minipage{4cm} \includegraphics[width=1.55in,height=55mm]{Figures/fig_iso-eps-converted-to.pdf} \caption{Examples of graph job allocation. The green (blue) color denotes busy (idle) slots. The red color indicates the utilized slots upon allocation.} \label{fig:iso} \endminipage \end{figure*} \subsection{Problem Formulation} Our goal is to find an allocation for each arriving graph job to minimize the total incurred cost on the network. Due to the inherent relation between the cost and loads of the DCs, minimizing the cost is coupled with balancing the loads of the DCs. In a {GDCN}, let $N_j$ denote the number of $Gjob_j \in \mathcal{J}$ in the system demanded for execution. Let $\mathbf{\overbar{M}}_{j}$ denote the matrix of mapping vectors of these graph jobs defined as follows: {\small \[ \mathbf{\overbar{M}}_{j}= \begin{bmatrix} \mathbf{M}_{j,(1)},\mathbf{M}_{j,(2)},\cdots,\mathbf{M}_{j,({N_j})} \end{bmatrix}, \;\; \forall j\in \{1,\cdots, J\}, \] } {\small \[ \mathbf{M}_{j,(i)}= \begin{bmatrix} m^1_{j,(i)} , m^2_{j,(i)} , \cdots , m^{n_d}_{j,(i)} \end{bmatrix}^\top, \; \forall i\in \{1,\cdots, N_j\}. \] } We formulate the \textit{optimal graph job allocation} as the following optimization problem ($\mathcal{P}1$): \vspace{-2mm} \begin{flalign} &\hspace{5mm}[\mathbf{\overbar{M}}^*_1,\mathbf{\overbar{M}}^*_2,\cdots,\mathbf{\overbar{M}}^*_J]=\nonumber\\ &\hspace{3mm}\argmin_{[\mathbf{\overbar{M}}_1,\mathbf{\overbar{M}}_2,\cdots,\mathbf{\overbar{M}}_J]} \sum_{i=1}^{n_d} \xi^i \eta^i N^i \Bigg( \sigma^i \left(\frac{L^{i}+\sum_{j=1}^{J} \sum_{k=1}^{N_j} m^i_{j,(k)}}{|\mathcal{S}^i|}\right)^{\alpha^i}\nonumber \\ &\hspace{5mm}+P^i_{idle} \Bigg) + \sum_{i=1}^{n_d} \sum_{j=1}^{J} \sum_{k=1}^{N_j} \xi^i \nu^i m^i_{j,(k)} \\ &\hspace{5mm}\textrm{s.t.}\nonumber\\ &\hspace{5mm}\sum_{j=1}^{J} \sum_{k=1}^{N_j} m^i_{j,(k)} \leq |\mathcal{S}|^{i}-L^{i},\;\;\forall i\in\{1,\cdots,n_d\},\label{eq:const1} \\ &\hspace{5mm}\mathbf{M}_{j,(i)} \in \mathcal{M}_j, \;\;\forall j\in \{1,\cdots,J\}, \forall i \in\{1,\cdots,N_j\}\label{eq:const2} . \end{flalign} In $\mathcal{P}1$, the objective function is the total incurred cost of execution, {\color{black}the first condition given by \eqref{eq:const1} ensures the stability of the DCs, and the second constraint given by \eqref{eq:const2} guarantees the feasibility of the assignment.} There are two main difficulties in obtaining the solution: i) Identifying the feasible mappings ($\mathcal{M}_j$-s) requires solving the sub-graph isomorphism problem between the graph jobs' topology and the aggregated network graph, which is categorized as NP-complete~\cite{subgraphNPcomplete}. Hence, we only assume the knowledge of $\mathcal{M}_j$-s in the small- and medium-scale {GDCN}s. In the large-scale {GDCN}s, we propose a low-complexity decentralized approach to extract isomorphic sub-graphs to a graph job and implement it in our proposed cloud crawlers. ii) $\mathcal{P}1$ is a nonlinear integer programming problem, which is known to be NP-hard. In small- and medium-scale {GDCN}s, we tackle this problem considering a convex relaxed version of it. However, for large-scale {GDCN}s, we find a ``potentially good" subset of feasible mappings as the cloud crawlers traverse the network. Afterward, the strategy selection is carried out using the computing power of the PAs in a decentralized fashion. {\color{black} \begin{remark} Considering the possibility of link outages and security preferences, the users may prefer utilizing fewer DCs during the job execution. Since these situations are more likely to happen in large-scale GDCNs, we incorporate this tendency to the utility function of the users, i.e., Eq.~\eqref{eq:util2} and~Eq.~\eqref{eq:util1}, described in Section~\ref{sec:Large}. \end{remark}} \begin{table} {\footnotesize \caption{Major notations.} \begin{center} \vspace{-2mm} \begin{tabular}{ |c |c|} \hline Symbol& Definition\\ \hline $G_D$ & The {{GDCN}} graph \\ \hline $\mathcal{D}$ & Set of DCs in the {{GDCN}} \\ \hline $d^i$ & The DC with index $i$ \\ \hline $n_d$ & Number of DCs in the {{GDCN}} \\ \hline $\mathcal{S}^i$ & Set of slots of DC $d^i$ \\ \hline $G$ & Aggregated graph of the {{GDCN}} \\ \hline $\mathcal{V}_S$& Set of slots of the entire {GDCN}\\ \hline {\color{black} $\mathcal{E}_D$}& {\color{black}Set of edges between adjacent DCs of a {GDCN}}\\ \hline ${\color{black}\mathcal{E}_S}$& Set of edges between adjacent slots of DCs in a {GDCN}\\ \hline $\mathcal{J}$ & Set of graph jobs in the system \\ \hline $J$ & Number of different types of jobs in the system \\ \hline $Gjob_j$ & Associated graph to the graph job with type $j$ \\ \hline $N_j$ & Number of jobs with type $j$ in the system \\ \hline $\mathcal{V}_j$& Set of nodes of the graph job with type $j$\\ \hline $\mathcal{E}_j$& Set of edges of the graph job with type $j$\\ \hline $L^i$ & Load of DC $d^i$\\ \hline $N^i$ & Number of cloud servers in DC $d^i$ \\ \hline $\mathcal{M}_j$& Set of all the mapping vectors for $Gjob_j$ \\ \hline $\mathcal{P}$& Set of PAs in the system\\ \hline $\mathcal{SA}_j$& Set of cloud crawler's suggested strategies for $Gjob_j$\\ \hline $\mathbf{p}_{j,(m)}$& Probability of selection of strategy $m\in\mathcal{SA}_j$\\ \hline \end{tabular} \end{center} } \end{table} \section{Graph Job Allocation in Small-Scale GDCN s: Centralized Approach}\label{sec:Small} \noindent Solving $\mathcal{P}1$ requires solving an integer programming problem in $n_d{\sum_{j=1}^{J}} N_j$ dimensions. For a small {GDCN} with three types of graph jobs ($J=3$), $5$ DCs ($n_d=5$), and $100$ graph jobs of each type in the system, the dimension of the solution becomes $1500$ rendering the computations impractical. To alleviate this issue, we solve $\mathcal{P}1$ in a sequential manner for available graph jobs in the system. In our approach, at each stage, the best allocation is obtained for one graph job while neglecting the presence of the rest. Afterward, the graph job is allocated to the {GDCN} and the loads of the utilized DCs are updated. As a result, at each stage, the dimension of the solution is $n_d$ ($5$ in the above example). For a $Gjob_j\in\mathcal{J}$, let the available graph jobs be indexed from $1$ to $N_j$ according to their execution order, where preferred customers can be prioritized in practice. For a graph job with type $j$ with index $k$, we reformulate $\mathcal{P}1$ as ($\mathcal{P}2$): \begin{flalign} &\hspace{1.9mm}\mathbf{M}^*_{j,(k)}\hspace{-1mm}=\hspace{-0.5mm}\argmin_{\mathbf{M}_{j,(k)}} \sum_{i=1}^{n_d} \xi^i \eta^i N^i \hspace{-1mm} \left( \sigma^i \left(\frac{L^{i}+ m^i_{j,(k)}}{|\mathcal{S}^i|}\right)^{\alpha^i}\hspace{-4mm}+P^i_{idle} \right) \nonumber\\ &\hspace{1.9mm}+ \sum_{i=1}^{n_d} \xi^i \nu^i m^i_{j,(k)} \label{eq:int1}\\ &\hspace{1.9mm}\textrm{s.t.}\nonumber\\ &\hspace{1.9mm} m^i_{j,(k)} \leq |\mathcal{S}^i|-L^{i}, \;\;\; \forall i\in\{1,2,\cdots,n_d\}, \label{eq:insideServerload}\\ &\hspace{1.9mm}\mathbf{M}_{j,(k)}\in \mathcal{M}_j, \label{eq:int2} \end{flalign} where $L^{i}$ denotes the updated load of DC $d^i$ after the previous graph job allocation. The last constraint in $\mathcal{P}2$ forces the solution to be discrete making the derivation of a tractable solution impossible. In the following, we relax this constraint and provide a tractable method to derive the solution in the set of feasible points. For the moment, we consider $\mathbf{M}_{j,(k)} \in \mathbb{\left(R^+\right)}^{n_d},\; \forall j,k$. {\color{black} We define $\mathcal{P}3$ as the following optimization problem with the same objective function as $\mathcal{P}2$, in which the constraint given by Eq.~\eqref{eq:int2} is relaxed and represented as two constraints ($\mathcal{P}3$): \begin{flalign} &\hspace{1.9mm}\mathbf{M}^*_{j,(k)}\hspace{-1mm}=\hspace{-0.5mm}\argmin_{\mathbf{M}_{j,(k)}} \sum_{i=1}^{n_d} \xi^i \eta^i N^i \hspace{-1mm} \left( \sigma^i \left(\frac{L^{i}+ m^i_{j,(k)}}{|\mathcal{S}^i|}\right)^{\alpha^i}\hspace{-4mm}+P^i_{idle} \right) \nonumber\\ &\hspace{1.9mm}+ \sum_{i=1}^{n_d} \xi^i \nu^i m^i_{j,(k)} \\ &\hspace{1.9mm}\textrm{s.t.}~\eqref{eq:insideServerload},\nonumber\\ &\hspace{3mm}\sum_{i=1}^{n_d} m^i_{j,(k)} =|\mathcal{V}_j|,\label{eq:insidefeasible}\\ & \hspace{3mm} m^i_{j,(k)}\geq 0, \;\; \forall i\in \{1,2,\cdots,n_d\},\label{eq:rel2} \end{flalign} where Eq.~\eqref{eq:insidefeasible} ensures the assignment of all the nodes of the graph job to the {GDCN}, and Eq.~\eqref{eq:rel2} guarantees the practicality of the solution.} It is easy to verify that $\mathcal{P}3$ is a convex optimization problem. We use the \textit{Lagrangian dual decomposition} method~\cite{boyd} to solve this problem. Let $\bm{\lambda}=[\lambda^1,\lambda^2,\cdots,\lambda^{n_d}]$, $\gamma$, and $\bm{\Lambda}=[\Lambda^1,\Lambda^2,\cdots,\Lambda^{n_d}]$ denote the Lagrangian multipliers associated with the first, the second, and the third constraint, respectively. The \textit{Lagrangian function} associated with $\mathcal{P}3$ is then given by: \begin{flalign} &\hspace{5mm}L(\mathbf{M}_{j,(k)},\bm{\lambda},\gamma,\bm{\Lambda})= -\sum_{i=1}^{n_d} \Lambda^i m^i_{j,(k)}+\nonumber\\ &\hspace{5mm}\sum_{i=1}^{n_d} \xi^i \eta^i N^i \left( \sigma^i \left(\frac{L^{i}+ m^i_{j,(k)}}{|\mathcal{S}^i|}\right)^{\alpha^i}\hspace{-4mm}+P^i_{idle} \right) +\sum_{i=1}^{n_d} \xi^i \nu^i m^i_{j,(k)} \nonumber \\ &\hspace{4mm}+ \sum_{i=1}^{n_d} \lambda^i \left(m^i_{j,(k)} - |\mathcal{S}^i|+L^{i}\right) + \gamma \left( \sum_{i=1}^{n_d} m^i_{j,(k)} - |\mathcal{V}_j|\right). \end{flalign} The corresponding \textit{dual function} of $\mathcal{P}3$ is given by: \begin{align}\label{eq:dualfunc} D(\bm{\lambda},\gamma,\bm{\Lambda})= \min_{\mathbf{M}_{j,(k)}}{L(\mathbf{M}_{j,(k)},\bm{\lambda},\gamma,\bm{\Lambda})}. \end{align} Finally, the \textit{dual problem} can be written as ($\mathcal{P}4$): \begin{align}\label{ref:dualProb} \max_{\bm{\lambda},\bm{\Lambda}\in (\mathbb{R}^+)^{n_d},\gamma \in \mathbb{R}} D(\bm{\lambda},\gamma,\bm{\Lambda}). \end{align} $\mathcal{P}3$ is a convex optimization problem with differentiable affine constraints; hence, it satisfies the \textit{constraint qualifications} implying a zero duality gap. As a result, the solution of $\mathcal{P}3$ coincides with the solution of $\mathcal{P}4$. It can be verified that the minimum of the Lagrangian function occurs at the following point: \begin{equation}\label{eq:ms} \hspace{-1mm}\Scale[0.99]{{m^i_{j,(k)}}^* = \left(\frac{\Lambda^i - \lambda^i - \gamma -\xi^i \nu^i}{\frac{ \xi^i \eta^i N^i \sigma^i \alpha^i}{(|\mathcal{S}^i|)^{\alpha^i}}}\right)^{\frac{1}{\alpha^i-1}}\hspace{-3mm} -L^i, \;\forall i\in \{1,\cdots,n_d \}.} \end{equation} By replacing this in the Lagrangian function, the dual function is given by: $D(\bm{\lambda},\gamma,\bm{\Lambda})=L(\mathbf{M}^*_{j,(k)},\bm{\lambda},\gamma,\bm{\Lambda})$, where $\small \mathbf{M}^*_{j,(k)}=[ {m^1_{j,(k)}}^* , {m^2_{j,(k)}}^* , \cdots , {m^{n_d}_{j,(k)}}^* ]^\top$. The optimal Lagrangian multipliers can be obtained by solving the dual problem given by: \begin{equation}\label{eq:nabla} \nabla D(\bm{\lambda},\gamma,\bm{\Lambda})|_{(\bm{\lambda}^*, \gamma^*,\bm{\Lambda}^*)}=0. \end{equation} Given the solution of Eq.~\eqref{eq:nabla}, the optimal allocation in $\mathbb{\left(R^+\right)}^{n_d}$ is given by $\mathbf{M}^*_{j,(k)}|_{(\bm{\lambda}^*, \gamma^*,\bm{\Lambda}^*)}$. The solutions of Eq. $\eqref{eq:nabla}$ can be derived via the iterative \textit{gradient ascent algorithm}~\cite{boyd}. Let $\widetilde{\mathbf{M}_{j,(k)}^*}=[\widetilde{{m^{1}_{j,(k)}}^*},\cdots,\widetilde{{m^{n_d}_{j,(k)}}^*}]^\top$ denote the derived solution in the continuous space, we obtain the solution of $\mathcal{P}2$ by solving the following weighted mean-square problem:\footnote{Instead of solving the mean-square problem, the k-d tree data structure~\cite{bentley1975multidimensional} can be used to find the closest feasible allocation in average complexity of $O(\log(|\mathcal{M}_{j}|))$, where $|\mathcal{M}_{j}|$ is the number of feasible allocations.} \begin{equation}\label{eq:weightedmeanSquare} \begin{aligned} \mathbf{M}^*_{j,(k)}= \argmin_{\mathbf{M}_{j,(k)}\in \mathcal{M}_{j}} \sum_{i=1}^{n_d} w_i \left(m^i_{j,(k)}-\widetilde{{m^i_{j,(k)}}^*}\right)^2, \end{aligned} \end{equation} where $w_.$-s are the design parameters, which can be tuned to impose a certain tendency toward utilizing specific DCs. So far, to derive the above solution, it is necessary to have a powerful centralized processor with global knowledge about the state of all the DCs. This is due to the inherent updating mechanism of the gradient ascent method~\cite{boyd}, in which iterative update of each Lagrangian multiplier requires global knowledge of the current values of the other Lagrangian multipliers and the DCs' loads. Obtaining this knowledge may not be feasible for a given {GDCN} with more than a few DCs. Moreover, multiple powerful backup processors may be needed to avoid the interruption of the allocation process in situations such as overheating of the centralized processor. In the following section, we design a distributed algorithm using the processing power of the DCs in parallel to resolve the above concerns. \section{Graph Job Allocation in Medium-Scale {GDCN}s: Decentralized Approach with DCs in Charge of Job Allocation}\label{sec:Medium} \noindent The described dual problem in Eq.~\eqref{ref:dualProb}, given the result of Eq.~\eqref{eq:ms}, can be written as follows: \begin{align}\label{eq:needdistributed} &\max_{\lambda^i \in \mathbb{R}^+,\gamma \in \mathbb{R},\Lambda^i\in \mathbb{R}^+}\sum_{i=1}^{n_d} D^i({\lambda}^i,\gamma,{\Lambda}^i), \end{align} where \begin{align} &\hspace{-3.5mm}D^i({\lambda}^i,\gamma,{\Lambda}^i)= \xi^i \eta^i N^i \left( \sigma^i \left(\frac{L^{i}+ {m^i_{j,(k)}}^*}{|\mathcal{S}^i|}\right)^{\alpha^i}\hspace{-4mm}+P^i_{idle} \right) \nonumber\\ &\hspace{-3.5mm}+ \xi^i \nu^i {m^i_{j,(k)}}^* + \lambda^i \left({m^i_{j,(k)}}^* - |\mathcal{S}^i|+L^{i}\right)\nonumber\\ &\hspace{-3.5mm}+\hspace{-1mm} \gamma \hspace{-0.5mm}\left({m^i_{j,(k)}}^* \hspace{-1mm} - |\mathcal{V}_j|/n_d\right) \hspace{-1mm}-\hspace{-1mm} \Lambda^i {m^i_{j,(k)}}^*,\;\;\forall i\in \{1,\cdots,n_d \}. \end{align} In Eq.~\eqref{eq:needdistributed}, each term can be associated with a DC. For $d^i$, there are two private (local) variables $\lambda^i,\Lambda^i$ and a public (global) variable $\gamma$, which is identical for all the DCs. Due to the existence of this public variable, the objective function cannot be directly written as a sum of separable functions. In the following, we propose a distributed algorithm deploying local exchange of information among adjacent DCs to obtain a unified value for the public variable across the network. \subsection{Consensus-based Graph Job Allocation} We propose the consensus-based distributed graph job allocation (CDGA) algorithm consisting of two steps to find the solution of Eq.~\eqref{eq:needdistributed}: i) updating the local variables at each DC, ii) updating the global variable via forming a consensus among DCs. We consider each term of Eq.~\eqref{eq:needdistributed} as a (hypothetically) separate term and rewrite the problem as a summation of separable functions, with $\gamma$ replaced by $\gamma^i$ in $D^i(.,.,.)$: \begin{equation}\label{eq:full_dist_1} \max_{\lambda^i \in \mathbb{R}^+,\gamma^i \in \mathbb{R},\Lambda^i\in \mathbb{R}^+} \sum_{i=1}^{n_d} D^i({\lambda}^i,{\gamma}^i,{\Lambda}^i). \end{equation} At each iteration of the CDGA algorithm, each DC first derives the value of the following variables locally using the gradient ascent method: \begin{equation}\label{eq:full_dist_2} \begin{aligned} &\hspace{-3mm}\lambda^i(k+1)=\lambda^i(k)+ c_{\lambda} (\nabla_{\lambda^i} D^i({\lambda}^i(k),{\gamma}^i(k),{\Lambda}^i(k))),\\ &\hspace{-3mm}\gamma'^i(k+1)= \gamma^i(k) + c_{\gamma} (\nabla_{\gamma^i} D^i({\lambda}^i(k),{\gamma}^i(k),{\Lambda}^i(k))),\\ &\hspace{-3mm}\Lambda^i(k+1)= \Lambda^i(k) + c_{\Lambda} (\nabla_{\Lambda^i} D^i({\lambda}^i(k),{\gamma}^i(k),{\Lambda}^i(k))), \end{aligned} \end{equation} where $c_{.}$-s are the corresponding step-sizes and $\gamma'^i$ is a local variable. Afterward, the local copies of the global variable ($\gamma^i$-s) are derived by employing the consensus-based gradient ascent method~\cite{ref:DistCens}: \begin{align}\label{eq:full_dist_3} \gamma^i(k+1)=\sum_{j=1}^{n_d} \Big(\mathbf{W}^\Phi\Big)_{ij} \gamma'^j(k) , \end{align} where $\mathbf{W}=\mathbf{I}-\epsilon \mathbf{L}(G_D)$, with $\mathbf{L}(G_D)$ the Laplacian matrix of $G_D$ and $\epsilon \in (0,1)$, and $\Phi\in \mathbb{N}$ denotes the number of performed consensus iterations among the adjacent DCs. In this method, the adjacent DCs perform $\Phi$ consensus iteration with local exchange of $\gamma'$-s before updating $\gamma$. The pseudo-code of the CDGA algorithm is given in Algorithm~\ref{alg:fulldist}. Since the solution is found in the continuous space, similar to Section~\ref{sec:Small}, the last stage of the algorithm is obtaining the solution in the feasible set of allocations. This step requires a centralized processor with the knowledge of the feasible solutions. Nevertheless, as compared to the centralized approach (Section~\ref{sec:Small}), the centralized processor is no longer in charge of deriving the optimal allocations for each graph job. \begin{algorithm}[t] {\footnotesize \caption{CDGA: Consensus-based distributed graph job allocation}\label{alg:fulldist} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{Convergence criteria $0<\upsilon<<1$, maximum number of iterations $K$.} At each DC $d^i\in\mathcal{D}$, choose an arbitrary initial value for $\lambda^i(1),\gamma^i(1),\Lambda^i(1)$.\\ \For{$k=1$ to $K$}{ At each DC $d^i\in\mathcal{D}$, derive the values of $\lambda^i,\gamma'^i,\Lambda^i$ for the next iteration (k+1) using Eq.~\eqref{eq:full_dist_2}. \label{lst:line:grad}\\ At each DC $d^i\in\mathcal{D}$, update the value of $\gamma^i$ using Eq.~\eqref{eq:full_dist_3}.\\ \If{$|\gamma^i(k+1)-\gamma^i(k)|\leq \upsilon$ and $|\Lambda^i(k+1)-\Lambda^i(k)|\leq \upsilon$ and $|\lambda^i(k+1)-\lambda^i(k)|\leq \upsilon$ and $|\gamma^i(k+1)-\gamma^j(k)|\leq \upsilon, \;1\leq i\neq j \leq n_d$}{ Go to line~\ref{lst:line:con}. } } Derive the convex relaxed solution described in Eq.~\eqref{eq:ms}.\label{lst:line:con}\\ Derive the allocation using Eq.~\eqref{eq:weightedmeanSquare}. } \end{algorithm} \vspace{-3mm} \section{Graph Job Allocation in Large-Scale {GDCN}s: Decentralized Approach using Cloud Crawling and PAs' Computing Resources}\label{sec:Large} \noindent Large-scale {GDCN}s consist of an enormous number of PAs and DCs. This fact imposes three challenges for graph job allocation: i) The CDGA algorithm developed above becomes infeasible. In particular, excessive computational burden will be incurred on the DCs due to the large number of arriving jobs. Also, CDGA in large-scale {GDCN}s will incur a long delay (e.g., a GDCN with $100$ DCs involves $300$ Lagrangian multipliers and requires hundreds of iterations for convergence), which may render the final solution less effective for the current state of the network. Moreover, continuous communication between the DCs imposes a considerable congestion over the communication links. ii) So far, the inherent assumption in our study is a known set of feasible allocations for the graph jobs. This requires solving the NP-complete problem of sub-graph isomorphism between the graph jobs and the large-scale aggregated network graph, which may take a long time. iii) Even for a given graph job, the size of the feasible allocation set becomes prohibitively large in a large-scale network. For instance, in a fully-connected network of $100$ DCs, each with $10$ slots, the number of feasible allocations for a simple triangle graph job is ${1000\choose 3}\sim 166\times 10^6$. These concerns motivate us to develop \textit{cloud crawlers}, based on which we address the mentioned challenges through a decentralized framework. Here, we use the term ``crawler" to describe the movement between adjacent DCs. This may bear a resemblance to the term \textit{web crawler}. Nevertheless, the cloud crawlers introduced here are fundamentally different from conventional web crawlers (e.g., \cite{ref:crawler1,ref:crawler2,ref:crawler3}). Our cloud crawlers aim to extract suitable sub-graphs from {GDCN}s for specified graph job structures when traversing the network, while web crawlers are mainly developed to extract information from Internet URLs by looking for keywords and related documents. \begin{algorithm}[htb!] \footnotesize{ \caption{Cloud crawling}\label{alg:CloudCrawler} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{Initial server $d^i\in \mathcal{D}$, $Gjob_j$, the center node $v_c$ and its maximum shortest distance $D$ to the nodes of the graph, size of the suggested strategies $|\mathcal{SA}_j|$.} Initialize a BST ($BST$), $IA$ as a list of list of lists, $\mathcal{VISITED}=\{\}$, and vector $Feas\_A$ with length $D+1$.\\ $\mathcal{VISITED}= \mathcal{VISITED} \cup d^i$\\ $Feas\_A[1]=1$\\ \For{$r=1$ to $D$}{\label{algLine:1} $Feas\_A[r+1]=Feas\_A[r]+|N^{r}_{v_c}|$\\ } \label{algLine:2} Observer the current pdf of the load of the server $f_{\tilde{L}^i}$ \label{lst:line:crawl}\\ Initialize $IA\_temp$ as a list of list of lists.\\ \%Completing the incomplete allocations using the slots of current DC:\\ \For{$r=1$ to $len(IA)$}{\label{algLine:thisDC3} $Last\_Alloc= IA[r,len(IA[r])]$\%Obtain the last allocation done for each incomplete allocation. This is a list of $4$ elements (see line \ref{alg:riid}) \\ $AN=|\mathcal{V}_j|-Last\_Alloc[4]$ \% \#assigned nodes of the job \\ $j=find(Feas\_A==AN)+1$ \%Next neighborhood that needs to be assigned\\ $SA=0$\\ \While{$j\leq D+1$}{ $SA=SA+|N^{j}_{v_c}| $\%\#used slots from the current DC\\ \If{$SA\leq |\mathcal{S}^i|$}{ $p=E\left\{\tilde{\pi}^i\left(\tilde{L}^i+SA\right)\right\}$\label{algPower}\\ $LL\_temp=IA[r]$ \%Initialize a temporary list\\ $LL\_temp.append([d^i,SA,p,Last\_Alloc[4]-SA])$\\ \If{$j = D+1$}{ \%Add completed allocations to the BST\\ \hspace{-3mm}$Tot\_p = Find\_Tot\_Cost(LL\_temp)$ \%Algorithm~\ref{alg:power_tot}\\ \hspace{-3mm}$Alloc=Create\_Alloc(LL\_temp)$\%Algorithm~\ref{alg:cAlloc}\\ \hspace{-3mm}$BST=BST\_Add(BST,\underbrace{Tot\_p}_{key},\underbrace{Alloc}_{value},|\mathcal{SA}_j|)$\\ \vspace{-3mm} \%Algorithm~\ref{alg:BSTadd} }\Else{ \hspace{-3mm}$IA\_temp.append(LL\_temp)$ } } $j=j+1$ } } $IA = IA\_temp$\\ \label{algLine:thisDC4} \%Assigning the nodes to the current DC:\\ \For{$r\;\; in\;\; Feas\_A$}{ \label{algLine:thisDC1} \If{$r \leq |\mathcal{S}^i|$}{ $p=E\left\{\tilde{\pi}^i\left(\tilde{L}^i+r\right)\right\}$\\ $RS=|\mathcal{V}_j|-r$ \%Number of unassigned nodes of the job\\ \If{$RS=0$}{ \hspace{-3.8mm}\%The allocation corresponding to assigning all the nodes to the current server is added to the BST\\ $BST\_Add(BST,p,[d^i,r],|\mathcal{SA}_j|)$ \%Algorithm~\ref{alg:BSTadd} }\Else{ \hspace{-3.8mm}\%A new incomplete allocation is added to $IA$ as a list of list\\ $IA.append([[d^i,r,p,RS]])$\label{alg:riid} } } }\label{algLine:thisDC2} \If{All the adjacent DC are in the set $\mathcal{VISITED}$}{\label{algLine:nextDC} \hspace{-3mm} Initialize a new $IA$ and randomly choose one adjacent DC~$d^k$\\ \hspace{-3mm} $\mathcal{VISITED}=\{\}$ }\Else{ Randomly choose one adjacent DC $d^k$\\ } $\mathcal{VISITED}=\mathcal{VISITED} \cup \{d^k\}$\\ $i=k$\\ crawl to $d^i$ and go to line \ref{lst:line:crawl}\label{algLine:nextDC2} \\ } \end{algorithm} \subsection{Strategy Suggestion Using Cloud Crawling} We introduce a cloud crawler (CCR) which carries a collection of structured information traveling between adjacent DCs. It probes the connectivity among the DCs and status of them (power usage, load distribution, etc.), based on which it provides a set of suggested allocations for the graph jobs. For a faster network coverage, multiple CCRs for each type of graph job can be assumed. Information gleaned by the CCRs can be shared with the PAs who act as mediators between the {GDCN} and customers using two mechanisms: i) the CCR shares them with a central database, which PAs have access to, on a regular basis; ii) the CCR shares them with DCs as it passes through them and the DCs update the connected PAs accordingly. The goal of a CCR is to find ``potentially good" feasible allocations to fulfill a graph job's requirements considering the network status. We consider a potentially good feasible allocation as a sub-graph in the aggregated network graph which is isomorphic to the considered graph job leading to a low cost of execution. In the following, we first prove a theorem, based on which we provide a corollary aiming to describe a fast decentralized approach to solve the sub-graph isomorphism problem in large-scale {GDCN}s. \begin{definition}\label{def:1} Two graphs $G$ and $G'$ with vertex sets $\mathcal{V}$ and $\mathcal{V}'$ are called isomorphic if there exists an isomorphism (bijection mapping) $g: V \rightarrow V'$ such that any two nodes, $\Scale[.97]{a,b\in \mathcal{V}}$, are adjacent in $G$ if and only if $\Scale[.97]{g(a),g(b)\in \mathcal{V'}}$ are adjacent in $G'$. \end{definition} \begin{algorithm}[h] {\footnotesize \caption{$Find\_Tot\_Cost$}\label{alg:power_tot} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{A list $LL$} \Output{The total cost $C$.} $C=0$\\ $j=0$\\ \While{LL[j]!=null}{ \hspace{-3mm}$C=C+LL[j][3]$ \% Sum the incurred costs on all the DCs involved\\ \hspace{-3mm}$j=j+1$ } return C } \end{algorithm} \begin{algorithm}[h] {\footnotesize \caption{$Create\_Alloc$}\label{alg:cAlloc} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{A list $LL$} \Output{Allocation strategy $S$} Initialize $S$ as a list of lists\\ $j=0$\\ \While{LL[j]!=null}{ \hspace{-3mm}$S=S.append([LL[j][1],LL[j][2]])$ \%The DC's index and its number of used slots\\ \hspace{-3mm}$j=j+1$\\ } return S } \end{algorithm} \begin{algorithm}[h] {\footnotesize \caption{$BST\_Add$}\label{alg:BSTadd} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{A binary search tree $BST$, a $key$ and a $value$, the desired size of the suggested strategy set $|\mathcal{SA}_j|$} \Output{A binary search tree $BST$} \If{BST.length $< |\mathcal{SA}_j|$}{ BST=BST.Insert($key$,$value$) }\ElseIf{$key < $ BST.get\_max().key }{ BST=BST.Delete(BST.get\_max())\\ BST=BST.Insert($key$,$value$) } return BST } \end{algorithm} \begin{theorem}\label{th:graphIso} Consider graphs $G$ and $H$ with vertex sets $\mathcal{V}_G$ and $\mathcal{V}_H$, respectively, where $|\mathcal{V}_G| \leq |\mathcal{V}_H|$. Assume that $H$ can be partitioned into multiple complete sub-graphs $h_0,...,h_N$, $N\geq1$, with vertex sets $\mathcal{V}_{h_0},,...,\mathcal{V}_{h_N}$, where $\cup_{i=0}^{N} \mathcal{V}_{h_i}=\mathcal{V}_H$, and all the nodes in each pair of sub-graphs with consecutive indices are connected to each other. Consider node $v \in \mathcal{V}_G$ and let $D\leq N$ denote the length of the longest shortest path between $v$ and nodes in $\mathcal{V}_G$. Define $\mathcal{N}^k_{v} \triangleq \{\hat{v}\in \mathcal{V}_G : SP(\hat{v},v)=k\}$, $\mathcal{N}^0_{v}=\{v\}$, where $SP(.,.)$ denotes the length of the shortest path between the two input nodes. Let $\{i_j\}_{j=0}^{D}$ be a sequence of integer numbers that satisfy the following conditions: \begin{align} &\hspace{-1mm}0\leq i_0,i_1,i_2,\cdots,i_{D} \leq D+1,\label{con:1}\\ &\hspace{-1mm}\sum_{l=0}^{D} i_l=D+1, \\ &\hspace{-1mm}i_{j}=0 \Rightarrow i_{j+1}=0, \;\;\forall j\in\{0,\cdots,D-1 \}.\label{con:3} \end{align} For such a sequence $\{i_j\}_{j=0}^{D}$, there is at least an isomorphic sub-graph to $G$, called $G'$, in $H$ with the corresponding isomorphism mapping $g$, for which at least one of the nodes of $G'$, $v'=g(v)$, belongs to $h_0$, if the following set of conditions is satisfied: \vspace{-1mm} \begin{equation}\label{eq:proover} \begin{aligned} \begin{cases} |\mathcal{V}_{h_0}|\geq \sum_{i=0}^{i_0-1}|\mathcal{N}^{i}_{{v}}|,\\ |\mathcal{V}_{h_1}|\geq \sum_{i=1}^{i_1} \mathbf{1}_{\{i_1 \geq 1\}}|\mathcal{N}^{i+i_0-1}_{{v}}|, \\ |\mathcal{V}_{h_2}|\geq \sum_{i=1}^{i_2} \mathbf{1}_{\{i_2 \geq 1\}}|\mathcal{N}^{i+i_0+i_1-1}_{{v}}|, \\ \vdots\\ |\mathcal{V}_{h_{D}}|\geq \sum_{i=1}^{i_D}\mathbf{1}_{\{i_D \geq 1\}}|\mathcal{N}^{i+\sum_{l=0}^{D-1} i_{l} -1}_{{v}}|. \end{cases} \end{aligned} \end{equation} \end{theorem} \begin{proof} The key to prove this theorem is considering the following mapping between the nodes of $G$ and the sub-graphs in $H$: \begin{equation}\label{eq:middproof} \hspace{-3.4mm} [v \rightarrow h_0, \;\mathcal{N}^1_{{v}}\rightarrow h_1,\; \mathcal{N}^2_{{v}}\rightarrow h_2, \cdots, \;\mathcal{N}^D_{{v}}\rightarrow h_D]. \end{equation} Under this mapping, the mapped nodes form an isomorphic graph to $G$ since the connection between all the adjacent nodes in $G$ is met in $H$. That is because they are either placed at the same (fully-connected) $h_i$, $0\leq i \leq N$ or in (fully-connected) adjacent $h_i$-s, $0\leq i \leq N$. With a similar justification, it can be proved that concatenation of the mapped nodes to the adjacent $h_i$-s, $0\leq i \leq N$, in Eq.~\eqref{eq:middproof} preserves the isomorphic property. For instance, all the following mappings form isomorphic graphs to $G$ in $H$: \begin{align} &\hspace{-2mm}[v \rightarrow h_0, \;\mathcal{N}^1_{{v}}\rightarrow h_1,\; \cdots,\mathcal{N}^{D-2}_{{v}}\rightarrow h_{D-2}, \nonumber \\ &\hspace{-2mm}\;\mathcal{N}^{D-1}_{{v}} \cup \mathcal{N}^D_{{v}}\rightarrow h_{D-1}, \{\}\rightarrow h_{D}],\\ &\hspace{-2mm}[v \rightarrow h_0, \;\mathcal{N}^1_{{v}}\rightarrow h_1,\; \cdots,\mathcal{N}^{D-3}_{{v}}\rightarrow h_{D-3}, \nonumber \\ &\hspace{-2mm}\;\mathcal{N}^{D-2}_{{v}} \cup \mathcal{N}^{D-1}_{{v}} \cup \mathcal{N}^{D}_{{v}}\hspace{-1mm}\rightarrow \hspace{-1mm} h_{D-2}, \{\}\hspace{-1mm}\rightarrow h_{D-1}, \{\}\hspace{-1mm}\rightarrow h_{D}],\\ &\hspace{-2mm}[v \cup \mathcal{N}^1_{{v}} \rightarrow h_0, \;\mathcal{N}^2_{{v}}\rightarrow h_1,\; \cdots,\mathcal{N}^{D-1}_{{v}}\rightarrow h_{D-2}, \nonumber \\ &\hspace{-2mm}\;\mathcal{N}^{D}_{{v}} \rightarrow h_{D-1}, \{\}\rightarrow h_{D}],\\ &\hspace{-2mm}[{v} \rightarrow h_0, \;\mathcal{N}^1_{{v}} \cup \mathcal{N}^2_{{v}} \cup \mathcal{N}^3_{{v}}\rightarrow h_1, \nonumber \\ &\hspace{-2mm}\mathcal{N}^4_{{v}} \rightarrow h_2, \cdots,\;\mathcal{N}^{D}_{{v}}\rightarrow h_{D-2}, \hspace{-2mm}\;\{\} \rightarrow h_{D-1}, \{\}\rightarrow h_{D}]. \end{align} It can be seen that conditions stated in Eq.~\eqref{con:1}-\eqref{con:3} denote the feasible concatenation strategies, where each $i_j$ denotes the number of neighborhoods mapped to $h_j$, $0\leq j \leq D$. Also, Eq.~\eqref{eq:proover} ensures the feasibility of the corresponding mappings. \end{proof} \begin{corollary}\label{cor:1} For $Gjob_j$, assume a CCR located at DC $d^{j_0}$ allocating at least one node of $Gjob_j$, $v_c\in \mathcal{V}_j$, to one slot at $d^{j_0}$, where the length of longest shortest path between $v_c$ and nodes in $\mathcal{V}_j$ is $D$. Assume that the CCR's near future path can be represented as $d^{j_0} \rightarrow d^{j_1} \cdots \rightarrow d^{j_{D}} $, where $j_i\neq j_k,\; \forall i\neq k$. Considering $d^{j_i}$ as $h_i$ in Theorem~\ref{th:graphIso}, for each realization of the sequence $\{i_j\}_{j=0}^{D}$ satisfying Eq.~\eqref{con:1}-\eqref{eq:proover}, the following described allocation $\mathbf{M}_j=[m^1_j,m^2_j,\cdots,m^{n_d}_j]$ is feasible and is isomorphic to $Gjob_j$. \begin{equation} \begin{aligned} m^k_j=\begin{cases} \sum_{i=0}^{i_0-1}|\mathcal{N}^{i}_{v_{c}}| &k={j_0},\\ \sum_{i=1}^{i_1} \mathbf{1}_{\{i_1 \geq 1\}}|\mathcal{N}^{i+i_0-1}_{v_{c}}|&k=j_1, \\ \sum_{i=1}^{i_2} \mathbf{1}_{\{i_2 \geq 1\}}|\mathcal{N}^{i+i_0+i_1-1}_{v_{c}}|&k=j_2, \\ \vdots\\ \sum_{i=1}^{i_D}\mathbf{1}_{\{i_D \geq 1\}}|\mathcal{N}^{i+\sum_{l=0}^{D-1} i_{l} -1}_{v_{c}}| &k=j_D,\\ 0 \;& Otherwise. \end{cases} \end{aligned} \end{equation} \end{corollary} Using our method described in the above corollary, it can be verified that the complexity of obtaining an isomorphic sub-graph to a graph job for a CCR becomes $O(D)$, where $D$ is the diameter of the graph job. Henceforth, we recall $v_c$ defined in Corollary~\ref{cor:1} as the center node, which can be chosen arbitrarily from the graph job's nodes. The pseudo-code of our algorithm implemented in a CCR is given in Algorithm~\ref{alg:CloudCrawler}. We use the binary search tree (BST) data structure~\cite{ref:DS} to structurize the carrying suggested strategies. To handle the large number of feasible allocations, we limit the capability of a CCR in carrying potentially good strategies (size of the BST) to a finite number $|\mathcal{SA}_j|$ for $Gjob_j\in\mathcal{J}$. Some important parts of Algorithm~\ref{alg:CloudCrawler} are further illustrated in the following. \textbf{A) Initialization:} A CCR is initialized at a DC for a certain graph job, $Gjob_j\in\mathcal{J}$, and a specified number of suggested strategies ($|\mathcal{SA}_j|$) to be carried.\footnote{Note that using a simple extension of this algorithm, a CCR can handle the extraction of suggested strategies for multiple graph jobs at the same time.} Each CCR carries a BST, a list~\cite{list} of incomplete allocations ($IA$) and a set of visited neighbors ($Visited$) (can be implemented as a list). In Fig.~\ref{fig:CCR}-a, topology of a graph job is shown along with three DCs where each square denotes a slot in a DC. The CCR is initialized at $d^1$ traversing the path $d^1\rightarrow d^2\rightarrow d^3$. \textbf{B) Determining the Graph Job Topology Constraints (lines:~\ref{algLine:1}-\ref{algLine:2}):} For a given center node of a graph job, i.e., $v_c$ in Corollary~\ref{cor:1}, the algorithm calculates the feasible number of nodes allocated to DCs according to Corollary~\ref{cor:1}. In Fig.~\ref{fig:CCR}-a, the center node is denoted by $v_c$ and different set of neighbors located in various shortest paths to $v_c$ are demonstrated. \textbf{C) Allocation Initialization and Completion (lines: \ref{algLine:thisDC3}-\ref{algLine:thisDC2}):} \begin{figure*}[t] \centering \includegraphics[width=1\textwidth]{Figures/Crawl.pdf} \caption{a: The graph job topology and the neighboring nodes to the center node (left); three DCs along with the carried incomplete and complete allocations of the CCR upon arriving at each DC (right). b: Some examples of completed allocations.} \label{fig:CCR} \vspace{-4mm} \end{figure*} According to Corollary~\ref{cor:1}, the crawler attempts to complete the incomplete allocations in $IA$ by accommodating the remaining nodes of the graph job to the current DC (lines: \ref{algLine:thisDC3}-\ref{algLine:thisDC4}). During this process, if the remaining number of unassigned nodes of the graph job becomes zero, the corresponding allocation is added to the BST considering its incurred cost. The rest of the allocations are added to the $IA$. Also, the allocations are initialized upon arriving at each DC using Corollary~\ref{cor:1} (lines: \ref{algLine:thisDC1}-\ref{algLine:thisDC2}). In Fig.~\ref{fig:CCR}-a, the initialized allocations are depicted underneath $d^1$. Also, the updated set of incomplete allocations and completed allocations during the movement of the CCR are depicted underneath $d^2$ and $d^3$. Also, some of the completed allocations are depicted in Fig.~\ref{fig:CCR}-b for a better understanding. \textbf{D) Traversing the {GDCN} (lines: \ref{algLine:nextDC}-\ref{algLine:nextDC2}):} The CCR examines the adjacent DCs of its current location. If there are multiple non-visited neighbor DCs, the CCR chooses its next destination randomly among them. However, if all the neighbor DCs are visited, the CCR clears the $visited$ set, and chooses its next destination at random. This process is designed to avoid re-visiting the previously visited DCs or trapping at a DC in which all of its neighbor DCs are visited. \begin{remark} After the size of the BST reaches the predefined length ($|\mathcal{SA}_j|$), a new completed strategy is added to the BST if it possesses a lower incurred cost as compared to the strategy with the maximum incurred cost in the BST, and the latter is deleted subsequently. \end{remark} \begin{remark} It is assumed that each DC has a probabilistic prediction for its near future load distribution. Hence, the crawler obtains the expected cost of allocation in line \ref{algPower}, e.g., $E\{\tilde{\pi}^i(\tilde{L}^i+m)\}= \sum_{j=0}^{|\mathcal{S}^i|-m} \pi(j+m) f_{\tilde{L}^i}(\tilde{L}^i=j)$ when $m$ slots of DC $d^i$ are taken, where $f_{\tilde{L}^i}$ is the probability mass function of the predicted load of $d^i$ and $\pi(j+m)$ is the incurred cost stated in Eq.~\eqref{eq:powerPrice} with $L^i+m^i_j$ replaced with $j+m$. \end{remark} \begin{remark} In the BST considered (see Algorithm~\ref{alg:CloudCrawler}), each node has two attributes: $``key"$ and $``value"$, where $key$ is a real number and $value$ is a list. The functions $getmax()$, $Delete()$, and $Insert()$ are assumed to be known, for which sample implementation can be found in~\cite{ref:DS}. Also in Algorithm~\ref{alg:CloudCrawler}, the function $len()$ returns the length of the input argument. If the input is a list, it returns the number of elements; if the input is a list of lists, it returns the number of lists inside the outer-list, etc. Moreover, in Algorithm~\ref{alg:BSTadd}, the $``length"$ attribute indicates the number of nodes of the BST. \end{remark} \begin{remark} The BST is used for its unique characteristics. If the BST is balanced, (e.g., implemented as an AVL tree) this data structure enables deletion of the strategy with the maximum cost and insertion of a new strategy, which are both necessary in the CCR, in time complexity of $O(\log |\mathcal{SA}_j|)$. Moreover, a simple \textit{inorder traversal}, which can be done in $O(|\mathcal{SA}_j|)$, gives the suggested strategies in ascending order with respect to their incurred cost. \end{remark} \begin{remark} We designed CCRs mainly for allocation of graph jobs in large-scale GDCNs. However, they could also be implemented in small- and medium-scale GDCNs. In those cases, if the CCR continuously explores the network and the power consumption of DCs changes smoothly over time, the allocation cost of the best strategy in the BST of the CCR would be similar to those of the solutions obtained in Section~\ref{sec:Small} and ~\ref{sec:Medium}. Note that, the analytical solutions proposed for small- and medium-scale GDCNs are guaranteed to find the optimal solution of $\mathcal{P}3$, which, due to the limitations discussed at the beginning of this section, are not applicable in large-scale GDCNs. However, cloud crawling can be viewed as an empirical approach, which not only provides a distributed solution, but also offers additional benefit such as extraction of isomorphic sub-graphs to a given graph job. \end{remark} Fig.~\ref{diag:sysmodel} depicts a sample CCR traversing over the network, where its corresponding information is shown in the bottom left of the figure. In this figure, a crawler is considered attempting to assign a graph job with $7$ nodes to the network. It is assumed that given the center node $v_c$, we have: $\mathcal{N}^0_{v_{c}}=1$, $\mathcal{N}^1_{v_{c}}=2$, $\mathcal{N}^2_{v_{c}}=2$, $\mathcal{N}^3_{v_{c}}=1$, and $\mathcal{N}^4 _{v_{c}}=1$. In the depicted BST, each suggested strategy is a list of lists, each of which consists of two elements: index of a DC and the number of slots utilized from that DC. So far, PAs are provided with a pool of potentially good allocations using CCRs. In the following, we address suitable strategy selection approaches for PAs with respect to the pricing policy of the DCPs. \subsection{Strategy Selection Under Fixed Pricing}\label{sec:regret} Due to the simplicity of implementation, fixed pricing is still a common approach to offer cloud services to customers. In this case, DCPs determine a constant price for utilizing each slot of their DC, which is chosen with respect to the expected load of the DC to guarantee a certain amount of profit. In this subsection and Subsection~\ref{sec:correquib}, it is assumed that PAs assign their graph jobs to the system in a sequential manner, where at each \textit{iteration} each PA assigns (at most) one graph job of each type (if it is requested by a customer) to the system. \subsubsection{Problem Formulation} We formulate the problem from the perspective of one PA since the utilization cost of DCs are assumed to be constant. For the $n^{th}$ arriving $Gjob_j$, the PA chooses an allocation $\mathbf{M}_{j,(n)}=[m^1_{j,(n)},\cdots,{m}^{n_d}_{j,(n)}]$ from the pool of the CCR's suggested allocations $\mathcal{SA}_j$. In this case, we define the utility function of a PA as: \begin{align}\label{eq:util2} &U_j(n)|_{\mathbf{M}_{j,(n)}} \triangleq \rho_j -\chi_j \sum_{k=1}^{n_d} PC^k {m}^k_{j,(n)} \nonumber \\ &-\phi_j \sum_{k=1}^{n_d} \mathbf{1}_{\{{m}^k_{j,(n)}>0\}}+ \chi_j |\mathcal{V}_j|PC^{max}+\phi_j |\mathcal{V}_j|, \end{align} where $PC^.$ denotes the slot cost of the indexed DC and $PC^{max}$ is a constant larger than the price of all the slots in the system. In this expression, different preferences of PAs are governed by positive real constants $\phi_j$ and $\chi_j$, $\rho_j \in \mathbb{R}^+$ is the default reward of execution, the second term describes the payment, the third term describes the privacy preference of the PA, and the last two terms are added to ensure that the utility function is non-negative. In the third term, a large value of $\phi_j$ implies more tendency toward utilizing fewer DCs to execute the graph job. The normalized utility function can be derived as: $\tilde{U}_j(n)= U_j(n)/\big[\rho_j+\chi_j|\mathcal{V}_j|PC^{max} + \phi_j (|\mathcal{V}_j|-1)\big]$. In this context, each PA aims to maximize his utility by selecting the best sequence of allocations ${\widetilde{M}_j}^*$. Mathematically: \begin{align} &{\widetilde{M}_j}^*= \argmax_{\widetilde{M}_j=\{\mathbf{M}_{j,(n)}\}_{n=1}^{N_j}} \;\;\sum_{n=1}^{N_j} U_j(n) |_{\mathbf{M}_{j,(n)}} \nonumber \\ &{\textrm{s.t.} } \;\;\mathbf{M}_{j,(n)} \in \mathcal{SA}_j,\; \;\forall n\in \{1,\cdots,N_j\}. \end{align} Due to accessibility constraints, a newly joined PA may not have complete information about the prices of all the slots. Also, DCPs may update the utilization costs periodically. Hence, initially there is a lack of knowledge about the DCs' prices on the PAs' side making conventional optimization techniques inapplicable. We tackle this problem by proposing an online learning algorithm partly inspired by the concept of \textit{regret}. This concept originates in the multi-armed bandit problem~\cite{ref:gambler}, where the gambler aims to identify the best slot machine to play (best strategy) at each round of his gambling while considering the history of the rewards of the machines. Our algorithm is an advanced version of the original algorithm in~\cite{ref:gambler} tailored for the graph job allocation in {GDCN}s. \subsubsection{Boosted Regret Minimization Assignment (BRMA) Algorithm} By choosing a strategy from the set of suggested strategies of a CCR and observing the utility, one can get an estimate about the utility of the similar strategies targeting similar DCs. To address this, in our algorithm, we use the concept of \textit{k-means clustering}~\cite{ref:clustering} to partition the strategies into different groups with respect to their similarity. Let $\mathcal{C}=\{C_1,C_2,\cdots,C_{|\mathcal{C}|}\}$ denote the set of clusters obtained using the method of~\cite{ref:clustering}. We group consecutive iterations of our algorithm as a ``time-frame", according to which $\mathcal{T}=\{tf_1,tf_2,\cdots, tf_{\ceil{N/\Gamma}}\}$ denotes the set of time-frames, where $N$ is the number of iterations and $\Gamma$ is the time-frame length. In this case, iterations $1$ to $\Gamma$ belong to $tf_1$, iterations $\Gamma+1$ to $2\Gamma$ belong to $tf_2$, etc. Let $\mathcal{A}_{tf_k}$ denote the set of actions performed in the $k^{th}$ time-frame and $A_{k}$ denote the action executed at iteration $k$. For strategy $m\in \mathcal{SA}_j$, let $ \kappa^k_m=\sum_{n=(k-1)\Gamma+1}^{k\Gamma} \mathbf{1}_{\{A_{n}=m\}} $ denote the number of times the strategy is chosen during $tf_k$. The pseudo-code of our proposed algorithm is given in Algorithm~\ref{alg:regretmin}. The main differences between our proposed algorithm and the method in~\cite{ref:gambler} are as follows: i) the concept of clustering is leveraged to group the analogous strategies; ii) a new weight update mechanism is proposed based on the concept of ``similarity", with which the weights of the unutilized strategies are estimated employing the utility of the chosen strategies; iii) the concept of time-frame is incorporated in our design (see Remark~\ref{remark:Grouping}). These approaches significantly improve the speed of convergence of the algorithm (see Section~\ref{sec:Simu}). In our algorithm, during $tf_n$, every time a PA needs to allocate $Gjob_j$, he chooses a strategy ($m\in \mathcal{SA}_j$) with probability: \begin{align} \label{eq:prob} \mathbf{p}_{j,(m)}(tf_n)&= (1-E) \frac{w_{j,(m)}(tf_n)}{\sum_{a \in \mathcal{SA}_j} w_{j,(a)}(tf_n)} + \frac{E}{|\mathcal{SA}_j|}, \end{align} where $w_{j,(m)}(tf_n)$ denotes the current weight of strategy $m$ and $0<E<1$. The second term is introduced to avoid trapping in local maxima. \textbf{Description of the BRMA Algorithm:} Initially, all the strategies have the same weight and the same probability of selection. At each iteration, one strategy is chosen according to the probability of selection. At the end of each time-frame, virtual rewards of the chosen strategies are derived using Eq.~\eqref{eq:Q}. Also, the utility of those strategies in a cluster from which one member is chosen is estimated using Eq.~\eqref{eq:Q2}. To obtain the estimation, we propose the following similarity index: $\frac{\exp \left(\frac{k_s<A_z,m>}{||A_z||\; ||m||}\right)-1}{\exp({k_s})-1}$, where $k_s>>1$ is a real constant. This index is maximized when two strategies utilize the same exact DCs with the same number of slots, and it is zero when they have no used DCs in common. The weights for the next time-frame are obtained using Eq.~\eqref{eq:weight} ($K$ is a positive real constant) followed by obtaining the probability of selections. \begin{algorithm}[t] \caption{BRMA: Boosted~regret~minimization assignment}\label{alg:regretmin} {\footnotesize \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{Length of time-frames $\Gamma$, $\mathcal{SA}_j$, number of time frames $TN_j$.} Obtain clusters $\mathcal{C}=\{C_1,C_2,\cdots,C_{|\mathcal{C}|}\}$ from $\mathcal{SA}_j$ according to~\cite{ref:clustering}.\\ Assign $w_{j_i}(tf_1)=1$, $\mathbf{p}_{j_i}(tf_1)=1/|\mathcal{SA}_j|$, $\forall i \in \mathcal{SA}_j$.\\ \For{$n=1$ to $TN_j$}{ Choose a strategy $m\in \mathcal{SA}_j$ according to $\mathbf{p}_j(tf_{\ceil{n/\Gamma}})$ ($A_n=m$) and observe the normalized utility $\tilde{U}_j(n)|_{m}$.\\ \If{$n=\Gamma k$, $k \in \mathbb{Z}^+$}{ Obtain the virtual reward for each $m \in \mathcal{A}_{tf_k}$ as follows: \vspace{-2.5mm} \begin{equation}\label{eq:Q} \hspace{-7mm}Q'_{j,(m)}(tf_k)\hspace{-.5mm}=\hspace{-.5mm} \frac{\displaystyle\sum_{z=(k-1)\Gamma+1}^{k \Gamma} \tilde{U}_j(z)|_{A_z} \mathbf{1}_{\{A_z=m\}}}{\kappa^k_m}. \end{equation}\\ Obtain the virtual reward for those strategies $m \notin \mathcal{A}_{tf_k}$ which at least one strategy from their cluster is chosen as follows: \vspace{-2.5mm} \begin{equation}\label{eq:Q2} \begin{aligned} Q'_{j,(m)}(tf_k)= \frac{1}{|C_{q}| } \Bigg[ \sum_{z={(k-1)\Gamma+1}}^{{k\Gamma}} \mathbf{1}_{\{A_z\in C_{q}\}}\\ \underbrace{\frac{\exp \left(\frac{k_s <A_z,m>}{||A_z||\; ||m||}\right)-1}{\exp({k_s})-1}}_\text{similarity index} \tilde{U}_j(z)|_{A_z} \Bigg] \hspace{0.6mm} \textrm{ if } m\in C_{q}. \end{aligned} \end{equation}\\ For strategy $m\in\mathcal{SA}_j$, $Q'_{j,(m)}(tf_k)=0$ if neither itself nor any strategy from its cluster is chosen in this time-frame.\\ Update the weights of the strategies for the next time-frame: \vspace{-2.5mm} \begin{equation}\label{eq:weight} \hspace{-7mm}w_{j,(m)}(tf_{k+1})= w_{j,(m)}(tf_{k}) \exp\hspace{-.5mm} \left(\frac{K Q'_{j,(m)} (tf_{k})}{|\mathcal{SA}_j|}\right), \end{equation}\\ Derive the distribution $\mathbf{p}_j(tf_{k+1})$ according to Eq.~\eqref{eq:prob}.\\ } } } \end{algorithm} \begin{remark}\label{remark:Grouping} In case of updating the weights of the strategies at each time instant, selecting multiple strategies with low utilities in the initial iterations boosts the weights of those strategies leading to an undesired low probability of selection for not chosen high utility strategies. To avoid this, we use the concept of time-frame and update the weights at the end of time-frames. \end{remark} \begin{figure*}[htb] \centering \includegraphics[width=7.1in, height=.8in]{Figures/GraphJobsFig.pdf} \caption{Topology of the graph jobs.} \label{fig:graphJobs} \vspace{-3mm} \end{figure*} \begin{figure*}[htb!] \centering \subcaptionbox{The incurred power of allocation using the optimal allocation (exhaustive search) and the sub-optimal approach and greedy algorithms.\label{diag:scenario1a}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/opt_vs_sub_opt_Small-eps-converted-to.pdf}}\quad \subcaptionbox{Cumulative average incurred power of allocation using the optimal allocation (exhaustive search) and the sub-optimal approach and greedy algorithms.\label{diag:scenario1b}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Average_Cost_Small-eps-converted-to.pdf}}\quad \subcaptionbox{The generated revenue upon using the sub-optimal approach as compared to the greedy methods.\label{diag:scenario1c}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/profit_Small-eps-converted-to.pdf}} \caption{Simulation results of the small-scale {{GDCN}}.} \label{diag:scenario1} \vspace{-5mm} \end{figure*} \subsection{Strategy Selection Under Adaptive Pricing}\label{sec:correquib} In modern cloud networks, cloud users are charged in a real-time manner with respect to their incurred load on DCs and the status of the DCs~\cite{zhao2014dynamic, wan2016reactive}. In this work, we propose an adaptive pricing framework suitable for graph job allocation in {GDCN}s. Let $\mathcal{P}=\{p_1,\cdots,p_{|\mathcal{P}|}\}$ denote the set of active PAs. For $Gjob_j$, based on Eq.~\eqref{eq:powerPrice}, upon utilizing suggested strategy $\mathbf{M}_{j,(a_k)}\in \mathcal{SA}_j$, we model the total payment of PA $p_k\in \mathcal{P}$ to the DCPs as: \begin{equation}\label{eq:loadprice} \begin{aligned} &\Upsilon(\mathbf{M}_{j,(a_k)},\{\mathbf{M}_{j,({a_{k'}})}\}_{k'=1, k'\neq k}^{|\mathcal{P}|})=\sum_{i=1}^{n_d} m^i_{j,(a_k)}\xi^i \nu^i+\\ &\sum_{i=1}^{n_d}\frac{ \xi^i \eta^i N^i \left(\hspace{-1mm} \sigma^i \hspace{-1mm} \left(\frac{L^{i}+ \sum_{k=1}^{|\mathcal{P}|}m^i_{j,(a_k)}}{|\mathcal{S}^i|}\right)^{\alpha^i}\hspace{-3mm}+P^i_{idle} \right)}{\sum_{k=1}^{|\mathcal{P}|} m^i_{j,(a_k)}}m^i_{j,(a_k)}. \end{aligned} \end{equation} Consequently, we model the utility of PA $p_k\in \mathcal{P}$ as: \begin{equation}\label{eq:util1} \begin{aligned} &\hspace{-3mm}c^{p_k}(\{\mathbf{M}_{j,(a_k)}\}_{k=1}^{|\mathcal{P}|}) \triangleq \Pi_{i=1}^{n_d} \mathbf{1}_{\{L^i+\sum_{k=1}^{|\mathcal{P}|} m^{i}_{j,(a_k)} \leq |\mathcal{S}^i| \}} \Big( \rho_j- \\ &\hspace{-3mm}\chi_j \Upsilon(\{M_{j,(a_k)}\}_{k=1}^{|\mathcal{P}|}) -\phi_j \sum_{i=1}^{n_d} \mathbf{1}_{\{{m}^{i}_{j,(a_k)}>0\}} + \chi_j \Upsilon^{max} \\ &\hspace{-3mm}+\phi_j |\mathcal{V}_j|\Big) - \left(1- \Pi_{i=1}^{n_d} \mathbf{1}_{\{L^i+\sum_{k=1}^{|\mathcal{P}|} m^{i}_{j,(a_k)} \leq |\mathcal{S}^i| \}} \right) \Xi^{p_k}, \end{aligned} \end{equation} where $\Pi_{i=1}^{n_d} \mathbf{1}_{\{L^i+\sum_{k=1}^{|\mathcal{P}|} m^{i}_{j,(a_k)} \leq |\mathcal{S}^i| \}}$ ensures the availability of enough free slots, $\Xi^{p_k}$ denotes the penalty for delaying the execution, the constants are the same as Eq.~\eqref{eq:util2}, and $\Upsilon^{max}$ denotes the maximum payment of a PA. In this case, the utility of each PA depends not only on its own choice of action but also on the chosen actions by others. In this paradigm, we model the interactions between the PAs as a \textit{non-cooperative game}, more specifically a multi-player \textit{normal form game}. Consequently, we assume that each PA is rational in the sense that it aims to maximize its own utility function. In summary, for $Gjob_j$, the game can be defined as: $\mathbb{G}_j=(\mathcal{P},\{\mathcal{SA}_j\},\{c^p\}_{p \in \mathcal{P}})$, where $c^p$ is the utility of PA $p\in\mathcal{P}$. To solve this game, we use the concept of correlated equilibrium (CE), which generalizes the idea of Nash equilibrium to enable correlated strategy choices among the players. For the proposed game $\mathbb{G}_j$, we define $\pi_j$ as the probability distribution over the joint strategy space $\Pi_{k=1}^{|\mathcal{P}|} \mathcal{SA_\textit{j}} = \mathcal{SA_\textit{j}} ^{|\mathcal{P}|}$. The set of correlated equilibria $\mathcal{CE}_{j}$ is the convex polytope given by the following expression:\footnote{$\mathbf{M}_{j,({-p_k})}$ denotes the strategy of all the PAs except $p_k$.} \begin{align} &\hspace{-2mm}\mathcal{CE}_{j} = \Big\{\pi_j: \displaystyle\sum_{\mathbf{M}_{j,({-p_k})} \in \mathcal{SA_\textit{j}} ^{|\mathcal{P}|-1}} \pi_j(\mathbf{M}_{j,(a_k)},\mathbf{M}_{j,({-p_k})})\nonumber \\ &\hspace{-3mm}\big[c^{p_k}(\mathbf{M}_{j,({a_k'})},\mathbf{M}_{j,({-p_k})})- c^{p_k}(\mathbf{M}_{j,(a_k)},\mathbf{M}_{j,({-p_k})})\big]\leq 0,\nonumber\\ &\hspace{-2mm}\forall p_k \in \mathcal{P}, \forall \mathbf{M}_{j,(a_k)},\mathbf{M}_{j,({a_k'})} \in \mathcal{SA}_\textit{j} \Big\}. \end{align} Inspired by the pioneer work~\cite{ref:regretmatching}, we propose a distributed algorithm, called regret matching-based assignment (RMBA) algorithm, to solve the proposed game while reaching the CE. The PAs' actions are described in Algorithm~\ref{alg:corrEqui}. In RMBA algorithm, each PA saves the history of actions of the other PAs, using which he obtains the past rewards of the actions given that the other PAs would have taken the same actions (Eq.~\eqref{eq:sameac}). Afterward, each PA derives the regret of not executing different strategies (Eq.~\eqref{eq:regretmatch},~\eqref{eq:regretmatch1}). Finally, the probability of selection of the strategies are determined, where strategies with higher rewards in the past receive higher probabilities (Eq.~\eqref{eq:probEqui}).\footnote{Partitioning the time into ``time-frames'' does not have a significant impact on the convergence of the RMBA algorithm. This is due to the fact that at each iteration of this algorithm, the regret for all the strategies are obtained considering the previously taken action of all the PAs, which reduces the chance of trapping in low utility strategies at the initial iterations (see Remark~\ref{remark:Grouping}).} \setlength{\textfloatsep}{0pt \begin{algorithm}[h] {\footnotesize \caption{RMBA: Regret matching-based assignment}\label{alg:corrEqui} \SetKwFunction{Union}{Union}\SetKwFunction{FindCompress}{FindCompress} \SetKwInOut{Input}{input}\SetKwInOut{Output}{output} \Input{PA $p_k$, graph job's type $j$, number of iterations $N_j$, $\mathcal{SA}_j$.} Select strategies randomly for the first iteration ($n=1$).\\ \For{$n=1$ to $N_j$}{ Denote history of allocations up to iteration $n$ as $\{\mathbf{A}_{\tau}\}_{\tau=1}^{n}$, where $\mathbf{A}_{t}$ is a vector consisting of $|\mathcal{P}|$ elements, which the $j^{th}$ one, $A_t^{j}$, corresponds to $p_j$'s used allocation at iteration $t$.\\ Calculate the substituting reward for every two different allocations ($\forall m_1,m_2\in \mathcal{SA}_j$): \begin{equation}\label{eq:sameac} \begin{aligned} SR^{p_k}_{m_1,m_2}(n)= \begin{cases} c^{p_k}(m_2,\mathbf{A}_n^{-{k}}) &\textrm{ if } A_n^{k}=m_1,\\ c^{p_k}(\mathbf{A}_n) &\textrm{O.W}. \end{cases} \end{aligned} \end{equation}\\ Calculate the substituting average rewards: \begin{equation}\label{eq:regretmatch} \Delta^{p_k}_{m_1,m_2}(n)= \frac{\sum_{\tau=1}^{n} SR^{p_k}_{m_1,m_2}(\tau)-c^{p_k}(\mathbf{A}_{\tau})}{n}. \end{equation}\\ Calculate the average regret: \begin{equation}\label{eq:regretmatch1} R^{p_k}_{m_1,m_2}(n)=\max \{\Delta^{p_k}_{m_1,m_2}(n),0 \}. \end{equation}\\ Form the selection probability distribution of the allocations, $\forall m \in \mathcal{SA}_j$, for the next iteration: \begin{align} \hspace{-6mm} \begin{cases} \hspace{-.0mm} p^{p_k}_{j,(m)}(n+1)\hspace{-.5mm}=\hspace{-.5mm} \frac{1}{\hspace{-0mm} \sum_{m'\in \mathcal{SA}_j} R^{p_k}_{A^{k}_{n},m'}(n)} R^{p_k}_{A^{k}_{n},m}(n) \\ \hspace{48mm}\textrm{if } m\neq A^{k}_{n} \hspace{-0.2mm}, \\ \hspace{-.5mm} p^{p_k}_{j,(m)}(n+1)\hspace{-.5mm}=\hspace{-.5mm} 1- \displaystyle\sum_{m'\in \mathcal{SA}_j: m'\neq m} p^{p_k}_{j,({m'})}(n+1) &\\ \hspace{48mm}\textrm{Otherwise}. \end{cases}\label{eq:probEqui} \end{align}\\ Choose a strategy for the next iteration $A^{p_k}_{n+1}$ according to the derived distribution. } } \end{algorithm} \section{Simulation Results}\label{sec:Simu} \subsection{Simulation of a Small-Scale GDCN} \noindent In this scenario, the network consists of $5$ fully-connected DCs. The number of slots per DC is assumed to follow one of the three scenarios described in Table \ref{table:Slots}. Each of the cloud servers inside a DC is assumed to have $3$ slots. \begin{table}[H] \begin{center} {\footnotesize \begin{tabular}{|c | c| c| c| c| c|} \hline & DC\_1 & DC\_2 & DC\_3 & DC\_4& DC\_5 \\\hline Scenario $1$& $9$ &$12$ &$15$ &$18$ &$21$\\ \hline Scenario $2$& $12$ &$15$ &$18$& $21$ &$24$\\ \hline Scenario $3$& $15$& $18$ &$21$ &$24$ &$27$\\ \hline \end{tabular} } \end{center} \caption{Number of slots of each DC for different scenarios.}\label{table:Slots} \end{table} For all DCs, the following parameters are chosen according to~\cite{ref:powerInfo}, $P_{idle}=150W$, $P_{max}=250W$, $\eta=1.3$, and $\alpha=3$ (these numbers were reported to model the IBM BladeCenter server). Type and topology of the graph jobs are depicted in Fig.~\ref{fig:graphJobs}. It is assumed that at each iteration $10$ graph jobs are needed to be allocated. The arrival rates of graph jobs are set to $1$, $1$, $1$, $3$, and $4$ per iteration for type $1$ to type $5$.\footnote{{\color{black}It is observed that large graph jobs containing more nodes and complicated communication constraints lead to a larger performance gap between our proposed methods and the baseline algorithms as compared to small graph jobs. Note that the actual performance gap is dependent on the topology of the graph job and may vary from one to another.}} The initial load of each DC is assumed to be a random variable uniformly distributed between $0$ and $20\%$ of its number of slots. For each DC, inspired by~\cite{ref:powerDCsurvey}, $\nu$ is chosen to be $5\%$ of the peak power consumption. The cost of electricity ($\xi^i,\; \forall i$) is chosen to be the average cost of electricity in the US $0.12 \$/kWh$. In simulations, we use the term ``incurred power" referring to the difference between the power consumption of the {GDCN} after the graph jobs are assigned as compared to that before the assignment. {\color{black} Since we are among the first to study the power-aware allocation of graph jobs in GDCNs, there is no baseline for direct comparison. Hence, we propose two greedy algorithms as the baselines:} \textbf{Greedy 1:} In this algorithm, for each DC, its future power consumption upon allocating all the nodes of the arriving graph job to it is derived. Then, the DCs are sorted in ascending order according to their future power consumption as: $d^{i_1},\cdots,d^{i_{n_d}}$. Finally, from the feasible set of assignments, the assignment with the largest number of utilized slots from $d^{i_1}$ is chosen. The ties are broken considering the number of utilized slots from $d^{i_{2}}$ and so on. \textbf{Greedy 2:} In this algorithm, at first the number of free slots of each DC is derived and the DCs are sorted in descending order with respect to their number of free slots as: $d^{i_1},\cdots,d^{i_{n_d}}$. From the feasible set of assignments, the assignment with the largest number of utilized slots from $d^{i_1}$ is chosen. Upon having a tie, the process continues by comparing the number of slots utilized form $d^{{i}_{2}}$ and so on. Simulation results of the sequential graph job allocation described in Section~\ref{sec:Small} are presented in Fig.~\ref{diag:scenario1}. For the third scenario\footnote{The rest are omitted due to similarity.} described in Table~\ref{table:Slots}, Fig.~\ref{diag:scenario1}(\subref{diag:scenario1a}) reveals a negligible gap between solving the integer programming described in Eq.~\eqref{eq:int1}-\eqref{eq:int2} using exhaustive search and using the subsequent proposed sub-optimal method (Eq.~\eqref{eq:ms}-\eqref{eq:weightedmeanSquare}), and Fig.~\ref{diag:scenario1}(\subref{diag:scenario1b}) depicts the corresponding cumulative average incurred power of allocations. For all the three scenarios, Fig.~\ref{diag:scenario1}(\subref{diag:scenario1c}) depicts the cumulative profit obtained after $100$ iterations upon using the proposed sub-optimal approach as compared to the greedy methods if graph jobs stay busy in the system for $24$ hours at each round of allocation. As can be seen from Fig.~\ref{diag:scenario1}(\subref{diag:scenario1c}), on average, our method leads to saving of \$1100 on electricity cost. \begin{figure*}[htb!] \centering \subcaptionbox{Convergence of local parameter $\Lambda$ for different DCs.\label{diag:scenarioDista}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Lambdas-eps-converted-to.pdf}}\quad \subcaptionbox{Convergence of global parameter $\gamma$ for different DCs.\label{diag:scenarioDistb}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/gammas-eps-converted-to.pdf}}\quad \subcaptionbox{Number of utilized slots of various DCs.\label{diag:scenarioDistc}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Ms-eps-converted-to.pdf}} \caption{Evolution of the parameters using the CDGA algorithm. The parameters of only 6 DCs are shown for more readability.} \label{diag:scenarioDist} \vspace{-4.5mm} \end{figure*} \begin{figure*}[htb!] \centering \subcaptionbox{The incurred power of allocation using the optimal allocation (exhaustive search), CDGA algorithm, and greedy algorithms.\label{diag:scenario22a}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/opt_vs_decen_Medium-eps-converted-to.pdf}}\quad \subcaptionbox{Cumulative average incurred power of allocation using the optimal allocation (exhaustive search), CDGA algorithm, and greedy algorithms.\label{diag:scenario22b}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Average_Cost_Medium-eps-converted-to.pdf}}\quad \subcaptionbox{The generated revenue upon using the CDGA algorithm as compared to the greedy methods.\label{diag:scenario22c}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/profit_Medium-eps-converted-to.pdf}} \caption{Simulation results of the medium-scale {{GDCN}}.} \label{diag:scenario22} \vspace{-4.5mm} \end{figure*} \subsection{Simulation of a Medium-Scale GDCN} In this scenario, the network comprises $15$ fully-connected DCs. Similar to the previous case, we consider $3$ scenarios, each created via (fully) connecting the three replicas of a {GDCN} described in Table~\ref{table:Slots}. The number of slots per DC, power parameters of each DC, $\nu$, and the price of electricity are assumed to be the same as the previous case. It is assumed that at each iteration, there are $30$ graph jobs waiting to be assigned to the network (the arrival rate for each type is three times higher than that of the first scenario). The step-sizes in Eq.~\eqref{eq:full_dist_2} are set as follows: $c_{\lambda}=0.1$, $c_{\gamma}=0.18$, and $c_{\Lambda}=0.15$. We choose $\phi=5$, and for deriving the matrix $\mathbf{W}$, the parameter $\epsilon$ is chosen to be $0.1$. Also, we choose the initial value of $\Lambda^i$, $\lambda^i$, $\gamma^i$ at DC $d^i$ to be $ \frac{\eta^i N^i \sigma^i \alpha^i}{5(|\mathcal{S}^i|)^{\alpha^i}}$, $0$, and $\frac{-\eta^i N^i \sigma^i \alpha^i}{3(|\mathcal{S}^i|)^{\alpha^i}}$, respectively. For assignment of a graph job with type $1$, Fig.~\ref{diag:scenarioDist} depicts the convergence of the local and global variables of the DCs at $6$ sampled DCs. Fig.~\ref{diag:scenarioDist}(\subref{diag:scenarioDista}) describes the convergence of the local variable $\Lambda$ at the DCs, Fig.~\ref{diag:scenarioDist}(\subref{diag:scenarioDistb}) shows the convergence of the global variable $\gamma$, and Fig.~\ref{diag:scenarioDist}(\subref{diag:scenarioDistc}) depicts the number of offered slots of each DC to the graph job. The parameter $\lambda$ takes the value of zero almost always upon the convergence, and thus is not depicted. As can be seen from Fig.~\ref{diag:scenarioDist}(\subref{diag:scenarioDistc}), the DCs $1$, $6$, and $11$ would offer one slot to the graph job while the rest would offer zero slots. Also, from Fig.~\ref{diag:scenarioDist}(\subref{diag:scenarioDistb}), it can be seen that the initial non-identical choices of the global variable $\gamma$ at each DC finally converges to a unified value among the DCs. Fig.~\ref{diag:scenario22} depicts the results of comparing the CDGA algorithm to the greedy algorithms. Fig.~\ref{diag:scenario22}(\subref{diag:scenario22a}) depicts the incurred power of allocation for scenario $3$ of network construction, and Fig.~\ref{diag:scenario22}(\subref{diag:scenario22b}) shows the cumulative average incurred cost of allocation. These two figures reveal the close-to-optimal performance of the CDGA algorithm. Also, Fig.~\ref{diag:scenario22}(\subref{diag:scenario22c}) demonstrates the obtained profit using the CDGA algorithm as compared to the greedy algorithms after $100$ iterations. As can be seen from this figure, on average, our method results in saving of \$10000 on electricity cost. \begin{figure*}[t] \centering \subcaptionbox{Comparison between the $P^{90\%}$ of the BRMA algorithm and the random strategy selection for various graph jobs.\label{diag:fixedPricesa}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/ProbsRegret-eps-converted-to.pdf}}\quad \subcaptionbox{Comparison between the utility of the BRMA algorithm and the random strategy selection for various graph jobs.\label{diag:fixedPricesb}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Indiv_util-eps-converted-to.pdf}}\quad \subcaptionbox{Effect of having different similarity considerations (left) and different number of clusters (right) for graph job with type $5$.\label{diag:fixedPricesc}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/cumUtil-eps-converted-to.pdf}} \caption{Simulation results of the large-scale {{GDCN}} upon having DCs with fixed prices.} \label{diag:fixedPrices} \vspace{-4mm} \end{figure*} \begin{figure*}[t] \vspace{3mm} \centering \subcaptionbox{Average utility of all the PAs for different types of graph jobs (left), and utility of individual PAs for each type of graph job in one round of RMBA algorithm (right).\label{diag:dynamicPricesa}}[.3\linewidth][c]{% \includegraphics[width=.320\linewidth]{Figures/Utility-eps-converted-to.pdf}}\quad \subcaptionbox{Total power consumption of the utilized servers for the RMBA algorithm and random strategy selection.\label{diag:dynamicPricesb}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Power-eps-converted-to.pdf}}\quad \subcaptionbox{Reduction in currency in circulation upon using the RMBA algorithm as compared to the random strategy selection.\label{diag:dynamicPricesc}}[.3\linewidth][c]{% \includegraphics[width=.330\linewidth]{Figures/Profit-eps-converted-to.pdf}} \caption{Simulation results of the large-scale {{GDCN}} upon having DCs with dynamic prices.} \label{diag:dynamicPrices} \vspace{-4mm} \end{figure*} \subsection{Simulation of a Large-Scale GDCN} \subsubsection{The Network and the CCR's Setting} We consider a {GDCN} consisting of 200 DCs each of which possesses $3k$ slots, where $k$ is a random integer number between $4$ and $11$. It is assumed that each server in a DC contains $3$ slots. The power parameters of each DC, $\nu$, and the price of electricity are assumed to be the same as before. In \cite{gyarmati2010scafida}, a scale-free (SF) architecture called Scafida is proposed for DC networks. The main advantages of this model are error tolerance, scalability, and flexibility of network architecture. Also, this graph structure is used to model Internet connections \cite{ref:SF}. Considering these facts, the network topology of the {GDCN} is assumed to be an SF graph constructed using preferential attachment mechanism with parameter $m = 3$~\cite{ref:SF}. For each type of graph job, we run a CCR on the network, where the initial place of the CCR is randomly chosen among the DCs and the size of carrying BST is set to $1000$. In the following, the strategies of the PAs are always chosen from the suggested strategies of the CCRs. \subsubsection{DCs with Fixed Prices} In this case, the load of each DC is assumed to be a uniform random variable between $20\%$ and $100\%$ of its number of slots. The price of utilizing each slot is fixed to be the total electricity cost of the DC divided by its number of slots. For a PA, for each type of job, the utility is derived by fixing all the values of $\rho$, $\chi$, and $\phi$ to $1$. The strategy exploration parameter $E$ is set to $0.01$, length of time-frame $\Gamma$ is chosen to be $15$, $|\mathcal{C}|=15$, $k_s=10$ in Eq.~\eqref{eq:Q2}, and $K=10$ in Eq.~\eqref{eq:weight}. To increase the convergence rate, we force the algorithm to execute one strategy from each cluster during the first time-frame. The resulting curves are obtained via averaging over $200$ simulations. In this case, our BRMA algorithm is compared with the random strategy selection method due to the lack of an existing algorithm for the problem. Note that in this case, load parameters and prices of the DCs are unknown prior to the graph job assignment; hence the above-defined greedy algorithms can not be applied to this setting. Besides the utility, we also introduce $P^{90\%}$ as a performance metric, which is the probability of selecting an allocation that has at most $10\%$ lesser utility as compared to the best suggested allocation. The results are depicted in Fig.~\ref{diag:fixedPrices}. With one graph job assigned per iteration, Fig.~\ref{diag:fixedPrices}(\subref{diag:fixedPricesa}) depicts the convergence of $P^{90\%}$ using the BRMA algorithm for all types of jobs, while Fig.~\ref{diag:fixedPrices}(\subref{diag:fixedPricesb}) reveals the corresponding utility of assignment as compared to the random strategy selection. As can be seen, the probability of choosing the high utility strategies increases while the BRMA algorithm explores the suggested strategies. Also, it can be seen that the proposed BRMA algorithm has a higher utility even at the first $15$ iterations. This is because at the first time-frame the BRMA algorithm exercises one strategy from each cluster, based on which strategies with good utilities are explored with higher probabilities. The utility gain of at least $20\%$ for each graph job assignment upon using our BRMA algorithm can be seen from Fig.~\ref{diag:fixedPrices}(\subref{diag:fixedPricesb}). Also, Fig.~\ref{diag:fixedPrices}(\subref{diag:fixedPricesc}) depicts the effect of changing the similarity coefficient $k_s$ (left sub-plot) and the effect of choosing various number of clusters (right sub-plot). For $k_s=-10$ all the strategies have a high similarity factor, and thus the algorithm does not perform well. As this parameter increases, the effect of similarity on weight update decreases, and the algorithm aims to select the best strategy with the highest utility rather than selecting a group of high utility strategies. Due to this fact, choosing $k_s=1$ as compared to $k_s=500$ results in a higher initial utility since the algorithm has more tendency toward choosing a portion of strategies with high utilities. However, choosing $k_s=500$ leads to a higher final utility. Also, as can be seen, having more clusters (up to the size of the time-frame) leads to a finer grain partitioning and a better performance. \subsubsection{DCs with Dynamic Prices} In this case, the PAs' payments is associated with the load of their utilized DCs (Eq.~\eqref{eq:loadprice}). The initial loads of the DCs are chosen to be uniformly distributed between the $20\%$ and $100\%$ of their number of slots. The presence of $5$ PAs is assumed in the system. For each PA, for each type of job, the utility is derived by fixing all the values of $\rho$, $\chi$, and $\phi$ to $1$ in Eq.~\eqref{eq:util1}. The results are presented in Fig.~\ref{diag:dynamicPrices}. In Fig.~\ref{diag:dynamicPrices}(\subref{diag:dynamicPricesa}), the average utility of the PAs for assigning one graph job over 100 Monte-Carlo simulations is presented (left plot). As can be seen, at least $20\%$ utility gain is obtained using our RMBA algorithm. To demonstrate the real-time performance of the RMBA algorithm, in the right plot of Fig.~\ref{diag:dynamicPrices}(\subref{diag:dynamicPricesa}), the utility of all the PAs for each type of graph job in one round of Monte-Carlo simulation is depicted. As can be seen, after exploring the environment and the other PAs' actions, each PA identifies the more rewarding strategies. Also, due to the inherent relationship between the utility of the PAs and the power consumption of the DCs, this method leads to less power consumption of DCs. This fact is revealed in Fig.~\ref{diag:dynamicPrices}(\subref{diag:dynamicPricesb}), where the corresponding power consumption associated with the utilized DCs opted by all the PAs is depicted for the RMBA algorithm and the random selection strategy. Fig.~\ref{diag:dynamicPrices}(\subref{diag:dynamicPricesc}) depicts the reduction in \textit{currency in circulation} obtained through less money gathering from the PAs and less payment for the electricity using the RMBA algorithm as compared to the random strategy selection. \section{Conclusion}\label{sec:concl} \noindent In this work, we study the problem of graph job allocation in geo-distributed cloud networks ({GDCN}s). The slot-based quantization of the resources of the DCs is considered. Inspired by big-data driven applications, it is considered that tasks are composed of multiple sub-tasks, which need multiple slots of the DCs with a determined communication pattern. The cost-effective graph job allocation in {GDCN}s is formulated as an integer programming problem. For small-scale {GDCN}s, given the feasible assignments of the graph jobs, we propose an analytic sequential sub-optimal solution to the problem. For medium-scale {GDCN}s, we introduce a distributed algorithm using the communication infrastructure of the network. Given the impracticality of those methods in large-scale {GDCN}s, we propose a decentralized graph job allocation framework based on the idea of strategy suggestion using our introduced cloud crawlers (CCRs). To opt efficient strategies from the pool of suggested strategies, we propose two online learning algorithms for the PAs considering fixed and adaptive pricing of DCs. Extensive simulations are conducted to reveal the effectiveness of all the proposed algorithms in {GDCN}s with different scales. For the future work, we suggest studying graph jobs with heterogeneous order of nodes' execution. {\color{black}Also, encapsulating the mathematical model of network link outages into the allocation of graph jobs among multiple DCs is worth further investigation.} \bibliographystyle{IEEEtran}
\section{Introduction}\label{sec:Introduction} Convolutional neural networks (CNNs) have achieved state-of-the-art performance across a variety of tasks involving natural images, including object and action recognition. Convolutional layers come with a host of benefits, including a more efficient usage of parameters compared to standard neural networks and the ability to learn patterns at multiple scales. In addition, convolutional layers allow the network to learn spatially invariant relationships between input and output. This is particularly useful in vision tasks involving natural images, in which an object's identity is often independent from its location in the image. Researchers from the neuroimaging community have recently begun exploring the utility of CNNs applied to publicly available brain-image datasets, predicting neurological conditions like Alzheimer's \citep{sarraf2016deepad} and autism \citep{anirudh2017bootstrapping}, as well as age \citep{cole2017predicting} and survival time of high-grade glioma patients \citep{nie20163d}. Although structural brain scans and natural images share similarities, there are several key differences that make adapting CNNs to brain images non-trivial. Much of the existing work on CNNs has focused on 2-dimensional (2D) images, but structural MRI scans of the human brain are 3-dimensional (3D). Some previous work has treated 3D volumes as a set of independent 2D slices \citep{sarraf2016deepad,farooq2017deep}, but doing so fails to fully leverage the spatial structure of the brain. A recent review \citep{bernal2017deep} suggests that 3D models outperform 2D models on several neuroimaging tasks. This increase in performance, however, comes at the cost of increased computation. The computational complexity involved in applying CNNs to 3D volumes of the brain makes it difficult to explore architectures even on small datasets. In \cite{cole2017predicting}, a 10-layer 3D CNN took 83 hours to train on only 2000 images. Existing applications of 3D convolutions to neuroimaging data \citep{cole2017predicting, cao2016mental} use architectures based on existing 2D CNN architectures. However, choices like i) the size and number of convolutional filters, ii) the type and size of pooling, and iii) the relationship between pooling, convolutional and fully connected layers, are among a myraid choices that, while extensively studied for natural images, have not been well studied in the context of 3D structural neuroimages. Architecture design choices are often inspired by known invariances in the data. The types of invariances in natural images are typically affine, as evidenced by the data augmentation techniques, such as translations and reflections, used in existing applications of CNNs \citep{krizhevsky2012imagenet}. However, it is unclear which of these invariances arise in neuroimaging data. Given that structural brain images are aligned, translation invariance may not be as important in brain images as it is in natural images. In fact, if local patterns in the brain are location-dependent, then standard convolutions may be inappropriate. In this work, we begin to explore CNN architectural choices in the context of structural neuroimaging data. We propose two modifications to existing CNN architectures. Our modifications produce a network that is able to better learn patterns from brain images and trains faster than architectures developed on natural image tasks. Furthermore, these modifications are straightforward to implement in Tensorflow \citep{abadi2016tensorflow}. By sharing our implementation\footnote{\url{https://gitlab.eecs.umich.edu/mld3/brain_age_prediction}}, we hope to inspire other researchers to continue to challenge current assumptions. We summarize both the technical and clinical significance of our work below. \paragraph{Technical Significance} Based on the structure of neuroimaging data, we present two modifications to existing CNN architectures: 1) learning different parameters in different regions of the brain, and 2) applying more filters in the early stages of the network. These modifications enable learning distinct patterns in different brain regions. By designing these modifications to target 3D brain images, we demonstrate improved performance and training times compared to a 3D CNN baseline when predicting age from brain scans. These improvements are robust to changes to the amount of training data and the number of network parameters. Our work suggests a greater space of improvements can be achieved by redesigning CNNs for brain images. \paragraph{Clinical Relevance} Neuroimages are a rich form of data from which a wealth of clinically relevant labels can be predicted. We focus on the task of predicting age from neuroimages. Age prediction from neuroimaging data allows researchers to quantify the difference in predicted age and chronological age, which can be a powerful marker of deviation from expected aging trajectories. There are a number of psychiatric and neurological conditions that are closely linked to such age-related deviations, including attention-deficit/hyperactivity disorder \citep{Shaw19649} and Alzheimer's \citep{stern2012cognitive}. Differences in predicted and chronological age have already been shown to be reliable and heritable biomarkers for a variety of neurodegenerative conditions \citep{cole2017predicting}. In addition, age prediction from brain scans enables further investigation into mechanistic factors correlated with accelerated or decelerated brain aging and associated changes in cognitive function. Our work takes the first step toward designing deep learning models that capture the invariances present in structural brain scans. We demonstrate that our ideas improve age prediction from these scans, but we hypothesize that the proposed ideas could generalize to other neuroimaging tasks. \paragraph{} The rest of this paper is organized as follows. Section \ref{sec:RelatedWork} presents related work, both in developing CNNs on neuroimaging data and in generalizing CNNs for data with different types of invariances. Section \ref{sec:Methods} discusses the proposed architectural modifications in more detail. Section \ref{sec:ExperimentalSetup} details the dataset we use for evaluation, and our experimental setup. In Section \ref{sec:Results}, we present an empirical evaluation of our proposed approach as well as several follow-up analyses. \section{Related Work}\label{sec:RelatedWork} There is a broad scope of work in applying CNNs to brain images. The most common tasks include anomaly detection, which covers tumor and micro-bleed detection, segmentation, which includes skull stripping and tumor segmentation, and label prediction. Label prediction is involves disease prediction, as well as the task we focus on: age prediction. Predicting age from brain images is an important step towards understanding typical brain development and further understanding developmental disorders \citep{dosenbach2010prediction}. While there has been a lot of progress on the task of developing machine learning techniques for predicting age from brain images \citep{franke2012brain}, here we focus primarily on those works that utilize CNNs. \cite{cole2017predicting} propose a CNN architecture with repeated blocks of 3D, $3\times3\times3$ convolutions. Their focus is not on comparing different CNN architectures, but rather comparing the performance of their proposed architecture to a Gaussian Process model. Few works exist that explicitly attempt to adapt CNNs to brain image tasks like age prediction or disease prediction. \cite{meszlenyi2017resting} and \cite{kawahara2017brainnetcnn} propose novel architectures to predict mild cognitive impairment and age, respectively, from functional connectivity networks extracted from functional MRI. They model the network as a graph and apply convolutions across the edges. Neither consider applying CNNs directly to brain scans. \cite{zheng2017novel} introduce a method involving a new pooling operation to predict HIV and ADHD from directly from functional imaging. However, their method requires an ensemble of CNNs and a separate algorithm to mix the ensemble, which increases computational complexity during training. Many of the works that focus on learning from brain data do not discuss architectural modifications. As described above, those that do either focus on learning from functional connectivity networks rather than actual images, or require computationally expensive models. More generally, there is a large body of work that aims to tailor CNNs to data with different structural properties. \cite{dieleman2016exploiting} introduce four new operations to help CNNs learn invariance to rotations. \cite{gens2014deep} and \cite{cohen2016group} attempt to generalize CNNs to arbitrary groups of affine transformations. \cite{ngiam2010tiled} modify convolutions in a way that helps CNNs learn invariances present in the training data. These works focus on natural images. None consider 3D spatial data. In contrast, we investigate a different and relatively unexplored class of images. We propose a novel architecture based on the structure of 3D brain volumes. Our approach increases performance without sacrificing computational efficiency, and is straightforward to implement. \section{Methods}\label{sec:Methods} This section describes two proposed modifications to existing architecture choices. The first, regional segmentation, is motivated by the idea that a CNN should learn different parameters in different regions of the brain. We segment the brain into consecutive regions and treat each region as an input channel. This encourages the network to learn region-dependent patterns. However, region-specific information is lost after the initial convolutional layers. To address this, the second modification applies more filters earlier in the network and fewer filters later. This is in contrast to the existing practice of learning fewer filters early on in the network and more in the later layers. Combined, these two modifications both improve performance on age prediction and decrease training time. \subsection{Regional Segmentation} CNNs are designed to capture spatially invariant patterns \citep{lecun1998gradient}. This model works well for natural images, since most objects in images retain their identity regardless of where they appear in an image. In contrast, brain images are typically aligned: each brain in a given dataset occupies the same spatial region. Complete spatial invariance is thus unnecessary since the network is not required to deduce the location of objects of interest. Furthermore, across different regions of the brain, the same pattern may have different meaning. Requiring a network to learn the same parameters over the entirety of the brain image may force those parameters to be too general and lose region-specific information. To better capture region-specific information, a CNN should learn different parameters in different brain regions. To address this, we propose the following modification: before applying convolutions to brain images, divide the brain image into distinct regions and concatenate those regions along the channel dimension. Learned weights will not be shared across regions, allowing the network to learn region-specific patterns. Given that we aim to learn different patterns in different regions, how should these regions be chosen? It may seem appealing to segment the brain into known anatomical regions. However, following known anatomical regions is challenging. Anatomical regions in the brain may vary in size and shape, but it is computationally desirable to have regions with equal dimensions. Formatting these regions to share the same dimensions may lead to large quantities of zero padding and wasted computation. \begin{figure}[htbp] \centering \begin{adjustbox}{center} \includegraphics[width=5in]{RegionalSegmentationNew.png} \end{adjustbox} \caption{A depiction of regional segmentation. The operation is simple: it divides an input volume into separate, consecutive regions and then treats each region as a channel. Different colors in the figure indicate different parameters. The convolutional filter does not share parameters across regions, but applies the separate parameters simultaneously over separate regions. } \label{fig:Segmentation} \end{figure} In light of the difficulty of using expert-defined anatomical regions, we segment the brain into consecutive, equally-sized cubes. More formally: let $I$ be a 3D, single-channel volume with dimensions $(X, Y, Z)$. Let $k$ be an integer regional segmentation rate, a hyperparameter. Regional segmentation divides $I$ into $k^3$ adjacent regions of size $(\lfloor \frac{X}{k} \rfloor, \lfloor \frac{Y}{k} \rfloor, \lfloor \frac{Z}{k} \rfloor)$. The regions are then concatenated along the channel dimension. In practice, each region is given an additional 3-voxel boundary in each dimension to avoid losing information along the edges of the regions. This approach, depicted in Figure \ref{fig:Segmentation} is easy to implement, requires no prior knowledge, and allows for different levels of granularity. Setting $k$ to be large corresponds to a finer segmentation of the brain, with less spatial parameter sharing; conversely, setting $k$ to be small corresponds to more spatial parameter sharing. Existing architectures set $k = 1$, while fully connected networks set $k$ to be the input dimension, treating each voxel as independent of the others. Separate parameters are learned for each region since regions are no longer spatially connected. Given that these regions are now treated as separate input channels, depthwise convolutions may be more appropriate than standard convolutions, because they peform completely separate convolutions across channels \citep{chollet2016xception}. However, current deep learning libraries lack implementations of 3D depthwise convolutions, and non-native implementations are computationally expensive. Normal convolutions do learn different parameters over different channels, but combine information across channels after convolution. We mitigate this problem in two ways. First, we rotate regions into the orientation that minimizes spatial overlap across the channel dimension as depicted in Figure \ref{fig:RotationRegions}, ensuring that as much region-specific information as possible is retained during convolutions. Second, we alter the number of filters in the network to focus on the earlier layers, as discussed in the next section. \begin{figure}[htbp] \centering \begin{adjustbox}{center} \includegraphics[width=4in]{RotatingRegions.png} \end{adjustbox} \caption{ An illustration of the overlap in the channel dimension between regions of a center-aligned image after regional segmentation with $k=2$. The original image is depicted on the left. The top pathway depicts the default rotation of the regions, which minimizes spatial overlap. The bottom pathway depicts the rotation that maximizes spatial overlap. For illustration purposes, this image depicts a 2D circle, but the same principle applies for 3D brain scans. } \label{fig:RotationRegions} \end{figure} \subsection{Filter Layouts} Existing CNN architectures have a common trend: the number of filters in convolutional layers starts small and increases with each layer. This models human intuition: at finer detail, objects share local patterns like edges and corners. But with increasing abstraction, objects become more and more distinct. Having a large number of specialized filters in later layers of a CNN is thus critical for an object recognition task with a large number of distinct classes \citep{zeiler2014visualizing}. The input to our network, however, consists of segmented regions of the brain concatenated across the channel dimension. This poses a problem: the first convolutional operation across the input image combines information from all regions. With each convolution, we lose information distinguishing regions. To mitigate this issue, we propose reversing the traditional filter scheme: instead of starting with a small number of filters and increasing them, start with a large number of filters and decrease that number in later layers. We hypothesize that it is critical to extract as much information as possible from earlier stages of the image, and less important to learn information in the later layers, when information from all regions is blended together. Our approach forces the network to learn more parameters at the lower levels, since these levels contain more information from distinct regions. This approach also bottlenecks the representation of these regions at later layers in the network, which acts as a form of regularization. Usually, it is difficult to experiment with a large number of filters early on in a network, because earlier filters are applied to larger images. Loading more filters on larger images results in reduced training speed and increased memory demands. However, by first applying regional segmentation and then reversing the filter layout, we find that the training time is still decreased relative to a baseline, as discussed in Section \ref{sec:Results}. \section{Experimental Setup \& Baselines}\label{sec:ExperimentalSetup} In this section, we describe the brain image dataset and task we used to evaluate our proposed modifications. We detail our exclusion criteria, the baseline we compare our proposed method to, and the specifics of how our models are trained. We also describe the architectural details of both the baseline and our proposed approach. \subsection{Dataset \& Task} We evaluate our modifications using data from the Philadelphia Neurodevelopmental Cohort (PNC) study \citep{satterthwaite2014neuroimaging}. The PNC study is a population-based sample of children ages 8-21 ($\mu$=15.48, $\sigma$=3.19) living in the greater Philadelphia area. Neuroimaging data were collected from 1,445 subjects. Data from 997 of those subjects were made publicly available. These data were initially downloaded and preprocessed for the purposes of functional connectivity analysis. Therefore, data quality inclusion criteria follow functional connectivity guidelines (low motion, at least 4min usable data). Data from 724 of the publicly available subjects met these criteria and were included. For our analysis, we use T1-weighted structural images (voxel size $0.94 \times 0.94 \times 1$, FOV dimensions $196 \times 256 \times 160$). These images were preprocessed using the DARTEL toolbox in SPM8. Preprocessing steps included: bias field correction, brain extraction, and spatially normalizing to MNI152 template space. After preprocessing, the structural images have dimensions $121 \times 145 \times 121$. From these images, we aim to predict subject age. To learn a model mapping 3D images to age, we randomly split the subjects into training (n=524), validation (n=100) and test (n=100) sets. Validation data were used for model selection and stopping criteria. All reported performance metrics pertain to the test set unless otherwise specified. \subsection{Models}\label{sec:Models} We compare a standard baseline architecture from \cite{cole2017predicting} to an architecture with our proposed modifications. Both the baseline and our proposed network are made up of repeated blocks of (convolution, convolution, batch normalization, pooling), as depicted in Figure \ref{fig:Block}. All architectures consist of 4 blocks total, followed by a hidden layer with 256 units, and then a single unit to output age prediction. All convolutional and hidden layers are followed by the eLU activation function. All models use $3 \times 3 \times 3$ convolutions of stride length 1. Before convolution, the inputs are padded so that the dimensions of the outputs are equal to the dimensions of the inputs, \textit{e.g.} ``same'' padding in Tensorflow. Pooling layers are all $2 \times 2 \times 2$ max pooling with stride length 2. \begin{figure}[htbp] \centering \includegraphics[width=6in]{BlockConv.png} \caption{ \small Both the baseline and proposed method use repeated copies of the convolutional block above. The convolutional layers within a block always have the same number of filters. } \label{fig:Block} \end{figure} \begin{table}[htbp] \centering \caption{ \small Architectures of the baseline and proposed CNNs, from left to right. Blocks 1 through 4 are copies of the block above. Both architectures have a single hidden layer with 256 units. The hidden layer uses the same activation function as the convolutional layers, namely eLu. } \begin{adjustbox}{center} \scalebox{0.8}{ \begin{tabular}{|c|c|c|c|c|c|c|c|c|}\hline &&& \multicolumn{4}{c|}{\textbf{\# Filters}} & & \\ \cline{4-7} \textbf{Approach} & \textbf{Segmentation} & \makecell{\textbf{Input} \\ \textbf{Channels}} & \textbf{Block 1} & \textbf{Block 2} & \textbf{Block 3} & \textbf{Block 4} & \makecell{\textbf{Hidden} \\ \textbf{Units}} & \makecell{\textbf{Output} \\ \textbf{Units}} \\ \hline Baseline & No & 1 & 8 & 16 & 32 & 64 & 256 & 1\\ \hline Proposed & Yes & $k^3$ & 64 & 32 & 16 & 8 & 256 & 1 \\ \hline \end{tabular} } \end{adjustbox} \label{tab:Arch} \end{table} The \textit{Baseline} architecture has 8 filters in its first block of convolutions, and double that number in every successive block, for a total of 64 filters in the final block. Our \textit{Proposed} approach has 64 filters in its first block, and half that every block after, for a total of 8 filters in the final block. A summary of both architectures is presented in Table \ref{tab:Arch}. Each layer of convolutional filters can be thought of as a 5-D tensor of shape $C \times 3 \times 3 \times 3 \times M$, where $C$ is the output dimension of the previous layer, and $M$ is the number of filters (the output dimension of the current layer). For example, in the first layer of the baseline network, the original input image is convolved with a 5-D tensor of shape $1 \times 3 \times 3 \times 3 \times 8$, while in the first layer of the proposed network, the segmented input image is convolved with a 5-D tensor of shape $k^3 \times 3 \times 3 \times 3 \times 64$. \subsection{Implementation Details}\label{sec:implementation} For all experiments, every model is trained five times with different random initializations until performance on the validation set no longer improves, approximately 700 epochs. Weights are initialized using Xavier initialization \citep{glorot2010understanding}. For each run, the model weights that achieved the best performance on the validation set during training were saved. These weights were restored after each run and the model was evaluated on the test set. We report the average test performance (and standard deviation) over the different initializations. For computational efficiency, all images are pooled by a factor of 3 in each dimension before being fed into the network, resulting in images of size $41 \times 49 \times 41$. We pool the images by averaging consecutive $3 \times 3 \times 3$ blocks; the specific aggregation function performed is discussed in the next section. We train all models with the Adam optimizer \citep{kingma2014adam}. We found no significant performance improvement for any model tested with non-default parameters, so we keep the defaults ($\alpha=0.001, \beta_1=0.9, \beta_2=0.999, \epsilon=10^{-8}$). We optimize with respect to mean squared error (MSE) on the training set. We report both MSE and mean absolute error (MAE) on the held-out test set. We implemented all models using Tensorflow \citep{kingma2014adam} and ran all experiments on a GeForce GTX 1080 Ti GPU. To select the hyperparameter $k$ for our proposed model, we searched in the range $[1,2,3,4]$, where 1 corresponds to no segmentation to and 4 corresponds 64 regions. $k$ was chosen based on the model that provided the lowest average performance (MSE) on the validation set. \section{Results \& Discussion}\label{sec:Results} In this section, we compare the performance of our proposed approach to the baseline architecture described in Section \ref{sec:Models}. We also compare the performance of each proposed modification independently. We measure performance in terms of both error and training time. We present an in-depth follow-up analysis, in which we investigate performance across a range of different settings. \subsection{Prediction Error} In Table \ref{tab:PNC1} we report the MSE and the MAE for the task of predicting age from structural brain images. As described in Section \ref{sec:implementation}, reported performances below represent the average and standard deviation of five different initializations of each model evaluated on the held-out test set. \begin{table}[htbp] \centering \caption{\small Comparison of model performances for the task of predicting age on the PNC dataset. The regional segmentation rate $k$, as described in Section 3, refers to how finely the brain is segmented before filters are learned in each region. We find that 2 is the optimal setting for this task. The filter layout refers to either increasing the number of filters (8-16-32-64), or decreasing the number of filters (64-32-16-8), as the depth of the network continues.} \begin{adjustbox}{center} \begin{tabular}{|c|c|c|c|c|c|}\hline \textbf{Approach} & \textbf{Filter Layout} & \textbf{$k$} & \textbf{MSE} & \textbf{MAE} & \textbf{\makecell{Training Time\\ (minutes)}} \\ \hline Baseline & 8-16-32-64 & - & $3.72 \pm 0.20$ & $1.58 \pm 0.06$ & 52.5\\ \hline Proposed & 64-32-16-8 & 2 & $\mathbf{3.03 \pm 0.15}$ & $\mathbf{1.43 \pm 0.03}$ & 40 \\ \hline Segmentation only & 8-16-32-64 & 2 & $3.76 \pm 0.08$ & $1.59 \pm 0.03$ & \textbf{30} \\ \hline Reverse layout only & 64-32-16-8 & - & $3.64 \pm 0.35$ & $1.53 \pm 0.05$ & 117 \\ \hline \end{tabular} \end{adjustbox} \label{tab:PNC1} \end{table} \begin{figure}[htbp] \centering \includegraphics[width=4in]{TestValdkPlot.png} \caption{\small Performance of proposed model plotted against the regional segmentation rate, $k$. The points are offset from integer values to better display both test and validation performance. Each point is the mean of five runs, and the error bars are the standard deviation across those runs. This chart demonstrates that for this particular problem, $k=2$ is a locally optimal hyperparameter. } \label{fig:TestKPlot} \end{figure} For the proposed model, we selected a regional segmentation rate of $k=2$ based on validation performance, resulting in eight different regions. Our experiments show that the combination of segmenting the brain into eight separate regions and reversing the order of filters results in improved age prediction from structural brain data. Results indicate that it is the combination of both modifications that improves performance; neither modification alone lowers the prediction error from the baseline. To understand how model performance varies with $k$, we plot both the validation and test performance of our proposed method for each setting of $k$ in Figure \ref{fig:TestKPlot}. Each point is the average performance of the model across five initializations, and error bars represent the standard deviation. For our proposed architecture, segmenting the brain too finely or leaving the brain whole results in decreased performance. We only used validation performances to do hyperparameter selection, but the same trend holds for both test and validation data. \subsection{Training Time} Table \ref{tab:PNC1} also displays the training time of the evaluated models. Training time refers to wall clock time, in minutes, per 700 epochs, the number of epochs taken to train each model. Each model was trained on the same GPU under the same load, for fair comparison. The table shows that reversing the layout of the filters in a CNN is a computationally expensive modification. Doing so more than doubles the training time from the equivalent baseline. More filters earlier in the network results in more filters being applied when the image data is larger and convolutions are more expensive. Table \ref{tab:PNC1} also shows that applying regional segmentation nearly halves training time. This is due in part to the reduced number of fully connected parameters in the proposed network, as discussed in section \ref{sec:fc}, and in part to the size of the feature maps in the network after the first convolution. A similar volume of data is input to the first convolution of the baseline and the segmentation only network. In the former, the images are arranged as ($41 \times 49 \times 41 \times 1$) arrays. In the latter, the images are arranged as ($23 \times 27 \times 23 \times 8$) arrays\footnote{Note that the dimensions of the segmented image are not exactly equal to ($\lfloor \frac{41}{2} \rfloor \times \lfloor \frac{49}{2} \rfloor \times \lfloor \frac{41}{2} \rfloor \times 8$) due to the padding boundary described in section \ref{sec:Methods}.}. After the first convolution, the number of feature maps in each section of the network is the same, but the maps are roughly twice as small in each spatial dimension in the segmentation only network, meaning the segmentation only network performs less computation in the remaining convolutional layers. The underlying implementation of the convolution operation also affects training time. Consider an input image of shape ($N \times X \times Y \times Z \times C$) where $N$ is the number of images in a batch, $X, Y, \textrm{ and } Z$ are spatial dimensions, $C$ is the number of channels in the image and a convolutional filter tensor of shape ($C \times \ell \times \ell \times \ell \times M$) where $\ell$ is the size of the convolutional filter and $M$ is the number of filters. The convolution can be thought of as a matrix multiplication between a filter matrix of shape ($M \times C\ell^3 $) and an input matrix of shape\footnote{This assumes that the output dimension is made to be equal to the input dimension using \textit{same} padding.} ($C\ell^3 \times NXYZ$). This multiplication is more efficient if the products $C \ell^3$ and $NXYZ$ are similar in magnitude, rather than one being significantly larger than the other \citep{chetlur2014cudnn}. If the input image is a single-channel, 3D brain image, and the filter size is small, the product $C\ell^3$ will be much smaller than $NXYZ$. In our baseline network, $C\ell^3 = 27$, while $NXYZ=4*41*49*41=329476$. Regional segmentation increases $C$ while decreasing $XYZ$ by a factor of $k^3$, making the products $C\ell^3$ and $NXYZ$ closer in magnitude and resulting in a more efficient convolution. To demonstrate how regional segmentation impacts the speed of convolutions, we simulated the forward pass of the convolution operation on a randomly-generated $4\times \frac{72}{k} \times \frac{72}{k} \times \frac{72}{k} \times k^3$ image. We convolved the image with a randomly generated $k^3 \times 3\times3\times3 \times 8$ filter, similar to the first convolutional layer of our baseline architecture. We varied the segmentation rate $k$ in the range $[1,2,3,4,6,8,9,12,18,24,36]$, choosing the divisors of 72 and forgoing the voxel boundary at the edges of regions to ensure that each convolution was applied over exactly the same amount of data. Each data-point of Figure \ref{fig:SimulatedConvolutions} displays the result of timing 500 forward-pass convolutions at the indicated segmentation rate. Figure \ref{fig:SimulatedConvolutions} demonstrates that initially as the segmentation rate increases and the products $C\ell^3$ and $NXYZ$ become closer in magnitude, the convolution speeds up. But, as the image becomes too finely segmented, $C\ell^3$ exceeds $NXYZ$ and the convolution slows down. \subsection{Robustness to Pooling Strategy} In both the baseline and proposed approach, we average pool the images before feeding them into the network to speed up training. Average pooling smooths out signals within the original images, but other pooling strategies may have different properties. To better understand how this smoothing affects the relative performance of to our proposed approach to the baseline, we evaluate both models on two other pooling strategies. \textit{Max} pooling corresponds to taking the maximum value of every consecutive $3 \times 3 \times 3$ block. \textit{Naive} pooling refers to taking the first voxel and discarding the rest in every consecutive $3 \times 3 \times 3$ block. While average pooling smooths signals, max pooling emphasizes strong signals and naive pooling arbitrarily selects voxels based on order. Given these differences, we hypothesized that relative performance may vary based on the pooling type. To test this hypothesis, we train the baseline and our proposed model separately on the training images pooled with each strategy. We evaluated the MSE of each model on the held-out test set pooled with each strategy, respectively (Figure \ref{fig:PNC_pooling_strategy}). Average pooling is the best strategy for both the baseline model and our proposed method. Our proposed method, however, is more robust to pooling strategies than the baseline. Most importantly, our proposed method reports a lower MSE for all pooling strategies than the baseline for any pooling strategy. \begin{figure* \centering \begin{subfigure}{0.54\textwidth} \centering \includegraphics[width=1\linewidth]{SimulatedConvolutions.png} \caption{}\label{fig:SimulatedConvolutions} \end{subfigure} \begin{subfigure}{0.45\textwidth} \centering \includegraphics[width=1\linewidth]{TwoSampleComp.png} \caption{} \label{fig:PNC_pooling_strategy} \end{subfigure} \caption{\small Convolution time vs. segmentation rate on the left, and performance based on pooling type on the right. \textbf{(a)} Time to compute the forward pass of a convolution on a 3D, single-channel image batch after regional segmentation. The plot shows that segmenting the image decreases training time up to a point, but too finely segmenting the image results in increased training time. \textbf{(b)} Plot of performance on pooling types. \textit{Average} and \textit{Max} refer to average and max pooling, respectively, while \textit{Naive} refers to downsampling the image by keeping the first voxel in every consecutive $3 \times 3 \times 3$ block. Average pooling is the best pooling type for both proposed and baseline. The proposed model outperforms the baseline using any pooling type, and is less sensitive to how the images are pooled. } \label{fig:TimeAndPooling} \end{figure*} \subsection{Sensitivity to Number of Fully Connected Parameters}\label{sec:fc} Our proposed model and the baseline model have a similar number of convolutional parameters (233,280 compared to 219,672). However, because the proposed model has fewer convolutional filters in later layers, it also has fewer parameters in the fully connected layers, despite having the same number of hidden units. Specifically, the proposed model has 16,640 weights in its fully connected layers, while the baseline has 590,080 such weights, despite both having 256 hidden units. In order to examine how much the number of fully parameters impacts performance, we varied the number of units in the hidden layer in our proposed approach in the range $[256, 2496, 4736, 6976, 9216]$. We varied the number of hidden units in our baseline in the range $[7, 69, 131, 194, 256]$. These ranges were chosen because they result in a similar number of fully connected parameters for each model, within 1\% of difference. Note that $256$ is the default number of hidden units for both models. The resulting performance of each model across these different settings is plotted in Figure \ref{fig:PNC_fc_param}. Having fewer fully connected parameters hurts the baseline. In contrast, the reverse model remains within the margin of error regardless of the number of fully connected parameters. These results suggest that the difference in performance between the proposed approach and the baseline is not due to the proposed approach having fewer fully connected parameters. \subsection{Varying the Amount of Training Data} Lack of data is a large concern in MRI studies, because gathering research-grade MRI scans is expensive and time consuming. It is not uncommon for researchers to work with datasets of fewer than 200 patients \citep{zheng2017novel, meszlenyi2017resting}. Compared to other single-site datasets, the PNC dataset is relatively large. In our setup, we have 524 training examples. To better understand the impact of small training sizes on our conclusions, we varied the number of training examples in the range $[100, 200, 300, 400, 524]$. For each number of training examples, we independently and randomly selected examples without replacement from the original training set of 524. In Figure \ref{fig:PNC_training_set_size}, we plot the number of training examples vs. model performance in terms of MSE for both the baseline and proposed approach. The line in purple plots the absolute difference in performance between the two models. The performance of both approaches declines as we decrease the number of training examples, as expected. However, the difference between the two models increases as the number of training examples decreases. This suggests that our method is more robust to small training sets. Furthermore, our proposed approach exhibits less variation in performance, indicating that it is potentially less more robust to weight initialization. \begin{figure* \centering \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=1\linewidth]{FCPlot.png} \caption{} \label{fig:PNC_fc_param} \end{subfigure} \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=1\linewidth]{NumberExamples.png} \caption{} \label{fig:PNC_training_set_size} \end{subfigure} \caption{\small Investigating the robustness of observed improvements \textbf{(a)} Plot of performance vs. number parameters in the fully connected layers. The left side, 16,640 parameters, is the default for the proposed model. The right side, 590,080 parameters, is the default for the baseline model. We vary the number of fully connected parameters by changing the number of units in the fully connected layer. Reducing the number of parameters for the baseline model does not help performance: rather, it hurts it. \textbf{(b)} Plot of performance vs. number of examples in training set size. The full training set, 524 examples, is on the right. The performance gap between our model and the baseline increases as training examples decrease. } \label{fig:ParamsAndTraining} \end{figure*} \section{Conclusions}\label{sec:Conclusions} In this paper, we introduced two novel modifications to existing CNN architectures, inspired by the structure of brain image data. First, we apply different learned parameters to different regions in the brain. Second, we start with a large number of filters in the first layer and decrease the number of filters after each convolutional block. These modifications encourage the network to learn region-specific patterns in the brain. Combined, they are simple and easy to implement, and result in a model that trains faster than a comparable CNN baseline. In addition, using our proposed architecture, we consistently observed improved age prediction across multiple downsampling types and varying amounts of training data. Our work suggests that there is a larger space of possible architectural choices to explore when adapting CNNs to brain imaging tasks. Due to fundamental differences between brain images and natural images, previous findings about how to build CNNs may not apply to neuroimaging data, or other types of data outside of the domain of natural images. This work provides a starting point to challenge assumptions existing architectures make when applying CNNs to brain images. There exists a variety of ways to expand this work. We did not focus increasing the depth of the neural network, or techniques associated with deeper networks, like inception modules \citep{szegedy2015going} or skip connections \citep{he2016deep}. However, if publicly available brain image datasets increase by an order of magnitude, such techniques may be of interest. Our work also did not focus on comparing pooling types within the network, activation functions, or larger convolution sizes. However, a better understanding of how to best design architectures for 3D brain volumes demands investigation in these areas as well. We hope that our work inspires more questions into how to best design CNNs for neuroimaging learning tasks. Understanding how to challenge and adapt ideas from existing CNN architectures will be critical to better predicting a multitude of clinically relevant labels, from age to Alzheimer's. \acks{This work was supported by the Exercise and Sports Science Initiative (grant no. U056408), and the National Science Foundation (NSF award no. IIS-1553146). The views and conclusions in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the Exercise and Sports Science Initiative or the NSF.}
\section{Introduction} In robotic localization of radio frequency (RF) sources, a robot searches for the source of some RF signal. The robot carries electronics and one or more antennas to analyze the received RF signal. These RF measurements are usually distilled into range or bearing estimates to the RF transmitter. The estimates are combined with knowledge of the robot's own position to update a belief, or probability distribution, over possible source locations. The robot then reasons over the belief to select its next action, with the aim of minimizing time or energy spent searching. The localization is considered complete when the belief is sufficiently concentrated in a small area, indicating a likely position for the RF source. Fast localization of RF sources is important to many applications. For example, quickly locating RF sources like distress beacons can be critical in directing search and rescue teams and saving lives\cite{Hoffmann2006}. Similarly, quickly locating sources of GPS interference, such as GPS jammers, can be important in ensuring the integrity of air traffic systems\cite{Geyer1999}. Instruments at Newark Liberty International Airport experienced interference when drivers using ``personal privacy devices"---small GPS jammers---drove on the nearby New Jersey Turnpike\cite{gnss2}. The Federal Aviation Administration investigated the use of a small, manned aircraft for localizing interference\cite{Geyer1997}, but manned solutions are expensive. Even when safety of life is not threatened, efficient localization of RF sources is important. For example, localizing radio-tagged wildlife is critical to understanding behavioral patterns of animals and can aid conservation efforts. Unfortunately, current localization methods are time and resource intensive\cite{cliff2015}. These methods rely on a human traversing terrain---often uninhabited and rough---and estimating bearing to a radio-tag by manually rotating a directional antenna\cite{posch2009}. Using a robot could reduce the burden on researchers, allowing them to study more animals at once. Further, a \textit{flying} robot, or unmanned aerial vehicle (UAV), is unencumbered by rough terrain; the value of aerially bypassing tough terrain has long been recognized by ecologists\cite{Seddon2004}. Flying also reduces reflections from obstacles on the ground\cite{korner2010}. Due to its many applications, localizing RF sources with UAVs has drawn significant attention. For example, UAVs have been used to localize WiFi routers\cite{Perkins2015}, ZigBee radios\cite{Venkateswaran2013,isaacs2014}, GPS jammers\cite{Perkins2016}, and wildlife radio-tags\cite{cliff2015}. However, UAVs have some drawbacks: they are less stable than ground robots and have limited payloads and flight times. In an effort to reduce weight, some methods resort to custom circuity\cite{cliff2015}, but this can be unattractive if we want researchers of different fields to use and maintain the system, or if they want to augment their system to cover new frequencies. Some use COTS electronics that only work on a single frequency\cite{Venkateswaran2013,isaacs2014,Perkins2015}, limiting the range of applications. The most serious drawback in prior work is that most methods---including all examples cited in this paragraph---require the UAV to make a full rotation for a single bearing measurement. Each rotation can take up to \SI{45}{\second}, which is a significant amount of the typical 10--15 minute available flight time. This might be the greatest bottleneck in improving the speed of aerial RF localization. In this work, we present a system designed to address these flaws. Our system is based on comparing the signal strength received by two antennas carried by a multirotor UAV---one mounted facing forward, the other facing back. These antennas are lightweight, low-cost, and simple to build. They feed into low-cost, commercial-off-the-shelf (COTS) dongles, which in turn feed into an onboard computer via USB. Leveraging existing open-source software, we use these dongles to estimate the signal strength received by each antenna. If the forward-facing antenna receives higher strength, the RF source is deemed to be in front of the UAV and vice versa. Combining these measurements with the UAV's GPS position and heading, an estimate of the source's location is produced. In the onboard computer, a greedy, information-theoretic planner uses this estimate and leverages the UAV's maneuverability to provide velocity commands. We demonstrate this localization procedure in simulation and with real flight tests, localizing three RF sources. One is an animal radio-tag in the VHF band, another is a ham radio emitting in the UHF band, and the last is a cell phone operating over LTE. Our contributions are as follows: \begin{enumerate} \item We present a novel, low-cost, UAV-based system for localizing general RF sources. The system is faster than most existing methods and requires no specialized knowledge of electronics. \item We analyze the performance of our system's sensing modality, which we call field-of-view sensing, to understand how its performance changes with noise and design parameters. \item We perform flight tests to validate our system against RF sources of different frequencies and operating modes. These tests include localization of a cell phone operating over LTE, which, to our knowledge, is a novel application. \end{enumerate} The paper begins with the background and related work that motivates our research. \Cref{sec:overview} describes the system, and \Cref{sec:modality} describes our sensing modality. Our localization algorithm is presented in \Cref{sec:algorithm}. Simulation results are presented in \Cref{sec:simulations}, and flight test results are presented in \Cref{sec:experiments}. \section{Related Work and Motivation} \label{sec:background} Early related work used UAVs to localize a magnetic rescue beacon~\cite{hoffmannthesis}. However, the sensor modality leveraged unique properties of the beacon and tests occurred over a small $\SI{9}{\meter} \times \SI{9}{\meter}$ area. A method for localizing wildlife radio-tags over larger distances with UAVs was proposed by Posh and Sukkarieh\cite{posch2009}; this work was built upon by K{\"o}rner et al. and ground tests were performed\cite{korner2010}. Soriano et al. used a similar method and also carried out ground tests\cite{Soriano2009}. These methods suggested using fixed-wing UAVs and modeling power expected from the given source and receiver locations. The measurement model relied on predicting the power that should be received by the UAV's antenna and comparing it to the true received power. Although these methods performed reasonably well in simulation and limited ground testing, this measurement model is not robust or applicable to general RF source localization tasks. For example, the measurement model requires knowledge of the RF source's transmitting power. In some problems, such as GPS jammer localization, the type of transmitter is completely unknown to searchers. Even when the transmitter specifications are known, signal strength is affected by many unmodeled factors. In wildlife radio-tag localization, the tagged animal might transition behind vegetation or terrain, greatly reducing received power. In addition, the radio-tag's antenna---even if nominally omnidirectional---likely has \textit{some} directionality to it, which can affect received power depending on the animal's pose. In recent work, Bayram et al. used the difference between successive strength measurements to perform gradient ascent on signal strength.\cite{bayram2016} This method obviates the need to know transmitter strength, as long as it remains constant during localization. However, the method fails to address factors that might change between successive measurements, like animal pose or terrain occlusions. The difficulty of using signal strength measurements makes bearing an attractive sensing modality for general RF localization. A common way to estimate bearing to an RF source is to use beamsteering with an antenna array, which has the benefit of quickly estimating bearing. However, beamsteering can be heavy, complex, and prone to calibration errors\cite{hood2011}. As a result, small robots often estimate bearing by rotating a directional antenna~\cite{Graefenstein2009,hood2011}. If the timescale of a rotation is significantly less than the timescales of factors affecting signal strength, strength measurements from the rotation can be used to estimate bearing to the RF source. There are still factors that affect all measurements from the same rotation equally, like the unknown distance to the transmitter. However, these can be normalized out. The simplest normalization technique sets the bearing estimate to the heading at which the highest strength was recorded, negating factors affecting all measurements. Another option is to subtract the mean from all measurements and divide by their standard deviation, allowing for cross-correlation with the antenna's reference gain pattern~\cite{Graefenstein2009}. The rise of maneuverable UAVs has popularized the antenna rotation strategy because they do not need extra actuators to rotate an antenna. Venkateswaran et al. exploit a vehicle that constantly rotates to keep itself airborne to measure bearing during the rotations.\cite{Venkateswaran2013} Isaacs et al. extended this work to a multirotor UAV that constantly rotates.\cite{isaacs2014} However, constantly rotating a multirotor UAV complicates any control strategies that might be used. Instead, most recent work relies on rotating a multirotor UAV once, moving to a new location, and rotating for a new measurement~\cite{cliff2015,Perkins2015,Perkins2016,vonehr2016}. Rotating a multirotor UAV to estimate bearing has two main drawbacks. The first is speed. Rotations are reported to take about \SI{25}{\second}~\cite{Perkins2015,Perkins2016}, \SI{40}{\second}~\cite{vonehr2016}, or even \SI{45}{\second}~\cite{cliff2015}. Small UAVs typically have battery lives of 10--15 minutes, so a \SI{45}{\second} rotation could amount to nearly 8\% of available flight time. Spending so much time for a single measurement limits the number of measurements that can be made. It also slows down localization, which needs at least a few bearing estimates for a decent source position estimate. The second drawback of rotate-for-bearing is that it assumes transmitter strength and the time-varying factors we identified earlier remain constant during each rotation. However, it is possible that an RF source changes its transmit power with time---it could even be a strategy to avoid detection by rotate-for-bearing UAVs. Further, factors like transmitter antenna directionality and orientation might change with timescales smaller than the duration of each rotation. These factors could affect each measurement from the rotation differently---then a comparison between the measurements would not yield a good bearing estimate. In the preceding paragraphs, we have briefly covered the evolution of RF localization with small UAVs. We show that the chief drawback of current methods is the need to perform a complete rotation to make bearing measurements. There are other drawbacks; most previous work only works on a single frequency and uses complex electronic circuitry. \section{System Description} \label{sec:overview} In this section, we describe a system designed to overcome the limitations outlined at the end of the last section. The core idea is attaching two directional antennas to a multirotor UAV and measuring received strength simultaneously. If the front-facing antenna measures higher strength, the RF source is assumed to lie in front of the UAV; if the rear antenna measures higher strength, the RF source is assumed to lie behind the UAV. These pseudo-bearing measurements provide less information than a bearing estimate but do not require the UAV to rotate in place. Because we compare measurements made simultaneously from both antennas, time-varying factors are normalized out. \subsection{Airframe} We use a DJI Matrice 100 (M-100) quadcopter, which DJI markets as a stable airframe for developers of UAV applications. In our work, the M-100 was both stable and easy to work with. Including its battery, the M-100 is~\SI{2.4}{\kilogram} and has a max takeoff capacity of \SI{3.4}{\kilogram}, allowing for a \SI{1}{\kilogram} payload. When carrying a payload, the M-100 has a flight time of about 15 minutes. The M-100's maximum speed is \SI{22}{\meter\per\second}. The M-100 has a built-in flight controller that provides low-level commands to the motors, keeping itself stable. A serial connection to the flight controller allows flight data to be queried. Position and velocity commands can be provided to the flight controller over the same link. In our system, an onboard computer provides velocity commands, which the flight controller executes while taking care of low-level motor inputs to keep the UAV stable. Our fully-equipped M-100 can be seen in \Cref{fig:matrice}. \begin{figure} \centering \includegraphics[width=3.1in]{matrice3.jpg} \caption{Our UAV in flight with \SI{782}{\mega\Hz} antennas mounted underneath.} \label{fig:matrice} \end{figure} \subsection{Moxon Antennas} The first components of our RF subsystem are the directional antennas. Because the gain provided by directional antennas depends on their orientation with respect to an RF source, they are useful in estimating bearing to RF sources. Gain is usually highest when the antenna points directly at the source, leading to higher strength measurements. The directionality of an antenna measures how tightly gain is concentrated. High directionality is often desired in bearing estimation, because the high gain achieved in the main lobe implies a bearing to the RF source with low ambiguity. Unfortunately, directional antennas can be large---especially at low frequencies, because antennas generally scale inversely with frequency. Further, directional antennas generally grow with their directionality. For example, one way to concentrate the gain of a Yagi antenna is to add elements, yielding a longer, heavier antenna. Mounting these antennas on small UAVs can be difficult because of their weight and the space they occupy. In order to limit antenna size, we use antennas that are only slightly directional. Specifically, we use Moxon antennas~\cite{moxon1993}, which are similar to Yagi antennas with only two elements. Moxon antennas are popular in the amateur radio community because they are easy to build and mechanically robust. They have low directionality, with most of their gain concentrated in a wide main lobe. \begin{figure} \centering \includegraphics[trim={2.5in 3in 2.7in 2.7in},clip,width=3.2in]{moxon2p.pdf} \caption{Top view of a basic Moxon antenna. Feed side points forward.} \label{fig:moxon} \end{figure} Design of these antennas requires no specialized electrical engineering knowledge. Because Moxon antennas are popular with amateur radio enthusiasts, there exist many free Moxon design generators. These tools interpolate between several well-modeled Moxon antennas for a range of frequencies and wire diameters. We use one such Moxon generator~\cite{moxongenerator}, inputting only frequency and wire diameter. \Cref{tab:antennas} shows the resulting antenna sizes for the frequencies of interest. The Moxon generator also produces an input file for NEC-2, an antenna analysis tool developed for the U.S. Navy~\cite{burke1979}. Now in the public domain, NEC-2 can be used to tweak Moxon designs further. However, the Moxon generator designs performed well in practice and we deemed this step unnecessary. \begin{table} \caption{Antenna sizes produced by Moxon generator~\cite{moxongenerator} for different frequencies and 14 AWG copper wire. Lengths A, B, C, and D correspond to those from \Cref{fig:moxon}. Mass includes coax cable.} \centering \begin{tabular}{@{} lccccc @{}} \toprule Frequency (MHz) & A (cm)& B (cm)& C (cm)& D (cm)& Mass (g)\\ \midrule 217.335 & 49.81 & 6.84 & 2.07 & 9.51 & 118 \\ 432.7 & 24.88 & 3.26 & 1.20 & 4.79 & 70\\ 782.0 & 13.71 & 1.71 & 0.75 & 2.66 & 66\\ \bottomrule \end{tabular} \label{tab:antennas} \end{table} Construction is also trivial and requires no mechanical skill beyond rudimentary soldering. The antenna dimensions are drawn on styrofoam board. Copper wire---size 14 AWG in our case---is bent and cut to fit the dimensions. The wire is taped to the board, and a thin cut is made in the upper wire for the feed. A suitable length of RG-58 coaxial cable is selected (about half a meter) and an inch of the cable is stripped of its inner and outer insulation. The inner conductor is soldered to one side of the copper feed, and the outer conductor is soldered to the other. A male SMA connector is soldered to the free end of the coax cable so it can feed into an RF dongle. The entire design and construction process can be completed in under an hour. \Cref{fig:antennas} shows completed antennas. \begin{figure} \centering \includegraphics[width=3.4in,trim={0 6cm 0 0},clip]{antennas.jpg} \caption{Our Moxon antennas on the left, from top to bottom: \SI{782}{\mega\Hz}, \SI{432.7}{\mega\Hz}, \SI{217.335}{\mega\Hz}. For size comparison, a commercially available \SI{217}{\mega\Hz} Yagi is on the right.} \label{fig:antennas} \end{figure} The use of custom antennas may seem counter-intuitive given our goal of making a hassle-free system. However, there are several reasons for our decision to use custom antennas. First, researchers might be interested in a frequency that is not commonly used and for which no commercial antennas exist. Second, custom antennas can be significantly less expensive than their COTS counterparts. Our system uses two antennas at once, so a researcher interested in three separate frequencies would have to purchase six antennas. Antennas range from tens to hundreds of dollars. In contrast, the material cost of our antennas---copper wire, styrofoam, coaxial cable---is negligible. Finally, most COTS antennas are not designed specifically for UAVs and can be heavy. For example, the commercially available \SI{217}{\mega\Hz} antenna in \Cref{fig:antennas} has a mass of \SI{0.54}{\kilogram}, whereas our Moxon is only \SI{0.12}{\kilogram}. \subsection{RTL-SDR Dongles} Although it makes sense to use custom antennas, RF electronics are more complicated and there is less incentive to deviate from COTS components. There exist good COTS components that cover most of the VHF and UHF spectrums. We use RTL-SDR dongles for our RF analysis. RTL-SDR refers to any software-defined radio (SDR) based on the RTL2832U chipset. These chipsets were originally designed to receive television broadcasts, but they can be modified into SDRs if combined with a tuner. We use dongles with the Rafael Micro R820T tuner, which are lightweight and low-cost (\SI{30}{\gram}, \$20 USD). The dongles have a female SMA connector on one end and a USB connector on the other. \Cref{fig:manifold} shows two dongles plugged into our UAV's onboard computer. \begin{figure} \centering \includegraphics[width=3.2in]{manifold.jpg} \caption{The Manifold onboard computer (center) has two RTL-SDR dongles in its USB ports (left). Each dongle is plugged into an antenna. The antennas (\SI{432.7}{\mega\Hz} in this picture) lie against the underside of styrofoam board.} \label{fig:manifold} \end{figure} These RTL-SDR dongles are versatile RF analyzers. With a stable sample rate of \SI{2.4}{\mega\Hz}, they can analyze \SI{2.4}{\mega\Hz} of bandwidth at once. They have a frequency range of \num{24}-\SI{1766}{\mega\Hz}, meaning they can cover all of the VHF and most of the UHF frequency ranges. There exist open-source C and Python libraries to tune the dongle and read samples. To measure signal power, the dongle is tuned to a frequency of interest. The dongle then reads RF samples, which can be converted into a periodogram, or an estimate of the power spectral density. Our signal strength estimate is simply the largest density in the sampled bandwidth. Because each dongle can analyze \SI{2.4}{\mega\Hz} at once, it can serve as a makeshift spectrum analyzer~\cite{nika2014,zhang2015b}. Thus, our measurement device doubles as a troubleshooting or exploratory device. For example, cell phones radiate at many frequencies and it is not always clear which frequency is used in which region. The RTL-SDR dongle can be used to check the spectrum for emissions, a technique we leveraged to determine the frequency at which our cell phone operates. As shown in \Cref{fig:analyzer}, we tuned the dongle to the \SI{700}{\mega\Hz} region and found emissions, suggesting our cell phone operates in this band. \begin{figure} \centering \includegraphics[width=3.3in]{analyzer2.png} \caption{Using RTL-SDR dongle with open-source gqrx radio software to analyze emissions from cell phone placing voice call over LTE connection at \SI{782}{\mega\Hz}. The lower half of the waterfall plot corresponds to time before the call is placed; once the call is placed, emissions are logged. } \label{fig:analyzer} \end{figure} The simplicity and versatility of RTL-SDR dongles makes them an attractive tool to measure signal strength. However, these dongles are not without drawbacks. One drawback is that the R820T tuner has a maximum frequency of \SI{1766}{\mega\Hz}. This upper limit covers most RF sources of interest, including wildlife radio-tags, the GPS frequency, ADS-B, and most cellular bands. A comparably priced dongle (\$30 USD) with the Elonics E4000 tuner can reach up to \SI{2100}{\mega\Hz}, covering all cellular bands. However, some commonly used frequencies, like WiFi (\SI{2.4}{\giga\Hz}), are outside this range. For these cases, one can resort to SDRs like the HackRF One, which can reach up to \SI{6}{\giga\Hz}. Unfortunately, this SDR costs \$300 USD, about an order of magnitude more than an RTL-SDR dongle. \subsection{Manifold Computer} The RTL-SDR dongles plug into the USB ports of a Manifold computer carried by the UAV. This onboard computer can be seen in \Cref{fig:manifold}. The Manifold is manufactured by DJI and retails for about \$500 USD. The Manifold has \num{2} GB RAM and four ARM Cortex-A15 cores that clock up to \SI{2.3}{\giga\Hz}. The Manifold is designed to parse video in flight, but our application does not use video so a cheaper alternative could probably be used. For example, ODROID computers retail for under \$100 USD and have been used in previous localization tasks\cite{Perkins2015,bayram2016}. The Manifold runs Ubuntu and ROS\cite{quigley2009}. In flight, the Manifold estimates signal strength from the RTL-SDR dongles and queries the M-100's flight controller over serial. The Manifold filters the strength measurements and UAV position to estimate the RF source's location. The Manifold then computes and provides velocity commands to the flight controller. \subsection{Transmitters} We use three RF sources in our experiments. The first is a Baofeng UV-5R radio. This radio is popular with amateur radio enthusiasts and can transmit and receive in portions of the VHF and UHF bands. For our tests, we set the radio to \SI{432.7}{\mega\Hz}, which is in the middle of the \SI{70}{\centi\meter} amateur band (\num{420}-\SI{450}{\mega\Hz}). The radio is set to its low power setting (\SI{1}{\watt}) and we radiate constantly for the duration of a flight. The second transmitter is a Nitehunters RATS-8 tracking collar. The collar pulses once a second at \SI{217.335}{\mega\Hz} and is designed to be worn by hunting dogs so their owners can find them. Although this collar is not a wildlife radio-tag, we will refer to it as such because it operates similarly and serves as a substitute. The \num{216}-\SI{220}{\mega\Hz} band is commonly used for wildlife tracking, and wildlife transmitters typically pulse as well. However, this collar retails for \$90 USD, which is a discount compared to collars sold for wildlife. Wildlife collars are ruggedized and often sell for hundreds of dollars. The third transmitter is a Samsung Galaxy S3 cell phone. To have it transmit, we place a voice call over Verizon's LTE network. In our region, this network operates in the \SI{700}{\mega\Hz} band. Using an RTL-SDR dongle, we found the phone uplink frequency is \SI{782}{\mega\Hz}. \Cref{fig:transmitters} shows the three transmitters. \begin{figure} \centering \includegraphics[width=3in]{transmitters4.jpg} \caption{Transmitters used in experiments. From left to right: wildlife collar, Baofeng UV-5R, Samsung Galaxy S3.} \label{fig:transmitters} \end{figure} \section{Sensing Modality} \label{sec:modality} In the previous section, we show how each antenna connects to an RTL-SDR dongle that estimates the signal strength received by each antenna. This section discusses how these measurements are woven into a sensing modality with a corresponding sensing model. We mount one antenna facing forward and another facing back. Strength measurements are made simultaneously. Because the antennas are directional, the antenna facing the RF source should receive higher strength. If higher strength is measured from the front-facing antenna, the RF source lies somewhere in front of the UAV; higher strength from the rear-facing antenna implies the source is behind the UAV. \Cref{fig:two_432} shows strength measurements made while our UAV rotated in place. The resulting pattern validates the idea of measuring higher strength from the antenna facing the RF source. We call the resulting sensing modality field-of-view (FOV) sensing because it is conceptually similar to detection-based modalities using cameras and laser scanning\cite{wehr1999,Symington2010}. The output is 1 if the front antenna measurement is higher and 0 if not. This model condenses two continuous, real-valued strength measurements into an observation $z\in\{0,1\}$. The reduction is useful if planning requires an expectation over observations, which is often the case in information-theoretic control. We denote the set of possible observations as $\mathcal{Z}$; in this sensing modality, $\mathcal{Z} = \{0,1\}$. \begin{figure} \centering \input{uv5r.tex} \caption{Signal strengths as functions of relative bearing to RF source. The front antenna receives higher strength when the UAV faces the RF source. The transmitter used was the UV-5R radio.} \label{fig:two_432} \end{figure} A sensor model is a probabilistic model that defines the probability---at time $t$---of making measurement $z_{t}$ if the UAV state is $x_{t}$ and the RF source location is $\theta_t$. We model the UAV state as a point in the special Euclidean group $\textrm{SE}(2)$, meaning it consists of a 2D position and a UAV heading. The RF source location $\theta_t\in\mathbb{R}^2$ only consists of a 2D position and is assumed constant, so we write $\theta_t=\theta$. Explicitly, $x_{t}$ and $\theta$ are \begin{equation} \begin{aligned} x_{t} &= \left[x_t^{\mathrm{n}}, x_t^{\mathrm{e}}, h_t\right]^\top\text,\\ \theta &= \left[\theta^{\mathrm{n}}, \theta^{\mathrm{e}}\right]^\top\text, \end{aligned} \end{equation} where $x_t^{\mathrm{n}}$ and $x_t^{\mathrm{e}}$ represent the north and east components of the UAV position, respectively. Likewise, $\theta^{\mathrm{n}}$ and $\theta^{\mathrm{e}}$ represent the north and east components of the RF source position. The UAV heading, denoted $h_t$, is measured east of north and defines the direction the front-facing antenna is pointing. We define the bearing $\beta_t$ as the angle, measured east of north, of a ray pointing from the UAV position to the transmitter position: \begin{equation} \beta_t = \arctan\left(\frac{\theta^{\mathrm{e}} - x_t^{\mathrm{e}}}{\theta^{\mathrm{n}} - x_t^{\mathrm{n}}}\right)\text. \end{equation} We define the quantity $\beta_t - h_t$ as the relative bearing. When the relative bearing is \ang{0}, the front antenna points directly at the RF source, and a measurement of 1 is expected. When the relative bearing is \ang{180}, the rear antenna points directly at the RF source, and a measurement of 0 is expected. We would expect a measurement of 1 if the relative bearing is in the interval $[\ang{-90}, \ang{90}]$, meaning the front antenna is pointed more closely to the RF source than the rear antenna. However, the front and rear antenna gains become similar at relative bearings near $\pm\ang{90}$, so mistakes are more likely. Therefore we define a cone width $\alpha \leq \ang{180}$ over which we are confident the proper measurement will be returned. Intuitively, this setup can be thought of as two cones of width $\alpha$ and with vertices at the UAV position; one cone is centered along the UAV heading and the other in the opposite direction. If the RF source lies in the front cone, we expect a measurement of 1; if the RF source lies in the rear cone, we expect a measurement of 0. If the RF source lies between these cones, we expect either measurement to be equally likely. We also define a mistake rate $\mu$, which is the probability the UAV misidentifies the cone containing the RF source, if the source lies in one. We set $\mu=0.1$ in flight tests and simulations. Mathematically, we have \begin{equation} P(z_t = 1\mid x_t, \theta) = \begin{cases} 1-\mu, & \text{if }\beta_t - h_t \in \left[-\frac{\alpha}{2},\ \frac{\alpha}{2}\right]\\ \hfil \mu, & \text{if }\beta_t - h_t \in \left[\ang{180}-\frac{\alpha}{2},\ \ang{180}+\frac{\alpha}{2}\right]\\ \hfil 0.5, & \text{otherwise} \end{cases} \label{eq:sensor} \end{equation} \Cref{fig:two_432} indicates that $\alpha=\ang{120}$ is an appropriate cone width. If the RF source lies between front and rear cones of with \ang{120}, we deem either measurement equally likely. A benefit of limiting cone width is that the resulting uncertainty region encodes uncertainty caused by imperfect antennas. Ideally, the front and rear cones would have a width $\alpha=\ang{180}$, but this would require perfectly constructed and placed antennas. In reality, some antennas might have larger side and back lobes in their gain patterns; or, the front-facing antenna might not be placed exactly along the UAV's heading axis. By including the uncertainty region, we alleviate the pressure on operators to construct and align their antennas perfectly. Not only is FOV sensing robust to antenna construction and placement, but it is also robust to time-varying factors like those discussed in \Cref{sec:background}. For example, transmitter strength and orientation can change during a rotation. We tested this by manually rotating our UV-5R radio as the UAV rotated in place and made strength measurements. The radio's antenna is a dipole, so it has low gain along its antenna's axis. The resulting strength measurements can be seen in \Cref{fig:robust1}. The patterns are distorted because changes in the radio's orientation affect the strength reaching the UAV's position. Traditional rotate-for-bearing approaches would have difficulty estimating bearing from these patterns. However, our two-antenna approach is not affected because both antennas are affected equally. The front-facing antenna measures greater strength in the front cone, and the rear antenna measures greater strength in the rear cone. \begin{figure} \centering \input{uv5r_changing.tex} \caption{Strength measurements while rotating UV-5R so received strength changes. Both front and rear measurements are affected equally.} \label{fig:robust1} \end{figure} \section{Localization Algorithm} \label{sec:algorithm} We implement a greedy, information-theoretic controller to provide velocity commands to the UAV. \subsection{Dynamic Model} We apply assumptions and restrictions to the UAV dynamic model in order to simplify implementation on a real UAV. First, we restrict the UAV's motion to a horizontal plane, constraining it to a constant altitude. Moxon antennas have roughly constant gain over elevation angle to the transmitter, so changes in UAV altitude would not yield much information about the transmitter location. It is possible to use antennas that are sensitive to elevation angle, but this scheme would require enhanced antenna modeling. Such a scheme would also be vulnerable to uncertainty in the transmitter's altitude. Because our goal is a simple, robust system, we use the Moxon antennas, leading to the reasonable constant-altitude restriction. Further, this restriction is common in previous UAV localization work\cite{cliff2015,Perkins2015,Perkins2016,bayram2016}. We also assume the dynamics are deterministic and that the current UAV state is known. The UAV's magnetometer provides heading information, and GPS is used for 2D position. We neglect any GPS position error. The assumption of known UAV position might seem questionable in certain applications, like GPS jamming. However, there are many alternative methods for a UAV to estimate its own position, from vision to satellite navigation systems at other frequencies\cite{Perkins2016}. Because we assume no noise in the dynamics, knowledge of the current state is enough to determine the UAV's position at future time steps. We model the UAV's planar motion as a single integrator for two reasons. First, the UAV's flight controller accepts velocity commands; second, the UAV is maneuverable and can change velocities quickly. Of course, the UAV will spend some time accelerating to commanded velocities, but the approximation is not unreasonable. Further, the UAV does not plan a long trajectory where propagation errors accumulate---it makes single-step plans and errors in the dynamics model will not be critical. Measurements are received at discrete time steps spaced $\Delta t$ apart. Using the simple forward Euler technique, we can propagate the UAV's state at time $t$ to the next time step $t+\Delta t$: \begin{equation} x_{t+\dt} = x_{t} + u_{t} \Delta t\text. \end{equation} \subsection{Belief and Filtering} The search area is modeled as a square, with the UAV starting in the center. We split the search area into a grid, where the density of each grid cell represents the probability that the RF source is in that cell. This technique is called discrete or histogram filtering\cite{Thrun2005}. It is common in UAV localization\cite{cliff2015,Perkins2015,Perkins2016} because it can handle non-Gaussian priors and non-linear dynamic and measurement models. We refer to this distribution over RF source locations as a belief. The belief is initialized to a uniform distribution with each cell weighted equally, indicating the RF source is equally likely to be in any cell. The belief $b_{t}$ is computed from the preceding belief $b_{t-\Delta t}$, the UAV state $x_t$, the observation $z_t$, the measurement model from \cref{eq:sensor}, and Bayes' rule: \begin{equation} b_{t}(\theta_i) \propto b_{t-\Delta t}(\theta_i)P(z_{t}\mid x_{t}, \theta_i), \label{eq:belief_update} \end{equation} where $\theta_i$ is a cell and $b_{t}(\theta_i)$ represents the probability the RF source is in cell $\theta_i$. For simplicity, the center of a cell is used in the measurement model. Each flight test used a stationary transmitter, so our model assumes a stationary transmitter. However, we could extend to moving transmitter applications by including a stochastic motion model in \cref{eq:belief_update}. \subsection{Algorithm} At time $t$, the UAV makes measurement $z_{t}$, yielding the current belief $b_{t}$. This belief is used to generate a velocity command with the goal of minimizing belief uncertainty as quickly as possible. One measure of uncertainty is entropy, which captures the spread of a probability distribution. The entropy of discrete distribution $b_{t}$, denoted $H(b_{t})$, is computed with \begin{equation} H(b_{t}) = -\sum_{\theta_i\in\Theta} b_{t}(\theta_i)\log{b_{t}(\theta_i)}\text, \end{equation} where by convention $0\log{0} = 0$. Entropy is minimized when the probability is concentrated in a single cell and maximized when all cells have equal probability. A common approach to automated localization is greedily minimizing entropy\cite{Hoffmann2006,cliff2015}. At each step, the UAV picks the action that minimizes the expected entropy of the belief after receiving the next measurement. This method is called greedy or myopic because it only plans over a single step. Planning myopically is generally suboptimal, as it can lead to short-term gain at the expense of long-term performance. However, multi-step planning for information gathering is computationally challenging\cite{Dressel2017}. Further, greedy entropy minimization has performed well in a variety of tasks\cite{Hoffmann2006,cliff2015,Dressel2017}. The set of possible control actions is technically infinite, but we discretize it to make the optimization easier. At each time step, the UAV reasons over this discrete set, evaluating the expected reduction in belief entropy after taking a specific action and making a new measurement. The action set is the Cartesian product of the velocity action set and the heading command set. The velocity action set consists of eight actions: move \SI{5}{\meter\per\second} in one of eight directions spaced \ang{45} apart (north, northeast, etc.). The heading action set consists of three actions: rotate \SI{10}{\degree\per\second} in either direction or do not rotate. The velocity set only includes speeds of $\SI{5}{\meter\per\second}$, because this speed was empirically found to move the UAV quickly without maneuvering violently. This restriction could be lifted in the future. To evaluate an action $u_{t}$, the UAV considers the resulting state $x_{t+\dt}$, which is fixed by knowledge of $x_{t}$ and the deterministic dynamic model. The measurement received at this new state, $z_{t+\dt}$, will lead to a new belief $b_{t+\dt}$. In myopic entropy reduction, the objective is to minimize $E_{z\in\mathcal{Z}} H(b_{t+\dt})$, the expected entropy after taking measurement $z_{t+\dt}$ at the next step. The objective is equivalent to $H(b_{t} \mid z_{t+\dt})$, the conditional entropy between distribution $b_{t}$ and $z_{t+\dt}$. This conditional entropy expresses what the uncertainty in the transmitter location would be if $z_{t+\dt}$ were known. We treat $z_{t+\dt}$ as a random variable because it is an unknown future quantity---as opposed to $x_{t+\dt}$, which is specified by $u_{t}$.\footnote{We abuse notation and use $b_{t}$ as an argument to information-theoretic quantities, even though it is a distribution and not a random variable. When we do so, we imply a random variable describing the transmitter location and having distribution $b_{t}$.} Conditional entropy can be expanded:\cite{thomas2006} \begin{equation} H(b_{t} \mid z_{t+\dt}) = H(b_{t}) - I(z_{t+\dt}; b_{t})\text, \end{equation} where $I(z_{t+\dt}; b_{t})$ is the mutual information between the target and sensor distributions. The entropy of the current belief, $H(b_{t})$, cannot be changed, so maximizing the mutual information $I(z_{t+\dt}; b_{t})$ minimizes the posterior entropy. This result satisfies intuition, as the mutual information between $z_{t+\dt}$ and $b_{t}$ expresses the reduction in uncertainty of belief $b_{t}$ if we knew $z_{t+\dt}$~\cite{thomas2006}. Mutual information is symmetric so $I(z_{t+\dt};b_{t}) = I(b_{t}; z_{t+\dt})$. Re-expanding leads to \begin{equation} I(b_{t}; z_{t+\dt}) = H(z_{t+\dt}) - H(z_{t+\dt} \mid b_{t})\text. \label{eq:objective} \end{equation} The UAV evaluates \cref{eq:objective} for each possible action $u_{t}$ and corresponding future state $x_{t+\dt}$, selecting the maximizing action. We can break down the terms in \cref{eq:objective} to gain an intuitive understanding of greedy entropy minimization~\cite{Hoffmann2006}. The term $H(z_{t+\dt})$ represents uncertainty in $z_{t+\dt}$, the measurement to be received at the next state $x_{t+\dt}$. We want this term to be large; intuitively, we learn when we sample from outcomes we are unsure of. The term $H(z_{t+\dt} \mid b_{t})$ represents the uncertainty $z_{t+\dt}$ would have if the transmitter's location were known. The UAV is evaluating an action $u_{t}$ so $x_{t+\dt}$ is known. If the transmitter's location is also known, any uncertainty in the measurement to be received is due to sensor noise. We might learn when we sample from outcomes we are unsure of, but not if the outcomes are very noisy. Therefore, picking $x_{t+\dt}$ to maximize $H(z_{t+\dt}) - H(z_{t+\dt} \mid b_{t})$ is equivalent to picking $x_{t+\dt}$ such that the UAV is uncertain about which measurement it will receive, but not simply because of sensor noise. We now show how to compute the objective function in \cref{eq:objective} using the current belief $b_{t}$, knowledge of $x_{t+\dt}$, and the measurement model. Consider the first term $H(z_{t+\dt})$: \begin{equation} H(z_{t+\dt}) = -\sum_{z\in\mathcal{Z}} P(z_{t+\dt}=z )\log P(z_{t+\dt}=z), \label{eq:firstterm} \end{equation} Because $x_{t+\dt}$ is implied by $u_{t}$, we can write $P(z_{t+\dt}\seq z) = P(z_{t+\dt}\seq z \mid x_{t+\dt})$. The measurement model (\cref{eq:sensor}) depends on transmitter location, so we apply the laws of total and conditional probability: \begin{equation} P(z_{t+\dt} \seq z \mid x_{t+\dt}) = \sum_{\theta_i\in\Theta} P(z_{t+\dt} \seq z \mid x_{t+\dt}, \theta_i) b_{t}(\theta_i). \end{equation} The second term in the objective from \cref{eq:objective} is $H(z_{t+\dt} \mid b_{t})$: \begin{equation} H(z_{t+\dt} \mid b_{t}) = -\sum_{\theta_i\in\Theta} b_{t}(\theta_i)\sum_{z\in\mathcal{Z}} P(z_{t+\dt} \seq z\mid x_{t+\dt},\theta_i)\log P(z_{t+\dt} \seq z\mid x_{t+\dt}, \theta_i). \label{eq:secondterm} \end{equation} \section{Simulations} \label{sec:simulations} To evaluate the performance of FOV sensing, we ran simulations with a single UAV searching for a single, stationary transmitter in a $\SI{200}{\meter} \times \SI{200}{\meter}$ search area that is discretized into 1600 $\SI{5}{\meter} \times \SI{5}{\meter}$ cells. In each simulation, the transmitter is initialized to a random location in the search area and the UAV starts in the center of the search area. For evaluation, we measure time to localization, which for these simulations we define as concentrating 50\% of the belief in a single cell. This concentration is equivalent to achieving a belief max-norm of 0.5. Denoted $\norm{b}_\infty$, the max-norm indicates the highest probability mass in any cell in belief $b$. When the max-norm is 1, the belief is concentrated in one cell and we are certain---according to our model---the transmitter is in that cell. A max-norm of 0.5 or greater means most of the belief is in one cell, making it a reasonable criteria for localization. Our localization algorithm minimizes belief entropy at the next time step, but we use the belief max-norm for evaluation. The reason for this mismatch is that optimizing entropy is common in robotic localization, but the max-norm is much easier to understand. A max-norm of 0.5 is more intuitive than a belief entropy of 4.2~nats. Further, these metrics are related and reach their extrema when the belief is uniform or concentrated in a single state, so it is not unreasonable to optimize for one and evaluate with the other. \subsection{Comparison to Other Modalities} We compare FOV sensing to two other sensing modalities. The first is an instantaneous bearing (IB) modality that provides bearing estimates in real-time. This modality might be implemented by a complex method like beam-steering. We include the IB modality to estimate the decrease in performance caused by avoiding the complexities of beam-steering. The second modality is the rotate-for-bearing (RFB) method in which the UAV rotates in place and estimates the bearing with a directional antenna. The UAV then moves to the next measurement location and rotates again. We assume the FOV sensor receives measurements sampled according to \cref{eq:sensor} at \SI{1}{\Hz}. The cone width and mistake rate are assumed to be $\alpha = \ang{120}$ and $\mu = 0.1$. The IB method also samples at \SI{1}{\Hz}. Bearing estimates for both the IB and RFB methods have zero-mean, Gaussian noise with a standard deviation of \ang{5}. This noise level is roughly half that reported in some work~\cite{Perkins2015}. When using the RFB method, the UAV takes \SI{24}{\second} to rotate. With all modalities, the UAV moves at \SI{5}{\meter\per\second}. We apply greedy, information-theoretic controllers for all modalities. For the RFB modality, this greedy controller picks the measurement location that most reduces entropy. The UAV then moves to this point and rotates to get a bearing estimate. The controller then picks a new measurement location. We also apply random controllers to the FOV and IB modalities to see the effect of the information-theoretic controllers. Shown in \Cref{tab:simulations}, the simulation results show two important results. First, FOV sensing can significantly outperform the RFB scheme. Mean localization with FOV sensing occurs in roughly the same time a \textit{single} bearing measurement is made---or less, if you use \num{40} and \SI{45}{\second} per rotation as reported in some work~\cite{vonehr2016,cliff2015}. FOV localization occurs in less than a third of the time that RFB takes. This estimate is conservative and the improvement would be even greater if longer rotation times or larger bearing standard deviations were used for the RFB method. The performance of FOV is much closer to that of IB, despite being much less complex than beam-steering. \begin{table} \caption{Mean time to concentrate 50\% of the belief in a single $\SI{5}{\meter}\times \SI{5}{\meter}$ cell in a $\SI{200}{\meter}\times \SI{200}{\meter}$ search area.} \centering \begin{tabular}{@{} lcc @{}} \toprule Sensor & Control & Localization Time (s) \\ \midrule FOV & Greedy & 30.8 \\ FOV & Random & 499 \\ IB & Greedy & 17.5 \\ IB & Random & 115 \\ RFB & Greedy & 99.2 \\ \bottomrule \end{tabular} \label{tab:simulations} \end{table} Second, greedy control improves FOV localization by an order of magnitude when compared to a random policy. This stark improvement suggests each measurement is uninformative, so carefully selecting the control input in order to gather more information is needed for good performance. In contrast, the performance of IB with random control is not nearly as poor; it performs roughly as well as the RFB method. Each bearing estimate is informative so the effect of intelligent control is less noticeable. To better visualize how informative each measurement is, we run a single simulation and plot the belief max-norm with time. The result can be seen in~\Cref{fig:snapshot}. When using the IB and FOV methods, the belief max-norm rises much more quickly; this result satisfies intuition as measurements are made every second. In contrast, the max-norm during the RFB method only jumps up every after each roation is completed. While the FOV measurements are less informative than the IB measurements, the FOV performance is much closer to IB, despite being far easier to implement on a real UAV. \begin{figure} \centering \input{belief_evolution.tex} \caption{Evolution of belief uncertainty for instantaneous bearing, field-of-view, and rotate-for-bearing modalities during a single simulation.} \label{fig:snapshot} \end{figure} \subsection{Measurement Quality and Quantity} We modeled measurement quality with the mistake rate $\mu$ and the cone width $\alpha$. The latter results in uncertainty regions where either observation is equally likely. We decided on a cone width of \ang{120} by examining experimentally derived gain patterns such as those shown in~\Cref{fig:two_432,fig:robust1}. We selected a mistake rate of 0.1 because it intuitively seemed like a reasonable and conservative value. However, the true rate might be lower. Furthermore, better antennas might yield larger cone widths with smaller uncertainty regions, leading to faster localization. It would be useful to know how antenna quality affects localization. We ran 1000 simulations for different cone widths and mistake rates while using a greedy, information-theoretic policy. Results can be seen in \Cref{fig:conewidth}. As the cone width increases and the uncertainty region decreases, localization time decreases. At the ideal cone width of \ang{180}, localization takes roughly two-thirds the time it does at a cone width of \ang{120}. However, this reduction only corresponds to savings of \SI{10}{\second}, and the mechanical difficulty of building near-perfect antennas is probably not worth the time savings. Likewise, a lower mistake rate $\mu$ reduces noise and localization time. \begin{figure} \centering \input{greed.tex} \caption{As the cone width increases, the uncertainty region shrinks, leading to faster localization.} \label{fig:conewidth} \end{figure} Localization depends not only on measurement quality but also measurement quantity. Measurement quantity is dictated by the measurement sample rate. In the RFB method, this rate is limited by the time to make a full rotation. However, in the FOV method, the sample rate is limited only by the electronics involved. Because the wildlife collar only transmits pulses at \SI{1}{\Hz}, we use that value as our sample rate across all transmitters. However, a higher sample rate can be used if the transmitter of interest continuously transmits. Higher sample rates yield more measurements which reduce localization time by providing more information about the transmitter's location. We ran 1000 simulations for different sample rates and using a greedy, information-theoretic policy. The cone width and mistake rate were set to the defualt values of \ang{120} and 0.1. Regardless of the sample rate, the UAV was limited to a planar speed of \SI{5}{\meter\per\second} and an angular speed of \SI{10}{\degree\per\second}. The results can be seen in~\Cref{fig:rate}. Increasing the sample rate can drastically improve localization time. At \SI{10}{\Hz}, localization time is less than half the time to perform a single rotation in the RFB modality. \begin{figure} \centering \input{rate.tex} \caption{As the sample rate increases, the time to localization decreases.} \label{fig:rate} \end{figure} \section{Flight Tests} \label{sec:experiments} To validate our sensing modality across different transmitters and frequencies, we rotated the UAV in place and measured the strength received by each antenna as the relative bearing to the transmitter changed. The results for the UV-5R radio were shown in \Cref{fig:two_432,fig:robust1}. The results for the wildlife collar and cell phone are shown in \Cref{fig:collarphone}. In all cases, the front-facing antenna receives higher strength when the UAV faces the RF source; the rear receives higher strength when the UAV is facing away. Note that the cell phone's transmitted power changes rapidly with time, but these changes affect both antennas equally, validating our claims of robustness to time-varying effects. \begin{figure} \centering \input{wildlife.tex} \input{phone.tex} \caption{(Left) Signal strength measurements made \SI{20}{\meter} from our wildlife collar. (Right) Signal strength measurements made \SI{100}{\meter} from a cell phone placing a voice call over LTE.} \label{fig:collarphone} \end{figure} \begin{figure*} \centering \includegraphics[width=2.1in,trim={1.05in 0.33in 1.05in 0.35in},clip]{temp_1} \includegraphics[width=2.1in,trim={1.05in 0.33in 1.05in 0.35in},clip]{temp_3} \includegraphics[width=2.1in,trim={1.05in 0.33in 1.05in 0.35in},clip]{temp_7} \includegraphics[width=2.1in,trim={1.05in 0 1.05in 0.35in},clip]{temp_20} \includegraphics[width=2.1in,trim={1.05in 0 1.05in 0.35in},clip]{temp_28} \includegraphics[width=2.1in,trim={1.05in 0 1.05in 0.35in},clip]{temp_37} \caption{Flight test trajectory using UV-5R radio (triangle). After 37 seconds, the UAV is fairly certain of the radio's location.} \label{fig:localization} \end{figure*} We then flew autonomous localization tests in a $\SI{400}{\meter} \times \SI{400}{\meter}$ search area with the different transmitters. The UAV flew at an altitude of \SI{10}{\meter}, moved at \SI{5}{\meter\per\second}, made measurements at \SI{1}{\Hz}, and used a greedy, information-theoretic policy. \Cref{fig:localization} shows one flight test trajectory. The beliefs shown were generated on the UAV; no post-processing was done. After \SI{37}{\second}, the UAV is fairly certain of the radio's location, which is in line with simulation results---localization occurs in roughly the time it would take to perform one rotation. Using the received observations and the GPS coordinates of the UAV and transmitter, we can estimate the true mistake rate and validate our model. Across the localization attempts, the UAV made 179 measurements where the transmitter was either in the front or rear cone; of these, 166 observations corresponded to the correct cone. This ratio corresponds to a mistake rate of 0.073, which is slightly less than the value of 0.1 we assumed earlier. This mistake rate held across the different transmitters; even though the phone's strength varied rapidly with time, it only made 4 mistakes in 79 observations, again validating our claim of robustness. Of the 203 measurements made when a transmitter was in the uncertainty region between the cones, a measurement of 1 was observed 111 times, or 54.7\% of the time. This value agrees with our model, which assume either observation was equally likely in the uncertainty region. \section{Conclusion} We present a system that significantly advances UAV-based RF localization in several key areas: in performance, where we localize RF sources in the time previous methods made a single measurement; in applicability, where we demonstrate our system across multiple frequencies and emission types; in robustness, where we continue to localize despite time-varying strength effects; and in cost, where our RF subsystem (dongles and antennas) is under \$50 USD, comparable to the cost of a single COTS directional antenna. The end result is a versatile RF localizer that can be leveraged as a testbed for algorithmic development. Future work will focus on control algorithms and reducing vulnerabilities of the sensing modality. Flight tests showed the system dynamics are stochastic, and simulations showed the great advantage of greedy control---perhaps non-myopic control will perform even better. We can both model transition stochasticity and plan non-myopically with the partially observable Markov decision process framework\cite{hsu2008point,Dressel2017}. We also plan to expand the model to track non-stationary RF sources. We can also expand the model to handle intermittent or weak transmissions. Our sensing modality is vulnerable to the presence of multiple RF sources at the same frequency, as the model assumes a single transmitter. However, this problem is not unique to our modality, as rotate-for-bearing schemes would also struggle in the presence of multiple transmitters. Thus, the problem of hunting multiple transmitters with a UAV merits further investigation. \section*{Acknowledgments} We are grateful to DJI for donating the M-100 and Manifold. This work was supported by NSF grant DGE-114747. \bibliographystyle{aiaa}
\section{\@startsection {section}{1}{\z@}% {-3.5ex \@plus -1ex \@minus -.2ex}% {2.3ex \@plus.2ex}% {\normalfont\Large\bfseries\raggedright}} \renewcommand\subsection{\@startsection{subsection}{2}{\z@}% {-3.25ex\@plus -1ex \@minus -.2ex}% {1.5ex \@plus .2ex}% {\normalfont\large\bfseries\raggedright}} \renewcommand\subsubsection{\@startsection{subsubsection}{3}{\z@}% {-3.25ex\@plus -1ex \@minus -.2ex}% {1.5ex \@plus .2ex}% {\normalfont\normalsize\bfseries\raggedright}} \makeatother \usepackage[dvips]{hyperref} \hypersetup{bookmarksopen=false,breaklinks=true, plainpages=false, colorlinks=true,linkcolor=blue, citecolor=red,urlcolor=red,hypertexnames=false} \usepackage{breakurl} \begin{document} \DeclareFontShape{T1}{lmr}{bx}{sc} { <-> ssub * cmr/bx/sc }{} \title{\vspace*{-15mm}Enquête sur les modes d'existence\\des êtres mathématiques (version augmentée)} \author{Guy Wallet} \affil{Laboratoire mathématiques, image et applications\\Université de La Rochelle\\23 avenue Albert Einstein, BP 33060, 17031 La Rochelle\\\protect\url{<EMAIL>}} \author{Stefan Neuwirth} \affil{Laboratoire de mathématiques de Besançon\\Université Bourgogne Franche-Comté\\16 route de Gray, 25030 Besançon Cedex\\\protect\url{<EMAIL>}} \date{} \maketitle \begin{abstract} L'objet de cet essai est de s'interroger sur la manière dont les entités mathématiques pourraient être accueillies dans l'architecture des modes d'existence proposée par Bruno Latour dans le cadre de son ontologie renouvelée et pluraliste du monde moderne \cite{Latour2012,EME}. Après avoir décrit les termes du problème, les travaux de Reviel Netz sur l'émergence des mathématiques grecques \cite{Netz1999} et ceux de Charles Sanders Peirce sur la dimension diagrammatique de l'activité mathématique \cite{Peirce33-58,Peirce76} sont présentés, ainsi que leurs conséquences relativement au thème du présent essai. Sa partie centrale développe longuement une conception non formaliste des mathématiques qui joue un rôle essentiel dans la suite. Cette analyse est basée sur la notion d'expérience chère à William James \cite{James2007}; elle est aussi inspirée par certains aspects de la philosophie de Per Martin-Löf \cite{MartinLof87}. Elle permet de décrire la solide certitude dont la démonstration dote les résultats mathématiques, tout en invalidant l'interprétation de cette certitude comme la marque de l'accès direct à une vérité absolue et transcendante. En s'appuyant sur cette analyse, la suite de ce travail définit une forme de quasi-mode d'existence propre aux êtres mathématiques qui respecte les traits principaux d'un mode d'existence selon l'ontologie latourienne. En conclusion, des éléments de discussion sont apportés quant à la manière dont ce quasi-mode pourrait être placé dans cette ontologie, notamment par rapport au mode de la référence objective qui prévaut dans de nombreuses autres sciences. \end{abstract} \section{Introduction} Désignée par l'abréviation \textsc{eme} dans la suite de ce texte, l'\emph{Enquête sur les modes d'existence} est d'abord un livre de Bruno Latour \cite{Latour2012}. La version numérique de cet ouvrage est étoffée par une enquête collective \cite{EME} à laquelle les internautes ont la possibilité de participer. Le livre et sa version numérique augmentée visent à renouveler notre vision des modes d'existence et des régimes de vérité associés. Il s'agit d'un projet de grande ampleur qui se propose de revisiter le cœur de notre modernité --~les sciences, les techniques, le droit, la religion, la politique, l'économie, etc.~-- et d'en déduire une description explicite d'une multiplicité de formes d'existence, chacune dotée de ses propres conditions de félicité. Ce projet d'une \emph{ontologie pluraliste} se place en opposition avec le point de vue qui accompagne la modernité selon lequel il n'y a qu'une seule forme d'existence, à savoir celle qui relève de la Science et plus largement de la Raison. Cette opposition n'a nullement pour objet de critiquer l'institution scientifique et de nier son importance; le propos de ce projet est plutôt de mettre la science à sa juste place en restituant finement la riche spécificité de son fonctionnement tout en concevant la possibilité d'autres institutions et d'autres formes d'existence elles aussi significatives de la modernité\footnote{L'un des motifs de cette refonte ontologique est de fournir un nouveau point de vue approprié pour penser et réagir face à la menace d'une catastrophe écologique et climatique de plus en plus pressante. Malgré son immense intérêt, cet aspect ne sera pas évoqué dans la suite du fait qu'il n'interfère pas immédiatement avec le sujet traité dans le présent article.}. De fait, un moment essentiel dans la genèse de l'\textsc{eme} est la mise en évidence du mode d'existence prépondérant dans la démarche scientifique pour produire une connaissance objective, avant tout dans les sciences expérimentales et de terrain\footnote{Dans un premier temps, le premier auteur du présent texte interprétait ce mode comme spécifique à la démarche scientifique expérimentale et de terrain, et caractérisant cette dernière. Après discussion avec Isabelle Stengers et Bruno Latour, il semble que cette interprétation est un peu rapide. D'une part, on peut observer la mise en œuvre de ce mode en dehors du cadre strictement scientifique, comme le montre la place occupée par l'exemple d'une excursion sur le mont Aiguille dans l'\textsc{eme}. D'autre part, il n'est pas absolument clair que ce même mode recouvre tout ce qui se fait dans les sciences expérimentales et de terrain.}, ce qui laisse provisoirement à l'écart les mathématiques. Il s'agit du \emph{mode de la référence} --~référence objective~-- noté [\textsc{ref}] et caractérisé par la construction de \emph{chaines de référence}. Une description un peu plus précise de ce mode et de la notion de chaine de référence sera donnée vers la fin de ce travail (voir la partie~\ref{PrecisREF}) au moyen de la présentation d'un exemple caractéristique. Il suffit pour l'instant de savoir qu'une chaine de référence est une succession (un enchainement) de médiations (d'inscriptions scripto-visuelles), chaque inscription\footnote{La description dans l'\textsc{eme} du mode de la référence fait grand usage du terme d'\emph{inscription} ou de manière équivalente de celui de \emph{forme}, voire de celui d'\emph{idéographie}, pour désigner un dispositif concret qui permet d'opérer une transition entre une face plus matérielle et une face qui relève plus de l'écriture ou du calcul. Pour citer l'\textsc{eme}: «par exemple une vitrine d'exposition sur laquelle on pose un spécimen est une inscription au même titre que l'écran d'un scanner médical ou un tableau excel» \cite[«Livre», colonne «Vocabulaire», entrée «Inscription»]{EME}.} étant produite à partir de la précédente. La chaine s'arrête lorsque la dernière inscription obtenue est suffisamment claire et explicite pour éclairer le problème étudié. Finalement, quelque chose existe objectivement lorsque les scientifiques concernés on pu construire une chaine de référence qui montre cette chose. Puisque les mathématiques sont incontestablement une composante du champ scientifique, se pose le problème de savoir si elles relèvent de ce mode d'existence [\textsc{ref}]. Cette question n'a pas de réponse évidente et elle est loin d'être tranchée ni même franchement abordée dans l'état actuel de l'\textsc{eme}. Certes, la question de l'ontologie des mathématiques est source d'un questionnement philosophique récurrent: \emph{de facto}, le statut des êtres mathématiques a toujours été l'objet d'interrogations et il n'est pas étonnant de retrouver un écho de cette pierre d'achoppement dans l'\textsc{eme}. En première analyse, on peut préciser quelques aspects de cette difficulté. \begin{itemize} \item Ranger les mathématiques dans le mode de la référence objective [\textsc{ref}] tel que ce dernier est présenté dans l'\textsc{eme} nécessite de montrer comment l'activité mathématique relève elle aussi des chaines de référence. Pour cela, et parce que la caractéristique essentielle de la pratique des mathématiques est l'élaboration de démonstrations, il semble nécessaire d'établir un pont entre la notion de chaine de référence et celle de démonstration. De prime abord, cela n'est pas évident et d'ailleurs, ce point ne semble pas évoqué dans l'\textsc{eme}. \item Cette difficulté est certainement liée au fait que les chaines de référence ont été mises en évidence dans la pratique des sciences possédant explicitement une base expérimentale ou de terrain, pratique qui se déploie dans des laboratoires qui constituent le cadre indispensable à la réussite de ces recherches: le laboratoire offre des conditions matérielles, financières, politiques et humaines qui constituent une dimension importante de l'activité scientifique. L'analogue semble nettement plus difficile à concevoir dans le cas d'une science formelle comme les mathématiques pour laquelle la base expérimentale est absente en première approximation, et la vie de laboratoire nettement moins spectaculaire. Néanmoins, les dernières décennies ont vu notablement s'accroitre l'importance des laboratoires comme structures de base de la recherche en mathématiques. \item Outre la difficulté à pénétrer au cœur de la pratique mathématique, l'obstacle principal à la clarification de ce problème est certainement la captation philosophique, vieille comme les mathématiques et la philosophie grecques, qui fait de la démonstration mathématique la forme paradigmatique de la démarche rationnelle parfaite, capable de mener directement et sans perte à la vérité pensée comme absolue et indépendante des acteurs humains. Cette captation est finement présentée et mainte fois évoquée dans l'\textsc{eme} et aussi dans l'ouvrage \cite{Netz1999} de Netz qui sera mentionné plus loin dans ce texte. Il apparait que cette idée d'une méthode permettant l'accès direct, plein et entier à la vérité, et la force qu'elle exerce implicitement dans notre culture occidentale, obscurcit particulièrement la réflexion sur la question posée. Ce point de vue, nommé formalisme dans l'\textsc{eme}, a joué un rôle décisif dans l'histoire culturelle de la modernité. Pour reprendre les termes de Netz dans \cite{Netz1999}, «cette vision a hanté la culture occidentale» sur le long terme. D'une certaine manière, l'\textsc{eme} apparait comme une critique frontale de cette conception. Cependant, force est de reconnaitre que, même une fois dévoilé et critiqué, cet arrière-fond philosophique n'en continue pas moins à troubler notre réflexion et à rendre délicate l'identification d'un mode d'existence adéquat pour les mathématiques. \end{itemize} Et pourtant, Bruno Latour a depuis longtemps émis l'hypothèse (voir \cite{Latour1985}) que le cas des sciences formelles et abstraites comme les mathématiques devrait pouvoir se traiter de manière peut-être encore plus évidente que celui des sciences de laboratoire ou de terrain. Il a supposé que c'est essentiellement le poids de nos préjugés philosophiques, particulièrement prégnants en ce qui concerne les mathématiques, qui nous aveuglerait sur ce point. Le point de vue développé dans la suite de la présente analyse pourrait en partie valider la pertinence de cette intuition. Notre ambition est de déterminer un mode d'existence pour les mathématiques qui soit à la fois conforme à l'esprit de l'\textsc{eme} et compatible avec l'expérience pratique des mathématiciens et des utilisateurs de mathématiques (dans la suite de ce travail, le terme de mathématicien désigne une personne ayant acquis la compétence lui permettant d'étudier et de produire lui-même des développements mathématiques). Le titre du présent texte évoque les modes d'existence au pluriel parce que notre enquête identifie un autre mode, qui fait intervenir le calcul mécanique de l'ordinateur comme étape essentielle d'un raisonnement (comme «hiatus» dans la «trajectoire» de l'existence de l'être mathématique, voir la partie~\ref{PrecisREF} pour l'emploi précis de ces deux mots); il utilise l'article déterminé, «les modes», pour afficher notre ambition d'une enquête ouverte et aussi large que possible. L'idée principale est de s'attaquer d'abord à l'arrière-fond philosophique évoqué précédemment. Pour cela, une critique de la conception formaliste des mathématiques est menée; elle permet en contrepoint de proposer une conception empirique de la notion de démonstration mathématique. Ce travail, peut-être le plus conséquent de l'article, est basé sur la notion d'expérience chère à James \cite{James2007}, mais elle est aussi inspirée par certains aspects de la philosophie du mathématicien, logicien et philosophe suédois Martin-Löf \cite{MartinLof87}, sans oublier de précieuses réflexions de Wittgenstein et Dewey \cite{Wittgenstein2006,Dewey2014} d'intérêt pour ce sujet. Ce point de vue permet de comprendre que tout résultat mathématique est doté de la certitude résultant de sa démonstration, tout en étant affecté par une forme de fragilité irréductible héritée du fait que la démonstration est d'abord une expérience. Cela permet d'invalider l'interprétation de cette certitude comme la marque de l'accès direct à une vérité absolue et transcendante. Cette étude préparatoire mais essentielle étant menée, il est possible d'en déduire, somme toute assez simplement, un mode d'existence --~par prudence, il est préférable d'évoquer plutôt un quasi-mode d'existence~-- propre aux êtres mathématiques. Ce quasi-mode respecte pour l'essentiel les caractéristiques d'un mode d'existence selon l'\textsc{eme}. De plus, il présente à la fois des analogies significatives et éventuellement quelques différences notables avec le mode d'existence de la référence objective. La question de l'articulation de ce quasi-mode avec celui de la référence objective peut alors commencer à être discutée. La présente étude est une version augmentée de l'article \cite{walletneuwirth18court}. \section{L'apport de R. Netz et de C. S.~Peirce: la place des diagrammes en mathématiques} \label{NetzPeirce} \subsection{L'émergence des mathématiques grecques} \label{emerge} Dans \cite{Latour2009}, Bruno Latour a présenté un ouvrage qui constitue selon lui la première avancée décisive dans la direction d'une «approche non formaliste du formalisme». Il s'agit du livre de Netz publié en 1999 sous le titre \emph{The shaping of deduction in Greek mathematics} \cite{Netz1999}. Cette étude présente une analyse de l'émergence des mathématiques grecques du point de vue de l'histoire cognitive et plus particulièrement de la constitution de la déduction. Ce travail d'historien s'appuie sur l'étude minutieuse des textes mathématiques grecs encore accessibles, parfois sous la forme de fragments, écrits en gros pendant un millénaire débutant au 5\ieme~siècle av.\ J.-C\@. L'analyse de Netz se place en opposition explicite avec la démarche épistémologique classique, telle que celle de Thomas Kuhn \cite{Kuhn2008}, qui s'intéresse essentiellement aux systèmes de croyances partagées --~les paradigmes~-- sur lesquels se fonderait le développement des connaissances scientifiques, ainsi qu'aux grands basculements de ces paradigmes lors des révolutions scientifiques. Netz met en doute que le travail scientifique se fonde réellement sur ces grands paradigmes qui apparaissent plutôt après coup dans les explications des épistémologues. Au contraire, ce sont pour lui les pratiques partagées qui constituent la base efficiente du développement concret des sciences. Justement, il se propose de mettre en lumière les pratiques partagées qui indiquent le mieux la force des ressources cognitives spécifiques aux mathématiques grecques. Le premier thème abordé par Netz est celui de l'introduction du diagramme avec lettres qui est l'outil le plus emblématique des mathématiques grec\-ques: voir la figure~\ref{fig:1}. \begin{figure}[h] \centering \includegraphics[width=300pt]{036eucmsd01.eps} \caption{Le diagramme avec lettres qui accompagne le théorème de Pythagore dans les \emph{Éléments} d'Euclide sur le folio~31 du manuscrit MS D'Orville~301 de l'an~888, reproduit avec l’aimable autorisation de l'Institut de mathématiques Clay.}\label{fig:1} \end{figure} Sur le plan de la pratique, c'est à coup sûr un apport de première importance qui a été, et continue à être, universellement utilisé dans l'ensemble des sciences et des techniques. Dans le cadre des mathématiques grecques, le diagramme avec lettres est un dispositif qui, en relation d'interdépendance avec le texte pur, offre une vue synoptique du cas considéré et joue le rôle d'univers de référence du texte. Cet univers est marqué par une double finitude: les objets qui sont marqués sont bornés et en nombre fini, ce qui en fait un bon support pour la pensée mathématique. De plus, la nature des objets représentés sur le diagramme n'est nulle part précisée. Non seulement les mathématiciens grecs n'apportent aucun élément de réponse à la question de savoir ce que pourraient bien être en vérité les entités qui peuplent leurs raisonnements mais de plus ils ne posent jamais la question de la réalité ultime des objets mathématiques\footnote{Un symptôme \emph{a contrario} en sont les difficultés rencontrées par un philologue et historien des mathématiques comme Árpád Szabó \cite{sz00} pour expliquer cette absence de questionnement.}. D'une certaine manière, l'ambigüité ontologique semble être constitutive de cette discipline. Ce parti pris a pour effet bénéfique d'écarter les questions qui fâchent, celles pour lesquelles un consensus est quasiment impossible, particulièrement dans la tradition de la polémique propre à la démocratie grecque. La seconde caractéristique des mathématiques grecques relevée par Netz est la forte spécificité du langage utilisé. La première propriété est la petite taille de son lexique: 143 mots utilisés répétitivement sont responsables de 95\,\% du corpus des œuvres d'Archimède, \emph{L'arénaire} mise à part. On a déjà vu que le diagramme avec lettres permet d'extraire de l'infinité des entités géométriques un univers de référence fini de petite taille suffisant et commode pour le travail de démonstration. Le lexique mathématique fait la même chose par rapport à la vaste étendue du lexique de la langue grecque. De plus, Netz note que ce langage possède une structure remarquable: pour une part importante, on l'obtient par une combinaison d'un petit nombre de briques qu'il nomme \emph{formules}. Ce sont de petites phrases ou groupes de mots, se répétant avec fort peu de variabilité. La présence massive de ces formules indique qu'elles ont un rôle cognitif important dans la structuration et la communication des argumentaires\footnote{Cependant, la manière dont ces formules se combinent est complexe. Chaque démonstration met en place un réseau d'anaphores, doit gérer la généralité de la proposition et les modalités des énoncés, et Fabio Acerbi parle très à propos de \emph{La syntaxe logique des mathématiques grecques} \cite{acerbi12}.}. En conclusion, Netz met en évidence les deux caractéristiques fortes des mathématiques grecques que sont d’une part l’introduction du diagramme avec lettres, qui évite tout questionnement ontologique sur la nature ultime des objets traités, et d’autre part l’utilisation d’un langage au lexique réduit, qui se développe implicitement selon une «structure en formules». Selon Netz, ces deux caractéristiques sont les sources principales de l’émergence et de l’efficience du mode déductif dans les mathématiques grecques, et il en analyse en détail la genèse. \subsection{Le diagramme au cœur des mathématiques selon C. S.~Peirce} \label{Peirce} Considéré comme le fondateur du courant pragmatiste en philosophie, Charles Sanders Peirce est un philosophe américain. Avec Ferdinand de Saussure, il est l'un des pères de la sémiotique (ou sémiologie), science des signes (verbaux ou non verbaux) et du sens dont ils sont porteurs. Peirce a été l'objet d'une reconnaissance tardive longtemps après sa mort lorsque des chercheurs se sont mis à exploiter les environ \nombre{12000} pages de ses écrits déposées à l'université de Harvard. Depuis lors, ses idées suscitent un grand intérêt et de nombreux travaux au niveau international. Dans la présente partie consacrée à la place que Peirce accorde aux diagrammes dans les mathématiques, les auteurs se sont principalement appuyés sur les travaux de Christiane Chauviré \cite{Chauvire1987,Chauvire2008} pour appréhender l'apport de ce philosophe à cet égard. Le point de vue de Peirce sur les mathématiques s'appuie sur les bases de sa sémiotique, à savoir la notion de signe et son lien avec la pensée. En toute généralité, un signe désigne quelque chose qui, quelle qu'en soit la raison, est interprétée comme représentant une autre chose. Contrairement à d'autres, Peirce n'impose pas au signe d'être simple ou minimal: les signes qu'il considère sont souvent des agencements complexes. Par exemple, on verra bientôt qu'un diagramme avec lettres de la géométrie grecque, aussi complexe soit-il, est un signe au sens de Peirce au même titre qu'une simple lettre nommant un objet géométrique dans le même diagramme. Ce philosophe considère que la pensée nécessite l'utilisation des signes au sens fort suivant: la fonction des signes n'est pas de représenter une pensée déjà produite par un processus se déroulant ailleurs, par exemple dans l'esprit d'un sujet humain; au contraire, \emph{les signes constituent le substrat indispensable à la constitution et au développement de la pensée et ultimement, l'acte de penser consiste à manipuler des signes.} De plus, Peirce classifie les signes en trois catégories, à savoir \emph{le symbole}, \emph{l'indice} et \emph{l'icône} en fonction du type de rapport qu'un signe entretien avec son objet. Le symbole est un signe de nature arbitraire dont la seule relation avec la chose représentée est une convention: la lettre nommant un objet géométrique est un exemple de symbole. L'indice est un signe qui entretient un rapport physique ou matériel avec la chose représentée: le mouvement de rotation des ailes d'un moulin est un indice du vent. L'icône est un signe qui a un rapport de ressemblance avec la chose qu'il représente: le dessin d'un arbre peut être considéré comme une icône de la notion d'arbre. Dans la pratique de la géométrie depuis les Grecs, le diagramme tracé explicitement sur un support n'est pas supposé être le véritable objet de l'étude. La meilleure preuve en est que des imperfections dans le tracé sont acceptées, parfois même conseillées. Bref, puisque ce diagramme tient lieu de la configuration géométrique idéale sur laquelle porte le raisonnement tout en étant non confondu avec elle, il est un signe au sens de Peirce. Il n'est pas difficile d'identifier la catégorie de ce signe puisque le symbole et l'indice sont d'emblée disqualifiés. Le diagramme géométrique est donc une icône: sa vertu est de représenter une configuration géométrique par un rapport de ressemblance. D'après Peirce, cette ressemblance porte sur la forme de la configuration, sachant que pour lui, \emph{la forme d'une chose est la structure de cette chose, c'est-à-dire l'ensemble des relations entre les parties constitutives de cette chose.} L'intérêt du diagramme est qu'il rend perceptible cette forme abstraite par l'observation directe, au même titre que quiconque peut percevoir une configuration d'objets concrets située dans son champ visuel. Il est notable que de nombreux secteurs des mathématiques utilisent explicitement des diagrammes se présentant sous la forme de figures géométriques (au sens d'une disposition concrète de points, de droites et autres courbes, de lettres et de chiffres), alors même que les objets étudiés ne relèvent pas de la géométrie. Pour ne donner qu'un exemple emblématique, il suffit de citer la théorie des catégories dans laquelle les diagrammes sont des figures constituées principalement de flèches, et dont la géométrie représente des propriétés abstraites sans rapport immédiat avec la géométrie au sens usuel. La figure~\ref{fig:2} montre un diagramme de ce type illustrant la notion de \emph{pullback} dans une catégorie. \begin{figure}[h] \[ \xymatrix@C+2em@R+2em{ & N \ar@/_10pt/[ddl]_*{g''} \ar@/^10pt/[ddr]^*{f''} \ar@{.>}[d]|*+<5pt,5pt>{\alpha} & \\ & P \ar[dl]_(0.4)*-<1ex,1ex>{g'} \ar[dr]^(0.4)*-<1ex,1ex>{f'} & \\ A \ar[r]^*{f} & C & B \ar[l]_*{g} } \] \caption{Le diagramme de la propriété universelle du pullback~$(P,g',f')$ de deux morphismes~$f\colon A\to C$ et~$g\colon B\to C$.} \label{fig:2} \end{figure} Toutes ces formes géométrisées de diagrammes relèvent clairement de l'analyse précédente. Poser qu'un diagramme en ce sens est une icône donnant à voir la forme d’une configuration abstraite sur une figure géométrique est une clarification intéressante, mais cela ne constitue peut-être pas une grande surprise et encore moins une révolution dans la philosophie des mathématiques. De fait, la position de Peirce est bien plus audacieuse comme la suite va le montrer. Tout d'abord, il introduit une extension de la notion de diagramme qui coupe le lien qui liait cette notion avec celle de figure géométrique. En toute généralité, un diagramme est une icône qui met en scène de manière perceptible la forme de la chose représentée par cette icône. Pour Peirce, il n'y a quasiment pas de limite quant à la nature d'une entité pour qu'elle puisse être interprétée comme l'icône d'une autre chose; la seule et impérieuse condition est que cette entité ressemble à cette chose sous un certain rapport. Ce degré de généralité se reporte pleinement sur la notion de diagramme comme la suite va le montrer. Comme exemple très simple de diagramme en ce sens, Peirce propose l'arrangement suivant susceptible d'apparaitre dans une présentation des bases de sa sémiotique: \[ \text{Signe:} \left\{ \begin{aligned} &\text{symbole} \\ &\text{indice} \\ &\text{icône} \end{aligned} \right. \] En effet, il s'agit d'un dispositif graphique et textuel --~une inscription scripto-visuelle~-- qui illustre de manière empiriquement perceptible la propriété abstraite selon laquelle la classe des signes est constituée de la réunion des classes des symboles, des indices et des icônes. Sa notion généralisée de diagramme permet à Peirce d'énoncer sa thèse fondamentale sur la sémiologie des mathématiques: \emph{Dans tous ses champs d'étude, c'est l'essence même de la pensée mathématique en acte de se traduire constamment par un travail de construction, d'observation et de transformation de diagrammes.} Cette thèse prend le contre-pied de l'idée reçue selon laquelle le mathématicien accède directement aux formes ou concepts abstraits; il est éventuellement ajouté que cela résulte d'une faculté plus ou moins mystérieuse nommée l'intuition. Il se trouve que le point de vue de Peirce englobe aussi une interprétation éclairante de l'intuition parfaitement en accord avec la précédente thèse, puisqu'il en donne la définition suivante: \emph{L'intuition d'une forme abstraite est la saisie empirique de cette forme sur une icône qui la représente.} Pour comprendre la pertinence de ce point de vue tout à fait radical, on peut le tester sur le cas des formules algébriques qui peuplent les traités d'algèbre. En voici un exemple extrait au hasard des \emph{Éléments de mathématique} de Bourbaki \cite[page A.I.93]{bourbaki70}. \[ \biggl( \sum_{\lambda \in\mathrm L}x_{\lambda}\biggr)^n = \sum_{| \beta |=n} \frac{n!}{\prod\limits_{\lambda \in\mathrm L} \beta_{\lambda}!} \prod_{\lambda \in\mathrm L}x_{\lambda}^{\beta_{\lambda}}\text.\leqno(14) \] Pour Peirce, une formule de ce type, avec ses notations si particulières et sa manière d'occuper l'espace sur le support de l'écriture --~savoir-faire inventé graduellement au cours du développement historique de ce domaine~-- est aussi un diagramme. En effet, cette graphie donne à voir au mathématicien qui l'observe nombre des propriétés de l'objet abstrait ainsi représenté, et prépare les opérations qu'on pourra lui appliquer. Autre exemple, comment ne pas être saisi par l'aspect diagrammatique de l'ensemble suivant de formules? \[ \begin{aligned} (a+b)^1&=a+b \\ (a+b)^2&=a^2+2ab+b^2 \\ (a+b)^3&=a^3+3a^2b+3ab^2+b^3 \\ \multicolumn{2}{c}{\dotfill} \end{aligned} \] C'est ainsi qu'il est possible d'interpréter une bonne partie de la pratique de l'algèbre comme un travail d'observation et de transformation de diagrammes. Mais bien entendu, celui qui se livre à cette activité algébrique n'a pas à être conscient de l'interprétation diagrammatique de son travail: il «fait de l'algèbre», un point c'est tout! Ce qui vient d'être dit sur les formules algébriques est évidemment valable pour toute formule mathématique quel que soit le domaine mathématique considéré. Si on prend au sérieux le degré de généralité avec lequel quelque chose est susceptible de jouer le rôle d'icône, qui pourrait être n'importe quoi d'après Peirce, un fragment de langage lui-même peut être porteur d'une dimension diagrammatique. Précisément, une séquence purement textuelle dans un développement mathématique constitue un diagramme, sous réserve qu'elle se révèle susceptible de mettre en scène une forme abstraite de manière perceptible. Dans cet ordre d'idée, la structure en «formules» du texte mathématique grec mise en lumière par Netz est interprétable comme l'explicitation de la dimension diagrammatique de ce texte, dimension indispensable à la fécondité de l'activité mathématique. On peut ajouter qu'en général, séquences textuelles, formules mathématiques et éventuellement figures géométriques sont inséparables et concourent à la constitution de diagrammes composés qui sont des mixtes de ces divers ingrédients. D'ailleurs, le diagramme géométrique introduit par les Grecs est lui même un diagramme composé puisqu'il est constitué de lettres et de dessins. Enfin, une entité mentale peut être un diagramme, si cette entité est ressentie comme satisfaisant la définition de Peirce. Finalement, les diagrammes au sens général apparaissent comme le substrat de l'activité mathématique. Cette activité se réalise par diverses opérations portant sur des diagrammes, comme les constructions et transformations de diagrammes. D'après Peirce, les transformations de diagrammes apportent la preuve visible que les mathématiques s'enrichissent par la production de nouvelles connaissances puisque en effet, ces opérations ne sont nullement prédéterminées. \subsection{Le point sur la question d'un mode d'existence en mathématiques après Netz et Peirce} Les travaux de Netz et de Peirce présentés dans les parties précédentes portent tous les deux sur les mathématiques, mais diffèrent notablement, tant par le champ d'étude --~mathématiques grecques et mathématiques en général~-- que par le type d'approche --~méthodes empiriques d'analyse textuelle des sciences sociales et analyse philosophique et sémiotique~--, au point qu'il peut sembler aventureux de vouloir en tirer une leçon commune. Et pourtant, ces mêmes différences font que ces deux approches des mathématiques se complètent relativement bien en ce qui concerne la place du diagramme dans les mathématiques. En effet, le diagramme géométrique avec lettres dont Netz a analysé l'importance dans les mathématiques grecques est généralisé par Peirce en un dispositif iconique jouant un rôle essentiel dans l'ensemble des mathématiques et non plus dans la seule géométrie grecque. D'autre part, Netz a mis en évidence des facteurs linguistiques spécifiques chez les Grecs --~utilisation d'un langage au lexique réduit et structuration de ce langage par l'emploi répétitif de formules~--, facteurs dont on peut admettre la persistance au delà de l'Antiquité jusqu'à nos jours et qui constituent un cadre dans lequel la notion de diagramme généralisé au sens de Peirce se révèle pertinente pour l'activité mathématique en général. Il s'agit maintenant d'analyser dans quelle mesure cette leçon commune permet de progresser relativement à la question d'un mode d'existence pour les mathématiques au sein de l'\textsc{eme}. Préalablement, il est intéressant de noter que l'un des bénéfices majeurs de l'introduction dans l'\textsc{eme} du mode [\textsc{ref}] de la référence objective est que ce mode n'a pas vocation à être l'unique vecteur de toute l'ontologie. Au contraire, cette conception du travail scientifique laisse de la place à d'éventuels autres modes d'existence capables de prendre en charge de nouveaux êtres, de les faire exister, de les instaurer. C'est effectivement ce qui est fait dans \cite{Latour2012,EME} par l'introduction d'une série de modes d'existence pour, par exemple, les êtres de la fiction, les êtres de la technique, les êtres du droit, de la politique, de la parole religieuse, etc. Chacun de ces nouveaux modes d'existence se manifeste par le truchement de trajectoires (continuité) constituées de sauts entre des formes différentes (discontinuité) se succédant selon un principe de «véridiction» \cite[«Livre», colonne «Vocabulaire», entrée «Véridiction»]{EME} spécifique à chaque mode. La richesse de ce nouveau point de vue sur l'ontologie, sa capacité à rendre compte de pratiques aussi éloignées que par exemple celles relevant d'une part de la recherche scientifique et d'autre part de la parole religieuse, laisse penser qu'il devrait pouvoir permettre une approche originale et pertinente du cas des mathématiques. Les analyses de Netz et de Peirce constituent un premier pas dans cette direction. En effet, la description qu'ils donnent des mathématiques est manifestement en forte corrélation avec le fond philosophique qui initie l'analyse anthropologique dans la démarche scientifique développée par l'\textsc{eme}. C'est vrai en ce qui concerne la critique vis-à-vis de l'approche épistémologique qui privilégie les révolutions scientifiques au détriment d'une étude concrète du fonctionnement réel d'une science normale. C'est aussi vrai pour l'importance donnée aux véritables technologies intellectuelles que sont d'un côté le travail sur les diagrammes couplé avec un langage enrégimenté, de l'autre la fabrication et l'étude des inscriptions scripto-visuelles. Dans les deux cas, il s'agit de «rematérialiser» la connaissance mathématique, c'est-à-dire de montrer en quoi elle est dépendante de procédés concrets de construction et de manipulation d'inscriptions, dont l'importance est généralement ignorée par l'approche purement épistémique du savoir mathématique. Néanmoins, ce que l'on ne trouve pas dans les analyses de Netz et de Peirce, ce qui d'ailleurs n'est pas leur propos, c'est la mise en évidence des cheminements particuliers --~l'analogue de la notion de chaine de référence dans les sciences expérimentales~-- par lesquels se manifesterait l'existence des entités mathématiques. Toutefois, Netz analyse très précisément la forme des démonstrations des Grecs. Après Netz et Peirce, que peut-on dire alors sur la manière dont se manifestent les êtres mathématiques? Ce sont les «existants» \cite[«Livre», colonne «Vocabulaire», entrée «Êtres, existants»]{EME} qui résultent des agencements particuliers produits par les mathématiciens. Ces agencements sont faits de textes, de dessins et de diagrammes constituant des ensembles éminemment structurés. Essentiellement, on y voit, et cela depuis les anciens Grecs, se répéter la forme suivante: l'introduction d'un cadre de travail par un jeu de définitions, de diagrammes, de notations et de commentaires\footnote{Dans les \emph{Éléments} d'Euclide, cette introduction n'est accompagnée d'aucun commentaire. D'autres traités antiques contiennent une préface, mais celle-ci n'a en général pas de finalité méthodologique.}, puis l'annonce du résultat à démontrer suivie de sa validation par une démonstration proprement dite. La leçon de Netz et de Peirce est que ces formes ne deviennent productives et partageables par une communauté que sous certaines conditions techniques et cognitives qui caractérisent ces mathématiques, précisées dans les parties~\ref{emerge} et~\ref{Peirce} ci-dessus. Marquées par l'usage des démonstrations comme moyen de validation ultime des résultats, ce sont ces mathématiques qui, héritières des Grecs, se sont trouvées au cœur de la révolution scientifique et sont maintenant pratiquées dans les lieux de recherche partout dans le monde. Dans la présente étude, ce sont elles qui sont désignées par l'expression «les mathématiques\footnote{L'expression est trompeuse car elle peut donner à penser que «les» mathématiques en question sont parfaitement unifiées et qu'elles épuisent la totalité des formes de l'activité mathématique. Cela est tout à fait discutable, ne serait-ce qu'au niveau historique. Un exemple frappant d'une autre pratique mathématique est donné par l'étude \cite{Chemla2016} de textes datant de la Chine impériale du~3\ieme\ au 7\ieme~siècle. On y découvre une culture mathématique riche mais très différente de celle qui est au centre de l'attention du présent travail. Malgré cette altérité, certaines des caractéristiques des mathématiques grecques relevées par Netz semblent présentes, en particulier un usage, en partie caché, d'inscriptions scripto-visuelles.}» et qui constituent son objet central. Ceci étant admis, la place centrale des démonstrations dans les mathématiques\footnote{À juste titre, les mathématiciens n'aiment guère que l'on réduise leur activité à l'écriture de démonstrations. De fait, une démonstration en bonne et due forme n'est susceptible d'être rédigée qu'après une longue phase préparatoire relativement informelle. Il n'empêche que c'est l'élaboration finale d'une démonstration qui est le but de ce travail préalable et qui en marque le succès. De plus, la phase préparatoire informelle est difficile à observer puisqu'elle comporte souvent des phases de réflexion intense sans manifestation extérieure significative. On peut écouter la belle description qu'en donne André Lichnerowicz dans une interview \cite{vernier87} dont la pointe est le propos rapporté que «le plus difficile pour une femme de mathématicien, c'est de distinguer un mathématicien qui travaille et un mathématicien qui dort».} suggère que les êtres mathématiques manifestent leur existence par des parcours en relation avec les démonstrations dans lesquelles ils sont impliqués. Est-il possible d'interpréter sans distorsion manifeste ces parcours démonstratifs comme des chaines de référence au sens de l'\textsc{eme}? Ou bien, peut-on concevoir les démonstrations comme les trajectoires d'un nouveau mode d'existence, qui lui serait spécifique aux entités mathématiques? Pour répondre à ces questions, un long détour pour élaborer une conception non formaliste des mathématiques, conception venant elle-même en critique de la vision formaliste de cette discipline, s'avère utile. \section{La démonstration et l'idée formaliste de sa perfection} \label{StrucPreuve} La logique contemporaine met à disposition plusieurs types de description de la notion de démonstration captant plus ou moins bien la forme de la pratique argumentaire des mathématiciens. Le calcul nommé «déduction naturelle» \cite{Gentzen1935} est particulièrement intéressant pour ce propos et la description qui suit s'en inspire un peu, en évitant toutefois les aspects techniques moins pertinents dans ce travail philosophique. Introduite par le mathématicien et logicien allemand Gerhard Gentzen\footnote{Gentzen (1909-1945) présente la curiosité d'avoir été à la fois un très grand logicien et un nazi semble-t-il convaincu. Il serait malvenu d'en déduire que son œuvre en logique --~la déduction naturelle, le calcul des séquents, la cohérence de l'arithmétique de Peano~-- présente une quelconque connivence avec le national-socialisme. De fait, son apport scientifique s'est révélé d'une extrême importance pour les développements modernes de la théorie de la démonstration.}, la déduction naturelle a pour objet premier de proposer un formalisme reproduisant le mode naturel du raisonnement mathématique par opposition au style de la méthode axiomatique\footnote{La méthode axiomatique n'est pas représentative de la pratique courante des mathématiciens. La meilleure preuve en est que la grande majorité d'entre eux n'ont que de très vagues idées sur le système axiomatique qui est censé être le fondement de leur travail. Cela ne les empêche aucunement de faire des mathématiques!} commune aux systèmes de Frege, de Russell et Whitehead et de Hilbert. Selon Gentzen, le raisonnement mathématique naturel repose non pas sur la référence à une poignée d'axiomes trop souvent abscons mais sur l'application de règles d'inférences claires, efficaces et en aussi grand nombre que nécessaire dans chaque secteur de cette discipline. Suivant en cela la terminologie utilisée dans les travaux de Per Martin-Löf \cite{MartinLof87}, un résultat mathématique dont on sait qu'on a le droit de l'affirmer est nommé un \emph{jugement}, ce terme étant pris exclusivement dans le sens de \emph{jugement mathématique} dans toute la suite du présent texte. Un jugement est donc un élément établi de connaissance mathématique: il se présente sous la forme d'un énoncé mathématique qui a été préalablement reconnu comme valide. La forme la plus simple d'un jugement est «$A$~est vrai\footnote{Le jugement «$A$ est vrai» est synonyme de «$A$ est un théorème» dans certains écrits de logique. Néanmoins, la tradition mathématique veut que l'on réserve le terme de théorème aux résultats qui sont à la fois importants et difficiles à démontrer. Il y a d'autres formes de jugement, en particulier le jugement hypothétique «$A$ est vrai sous l'hypothèse que $B$ est vrai».}», où $A$~désigne une proposition. Par exemple, l'énoncé que «la somme des angles d'un triangle est égale à deux angles droits» est une proposition, et l'affirmation que cette proposition est vraie est un jugement qui est par exemple validé par le raisonnement que l'on trouve dans les \emph{Éléments} d'Euclide et que nous présentons dans la partie~\ref{PreuveExpe}. Maintenant, il reste à savoir comment les jugements sont obtenus. Certains sont donnés préalablement à la phase déductive; ils traduisent une sorte d'évidence basique et immédiate relative aux objets considérés et au cadre de travail. Les autres jugements sont tous ceux que l'on peut obtenir par déduction, c'est-à-dire par application de \emph{règles d'inférence}: chacune de ces règles décrit comment zéro, un ou plusieurs jugements permettent d'obtenir un autre jugement. Ces règles d'inférence reprennent sous une forme épurée les bases de la logique du raisonnement humain. La déduction naturelle représente une démonstration mathématique comme un enchainement de jugements\footnote{\label{StructDem}Plus généralement, la structure d'une démonstration peut être un peu plus complexe qu'une simple suite organisée comme un parcours linéaire: c'est plutôt une famille de jugements reliés par des règles d'inférence qui confluent vers le jugement final. La structure combinatoire d'une telle configuration est ce que les logiciens nomment un \emph{arbre de preuve}. Cette même structure serait vraisemblablement appropriée pour les chaines de référence. Dans le présent travail de nature essentiellement philosophique, il semble inutile de préciser davantage ce point technique.}, chaque jugement étant obtenu à partir du précédent (ou des précédents) par une règle d'inférence, le dernier jugement obtenu représentant le théorème. \emph{A priori}, il n'y a pas grand chose à reprocher à la description de la notion de démonstration développée ci-dessus sinon qu'elle est excessivement brève et formelle. Toutefois, ce mode de description donne facilement prise à une interprétation formaliste, cette dernière se révélant être une version moderne de l'antique captation philosophique des mathématiques grecques telle qu'elle avait été opérée par les philosophes platoniciens. En effet, on a vu qu'une démonstration apparait comme une structure constituée de jugements reliés par des inférences logiques; or les inférences logiques sont parfaitement caractérisées et cataloguées par le travail des logiciens depuis le siècle dernier: cette structure peut donc être simulée par un calcul en réduisant le texte de la démonstration à une série de symboles assemblés selon des règles syntaxiques précises, sans utilisation de la langue naturelle. Il en découle que la démonstration devient un dispositif formel objectif dont la validité tient à son objectivité, c'est-à-dire à son caractère indépendant de l'approche subjective de l'esprit humain. Autrement dit, la validité d'une démonstration réside ultimement dans une propriété objective d'un objet combinatoire extérieur à notre conscience. En conséquence, une fois qu'elle est convenablement formalisée, une démonstration mathématique constitue une forme d'argumentation imparable, incontestable, menant inéluctablement à sa conclusion. Ainsi, la vérité dévoilée par une démonstration prend un caractère universel, immuable et permanent, bien exprimé par la conception tarskienne de vérité. Afin d’illustrer la réalité de ce point de vue, voici une longue citation issue de l’introduction du livre~I des \emph{Éléments de mathématique} de Bourbaki \cite{bourbaki54}, intitulé \emph{Théorie des ensembles}, qui a pour but explicite de montrer les changements --~par rapport au vénérable héritage légué par les Grecs~-- que les développements contemporains apportent à la notion de démonstration. \begin{quotation}\label{citation-bourbaki} [\dots] l'analyse du mécanisme des démonstrations dans des textes mathématiques bien choisis a permis d'en dégager la structure, du double point de vue du vocabulaire et de la syntaxe. On arrive ainsi à la conclusion qu'un texte mathématique suffisamment explicite pourrait être exprimé dans une langue conventionnelle ne comportant qu'un petit nombre de «mots» invariables assemblés suivant une syntaxe qui consisterait en un petit nombre de règles inviolables: un tel texte est dit \emph{formalisé}. La description d'une partie d'échecs au moyen de la notation usuelle, une table de logarithmes, sont des textes formalisés; les formules du calcul algébrique ordinaire en seraient aussi, si l'on avait complètement codifié les règles gouvernant l'emploi des parenthèses et qu'on s'y conformât strictement, alors qu'en fait certaines de ces règles ne s'apprennent guère qu'à l'usage, et que l'usage autorise à y faire certaines dérogations. La vérification d'un texte formalisé ne demande qu'une attention en quelque sorte mécanique, les seules causes d'erreur possibles étant dues à la longueur ou à la complication du texte; c'est pourquoi un mathématicien fait le plus souvent confiance à un confrère qui lui transmet le résultat d'un calcul algébrique, pour peu qu'il sache que ce calcul n'est pas trop long et a été fait avec soin. Par contre, dans un texte non formalisé, on est exposé aux fautes de raisonnement que risquent d'entrainer, par exemple, l'usage abusif de l'intuition, ou le raisonnement par analogie. En fait, le mathématicien qui désire s'assurer de la parfaite correction, ou, comme on dit, de la «rigueur» d'une démonstration ou d'une théorie, ne recourt guère à l'une des formalisations complètes dont on dispose aujourd'hui, ni même le plus souvent aux formalisations partielles et incomplètes fournies par le calcul algébrique et d'autres similaires; il se contente en général d'amener l'exposé à un point où son expérience et son flair de mathématicien lui enseignent que la traduction en langage formalisé ne serait plus qu'un exercice de patience (sans doute fort pénible). Si, comme il arrive mainte et mainte fois, des doutes viennent à s'élever, c'est en définitive sur la possibilité d'aboutir sans ambigüité à une telle formalisation qu'ils portent, soit qu'un même mot soit employé en des sens variables suivant le contexte, soit que les règles de la syntaxe aient été violées par l'emploi inconscient de modes de raisonnement non spécifiquement autorisés par elles, soit encore qu'une erreur matérielle ait été commise. Ce dernier cas mis à part, le redressement se fait invariablement, tôt ou tard, par la rédaction de textes se rapprochant de plus en plus d'un texte formalisé, jusqu'à ce que, de l'avis général des mathématiciens, il soit devenu superflu de pousser ce travail plus loin; autrement dit, c'est par une comparaison, plus ou moins explicite, avec les règles d'un langage formalisé, que se fait l'essai de la correction d'un texte mathématique. \end{quotation} C'est ainsi que la mise au clair de ce qu'est une démonstration au moyen d'un point de vue avant tout formaliste peut conduire à conforter l'idée de la perfection absolue de l'argumentation mathématique. Non seulement cette conception mérite d’être questionnée, mais, par un glissement insidieux, elle fait de la démonstration mathématique le modèle par excellence de la méthode rationnelle permettant, selon «les modernes\footnote{Conformément à l’utilisation de ce terme dans l'\textsc{eme} \cite[«Livre», colonne «Vocabulaire», entrée «Modernes, modernisation»]{EME}, «les modernes» désignent ces hommes qui adhèrent pleinement au grand récit de l'émancipation selon lequel, depuis la révolution scientifique, s'établirait progressivement mais irréversiblement la distinction absolue entre Illusion et Raison, entre un passé archaïque et un futur émancipé, entre Croyance et Savoir Vrai. Voir l’\textsc{eme} \cite{Latour2012,EME} pour de plus amples développements sur ce thème et son rapport avec la crise écologique.}», l'accès direct et complet à la Vérité quel que soit le domaine ou le problème considéré. \section{Une conception empirique du jugement mathématique} \label{NonForm} \subsection{L'expérience d'un jugement} \label{PreuveExpe} L'interprétation formaliste précédente peut induire le biais qu'un jugement serait obtenu en tant que tel grâce au dispositif formel que constitue une démonstration formalisée, indépendamment des acteurs mathématiciens concernés, de leur appréhension de ladite démonstration, de leurs tentatives, de leurs discussions, de leurs calculs. Pour échapper à ce travers, il faut remarquer qu'une configuration de signes sur une feuille de papier ou un tableau ne devient éventuellement une démonstration --~formelle ou pas~-- qu'à la condition que des acteurs humains puissent en faire l'expérience. Cette remarque nous met sur la voie d'une autre approche philosophique, cette fois-ci dans l'esprit de l'\emph{empirisme radical} de William James \cite{James2007}. Cette doctrine est centrée sur la notion d'expérience, ce dernier terme se référant à tout ce dont un sujet individuel fait l’expérience dans le flux continu de sa propre vie. Autrement dit, l'expérience est le champ instantané du présent, à la fois continu et changeant, qui constitue le vécu de chaque personne. L'intérêt pour notre questionnement de l'empirisme jamesien se manifeste dans le principe suivant qui en offre un résumé percutant: \begin{quote} \emph{N'admettre que ce dont on puisse faire l'expérience, et rendre justice à tout ce qui peut être objet d'expérience}\footnote{Cette formulation provient de la préface de \cite{James2007}.}. \end{quote} De ce point de vue, un jugement, plus exactement l'affirmation d'un jugement ou l'adhésion à un jugement, est une expérience d'un certain type qu'il faut maintenant essayer de décrire. La question est de savoir ce qui caractérise les jugements parmi les expériences porteuses de connaissance. La réponse qui va être donnée est inspirée par la lecture du travail \cite{MartinLof87} du logicien, mathématicien et philosophe Per Martin-Löf, connu entre autres comme le concepteur de l'étonnante et riche \emph{théorie constructive des types}. Néanmoins, les développements qui vont suivre ne sont pas dans la droite ligne de l'analyse de Martin-Löf. De fait, cet auteur ne se réfère pas directement à l'empirisme ou au pragmatisme de James. Ses sources sont plutôt l'œuvre de Kant et surtout la phénoménologie à travers les analyses de Husserl sur les fondements de la logique\footnote{\label{IntuiML}De plus, dans ses travaux, Martin-Löf se réfère explicitement à l'intuitionnisme dont il est un représentant ancré dans la période contemporaine \emph{post} 1960. Contrairement au maitre Brouwer initiateur de ce courant, il ne jette pas l'opprobre sur le langage et les langues formelles. Néanmoins, il est profondément fidèle à l'exigence de sens qui constitue le trait principal de l'intuitionnisme. Cela se retrouve dans son interprétation de la démonstration d'un jugement qu'il donne dans \cite{MartinLof87}, qui a inspiré la définition donnée dans le présent travail. Voir la présentation synthétique \cite{Bourdeau2004} pour plus de précisions sur l'intuitionnisme et l'apport de Martin-Löf.}. Néanmoins, l'intuitionnisme auquel se réfère Martin-Löf n'est pas totalement étranger à l'empirisme, comme relevé dans \cite{Bourdeau2004}. La propriété fondamentale qui fait qu'un énoncé mathématique est un jugement est qu'\emph{on sait qu'on a le droit de l'affirmer}: il possède une démonstration. Pour l'instant, rien de bien nouveau. La divergence avec le point de vue formaliste se marque si l'on insiste sur la nature de cette connaissance simplement en mettant en avant la notion d'expérience. C'est ce qui est fait avec la définition suivante qui va jouer un rôle essentiel dans les développements qui suivent. \begin{quote} \label{DefPreuve} \emph{Une expérience de démonstration d'un jugement est une expérience par laquelle un mathématicien saisit l'évidence de ce jugement}. \end{quote} On peut dire qu'une expérience de démonstration est une expérience par laquelle ce mathématicien littéralement \emph{voit} ce jugement; alors, pour le sujet de cette expérience, le jugement \emph{est}, pleinement, sans restriction au point qu'il lui est impensable d'en douter, de s'y soustraire. Chaque terme de la définition a son importance: «expérience» bien entendu pour qualifier un segment du flux de la vie propre à un individu (ce qui n'empêche pas que la conclusion de l'expérience puisse être partagée: ce point sera discuté dans la partie~\ref{FormeDem}), «mathématicien» pour indiquer que la reconnaissance pleine et entière de cette expérience nécessite une compétence généralement acquise par l'enseignement et la pratique au sein d'une communauté scientifique spécifique, enfin «l'évidence» pour marquer qu'une expérience de démonstration rend visible et manifeste le jugement, qu'elle expose au regard la totalité d'un arrangement qui le valide sans conteste et l'établit comme «fait mathématique». Dans l'utilisation qui vient d'en être faite, les expressions «voir un jugement», «rendre visible» ou «exposer au regard» ne sont pas de simples métaphores destinées à désigner la saisie directe par l'esprit de propriétés abstraites. Comme l'a montré Peirce, la dimension diagrammatique des mathématiques permet au mathématicien d'amener dans sa perception sensible (en général la vision) la forme de la configuration abstraite dont il traite, et il peut ainsi l'observer et la manipuler avec la force brute que donne cette perception. Afin d'illustrer ce qu'est cette expérience de la vision d'un jugement, considérons l'exemple de la Proposition~32 du Livre~I des \emph{\'Eléments} d'Euclide qui énonce le jugement selon lequel \emph{la somme des angles d'un triangle est égale à deux droits}. Cet exemple est intéressant du fait qu'il est relativement élémentaire tout en étant caractéristique de la démarche inaugurée par les Grecs. La démonstration est basée sur le diagramme présenté dans la figure~\ref{fig:3}. Sur ce diagramme se distinguent en traits continus la donnée initiale d'un triangle~ABC et en traits discontinus une construction auxiliaire telle que B,~C et~D soient alignés et se succèdent dans cet ordre sur cette droite et que CE~soit parallèle à~BA, le point~E étant situé du même côté de la droite prolongeant~BC que le point~A. \begin{figure}[!h] \centering \includegraphics[width=8cm]{Theoreme32.eps} \caption{Un diagramme avec lettres analogue à celui qui accompagne la Proposition~32 du Livre~I des \emph{\'Eléments} d'Euclide.}\label{fig:3} \end{figure} Imaginons l'expérience vécue par un mathématicien qui scrute ce diagramme. En se remémorant le schéma général des angles définis par deux droites parallèles coupées par une sécante et les relations d'égalité afférentes, cet observateur note les égalités d'angles suivantes: $\widehat{\mathrm{ABC}}=\widehat{\mathrm{ECD}}$ et $\widehat{\mathrm{BAC}}=\widehat{\mathrm{ACE}}$. Alors ce scrutateur géomètre ne peut qu'être saisi par l'évidence du jugement considéré qui se donne à voir complètement et clairement sur le diagramme. Cette expérience qu'est une expérience de démonstration d'un jugement est en partie un acte mental mais elle ne se réduit pas au moment ultime pendant lequel le mathématicien est saisi par cette évidence. Ce moment est préparé par la démarche souvent laborieuse d'analyse critique et d'appropriation à laquelle se livre le mathématicien en composant ou en décryptant une inscription faite de textes, de figures, de schémas, de formules, de calculs, etc. Ce n'est qu'à la fin de cette phase d'exploration et de confrontation que cette expérience peut éventuellement surgir pleine et entière. C'est la totalité du processus menant à l'évidence finale qui est l'expérience de démonstration. Autrement dit, le succès de la phase finale de l'expérience de démonstration se manifeste dans la conscience du mathématicien mais il dépend grandement de l'inscription scripto-visuelle sur laquelle s'appuie ce processus et plus généralement des conditions cognitives caractéristiques des mathématiques et de la dimension diagrammatique de cette discipline mises en lumière dans les travaux de Netz et Peirce présentés dans la partie~\ref{NetzPeirce}. Contrairement à l'approche formaliste de la démonstration évoquée dans la partie~\ref{StrucPreuve}, une expérience de démonstration d'un jugement ne se fonde pas sur l'utilisation explicite de techniques et méthodes logiques. Ce qui justifie une expérience de démonstration d'un jugement par un mathématicien, c'est la mise en place par ce dernier d'un dispositif dont l'expérience est vécue comme la manifestation incontestable du bien-fondé --~l'évidence~-- de ce jugement. Dans l'ordre conceptuel, cette manifestation de l'évidence mathématique précède l'analyse logique du raisonnement, qui elle procède d'une mise en forme postérieure à l'expérience de démonstration. En général, cette évidence n'est pas immédiatement accessible. Le travail de construction d'une expérience de démonstration auquel se livre le mathématicien consiste à fabriquer un cheminement souvent indirect, permettant de transporter étape par étape l'évidence jusqu'à obtenir l'évidence finale du jugement. Ce transport de l'évidence produit à chaque étape une expérience de démonstration d'un jugement intermédiaire. Ainsi, il apparait qu'une expérience de démonstration d'un jugement se scinde elle-même en une succession d'expériences de jugements intermédiaires, c'est-à-dire en une succession d'expériences de l'évidence de chacun de ces jugements. Nous proposons de lire le passage suivant de Hermann Weyl dans ce sens. \begin{quotation} Le célèbre ouvrage de Dedekind, \emph{Nature et fonction du nombre}, 1888, préf.\ 1\iere\ éd., s'ouvre sur cette phrase: «Ce qui est démontrable ne doit pas, en science, être cru sans démonstration». Cette assertion est probablement typique de la pensée de la plupart des mathématiciens, elle n'en prend pas moins les choses à l'envers. Comme si un rapport de fondation aussi médiat que celui que nous nommons démonstration, était capable de susciter une «croyance» sans que nous nous assurions de l'exactitude de chaque pas isolé au moyen d'une intuition immédiate! C'est cette intuition (non pas la démonstration), qui est partout la source ultime de la connaissance, elle consiste à avoir «l'expérience directe du vrai\footnote{Weyl cite ici Edmund Husserl: «Une évidence n'est, au contraire, rien d'autre que ``l'expérience vécue'' de la vérité» \citep[§~51]{husserl59}.}». \citep[p.~59.]{weyl94} \end{quotation} Ainsi, par l'expérience de démonstration globale, l'évidence se propage de jugement en jugement pour culminer par l'évidence du jugement final. Mais d'où vient la puissance de la conviction attachée à une expérience de démonstration d'un jugement, cette certitude qui a impressionné les philosophes au point d'y voir le paradigme d'un accès direct à la Vérité? Pourquoi la «certitude nécessaire», c'est-à-dire le type de confiance que l'on accorde à un résultat qui résulte d'une expérience de démonstration, est-elle considérée comme l'une des formes de certitude la plus incontestable qui soit? Il y aurait lieu d'approfondir ces questions et de relativiser certaines de ces formulations, par exemple en discutant les arguments développés par Wittgenstein dans \cite{Wittgenstein2006} et par Dewey dans \cite{Dewey2014}, ce qui n'est pas fait sinon de manière allusive dans le cadre de la présente contribution. Pour l'instant, il suffit de constater que c'est la notion même d'expérience de démonstration telle qu'elle vient d'être définie qui explique la puissance de la certitude nécessaire. Celui qui éprouve une expérience de démonstration d'un jugement, c'est-à-dire celui qui est saisi par l'évidence du résultat énoncé, est absolument certain de la validité du jugement considéré. À l'opposé, celui qui admet qu'un résultat est démontré mais dont la conviction est mitigée d'une dose de doute, celui-ci n'a simplement pas éprouvé une expérience de démonstration de ce résultat. Comme le montrera le point~2 de la partie~\ref{DeuxRem}, ce n'est pas une question de force qui distingue la conviction attachée à une expérience de démonstration d'un jugement, c'est une question de qualité, celle qui résulte du cheminement de l'évidence qui aboutit en pleine lumière, sans zone d'ombre et sans délégation à un oracle\footnote{\label{NoteOracle}Un oracle contemporain pourrait être: l'avis d'un expert assurant d'autorité que telle démonstration est valide, ou bien encore le recours à un outil informatique approprié pour gérer tout ou partie d'une démonstration (voir le point~2 de la partie~\ref{DeuxRem}). En toute rigueur, l'argument selon lequel tel jugement est acquis du seul fait qu'il a fait l'objet d'une publication est aussi une forme de recours à un oracle\dots}, au jugement considéré. Rappelons encore une fois que la nature même d'une expérience de démonstration et la qualité de la certitude nécessaire qui en découle, sont profondément dépendantes des conditions et dispositifs propres aux mathématiques précisés par Netz et Peirce\footnote{\label{note:voevodsky}D'ailleurs, c'est lorsque ces conditions sont mises à mal par l'étendue et la complexité du champ mathématique considéré que la certitude nécessaire peut commencer à être mise en doute; c'est par exemple le sens de certaines déclarations du mathématicien Vladimir Voevodsky à propos de son absence de confiance en de nombreux résultats célèbres et publiés de son domaine de recherche, y compris les siens.}. \subsection{Inscription de démonstration et partage d'un jugement}\label{FormeDem} Maintenant qu'a été introduit le concept d'expérience de démonstration, il est notable que cette notion ne recouvre pas la totalité des significations contenues dans l'idée usuelle de démonstration. En effet, dans un texte de mathématiques (livre, article ou lettre), la partie du document qui est censée justifier un théorème est elle-même qualifiée de démonstration (ou de preuve) du théorème. Or il est clair que cet objet concret qu'est la démonstration en ce sens est quelque chose de différent de l'expérience de démonstration du théorème en question. C'est d'autant plus clair pour un mathématicien qui sait que généralement, la simple lecture d'une démonstration d'un théorème est loin de suffire pour en éprouver l'évidence. Sa pratique des mathématiques lui a montré qu'avant d'atteindre cette évidence, il est souvent nécessaire de se livrer à un travail d'exploration de cette démonstration, et que cette tâche est délicate, et son issue incertaine. La définition qui suit permet de préciser utilement cette distinction. \begin{quote} \emph{Une inscription de démonstration d'un jugement donné est une inscription scripto-visuelle (couchée sur le papier, tracée sur un tableau, enregistrée dans un fichier informatique\dots) présentant une configuration d'arguments textuels et graphiques susceptible en principe de permettre ou de favoriser l'expérience de démonstration du jugement.} \end{quote} La notion d'inscription de démonstration d'un jugement est donc intrinsèquement différente de celle d'expérience de démonstration puisque la première est une forme faite de textes, de tableaux, de schémas, de diagrammes, et que la seconde est une expérience se concluant chez celui qui l'éprouve par l'acte mental de l'évidence du jugement. Néanmoins, ces deux notions sont liées. Ou bien l'inscription de la démonstration est élaborée en même temps que l'auteur cherche à éprouver la validité d'un énoncé, validité qui est finalement attestée par l'expérience de la démonstration. Dans ce cas, la recherche de cette expérience oriente la fabrication d'une inscription, et cette dernière, au fur et à mesure de son élaboration, offre un outil scripto-visuel stable facilitant l'avènement de l'expérience de la démonstration. Ou bien on dispose \emph{a priori} d'une démonstration déjà rédigée, et un travail d'investigation basé sur cette inscription est susceptible d'être constitutif d'une expérience de démonstration du jugement considéré. Ainsi, \emph{une inscription de démonstration d'un jugement joue le rôle d'un guide pour le cheminement de l'évidence jusqu'à l'expérience de démonstration de ce jugement}\footnote{C'est un peu le même rapport qui existe entre le topo-guide décrivant une randonnée (bel exemple d'inscription scripto-visuelle) et l'accomplissement sur le terrain de cette même randonnée (expérience éventuellement délicate et incertaine).}. Finalement, c'est l'idée habituelle de démonstration qui est scindée en les deux notions différentes mais complémentaires que sont l'inscription de démonstration et l'expérience de démonstration\footnote{Cette manière de distinguer deux notions différentes dans celle de démonstration est d'usage purement philosophique. Elle ne vise aucunement à s'imposer dans la pratique des mathématiciens.}. L'intérêt principal d'une inscription de démonstration d'un jugement est de conserver et de communiquer des éléments permettant de valider ce jugement. L'acte de communiquer la démonstration d'un jugement est essentiel dans la vie scientifique de la communauté des mathématiciens. Cet acte présuppose la croyance que la démontrabilité d'un jugement est une notion partageable. Pourtant, il va de soi qu'une expérience de démonstration d'un jugement est essentiellement privée du fait que l'expérience éprouvée par un individu lui appartient en tant que moment de sa vie propre et que toute autre personne est dans l'incapacité d'y accéder pleinement. Néanmoins, on constate dans la pratique de la communauté des mathématicien que la validation d'un jugement est une notion partageable: dans de très nombreux cas, les mathématiciens se mettent d'accord pour reconnaitre qu'une inscription de démonstration permet de valider un jugement, ce qui signifie qu'un travail d'exploration de ce document génère une expérience de démonstration du jugement chez un nombre suffisant de mathématiciens concernés. Avec Wittgenstein, nous pouvons estimer que cette propriété ne relève pas d'une explication philosophique mais d'un arrière-fond de pratiques et de formes de vie \cite{Wittgenstein2004}. À l'origine de ce contexte de pratiques partagées, il y a l'enseignement de cette science dans lequel on apprend collectivement à éprouver l'évidence de tel ou tel énoncé. En ce sens, l'apprentissage des mathématiques est aussi un apprentissage collectif de la notion de démontrabilité et du consensus qui en découle. Finalement, faire des mathématiques, c'est être implicitement convaincu que la validité d'un raisonnement mathématique est une notion qui a un sens collectif. D'ailleurs, il est fréquent que la construction d'une démonstration soit l'œuvre non pas d'une seule personne mais de tout un groupe de protagonistes\footnote{Dans ce dernier cas, on peut estimer que le partage de l'expérience de l'évidence va au delà de la simple juxtaposition d'expériences indépendantes. En effet, l'intensité de la communication entre les interlocuteurs dans ses aspects verbaux et non verbaux (intonations, gestes, regards complices, sons divers, etc.)\ peut réussir à percer quelque peu l'extériorité de ces expériences en instaurant une forme de partage un peu plus conséquent. Cette situation est en partie analogue à celle qui aboutit au partage du monde physique qui nous entoure par l'intermédiaire de nos expériences perceptives, partage défendu fermement par James \cite{James2007} pour qui l'empirisme radical n'est pas un solipsisme.}. Lorsqu'un jugement est partagé par un nombre significatif d'acteurs compétents sur le sujet, la communauté des mathématiciens accorde sa confiance à ce jugement. Cela implique que ce résultat devient une sorte de «fait mathématique» sur lequel tout mathématicien peut s'appuyer sans être dans l'obligation d'en éprouver lui-même l'évidence. Cette forme d'acceptation communautaire d'un nouveau jugement est rendue nécessaire par l'étendue et la vitesse actuelle de développement du champ mathématique. Sans doute que dans l'Antiquité, même dans sa période tardive, l'extension du domaine mathématique permettait à tout amateur sérieux d'en maitriser lui-même l'étendue sans avoir à s'en remettre à l'avis de ses pairs. Cette manière de procéder peut sembler être une forme de recours à un oracle, mais elle en diffère parce que d'une part il y a eu partage de la preuve par un panel d'experts de confiance, et que d'autre part il est toujours possible à quiconque de se reporter à la démonstration. Ce dernier argument n'est pas tout à fait réaliste du fait de la grande spécialisation des mathématiques actuelles et de l'extrême complexité de certaines démonstrations. Quoi qu'il en soit, le processus de validation d'un nouveau jugement est organisé en deux niveaux se succédant dans le temps: le niveau individuel ou quasi-individuel lorsqu'un ou quelques acteurs font l'expérience initiale de l'évidence de ce jugement et en communiquent une inscription de démonstration, puis le niveau collectif lorsqu'un nombre significatif d'autres acteurs compétents partagent ce jugement en approuvant l'inscription de démonstration. L'existence de ces deux niveaux renforce considérablement la fiabilité des jugements mathématiques. Enfin, ce mécanisme de validation collectif en deux étapes ne doit pas occulter le fait que, \emph{in fine}, c'est l'expérience de démonstration qui constitue la pierre angulaire et la spécificité de l'activité mathématique, même si cette expérience est déléguée à un groupe d'experts lors de la deuxième étape du processus d'évaluation. En dernier ressort, c'est sur cette expérience que repose toute la procédure. \subsection{Le phénomène des erreurs \emph{post demonstratio}} \label{erreurs} Dans la vie courante, les raisonnements que nous faisons semblent souvent bien fragiles: facilement remis en cause, ils sont la plupart du temps l'occasion de querelles sans issues. La contemplation des divers débats publics dans nos démocraties fatiguées en fournit un exemple saisissant. \emph{A contrario}, les raisonnements mathématiques ont la réputation d'être d'une solidité infaillible et d'imposer de fait un consensus. C'est en partie justifié par la nature même de la validation d'un jugement mathématique en deux étapes, explicitées dans la partie~\ref{FormeDem} précédente, qui constituent un réquisit d'une très grande exigence excluant en principe la contestation. Néanmoins, l'idée d'un discours parfait tel que l'ont pensé les philosophes platoniciens de l'Antiquité ou les laudateurs contemporains de l'essence formelle des mathématiques, idée excluant par essence toute faute, résulte d'un glissement abusif. La manifestation la plus claire de cet abus de réputation réside dans le phénomène des erreurs \emph{post demonstratio}. L'importance philosophique de ce phénomène a été remarquée par Martin-Löf dans son étude \cite{MartinLof87}. La terminologie «erreur \emph{post demonstratio}» est introduite par les auteurs du présent texte. Cette dernière ne doit pas être confondue avec la faute commise par l'apprenti mathématicien qui ne sait pas encore articuler un raisonnement mathématique. Le terme d'erreur \emph{post demonstratio} est employé lorsque: 1) à un moment donné, un jugement est validé par la procédure décrite précédemment; 2) à un moment ultérieur, éventuellement longtemps après, une erreur est découverte dans cette validation. La manifestation de cette erreur est la découverte d'un argument nouveau dont l'effet concret est de rendre impossible l'expérience de l'évidence de ce jugement. Bien que ne mettant pas en péril l'édifice des mathématiques, la fréquence d'apparition de ces erreurs est cependant non négligeable. D'ailleurs, tout mathématicien sait très bien qu'il lui arrive de trouver des erreurs dans des raisonnements préalablement validés, que ces raisonnements proviennent de lui-même ou d'une autre personne, qu'ils soient déjà publiés ou non dans la littérature scientifique. Habituellement, la présence de ce type d'erreur est analysée comme la simple marque de l'imperfection ou de la finitude de l'esprit humain. Il en découle que les conséquences philosophiques du phénomène des erreurs \emph{post demonstratio} ne sont pas correctement perçues. Il est vrai que l'on est face à un paradoxe. D'une part, le mécanisme de la démonstration --~expérience de l'évidence, inscription guidant cette expérience, partage de l'évidence guidée par l'inscription~-- est agencé, admirablement agencé peut-on ajouter, pour exclure les erreurs: mener à son terme ce mécanisme est la méthode, initiée en grande partie par les mathématiciens grecs, qui apporte la garantie que le raisonnement ainsi produit est valide, exempt de toute faute. Mais d'autre part, la nature même de cette procédure ne permet pas d'exclure définitivement la possibilité qu'une erreur puisse être détectée par la suite. La raison en est qu'\emph{il n'y a aucun moyen extérieur à l'expérience de démonstration d'un jugement, qui puisse permettre de s'assurer définitivement de sa validité}. \emph{La fiabilité d'une démonstration se fonde uniquement sur une forme d'expérience humaine, celle de l'évidence d'un jugement.} C'est déjà beaucoup, surtout si l'inscription qui appuie cette expérience est reconnue comme valide par une large communauté. Mais le raisonnement mathématique ne peut pas prétendre atteindre une perfection sans faille, une forme de validité éternelle, acquise pour la nuit des temps, car rien dans ce qui constitue la pratique des mathématiques ne peut justifier cette prétention. Une simple expérience humaine n'étant pas taillée pour atteindre l'absolue perfection, il faut se résoudre à reconnaitre une irréductible part de fragilité aux résultats mathématiques. Ainsi, l'assurance d'une garantie absolue du bien-fondé d'un jugement transcendant l'expérience de démonstration est un mythe et un non-sens. La technique de la démonstration d'un jugement est la méthode mise au point par les hommes pour attester de la validité de ce jugement; faute d'être acquise à tout jamais, cette validité est assurée dans le temps de l'expérience humaine, c'est-à-dire tant qu'il y aura des hommes qui exploreront la démonstration de ce jugement pour en éprouver l'évidence et qui confronteront ce jugement avec les nouveaux acquis mathématiques avec lesquels il pourrait être en relation. D'ailleurs, il est notable que les mathématiciens préfèrent généralement revisiter les démonstrations des jugements qu'ils doivent utiliser dans leur propre travail plutôt que de les admettre directement\footnote{Bien entendu, il ne s'agit que d'une préférence, et un mathématicien n'a pas toujours la possibilité de retraverser tous les outils qu'il utilise. C'est le cas pour certains théorèmes de nos mathématiques actuelles dont la démonstration complète nécessite plusieurs milliers de pages comme par exemple le «théorème énorme» qui classifie les groupes simples finis.}. D'une certaine manière, c'est la croyance que la technique de la démonstration n'est qu'un moyen pour accéder à une instance extérieure à cette expérience qui fonde l'idée de l'incontestabilité du raisonnement mathématique. Pour les philosophes platoniciens, cette instance était le monde transcendant des idées pures. Pour les modernes d'aujourd'hui, cette instance est plus volontiers le monde des objets formels. D'où cet ultime refuge pour la thèse de l'infaillibilité du discours mathématique: un raisonnement formalisé, c'est-à-dire complètement coulé dans le moule syntaxique de l'une des théories formalisant la pratique des mathématiques, peut sembler par essence complètement imparable. Si on admet cette thèse, on est alors tenté de voir à nouveau tout raisonnement usuel comme une approximation nécessairement imparfaite d'un objet formel parfait (voir la citation de Bourbaki page~\pageref{citation-bourbaki}), ce qui expliquerait à la fois la présence d'erreurs cachées dans la pratique ordinaire des mathématiques et une stratégie pour les éviter, à savoir celle de s'approcher autant que faire se peut de la formalisation complète. Mais qu'est-ce qu'une démonstration formelle? Comme cela a déjà été noté, une configuration de signes sur un support quelconque ne peut prendre le statut de démonstration formelle que dans le cas où elle est identifiée comme telle dans le cadre d'une expérience d'un sujet mathématicien. Quelle que soit la nature de cette expérience, il ne s'agit que d'une simple expérience humaine, inapte à fonder une infaillibilité sans restriction. En conséquence, la stratégie consistant à assoir la perfection absolue d'un raisonnement mathématique aboutissant à un certain jugement en le formalisant complètement ne peut pas fonctionner: à supposer que l'on soit capable de procéder à cette formalisation, cela ne ferait que déplacer la possible intrusion future d'erreurs dans l'expérience qui assure que l'entité syntaxique obtenue possède la qualité de démonstration formelle\footnote{Ce qui ne veut pas dire que le travail sur les démonstrations formelles ne présente pas d'intérêt scientifique! C'est seulement une certaine utilisation de ces développements formels à des fins philosophiques qui est critiquée ici.}. Finalement, il n'existe pas de méthode permettant de s'assurer définitivement de la validité absolue d'une démonstration. D'ailleurs, s'il en existait une, il suffirait de l'appliquer à chaque démonstration produite pour être certain qu'elle ne sera jamais mise en défaut par le surgissement d'une erreur. Néanmoins, il ne faut pas en déduire que le raisonnement mathématique est miné par des erreurs potentielles. Ce que révèle l'analyse précédente, c'est que le mécanisme de la preuve ne permet pas d'exclure à tout jamais la possibilité d'une erreur, ce qui ne veut pas dire qu'il y aura dans le futur --~certainement ou avec une grande probabilité~-- apparition d'erreurs. De fait, en l'absence d'une instance transcendante permettant d'évaluer dans l'absolu un jugement donné, une expérience de démonstration de ce jugement offre une excellente garantie sur sa validité, à la fois extrêmement solide et limpide sur son fondement\footnote{Cette garantie est quelque peu mise à mal par la course à la publication qui anime la recherche actuelle. Même en mathématiques, cette fièvre productiviste pousse à ne pas trop se poser de question sur la fiabilité des outils utilisés et hélas aussi sur la qualité des preuves. D'où des erreurs fréquentes qui sont relevées par les relecteurs des articles, du moins lorsque ces derniers acceptent de dégager le temps nécessaire à cette tâche, au détriment de leurs propres publications\dots}. \subsection{Deux remarques} \label{DeuxRem} \paragraph{1.} Jusqu'à ce point, l'analyse présentée auparavant n'a nullement pris en compte les fortes différences, pratiques et théoriques, qui en gros scindent la communauté des mathématiciens en deux écoles, d'une part les mathématiques classiques, et d'autre part les mathématiques constructives\footnote{En termes d'effectif, ces deux écoles sont inégales puisque seulement une minorité de mathématiciens peuvent être qualifiés de constructivistes. Cette disparité n'empêche pas le courant constructiviste d'avoir à nouveau une grande importance, en particulier du fait de ses liens forts, théoriques et pratiques, avec l'informatique et la logique.}. En fait, la présentation d'une conception non formaliste de la preuve présentée ci-haut est censée s'appliquer de manière égale aux mathématiques développées dans ces deux groupes. Cela peut paraitre étonnant à un lecteur connaisseur de l'histoire des mathématiques depuis la fin du 19\ieme~siècle, qui sait parfaitement que ces deux courants s'opposent en particulier sur ce que doit être une démonstration. De plus, ce même lecteur peut aussi remarquer que la définition de la notion d'expérience de démonstration donnée dans la partie~\ref{PreuveExpe} semble relativement proche des conceptions philosophiques développées dans l'intuitionnisme, comme l'indique la note~\ref{IntuiML} faisant référence à Martin-Löf. Cependant, les auteurs du présent texte défendent que, au delà de l'opposition philosophique sur la querelle des fondements, c'est la forme paradigmatique de la notion de démonstration, telle qu'elle est pratiquée depuis les Grecs, qui est bien captée par la définition choisie ici. Tout mathématicien, classique ou constructiviste, admet la validité d'une démonstration lorsque, au terme d'un travail d'exploration et de maturation, il est saisi par l'évidence de la conclusion. Jusqu'à maintenant, cette expérience de la démonstration est constitutive de l'essence de l'activité mathématique, et elle transcende les controverses. C'est dans le choix des moyens utilisés pour édifier la démonstration que l'opposition est pertinente\footnote{L'opposition est aussi totale en ce qui concerne la notion de vérité (voir par exemple la présentation donnée dans \cite{Bourdeau2004}). Cette dissension majeure ne semble pas affecter le fait qu'une démonstration est vécue comme l'expérience de l'évidence de sa conclusion.}. Par exemple, l'utilisation du principe du tiers exclu est jugée légitime par un mathématicien classique au sens où elle lui semble marquée par l'évidence, alors que cette utilisation est rejetée par un mathématicien constructiviste pour qui ce même moyen rompt le cheminement de l'évidence\footnote{À ce propos et en dehors de tout engagement partisan, les auteurs du présent texte ont pour leur part le sentiment que, en ce qui concerne le cheminement de l'évidence qui constitue le cœur de l'expérience de démonstration, les mathématiques constructives constituent un cadre plus favorable à la force de cette expérience.}. \paragraph{2.} Une autre question non encore abordée dans cette discussion est relative à l'utilisation d'outils informatiques dans une démonstration. En effet, de manière analogue à ce qui se passe dans toutes les autres sciences, les progrès technologiques et théoriques font apparaitre des dispositifs informatiques susceptibles d'être utilisés dans la vérification ou la construction de démonstrations. C'est le cas des assistants de preuve comme le logiciel \emph{Coq} \cite{coqmanual} qui permettent de vérifier, de compléter ou même de construire des démonstrations. Un exemple maintenant classique de la réussite de cette démarche est le théorème des quatre couleurs dont la démonstration complètement mécanisée a été obtenue en 2004 et dont on ne possède aucune démonstration pouvant se passer de l'outil informatique. Pour illustrer l'impact de l'usage des ordinateurs par un exemple simple, imaginons d'abord que la seule démonstration que nous aurions de ce que la somme des nombres entiers de~1 à 2~millions fait 2~billions et 1~million était l'inscription du calcul de cette somme sur un support informatique; or nous avons une démonstration, qui est que cette somme est aussi celle des nombres entiers de 2~millions à~1, et qu'en additionnant terme à terme les termes de ces deux sommes, on obtient 2~millions de fois 2~millions et~1. L'évidence de cette démonstration nous parait d'une autre qualité que l'inscription du calcul. La question est de savoir en quoi la notion de démonstration présentée auparavant pourrait être modifiée par ces nouvelles pratiques. Par exemple, considérons une démonstration dont une partie n'est validée que mécaniquement; est-ce qu'elle peut générer une démonstration au sens de l'expérience de l'évidence de son résultat? À première vue, il semble que non parce que le cheminement de l'évidence guidé par la démonstration est \emph{a priori} rompu: la partie de la démonstration prise en charge par l'outil informatique se présente comme une béance à ce niveau, du moins pour celui qui n'est pas capable de comprendre ce que fait le programme informatique. Certes, l'intrusion de la matérialité dans l'efficience des mathématiques n'est pas nouvelle et elle est même structurelle d'après la contribution de Netz sur l'émergence des mathématiques dans le monde grec. Ce qui semble nouveau avec la mécanisation des démonstrations est que le dispositif mis en œuvre certes peut apporter une réponse, mais que cette dernière n'est pas de nature à favoriser la démonstration au sens de l'expérience de l'évidence de sa conclusion. Néanmoins, un mathématicien doté d'une bonne culture informatique peut être en capacité de saisir la nature du programme informatique, d'en démontrer la validité, pour finalement estimer que, tant bien que mal, l'évidence poursuit son chemin dans la partie traitée mécaniquement. Encore faut-il avoir une confiance absolue en le dispositif électronique piloté par le programme qui effectue la tâche demandée. Il faudrait une confiance de l'ordre de celle que l'on accorde à un résultat mathématique validé par une démonstration, c'est-à-dire, une confiance qui exclut totalement le doute du fait que l'on est pénétré de son évidence par le contrôle que l'on a pu exercer sur l'intégralité du processus qui valide le résultat. On voit bien que cela ne peut pas fonctionner ainsi. Dans le cas considéré, le détail du fonctionnement intime du processus mécanique qui valide le résultat n'est justement pas accessible (nous négligeons ici une défaillance toujours possible au niveau matériel de la mise en œuvre par un ordinateur concret). Comme indiqué dans la la note~\ref{NoteOracle}, on est dans le cas de l'utilisation explicite d'un oracle selon la terminologie utilisée à la fin de la partie~\ref{PreuveExpe}. Force est de constater que les mathématiques tributaires de telles démarches informatiques se rapprochent des autres sciences comme la physique qui dépendent de manière plus ou moins essentielle de dispositifs matériels expérimentaux. Mais alors il faut être conscient que ces mathématiques nouvelles sont, dans leur méthode même, d'une nature différente du procédé de la démonstration instauré par les Grecs, qui depuis ce moment inaugural a constitué l'originalité et la marque distinctive de cette discipline. Il est possible que ce soit une nouvelle science qui émerge de cette manière, à la frontière des mathématiques, de la logique et de l'informatique: une science dont les objets sont les démonstrations formelles, et dont la démarche est fortement dépendante d'outils informatiques puissants. La confiance accordée aux résultats fournis par ces démarches peut être très forte car le travail scientifique concerné est souvent de qualité incontestable. Par exemple, la certification \emph{Coq}, label donné à un résultat vérifié par l'assistant de preuve \emph{Coq}, est considérée comme une forme très haute de validité\footnote{Plus précisément, la certification a lieu sur la base d'une inscription de démonstration spécialement adaptée à l'assistant de preuve, élaborée à partir d'une démonstration dont un mathématicien a fait l'expérience et qu'il a rédigée. Alors pourquoi certifier? Trois raisons nous viennent à l'esprit: les erreurs \emph{post demonstratio} (c'est la motivation initiale de Voevodsky, qui a été très affecté par de telles erreurs comme évoqué dans la note~\ref{note:voevodsky}); convaincre les autres mathématiciens de la correction de la preuve et en particulier de l'absence d'oubli d'un cas particulier parmi un grand nombre d'autres (théorème de Hales de la conjecture de Kepler, théorème des quatre couleurs); développer la certification en tant que discipline scientifique (théorème de Feit-Thompson; on peut noter qu'au cours de la certification de ce théorème, quelques erreurs de la preuve originelle ont été corrigées, mais qu'aucune n'était problématique).}, à tel point que si un résultat obtenu par \emph{Coq} entrait en contradiction avec un jugement validé par une démonstration au sens développé précédemment de l'évidence vécue, il ne va pas de soi que la confiance serait prioritairement accordée au deuxième. Autrement dit, sur le plan de la force de la confiance, un résultat certifié par \emph{Coq} n'a rien à envier à un résultat certifié par une démonstration. Ce n'est pas la force en elle-même de la confiance accordée à un résultat qui est la marque distinctive de l'essence de la démarche mathématique. C'est la nature du processus qui légitime le résultat, à savoir la démonstration comme expérience de son évidence qui est spécifique aux mathématiques depuis les Grecs. Cette expérience crée chez celui qui l'éprouve une forme de rapport particulier avec le résultat validé, rapport qui est incompatible avec la délégation d'une partie de la démonstration à un oracle. \section{Conclusion: vers un mode d'existence pour les mathématiques} Cette partie terminale a pour objet principal d'introduire une forme de mode d'existence propre aux êtres mathématiques et de discuter le placement de ce mode dans celui de la référence objective [\textsc{ref}]. Préalablement, quelques précisions doivent être apportées relativement au mode [\textsc{ref}] et à la notion générale de mode d'existence au sens de l'\textsc{eme}. \subsection{Quelques précisions sur les modes d'existence en général et sur le mode [\textsc{ref}] en particulier} \label{PrecisREF} Il n'est guère utile pour un lecteur ne connaissant pas le sujet de donner une description de la notion de mode d'existence selon l'\textsc{eme} en égrenant les termes du métalangage qui a été forgé pour fixer un cadre général à cette notion. Il est certainement préférable d'évoquer préalablement un cas concret. C'est ce qui va être fait avec la présentation succincte de la manière dont le travail d'une mission scientifique de terrain est analysé par l'anthropologie des sciences. Le type de pratique scientifique correspondant à cette mission semble de prime abord aussi éloigné que possible de la pratique des mathématiques, ce qui devrait permettre par la suite de mieux faire apparaitre les analogies et différences entre les modalités d'existence des êtres sous-jacents à ces pratiques. L'exemple choisi est celui de la lumineuse étude\footnote{Cette étude est un splendide exercice de philosophie appliquée. La description qui en est donnée dans le présent article est d'une brièveté qui ne lui rend pas justice.} développée par Latour dans le chapitre 2 de \cite{Latour2007}. Ce texte analyse le travail d'une mission scientifique dont l'objet est de comprendre la dynamique de la transition forêt-savane dans une région reculée du Brésil proche de Boa Vista. L'étude montre l'élaboration concrète d'une chaine de médiations --~maintenant appelée chaine de référence~-- depuis le choix de la parcelle choisie pour mener l'investigation, la triangulation de cette parcelle à l'aide d'un «pédofil\footnote{C'est le petit nom donné à un instrument permettant de mesurer les distances dans un terrain naturel encombré et non aplani.}», les prélèvements d'échantillons de terre à différentes profondeurs et leur placement dans une pédocomparateur\footnote{Dispositif permettant de ranger des échantillons de terrain selon une disposition planaire en rapport avec la localisation des prélèvements.}, les traitements de ces échantillons permettant d'extraire du pédocomparateur des tableaux numériques, enfin l'élaboration d'un diagramme final tenant sur une simple feuille de papier et résumant à lui tout seul l'investigation, la conclusion de cette dernière sur la structure du sol au voisinage de la lisière et la formulation de l'hypothèse d'une probable avancée dans le temps de la forêt sur la savane grâce au laborieux travail des vers de terre. Cette chaine est donc constituée par la succession d'inscriptions scripto-visuelles, chacune étant plus abstraite et moins matérielle que la précédente. Le choix judicieux de ces formes, le protocole très précis avec lequel ce choix est fait ainsi que l'opération qui fait passer d'une inscription à la suivante, tout cela permet à l'information de circuler dans les deux sens le long de la chaine, entre les points extrêmes que sont la parcelle initiale et le diagramme final. L'évolution des inscriptions le long de la chaine va vers la simplicité perceptive en passant graduellement de l'indéchiffrable fouillis du terrain initialement choisi au limpide diagramme terminal. En effet, la fonction de la chaine est d'arriver à une inscription finale qui soit suffisamment claire, simple et significative pour emporter la conviction des chercheurs concernés. Finalement, ce que l'on pourrait nommer de manière quelque peu pédante «l'ontologie objective de la nature du sol transversalement à la lisière» est ce que donne à voir le diagramme final en gardant soigneusement en mémoire la circulation de la référence tout le long de la chaine. Cette description met concrètement en évidence les traits principaux des chaines de référence. Selon l'\textsc{eme}, ces chaines d'inscriptions sont au cœur du mode d'existence [\textsc{ref}] au sens où quelque chose existe objectivement lorsque l'on peut mettre en place une chaine de référence qui établit cette chose \emph{via} la cascade de formes constituée par cette chaine. La dissemblance, l'éloignement entre chaque forme et la forme suivante est appelé le \emph{hiatus} propre au mode [\textsc{ref}]. Ce hiatus peut être perçu au niveau très général de la seule dissemblance de deux inscriptions en tant que simples entités scripto-visuelles (dissemblance que l'on pourrait interpréter comme des différences entre les parties textuelles ou graphiques de chacune des inscriptions). De manière plus spécifique, ce hiatus peut aussi signifier le manque \emph{a priori} de conviction que la seconde inscription est conçue de manière à porter une information que l'on peut rapporter à la première, cette conviction étant une expérience recherchée par les acteurs scientifiques qui élaborent la chaine ou en prennent connaissance. La \emph{condition de félicité} qui permet de lisser une telle chaine est que l'opération qui fait passer d'une inscription à la suivante est conçue de manière à préserver une certaine constance\footnote{On peut remarquer l'analogie avec une méthode utilisée pour montrer qu'un algorithme itératif est correct, c'est-à-dire qu'il fait bien ce qu'on attend de lui. Cette méthode consiste à chercher un invariant de boucle, c'est-à-dire un prédicat qui reste constant au cours des itérations.}, de telle sorte que l'information lisible sur la deuxième forme remonte à une information portée par la forme précédente. La dernière inscription d'une chaine de référence permet en principe de conclure mais elle n'a de valeur que par l'ensemble de la chaine qui, du fait des conditions de félicité, permet de faire transiter cette information en remontant pas à pas la chaine de manière à aboutir au phénomène initial sur lequel porte l'étude. Après la présentation d'un exemple concret et de certains éléments du mode [\textsc{ref}] correspondant, il est temps d'énoncer quelques généralités significatives sur les modes d'existence au sens de l'\textsc{eme}. Un mode d'existence désigne un collectif d'entités partageant une même manière d'être et de s'animer, et dont la présence active peut être décelée dans notre modernité, du moins lorsqu'on abandonne le dogme selon lequel il y a une seule forme d'existence qui est celle de la vérité objective à laquelle la Science et la Raison donnent un accès direct et sans perte. L'une des idées phares de l'\textsc{eme} est que, bien qu'une multiplicité de modes d'existence distincts puissent être distingués, ces derniers partagent des traits communs qui permettent de les identifier et de les classer. Ce sont principalement: \begin{itemize} \item un certain type de \emph{trajectoire} qui est le support principal de l'existence dans le mode considéré --~dans le cas de [\textsc{ref}], ce sont les chaines de référence; \item un certain type de \emph{hiatus} qui sépare deux étapes successives quelconques d'une trajectoire --~dans le cas de [\textsc{ref}], c'est l'éloignement, la dissemblance entre deux inscriptions successives d'une chaine de référence; \item un certain type de \emph{conditions de félicité et d'infélicité} qui sont les conditions de vérité ou de fausseté propres au mode considéré --~dans le cas de [\textsc{ref}], étant donnée une chaine de référence et une information qui émerge à la dernière étape de la chaine, la condition de félicité énonce que cette information est pertinente si elle peut être rapportée d'étape en étape en remontant toute la chaine de référence. \end{itemize} \subsection{Un quasi-mode d'existence pour les mathématiques} \label{quasimode} Le propos de cette partie est de décrire le fonctionnement, la manière d'être et de se présenter à nous, des êtres qui se manifestent quand un mathématicien (ou un groupe de mathématiciens) met au point un développement mathématique ou parcourt un tel développement. Comme cette description peut se faire en suivant le patron des modes d'existence au sens de l'\textsc{eme}, il semble naturel d'en déduire que les entités mathématiques relèvent d'un tel mode. En toute rigueur, il serait préférable de parler pour l'instant d'un quasi-mode car, à supposer que l'argumentaire qui suit soit suffisant pour établir une forme de mode d'existence acceptable, il restera à le placer dans l'architecture générale proposée par l'\textsc{eme} selon l'une des options suivantes: comme relevant purement et simplement du mode de la référence objective [\textsc{ref}], ou bien comme sous-mode de ce même [\textsc{ref}] mais doté d'une forte spécificité, ou bien comme nouveau mode à part entière, ou bien comme autre chose encore\dots{} L'idée qui va être développée est que ce quasi-mode d'existence est déjà presque présent, en pointillé, dans la description empiriste du raisonnement mathématique donnée dans la partie~\ref{NonForm}. Préalablement, il convient de revenir sur les inscriptions scripto-visuelles qui interviennent dans la pratique des mathématiques. Dans la partie~\ref{FormeDem}, avec la notion d'inscription de démonstration (d'un jugement), nous avons introduit une telle inscription en insistant sur la différence essentielle avec l'expérience de démonstration (du même jugement). Il est maintenant utile de considérer la notion \emph{a priori} banale d'\emph{énoncé mathématique} (expression simplifiée en \emph{énoncé} dans la suite): habituellement, c'est un texte qui exprime un contenu mathématique, que ce dernier soit prouvé --~ce qui en fait un jugement~-- ou ne le soit pas. Il est nécessaire d'élargir cette notion de manière à inclure éventuellement d'autres éléments afin d'en faire un tout relativement complet sur le plan de l'expression habituelle des mathématiques. Par exemple, l'ajout peut être une partie graphique, un diagramme, une image, etc. Évidemment, tous ces éléments extra-textuels doivent être comptés à égalité d'importance avec la partie strictement textuelle. Pour prendre un exemple élémentaire et bien connu, le mathématicien qui évoque le théorème de Thalès met en place immédiatement, sur un support matériel et/ou dans une image mentale, un texte et un diagramme avec lettres: le tout décrit ce résultat et en constitue l'accrochage matériel et symbolique. Ce cadre scripto-visuel --~cette forme~-- est pratiquement indispensable à tout travail sur le résultat considéré. Dans la suite, l'expression d'énoncé est prise au sens élargi que nous venons de préciser. Après ce préalable, le mode d'existence pour les mathématiques peut être abordé en précisant son type de hiatus, de trajectoire et de condition de félicité. Le hiatus du quasi-mode d'existence pour les mathématiques est la discontinuité manifestée par l'éloignement entre un énoncé donné initialement et un énoncé final. Cet éloignement peut être compris comme la simple dissemblance entre les deux inscriptions scripto-visuelles en jeu; de manière plus spécifique, il peut aussi être interprété comme l'absence de preuve qui permettrait de passer du premier au second. Le saut, la transition, la transformation reliant ces énoncés est une démonstration qui est présentée comme un guide pour faire transiter l'évidence du premier au second. Pour important qu'il soit, ce guide ne certifie pas que l'expérience du cheminement de l'évidence sera au rendez-vous de celui qui le parcourt. La condition de félicité de ce saut est que cette démonstration soit considérée comme valide, c'est-à-dire qu'elle génère l'évidence de l'énoncé final chez celui qui éprouve cette «passe» \cite[«Livre», colonne «Vocabulaire», entrée «Passe»]{EME} particulière. Lorsque cette condition est réalisée, l'énoncé final par delà le hiatus devient un jugement, sous réserve que l'énoncé source en deçà soit lui-même un jugement, et le saut s'identifie à la preuve de ce jugement à partir du jugement source. Autrement dit, cette condition de félicité est satisfaite lorsque l'évidence peut circuler jusqu'à l'énoncé final en suivant le guide fourni par la démonstration. Une fois définis les éléments précédents, on considère les trajectoires obtenues en enchainant hiatus et sauts, trajectoires qui seront nommées au moins provisoirement \emph{chaines démonstratives}. Précisément, une telle chaine est donnée par: \begin{itemize} \item une succession d'inscriptions $I_1,I_2,\ldots,I_n$ qui sont des énoncés; la première de ces inscriptions~$I_1$ est supposée être un jugement; \item une succession d'inscriptions $D_1,D_2,\ldots,D_{n-1}$ telles que pour chaque $k=1,2,\ldots,n-1$, l'inscription~$D_k$ soit une démonstration de~$I_{k+1}$ à partir de~$I_k$. \end{itemize} On peut représenter ceci sous la forme du graphique suivant: \begin{equation}\label{Chaine1} I_1 \mapright{D_1} I_2 \mapright{D_2} I_3 \mapright{D_3} \cdots \mapright{} I_{n-1} \mapright{D_{n-1}} I_{n}.\tag{*} \end{equation} De fait, cette notion de chaine démonstrative n'est qu'une certaine mise en forme, en termes de chaines d'inscriptions, de la notion générale de démonstration. Cette manière de présenter la notion de démonstration a pour objet d'en donner une présentation proche de celle d'une chaine de référence sans en déformer le contenu. Avec les notations introduites dans la définition~(\ref{Chaine1}), la chaine démonstrative peut être vue comme la démonstration de~$I_{n}$ à partir de~$I_{1}$. D'un point de vue purement formel, cette démonstration globale pourrait remplacer la chaine toute entière en réduisant cette dernière à un seul saut \[ I_1 \mapright{D} I_n\text. \] Dans la pratique, il en va autrement, car, dans le but de faire circuler plus facilement l'évidence, le mathématicien sait qu'il est préférable de scinder la démonstration globale en une succession de démonstrations intermédiaires, chacune étant plus facile à élaborer et plus à même de susciter le transport de l'évidence\footnote{En ce sens, l'argumentation mathématique n'est pas aussi éloignée de la rhétorique que l'on se plait à le dire.}. Cela justifie pleinement la notion de chaine démonstrative, qui plus est en exhibant une propriété importante: pour que ces chaines deviennent opérationnelles, il est préférable que les énoncés successifs soient suffisamment «proches» au sens où il est relativement aisé de faire transiter l'évidence entre eux. À propos de la structure essentiellement linéaire d'une telle chaine --~certainement réductrice par rapport à la complexité combinatoire que peut prendre en général une démonstration~-- il est bon de rappeler la mise en garde exprimée dans la note~\ref{StructDem} (et les mises en garde de Gentzen \cite[pages~19-20]{Gentzen1935} lui-même). La condition de félicité définie précédemment pour un saut isolé se généralise dans les mêmes termes à une chaine toute entière: une chaine démonstrative satisfait la condition de félicité lorsque chacun de ses sauts constitutifs la satisfait, autrement dit lorsque l'évidence peut cheminer le long de la chaine en validant comme jugement chacun des énoncés successifs. Au contraire, la condition d'infélicité est satisfaite lorsque le cheminement de l'évidence est interrompu en un point de cette chaine. Finalement, le quasi-mode d'existence des êtres mathématiques est porté par ces chaines démonstratives lorsqu'elles sont reconnues satisfaire la condition de félicité. Un être mathématique (c'est-à-dire un objet ou une propriété mathématique) est amené à l'existence lorsqu'une chaine démonstrative satisfaisant la condition de félicité énonce, montre cette existence. C'est ainsi que tout jugement, habituellement conçu comme un acquis de connaissance, est également interprétable comme une extension de l'ontologie: telle entité (objet ou propriété) est dotée d'une existence avérée par la chaine démonstrative correspondante. Par exemple, une chaine démonstrative associée au théorème de Pythagore amène à l'existence, pour un triangle rectangle, la propriété d'égalité entre les carrés construits sur les côtés adjacents à l'angle droit et le carré construit sur l'hypoténuse. Dans quel lieu ces êtres vivent-ils? L'ambigüité ontologique des mathématiques relevée par Netz fait qu'aucune place n'est attribuée d'emblée aux objets mathématiques dans ce que nous nommons naïvement la réalité extérieure. Depuis les mathématiques grecques, la réponse platonicienne à cette difficulté a été de postuler que ces objets se tiennent figés dans l'immuable éternité d'une sorte de monde suprasensible des idées pures. Le quasi-mode d'existence des êtres mathématiques présenté dans cette partie~\ref{quasimode} permet avantageusement d'éviter ce recours à la transcendance tout en restant au plus près de la pratique des acteurs de cette sciences. Il reste que, si on le souhaite, on peut dire que les entités mathématiques peuplent des mondes qui leur sont propres tout en restant attachées aux dispositifs scripto-visuels qui les supportent. Être mathématicien, c'est peut-être d'abord avoir la capacité de reconnaitre ces mondes, d'y accéder, de les voir s'animer à partir du seul travail sur des inscriptions appropriées. Du fait du caractère spécifique et généralement difficile à mettre en œuvre du processus qui amène ces êtres à l'existence, il est naturel de les qualifier de lointains. Le seul moteur d'animation d'un monde d'entités mathématiques est le cheminement de l'évidence le long des chaines démonstratives correspondantes. Dans ce nouveau cadre, il ne faut pas oublier la leçon de Netz et de Peirce: un tel monde ne devient opérationnel que parce que certaines conditions techniques et cognitives sont satisfaites, conditions qui permettent à la pratique des mathématiques de se déployer principalement dans la dimension diagrammatique (voir la partie~\ref{NetzPeirce}). Évidemment, ces conditions accentuent encore plus l'éloignement d'un tel monde relativement à celui des «affaires courantes». Comme cela est énoncé dans l'\textsc{eme}, «\emph{chaque saut par dessus une discontinuité représente un risque pris qui peut réussir ou rater}». Dans le cas qui nous intéresse, le risque est que la démonstration soit considérée comme insuffisante pour générer l'expérience de l'évidence de l'énoncé final. L'objet de la condition de félicité est donc de surmonter ce risque. Cependant, le risque ne peut pas être éliminé définitivement: c'est la leçon enseignée par le phénomène des erreurs \emph{post demonstratio}, c'est-à-dire la nécessité d'envisager l'éventualité d'erreurs dans la démonstration du jugement considéré. Traduite dans notre perspective ontologique, cette leçon montre que l'existence d'un être mathématique ne peut pas avoir la valeur d'une vérité définitive transcendant l'expérience du cheminement de l'évidence éprouvé par un mathématicien. Cet être est doté d'une existence certaine tant que le transport de l'évidence qui le valide est reconnu comme tel, ce qui ne peut exclure la découverte future d'une faille susceptible d'invalider cette existence. La raison en est que ce cheminement est une expérience, celle de l'évidence du jugement final, et non pas l'accès à une forme de réalité indépendante des acteurs mathématiciens. Comme indiqué précédemment, on peut y voir la raison de la manie qu'ont les mathématiciens de parcourir les argumentaires menant à des êtres mathématiques pourtant déjà acquis: ils testent le risque d'une erreur et font ainsi l'expérience de leur existence. Le maintien dans l'existence --~la \emph{subsistance} selon le vocabulaire général de l'\textsc{eme}~-- des êtres mathématiques pourrait se faire au prix de cette vérification sans cesse renouvelée. Dans la suite de ce travail, le quasi-mode précédent va être comparé au mode de la référence objective tel qu'il a été présenté dans la partie~\ref{PrecisREF}. Cette comparaison permettra de discuter quelle place pourrait être attribuée aux êtres mathématiques dans l'\textsc{eme}. \subsection{Éléments de comparaison entre [\textsc{ref}] et le quasi-mode d'existence des êtres mathématiques} \label{CompModes} La comparaison entre le quasi-mode d'existence des êtres mathématiques et celui de la référence objective se réduit principalement à la comparaison des chaines et des conditions de félicité propres à chacun. C'est ce qui va être fait dans la suite en mettant en lumière des analogies et des différences entre: \begin{itemize} \item d'une part la technique des chaines de référence pratiquée dans les sciences de terrain ou expérimentales rapidement présentées dans la partie~\ref{PrecisREF} et qui, pour éviter un risque de confusion avec une éventuelle notion plus large de chaine de référence, seront provisoirement appelées des \emph{chaines de référence objective}, \item d'autre part le travail de la preuve mis en œuvre en mathématiques et représenté par les \emph{chaines démonstratives} introduites dans la partie~\ref{quasimode} précédente. \end{itemize} La première analogie est que ces deux types de chaines se présentent comme des trajectoires dont les nœuds --~les étapes successives~-- sont des inscriptions scripto-visuelles. Il s'agit d'une analogie relative au cadre général des modes d'existence décrits dans l'\textsc{eme} puisque seules les trajectoires du mode [\textsc{ref}] présentent cette particularité. Pour autant, la nature de ces inscriptions peut révéler une différence notable entre les deux types de chaines. En effet, comme c'est le cas dans l'exemple présenté dans la partie~\ref{PrecisREF}, les inscriptions d'une chaine de référence objective peuvent inclure des données matérielles extraites du milieu étudié, ce qui n'est pas le cas d'une chaine démonstrative. Cependant, cette différence tend à se gommer sinon à disparaitre lorsque l'on considère le déroulement d'une chaine de référence objective. En effet, les inscriptions d'une chaine démonstrative sont des énoncés qui utilisent les outils habituels de représentation d'entités mathématiques par un mixte de textes et d'images. Or, comme cela est relevé dans la partie~\ref{PrecisREF}, l'une des propriétés des chaines de référence objective est l'utilisation croissante le long de la chaine de ces mêmes outils. Précisément, la succession des formes d'une chaine de référence objective est marquée par une double dynamique: la diminution, allant le plus souvent jusqu'à la disparition pure et simple, de données matérielles en rapport avec le phénomène étudié, et l'augmentation d'entités de nature mathématique. Une deuxième analogie significative apparait au niveau de la fonction des chaines de référence objective et des chaines d'existence mathématique. Dans les deux cas, ces dispositifs ont pour but de créer une conviction à propos de la vérité d'un énoncé scientifique, cette conviction étant atteinte à la fin de la construction de la chaine dans les deux cas. Comme la suite va le montrer, cette ressemblance ne va pas jusqu'à inclure la nature même de cette conviction. Une troisième analogie concerne le hiatus se présentant dans chacun des deux types de chaines, hiatus qui dans les deux cas est formulé de manière identique comme la dissemblance et l'éloignement de deux inscriptions successives. Comme précisé précédemment, cet éloignement peut être interprété comme un manque \emph{a priori}, celui de l'expérience en laquelle consiste la satisfaction de la condition de félicité correspondante. L'analogie en question concerne donc la formulation du hiatus, ce qui n'exclut pas une certaine dissemblance découlant elle-même d'un contraste entre les deux types de conditions de félicité. Justement, une quatrième analogie peut être relevée en ce qui concerne les conditions de félicité. Dans chacune de ces chaines, chaque saut d'une inscription à la suivante doit satisfaire une condition de félicité qui est de préserver certaines constantes. C'est ainsi qu'est formulée dans l'\textsc{eme} une propriété fondamentale des chaines de référence objective qui permet à l'information de circuler le long de la chaine dans les deux sens. Pour les chaines démonstratives, la condition de félicité est le transport de l'évidence: chaque saut est lui-même un cheminement qui doit permettre à l'évidence de se propager depuis l'énoncé initial source du saut jusqu'à l'énoncé final but du saut. Enfin, une dernière analogie est relative au caractère lointain, c'est-à-dire éloigné des affaires communes, des entités amenées à l'existence selon l'un ou l'autre des deux modes. En effet, il ne faut rien de moins qu'une chaine --~de référence objective ou démonstrative~-- et donc toute une série de médiations, d'instruments et/ou de raisonnements, pour réussir à les instaurer. Une source notable de dissemblance est relative au moteur de la conviction obtenue à l'issue du parcours de ces chaines. Pour une chaine de référence objective, on peut discerner deux principaux facteurs de conviction: le premier est la confiance dans le protocole suivi tout au long de la chaine pour contrôler le maintien des constantes, le second est la simplicité perceptive de la dernière inscription. Autrement dit, le premier facteur est de nature globale puisqu'il concerne l'ensemble de la chaine, et il correspond à la satisfaction de la condition de félicité correspondante; le second est local puisqu'il est en rapport avec la dernière inscription seulement. Dans le cas d'une chaine démonstrative, cette conviction réside dans l'expérience de l'évidence du dernier énoncé, qui n'est pas du même ordre que l'expérience de la simplicité perceptive de cet énoncé final. Cette dernière inscription devient évidente pour un mathématicien non pas du fait qu'il la trouve simple à appréhender mais parce que cet acteur expérimente qu'un certain cheminement de l'évidence aboutit à cette inscription. Ainsi, le facteur de conviction d'une chaine démonstrative est avant tout global et il se confond avec la satisfaction de la condition de félicité correspondante. Néanmoins, on peut raisonnablement argüer que l'expérience que constitue le parcours d'une chaine démonstrative apporte une certaine familiarité avec sa dernière inscription qui, en conséquence, acquiert une forme de simplicité perceptive\footnote{Pour prendre un exemple scolaire, l'inscription qu'est l'énoncé du théorème de Pythagore est perçue comme terriblement abstraite et complexe pour l'élève qui la découvre dans son cursus; mais si par la suite, cet élève réussit à apprivoiser une démonstration de ce résultat, cette inscription devient à ses yeux plus concrète et familière, bref, la perception qu'il en a se modifie dans le sens d'une plus grande simplicité. Pour invoquer James, une expérience entretient toujours des relations (qui sont elles-mêmes l'objet d'expériences) avec un contexte constitué d'autres expériences. Ainsi, la perception d'une inscription n'est pas une expérience isolée et elle mobilise immédiatement d'autres expériences qui lui donnent une partie de ses caractéristiques.}. Ce n'est donc peut-être pas cette propriété de simplicité perceptive de la dernière inscription qui constitue la différence la plus notable entre les deux types de chaines. C'est au niveau des conditions de félicité que la dissemblance est frappante. En effet, dans le cas d'une chaine démonstrative, cette condition se confond avec l'expérience de l'évidence de la dernière inscription. Cette évidence signifie que l'acteur concerné littéralement voit, perçoit directement, c'est-à-dire sans recours à un oracle, la validité du résultat final. Cette signification de l'évidence est entièrement dépendante de l'aspect diagrammatique de la pensée mathématique. En effet, cette vision directe du résultat final n'est rien d'autre que l'expérience perceptive de diagrammes convenablement (et souvent laborieusement) modifiés. Au contraire, une chaine de référence objective inclut généralement des transformations --~utilisation cruciale d'appareillages technologiques, généralisation inductive du résultat d'expériences singulières~-- qui ne peuvent pas produire la même forme d'évidence, même si la conviction qui en découle peut être elle aussi très forte. En conclusion, même si elles sont voisines, les conditions de félicité propres aux deux types de chaines ne peuvent être confondues puisque le transport de l'évidence d'une chaine démonstrative n'est fondamentalement pas de même nature que le maintien de constantes d'une chaine de référence objective. Le lecteur attentif mais peu familier du point de vue de l'\textsc{eme} peut s'attendre à ce que l'on souligne une autre différence «évidente» concernant le rapport au monde matériel des entités amenées à l'existence dans chacun de ces modes, puisqu'il peut être clair pour lui que les êtres de la référence objective se caractérisent par une présence active dans un secteur de la réalité matérielle, alors que les êtres mathématiques se cantonnent dans des mondes symboliques et abstraits sans ancrage matériel. Il se trouve que cette évidence est remise en cause par l'\textsc{eme}, du fait même que la notion de monde matériel ou de matière y est analysée comme une confusion --~un amalgame entre deux modes d'existence~-- d'où découle la pauvreté de l'ontologie des modernes (voir~\cite[chapitre~4]{EME}). Cette notion de matière au sens des modernes est profondément transformée dans l'\textsc{eme}; en particulier, elle acquiert un statut multimodal: chaque mode d'existence possède sa propre notion de matière qui désigne l'ensemble des entités dont dépendent les êtres de ce mode. L'effondrement dans le cadre de l'\textsc{eme} de la notion unimodale de monde matériel fait que l'attente supposée du lecteur perd toute pertinence et ne peut qu'être abandonnée. En guise de conclusion toute provisoire, le quasi-mode d'existence des entités mathématiques décrit dans la partie~\ref{quasimode} et le mode de la référence objective présentent un nombre significatif d'analogies qui rendent difficiles une séparation pure et simple: ces modes ont, pour reprendre une notion chère au second Wittgenstein, comme un air de famille. Cependant, ces deux mêmes modes exhibent aussi au moins une forme de différence assez nette qui empêche l'identification des deux ou même la fusion de l'un dans l'autre. Or, il semble inévitable de pouvoir disposer de ces deux modes afin de couvrir le maximum du champ scientifique. D'ailleurs, c'est le plus souvent un mixte des deux qui semble être à l'œuvre lorsque la démarche considérée présente à la fois un développement mathématico-déductif et un dispositif expérimental. Un exemple récent et spectaculaire en est l'extraordinaire construction étalée sur près d'un siècle qui vient de confirmer l'existence des trous noirs \emph{via} la perception des ondes gravitationnelles\footnote{Voir la notion de «treuil ontologique» introduite par Étienne Klein \cite{klein08} pour évoquer le rôle des mathématiques dans l'ontologie de la physique. Le risque de ranimer l'antienne des mathématiques comme langage de la nature est implicitement présent, mais l'ancrage dans le cadre des modes d'existence de l'\textsc{eme} ajouté au quasi-mode présenté dans la présente contribution devrait constituer un puissant antidote.}. La démarche mythique de Thalès déterminant la hauteur d'une pyramide par l'intermédiaire du théorème dit aujourd'hui de Thalès est tout aussi exemplaire. À la réflexion, cette idée d'associer les deux modes semble inévitable pour rendre compte de l'activité scientifique même dans le cas des sciences expérimentales ou de terrain. En effet, puisque les inscriptions qui constituent les étapes des chaines de référence font fortement intervenir des entités mathématiques, le moindre traitement mathématique de ces inscriptions --~par exemple un simple calcul numérique~-- en toute rigueur relève du quasi-mode d'existence des êtres mathématiques. Pour tenir compte de ces contraintes, une solution est de concevoir le mode [\textsc{ref}] sous la forme d'un mode élargi contenant non seulement le mode de la référence objective restreint décrit dans la partie~\ref{PrecisREF} mais aussi le quasi-mode des êtres mathématiques. Cela revient à penser [\textsc{ref}] comme un mode composé\footnote{À propos de cette idée de mode composé, il y a un précédent dans l'\textsc{eme} avec le cas du mode \emph{reproduction} [\textsc{rep}] qui se scinde lui-même en deux notions distinctes --~deux quasi-modes?~-- les \emph{inertes} et les \emph{vivants}.}. Si cette hypothèse est retenue, il restera à donner une description cohérente et unifiée de cette acception étendue du mode [\textsc{ref}]. En attendant, il est facile d'esquisser une description schématique de ce mode: ses \emph{trajectoires} sont des chaines d'inscriptions obtenues chacune à partir de la précédente par une transformation; son \emph{hiatus} est la dissemblance, l'éloignement des inscriptions successives; sa \emph{condition de félicité} est la circulation de la référence objective ou de l'évidence le long de la chaine. \begin{quote} \emph{Guy Wallet remercie Isabelle Stengers pour ses remarques et encouragements relativement à une version préliminaire de ce travail. Il remercie aussi Bruno Latour pour l'intérêt appuyé qu'il a manifesté pour une seconde version du même travail, et pour une discussion qu'il a organisée dans son laboratoire à ce propos. Enfin, les deux auteurs remercient Fabien Ferri pour les avoir mis sur la piste des thèses de Peirce commentés dans les écrits \cite{Chauvire1987,Chauvire2008} de Christiane Chauviré.} \end{quote} \providecommand\urlprefix{} \let\enquote=\frquote
\section*{Theoretical Framework} Motivated by observational evidence that turbulence in the solar wind consists of low-frequency fluctuations (compared to the ion Larmor frequency), with negligible energy in the fast magnetosonic modes, we tackle the problem in the framework of ``Kinetic Reduced Magnetohydrodynamics'' (KRMHD) \cite{sch09}, which is the long-wavelength limit of gyrokinetics \cite{frieman82,howes06,kunz18} and the anisotropic reduction of Kinetic MHD \cite{kulsrud83,kunz15}. The electrons are isothermal in this approximation, so only the ions require a kinetic treatment. The collisional limit of KRMHD is the well-known ``Reduced MHD'' \cite{kadomtsev74,strauss76}. The applicability of KRMHD is limited by a few constraints. Most importantly, these include magnetized ions ($\lambda \gg \rho_i$, where $\rho_i$ is the thermal ion Larmor radius and $\lambda$ is any target fluctuation's scale length measured across the magnetic field); spatial anisotropy ($\lambda \ll \ell_\parallel$, where $\ell_\parallel$ is a fluctuation's scale length along the local magnetic field); and low frequency ($\omega \ll \Omega$, where $\omega$ represents any dynamical frequency of interest and $\Omega$ is the ion Larmor frequency). The fluctuating fields must be small in comparison to their background values (ordered $\sim\omega/\Omega\sim\lambda/\ell_\parallel$), and the background magnetic field is assumed to be (locally) straight, with constant magnitude. The ion mean free path $\lambda_\mathrm{mfp}$ can be long or short compared to $\ell_\parallel$ without violating KRMHD orderings. Similarly, the ratio of the sound speed to the Alfv\'en speed ($\sim\sqrt{\beta_i}$, where $\beta_i$ is the raio of the ion thermal to magnetic energies) can be large or small. KRMHD is well suited to the study of the inertial-range turbulence, in the solar wind and elsewhere. Under this approximation, Alfv\'enic fluctuations are completely unaffected by the compressive fluctuations, and the compressive fluctuations are affected {\it only} by the Alfv\'enic fluctuations and not by one another \cite{sch09}. \subsection*{Alfv\'en waves} In KRMHD, Alfv\'enic fluctuations are purely transverse, incompressible, nonlinearly interacting Alfv\'en-wave packets, which propagate in both directions along a straight, static background magnetic field $\mbf{B}_0 = B_0 \hat{\mbf{z}}$, in a plasma with mean mass density $\rho_0$. Two scalar stream (flux) functions $\Phi = \Phi(\mbf{r}, t)$ and $\Psi = \Psi(\mbf{r}, t)$ describe the fluctuating field-perpendicular flow velocity $\mbf{u} = \hat{\mbf{z}} \times \boldsymbol{\nabla} \Phi$ and magnetic field $\mbf{b} = \hat{\mbf{z}} \times \boldsymbol{\nabla} \Psi$, respectively; the latter is in units of the Alfv\'en speed $v_{\rm A}=B_0/\sqrt{4\pi\rho_0}$. Only the $z$ components of the vorticity $\boldsymbol{\nabla}\times\mbf{u}$ and current $\boldsymbol{\nabla}\times\mbf{b}$ are non-zero, equal to $\nabla_\perp^2 \Phi$ and $\nabla_\perp^2 \Psi$, respectively. The Els\"asser representation $\mbf{Z}^{\pm}=\mbf{u}\pm\mbf{b}$ \cite{elsasser50} brings to the fore key features of Alfv\'enic fluctuations in full MHD. In our reduced theory, the Els\"asser potentials $\zeta^\pm = \Phi \pm \Psi$ and ``vorticities'' $\omega^\pm = \nabla_\perp^2\zeta^\pm$ are useful. In terms of these functions, the KRMHD equations for Alfv\'enic fluctuations are \begin{equation} \left(\frac{\partial}{\partial t} \mp v_A \frac{\partial}{\partial z}\right) \omega^\pm = - \left\{ \zeta^\mp, \omega^\pm \right\} - \left\{ \partial_j \zeta^\mp, \partial_j \zeta^\pm \right\}, \label{eq:KRMHDa} \end{equation} where $\left\{f,g\right\} \equiv \partial_x f\, \partial_y g - \partial_y f\, \partial_x g$. In the final term in \eqref{eq:KRMHDa}, summation over $j = x,y$ is implied. Important Alfv\'enic phenomena are easily read from \eqref{eq:KRMHDa}. The linear terms (on the left-hand side) describe perturbations propagating up and down the background magnetic field with speed $v_A$. According to the right-hand side, only counter-propagating perturbations interact. The compressive fluctuations do not appear. Note that the local {\it direction} of the magnetic field is determined by the Alfv\'en waves, because $\mbf{B}/B \approx \hat{\mbf{z}} + \mbf{b}/v_{\rm A}$. KRMHD separately tracks fluctuations of the magnetic-field {\it strength}, $\delta\! B$, as described below. \subsection*{Ion kinetics} Compressive fluctuations, namely those of density ($\delta n$) and pressure, are calculated via moments of the ion distribution function perturbed from a Maxwellian equilibrium; the perturbed magnetic-field strength $\delta\! B$ is obtained from these via pressure balance (across the mean field $\mbf{B}_0$). In KRMHD, as a result of the straight-$\mbf{B}_0$ equilibrium geometry, magnetic-moment conservation, and the restriction to long wavelengths ($\lambda\gg\rho_i$), one can integrate the perturbed distribution function over perpendicular velocities $v_\perp$, retaining only the $v_\perp^0$ and $v_\perp^2$ moments, which are required to obtain $\delta n$ and $\delta\! B$. The ion kinetics are thus encoded by two kinetic scalar fields, $g = g^{(i)} (\mbf{r}, v_\parallel, t)$, $i=1, 2$, which are particular linear combinations of the $v_\perp^0$ and $v_\perp^2$ moments, chosen to produce two decoupled kinetic equations \cite{sch09}: \begin{equation} \frac{\mathrm{d} g^{(i)}}{\mathrm{d} t} + v_\parallel \nabla_\parallel g^{(i)} + v_\parallel F_0 \nabla_\parallel \phi^{(i)} = 0, \label{eq:gb} \end{equation} where $F_0 = \exp{(-v_\parallel^2/v_{{\rm th}}^2)}/\sqrt{\pi}v_{{\rm th}}$ is the background Maxwellian distribution. Ions are accelerated along the moving field lines by the parallel electric field and the mirror force. For each $g^{(i)}$, the appropriate linear combination of these forces is accounted for by its potential $\phi^{(i)} = \alpha^{(i)}\int \mathrm{d}v_\parallel \, g^{(i)}(v_\parallel)$, where the constant prefactors $\alpha^{(i)}$ depend on plasma parameters---the ratios of ion thermal to magnetic energies (``plasma beta'', $\beta_i\equiv 8\pi n_i T_i/B_0^2$), of the ion to electron temperatures, $\tau\equiv T_i/T_e$, and of the ion to electron charge, $Z\equiv q_i/|e|$. The explicit expressions are $\alpha^{(i)} = (\tau/Z - 1/\beta_i \pm \kappa)^{-1}$, with ``$+$'' for $i=1$ and ``$-$'' for $i=2$ and $\kappa = [(1+\tau/Z)^2 + 1/\beta_i^2]^{1/2}$. At any time and location, $\delta n$ and $\delta\! B$ can be determined as linear combinations of $\phi^{(1)}$ and $\phi^{(2)}$, with coefficients that also depend on the plasma parameters: \begin{align} \label{eq:dn} \frac{\delta n}{n_i} &= \frac{1}{2\kappa}\left[\sigma\frac{\phi^{(1)}}{\alpha^{(1)}} - \frac{2\tau}{Z\beta_i}\frac{\phi^{(2)}}{\alpha^{(2)}}\right],\\ \frac{\delta\! B}{B_0} &= \frac{1}{2\kappa}\left[\sigma\frac{\phi^{(2)}}{\alpha^{(2)}} - \left(1+\frac{Z}{\tau}\right)\frac{\phi^{(1)}}{\alpha^{(1)}}\right], \label{eq:dB} \end{align} where $\sigma = 1 + \tau/Z + 1/\beta_i + \kappa$. The particular forms of these coefficients or of $\alpha^{(i)}$ are not important for the forthcoming discussion, which hinges just on the mathematical structure of \eqref{eq:gb}. We shall drop the superscripts of $g$ and $\phi$ wherever this causes no ambiguity. The apparent simplicity of \eqref{eq:gb} is an intentional feature of the KRMHD model, but a few subtleties deserve mention. The equations for $g^{(1)}$ and $g^{(2)}$ are totally decoupled from one another, but not from the background Alfv\'enic perturbations, which move the plasma and the field lines around. This effect enters via the ``convective'' derivatives $\mathrm{d}/\mathrm{d} t\equiv\partial/\partial t +\mbf{u}\cdot\vdel_\perp$ and $\nabla_\parallel \equiv \partial/\partial z + (\mbf{b}/v_{\rm A})\cdot\vdel_\perp$. In the presence of Alfv\'enic fluctuations, since the magnetic field lines are ``frozen'' into the plasma, the Alfv\'enic flows $\mbf{u}$ move the field lines $\mbf{b}$ and the plasma together. Thus, \eqref{eq:gb} might seem to be a linear equation that has been re-expressed in a well-defined Lagrangian frame \cite{sch09}. However, after about one eddy-turnover time, structure in $\mbf{b}$ develops at arbitrarily small spatial scales \cite{eyink15,eyink18,boozer18}. Thus, in the presence of any resistivity (not shown in \eqref{eq:KRMHDa}, but included in our simulations and in reality), the field lines' identities and thus the Lagrangian frame are lost. Consequently, a density fluctuation (for example) that is momentarily aligned with the local magnetic field develops finer parallel wavelengths in about one eddy-turnover time.\footnote{Note that, absent resistivity, the parallel electric field associated with Alfv\'enic fluctuations is zero, and one might therefore mistakenly believe that the potentials $\phi$ describe all parallel electric fields also in resistive KRMHD. In fact, the moving field lines associated with the Alfv\'enic fluctuations can change their topology in the presence of resistivity and generate parallel electric fields in the process. In KRMHD, the compressive fluctuations cannot see these resistive parallel electric fields; they are not included in $\phi$. Thus, when field lines resistively reconnect, KRMHD compressive fluctuations are undisturbed, but get relabeled as the field-line identities change. It is this relabeling that causes the compressive fluctuations to inherit the parallel structure of the Alfv\'enic fluctuations.} This process of field-line dissolution and replacement manifests as a forward parallel cascade of compressive fluctuations by background Alfv\'enic fluctuations, as we observe in our simulations (see \figref{fig:par_cascade}). The derivative operators in \eqref{eq:gb} are independent of $v_\parallel$ and the $v_\parallel$ integrals extend from $-\infty$ to $+\infty$. These properties and the appearance of the Maxwellian function $F_0(v_\parallel)$ make Hermite polynomials a natural orthogonal basis for $g(v_\parallel)$. That is, one can decompose \begin{equation} \label{eq:Hermite} g(v_\parallel) = \sum_{m=0}^\infty \frac{H_m(v_\parallel/v_{{\rm th}}) F_0(v_\parallel)}{\sqrt{2^m m!}}\,g_m, \end{equation} where $H_m(x)=(-1)^m e^{x^2}(\mathrm{d}/\mathrm{d} x)^me^{-x^2}$ is the Hermite polynomial of degree $m$. It is convenient to describe the velocity-space structure of $g(v_\parallel)$ in terms of the spectral coefficients $g_m$. Just as a fluid cascade is described in terms of a flux of energy from low to high wavenumbers, one may describe collisionless damping as a flux of free energy from low $m$ to high $m$. In this context, it is appropriate to state explicitly what we mean by free energy \cite{sch09}. It follows immediately from \eqref{eq:gb} that it has a quadratic invariant: \begin{align} \nonumber W &= \int\frac{\mathrm{d}^3\mbf{r}}{V}\left(\int\mathrm{d}v_\parallel\frac{g^2}{2F_0} + \frac{\phi^2}{2\alpha}\right)\\ &= \frac{1}{2}\sum_{\mbf{k}}\left(\sum_{m=0}^\infty|g_{m,\mbf{k}}|^2 + \alpha|g_{0,\mbf{k}}|^2\right), \label{eq:W} \end{align} where $V$ is the volume of the domain and the second expression follows from the Parseval theorem for the Fourier and Hermite functions and provides an explicit motivation for discussing free-energy flows in the $(m,\mbf{k})$ phase space. It is not hard to show that $W$ is minus the entropy of the perturbed distribution plus the energy of the fluctuating magnetic field (up to a factor of $T_i$), which is what motivates the term ``free energy''. \subsection*{Landau damping, phase mixing and stochastic echo} In the absence of Alfv\'enic fluctuations, \eqref{eq:gb} is the one-dimensional, unmagnetized problem originally considered by Landau \cite{landau46}, so the compressive fields $\phi$ are subject to his damping. In the presence of Alfv\'enic turbulence, the rate of collisionless damping is {\it enhanced}, because the damping rate and the associated rate of formation of structure in velocity space are proportional to $|k_\parallel|v_{{\rm th}}$, which is {\it increased} by the parallel cascade of compressive fluctuations. If this were the end of the story, i.e., if the compressive-fluctuation spectra were determined solely by simple ``superposition'' of the turbulent cascade and Landau damping, then one would predict steep (and possibly non-universal) Fourier spectra \cite{bratanov13prl,sch16} and shallow Hermite spectra \cite{zocco11,kanekar15}, corresponding to free energy spreading to small scales in velocity space as quickly as to small scales in real space. But there is more to the story. In the absence of collisions, phase mixing is formally reversible. Spatial perturbations of fields $\phi$ decay in time as spatial perturbations of the distribution function are transferred to finer scales in velocity space (higher Hermite moments $g_m$), but until collisions scramble the phases, the process can in principle be reversed. Consider \eqref{eq:gb} for an initial value problem, with the initial perturbation $\phi(\vr_\perp,\ell) \sim \cos(k_\parallel \ell)$ along some field line labeled by the perpendicular coordinate~$\vr_\perp$. If we could Fourier transform $g(\vr_\perp, \ell, v_\parallel, t)$ along the moving field line, we would find the ballistic (or ``free-streaming'') part of the response to be $g_{k_\parallel} \sim \exp(-ik_\parallel v_\parallel t)$; the argument of the exponent is the ``phase'' in ``phase mixing''. The ``mixing'' occurs when one integrates $g_{k_\parallel}(v_\parallel)$ over $v_\parallel$, as one would to find a self-consistent $\phi$---the Maxwellian velocity dependence of $F_0(v_\parallel)$ in the initial condition is then mixed with the perturbation's advancing phase \cite{hammett90,hammett92}. A more complete analysis is required to recover Landau's full story, but the essential connection between phase mixing and the damping of fields that is exposed here is authentic. Velocity-space integrals decay even as $g_{k_\parallel}(v_\parallel)$ itself only becomes more oscillatory in $v_\parallel$, without decaying. If time were reversed, the accumulated phase would unmix, and the original $\phi$ perturbations would grow in time, until the unmixing were complete. It is not easy to reverse time, but the scattering of a compressive wave by an Alfv\'en wave that is propagating in the opposite direction along the field line has the same mathematical effect: such an interaction causes the compressive wave's $k_\parallel$ to change sign, the phase subsequently unmixes and the field perturbation regenerates. The most familiar example of this phase unmixing is the textbook phenomenon of plasma echo \cite{gould67,malmberg68}. The idea of a stream of stochastic echoes produced by a sequence of nonlinear interactions has been the object of several recent studies of {\it electrostatic} ($\mbf{b}=0$) plasma turbulence \cite{sch16,kanekar15phd,parker16,adkins18}. Here, we explore for the first time the possibility of stochastic echoes in a plasma with moving field lines ($\mbf{b}\neq0$). As described above, the compressive fluctuations couple to the Alfv\'enic fluctuations in a nontrivial way, as the field lines along which the particles stream are being advected by the same flows as the particles' distribution function $g$. Although there is as yet no complete theory for this problem, our numerical results suggest that elements of the electrostatic theory \cite{sch16,adkins18} are germane. This generalization opens the way to understanding kinetic turbulence in heliospheric (solar-wind) and similarly collisionless astrophysical plasmas, which are usually well into the electromagnetic regime. Below we show evidence that nonlinear, stochastic echoes are present, and that they can have profound effects on observable quantities. Our key finding, best illustrated by \figref{fig:flux}, is that in the inertial range, the average net flux of free energy to smaller velocity-space scales (higher Hermite moments) is very small in comparison with the average net flux of free energy to smaller spatial scales (higher perpendicular wavenumbers). In the figure, this conclusion is supported by the nearly horizontal stream lines of the flux in the inertial range (away from the stirring at long wavelengths and from the dissipation at the smallest scales). After a brief discussion of the set up of our numerical experiment, we provide further evidence from the simulations, including detailed spectra and structure functions such as can be (or have been) obtained from solar-wind measurements. \begin{figure}[t] \includegraphics[width=1.0\linewidth]{Fourier_Hermite_Flux_Minus.png} \caption{The flux $(\Pi,\Gamma)$ (see \eqsand{eq:Gamma}{eq:Pi}) of free energy $W$ (\eqref{eq:W}) of the kinetic field $g^{(1)}$, normalized to its injection rate, as a function of the Hermite number $m$ (vertical) and perpendicular wavenumber $k_\perp$ (horizontal). Colors represent the magnitude of the flux and arrows its streamlines. Away from the stirring (at small $m$ and small $k_\perp)$ and damping (at large $m$ and/or large $k_\perp$), the time-averaged net turbulent free-energy flux to high $m$ is very small; Landau damping is largely suppressed by stochastic echoes (return flux from high to low $m$) and so different Hermite moments $g_m$ of the ion distribution function are effectively energetically insulated from each other.} \label{fig:flux} \end{figure} \section*{Numerical Experiment} \subsection*{Numerical set up} Our simulations track the evolution of driven and damped compressive fluctuations in a sea of driven and damped Alfv\'enic turbulence for a number of the latter's eddy-turnover times---well into the statistically stationary state, so statistical averages can be reliably calculated. We solve \eqsref{eq:KRMHDa} and \exref{eq:gb} spectrally in Fourier--Hermite space. Namely, we solve \eqref{eq:gb} in the form of a number of coupled ``fluid'' equations for the Hermite moments $g_m$, defined by \eqref{eq:Hermite}: \begin{align} \frac{\mathrm{d} g_m}{\mathrm{d} t} + v_{{\rm th}}\nabla_\parallel\!\left[\sqrt{\frac{m+1}{2}}\,g_{m+1} + (1+\alpha\,\delta_{m,1})\sqrt{\frac{m}{2}}\,g_{m-1}\right] = 0 \label{eq:gm} \end{align} and $\phi = \alpha g_0$. We advance these equations in time with a third-order modified Williamson algorithm (a four-step, low-storage Runge-Kutta method). The spatial dependence of all fields is expressed as discrete Fourier series and we use the standard pseudo-spectral approach to solve the linear and nonlinear terms containing spatial derivatives. The simulation domain is a triply periodic cube of size $2\pi$ in each direction.\footnote{Note that in KRMHD, there is a rescaling symmetry whereby all fluctuation amplitudes relative to the corresponding background values (e.g., $\delta\! B/B_0$, $u/v_{\rm A}$, $g/F_0$ etc.) can be arbitrarily rescaled as long as the ratios of all perpendicular to parallel scales are rescaled by the same amount (i.e., the fluctuation amplitudes and $k_\parallel/k_\perp$ are arbitrarily small). Therefore, the parallel and perpendicular units of length are independent.} The code units are set by this and by $v_{\rm A}=1$. The nonlinear terms are partially dealiased using a phase-shift method \cite{patterson71}. The total number of spectral modes is therefore smaller than the total number of mesh points used to evaluate the nonlinear terms; we report the spatial size of a given simulation in terms of the latter. The simulations presented here have spatial resolution from $256^3$ (\figref{fig:g_spec}) to $512^3$ (all figures). The description of compressive fluctuations provided by \eqref{eq:gb} is appropriate for the inertial range, but the {\it production} of fluctuations at large scales and their removal at small scales in a simulation require one to add forcing and dissipation, respectively. The forcing occurs at $m=1$ and low wavenumbers, viz., $|k_x|,|k_y|,|k_z| = 1, 2$. The strength of the forcing can be arbitrary because \eqref{eq:gb} is linear in $g$ and so the amplitude of the compressive fluctuations is arbitrary. Our forcing is designed so as to keep the rate of injection of the compressive free energy exactly constant. We add two forms of dissipation to \eqref{eq:gb}, to absorb energy at small scales in $\mbf{r}$ (``hyperviscosity'') and $v_\parallel$ (``hypercollisionality'') without changing the dynamics at large scales. We tested multiple specific forms of dissipation in the course of this study. Our results require the presence of the dissipation at small scales, but do not depend on its specific form. In the simulations reported here, we add $-\muk_\perp^8g_m - \nu m^6g_m$ to the right-hand side of \eqref{eq:gm} with $m\ge2$. The values of $\mu$ and $\nu$ are chosen so that this dissipation is significant only for modes with the largest values of $k_\perp$ and $m$ but removes energy without creating bottlenecks or reflections. In practice, the Hermite series of $g(v_\parallel)$ (\eqref{eq:Hermite}) is truncated at some $m=M$. In the absence of collisions, the Hermite \eqsref{eq:gm} fail to close, because the evolution of each $g_m$ depends on $g_{m+1}$ (and $g_{m-1})$. However, with the hypercollisional cutoff described above, one can take $g_{M+1} = 0$ to a very good approximation as long as $M$ is chosen large enough. This is our approach. The simulations reported here have resolution from $M=32$ (all figures) to $M=128$ (\figref{fig:g_spec}). The Alfv\'en waves are also stirred and damped. We stir them by forcing at low wavenumbers (the same as for the kinetic field $g$) and in the velocity field only. The forcing is designed to keep the injected power $\epsilon$ exactly constant, while maintaining the rate of cross-helocity injection exactly zero \cite{teaca11}. The magnitude of $\epsilon$ allows us to control the character of the resulting Alfv\'enic turbulence: weaker injection produces weakly interacting Alfv\'en waves, but increasing it pushes the system towards strong, critically balanced turbulence \cite{GS95,GS97}. This is the relevant regime that we study here. It is achieved when $\epsilon=1$ in code units. Like the kinetic field, the Alfv\'enic fields are also dissipated by eighth-order ``hyperviscosity'' and ``hyperresistivity'', artificially set to be numerically equal. The plasma parameters $\beta_i$, $\tau$ and $Z$ are all set to unity. They enter via the constants $\alpha^{(i)}$ in the definitions of the potentials $\phi^{(i)}$ in terms of $g^{(i)}$ and affect their Landau-damping rates. They are also needed to compute the relative amplitudes of $\delta n$ and $\delta\! B$, via \eqsand{eq:dn}{eq:dB}. The results presented here do not depend significantly upon these as long as they are all $\sim1$. \begin{figure}[t] \begin{center} \includegraphics[width=0.85\linewidth]{density_plane_perp3.png}\\ \includegraphics[width=0.9\linewidth]{spectra_perp.pdf} \end{center} \vskip-0.5cm \caption{{\bf Perpendicular cascade.} Upper panel: snapshot of the density-fluctuation field $\delta n$ in the plane $(x,y)$ perpendicular to the mean magnetic field. Lower panel: perpendicular spectra of the Alfv\'enic (velocity $E^u$ and magnetic $E^b$), density ($E^n$) and magnetic-field-strength ($E^B$) fluctuations; inset: ratio of the density to Alfv\'enic-velocity spectra, $E^n/E^u$. The Alfv\'enic spectra are normalized to the total mean Alfv\'enic energy, compressive spectra to the total mean free energy~$W$ (\eqref{eq:W}).} \label{fig:perp_cascade} \vskip-0.25cm \end{figure} \subsection*{Perpendicular spectra} Let us first establish that we are dealing with a system that exhibits some familar features of turbulence. A snapshot of the density-fluctuation field in the plane perpendicular to the background magnetic field is shown in \figref{fig:perp_cascade}, together with time-averaged perpendicular wavenumber spectra of the density $\delta n$ ($E^n$), magnetic-field strength $\delta\! B$ ($E^B$), and of the Alfv\'enic fluctuations of velocity $\mbf{u}$ ($E^u$) and magnetic field $\mbf{b}$ ($E^b$). The spectral slope of the latter follows quite well the $k_\perp^{-3/2}$ scaling expected for RMHD turbulence \cite{boldyrev06,mallet17a,maron01,chenmallet11,perez12}. To a good approximation, the compressive fluctuations' spectra track the Alfv\'enic-velocity spectrum (see inset of \figref{fig:perp_cascade}), as one might expect an undamped passive scalar to do \cite{obukhov49,corrsin51}. We do not observe a significant steepening of the compressive spectra compared to the Alfv\'enic ones, which would have had to happen had there been Landau damping of compressive fluctuations depleting their energy cascade at each scale \cite{sch16}. This is circumstantially consistent with an inhibition of Landau damping. It is also essentially consistent with what is observed in the solar wind \cite{celnikier83,celnikier87,marsch90,bershadskii04,hnat05,kellogg05,chen11}. \begin{figure}[t] \begin{center} \includegraphics[width=1.0\linewidth]{b_field_line3.png}\\ \includegraphics[width=0.9\linewidth]{spectra_para.pdf}\\ \includegraphics[width=0.85\linewidth]{Parallel_Coherence_Length.pdf}\\ \end{center} \vskip-0.7cm \caption{{\bf Parallel cascade.} Upper panel: snapshot of a typical set of magnetic-field lines, with color showing the density-fluctuation field. The $z$ dimension of the box is lengthened by the factor of 4 for better viewing (formally, in KRMHD, it is arbitrarily longer than the perpendicular size of the box). Middle panel: parallel spectra of the Alfv\'enic, density and field-strength fluctuations, measured along perturbed field lines; inset: ratio of the density to Alfv\'enic-velocity spectra, $E^n/E^u$. The normalizations are the same as in \figref{fig:perp_cascade}. Lower panel: parallel coherence length $\ell_\parallel$ of Alfv\'enic, density and field-strength fluctuations as a function of their perpendicular coherence length $\lambda$; inset: ratio of the parallel coherence length of the density to that of the Alfv\'enic velocity. Here $\ell_\parallel(\lambda)$ is calculated via the second-order correlation function, by the method described in \cite{mallet15}, but following the perturbed field lines with higher-order accuracy, as described in the text.} \label{fig:par_cascade} \vskip-0.6cm \end{figure} \subsection*{Existence of parallel cascade} Critically balanced Alfv\'enic fluctuations become progressively more anisotropic at finer scales \cite{GS95,GS97}, with parallel and perpendicular correlation scales related by $\ell_\parallel \propto \lambda^{1/2}$ \cite{boldyrev06,mallet15,mallet17a}. Consequently, their parallel spectrum is expected to scale as $k_\parallel^{-2}$ \cite{GS97,beresnyak15,mallet17a} (and indeed does in the solar wind \cite{horbury08,podesta09aniso,wicks10,chenmallet11,chen16}). The question that we address here is whether the kinetic field $g$ advected by them ``inherits'' this parallel cascade. Because $\ell_\parallel\gg\lambda$, parallel correlations can only be measured correctly along the {\it fluctuating} field \cite{cho00,maron01,chenmallet11}. We identify the field lines by tracing a set of them from $100,000$ randomly chosen points in the simulation domain at a given instant in time, record the values of fluctuating quantities as functions of the distance along each field line, and then calculate parallel spectra (we use a fourth-order Runge-Kutta method to integrate the field lines and cubic spline interpolation to determine values of the fluctuating fields on them). The results from this analysis are shown in \figref{fig:par_cascade} alongside an instantaneous snapshot of field lines, in which they are ``painted'' with the values of the density-fluctuation field. One can see that the field lines wander widely across the domain. The resulting parallel wavenumber spectra are steeper than the perpendicular wavenumber spectra, as expected. The $k_\parallel^{-2}$ scaling is well satisfied for $E^b$, whereas the Alfv\'enic-velocity spectrum $E^u$ is a little steeper. The compressive spectra closely track $E^u$ (see inset), confirming the existence of a ``parallel cascade'' of these passive fields (contrary to what was believed by \cite{sch09} on the basis of linearity of \eqref{eq:gb} in a suitably well-behaved Lagrangian frame). The lower panel of \figref{fig:par_cascade} reinforces this conclusion: the parallel coherence lengths of the compressive fluctuations scale as $\lambda^{1/2}$, as do those of the Alfv\'enic fluctuations. The existence of a parallel cascade is an important finding of the present study. As we have argued above, it occurs because magnetic fields reconnect at every scale over a time comparable to the correlation time associated with this scale \cite{eyink15,eyink18,boozer18} and thus cannot preserve their identity over more than one parallel correlation scale of the Alfv\'enic turbulence---thus, any density perturbation that extends along a field line will be broken up and decorrelated on the same parallel scale (hence the tracking of the Alfv\'enic spectra by the compressive ones). It is the presence of the parallel cascade that makes the question of the efficiency of Landau damping relevant: its rate $\sim|k_\parallel|v_{{\rm th}}$ will be of the same order as the Alfv\'en frequency $k_\parallelv_{\rm A}$ (taking $\beta_i=1$) and so, in a critically balanced turbulence, of the same order as the nonlinear cascade rate at every scale. It therefore {\em a priori} matters as an energy-removal channel and the discovery that it in fact does not is a nontrivial one. \subsection*{Phase-space spectra and dissipation} Let us now complete the characterisation of the free-energy distribution in phase space by studying the structure of the fluctuations of $g$ in velocity space, in terms of its Hermite spectra. Besides helping us build our case for fluidization of kinetic turbulence, these are of interest in the context of the rapid recent advances in both instrumentation and computing, meaning that they can now be measured directly both in space \cite{servidio17} and in fully kinetic simulations \cite{cerri18,pezzi18,kawazura18ie}. In the absence of background Alfv\'enic turbulence, the time- and space-averaged Hermite spectrum of a forced and Landau-damped kinetic field is $\langle|g_m|^2\rangle \propto m^{-1/2}$ \cite{zocco11,kanekar15}. This corresponds to a constant finite free-energy flux from small to large Hermite numbers. As a consequence, there is a dissipative anomaly associated with the collision operator: in the limit of vanishing collisionality, the collisional dissipation stays finite, enabling the removal of free energy from the system at a collisionality-independent phase-mixing rate. With turbulence, we find the spectrum to be a little steeper than $m^{-1}$, as shown in \figref{fig:g_spec}. Collisional dissipation rate associated with such a spectrum would vanish in the limit of small collisionality \cite{adkins18}, indicating that refinement of scales in velocity space is not sufficient to process into heat the finite free energy injected by forcing, and thus that the principal cascade route must be via smaller {\it spatial} scales. Indeed, \figref{fig:diss_spec}, where we show the combined collisional and hyperviscous dissipation in the $(k_\perp,m)$ phase space, confirms that the majority of the free energy is thermalized at small spatial scales, not at high~$m$. \begin{figure}[t] \includegraphics[width=1.0\linewidth]{Hermite_Spectrum.pdf} \caption{{\bf Phase-space cascade.} Hermite spectrum (integrated over wavenumbers) of the kinetic field $g^{(1)}$ advected by Alfv\'enic turbulence according to \eqref{eq:gb}: the thick line shows the spectrum for a run with spatial resolution $256^3$ and $M=128$ Hermite moments; the thin line is for a run with spatial resolution $512^3$ and $M=32$ Hermite moments. The slope $m^{-1/2}$ associated with linear Landau damping \cite{zocco11,kanekar15} is shown for reference. The normalization of the spectrum is the same as in \figref{fig:perp_cascade}. Inset: spectrum of $g^{(1)}$ in the phase space $(k_\perp,m)$ (integrated over $k_z$).} \label{fig:g_spec} \end{figure} \begin{figure}[t] \includegraphics[width=1.0\linewidth]{Fourier_Hermite_Dissipation_Minus.png} \caption{Dissipation rate of the free energy $W$ (defined by \eqref{eq:W}) of the kinetic field $g^{(1)}$, normalized to its total injection rate, as a function of the Hermite number $m$ and perpendicular wavenumber $k_\perp$. Dissipation is important only for large $m$ (hypercollisional) or large $k_\perp$ (hyperviscous). In the inertial range, the free energy is well conserved. The range of $(k_\perp,m)$ into which energy is injected by forcing is shown as grey box. Some of the energy injected at $m=1$ and low $k_\perp$ is dissipated by collisions, but the dissipation is most intense at high $k_\perp$ and low $m$.} \label{fig:diss_spec} \end{figure} \subsection*{Free-energy fluxes} Finally, having collected all this circumstantial (but observationally testable) evidence for the ``fluidization'' of kinetic turbulence, let us return to \figref{fig:flux}, where the fluxes of free energy in the $(k_\perp,m)$ space are plotted. Comparison of the fluxes towards smaller scales in velocity space (higher Hermite numbers) with the fluxes towards smaller scales in position space (higher wavenumbers) provides the most direct numerical evidence supporting the claim that, in the inertial range, Landau damping is suppressed rather than enhanced. The compressive free energy, $W$, defined by \eqref{eq:W}, is conserved in the inertial range of our simulations. Indeed, forcing is implemented spectrally (in $m$ and $k_\perp$) and is, therefore, exactly zero outside of a few lowest modes. The dissipation rate (shown in \figref{fig:diss_spec}) is negiligibly small away from the highest resolved $m$ and $k_\perp$. For most $m$ and $k_\perp$ modes, there are, therefore, neither sinks nor sources of free energy other than coupling to other modes. Fluxes from mode to mode can then be defined in such a way that the free energy in a wavenumber shell $|\vk_\perp'|=k_\perp$ and at Hermite number $m$, $W_m(k_\perp)=\sum_{k'_z}\sum_{|\vk_\perp'|=k_\perp}(1+\alpha\,\delta_{m,0})|g_{m,\mbf{k}'}|^2/2$, satisfies, away from the forcing and dissipation, \begin{equation} \frac{\partial W_m(k_\perp)}{\partial t} = - \left[\Gamma_m(k_\perp) - \Gamma_{m-1}(k_\perp)\right] -\frac{\partial\Pi_m(k_\perp)}{\partialk_\perp}, \end{equation} where $\Gamma_m(k_\perp)$ is the Hermite flux and $\Pi_m(k_\perp)$ is the Fourier flux. The Hermite coupling is essentially local (it involves only neighboring Hermite numbers $m-1$, $m$ and $m+1$), and so it is easy to read off Hermite fluxes from \eqref{eq:gm}: \begin{align} \nonumber &\Gamma_m(k_\perp) = v_{{\rm th}}\sum_{m'=0}^m\int\frac{\mathrm{d}^3\mbf{r}}{V} (1+\alpha\,\delta_{m',0}) [g_{m'}]^=_{k_\perp}\\ &\qquad\nabla_\parallel\left[\sqrt{\frac{m'+1}{2}}\,g_{m'+1} + (1+\alpha\,\delta_{m',1})\sqrt{\frac{m'}{2}}\,g_{m'-1}\right], \label{eq:Gamma} \end{align} where the Fourier ring filter applied to a function is defined by \begin{equation} [g_m]^=_{k_\perp}(\mbf{r}) = \sum_{k'_z}\sum_{|\vk_\perp'|=k_\perp} e^{i\mbf{k}'\cdot\mbf{r}} g_{m,\mbf{k}'}. \end{equation} Fluxes in Fourier space can be nonlocal, but are commonly defined and studied nonetheless \cite{verma04}: \begin{equation} \label{eq:Pi} \Pi_m(k_\perp) = (1+\alpha\,\delta_{m,0}) \frac{2\pi}{\sqrt{L_x L_y}} \int\frac{\mathrm{d}^3\mbf{r}}{V}\,[g_m]^>_{k_\perp}\mbf{u}\cdot\vdel_\perp[g_m]^{\le}_{k_\perp}, \end{equation} where $L_xL_y=(2\pi)^2$ is the cross-section of the box and the high- and low-pass Fourier filters are defined by \begin{align} &[g_m]^>_{k_\perp}(\mbf{r}) = \sum_{k'_z}\sum_{|\vk_\perp'|>k_\perp} e^{i\mbf{k}'\cdot\mbf{r}} g_{m,\mbf{k}'},\\ &[g_m]^\le_{k_\perp}(\mbf{r}) = \sum_{k'_z}\sum_{|\vk_\perp'|\lek_\perp} e^{i\mbf{k}'\cdot\mbf{r}} g_{m,\mbf{k}'}. \end{align} While the two-dimensional phase-space flux $(\Pi,\Gamma)$ is not a unique quantity, defined up to arbitrary circulations in the $(k_\perp,m)$ space, it is a useful one and, absent any obviously spurious such circulations, it gives a good representation of the paths that free energy takes to cross the gap between the forcing and dissipation scales. It is $(\Pi,\Gamma)$ vs.\ $(k_\perp,m)$, as defined by \eqsand{eq:Pi}{eq:Gamma}, that is plotted in \figref{fig:flux}. On average, at forcing scales (low $k_\perp$), a significant amount of free energy flows directly to high $m$. This flux is restricted to the forcing band of $k_\perp$ modes, because in this range, the nonlinear interactions have not yet managed to set up a return echo flux. This is in sharp contrast with the situation in the inertial range, where the energy flows mostly to small spatial scales. Recall that in the inertial range, the parallel cascade of compressive fluctuations should make Landau damping {\it stronger} in the presence of turbulence than otherwise, because free-streaming particles have less distance to travel to smooth out spatial fluctuations. Recall also that this parallel cascade is critically balanced, which means that Landau damping should be able to ``keep up'' with nonlinear, spatial mixing at every scale in the inertial range. In reality (as represented by the simulations), Landau damping is manifestly rapid enough to be important at forcing scales but (on average) far weaker than perpendicular spatial mixing in the inertial range, so it is reasonable to conclude that there is another process that is cancelling on average the flux to high~$m$. This is the most explicit signature of stochastic echoes that can be diagnosed in these simulations.\footnote{For electrostatic kinetic turbulence, where $\mbf{b}=0$, it is possible to decompose $g_m$ explicitly into phase-mixing and anti-phase-mixing components and thus calculate directly the ``forward'' and ``backward'' free-energy fluxes in Hermite space \cite{sch16,adkins18}. However, this decomposition involves the sign of $k_\parallel$, which in our case would have to be calculated with respect to the perturbed, turbulent magnetic field. We do not know how to make such a calculation mathematically rigorous and thus do not use this decomposition.} The conclusion from \figref{fig:flux} is that, in the inertial range, individual Hermite moments are, in effect, energetically insulated from each other, on average. The compressive turbulence is ``fluidized''. \section*{Discussion} \subsection*{Summary} We have presented a case for effective fluidization of compressive fluctuations in collisionless (or weakly collisional) plasma turbulence. Compressive fluctuations are advected passively by the ambient Alfv\'enic turbulence and turn out to inherit its parallel structure (\figref{fig:par_cascade}). This means that their phase-mixing (Landau-damping) rate $\sim|k_\parallel|v_{{\rm th}}$ is in principle comparable to the frequency $k_\parallelv_{\rm A}$ of the Alfv\'enic motions and, therefore, in a critically balanced turbulence \cite{GS95,GS97}, to the rate at which these motions push the compressive free energy to smaller perpendicular scales. However, what might have been thought an effective dissipation at every scale fails to remove energy efficiently from the low-order moments of the ion distribution function (\figref{fig:flux}) and thus steepen the inertial-range spectra of, e.g., density and magnetic-field-strength fluctuations. Instead, they follow faithfully the spectrum of the advecting Alfv\'enic field (\figref{fig:perp_cascade}) as a well-behaved ``fluid'' passive scalar would do \cite{obukhov49,corrsin51}. The reason for this turns out to be that nonlinear advection effectively nullifies phase mixing (except at the forcing scales), with free-energy fluxes in the inertial range largely confined within each moment of the distribution function, taking its energy from large to small {\em spatial} scales, where it dissipates (\figref{fig:diss_spec}). We interpret this behavior as resulting from statistical cancellation of phase mixing by plasma echoes. These are excited because the nonlinear advection causes phase-mixing modes propagating towards smaller velocity-space scales to couple to anti-phase-mixing ones, propagating back to larger scales--- the result is a return flux from phase space \cite{sch16}. \begin{figure*}[t] \includegraphics[width=1.0\textwidth]{3D_statistical_eddy_shape.pdf} \caption{Level sets for the correlation functions of the Alfv\'enic magnetic field $\mbf{b}$ (black netting) and perturbed field strength $\delta\! B/B_0$ (color) corresponding to the perpendicular scales (from left to right) $\lambda=0.5,0.16,0.05$. The two other coordinates are the distance $\ell_\parallel$ along local mean field and the dustance $\xi$ along the perturbed field $\mbf{b}$. Colors show distance from the center. Note that the parallel and perpendicular scales are measured in units of parallel and perpendicular box size, respectively ($2\pi$ in each direction), which are also the forcing scales, but, in KRMHD, the box can be arbitrarily stretched in the parallel direction---so these level sets are in fact highly elongated with $\ell_\parallel\gg\xi,\lambda$. These correlation functions have been constructed following the method desribed in \cite{mallet16} and are to be compared, modulo the arbitrary elongation factor, with solar-wind measurements in \cite{chen12}.} \label{fig:3Deddies} \end{figure*} \subsection*{Relation to observations in space} There is a long history of density and field-strength spectra being measured in the solar wind and found to have the same slopes as the ambient Alfv\'enic turbulence \cite{celnikier83,celnikier87,marsch90,bershadskii04,hnat05,kellogg05,chen11}. Why they do so in a collisionless plasma has remained a puzzle, if perhaps not always a fully appreciated one, in view of the community's instinctive preference for fluid models. As solar wind has come to be regarded as a unique plasma physics laboratory, compressive fluctuations, under further, more plasma-physics-aware, scrutiny, have stubbornly continued to manifest ``fluid'' behavior \cite{verscharen17}. Ours is the first dedicated attempt to simulate these fluctuations drift-kinetically, using equations that are physically appropriate for them \cite{sch09}. Our results are manifestly in agreement with what observations have shown for many years. In the solar wind, it has, relatively recently, become possible to probe beyond spectra and diagnose three-dimensional structure of local correlations \cite{chen12,verdini18}. The physically motivated local basis is the direction of the ``local mean'' magnetic field (the correlation length along it is denoted $\ell_\parallel$), the direction of the field's perturbation $\mbf{b}$ at the scale of interest (the corresponding correlation length is $\xi$) and the third direction, transverse to both (correlation length $\lambda$). The idea is that, if turbulence has a tendency towards local alignment between the two Alfv\'enic fields \cite{boldyrev06,chandran15,mallet16,mallet17a}, it must turn out that statistically not only $\lambda,\xi\ll\ell_\parallel$ (anisotropy) but also $\lambda\ll\xi$ (alignment). In \figref{fig:3Deddies}, we show representative contours of 3D correlation functions (``statistical eddy shapes'') calculated in this frame both for Alfv\'enic and compressive fluctuations. They are very similar to what is measured in the solar wind \cite{chen12}: Alfv\'enic ``statistical eddies'' are ``pancakes'', or ``ribbons'', with $\lambda\ll\xi\ll\ell_\parallel$, while the compressive structures have a more tubular aspect.\footnote{Quantitatively, for the Alfv\'enic fields, we see a scaling of the aspect ratio (very approximately) consistent with $\lambda/\xi\propto\lambda^{1/4}$ \cite{boldyrev06,mallet16,mallet17a}, whereas for the compressive fluctuations, $\lambda/\xi$ has a noticeably shallower scaling with $\lambda$ (we do not measure these alignment scalings accurately at the resolution of our simulations). Thus, compressive fluctuations do appear to have a local 3D anisotropy and a tendency to form ribbons, but a weaker one than Alfv\'enic turbulence exhibits.} Thus, it appears that simulated collisionless compressive fluctuations bear significant resemblance to the measured ones, in a more detailed way than just having the same spectra---a reassuring fact. With the extraordinary velocity-space resolution afforded by the new MMS satellite, phase-space spectra have become measurable in space plasmas \cite{servidio17}. Thus, the prediction of steep Hermite spectra (\figref{fig:g_spec}) is a falsifiable one. More generally, considerations of phase-space turbulence can now be viewed as more than just theorizing about ``under-the-hood'' physics, for they deal with phenomena that are directly observable with available instruments. \subsection*{Implications for modelling techniques} As we mentioned in the introduction, there is a thriving industry of effective fluid models of collisionless plasmas, of which the most sophisticated strand is the ``Landau-fluid'' closures \cite{hammett90,hammett92,dorland93,beer96,snyder97,snyder01,passot04,sulem15,tassi16}. Their underlying idea is to assume that Landau damping removes free energy from low to high Hermite moments as effectively in a nonlinear system as in a linear one. This might appear to be the exact opposite of the main conclusion of this work. However, Landau-fluid models have consistently been found to work better when more---but not necessarily many more---moments are kept compared to the standard fluid approximation. It might be argued that the art of crafting a good Landau-fluid model is precisely to do it in such a manner as to capture the effect of the echoes within a minimal set of Hermite moments while setting the boundary (closure) condition at the maximum retained $m$ so as not to introduce or divert free-energy flows in a spurious way. With the echo effect and fluidization now explicitly part of one's intellectual vocabulary, one might hope to revisit this task with renewed vigor, purpose and insight. \subsection*{An implication for astrophysical theory} One cannot either adequately enumerate or, indeed, anticipate all of the instances across the vast canvas of plasma astrophysics where the nature of collisionless plasma turbulence may prove to be of interest. We wish to highlight one problem that has a long history \cite{rees82,narayan95,quataert99} and has recently seen a burst of activity (see \cite{kawazura18ie} and references therein). It is a long-standing question in the theory of matter accretion onto black holes whether, and to what degree, plasma turbulence that is excited in the accretion disk by instabilities driven by the Keplerian shear and helps enable accretion by transporting angular momentum, can be thermalized preferentially on ions, rather than electrons, or vice versa. This has implications for the relative amounts of energy radiated out by electrons (and thus observed) vs.\ swallowed by the black hole as mass (ions) is sucked in, as well as for observational signatures of disks and their jets \cite{ressler17,chael18}. Turbulent energy is split into Alfv\'enic and compressive cascades at MHD scales \cite{lithwick01,sch09}. Whereas at asymptotically low $\beta_i$, one can show that all of the compressive free energy must always thermalize into ions (this follows from the equations derived in \cite{zocco11}), how it is partitioned between ions and electrons at finite and high $\beta_i$ is a nontrivial question decided by the dynamics at the ion Larmor scale \cite{howes11prl,told15,kawazura18ie,parashar18}---and so how much of it arrives to this scale without being dissipated on its way through the inertial range is important. Our findings indicate that, at least at $\beta_i\sim1$, most of it does. Since the theory (or even a reliable modelling prescription) of energy partition in plasma turbulence is still to be developed, this is a useful factual constraint to have. \subsection*{Implications for general (plasma) physics} The peregrinations and rearrangements of energy through a system's phase space is a recurrent motif of theoretical physics. Turbulence theory is explicitly constructed to describe the energy's thermalization routes, which bridge the usually vast separations between its injection and dissipation scales, producing rich, multiscale nonlinear structure in the process. In weakly collisional plasmas, these energy-transfer routes lie in a 6D phase space, with velocity-space refinement (phase mixing) of the particles' distribution functions in general as effective as spatial mixing in accessing dissipation mechanisms \cite{sch09,eyink18}. It is perhaps noteworthy that, in the case of inertial-range turbulence of a magnetized plasma, one of these forms of mixing turns out unambiguously to be the winner: spatial advection outperforms phase mixing and makes a collisionless plasma resemble a collisional fluid. Those who believe in the universality of nonlinear dynamics might be pleased by such an outcome. For plasma physicists, this is a sobering reminder that collisionless dissipation processes that make our subject so intellectually distinctive are not irreversible until they are consummated by collisional entropy production---and an intriguing demonstration that nonlinear effects can sometimes hinder them in favor of more ``fluid-like'' entropy-production mechanisms. \acknow{We are grateful to T.~Adkins, T.~Antonsen, A.~Beresnyak, F.~Califano, B.~Chandran, S.~Cowley, P.~Dellar, G.~Hammett, E.~Highcock, Y.~Kawazura, N.~Loureiro, A.~Mallet, J.~Parker, C.~Staines, and L.~Stipani for many useful interactions on topics related to this project. This work was made possible thanks to the HPC resources of TGCC made available by GENCI (project A0010510117). W.D.\ and A.K.\ received support from US DoE (grants DE-FC02-04ER54784 and DE-FG02-93ER54197). The work of A.A.S.\ was supported in part by grants from UK STFC (ST/N000919/1) and EPSRC (EP/M022331/1). All authors gratefully acknowledge the hospitality of the Wolfgang Pauli Institute, Vienna, where some of this work was done.} \showacknow
\section{Introduction} Route choice is important in transport applications such as network equilibrium modelling, day-to-day route choice decisions, and route guidance. The literature describes various methods to model the route choice behaviour of travellers. They range from simple deterministic shortest route choice to sophisticated stochastic models in which random error terms capture travel time uncertainty and taste heterogeneity amongst travellers. Commonly, the route choice model is applied in an iterative process, for example, to reach equilibrium in a congested network or for en-route decisions. For large networks the number of times route choice has to be simulated is very high. Therefore, a good balance between realism and computational efficiency is required. \subsection{Random utility maximization} A common choice mechanism is that travellers consider multiple routes, assign a subjective utility to each route, and choose the route with the highest utility. The discrete choice framework based on random utility maximization (RUM) allows random components in the utility formulations. In this case the utility of each route follows some random distribution. Observe that a route consists of a set of links, and we assume that a route's utility is (among other things) determined by the characteristics of the corresponding links. Then the joint probability distribution of route utilities contains dependencies when routes have overlap, and thus share (dis)utility from the same link(s). Furthermore the distribution is heteroscedastic (i.e., the variability of utility differs amongst routes) since routes have different lengths. Section \ref{sec:rum} provides an in-depth analysis of desired random route utility properties, that especially explores the distribution of foreseen travel times besides the usual analyst error. This gives new insights into the variance and covariance structure of route utility. The Multinomial Probit (MNP) model for route choice \citep[see ][]{Daganzo01081977,Yai1997} can easily address correlation and heteroscedasticity, but no closed-form formulation of the route probabilities exists. The latter leads to computationally expensive simulations. On the other hand the Multinomial Logit (MNL) model for route choice \citep[see ][]{Daganzo01081977}\footnote{\citet[][Eqn. 10]{Daganzo01081977} are the first to present MNL route choice probabilities, based on the method of \citet{Dial197183}} has an elegant closed-form formulation for the route probabilities; however, route utilities have to be independent and homoscedastic. Extensions to mixed logit models \citep{Bekhor2002} are possible to overcome some of the limitations, however, these models again have to rely on numerical solution methods requiring simulations which are often infeasible on large scale networks. In addition, the thus far proposed covariance structures in MNP and mixed logit are not in line with revealed foreseen travel times; the \emph{variance} has been assumed proportional to the mean, whereas instead, data shows a linear relation between \emph{standard deviation} and mean (see Section \ref{sec:rum:lin}). Several adaptations to the MNL model exist to address correlation due to route overlap \citep{Prato2009}. They either insert a correction term into the utility, or exploit the more general Multivariate Extreme Value (MEV) distribution for the error term. In Section \ref{sec:instances} an overview of these methods is presented. The heteroscedasticity is less addressed in the literature. In practice, the scale parameter of MNL is sometimes considered to be proportional to the distance between origin and destination, but this does not address heteroscedasticity within the origin-destination (OD) route set \citep[see ][]{Chen2012}. Less pragmatic is the solution by \citet{Castillo2008373} who assume Weibull distributed utilities leading to the Multinomial Weibit (MNW) model. Only slightly different is the approach of \citet{Galvez2002,Fosgerau2009494} who use a multiplicative error term instead of an additive error term. The probabilities of the earlier-known Kirchhoff distribution of routes as presented by \citet{Fellendorf2010} also coincide with MNW. Recently, \citet{Kitthamkesorn2013} included the path-size factor into the MNW model to correct for correlation between routes. \subsection{Generalized Multivariate Extreme Value models} In this paper the state-of-the-art of models with closed-form utility formulations is reviewed, and they are gathered in a framework with a single, general form for the choice probabilities. Two classes of MEV can be identified -- each based on a different utility formula --, which are unified in what we call Generalized Multivariate Extreme Value (GMEV). The generalization gives rise to three undiscovered route choice models based on the multiplicative utility formula. Furthermore, we recall that equivalent MEV formulations exist for models in which a correction term is inserted in the utility formulation (e.g. Path-Size Logit). All these models can therefore be captured in the GMEV framework based on either additive or multiplicative utility formulas. Section \ref{sec:qualassess} assesses these models qualitatively by analysing their distributions and comparing them with the desired properties formulated in Section \ref{sec:rum:req}. Additive models prove not to be able to capture random foreseen travel time, but they do capture the analyst error. On the other hand, multiplicative models can handle both errors, but based on the same distribution (i.e., the foreseen travel time and analyst error are completely dependent). One of the desired properties cannot be fulfilled by any existing model. Namely, in a transport network model the route choice model is applied to many route sets, so it is important that the model gives realistic results for all route sets existing in a network. In particular, the results should remain realistic when the network and/or routes change. With respect to this, both MNL and MNW have an undesired property. In MNL, the route probabilities will remain equal if a constant is added to each route's utility. In MNW, the route probabilities will remain equal if each route's utility is multiplied with a constant. Both these properties are unrealistic. Therefore, \citet{Xu2015} provide a hybrid method where the choice probabilities have a MNL en MNW component; however, this hybrid method stems from a combined impedance function (i.e., it defines the choice probabilities based on the choice probability functions of logit and weibit). Although the model can be useful in practice, the model does not stem from a utility formulation with an additive and multiplicative error term (Section \ref{sec:hybrid} discusses how the hybrid models would fit in the \ensuremath{\text{GMEV}}\ framework). To partially overcome the shortcomings of MNW, we introduce new \ensuremath{\text{GMEV}}\ route choice models based on the multiplicative utility formula and a reference route. The probability of choosing the reference route only depends on the non-overlapping differences with other routes, since the overlap is explicitly removed. The models fit in the same framework as the existing models. Furthermore, they are designed to be suitable under changing networks and routes. A qualitative assessment and a numerical benchmark on a small network example of the existing and new models show that the new models can resemble expected behaviour under more types of network changes than existing closed-form models can. For example, the model performs well if all route costs are multiplied with a factor, but also if a constant cost is added to all routes. \subsection{Route set generation} This paper assumes that a relevant route set is explicitly given. For an overview of route set generation techniques, see \citet{Frejinger2009984,Prato2012}. However, it should be noted that the generation and composition of the route set has a large influence on model outcomes \citep{bliemertrr2008,Cascetta2002,Prato2012}. Another disadvantage with explicit route sets is that a correct sample of routes is required to obtain unbiased parameter estimates \citep{Frejinger2009984}. For discussions on sampling routes based on distributions derived from route choice models see \citep{Frejinger2009984,Flotterod2013,Guevara2013}. \citet{Bierlaire2008381} points out difficulties with selection bias in the estimation of additive MEV models from choice based samples. A recently revisited different approach -- that overcomes route set generation/sampling related problems -- is to implicitly generate routes as done by \citet{Dial197183,Papola2013CACIE,Fosgerau201370,Mai2015}. However, these models either have a restricted route set \citep{Dial197183,Papola2013CACIE} (see Section \ref{sec:jointnetwork}), or contain all routes, even those with loops \citep{Fosgerau201370,Mai2015}. In addition, no methods with implicit choice set generation that can handle non-additive travel costs are known to exist by the authors of this paper. Since explicit finite route sets have practical advantages, they are commonly used in traffic assignment models to either avoid too computationally expensive (dynamic) shortest-path calculations, to allow dynamic network loading of path flows, or to allow for traffic assignment models with non-additive link costs. For example, \citet{Zhou2015} generates an a-priori route set in a static assignment context using the deterministic method of \citet{Bekhor2006}, \citet{tr-b14} generates an a-priori route set for a quasi-dynamic model using the stochastic method of \citet{Fiorenzo2004}. \subsection{Contribution} The contribution of this paper is summarized as follows. First, we describe the desired properties of random route utility which includes random foreseen travel times, and empirically verify the linear relation between mean and standard deviation of foreseen travel time. Second, existing closed-form route choice models based on random utility maximization are presented in a novel \ensuremath{\text{GMEV}}\ framework and it is shown that all existing closed-form models with explicit choice sets fit in the \ensuremath{\text{GMEV}}\ framework. Third, the unexplored area of multiplicative MEV models gives rise to three new closed-form route choice models, and the proposed multiplicative MEV models based on a reference route give rise to another four new closed-form route choice models. The working of this model is illustrated with a small network example, and its behaviour with respect to network changes is compared to the behaviour of existing models. Fourth, we show that the additive models, contrary to multiplicative models, can not capture random foreseen travel time. Fifth, we show the strength of a unified GMEV model by providing its stochastic user equilibrium formulation. Sixth, all twelve models (of which seven are new) are estimated on a carefully constructed small network example with multiple choice sets for origin-destination pairs with both short and long distances. The estimation is done twice with two different synthetic datasets generated by MNP simulations based on the desired properties of random route utility, this allows benchmarking the models on the other dataset. The benchmark provides insight in the performance of the model if its applied on different networks, without re-estimation. Overall, when the models are estimated on one synthetic dataset and validated on the other synthetic dataset, the new models based on reference routes have a better validation than existing models. They can better approximate -- without simulations -- the MNP probabilities that take, amongst others, heteroscedasticity and correlation into account. \section{Random Route Utility Formulation}\label{sec:rum} The random utility maximisation (RUM) framework is commonly used for describing route choice. Each route alternative is associated with some utility and the traveller is assumed to choose the route that provides the maximum expected utility. Since utility is not directly observable, analysts typically assume a structure of utility that includes measurable components and random terms that describe unmeasurable components. This section provides a route utility formulation with random foreseen travel times, that is used in Section \ref{sec:qualassess} to assess the GMEV models. Let $R$ denote the set of relevant routes between a certain origin-destination (OD) pair. The systematic utility $V_r$ for a route $r\inR$ is decomposed in a part based on travel time ${\ensuremath{\tau}}_r$, and `other' systematic utility $V^0_r$, thus $V_r=V^0_r+\beta{\ensuremath{\tau}}_r$, where ${\ensuremath{\tau}}_r$ is a random variate representing foreseen travel time, $\beta$ is the travel time parameter. Then we write the random utility for route $r\inR$ as\footnote{The OD pair and individual are not indexed since they are not relevant for this study and omitting them makes the formulas more readable.}, \begin{equation} \label{eqn:U} U_r=V_r+\varepsilon_r=V^0_r+\beta{\ensuremath{\tau}}_r+\varepsilon_r, \end{equation} where $\varepsilon_r$ is the analyst error. $V^0_r$ is assumed to be deterministic and can contain all route attributes other than the foreseen travel time, such as travel distance, running cost, number of traffic lights encountered, number of left turns, travel time variability, etc. Typical random component $\varepsilon_r$ includes attributes that are considered by travellers when choosing their routes, but that are not included in $V^0_r+\beta{\ensuremath{\tau}}_r$. Since the analyst does not have perfect knowledge on how the traveller gathers information about its travel time, we explicitly consider foreseen travel time as a random distribution ${\ensuremath{\tau}}_r$ in this work. In addition, travellers can have different preferences with respect to travel time and they do not perfectly measure the actual values of the attribute levels, but rather have a subjective perception that deviates from the actual values. Denote the analyst's estimate of foreseen travel time with $\hat{\ensuremath{\tau}}_r$, which generally does not consider all conditions (e.g., exact departure time, weather, information sources) the traveller is aware of. The deviation between the actual and estimate of foreseen travel time is typically larger for longer trips (see next Section). For example, when asking a traveller about the travel time of a recent short trip, his or her expectation may be off by one or two minutes, while for a long trip the expectation may be off by 10 minutes or more. We would like to point out that the foreseen travel time distribution does not capture travellers' disproportionate resilience towards high travel time variability, which can be captured by an (un)reliability term in $V^0_r$. The utility in Equation (\ref{eqn:U}) is very general since the analyst can include any attribute in $V^0_r$, and the, in our opinion, two most important sources of randomness for route utility are captured. Extension for errors around other terms in the systematic utility can be made in a straightforward fashion. We focus in this paper on the foreseen travel time because it is the most important factor in route choice. In addition, data is available to support assumptions on its structure. Both ${\ensuremath{\tau}}_r$ and $\varepsilon_r$ are random variables and are described by probability distributions. A common assumption for analyst errors $\varepsilon_r$ is that they are independently and identically distributed (i.i.d.). The next section discusses the foreseen travel time distribution in more detail. Since ${\ensuremath{\tau}}_r$ and $\varepsilon_r$ capture different sources of randomness, they can be considered independent, i.e. $\Covar({\ensuremath{\tau}}_r,\varepsilon_r)=0$ for all $r\in R$. \subsection{Structure of foreseen travel time}\label{sec:rum:lin} Consider two similar road segments with lengths respectively 1 and 5 kilometres, and suppose the distribution of foreseen travel times for the 1-km road segment is known. There are two natural ways to determine the foreseen travel time distributions of the 5-km road segments by, which impose different relations between their means and variances. The first method -- used in all previous Probit studies \citep[e.g., ][]{Yai1997,Daganzo01081977} -- is based on link-additivity and postulates that the foreseen travel time of the 5-km road segment is equally distributed as the sum of foreseen travel times of five independent 1-km road segments. This implies for each set of road segments for which the \emph{additivity postulate} holds, that the ratio between the mean and the \emph{variance} is equal for each segment. Link-additivity is convenient in transport networks, since overlap and heteroscedasticity of routes can automatically be captured when the normal distributed travel costs are drawn for each link and then summed per route. The second method is based on scaling and postulates that the foreseen travel time of the 5-km road segment is equally distributed as five times the foreseen travel time of one 1-km road segment. This implies for each set of road segments for which the \emph{scaling postulate} holds, that the ratio between the mean and the \emph{standard deviation} is equal for each segment. Furthermore, the convenience of link-additivity does not apply under the scaling postulate. When an analyst wants to specify means and variances of foreseen travel times of routes, these two postulates each imply a different structure. Under the natural assumption that the mean equals the analyst's estimate $\hat{\ensuremath{\tau}}_r$, the variance is linear in $\hat{\ensuremath{\tau}}_r$ under the linear-additivity postulate and quadratic in $\hat{\ensuremath{\tau}}_r$ under the scaling postulate. In order to examine which postulate is more plausible, we first analyse the relationship between mean travel times and standard deviation of travel times in two datasets, and then discuss findings in the literature related to the postulates. \begin{figure} \includegraphics[width=\textwidth]{scatterMunPC3.pdf} \caption{Relation between the average and the standard deviation of revealed perceived travel times for an OD pair, shown for 216 postcode OD pairs and 686 municipality OD pairs from Dutch national travel survey data. Linear regression between mean and standard deviation has a R-square of 0.9379. Linear regression between mean and variance has a R-square of 0.8016. The linear regression line has slope 0.3859.} \label{fig:TTscatter} \end{figure} \begin{figure} \begin{center} \includegraphics{scatterSurveyPP.pdf} \end{center} \caption{Relation between the average and the standard deviation of foreseen travel times for a route from a respondent, shown for 21 routes from 19 respondents from trips between Delft and The Hague. The marker size is proportional to the number of entries per route. Linear regression between mean and standard deviation has an R-square of 0.9300. Linear regression between mean and variance has an R-square of 0.8401. The linear regression line has slope 0.1301.} \label{fig:TTscatterSurvey} \end{figure} We have analysed household travel survey data from the Netherlands for the years 2010, 2011, and 2012 (Onderzoek Verplaatsingen in Nederland, OViN). In this survey, travellers are asked to state the travel times from trips they have made during a single day. We pooled data from trips with motorised private vehicles (i.e., car-driver, car-passenger, and motor bicycle) per 4-digit postal code and municipality\footnote{The four large municipalities Amsterdam, Utrecht, The Hague and Rotterdam are subdivided in respectively 7, 3, 5 and 5 districts.}. After excluding OD pairs with less than 25 observations we obtained 686 municipality aggregated OD pairs and 216 postal code aggregated OD pairs containing 38,106 and 8,079 trips, respectively. Figure \ref{fig:TTscatter} shows the relationship between the average travel time and the standard deviation of the perceived travel times for each OD pair. The data shows a strong correlation and a linear relation between the average travel time and the standard deviation of travel time. Under the assumption that the traveller had complete information, the perceived travel time and foreseen travel time coincide, and the data is then in accordance with the scaling postulate. Clearly, the spread in reported travel times here is also the result of variations in traffic conditions and travel demand, routing, and aggregation of different households in each OD pair. Unfortunately, we do not have the exact data on the foreseen travel time per route in the household travel surveys; however, we do have data from another smaller study about route choice and information. This second data set comes from a study where 32 commuters between The Hague and Delft in the Netherlands were asked about the used information sources \citep[see ][]{Ramos2012revealed,Ramos2015thesis}. Some of them were equipped with GPS devices for real-time information. After every trip they made, they were asked to indicate what their expected route and foreseen travel time for their next trip are. We aggregated this data per route per respondent, and determined the mean and standard deviation for all routes with at least 10 entries. In total 407 entries for 21 routes from 19 respondents\footnote{Two respondents reported two routes at least 10 times; 17 other respondents reported one route at least 10 times.} are used for the results in Figure \ref{fig:TTscatterSurvey}. This dataset also indicates a linear relationship between the average and standard deviation. Thus both datasets indicate that the scaling postulate is more plausible than the additivity postulate. \citet{MahmassaniTRR12} investigate travel time variability based on GPS and simulated trajectories and they conclude that a linear relation exists between the standard deviation of observed travel times and the average travel times. They furthermore reject a square root and quadratic relation. \citet{MahmassaniTRR13} provide the same conclusion at a network level, rather than just at link level. \citet{fosgerau2010relation} and \citet{yildirimoglu2013exploring} use data on time-of-day dependent relations between mean and standard deviation to show hysteresis. Their plots also strongly suggest a linear relation. Furthermore, \citet{hellinga2012} took a year of measurements from loop detector data on a motorway and aggregated each day into 15-minute averages. They also show a strong linear relationship between the standard deviation of the observed travel times and the average travel times. Despite that none of these studies analysed \emph{foreseen} travel time distributions, they all indicate that the scaling postulate holds for their travel times. These results, the OViN data, and the actual foreseen travel time data, should convince that the scaling postulate is more plausible than the additivity postulate for distributions of foreseen route travel times. Write $\stdev({\ensuremath{\tau}}_r)$ as the standard deviation of foreseen travel time. Let this standard deviation be proportional to $\hat {\ensuremath{\tau}}_r$ with proportionality constant $\theta$, then $\stdev({\ensuremath{\tau}}_r)=\theta\hat{{\ensuremath{\tau}}_r}$ This finding contradicts the assumptions for MNP route choice models made by \citet{Daganzo01081977} and \citet{Yai1997}. Their assumption of a linear relationship between the variance of travel times and $\hat {\ensuremath{\tau}}_r$, stems from the additivity postulate. In these models it is practical that route travel time can be readily obtained from the summation of normal distributed link travel times, but this seems to be unrealistic. It is possible to adjust the MNP-model to make it compatible with the scaling postulate by directly determining the (co)variance-matrix for all routes. However, this comes at the cost of link-additivity. \subsection{Covariances of foreseen travel times} Since routes may overlap, foreseen travel times are correlated. Route overlap induces a structure of covariances between travel times. This means that if two routes are largely overlapping, then also the foreseen travel time of both routes should be almost identical. Consider two routes, $r,s \in R$. Let $\hat {\ensuremath{\tau}}_r=\hat{\ensuremath{\tau}}_{rs}+\hat{\ensuremath{\tau}}_{r\setminus s}$ be the decomposed travel time estimates of route $r$, where $\hat{\ensuremath{\tau}}_{rs}$ is the overlapping part with route s, and $\hat{\ensuremath{\tau}}_{r\setminus s}$ the non-overlapping part. The covariance between ${\ensuremath{\tau}}_r$ and ${\ensuremath{\tau}}_s$ should capture the overlap. We propose two candidate formulations for the covariance. One based on a correlation formulation derived from the literature, and one based on variance distribution over links. The approaches from \citet{Daganzo01081977,Yai1997,Bekhor2002} rely on the additivity postulate, and the additivity over links leads to a definition of covariances. Under the scaling postulate these covariances are not directly usable due to the different relation between mean and standard deviation. However, the corresponding correlation, $\hat{\ensuremath{\tau}}_{rs}/\sqrt{\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_s}$, is independent of any relationship between mean and standard deviation, and can be used together with $\stdev({\ensuremath{\tau}}_r)=\theta\hat{\ensuremath{\tau}}_r$. Then from the definition of correlation it follows that \begin{align} \text{Corr}({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)&=\frac{\hat{\ensuremath{\tau}}_{rs}}{\sqrt{\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_s}}=\frac{\Covar({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)}{\stdev({\ensuremath{\tau}}_r)\stdev({\ensuremath{\tau}}_s)}\\ &\Downarrow\nonumber\\ \Covar({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)&=\theta^2\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_s\frac{\hat{\ensuremath{\tau}}_{rs}}{\sqrt{\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_s}}=\theta^2\hat{\ensuremath{\tau}}_{rs}\sqrt{\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_s}.\label{eqn:covGm} \end{align} An alternative formulation of the covariance can be obtained by using the definition $\Var({\ensuremath{\tau}}_r-{\ensuremath{\tau}}_s)=\Var({\ensuremath{\tau}}_r)+\Var({\ensuremath{\tau}}_s)-2\Covar({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)$ and an approximation of variance of the non-overlapping parts of travel time. Under the assumption that a route's variance is equally `distributed' over the total travel time and that ${\ensuremath{\tau}}_r$ can be decomposed in independent parts, ${\ensuremath{\tau}}_r={\ensuremath{\tau}}_{rs}+{\ensuremath{\tau}}_{r\setminus s}$, the variance associated with the non-overlapping part equals \begin{equation} \Var({\ensuremath{\tau}}_{r\setminus s})=\frac{\hat{\ensuremath{\tau}}_{r\setminus s}}{\hat{\ensuremath{\tau}}_r}\Var({\ensuremath{\tau}}_r)=\frac{\hat{\ensuremath{\tau}}_{r\setminus s}}{\hat{\ensuremath{\tau}}_r}\theta^2\hat{\ensuremath{\tau}}_r^2=\theta^2\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_{r\setminus s}. \end{equation} Then the covariance equals \begin{align} \Covar({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)&=\frac{1}{2}\left(\Var({\ensuremath{\tau}}_r)+\Var({\ensuremath{\tau}}_s)-\Var({\ensuremath{\tau}}_r-{\ensuremath{\tau}}_s)\right)\\ &=\frac{1}{2}\left(\Var({\ensuremath{\tau}}_r)+\Var({\ensuremath{\tau}}_s)-\Var({\ensuremath{\tau}}_{r\setminus s}-{\ensuremath{\tau}}_{s\setminus r})\right)\\ &=\frac{1}{2}\theta^2\left(\hat{\ensuremath{\tau}}_r^2+\hat{\ensuremath{\tau}}_s^2-\hat{\ensuremath{\tau}}_r\hat{\ensuremath{\tau}}_{r\setminus s}-\hat{\ensuremath{\tau}}_s\hat{\ensuremath{\tau}}_{s\setminus r}\right)\\ &=\frac{1}{2}\theta^2\left(\hat{\ensuremath{\tau}}_r(\hat{\ensuremath{\tau}}_r-\hat{\ensuremath{\tau}}_{r\setminus s})+\hat{\ensuremath{\tau}}_s(\hat{\ensuremath{\tau}}_s-\hat{\ensuremath{\tau}}_{s\setminus r})\right)\\ &=\theta^2\hat{\ensuremath{\tau}}_{rs}\frac{\hat{\ensuremath{\tau}}_r+\hat{\ensuremath{\tau}}_s}{2}.\label{eqn:covAm} \end{align} Notice that the covariance formulations of Equations (\ref{eqn:covGm}) and (\ref{eqn:covAm}) are respectively based on the geometric mean and arithmetic mean of travel times $\hat{\ensuremath{\tau}}_r$ and $\hat{\ensuremath{\tau}}_s$. Note that although we base the covariance on the travel time and its overlap, it is also possible to define it based on overlap of distance or total systematic utility. \subsection{Desired choice model properties}\label{sec:rum:req} In summary, the assumptions on the error terms and the utility formulation in Equation (\ref{eqn:U}) determine the expected value, variance and covariance of the utility. \begin{itemize} \item The expected value of utility of route $r\in R$ is \begin{align} \E (U_r)&=\E \left(V^0_r+\beta{\ensuremath{\tau}}_r+\varepsilon_r\right),\\ &=\E \left(V^0_r\right)+\E \left(\beta{\ensuremath{\tau}}_r\right)+\E \left(\varepsilon_r\right),\\ &=V^0_r+\beta\hat{\ensuremath{\tau}}_r+\E \left(\varepsilon_r\right). \end{align} \item The variance of the utility of route $r\in R$ is \begin{align} \Var (U_r)&=\Var \left(V^0_r+\beta{\ensuremath{\tau}}_r+\varepsilon_r\right),\\ &=\Var \left(V^0_r\right)+\Var \left(\beta{\ensuremath{\tau}}_r\right)+\Var \left(\varepsilon_r\right),\\ &=\theta^2\hat{\ensuremath{\tau}}_r^2+\Var \left(\varepsilon_r\right). \end{align} \item The covariance between routes $r,s\in R$, $\Covar (U_r,U_s)=\Covar ({\ensuremath{\tau}}_r,{\ensuremath{\tau}}_s)$, equals either Equation (\ref{eqn:covGm}) or (\ref{eqn:covAm}). \end{itemize} Furthermore, when the route choice model is part of a transport network model, the following properties are desired: \begin{itemize} \item applicability to and compatibility between all types of (changing) networks, including those with OD pairs with short and long distances, and including those with changing differences and ratios between routes; \item closed-form probabilities to avoid computationally expensive simulations; \item capture correlations due to overlap. \end{itemize} \section{Random Route Utility Maximization models with Generalized Multivariate Extreme Value distributions} In this section an overview is given of choice models that are applicable for routes based on random utility maximization (RUM) with closed-form expressions for the probabilities. This implies that MNP, Mixed Logit, and models with an error correction component (e.g., Logit kernel) are not considered; we refer to \citep{Prashker2004,Frejinger2006_905} for an overview of these simulation based models. However, since the MNP model is capable of completely capturing both the analyst error and the random foreseen travel time (and thus heteroscedasticity and correlation)\footnote{Note that we use an adjusted MNP (compared to the literature) that is in line with the (co)variances under the scaling postulate.}, we will use MNP simulated data as ground truth in the illustrative example in Section \ref{sec:network}. The existing models are all based on a single random variable, which should approximate both the analyst error and travel time distribution; Section \ref{sec:qualassess} answers to which degree this is possible. In this section the family of distributions will be deduced from RUM models with separable systematic and random utility components (i.e., $U_r$ can be written as a function of $V_r$ and $\varepsilon_r$). This leads to two types of Extreme Value (EV) models. First consider the additive utility formula $U_r=V_r+\varepsilon_r, \forall r\inR,$ where $\left(\varepsilon_1,\ldots,\varepsilon_{|R|}\right)$ is Multivariate Extreme Value (MEV) distributed \citep{McFadden1978}; these models fall in the EV type I (Gumbel) category. Second, consider the multiplicative utility formula $U_r=V_r\varepsilon_r, \forall r\inR$ and assume that $\left(-\ln\varepsilon_1,\ldots,-\ln\varepsilon_{|R|}\right)$ is MEV distributed \citep{Galvez2002,Fosgerau2009494}; these models fall in the EV type III (reversed Weibull) category. The EV type II (Fr\'{e}chet) is not suitable for route choice since Fr\'{e}chet distributions have a lower bound on its support (i.e., there is a maximum on the route cost/travel time if such a model existed). The Generalized Multivariate Extreme Value (GMEV) models consist of both the additive and multiplicative MEV models. Note that in older literature the MEV models were also named GEV. GEV is a family of univariate distributions consisting of Gumbel, Fr\'{e}chet and reversed Weibull. An MEV distribution is the joint distribution of multiple random variables with marginal distribution from one GEV type. MEV type I was discovered first by \citet{McFadden1978} under the name `The Generalized Extreme Value model'. Other parametric approaches -- not based directly on separable RUM -- also exist. In \citep{Castillo2008373,Li2011,Nakayama2013753,Nakayama2015,Chikaraishi2015} utilities $U_r, \forall r\inR$ are independently Generalized Extreme Value (GEV) distributed. \citet{Li2011} captures even a larger class of models, with independent route utilities. \citet{Fosgerau20131} and \citet{Mattsson2014} provide the largest class of parametric approaches, where dependencies can be included as well. Note that all these models cannot be decomposed in systemtic and random components\footnote{Except for their specific cases where they fit in the \ensuremath{\text{GMEV}}\ type.}. They directly parametrize the utility's probability distributions which is less explainable in behavioural terms. The exception is the derivation of the revised q-generalized logit model by \citet{Chikaraishi2015} from the q-product function. \subsection{The two types of Multivariate Extreme Value distributions} MEV distributions are very flexible since they allow for correlation between their variables. Generating functions are the core of MEV distributions and unfortunately these are not easily interpretable, making the theory rather complex. It is well-known that MEV type I models capture the MNL, Paired Combinatorial Logit (PCL) and Link-Nested Logit (LNL) models, but it is less known that C-Logit, Path-Size Logit (PSL) and Path-Size Correction Logit belong to the MEV family. It is convenient that the latter models also fit in the generic framework since general results can be applied to them. All these mentioned `logit based' models have an additive utility formula, so first the MEV derivation for this additive case is presented. Thereafter, the multiplicative MEV models are derived, and we show how they both fit in the GMEV framework. \subsubsection{Additive MEV models} The additive utility formula is $U_r^\ensuremath{\text{A}}=V_r+\varepsilon^\ensuremath{\text{A}}_r, \forall r\inR$. Define the probability of choosing route $r\in R$ as \begin{align} P_r^\ensuremath{\text{A}}:= & \text{P}\left(U_r^\ensuremath{\text{A}}\geq U_p^\ensuremath{\text{A}}, \quad \forall p\neq r\right) \label{eqn:prob}\\ = & \text{P}\left(V_r+\varepsilon_r^\ensuremath{\text{A}}\geq V_p+\varepsilon_p^\ensuremath{\text{A}}, \quad \forall p\neq r\right).\label{eqn:Aprob} \end{align} Following \citet{McFadden1978}, assume that the joint distribution of $\left(\varepsilon_1^\ensuremath{\text{A}},\ldots,\varepsilon_{|R|}^\ensuremath{\text{A}}\right)$ follows MEV type I distribution $\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}$ with cumulative distribution function \eqn{\label{eqn:addErrorDistr} F_{\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}}(x_1,\ldots,x_{|R|})=e^{-G(e^{-x_1},\dots,e^{-x_{|R|}})}, } where \emph{generating function} $G:\mathbb{R}^{|R|}\rightarrow\mathbb{R}$ satisfies \begin{itemize} \item $\mu$-homogeneity: \eqn{G(a z_1,\ldots,a z_{|R|})=a^\mu G(z_1,\ldots,z_{|R|}), \quad \forall a>0\label{eqn:muhom}} \item Limit property: \eqn{\lim_{z_r\rightarrow\infty}G(z_1,\ldots,z_{|R|})=\infty, \quad\forall r\inR} \item Alternating signs: \eqn{ \frac{\partial^{|\hatR|}G(z_1,\ldots,z_{|R|})}{\prod_{r\in\hat{R}}\partial z_r}(-1)^{|\hatR|-1}\geq 0,\quad \forall \hat R \subseteq R, \hat R \neq \emptyset .\label{eqn:altsign}} \end{itemize} The alternating signs property means that the sign of $G$ switches every time an additional distinct partial derivative is taken. The generating function needs to satisfy the properties in order for $F_{\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}}$ to be a well-defined multivariate cumulative distribution function. With this utility formulation and distribution the following closed-form choice probabilities can be derived: \begin{align} P_r^\ensuremath{\text{A}} =& \text{P}\left(U_r^\ensuremath{\text{A}}\geq U_p^\ensuremath{\text{A}}, \quad \forall p\neq r\right)\nonumber\\ =&\frac{y_r^\ensuremath{\text{A}} G_r(y_1^\ensuremath{\text{A}},\ldots,y_{|R|}^\ensuremath{\text{A}})}{\mu G(y_1^\ensuremath{\text{A}},\ldots,y_{|R|}^\ensuremath{\text{A}})},\label{eqn:AMEVprob} \end{align} where $G_r(x_1,\ldots,x_{|R|})=\frac{\partial G(x_1,\ldots,x_{|R|})}{\partial x_r}$ and $y_r^\ensuremath{\text{A}}=e^{V_r},\forall r\inR$. More details on the generating function and the derivation of the choice probabilities can be found in \citep{McFadden1978}. By using Euler's homogeneous function theorem Equation (\ref{eqn:AMEVprob}) can be rewritten as \begin{align} P_r^\ensuremath{\text{A}} =&\frac{y_r^\ensuremath{\text{A}} G_r(y_1^\ensuremath{\text{A}},\ldots,y_{|R|}^\ensuremath{\text{A}})}{\sum_{p\inR}y_p^\ensuremath{\text{A}} G_p(y_1^\ensuremath{\text{A}},\ldots,y_{|R|}^\ensuremath{\text{A}})}\label{eqn:AMEVprob2} \\ =&\frac{e^{V_r}G_r(e^{V_1},\ldots,e^{V_{|R|}})}{\sum_{p\inR}e^{V_p} G_p(e^{V_1},\ldots,e^{V_{|R|}})}\\ =&\frac{e^{V_r+\ln G_r(e^{V_1},\ldots,e^{V_{|R|}})}}{\sum_{p\inR}e^{V_p+\ln G_p(e^{V_1},\ldots,e^{V_{|R|}})} }\label{eqn:AMEVprobeasy} \end{align} Since the denominator is independent of $r$ and the formulation is similar to that of MNL, the probabilities provided in Equation (\ref{eqn:AMEVprobeasy}) are the easiest to interpret. In the remainder of this paper the formulations of Equations (\ref{eqn:AMEVprob}) and (\ref{eqn:AMEVprob2}) will be used because in the multiplicative case only the definition of the $y_r^\ensuremath{\text{A}}$'s will change, and these can then be substituted easily. For a route set $R$ the combination of a generating function $G$ and a \emph{generating vector} $\boldsymbol{y}=(y_1,\ldots,y_{|R|})$ completely determines choice probabilities with Equation (\ref{eqn:AMEVprob}). In other words, the route set, the generating function and the generating vector completely specify a choice model. Therefore, we can write the choice probabilities as a function of the generating function and generating vector for all types of \ensuremath{\text{GMEV}}\ models. For a choice model $X$ applied on route set $R$ with $\mu$-homogeneous generating function $G^X$ and generating vector $\boldsymbol{y}^X$, we can write the probability of choosing route $r$ as \eqn{ P_r^X(G^X;\boldsymbol{y}^X):= \frac{y_r^XG_r^X(\boldsymbol{y}^X)}{\mu G^X(\boldsymbol{y}^X)},\quad \forall r\in R.\label{eqn:Gprobs} } Note that for the additive utility formula the generating vector is always equal to the exponentials of systematic utilities. Therefore define $\ensuremath{\y^\text{A}}:=(e^{V_1},\ldots,e^{V_{|R|}})$ as the \emph{additive generating vector}. This additive generating vector should be used for all MEV models with an additive utility form, thus the generating function then defines choice probabilities. \subsubsection{Multiplicative MEV models} Before we present examples of the generating function, we first examine the multiplicative utility formula. \citet{Fosgerau2009494} are the first to explore this field. In their analysis, the multiplicative formulation is transformed into an equivalent additive formulation. The analysis presented here is slightly different because we allow more flexibility on the scale parameter. The models in \citep{Castillo2008373,Nakayama2013753,Kitthamkesorn2013} yield similar results for specific instances of generating functions, but the utility is not purely the product of systematic utility and an error term; instead, the utility is directly parametrized. The multiplicative utility formula is \eqn{ U_r^\ensuremath{\text{M}}=V_r\varepsilon_r^\ensuremath{\text{M}},\quad \forall r\inR, } where $V_r< 0$ and $\varepsilon_r^\ensuremath{\text{M}} \geq 0$. This domain of the systematic utility is more restrictive than for additive MEV; however, in the route choice context it is natural that route costs are valued negatively, yielding negative systematic utility. By applying a log-transformation to Equation (\ref{eqn:prob}) and some further algebra, we can derive the probability of choosing route $r\inR$ as: \begin{align} P_r^\ensuremath{\text{M}}=&\text{P}\left(V_r\varepsilon_r^\ensuremath{\text{M}}\geq V_p\varepsilon_p^\ensuremath{\text{M}}, \quad \forall p\neq r\right)\label{eqn:MultAddStart}\\ =&\text{P}\left(-V_r\varepsilon_r^\ensuremath{\text{M}}\leq -V_p\varepsilon_p^\ensuremath{\text{M}}, \quad \forall p\neq r\right)\\ =&\text{P}\left(\ln \left(-V_r\varepsilon_r^\ensuremath{\text{M}}\right)\leq\ln\left( -V_p\varepsilon_p^\ensuremath{\text{M}}\right), \quad \forall p\neq r\right)\label{eqn:lntf}\\ =&\text{P}\left(\ln \left(-V_r\right)+\ln\left(\varepsilon_r^\ensuremath{\text{M}}\right)\leq\ln\left( -V_p\right)+\ln\left(\varepsilon_p^\ensuremath{\text{M}}\right), \quad \forall p\neq r\right)\\ =&\text{P}\left(-\ln \left(-V_r\right)-\ln\left(\varepsilon_r^\ensuremath{\text{M}}\right)\geq-\ln\left( -V_p\right)-\ln\left(\varepsilon_p^\ensuremath{\text{M}}\right), \quad \forall p\neq r\right)\label{eqn:MultAdd} \end{align} Equation (\ref{eqn:MultAdd}) has the same structure as the choice probabilities in Equation (\ref{eqn:Aprob}) of the additive choice model with systematic utilities $\tilde V_r = -\ln \left(-V_r\right), \forall r\inR$ and error terms $\tilde \varepsilon_r^\ensuremath{\text{A}}=-\ln\left(\varepsilon_r^\ensuremath{\text{M}}\right)$. Therefore, we can apply the theory of the additive MEV with these variable substitutions. So in the multiplicative case, $\left(-\ln\varepsilon_1^\ensuremath{\text{M}},\ldots,-\ln\varepsilon_{|R|}^\ensuremath{\text{M}}\right)$ follows MEV type I distribution $\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}$ (i.e., $(\varepsilon_1^\ensuremath{\text{M}},\ldots,\varepsilon_{|R|}^\ensuremath{\text{M}})$ is not similar to $\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}$!), this distribution of $(\varepsilon_1^\ensuremath{\text{M}},\ldots,\varepsilon_{|R|}^\ensuremath{\text{M}})$ is called MEV type III. This is a multivariate distribution whose marginal distributions are of type reversed Weibull, and inherits the covariance structure from the generating function. So, it is the reversed Weibull equivalent of the model of \citet{McFadden1978}. Note that all generating functions can be applied on both types. The \emph{multiplicative generating vector}, denoted with $\ensuremath{\y^\text{M}}$, is derived from the additive generating vector and becomes \eqn{ \ensuremath{\y^\text{M}}=\left(e^{\tilde V_1},\ldots,e^{\tilde V_{|R|}}\right)=\left(e^{-\ln \left(-V_1\right)},\ldots,e^{-\ln \left(-V_{|R|}\right)}\right)=\left(\frac{-1}{V_1},\ldots,\frac{-1}{V_{|R|}}\right). } The probabilities of models with multiplicative utility formulas can be derived from Equation (\ref{eqn:Gprobs}) by simply using the multiplicative generating vector $\ensuremath{\y^\text{M}}$. By applying Euler's homogeneous function theorem again we can get \eqn{ P_r=\frac{\frac{-G_r(-1/V_1,\ldots,-1/V_{|R|})}{V_r}}{\sum_{p\inR}\frac{-G_p(-1/V_1,\ldots,-1/V_{|R|})}{V_p}} ,} but the form of Equation (\ref{eqn:Gprobs}) using $\ensuremath{\y^\text{M}}$ is preferred. The main advantage of the multiplicative utility formula is that the utilities are automatically heteroscedastic. The standard deviation of the utility is proportional with the systematic utility and thus even the multiplicative equivalent of MNL is heteroscedastic. A well-known property of additive models is that the probabilities are invariant under addition of a constant to all systematic utilities. Therefore, only differences in utilities matter in the MNL model. Analogously, the multiplicative models are invariant under multiplying all systematic utilities with the same factor (mini-proof: If $\lambda V_r\varepsilon_r^\ensuremath{\text{M}}\geq \lambda V_p\varepsilon_p^\ensuremath{\text{M}}$ then $V_r\varepsilon_r^\ensuremath{\text{M}}\geq V_p\varepsilon_p^\ensuremath{\text{M}}$), and only ratios between utilities matter in the multiplicative equivalent of MNL. In Section \ref{sec:qualassess} its properties are further analysed. \subsubsection{Hybrid approach}\label{sec:hybrid} \citet{Xu2015} introduce a hybrid model directly derived from the logit and weibit choice probability functions. This model inherits characteristics of as well logit as weibit. The model uses two scale parameters, one from logit ($\mu^\ensuremath{\text{A}}$) and one from weibit ($\mu^\ensuremath{\text{M}}$), and has choice probabilities equal to \begin{equation}\label{eqn:hybridXu} P_r=\frac{e^{\mu^\ensuremath{\text{A}} V_r}\left(-\frac{1}{V_r}\right)^{\mu^\ensuremath{\text{M}}}}{\sum_{p\inR}e^{\mu^\ensuremath{\text{A}} V_p}\left(-\frac{1}{V_p}\right)^{\mu^\ensuremath{\text{M}}}},\quad \forall r\in R. \end{equation} Unfortunately, the model cannot be written as a RUM model with route $r$'s utility in the form of $U_r=V_r\times\varepsilon^\ensuremath{\text{M}} + \varepsilon^\ensuremath{\text{A}}$ with a additive error term $\varepsilon^\ensuremath{\text{A}}$ and multiplicative error term $\varepsilon^\ensuremath{\text{M}}$, which would have been a very neat solution. A straightforward hybrid approach in our framework would be to introduce generating vector $(-e^{V_1}/V_1,\ldots,-e^{V_{|R|}}/V_{|R|})$, i.e., the element-wise multiplication of $\ensuremath{\y^\text{A}}$ and $\ensuremath{\y^\text{M}}$. This will not lead to the approach of \citet{Xu2015}, since only one scale parameter will be introduced when the vector is applied on a generating function. However, the hybrid model of \citet{Xu2015} can be derived from either the \ensuremath{\text{A-}}\ or \ensuremath{\text{M-}} models from our framework by introducing an additional term in the systematic utility. In the additive form, the hybrid model of equation (\ref{eqn:hybridXu}) is obtained with \begin{equation} U_r=V_r-\frac{\mu^\ensuremath{\text{M}}}{\mu^\ensuremath{\text{A}}}\ln(-x)+\varepsilon^\ensuremath{\text{A}}_r, \quad \forall r\inR, \end{equation} where a logarithmic term is inserted to simulate the multiplicative model \citep{Xu2015}. In our framework, this can be represented with generating vector \begin{equation}\label{eqn:yHybridAdd} \boldsymbol{y}=\left(e^{V_1-\rho\ln(-V_1)},\ldots,e^{V_{|R|}-\rho\ln(-V_{|R|})}\right)= \left( \frac {e^{V_1}} {\left(-V_1 \right)^\rho} ,\ldots, \frac {e^{V_{|R|}}} {\left(-V_{|R|}\right)^\rho} \right), \end{equation} where $\rho>0$ is a parameter representing the ratio between the scales. In the multiplicative form, the hybrid model of equation (\ref{eqn:hybridXu}) is obtained with \begin{equation} U_r=V_r\times e^{-\frac{\mu^\ensuremath{\text{A}}}{\mu^\ensuremath{\text{M}}} V_r}\times \varepsilon^\ensuremath{\text{M}}_r, \quad \forall r\inR, \end{equation} where a exponential factor is inserted to simulate the additive model. In the framework again, this becomes generating vector \begin{equation} \boldsymbol{y}=\left(\frac{-1}{V_1 e^{-\frac{V_1}{\rho}}},\ldots,\frac{-1}{V_{|R|} e^{-\frac{V_{|R|}}{\rho}}}\right)= \left( \frac {e^{\frac{V_1}{\rho}}} {-V_1} ,\ldots, \frac {e^{\frac{V_{|R|}}{\rho}}} {-V_{|R|}} \right), \end{equation} with the same interpretation for $\rho$ as above. The difference between the two generating vectors lies at the estimated scale parameter. With the latter formulation $\mu^\ensuremath{\text{M}}$ is estimated directly from the model and $\mu^\ensuremath{\text{A}}$ is derived from $\rho$. While with equation (\ref{eqn:yHybridAdd}) $\mu^\ensuremath{\text{A}}$ is estimated directly and $\mu^\ensuremath{\text{M}}$ is derived from $\rho$. There is no difference in model outcomes and/or flexibility. Using any of the two approaches, it is possible to derive hybrid path-size, paired combinatorial, and link-nested models (see next section). The covariance structure provided in the latter two model instances are then only applied on the main error structure (i.e., dependent on which of the two generating functions is chosen). \subsection{Generating functions and model instances}\label{sec:instances} To create instances of the family of GMEV route choice models, the generating function has to be specified. Together with one of the two derived generating vectors, Equation (\ref{eqn:Gprobs}) will provide the closed-form choice probabilities of the choice model. Any function that satisfies Equations (\ref{eqn:muhom})-(\ref{eqn:altsign}) is a generating function. The cross-nested logit uses one of the most general forms of the generating function and is analysed by \citet{Bierlaire2006,Papola2004}. All presented generating functions here are also special cases of cross-nested logit models. To address overlap on links, the presented model instances assume that each link is associated with one cost, namely systematic utility. This assumption is made for clarity reasons, differentiation into link length, travel and other cost can easily be done, also for the various factors and coefficients introduced below. Let $\mathcal{L}$ be a set of links and let the systematic utility of link $l\in \mathcal{L}$ be $V_l$. For each route $r\in R$, $\mathcal{L}_r$ is the set of links of which $r$ consists and the systematic route utility equals $V_r=\sum_{l\in\mathcal{L}_r}V_l$. \subsubsection{Multinomial} The well-known MNL model \citep[see ][]{McFadden74} is based on multinomial generating function \eqn{ \ensuremath{G^\text{MN}}(\boldsymbol{z}):=\sum_{r\inR}z_r^\mu, } where $\mu>0$ is the scale parameter. The traditional (additive) MNL model, denoted \ensuremath{\text{A-}}\ensuremath{\text{MN}}, has the following simple route choice probabilities, \eqn{ \label{eqn:AMNLprobs} P_r^{\ensuremath{\text{A-}}\ensuremath{\text{MN}}}(\ensuremath{G^\text{MN}};\ensuremath{\y^\text{A}})= \frac{y^\text{A}_r\ensuremath{G^\text{MN}}_r(\ensuremath{\y^\text{A}})}{\mu \ensuremath{G^\text{MN}}(\ensuremath{\y^\text{A}})}=\frac{e^{\mu V_r}}{\sum_{p\inR}e^{\mu V_p}},\quad \forall r\in R. } The multiplicative counterpart is the multinomial weibit model (or Kirchhoff distribution), denoted with \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ and has route choice probabilities \eqn{ P_r^{\ensuremath{\text{M-}}\ensuremath{\text{MN}}}(\ensuremath{G^\text{MN}};\ensuremath{\y^\text{M}})= \frac{y^\text{M}_r\ensuremath{G^\text{MN}}_r(\ensuremath{\y^\text{M}})}{\mu \ensuremath{G^\text{MN}}(\ensuremath{\y^\text{M}})}=\frac{\left(-\frac{1}{V_r}\right)^\mu}{\sum_{p\inR}\left(-\frac{1}{V_p}\right)^\mu},\quad \forall r\in R. } \subsubsection{Path-Size} We will first introduce a Path-Size (PS) generating function to define a specific MEV type, and then we will show that models proposed in the literature are identical. For this PS generating function the path-size factor $\ensuremath{\text{PS}}_r$ is required for each route $r\inR$; this factor depicts the amount of overlap with other routes. Define PS generating function \eqn{ \ensuremath{G^\text{PS}}(\boldsymbol{z}):=\sum_{r\inR}\ensuremath{\text{PS}}_r^\beta z_r^\mu, } where $\mu>0$ is the scale parameter and $\beta$ is the path-size parameter. The additive Path-Size model, denoted \ensuremath{\text{A-}}\ensuremath{\text{PS}}, has choice probabilities \eqn{ P_r^{\ensuremath{\text{A-}}\ensuremath{\text{PS}}}(\ensuremath{G^\text{PS}};\ensuremath{\y^\text{A}})= \frac{y^\text{A}_r\ensuremath{G^\text{PS}}_r(\ensuremath{\y^\text{A}})}{\mu \ensuremath{G^\text{PS}}(\ensuremath{\y^\text{A}})}=\frac{\ensuremath{\text{PS}}_r^\beta e^{\mu V_r}}{\sum_{p\inR}\ensuremath{\text{PS}}_p^\beta e^{\mu V_p}},\quad \forall r\in R.\label{eqn:PA-PSL} } The path-size-like models in the literature have a logarithmic term included in the utility. The MNL model with scale $\mu$ and systematic route utility $V_r+\gamma\ln x_r$ leads to the same choice probabilities as the additive MEV model with generating function $\ensuremath{G^\text{PS}}(\boldsymbol{z})$, generating vector $\boldsymbol{y}=(e^{V_1},\dots,e^{V_|R|})$, path-size factors $\ensuremath{\text{PS}}_r=x_r, \forall r\inR$, and path-size parameter $\beta=\mu\gamma$. So, C-Logit, Path-Size Logit, and Path-Size Correction Logit can be translated into a \ensuremath{\text{A-}}\ensuremath{\text{PS}}\ model. C-Logit presented by \citet{Cascetta1996} adds the term $-\beta^\text{CF}\text{CF}_r$ to the utility, with parameter $\beta^\text{CF}$ and commonality factor $\text{CF}_r$ for each route $r$. This is equivalent to \ensuremath{\text{A-}}\ensuremath{\text{PS}}\ with $\ensuremath{\text{PS}}_r=\text{CF}_r$ and $\beta=-\mu\beta^\text{CF}$. Path-Size Logit presented by \citet{ben-akiva1999} adds the term $\beta^\text{PS} {\tilde \ensuremath{\text{PS}}}_r$ to the utility, with parameter $\beta^\text{PS}$ and path-size factor ${\tilde \ensuremath{\text{PS}}}_r$ for each route $r$. This is equivalent to \ensuremath{\text{A-}}\ensuremath{\text{PS}}\ with $\ensuremath{\text{PS}}_r={\tilde \ensuremath{\text{PS}}}_r$ and $\beta=\mu\beta^\text{PS}$. Path-Size Correction Logit \citep[see ][]{bovy2008} is equal in the same way. For those familiar with general cross-nested logit: note that \ensuremath{G^\text{PS}}\ is an instance of cross-nested logit with parametrized non-normalized inclusion factors with a single nest per alternative. Different choices for $\ensuremath{\text{PS}}_r$ are compared in \citep{Frejinger2006_905}; they conclude that the best formulation for the path-size factor is \begin{equation}\label{eqn:pathsize} \ensuremath{\text{PS}}_r=\frac{\sum_{l\in \mathcal{L}_r}\frac{V_l}{\#_l}}{\sum_{l\in \mathcal{L}_r}V_l}=\frac{\sum_{l\in \mathcal{L}_r}\frac{V_l}{\#_l}}{V_r}, \end{equation} where $\#_l=\left|\{r\in R| l\in \mathcal{L}_r\}\right|$ is the number of routes using link $l$. If $\ensuremath{\text{PS}}_r=1$ then $r$ has no overlap with any other route. If $\ensuremath{\text{PS}}_r\rightarrow 0$ then $r$ shares each link with many other routes. The multiplicative counterpart of \ensuremath{\text{A-}}\ensuremath{\text{PS}}\ is denoted with \ensuremath{\text{M-}}\ensuremath{\text{PS}}\ and has route choice probabilities \eqn{ P_r^{\ensuremath{\text{M-}}\ensuremath{\text{PS}}}(\ensuremath{G^\text{PS}};\ensuremath{\y^\text{M}})= \frac{y^\text{M}_r\ensuremath{G^\text{PS}}_r(\ensuremath{\y^\text{M}})}{\mu \ensuremath{G^\text{PS}}(\ensuremath{\y^\text{M}})}=\frac{\ensuremath{\text{PS}}_r^\beta\left(-\frac{1}{V_r}\right)^\mu}{\sum_{p\inR}\ensuremath{\text{PS}}_p^\beta\left(-\frac{1}{V_p}\right)^\mu},\quad \forall r\in R. } Path-size is also added to MNW by \citet{Kitthamkesorn2013,Kitthamkesorn2014}, but they assume that $\beta=1$, which thus leads to a specific instance of \ensuremath{\text{M-}}\ensuremath{\text{PS}}. \subsubsection{Paired Combinatorial} The (additive) Paired Combinatorial Logit (PCL) model as presented and analysed by \citet{Chu1989,Koppelman200075,pravinvongvuth2005,Prashker1998,gliebe1999route,Chen2003} captures correlation between each pair of routes. For each route couple a nest is defined with a fixed nest specific scale. This scale is determined by the similarity index, denoted with $\ensuremath{\varphi}_{rp}$, for all $r\neq p\inR$. Define paired combinatorial generating function \eqn{ \ensuremath{G^\text{PC}}(\boldsymbol{z}):=\sum_{r\inR}\sum_{p\inR\setminus\{r\}} \left( z_r^\frac{\mu}{1-\ensuremath{\varphi}_{rp}}+z_p^\frac{\mu}{1-\ensuremath{\varphi}_{rp}} \right)^{1-\ensuremath{\varphi}_{rp}}, } where $\mu>0$ is the scale parameter. Multiple definitions for the similarity index exist, but the most common one is \begin{equation} \ensuremath{\varphi}_{rp}:=\frac{\sum_{l\in \mathcal{L}_r\cap\mathcal{L}_p}V_l}{\sqrt{V_rV_p}}, \quad \forall r,p\inR. \end{equation} The traditional additive PCL model, denoted \ensuremath{\text{A-}}\ensuremath{\text{PC}}, has route choice probabilities \eqn{ P_r^{\ensuremath{\text{A-}}\ensuremath{\text{PC}}}(\ensuremath{G^\text{PC}};\ensuremath{\y^\text{A}})= \frac{y^\text{A}_r\ensuremath{G^\text{PC}}_r(\ensuremath{\y^\text{A}})}{\mu \ensuremath{G^\text{PC}}(\ensuremath{\y^\text{A}})}= \frac{ \sum_{p\inR\setminus\{r\}} e^\frac{\mu V_r}{1 - \ensuremath{\varphi}_{rp}} \left(e^\frac{\mu V_r}{1 - \ensuremath{\varphi}_{rp}}+e^\frac{\mu V_p}{1 - \ensuremath{\varphi}_{rp}}\right)^{-\ensuremath{\varphi}_{rp}} }{ \sum_{r'\inR}\sum_{p\inR\setminus\{r'\}}\left(e^\frac{\mu V_{r'}}{1 - \ensuremath{\varphi}_{r'p}}+e^\frac{\mu V_p}{1 - \ensuremath{\varphi}_{r'p}}\right)^{1-\ensuremath{\varphi}_{r'p}} } ,\quad \forall r\in R. } The multiplicative counterpart is denoted with \ensuremath{\text{M-}}\ensuremath{\text{PC}}\ and has route choice probabilities \eqn{ P_r^{\ensuremath{\text{M-}}\ensuremath{\text{PC}}}(\ensuremath{G^\text{PC}};\ensuremath{\y^\text{M}})= \frac{y^\text{M}_r\ensuremath{G^\text{PC}}_r(\ensuremath{\y^\text{M}})}{\mu \ensuremath{G^\text{PC}}(\ensuremath{\y^\text{M}})}= \frac{ \sum_{p\inR\setminus\{r\}} \left(-\frac{1}{V_r}\right)^\frac{\mu }{1 - \ensuremath{\varphi}_{rp}} \left(\left(-\frac{1}{V_r}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{rp}}+\left(-\frac{1}{V_p}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{rp}}\right)^{-\ensuremath{\varphi}_{rp}} }{ \sum_{r'\inR}\sum_{p\inR\setminus\{r'\}}\left(\left(-\frac{1}{V_{r'}}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}}+\left(-\frac{1}{V_p}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}}\right)^{1-\ensuremath{\varphi}_{r'p}} } ,\quad \forall r\in R. } \subsubsection{Link-Nested} \citet{vovsha1998} are the first who applied the Cross-Nested Logit model to route choice such that links represent nests. In this (additive) Link-Nested Logit (LNL) a nest is created for each link and all routes that use the link are included in the nest. The inclusion coefficient of each route in each link (or nest) is denoted with $\ensuremath{\alpha}_{lr}$ for all links $l\in\mathcal{L}$ and routes $r\inR$. Define link-nested generating function \eqn{ \ensuremath{G^\text{LN}}(\boldsymbol{z}):=\sum_{l\in\mathcal{L}} \left(\sum_{r\inR}\ensuremath{\alpha}_{lr}z_r^{\mu_l}\right) ^\frac{\mu}{\mu_l}, } where $\mu>0$ is the scale parameter and $\mu_l>0, \forall l\in\mathcal{L}$ are the link specific scale parameters. In general, it is difficult to estimate all link specific scale parameters in large networks. More on this topic can be found in \citep{Bierlaire2006}, where also the necessity of normalizing the inclusion coefficients is discussed. For this study the following normalized inclusion coefficients are applied \begin{equation} \ensuremath{\alpha}_{lr}=\begin{cases} \frac{V_l}{V_r} & \text{if } l\in\mathcal{L}_r\\ 0 & \text{otherwise} \end{cases}. \end{equation} The traditional additive LNL model, denoted \ensuremath{\text{A-}}\ensuremath{\text{LN}}, has route choice probabilities \eqn{ P_r^{\ensuremath{\text{A-}}\ensuremath{\text{LN}}}(\ensuremath{G^\text{LN}};\ensuremath{\y^\text{A}})= \frac{y^\text{A}_r\ensuremath{G^\text{LN}}_r(\ensuremath{\y^\text{A}})}{\mu \ensuremath{G^\text{LN}}(\ensuremath{\y^\text{A}})}= \frac{ \sum_{l\in\mathcal{L}} \ensuremath{\alpha}_{lr}e^{\mu_l V_r} \left(\sum_{p\inR}\ensuremath{\alpha}_{lp}e^{\mu_lV_p}\right)^{\frac{\mu}{\mu_l}-1} }{ \sum_{l\in\mathcal{L}}\left(\sum_{p\inR}\ensuremath{\alpha}_{lp}e^{\mu_lV_p}\right)^\frac{\mu}{\mu_l} } ,\quad \forall r\in R. } The multiplicative counterpart is \ensuremath{\text{M-}}\ensuremath{\text{LN}}\ with route choice probabilities \eqn{ P_r^{\ensuremath{\text{M-}}\ensuremath{\text{LN}}}(\ensuremath{G^\text{LN}};\ensuremath{\y^\text{M}})= \frac{y^\text{M}_r\ensuremath{G^\text{LN}}_r(\ensuremath{\y^\text{M}})}{\mu \ensuremath{G^\text{LN}}(\ensuremath{\y^\text{M}})}= \frac{ \sum_{l\in\mathcal{L}} \ensuremath{\alpha}_{lr}\left(-\frac{1}{V_r}\right)^{\mu_l} \left(\sum_{p\inR}\ensuremath{\alpha}_{lp}\left(-\frac{1}{V_p}\right)^{\mu_l}\right)^{\frac{\mu}{\mu_l}-1} }{ \sum_{l\in\mathcal{L}}\left(\sum_{p\inR}\ensuremath{\alpha}_{lp}\left(-\frac{1}{V_p}\right)^{\mu_l}\right)^\frac{\mu}{\mu_l} } ,\quad \forall r\in R. } \subsubsection{Joint Network}\label{sec:jointnetwork} Recently, \citet{Papola2013CACIE} introduced a new generating function based on an generalization of cross-nested generating functions to networks \citep[see ][]{Daly2006,Newman2008}. Because their approach is based on links instead of routes, the generating function defines dependencies between links instead of routes. This is fundamentally different from the GMEV models presented in this work that is based on a route set and based on the error structure of random utility per route. The joint network formulation of \citet{Papola2013CACIE} is not a member of the \ensuremath{\text{GMEV}}\ models for route choice in this study since it cannot handle generic route sets as input. Their method has an implicit enumeration of routes. This has the advantage that the problem of choice set generation is dealt with internally. Unfortunately, this does not allow a utility formulation per route. Furthermore, the link based approach also delimits the routes that will be found. For their model specifically, scale parameters of `nodes' depend on the shortest path to the destination. Their definition requires that a route advances through nodes for which the shortest path towards the destination decreases in every step. In real networks, the remaining shortest path will often increase when you deviate from the shortest path. This makes the model restrictive. Although a natural connection between a road network and a (recursive) network based generating function seems to be promising, \citet{Marzano2014} suggests that the achievable covariance structure is not more advanced than that of cross-nested generating functions. \section{Qualitative Assessment of the Models}\label{sec:qualassess} This section analyses the utility distribution of the \ensuremath{\text{GMEV}}\ models and assesses them qualitatively based on the desired properties presented in Section \ref{sec:rum:req}. The desired route utilities have two random variables (i.e., the random foreseen travel time and the analyst error) per route, but the models contain only one (\ensuremath{\text{GMEV}} -distributed) variable per route. We show that this variable can only resemble the analyst error in the additive models, and that it can resemble both errors in the multiplicative models, however, with completely correlated foreseen travel times and analyst errors. \subsection{Utility distribution} The results in this section for the additive models summarize the findings of \citet{McFadden1978,Daly2006}, while the derivations for the multiplicative models are slightly different from those in \citep{Fosgerau2009494} that uses two scales. From the additive utility formulation and Equation (\ref{eqn:addErrorDistr}) follows the multivariate utility distribution of the additive models: \begin{align} F_{U^\ensuremath{\text{A}}}(x_1,\ldots,x_{|R|})=&\Pr\left(U_r^\ensuremath{\text{A}}\leq x_r,\quad\forall r\in R\right)\\ =&\Pr\left(V_r +\varepsilon_r^\ensuremath{\text{A}}\leq x_r,\quad\forall r\in R\right)\\ =&\Pr\left(\varepsilon_r^\ensuremath{\text{A}}\leq x_r-V_r ,\quad\forall r\in R\right)\\ =&F_{\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}}\left(x_1-V_1,\ldots,x_{|R|}-V_{|R|}\right)\\ =&e^{-G(e^{-x_1+V_1},\dots,e^{-x_{|R|}+V_{|R|}})} \end{align} With some algebra, the multivariate utility distribution of the multiplicative models is written as \begin{align} F_{U^\ensuremath{\text{M}}}(x_1,\ldots,x_{|R|})=&\Pr\left(U_r^\ensuremath{\text{M}}\leq x_r,\quad\forall r\in R\right)\\ =&\Pr\left(V_r \varepsilon_r^\ensuremath{\text{M}}\leq x_r,\quad\forall r\in R\right)\\ =&\Pr\left(-V_r \varepsilon_r^\ensuremath{\text{M}}\geq -x_r,\quad\forall r\in R\right)\\ =&\Pr\left(\ln \left(-V_r \varepsilon_r^\ensuremath{\text{M}}\right)\geq \ln\left(-x_r\right),\quad\forall r\in R\right)\\ =&\Pr\left(\ln \left(-V_r \right)+\ln \left(\varepsilon_r^\ensuremath{\text{M}}\right)\geq \ln\left(-x_r\right),\quad\forall r\in R\right)\\ =&\Pr\left(-\ln \left(\varepsilon_r^\ensuremath{\text{M}}\right)\leq\ln \left(-V_r \right)- \ln\left(-x_r\right),\quad\forall r\in R\right)\\ =&F_{\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}}\left(\ln\left(-V_1 \right)- \ln\left(-x_1\right),\ldots,\ln\left(-V_{|R|} \right)- \ln\left(-x_{|R|}\right)\right)\\ =&F_{\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}}\left(\ln\frac{V_1}{x_1},\ldots,\ln\frac{V_{|R|}}{x_{|R|}}\right)\\ =&e^{-G\left(e^{-\ln\frac{V_1}{x_1}},\dots,e^{-\ln\frac{V_{|R|}}{x_{|R|}}}\right)}\\ =&e^{-G\left(\frac{x_1}{V_1},\dots,\frac{x_{|R|}}{V_{|R|}}\right)} \end{align} Then the marginal distribution for the utility of route $r\inR$ is \begin{align} F_{U_r^\ensuremath{\text{A}}}(x_r)=&\lim_{\left\{x_p\rightarrow \infty\right\}_{p\neq r}}F_{U^\ensuremath{\text{A}}}\left(x_1,\ldots,x_{|R|}\right)\\ =&e^{-G\left(e^{-x_r+V_r}\boldsymbol{1}_r\right)}\\ =&e^{-e^{\mu (-x_r+V_r)}G\left(\boldsymbol{1}_r\right)}\\ =&e^{-e^{\mu (-x_r+V_r)+\ln G\left(\boldsymbol{1}_r\right)}}\\ =&e^{-e^{\mu \left(-x_r+V_r+\frac{\ln G\left(\boldsymbol{1}_r\right)}{\mu}\right)}}, \end{align} for the additive case, which can be identified as a Gumbel distribution, and with notation $\boldsymbol{1}_r:=\left(0,\ldots,0,1,0,\ldots,0\right)$ (1 on the $r$-th position).\footnote{Note that for $\mu=1$ these are reversed exponential distributions.} For the multiplicative models the marginal distribution function of route $r$'s utility is \begin{align} F_{U_r^\ensuremath{\text{M}}}(x_r)=&\lim_{\left\{x_p\rightarrow 0\right\}_{p\neq r}}F_{U^\ensuremath{\text{M}}}\left(x_1,\ldots,x_{|R|}\right)\\ =&e^{-G\left(\frac{x_r}{V_r}\boldsymbol{1}_r\right)}\\ =&e^{-\left(\frac{x_r}{V_r}\right)^\mu G\left(\boldsymbol{1}_r\right)}\\ =&e^{-\left(\frac{x_r}{V_rG\left(\boldsymbol{1}_r\right)^{\frac{-1}{\mu}}}\right)^\mu}, \end{align} which can be identified as a reversed Weibull distribution, where reversed means that $-U_r^\ensuremath{\text{M}}$ is Weibull distributed . The expected maximum utility is an important measure of choice models; it can be used to formulate the corresponding user equilibrium. Furthermore, it is input to define duality gaps. Denote $U^{*\ensuremath{\text{A}}}$ as the maximum utility for the additive models, and $U^{*\ensuremath{\text{M}}}$ as the maximum utility for the multiplicative models. Their distributions can be written as \begin{align} F_{U^{*\ensuremath{\text{A}}}}(x)=&F_{U^\ensuremath{\text{A}}}(x,\ldots,x)\\ =&e^{-G\left(e^{-x+V_1},\dots,e^{-x+V_{|R|}}\right)}\\ =&e^{-e^{-\mu x}G\left(e^{V_1},\dots,e^{V_{|R|}}\right)}\\ =&e^{-e^{\mu \left(-x+\ln G\left(e^{V_1},\dots,e^{V_{|R|}}\right)/\mu\right)}}, \text{ and}\\ F_{U^{*\ensuremath{\text{M}}}}(x)=&F_{U^\ensuremath{\text{M}}}(x,\ldots,x)\\ =&e^{-G\left(\frac{x}{V_1},\dots,\frac{x}{V_{|R|}}\right)}\\ =&e^{-(-x)^\mu G\left(\frac{-1}{V_1},\dots,\frac{-1}{V_{|R|}}\right)}\\ =&e^{-\left(\frac{x}{-G\left(\frac{-1}{V_1},\dots,\frac{-1}{V_{|R|}}\right)^{\frac{-1}{\mu}}}\right)^\mu}, \end{align} which can be identified as Gumbel and reversed Weibull distributions again. \begin{table} \caption{Expected value and variance of the desired, multiplicative and additive utility formulations} \centering \begin{tabular}{l|lll} \toprule & Desired & Additive MEV & Multiplicative MEV \\ & & {(\small $\gamma$ is Euler's constant)} & {(\small $\Gamma(\cdot)$ is the Gamma function)} \\ \midrule Utility $U_r$ & $V^0_r+\beta{\ensuremath{\tau}}_r+\varepsilon_r$ & $V_r+\varepsilon_r^\ensuremath{\text{A}}=V^0_r+\beta\hat{\ensuremath{\tau}}_r+\varepsilon_r^\ensuremath{\text{A}}$ & $V_r\times\varepsilon_r^\ensuremath{\text{M}}=\left(V^0_r+\beta\hat{\ensuremath{\tau}}_r\right)\times\varepsilon_r^\ensuremath{\text{M}}$ \\ Expected value & $\underbrace{V^0_r+\beta\hat{\ensuremath{\tau}}_r+\E \left(\varepsilon_r\right)}_{\text{affine in }\hat{\ensuremath{\tau}}_r}$ & $\displaystyle \underbrace{V^0_r+\beta\hat{\ensuremath{\tau}}_r+\frac{\ln G(\boldsymbol{1}_r)+\gamma}{\mu}}_{\text{affine in }\hat{\ensuremath{\tau}}_r}$ & $\displaystyle \underbrace{\frac{V^0_r+\beta\hat{\ensuremath{\tau}}_r}{G(\boldsymbol{1}_r)^{1/\mu}}\Gamma\left(1+\frac{1}{\mu}\right)}_{\text{affine in }\hat{\ensuremath{\tau}}_r}$\\ Variance & $\underbrace{\theta^2\hat{\ensuremath{\tau}}_r^2+\Var \left(\varepsilon_r\right)}_{\text{quadratic in }\hat{\ensuremath{\tau}}_r}$ & $\displaystyle\underbrace{\frac{\pi^2}{6}\left(\frac{1}{\mu}\right)^2}_{\text{constant}}$ & $\displaystyle\underbrace{\frac{\left(V^0_r+\beta\hat{\ensuremath{\tau}}_r\right)^2}{G(\boldsymbol{1}_r)^{2/\mu}}\left(\Gamma\left(1+\frac{2}{\mu}\right)-\Gamma\left(1+\frac{1}{\mu}\right)^2\right)}_{{\text{quadratic in }V^0_r+\beta\hat{\ensuremath{\tau}}_r}}$ \\ Expected $\max_{r\inR} U_r$ & Not closed form & $\displaystyle \frac{\ln G\left(e^{V_1},\dots,e^{V_{|R|}}\right)+\gamma}{\mu}$ & $\displaystyle -G\left(\frac{-1}{V_1},\dots,\frac{-1}{V_{|R|}}\right)^{\frac{-1}{\mu}}\Gamma\left(1+\frac{1}{\mu}\right)$ \\ \bottomrule \end{tabular} \label{tab:utility} \end{table} Table \ref{tab:utility} shows the desired expected value, variance, and expected maximum utility together with the actual expected value, variance and expected maximum utility of the models. It is based on the identification of the marginal distributions as Gumbel and reversed Weibull, and on systematic utility specification $V_r=V^0_r+\beta{\ensuremath{\tau}}_r$. Neither the additive nor the multiplicative formulation completely coincide with the desired result. The expected value is not a problem for any model; any value can be achieved after normalization and identification, and the location of utility is not decisive for choice probabilities. On the other hand, the variance of the additive models is constant and the variance of the multiplicative models is affected by $V_r^0$, and for the latter $\Var(\varepsilon_r)$ is not directly represented. However, as the next section describes, the constant in the systematic utility of the multiplicative model does not have to be normalized. This constant will return as a constant term in the variance, and can thus resemble $\Var(\varepsilon_r)$. Despite that the multiplicative models' variances can capture the variances from the foreseen travel time distribution and analyst error simultaneously, they are both represented by $\varepsilon_r$ and thus completely dependent. This is not in line with the desired independence. Closed form formulations of the covariance of GMEV models are not known. \citet{Marzano20131,Marzano2014} present a more tractable expression and a method to calculate them for additive MEV. The covariances of the additive models are based on the constant variance, and will therefore not change when the systemic utility changes. However, the systematic utility enters the variance quadratically in the multiplicative model, and therefore its covariance will also in- and decrease together with it. Thus, the multiplicative models capture the covariances better. The expected maximum utility for the \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ model indeed return in the well-known log-sum that can by used for an hierarchical derivation of the other models. This was first identified by \citet{ben1973structure}. \subsection{Stochastic user equilibrium formulation} The derived \ensuremath{\text{GMEV}}\ route choice models all have an equivalent stochastic user equilibrium formulation. Mathematical programming formulation are known for all logit based models \citep{Fisk1980,Bekhor1999}, for the \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ and (simplified) \ensuremath{\text{M-}}\ensuremath{\text{PS}}\ models \citep{Kitthamkesorn2013,Kitthamkesorn2014}, for the q-generalized logit model \citep{Chikaraishi2015}, and for the hybrid logit-weibit model \citep{Xu2015}. It is straightforward to derive the variational inequality formulation -- that we discuss -- from a mathematical programming formulation. \citet{chen1999dynamic,Guo2010} describe a stochastic user equilibrium for the MNL model using a variational inequality. \citet{Zhou2012} provide two variational inequality formulations for the C-logit model. Their first formulation is specific for C-logit and a special case of the formulation we present below. Their second formulation is more generic and works with any choice probability formula, but it returns different generalised costs than the approach we present below. Since the choice probabilities of each \ensuremath{\text{GMEV}}\ model can be written solely in terms of the generating function and generating vector, this also holds for the corresponding variational inequality formulation. Denote the demand with $D$, the flow for route $r\inR$ as $f_r$, and $\boldsymbol{f}$ as the vector of flows. Since, amongst other attributes, the travel time in the systematic utility depends on the flow, write that the generating vector now depends on $\boldsymbol{y}(\boldsymbol{f})$\footnote{When the generating vector is substituted, just replace $V_r$ with $V_r(\boldsymbol{f})$ to denote dependency of attributes on flow.}. For clarity, but without loss of generality, only one route set (i.e., one OD pair) is considered. Consider the following variational inequality (VI) formulation; find equilibrium flow $\boldsymbol{f}^*=(f_1^*,\ldots,f_{|R|}^*)$, such that \begin{equation} \begin{split} \sum_{r\inR} \left(-\ln\left(y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))\right)+\ln(f^*_r)\right)(f_r-f_r^*)\geq 0,\quad \forall \boldsymbol{f}\in\varOmega,\\ \text{where }\varOmega=\left\{\boldsymbol{f}\in\mathbb{R}^{|R|}\middle|f_r>0,\sum_{r\inR}f_r=D\right\}. \end{split}\label{eqn:suevi} \end{equation} Define the generalized stochastic cost for route $r\inR$ under flow $\boldsymbol{f}$ as $c_r(\boldsymbol{f}):=-\ln\left(y_r(\boldsymbol{f})G_r(\boldsymbol{y}(\boldsymbol{f}))\right)+\ln(f_r)$\footnote{Note that this cost is unit-less. For MNL, it is possible to normalize it such that the systemic utility appears as a term.}. The corresponding Karush-Kuhn-Tucker system \citep[see e.g.,][Proposition 1.2.1]{facchinei2003finite} is then to find multipliers $\kappa$ and $\lambda_1,\ldots,\lambda_{|R|}$ for which \begin{align} 0&=-\ln\left(y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))\right)+\ln(f_r^*)+\kappa-\lambda_r,\quad \forall r\inR,\label{eqn:kkt1}\\ \sum_{r\inR}f_r&=D,\\ 0&\leq\lambda_r, \quad \forall r\inR, \label{eqn:kkt2}\\ 0&<f_r, \quad \forall r\inR, \text{ and}\label{eqn:kkt3}\\ 0&=\sum_{r\inR}\lambda_rf_r\label{eqn:kkt4} \end{align} hold. Equations (\ref{eqn:kkt2}), (\ref{eqn:kkt3}) and (\ref{eqn:kkt4}) imply that $\lambda_r=0$ for all $r\in\mathbb{R}$. Rewriting equation (\ref{eqn:kkt1}) then gives \begin{align} \ln\left(y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))\right)&=\ln(f_r^*)+\kappa,\quad \forall r\inR\\ y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))&=f^*_re^\kappa,\quad \forall r\inR.\label{eqn:sueroute} \end{align} Summing over routes gives \begin{equation} \sum_{r\inR}y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))=D e^\kappa,\quad \forall r\inR.\label{eqn:suesum} \end{equation} Finally, dividing equation (\ref{eqn:sueroute}) by equation (\ref{eqn:suesum}) gives \begin{equation} \frac{y_r(\boldsymbol{f}^*)G_r(\boldsymbol{y}(\boldsymbol{f}^*))}{\sum_{s\inR}y_s(\boldsymbol{f}^*)G_s(\boldsymbol{y}(\boldsymbol{f}^*))}=\frac{f_r^*}{D}, \end{equation} which actually coincides with the choice probability definition of Equation (\ref{eqn:AMEVprob2}). Therefore, VI problem (\ref{eqn:suevi}) describes the stochastic user equilibrium with the choice model that is defined by generating function $G$ and generating vector $\boldsymbol{y}$. Such a VI formulation is useful, since the corresponding theory can be used to analyse existence and uniqueness of stochastic user equilibria (as for example done by \citet{Nagurney1998,tr-b14}). In addition, the VI formulation provided the generalized stochastic cost per route -- which should all be equal in equilibrium --, that can be used in assignment algorithms to determine duality gaps. Namely, as $\hat \boldsymbol{f}\rightarrow\boldsymbol{f}^*$, then \begin{equation} \frac{\sum_{r\in R}\hat f_r\left(c_r(\hat\boldsymbol{f})-\min_{s\inR} c_s(\hat\boldsymbol{f})\right)}{\sum_{r\in R}\hat f_r\min_{s\inR} c_s(\hat\boldsymbol{f})}\rightarrow 0. \end{equation} \subsection{Normalization, identification, and invariance}\label{sec:norm} The constant in the systematic utility (i.e., the alternative specific constant) of the logit-based (i.e., additive) models has to be normalized because only differences in utility matter. Furthermore, one of the attribute parameters or the scale has to be normalized due to identification. If the cost parameter is normalized to one, all other attribute parameters can be interpreted as willingness to pay for its attribute. The multiplicative models however, do not require the constant in the utility to be normalized. This constant is also multiplied with the error term and thus this term is not equal amongst alternatives. This allows the modeller to use an additional parameter. Similar as for the additive case, one of the attribute parameters or the scale has to be normalized due to identification. For logit based additive models only differences between utilities matter for the choice probabilities. Similarly, only the ratios between utilities matter for the choice probabilities in the multiplicative models \citep{Fosgerau2009494}. This means that the additive models are invariant under addition with a constant and the multiplicative models are invariant under multiplication with a constant. As the next example shows, it is doubtful that these properties are realistic and they limit both models. For the additive case consider two route sets that only differ by a constant, one with route costs (e.g., travel time) $\left\{1,6\right\}$ and one with $\left\{100,105\right\}$; it is not expected that the choice probabilities are the same for these routes sets. Analogously, route costs $\left\{2,3\right\}$ and $\left\{40,60\right\}$ should neither reflect the same probabilities for the multiplicative case. Nevertheless, since the constant in the systematic utility does not have to be normalized, the property is less restrictive for the multiplicative case. Section \ref{sec:networkchange} provides further analysis. \section{Multiplicative MEV Models with Explicit Removal of Overlap} We present an adjustment to the multiplicative model based on the decision rule that travellers only compare the non-overlapping part of routes compared to a reference route. This relaxes the invariance properties to a certain extent, and implies a different choice mechanism for travellers. Probabilities for switching to another route and staying at the reference route are determined. This different decision rule can be retrieved from an alternative utility formulation, which allows a qualitative analysis of the model. Using the systematic utility per link, and the multiplicative utility formula, let \[ U^\ensuremath{\text{M}}_r=\left(\sum_{l\in\mathcal{L}_r}V_l\right)\varepsilon_r^\ensuremath{\text{M}}, \quad \forall r\in R. \] The choice probability for alternative $r\in R$ is \begin{align} P_r^\ensuremath{\text{M}}=&\text{P}(U_r^\ensuremath{\text{M}}\geq U_p^\ensuremath{\text{M}}, \forall p\neq r)\\=&\text{P}\left(\left(\sum_{l\in \mathcal{L}_r}V_l\right)\varepsilon_r^\ensuremath{\text{M}}\geq\left(\sum_{l\in \mathcal{L}_p}V_l\right)\varepsilon_p^\ensuremath{\text{M}}, \quad \forall p\neq r\right)\\ =&\text{P}\left(\sum_{l\in \mathcal{L}_r}V_l\varepsilon_r^\ensuremath{\text{M}}\geq\sum_{i\in \mathcal{L}_p}V_l\varepsilon_p^\ensuremath{\text{M}}, \quad \forall p\neq r\right)\\ =&\text{P}\left(\sum_{l\in \mathcal{L}_r\setminus \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}}+\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}}\geq\sum_{l\in \mathcal{L}_p\setminus \mathcal{L}_r}V_l\varepsilon_p^\ensuremath{\text{M}}+\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_p^\ensuremath{\text{M}}, \quad \forall p\neq r\right).\label{eqn:componentP} \end{align} In this formulation, each part of random utility is associated with a part of systematic utility according to the scaling postulate. The systematic utility that is shared amongst a pair of alternatives appears at both sides of the inequality. The shared links for route pair $r,p$ are contained in $\mathcal{L}_r\cap \mathcal{L}_p$. An individual will evaluate the links independent of the alternatives they belong to. Therefore we assume that the part of the random utility belonging to these shared links is fully correlated. This means that for all $l \in \mathcal{L}_r\cap \mathcal{L}_p$ the terms $V_l\varepsilon_r^\ensuremath{\text{M}}$ and $V_l\varepsilon_p^\ensuremath{\text{M}}$ in Equation (\ref{eqn:componentP}) are equal and can be subtracted from both sides of the inequality. This can be derived in an econometrical sound fashion by reconsidering the utility formula based on a reference route. Let $r$ be the reference route, and denote the utility for each route $p \in R$ as \begin{equation} U_p^{\ensuremath{{\text{M}\Delta}},r}:=\begin{cases} \sum_{l\in\mathcal{L}_r}V_l\varepsilon_r^\ensuremath{\text{M}} &\text{if }p=r\\ \sum_{l\in \mathcal{L}_p\setminus \mathcal{L}_r}V_l\varepsilon_p^\ensuremath{\text{M}}+\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}} &\text{otherwise}. \end{cases} \end{equation} The utility that overlaps with the reference route, is multiplied with the error term of the reference route, while the remainder has its own error term. We refer to this type of probabilities as the \emph{\ensuremath{{\text{M}\Delta\text{-}}} case} with reference route $r$. The probability of choosing route $p\inR$, conditional on reference route $r$ is \begin{equation} P_p^{\ensuremath{{\text{M}\Delta}},r}=\begin{cases} \text{P}\left(\sum_{l\in \Kmin{p}{s}}V_l\varepsilon_p^\ensuremath{\text{M}} \geq \sum_{l\in \Kmin{s}{p}}V_l\varepsilon_s^\ensuremath{\text{M}}, \quad \forall s\neq p\right) &\text{if }p=r\\ \text{P}\left(\sum_{l\in \Kmin{p}{r}}V_l\varepsilon_p^\ensuremath{\text{M}}+\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}} \geq U_s^{\ensuremath{{\text{M}\Delta}},r}, \quad \forall s\neq p\right) &\text{otherwise}, \end{cases} \end{equation} with notation $\Kmin{r}{p}=\mathcal{L}_r\setminus \mathcal{L}_p$, and the overlapping parts are subtracted for case $p=r$ (see Equation (\ref{eqn:componentP})). First, we analyse the case $p=r$. That choice probability reads that the utility of non-overlapping links of routes $s$ with $p$ is smaller than the utility of the non-overlapping links of route $p$ with each respective $s$. Thus, it is the probability that the traveller does not benefit from swapping some links and change route. Now isolate $\varepsilon_r$ on the left hand side; \begin{align} \text{if } p=r \text{, then }P_p^{\ensuremath{{\text{M}\Delta}},r}=& \text{P}\left(\left(\sum_{l\in \Kmin{p}{s}}V_l\right)\varepsilon_p^\ensuremath{\text{M}} \geq \left(\sum_{l\in \Kmin{s}{p}}V_l\right)\varepsilon_s^\ensuremath{\text{M}}, \quad \forall s\neq p\right)\\ =&\text{P}\left(\varepsilon_p^\ensuremath{\text{M}} \leq \frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\varepsilon_s^\ensuremath{\text{M}}, \quad \forall s\neq p\right).\label{eqn:Pi} \end{align} With the same algebra that derives Equation (\ref{eqn:MultAdd}) from Equation (\ref{eqn:MultAddStart}), this multiplicative formulation can be transformed to an additive formulation: \begin{align} \text{if } p=r \text{, then }P_p^{\ensuremath{{\text{M}\Delta}},r}=&\text{P}\left(\varepsilon_p^\ensuremath{\text{M}} \leq \frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\varepsilon_s^\ensuremath{\text{M}}, \quad \forall s\neq p\right)\label{eqn:MultiRefRoute}\\ =&\text{P}\left(\ln(\varepsilon_p^\ensuremath{\text{M}}) \leq \ln\left(\frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\varepsilon_s^\ensuremath{\text{M}}\right), \quad \forall s\neq p\right)\\ =&\text{P}\left(\ln(\varepsilon_p^\ensuremath{\text{M}}) \leq \ln\left(\frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\right)+\ln\left(\varepsilon_s^\ensuremath{\text{M}}\right), \quad \forall s\neq p\right)\\ =&\text{P}\left(-\ln(\varepsilon_p^\ensuremath{\text{M}}) \geq -\ln\left(\frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\right)-\ln\left(\varepsilon_s^\ensuremath{\text{M}}\right), \quad \forall s\neq p\right)\label{eqn:probMDMEV} \end{align} For the case $p\neq r$ we can show that; \begin{align} \text{if } p\neq r \text{ then }P_p^{\ensuremath{{\text{M}\Delta}},r}=&\text{P}\left(\sum_{l\in \Kmin{p}{r}}V_l\varepsilon_p^\ensuremath{\text{M}}+\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}} \geq U_s^{\ensuremath{{\text{M}\Delta}},r}, \quad \forall s\neq p\right)\\ =&\text{P}\left(\frac{\sum_{l\in \Kmin{p}{r}}V_l}{\sum_{l\in \Kmin{r}{p}}V_l}\varepsilon_p^\ensuremath{\text{M}}\leq\varepsilon_r^\ensuremath{\text{M}} \wedge \left(\frac{\sum_{l\in \Kmin{p}{s}}V_l}{\sum_{l\in \Kmin{s}{p}}V_l}\varepsilon_p^\ensuremath{\text{M}}\leq\frac{\sum_{l\in \Kmin{s}{p}}V_l}{\sum_{l\in \Kmin{p}{s}}V_l}\varepsilon_s^\ensuremath{\text{M}},\forall s\neq r,p\right) \right)\label{eqn:nonTriv} \end{align} This equality is not trivial, one should check that Equation (\ref{eqn:nonTriv}) holds or fails for all six orderings of $U_r,U_p$, and $U_s$ by using and/or substituting the condition in Equation (\ref{eqn:MultiRefRoute}). So, if route $p$ is chosen under reference route $r$, then it is beneficial to switch from route $r$ to route $p$, and this improvement is larger than to switch to any other route $s$. Equation (\ref{eqn:nonTriv}) can be rewritten in an additive form similar to (\ref{eqn:probMDMEV}) by taking the logarithm transformation. Assume -- similar as in the \ensuremath{\text{M-}} models -- that in the derived additive forms $\left(-\ln(\varepsilon_1^\ensuremath{\text{M}}), \ldots, -\ln(\varepsilon_{|R|}^\ensuremath{\text{M}})\right)$ follows \ensuremath{\text{MEV}}\ distribution $\boldsymbol{\varepsilon}^\ensuremath{\text{MEV}}$, then we have another type of \ensuremath{\text{GMEV}}\ route choice models. The generating vector is reference route specific, denoted with $\ensuremath{\y^{\text{M}\Delta,r}}$, and given by \begin{equation} \ensuremath{y^{\text{M}\Delta,r}}_{p}= \begin{cases} 1 &\text{if }r=p\\ \frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l} &\text{otherwise} \end{cases} , \quad \forall r,p\inR, \end{equation} where we used that $e^0=1$ and \[e^{-\ln\left(\frac{\sum_{l\in \Kmin{p}{r}}V_l}{\sum_{l\in \Kmin{r}{p}}V_l}\right)}=\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}.\] Given any generating function $G$, reference route $r$ and \emph{\ensuremath{{\text{M}\Delta\text{-}}} generating vector} $\ensuremath{\y^{\text{M}\Delta,r}}$ the choice probabilities can be derived with Equation (\ref{eqn:Gprobs}). By then applying Euler's homogeneous function theorem, the probability of choosing route $p\inR$ with reference route $r\in R$ is: \begin{equation} P_p^{\ensuremath{{\text{M}\Delta}},r}=\frac{\ensuremath{y^{\text{M}\Delta,r}}_p G_p(\ensuremath{\y^{\text{M}\Delta,r}})}{G_r(\ensuremath{\y^{\text{M}\Delta,r}})+\sum_{\{p\in R|p\neq r\}}\frac{\sum_{l\in \Kmin{p}{r}}V_l}{\sum_{l\in \Kmin{r}{p}}V_l}G_p(\ensuremath{\y^{\text{M}\Delta,r}})}.\label{eqn:MDprobConditional} \end{equation} Note that if no overlap exists the \ensuremath{{\text{M}\Delta\text{-}}} models collapse to the \ensuremath{\text{M-}} models\ (i.e., they return the same probabilities). The previous analysis was based on one reference route, but for applications there is not always a (single) reference route available since the (current) reference of the travellers is not known. The final step is to handle this uncertainty. Denote $\Pref{r}$ as the probability that route $r$ is the reference route. The final choice probability for route $p$ then becomes \begin{equation} P_p^\ensuremath{{\text{M}\Delta}}=\sum_{r\inR} P_p^{\ensuremath{{\text{M}\Delta}},r}\Pref{r}.\label{eqn:MDprob} \end{equation} We consider three ways to determine the $\Pref{r}$. First, it is possible to assign every route as reference route with the same probability (i.e., $\Pref{r}=1/|R|,\forall r\in R$). This seems only realistic when no irrelevant routes exist in the choice set, since it is not plausible that travellers use an irrelevant route as reference. Second, it is very natural to set the probability that a route is chosen equal to the probability that a route is the reference route. Then Equation (\ref{eqn:MDprob}) becomes a system of equations: $P_p^\ensuremath{{\text{M}\Delta}}=\sum_{r\inR} P_p^{\ensuremath{{\text{M}\Delta}},r}P_p^\ensuremath{{\text{M}\Delta}}$ (where $P_p^\ensuremath{{\text{M}\Delta}},p\inR$ are the unknowns). Furthermore, $\sum_{p\inR}P_p^\ensuremath{{\text{M}\Delta}}=1$, thus this system of equations can be identified as a Markov chain. Since $P_p^{\ensuremath{{\text{M}\Delta}},r}>0, \forall p,r\inR$, a steady state exists which can be found by solving the system of equations. A third possibility is to fix one route (e.g., the fastest in free-flow conditions) as the reference route $r$, and to only determine the choice probabilities of $\ensuremath{{\text{M}\Delta}},r$. This means that $\Pref{r}=1$ for exactly one $r\inR$. This might not be the realistic for standard equilibrium models since this creates asymmetry. However, such an approach would be very feasible for en-route decisions, where the current route serves as reference point. Also in day-to-day models, the previously chosen trip can be a natural reference route. This new family of \ensuremath{{\text{M}\Delta}}\ does not account automatically for all overlap with the multinomial generating function. Any network with overlap in which all routes have the same length, will give equal choice probabilities; the network structure does not have any influence on the choice probabilities. Also, the conditional choice situation with reference route $r$ does account for overlap between $r$ and all other alternatives, but cannot capture dependencies between all these other alternatives. So, a specific generating function that can handle these dependencies has to be specified per reference route. \subsection{Model instances} Using the four available generating functions we can derive several models based on multiplicative utility formulas based on reference routes. Here we only present the choice probabilities of route $r$ conditional on $r$ being the reference route, i.e., using $p=r$ in Equation (\ref{eqn:MDprobConditional})\footnote{Under the Markov chain assumption, these are the probabilities for staying in the same state.}. The derived choice probabilities seem to be rather complex; however, that is only due to the asymmetry of the generating vector. Basically, the choice probabilities of a $\ensuremath{{\text{M}\Delta}},r$-model are not more complex than those for a \ensuremath{\text{A-}}\ or \ensuremath{\text{M-}} model, and they can be derived easily for applications. \begin{description} \item[\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}] The disadvantage of independence in basic MNL is inherited. Not all overlap is explicitly removed in the \ensuremath{{\text{M}\Delta\text{-}}} case, dependencies between non-reference routes maintain. The choice probabilities are \begin{equation} P_r^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}},r}(G^\ensuremath{\text{MN}};\ensuremath{\y^{\text{M}\Delta,r}})=\frac{1}{1+\sum_{p\inR\setminus\{r\}}\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^\mu} ,\quad \forall r\in R. \end{equation} \item[\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}}] The path-size choice probabilities are \begin{equation} P_r^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}},r}(G^\ensuremath{\text{PS}};\ensuremath{\y^{\text{M}\Delta,r}})=\frac{\ensuremath{\text{PS}}_r^\beta}{\ensuremath{\text{PS}}_r^\beta+\sum_{p\inR\setminus\{r\}}\ensuremath{\text{PS}}_p^\beta\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^\mu} ,\quad \forall r\in R. \end{equation} As it is possible to convert the path-size factor back into the utility formulation for the \ensuremath{\text{A-}}\ensuremath{\text{PS}}\ and \ensuremath{\text{M-}}\ensuremath{\text{PS}}\ models \citep{Kitthamkesorn2013}, this is also possible for the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}}\ model. This will lead to: \begin{equation} U_p^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}},r}:=\begin{cases} \frac{\sum_{l\in\mathcal{L}_r}V_l\varepsilon_r^\ensuremath{\text{M}}}{\ensuremath{\text{PS}}_r^\beta} &\text{if }p=r\\ \frac{\sum_{l\in \mathcal{L}_p\setminus \mathcal{L}_r}V_l\varepsilon_p^\ensuremath{\text{M}}}{\ensuremath{\text{PS}}_p^\beta}+\frac{\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\varepsilon_r^\ensuremath{\text{M}}}{\ensuremath{\text{PS}}_r^\beta} &\text{otherwise}. \end{cases} \end{equation} Having a reference route allows one to revisit the used path-size factors. These can be obtained by excluding all links of the reference route. This will lead to a formulation with reference route specific path-size parameters. Similar to equation (\ref{eqn:pathsize}), the formulation for the reference route $r$ specific path-size factor $\ensuremath{\text{PS}}_{p,r}$ for route $p$ is \begin{equation}\label{eqn:pathsizeMD} \ensuremath{\text{PS}}_{p,r}=\begin{cases}\frac{\sum_{l\in \Kmin{p}{r}}\frac{V_l}{\#_l}}{\sum_{l\in \Kmin{p}{r}}V_l}, & \text{if } p\neq r\\ 1&\text{if } p=r.\end{cases} \end{equation} \item[\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PC}}] The paired combinatorial choice probabilities for in the \ensuremath{{\text{M}\Delta\text{-}}} case are \begin{align} & P_r^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PC}},r}(G^\ensuremath{\text{PC}};\ensuremath{\y^{\text{M}\Delta,r}})=\nonumber\\ & \frac{ \sum_{p\inR\setminus\{r\}} \left(1+\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{rp}}\right)^{-\ensuremath{\varphi}_{rp}} }{ \sum_{r'\inR\setminus\{r\}} \left(1+\left(\frac{\sum_{l\in \Kmin{r}{r'}}V_l}{\sum_{l\in \Kmin{r'}{r}}V_l}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{rr'}}\right)^{1-\ensuremath{\varphi}_{rr'}}+ \sum_{p\inR\setminus\{r,r'\}}\left(\left(\frac{\sum_{l\in \Kmin{r}{r'}}V_l}{\sum_{l\in \Kmin{r'}{r}}V_l}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}} +\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}}\right)^{1-\ensuremath{\varphi}_{r'p}} } ,\quad \forall r\in R. \end{align} This formula looks complicated, as the cumbersome indexing is required because the non-symmetric generating vector $\ensuremath{\y^{\text{M}\Delta,r}}$ is substituted, and then some terms collapse to 1. Without this substitution the probabilities are \begin{equation} P_r^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PC}},r}(G^\ensuremath{\text{PC}};\ensuremath{\y^{\text{M}\Delta,r}})= \frac{ \sum_{p\inR\setminus\{r\}} \left({\ensuremath{y^{\text{M}\Delta}}_{rr}}^\frac{\mu}{1 - \ensuremath{\varphi}_{rp}}+{\ensuremath{y^{\text{M}\Delta}}_{rp}}^\frac{\mu}{1 - \ensuremath{\varphi}_{rp}}\right)^{-\ensuremath{\varphi}_{rp}} }{ \sum_{r'\inR}\sum_{p\inR\setminus\{r'\}}\left({\ensuremath{y^{\text{M}\Delta}}_{rr'}}^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}}+{\ensuremath{y^{\text{M}\Delta}}_{rp}}^\frac{\mu}{1 - \ensuremath{\varphi}_{r'p}}\right)^{1-\ensuremath{\varphi}_{r'p}} } ,\quad \forall r\in R. \end{equation} \item[\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{LN}}] The link-nested choice probabilities in the \ensuremath{{\text{M}\Delta\text{-}}} case are \begin{equation} P_r^{\ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{LN}},r}(G^\ensuremath{\text{LN}};\ensuremath{\y^{\text{M}\Delta,r}})= \frac{ \sum_{m\in\mathcal{L}} \ensuremath{\alpha}_{mr} \left(\ensuremath{\alpha}_{mr}+\sum_{p\inR\setminus\{r\}}\ensuremath{\alpha}_{mp}\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^{\mu_m}\right)^{\frac{\mu}{\mu_m}-1} }{ \sum_{m\in\mathcal{L}} \left(\ensuremath{\alpha}_{mr}+\sum_{p\inR\setminus\{r\}}\ensuremath{\alpha}_{mp}\left(\frac{\sum_{l\in \Kmin{r}{p}}V_l}{\sum_{l\in \Kmin{p}{r}}V_l}\right)^{\mu_m}\right)^\frac{\mu}{\mu_m} } ,\quad \forall r\in R. \end{equation} \end{description} \subsection{Model properties} Since for the \ensuremath{{\text{M}\Delta}}\ case utilities are sums of two variates of the MEV distributions, it is not possible to obtain a convenient closed-form for the joint density function of the utilities. Therefore, we cannot derive the expected maximum utility. However, from the marginal distributions of $\boldsymbol{\varepsilon}^\ensuremath{\text{M}}$ it is possible to obtain the expected value and variance of the \ensuremath{{\text{M}\Delta}}\ utilities conditional on a reference route, which are: \begin{equation} \E(U_p^{\ensuremath{{\text{M}\Delta}},r})=\begin{cases} \frac{\sum_{l\in\mathcal{L}_r}V_l}{G(\boldsymbol{1}_r)^{1/\mu}}\Gamma\left(1+\frac{1}{\mu}\right) &\text{if }p=r\\ \left(\frac{\sum_{l\in \mathcal{L}_p\setminus \mathcal{L}_r}V_l}{G(\boldsymbol{1}_p)^{1/\mu}}+\frac{\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l}{G(\boldsymbol{1}_r)^{1/\mu}}\right)\Gamma\left(1+\frac{1}{\mu}\right) &\text{otherwise} \end{cases}, \text{ and,} \end{equation} \begin{equation} \Var(U_p^{\ensuremath{{\text{M}\Delta}},r})=\begin{cases} \frac{\left(\sum_{l\in\mathcal{L}_r}V_l\right)^2}{G(\boldsymbol{1}_r)^{2/\mu}}\left(\Gamma\left(1+\frac{2}{\mu}\right)-\Gamma\left(1+\frac{1}{\mu}\right)^2\right) &\text{if }p=r\\ \left(\frac{\left(\sum_{l\in \mathcal{L}_p\setminus \mathcal{L}_r}V_l\right)^2}{G(\boldsymbol{1}_p)^{2/\mu}}+\frac{\left(\sum_{l\in \mathcal{L}_r\cap \mathcal{L}_p}V_l\right)^2}{G(\boldsymbol{1}_r)^{2/\mu}}\right)\left(\Gamma\left(1+\frac{2}{\mu}\right)-\Gamma\left(1+\frac{1}{\mu}\right)^2\right) &\text{otherwise}. \end{cases} \end{equation} Furthermore, when the reference route is fixed (i.e., $\Pref{r}=1$ for exactly one $r\inR$), then SUE formulation (\ref{eqn:suevi}) also holds for the $\ensuremath{{\text{M}\Delta}},r$-case. \subsection{Simple network} \begin{figure}[htbp] \centering \begin{tikzpicture} \node[label=left:Origin,circle,draw] (n1) at (0,0) {}; \node[circle,draw] (n2) at (3,2) {}; \node[circle,draw,label=right:Destination] (n3) at (6,0) {}; \draw[->] (n1) ..controls +(90:2cm) and +(180:2cm).. node[above,left] {$V=$3 mins.} (n2); \draw[->] (n2) ..controls +(0:2cm) and +(90:2cm).. node[above,right] {$V=$1 min.} (n3); \draw[->] (n2) ..controls +(-90:2cm) and +(180:2cm).. node[below,left] {$V=$2 mins.} (n3); \draw[->] (n1) ..controls +(-90:2cm) and +(-90:2cm).. node[below] {$V=$4 mins.} (n3); \end{tikzpicture} \caption{Simple three route overlap network.} \label{fig:simplenetwork} \end{figure} To provide more insight in the working of \ensuremath{{\text{M}\Delta\text{-}}} models, the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ probabilities are provided for a simple network. Figure \ref{fig:simplenetwork} shows an origin and destination with three routes in between. Systematic utility is assumed to equal foreseen travel time, and no route specific constant is included. The upper and middle routes have overlap, and the upper route is faster. The lower route has no overlap with the other two, and is equally fast as the upper route. Table \ref{tab:simplenetwork} shows the choice probabilities for each reference route based on $\mu=1$, as well as, the solutions based on equal reference route probabilities and the Markov chain approach. \begin{table} \caption{Choice probabilities for the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model on the simple network. The probabilities conditional on reference routes, as well as the two solution methods are provided.} \centering \begin{tabular}{l|lll} \toprule & Upper & Middle & Lower \\ \midrule Ref. route = Upper & $\frac{2}{5}$ & $\frac{1}{5}$ & $\frac{2}{5}$ \\[5pt] Ref. route = Middle & $\frac{8}{17}$ & $\frac{4}{17}$ & $\frac{5}{17}$ \\[5pt] Ref. route = Lower & $\frac{5}{14}$ & $\frac{4}{14}$ & $\frac{5}{14}$ \\[5pt] Equal $\Pref\cdot$ solution & $\approx 0.409$ & $\approx 0.240$ & $\approx 0.350$ \\[5pt] Markov chain solution & $\approx 0.401$ & $\approx 0.239$ & $\approx 0.359$ \\ \bottomrule \end{tabular} \label{tab:simplenetwork} \end{table} As expected, the slowest middle route has lowest choice probability. This choice probability is significantly smaller than it would be under \ensuremath{\text{A-}}\ and \ensuremath{\text{M-}} models, which is realistic since changing from the upper to the middle route means that the non-overlapping travel time doubles. Also, the two different solution methods for dealing with multiple reference routes do not differ that much. On the other hand, there is a higher preference for the upper route than for the lower route while they have equal travel times. Based on the theory in Section \ref{sec:rum}, one would argue that the opposite should be true. Having the upper or lower route as the reference route, causes no difference in choice probabilities between the upper and lower route. Only because the middle route exists, and since it is more 'profitable' (i.e. the factor 2 between the non-overlapping parts between middle and lower is higher than the factor $4/3$ between middle and lower route) to switch to the upper route, there is a slight preference for the upper route. This means that by having routes included as reference routes, the final probabilities change (similar to what \citet{bliemertrr2008} show). So, this simple example provides insight in the working of the \ensuremath{{\text{M}\Delta\text{-}}} models, but does not show its full potential. Clearly, the \ensuremath{{\text{M}\Delta\text{-}}} models have different behaviour than all other known route choice models. The next two sections provide more insight in the differences between the \ensuremath{\text{A-}}, \ensuremath{\text{M-}} and \ensuremath{{\text{M}\Delta\text{-}}} models -- and their suitability for traffic assignment applications --. First, we analyse their basic behaviour under simple changes in the network configuration, and second, we analyse all models under more complex network variations. The latter quantitative test shows which model can best approximate the generic utility formulation of Section \ref{sec:rum}. These Sections provide the full potential of the \ensuremath{{\text{M}\Delta\text{-}}} models. \section{Basic model behaviour under simple network changes}\label{sec:networkchange} In this section we discuss the change in choice behaviour under three simple network adjustments. Consider the four networks depicted in the first column of Table \ref{tab:networkvariations}. Network A is the basis and has 2 routes with different lengths of which the final parts overlap. In network B the overlapping part is extended, while in networks C1 and C2 the non-overlapping parts are extended by respectively adding a constant length and by multiplying their lengths. The models are so simple that, regardless the \emph{exact} choice behaviour, the trend in choice probabilities for the two routes is known. The trend can either be that the probabilities remain equal, converge, or diverge. It is desired that choice models can reproduce the expected trend for each network change. However, not all trends can be reproduced by all choice models. Therefore, we analyse the behaviour of the three basic (-\ensuremath{\text{MN}}) models. We take advantage of having only two routes for the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model here, which avoids dealing with reference routes. However, similar results are obtained when extending to more than two routes, as is analysed in the next section. \begin{table} \caption{\textbf{Behaviour under changing networks.} Networks B, C1 and C2 are slight variations on network A. Each network has two routes; the table shows the trend of the route probabilities when one switches for network A to any of the other three networks. They can either converge, diverge, or remain equal (depicted with arrows). The expected trend and achievable trends for three models are provided (see main text).} \centering \begin{tabular}{ll|m{2cm}m{1.5cm}m{1.5cm}m{1.5cm}} \toprule A & \parbox{5cm}{\begin{tikzpicture} \node[circle,draw] (n1) at (0,0) {}; \node[circle,draw,scale=0.5] (n2) at (1.5,0) {}; \node[circle,draw] (n3) at (3,0) {}; \draw[->] (n1) ..controls +(0:1cm) and +(180:1cm).. node[above] {1} (n2); \draw[->] (n1) ..controls +(-45:1cm) and +(225:1cm).. node[below] {2} (n2); \draw[->] (n2) -- node[above] {1} (n3); \end{tikzpicture}} & Expected choice behaviour & \ensuremath{\text{A-}}\ensuremath{\text{MN}} & \ensuremath{\text{M-}}\ensuremath{\text{MN}} & \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}} \\ \midrule B & \parbox{5cm}{\begin{tikzpicture} \node[circle,draw] (n1) at (0,0) {}; \node[circle,draw,scale=0.5] (n2) at (1.5,0) {}; \node[circle,draw] (n3) at (4.5,0) {}; \draw[->] (n1) ..controls +(0:1cm) and +(180:1cm).. node[above] {1} (n2); \draw[->] (n1) ..controls +(-45:1cm) and +(225:1cm).. node[below] {2} (n2); \draw[->] (n2) -- node[above] {2} (n3); \end{tikzpicture}} & $=$ & $=$ \quad\cmark & $\pbox{1em}{$\downarrow$\\ $\uparrow$}$ \quad\xmark & $=$ \quad\cmark \\ \cmidrule(lr){1-2} C1 & \parbox{5cm}{\begin{tikzpicture} \node[circle,draw] (n1) at (0,0) {}; \node[circle,draw,scale=0.5] (n2) at (3,0) {}; \node[circle,draw] (n3) at (4.5,0) {}; \draw[->] (n1) ..controls +(0:1cm) and +(180:1cm).. node[above] {2} (n2); \draw[->] (n1) ..controls +(-45:1cm) and +(225:1cm).. node[below] {3} (n2); \draw[->] (n2) -- node[above] {1} (n3); \end{tikzpicture}} & \pbox{1em}{$\downarrow$\\ $\uparrow$} & $=$ \quad\xmark & \pbox{1em}{$\downarrow$\\ $\uparrow$} \quad\cmark & \pbox{1em}{$\downarrow$\\ $\uparrow$} \quad\cmark \\ \cmidrule(lr){1-2} C2 & \parbox{5cm}{\begin{tikzpicture} \node[circle,draw] (n1) at (0,0) {}; \node[circle,draw,scale=0.5] (n2) at (3,0) {}; \node[circle,draw] (n3) at (4.5,0) {}; \draw[->] (n1) ..controls +(0:1cm) and +(180:1cm).. node[above] {2} (n2); \draw[->] (n1) ..controls +(-60:1.5cm) and +(240:1.5cm).. node[below] {4} (n2); \draw[->] (n2) -- node[above] {1} (n3); \end{tikzpicture}} & \pbox{1em}{$\uparrow$\\ $\downarrow$} & \pbox{1em}{$\uparrow$\\ $\downarrow$} \quad\cmark & \pbox{1em}{$\uparrow$\\ $\downarrow$} \quad\cmark & \pbox{1em}{$\uparrow$\\ $\downarrow$} \quad\cmark \\ \bottomrule \end{tabular}\\ \label{tab:networkvariations} \end{table} Consider the switch from network A to network B. Since the non-overlapping parts remain equal, the choice probabilities for both routes obviously also remain equal. In the \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ model only the difference between the routes matters, and since this difference does not change, the probabilities also remain equal for that model. For the \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ model however, only the ratio between the routes matters, and this ratio changes. Because the non-overlapping part increases, the (lower:upper)-ratio decreases, and the choice probabilities will converge. The expected behaviour can not be reproduced by any \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ model instance. The \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model in the end, merely considers the ratio of the difference between routes, i.e., the ratio of the non-overlapping parts. Since the non-overlapping part does not change, the choice probabilities do not change. This holds for all \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model instances Consider the switch from network A to network C1. When a constant length is added to both routes, they become more similar the choice probability of the shortest route increases. So, it is expected that the route probabilities will converge\footnote{As an easy example, consider routes with length $x$ and $x+1$; the choice probabilities will become 50 \%-50\% if $x\rightarrow\infty$ and 100\%-0\% if $x\rightarrow 0$}. The difference between the two routes will not change, therefore no \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ model instance can reproduce the expected behaviour. On the other hand, the \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ and \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ models will reproduce the expected behaviour since the (lower:upper)-ratio between routes (in- and excluding the overlapping part) decreases. The probabilities converge for all \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ and \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model instances. Consider the switch from network A to network C2. When a both routes are multiplied by the same factor, the absolute detour of the longest route will increase, and will therefore be chosen less. So, it is expected that route probabilities will diverge\footnote{As an easy example, consider routes with length $x$ and $2\times x$; the choice probabilities will become 50 \%-50\% if $x\rightarrow 0$ and 100\%-0\% if $x\rightarrow \infty$}. The difference between the two routes will increase, therefore the probabilities in the \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ models will diverge, which coincides with the expected behaviour. The ratio of the non-overlapping parts of the routes remains equal, but due to the overlapping part, the ratio between the whole routes changes. This increase in the (lower:upper)-ratio will lead to the desired diverging probabilities in the \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ model. Of course, the divergence `speed' depends on the length of the overlapping part. However, this can be adjusted by using the constant in the systematic utility specification. This constant is also the reason that the diverging probabilities are obtainable in the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model; here it also completely determines the divergence `speed', which is an advantage compared to \ensuremath{\text{M-}}\ensuremath{\text{MN}}. All \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ model instances diverge for this network example, but the behaviour remains dependent on the overlapping length. Almost all \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model instances will have the expected behaviour, except for those with a constant equal to zero. This analysis, summarized in Table \ref{tab:networkvariations}, on the most simple and basic network variation shows that only the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ model can reproduce all expected behaviours. We believe no simple network change exists of which the expected behaviour can be captured by \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ or \ensuremath{\text{M-}}\ensuremath{\text{MN}}, but not by \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}. Since real networks do not consist of merely simple network changes, the next section analyses the competitiveness of all models on more comprehensive networks based on the route utility formulation of section \ref{sec:rum}, including the \ensuremath{\text{PS}}, \ensuremath{\text{PC}}, and \ensuremath{\text{LN}}\ variants, and including more than two routes which requires the use of reference routes for the \ensuremath{{\text{M}\Delta\text{-}}} models. \section{Network Example}\label{sec:network} The route choice models are applied on a network with three routes to show the advantage of the \ensuremath{{\text{M}\Delta\text{-}}} models compared to the others. \citet{bliemertrr2008} compare route choice models on different route sets. They demonstrate that existing closed-form route choice models (except for MNL) are sensitive to irrelevant route alternatives. Hence, if the route sets in application are different from the route sets in estimation, the results may be poor. This network example considers very different choice situations and the models are estimated and validated on different subsets of the data. In Figure \ref{fig:network} the network with link travel times and routes is depicted. This network has been carefully constructed to put the choice models under stress, namely with and without overlap, and with short and long distance OD pairs. Also, the relative influence of the analyst and random foreseen travel time changes. The travel times of links 1, 2, 4 and 5 depend on variable $x$ and by varying $x$ different choice situations are created. Each value of $x$ can represent a different OD pair in a transport network. The graph shows how route travel times increase with $x$; for $x=0$ the difference (respectively ratio) between the slowest and fastest routes is four minutes (respectively 0.67), and this increases to eight minutes (respectively 0.90) for $x=40$. Furthermore, overlap occurs on links 1 and 5. \begin{figure}[bhtp] \centering \begin{tikzpicture} \node[label=right:O.,circle,draw,fill=blue!20] (n1) at (0,0) {}; \node[circle,draw] (n2) at (2,2) {}; \node[circle,draw] (n3) at (4,-2) {}; \node[circle,draw,label=left:D.,fill=red!20] (n4) at (6,0) {}; \draw[->,dashed] (n1) ..controls +(90:1.5cm) and +(180:1.5cm).. node[above,sloped] {link 1} node[below,sloped] {$x$} (n2); \draw[->,dashed] (n2) ..controls +(0:2cm) and +(90:2cm).. node[above,sloped] {link 2} node[below,sloped] {$1.05x+12$} (n4); \draw[->,dashed] (n1) ..controls +(-90:2cm) and +(180:2cm).. node[above,sloped] {link 4} node[below,sloped] {$0.95x$+8} (n3); \draw[->] (n2) ..controls +(-45:2cm) and +(135:2cm).. node[above,sloped] {link 3} node[below,sloped] {10} (n3); \draw[->,dashed] (n3) ..controls +(0:1.5cm) and +(-90:1.5cm).. node[above,sloped] {link 5} node[below,sloped] {$x$} (n4); \end{tikzpicture} \begin{tikzpicture}[scale=1] \draw[->] (-0.2,0) -- (4.5,0) node[right] {$x$}; \draw[->] (0,-0.2) -- (0,4.5) node[above] {Travel time}; \draw[shift={(0,0)}] (0pt,2pt) -- (0pt,-2pt) node[below] {$0$}; \draw[shift={(4,0)}] (0pt,2pt) -- (0pt,-2pt) node[below] {$40$}; \foreach \boldsymbol{y}/\ytext in {0/0,0.4/8,0.6/12,3.8/76,4.2/84} \draw[shift={(0,\boldsymbol{y})}] (2pt,0pt) -- (-2pt,0pt) node[left] {$\ytext$}; \draw[loosely dashed,thin] (0,4.2) -- (4,4.2); \draw[loosely dashed,thin] (0,3.8) -- (4,3.8); \draw[thick] (0,0.4) -- (4,3.8) node[right=1cm,below] {Lower route}; \draw[thick] (0,0.6) -- (4,4.2) node[right=1cm,above] {Upper route}; \draw[thick] (0,0.5) -- (4,4) node[right=0cm] {Middle route}; \end{tikzpicture} \caption{Network and travel times. Dashed links have variable costs. } \label{fig:network} \end{figure} For the experiment, the probabilities from the MNP model -- that can properly handle both the analyst error and random foreseen travel time, and the desired variance-covariance structure based on the scaling postulate -- are the ground truth. Thus, the route utilities are jointly distributed following a multivariate normal distribution. This distribution is specified in line with the random route utility of Section \ref{sec:rum}. Assume that there is no systematic utility other than travel time, then identification leads to $V^0_r=0$ for the \ensuremath{\text{A-}} models, and $V^0_r=c$ for the \ensuremath{\text{M-}}\ and \ensuremath{{\text{M}\Delta\text{-}}} models (see Section \ref{sec:norm}). For the normalization set the expected analyst error $\E(\varepsilon_r)$ to $0$ and the travel time parameter $\beta$ to $-1$. For the proportionality parameter (regarding the standard deviation of the foreseen travel time), linear regression on the OViN data of Figure \ref{fig:TTscatter} leads to $\theta=0.3859$, and linear regression on the route survey leads to $\theta=0.1301$; however, the first value is too high (see Section \ref{sec:rum:lin}) and the latter too low (since it is the response of only one traveller), thus we assume $\theta=0.2$. The covariances between the random foreseen travel times are assumed to be based on the arithmetic mean, see Equation (\ref{eqn:covAm}). Note that these definitions of the (co)variances are different from those in the literature that assume proportionality between variance and mean. The standard deviation of the analyst error is set to $\stdev(\varepsilon_r)=10$ (minutes). This leads to the following multivariate normal utility distribution: \begin{equation} \mathcal{N}\left(\underbrace{-\left(\begin{array}{c} 2.05x+12 \\ 2x+10 \\ 1.95x+8 \end{array}\right)}_{\E(\boldsymbol{U})} ,\underbrace{0.2^2\left(\begin{array}{ccc} (2.05x+12)^2 & 2.025x^2+11x & 0 \\ 2.025x^2+11x & (2x+10)^2 & 1.975x^2+9x \\ 0 & 1.975x^2+9x & (1.95x+8)^2 \end{array} \right)}_{\text{covariance matrix of }\boldsymbol{{\ensuremath{\tau}}}}+\underbrace{\text{diag}\left(\begin{array}{c} 100 \\ 100 \\ 100 \end{array}\right)}_{\text{variance matrix of }\boldsymbol{\varepsilon}}\right).\label{eqn:MVN} \end{equation} While $x$ increases, not only the distance between origin and destination increases, but also the influence of the randomness from foreseen travel time compared to the randomness from the analyst error increases. For $x=0$ only 3.8 percent of the variance of utility is due to the foreseen travel time; however, for $x=40$, 76.4 percent of the variance is due to the foreseen travel time. Furthermore, the part of utility with overlap increases with $x$. In the development of this network example, the link travel times were chosen given the assumptions on the errors, and such that the route choice probabilities are more or less stable. \begin{figure}[htbp] \centering \includegraphics[width=7.5cm]{groundtruth.pdf} \caption{Ground truth probabilities based on a million multivariate normal samples for each $x\in\{0,\ldots,40\}$.} \label{fig:groundtruth} \end{figure} For all $x\in \{0,1,\ldots,40\}$ the choice situation is simulated a million times by sampling from the multivariate normal distribution (Equation (\ref{eqn:MVN})), see Figure \ref{fig:groundtruth}. The models are estimated twice; once on the dataset $x=\{5,\ldots,15\}$, and once on dataset $x=\{25,\dots,35\}$ using log-likelihood maximization. So, eleven million `observations' are used to estimate each model. For the \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}}\ the path-size formulation of equation (\ref{eqn:pathsize}) is chosen\footnote{This is chosen since equation (\ref{eqn:pathsizeMD}) leads to much more path-size factors}. For the \ensuremath{\text{LN}}\ models link specific scales are estimated for links 1 and 5; the other links -- read nests -- contain only one route and thus `collapse': $(y^{\mu_l})^{\mu/\mu_l}=y^\mu$. The Markov chain approach for reference routes is chosen for \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}}\ and \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}}, and the `equal probability reference route' approach is chosen for \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PC}}\ and \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{LN}}\footnote{For these two models the software (Wolfram Mathematica) couldn't find analytical soltions of the choice probabilities using the Markov chain with unknown $x$. General applications do not have this parametrization on $x$, and thus shouldn't be problematic.}. For the validation, the models' log-likelihood on the other dataset is determined, so the parameters from the estimation on $x=\{5,\ldots,15\}$ are applied to $x=\{25,\dots,35\}$, and vice versa. \begin{table} \caption{Parameter estimates for every model for the two datasets} \centering \begin{tabular}{l|llp{2.0cm}|llp{2.0cm}} \toprule Model & \multicolumn{6}{c}{Parameter estimates} \\ & \multicolumn{3}{c|}{Dataset $x=\{5,\ldots,15\}$} & \multicolumn{3}{c}{Dataset $x=\{25,\ldots,35\}$}\\ & Scale $\mu\approx$ & Constant $\ensuremath{\text{c}}\approx$ & Other & Scale $\mu\approx$ & Constant $\ensuremath{\text{c}}\approx$ & Other\\ \cmidrule(r){1-7} \ensuremath{\text{A-}}\ensuremath{\text{MN}} & 0.107 & & & 0.0699 & & \\ \ensuremath{\text{A-}}\ensuremath{\text{PS}} & 0.107 & & $\beta\approx 0.182$ & 0.0681 & & $\beta\approx 0.501$\\ \ensuremath{\text{A-}}\ensuremath{\text{PC}} & 0.0935 & & & 0.0576 & &\\ \ensuremath{\text{A-}}\ensuremath{\text{LN}} & 0.0438 & & $\mu_1\approx 0.095$ $\mu_5\approx 0.818$ & 0.0225 & &$\mu_1\approx 0.0225$ $\mu_5\approx 1.091$\\ & & & & & & \\ \ensuremath{\text{M-}}\ensuremath{\text{MN}} & 11.518 & -77.635 & & 5.593 & =0 &\\ \ensuremath{\text{M-}}\ensuremath{\text{PS}} & 12.932 & -91.038 & $\beta\approx 0.173$ & 8.690 & -47.403 & $\beta\approx 0.490$\\ \ensuremath{\text{M-}}\ensuremath{\text{PC}} & 12.983 & -108.293 & & 7.809 & -55.479 &\\ \ensuremath{\text{M-}}\ensuremath{\text{LN}} & 0.490 & -142.935 & $\mu_1\approx 73.916$ $\mu_5\approx 1175.47$ & 0.319 & -0.258 &$\mu_1\approx 18.235$ $\mu_5\approx 118.725$\\ & & & & & & \\ \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{MN}} & 7.475 & -43.589 & & 4.619 & =0 &\\ \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}} & 10.613 & -72.889 & $\beta\approx 0.145$ & 7.381 & -41.176 &$\beta\approx 0.432$\\ \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PC}} & 14.328 & -126.223 & & 7.396 & -62.199 &\\ \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{LN}} & 0.475 & -111.01 & $\mu_1\approx 58.367$ $\mu_5\approx 7518.45$ & 0.569 & =0 & $\mu_1\approx 15.265$ $\mu_5\approx 61.098$\\ \bottomrule \end{tabular} \label{tab:network} \end{table} Table \ref{tab:network} shows the estimated parameters.\footnote{The q-generalized logit model by \citet{Nakayama2013753} that captures both \ensuremath{\text{A-}}\ensuremath{\text{MN}}\ and \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ has also been estimated; the results are not presented since the resulting model was always equivalent to the \ensuremath{\text{M-}}\ensuremath{\text{MN}}\ model (i.e., not to \ensuremath{\text{A-}}\ensuremath{\text{MN}})} The standard errors are very low due to the large artificial dataset and therefore not reported. Figure \ref{fig:LL} shows the log-likelihoods of the estimation and validation results. Probabilities of the models are found in Figures \ref{fig:MNLPSL} and \ref{fig:PCLLNL}. In every graph two instances of one model and the ground truth are shown, the blue lines depict the route probabilities for the model estimated on $x=\{5,\ldots,15\}$, the red lines depict the route probabilities for the model estimated on $x=\{25,\ldots,35\}$, and the grey lines depict the MNP (i.e., ground truth) probabilities. \begin{figure}[htbp] \centering \includegraphics[width=0.49\textwidth]{X0515copy2.pdf}\rule{0.5pt}{5cm} \includegraphics[width=0.49\textwidth]{X2535copy2.pdf} \caption{Log-likelihoods of model instances for estimation and validation. Parameter estimates of the left estimation are used for the validation in the right, and vice versa.} \label{fig:LL} \end{figure} \newgeometry{margin=2.5cm} \begin{landscape} \begin{figure}[htbp] \centering \includegraphics[width=7.5cm]{mnl.pdf} \includegraphics[width=7.5cm]{mpmnl.pdf} \includegraphics[width=7.5cm]{mpmnldiff.pdf}\\[1cm] \includegraphics[width=7.5cm]{ps.pdf} \includegraphics[width=7.5cm]{mpps.pdf} \includegraphics[width=7.5cm]{psdiff.pdf}\\[1cm] \includegraphics[width=22.5cm]{legend.pdf} \caption{Choice probabilities of the \ensuremath{\text{MN}} - and \ensuremath{\text{PS}} -models.} \label{fig:MNLPSL} \end{figure} \end{landscape} \begin{landscape} \begin{figure}[htbp] \centering \includegraphics[width=7.5cm]{pcl2.pdf} \includegraphics[width=7.5cm]{mppcl.pdf} \includegraphics[width=7.5cm]{mppcldiff.pdf}\\[1cm] \includegraphics[width=7.5cm]{cnl.pdf} \includegraphics[width=7.5cm]{mpcnl.pdf} \includegraphics[width=7.5cm]{mpcnldiff.pdf}\\[1cm] \includegraphics[width=22.5cm]{legend.pdf} \caption{Choice probabilities of the \ensuremath{\text{PC}} - and \ensuremath{\text{LN}} -models.} \label{fig:PCLLNL} \end{figure} \end{landscape} \restoregeometry The estimation results show that the \ensuremath{\text{MN}}\ models have the poorest log-likelihoods of all on the $\{25,\ldots,35\}$-data; these models cannot address the overlap of routes properly. The validation results of the \ensuremath{\text{MN}}\ models are also worse than the other types, so they cannot be transferred between short distance and long distance OD pairs. Another remark is that the \ensuremath{\text{PC}}\ models, which are designed to capture overlap, perform poorest on the $\{5,\ldots,15\}$-data; this is due the fact that the covariance between routes is low (because the analyst error is dominating), while the \ensuremath{\text{PC}}\ model always imposes dependencies. In all cases, the \ensuremath{\text{A-}} models have the worst estimation result compared to the \ensuremath{\text{M-}}\ and \ensuremath{{\text{M}\Delta\text{-}}} models. Remarkably, the multiplicative models also outperform the additive models on the $\{5,\ldots,15\}$-data, where the influence of the foreseen travel time is relatively small. The \ensuremath{{\text{M}\Delta\text{-}}} models have better results on all four \ensuremath{\text{MN}}\ and \ensuremath{\text{PS}}\ estimations, while the \ensuremath{\text{M-}} models have better results on three out of four \ensuremath{\text{PC}}\ and \ensuremath{\text{LN}}\ estimations. This is because the additional parameter, the constant $c$, for the multiplicative models, which leads to a better fit. The multiplicative errors capture the analyst error with constant $c$ in the systematic utility. This constant is indeed larger for the models estimated on the $\{5,\ldots,15\}$-data, where the analyst error is dominant. Furthermore, note that all scale parameters $\mu$ are smaller for the $\{25,\ldots,35\}$-data (i.e., the variance is higher); this reflects the heteroscedasticity of route utility. We would like to mention that the \ensuremath{\text{PC}}\ and \ensuremath{\text{LN}}\ estimation were problematic on other network configurations that we have tried. For the multiplicative models extremely high scales occurred, which can lead to numerical problems. They also generated very unrealistic probabilities outside the area they were estimated on. As mentioned earlier, it is infeasible to estimate all link-specific nest-scales in large networks for \ensuremath{\text{LN}}\ models. \section{Conclusions and Discussion} This paper presented twelve route choice models -- of which seven are new -- in a single framework, and assessed them qualitatively and quantitatively. Choice probabilities for all models have the same closed form expression, namely Equation (\ref{eqn:Gprobs}), based on a generating function and a generating vector. The generating function determines how route overlap is captured, which is either multinomial (\ensuremath{\text{MN}}), path-size (\ensuremath{\text{PS}}), paired combinatorial (\ensuremath{\text{PC}}), or link-nested (\ensuremath{\text{LN}}). The generating vector determines the utility formula, which is either additive RUM (\ensuremath{\text{A}}), multiplicative RUM (\ensuremath{\text{M}}), or the newly presented multiplicative RUM based on reference routes that only considers differences between routes (\ensuremath{{\text{M}\Delta}}). For the qualitative assessment a basic structure of utility with random foreseen travel time was presented (see Section \ref{sec:rum}). We base our analysis on two postulates on random travel times of road segments that each lead to a different structure of randomness. Empirical evidence provides the new insight that the foreseen travel time distribution's mean and standard deviation have a linear relationship, contrary to a linear relationship between its mean and variance. The homoscedastic additive models are not able to capture the random foreseen travel time, but multiplicative models do allow for this. Furthermore, differences in normalization, identification, and invariance are pointed out. The constant in systematic utility in multiplicative models does not have to be normalized. This allows more degrees of freedom and a better fit on the data, but makes it more difficult to compare models from the different paradigms directly. One main advantage of the generic GMEV framework is that it can be analysed as a whole, we show this by providing the equivalent stochastic user equilibrium formulation for all models. To show the distinctiveness of the \ensuremath{{\text{M}\Delta\text{-}}} models, each model's behaviour under basic network changes was analysed. Only the \ensuremath{{\text{M}\Delta\text{-}}} models can reproduce realistic behaviour when the characteristics of parallel and serial links change. To test the models' potential on real networks, and to test whether they can be applied on datasets on which they are not estimated, a carefully constructed network example was presented. Based on our analyses, we expect good performance of the \ensuremath{\text{M-}}\ensuremath{\text{PS}}\ and \ensuremath{{\text{M}\Delta\text{-}}}\ensuremath{\text{PS}}\ models for route choice on real networks. They can capture overlap sufficiently, and they can handle random foreseen travel time. Also \citet{Fosgerau2009494} and \citet{Chikaraishi2015} have both compared additive with multiplicative formulations on multiple datasets, and they found that the multiplicative models have a better fit for all datasets.\footnote{Note that \citet{Chikaraishi2015} state their model equals logit when $q=0$ and to weibit when $q=1$; however, they do not fully use the flexibility of weibit. When they would have estimated a constant for the weibit models (similar to the approach in this paper), the q-generalized logit models with $0<q<1$ will also become weibit.} However, additional empirical estimation and validation is required to conclusively assess all models. Finally, the \ensuremath{\text{PC}}\ and \ensuremath{\text{LN}}\ models are problematic to estimate on some other networks we tried, and they can cause numerical problems. This paper does not discuss the route generation or sampling related to the explicit route sets of the models. As pointed out earlier, a correct sample of routes is required to obtain unbiased parameter estimates \citep{Frejinger2009984}. For econometrically sound applications, sampling techniques as presented by \citep{Frejinger2009984,Flotterod2013,Guevara2013} have to be adapted for the new models. Models with implicit route sets \citep{Dial197183,Papola2013CACIE,Fosgerau201370,Mai2015} do not have this issue, but they might lead to unrealistic routes. The connection between the link-based MEV model of \citep{Papola2013CACIE} with the route-based GMEV framework does not seem feasible due to the different base units, but if it exists, it might lead to new GMEV model instances. On the other hand, \citet{Prato2012} points out conceptual and empirical reasons that plea for the explicit approach. \section{Acknowledgements} We would like to thank Michel Bierlaire for the discussion with him on an early version of this paper, Kees van Goeverden for preparing the OViN data, and Giselle de Moraes Ramos-Heydendael for providing the foreseen travel time data. The study is performed as part of the Innovative Pricing for Sustainable Mobility (iPriSM) project in the Sustainable Accessibility of the Randstad (SAR) program of the Dutch National Science Foundation (NWO). The main theory in this paper is initiated during a visit of the corresponding author to the Institute of Transport and Logistics Studies at the University of Sydney. \bibliographystyle{apalike}
\section{Introduction} H{\,\sc ii} galaxies, also known as \it blue compact dwarf \rm depending on classification criteria \citep{Melnick1985}, are a subclass of dwarf galaxies characterized by its compactness ($\sim1$ kpc), high star formation rate and a spectrum dominated by intense emission lines superimposed to a weak stellar continuum, which resembles that observed in giant H{\,\sc ii} regions in spiral galaxies \citep{Sargent1970}. Among the observed emission lines are the hydrogen Balmer series and the forbidden lines of oxygen ([O\,{\sc iii}] $\lambda\lambda4959$, 5007, 4363, [O\,{\sc ii}] $\lambda\lambda3726$, 3729), nitrogen ([N\,{\sc ii}] $\lambda\lambda6548$, 6583), and sulfur ([S\,{\sc ii}] $\lambda\lambda6716$, 6731). The fact of being gas-rich and metal-poor objects raised the hypothesis that these galaxies were young systems forming their first stars \citep{Searle1972}, but the idea of being old systems with intermittent star formation bursts interleaved by quiescent periods has been supported by observations of an underlying old stellar population \citep{Thuan1983,Telles1997a,Westera2004,Corbin2006}. An important characteristic of these galaxies is the supersonic nature of their emission line profile, which is broader than that observed in typical H{\,\sc ii} regions \citep{Smith1970,Smith1971}. \citet{Terlevich1981} proposed that the gravitational potential is responsible for this supersonic line widths, as they found a correlation between H$\beta$ luminosity and velocity dispersion ($L\sim\sigma^{4}$) and radius and velocity dispersion ($R\sim\sigma^{2}$) in giant H{\,\sc ii} regions. This scenario was further supported by \citet{TenorioTagle1993}, who proposed a model to explain and maintain the supersonic motion, which is given by the constant passage of low-mass stars producing bow shocks. Alternatively, the supersonic motions may be maintained by the mechanical energy injected into the interstellar medium from the ongoing star formation activity, stellar winds, radiation pressure and supernovae explosions, all of which contribute to increase the turbulence \citep{Green2010,Moiseev2012,Moiseev2015}. These scenarios have difficulties to explain the $L\sim\sigma^{4}$ and $R\sim\sigma^{2}$ relations. Which of these mechanisms is dominant remains an open problem. \citet{Gallagher1983} suggested that the dominant mechanism depends on the system scale, being the gravitational potential in regions of hundreds of parsecs (supergiant H{\,\sc ii} regions) and energy from massive young stellar populations in regions of tens of parsecs (giant H{\,\sc ii} regions). Furthermore, \citet{TenorioTagle1996} demonstrated that the mechanical energy from massive stars is not sufficient to explain the observed line broadening, in agreement with \citet{Yang1996} who found that the stellar winds and supernova explosions act increasing the dispersion caused by the gravitational potential. Kinematics and dynamics of H{\,\sc ii} galaxies have been investigated, early on, by looking at their velocity dispersion. Rapidly a scale relation between emission line and velocity dispersion have been established \citep{Melnick1988}. These scale relations have been used early on as distance indicator. Taking advantage of larger survey and better data, recent studies could minimise errors in these relations \citep{Bordalo2011, Chavez2014}. These studies also show that such relations are subject to evolutionary effects, responsible, according to authors, for part of the dispersion of such relations. More recently, high redshift H{\,\sc ii} galaxies have been used as tools for precise cosmology \citep{Terlevich2015}. Kinematical studies of H\,{\sc ii} galaxies with 2D mapping instrumentation were first made by \citet{Ostlin1999,Ostlin2001} and focused on the analysis of velocity field to determine the mass distribution using rotation curves. The results showed a disturbed velocity field and supersonic velocity dispersion in a small sample of H\,\sc ii \rm galaxies, what pointed out that velocity dispersion dominates the gravitational potential. However, as the morphology of the galaxies suggested interaction or merger, the authors concluded that those galaxies were not systems in equilibrium, but in a merger process \citep{Ostlin2001}. Recently, using integral field spectroscopy, \citet{Lagos2016} and \citet{Kumari2017} came up with the same conclusion for the galaxies Tol 65 and NGC 4449, respectively, with a merger being responsible for trigger the star formation. The kinematics of both objects seems to be affected by stellar feedback \citep{Lagos2016,Kumari2017}. Further evidence of stellar feedback on H\,\sc ii \rm galaxies is presented by \citet{Cairos2017a,Cairos2017b} that found supersonic velocity dispersion in areas surrounding H\,\sc ii \rm regions and in the outskirts of the galaxies. In order to disentangle the line broadening mechanisms, we used diagnostic diagrams, such as $I - \sigma $, $I - V_r$ and $V_r - \sigma$, that have been revealed to be precious tools to find signatures of peculiar motions, as expanding shells, radial motions \citep{MunozTunon1996,Bordalo2009,Plana2017} and of turbulent ISM and \hbox{H\,{\sc ii}} region \citep{Moiseev2012}. The paper is organized as follows. In Section~\ref{sec:OR} we present observations and the reduction techniques used. The ionized gas kinematics is presented in \S~\ref{sec:IFUresults}, discussion of the diagnostic diagrams of H\,{\textsc{ii}} complexes is presented in \S~\ref{sec:diagrams} along with a statistical analysis of specific diagrams in section \S~\ref{sec:statistics}. The section \S~\ref{sec:PCA} is dedicated to a Principal Component Analysis of the data cubes. In \S~\ref{sec:discussion} our results are discussed. Finally in \S~\ref{sec:conclusion}, we give the summary and draw general conclusion. \section{Sample, Observations and Data Reduction} \label{sec:OR} \subsection{Sample} \subsubsection{UM 461} UM 461 was discovered in objective prism survey from the University of Michigan \citep{MacAlpine1981}. It has an optical structure formed by two compact star-forming knots, enveloped by a diffuse medium distorted toward the southwest, as seen in Fig.\ \ref{Fig01}. The knots are off-center, the brightest located east of the galaxy. The southwest extension of the nebulosity has been attributed to tidal effect due to an interaction with UM 462 \citep{Lagos2011,Noeske2003,Doublier1999}. \citet{Taylor1995} first studied this interpretation as they observed distortions in the isophotes of H\,{\sc i} emission of UM 461 towards UM 462, suggesting a binary system in interaction. On the other hand, in \hbox{H\,{\sc i}} observations from \citet{Zee1998} these two galaxies appear as isolated systems with no clear interaction signs. Although a possible interaction with UM 462 could be responsible for trigger the star formation in UM 461, \citet{OlmoGarcia2017} show evidence of accretion of metal-poor gas in the latter, producing a difference in metallicity along the galaxy and probably fueling the star formation activity. Near-infrared observations showed that the western knot can be spatially resolved into several stellar clusters and complexes, whereas the eastern knot is more compact \citep{Noeske2003,Lagos2011}. These clusters are young ($\sim 5$ Myr) with diameters smaller than 37 pc and masses of the order of $\sim10^4-10^6\,M_\odot$. A stellar population with ages $\gtrsim10^8$ yr is embedded in the nebular component that envelops the star-forming knots \citep{Lagos2011}. In a recent work, \citet{Lagos2018} report VIMOS-IFU observations of UM 461. They conclude that the ISM is well mixed, at large scale, but their study also reports a low metallicity region close to the brightest H{\,\sc ii} region. It leads the authors to imagine a scenario where a recent infall of a low mass metal-poor dwarf or H{\,\sc i} cloud occurred. \subsubsection{CTS 1020} CTS 1020 was also discovered by objective prism technique in the Cal\'an-Tololo Survey \citep{Maza1991}. It has a roughly spheroidal form and a well defined nucleus (Fig.\ \ref{Fig01}), classified as a \hbox{H\,{\sc ii}} type II according to \citet{Telles1997b}. It is a less studied galaxy, but its observational properties are reported in a number of catalogs \citep{Maza1991,Kilkenny1997,Stobie1997,Kehrig2004,Lagos2007,Kopparapu2008,Jones2009}. Analysis of H$\beta$ equivalent width indicates an intense star formation activity in a region slightly shifted from the center of the galaxy \citep{Lagos2007}. \subsection{Observations and Data Reduction} Observations have been carried out in two runs in February 12$^{th}$ 2008 and in February 18$^{th}$ 2010 as part of the GS-2008-Q32 program with Gemini South 8m telescope in Chile, using the Gemini Multi-Object Spectrograph (GMOS) equipped with an Integral Field Unit (IFU) on single-slit mode\citep{Allington2002}. Observations have been done under very good seeing conditions. UM 461 has been observed with a seeing between 0.35$\arcsec$ and 0.45$\arcsec$ and CTS1020 between 0.35$\arcsec$ and 0.5$\arcsec$. Table~\ref{Table1} gives essentials characteristics for both galaxies. This mode uses 750 hexagonal lenses, each associated with a fiber, to sample the focal plane. The fibers are arranged to form single column positioned at the entrance of the slit of the spectrograph. The sky is sampled by 250 lenses at a distance of 1\arcmin\ from the science field. As individual IFU provides a field of view of $5\arcsec\times 3.5\arcsec$ (in single-slit mode), it was necessary nine and five fields to cover UM 461 and CTS 1020, respectively (see Fig.\ \ref{Fig01}). The time exposure of each field was 600s and the R831/550 grating has been used along with the g filter G5322 (see Table \ref{Table2} for the journal of observation). The IFU fields positioning are shown in Fig.\ \ref{Fig01} superimposed to the acquisition image taken with a $g$ filter and time exposure of 30 s. \begin{table} \centering \caption{General parameters of the galaxies.} \label{tab:example_table} \begin{threeparttable} \makebox[\linewidth][r]{ \begin{tabular}{lcccc} \hline Galaxy & $\alpha$ & $\delta$ & $v_{sys}$ & $D$ \\ & $(J2000)$ & $(J2000)$ & (km s$^{-1}$) & (Mpc) \\ \hline UM 461 & 11 51 33.1 & -02 22 22 & 1039 & 19.3 \\ CTS 1020 & 10 47 44.3 & -20 57 49 & 3789 & 57.4 \\ \hline \end{tabular} } \begin{tablenotes} \footnotesize \item Informations obtained from NED. \end{tablenotes} \end{threeparttable} \end{table} \begin{figure*} \includegraphics[scale=1.0]{Fig01.pdf} \caption{Acquisition images of UM 461 and CTS 1020 taken with a $g$ filter and time exposure of 30s. Superimposed are the IFU field mosaic. Each IFU has a $3.5\arcsec \times 5\arcsec$ field of view.} \label{Fig01} \end{figure*} \begin{table*} \centering \begin{minipage}{140mm} \caption{Journal of Observation} \label{Table2} \begin{tabular}{ccccccc} \hline Galaxy & Observation & Instrument & Exposure & Fields & Grating & Resolution \\ & Date & & Time & Number & Filter & \\ \hline UM 461 & Feb. 12$^{th}$ 2008 & GMOS/IFU & 600s & 9 & R831 - G5322 & 4396 \\ CTS 1020 & Feb. 18$^{th}$ 2010 & GMOS/IFU & 600s & 5 & R831 - G5322 & 4396 \\ \hline \end{tabular} \end{minipage} \\ \begin{tablenotes} \item Informations from Gemini website. \end{tablenotes} \end{table*} Data have been reduced using special reduction package given by Gemini Staff \footnote{http://www.gemini.edu/node/10795} using the IRAF reduction package \footnote{Image Reduction and Analysis Facility is a software developed by the National Optical Astronomy Observatory - iraf.noao.edu}. All raw images have been bias corrected, trimmed and flat fielded. Flatfield images have also been used to locate the positions of the 750 lenses on the frame. Twilight images were used to estimate the grating response. Arcs, from the CuAr lamp, have also been taken for the wavelength calibration. Using the bright O\,{\sc i} night sky line at 5577.338\,\AA\ we have estimated the wavelength accuracy to 0.1\,\AA. The last step of the reduction was the sky subtraction using the field located at 1\arcmin\ from the science field. Finally the data cube has been created with the {\sc gfcube}. We used a spacial resampling of 0.1\arcsec\ per pixel. The total spectral coverage for both objects is between 4442\,\AA\ and 6559\,\AA. From the arcs spectra, we deduced a spectral sampling of 0.33\,\AA\ per spectral pixel. \section{Ionized gas moment maps} \label{sec:IFUresults} Specific macro using IDL (Image Data Language) have been used to produce the different maps. We perform a linear fit of the continuum and a Gaussian fit of the emission lines, using the {\sc gaussfit} task in IDL. We have considered signal from the galaxy a profile 3$\sigma$ above the sky level. The Gaussian fit gave us directly three maps: monochromatic (area of the profile), radial velocity (central wavelength) and velocity dispersion $(\sigma)$. Fig.\ \ref{Fig02} and Fig.\ \ref{Fig03} show profiles and the associated fit, estimated in 0.4$\arcsec$ x 0.4$\arcsec$ boxes, in four zones located in different areas for both objects. Location of zones is shown in Fig.\ \ref{Fig04}$b$ and Fig.\ \ref{Fig05}$b$. The Gaussian fit appears to be very good, even in outskirts zones where the SNR is lower ($\approx20$). Following the GAUSSFIT routine help, we estimate that the 1-$\sigma$ fit error is between 0.2 to 0.5 km s$^{-1}$ depending on SNR (see Fig.\ \ref{Fig02} and Fig.\ \ref{Fig03} captions). \begin{figure} \vspace{-0.0cm} \includegraphics[scale=0.22]{Fig02.pdf} \caption{UM 461: Profiles and Gaussian fit in four different zones of $0.4\arcsec~ \times~ 0.4\arcsec$. Different zones locations are given in Fig.\ \ref{Fig04}$b$. They represent integrated profiles in areas with very high SNR (>200) to area with SNR < 20.} \label{Fig02} \end{figure} \begin{figure} \vspace{-0.0cm} \includegraphics[scale=0.22]{Fig03.pdf} \caption{CTS 1020: Profiles and Gaussian fit in four different zones of $0.4\arcsec~ \times~ 0.4\arcsec$. Different zones locations are given in figure Fig.\ \ref{Fig05}$b$. They represent integrated profiles in areas with very high SNR (> 200) to area with SNR < 20.} \label{Fig03} \end{figure} For both galaxies, we were able to derive monochromatic map, velocity and velocity dispersion maps using only [O\,{\sc iii}]$\lambda$5007 emission line. The velocity dispersion map has been corrected from the instrumental and thermal broadening. The velocity dispersion ($\sigma$) was obtained by correcting the observed one ($\sigma_ {obs}$) for both instrumental ($\sigma_{inst}$) and thermal ($\sigma_{th}$) broadening, $\sigma_{obs} =\sqrt{\sigma^2 + \sigma^2_{th} + \sigma^2_{inst}}$. We have estimated the thermal dispersion to $\sigma_{th} = 3.2 \mathrm{\ km\ s}^{-1}$ for the oxygen (at a temperature of $10^4K$), and $\sigma_{inst} = 27.5 \pm 0.1$ km s$^{-1}$ for both galaxies, from several emission lines in calibration lamp used for the wavelength calibration. To take into account the seeing quality of observations, we performed a Gaussian smoothing of 0.4$\arcsec$ FWHM of the maps. Tests in regions on the outskirts of galaxies, where the SNR is below 20, reveal that sigma estimation from the gaussian fit has an relative error less than 3\% when continnum level is estimated till three times the linear fit errors. \begin{figure*} \includegraphics[width=5.8cm, angle=0, scale=1]{Fig04a.pdf} \includegraphics[width=5.8cm, angle=0, scale=1.02]{Fig04b.pdf} \includegraphics[width=5.8cm, angle=0, scale=1]{Fig04c.pdf} \caption{UM 461: $a)$ Radial velocity and $b)$ velocity dispersion maps. The superimposed contours are the flux from [O\,{\sc iii}]$\lambda$5007 line. Labels refer extracted profiles in Fig.\ \ref{Fig02} (numbers) and Fig.\ \ref{Fig14} (letters). $c)$ Velocity dispersion contour map with isocurves varying by 0.1 km s$^{-1}$. In colors we have points in the interval 20--29 km s$^{-1}$ and in gray scale for values out of this interval.} \label{Fig04} \end{figure*} \subsection{UM 461} \subsubsection{Monochromatic map} The [O\,{\sc iii}]$\lambda$5007 monochromatic emission map is superimposed on both velocity and velocity dispersion maps presented in Fig. \ref{Fig04}$a$ and Fig. \ref{Fig04}$b$, respectively. The eastern knot is a factor of 12 brighter compared to the western knot. \subsubsection{Radial Velocity map} The velocity map has been elaborated using a systemic velocity v$_{syst}$ = 1039 km s$^{-1}$ from NASA/IPAC Extragalactic Database (NED)\footnote{http://ned.ipac.caltech.edu/}. The eastern knot shows a velocity gradient of 15 km s$^{-1}$ from the southeast to the northwest of the knot. The western knot has a different pattern, as does not exhibit a clear gradient and is dominated by velocities between 1048 and 1061 km s$^{-1}$. Despite the low amplitude gradient in the eastern knot, the overall motion of the ionized gas is not ordered. Considering the stellar clusters and complexes spread along the galaxy, as observed in the near-infrared \citep{Lagos2011,Noeske2003}, the overall kinematics could result from the interaction of these stellar populations with the interstellar medium, as they evolve and inject mechanical energy into the medium through stellar winds and supernova explosions. The eastern knot, despite more compact, has at least three smaller companions around it, which could be responsible for the disturbed velocity field, mainly in the northeastern region. In the western knot, the stellar clusters are more spread out among them, producing a much less ordered motion. In fact, the velocity map of UM 461 suggests a weak kinematical connection between the knots. In agreement with this scenario, \citet{OlmoGarcia2017} show evidence of stellar feedback in the eastern knot and its coherent motion within the host galaxy. \citet{Lagos2018} velocity field of UM 461 is consistent with ours, showing the same velocity gradient in both knots. Radial velocities show a difference of $\approx 15$ km s$^{-1}$, that can be attributed to the spectral resolution difference. \subsubsection{Velocity dispersion map} The velocity dispersion map in Fig.~\ref{Fig04}$b$ shows that all velocity dispersions are supersonic, ranging between 15 to 35 km s$^{-1}$ in a few pixels. In the eastern knot, it is noticeable a ring-like structure with $\sigma$ values between 25 and 29 km s$^{-1}$ that envelops a region of lower dispersion (21--24 km s$^{-1}$). \citet{Melnick1988} and \citet{Bordalo2011} reported slightly lower velocity dispersion of 14.5 km s$^{-1}$ and 12.6 km s$^{-1}$, respectively. Our lowest $\sigma$ is 15 km s$^{-1}$, but in the center of the brightest knot, where the one fiber measurement certainly has been done, our value is $\approx20$ km s$^{-1}$. In the western knot, the velocity dispersion increases toward the southeast, with some small regions of increasing $\sigma$. A few pixels show very high velocity dispersion (especially in the connection between the knots) up to 50 km s$^{-1}$. In Fig.~\ref{Fig04}$c$ we show a velocity dispersion contour map obtained varying the isocurves by 0.1 km s$^{-1}$. In this map, we wanted to highlight regions in the interval 20 to 29 km s$^{-1}$ (shown in colors), because the contrast with the highest and lowest $\sigma$ values (in gray scale) makes it difficult to see some fine structures within these regions. In fact, we found several regions of increasing $\sigma$ (meaning a local $\sigma$ peak surrounded by decreasing values) along the galaxy. By restricting the $\sigma$ range allowed us to better distinguish the ring-like structure in the eastern knot. This structure resembles the distribution of H$\beta$ equivalent width reported by \citet{Lagos2007}, that exhibits $EW(H\beta$) higher than 300\,\AA, indicating an intense star formation activity in the eastern knot. \begin{figure*} \includegraphics[width=5.8cm, angle=0, scale=1.]{Fig05a.pdf} \includegraphics[width=5.8cm, angle=0, scale=1.]{Fig05b.pdf} \includegraphics[width=5.8cm, angle=0, scale=1.]{Fig05c.pdf} \caption{CTS 1020: $a)$ Radial velocity and $b)$ velocity dispersion maps. The superimposed contours are the flux from [O\,{\sc iii}]$\lambda$5007 line. Labels refer extracted profiles in Fig.\ \ref{Fig05} (numbers) and Fig.\ \ref{Fig15} (letters). $c)$ Velocity dispersion contour map with isocurves varying by 0.1 km s$^{-1}$. In colors we have points in the interval 38--47 km s$^{-1}$ and in gray scale for values out of this interval.} \label{Fig05} \end{figure*} \subsection{CTS 1020} \subsubsection{Monochromatic map} The [O\,{\sc iii}]$\lambda$5007 monochromatic emission map is superimposed on both velocity and velocity dispersion maps presented in Fig.\ \ref{Fig05}$a$ and Fig.\ \ref{Fig05}$b$, respectively. Emission extends across all observed fields (and possibly beyond the observed fields in the northeast and east). It is also noticeable an extension towards the southwest, which probably is a manifestation of a second nucleus, but the lack of spatial resolution prohibits to see it. \subsubsection{Radial Velocity map} We used v$_{syst}$ = 3789 km s$^{-1}$ as systemic velocity from NED. The velocity field of CTS 1020 is very different from UM 461. Here we can clearly see a velocity gradient more consistent with a rotating disk. Across a velocity major axis of 0$^o$, radial velocity varies from 3752 km s$^{-1}$ in the south to 3800 km s$^{-1}$ in the north. Southwest from the monochromatic center (at $\sim1\arcsec$), a small region shows radial velocities 10 km s$^{-1}$ higher than immediate surroundings. We speculate that it can be a high velocity cloud. East of the center, on the edge of the field, a region of $2\arcsec \times 1.5\arcsec$ shows high radial velocities between 3805 and 3818 km s$^{-1}$, the highest of the velocity field. Here too, we can speculate that it is a high velocity cloud, but because our fields did not cover the galaxy entirely, it is difficult to conclude. Despite a clear velocity gradient compatible with a disk pattern, it is almost certain that the kinematics is more complex than it seems. From the monochromatic map we derived an inclination angle of the disk by doing the ratio of the minor axis to the major axis, we found 30$^o$. \subsubsection{Velocity dispersion map} The outskirt of the velocity dispersion map (Fig.\ \ref{Fig05}$b$) shows velocity dispersion lower than $\sigma = 20$ km s$^{-1}$, where the SNR is close to the limit discussed above and the Gaussian fit profile is not so good. Nevertheless, after an eye check of these profiles, we are confident that the estimated dispersion is accurate. Beside this region, the velocity dispersion reaches low values ($\sigma<38$ km s$^{-1}$) in the northern and southern regions, while highest values ($\sigma>47$ km s$^{-1}$) are concentrated in an arch in the southeastern part of the galaxy. Crossing the center of the galaxy in the east to west direction $\sigma$ assumes values between 38 and 47 km s$^{-1}$. Fig.\ \ref{Fig05}$c$ shows the $\sigma$ contour map restricted to the range 38--47 km s$^{-1}$ (shown in colors). These values are mainly concentrated in the area along the center toward the west of the galaxy. By restraining the $\sigma$ range, we can now distinguish few regions of increasing $\sigma$: in the center, $\sigma$ increases with intensity; in the west coincides with the disturbed region seen in the velocity field; in the southeastern region $\sigma$ reaches values higher than 47 km s$^{-1}$. \section{Diagnostics diagrams}\label{sec:diagrams} \subsection{Description} As mentioned before, several studies have shown that \hbox{H\,{\sc ii}} galaxies have supersonic velocity dispersion and little velocity gradient. In order to study the dynamic of these objects, several studies have suggested over the years, the use of the so called, diagnostic diagrams such: $I - \sigma$, $I - V_r$ or $V_r - \sigma$. For each galaxy, we are presenting the $I - \sigma$ in Fig.~\ref{Fig06}$a$, $I - V_r$ in Fig.~\ref{Fig06}$b$ and $V_r - \sigma$ in Fig.~\ref{Fig06}$c$. \citet{Bordalo2009} summarise the different interpretations of these diagrams. Introduced by \citet{MunozTunon1996}, the $I - \sigma$ diagram has been used by those authors to identify expanding shells by localizing inclined bands. This interpretation is based on the fact that the velocity dispersion should be higher at the center of the shell and the intensity lower because less material is crossed along the line of sight than at the inner and outer edges of the shell. Large variations of radial velocity with a relatively narrow intensity interval in a $I - V_r$ diagram, could mean an expansion or an inflow of matter. The $V_r - \sigma$ panel looks at the dependence between the two variables. If a significative correlation is found between velocity and dispersion, it could mean the presence of relative motion inside the system. The inclined pattern is the signature of systematic motion, such as Champagne flows such that cloud of gas with high $\sigma$ moves away from us (positive slope) or toward us (negative slope). \begin{figure*} \includegraphics[width=17.0cm, angle=0, scale=1.1]{Fig06a.pdf} \includegraphics[width=17.0cm, angle=0, scale=1.1]{Fig06b.pdf} \caption{Diagnostic diagrams for UM 461 ({\it top}) and CTS 1020 ({\it bottom}): (a) Velocity Dispersion vs Intensity; (b) Radial Velocity vs Intensity; and (c) Velocity Dispersion vs Radial Velocity (c). We have separated the western (black) and eastern (blue) knots for UM 461. Horizontal dashed line represents instrumental broadening.} \label{Fig06} \end{figure*} \subsubsection{UM 461} The top panels of Fig.~\ref{Fig06} shows for UM 461. Each knot is represented with two different symbols. The $I - \sigma$ plot shows a similar behaviour for both knots, a trumpet like shape where the low intensity region has a large velocity dispersion range and the high intensity a narrow velocity dispersion interval. The $I - V_r$ panel clearly shows the velocity differences between both knots, with the western knot moving away from the eastern knot. The radial velocity range is larger at very low intensity level, due to the lowest SNR. No vertical bands, characteristic of expansion motion, is visible in either knots. The $V_r - \sigma$ plot shows a clear correlation, but a closer look seems to show sub-structures. We decided to investigate further using robust statistical tools, detailed in Section \ref{sec:statistics}. \subsubsection{CTS 1020} The bottom panels of Fig.~\ref{Fig06} show the diagrams for CTS 1020. The $I-\sigma$ diagram exhibits a different behaviour of $\sigma$ compared to UM 461. Here, $\sigma$ increases with intensity until reaches a lane along all intensities with values between 38 and 43 km s$^{-1}$ (highlighted in Fig. \ref{Fig05}$c$), and a mean of $40.3\ \mathrm{km\ s^{-1}}$. Fig.~\ref{Fig06}$b$ shows the $I - V_r$ corresponding diagram for this object. No radial motions (materialised by a vertical band) can be seen. The triangular shape toward the higher intensity, is more characteristic of a rotation pattern, with a maximum velocity amplitude of 80 km s$^{-1}$. The third plot (Fig.~\ref{Fig04}$c$) represents the $V_r - \sigma$ diagram. It seems that two populations are present, we have performed a deep statistical analysis in the Section \ref{sec:statistics} in order to extract those two populations. \subsection{$I - \sigma$ diagram} In Figs.\ \ref{Fig07} and \ref{Fig08}, we further explored the $I-\sigma$ diagram by looking at different regions and their respective location in the velocity dispersion map. We have divided the $I-\sigma$ diagram in three intervals of intensity (\it high \rm -- $\log I>3.5$; \it intermediate \rm -- $2.7<\log I<3.5$; and \it low \rm -- $\log I<2.7$), and $\sigma$ intervals according to values in the horizontal lane, in order to distinguish their distribution over the galaxy. \subsubsection{UM 461} \begin{figure*} \centering \includegraphics[width=17cm, angle=0, scale=1.11]{Fig07.pdf} \caption{$I-\sigma$ diagram and respective velocity dispersion map for UM 461. The black horizontal lines indicate, from top, the velocity dispersion in 24 and 19 km s$^{-1}$. The intensity is given in arbitrary units and is shown as contours in the map.} \label{Fig07} \end{figure*} Fig.\ \ref{Fig07} shows the $I-\sigma$ diagram and the respective velocity dispersion map for UM 461. This galaxy has a simple morphology with intensity decreasing outwards the knots. The high intensity regions (in dark blue) have an almost constant velocity dispersion ($\langle\sigma\rangle\sim21.8\ \mathrm{km\ s^{-1}}$), which also comprises an horizontal lane along the intensity range. The regions in $2.7<\log I<3.5$ also exhibit values around $\langle\sigma\rangle$ (in orange -- mainly in the eastern knot) with some regions of higher $\sigma$ (in yellow), which coincides with the ring-like structure shown in Fig.\ \ref{Fig04}$c$. The lowest ($\sigma<20$ km s$^{-1}$) and highest $\sigma$ values ($\sigma>32$ km s$^{-1}$) are located in the outermost regions of the galaxy, surrounding both star-forming knots. Only a few pixels reach $\sigma$ values higher than 32 km s$^{-1}$. These regions (shown in grey and red) cover the whole $\sigma$ range and form a triangular pattern, which is related to the turbulent motion in the diffuse gas that permeates the star-forming regions in the galaxy \citep{Moiseev2012,Moiseev2015}. It was not possible to identify signatures of expanding shells, as proposed by \citet{MunozTunon1996}. The horizontal lane with an almost constant $\sigma$ is supposed to be a supersonic random motion caused by a constant passage of bow shocks from low-mass stars in the model of \citet{MunozTunon1996}. \subsubsection{CTS 1020} \begin{figure*} \includegraphics[width=17cm, angle=0, scale=1.]{Fig08.pdf} \caption{$I-\sigma$ diagram and respective velocity dispersion map for CTS 1020. The black horizontal lines indicate, from top, the velocity dispersion in 43, 38 and 28 km s$^{-1}$. The intensity is given in arbitrary units and is shown as contours in the map.} \label{Fig08} \end{figure*} In CTS 1020, the velocity dispersion distribution (Fig. \ref{Fig08}) shows a different pattern from that of UM 461. Although the $\sigma$ range also decreases with intensity, the regions of high intensity are related to high velocity dispersion. This galaxy also presents a horizontal lane of an almost constant velocity dispersion ($\langle\sigma\rangle\sim40.3$ km s$^{-1}$), but contrary to UM 461, in CTS 1020 this value is higher than the overall mean ($37.1$ km s$^{-1}$) along the galaxy. The points in this lane (represented in dark blue, dark orange and red) are not widely spread along the galaxy (see also Fig.\ \ref{Fig05}$c$), as seems to be the case of UM 461. Instead, the regions represented in light blue, light orange and light grey, seems to cover a large area of the galaxy. The velocity dispersion seems to decrease outwards, but some regions show a velocity dispersion higher than the local average, such as the regions in dark orange. The high intensity region with $\sigma$ values around $\langle\sigma\rangle$ (in dark blue) cross the center of the galaxy in the east to west direction (As also seen in Fig.\ \ref{Fig05}$c$.). As observed in UM 461, the lowest ($\sigma<28$ km s$^{-1}$) and highest $\sigma$ values ($\sigma>43$ km s$^{-1}$) are located in the outer parts of the galaxy, except by a small region with $\sigma$ higher than 43 km s$^{-1}$ in the southeast (in yellow), which would be an evidence of expanding motion. Despite the different pattern, the main similarity with UM 461 is that the outermost regions (shown in grey and red) cover the whole $\sigma$ range, and could also be related to the turbulent motion of the diffuse gas. \section{Statistical Analysis}\label{sec:statistics} In order to extract information from the $V_r - \sigma$ diagram, we performed statistical analysis to determine the possibility of having several independent populations. To achieve this goal, we employed the {\tt R} statistical package ({\tt R} Development Core Team 2009), largely used in different statistical analysis. We aim at finding how many independent components are present (task {\tt Mclust}), to locate them in the diagram and in the map (so-called geographic location). {\tt Mclust} is a {\tt R} function for model-based clustering, classification, and density estimation based on finite Gaussian mixture modeling. An integrated approach to finite mixture models is provided with routines that combine model-based hierarchical clustering and several tools for model selection \citep[see][]{Fraley2007}. A central question in finite mixture modelling is how many components should be included in the mixture. In the multivariate setting, the volume, shape, and orientation of the covariances define different models (or parametrisation) with their different geometric characteristics. In {\tt Mclust}, the number of mixing components and the best covariance parameterisation are selected using the Bayesian Information Criterion (BIC). {\tt Mclust} also relates each element in the dataset to a particular component in the mixture. The code uses the Expectation-Maximization (EM) algorithm that maximizes the conditional expected log-likelihood at each M-step of the algorithm. \begin{figure*} \vspace{-0.5cm} \includegraphics[width = 16.0cm]{Fig09.pdf} \caption{UM 461 East (a) $V_r - \sigma$ diagram. Two components, blue and orange, separated using statistical analysis with the task {\tt Mclust}. (b) Geographic representation of the different components. UM 461 West (c) $V_r - \sigma$ diagram. {\tt Mclust} decomposition result, (d) Geographic representation of the different components. CTS 1020 (e) $V_r - \sigma$ diagram. Five components separated using {\tt MClust} task. CTS 1020 (f) Geographic representation of the different components. Solid lines represent linear regression of the different components in all plots.} \label{Fig09} \end{figure*} Below, we are detailing how we applied these different tasks and their results. \subsection{UM 461} In this case, we had to separate knots on the East and West. Fig.~\ref{Fig09}$a,~b$ shows the result of such statistical analysis for the eastern knot and Fig.~\ref{Fig09}$c,~d$ western knot. In UM 461 eastern knot, we found $m~=~4$ components. Two of these components did not seem to have physical meaning since they were regrouping dispersed points in the galaxy outskirt and small areas. The two others components correspond to two peaks in a density map of the diagram (not presented here), which gave us more confidence in the statistical decomposition. Both components are plotted in Fig.~\ref{Fig09}$a$, respectively in blue and orange, within a 80\% confidence level. We perform a standard Pearson's product-moment correlation test for the different components, in order to show the existence of systematic motions mentioned before. Subcomponent 1 (in orange) has a correlation of $0.37$ and correlation of subcomponent 2 (in blue) is $0.28$, both are considered as weak correlation. In UM 461 western knot, we also found $m~=~4$ components. As previously, only two seems to show a physical meaning. The relevant components correspond to denser areas of the diagram. The Pearson test, in both components gives respectively $0.33$ (orange component) and $-0.01$ (blue component). In both, East and West regions, we performed a simple linear regression (showed as solid lines in Fig.~\ref{Fig09}$a$, Fig.~\ref{Fig09}$c$) for these components when the correlation is relevant. In this context, both subcomponents in the eastern region can be interpreted as complexes with relatively high dispersion, moving away from the observer (positive slope). In the western region only the orange component shows a relevant correlation and the linear regression has a positive slope, corresponding to a complex moving away from the observer. Fig.~\ref{Fig09}$b,~d$ show the geographic location of the different components and subcomponents for both eastern and western knots. In both knots, the geographic location is compatible with the velocity field represented in Fig.~\ref{Fig04}$a$, with the subcomponent in blue representing the low velocity area and the orange subcomponent representing higher velocities. \subsection{CTS 1020} As for UM 461, before analysis, $V_r$ and $\sigma$ were normalized in order to avoid bias due to amplitude differences between $V_r$ and $\sigma$. The {\tt Mclust} analysis is presented in Fig.~\ref{Fig09}$e,~f$. It has separated three components in the $V_r - \sigma$ diagram. All of three components appear to have a physical meaning when we look at the X-Y location map (Fig.~\ref{Fig09}$f$). The first two ones (blue and grey) show weak (0.3 for first component) and moderate (0.54 for the second) correlation. Fig.~\ref{Fig09}$f$, representing the X-Y location of these regions, is also compatible with CTS 1020 velocity map (Fig.~\ref{Fig05}$c$) where the orange region represents the high radial velocities in the northwest and the blue region represents the lower radial velocities. The third component (grey) seems to correspond to the highest radial velocities but does not show any correlation with the Pearson test. We also perform a simple linear regression for both components (orange and blue, showed as solid lines in Fig.~\ref{Fig09}$e$), where the correlation is relevant. \section{Principal Component Analysis of Data Cubes}\label{sec:PCA} The basic idea of this analysis, used with multidimensional data, consists in apply a linear orthogonal transformation to take the data from their original basis, where they are correlated, to a new basis, where the variables are not. This new orthogonal basis, formed by eigenvectors, is then used to represent the data. Eigenvectors in this new coordinate system are classified by decreasing variance \citep{Starck2006}. A tomogram (or eigenimage) is a 2D representation of the projected data in this new basis. Each tomogram corresponds to an eigenspectrum, which is the representation the eigenvector components (or weights) versus the wavelength (or radial velocity). Weight values can be positive or negative which is reflected in the respective tomograms \citep{Cerqueira2015, Steiner2009}. This variance can be understood as the information quantity contained in each eigenvector. It is possible then to reconstruct the original cube using only the most relevant tomograms (the ones with higher variance), leaving aside the rest (basically noise or instrument fingerprint). The use of PCA with data cube has been explored by several authors during the past decade. \citet{Steiner2009} and \citet{Menezes2014} give details about PCA treatment and data preparation, see also \citet{Cerqueira2015} for more details. In the following, we are presenting the Principal Component Analysis for both galaxies, first analysing the four more relevant eigenspectra and tomograms and then presenting the reconstructed maps. We choose to perform this decomposition using [O\,{\sc iii}]$\lambda$5007 emission line because it is the brightest line. \begin{figure*} \vspace{-0.5cm} \includegraphics[width=17.0cm, angle=0, scale=1.0]{Fig10.pdf} \caption{UM 461. PCA decomposition of [O\,{\sc iii}]$\lambda$5007 data cube. Top row represents four tomograms with the highest variance. Bottom row presents the correspondent eigenvectors, with the respective variance.} \label{Fig10} \end{figure*} \begin{figure*} \vspace{-0.5cm} \includegraphics[width=17.0cm, angle=0, scale=1.0]{Fig11.pdf} \caption{CTS 1020. PCA decomposition of [O\,{\sc iii}]$\lambda$5007 data cube. Top row represents four tomograms with the highest variance. Bottom row presents the correspondent eigenvectors, with the respective variance.} \label{Fig11} \end{figure*} \subsection{Tomograms and Eigenspectra} Fig.~\ref{Fig10} and Fig.~\ref{Fig11}, respectively show the PCA decomposition of UM 461 and CTS 1020. On top, we present the four most relevant tomograms, representing respectively 99.55\%, 0.40\%, 0.03\% and 0.001\% of variance for UM 461 and 98.99\%, 0.90\%, 0.05\% and 0.02\% of variance for CTS 1020. For both galaxies, color coding are indicative of the weights (components) of the eigenvectors and are non-dimensional. For both galaxies, eigenspectra are represented in the bottom row. The Y axis represents the weights when the X axis gives the relative displacement, in velocity, with respect to the systemic velocity, respectively v$_{syst}$ = 1039 km~s$^{-1}$ for UM 461 and v$_{syst}$ = 3789 km~s$^{-1}$. \begin{itemize} \item The first tomogram, giving most of the variance, mainly represents the monochromatic emission for both galaxies, represented by isophotes in Fig.~\ref{Fig04}$a$ and Fig.\ \ref{Fig05}$a$. We recognise the two nuclei in UM 461 (brighter on the east) and the small extension in the southwest in the case of CTS 1020. \\ \item The second tomogram (and the respective eigenspectrum) shows a different pattern. For both galaxies, we can see that eigenvectors weights are positives and negatives with respect to the velocity displacement. In the case of UM 461, a positive velocity gradient can be seen with respect to the eigenspectrum, the red wing of the eigenspectrum corresponds to positive weight, associated to positive regions in the East nucleus of the tomogram. The blue wing is associated to the negative region of the East nucleus of the tomogram and with negative weights in the eigenspectrum. The maximum velocity gradient we can infer from the eigenspectrum is $\sim$70 km~s$^{-1}$. The western nucleus doesn't show any gradient.\\ In the case of CTS 1020, positive coefficients appear to be associated with the blueshifted wing of the eigenspectrum and negative coefficients with the redshifted wing. The tomogram associated with the eigenspectrum shows this gradient along a PA $\approx 0^o$. The velocity amplitude of this gradient, deduced from the eigenspectrum, is $\approx80$ km~s$^{-1}$. \\ \item The third tomogram shows different pattern between UM 461 and CTS 1020. In the case of UM 461, the eigenspectrum shows two negatives peaks (corresponding to blue regions in the tomogram) and one positive peak (corresponding to the red area). CTS 1020 eigenspectrum shows the opposite, two positive peaks and one negative peak. The western nucleus of UM 461 doesn't show velocity gradient and the eastern nucleus is showing two positive (red) regions with a negative (blue) region in between. In the case of CTS 1020, two negative (blue) areas with two positive (red) regions in between. \\ \item The fourth tomogram is very faint in UM 461 case but both eigenspectra are showing the same pattern with two negative and two positive peaks. \end{itemize} \subsection{Toy Models} \begin{figure*} \vspace{-0.5cm} \includegraphics[width=17.0cm, angle=0, scale=1.0]{Fig12.pdf} \caption{PCA decomposition of Rigid Body rotating disk. Top row represents four tomograms with the highest variance. Bottom row presents the correspondent eigenvectors.} \label{Fig12} \end{figure*} \begin{figure*} \vspace{-0.5cm} \includegraphics[width=17.0cm, angle=0, scale=1.0]{Fig13.pdf} \caption{PCA decomposition Rotating Disk. Top row represents four tomograms with the highest variance. Bottom row presents the correspondent eigenvectors.} \label{Fig13} \end{figure*} In order to interpret the physical meaning (if any) of eigenspectra and tomograms, we performed some simple toy models to be analysed using PCA and looked at results. Only one phenomenon comes to mind when we think about describing the ionized gas kinematics in a galaxy: a rotating disk. We basically simulate two kinds to rotation in order to be analysed using PCA, we first present a rigid body rotation and then a differential rotating disk. For the latter one, we decide to give three different inclinations. All models have in common an exponential light distribution, a position angle of 45$^o$ and a poissonian noise has been added. The light distribution is not important since it always represents the higher variance in the decomposition and the first tomogram represents it. \begin{itemize} \item Rigid Body Rotation \\ Fig.\ref{Fig12} gives the first four tomograms and eigenvectors for the model. As expected, the first component represents the exponential light distribution. The second tomogram is the velocity field, with the classic straight line isovelocities. The corresponding eigenvector reproduce the 60 km~s$^{-1}$ velocity gradient. Third and fourth eigenvectors, show alternately positive and negative coefficients. \\ \item Rotating Disk \\ In these model we simulate a rotating disk, with three different inclinations, i=20$^0$, i=45$^0$ and i=60$^0$ and a maximum rotational velocity of 60 km~s$^{-1}$. As mentioned before, we found that the second tomogram represents more or less the velocity field (confirmed by the amplitude found in the second tomogram). Fig.\ref{Fig13} only present the result of the PCA for a disk inclination of i=45$^0$. The second tomogram/eigenvector reproduces the velocity field of a rotating disk with a velocity amplitude of 60 km~s$^{-1}$ and a plateau after the first few arc seconds. The third and fourth eigenvectors, also show alternate positive and negative coefficients. The last two tomograms show negative (blue) and positive regions (red). \end{itemize} The principal aim of such simple models was to determine if a PCA decomposition was able to separate some kinematical parameters, such as inclination for instance, and our answer is no. We also simulate rotating disk with two different velocity dispersions, but the different eigenvectors look like the same and no differences can be found. As a result we are fairly confident that, only the two first eigenvectors/tomograms can have a physical interpretation, respectively as the light distribution (always with the highest variance) and the velocity field of some kind showing a velocity gradient. The interpretation of lower variance of eigenvectors will highly speculative. \subsection{Reconstructed Data Cubes} \begin{figure} \vspace{-0.0cm} \includegraphics[scale=0.22]{Fig14.pdf} \caption{UM 461: Reconstructed profiles from the PCA decomposition, in four regions of the galaxy. In blue are represented the reconstructed profile and in black, the original profile.} \label{Fig14} \end{figure} \begin{figure} \vspace{-0.0cm} \includegraphics[scale=0.22]{Fig15.pdf} \caption{CTS 1020: Reconstructed profiles from the PCA decomposition, in four regions of the galaxy. In blue are represented the reconstructed profile and in black, the original profile.} \label{Fig15} \end{figure} The great strength of the PCA decomposition, regarding data reduction, is the fact that it can eliminate noise in a very clean and efficient way. The reconstructed cube will be done by using the most significant eigenvectors (the one with higher variance), following the description by \citet{Steiner2009, Cerqueira2015}. We have limited the reconstruction to the first three eigenvectors representing 99.98\% of the variance in UM 461 case and 99.94\% for CTS 1020. In Fig.~\ref{Fig14} and Fig.~\ref{Fig15}, we present four original and reconstructed profiles in regions across UM 461 and CTS 1020. These regions are $0.4\times 0.4\arcsec$ and are located in different parts of the galaxies. Zones1 are located in the bright parts of each galaxy. The other zones are located in low SNR regions in the outskirts of each galaxy. In high SNR areas, there are virtually no differences between the original and the reconstructed profile. In the others zones, we can note that reconstructed profiles are more regular in shape. We can also note that the central velocities are almost identical between the original and reconstructed profiles. The major difference comes from the FWHM (and then the velocity dispersion). In both galaxies, the reconstructed profile appears to be narrower compared to the original profile. We have selected those profiles as examples, where the SNR is low. The differences in velocity dispersion is clearer when looking at the diagnostic diagrams, presented below. For both galaxies, we built the different maps and diagnostic diagrams and analysed them. Both the eastern and western parts of UM 461 do not show significant differences in the $Vr~ vs~ \sigma$, where differences could be seen more easily. Both regions, East and West, show similar distribution in the $Vr~ -~ \sigma$ plane compared to data without PCA analysis. In CTS 1020 case, the result is different. Fig.~\ref{Fig16} presents the diagnostic diagram Velocity Dispersion vs Radial Velocity from both reconstructed profiles and originals. Blue symbols represent original data and black symbols represent data from reconstructed profiles. Fig.~\ref{Fig16} shows velocities lower than 3740 km~s$^{-1}$ coming from regions in the South West. Fig.~\ref{Fig16} also shows a lower number of pixels with velocity dispersion higher than 45 km~s$^{-1}$ compared to original data. More generally, it is noticeable that the velocity and the velocity dispersion distribution have changed, even if the bulk of points seems to remain the same. The region with high velocity (beyond 3780 km~s$^{-1}$) and high velocity dispersion (larger than 40 km~s$^{-1}$) is not present anymore. These points came from the East - South East region in Fig.~\ref{Fig05}$b$, where the velocity dispersion is the highest. Profiles from Zones $e$ and $f$ (Fig.~\ref{Fig15}), clearly show that reconstructed profiles are narrower than original ones. \begin{figure} \vspace{-0.0cm} \includegraphics[scale=0.35]{Fig16.pdf} \caption{Velocity Dispersion vs Radial Velocity diagnostic diagram from reconstructed profiles and original. } \label{Fig16} \end{figure} \section{Discussion}\label{sec:discussion} In the following we discuss implications, for both galaxies, of our kinematical study. The motion in both star-forming knots of UM 461 has different patterns, suggesting a weak kinematical connection between the knots. The velocity field is disturbed mainly in the western knot, which is spatially resolved in individual stellar clusters and complexes \citep{Noeske2003,Lagos2011}. The overall kinematics of the galaxy is probably a result from the interaction with a low mass metal-poor dwarf or H{\,\sc i} cloud occurred \citep{Lagos2018}. At first glance, CTS 1020 seems to show a more ordered motion with a gradient of $\sim50$ km s$^{-1}$ (from velocity field top to bottom). The velocity field can be seen as a rotating disc, even though the velocity field is disturbed in several regions. The velocity dispersion in the eastern knot of UM 461 form a ring-like structure that resembles what we could expect in a collect and collapse scenario \citep{ElmegreenLada1997} in which the first generation of stars produces an H{\,\sc ii} region that expands and sweep up the interstellar medium creating a shell of material that will collapse and start to form stars within it. In that shell, the newly formed stars also create H{\,\sc ii} regions that expands into the shell ionizing it. In that way, the velocity dispersion induced to the gas in the most central region increases as the gas encounter an inhomogeneous medium and increases further as the stars within the shell drive H{\,\sc ii} regions. In that context, the regions of increasing $\sigma$ seen in Fig.\ \ref{Fig04}$c$ could be related to H{\,\sc ii} regions within the ring-like structure. This kind of ring-like structure has been observed in molecular gas that surrounds H{\,\sc ii} regions \citep{Deharveng2003,Deharveng2010}, but in an advanced stage the gas will be ionized by the stellar population formed in the shell and this molecular signature disappears. Thus, we could be looking at this advanced stage of a collect and collapse scenario, also favoured by the morphology of the eastern knot. This is in agreement with \citet{OlmoGarcia2017} that show a global expansion of this knot. Galaxies also differ in the $I-\sigma$ diagram distribution, but the overall picture still agree with the observed picture for this type of galaxy, in which the $\sigma$ range decreases with increasing intensity. The main difference is that, in UM 461, high intensity regions are related to low velocity dispersion, which is typically observed in H\,{\sc ii} galaxies \citep{Moiseev2012,Moiseev2015}, whereas the high intensity regions in CTS 1020 are related to high velocity dispersion. Despite this, the main similarity is that gas with low intensity covers the whole $\sigma$ range and permeates the brightest regions of the galaxies. As proposed by \citet{Moiseev2012}, this pattern is representative of the turbulent motion in the diffuse gas due to the injected mechanical energy from the stellar population. On the other hand, in CTS 1020 $\sigma$ decreases along with monochromatic intensity outwards the galaxy, implying that $\sigma$ is driven by virial motion \citep{Moiseev2015}. However, $\sigma$ is also probably affected by the injection of mechanical energy from the stellar population that increases the velocity dispersion in the outermost parts of the galaxy, where it should be lower in the proposed scenario. Signatures of disturbed regions can be observed in the velocity dispersion contour map (Fig.\ \ref{Fig05}$c$), where the western and southeastern regions exhibit structures of increasing $\sigma$, and the southeastern where it reaches $\sigma$ higher than 47 km s$^{-1}$. In summary, by using the $I-\sigma$ diagram along with the velocity dispersion contour map restricted to specific intervals it was possible to separate the line broadening mechanisms. The kinematics in both galaxies is affected by stellar feedback, but in CTS 1020 the gravitational potential dominates, whereas UM 461 seems to be more susceptible to the energy injection from the stellar population. The other diagnostic diagram that we used was the $V_r-\sigma$ diagram, which allows to detect systemic motions away or toward us. In order to find such correlations, we decided to use different statistical tests to separate independent components in this diagram. The {\tt MClust} analysis result of the eastern part of UM 461, shows two subcomponents with a weak, but measurable, correlation that points to a motion away from the observer. In the western knot of UM 461, the {\tt MClust} analysis result also gives two subcomponents, one with weak correlation and the other with no measurable correlation. This analysis points that one region is moving away from us. The {\tt MClust} analysis of $V_r-\sigma$ diagram for CTS 1020 also reveals three regions, two having weak and moderate correlations. Those regions appear to reproduce the radial velocity map in Fig.\ \ref{Fig09}$f$. revealing a weak motion toward us. In summary, the $V_r-\sigma$ diagram analysis for both galaxies shows a correlation between $V_r$ and $\sigma$ compatible with systemic motions toward and/or away from the observer. The use of reconstructed data cubes, after a PCA decomposition, changes the shape of several previously low SNR profile. These changes are reflected in the $V_r-\sigma$ diagram in Fig.\ \ref{Fig16}$c$. \citet{Lagos2018} gave a baryonic mass of 1.76~10$^8$ M$_{\odot}$ for UM461. The relation between dynamical mass and baryonic mass for starburst galaxie from \citet{Bergvall2016} gives then an estimated dynamical mass of 3.15~10$^8$ M$_{\odot}$. With UM 461 data: R=0.4kpc and $\sigma$ = 25 km.s$,^{-1}$, we found a dynamical mass (using the same aproximation as \citet{Bergvall2016}) of 2.75~10$^8$ M$_{\odot}$. To reach the predicted dynamical mass, the mean velocity dispersion should be 27 km.s$^{-1}$. \section{Summary and Conclusions}\label{sec:conclusion} In this work, we have studied the H{\,\sc ii} galaxies UM 461 and CTS 1020 based on integral field spectroscopy (Gemini GMOS-IFU). Taking advantage of monochromatic, velocity and velocity dispersion maps, we embarque in a kinematical analysis using different diagnostic diagrams (like $I-\sigma$ and $V_r-\sigma$) to investigate the nature of the internal kinematics for both objects. As mentioned before, velocity dispersion of ionized gas plays a major role in H{\,\sc ii} galaxies dynamics. The $L~ vs~ \sigma$ relation, based on single measurements, is interpreted as gravity being the main mechanism causing the supersonic broadening of emission profiles \citep{Chavez2014}. The main result of our study is that the kinematics of ionized gas of these two galaxies is different, but it also shows similarities. Differences come from the velocity and velocity dispersion maps themselves: in UM 461 no ordered motion is present, only velocity gradient; in CTS 1020 a disk like rotation pattern can be seen, even if a larger field of view is necessary to confirm it. Velocity dispersion maps show the same differences: in UM 461 regions of low dispersion correspond to high intensity regions, and CTS 1020 shows high dispersion areas where the intensity is the hightest and where intensity is low as well. $I-\sigma$ diagrams for both galaxies offer some differences. UM 461 diagram shows, according \citet{Moiseev2012}, signature of H\,{\sc ii} regions, constant velocity dispersion and high monochromatic emission, in both knots centers. It also shows the presence of turbulent diffuse gas. On the other hand, despite thte fact that, in CTS 1020 case, is still possible to identify the turbulent diffuse gas surrounding the galaxy, high $\sigma$ is related to high intensity and seems to decrease outwards, suggesting that $\sigma$ is driven by virial motions. Applying statistical methods, a closer analysis of the $V_r - \sigma$ diagrams, shows that several independent regions with weak and moderate correlation are consistent with systemic motions toward or away the observer. When reported on a geographic map, these regions are consistent with low and high velocities on the velocity maps. In the case of CTS 1020, it might means that the rotating disk can also be interpreted as large regions animated of opposite motions. A large field of view will be needed in order to find out if the velocity field really represents a rotating disk in that case. Finally, we also performed a PCA analyis of the data cube in order to improve the SNR. Our results show that data have been improved where the SNR was low, but also show that PCA seems to have modified the shape of the reconstructed profiles, resulting in more symetrical ones. \section*{Acknowledgments} This work is Based on observations obtained at the Gemini Observatory, which is operated by the Association of Universities for Research in Astronomy, Inc., under a cooperative agreement with the NSF on behalf of the Gemini partnership: the National Science Foundation (United States), the National Research Council (Canada), CONICYT (Chile), Ministerio de Ciencia, Tecnolog\'{i}$a$ e Innovaci\'{o}n Productiva (Argentina), and Minist\'{e}rio da Ci\^{e}ncia, Tecnologia e Inova\c{c}\~{a}o (Brazil). MSC would like to thanks Instituto Nacional de Tecnologia - Astrof\'{i}sica for its financial support. HP wants to thanks Casadinho CAPES/Cnpq project number 552236/2011-0 for its financial support. HP acknowledges the financial support from FAPESB agency under the project number 7916/2015. Authors warmly thanks A.L.B. Ribeiro for his help on the statistical analysis and the use of R. HP thanks the finnancial support from FAPESP agency under the project number 2014/11156-4. We also acknowledge the usage of the Nasa Extragalactic Database (http://ned.ipac.caltech.edu/) and R free software.
\section{\label{1} Introduction} Ferrimagnets are substances made of various components having different magnetic properties. The differences in magnetic moments lead to a geometric frustration that may arise because either different elements occupy the lattice sites or the same element occupies nonequivalent crystallographic sites surrounded by a different number or type of non-magnetic ions, which effectively results in different magnetic properties. For complex alloys a combination of both may take place (For an extensive review see Ref. \cite{skomski:2008} and references therein). Within mean-field approach it is generally accepted that ferrimagnets can be modeled with the help of several interpenetrating sublattices each ordered ferromagnetically with effective antiferromagnetic coupling between them. In the pioneering works of N\'{e}el on ferrimagnetism within the molecular field approach (see e.g. \cite{Neel:1971}), a two sublattice model is used to compute the thermal magnetization behaviour of ferrimagnets, and six possible magnetization curves were derived. Special attention there is paid to iron garnets, where the spontaneous magnetization in comparison with experiment can be interpreted by applying a three-sublattice model. In view of experimental study of magnetocaloric effect of rare-earth based ferrimagnets~\cite{Andreenko:1989} which has great potential for technological applications in environmentally-friendly refrigeration, the theoretical mean-field description of such alloys with three sublattices, is further elaborated~\cite{Ranke:2009}. Such studies are based on considering microscopic classical Heisenberg models with different exchange and spin-orbit interactions depending on the crystal structure, chemical composition of the particular alloy under study. \\There is another theoretical mean field approach based on considering mixed spin Ising model for description of ferrimagnets, see for example~\cite{Kaneyoshi:1991,Tucker:1999,Abubrig:2013}, where a very detailed review of the literature on this approach is presented. In the present paper we will consider ferrimagnets which can be described by different magnetic ions sitting on two interpenetrating sublattices in a body centred cubic structure. The interaction of ions on each sublattice is supposed ferromagnetic, while ions on the different sublattices are coupled antiferromagnetically. The magnetic properties will be investigated on the basis of bilinearly coupled Heisenberg classical model in a mean-field approximation which is treated using the Hubbard-Stratonovich transformation for obtaining the respective Landau free energy and its analysis. The rest of the paper is organized as follows: in Section 2 we describe in detail how we calculate the Landau free energy from classical Heisenberg model with competing interactions on the basis of previously applied approach~\cite{Shopova:2001} for derivation of mean field approximation. In Section 3 the solutions of equations of state obtained by the minimization of Landau energy derived in Section 1 are discussed. Section 4 summarizes the results both in strong and weak-coupling limit for ferrimagnetic substances under consideration. Section 5 generalizes the conclusions and possible further development of our study. \section{\label{2} The model and derivation of Landau free energy} The microscopic Heisenberg Hamiltonian which describes two coupled subsystems consisting of classical spins with different magnetic properties which antiferromagnetically between them through a bilinear term can be written in the following form : \begin{equation}\label{Eq1} H=-\frac{1}{2}\sum_{ij}^{2N} \left[\mathcal{J}^{(1)}_{ij}\mathbf{S}_i^{(1)} \cdot \mathbf{S}_j^{(1)} + \mathcal{J}^{(2)}_{ij}\mathbf{S}_i^{(2)} \cdot \mathbf{S}_j^{(2)} +2 \mathcal{K}_{ij}\mathbf{S}_i^{(1)} \cdot \mathbf{S}_j^{(2)}\right]. \end{equation} Here $\mathbf{S}_j^{(1,2)}$, are $n$-component classical Heisenberg spins whose magnitude is normalized on the unit sphere in spin space through the condition $|\mathbf{S}_j^{(1,2)}|=1$. The exchange parameters $\mathcal{J}^{(1,2)}_{ij}, \; \mathcal{K}_{ij}$ in the general case are $N \times N$ symmetric matrices with $N$ - the number of lattice sites considered equal for both subsystems. This condition simplifies the consideration as makes the system symmetric with respect to the interchange of the subsystems. The exchange matrices $ \mathcal{J}^{(1,2)}_{ij}$ denote the interaction between magnetic atoms of the same sort and $\mathcal{K}_{ij}$ - between magnetic atoms of different sorts. \\The above Hamiltonian may be applied to the description of magnetic systems which consist of two different magnetic materials and no matter what is the microscopic origin of this difference, it is effectively described by different exchange interactions within the two subsystems. There may be other situation when the substance is made only of one type of magnetic ions but they occupy two different crystallographic positions in the Bravais lattice and are separated by a number of non-magnetic atoms. Such substance may also be considered as built of two magnetic subsystems with different exchange interactions within them.\\ In order to analyse the behaviour of magnetization and the phase transitions in systems that can be described by the above microscopic Hamiltonian we have to find the mean-field energy for the Hamiltonian~(\ref{Eq1}) by calculating the partition function which in this case is represented by functional integral in n-dimensional spin space, where $n$ - is the number of spin components. To do this we apply the Hubabrd -Stratonovich transformation; see for example~\cite{Brout:1974} and the papers cited therein. We have used this approach in \cite{Shopova:2001} for ferromagnetic coupling between the two magnetic subsystems where a detailed description of procedure is given. Here we will just outline the important steps in the derivation of Landau free energy , especially in relation of antiferromagnetic coupling between the subsystems. \\ We present the two interacting different magnetic subsystems on a body-centered crystal lattice, for which the corners of elementary cube are occupied by one sort of magnetic atoms, and at the center of the cube atoms of different magnetic sort are located. So the nearest neighbours belong to different magnetic subsystems and the next-nearest neighbour to subsystems 1 and 2, respectively. Thus the system may be described as two interpenetrating sublattices,consisting of different magnetic atoms and we assume that the interaction within the sublattices $\mathcal{J}^{1,2}_{ij}$ is ferromagnetic and between them, $\mathcal{K}_{ij}$, it is antiferromagnetic. The Hubbard-Stratonovich transformation renders the initial microscopic Hamiltonian in new n-component variables $\mathbf{\Psi}^{(1)}_i, \mathbf{\Psi}^{(2)}_i$ defined in real space, directly connected with the initial spins (see~\cite{Shopova:2001}), namely: \begin{align}\label{Eq2} \mathcal{H}=\frac{1}{2}\sum_{ij}^{2N}\left(J_{ij}^{(1)}\mathbf{\Psi}_i^{(1)} \cdot \mathbf{\Psi}_j^{(1)}+ J_{ij}^{(2)}\mathbf{\Psi}_i^{(2)} \cdot \mathbf{\Psi}_j^{(2)}+2K_{ij}\mathbf{\Psi}_i^{(1)} \cdot \mathbf{\Psi}_j^{(2)}\right) \\ \nonumber- \ln\left[\sum_{i}^{2N}\textsl{I}_{n/2-1}(x_i^{(1)}) (\frac{x_i^{(1)})}{2})^{-n/2}\Gamma(\frac{n}{2})\right] - \ln\left[\sum_{i}^{2N}\textsl{I}_{n/2-1}(x_i^{(2)} )(\frac{x_i^2}{2})^{-n/2}\Gamma(\frac{n}{2})\right]. \end{align} Here $\textsl{I}_{n/2-1}(x_i^{(1,2)} )$ is the modified Bessel function, and $\Gamma(\frac{n}{2})$ is the Gamma function. In the above expression the exchange parameters $J_{ij}^{(1,2)}$ and $K_{ij}$ are connected to those in the initial Hamiltonian ~(\ref{Eq1}) by the relations: \begin{eqnarray}\label{Eq3} \nonumber J_{ij}^{(1,2)} &=& \frac{\mathcal{J}^{(1,2)}_{ij}}{T} \\ K_{ij} &=& \frac{\mathcal{K}_{ij}}{T} \end{eqnarray} with $T$ - the temperature. \\ We denote by $x_i^{(1)}$ and $x_i^{(2)}$ in (\ref{Eq2}) the following expressions: $$x_i^{(1)}=\left|J_{ij}^{(1)}\mathbf{\Psi}_j^{(1)}+K_{ij}\mathbf{\Psi}_j^{(2)}\right|; \;\; x_i^{(2)}= \left|J_{ij}^{(2)}\mathbf{\Psi}_j^{(2)}+K_{ij}\mathbf{\Psi}_j^{(1)}\right|$$ The terms containing Bessel functions in~(\ref{Eq2}) will be further used only in the form of expansion with respect to $x_i^{(1,2)}$ up to forth order by using the relation: $$\Gamma(\frac{n}{2}) (\frac{2}{x})^{(n/2-1)}I_{n/2-1}(x)=1+\sum_{k=1}^{\infty}\frac{(x^2/4)^k}{k!(k+n/2+1)(k+n/2-2) ...n/2}$$ The next step is to perform Fourier transformation to $\mathbf{k}$-space , and pass to continuum limit in $\mathbf{k}$ as the finite size effects will not be considered at this stage. The quadratic part of the obtained Hamiltonian again contains a bilinear term with respect to $\mathbf{\Psi}^{(1,2)}(\textbf{k})$ and we have to diagonalise it. This is done with the help of unitary matrix $\hat{S}$: \begin{equation}\label{Eq4} \hat{S}= \left( \begin{array}{cc} S_0(\mathbf{k}) & -S_1(\mathbf{k}) \\ S_1^{\ast}(\mathbf{k}) & S_0(\mathbf{k}) \\ \end{array} \right). \end{equation} The eigenvalues of the matrix $\hat{S}$ read: \begin{equation}\label{Eq5} \lambda_{1,2}(\mathbf{k})=\frac{1}{2}\left[J_1(\mathbf{k})+J_2(\mathbf{k}) \pm \sqrt{(J_1(\mathbf{k})-J_2(\mathbf{k}))^2+4K(\mathbf{k})^2}\right], \end{equation} where $J_{1,2}(\mathbf{k})$ and $K(\mathbf{k})$ are the Fourier transforms of $J_{ij}^{(1,2)}$ and $K_{ij}$, respectively. In order to compute the integral we use the steepest-descent method, \textit{i.e.} the integration contour is taken around the maxima of the eigenfunctions (\ref{Eq5}). The calculation for bcc structure show that if we take the nearest neigbour interaction between atoms of the same sort and the nearest neighbour interaction between the atoms of different sort, $\lambda_{1,2}(\mathbf{k})$ has a maximum in the centre of the Brillouin zone that gives ferromagnetic ordering for the sublattices with antiferromagnetic $K<0$ interaction between them which is the focus of our consideration below. We should note that $\lambda_{1,2}(\mathbf{k})$ has a maximum also at the border of the Brillouin zone $\mathbf{k}=\pi/a$ ($a$ is the lattice constant) which supposes antiferromagnetically ordered sublattices. There may be also some local maximum inside the Brillouin zone, which may give some incommensurate ordering within the sublattices, but this case is beyond the scope of the present study.\\ After performing the reverse Fourier transform to real space we obtain the dimensionless Landau energy in the following form: \begin{align}\label{Eq6} \frac{F}{T} = \frac{t_1}{2}\overrightarrow{\psi}_1^2 & +\frac{t_2}{2}\overrightarrow{\psi}_2^2+\frac{g}{4}\left[(\overrightarrow{\psi}_1^2)^2+(\overrightarrow{\psi}_2^2)^2\right] \nonumber\\ & +\frac{b}{2}\overrightarrow{\psi}_1^2\overrightarrow{\psi}_2^2 +b(\overrightarrow{\psi}_1\cdot\overrightarrow{\psi}_2)^2+w(\overrightarrow{\psi}_2^2-\overrightarrow{\psi}_1^2)(\overrightarrow{\psi}_1\cdot\overrightarrow{\psi}_2). \end{align} The coefficients of the Landau energy are expressed by the components of the matrix~(\ref{Eq4}) and its eigenvalues~(\ref{Eq5}) for $\mathbf{k}=0$: \begin{align}\label{Eq7} \nonumber S_0 & = \frac{1}{D}\left(J_1-J_2 +\sqrt{(J_1-J_2)^2+4K^2}\right), \\ S_1 & = \frac{2K}{D} \end{align} where $D$ is introduced to satisfy the condition $\|\hat{S}\|=1$, namely $S_0^2+S_1^2=1$: \begin{equation}\label{Eq8} D=\sqrt{2}\left[(J_1-J_2)^2+4K^2\right]^{1/4}\left[J_1-J_2 +\sqrt{(J_1-J_2)^2+4K^2} \right]^{1/2}. \end{equation} We will write here the explicit expressions for the coefficients of landau energy as we will need them further in solving the mean field equations and discussion of obtained results; \begin{subequations}\label{Eq9} \begin{align} t_{1,2} & = \frac{1}{\lambda_{1,2}}-\frac{1}{n}\\ g & = \frac{u}{2}(S_0^4+S_1^4) \\ b & = uS_1^2S_0^2 \\ w & = \frac{u}{2}S_0S_1(S_0^2-S_1^2); \end{align} \end{subequations} here $u=n^2 (n+2)$ with $n$ - the number of order parameter components. The real vector fields $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$ in the Landau free energy~(\ref{Eq6}) play the role of two coupled order parameters, and the averaged sublattice magnetizations are related to them by the equations: \begin{subequations}\label{Eq10} \begin{align} \overrightarrow{m_1} & = \frac{S_0}{\lambda_1}\overrightarrow{\psi_1} -\frac{S_1}{\lambda_2}\overrightarrow{\psi_2}\\ \overrightarrow{m_2} & = \frac{S_1}{\lambda_1}\overrightarrow{\psi_1} + \frac{S_0}{\lambda_2}\overrightarrow{\psi_2} \end{align} \end{subequations} \section{\label{3} Solving mean-field equations} The initial microscopic Hamiltonian is symmetric with respect to the rotation of all spins through the same angle. The application of Hubbard-Stratonovich transformation for derivation of landau free energy , given in previous section, preserves the symmetry of initial hamiltonian also with respect to field variables $\overrightarrow{\psi}_{1,2}$ which means that we can find the magnitude and the mutual orientation between order parameters $\overrightarrow{\psi}_{1,2}$ but not their orientation with respect to crystallographic axes. This may be done for particular magnetic substance by including in the initial microscopic Hamiltonian terms accounting for the magnetic anisotropy. For pure exchange interactions we can introduce the following notations~\cite{Shopova:2001}: $\overrightarrow{\psi_1}_i=|\overrightarrow{\psi_1}|\beta_i$ and $\overrightarrow{\psi_2}_i=|\overrightarrow{\psi_2}|\delta_i$, where $|\overrightarrow{\psi_1}|=\psi_1, \; |\overrightarrow{\psi_2}|=\psi_2$ are the magnitudes of the vector fields, and $\beta_i, \; \delta_i$ are the respective direction cosines, which fulfil the condition: \begin{equation}\label{Eq11} \sum_{i=1}^3\beta_i^2=1 \quad \mathrm{and} \quad \sum_{i=1}^3\delta_i^2=1. \end{equation} The equations of state then will be: \begin{equation}\label{Eq12} \frac{\partial f}{\partial X_i}=0, \quad \mathrm{where} \quad X_i=\{\psi_1, \psi_2, \beta_i, \delta_i\} \end{equation} Solving the above equations with respect to direction cosines $\beta_i, \; \delta_i$ gives two possible orientations between the vector fields $\overrightarrow{\psi_1}, \overrightarrow{\psi_2}$ for $K<0$: \begin{enumerate} \item The collinear phase with $\sum_i \beta_i \delta_i = -1$, that is, $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$ are antiparallel, and \item The non-collinear phase with $\sum_i \beta_i \delta_i = 0$, that is, $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$ are perpendicular. \end{enumerate} Below we will discuss in detail the non-collinear phase 2. The angle between the order parameters $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$, \emph{i.e.},is; $$ \sum_i^3 \beta_1 \delta_i = -\frac{w (\psi_2^2-\psi_1^2)}{2 b \psi_1 \psi_2} $$ and is defined only when $\psi_1\neq 0$ and $\psi_2\neq 0$. For $K < 0$, the analysis shows that the non-collinear phase exists only when the order parameters $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$ are of equal magnitudes, meaning that the order parameters $\overrightarrow{\psi}_1 $ and $\overrightarrow{\psi}_2$ are mutually perpendicular. The magnitude $\psi=\psi_1=\psi_2$ for the non-collinear phase in analytical form reads: \begin{equation}\label{Eq13} \psi^2=-\frac{t_1+t_2}{u}. \end{equation} Then the sublattice magnetization magnitudes calculated using the above expressions for the non-collinear phase will be: \begin{subequations}\label{Eq14} \begin{align} |\overrightarrow{m}_1| & = \psi\sqrt{\frac{S_0^2}{\lambda_1^2}+\frac{S_1^2}{\lambda_2^2}}, \\ |\overrightarrow{m}_2| & = \psi\sqrt{\frac{S_1^2}{\lambda_1^2}+\frac{S_0^2}{\lambda_2^2}}. \end{align} \end{subequations} Note that the sublattice magnetizations are not perpendicular but form an angle $\angle(\overrightarrow{m}_1,\overrightarrow{m}_2) =\gamma$ with each other, expressed by $$ \cos(\gamma)=\frac{S_0S_1(\lambda_1^2-\lambda_2^2)}{\sqrt{(S_0^2\lambda_2^2+S_1^2\lambda_1^2)(S_1^2\lambda_2^2+S_0^2\lambda_1^2)}}. $$ The calculations show that this non-collinear phase for $K<0$ within the exchange approximation has no domain of stability. We should mention here that the free energy ~(\ref{Eq6}) is very sensitive to the sign of interaction $K$ between the sublattices. When $K>0$, \emph{i.e.}, the interaction between the sublattices is ferromagnetic there is small domain in which the respective non-collinear phase is stable \cite{Shopova:2003}.\\ For antiparallel $\overrightarrow{\psi_1}$ and $\overrightarrow{\psi_2}$ it is obvious that the sublattice magnetizations~(\ref{Eq10}) will be also antiparallel. We may write the resulting equations for the magnitudes of the order parameters $\psi_1$ and $\psi_2$ of the collinear phase and $K<0$ in the following form: \begin{subequations}\label{Eq15} \begin{align} t_1\psi_1 + g \psi_1^3 + 3b \psi_1\psi_2^2-w \psi_2 (\psi_2^2-3\psi_1^2) & = 0, \\ t_2\psi_2+ g \psi_2^3 + 3b \psi_1^2\psi_2-w \psi_1 (3\psi_2^2-\psi_1^2) & = 0, \end{align} \end{subequations} with the stability conditions given by: \begin{align}\label{Eq16} t_1+3g\psi_1^2+3b\psi_2^2+3w\psi_1\psi_2 & > 0 \\ (t_1+3g\psi_1^2+3b\psi_2^2+6w\psi_1\psi_2)&(t_2+3g\psi_2^2+3b\psi_1^2-6w\psi_1\psi_2)\nonumber\\ -9[w(\psi_1^2-\psi_2^2)+2b\psi_1\psi_2]^2 & \geq 0 \end{align} We will make some remarks on the dependence of solutions of above system on the magnitude of exchange parameters $J_1, \; J_2$ and $K$. When $J_1<|K|, J_2<|K|$, the leading interaction is determined by the antiferromagnetic coupling between the two sublattices. This may be called a strong coupling limit for which the eigenvalue $\lambda_2(\mathbf{k}=0)$ \begin{equation}\label{Eq16} \lambda_{2}=\frac{1}{2}\left[J_1+J_2-\sqrt{(J_1-J_2)^2+4K^2}\right], \end{equation} becomes negative. This is equivalent to the inequality $K^2-J_1J_2 >0$. The coefficient $t_2$ in front of $\psi_2^2$ becomes positive; see (\ref{Eq9}), and the field $\overrightarrow{\psi}_2$ becomes redundant. The Landau free energy (\ref{Eq6}) will be: \begin{equation}\label{Eq17} (\frac{F}{T})_s= f_s = \frac{t_1}{2}\overrightarrow{\psi_1}^2 +\frac{g}{4}(\overrightarrow{\psi_1}^2)^2 \end{equation} The minimization of above equation gives for $\overrightarrow{\psi_1}$ the solution: \begin{equation}\label{Eq18} (\overrightarrow{\psi_1})^2 = - \frac{t_1}{g} \end{equation} which exists and is stable for $t_1<0$.\\ The sublattice magnetizations: \begin{eqnarray}\label{Eq19} \overrightarrow{m}_1 &=&\frac{S_0}{\lambda_1} \overrightarrow{\psi_1}\\ \nonumber \overrightarrow{m}_2 &=&\frac{S_1}{\lambda_1} \overrightarrow{\psi_1} \end{eqnarray} will be antiparallel as $S_1\sim K/D$ and $K<0$. The phase described by the above equations will be presented by two antiparallel sublattices with different magnitudes of sublattice magnetizations.\\ In the weak coupling limit for antiparallel configuration, \emph{i.e.}, when $J_1>|K|, J_2>|K|$, or equivalently $J_1J_2 > K^2$, the system of equations~(\ref{Eq15}), together with the stability conditions (\ref{Eq16}), (\ref{Eq17}) should be solved. This can be done numerically and the results will be presented in the next section. \section{\label{4} Results and discussion} The analytical result for sublattice magnetizations in the limiting case of strong coupling~(\ref{Eq19}) gives for the magnitude of total magnetization $|\overrightarrow{M}| = |\overrightarrow{m}_1+ \overrightarrow{m}_2|$ the following expression: $$|\overrightarrow{M}|=S_0 \frac{|\psi_1|}{\lambda_1}\left|1+\frac{S_1}{S_0}\right|$$ with $|\psi_1|^2$, given by (\ref{Eq18}). The phase transition is obviously of second order and the total magnetization behaviour with temperature is smooth resembling the one of Weiss ferromagnet with the exception that no saturation is reached for $T=0$. According to the Neel's classification of ferrimagnets, see~\cite{Neel:1971}, the change of magnetization with temperature in the strong coupling limit falls within R-type curve. For example, similar curve is obtained theoretically and compared with the respective experiment for Y$_3$Fe$_5$O$_{12}$~\cite{Ranke:2009} where two sublattice model with strong antiferromagnetic coupling is considered.\\ In the limiting case when $J_1=J_2=J$ the relation will hold $S_0=-S_1= 1/\sqrt{2}$ and an antiferromagnetic structure with $\overrightarrow{m}_1= - \overrightarrow{m}_2$ will appear, only if $\overrightarrow{\psi}_2\equiv 0$ and $|\overrightarrow{\psi}_1|^2=-2t_1/u$. The transition temperature for antiferromagnetic ordering will be given by: $t_c^{a}= (J+|K|)/n$.\\ Further we will present the numerical results for the temperature dependence of sublattice magnetizations and the total magnetization of the system in the weak-coupling limit which we define here in the following way: $\mathcal{J}_1 > |\mathcal{K}|$ and $\mathcal{J}_2 > |\mathcal{K}|$. Such a situation is present, for example in some ferrimagnetic compounds like GdCo$_{12}$B$_6$~\cite{Isnard:2012}. It is experimentally found that the exchange constants within sublattices are ferromagnetic and larger than the antiferromagnetic coupling between the sublattices; moreover there the magnetic anisotropy is small.\\ Experiments for some R-T compounds where R is a rare earth element and T is a transition element, show that the exchange in the transition metal sublattice is leading in magnitude, while the exchange in the rare-earth ion sublattice can be safely ignored and considered as negligible. The intersublattice interaction is also small see, for example, DyFe$_5$Al$_7$~\cite{Gorbunov:2012}, ErFe$_{11}$TiH~\cite{Kostyuchenko:2015}, RCo$_2$ (R = Tb and Gd and R = Er, Ho, and Dy)~\cite{Valiev:2017}. In our notations the relation between the exchange integrals in this case will be $\mathcal{J}_1>|\mathcal{K}|\gg \mathcal{J}_2$, so this does not fall into our assumption of weak coupling and will not be considered here.\\ In order to solve numerically the equations of state~(\ref{Eq15}) for weak coupling between sublattices we introduce the following dimensionless parameters. \begin{subequations}\label{Eq22} \begin{align} t&= \frac{T}{\mathcal{J}_1 + \mathcal{J}_2}, \\ \alpha&= \frac{\mathcal{J}_1 - \mathcal{J}_2}{\mathcal{J}_1 + \mathcal{J}_2},\\ \beta&= \frac{\mathcal{K}}{\mathcal{J}_1 + \mathcal{J}_2}, \end{align} \end{subequations} with $t$ -- the dimensionless temperature. In the above expression we have supposed that $\mathcal{J}_1 >\mathcal{J}_2$ which in view of symmetry in interchanging the sublattices does not limit the consideration; then $\alpha >0$ and $\beta<0$ as $\mathcal{K}<0$. The weak coupling between the sublattices, namely $ \mathcal{J}_1 > |\mathcal{K}|$ and $\mathcal{J}_1 > |\mathcal{K}|$ may be expressed by the parameters from~(\ref{Eq22}) by the relation: $$ \alpha^2 + \beta^2 <1. $$ The parameter $\alpha$ is a measure for the difference in exchange parameters of the two sublattices and by its definition $0<\alpha<1$.\\ The total magnetization of the system is the sum of sublattice magnetizations~(\ref{Eq10}): \begin{equation}\label{Eq23} \overrightarrow{M}=\overrightarrow{m}_1+\overrightarrow{m}_2 =\frac{S_0+S_1}{\lambda_1}\overrightarrow{\psi}_1+\frac{S_0-S_1}{\lambda_2}\overrightarrow{\psi}_2. \end{equation} Hereafter we will use the following notations for magnitudes of sublattice magnetizations and total magnetization both in the text and in figures: $$m_1=|\overrightarrow{m}_1|; \; \;m_2=|\overrightarrow{m}_2|; \mathrm{and} \;M=|\overrightarrow{M}|$$ The calculations show that the phase transition to ordered ferrimagnetic state occurs at temperature : $$t_c=\frac{1}{6}(1+\sqrt{\alpha^2+\beta^2})$$ which grows when either the difference between the exchange interactions in sublattices grows, or when the antiferromagnetic coupling is bigger, or both. The phase transition from disordered to ordered phase is of second order.\\ We want to note that within the exchange approximation used here for the regime of weak coupling defined above with the decrease of temperature a compensation point appears no matter how small is the difference between the exchange interactions of sublattices. At the compensation temperature $t_{comp}$, the sublattice magnetizations $\overrightarrow{m}_1$ and $\overrightarrow{m}_2$ are equal in magnitude and antiparallel, so $M=0$. The relation between the order parameters magnitudes there is defined by: \begin{equation}\label{Eq24} \psi_1= \frac{\lambda_1}{\lambda_2}\frac{(S_0-S_1)}{(S_0+S_1)}\psi_2. \end{equation} As the calculations show $\psi_2< \psi_1$ for all values of $\alpha$ and $\beta$, but $\psi_1$ grows with the decrease of temperature in a monotonic way, while $\psi_2$ grows more rapidly. The quantity $$ \frac{\lambda_1}{\lambda_2}\frac{(S_0-S_1)}{(S_0+S_1)}=\frac{(6t_c)^2}{1-\alpha^2-\beta^2}\left(\frac{\sqrt{\alpha^2+\beta^2}-\beta}{\alpha}\right) $$ is always $> 1$ as $\beta<0 \sim K$ and $\alpha >0$ so at some temperature $t_\mathrm{comp}<t_c$, and values of $\psi_1 \;, \; \psi_2$ the condition~(\ref{Eq24}) is fulfilled. In the following figure we show the change of net magnetization magnitude $M (t)$ with the temperature for $\alpha = 0.1$, \textsl{i.e.}, $\mathcal{J}_2=0.83 \mathcal{J}_1$ and different values of $\beta$. \begin{figure}[!ht] \begin{center} \includegraphics[scale=0.55]{mag_alpha01.eps} \end{center} \caption{The dependence of net magnetization $M$ on reduced temperature $t$ for for fixed $\alpha$ and the different values of antiferromagnetic coupling $\beta$}. \label{Fig1} \end{figure} It is seen from Fig.1 that the increase of antiferromagnetic coupling between the sublattices slightly shifts the compensation temperature to higher values, and $M(t)$ grows more rapidly below the compensation temperature and reaches higher values as $t\longrightarrow 0$. We suppose that within the exchange approximation and in weak coupling limit the key factor for the compensation point to appear is the weakness of antiferromagnetic exchange between the sublattices compared to the ferromagnetic exchange of sublattices 1 and 2 , respectively. We will discuss in more detail the influence of difference between the magnitudes of exchange interaction in the sublattices, represented by the parameter $\alpha$ on $M(t)$ and sublattice magnetizations $m_1, \; \mathrm{and} \;m_2$. For $\alpha=0.08$, \textsl{i.e.}, $\mathcal{J}_2 =0.85 \mathcal{J}_1$, $M(t)$, $m_1, \; \mathrm{and} \;m_2$ are shown in Fig. 2. \begin{figure}[!ht] \begin{center} \includegraphics[scale=0.55]{mag_a008b03.eps} \end{center} \caption{The dependence of net magnetization $M$ and sublattice magnetizations $m_1$ and $m_2$ on reduced temperature $t$ for for small difference between sublattice exchange parameters}. \label{Fig2} \end{figure} At $t_c$ the transition is of second order and when lowering the temperature a compensation point $t_{comp}$ appears, which is located close to $t_c$. Sublattice magnetizations change with temperature in monotonic way, and in the temperature interval $t_{comp}<t<t_c$, the relation between sublattice magnetizations is $m_1>m_2$, as expected as in sublattice 1 the exchange interaction $\mathcal{J}_1>\mathcal{J}_2$. Below $t_{comp}$ the magnetization of weaker sublattice $m_2$ becomes bigger than $m_1$.\\ \begin{figure}[!ht] \begin{center} \includegraphics[scale=0.55]{mag_a04b0095.eps} \end{center} \caption{The dependence of net magnetization $M$ and sublattice magnetizations $m_1$ and $m_2$ on reduced temperature $t$ for intermediate difference between sublattice exchange parameters}. \label{Fig2} \end{figure} For intermediate values of $\alpha=0.4, \mathrm{or} \mathcal{J}_2 =0.43 \mathcal{J}_1$, see Fig.3, with decrease of temperature below the compensation point the total magnetization rapidly grows in non-monotonic way as $t\rightarrow 0$, similar to V-curve according to Neel's classification. The behaviour of sublattice magnetizations with temperature is quite different; $m_1$ , which is the sublattice magnetization with stronger exchange interaction $\mathcal{J}_1$ grows in smooth way with decrease of temperature, while $m_2$ for weaker sublattice interaction $\mathcal{J}_2$, below compensation point grows drastically in non-monotonic way and in the temperature interval $0 <t<t_{comp}$, $m_2 \gg m_1$.\\ Such behaviour is described in detail in ~\cite{Belov:1996} for ferrimagnets with compensation point for many experimentally observed substances. There explanation of $M(t)$ behaviour below compensation point is done by introducing the notion of weak sublattice where depending on the particular substance considered different mechanisms for explanation of this effect are pointed out. Within our exchange model the effect of weak sublattice is readily seen and mainly depends on the difference $ \mathcal{J}_1-\mathcal{J}_2 \sim \alpha$. When $\alpha$ further grows the compensation point is shifted to lower temperatures and the magnetization $m_1$ of the stronger sublattice decreases for $t\rightarrow 0$. This is illustrated in Fig.4 for $ \mathcal{J}_2=0.19 \mathcal{J}_1$.\\ \begin{figure}[!ht] \begin{center} \includegraphics[scale=0.55]{mag_a07b01.eps} \end{center} \caption{Illustration of the dependence of net magnetization $M$ and sublattice magnetizations $m_1$ and $m_2$ on reduced temperature $t$ when the exchange in sublattice 2 is very small compared to sublattice 1}. \label{Fig4} \end{figure} A qualitatively similar behaviour of the total magnetization can be seen in the experiments with ErFe$_2$~\cite{Chaaba:2017} and GdCo$_{12}$B$_6$~\cite{Isnard:2012} although direct comparison with the experimental curves can hardly be made, as these substances have crystallographic and magnetic structure that differs from the one assumed within our model. The influence of parameter $\alpha$ is summarized in the next figure, see Fig. 5, where the net magnetization is displayed for small values of $\beta=0.08$ and different values of parameter $\alpha$. \begin{figure}[!ht] \begin{center} \includegraphics[scale=0.55]{mag_beta008.eps} \end{center} \caption{The dependence of net magnetization $M$ for fixed antiferromagnetic exchange $\beta$ and growing difference $\alpha$ between the ferromagnetic exchanges of the two sublattices}. \label{Fig5} \end{figure} As the difference between the magnitudes of sublattice exchange interactions grow the transition temperature is shifted to higher values as expected and the compensation temperature is lowered. Another effect is the change of net magnetization behaviour below $t_{comp}$ from monotonic to nearly exponential when $\alpha$ increases. \section{\label{4} Conclusions} Our mean-field analysis of this relatively simple model with competing interactions on a bcc lattice shows that the behaviour of net magnetization of the two-sublattice ferrimagnet depends essentially on the difference in magnetic interactions between the sublattices within the weak coupling limit presented here. The influence of antiferromagnetic coupling is more prominent when its magnitude is of the same order, or larger than the difference between the exchange parameters of the sublattices. The model may be generalized to include the expansion of the effective Hamiltonian up to sixth-order terms in $x_i , \;\; i=1,2$ in order to consider the possibility of first order phase transition to ferrimagnetic state due to the influence of external parameters as pressure and change of concentration. \\Within our approach the parameters of Landau energy can be directly related to the averaged microscopic exchange interactions as described in section 2 , and this relation is quite simple in the case of high symmetry crystal structure as considered here. It will be of interest also to include the influence of an external magnetic field and to perform calculations for ferrimagnets, for which the relation between exchange interactions fulfills the condition $\mathcal{J}_1 > |\mathcal{K}| \gg \mathcal{J}_2$, that is, when one of the sublattices is very weak. \section*{Acknowledgments} This work was supported by the Bulgarian National Science Fund under contract DN08/18 (14.12.2017).
\section{\label{sec:level1} Introduction} Turbulent magnetic fields are ubiquitous in the universe and their role in determining energetic particle transport is key to understanding the confinement and acceleration of high-energy cosmic rays \citep{TurbForStochAcc,ImpPlasmaProb,VoidMagnetTurb,TurbAcceleration,gregori2015the}. As particles traverse a turbulent, magnetised plasma, they undergo a random walk in both physical and momentum space. The latter process is referred to as 2nd-order Fermi acceleration, being a generalization of the mechanism proposed by Fermi \citep{FermiAcceleration}. Fermi observed that repeated elastic scattering of fast particles off slow moving `magnetised clouds', when averaged over a random distribution of cloud velocities produce a net gain in energy. The rate of energy gain is slightly higher than the rate of energy loss because head-on collisions are more probable than overtaking ones, the net gain being proportional to $(u/v)^2$ where $u$ is the mean fluid velocity and $v (\gg u)$ the particle velocity. Subsequently the focus has shifted from discrete interactions with magnetised clouds to continuous scattering in magneto-hydrodynamic (MHD) turbulence, but the underlying principle remains the same. Fermi noted shortly afterwards that converging flows such as might exist between Galactic spiral arms result in a faster 1st-order process where the energy gain is proportional to $u/v$ \citep{Fermi54}. Indeed 1st-order Fermi acceleration in the converging fluid flow at astrophysical shock waves is currently the preferred model for the origin of cosmic rays \citep{Bell1,1978ApJ...221L..29B,ParticleAccelerationTheory}. However the 2nd-order mechanism can be more efficient for accelerating non-relativistic thermal background plasma particles and under certain conditions can also preferentially accelerate electrons relative to protons as is required to explain many astrophysical sources \citep{FermiReview}. In reality there may be a hybrid mechanism, e.g. initial 2nd-order acceleration of background plasma particles by turbulence, followed by a second stage of 1st-order acceleration by a shock wave. The 2nd-order Fermi process is quite general, requiring only turbulent magnetised fluid motions and injection of particles with energy above that of the background thermal plasma. Relevant environments are common in the universe and stochastic acceleration is believed to be responsible for phenomena as diverse as e.g. radio emission from young supernova remnants entering the Sedov-Taylor phase \citep{SecOrdFermSolAltern}, the ejection of mass from the Solar corona \citep{1985srph.book..333N}, the acceleration of particles in the jets of active galactic nuclei and in their giant radio lobes \citep{Tramacere07,OSullivan09,Hardcastle09} and $\gamma$-ray emission from the Fermi bubbles \citep{2011PhRvL.107i1101M}. The necessary conditions may be accessible in laboratory experiments \citep{gregori2015the} thus providing a platform to explore particle acceleration in a controlled setting and isolate effects of relevance to astrophysical models. We explore here the possibility of validating the physics of 2nd-order Fermi acceleration using existing experimental set-ups (see supplementary material to Ref.\citep{tzeferacos2018laboratory}. In \S~\ref{sec:level2} we introduce the proposed set-up and place it in the context of previous experiments. The governing equations for the momentum space diffusion process are stated in \S~\ref{sec:level3} and the relevant Fokker-Planck coefficients of the diffusion process are estimated. We discuss the relevant time scales to justify the diffusion approach adopted. An analytic solution for the diffusion equation is investigated in \S~\ref{sec:level4}. Finally in \S~\ref{sec:level5}, laser experiments at the National Ignition Facility (NIF), Livermore, USA~\citep{moses} are discussed. We conclude that the effects of stochastic Fermi acceleration are measurable in the laboratory. \section{\label{sec:level2} Experimental set-up} Experiments with high power lasers have achieved conditions where strong magnetised turbulence can be sustained over large spatial scales and thus provide insights on the origin and amplification of magnetic fields in the intergalactic medium \citep{meinecke2014turbulent,meinecke2015developed, gregori2015the}. \citep{tzeferacos2018laboratory} describe how a high power laser was used to generate two counter streaming plasma flows from direct ablation of CH (plastic) foils. Each flow was guided through a grid of $300~\mu$m holes with $300~\mu$m spacing between holes. The grids were spatially shifted to increase turbulent motions in the plasma and enhance the turbulent dynamo processes responsible for amplification of magnetic seed fields. This produced turbulent structures with an outer scale of $\sim 600~\mu$m in the colliding region. These results were obtained using multi-kJ laser systems. At the NIF, a MJ of laser energy is available so more extreme conditions are to be expected as shown in Table~I. \begin{table} \begin{center} \def~{\hphantom{0}} \begin{tabular}{lccc} RMS magnetic field & $B\sim 1.2\,$MG \\ Mean turbulent velocity & $u=6\times 10^7\,$cm/s \\ Scale of the turbulence cells & $\ell\sim 0.06\,$cm \\ Plasma size & $L=0.4\,$cm \\ Initial proton momentum & $p_0=0.002\,m_{\rm p} c$ \\ Temperature & $T=700\,$eV \\ Electron density & $n=7\times 10^{20} \,\text{cm}^{-3}$\\ Density relation & $\Delta n / n\sim O(1)$ \\ Plasma beta \tablefootnote{The dependence on B is made explicit here, as we consider different values throughout the paper. All other parameters are as stated in Table~I. $\beta=4\times 10^{-11} nT/B^2$ in Gaussian cgs.} & $\beta=13.7\,\left(1.2\,\text{MG} / B\right)^2$\\ Alfv\'enic Mach number & $M_{\rm a}=u/v_{\rm a}=6$\\ Reynolds number & $Re=1200$\\ Magnetic Reynolds number & $R_{\rm m}=25000$\\ \end{tabular} \caption{The expected plasma parameters for the proposed experiment at the NIF, LLNL. These are derived from experiments done at other facilities \citep{tzeferacos2018laboratory}, rescaled to NIF laser drive conditions. The estimates for the Reynolds and magnetic Reynolds number follow \citep{Braginskii65} and \citep{Spitzer53}. However as discussed in \citep{Ryutov99} micro-instabilities may alter our estimates.} \label{Tab:Table1} \end{center} \end{table} We adopt these estimated parameters in order to assess the feasibility of a `cosmic ray acceleration platform' in the laboratory. The first step is the injection of cosmic ray particles, which can be implemented by replacing the CH foils used earlier~\citep{tzeferacos2018laboratory} by CD (deuterated plastic) foils. Within the turbulent plasma region, 3 MeV protons (with velocity $v_\textrm{p} \sim 8 \times 10^{-2}\,c$) will be produced via D-D collisions in the counter-streaming plasma flows \citep{ProtonEmission}. Analogous to the astrophysical situation, these protons as they stream out from the plasma interact with the turbulent magnetic fields and should be accelerated by the 2nd-order Fermi process. We now model this interaction to predict the energy spectrum of the protons. As each scatter changes the energy of a particle by a small fraction of its initial energy, this is a diffusion process in momentum space described by a Fokker-Planck transport equation for $f (p, t)$, the phase space density of the protons in the plasma \citep{EarlySolutionAttempt,TurbForStochAcc,ParticleAccelerationTheory,FermiToFokker}: \begin{align} \label{Eq:DiffusionEquation} \left(\frac{\partial f}{\partial t}\right)_{\text{inner}}=&\frac{1}{p^2}\frac{\partial}{\partial p}\left(p^2 D_{p} \frac{\partial f}{\partial p}\right) -\frac{f}{\tau_{\text{esc}}}\nonumber\\&+\frac{C_0\delta\left(p-p_0\right)\delta\left(t-t_0\right)}{4\pi p^2}. \end{align} Here $D_{p}$ is the momentum diffusion coefficient, $\tau_{\text{esc}}$ the escape time describing the loss of protons from the system and the last term describes instantaneous injection ($C_0$) of superthermal particles at time $t_0$ and momentum $p_0$. Note that spatial homogeneity is assumed in writing down Eq.~(\ref{Eq:DiffusionEquation}), however we will assume that the injection occurs only in the central region of the plasma. The particle distribution function $n$ is related to the phase space density $f$ through \begin{align} \label{Eq:FtoN} n(p,t)=4\pi p^2 f(p,t). \end{align} The diffusion equation~(\ref{Eq:FtoN}) has been solved for a variety of situations \citep{TurbForStochAcc,EarlySolutionAttempt,SecOrdFermSolAltern,Kaplan56,SolFermAcc} and we discuss below the appropriate solution for the proposed experiment. The detectors used to measure the proton energy are located outside the plasma, hence the relevant distribution function to consider is that of the \emph{escaping} protons. This can be related to the particle distribution function of the protons inside the plasma by requiring that proton number be conserved after the injection, i.e. at $t>t_0$ \begin{align} \label{Eq:OuterDiffusionEquation} \left(\frac{\partial n}{\partial t}\right)_{\text{outer}}=\frac{n_{\text{inner}}}{\tau_{\text{esc}}}, \end{align} where $f_{\text{inner}}$ is the solution of Eq.(\ref{Eq:DiffusionEquation}). As will be shown in \S \ref{sec:level3}, the escape time $\tau_{\text{esc}}$ is momentum-dependent so the phase space density inside and outside the plasma will be \emph{different}. \section{\label{sec:level3} The transport coefficients} The Fokker-Planck transport coefficient for energy diffusion is \cite[e.g.][]{ParticleAccelerationTheory} \begin{align} \label{Eq:DefDiffCoeff} D_{\epsilon}=\frac{\left<\left( \Delta \epsilon\right)^2\right>}{\Delta t}, \end{align} where $\langle.\rangle$ denotes the average over scattering angles, and the energy change per scatter is given by the integral over the force exerted by the electric field fluctuations, i.e. \begin{align} \label{Eq:EnergyChange} \langle\left(\Delta \epsilon\right)^2\rangle= \left<\left(e\int \mathbf{E}\mathbf{\cdot}\mathrm{d}\mathbf{s}\right)^2\right>\sim e^2\ell^2\langle\left(E_{||}\right)^2\rangle. \end{align} Here, $\mathbf{s}$ is the world-line of the particle and $\ell$ is the scale length of the turbulence cells in the plasma flow. These cells are defined by the scale on which the electric field, $\bf E$, is statistically de-correlated, close to the outer scale of the turbulent spectrum. The appropriate Ohm's law reads: \begin{align} \label{Eq:GenOhmLawFinal} \mathbf{E}=-\frac{\mathbf{u}\times\mathbf{B}}{c}-\frac{\mathbf{\nabla} P_{\rm e}}{n e} , \end{align} where ${P_e}$ is the isotropic electron pressure, $n$ is the electron density and $\mathbf{u}$ is the electron velocity field. In principle Ohm's law contains possible additional contributions but these turn out to be small in the present case as e.g. the Reynolds and magnetic Reynolds numbers are large. Note that the ratio of the two, the magnetic Prandtl number $P_{\rm m}=R_{\rm m}/Re$ is much larger than unity at the NIF (see Table I), confirming that the plasma is in an astrophysically relevant regime. For the assumed conditions at the NIF, the pressure term is insignificant, being of ${\cal O}(10^{-2})$. We will retain it nevertheless as it is relevant for conditions achievable at other facilities such as OMEGA \citep{soures}. Returning to the Fokker-Planck transport coefficient~(\ref{Eq:DefDiffCoeff}), we find by combining Eqs.(\ref{Eq:EnergyChange}) and (\ref{Eq:GenOhmLawFinal}) \begin{align} \label{Eq:EnergyChangeStart} \left<\left(\Delta \epsilon\right)^2\right>=&e^2\ell^2\left<\left(\frac{u^2B^2}{c^2}\sin^2(\theta)\right)\right>+e^2\ell^2\left<\left(\frac{\mathbf{\nabla} P_{\rm e}}{n e}\right)^2\right>\nonumber\\ &+2e^2\ell^2\left<\left(\frac{uB}{c}\left|\frac{\mathbf{\nabla} P_{\rm e}}{n e}\right|\sin(\theta)\cos(\phi)\right)\right>, \end{align} with $\theta$ the angle between $\mathbf{u}$ and $\mathbf{B}$ and $\phi$ the angle for the inner product of the two terms in (\ref{Eq:GenOhmLawFinal}) after squaring. Treating the electrons as an ideal gas, one finds for the electron pressure term: $\mathbf{\nabla} P_{\rm e}= e \mathbf{\nabla} (nT)$. Due to the large electron thermal conduction, the temperature remains approximately constant across the plasma \citep{tzeferacos2018laboratory}, hence pressure fluctuations are due only to density variations. This also implies that the angles $\theta$ and $\phi$ are uncorrelated, hence the averaging gives \begin{align} \label{Eq:AveragedECS} \left<\left(\Delta \epsilon\right)^2\right>=\ell^2\left[\frac{4}{3}\frac{e^2}{c^2}u^2B^2+e^2T^2\left(\frac{\mathbf{\nabla} n}{n}\right)^2\right]. \end{align} The relevant time scale for this energy change depends on the parameters of the system. This can be in one of two regimes --- ballistic escape or true diffusion --- according to how the pitch angle scattering time compares to the time a proton needs to escape the plasma. The relevant time scale determining the Fokker-Planck coefficient (\ref{Eq:DefDiffCoeff}) is the time it takes a proton to cross a turbulent cell, taken to be of the order of the grid size i.e., $\Delta t \sim \ell/v_\mathrm{p}$. For the magnetic field values expected in the NIF experiment (Table I), the proton gyro-radius is $r_{\rm g}\sim 0.2$ cm, i.e. larger than the turbulent cell scale, so particles are \emph{unmagnetised}. Hence proton propagation can be described as a random walk until escape from the plasma. Since the protons are non-relativistic, we have \begin{align} \label{Eq:TimeScale} \Delta t \sim \frac{\ell}{v_\mathrm{p}}=\frac{m_\mathrm{p} \ell}{p}, \end{align} where $p=m_\mathrm{p} v_\mathrm{p}$ is the proton momentum. Moreover in this case, $(\Delta \epsilon)^2 = (p^2/m_\mathrm{p}^2) (\Delta p)^2$, so the momentum diffusion coefficient is from Eqs.(\ref{Eq:AveragedECS}) and (\ref{Eq:TimeScale}): \begin{align} \label{Eq:DiffusionCoefficient} D_p= \frac{\left<\left(\Delta p\right)^2\right>}{\Delta t}\sim\ \frac{\ell}{c}\left[\frac{4e^2B^2}{3}\frac{u^2}{c^2}+e^2 T^2\left(\frac{\mathbf{\nabla} n}{n}\right)^2\right]\frac{m_\mathrm{p} c}{p}. \end{align} We note the dependence $D_p\propto p^{-1}$. In the traditional moving cloud picture, diffusion is \emph{less} efficient for particles with higher momentum because the difference in probability for head-on and over-taking collisions is then smaller. In the present setup with MHD turbulence, particle trajectories are simply aligned with the electric field for a shorter time, provided they remain non-relativistic. Next we need the spatial diffusion coefficient in order to determine the diffusive escape-time scale. The mean free path is the distance a proton travels before it is deflected by an angle $\pi/2$ in a time $\tau_{90}$ i.e. $\lambda = v_\mathrm{p}\tau_{90}$. This can be estimated by treating the change in angle by each turbulence cell as a random walk process so the time to be scattered $\pi/2$ away from the initial direction is, \begin{align} \label{Eq:T90Time} \tau_{90}\sim \frac{r_{\rm g}}{\omega_{\rm g} \ell}= \frac{m_\mathrm{p}^2c^3}{\ell e^2 B^2}\frac{p}{m_\mathrm{p} c}, \end{align} where $\omega_{\rm g} = v_{\rm p}/r_{\rm g} = eB/mc$, with $B$ given by its rms value. The spatial diffusion coefficient is thus: \begin{align} \label{Eq:SpatDiffCoeff} D_x=\frac{\left<\left(\Delta x\right)^2\right>}{\Delta t}\sim\frac{1}{3}\frac{\lambda^2}{\tau_{90}}=\frac{m_\mathrm{p}^2 c^5}{3e^2 \ell B^2}\left(\frac{p}{m_\mathrm{p} c}\right)^3. \end{align} The spatial and momentum diffusion coefficients are related through: \begin{align} \label{Eq:DPDXconnection} D_p D_x=\frac{m_\mathrm{p}^2c^4}{3e^2B^2}\left[\frac{4e^2B^2}{3}\frac{u^2}{c^2}+e^2 T^2\left(\frac{\mathbf{\nabla} n}{n}\right)^2\right]\left(\frac{p}{m_{\rm p}c}\right)^2. \end{align} The escape time $\tau_{\text{esc}}$ is the time it takes a particle to diffuse out of the turbulent region of size $L$: \begin{align} \label{Eq:EscapeTime} \tau_{\text{esc}}=\frac{L^2}{D_x}=\frac{3e^2}{m_{\rm p}^2c^5}\ell\,L^2B^2\left(\frac{p}{m_{\rm p} c}\right)^{-3}. \end{align} This shows that particles with higher momentum get lost more efficiently, as is expected, since such particles stream out of the plasma faster, in addition to having a longer mean free path. Consequently, the mean momentum of particles outside the plasma will be higher due to the biased escape of mostly fast particles. Moreover, slower particles remain inside the plasma longer, accounting for their stronger acceleration. As noted before, the system can be in two different limits: true diffusion or ballistic escape. The regimes are characterised by comparing the intrinsic time-scales of the system. Using the parameters from Table \ref{Tab:Table1} the angular scattering time as defined by Eq.(\ref{Eq:T90Time}) is \begin{align} \label{Eq:AngularScattTime} \tau_{90}\sim \frac{r_{\rm g}}{\omega_{\rm g} \ell}\sim 1.5 \times 10^{-10}\,\text{s} \left(\frac{B}{1.2\text{ MG}}\right)^{-2} \left(\frac{\ell}{0.1\text{ cm}}\right)^{-1}, \end{align} while the time needed to diffuse out of the plasma is: \begin{align} \label{Eq:EscapeTimeEstimate} \tau_{\text{esc}}=\frac{L^2}{D_x}\sim 5.5\times10^{-10}\,\text{s} \left(\frac{B}{1.2\text{ MG}}\right)^{2}\left(\frac{\ell}{0.1\text{ cm}}\right). \end{align} These must be compared with the time a proton would take to cross the plasma in the absence of magnetic fields: \begin{align} \label{Eq:CrossingTime} t_{\text{cross}}=\frac{L}{v_{\rm p}}=1.7\times10^{-10}\,\text{s}. \end{align} All the time scales above are of the same order, indicating that the conditions at NIF will be close to the transition from ballistic escape to the diffusive regime. We can optimistically also consider the case when $B$ is larger by a factor of $\sim3$ (chosen to guarantee a factor of $O(100)$ change in the time-scales). Then $B\sim 3.6$~MG and \begin{align} \label{Eq:DiffusiveComparisonTimes} \tau_{90}\sim 3.4\times 10^{-11}\,\text{s} < \tau_{\text{esc}}=2.5\times10^{-9}\,\text{s}. \end{align} We may now safely assume true diffusion rather than ballistic escape. \section{\label{sec:level4} Solving the diffusion equation} Given the diffusion and loss coefficients that we have derived, we can employ an analytical solution~\citep{SolFermAcc} obtained under the following assumptions. First, the initial and final proton distributions are assumed to be isotropic so the distribution function depends only on $p=|\mathbf{p}|$. In the present case, even if the turbulent plasma is produced by the collision of two counter propagating flows, their centre-of-mass is at rest, which suggests that the D-D proton emission is isotropic on average. However each individual D-D pair does not necessarily have a stationary centre-of-mass due to the temperature of the plasma jets so the initial energy distribution is not mono-energetic. We will discuss the implication of this in the next section. Experimental data show that the properties of turbulence are uniform within the interaction region of size $L$ \citep{tzeferacos2018laboratory} so any spatial dependence may safely be neglected. Second, the plasma must be magnetised, which is the case for electrons in the proposed experiment (however, the ions are only weakly magnetised). Third, the proton energies must be relativistic. Although this is \emph{not} the case here, the analytical solution~\citep{SolFermAcc} holds as long as $D_p D_x \propto p^2$ and as shown earlier this relation remains valid even in the non-relativistic case. Noting that $D_p$ and $\tau_{\text{esc}}$ are \emph{constant} in time, the solution of Eq.(\ref{Eq:DiffusionEquation}), taking $C_0=1$, is then \citep{Kaplan56,SecOrdFermSolAltern,SolFermAccOld,SolFermAcc}: \begin{align} \label{Eq:Solution} n_{\text{inner}}=\frac{2\hat{p}^2\sqrt{\Psi}}{\sqrt{k\tau}\left(1-\Psi\right)}e^{-\frac{\left(\hat{p}^3+\hat{p}_0^3\right)\left(1+\Psi\right)}{3\sqrt{k\tau}\left(1-\Psi\right)}}\text{I}_0\left[\frac{4\left(\hat{p} \hat{p}_0\right)^{\frac{3}{2}}\sqrt{\Psi}}{3\sqrt{k\tau}\left(1-\Psi\right)}\right], \end{align} where $\hat{p}$ and $\hat{p}_0$ are dimensionless momenta, e.g., $\hat{p}=p/m_{\rm p} c$, and $\text{I}_0$ is the modified Bessel function of the first kind. The function $\Psi$ is defined as \begin{align} \label{Eq:Psi} \Psi(t,t_0)=\exp\left[-6\sqrt{\frac{k}{\tau}}\left(t-t_0\right)\right], \end{align} with \begin{align} \label{Eq:KDefinition} k=\frac{D_p}{m_{\rm p}^2 c^2}\frac{p}{m_{\rm p} c}, \end{align} and, \begin{align} \label{Eq:DefTau} \tau=\tau_{\text{esc}}\left(\frac{p}{m_{\rm p} c}\right)^3. \end{align} In order to now determine the outer distribution function, $n_{\text{outer}}$, we can simply integrate Eq.(\ref{Eq:OuterDiffusionEquation}) to find: \begin{align} \label{Eq:OuterDistrSolution} n_{\text{outer}}(p,p_0,t,t_0)=\int_{0}^{t} \frac{n_{\text{inner}}(p,p_0,t',t_0)}{\tau_{\text{esc}}}\,\text{d}t'. \end{align} Both distributions are shown in Fig.~\ref{Fig:InnerOuter}. Due to the scaling $\tau_{\text{esc}}\propto p^{-3}$, escape from the plasma is biased towards higher momentum protons. This explains the decreasing mean momentum inside the plasma, since only the slower particles remain after a time comparable to $\tau_{\text{esc}}$. For the same reason the mean momentum outside the plasma is higher than on the inside. The momentum spectra shown in Fig.~\ref{Fig:InnerOuter} were obtained by substituting the values for the plasma conditions given in Table~\ref{Tab:Table1}. \begin{figure*} \centering \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{spectrum_8_1.png} \caption{ \label{fig:sub1} \end{subfigure}% \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{spectrum_8_2.png} \caption{ \label{fig:sub2} \end{subfigure} \\ \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{spectrum_7.png} \caption{ \label{fig:sub3} \end{subfigure}% \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{MeanMomInTime.png} \caption{ \label{fig:sub4} \end{subfigure} \caption{The particle distribution functions inside (solid) and outside (dashed) the plasma. The vertical line indicates the initial proton momentum. The outer distribution does not change significantly after $\sim 10^{-8}$~s (c.f. panels \ref{fig:sub1}-\ref{fig:sub3}) while the inner distribution falls off quickly. Panel~\ref{fig:sub4} shows the time dependence of the mean momentum.} \label{Fig:InnerOuter} \end{figure*} Momentum diffusion also changes the mean momentum of the proton distribution. We can obtain analytically the mean proton momentum \emph{inside} the plasma: \begin{align} \label{Eq:MeanValue} \mu_{\text{inner}} = & \frac{3^{1/3}}{\sqrt{k\tau}}\left[k^2\tau^2\frac{\left(1-\Psi\right)^4}{\left(1+\Psi\right)^4}\right]^{1/3}\Gamma\left(\frac{4}{3}\right) \times \nonumber\\ &\exp\left[{-\frac{4\Psi \hat{p}_0^3}{3\sqrt{k\tau}\left(1-\Psi^2\right)}}\right]\text{L}_{-\frac{4}{3}}\left[\frac{4\Psi \hat{p}_0^3}{3\sqrt{k\tau}\left(1-\Psi^2\right)}\right], \end{align} where $\text{L}_{-\frac{4}{3}}$ are Laguerre polynomials, and $\Gamma$ is the Gamma function. However the mean momentum outside can only be calculated numerically. \section{\label{sec:level5} Experimental feasibility} The two relevant quantities that can be measured in a possible experiment are the shift in the mean energy and e.g. the full width at half maximum (FWHM) of the proton distribution. Of particular interest is the outer distribution, since that is where the detector is located. Given the available diagnostics, the measurement is essentially time-integrated, being the integral of Eq.~(\ref{Eq:OuterDistrSolution}) from the initial time to infinity. In practice, it is sufficient to integrate up to a time late enough such that a significant portion of the protons have escaped from the plasma, indicated by the inner distribution dropping to near zero. A time of order $10^{3}\tau_\textrm{esc}$ proves sufficient as will be shown later. Also, the lower bound must be modified, due to the delta function nature of the distribution at $t = t_0$. Taking into account that the shortest time-scale on which a particle can exit the plasma is just crossing time, the lower bound on the integral can be chosen to be $t_0 \sim \tau_{\text{esc}}$. Then we obtain for the mean momentum of the escaping protons: \begin{align} \label{Eq:FinalMeanMomentum} \mu_\textrm{outer}\sim \int_0^1 \hat{p}\int_{10^{-13}}^{10^{-7}} \frac{n_{\text{inner}}}{\tau_{\text{esc}}} \text{d}t\,\text{d}\hat{p} =0.08\, c, \end{align} which corresponds to a mean energy of 3.01~MeV. As expected, this is higher than at injection --- by 10~keV which is $\sim 3\%$ of the initial proton energy. The upper limit $\hat{p}=1$ was chosen to ensure that $\hat{p}\gg \hat{p}_0$ and thus out of reach of the acceleration mechanism. This follows from the Hillas criterion \citep{HillasLimit}, which provides an upper limit on the maximum energy gain by comparing the system size with the particle gyro-radius. The Hillas limit in our case is \begin{align} E_{\text{Hillas}}=eBL\frac{u}{c}=0.24\,\text{MeV}, \end{align} which is larger than the predicted energy gain of $\sim 0.01$~MeV. The expected width of the distribution is $\Delta E_{\text{FWHM}} \sim0.4\,\text{MeV}$, i.e. $\sim 15\%$ of the proton energy. Applying the same approximations to the inner distribution, we find for the mean energy $\mu_\textrm{inner}\sim 0.6\,\text{MeV}$. This distribution, however, is not relevant any more, as the overall probability to find a particle inside the plasma after such long times has dropped to \begin{align} \label{Eq:OverallParticleNumberInside} N_{\text{inner}}=\int_{0}^{1}n_{\text{inner}}\,\text{d}\hat{p}\sim 10^{-28}. \end{align} Here the upper limit was chosen such that it is much bigger than the mean initial momentum $p_0$ and thus out of reach of the acceleration process. Note that the numbers above correspond to impulsive injection of one particle ($C_0=1$) at one point in time. Our result can be simply extended for multiple impulsive injections by appropriate superposition of the solution. If the time during which particles are injected is shorter than both the plasma and detector accumulation time, then the resultant proton spectrum is just that for a single impulsive injection scaled by a multiplicative factor. \begin{figure*} \centering \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{HigherBFieldSPectrum5E-8.png} \caption{ \label{fig:sub21} \end{subfigure}% \begin{subfigure}{.5\linewidth} \centering \includegraphics[width=.95\linewidth]{MeanMomentumChangeHigherB.png} \caption{ \label{fig:sub22} \end{subfigure} \caption{The particle distribution functions inside (solid) and outside (dashed) the plasma taking $B=3.6$ MG. The vertical line indicates the initial proton momentum. Panel \ref{fig:sub22} shows the time dependence of the mean momentum.} \label{Fig:InnerOuter2} \end{figure*} We do the same analysis assuming a higher peak magnetic field of $B \sim 3.6 \text{ MG}$, which as noted before guarantees the system to be in the diffusive regime. As Fig.~\ref{Fig:InnerOuter2} shows, both the inner and outer distributions start off at the initial momentum for times around the escape time of these particles. Subsequently the mean momentum of the outer distribution increases due to the biased escape, and decreases only when the time is long enough for slower particles to escape the plasma. As expected, the mean proton energy is now higher than before: $\Delta \mu_{\epsilon}\sim 200\,\text{keV}$. The same is true for the FWHM, which increases to: $\Delta E_{\text{FWHM}}\sim 1.2\,\text{MeV}$. This is consistent with the Hillas limit, which for the changed plasma parameters reads $E_{\text{Hillas}}=0.71\,\text{MeV}$. Finally, as mentioned earlier, we need to consider that the protons are not all injected with the same energy. However the thermal broadening is expected to be 30-40~keV \citep{ThermalSpread} (see also \cite{ThermalSpreadold}), i.e. an order of magnitude smaller than our calculated effect. On top of the thermal broadening there is a second effect related to the turbulent motion which can be estimated by noting that the relative change in energy is $\Delta E/E=4u/v_p \sim 0.1$, i.e. $\Delta E \sim 300\,\text{keV}$ which is smaller than the expected broadening due to stochastic acceleration. In ascribing any measured energy shift and spectral broadening to the 2nd-order Fermi mechanism, it must be noted that target charging, generation of static electric fields due to the escape of hot electrons and energy loss by collisions can all obscure the signal \citep{PhysRevLett.114.215002,doi:10.1063/1.1320467}. Other experiments with the proposed set-up are evaluating these effects and indicate that the resulting distortions are in fact negligible \citep{ChenPreprint}. We can interpret the spread due to turbulent motion of $\Delta E=300keV$, as a lower bound for detection. Therefore given plasma conditions as in Table I, and certainly for a 3 times stronger magnetic field, 2nd-order Fermi acceleration of D-D fusion protons should be measurable at the NIF. To summarise, we have presented a suitable experimental set-up for measuring stochastic acceleration of protons in a turbulent plasma. If realised, this would provide a platform where basic physical processes related to the classic Fermi theory of cosmic ray acceleration can be directly tested and validated against numerical simulations. We have demonstrated that the unique experimental capabilities available at NIF offer a potential route to explore collisionless magnetised transport, where unlike in previous studies \citep{ChenPreprint} the crossing time exceeds the scattering/isotropisation time. For the experimental conditions we consider, the transition occurs at turbulent field strengths of $B \lesssim 3$ MG, which are theoretically achievable using the experimental set-up of \cite{tzeferacos2018laboratory}. This regime may have practical implications for the acceleration of cosmic rays in the presence of sub-Larmor scale turbulent fields in astrophysical systems \cite[e.g.][]{Bell2004}. \section*{Acknowledgements:} We would like to thank John Foster for valuable input. The research leading to these results has received funding from AWE plc. and the Engineering and Physical Sciences Research Council (grant numbers EP/M022331/1, EP/N014472/1 and EP/P010059/1). SS acknowledges a Niels Bohr Professorship awarded by the Danish National Research Foundation. \copyright British Crown Copyright 2018/AWE
\section{Introduction} A \emph{metric Anosov flow}, or \emph{Smale flow}, is a topological flow equipped with a continuous bracket operation which abstracts the local product structure of uniform hyperbolic flows. Examples of metric Anosov flows include Anosov flows, H\"older continuous suspension flows over shifts of finite type, and the flows associated to projective Anosov representations studied by Bridgeman, Canary, Labourie and Sambarino \cite{bcls, BC17}. We say that a flow has a \emph{Markov coding} if there is a finite-to-one surjective semi-conjugacy $\pi$ with a suspension flow over a shift of finite type on a finite alphabet. However, for this symbolic description to be useful, it is also required that the roof function and the map $\pi$ can be taken to be H\"older. For the purposes of this paper, we call this a \emph{strong Markov coding}. Pollicott showed that Bowen's construction of symbolic dynamics for basic sets of Axiom A flows can be extended to the metric Anosov setting \cite{pollicott} to provide a Markov coding. However, no criteria for obtaining a \emph{strong} Markov coding, which is necessary for most dynamical applications, were suggested. Furthermore, we see no reason that every metric Anosov flow \emph{should} have a strong Markov coding, since questions of H\"older continuity seem to require additional structure on the space and the dynamics. In this paper, we give a method for obtaining the strong Markov coding for some systems of interest via the metric Anosov flow machinery. Our primary motivation for this analysis is to gain a more complete dynamical picture for the geodesic flow on a compact (and, more generally, convex cocompact), locally $\operatorname{CAT}(-\kappa)$ metric space, where $\kappa>0$, which is a generalization of the geodesic flow on a closed (or convex cocompact) Riemannian manifold of negative curvature. In the closed Riemannian case, the geodesic flow is Anosov, so the system has a strong Markov coding by Bowen's results \cite{bowen-symbolic}. In the convex cocompact Riemannian case, the geodesic flow restricted to the non-wandering set is Axiom A, so Bowen's argument still applies. We show that this extends to the $\operatorname{CAT}(-\kappa)$ case. The majority of previous dynamical results in this area are based on analysis of the boundary at infinity via the Patterson--Sullivan construction. This has yielded many results for the Bowen-Margulis measure \cite{Roblin}, and also recently for a class of equilibrium states \cite{BPP16}. A weak form of symbolic dynamics for geodesic flows on $\operatorname{CAT}(-\kappa)$ spaces, or more generally on Gromov hyperbolic spaces, is due to Gromov \cite{gromov}, extending on an approach of Cannon \cite{Cannon}. Full details were provided by Coornaert and Papadopoulos \cite{cp}. This approach uses topological arguments to give an orbit semi-equivalence with a suspension over a subshift of finite type. A priori, orbit semi-equivalence is too weak a relationship to preserve any interesting dynamical properties \cite{GM, KT17}, and it is not known how to improve this construction of symbolic dynamics to a semi-conjugacy. In \cite{CLT}, we used this weak symbolic description to prove that these geodesic flows are expansive flows with the weak specification property, and explored the consequences of this characterization. However, neither the boundary at infinity techniques, nor techniques based on the specification property are known to produce finer dynamical results such as the Bernoulli property. Once the strong Markov coding is established, a treasure trove of results from the literature can be applied. We collect some of these results as applied to geodesic flow for $\operatorname{CAT}(-1)$ spaces as Corollary \ref{t.applications}. The Bernoulli property in particular is an application that is out of reach of the previous techniques available in this setting. Our first step is to formulate verifiable criteria for a metric Anosov flow to admit a strong Markov coding. In the following statement, the \emph{pre-Markov proper families at scale $\alpha$}, which are formally introduced in Definition \ref{defn:pollicott}, are families of sections to the flow $\mathcal B=\{B_i\}$, $\mathcal D=\{D_i\}$, $B_i \subset D_i$ with finite cardinality and diameter less than $\alpha$ satisfying certain nice basic topological and dynamical properties. These families were originally introduced by Bowen and are the starting point for his construction of symbolic dynamics for flows. \begin{thmx} \label{t.usefulversion} Let $(\phi_t)$ be a H\"older continuous metric Anosov flow without fixed points. Suppose that there exists a pre-Markov proper family $(\mathcal B, \mathcal D)$ satisfying: \begin{enumerate} \item the return time function $r(y)$ for $\mathcal B$ is H\"older where it is continuous (i.e., on each $B_i \cap H^{-1}(B_j)$ where $H$ is the Poincar\'e first-return map); \item the projection maps along the flow $\operatorname{Proj}_{B_{i}}: B_i \times [-\alpha, \alpha] \to B_i$ are H\"older, where $\alpha>0$ is the scale for the pre-Markov proper family. \end{enumerate} Then the flow has a strong Markov coding. \end{thmx} Metric Anosov flows are expansive (see \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:smale}), which implies that their fixed points are a finite set of isolated points, and can thus be removed. Metric Anosov flows satisfy Smale's spectral decomposition theorem \cite{pollicott}. That is, the non-wandering set for $(\phi_t)$ decomposes into finitely many disjoint closed invariant sets on each of which the flow is transitive. In particular, if $(\phi_t)$ is a transitive metric Anosov flow, there are no fixed points and the shift of finite type in the strong Markov coding is irreducible. We verify the criteria of Theorem \ref{t.usefulversion} in our setting, obtaining the following application, which is our main result. \begin{thmx} \label{t.main} The geodesic flow for a compact locally $\operatorname{CAT}(-\kappa)$ space with non-elementary fundamental group, $\kappa>0$, has an irreducible strong Markov coding. \end{thmx} We actually prove Theorem \ref{t.main} in the more general setting of convex cocompact locally $\operatorname{CAT}(-\kappa)$ spaces, with the geodesic flow restricted to the non-wandering set. We prove Theorem \ref{t.main} by giving a geometric construction of a `special' pre-Markov proper family $(\mathcal B, \mathcal D)$ for the geodesic flow. The sections are defined in terms of Busemann functions, which are well known to be Lipschitz. We then use the regularity of the Busemann functions to establish (1) and (2) of Theorem \ref{t.usefulversion} for the family $(\mathcal B, \mathcal D)$, thus establishing Theorem \ref{t.main}. Our second main application is to use similar techniques to study the flow associated to a projective Anosov representation, which is another important example of a metric Anosov flow. Again, the key issue is establishing the regularity properties (1) and (2) of Theorem \ref{t.usefulversion}. We achieve this using similar ideas to the proof of Theorem \ref{t.main}, although there are some additional technicalities since we must find machinery to stand in for the Busemann functions. \begin{thmx} \label{t.main2} The geodesic flow for a projective Anosov representation $\rho: \Gamma \to \mathsf{SL}_m(\mathbb{R})$, where $\Gamma$ is a hyperbolic group, admits a strong Markov coding. \end{thmx} This provides a clean self-contained reference for a key step in the paper \cite{bcls}, addressing an issue in how their statement was justified. We emphasize that this issue can be sidestepped in their examples of interest, and thus does not impact their results in a central way. We explain this here. In \cite{bcls}, the statement of Theorem \ref{t.main2} is justified by showing that the flow is metric Anosov \cite[Proposition 5.1]{bcls} and then referencing \cite{pollicott} as saying that this implies the existence of strong Markov coding. This claim also appears in the papers \cite{BC17, BCLS18, PS17, aS16} either explicitly or implicitly through the claim that results that are true for Anosov flows are true for metric Anosov flows via \cite{pollicott}. However, \cite[Theorem 1]{pollicott} only provides a Markov coding with no guarantee of regularity of the roof function or projection map beyond continuity. When the phase space of the geodesic flow of the representation is a closed manifold, for example in the important case of Hitchin representations, the required regularity can be observed easily from smoothness of the flow and by taking smooth discs for sections in the construction of the symbolic dynamics, as Bowen argued in the Axiom A case. The case of deformation spaces of convex cocompact hyperbolic manifolds is also unproblematic due to the Axiom A structure. If $\Gamma$ is not the fundamental group of a convex cocompact negatively curved manifold, we stress that the phase space of the flow need not be a manifold, so new arguments for regularity are needed. In the context of \cite{bcls}, this is only a minor issue given that they show that the flow is H\"older and demonstrate H\"older continuity of the local product structure. Sections with H\"older return maps can likely be constructed based on these facts. However, to carry this out and incorporate it into Pollicott's symbolic dynamics construction needs rigorous justification. Our proof of Theorem \ref{t.main2} realizes this general philosophy (we do not use or prove H\"older continuity of the local product structure, but our arguments have a similar flavor), and our argument gives a convenient framework and self-contained reference for the regularity of the Markov coding. The existence of a strong Markov coding allows one to instantly apply the rich array of results on dynamical and statistical properties from the literature that are proved for the suspension flow, and known to be preserved by the projection $\pi$. We collect some of these results as they apply to our primary example of the geodesic flow for a compact, or convex cocompact, locally $\operatorname{CAT}(-\kappa)$ space. \begin{corx}\label{t.applications} Consider the geodesic flow on a compact, or convex cocompact with non-elementary fundamental group, locally $\operatorname{CAT}(-\kappa)$ space, and let $\varphi$ be a H\"older potential function on the space of geodesics (resp. non-wandering geodesics in the convex cocompact case). Then there exists a unique equilibrium measure $\mu_\varphi$, and it has the following properties. \begin{enumerate} \item $\mu_\varphi$ satisfies the Almost Sure Invariance Principle, the Law of the Iterated Logarithm, and the Central Limit Theorem; \item The dynamical zeta function is analytic on the region of the complex plane with real part greater than $h$, where $h$ is the entropy of the flow, and has a meromorphic extension to points with real part greater than $h- \epsilon$. \item If the lengths of periodic orbits are not all integer multiples of a single constant then the system is Bernoulli with respect to $\mu_\varphi$; \item If the lengths of periodic orbits are all integer multiples of a single constant and the space is compact and geodesically complete, then $\mu_\varphi$ is the product of Lebesgue measure for an interval with a Gibbs measure for an irreducible shift of finite type; the measure in the base is thus Bernoulli if the shift is aperiodic, or Bernoulli times finite rotation otherwise. \end{enumerate} \end{corx} The equilibrium measure for $\varphi=0$ is the measure of maximal entropy, which is known in this setting as the \emph{Bowen-Margulis measure} $\mu_{BM}$. While items (1), (2), and (3) are true for any topologically transitive system with a strong Markov coding, item (4) additionally uses a structure theorem of Ricks in \cite{ricks}, which applies for geodesic flow on compact, geodesically complete locally $\operatorname{CAT}(0)$ spaces. Finally, we note that in our previous work \cite{CLT}, in the compact case, we used a different approach based on the specification property to show that there is a unique equilibrium measure $\mu_\varphi$. However, those techniques do not give the strong consequences listed above. The paper is structured as follows. In \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:background}, we establish our definitions and preliminary lemmas. In \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:Markov}, we establish the machinery required to build a strong Markov coding for a metric Anosov flow, and prove Theorem \ref{t.usefulversion}. In \ifmmode{S^2}\else{$S^2$}\fi\ref{sec:good rectangles}, we study geometrically defined sections to the flow, completing the proof of Theorem \ref{t.main}. In \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:twoexamples}, we extend the construction to projective Anosov representations, proving Theorem \ref{t.main2}. In \ifmmode{S^2}\else{$S^2$}\fi \ref{s.applications}, we discuss applications of the strong Markov coding, proving Corollary \ref{t.applications}. \section{Preliminaries}\label{sec:background} \subsection{Flows and sections} We consider a continuous flow $(\phi_t)_{t \in \mathbb R}$ with no fixed points on a compact metric space $(X, d)$. For a set $D$, and interval $I$, we write \[ \phi_I D = \{\phi_t x : x \in D, \ t \in I\}. \] We say that a flow $(\phi_t)$ is \emph{H\"older continuous} if the map from $X \times [0,1] \to X$ given by $(x,t) \to \phi_t(x)$ is H\"older continuous. It follows that every time$-t$ map is H\"older continuous, and the map $t \to \phi_t(x)$ is H\"older continuous for each $x\in X$. \begin{defn}\label{defn:section} For a continuous flow $( \phi_t )$ on a metric space $(X,d)$, a \emph{section} is a closed subset $D\subset X$ and a $\xi>0$ so that the map $(z,t) \mapsto \phi_tz$ is a homeomorphism between $D \times [-\xi, \xi] \to X$ and $\phi_{[-\xi,\xi]}D$. \end{defn} For a section $D \subset X$, we write $\operatorname{Int}_\phi D$ for the interior of $D$ \emph{transverse to the flow}; that is, \[\operatorname{Int}_\phi D = D \cap \bigcap_{\epsilon>0}(\phi_{(-\epsilon,\epsilon)}D)^\circ\] where $Y^\circ$ denotes the interior of $Y$ with respect to the topology of $X$. For any section $D$, there is a well-defined projection map $\operatorname{Proj}_D: \phi_{[-\xi,\xi]}D \to D$ defined by $\operatorname{Proj}_D(\phi_tz) =z$. By definition, the domain of this map contains a nonempty open neighborhood of $X$. In \cite{BW}, a set $D \subset X$ is defined to be a section if $D$ is closed and there exists $\xi>0$ so that $D \cap \phi_{[-\xi,\xi]}x = \{x\}$ for all $x \in D$. It is easily checked that this is equivalent to Definition \ref{defn:section}, see \cite[\ifmmode{S^2}\else{$S^2$}\fi 5]{BW}. \subsection{Shifts of finite type and suspension flow} Let $\mathcal{A}$ be any finite set. The full, two-sided shift on the alphabet $\mathcal{A}$ is the dynamical system $(\Sigma, \sigma)$ where \[ \Sigma = \{ \underline x: \mathbb{Z} \to \mathcal{A} \} \ \mbox{ and } \ (\sigma \underline x)_n = \underline x_{n+1}. \] We equip $\Sigma$ with the metric \[ d(\underline x, \underline y) := \frac{1}{2^l} \ \mbox{ where } l = \min\{|n|:\underline x_n \neq \underline y_n\}. \] A \emph{subshift} $Y$ of the full shift is any closed, $\sigma$-invariant subset of $\Sigma$, equipped with the dynamics induced by $\sigma$. We say that $(Y, \sigma)$ is a symbolic system. Given a $\{0,1\}$-valued $d \times d $ transition matrix $A$, where $d$ is the cardinality of $\mathcal{A}$, a ($1$-step) subshift of finite type is defined by \[ \Sigma_A = \{\underline x \in \Sigma : A_{x_n x_{n+1}}=1 \mbox{ for all } n\in \mathbb{Z}\}. \] This is the class of symbolic spaces that appears in this paper. We now recall the suspension flow construction. \begin{defn} Given a symbolic system $(Y, \sigma)$ and a positive function $\rho: Y \to (0,\infty)$, we let \[ Y^{\rho} = \{ (\underline x,t): \underline x\in Y, 0\leq t \leq \rho(\underline x) \}/((\underline x, \rho(\underline x))\sim(\sigma \underline x,0))\] and we define the suspension flow locally by $\phi_s(\underline x, t) = (\underline x, t+s).$ This is the \emph{suspension flow over $(Y, \sigma)$ with roof function $\rho$}. We denote the flow $(Y^{\rho}, (\phi_s))$ by $\operatorname{Susp}(Y, \rho)$. \end{defn} \subsection{$\operatorname{CAT}(-1)$ spaces and geodesic flow}\label{subsec:CAT (-1)} In this paper, a \emph{geodesic} is defined to be a local isometry from $\mathbb{R}$ to a metric space. Thus, by our definition, a geodesic is parametrized and oriented. \begin{defn} In any metric space $(Y,d_Y)$, the \emph{space of geodesics} is \[ GY:= \{ c:\mathbb{R} \to Y \mbox{ where $c$ is a local isometry} \}.\] The \emph{geodesic flow} $(g_t)$ on $GY$ is given for $t \in \mathbb R$ by $g_tc(s) = c(s+t)$. \end{defn} A \emph{geodesic metric space} is a metric space in which the distance between any pair of points can be realized by the length of a geodesic segment connecting them. Given a geodesic metric space $(\tilde X,d_{\tilde X})$, and points $x,y,z \in X$, we can form a geodesic triangle $\Delta(x,y,z)$ in $\tilde X$ and a comparison geodesic triangle $\Delta(\bar x, \bar y, \bar z)$ with the same side lengths in $\mathbb{H}^2$. A point $p \in \Delta(x,y,z)$ determines a comparison point $\bar p \in \Delta(\bar x, \bar y, \bar z)$ which lies along the corresponding side of $\Delta(\bar x, \bar y, \bar z)$ at the same distance from the endpoints of that side as $p$. We say that the space $\tilde X$ is $\operatorname{CAT}(-1)$ if for all geodesic triangles $\Delta(x,y,z)$ in $\tilde X$ and all $p,q \in \Delta(x,y,z)$, we have $d_{\tilde X}(p,q)\leq d_{\mathbb{H}^2}(\bar p, \bar q)$. That is, a space is $\operatorname{CAT}(-1)$ if its geodesic triangles are thinner than corresponding triangles in the model space of curvature $-1$. All $\operatorname{CAT}(-1)$ spaces are contractible, see e.g. \cite[Ch.3, Props 28 \& 29]{troyanov}. A $\operatorname{CAT}(-\kappa)$ space is defined analogously: its geodesic triangles are thinner than corresponding triangles in the model space of curvature $-\kappa$. A $\operatorname{CAT}(- \kappa)$ space can be rescaled homothetically to a $\operatorname{CAT}(-1)$ space. Thus, it suffices to consider $\operatorname{CAT}(-1)$ spaces. In this paper, $(\tilde X, d_{\tilde X})$ will be a $\operatorname{CAT}(-1)$ space, $\Gamma$ will be a discrete group of isometries of $\tilde X$ acting freely and properly discontinuously, and $X=\tilde X/\Gamma$ will be the resulting quotient. A space $(X,d_X)$ is \emph{locally} $\operatorname{CAT}(-1)$ if every point has a $\operatorname{CAT}(-1)$ neighborhood, and it is easily checked that $X=\tilde X/\Gamma$ satisfies this property. Conversely, the universal cover of a complete locally $\operatorname{CAT}(-1)$ space is (globally) $\operatorname{CAT}(-1)$, see e.g. \cite[Thm II.4.1]{bh}, so every complete locally $\operatorname{CAT}(-1)$ space arises this way. We assume that $\Gamma$ is non-elementary, i.e. $\Gamma$ does not contain $\mathbb{Z}$ as a finite index subgroup. The \emph{boundary at infinity} of a $\operatorname{CAT}(-1)$ space is the set of equivalence classes of geodesic rays, where two rays $c,d:[0,\infty) \to \tilde X$ are equivalent if they remain a bounded distance apart, i.e., if $d_{\tilde X}(c(t), d(t))$ is bounded in $t$. We denote this boundary by $\partial^\infty \tilde X$. It can be equipped with the cone topology, see e.g. \cite[Chapter II.8]{bh}. Given a geodesic $c$, we use $c(-\infty)$ and $c(+\infty)$ to denote the points in $\partial^\infty \tilde X$ corresponding to the positive and negative geodesic rays defined by $c$. Given $\Gamma$, let $\Lambda \subset \partial^\infty \tilde X$ be the limit set of $\Gamma$, i.e., the set of limit points in $\partial^\infty\tilde X$ of $\Gamma\cdot x$ for an arbitrary $x\in \tilde X$. Let $C(\Lambda) \subset \tilde X$ be the convex hull of $\Lambda$; clearly $C(\Lambda)$ is $\Gamma$-invariant. If $C(\Lambda)/\Gamma$ is compact, we say that the action of $\Gamma$ on $\tilde X$ is \emph{convex cocompact}. We also call the space $X=\tilde X/\Gamma$ \emph{convex cocompact}. If $\Gamma$ already acts cocompactly on $\tilde X$, then $\Lambda=\partial^\infty \tilde X$, $C(\Lambda) = \tilde X$ and $X= C(\Lambda)/\Gamma$. We assume that $X$ is compact, or convex cocompact. For a $\operatorname{CAT}(-1)$ space $\tilde X$, the space of geodesics $G\tilde X$ can be identified with $[(\partial^\infty\tilde X \times \partial^\infty\tilde X)\setminus \Delta] \times \mathbb{R}$, where $\Delta$ is the diagonal. We equip $G\tilde X$ with the metric: \[ d_{G\tilde X}(\tilde c,\tilde c') := \operatorname{Int}_{-\infty}^\infty d_{\tilde X}(\tilde c(s),\tilde c'(s)) e^{-2|s|}ds.\] The factor $2$ in the exponent normalizes the metric so that $d_{G\tilde X}(\tilde c, g_s \tilde c)=s$. The topologies induced on $G\tilde X$ by this metric and on $[(\partial^\infty\tilde X \times \partial^\infty\tilde X)\setminus \Delta] \times \mathbb{R}$ using the cone topology on $\partial^\infty \tilde X$ agree. We equip $GX$, the space of geodesics in the quotient $X=\tilde X/\Gamma$, with the metric \[ d_{GX}(c,c') = \inf_{\tilde c,\tilde c'} d_{G\tilde X}(c,c')\] where the infimum is taken over all lifts $\tilde c, \tilde c'$ of $c$ and $c'$. Since the set of lifts is discrete, the infimum is always achieved. When $X$ is compact, the space $GX$ is compact, and we study the flow $(g_t)$ on $GX$. When $X$ is convex cocompact, we need to restrict the geodesics we study so that the phase space for our flow is compact. Given a cocompact action of $\Gamma$ on $\tilde X$, let $\hat G\tilde X$ be the set of geodesics with image in $C(\Lambda)$. This set of geodesics is clearly invariant under the geodesic flow and the action of $\Gamma$, and can be identified with $[(\Lambda \times \Lambda)\setminus \Delta]\times \mathbb{R}$. Then $\hat G X = (\hat G\tilde X)/\Gamma$ consists of those geodesics in $X$ which remain in the compact set $C(\Lambda)/\Gamma$. As long as $\Gamma$ is non-elementary, the geodesic flow on $\hat GX$ is transitive. This follows from, for example, \cite[\S8.2]{gromov}. $\hat GX$ is the non-wandering set for the geodesic flow on $GX$, and it is compact. In the convex-cocompact case, we assume throughout that $\Gamma$ is non-elementary and we study the geodesic flow $(g_t)$ restricted to $\hat G X$. Clearly, if $X$ is compact, $\hat G\tilde X = G\tilde X$ and $\hat GX = GX$. See \cite{tapie} or \cite{mB95} for further background and references on geodesic flow for convex cocompact manifolds. \subsection{Geometric lemmas} The following lemma has an elementary proof which can be found in \cite[Lemma 2.8]{CLT}. \begin{lem}\label{lem:X GX bound} There exists some $L>0$ such that $d_X(c(0), c'(0)) \leq L d_{GX}(c,c')$. \end{lem} The following lemma shows that the time-$t$ map of the geodesic flow is Lipschitz. \begin{lem}\label{lem:Lipschitz} Fix any $T>0$. Then for any $t\in[0,T]$, and any pairs of geodesics $x,y\in GX$, \[ d_{GX}(g_t x, g_t y) < e^{2T} d_{GX}(x,y). \] \end{lem} \begin{proof} By definition, for properly chosen lifts, \[ d_{GX}(x,y) = \operatorname{Int}_{-\infty}^\infty d_{\tilde X}(\tilde x(s), \tilde y(s)) e^{-2|s|}ds. \] As $g_t\tilde x$ and $g_t\tilde y$ are lifts of $g_tx$ and $g_ty$, we compute: \begin{align} d_{GX}(g_tx,g_ty) & \leq \operatorname{Int}_{-\infty}^\infty d_{\tilde X}(\tilde x(s+t),\tilde y(s+t))e^{-2|s|}ds \nonumber \\ & = \operatorname{Int}_{-\infty}^\infty d_{\tilde X}(\tilde x(s),\tilde y(s))e^{-2|s-t|}ds \nonumber \\ & = \operatorname{Int}_{-\infty}^\infty d_{\tilde X}(\tilde x(s),\tilde y(s))e^{-2|s|}\cdot \frac{e^{-2|s-t|}}{e^{-2|s|}}ds \nonumber \end{align} It is easy to check that $\frac{e^{-2|s-t|}}{e^{-2|s|}} \leq e^{2t}$, which completes the proof. \end{proof} It follows that the flow $(g_t)$ is Lipschitz, using Lemma \ref{lem:Lipschitz} and the fact that $d_{GX}(g_sx, g_tx) = |s-t|$ for all $x$, and all $s, t$ with $|s-t|$ sufficiently small. \subsection{Busemann functions and horospheres} We recall the definitions of Busemann functions and horospheres. \begin{defn} Let $\tilde X$ be a $\operatorname{CAT}(-1)$ space, $p\in \tilde X$ and $\xi\in \partial^\infty\tilde X$, and $c$ the geodesic ray from $p$ to $\xi$. The \emph{Busemann function centered at $\xi$ with basepoint $p$} is defined as \[B_p(-,\xi): \tilde X \to \mathbb{R},\] \[q \mapsto \lim_{t\to\infty} d_{\tilde X}(q,c(t))-t.\] \end{defn} It is often convenient for us to use the geodesic ray $c(t)$ itself to specify the Busemann function centered at $c(+\infty)$ with basepoint $c(0)$. Thus, for a given geodesic ray $c(t)$, we say the \emph{Busemann function determined by $c$} is the function \[ B_c(-):= B_{c(0)} (-, c(+\infty)). \] It is an easy exercise to verify that any Busemann function is 1-Lipschitz, and it is a well-known fact that Busemann functions on $\operatorname{CAT}(-1)$ spaces are convex in the sense that for any geodesic $\eta$, $B_p(\eta(t),\xi)$ is a convex function of $t$ (see, e.g. \cite[Prop II.8.22]{bh}). The level sets for $B_p(-,\xi)$ are called \emph{horospheres}. \subsection{Stable and unstable sets for $\operatorname{CAT}(-1)$ spaces} In a $\operatorname{CAT}(-1)$ space, we define strong stable and unstable sets in $G X$ generalizing the strong stable and unstable manifolds for negatively curved manifolds. See also \cite[\S2.8]{mB95}. \begin{defn} Let $p_{GX}:G\tilde X \to GX$ be the natural projection. Given $c\in GX$ with lift $\tilde c\in G\tilde X$, the \emph{strong stable set through $c$} is \[ W^{ss}(c) = p_{GX}\{ \tilde c' \in G\tilde X : \tilde c'(\infty) = \tilde c(\infty) \mbox{ and } B_{\tilde c}(\tilde c'(0)) = 0\}. \] For any $\delta>0$, \[ W^{ss}_\delta(c) = p_{GX}\{ \tilde c' \in G\tilde X : \tilde c'(\infty) = \tilde c(\infty), \ B_{\tilde c}(\tilde c'(0)) = 0 \mbox{ and } d_{G\tilde X}(\tilde c,\tilde c')<\delta \}. \] The \emph{strong unstable set through $c$} is \[W^{uu}(c) = p_{GX}\{ \tilde c' \in GX : \tilde c'(-\infty) = \tilde c(-\infty) \mbox{ and } B_{-\tilde c}(\tilde c'(0)) = 0\}\] and \[ W^{uu}_\delta(c) = p_{GX}\{ \tilde c' \in G\tilde X : \tilde c'(-\infty) = \tilde c(-\infty), \ B_{-\tilde c}(\tilde c'(0)) = 0 \mbox{ and } d_{G\tilde X}(\tilde c,\tilde c')<\delta \},\] where $-\tilde c(t) = \tilde c(-t)$. \end{defn} \begin{lem}\label{lem:contract} There exists a constant $C>1$ so that for sufficiently small $\delta$, \begin{enumerate} \item if $c' \in W^{ss}_\delta(c)$ and $t>0$, $d_{GX}(g_tc, g_tc') \leq C d_{GX}(c, c') e^{-t}$; \item if $c'' \in W^{uu}_\delta(c)$ and $t<0$, $d_{GX}(g_tc, g_tc'') \leq C d_{GX}(c, c'') e^{t}$. \end{enumerate} \end{lem} \begin{proof} We prove this for the stable sets in $\tilde X$. The result in $X$ follows, and the proof for the unstable sets is analogous. First we note that in $\mathbb{H}^2$, given $\delta_0>0$, there exists $K>1$ so that if $\bar c, \bar c'$ are two geodesics with $d_{\mathbb{H}^2}(\bar c(t), \bar c'(t) ) < \delta_0$, $\bar c(\infty)= \bar c'(\infty) = \bar \xi$ and $\bar c(0), \bar c'(0)$ on the same horosphere centered at $\bar \xi$, then $d_{\mathbb{H}^2}(\bar c(t), \bar c'(t) ) \leq K e^{-t} d_{\mathbb{H}^2}(\bar c(0), \bar c'(0)) $ for all $t>0$. Let $c' \in W^{ss}_\delta(c)$ with $\delta$ small enough so that, via Lemma \ref{lem:X GX bound}, $d_X( c(0), c'(0)) <\delta_0 $. In $\tilde X$, consider the ideal triangle $\Delta$ with vertices $ \tilde c(0)$, $\tilde c'(0)$ and $\tilde c(\infty)= \tilde c'(\infty)=\xi$. There exists an ideal comparison triangle $\bar\Delta= \Delta(\bar c(0), \bar c'(0), \bar\xi)$ in $\mathbb{H}^2$ satisfying the $\operatorname{CAT}(-1)$ comparison estimate $d_{\tilde X}(\tilde c(t), \tilde c'(t)) \leq d_{\mathbb{H}^2}(\bar c(t), \bar c'(t))$, see \cite[Prop. 4.4.13]{das-simmons-urbanski}. We obtain for all $t\geq 0$, \begin{equation}\label{eqn:contract} d_{\tilde X}(\tilde c(t), \tilde c'(t)) \leq d_{\mathbb{H}^2}(\bar c(t), \bar c'(t)) \leq K d_{\tilde X}(\tilde c(0),\tilde c'(0)) e^{-t}. \end{equation} Now we calculate: \begin{align} d_{G X}(g_t c, g_t c') & \leq e^{-2t} \operatorname{Int}_{-\infty}^0 d_{\tilde X}(\tilde c(u),\tilde c'(u)) e^{-2|u|}du \nonumber \\ & \ \ \ \ \ \ + K e^{-t} \operatorname{Int}_{-t}^\infty d_{\tilde X}(\tilde c(s),\tilde c'(s)) e^{-2|s|} ds, \nonumber \end{align} by breaking our calculation of $d_{G X}(g_t c, g_t c')$ into integrals over $(-\infty,0)$ and $(0,\infty)$, applying a change of variables to the first integral, and equation \eqref{eqn:contract} to the second. We then have that $d_{G X}(g_t c, g_t c') \leq (1+K)e^{-t} d_{G X}(c,c')$. \end{proof} \section{Metric Anosov flows}\label{sec:Markov} In this section, we define metric Anosov flows and prove Theorem \ref{t.usefulversion}. The definition was first given by Pollicott in \cite{pollicott}, generalizing the definition of a hyperbolic flow in \cite{bowen-periodic, bowen-symbolic}, and building on the discrete-time definition of a Smale space due to Ruelle \cite{Ruelle}; see \cite{iP2014} for a detailed exposition in discrete time. \subsection{Metric Anosov flows}\label{sec:smale} A continuous flow $(\phi_t)$ on a compact metric space $(Y, d)$ is a \emph{metric Anosov flow}, also known as a \emph{Smale flow}, if it is equipped with a notion of local product structure. That is, a bracket operation so that the point $\langle x,y\rangle $ is analogous in the uniformly hyperbolic setting to the intersection of the unstable manifold of $x$ with the strong stable manifold of $y$. We give the definition. We follow the presentations of Ruelle and Pollicott and start by emphasizing the topological structure needed. For $\epsilon>0$, let us write \[ (Y \times Y)_\epsilon := \{(x,y) \in Y \times Y : d(x,y) < \epsilon\}. \] Assume there exists a constant $\epsilon>0$ and a continuous map \[ \langle ~,~\rangle ~: (Y \times Y)_\epsilon \to Y, \] which satisfies: \begin{itemize} \item[a)] $\langle x,x\rangle =x$ \item[b)] $\langle \langle x,y\rangle ,z\rangle =\langle x, z\rangle $ \item[c)] $\langle x, \langle y,z\rangle \rangle =\langle x, z\rangle $. \end{itemize} We further assume that if $(\phi_sx,\phi_sy) \in (Y\times Y)_\epsilon$ for all $s\in[0,t]$, \begin{itemize} \item[d)]$\phi_t(\langle x,y \rangle)= \langle \phi_tx, \phi_ty \rangle$. \end{itemize} We define the \emph{local strong stable set according to $\langle ~,~\rangle $} to be \[ V^{ss}_\delta (x) = \{ u \mid u = \langle u,x\rangle \mathrm{ ~and~ } d(x, u)< \delta \}, \] and the \emph{local unstable set according to $\langle ~,~\rangle $} to be \[ V^{u}_\delta (x) = \{ v \mid v = \langle x,v\rangle \mathrm{ ~and~ } d(x, v)< \delta \}. \] It can be deduced from the properties of the bracket operation that for small $\delta>0$, the map $\langle ~,~\rangle : V^{ss}_{\delta} (x) \times V^{u}_{\delta} (x) \to Y$ is a homeomorphism onto an open set in $Y$, see \cite[\S7.1]{Ruelle}. By decreasing $\epsilon$ if necessary, we may assume that for each $x \in Y$, the map $\langle ~,~\rangle : V^{ss}_{\epsilon/2} (x) \times V^{u}_{\epsilon/2} (x) \to Y$ is a homeomorphism onto an open set in $Y$. So far, the structure required on $\langle~,~\rangle$ is purely topological. For this bracket operation to capture dynamics analogous to that of an Anosov flow, we need to add dynamical assumptions. We define the \emph{metric} local strong stable and strong unstable sets as follows: \[ W^{ss}_\delta (x; C, \lambda) = \{ v \in V^{ss}_\delta (x) \mid d(\phi_t x, \phi_t y) \leq Ce^{-\lambda t}d(x,y) \text{ for } t \geq 0\} \] \[ W^{uu}_\delta (x; C, \lambda) = \{ v \in V^{u}_\delta (x) \mid d(\phi_{-t} x, \phi_{-t} y) \leq Ce^{-\lambda t}d(x,y) \text{ for } t \geq 0\}. \] \begin{defn}\label{defn:metric anosov} Let $(\phi_t)$ be a continuous flow on a compact metric space $(Y,d)$ and let $\epsilon>0$ and $\langle~,~\rangle$ be as described above. We say that $(\phi_t)$ is a \emph{metric Anosov flow} if there exist constants $C, \lambda, \delta_0>0$ and a continuous function $v\colon(Y\times Y)_\epsilon \to \mathbb{R}$ such that, writing $W^{ss}_{\delta_0} (x) = W^{ss}_{\delta_0} (x; C, \lambda)$ and $W^{uu}_{\delta_0} (x) = W^{uu}_{\delta_0} (x; C, \lambda)$, for any $(x, y) \in (Y \times Y)_\epsilon$ we have \[ W^{uu}_{\delta_0}(\phi_{v(x,y)}x) \cap W^{ss}_{\delta_0}(y) = \{\langle x,y\rangle \}. \] Furthermore, $v(x,y)$ is the unique small value of $t$ so that $W^{uu}_{\delta_0}(\phi_{t}x) \cap W^{ss}_{\delta_0}(y)$ is non-empty. \end{defn} We can deduce the following basic control on scales: for each small $\delta>0$, there exists $\gamma\in(0, \epsilon)$ so that if $x,y \in (Y \times Y)_{\gamma}$, then $W^{uu}_{\delta}(\phi_{v(x,y)}x) \cap W^{ss}_{\delta}(y) = \{\langle x,y\rangle\}$, and $v(x,y)<\delta$. This follows from continuity of $\langle ~,~\rangle $ and $v$, and the fact that $\langle x,x\rangle =x$ implies $v(x,x)=0$. The details are similar to \cite[Lemma 1.5]{bowen-periodic}. In examples of metric Anosov flows, we can consider the bracket operation $\langle~,~\rangle$ as being defined by the metric strong stable and unstable sets via the equation in Definition \ref{defn:metric anosov}, and check that the basic topological properties of the bracket operation hold as a consequence of being defined this way. Thus, it is probably helpful to think of the families $W^{uu}_\delta$ and $W^{ss}_\delta$ as the basic objects in the definition. A hyperbolic set for a smooth flow is locally maximal if and only if it has local product structure \cite[Theorem 6.2.7]{FH}. Thus, metric Anosov flows are generalizations of locally maximal hyperbolic sets for smooth flows. In particular, an Axiom A flow restricted to its non-wandering set is metric Anosov. Another class of examples of metric Anosov flows is given by suspension flows by a H\"older continuous roof function over a shift of finite type. The metric Anosov flow structure for the constant roof function case is described in \cite{pollicott}. The stables and unstables and bracket operation for the H\"older roof function case can be obtained by using H\"older orbit equivalence with the constant roof function case. The details are similar to the second proof of Theorem 5.1.16 in \cite[\S6.1]{FH}, which shows that a smooth time change of a hyperbolic set is a hyperbolic set. The following property of metric Anosov flows follows the standard proof that Axiom A flows are expansive. \begin{thm}\emph{(}\cite[Cor 1.6]{bowen-symbolic}, \cite[Prop 1]{pollicott}\emph{)} A metric Anosov flow satisfies the expansivity property. \end{thm} There are at most finitely many fixed points for an expansive flow, and they are all isolated. Expansivity is a corollary of the following result, which says that orbits that are close are exponentially close. \begin{thm}\label{expclose} \emph{(}\cite[Lemma 1.5]{bowen-symbolic}\emph{)} For a metric Anosov flow, there are constants $C, \lambda>0$ so that for all $\epsilon>0$, there exists $\delta>0$ so that if $x,y \in Y$ and $h: \ifmmode{\Bbb R}\else{$\Bbb R$}\fi \to \ifmmode{\Bbb R}\else{$\Bbb R$}\fi$ is continuous such that $h(0)=0$ and $d(\phi_t x, \phi_{h(t)} y) < \delta$ for all $t \in [-T, T]$, then $d(x, \phi_v y)< C e^{-\lambda T}\delta$ for some $|v| < \epsilon$. \end{thm} Bowen's proof goes through without change in the setting of metric Anosov flows. In the case of geodesic flow on a $\operatorname{CAT}(-1)$ space, this is a well known property of geodesics in negative curvature: it holds for geodesics in $\mathbb{H}^2$ by standard facts from hyperbolic geometry, and this can be propagated to the universal cover of a locally $\operatorname{CAT}(-1)$ space by using two nearby geodesics to form a comparison quadrilateral in $\mathbb{H}^2$. The details of the argument in this case are contained in the proof of Proposition 4.3 of \cite{CLT}. \begin{thm} \label{t.smale} For a compact (resp. convex cocompact), locally $\operatorname{CAT}(-1)$ space $X$, the geodesic flow on $Y= GX$ (resp. $Y=\hat GX$) is a metric Anosov flow. \end{thm} \begin{proof} First, we define $\langle \cdot, \cdot \rangle$ for geodesics in $G\tilde X$, and verify its properties there. For $(c,c')\in (G\tilde X \times G\tilde X)_\epsilon$, define $\langle c,c'\rangle $ to be the geodesic $d$ with $d(-\infty) = c(-\infty)$, $d(+\infty) = c'(+\infty)$ and $B_{c'}(d(0)) = 0$ (see Figure \ref{fig:smale}). It is easy to verify that $\langle \cdot, \cdot \rangle$ is continuous and satisfies conditions (a), (b), (c), and (d) from \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:smale}. $V_\delta^{ss}(c)$ consists of geodesics $\delta$-close to $c$ which have the same forward endpoint as $\tilde c$ and basepoint on $B_{\tilde c} = 0$, and $V_\delta^u(c)$ is geodesics $\delta$-close to $c$ which have the same backward endpoint as $c$. It follows from Lemma \ref{lem:contract} that for a sufficiently large choice of $C$ and $\lambda = 1$, \[W^{ss}_\delta(c;C,\lambda) = \{c': c'(+\infty) = c(+\infty), \ B_{c}(c'(0))=0, \mbox{ and } d_{G\tilde X}(c,c')<\delta \}; \] \[W^{uu}_\delta(c;C,\lambda) = \{c': c'(-\infty) = c(-\infty), \ B_{-c}(c'(0))=0, \mbox{ and } d_{G\tilde X}(c,c')<\delta \}. \] We define $v:(G\tilde X\times G\tilde X)_\epsilon \to \mathbb{R}$ by setting $v(c,c')$ to be the negative of the signed distance along the geodesic $d = \langle c,c'\rangle $ from its basepoint to the horocycle $B_{-c}=0$. This is clearly continuous, and it is easily checked that \[ W^{uu}_\delta(g_{v(c,c')}c) \cap W^{ss}_\delta(c') = \langle c,c'\rangle \] and that for all other values of $t$, $W^{uu}_\delta(g_tc) \cap W^{ss}_\delta(c') = \emptyset$. Recall that $X = \tilde X /\Gamma$, and note that these constructions are clearly $\Gamma$-equivariant. For sufficiently small $\epsilon$, there clearly exists a small enough $\delta_0$ such that the scale $\delta_0$ metric local strong stable and unstable sets descend to $GX$, and the bracket operation $\langle \cdot , \cdot \rangle$ and the map $v$ descend to $(GX \times GX)_\epsilon$. By construction, these operations have all the desired properties for a metric Anosov flow. If $X$ is compact, this completes the proof. Now we extend the argument to the case that $X$ is convex cocompact. The argument above applies verbatim to define a continuous operation $\langle \cdot ,\cdot \rangle $ on $(GX \times GX)_\epsilon$ which satisfies conditions (a), (b), (c), and (d) from \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:smale}. To show that we have a metric Anosov flow on the compact metric space $\hat GX$, all that remains to check is that $\langle \cdot ,\cdot \rangle $ can be restricted to $\hat GX$. If $c, c' \in \hat G\tilde X$, then $c(-\infty), c'(+\infty) \in \Lambda$, so by construction the geodesic $d = \langle c, c'\rangle $ has $d(-\infty), d(+\infty) \in \Lambda$. Thus $d \in \hat GX$. \end{proof} \begin{figure}[h] \begin{tikzpicture} \draw (0,0) circle (3.5); \fill[gray!50!white] (0,0) circle(1); \draw[thick,green!50!black, dashed] (-.55,1.95) circle(1.47); \draw[thick,green!50!black, dashed] (.55,-1.7) circle(1.7); \node at (1.2,0.4) {$\tilde U$}; \draw (-1,-3.4) arc (-19.7:19.7:10cm); \draw (1,3.35) arc (160.3:199.7:10cm); \draw[thick, blue] (-1,3.35) --(1,-3.35); \draw [ultra thick, ->] (-.43,.5) -- (-.45,.8) ; \draw [ultra thick, ->] (.43,0) -- (.43,.3) ; \draw [blue, ultra thick, ->] (-.15,.5) -- (-.24,.85) ; \node at (-1,-2.8){$c'$}; \node at (1,2.8){$c$}; \node[red] at (-1,.15) {$v(c,c')$} ; \node[blue] at (1.36,1){$<c,c'>$}; \draw[blue, ->] (.75,.9) -- (-.05,.7) ; \node[red, rotate=16] at (-.18,.2) {{\huge$\{$}} ; \node[green!50!black] at (-2.4,1) {$B_{c'}=0$} ; \node[green!50!black] at (2.4,-.3) {$B_{-c}=0$} ; \end{tikzpicture} \caption{The geometric construction showing that geodesic flow on a CAT(-1) space is a metric Anosov flow.}\label{fig:smale} \end{figure} \subsection{Sections, proper families, and symbolic dynamics for metric Anosov flows}\label{sec:sections} We recall the construction of a Markov coding for a metric Anosov flow. We follow the approach originally due to Bowen \cite{bowen-symbolic} for basic sets for Axiom A flows, which was shown to apply to metric Anosov flows by Pollicott \cite{pollicott}. We recall Bowen's notion of a proper family of sections and a Markov proper family from \cite{bowen-symbolic}. \begin{defn}\label{defn:proper} Let $\mathcal B=\{B_1, \ldots, B_n\}$, and $\mathcal D=\{D_1, \ldots, D_n\}$ be collections of sections. We say that $(\mathcal B , \mathcal D)$ is a \emph{proper family at scale $\alpha>0$} if $\{ (B_i, D_i) : i = 1, 2, \ldots, n \}$ satisfies the following properties: \begin{enumerate} \item $\operatorname{diam}(D_i)< \alpha$ and $B_i \subset D_i$ for each $i \in \{1, 2, \ldots, n\}$; \item $\bigcup_{i=1}^n\phi_{(-\alpha, 0)} (\operatorname{Int}_\phi B_i)=Y$; \item For all $i\neq j$, if $\phi_{[0, 4\alpha]}(D_i) \cap D_j \neq \emptyset$, then $\phi_{[-4\alpha, 0]}(D_i) \cap D_j = \emptyset$. \end{enumerate} \end{defn} Condition (3) implies that the sets $D_i$ are pairwise disjoint, and the condition is symmetric under reversal of time; that is, it follows that if $\phi_{[-4\alpha, 0]}(D_i) \cap D_j \neq \emptyset$, then $\phi_{[0, 4\alpha]}(D_i) \cap D_j = \emptyset$. In \cite{bowen-symbolic, pollicott}, the time interval in condition (2) is taken to be $[-\alpha, 0]$. Our `open' version of this condition is slightly stronger and convenient for our proofs in \ifmmode{S^2}\else{$S^2$}\fi\ref {sec:good markov}. We now define a special class of proper families, which we call \emph{pre-Markov}. \begin{defn}\label{def:rectangle} For a metric Anosov flow, a \emph{rectangle} $R$ in a section $D$ is a subset $R \subseteq \operatorname{Int}_\phi D$ such that for all $x,y \in R$, $\operatorname{Proj}_{D} \langle x,y\rangle \in R$. \end{defn} \begin{defn}[Compare with \ifmmode{S^2}\else{$S^2$}\fi 2 in \cite{pollicott}, \ifmmode{S^2}\else{$S^2$}\fi 7 in \cite{bowen-symbolic}]\label{defn:pollicott} Let $(\mathcal B, \mathcal D)$ be a proper family at scale $\alpha>0$. We say that $(\mathcal B, \mathcal D)$ is \emph{pre-Markov} if the sets $B_i$ are closed rectangles and we have the following property: \begin{equation} \label{premarkov} \mbox{If }B_i \cap \phi_{[-2 \alpha, 2 \alpha]}B_j \neq \emptyset, \mbox{ then } B_i \subset \phi_{[-3\alpha, 3\alpha]} D_j. \end{equation} \end{defn} The existence of pre-Markov proper families is left as an exercise by both Bowen and Pollicott since it is fairly clear that the conditions asked for are mild; some rigorous details are provided in \cite{BW}. In Proposition \ref{prop:good mpf}, we complete this exercise by providing a detailed proof of the existence of a special class of pre-Markov proper families. For our purposes, we must carry out this argument carefully since it is crucial for obtaining the H\"older return time property of Theorem \ref{t.usefulversion}. We now define a Markov proper family. This is a proper family where the sections are rectangles, and with a property which can be informally stated as `different forward $\mathcal R$-transition implies different future, and different backward $\mathcal R$-transitions implies different past.' \begin{defn} A proper family $(\mathcal R, \mathcal S)$ is \emph{Markov} if the sets $R_i$ are rectangles, and we have the following Markov property: let $H$ denote the Poincar\'e return map for $\bigcup_i R_i$ with respect to the flow $(\phi_t)$. Then if $ x \in R_i$ and $ H(x) \in R_j$, and $z \in R_i$ and $H(z) \notin R_j$, then $z \notin V^{ss}_{\operatorname{diam} R_i}(x)$. Similarly, if $ x \in R_i$ and $ H^{-1}(x) \in R_j$, and $z \in R_i$ and $H^{-1}(z) \notin R_j$, then $z \notin V^u_{\operatorname{diam} R_i}(x)$. \end{defn} The reason we call the families defined in Definition \ref{defn:pollicott} \emph{pre-Markov} is because the argument of \S7 of \cite{bowen-symbolic}, and \S2 of \cite{pollicott} gives a construction to build Markov families out of pre-Markov families. The motivation for setting things up this way is that the existence of pre-Markov families can be seen to be unproblematic, whereas the existence of proper families with the Markov property is certainly non-trivial. More formally, we have: \begin{lem} \label{PtoB} If $(\mathcal B, \mathcal D)$ is a pre-Markov proper family at scale $\alpha$ for a metric Anosov flow, then there exists a Markov proper family $(\mathcal R, \mathcal S)$ at scale $\alpha$ so that for all $i$, there exists an integer $j$ and a time $u_j$ with $|u_j|<<\alpha$ such that $R_i \subset \phi_{u_j}B_j$. \end{lem} This is proved in \cite[ \S7]{bowen-symbolic} in the case of Axiom A flows, and the construction in \S2 of \cite{pollicott} adapts this proof to the case of metric Anosov flows, culminating in the statement of \cite[ \ifmmode{S^2}\else{$S^2$}\fi 2.2 `Key Lemma']{pollicott}. We note that for metric Anosov flows, pre-Markov proper families $(\mathcal B, \mathcal D)$ can be found at any given scale $\alpha>0$, and thus Lemma \ref{PtoB} provides Markov proper families at any small scale $\alpha>0$ (in the sense of Definition \ref{defn:proper}). We note that in \cite{bowen-symbolic, pollicott}, pre-Markov families are also equipped with an `intermediate' family of sections $\mathcal K$, which are a collection of closed rectangles $K_i \subset \operatorname{Int}_\phi B_i$, and a scale $\delta>0$ chosen so any closed ball $\overline B(x, 6\delta)$ is contained in some $\phi_{[-2 \alpha, 2 \alpha]}K_i$. Given a pre-Markov proper family, such a collection $\mathcal K$ and such a $\delta>0$ can always be found. The only role of theses intermediate families is internal to the proof of Lemma \ref{PtoB}, and thus we consider the existence of the family $\mathcal K$ to be a step in the proof of Lemma \ref{PtoB} rather than an essential ingredient which needs to be included in the definition of proper families. The proof of Lemma \ref{PtoB} involves cutting up sections from the pre-Markov family into smaller pieces; this can be carried out so that the resulting sections all have diameter less than $\alpha$. The flow times $u_i$ are used to push rectangles along the flow direction a small amount to ensure disjointness. These times can be taken arbitrarily small, in particular, much smaller than $\alpha$. Note that if $\mathcal B = \{B_1, \ldots, B_n\}$, then the collection $\mathcal R= \{R_1, \ldots R_N\}$ provided by Lemma \ref{PtoB} satisfies $N >> n$. \subsection{Markov partitions} Given a collection of sections $\mathcal R$, let $H: \bigcup_{i=1}^N R_i \to \bigcup_{i=1}^N R_i$ be the Poincar\'e (return) map, and let $r: \bigcup_{i=1}^N R_i \to (0, \infty)$ be the return time function, which are well defined in our setting. \begin{defn} For a Markov proper family $(\mathcal R, \mathcal S)$ for a metric Anosov flow, we define the coding space to be \[ \Sigma=\Sigma(\mathcal R)= \left \{ \underline x \in \prod_{-\infty}^{\infty}\{1, 2, \ldots, N\} \mid \text{ for all } l, k \geq 0, \bigcap_{j=-k}^l H^{-j}( \operatorname{Int}_\phi R_{x_j}) \neq \emptyset \right \}. \] \end{defn} In \S2.3 of \cite{pollicott}, the symbolic space $\Sigma(\mathcal R)$ is shown to be a shift of finite type. There is a canonically defined map $\pi: \Sigma(\mathcal R) \to \bigcup_i R_i$ given by $\pi(\underline x) = \bigcap_{j=-\infty}^\infty H^{-j}(R_{x_j})$. Let $\rho= r \circ \pi: \Sigma \to (0, \infty)$ and let $\Sigma^\rho=\Sigma^\rho(\mathcal R)$ be the suspension flow over $\Sigma$ with roof function $\rho$. We extend $\pi$ to $\Sigma^\rho$ by $\hat \pi(\underline x, t) = \phi_t(\pi(\underline x))$. Pollicott shows the following. \begin{thm} \emph{(}\cite[Theorem 1]{pollicott}\emph{)} If $(\phi_t)$ is a metric Anosov flow on $Y$, and $(\mathcal R, \mathcal S)$ is a Markov proper family, then $\Sigma(\mathcal R)$ is a shift of finite type and the map $\hat\pi: \Sigma^\rho \to Y$ is finite-to-one, continuous, surjective, injective on a residual set, and satisfies $\hat \pi \circ f_t = \phi_t \circ \hat \pi$, where $(f_t)$ is the suspension flow. \end{thm} We say that a flow has a \emph{strong Markov coding} if the conclusions of the previous theorem are true with the additional hypothesis that the roof function $\rho$ is H\"older and that the map $\hat \pi$ is H\"older. This is condition (III) on p.195 of \cite{pollicott}. Since $\rho= r \circ \pi: \Sigma \to (0, \infty)$, it suffices to know that $\hat\pi$ is H\"older and $r$ is H\"older where it is continuous. Thus, we can formulate Pollicott's result as follows: \begin{thm} [Pollicott] \label{t.pollicott} If $(\phi_t)$ is a metric Anosov flow, and there exists a Markov proper family $(\mathcal R, \mathcal D)$ such that the return time function $r$ for $\mathcal R$ is H\"older where it is continuous, and the natural projection map $\hat \pi: \Sigma^\rho \to X$ is H\"older, then the flow has a strong Markov coding. \end{thm} A drawback of this statement is that it is not clear how to meet the H\"older requirement of these hypotheses. Our Theorem \ref{t.usefulversion} is designed to remedy this. Recall the hypotheses of Theorem \ref{t.usefulversion} are that the metric Anosov flow is H\"older and that there exists a pre-Markov proper family $(\mathcal B, \mathcal D)$ so that the return time function and the projection maps to the $B_i$ are H\"older. We now prove Theorem \ref{t.usefulversion} by showing that these hypotheses imply the hypotheses of Theorem \ref{t.pollicott}. \begin{proof}[Proof of Theorem \ref{t.usefulversion}.] We verify the hypotheses of Theorem \ref{t.pollicott}. Let the family $(\mathcal R, \mathcal S)$ be the Markov family provided by applying Lemma \ref{PtoB} to $(\mathcal B, \mathcal D)$. Recall that by Lemma \ref{PtoB}, we can choose the scale $\alpha$ for $(\mathcal B, \mathcal D)$ as small as we like. Then $\mathcal R$ consists of rectangles $R_i$ which are subsets of elements of $\mathcal B$ shifted by the flow for some small time. Thus, the return time function for $\mathcal R$ inherits H\"older regularity from the return time function for $\mathcal B$. Now we use Theorem \ref{expclose} to show that the projection map $\pi$ from $\Sigma(\mathcal R)$ is H\"older. Fix some small $\alpha_0>0$. Choose $\epsilon>0$ sufficiently small that the projection maps to any section $S$ with diameter less than $\alpha_0$ are well-defined on $\phi_{[-\epsilon,\epsilon]}S$. Then let us suppose that our Markov family is at scale $\alpha$ so small that $\alpha<\alpha_0$ and $3\alpha < \delta$ where $\delta$ is given by Theorem \ref{expclose} for the choice of $\epsilon$ above. Let $\underline i, \underline j \in \Sigma(\mathcal R)$ which agree from $i_{-n}$ to $i_n$. We write $x, y$ for the projected points, which belong to some $B_{i^*}$. If two orbits pass through an identical finite sequence $R_{i_{-n}}, \ldots, R_{i_0}, \ldots R_{i_n}$ then they are $3\alpha$-close for time at least $2n$ multiplied by the minimum value of the return map on $\mathcal R$, which we write $r_0$. The distance is at most $3 \alpha$ since $\operatorname{diam} R_i < \alpha$ and the return time is less than $\alpha$. Thus, by Theorem \ref{expclose} there is a time $v$ with $|v|<\epsilon$ so that $d(x, \phi_v y)< \alpha e^{-\lambda 2nr_0}$. Using H\"older continuity of the projection map $\operatorname{Proj}_{R_{i_0}}$, which is well-defined at $\phi_vy$ since $|v|<\epsilon$, we have \[ d(x,y) = d(\operatorname{Proj}_{R_{i_0}}x, \operatorname{Proj}_{R_{i_0}}\phi_v y)< Cd(x, \phi_vy)^\beta, \] where $\beta$ is the H\"older exponent for the projection map. Thus, $d(x,y) < C\alpha e^{-(2\beta \lambda r_0) n}$. Since $d(\underline i, \underline j) = 2^{-n}$, this shows the projection $\pi$ from $\Sigma(\mathcal R)$ is H\"older. It follows that the roof function $\rho = \pi \circ r$ is H\"older. Thus, since $\pi$ is H\"older, the roof is H\"older and the flow is H\"older, it follows that $\hat \pi: \Sigma^\rho \to X$ is H\"older. \end{proof} The advantage of the formulation of Theorem \ref{t.usefulversion} is that the hypotheses for the strong Markov coding are now written entirely in terms of properties of the flow and families of sections $\mathcal D$. In the terminology introduced above, Bowen showed that transitive Axiom A flows admit a strong Markov coding, using smoothness of the flow and taking the sections to be smooth discs to obtain the regularity of the projection and return maps. For a H\"older continuous metric Anosov flow, we do not know of a general argument to obtain this regularity. Our strategy to verify the hypotheses of Theorem \ref{t.usefulversion} in the case of geodesic flow on a $\operatorname{CAT}(-1)$ space is to construct proper families in which the sections are defined geometrically. For these special sections, we can establish the regularity that we need. Our argument relies heavily on geometric arguments which are available for CAT(-1) geodesic flow, but do not apply to general metric Anosov flows. \section{Geometric rectangles and H\"older properties}\label{sec:good rectangles} \subsection{Geometric rectangles} \label{subsec:geom rect} In this section, we define geometric rectangles which can be built in $G\tilde X$ for any $\operatorname{CAT}(-1)$ space $\tilde X$. \begin{defn}\label{def:geom rectangle} Let $U^+$ and $U^-$ be disjoint open sets in $\partial_\infty \tilde X$. Let $T \subset \tilde X$ be a transversal on $\tilde X$ to the geodesics between $U^-$ and $U^+$ -- that is, a set $T$ so any geodesic $c$ with $c(\infty)\in U^+$ and $c(-\infty) \in U^-$ intersects $T$ exactly once. Let $R(T, U^+, U^-)$ be the set of all geodesics $c$ with $c(\infty)\in U^+$ and $c(-\infty) \in U^-$ and which are parametrized so that $c(0)\in T$. If $R(T,U^+,U^-)$ is a section to the geodesic flow on $G \tilde X$, we call $R(T,U^+,U^-)$ a \emph{geometric rectangle for $G\tilde X$}. Any sufficiently small geometric rectangle in $G\tilde X$ projects bijectively to $GX$, and this defines a \emph{geometric rectangle for $GX$}. \end{defn} \begin{figure}[h] \begin{tikzpicture} \draw (0,0) circle (3.5); \node at (0,4) {$U^+$}; \node at (0,-4) {$U^-$}; \draw (-1,-3.35) arc (-19.7:19.7:10cm); \draw (1,3.35) arc (160.3:199.7:10cm); \draw[ultra thick, red] (1.75,3.05) arc (60:120:3.5cm); \draw[ultra thick, red] (-1.75,-3.05) arc (240:300:3.5cm); \draw [thick, ->] (-.43,0) -- (-.43,.3) ; \draw [thick, ->] (.43,0) -- (.43,.3) ; \draw [thick, ->] (0,0) -- (-.1,.3) ; \draw[ultra thick] (-.5,0) -- (.5,0); \node at (.8,0){$T$}; \node at (-1,2.7){$c'$}; \node at (1,2.7){$c$}; \draw (-1,3.35) --(1,-3.35); \node at (.2,-1.3){$d$}; \end{tikzpicture} \caption{Illustrating Definition \ref{def:geom rectangle}. The arrows mark the basepoint and direction for each geodesic in $R(T,U^+,U^-)$.}\label{fig:geom rectangle} \end{figure} If $c, c' \in R(T,U^+,U^-)$, then $\operatorname{Proj}_T \langle c, c'\rangle $ is the geodesic $d$ which connects the backward endpoint of $c$ to the forwards endpoint of $c'$, with $d(0)\in T$, and thus $R(T,U^+,U^-)$ is a rectangle in the sense of Definition \ref{def:rectangle} (see Figure \ref{fig:geom rectangle}). In the case when $X$ is convex cocompact, we observe that $R(T, U^+, U^-)\cap \hat G\tilde X$ is still a rectangle. This is because membership of $\hat G\tilde X$ is determined by whether the endpoints of a geodesic lie in $\Lambda \subset \partial^\infty\tilde X$, and thus if $c, c'\in \hat G\tilde X$, then $\langle c,c'\rangle \in \hat G\tilde X$. We keep the notation $R(T, U^+, U^-)$ for rectangles in $\hat G \tilde X$. Although this is formally a slight abuse of notation, using the same notation for rectangles in $G \tilde X$ and $\hat G \tilde X$ simplifies notation and will not cause any issues. To build rectangles we need to specify the sets $U^+$ and $U^-$ and choose our transversals. We do so in the following definition. Fix a parameter $\tau >>1$. Let $c\in G\tilde X$. Let $B_1 = B_{d_{\tilde X}}(c(-\tau),1)$ and $B_2 = B_{d_{\tilde X}}(c(\tau),1)$ be the open balls of $d_{\tilde X}$-radius 1 around $c(\pm\tau)$. Let \[ \gamma(c, \tau) = \{ c'\in GX : c' \cap B_i \neq \emptyset \mbox{ for } i=1,2 \}. \] Let \[ \partial (c, \tau) = \{ (c'(-\infty), c'(+\infty)) \in \partial^\infty \tilde X \times \partial^\infty \tilde X : c'\in \gamma(c,\tau) \}.\] It is easy to check that $\partial (c, \tau)$ is open in the product topology on $\partial^\infty \tilde X \times \partial^\infty \tilde X$. Then we may find open sets $U^-$ and $U^+$ such that $(c(-\infty), c(+\infty)) \in U^- \times U^+ \subset \partial (c, \tau)$. \begin{defn}\label{def:good rectangle} Let $c\in G\tilde X$ and $\tau >>1$. Let $U^-$ and $U^+$ satisfy $U^- \times U^+ \subset \partial (c, \tau)$. The \emph{good rectangle} $R(c, \tau; U^-, U^+)$ is the set of all $\eta \in G \tilde X$ which satisfy: \begin{enumerate} \item $\eta(-\infty) \in U^-$ and $\eta(+\infty) \in U^+$, \item $B_{c}(\eta(0)) = 0$, \item If $\eta(t_1)\in B_1$ and $\eta(t_2)\in B_2$, then $t_1<0<t_2$. \end{enumerate} In the convex cocompact case, in addition we take the intersection of all such geodesics with $\hat G\tilde X$. To remove arbitrariness in the choice of $U^-, U^+$, we can let $\delta>0$ be the biggest value so that if $U^-_\delta = B_\infty(c(+\infty), \delta)$ and $U^+_\delta = B_\infty(c(-\infty), \delta)$, then $U^-_\delta \times U^+_\delta \subset \partial(c, \tau)$. We can set $R(c, \tau)= R(c, \tau; U^-_\delta, U^+_\delta)$. \end{defn} In other words, for \emph{good} rectangles, we take as our transversal $T$ on $X$ a suitably sized disc in the horocycle based at $c(+\infty)$ through $c(0)$ (see Figure \ref{fig:good rectangle}). We will usually consider the `maximal' good rectangle $R(c, \tau)$. However, we note that the definition makes sense for any $V^- \times V^+ \subset \partial (c, \tau)$. In particular, it is not required that the geodesic $c$ itself (which defines the horocycle that specifies the parameterization of the geodesics) be contained in $R(c, \tau; V^-, V^+)$. \begin{figure}[h] \begin{tikzpicture} \draw (0,0) circle (3.5); \draw [fill=cyan] (0,2) circle (.4); \draw [fill=cyan] (0,-2) circle (.4); \draw[thick, dashed, green!50!black] (0,1.75) circle(1.75); \node at (0,4) {$U^+$}; \node at (0,-4) {$U^-$}; \draw (0,-3.5) -- (0,3.5); \draw[ultra thick, red] (.57,3.45) arc (80:100:3.5cm); \draw[ultra thick, red] (-.57,-3.45) arc (260:280:3.5cm); \draw [ultra thick,->] (0,0) -- (0,.5); \draw (.5,-3.45) to [out=95,in=265] (.3,3.450); \draw [ultra thick,->] (0.22,0.02) -- (0.2,.5); \node at (-.24,.4){$c$}; \node at (.44,.4){$\eta$}; \node at (2,.7){$T=H$}; \node at (-.7,2){$B_2$}; \node at (-.7,-2){$B_1$}; \end{tikzpicture} \caption{A geodesic $\eta\in R(c, \tau ; U^-,U^+)$ as in Definition \ref{def:good rectangle}.}\label{fig:good rectangle} \end{figure} To justify this definition, we must verify that $R(c, \tau; U^-, U^+)$ is in fact a rectangle in the sense of Definition \ref{def:geom rectangle}. That is, we need to prove the following two lemmas: \begin{lem} \label{sectionproof} For any $\eta \in G\tilde X$ with $\eta(-\infty) \in U^-$ and $\eta(+\infty) \in U^+$, there is exactly one point $p \in \eta$ such that $B_{c}(p)=0$ and such that $p$ lies between $\eta$'s intersections with $B_1$ and $B_2$. \end{lem} \begin{proof} We have $B_{c(0)}(\eta(t_1),c(+\infty))>0$ when $\eta(t_1) \in B_1$ and $B_{c(0)}(\eta(t_2),c(+\infty))<0$ when $\eta(t_2) \in B_2$. Continuity and convexity of the Busemann function implies that there is a unique $t^*\in (t_1, t_2)$ such that $B_{c(0)}(\eta(t^*),c(+\infty))=0$. Let $p=\eta(t^*)$. \end{proof} \begin{lem} $R(c, \tau; U^-, U^+)$ is a section. \end{lem} \begin{proof} The openness of $U^-$ and $U^+$, and the $1$-Lipschitz property of Busemann functions are the key facts. \end{proof} We give the following distance estimates for geodesics in a rectangle. \begin{lem} \label{l.distance} For all $\eta \in R(c, \tau; U^-, U^+)$, we have \begin{enumerate} \item $d_{\tilde X}(c(0), \eta(0))\leq 2$; \item $d_{\tilde X}(c( \pm \tau), \eta(\pm \tau))<4$. \end{enumerate} \end{lem} \begin{proof} First, we prove (1). By the definition of the rectangle, we know that there exist times $t^+>0$ and $t^-<0$ so that $d_{\tilde X}(c(\tau), \eta(t^+))<1$ and $d_{\tilde X}(c(-\tau), \eta(t^-))<1$. Since the distance between two geodesic segments is maximized at one of the endpoints, we know that $d_{\tilde X}(\eta(0), c)<1$. Thus, there exists $t^\ast$ so that $d_{\tilde X}(\eta(0), c(t^\ast))<1$. Thus, $d_{\tilde X}(c(0), \eta(0)) \leq d_{\tilde X}(c(0), c(t^\ast))+ d_{\tilde X}(\eta(0), c(t^\ast)) < |t^\ast|+1$. Since the Busemann function is $1$-Lipschitz, \[|B_c(c(t^\ast))| = |B_c(c(t^\ast))- B_c(\eta(0))| \leq d_{\tilde X}(c(t^\ast), \eta(0)) <1.\] Since $|B_c(c(t^\ast))| = |t^\ast|$, it follows that $|t^\ast|<1$. Thus, $d_{\tilde X}(c(0), \eta(0))<2$. We use (1) to prove (2). Observe that $t^+\leq \tau+3$. This is because \begin{align*} t^+=d_{\tilde X}(\eta(0), \eta(t^+)) &\leq d_{\tilde X}(\eta(0), c(0))+ d_{\tilde X}(c(0), c(\tau)) + d_{\tilde X}(c(\tau), \eta(t^+)) \\ & \leq 2+\tau +1. \end{align*} We also see that $t^+\geq \tau-3$. This is because \begin{align*} \tau = d_{\tilde X}(c(0), c(\tau)) & \leq d_{\tilde X}(c(0), \eta(0))+d_{\tilde X}(\eta(0), \eta(t^+))+d_{\tilde X}(\eta(t^+), c(\tau)) \\ & \leq 2 + t^+ +1. \end{align*} Thus $|\tau-t^+| <3$. It follows that \[d_{\tilde X}(c(\tau), \eta(\tau)) \leq d_{\tilde X}(c (\tau), \eta(t^+))+ d_{\tilde X}(\eta(\tau), \eta(t^+))< 1+ 3 = 4.\] The argument that $d_{\tilde X}(c(-\tau), \eta(-\tau))<4$ is analogous. \end{proof} We obtain linear bounds on the Busemann function for $\eta \in R(c, \tau; U^-,U^+)$. \begin{lem}\label{lem:linear} For all $\eta \in R(c, \tau; U^-, U^+)$, \[ -t \leq B_{c(0)}(\eta(t),c(+\infty)) \leq - \frac{t}{2} \mbox{ for all } 0\leq t<\tau \] and \[ -\frac{t}{2} \leq B_{c(0)}(\eta(t),c(+\infty)) \leq - t \mbox{ for all } -\tau < t \leq 0. \] That is, for times between $-\tau$ and $\tau$, the values of the Busemann function along $\eta$ lie between $-t$ and $-\frac{t}{2}$. \end{lem} \begin{proof} That $-t \leq B_{c}(\eta(t))$ follows immediately from the 1-Lipschitz property of Busemann functions. By Lemma \ref{l.distance} and the 1-Lipschitz property of Busemann functions, $|B_{c}(\eta(\tau)) + \tau | = | B_{c}(\eta(\tau)) - B_{c}(c(\tau)) | < 4$, and similarly $|B_{c}(\eta(\tau)) - \tau | = | B_{c}(\eta(-\tau)) - B_{c}(c(-\tau)) | < 4$. Therefore, $f(t) = B_{c}(\eta(t))$ is a convex function with $f(-\tau)\in (\tau-4,\tau]$, $f(0)=0$ and $f(\tau) \in [-\tau,-(\tau-4))$. Then if for some $t_0 \in (-\tau,0]$, $f(t_0) < -\frac{t_0}{2}$, or for some $t_0 \in [0,\tau)$, $f(t_0)>-\frac{t_0}{2}$, then for all $t>\max\{0,t_0\}$, by convexity, $f(t) > -t/2$. But then $f(\tau) > -\frac{\tau}{2}$, a contradiction since $\tau>>1$. \end{proof} The proof actually yields the upper bound of $B_{c}(\eta(t)) \leq - \frac{\tau-4}{\tau} t$ but all we need is some linear bound with non-zero slope. \begin{lem}\label{lem:deform tool} Let $R_1$ and $R_2$ be rectangular subsets of good geometric rectangles. Suppose $\operatorname{diam}(R_1) = \epsilon$ and that $R_1 \cap R_2 \neq \emptyset$. Then for $|t|>2L\epsilon$, $g_tR_1 \cap R_2 = \emptyset$, where $L$ is the constant from Lemma \ref{lem:X GX bound}. \end{lem} \begin{proof} Let $f$ be the Busemann function used to specify the basepoints of geodesics in $R_2$. Since the diameter of $R_1$ is $\epsilon$, and since for some $\eta\in R_1$, $f(\eta(0))=0$, $|f(c(0))| < L\epsilon$ for all $c\in R_1$. This uses Lemma \ref{lem:X GX bound} and the 1-Lipschitz property of Busemann functions with respect to $d_X$. If $\eta \in R_1 \cap R_2$, then $\frac{1}{2}|t| \leq |f(\eta(t))| \leq |t|$ by Lemma \ref{lem:linear}. Now suppose that $\eta \in g_tR_1 \cap R_2$ for some $|t|>2L\epsilon$. Then $g_{-t}\eta \in R_1$ and we must have $|f(\eta(-t))| > L\epsilon$, which is a contradiction. \end{proof} \subsection{H\"older properties} We are now ready to prove the regularity results we need to apply Theorem \ref{t.usefulversion}. First, we show that return times between geometric rectangles are Lipchitz. Let $R=R(c, \tau; U^+, U^-)$ and $R'=R(c', \tau'; U'^+, U'^-)$ be good geometric rectangles and let $d\in R$ such that $g_{t_0}d \in R'$ for some $t_0$ which is minimal with respect to this property. We write $r(d)=r(d, R, R') :=t_0$; this is the return time for $d$ to $R \cup R'$. Let us make the standing assumption that all return times are bounded above by $\alpha>0$. Note that $d\in R$ and $g_{t_0}d \in R'$ iff $d(-\infty)\in U^-\cap U'^-$ and $d(+\infty)\in U^+\cap U'^+$. The key property we want is the following: \begin{prop}\label{prop:Lipschitz} Let $R, R'$ be good rectangles and $Y= R \cap H^{-1}(R')$. Then the return time map $r:(Y, d_{G\tilde X}) \to \mathbb{R}$ is Lipschitz. \end{prop} \begin{proof} Let $v,w \in Y$ with return times $r(v), r(w)$, respectively. Let $\epsilon = d_{GX}(v,w)$. We consider the Busemann function determined by the geodesic $c'$ which defines the rectangle $R'$. Let $f(t) = B_{c'}(v(r(v)+t))$ and let $g(t) = B_{c'}(w(r(v)+t))$. Then $r(w)-r(v) = t^*$ where $t^*$ is the unique value of $t$ with $|t^\ast|< \alpha$ such that $g(t^\ast) = 0$. By Lemma \ref{lem:linear}, the graph of $f(t)$ lies between the lines $y=-t$ and $y=-\frac{t}{2}$ for small $t$. Let $C = e^\alpha$, where $\alpha$ is an upper bound on the return time. By Lemmas \ref{lem:X GX bound} and \ref{lem:Lipschitz}, $d_X(v(s), w(s))<LC\epsilon$ for all $s<\alpha$, where $C$ is a uniform constant. The 1-Lipschitz property of Busemann functions implies that $|f(t)-g(t)| < LC\epsilon$. Thus, for $t>0$, we have $g(t)\leq f(t)+LC \epsilon \leq -t/2 +LC\epsilon$, and so for $t>2LC \epsilon$, $g(t)<0$. For $t<0$, we have $g(t) \geq f(t)-LC \epsilon \geq -t/2-LC \epsilon$, and so for $t<-2LC \epsilon$, we have $g(t)>0$. Thus, by the intermediate value theorem, the root $g(t^\ast)=0$ satisfies $t^\ast \in (-2LC\epsilon, 2LC \epsilon)$. Therefore, $|r(w)-r(v)| = |t^\ast| < 2LC\epsilon$ proving the desired Lipschitz property with constant $2LC$. \end{proof} We now show that the projection map to a good rectangle is H\"older. Consider any good geometric rectangle $R=R(c,\tau; U^-, U^+)$. Fix some small $\alpha>0$ so that $(-\alpha, \alpha) \times R \to G\tilde X$ by $(t,x) \mapsto g_t x$ is a homeomorphism. \begin{prop} \label{projholder} $\operatorname{Proj}_R:g_{(-\alpha, \alpha)}R \to R$ is H\"older. \end{prop} \begin{proof} We prove that for all $x,y\in g_{(-\alpha, \alpha)}R$ there exists some $K>0$ such that \[ d_{G\tilde X} (\operatorname{Proj}_Rx, \operatorname{Proj}_Ry) \leq K d_{G\tilde X}(x,y)^{\frac{1}{2}}.\] First, note that for all $|t|<2\alpha$, $g_t$ is a $e^{2\alpha}$-Lipschitz map by Lemma \ref{lem:Lipschitz}. Therefore, to prove the Proposition, it suffices to prove the case where $x\in R$, as we can pre-compose the projection in this case with the Lipschitz map $g_{t^*}$ where $g_{t^*}x\in R$. Let $t=B_c(y(0))$. By Lemma \ref{lem:linear} for all $|s|<\tau$, $\frac{|s|}{2} \leq |B_c(y(s))-t| \leq |s|.$ Similarly, $\frac{|s|}{2} \leq |B_c(x(s))| \leq |s|$. Since $B_c(x(s))$ and $B_c(y(s))$ are both decreasing by definition of $R$, these inequalities give us that \[ |B_c(x(s)) - B_c(y(s))| \geq t-\frac{|s|}{2} \ \mbox{ for all } s\leq \tau.\] Since $B_c$ is a 1-Lipschitz function on $\tilde X$, \[ d_{\tilde X}(x(s), y(s)) \geq t-\frac{|s|}{2} \ \mbox{ for all } s\leq \tau. \] Then we can compute \[ d_{G\tilde X}(x,y) \geq \operatorname{Int}_{-2t}^{2t} \left(t-\frac{|s|}{2}\right) e^{-2|s|} ds = \frac{1}{4}(-1+e^{-4t}+4t) \geq c t^2\] for a properly chosen $c>0$ since $|t|<\alpha$. By Lemma \ref{lem:linear} and the fact that the geodesic flow moves at speed one for $d_{G\tilde X}$, $d_{G\tilde X}(y,\operatorname{Proj}_Ry) \leq 2|t|$. Using $d_{G\tilde X}(x, \operatorname{Proj}_Ry) \leq d_{G\tilde X}(x,y) + d_{G\tilde X}(y,\operatorname{Proj}_Ry)$, if there exists some $L>0$ such that $d_{G\tilde X}(y,\operatorname{Proj}_Ry) \leq Ld_{G\tilde X}(x,y)^{1/2}$, the Lemma is proved. But we have shown above that $d_{G\tilde X}(x,y) \geq ct^2$ and $d_{G\tilde X} (y, \operatorname{Proj}_Ry)\leq 2|t|$. \end{proof} \subsection{A pre-Markov proper family of good rectangles}\label{sec:good markov} To complete our argument, it suffices to check that a pre-Markov proper family $(\mathcal R, \mathcal S)$ can be found where the family of sections $\mathcal S$ consists of good geometric rectangles, perhaps flowed by a small time. Applying the results of the previous section, this will show that $(\mathcal R, \mathcal S)$ has properties (1) and (2) of Theorem \ref{t.usefulversion}. \begin{prop}\label{prop:good mpf} Let $X$ be a convex cocompact locally $\operatorname{CAT}(-\kappa)$ space, and let $(g_t)$ be its geodesic flow (on $GX$ when $X$ is compact, and on $\hat GX$ otherwise). For any sufficiently small $\alpha>0$, there exists a pre-Markov proper family $(\mathcal B, \mathcal D)$ for the flow at scale $\alpha$ such that each $D_i$ has the form $g_{s_i}R_i$ for some $s_i$ with $|s_i| << \alpha$ and some good geometric rectangle $R_i$. \end{prop} We need the following lemma. \begin{lem} \label{markovpf} Let $(\phi_t)$ be a Lipschitz continuous expansive flow on a compact metric space. Given a proper family $(\mathcal B, \mathcal D)$ for $(\phi_t)$ at scale $\alpha>0$ where the $B_i$ and $D_i$ are rectangles, there exists a pre-Markov proper family $(\mathcal B', \mathcal D')$ at scale $\alpha>0$ such that every $D_k'\in\mathcal{D}'$ is the image under $\phi_{s_k}$ of some $D_i\in\mathcal{D}$ where $|s_k| << \alpha$. \end{lem} It is clear from the proof below that the times $s_k$ can be made arbitrarily small in absolute value. \begin{proof} Let $(\mathcal{B},\mathcal{D})= \{(B_i, D_i) : i = 1, \ldots, n \}$ be a proper family at scale $\alpha$ where the $B_i$ and $D_i$ are rectangles. Recall that by definition, a proper family satisfies: (1) $\operatorname{diam} (D_i)< \alpha$ and $B_i \subset D_i$ for each $i \in \{1, 2, \ldots, n\}$; (2) $\bigcup_{i=1}^n\phi_{(-\alpha, 0)} (\operatorname{Int}_\phi B_i)=Y$; (3) for all $i\neq j$, if $\phi_{[0, 4\alpha]}(D_i) \cap D_j \neq \emptyset$, then $\phi_{[-4\alpha, 0]}(D_i) \cap D_j = \emptyset$. Our strategy for constructing new proper families out of $(\mathcal B, \mathcal D)$ is to replace an element $(B_i, D_i)$ by a finite collection $\{ (\phi_{s_k}R_k, \phi_{s_k}D_i) \}_k$ where $R_k$ are rectangles with $R_k \subset B_i$ and $\bigcup_k \operatorname{Int}_\phi R_k$ covers $\operatorname{Int}_\phi B_i$. Then $\phi_{s_k}R_k$ and $\phi_{s_k}D_i$ inherit the rectangle property from $R_k$ and $D_i$ (and are closed if $R_k$ and $D_i$ are), and by choosing all $s_k$ distinct and sufficiently small in absolute value, we can ensure that the resulting collection will still satisfy (1), (2), and (3). We give some details. For (1), since the flow is Lipschitz and $\operatorname{diam}(D_{i})<\alpha$, we can choose $\epsilon_1$ so small that $\operatorname{diam}(\phi_{\pm\epsilon_1}D_{i})<\alpha$. Thus, (1) will be satisfied if all $s_k$ have $|s_k| < \epsilon_1$. For (2), since $\bigcup_k \operatorname{Int}_\phi R_k$ covers $\operatorname{Int}_\phi B_i$, then it suffices to assume that all $s_k$ are sufficiently small in absolute value. For (3), let $\beta>0$ be the minimum value of $s$ so that there is a pair $D_j, D_k$ in our proper family with both $\phi_{[0,s]} D_j \cap D_k$ and $\phi_{[-s,0]} D_j \cap D_k$ nonempty, and observe that we must have $\beta>4\alpha$. Choosing $\epsilon_2$ smaller than $\frac{\beta-4\alpha}{2}$ and smaller than $d(D_j, D_k)$ for any $j\neq k$, condition (3) will be satisfied for $\phi_{s_j} D_j$ and $\phi_{s_k}D_k$ when $|s_j|, |s_k| < \epsilon_2$ and $j\neq k$. Also, it is clear that (3) will hold for the pair $\phi_{s_{k_1}} D$ and $\phi_{s_{k_2}}D$ when $D \in \mathcal D$, $|s_{k_1}|, |s_{k_2}| < \epsilon_2$ and $s_{k_1} \neq s_{k_2}$. We now use this strategy to refine $(\mathcal B, \mathcal D)$ to ensure the pre-Markov property \eqref{premarkov} holds. For $B \in \mathcal B$, consider the set \[ F(B; \mathcal{B},\mathcal{D}) = \{B_j \in \mathcal B : \ B \cap \phi_{[-2\alpha, 2\alpha]}B_j \neq \emptyset \mbox{ but } B \nsubseteq \phi_{(-3\alpha,3\alpha)} D_j\}.\] The set $F(B; \mathcal{B},\mathcal{D})$ is finite and encodes the elements of the proper family for which an intersection with $B$ causes an \emph{open} version of \eqref{premarkov} to fail. Clearly if $F(B; \mathcal{B},\mathcal{D}) = \emptyset$ for all $B \in \mathcal B$, then the pre-Markov condition \eqref{premarkov} is satisfied. Let $i_1< i_2 < \cdots <i_n$ be the set of all indices so that $F(B_{i_j}; \mathcal{B},\mathcal{D}) \neq \emptyset$. We cover $B_{i_1}$ by a finite collection of rectangles $R_k \subset B_{i_1}$ such that \begin{itemize} \item $\bigcup_k \operatorname{Int}_\phi R_k$ covers $\operatorname{Int}_\phi B_{i_1}$, and \item If $R_{k} \cap \phi_{[-2\alpha, 2\alpha]}B_j \neq \emptyset$ for some $j$, then $R_{k}\subseteq \phi_{(-3\alpha,3\alpha)} D_j$. \end{itemize} \begin{figure} \begin{center} \begin{tikzpicture}[scale=.9] \draw[thick, orange!20!white, fill=orange!20!white] (-2.8,1.42) -- (-.12,1.42) -- (-.33,1) -- (-3,1) ; \draw[thick, orange!20!white, fill=orange!20!white] (-1.6,1.1) -- (-.75,2.8) -- (.5,2.8) -- (-.38,1.1) -- (-1.6,1.1) ; \draw[thick, orange!20!white, fill=orange!20!white] (2.3,1.6) -- (-.6,1.6) -- (-.1,2.65) -- (2.84,2.65) ; \draw[thick, orange!20!white, fill=orange!20!white] (-.52,1) -- (-.09,1.8) -- (2.4,1.8) -- (2,1); \draw[thick, orange!20!white, fill=orange!20!white] (-2.8,1.35) -- (-1.4,1.35) -- (-.75,2.65) -- (-2.2,2.65) ; \draw[thick, orange!20!white, fill=orange!20!white] (-2.22,2.57) -- (2.77,2.57) -- (3,3) -- (-2,3) ; \draw[thick, orange!20!white, fill=orange!40!white] (-2.2,2.65) -- (-.75,2.65) -- (-1.4,1.35) -- (-1.47,1.35) -- (-.87,2.57) -- (-2.22,2.57) ; \draw[fill=orange!40!white] (-2.8,1.42) -- (-.12,1.42) -- (-.33,1) -- (-.52,1) -- (-.47,1.1) -- (-1.6,1.1) -- (-1.47,1.35) -- (-2.8,1.35) ; \draw[fill=orange!40!white] (2.3,1.6) -- (-.6,1.6) -- (-.14,2.57) -- (-.86,2.57) -- (-.75,2.8) -- (.5,2.8) -- (.43,2.65) -- (2.84,2.65) -- (2.77,2.57) -- (0.38,2.57) -- (-0.02,1.8) -- (2.4,1.8); \draw[fill=orange!40!white] (-.52,1) -- (-.09,1.8) -- (-.03,1.8) -- (-.38,1.09); \draw[thick, fill=blue!50!white] (-2.75,1.5) -- (-1.5, 1.5) -- (-1,2.5) -- (-2.25, 2.5) ; \draw [thick, dashed] plot [smooth cycle] coordinates { (-2,4) (-3.3,3) (-4,1) (-3,0) (2,0) (3.3,1) (4,3) (3,4) } ; \draw [thick, fill=pink] (0,-2) -- (-.5,-3) -- (2.5,-3) -- (3,-2) -- (0,-2) ; \draw [thick, red, dashed] plot [smooth cycle] coordinates { (0,-1.5) (-.65,-2) (-1,-3) (-.5,-3.5) (2.5,-3.5) (3.2,-3) (3.5,-2) (3,-1.5) } ; \draw [thick, fill=pink] (-.25, 1) -- (0,1.5) -- (2.25, 1.5) -- (2,1) -- (-.25,1) ; \draw [thick, blue, dashed] (-2.9,1.2) .. controls (0,.8) and (.3,3.4) .. (-2.1,2.8) ; \draw [thick, red, dashed] (-.75,1) .. controls (-.4,2.1) and (0,2) .. (2.5,2) ; \draw (0,-2) -- (0,-.12) ; \draw [->] (0,-2) -- (0,-.5) ; \draw [dashed] (0,-.12) -- (0,1.5) ; \draw [thick, fill=blue!50!white, xshift=-4cm, yshift=8cm] (0,-2) -- (-.5,-3) -- (2.5,-3) -- (3,-2) -- (0,-2) ; \draw [thick, blue, dashed, xshift=-4cm, yshift=8cm] plot [smooth cycle] coordinates { (-0.1,-1.5) (-.75,-2) (-1.1,-3) (-.6,-3.5) (2.5,-3.5) (3.2,-3) (3.5,-2) (3,-1.5) } ; \draw[thick, orange] (-.52,1) -- (-.09,1.8) -- (2.4,1.8); \draw[thick, orange] (-2.8,1.35) -- (-1.4,1.35) -- (-.75,2.65) -- (-2.2,2.65) ; \draw[thick, orange] (-2.22,2.57) -- (2.77,2.57) ; \draw[thick, orange] (-2.8,1.42) -- (-.12,1.42) -- (-.33,1) ; \draw[thick, orange] (-1.6,1.1) -- (-.75,2.8) -- (.5,2.8) -- (-.38,1.1) -- (-1.6,1.1) ; \draw[thick, orange] (2.3,1.6) -- (-.6,1.6) -- (-.1,2.65) -- (2.84,2.65) ; \draw [thick] (-2,3) -- (-3,1) -- (2,1) -- (3,3) -- (-2,3) ; \draw[->] (-1.5,1.5) -- (-1.5, 3.5) ; \draw (-1.5,1.5) -- (-1.5, 4.5) ; \draw[dashed] (-1.5,4.5) -- (-1.5, 5) ; \draw[->] (-1,2.5) -- (-1, 4.5) ; \draw (-1,2.5) -- (-1, 4.73) ; \draw[dashed] (-1,4.7) -- (-1, 6) ; \node at (3,2) {$B_1$} ; \node at (3.8,1) {$D_1$} ; \node at (3,-2.7) {$B_j$} ; \node at (3.9,-1.7) {$D_j$} ; \node at (-4.55,5.7) {$B_i$} ; \node at (-4.9,4.2) {$D_i$} ; \end{tikzpicture} \end{center} \caption{Ensuring the pre-Markov condition \eqref{premarkov}. $(1,j)$ and $(1,i)$ belong to $F(B_1;\mathcal{B},\mathcal{D})$. The flow direction is vertical. The orange rectangles provide one possible choice for the $R_k$.}\label{fig:cut} \end{figure} It is clearly possible to find collections of rectangles satisfying the first condition. The second can be satisfied because $B_{i_1} \cap \phi_{[-2\alpha, 2\alpha]}B_j$ is a closed subset of $B_{i_1}$ contained in the open subset $\phi_{(-3\alpha,3\alpha)} D_j$, with respect to the subspace topology on $B_{i_1}$. We replace $(B_{i_1}, D_{i_1})$ in $(\mathcal{B}, \mathcal{D})$ with $\{(\phi_{s_{k}}R_{k}, \phi_{s_{k}} D_{i_1})\}_k$ for distinct times $s_{k}$ sufficiently small in absolute value as detailed above. We obtain $(\mathcal{B}^1, \mathcal{D}^1)$ with $\mathcal{B}^1$ consisting of closed rectangles satisfying conditions (1), (2), and (3). To establish condition \eqref{premarkov}, we must prove two things. First, we claim that for all $k$, $F(\phi_{s_{k}}R_{k}; \mathcal{B}^1, \mathcal{D}^1) = \emptyset$. This is true for the following reasons. First, if $B_j \in \mathcal B$ with $i_1 \neq j$, then by construction we know that $B_j \notin F(\phi_{s_{k}}R_{k}; \mathcal{B}^1,\mathcal{D}^1)$. It remains only to consider sets of the form $\phi_{s_{i}}R_{i}$ with $i \neq k$. Suppose $\phi_{s_{k}}R_{k} \cap \phi_{[-2\alpha, 2 \alpha]} \phi_{s_{i}}R_{i} \neq \emptyset$. Then it is clear that since $|s_i|, |s_k|$ are small and $R_k \subset D_{i_1}$, then $\phi_{s_{k}}R_{k} \subset \phi_{(-3 \alpha, 3 \alpha)} \phi_{s_i} D_{i_1}$. It follows that $\phi_{s_{i}}R_{i} \notin F(\phi_{s_{k}}R_{k}; \mathcal{B}^1,\mathcal{D}^1)$. We conclude that $F(\phi_{s_{k}}R_{k}; \mathcal{B}^1, \mathcal{D}^1) = \emptyset$. That is, we have eliminated the `bad' rectangle $B_{i_1}$ from the proper family and replaced it with a finite collection of rectangles that do not have any `bad' intersections. Second, we claim that for all $k$ and any $j \neq i_1, i_2, \ldots, i_n$, we have that $\phi_{s_k}R_k \notin F(B_j; \mathcal{B}^1,\mathcal{D}^1)$. This is true for the following reason. Since $j \neq i_l$, $F(B_j;\mathcal{B},\mathcal{D}) = \emptyset$. Therefore $B_{i_1}\notin F(B_j; \mathcal{B},\mathcal{D})$ prior to refining and replacing $B_{i_1}$. Therefore, either $B_j \cap \phi_{[-2\alpha,2\alpha]}B_{i_1} = \emptyset$ or $B_j\subseteq \phi_{(-3\alpha,3\alpha)}D_{i_1}$. Either condition is `open,' in the sense that there is some $\epsilon_3(j)>0$ such that the condition remains true if $(B_{i_1},D_{i_1})$ is replaced by $(\phi_s B_{i_1}, \phi_s D_{i_1})$ for $|s|<\epsilon_3(j)$. Therefore, if we further demand that all $s_k$ satisfy $|s_k|<\min_j \epsilon_3(j)$, we will have that $\phi_{s_k}R_k \notin F(B_j; \mathcal{B}^1,\mathcal{D}^1)$, as desired. This implies that $F(B_j;\mathcal{B}^1,\mathcal{D}^1)=\emptyset$ for all such $j$. From these two facts we conclude that the set of $B\in\mathcal{B}^1$ for which $F(B;\mathcal{B}^1,\mathcal{D}^1)\neq \emptyset$ is (at most) $B_{i_2}, \ldots B_{i_n}$. To complete the proof, we carry out the `refine-and-replace' scheme finitely many times, modifying $(\mathcal{B}^1, \mathcal{D}^1)$ into $(\mathcal{B}^2, \mathcal{D}^2)$ by carrying out the procedure above on $(B_{i_2}, D_{i_2})$, etc. Finally, we modify $(B_{i_n}, D_{i_n})$ to produce a collection $(\mathcal{B}^n, \mathcal{D}^n)$ which by construction satisfies $F(B; \mathcal{B}^n,\mathcal{D}^n) = \emptyset$ for all $B \in \mathcal B^n$. In other words, we have eliminated every intersection which causes the pre-Markov property to fail, and this completes the proof. \end{proof} For completeness, we remark on how to obtain the intermediate family of sections $\mathcal K$ described after Lemma \ref{PtoB}. We choose closed rectangles $K_i$ so $K_i \subset \operatorname{Int}_\phi B_i$. They can be chosen as close to $B_i$ as we like so that $\{\phi_{[-\alpha, 0]} (\operatorname{Int}_\phi K_1), \ldots, \phi_{[-\alpha, 0]} (\operatorname{Int}_\phi K_n)\}$ is an open cover. Now take a Lebesgue number $12 \delta$ for this open cover. Then for any $x$, $\overline B(x, 6\delta) \subset \phi_{[-\alpha, 0]} (\operatorname{Int}_\phi K_i)$ for some $i$, and thus $\overline B(x, 6\delta) \subset \phi_{[-2 \alpha, 2 \alpha]}K_i$. We now prove Proposition \ref{prop:good mpf} by showing that we can ensure the sections $B_i$ are geometrically defined rectangles. \begin{proof}[Proof of Proposition \ref{prop:good mpf}] We show that we can construct a proper family out of good geometric rectangles for $\hat G X$. Let $\alpha$ be small enough that all $\{g_t\}$-orbits of length $8\alpha$ remain local. Fix $\rho>0$ much smaller than $\alpha$. Fix some large $\tau$ and for each $c \in \hat G\tilde X$ pick an open good geometric rectangle $\tilde R(c,\tau)$ with diameter less than $\rho$. Then $\{ g_{(-\rho,0)} \tilde R(c, \tau)\}_{c\in G\tilde X}$ is an open cover of $\hat G\tilde X$. By compactness of $\hat GX$, we can choose a finite set $\{ \tilde H_1, \ldots , \tilde H_n\}$, writing $\tilde H_i = g_{(-\rho,0)}\tilde R_i$, so that $\hat GX$ is covered by the projections $H_i= g_{(-\rho,0)} R_i$ of $\tilde H_i$ to $GX$. We build our proper family recursively. Let $B_1 \subset D_1$ be a closed good geometric rectangle of diameter less than $\alpha$ chosen so that $R_1 \subset \operatorname{Int}_g B_1$. Note that $H_1 \subset g_{(-\alpha,0)} \operatorname{Int}_g B_1$. Now suppose that $\{ (B_j, D_j) \}_{j=1}^l$ have been chosen satisfying $\operatorname{diam} D_j < \alpha$, $D_j \cap D_k = \emptyset$ for $j\neq k$, and so that each $D_j$ has the form $g_{s_j}R_i$ for some $s_j$ with $|s_i| << \alpha$ and some good geometric rectangle $R_i$. Let $H_i$ be the element of our cover of smallest index such that $H_i \nsubset \bigcup_{j=1}^l g_{[-\alpha,0]} \operatorname{Int}_g B_j$. We want to build further $(B_j, D_j)$ covering $H_i$. Let \[ M_i = \left\{ c\in R_i : g_{(0,\rho)} c \ \cap \ \big(\bigcup_{j=1}^l \operatorname{Int}_g B_j\big) = \emptyset \right\} = R_i \setminus \left( \bigcup_{j=1}^l g_{(-\rho,0)} \operatorname{Int}_g B_j \right). \] $M_i$ is a closed subset of $R_i$. Pick $\epsilon << \frac{\rho}{4Ll}$, where $L$ is given by Lemma \ref{lem:X GX bound}. By passing to endpoints of its geodesics, $M_i$ can be identified with a closed subset of $U^-\times U^+$, so we can find a finite set $T_1, \ldots , T_n$ of closed rectangles with each $T_k$ identified with some $V_k^-\times V_k^+ \subset U^-\times U^+$ such that $\{ \operatorname{Int}_g T_k\}_{k=1}^n$ cover $M_i$, $T_k \cap M_i \neq \emptyset$, and $\operatorname{diam} T_k < \epsilon$. By Lemma \ref{lem:deform tool}, if for some $t\in [0,\rho]$, $g_tT_k \cap D_j \neq \emptyset$, then for $|t'-t|>2L\epsilon$, $g_{t'}T_k$ and $D_j$ are disjoint. Since $4L\epsilon << \frac{\rho}{l}$, and since there are at most $l$ of the $D_j$'s which can intersect $g_{[0,\rho]}T_k$, we can pick distinct $s_k \in (0, \rho)$ so that $g_{s_k} T_k \cap ( \bigcup _{j=1}^l D_j ) = \emptyset$. We add the collection $\{ D_k:=g_{s_k}T^k \}_{k=1}^n$ to our collection $\{D_j\}$. Inside each new $D_k$, we choose a slightly smaller closed rectangle $B_k$ so that $\{ g_{-s_k} \operatorname{Int}_g B_k \}$ cover $M_i$. It is then clear since $\rho<\alpha$ that $\bigcup_{j=1}^{l'} g_{(-\alpha,0)} \operatorname{Int}_g B_j$ covers $H_i$. We continue this way until $\hat GX$ is covered by $\{ g_{(-\alpha,0)} \operatorname{Int}_g B_j \}$ and check the conditions of Definitions \ref{defn:proper} and \ref{defn:pollicott}. We have ensured that \ref{defn:proper}(2) is satisfied. Using the Lipschitz property of the flow and the fact that $\epsilon << \alpha$ we can ensure that $\operatorname{diam} D_j < \alpha$ for all $j$, ensuring condition \ref{defn:proper}(1). We have also ensured \ref{defn:proper}(3) by constructing the $D_j$ disjoint and picking $\alpha$ so small that all orbit segments with length $8\alpha$ are local. Applying Lemma \ref{markovpf} produces a pre-Markov proper family satisfying Definition \ref{defn:pollicott}. By construction, each $D_i$ in $\mathcal{D}$ is the image of a good geometric rectangle under the flow for a small time. \end{proof} We now complete the proof of Theorem \ref{t.main}. The flow is a metric Anosov flow by Theorem \ref{t.smale}. The flow is H\"older by Lemma \ref{lem:Lipschitz}. We take a pre-Markov proper family for the flow for which the family of sections $\mathcal D$ are good geometric rectangles flowed for some short constant amount of time, as provided by Proposition \ref{prop:good mpf}. By Propositions \ref{prop:Lipschitz} and \ref{projholder} the return time map and projection map to these sections are H\"older. Thus, we have met the hypotheses of Theorem \ref{t.usefulversion} and we conclude that the geodesic flow has a strong Markov coding. \section{Projective Anosov representations} \label{sec:twoexamples} We show that the methods introduced in the previous section can be adapted to the geodesic flow $(\mathsf{U}_\rho\Gamma, (\phi_t))$ for a projective Anosov representation $\rho: \Gamma \to \mathsf{SL}_m(\mathbb{R})$, proving Theorem \ref{t.main2}. This flow is a H\"older continuous topologically transitive metric Anosov flow \cite[Proposition 5.1]{bcls}, so to meet the hypotheses of Theorem \ref{t.usefulversion} it remains to show there is a pre-Markov proper family of sections to the flow such that the return time function between any two sections is H\"older, and the projection from a flow neighborhood of a section to the section are H\"older. We sketch the proof by showing how to set up analogues of all the objects defined in \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:good rectangles}. This will demonstrate that the proof in \ifmmode{S^2}\else{$S^2$}\fi \ref{sec:good rectangles} applies in this setting. Following \cite{bcls}, we define the geodesic flow for a projective Anosov representation. Let $\Gamma$ be a Gromov hyperbolic group. We write $\widetilde{\mathsf{U}_0\Gamma} = \partial_\infty \Gamma^{(2)} \times \mathbb R$, and $\mathsf{U}_0\Gamma$ for the quotient $\widetilde{\mathsf{U}_0\Gamma}/\Gamma$. The Gromov geodesic flow (see \cite{champetier} and \cite{mineyev}) can be identified with the $\mathbb R$-action on $\mathsf{U}_0\Gamma$. \begin{defn} A representation $\rho:\Gamma\to\mathsf{SL}_m(\mathbb{R})$ is a \emph{projective Anosov representation} if: \begin{itemize} \item $\rho$ has transverse projective limit maps. That is, there exist $\rho$-equivariant, continuous maps $\xi:\partial^\infty\Gamma \to \mathbb{RP}(m)$ and $\theta:\partial^\infty\Gamma \to \mathbb{RP}(m)^*$ such that if $x\neq y$, then \[ \xi(x) \oplus \theta(y) = \mathbb{R}^m.\] Here we have identified $\mathbb{RP}(m)^*$ with the Grassmannian of $m-1$-planes in $\mathbb{R}^m$ by identifying $v\in\mathbb{RP}(m)^*$ with its kernel. \item We have the following contraction property (see \S2.1 of \cite{bcls}). Let $E_\rho = \widetilde{\mathsf{U}_0\Gamma} \times \mathbb R^{m}/ \Gamma$ be the flat bundle associated to $\rho$ over the geodesic flow for the word hyperbolic group on $\mathsf{U}_0\Gamma$, and let $E_\rho = \Xi \oplus \Theta$ be the splitting induced by the transverse projective limit maps $\xi$ and $\theta$. Let $\{\tilde \psi_t\}$ be the flow on $\widetilde{\mathsf{U}_0\Gamma} \times \mathbb R^{m}$ obtained by lifting the Gromov geodesic flow on $\mathsf{U}_0\Gamma$ and acting trivially on the $\mathbb R^m$ factor. This flow descends to a flow $\{\psi_t\}$ on $E_\rho$. We ask that there exists $t_0>0$ such that for all $Z\in \mathsf{U}_0\Gamma$, $v \in \Xi_Z\setminus\{0\}$ and $w \in \Theta_Z \setminus \{ 0\}$, we have \[ \frac{\| \psi_{t_0} (v) \|}{\| \psi_{t_0} (w) \|} \leq \frac{1}{2} \frac{ \| v \|}{\| w \|}. \] \end{itemize} \end{defn} For $v\in (\mathbb{R}^m)^*$ and $u\in\mathbb{R}^m$, we write $\langle v | u \rangle$ for $v(u)$. We define the geodesic flow $(\mathsf{U}_\rho\Gamma,(\phi_t))$ of a projective Anosov representation, referring to \S4 of \cite{bcls} for further details. Let \[ F_\rho = \left\{ (x,y,(u,v)) : (x,y)\in\partial^\infty\Gamma^{(2)}, \ u\in \xi(x), \ v\in \theta(y), \ \langle v|u\rangle =1\right\}/\sim\] where $(u,v)\sim(-u,-v)$ and $\partial^\infty\Gamma^{(2)}$ denotes the set of distinct pairs of points in $\partial^\infty\Gamma$. Since $u$ determines $v$, $F_\rho$ is an $\mathbb{R}$-bundle over $\partial^\infty\Gamma^{(2)}$. The flow is given by \[ \phi_t(x,y,(u,v)) = (x,y,(e^tu,e^{-t}v)).\] We define $\mathsf{U}_\rho\Gamma = F_\rho/\Gamma$. The space $\mathsf{U}_\rho\Gamma$ is compact \cite[Proposition 4.1]{bcls} (even though $\Gamma$ does not need to be the fundamental group of a closed manifold). The flow $(\phi_t)$ descends to a flow on $\mathsf{U}_\rho\Gamma$. The flow $(\mathsf{U}_\rho\Gamma, (\phi_t))$ is what we call the \emph{geodesic flow of the projective Anosov representation}. The flow is H\"older orbit equivalent to the Gromov geodesic flow on $\mathsf{U}_0\Gamma$, which motivates this terminology. In \cite[Theorem 1.10]{bcls}, it is proven that $(\mathsf{U}_\rho\Gamma, (\phi_t))$ is metric Anosov. We construct sections locally on $F_\rho$ and project the resulting sections down to $\mathsf{U}_\rho\Gamma$ that will verify the hypotheses of Theorem \ref{t.usefulversion}, and thus show that the geodesic flow has a strong Markov coding. We can define stable and unstable foliations in the space $F_\rho$. For a point $Z=(x_0,y_0,(u_0,v_0))\in F_\rho$, we define respectively, the strong unstable, unstable, strong stable, and stable leafs through $Z$ as follows. \begin{align*} W^{uu}(Z) &=\{ (x,y_0,(u,v_0)) : x\in\partial^\infty\Gamma, x\neq y_0, u\in\xi(x), \langle v_0|u \rangle =1\}. \\ W^u(Z) &=\{ (x,y_0,(u,v)) : x\in\partial^\infty\Gamma, x\neq y_0, u\in\xi(x), v\in\theta(y_0), \langle v|u \rangle =1\} \\ & = \bigcup_{t\in\mathbb{R}} \phi_t(W^{uu}(Z)). \\ W^{ss}(Z) &=\{ (x_0,y,(u_0,v)) : y\in\partial^\infty\Gamma, x_0\neq y, v\in\theta(y), \langle v|u_0 \rangle =1\}. \\ W^s (Z) &=\{ (x_0,y,(u,v)) : y\in\partial^\infty\Gamma, x_0\neq y, u\in\xi(x_0), v\in\theta(y), \langle v|u \rangle =1\} \\ & = \bigcup_{t\in\mathbb{R}} \phi_t(W^{ss}(Z)). \end{align*} Fix any Euclidean metric $|\cdot|$ on $\mathbb{R}^m$. This induces a metric on \[ \mathbb{RP}(m) \times \mathbb{RP}(m)^* \times ((\mathbb{R}^m \times (\mathbb{R}^m)^*)/\pm1).\] Let $d_{F_\rho}$ be the pull-back of this metric to $F_\rho$; the transversality condition on the limit maps in the definition of Anosov projective representation ensures this is well-defined. This is called a \emph{linear metric} on $F_\rho$. There is a $\Gamma$-invariant metric $d_0$ on $F_\rho$ which is locally bi-Lipschitz to any linear metric by \cite[Lemma 5.2]{bcls}. Therefore, it is sufficient to verify the H\"older properties we want with respect to a linear metric. We now build our sections in analogy with our construction of good geometric rectangles in the $\operatorname{CAT}(-1)$ setting. Fix some $Z = (x_0,y_0,(u_0,v_0)) \in F_\rho$ and choose some small, disjoint open sets $U^+$ containing $x_0$ and $U^-$ containing $y_0$. Choose $U^+$ and $U^-$ small enough that for all $x,y\in U^+\times U^-$, $\xi(x)$ and $\theta(y)$ are transversal. Since $\xi(x_0)$ and $\theta(y_0)$ are transversal and $\xi, \theta$ are continuous, this is possible. Let \[ R(Z,U^+,U^-) = \{ (x,y,(u,v))\in F_\rho : x\in U^+, y\in U^-, \langle v_0 | u \rangle =1\}.\] It is straightforward to check that $R(Z,U^+,U^-)$ is a transversal to the flow $\phi_t$ by using the definition of a linear metric to verify that all points sufficiently near to $Z$ project to $R(Z,U^+,U^-)$. It is also straightforward to check that $R(Z,U^+,U^-)$ is a rectangle using the definitions of the (strong) stable and unstable leaves. This is essentially the same as our proof of Lemma \ref{sectionproof}. We can describe $R(Z,U^+,U^-)$ as the zero set for a `Busemann function' as follows. \begin{lem}\label{lem:beta Lipschitz} Fiz $Z_0=(x_0,y_0,(u_0,v_0))$. For all $(x,y,(u,v))$ define \[ \beta_{Z_0}((x,y,(u,v))) = -\log\langle v_0 | u\rangle.\] Then $\beta_{Z_0}$ is a locally Lipschitz function with respect to a linear metric on $F_\rho$. \end{lem} \begin{proof} Let $Z_1=(x_1,y_1,(u_1,v_1))$ and $Z_2=(x_2,y_2,(u_2,v_2))$ be in a small neighborhood of $Z_0$ for the linear metric. This implies that $\langle v_0,u_i\rangle$ lie in some range bounded away from zero. Over this range, the function $-\log$ is Lipschitz. We know by the definition of a linear metric that \[ d_{F_\rho}(Z_1,Z_2) = |\xi(x_1)-\xi(x_2)| + |\theta(y_1)-\theta(y_2)| + |u_1-u_2| + |v_1-v_2|. \] (In the various factors above, $|* - *|$ denotes the metrics induced on $\mathbb{RP}(m)$, $\mathbb{RP}(m)^*$, $\mathbb{R}^m$, and $(\mathbb{R}^m)^*$ by the Euclidean metric on $\mathbb{R}^m$.) We calculate, using that $-\log$ and $\langle v_0 | \cdot\rangle$ are Lipschitz: \begin{align} |\beta_{Z_0}(Z_1)-\beta_{Z_0}(Z_2)| = |-\log\langle v_0|u_2\rangle - \log\langle v_0|u_1\rangle | \nonumber & \leq K_1 |\langle v_0|u_2 \rangle - \langle v_0|u_1 \rangle| \nonumber \\ & \leq K_2 |u_2-u_1| \nonumber \\ & \leq K_2 d_{F_\rho}(Z_1,Z_2). \nonumber \qedhere \end{align} \end{proof} \begin{lem} For all $Z\in R(Z_0,U^+,U^-)$, we have $\beta_{Z_0}(\phi_t Z) = -t$. \end{lem} \begin{proof} This is immediate from the definition of $\beta_{Z_0}$. \end{proof} It is clear that $R(Z_0, U^+, U^-) = \{ (x,y,(u,v)) : x\in U^+, y\in U^-, \beta_{Z_0}(u)=0\}$ and if $\phi_{t^*}Z \in R(Z_0,U^+,U^-)$, then $\beta_{Z_0}(Z)=t^*$. We now have a simple proof of the analogue of Proposition \ref{prop:Lipschitz} we need: \begin{prop} The return time function between two good geometric rectangles is Lipschitz. \end{prop} \begin{proof} Suppose that $Z_1, Z_2 \in R$ and, for small $r_1, r_2$, that $\phi_{r_1}Z_1, \phi_{r_2}Z_2 \in R'=R(Z',U'^+, U'^-)$. Then by Lemma \ref{lem:beta Lipschitz}, we have \[ |r_1-r_2| = |\beta_{Z'}(Z_1) - \beta_{Z'}(Z_2)| \leq K d_{F_\rho}(Z_1, Z_2), \] and we thus conclude that the return time function from $Z_1$ to $Z_2$ is Lipschitz. \end{proof} It is also easy to verify that the flow $(\phi_t)$ is Lipschitz. All that is left to prove is an analogue of Proposition \ref{projholder}: \begin{lem} For any good geometric rectangle $R$, $\operatorname{Proj}_R:\phi_{(-\alpha,\alpha)} R \to R$ is H\"older. \end{lem} \begin{proof} Since the flow is Lipschitz, we can assume $Z_1\in R$. Assume $Z_2 \in \phi_{-t^*}R$ for some $t^* \in (-\alpha, \alpha)$, so $\operatorname{Proj}_R(Z_2) = \phi_{t^*}Z_2$. If $R$ is a rectangle based at $Z_0=(x_0,y_0,(u_0,v_0))$, then $(u_2, v_2)\mapsto (e^{t^*}u_2, e^{-t^*}v_2)$ is the projection along the smooth flow $(e^t, e^{-t})$ to the smooth subset of $\mathbb{R}^m\times (\mathbb{R}^m)^*$ given by $\{(u,v): \langle v_0 | u \rangle =1, \langle v|u \rangle =1\}$, which is transverse to the flow. Therefore this map is smooth, hence Lipschitz on any compact set for any linear metric, and this suffices for the proof. \end{proof} \section{Applications of strong markov coding}\label{s.applications} There is a wealth of literature for Anosov and Axiom A flows which uses the strong Markov coding to prove strong dynamical properties of equilibrium states. We do not attempt to create an exhaustive list of these applications, but we refer the reader to the many results described in references such as Bowen-Ruelle \cite{bowen-ruelle}, Pollicott \cite{pollicott}, Denker-Philipp \cite{DP84} and Melbourne-T\"or\"ok \cite{MT04}. We summarize some of these applications as they apply to the non-wandering set of the geodesic flow of a convex cocompact locally CAT(-1) space $X = \tilde X/\Gamma$. The flow is topologically transitive since the action of $\Gamma$ on $(\Lambda \times \Lambda)\setminus \Delta$ is topologically transitive. Thus, the shift of finite type in the strong Markov coding is irreducible. In places in the discussion below, we need the notion of topological weak-mixing. We say that a metric Anosov flow is \emph{topologically weak-mixing} if all closed orbit periods are not integer multiples of a common constant. The result that there is a unique equilibrium state $\mu_\varphi$ for every H\"older potential is due to Bowen-Ruelle \cite{bowen-ruelle} for topologically transitive Axiom A flows. The method of proof was observed to extend to flows with strong Markov coding in \cite{pollicott}. It is also observed in \cite{pollicott} that if $\varphi, \psi$ are H\"older continuous functions then the map $t \to P(\varphi + t \psi)$ is analytic and $(d/dt)P(\varphi+ t \psi)|_{t=0} = \operatorname{Int} \psi d_{\mu_\varphi}$, where $P(\cdot)$ is the topological pressure. This result is one of the key applications of thermodynamic formalism used in \cite{bcls, aS16}. We now discuss the statistical properties listed in (1) of Corollary D. The Almost Sure Invariance Principle (ASIP), Central Limit Theorem (CLT), and Law of the Iterated Logarithm are all properties of a measure that are preserved by the push forward $\pi^\ast$ provided by the strong Markov coding, and thus it suffices to establish them on the suspension flow. The CLT is probably the best known of these results, and goes back to Ratner \cite{ratner}. A convenient way to obtain these results in our setting is to apply the paper of Melbourne and T\"or\"ok \cite{MT04} which gives a relatively simple argument that the CLT lifts from an ergodic measure in the base to the corresponding measure on the suspension flow. They then carry out the more difficult proof that the ASIP lifts from an ergodic measure in the base to the flow, recovering the result of Denker and Phillip \cite{DP84}. The other properties discussed (and more, see \cite{MT04}), are a corollary of ASIP. The equilibrium state for the suspension flow is the lift of a Gibbs measure on a Markov shift. The measure in the base therefore satisfies ASIP by \cite{DP84}, so we are done. We now discuss the application to dynamical zeta functions, which was established in the case there is a strong Markov coding and the flow is topologically weak mixing in \cite{pollicott}. Results on zeta functions are carried over from the suspension flow by a strong Markov coding. The assumption of topological weak mixing is not needed for the result that we stated as (2) in Corollary D. See \cite[Chapter 6]{PP}. For item (3) of Corollary D, we can refer directly to \cite{pollicott} for the statement that if the flow has a strong Markov coding and is topological weak-mixing, then the equilibrium state $\mu_\varphi$ is Bernoulli. The proof is given by Ratner \cite{ratner2}. For item (4) of Corollary \ref{t.applications} , we argue as follows. Ricks proves that for a proper, geodesically complete, $\operatorname{CAT}(0)$ space $\tilde X$ with a properly discontinuous, cocompact action by isometries $\Gamma$, all closed geodesics have lengths in $c\mathbb{Z}$ for some $c>0$ if and only if $\tilde X$ is a tree with all edge lengths in $c\mathbb{Z}$ \cite[Thorem 4]{ricks}. It follows that $X$ is a metric graph with all edges of length $c$. In this case, the symbolic coding for the geodesic flow on $X$ is explicit: $(GX, (g_t))$ is conjugate to the suspension flow with constant roof function $c$ over the subshift of finite type defined by the adjacency matrix $A$ for the graph $X$. Equilibrium states for the flow are products of equilibrium states in the base with Lebesgue measure in the flow direction. Since an equilibrium state for a H\"older potential on a topologically mixing shift of finite type is Bernoulli, item (4) follows immediately by taking $k\geq 1$ so that $A^k$ is aperiodic; if $k=1$, the measure on the base is Bernoulli, and if $k>1$ the measure on the base is the product of Bernoulli measure and rotation of a finite set with $k$ elements. \subsection*{Acknowledgements} D.C. would like to thank Ohio State University for hosting him for several visits, during which much of this work was done. We are grateful to Richard Canary for several discussions regarding the application of our work to the results of \cite{bcls}. \bibliographystyle{alpha}
\subsection{Compensating for blow-ups in the bridge process} \label{sec:diffmin} While the small-time fluctuations for the bridge are uniquely determined in terms of the matrices $u_1,\dots,u_n$, we present an example which shows that knowledge of $u_1,\dots,u_n$ is not sufficient to construct a path which approximates the minimal-like path well enough to recover the limit fluctuations as in the previous section. We consider the hypoelliptic diffusion corresponding to the matrices \begin{equation*} A= \begin{pmatrix} -1 & 0 \\ 1 & 2 \\ \end{pmatrix} \quad\mbox{and}\quad B= \begin{pmatrix} 1 \\ 0 \end{pmatrix}\;, \end{equation*} which satisfy condition~(\ref{kalman}). Using the eigendecomposition of $A$, we obtain, for $\varepsilon>0$ and $r\in\mathbb{R}$, \begin{equation*} \operatorname{e}^{\varepsilon rA}= \begin{pmatrix} \operatorname{e}^{-\varepsilon r} & 0\\[0.4em] \frac{1}{3}\left(\operatorname{e}^{2\varepsilon r}-\operatorname{e}^{-\varepsilon r}\right) & \operatorname{e}^{2\varepsilon r} \end{pmatrix} \end{equation*} as well as \begin{equation*} U^\varepsilon(r)= \begin{pmatrix} \operatorname{e}^{-\varepsilon r} \\[0.4em] \frac{1}{3}\left(\operatorname{e}^{2\varepsilon r}-\operatorname{e}^{-\varepsilon r}\right) \end{pmatrix}= \begin{pmatrix} 1 \\[0.4em] \varepsilon r \end{pmatrix}+ \begin{pmatrix} O\left(\varepsilon\right) \\[0.4em] O\left(\varepsilon^2\right) \end{pmatrix}\;, \end{equation*} uniformly in $r$ on compact intervals. Thus, as for the Ornstein-Uhlenbeck process paired with its area and the Kolmogorov diffusion, $U^\varepsilon(r)$ is of the form~(\ref{urepsform}) with $u_1=u_2=1$. By Theorem~\ref{CLT}, these three processes exhibit the same small-time fluctuations for the bridge. We further compute that, for $t\in[0,1]$, \begin{equation*} \operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon= \begin{pmatrix} \frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}-\operatorname{e}^{-\varepsilon t}\right) & -\frac{1}{6\varepsilon}\left(2\operatorname{e}^{-2\varepsilon t}-3\operatorname{e}^{-\varepsilon t}+\operatorname{e}^{\varepsilon t}\right)\\[0.5em] \frac{1}{6\varepsilon}\left(2\operatorname{e}^{2\varepsilon t}-3\operatorname{e}^{\varepsilon t}+\operatorname{e}^{-\varepsilon t}\right) & -\frac{1}{12\varepsilon} \left(\operatorname{e}^{2\varepsilon t}-2\operatorname{e}^{\varepsilon t}+2\operatorname{e}^{-\varepsilon t}-\operatorname{e}^{-2\varepsilon t}\right) \end{pmatrix}\;, \end{equation*} which has the expansion \begin{equation*} \operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon= \begin{pmatrix} t+\frac{1}{6}\varepsilon^2 t^3+O\left(\varepsilon^4\right) & -\frac{1}{2}\varepsilon t^2+\frac{1}{3}\varepsilon^2t^3+O\left(\varepsilon^3\right)\\[0.5em] \frac{1}{2}\varepsilon t^2+\frac{1}{3}\varepsilon^2t^3+O\left(\varepsilon^3\right) & -\frac{1}{6}\varepsilon^2t^3-\frac{1}{24}\varepsilon^4 t^5+O\left(\varepsilon^6\right) \end{pmatrix}\;, \end{equation*} uniformly in $t\in[0,1]$. Setting \begin{equation*} R= \begin{pmatrix} 0 & \frac{1}{3}\\[0.4em] \frac{1}{3} & 0 \end{pmatrix} \end{equation*} and with \begin{equation*} D_\varepsilon= \begin{pmatrix} 1 & 0\\ 0 & \varepsilon \end{pmatrix}\;,\quad J_t= \begin{pmatrix} t^{1/2} & 0\\ 0 & t^{3/2} \end{pmatrix} \quad\mbox{as well as}\quad V= \begin{pmatrix} 1 & -\frac{1}{2}\\[0.4em] \frac{1}{2} & -\frac{1}{6} \end{pmatrix}\;, \end{equation*} we have \begin{equation*} \operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon= D_\varepsilon J_t\left(V+\varepsilon t R+O\left(\varepsilon^2\right)\right)J_t D_\varepsilon\;, \end{equation*} uniformly in $t\in[0,1]$. Let $I$ denote the $2\times 2$ identity matrix. Since $V$ is invertible, we deduce that, for $\varepsilon>0$ sufficiently small, \begin{equation*} \left(V+\varepsilon R+O\left(\varepsilon^2\right)\right)^{-1}= \left(I+\varepsilon V^{-1}R+O\left(\varepsilon^2\right)\right)^{-1}V^{-1}= V^{-1}-\varepsilon V^{-1}RV^{-1}+O\left(\varepsilon^2\right)\;, \end{equation*} and therefore, due to $J_1=I$, \begin{equation*} \left(\Gamma_1^\varepsilon\right)^{-1}\operatorname{e}^{-\varepsilon A}= D_\varepsilon^{-1}\left(V^{-1}- \varepsilon V^{-1}RV^{-1}+O\left(\varepsilon^2\right)\right) D_\varepsilon^{-1}\;. \end{equation*} This implies that \begin{align*} \alpha_t^\varepsilon &=D_\varepsilon J_t\left(V+\varepsilon t R+O\left(\varepsilon^2\right)\right)J_t \left(V^{-1}-\varepsilon V^{-1}RV^{-1}+O\left(\varepsilon^2\right)\right) D_\varepsilon^{-1}\\ &=D_\varepsilon\left(J_tVJ_tV^{-1} + \varepsilon t J_tRJ_tV^{-1} - \varepsilon J_tV J_t V^{-1}RV^{-1} +O\left(\varepsilon^2\right)\right) D_\varepsilon^{-1}\;. \end{align*} We compute \begin{equation*} J_tVJ_tV^{-1}= \begin{pmatrix} 3t^2-2t & 6t-6t^2\\[0.4em] t^3-t^2 & 3t^2-2t^3 \end{pmatrix} \end{equation*} as well as \begin{equation*} \varepsilon t J_tRJ_tV^{-1}= \begin{pmatrix} -2\varepsilon t^3 & 4\varepsilon t^3\\[0.4em] -\frac{2}{3}\varepsilon t^3 & 2\varepsilon t^3 \end{pmatrix} \quad\mbox{and}\quad \varepsilon J_tV J_t V^{-1}RV^{-1}= \begin{pmatrix} -2\varepsilon t^2 & 4\varepsilon t\\[0.4em] -\frac{2}{3}\varepsilon t^3 & 2\varepsilon t^2 \end{pmatrix}\;, \end{equation*} which yields \begin{equation*} \alpha_t^\varepsilon= \begin{pmatrix} 3t^2-2t + \left(2t^2-2t^3\right)\varepsilon + O\left(\varepsilon^2\right) & \left(6t-6t^2\right)\varepsilon^{-1} + 4t^3-4t + O\left(\varepsilon\right)\\[0.4em] \left(t^3-t^2\right)\varepsilon + O\left(\varepsilon^3\right) & 3t^2-2t^3+\left(2t^3-2t^2\right)\varepsilon + O\left(\varepsilon^2\right) \end{pmatrix}\;. \end{equation*} In particular, for $y=(a,b)$, we obtain \begin{equation*} \alpha_t^\varepsilon y= \begin{pmatrix} 3t^2-2t & \left(6t-6t^2\right)\varepsilon^{-1}\\[0.4em] \left(t^3-t^2\right)\varepsilon & 3t^2-2t^3 \end{pmatrix} \begin{pmatrix} a \\[0.4em] b \end{pmatrix}+ \begin{pmatrix} \left(4t^3-4t\right)b\\[0.4em] \left(2t^3-2t^2\right) b\varepsilon \end{pmatrix}+ \begin{pmatrix} O\left(\varepsilon\right) \\[0.4em] O\left(\varepsilon^2\right) \end{pmatrix}\;. \end{equation*} It follows that in our current example for an approximate minimal-like path to lead to well-defined small-time fluctuations for the bridge from $x=0$ to $y=(a,b)$ with respect to the rescaling $D_\varepsilon$, we have to at least subtract the path \begin{equation*} \left( \left(3t^2-2t\right)a + \left(6t-6t^2\right)\frac{b}{\varepsilon} + \left(4t^3-4t\right)b, \left(t^3-t^2\right) a\varepsilon + \left(3t^2-2t^3\right)b+\left(2t^3-2t^2\right)b\varepsilon\right)_{t\in[0,1]}\;. \end{equation*} This differs from the minimal-like path $(\phi_t^\varepsilon(y))_{t\in[0,1]}$ considered for the Kolmogorov diffusion, and the approximate minimal-like path $(\psi_t^\varepsilon(y))_{t\in[0,1]}$ found for the Ornstein-Uhlenbeck process paired with its area starting from $0$. \subsection{Kolmogorov diffusion} \label{sec:kol} The Kolmogorov diffusion, named after Kolmogorov~\cite{kolmogorov}, is the simplest example of a stochastic process which satisfies a weak H\"ormander condition but not the strong H\"ormander condition. It is the diffusion $(x_t)_{t\in[0,1]}$ in $\mathbb{R}^2$ which pairs a standard Brownian motion $(W_t)_{t\in[0,1]}$ in $\mathbb{R}$ with its time integral, that is, \begin{equation*} x_t=\left(W_t,\int_0^tW_s\,{\mathrm d} s\right)\;. \end{equation*} It is the unique strong solution to the stochastic differential equation \begin{align*} {\mathrm d}\left(x_t\right)_1&={\mathrm d} W_t\;,\\ {\mathrm d}\left(x_t\right)_2&=\left(x_t\right)_1\,{\mathrm d} t\;, \end{align*} subject to $x_0=0$. This process falls into our model class of hypoelliptic diffusions by taking \begin{equation*} A= \begin{pmatrix} 0 & 0\\ 1 & 0 \end{pmatrix} \quad\mbox{and}\quad B= \begin{pmatrix} 1 \\ 0 \end{pmatrix}\;, \end{equation*} which corresponds to the operator \begin{equation*} \mathcal{L}=x_1\frac{\partial}{\partial x_2}+\frac{1}{2} \left(\frac{\partial}{\partial x_1}\right)^2 \end{equation*} on $\mathbb{R}^2$. The Kalman rank condition~(\ref{kalman}) is satisfied because \begin{equation*} AB= \begin{pmatrix} 0 \\ 1 \end{pmatrix} \end{equation*} implies $E_2=\mathbb{R}^2$. We first use Lemma~\ref{modelbridge} to determine the expressions for the associated diffusion bridges in small time to then explicitly see that Theorem~\ref{LLN} and Theorem~\ref{CLT} hold. For $\varepsilon>0$, the rescaled Kolmogorov diffusion $(x_t^\varepsilon)_{t\in[0,1]}$ with generator $\varepsilon\mathcal{L}$ is given by \begin{equation*} x_t^\varepsilon=\left(\varepsilon^{1/2}W_t,\varepsilon^{3/2}\int_0^tW_s\,{\mathrm d} s\right)\;. \end{equation*} Since $A^2=0$, we obtain, for $r\in\mathbb{R}$, \begin{equation*} \operatorname{e}^{\varepsilon r A}=I+\varepsilon rA= \begin{pmatrix} 1 & 0 \\ \varepsilon r & 1 \end{pmatrix}\;. \end{equation*} We further compute, for $t\in[0,1]$, \begin{equation*} \Gamma_t^\varepsilon=\int_0^t\operatorname{e}^{-\varepsilon sA}B B^{\ast}\operatorname{e}^{-\varepsilon s A^{\ast}}\,{\mathrm d} s = \begin{pmatrix} t & -\frac{1}{2}\varepsilon t^2\\[0.4em] -\frac{1}{2}\varepsilon t^2 & \frac{1}{3}\varepsilon^2 t^3 \end{pmatrix}\;. \end{equation*} It follows that \begin{equation*} \operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon= \begin{pmatrix} t & -\frac{1}{2}\varepsilon t^2\\[0.4em] \frac{1}{2}\varepsilon t^2 & -\frac{1}{6}\varepsilon^2 t^3 \end{pmatrix} \quad\mbox{and}\quad \left(\Gamma_1^\varepsilon\right)^{-1}\operatorname{e}^{-\varepsilon A}= \begin{pmatrix} -2 & 6 \varepsilon^{-1}\\[0.4em] -6 \varepsilon^{-1} & 12\varepsilon^{-2} \end{pmatrix}\;, \end{equation*} which implies \begin{equation*} \alpha_t^\varepsilon=\operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon\left(\Gamma_1^\varepsilon\right)^{-1} \operatorname{e}^{-\varepsilon A}= \begin{pmatrix} 3t^2-2t & \left(6t-6t^2\right)\varepsilon^{-1} \\[0.4em] \left(t^3-t^2\right)\varepsilon & 3t^2-2t^3 \end{pmatrix}\;. \end{equation*} Thus, by Lemma~\ref{modelbridge} and for $y=(a,b)\in\mathbb{R}^2$, the process $(z_t^\varepsilon(a,b))_{t\in[0,1]}$ in $\mathbb{R}^2$ given by \begin{align*} \left(z_t^{\varepsilon}(a,b)\right)_1 &=\left(3t^2-2t\right)a+\left(6t-6t^2\right)\frac{b}{\varepsilon}+ \varepsilon^{1/2}\left(W_t-\left(3t^2-2t\right)W_1- \left(6t-6t^2\right)\int_0^1W_s\,{\mathrm d} s\right)\;,\\ \left(z_t^{\varepsilon}(a,b)\right)_2 &=\left(t^3-t^2\right)a\varepsilon+\left(3t^2-2t^3\right)b+ \varepsilon^{3/2}\left(\int_0^tW_s\,{\mathrm d} s-\left(t^3-t^2\right)W_1- \left(3t^2-2t^3\right)\int_0^1W_s\,{\mathrm d} s\right) \end{align*} has the same law as the rescaled Kolmogorov diffusion $(x_t^\varepsilon)_{t\in[0,1]}$ conditioned on $x_1^\varepsilon=(a,b)$. From the explicit expression, it follows that the processes \begin{equation}\label{koldiff} \left(\left(z_t^{\varepsilon}(a,b)\right)_1- \left(3t^2-2t\right)a-\left(6t-6t^2\right)\frac{b}{\varepsilon}, \left(z_t^{\varepsilon}(a,b)\right)_2- \left(t^3-t^2\right)a\varepsilon-\left(3t^2-2t^3\right)b\right)_{t\in[0,1]} \end{equation} converge weakly as $\varepsilon\to 0$ to the zero process. This is consistent with Theorem~\ref{LLN} because for the Kolmogorov diffusion starting from $x=0$, we have \begin{equation*} \phi_t^\varepsilon(y)=\alpha_t^\varepsilon y= \left(\left(3t^2-2t\right)a+\left(6t-6t^2\right)\frac{b}{\varepsilon}, \left(t^3-t^2\right)a\varepsilon+\left(3t^2-2t^3\right)b\right)\;. \end{equation*} We note that while the path $\left(\phi_t^\varepsilon(y)\right)_{t\in[0,1]}$ is well-defined for each $\varepsilon>0$, its first component blows up as $\varepsilon\to 0$, unless $b=0$. From the above expression for a Kolmogorov bridge from $0$ to $(a,b)$ in small time, we further see that rescaling the processes~(\ref{koldiff}) by $\varepsilon^{1/2}$ in the first component and by $\varepsilon^{3/2}$ in the second component leads to the fluctuation process which, at $t\in[0,1]$, is given as \begin{equation*} \left(W_t-\left(3t^2-2t\right)W_1- \left(6t-6t^2\right)\int_0^1W_s\,{\mathrm d} s, \int_0^tW_s\,{\mathrm d} s-\left(t^3-t^2\right)W_1- \left(3t^2-2t^3\right)\int_0^1W_s\,{\mathrm d} s\right)\;. \end{equation*} Since this coincides with the expression for $z_t^1(0)$, the resulting limit fluctuations are equal in law to a Kolmogorov bridge from $0$ to $0$ in time~$1$. Below we conclude that this is also what is given to us by Theorem~\ref{CLT}. For $r\in\mathbb{R}$, we have \begin{equation*} U^\varepsilon(r)= \operatorname{e}^{\varepsilon r A}B= \begin{pmatrix} 1 \\ \varepsilon r \end{pmatrix}\;, \end{equation*} which is of the form~(\ref{urepsform}) with $u_1=u_2=1$. In particular, we already work in a suitable basis. The rescaling map $D_\varepsilon$ is then \begin{equation}\label{kolD} D_\varepsilon= \begin{pmatrix} 1 & 0 \\ 0 & \varepsilon \end{pmatrix}\;. \end{equation} Since we consider the rescaled fluctuations $(F_t^\varepsilon)_{t\in[0,1]}$ defined by~(\ref{refluct}) this corresponds to rescaling the first component by $\varepsilon^{1/2}$ and the second component by $\varepsilon^{3/2}$, as above. We further obtain that \begin{equation}\label{kolJ} J_t= \begin{pmatrix} t^{1/2} & 0 \\ 0 & t^{3/2} \end{pmatrix}\;,\quad \hat U(r)= \begin{pmatrix} 1 \\ r \end{pmatrix} \quad\mbox{and}\quad V= \begin{pmatrix} 1 & -\frac{1}{2} \\[0.4em] \frac{1}{2} & -\frac{1}{6} \end{pmatrix}\;. \end{equation} By integration by parts, we have \begin{equation}\label{kolhatU} \int_0^t\hat U(t-s)\,{\mathrm d} W_s= \left(W_t,\int_0^t(t-s)\,{\mathrm d} W_s\right)= \left(W_t,\int_0^tW_s\,{\mathrm d} s\right)\;. \end{equation} This together with the computation \begin{equation}\label{kolcov} J_t V J_t V^{-1}= \begin{pmatrix} t & -\frac{1}{2} t^2\\[0.4em] \frac{1}{2} t^2 & -\frac{1}{6} t^3 \end{pmatrix} \begin{pmatrix} -2 & 6 \\[0.4em] -6 & 12 \end{pmatrix}= \begin{pmatrix} 3t^2-2t & 6t-6t^2 \\[0.4em] t^3-t^2 & 3t^2-2t^3 \end{pmatrix} \end{equation} shows that Theorem~\ref{CLT} indeed yields the same small-time fluctuations for a Kolmogorov bridge as derived above. Irrespective of the initial and final positions, the small-time fluctuations are equal in law to a Kolmogorov bridge from $0$ to $0$ in time $1$. \subsection{Ornstein-Uhlenbeck process paired with its area} \label{sec:OU} Performing the small-time analysis for the bridge of an Ornstein-Uhlenbeck process paired with its area demonstrates that Theorem~\ref{CLT} can greatly simplify the determination of the small-time fluctuations for the bridge. Let $(W_t)_{t\in[0,1]}$ be a standard Brownian motion in $\mathbb{R}$ and fix $x\in\mathbb{R}^2$. We consider the diffusion $(x_t)_{t\in[0,1]}$ in $\mathbb{R}^2$ which is the unique strong solution to the stochastic differential equation \begin{align*} {\mathrm d} \left(x_t\right)_1&=-\left(x_t\right)_1\,{\mathrm d} t +{\mathrm d} W_t\;,\\ {\mathrm d} \left(x_t\right)_2&=\left(x_t\right)_1\,{\mathrm d} t\;, \end{align*} subject to the initial condition $x_0=x$. This corresponds to the choice \begin{equation*} A= \begin{pmatrix} -1 & 0\\ 1 & 0 \end{pmatrix} \quad\mbox{and}\quad B= \begin{pmatrix} 1 \\ 0 \end{pmatrix} \end{equation*} in our model class of diffusion processes. The matrices $A$ and $B$ satisfy condition~(\ref{kalman}) since \begin{equation*} \operatorname{span}\left\{ \begin{pmatrix} 1 \\ 0 \end{pmatrix}, \begin{pmatrix} -1 & 0\\ 1 & 0 \end{pmatrix} \begin{pmatrix} 1 \\ 0 \end{pmatrix} \right\}=\mathbb{R}^2\;. \end{equation*} In the following, we first use Lemma~\ref{modelbridge} to find explicit expressions for the corresponding bridge processes in small time to then determine the small-time fluctuations for the bridge by hand, before we show that Theorem~\ref{CLT} greatly simplifies the analysis. Using $A^k=(-1)^{k-1}A$ for $k\in\mathbb{N}$, we compute, for $\varepsilon>0$ and $r\in\mathbb{R}$, \begin{equation*} \operatorname{e}^{\varepsilon rA}= \begin{pmatrix} \operatorname{e}^{-\varepsilon r} & 0\\[0.4em] 1-\operatorname{e}^{-\varepsilon r} & 1 \end{pmatrix}\;. \end{equation*} It follows that, for $t\in[0,1]$, \begin{equation*} \Gamma_t^\varepsilon= \begin{pmatrix} \frac{1}{2\varepsilon}\left(\operatorname{e}^{2\varepsilon t}-1\right) & -\frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}-1\right)^2 \\[0.4em] -\frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}-1\right)^2 & \frac{1}{2\varepsilon}\left(\operatorname{e}^{2\varepsilon t}-4\operatorname{e}^{\varepsilon t}+2\varepsilon t +3\right) \end{pmatrix}\;, \end{equation*} which yields \begin{equation*} \operatorname{e}^{\varepsilon tA}\Gamma_t^\varepsilon= \begin{pmatrix} \frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}-\operatorname{e}^{-\varepsilon t}\right) & -\frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}+\operatorname{e}^{-\varepsilon t}-2\right)\\[0.4em] \frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}+\operatorname{e}^{-\varepsilon t}-2\right) & -\frac{1}{2\varepsilon}\left(\operatorname{e}^{\varepsilon t}-\operatorname{e}^{-\varepsilon t}-2\varepsilon t\right) \end{pmatrix}\;. \end{equation*} A straightforward but elaborate calculation shows that, for $t\in[0,1]$, the matrix $\alpha_t^\varepsilon$ is given by \begin{align*} \left(\alpha_t^{\varepsilon}\right)_{11} &=\frac{\left(1-\operatorname{e}^{-\varepsilon t}\right)\left((\varepsilon-1)\operatorname{e}^{\varepsilon(1+t)}+\operatorname{e}^{\varepsilon t}+ (\varepsilon+1)\operatorname{e}^\varepsilon-\operatorname{e}^{2\varepsilon}\right)} {\left(\operatorname{e}^\varepsilon-1\right)\left((\varepsilon-2)\operatorname{e}^\varepsilon+\varepsilon+2\right)}\;,\\ \left(\alpha_t^{\varepsilon}\right)_{12} &=\frac{\operatorname{e}^{-\varepsilon}-\operatorname{e}^{-\varepsilon(1-t)}-\operatorname{e}^{-\varepsilon t}+ 1}{(\varepsilon+2)\operatorname{e}^{-\varepsilon}+\varepsilon-2}\;,\\ \left(\alpha_t^{\varepsilon}\right)_{21} &=\frac{\operatorname{e}^{2\varepsilon}-1+(\varepsilon +1)\operatorname{e}^{\varepsilon(1-t)}+\operatorname{e}^{\varepsilon t}+(\varepsilon-1)\operatorname{e}^{\varepsilon(1+t)} -\varepsilon t\left(\operatorname{e}^\varepsilon-1\right)^2-2\varepsilon\operatorname{e}^{\varepsilon}-\operatorname{e}^{\varepsilon(2-t)}} {\left(\operatorname{e}^\varepsilon-1\right)\left((\varepsilon-2)\operatorname{e}^\varepsilon+\varepsilon+2\right)}\;,\\ \left(\alpha_t^{\varepsilon}\right)_{22} &=\frac{\operatorname{e}^{-\varepsilon t}-\operatorname{e}^{-\varepsilon(1-t)}+(\varepsilon t +1) \operatorname{e}^{-\varepsilon} +\varepsilon t -1}{(\varepsilon+2)\operatorname{e}^{-\varepsilon}+\varepsilon-2}\;. \end{align*} By Lemma~\ref{modelbridge}, this gives an explicit expression for the bridge of the considered Ornstein-Uhlenbeck process paired with its area. Repeatedly applying l'H\^opital's rule, we see that, as $\varepsilon\to 0$, \begin{align*} \left(\alpha_t^{\varepsilon}\right)_{11} &=3t^2-2t+O\left(\varepsilon^2\right)\;,\\ \left(\alpha_t^{\varepsilon}\right)_{12} &=\frac{6t-6t^2}{\varepsilon}+O\left(\varepsilon\right)\;,\\ \left(\alpha_t^{\varepsilon}\right)_{21} &=\left(t^3-t^2\right)\varepsilon+O\left(\varepsilon^3\right)\;,\\ \left(\alpha_t^{\varepsilon}\right)_{22} &=3t^2-2t^3+O\left(\varepsilon^2\right)\;, \end{align*} uniformly in $t\in[0,1]$. From a comparison to the expressions we obtained in the small-time analysis for the Kolmogorov diffusion in Section~\ref{sec:kol}, we deduce that the Ornstein-Uhlenbeck process paired with its area exhibits the same small-time fluctuations for the bridge as the Kolmogorov diffusion. This follows much more easily by applying Theorem~\ref{CLT}. For $r\in\mathbb{R}$, we have \begin{equation*} U^\varepsilon(r)= \begin{pmatrix} \operatorname{e}^{-\varepsilon r} \\ 1-\operatorname{e}^{-\varepsilon r} \end{pmatrix}= \begin{pmatrix} 1 \\ \varepsilon r \end{pmatrix}+ \begin{pmatrix} O\left(\varepsilon\right) \\ O\left(\varepsilon^2\right) \end{pmatrix}\;. \end{equation*} We see that $U^\varepsilon(r)$ is of the form~(\ref{urepsform}) with $u_1=u_2=1$. Hence, the rescaling matrix $D_\varepsilon$ as well as $J_t, \hat U(r)$ and $V$ are again given by~(\ref{kolD}) as well as~(\ref{kolJ}). Similarly, the quantities~(\ref{kolhatU}) and (\ref{kolcov}), which characterise the small-time fluctuations uniquely, remain unchanged. Thus, as a result of giving rise to the same $\hat U(r)$ for all $r\in\mathbb{R}$, the Kolmogorov diffusion and the Ornstein-Uhlenbeck process paired with its area exhibit the same small-time fluctuations for the bridge. For $x=0$ there is another interesting observation we can make in regards to these two processes, which is a consequence of certain terms vanishing in the Laurent expansion of $\alpha_t^\varepsilon$ in $\varepsilon\to 0$. If we consider the path $(\psi_t^\varepsilon(y))_{t\in[0,1]}$ defined by, for $y=(a,b)$, \begin{equation*} \psi_t^\varepsilon(y)=\left( \left(3t^2-2t\right)a+\left(6t-6t^2\right)\frac{b}{\varepsilon}, \left(t^3-t^2\right)a\varepsilon+\left(3t^2-2t^3\right)b \right) \end{equation*} then this is sufficient to compensate for the blow-up behaviour in the bridge process $(z_t^\varepsilon(y))_{t\in[0,1]}$ as $\varepsilon\to 0$, and the two processes \begin{equation*} \left(\varepsilon^{-1/2}D_\varepsilon^{-1} \left(z_t^\varepsilon(y)-\phi_t^\varepsilon(y)\right)\right)_{t\in[0,1]} \quad\mbox{and}\quad \left(\varepsilon^{-1/2}D_\varepsilon^{-1} \left(z_t^\varepsilon(y)-\psi_t^\varepsilon(y)\right)\right)_{t\in[0,1]} \end{equation*} have the same limit process as $\varepsilon\to 0$. Since the approximate minimal-like path $(\psi_t^\varepsilon(y))_{t\in[0,1]}$ for the current example with $x=0$ coincides with the minimal-like path for a Kolmogorov bridge from $0$ to $y$ in small time, not only the small-time fluctuations for the bridge but also a sufficiently good approximation of the minimal-like path is given in terms of the Kolmogorov diffusion. Though, as shown in the next example, the latter need not hold for two processes which admit the same $n\in\mathbb{N}$ and $u_1,\dots,u_n$. \subsection{Iterated Kolmogorov diffusion} \label{ultra} The diffusions studied in Section~\ref{sec:OU} and Section~\ref{sec:diffmin} both exhibit the same small-time fluctuations for the bridge as the Kolmogorov diffusion. Similarly, there is a family of diffusions which all have the same small-time fluctuations for the bridge as the iterated Kolmogorov diffusion, that is, a standard Brownian motion together with a finite number of its iterated time integrals. Banerjee and Kendall~\cite{kendall_couple} study maximal and efficient couplings for iterated Kolmogorov diffusions, and Baudoin, Gordina and Mariano~\cite{kolgradbounds} obtain gradient bounds for this hypoelliptic diffusion. We close by explicitly determining the small-time fluctuations for the bridge of an iterated Kolmogorov diffusion. By the independence of the components of a Brownian motion in $\mathbb{R}^m$, it is sufficient to focus on a standard Brownian motion in $\mathbb{R}$ and its iterated time integrals. In our model class, this diffusion corresponds to the choice of the $d\times d$ matrix $A$ and the $d\times 1$ matrix $B$, understood as a column vector, whose entries are, for $i,j\in\{1,\dots,d\}$, \begin{equation*} A_{ij}= \begin{cases} 1 & \mbox{if } i=j+1\\ 0 & \mbox{otherwise} \end{cases} \quad\mbox{and}\quad B_{i}= \begin{cases} 1 & \mbox{if } i=1\\ 0 & \mbox{otherwise} \end{cases}\;. \end{equation*} With $\mathcal{L}$ on $\mathbb{R}^d$ given by~(\ref{model}), the operator $\mathcal{L}-\frac{\partial}{\partial t}$ is a strongly degenerate ultraparabolic operator. For $k\in\mathbb{N}$, we have \begin{equation*} \left(A^k\right)_{ij}= \begin{cases} 1 & \mbox{if } i=j+k\\ 0 & \mbox{otherwise} \end{cases}\;. \end{equation*} This yields \begin{equation*} \operatorname{span}\left\{ B,AB,\dots,A^{d-1}B\right\}=\mathbb{R}^d\;, \end{equation*} that is, the Kalman rank condition~(\ref{kalman}) is satisfied. Moreover, we obtain $n=d$ since $\mathbb{R}^d$ cannot be spanned by less than $d$ vectors. From $A^k=0$ for $k\geq d$, it follows that, for $r\in\mathbb{R}$, \begin{equation*} \operatorname{e}^{\varepsilon rA}= \sum_{k=0}^{d-1}\frac{\varepsilon^k r^k}{k!}A^k\;, \end{equation*} which implies \begin{equation*} \left(U^\varepsilon(r)\right)_i=\left(\operatorname{e}^{\varepsilon rA}B\right)_i= \frac{\varepsilon^{i-1}r^{i-1}}{(i-1)!}\;. \end{equation*} Hence, $U^\varepsilon(r)$ is of the form~(\ref{urepsform}) with \begin{equation*} u_i=\frac{1}{(i-1)!}\;. \end{equation*} In the current example, the matrices $D_\varepsilon$ and $J_t$ are the $d\times d$ diagonal matrices, whose $i^{\rm th}$ diagonal element equals $\varepsilon^{i-1}$ and $t^{i-1/2}$, respectively. We further see that $V$ has the entries \begin{equation*} V_{ij}=(-1)^{j+1}u_iu_j\frac{(i-1)!\,(j-1)!}{(i+j-1)!}= (-1)^{j+1}\frac{1}{(i+j-1)!}\;. \end{equation*} Let $H$ be the $d\times d$ Hankel matrix defined by \begin{equation*} H_{ij}=\frac{1}{(i+j-1)!}\;, \end{equation*} and let $S$ be the $d\times d$ diagonal matrix whose $i^{\rm th}$ diagonal element equals $(-1)^{i+1}$. Due to \begin{equation*} (HS)_{ij}=\sum_{k=1}^d H_{ik}S_{kj}=H_{ij}S_{jj}= (-1)^{j+1}\frac{1}{(i+j-1)!}=V_{ij}\;, \end{equation*} for all $i,j\in\{1,\dots,d\}$, we have $V=HS$. Since $S^{-1}=S$, it follows that \begin{equation*} V^{-1}=SH^{-1}\;. \end{equation*} Using my formula for the inverse of the factorial Hankel matrix $H$, see~\cite[Theorem~1.1]{inverthankel}, we obtain \begin{align*} \left(V^{-1}\right)_{ij} &=\sum_{k=1}^dS_{ik}\left(H^{-1}\right)_{kj} =(-1)^{i+1}\left(H^{-1}\right)_{ij}\\ &=(-1)^{d+j}(i-1)!\,j!\,\binom{d-1}{i-1}\binom{d+j-1}{j} \sum_{k=0}^{i-1}\binom{d-i+k}{j-1}\binom{d+k-1}{k}\;. \end{align*} We further compute that \begin{align*} &\left(J_tVJ_tV^{-1}\right)_{ij}\\ &\qquad=\sum_{l=1}^d t^{i-1/2}V_{il}t^{l-1/2}\left(V^{-1}\right)_{lj}\\ &\qquad=\sum_{l=1}^d(-1)^{d+j+l+1}\frac{(l-1)!\,j!}{(i+l-1)!} \binom{d-1}{l-1}\binom{d+j-1}{j} \sum_{k=0}^{l-1}\binom{d-l+k}{j-1}\binom{d+k-1}{k} t^{i+l-1}\;. \end{align*} As $\hat U(r)$ has the entries \begin{equation*} \left(\hat U(r)\right)_i=r^{i-1}u_i=\frac{r^{i-1}}{(i-1)!}\;, \end{equation*} we see, by integration by parts, that the process \begin{equation*} \left(\int_0^t\hat U(t-s)\,{\mathrm d} W_s\right)_{t\in[0,1]} \end{equation*} is again the iterated Kolmogorov diffusion. Using Theorem~\ref{CLT}, this observation and the formula for $J_tVJ_t V^{-1}$ together give an explicit expression of the small-time fluctuations for the bridge of an iterated Kolmogorov diffusion. Moreover, since $U^\varepsilon(r)=D_\varepsilon\hat U(r)$ for $r\in\mathbb{R}$, these small-time fluctuations are equal in law to the bridge from $0$ to $0$ in time $1$ of an iterated Kolmogorov diffusion with the same number of iterated time integrals. \section{Introduction} \input{introduction} \section{Diffusion bridge in the model class} \label{sec:modelbridge} \input{bridge} \section{Small-time analysis for the model diffusion bridge} \label{sec:smalltime} \input{smalltime} \section{Illustrating examples} \label{sec:examples} \input{examples} \input{diffmin} \input{genkol} \bibliographystyle{plain}
\section{Introduction}\label{sec:Intro} The number of identified exoplanets and brown dwarfs has grown substantially over the past two decades. Even though the observations rarely go beyond characterizing their mass and radius, they have also started to reveal additional information. In particular, the observation of global magnetic fields can offer important constraints on the interior dynamics. While detecting the magnetic fields of exoplanets has proven elusive so far, brown dwarfs show radio emissions clearly indicative of an internal dynamo process \citep{Reiners2010}. Recently, the Zeeman line broadening measurement for a brown dwarf constrained the surface field strength to about $0.5\,$T, a value consistent with the estimates based on the radio emissions \citep{Berdyugina2017}. Dynamo action requires an electrically conducting and convecting region but also depends on the rotation rate and luminosity of an object. Numerical models for the thermal evolution, interior dynamics, or magnetic field generation are indispensable for predicting, interpreting, and understanding the observations. These simulations require an internal model of the studied object that also includes the transport properties. Early approaches to determine the transport properties of degenerate matter were, for example, based on the Kubo theory \citep{Hubbard1966,Hubbard1969}. \cite{Flowers1976} used a variational approach for the solution of the Boltzmann equation and considered all relevant scattering mechanisms. \cite{Stevenson1977a} provided approximate formulae based on the Ziman theory using the static ion-ion structure factor for a hard-sphere system which can be applied for a wide range of densities and temperatures. \cite{Nandkumar1984} relied on the relaxation time approximation and included structure factor effects within the simple one-component plasma model. This approach has been adapted recently by \cite{Harutyunyan2016} to determine the electrical conductivity in the warm crusts of neutron stars. Conductivity models that are valid for the wide ranges of density and temperature in astrophysical and other applications, such as inertial confinement fusion, were proposed by, e.g., \cite{Lee1984} and \cite{Ichimaru1985}. Our work follows a different path to describe the extreme matter in the interior of massive objects governed by strongly correlated ions immersed in a degenerate electron gas. We apply a combination of density functional theory for the electron system and classical molecular simulations for the ions (DFT-MD method) to derive the material properties of H-He mixtures. This approach had been previously applied to Jupiter by \citet{French2012}, whose results were subsequently used for simulations of the planet's interior dynamo processes reproducing the Jovian large scale magnetic field \citep{Gastine2014,Jones2014,Duarte2018}. The work presented here extends the Jupiter study of \cite{French2012}. We select three objects within a mass range of $10-50~M_{\rm J}$ from \cite{Becker2014}: the massive exoplanet KOI-889b, and the two brown dwarfs Corot-3b and Gliese-229b. The latter is the most massive object in this set. \cite{Becker2014} predict a pressure of 22000~TPa, a temperature of 1.2$\cdot$10$^6$~K, and a density of 450~g/cm$^3$ at the center of Gliese-229b based on \textit{ab initio} equations of state (EOS). This exceeds the thermodynamic conditions within Jupiter several orders of magnitude. For instance, the core-mantle boundary in Jupiter is predicted at 4~TPa, 20000~K, and 4.3~g/cm$^3$ \citep{Guillot1999,Nettelmann2012}. The thermodynamic conditions typical for the interior of Gliese~229b are already accessible in the laboratory using the world's most powerful laser at the National Ignition Facility (NIF) covering the conditions from substellar objects (giant planets, brown dwarfs) to low-mass stars~\citep{Lindl2004, Moses2011}. It has been demonstrated by~\cite{Hurricane2014} that a deuterium-tritium capsule can be dynamically compressed up to about 400~g/cm$^3$. Hence, the data presented here may also serve as input for the hydrodynamic simulations accompanying these experiments. Our paper is organized as follows. We recapitulate the calculation of interior models for massive giant planets and brown dwarfs according to \cite{Becker2014} in section~\ref{sec:IntBrownie}. The determination of the thermodynamic material properties via \textit{ab initio} simulations is outlined in section~\ref{sec:Tdyn_Props}. The Love number $k_2$ and the equidistance are discussed in section~\ref{sec:k2}. The calculations of the transport properties and corresponding results are described in section~\ref{sec:Lik}. Finally, we discuss the implications of our obtained material properties on planetary and stellar dynamos in section \ref{sec:Implications} and conclude in section \ref{sec:Conclusion}. \section{Interior Structure Models and Temperature Profiles}\label{sec:IntBrownie} The interior structure models of the massive giant planet KOI-889b and the brown dwarfs Corot-3b and Gliese-229b are adopted from \cite{Becker2014}, whose assumptions we recall briefly. The objects are described as spherical bodies, each composed of a single isentropic layer. The temperature profile can be obtained by integrating numerically the differential equation \begin{eqnarray} \left(\frac{\partial T}{\partial \varrho}\right)_{s}=\frac{T}{\varrho^2}\frac{\left(\frac{\partial P}{\partial T}\right)_{\varrho}}{\left(\frac{\partial u}{\partial T}\right)_{\varrho}} \label{IsenDGL} \end{eqnarray} at constant specific entropy $s$. Most crucial inputs are the thermal and caloric EOS, $P(\varrho, T)$ and $u(\varrho, T)$, which describe pressure $P$ and specific internal energy $u$ in terms of density $\varrho$ and temperature $T$. The material inside each object is approximated as linear mixture of hydrogen, helium and heavier elements (with their respective mass fractions $X$, $Y$ and $Z$). Here, we use H-REOS.3 for hydrogen and He-REOS.3 for helium, which have been derived from \textit{ab initio} simulations employing VASP~\citep{Kresse1993,Kresse1994,Kresse1996,Hafner2008}, see~\cite{Becker2014} for details. The heavy elements are approximated with a fourfold mass-scaled version of He-REOS.3 to match the mass of water. In the modeling procedure, $Y$ is fixed to the solar value of 0.27, while $Z$ is varied until the resulting model matches the observational constraints for total mass and radius. $X$ is given by $X=1-Y-Z$. The final compositional triplets $X/Y/Z$ can be found in Table~\ref{tab:objects} together with the observational constraints and the boundary conditions of each isentrope. The boundary of each object is chosen at pressure $P_{atm}$ and temperature $T_{atm}$, where the atmosphere becomes convective and therefore marks the onset of the isentrope. \cite{Becker2014} employed the radiative-convective model of \cite{Marley1996} and \cite{Fortney2008b} to describe the objects' atmospheres. The interior structure models by \cite{Becker2014} result in a mass $M$ of $9.98~M_{\rm J}$ and a radius $R$ of $1.028~R_{\rm J}$ for KOI-889b, $21.66~M_{\rm J}$ and $0.973~R_{\rm J}$ for Corot-3b , and $46.23~M_{\rm J}$ and $0.8646~R_{\rm J}$ for Gliese-229b. All these values lie within the error bars of the corresponding observational constraints as listed in Table~\ref{tab:objects}. \begin{deluxetable}{cccc}[bht] \tablecolumns{4} \tablewidth{0pc} \tablecaption{Observational constraints and parameters} \tablehead{ \colhead{~} & \colhead{KOI-889b\tablenotemark{a,d}} & \colhead{Corot-3b\tablenotemark{b,d}} & \colhead{Gliese-229b\tablenotemark{c,d}} } \startdata \rule{0pt}{10pt} Mass [$M_{\rm J}$] &$9.98 \pm 0.5$ &$21.66 \pm 1$ &$46.2_{-14.8}^{+11.8}$ \\ \rule{0pt}{10pt} Radius [$R_{\rm J}$] &$1.03 \pm 0.06$ &$1.01 \pm 0.07$ &$0.87_{-0.07}^{+0.11}$ \\ \rule{0pt}{10pt} Fe/H &-0.07$\pm$0.15 &-0.02$\pm$0.06 &-0.2$\pm$0.4 \\ \rule{0pt}{10pt} P$_{\rm atm}$ [bar] &58 &74 &52 \\ \rule{0pt}{10pt} T$_{\rm atm}$ [K] &1000 &1500 &1800 \\ \rule{0pt}{10pt} X/Y/Z &0.69/0.27/0.04 &0.71/0.27/0.02 &0.71/0.27/0.02 \\ \enddata \tablenotetext{a}{Mass, radius, and Fe/H: \cite{Hebrard2013}} \tablenotetext{b}{Mass, radius, and Fe/H: \cite{Deleuil2008}} \tablenotetext{c}{Mass and radius are derived from the fitting formulae given in \cite{Marley1996}, Fe/H is taken from \cite{Schiavon1997}.} \tablenotetext{d}{P$_{\rm atm}$, T$_{\rm atm}$, and X/Y/Z: \cite{Becker2014}, atmosphere model by \cite{Marley1996} and \cite{Fortney2008b}} \tablenotetext{ }{ } \label{tab:objects} \end{deluxetable} \begin{figure}[hbt] \includegraphics[width=1.0\columnwidth]{./PlasmaParam} \caption{Temperature-particle density plane with isentropes of the three massive objects under consideration here (see \cite{Becker2014}) in comparison to Jupiter (see \cite{Nettelmann2012,French2012}). Also shown are lines for the ionic coupling parameter $\Gamma=0.1, 1, 10$ and the electron degeneracy parameter $\Theta=0.1, 1, 10$ which illustrate the thermodynamic conditions along the isentropes and the parameter region for our present calculations.} \label{fig:PlasmaParam} \end{figure} The isentropes of the three objects considered here are illustrated in Figure~\ref{fig:PlasmaParam}, while the thermodynamic states for selected points along the isentropes can be found in Table~\ref{tab:Mat}. For comparison we also include the three-layer Jupiter model J11-8a with an outer enevelope composition $X_1/Y_1/Z_1$ of 0.724/0.238/0.038 and an inner envelope composition $X_2/Y_2/Z_2$ of 0.561/0.311/0.128 \citep{Nettelmann2012, French2012} in Figure~\ref{fig:PlasmaParam}. Additionally, we show the coupling parameter $\Gamma=e^2/(4\pi\varepsilon_0 d k_BT)$ and the degeneracy parameter $\Theta=k_BT/E_F$ associated with the interior temperatures for the case of hydrogen-helium mixtures of equal electron and ion number density. $d$ is the mean distance between the ions, $k_B$ represents Boltzmann's constant, and $E_F$ the electronic Fermi energy. It can be seen that even in the case of the object with the smallest mass, KOI-889b, the particle density and temperature in the center are about one order of magnitude higher than in Jupiter. All four isentropes are subject to strong electron degeneracy ($\Theta\sim 0.1$) in the inner regions. The pronounced change in slope in all four curves is due to dissociation and ionization of hydrogen. The density jump at about $5\times 10^{23}$~cm$^{-3}$ on the Jupiter isentrope marks the boundary between the upper and lower mantle, see~\cite{Nettelmann2012}. \section{Thermodynamic Material Properties}\label{sec:Tdyn_Props} The entire set of thermodynamic material properties is directly derived from the linearly mixed wide-range EOS for hydrogen and helium~\citep{Becker2014} described in the previous section. Additional data points were generated via cubic spline interpolation of the EOS tables to obtain a sufficiently dense EOS grid. The derivatives of $P(\varrho,T)$ and $u(\varrho,T)$ and thus the material properties were then calculated analytically from the spline polynomials. Consequently, the errors of our results are connected to the errors of the EOS tables and are estimated to be $\leq 5\%$, see~\cite{Becker2014}. In this section we present results for the specific heat capacities at constant volume $c_V$ and constant pressure $c_P$, as well as the isothermal compressibility $\kappa_T$, the thermal expansion coefficient $\alpha$, and the sound velocity $c_s$. These quantities are defined as follows: \begin{eqnarray} \alpha & = & -\frac{1}{\varrho}\left(\frac{\partial \varrho}{\partial T}\right)_P =\frac{1}{\varrho} \left(\frac{\partial \varrho}{\partial P}\right)_T\left(\frac{\partial P}{\partial T}\right)_\varrho,\\ \kappa_T &=& \frac{1}{\varrho}\left(\frac{\partial \varrho}{\partial P}\right)_T ,\\ c_V & = &\left(\frac{\partial u}{\partial T}\right)_{\varrho} ,\\ c_P & = & c_V + \frac{T\alpha^2}{\varrho\kappa_T},\label{eq:CpCv} \label{eq:cpcv} \\ c_s &=& \sqrt{\left(\frac{\partial P}{\partial\varrho}\right)_s}= \sqrt{\frac{c_P}{\varrho c_V\kappa_T}} .\label{eq:TdynMatConst} \end{eqnarray} The respective values along the isentropes of the three considered objects are summarized in Table~\ref{tab:Mat}. \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./CpCvNeu} \caption{Specific heat capacities at constant volume $c_V$ (dashed curves) and constant pressure $c_P$ (solid curves) along the isentropes of Jupiter (black)~\citep{French2012}, KOI-889b (orange), Corot-3b (brown) and Gliese-229b (green).} \label{fig:CpCv} \end{figure} \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./kappaT} \caption{Isobaric expansion coefficient $\alpha$ (solid curves) and the isothermal compressibility $\kappa_T$ (dashed curves) along the considered isentropes with the same color code used in Figure~\ref{fig:CpCv}.} \label{fig:kappaT} \end{figure} \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Cs} \caption{Sound velocities along the isentropes of Jupiter (black)~\citep{French2012}, KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green).} \label{fig:Cs} \end{figure} \begin{deluxetable*}{ccccccccccc}[htb] \tablecolumns{11} \tablewidth{0pc} \tablecaption{Thermodynamic material properties of the massive giant planet KOI-889b as well as the brown dwarfs Corot-3b and Gliese-229b} \tablehead{ \colhead{object} & \colhead{r} & \colhead{m} & \colhead{P} & \colhead{T} & \colhead{$\varrho$} & \colhead{$\alpha$} & \colhead{$\kappa_T$} & \colhead{c$_V$} & \colhead{c$_P$} & \colhead{c$_s$}\\ \colhead{} & \colhead{[R$_{\mathrm{obj}}$]} & \colhead{[M$_{\mathrm{obj}}$]} & \colhead{[GPa]} & \colhead{[K]} & \colhead{[g cm$^{-3}$]} & \colhead{[K$^{-1}$]} & \colhead{[GPa$^{-1}$]} & \colhead{[J (gK)$^{-1}$]} & \colhead{[J (gK)$^{-1}$]} & \colhead{[km s$^{-1}$]}} \startdata KOI-889b & 0.996 & 0.99996 & 2.53 & 4800 & 0.100 & 1.33$\times10^{-4}$ & 0.288 & 13.4 & 16.3 & 6.48\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ KOI-889b & 0.043 & 3.15$\times10^{-4}$ & 3.974$\times10^{5}$ & 166000 & 46.5 & 5.75$\times10^{-7}$ & 1.51$\times10^{-6}$ & 14.1 & 15.0 & 120.0\\ Corot-3b & 0.996 & 0.9558 & 11.27 & 7700 & 0.208 & 6.53$\times10^{-5}$ & 0.06 & 16.6 & 19.5 & 9.60\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ Corot-3b & 9.29$\times10^{-3}$ & 3.08$\times10^{-5}$ & 2.7600$\times10^{6}$ & 420000 & 136.6 & 2.67$\times10^{-7}$ & 2.27$\times10^{-7}$ & 13.6 & 14.6 & 186.5\\ Gliese-229b & 0.998 & 1.0000 & 5.76 & 8000 & 0.126 & 9.50$\times10^{-5}$ & 0.132 & 19.5 & 24.2 & 8.59\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ Gliese-229b & 0.024 & 6.84$\times10^{-5}$ & 2.214$\times10^{7}$ & 1.18$\times10^{6}$ & 447 & 1.26$\times10^{-7}$ & 2.93$\times10^{-8}$ & 14.8 & 16.3 & 289\\ \enddata \tablenotetext{}{(This table is available in its entirety in machine-readable form.)} \label{tab:Mat} \end{deluxetable*} The results for the specific heat capacities $c_V$ (dashed curves) and $c_P$ (solid curves) for Gliese-229b (green), Corot-3b (brown), and KOI-889b (orange) are shown in Figure~\ref{fig:CpCv}. The heat capacities for Jupiter (black), computed earlier by~\cite{French2012}, are shown for comparison. Note, no data are provided for the innermost region within 10\% of Jupiter's radius, which is assumed to be an isothermal rocky core. For Jupiter, both heat capacities are characterized by a pronounced peak at $90\%$ of its radius, which coincides with the dissociation of the hydrogen molecules and the associated latent heat. The step in $c_V$ and $c_P$ at $\sim 62\%$ of the radius is due to the transition from the outer to the inner envelope layer. The three more massive objects lack such a discontinuity, since they are modeled with one layer only. Moreover, we observe no pronounced local maxima as found in the case of Jupiter. This is due to the much hotter boundary temperatures for the isentropes of the massive giant planet KOI-889b and the brown dwarfs. While the Jupiter model starts at 1000 K where hydrogen is still in the molecular state, \cite{Becker2014} determined boundary temperatures between 4800~K and 8000~K for the massive objects where most of the hydrogen molecules are already dissociated. The corresponding heat capacity curves thus only capture the falling flanks of the peaks caused by the latent heat of hydrogen dissociation. The respective radial gradients in Figure~\ref{fig:CpCv} seem steeper than in Jupiter because we use relative rather than absolute radii. At deep interior conditions, all profiles remain roughly constant. This reflects the simpler properties of the fully ionized and increasingly degenerate matter described by~\cite{Hubbard1966}. However, the particles are still significantly correlated under these conditions, e.g. 16\% of the heat capacity $c_V$ can be attributed solely interaction effects in Gliese-229b's interior. The close approach of $c_V$ and $c_P$ at the maximum of the Jovian curves can be explained using Equation~(\ref{eq:cpcv}), where the isobaric expansion coefficient $\alpha$ contributes quadratically. This quantity is compared to the isothermal compressibility $\kappa_T$ in Figure~\ref{fig:kappaT}. All curves decrease entirely monotonically with density, with the exception of a minimum in the $\alpha$ profile of Jupiter due to the dissociation of hydrogen. This minimum in turn causes $c_V$ and $c_P$ to be particularly similar at this point (see Equation~(\ref{eq:cpcv})). Overall, we find $\kappa_T$ and $\alpha$ to be smaller for more massive objects because of the higher degeneracy of the matter in their interiors. The sound velocity $c_s$ can be derived from the properties discussed above using Equation~(\ref{eq:TdynMatConst}). The resulting profiles are shown in Figure~\ref{fig:Cs}. For all considered objects, the sound velocity increases with $\varrho$, since $\kappa_T$ decreases with density steeper than 1/$\varrho$ while $c_V/c_P$ remains roughly constant. \section{Static Love Number and Equidistance}\label{sec:k2} While the material properties of the matter inside planetary objects are usually not directly accessible, we can at least narrow down the mass distribution inside an object by measuring the Love number $k_2$ and equidistance $\nu_0$. Therefore, we provide values for all objects under consideration and compare to experimental values in Table~\ref{tab:love-equi}. The numerical procedure is adapted from \cite{Kellermann2018} and is briefly summarized in the following. If a planet is in the vicinity of another mass, e.g., the parent star or a moon, its gravitational field will be perturbed by the interactions. This external potential can be expanded using Legendre polynomials $P_n$: \begin{eqnarray} W(s) = \sum_{n=2}^\infty W_n = \frac{GM}{a} \sum_{n=2}^\infty \left(\frac{s}{a}\right)^n P_n(\cos\theta) \quad, \end{eqnarray} with the perturbing mass $M$, its distance to the planet $a$, the radial coordinate within the planet $s$, and the angle $\theta$ between $s$ and $a$. Due to this tidal mass shift, the planet's potential responds with the induced potential \begin{eqnarray} V_n^{\rm ind}(s) &=& K_n(s)W_n(s) \quad,\\ V_n^{\rm ind}(R_{\rm obj}) &=& k_n W_n(R_{\rm obj}) \quad. \end{eqnarray} $K_n$ is the Love function of degree $n$ and its value at the surface is the Love number $k_n$. To obtain $k_n$ we follow the formulation of \cite{Zharkov1978}. Similar to the gravitational moments $J_{2n}$, the Love numbers depend on the density profile of the planet. They can be calculated via \begin{eqnarray} k_n = \frac{T_n(R_{\rm obj})}{R_{\rm obj} ~ g_0}-1 \quad. \end{eqnarray} Here $g_0$ is the surface gravity of the unperturbed planet and the function $T_n$ fulfills the differential equation \begin{eqnarray} T_n''(s) + \frac{2}{s} T_n'(s) + \left[ \frac{4\pi G \varrho'(s)}{V'(s)} - \frac{n(n+1)}{s^2} \right] T_n(s) = 0 \quad,\nonumber\\ \end{eqnarray} with $\varrho$ and $V$ the density profile and potential of the unperturbed planet, respectively. Primed quantities denote derivatives with respect to coordinate $s$. In the case of Jupiter's three-layer model we have to account for internal density jumps. Therefore, the inner boundary conditions \begin{eqnarray} T_n(b^+) &=& T_n(b^-) \quad,\\ T_n'(b^+) &=& T_n'(b^-) + \frac{4\pi G}{V'(b)}\left[\varrho(b^-)-\varrho(b^+)\right]T_n(b) \end{eqnarray} have to be fulfilled. In these equations $b^-$ and $b^+$ denote the inner and outer side of the density jump, respectively. The possible results for $k_2$ lie between 0 and 1.5, the latter value being the limit for a sphere with homogeneous density. In general, a concentration of mass towards the center results in a smaller $k_2$ value. Our calculated values for Jupiter, KOI-889b, and the two brown dwarfs are listed in Table~\ref{tab:love-equi}. The table also contains the observational value for Jupiter \mbox{$k_{2,{\rm J}}=0.49$} that is based on gravity measurements \citep{Ragozzine2009} and can be reproduced by the three-layer model to within 10~\%. For the three massive objects the mass increases strongly but the radius decreases only slightly compared to Jupiter. While the Love number of the giant planet KOI-889b is still comparable to that of Jupiter, the significant rise in gravitational pull towards the center inside the brown dwarfs leads to a reduction of $k_2$ down to 0.349 for Gliese-229b. The equidistance $\nu_0$ (characteristic frequency) is the inverse of the time an acoustic wave would need to travel through an object. It is sensitive to the internal structure (see \cite{Gudkova1999b}) and is related to the sound velocity via \begin{eqnarray} \nu_0 &=& \left[ 2\int_0^{R_{\mathrm{Obj}}} \frac{{\rm d}r}{c_s(r)} \right]^{-1} \quad. \label{eq:equidist} \end{eqnarray} The equidistance thus increases with the object mass like the sound velocity (see Table~\ref{tab:love-equi}). For Jupiter our calculated value of $156~\mu$Hz agrees well with the experimental one of $155.3\pm 2.2~\mu$Hz \citep{Gaulme2011}. Furthermore, \cite{LeBihan2013} calculated the equidistance for massive giant planets. For Corot-3b they find an equidistance of 653.3~$\mu$Hz which is considerably lower than 723~$\mu$Hz as derived from our model. However, they used a different equation of state for the hydrogen-helium system with a slightly lower helium mass fraction ($Y=0.25$) and any metallicity is neglected ($Z=0$). In particular, they used the upper limit for the radius of Corot-3b (1.01~$R_{\rm J}$) while our results are based on a model predicting 0.973~$R_{\rm J}$. Thus, we obtain steeper gradients in the density profile, leading to higher sound velocities and finally to a larger value of the equidistance. \begin{deluxetable}{ccc}[htb] \tablecolumns{3} \tablewidth{0pc} \tablecaption{Love number $k_2$ and equidistance $\nu_0$} \tablehead{ \colhead{Object} &\colhead{$k_2$} & \colhead{$\nu_0$ [$\mu$Hz]}} \startdata Jupiter (exp.)\tablenotemark{a,b} & 0.49 & 155.3 $\pm$ 2.2\\ Jupiter (3L)\tablenotemark{c} & 0.538 & 156 \\ KOI-889b (1L)\tablenotemark{ } & 0.447 & 464 \\ Corot-3b (1L)\tablenotemark{ } & 0.387 & 723 \\ Gliese-229b (1L)\tablenotemark{ } & 0.349 & 1235 \\ \enddata \tablenotetext{a}{Love number: \cite{Ragozzine2009}} \tablenotetext{b}{Equidistance: \cite{Gaulme2011}} \tablenotetext{c}{Underlying three-layer (3L) model: \cite{Nettelmann2012}} \tablenotetext{}{} \label{tab:love-equi} \end{deluxetable} \section{Transport Properties}\label{sec:Lik} In contrast to the thermodynamic properties, the transport properties such as the shear viscosity $\eta$ and the electrical and thermal conductivities $\sigma$ and $\lambda$ are obtained from simulating a real H-He mixture. The DFT-MD simulations are carried out with VASP, assuming a solar-like mean helium content of $\overline{Y}=0.275$. The calculations for the viscosity are performed with 116 hydrogen and 11 helium ions, while the static simulations for $\sigma$ and $\lambda$ require 232 hydrogen and 22 helium ions. The choice between the full Coulomb potential and PAW pseudopotentials~\citep{Blochl1994} and in turn the cutoff energies was made according to \citet{Becker2014}. Subsequently, the remaining transport properties such as the Rosseland mean opacity $\kappa_R$ and the Lorenz number $L$ are derived from the conductivities. In general, all transport properties possess an ionic as well as an electronic contribution arising from the Born-Oppenheimer approximation allowing to decouple the motion of both species. In appropriate cases one of these two contributions is neglected, as discussed in the following sections for the individual transport properties. The densities and temperatures are selected along the isentropes of Gliese-229b, Corot-3b and KOI-889b, see Table~\ref{tab:Mat}. Heavier elements ($Z$) are not explicitly represented in those simulations, due to their small abundance. However, the helium content was increased slightly from 0.27 to 0.275 to match the pressures of the isentropes discussed in section~\ref{sec:IntBrownie}, which included a mass-scaled helium EOS to represent heavy elements. Indeed, the resulting pressures of the real mixture simulations reproduce the pressures along the isentropes with a maximum deviation of $2.5\%$ for Gliese-229b and Corot-3b (both $Z=2\%$), and $5\%$ for KOI-889b due to the larger amount of heavier elements ($Z=4\%$). The entire sets of transport properties along the three isentropes can be found in Table~\ref{tab:Trans}. \subsection{Viscosities}\label{subsec:Visco_Theo} Since the shear viscosity $\eta$ is dominated by the motion of the ions in the system, we neglect the electronic contributions, following~\cite{Bertolini2007}. The shear viscosity can be evaluated within the framework of linear response theory (LRT) (\cite{Kubo1957, Allen1989, Alfe1998}) using autocorrelation functions (ACFs) for the non-diagonal elements of the stress tensor $p_{ij}$: \begin{equation} \eta=\frac{V}{3k_BT}\int\limits_0^\infty\mathrm{d}t \sum_{ij=\left\{xy,yz,zx \right\}}\langle p_{ij}(0)p_{ij}(t) \rangle \quad. \label{eq:visco} \end{equation} Here, $V$ is the volume of the simulation box, $T$ the temperature and $k_B$ is Boltzmann's constant. Following~\cite{Alfe1998}, two additional ACFs are defined via rotation invariance by a linear combination of the diagonal elements of the stress tensor: $1/2(\langle p_{xx}(0)p_{xx}(t) \rangle - \langle p_{yy}(0)p_{yy}(t) \rangle)$ und $1/2(\langle p_{yy}(0)p_{yy}(t) \rangle - \langle p_{zz}(0)p_{zz}(t) \rangle)$. Below 50000~K we used all five independent ACFs to calculate $\eta$ for a better statistics, while at 50000~K and above only the three ACFs given by Equation~(\ref{eq:visco}) were accessible. In the respective DFT-MD calculations we sampled the Brillouin zone with a $2\times2\times2$ Monkhorst-Pack $\mathbf{k}$-point grid. Using only the Baldereschi mean value point \citep{Baldereschi1973} is not sufficient since the ACFs do not fluctuate around zero in this case, leading to wrong results. For sufficient statistics of the ACFs and a maximum error of 15\% for $\eta$, but typically below 10\%, we simulated at least 120000 time steps, leading to total simulated times between 20 and 80~ps for each point. \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Eta} \caption{Dynamic shear viscosities $\eta$ from DFT-MD calculations (solid curves) for Jupiter (black)~\citep{French2012}, KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green) in comparison to results of~\cite{Stevenson1977a} (dashed curves).} \label{fig:eta1} \end{figure} \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Nu} \caption{Kinematic shear viscosities $\nu=\eta/\varrho$ displayed in the same color code as in Figure~\ref{fig:eta1}. The results of~\cite{Stevenson1977a} (dashed curves) are shown for comparison.} \label{fig:eta2} \end{figure} The results for the dynamic shear viscosity are shown in Figure~\ref{fig:eta1}. The solid curves represent our DFT-MD results for KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green) along with earlier DFT-MD calculations for Jupiter (black) by \cite{French2012}. Additionally, the dashed curves illustrate predictions of~\cite{Stevenson1977a} for comparison. The viscosity is increasing monotonically from the surface to the center for all objects. The more compact the giant planet/brown dwarf is, the higher is the density inside the object and the higher is the shear viscosity. The dynamic shear viscosities provided by~\cite{Stevenson1977a} are based on the behavior of fluid alkali metals (see also \cite{Nandkumar1984}) and underestimate the viscosities considerably compared to the DFT-MD results. This behavior is also observed for the kinematic shear viscosity $\nu=\eta/\varrho$ illustrated in Figure~\ref{fig:eta2}. The results of \cite{Stevenson1977a} lie entirely below the DFT-MD curve of Jupiter and show a reversed trend compared to our calculations. We find the kinematic shear viscosities of our considered objects to increase with higher mass. Moreover, the values for KOI-889b and Corot-3b become constant toward their centers as has been previously found for Jupiter \citep{French2012}. However, Gliese-229b behaves differently and is characterized by a steady increase of the kinematic shear viscosity towards its center corresponding to the regions with densities above 100~g/cm$^3$. \subsection{Electrical and Thermal Conductivity}\label{subsec:El_Theo} The electrical $\sigma$ and thermal $\lambda$ conductivity are dominated by their electronic contributions, which can be obtained within the framework of LRT using the frequency-dependent Onsager coefficients~\citep{Holst2011} \begin{eqnarray} L_{mn}(\omega) = \frac{2\pi q^{4-m-n}}{3V m_e^2\omega}\sum_{\mathbf{k}\nu\mu} |\langle\mathbf{k}\nu|\hat{\mathbf{p}}| \mathbf{k}\mu \rangle|^2 (f_{\mathbf{k}\nu} - f_{\mathbf{k}\mu}) \nonumber\\ \times \!\left( \frac{E_{\mathbf{k}\mu}+E_{\mathbf{k}\nu}}{2}-h_e \!\right)^{m+n-2} \!\!\!\!\delta\!\left( E_{\mathbf{k}\mu} - E_{\mathbf{k}\nu} - \hbar\omega \right) .\; \end{eqnarray} The above equation contains the frequency $\omega$, the mass $m_e$ and charge $q=-e$ of the electron, the enthalpy per electron $h_e$, the eigenvalues $E_{\mathbf{k}\mu}$ with the Fermi-occupation number $f_{\mathbf{k}\mu}$ of the Bloch-state $|\mathbf{k}\mu \rangle$ as well as the matrix elements $\langle\mathbf{k}\nu|\hat{\mathbf{p}}| \mathbf{k}\mu \rangle$ with the momentum operator. According to this equation, there is a contribution to $L_{mn}(\omega)$ if the energy of an incident photon $\hbar\omega$ is equal to the difference of two eigenstates. The Onsager coefficient $L_{11}(\omega)=\sigma(\omega)$ is given by the frequency-dependent Kubo-Greenwood formula~\citep{Kubo1957,Greenwood1958}. The static limits of the electrical and thermal conductivity are obtained from their behavior at $\omega\to0$: \begin{eqnarray} \sigma &=& \lim_{\omega\to 0} L_{11}(\omega)\label{eq:LimSig}\quad,\\ \lambda &=& \lim_{\omega\to 0} \frac{1}{T}\left(L_{22}(\omega)-\frac{L_{12}^2(\omega)}{L_{11}(\omega)}\right)\quad. \label{eq:LimLam} \end{eqnarray} The ionic contributions to both quantities are neglected, since the considered objects are almost entirely composed of degenerate matter. In this regime both conductivities are governed by the faster electrons and, hence, can be derived from static DFT calculations. For each density--temperature condition we averaged over 20 snapshots using a 4x4x4 Monkhorst-Pack set to sample the Brillouin zone. Moreover, we used the PBE exchange-correlation functional~\citep{Perdew1996} throughout the calculation for the massive exoplanet and the two brown dwarfs, while the Jupiter results~\citep{French2012} we compare to were obtained using the HSE exchange-correlation functional~\citep{Heyd2006}. Typically, it is necessary to use the more sophisticated HSE exchange-correlation functional to describe the dissociation of hydrogen molecules appropriately. However, our three considered objects are dominated by degenerate matter with almost no hydrogen bonds so that the PBE functional yields reasonable results. Please note, that the addition of metals ($Z$) to the hydrogen-helium mixture would lead to slightly decreased conductivities due to stronger electron-ion scattering. The results for the electrical and thermal conductivities are shown in the upper panels in Figure~\ref{fig:sigma} and Figure~\ref{fig:lambda}, respectively. Additionally, the associated quantities magnetic diffusivity, \begin{equation}\label{eq:beta} \beta = \frac{1}{\sigma \mu_0} \quad, \end{equation} and thermal diffusivity, \begin{equation}\label{eq:kappa} \kappa = \frac{\lambda}{\varrho c_p} \quad, \end{equation} can be calculated from the conductivities, where $\mu_0$ is the vacuum permittivity. Both quantities are included in Table~\ref{tab:Trans} and the thermal diffusivity is shown in the lower panel of Figure~\ref{fig:lambda}. The electrical conductivity results are shown in Figure~\ref{fig:sigma}. Our DFT-MD results for KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green) are shown along with the model by \citet{Stevenson1977a} (dashed colored curves) as well as DFT-MD calculations for Jupiter (black line for HSE and open circles for PBE)~\citep{French2012}. The Jupiter results have been complemented by a prediction for the planet's rocky core shown as a dashed black curve. We assume that the core is made entirely of MgO and use a temperature of 20000~K and a density of 15~g/cm$^3$ as reference conditions~\citep{Cebulla2014}. Using the same approach as described for the hydrogen-helium mixture, we obtain an electrical conductivity of roughly 90000 S/m. This corresponds to a bad metal {and thus supports the boundary condition to a conducting core often made in magnetohydrodynamic simulations for Jupiter's magnetic field. \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Sigma} \caption{Electrical conductivity $\sigma$ along the considered isentropes. The results along the Jovian isentrope derived from DFT-MD calculations using the HSE (black line) and PBE (open black circles) functional are taken from~\cite{French2012}. Furthermore, data by \cite{Stevenson1977a} are shown.} \label{fig:sigma} \end{figure} The electrical conductivities from DFT-MD calculations have the steepest, super-exponential slope within the outermost 10\%, spanning a wide range of orders of magnitude. The values of our considered objects exceed the Jupiter results by at least 1.5 orders of magnitude. This is due to the significantly higher mass densities as well as electron densities $n_e$ in the massive objects compared to Jupiter. The electrical conductivity in degenerate matter is proportional to the Fermi energy, which in turn fulfills $E_F \sim n_e^{2/3}$. Additionally, helium is fully ionized under the conditions investigated in contrast to those present in Jupiter. Comparing our results to \cite{Stevenson1977a}, we find especially the orange curve of KOI-889b to agree remarkably well with their predictions below \mbox{0.7 $R_{Obj}$.} The electrical conductivity varies most in the interior of KOI-889b spanning four orders of magnitude. At the object's surface, as it is defined in section~\ref{sec:IntBrownie}, the hydrogen-helium mixture is not an insulator as has been predicted for Jupiter~\citep{French2012}. However, the conductivity is also not yet in the metallic range, so that this is most likely the region we introduce the largest error using the PBE instead of the HSE functional. This difference in functional amounts up to two orders of magnitude in the comparable region for Jupiter. Nevertheless, the electrical conductivity in KOI-889b as obtained with the PBE functional is eight orders of magnitude higher than the corresponding value in Jupiter at the same scaled radius. Furthermore, as shown by the Jupiter curves (see also \cite{French2012}, Figure~5), both exchange-correlation functionals agree well for the fully ionized regime. As the extent of the non-fully ionized region is negligibly small in the massive giant planet and the brown dwarfs, the utilization of the PBE instead of the HSE functional is justified. Furthermore, Figure~\ref{fig:sigma} includes the conductivity data used in \cite{Gastine2014}. This combines an exponential branch for the strong decay in the outer shell with a polynomial branch for the interior. Note that numerical dynamo simulations use dimensionless formulations. For easy comparison we scaled the electrical conductivity of \cite{Gastine2014} by the corresponding value from \cite{French2012} for $R=0.2~R_{\rm J}$. Though the conductivity in the Jupiter dynamo models does not decay as steeply as predicted by \cite{French2012}, the Jovian model is nevertheless reproduced convincingly \citep{Gastine2014,Duarte2018}. The extreme gradient, that is better captured by the hyperbolic fit used in the dynamo models by \cite{Jones2014} and \cite{Cao2017}, has little additional effect on the dynamo process. \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Lambda} \caption{Thermal conductivity $\lambda$ (upper panel) and thermal diffusivity $\kappa$ (lower panel) along the considered isentropes (solid lines) in comparison to the results given by~\cite{Stevenson1977a} (dashed lines). The data for Jupiter, including the ionic thermal conductivity $\lambda_i$ (dotted black line), were calculated by~\cite{French2012}.} \label{fig:lambda} \end{figure} The thermal conductivity is illustrated in the upper panel of Figure~\ref{fig:lambda} and resembles the general trend observed for the electrical conductivity. We find the thermal conductivity to exceed the respective values for Jupiter in the three considered objects at any given object radius. The slope of the colored curves is slightly steeper towards the objects' surfaces compared to Jupiter. Overall, the thermal conductivity is found to reach its smallest value at the surface of KOI-889b. Moreover, our results are in good agreement with the earlier predictions by \citet{Stevenson1977a} (dashed curves). Hence, their approach should work best for metals and degenerate matter as reflected by finding the smallest deviations between both predictions for the most massive object Gliese-229b. The dotted line in the upper panel of Figure~\ref{fig:lambda} shows the ionic contribution of the thermal conductivity in Jupiter~\citep{French2012} in contrast to the solid lines that only contain the electronic contribution. Evidently, the ionic contributions dominate the non-metallic region near the surface of Jupiter. Such calculations, requiring the computation of heat flows~\citep{French2012}, have not been performed for the more massive objects, since their non-metallic region is very small. Hence, we suggest to use the values provided for Jupiter by \cite{French2012} for the first outermost points of the massive objects. This is justified due to the similar thermodynamic conditions on the surface of all four objects, while the ionic contribution of the thermal conductivity varies only little with density and temperature. The same applies for the thermal diffusivity in the lower panel of Figure~\ref{fig:lambda}, which is the thermal conductivity scaled with the inverse of density and the specific heat capacity at constant pressure, see Equation~\eqref{eq:kappa}. The latter results show a significant deviation between our results and those by \cite{Stevenson1977a}, who used a rather simple approximation for the thermal diffusivity. Their analytic approach assumes a constant heat capacity $c_p$ and only requires the density as input. \begin{deluxetable*}{ccccccccccc} \tablecolumns{11} \tablewidth{0pc} \tablecaption{Linear transport properties of the massive giant planet KOI-889b as well as the brown dwarfs Corot-3b and Gliese-229b \label{tab:Trans}} \tablehead{ \colhead{object} & \colhead{r} & \colhead{m} & \colhead{T} & \colhead{$\sigma$} & \colhead{$\beta$} & \colhead{$\lambda$} & \colhead{$\kappa$} & \colhead{$\eta$} & \colhead{$\nu$} & \colhead{$\kappa_R$}\\ \colhead{} & \colhead{[R$_{\mathrm{obj}}$]} & \colhead{[M$_{\mathrm{obj}}$]} & \colhead{[K]} & \colhead{[S m$^{-1}$]} & \colhead{[m$^2$ s$^{-1}$]} & \colhead{[W (Km)$^{-1}$]} & \colhead{[m$^2$ s$^{-1}$]} & \colhead{[mPas]} & \colhead{[mm$^2$ s$^{-1}$]} & \colhead{[cm$^2$ g$^{-1}$]}} \startdata KOI-889b & 0.996 & 0.99996 & 4800 & 33.7 & 23600 & 0.022 & 1.32$\times10^{-8}$ & 0.078 & 0.776 & 1.02$\times10^{4}$\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ KOI-889b & 0.043 & 3.15$\times10^{-4}$ & 166000 & 4.61$\times10^{7}$ & 0.017 & 203020 & 2.91$\times10^{-4}$ & 23.56 & 0.506 & 3.10$\times10^{5}$\\ Corot-3b & 0.996 & 0.9558 & 7700 & 15000 & 53.05 & 3.100 & 7.66$\times10^{-7}$ & 0.149 & 0.719 & 5.61$\times10^{5}$\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ Corot-3b & 9.29$\times10^{-3}$ & 3.07$\times10^{-5}$ & 420000 & 1.265$\times10^{8}$ & 6.29$\times10^{-3}$ & 1.25$\times10^{6}$ & 6.27$\times10^{-4}$ & 92.78 & 0.679 & 4.38$\times10^{4}$\\ Gliese-229b & 0.998 & 1.0000 & 8000 & 3200 & 245.6 & 1.40 & 4.60$\times10^{-7}$ & 0.136 & 1.080 & 3.88$\times10^{5}$\\ \vdots & \vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots &\vdots & \vdots\\ Gliese-229b & 0.024 & 6.84$\times10^{-5}$ & 1.18$\times10^{6}$ & 2.32$\times10^{8}$ & 3.42$\times10^{-3}$ & 6.42$\times10^{6}$ & 8.83$\times10^{-4}$ & 581.0 & 1.300 & 3000\\ \enddata \tablenotetext{}{(This table is available in its entirety in machine-readable form.)} \end{deluxetable*} \subsection{Lorenz number} To check whether our results obey the theoretical predictions for a degenerate electron gas, we calculate the Lorenz number~\citep{Lorenz1872}, which is defined by the Wiedemann-Franz law \begin{equation} L=\frac{e^2}{k_B^2T}\frac{\lambda}{\sigma} \quad. \end{equation} \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Lorenz} \caption{The left panel shows the Lorenz number along the isentropes (solid lines) of Jupiter (black)~\citep{French2012}, KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green). The Wiedemann-Franz limit (dashed black line) is shown as well. The right panel shows the Lorenz number near the surface of the considered objects.} \label{fig:lorenz} \end{figure} The results are shown in Figure~\ref{fig:lorenz}. The Wiedemann-Franz law of $L=\pi^2/3$ is strictly valid only for the fully degenerate limit $\Theta\ll 1$. The results for Jupiter are about 6~\% higher, most likely due to the contribution of neutral helium atoms which are not ionized under these conditions. The exponential increase near the surfaces can be addressed to the transition from a liquid metal to a partially ionized plasma along the isentrope. For more compact objects this process is shifted towards the outer regions. Such a behavior of the Lorenz number for warm dense hydrogen has already been shown by \cite{Holst2011} for decreasing densities and temperatures (see Figure$\:$ 8 therein). \subsection{Opacity}\label{subsec:Opaz_Result} Further optical properties can be determined from the frequency-dependent electrical conductivity~\citep{French2011}. The imaginary part of the complex electrical conductivity $\sigma(\omega)=\sigma_1(\omega)+ \mathrm{i}\sigma_2(\omega)$ can be calculated using a Kramers-Kronig relation. The complex dielectric function $\epsilon(\omega)=\epsilon_1(\omega)+ \mathrm{i}\epsilon_2(\omega)$ then emerges from $\epsilon_1(\omega) = 1-\sigma_2(\omega)/\epsilon_0\omega$ and $\epsilon_2(\omega) = 1-\sigma_1(\omega)/\epsilon_0\omega$. For absorption features one needs to determine the complex refraction index via $\epsilon(\omega)$: $n(\omega) + \mathrm{i}k(\omega) = \sqrt{\epsilon({\omega})}$. The extinction-coefficient $k(\omega)$ and the speed of light $c$ yield the frequency-dependent absorption coefficient $\alpha(\omega)=2\omega k(\omega)/c$. Finally, we obtain the Rosseland mean opacity $\kappa_R$ as a measure for the optical thickness of a system~\citep{Kippenhahn1991}, \begin{equation} \frac{1}{\kappa_R} = \frac{15}{4\pi^4} \int \limits_0^{\infty} \frac{d\omega}{\alpha(\omega)}\frac{x^4\mathrm{e}^x}{(\mathrm{e}^x-1)^2} \quad, \end{equation} with the substitution $x=\hbar\omega/(k_BT)$. The inverse absorption coefficient is weighted with the derivative of the Planck function with respect to temperature. The resulting expression is integrated over all frequencies. $\kappa_R$ is an important quantity to determine, e.g., for describing radiation transport inside the objects. If the matter is optically thick, energy cannot be transported efficiently via radiation and convection becomes the dominant transport mechanism (Schwarzschild criterion). The following results for $\kappa_R$ from DFT-MD simulations only contain the electronic contributions. Rotational and vibrational excitations are neglected, which is justified for most of the interior (fully dissociated and ionized). However, the strong absorption of molecules, especially in the cool atmospheres of giant planets and brown dwarfs, is not considered. Likewise, we neglect absorption from heavier elements (oxygen, carbon, iron and noble gases) since the simulations are based on a representative mixture of hydrogen and helium. \begin{figure}[htb] \includegraphics[width=1.0\columnwidth]{./Opaz} \caption{Rosseland mean opacity $\kappa_R$ derived from DFT-MD calculations (solid curves) for KOI-889b (orange), Corot-3b (brown), and Gliese-229b (green). The respective values from the OPAL tables (dashed curves:~\cite{Rogers1998}) are shown as well.} \label{fig:opaz} \end{figure} In Figure~\ref{fig:opaz}, we compare our results (solid curves) to those from the OPAL tables~\citep{Rogers1994,Rogers1998} (dashed curves) obtained from interpolation of those tables with respect to the thermodynamic conditions along the isentropes of the objects. We find the highest opacities if the system contains bound electrons and the main contribution arises from bound-free transitions. Similar to the electrical conductivity this is the case in the outermost parts of KOI-889b and the brown dwarfs, where the conductivities increase in a super-exponential way. The thermodynamic states in the interior of an object become more extreme and thus more ionized with increasing mass. Hence, the maximum of $\kappa_R$ is closer to the surface than for less massive objects due to bound-free transitions. Therefore Gliese-229b (green curves) has the outermost location of the maximum of $\kappa_R$ compared to Corot-3b (brown curves) and KOI-889b (orange curves). The higher the pressure in the interior, the faster helium ionizes. Consequently, after the ionization of hydrogen bound-free transitions in helium disappear faster for massive objects, leading to a stronger slope of the opacity. Therefore, the slope of $\kappa_R$ inside KOI-889b towards the center is smaller than for Corot-3b and Gliese-229b. Qualitatively, the OPAL results show the same behavior as the DFT-MD curves but with a more pronounced maximum. OPAL treats the various absorption processes based on atomic physics codes and takes into account plasma effects such as line broadening and screening in an approximate way. The DFT-MD method considers these effects within the electronic structure calculations for given ion configurations consistently. \section{Implications for planetary and stellar dynamos}\label{sec:Implications} The Jupiter model data by \cite{French2012}, which served as a reference in the discussion above, have been used in numerical simulations of Jupiter's dynamo successfully reproducing the planet's large scale magnetic field \citep{Gastine2014,Jones2014,Duarte2018}. A particularly interesting feature is the dynamo action of the zonal winds that are driven by Reynolds stresses acting in the outer molecular layer. Where these winds reach down to sizable electrical conductivities, they modify the large scale field produced by a primary dynamo at greater depth \citep{Gastine2014}. This secondary dynamo creates banded structures at low latitude that have recently been confirmed by the Juno mission \citep{Connerney2018}. The numerical simulations suggest that these bands are the expression of pole-ward propagating waves \citep{Gastine2012}. The properties derived here suggest that the dynamics in large exoplanets or brown dwarfs may be very similar to the scenario explored for Jupiter. The molecular hydrogen envelope occupies a smaller fraction and has therefore largely not been considered here. We expect that, just like on Jupiter, these objects will harbor fierce zonal wind systems and the associated dynamo action. Concerning the deeper dynamics, it seems remarkable that the kinematic viscosity remains not only surprisingly similar to that in Jupiter but also remains more or less homogeneous and is thus virtually independent of the density. Moreover, since the thermal diffusivity increases relatively mildly with density while the opacity is huge, convective motions will likely remain the preferred mode of heat transport. Since exoplanets or brown dwarfs also seem to be relatively fast rotators with decent luminosities, their internal dynamos may operate in the same regime as, for example, Jupiter or many fully convective stars \citep{Reiners2010}. \cite{Christensen2009} and \cite{Yadav2013} show that the field strength of such objects is successfully predicted by a scaling law that formulates a simple dependence on the luminosity. For a typical brown dwarf, this law would predict a field of about $0.2\,$T \citep{Reiners2010}. Radio emissions confirm that several brown dwarfs indeed possess a magnetic field but indicate that the field strengths are somewhat larger \citep{Kao2016}. Recently, the first detection of Zeeman line broadening for a brown dwarf suggests a field of about $0.5\,$T, covering at least $10\,$\% of the surface. The reason why the scaling laws seem to underpredict the field strength remains unclear and may simply be an expression of the uncertainties \citep{Kao2016}. However, a dynamo simulation by \citet{Yadav2015} offers an alternative explanation. Dynamo simulations with a small Prandtl number, the ratio of kinematic viscosity to thermal diffusivity, show particularly strong localized surface field patches on top of a weaker larger scale background field. Such a combination has been observed for several low mass stars \citep{Reiners&Basri2009}. Zeeman line broadening as well as radio emission data may predominantly constrain the strong localized surface field while scaling laws mostly concern the deeper produced global field. In Jupiter, the magnetic Prandtl number becomes as small as $10^{-2}$ at depth \citep{French2012}. The data presented above suggest even smaller values in more massive objects, for example values down to $1.27\cdot10^{-3}$ in Gliese-229b. Dedicated dynamo simulations based on the properties presented here will be required to explore the possible particularities of the dynamics and magnetic fields in massive exoplanets and brown dwarfs. \section{Conclusions}\label{sec:Conclusion} We have determined the thermophysical properties of H-He mixtures for conditions inside massive giant planets and brown dwarfs based on \textit{ab initio} simulations. In particular, we discussed thermodynamic material properties, the Love number, the equidistance, as well as transport properties including the closely related opacity. The provided values represent a considerable extension of the dataset calculated for Jupiter by \cite{French2012}. In comparison to Jupiter, the underlying models \citep{Becker2014} start at greater pressures and temperatures where most of the hydrogen is already dissociated. The thermodynamic material properties and transport properties therefore largely lack the features that characterize the properties in Jupiter's outer envelope. For example, the extreme rise in electrical conductivity and the dissociation maximum in the heat capacities \citep{French2012} are absent for the considered massive objects. The properties of degenerate matter play an increasingly important role when the object mass grows. Overall, our dataset, combined with the Jupiter data by \cite{French2012}, increases our knowledge of extreme thermodynamic conditions, covering the broad mass range from Jupiter-sized giant planets up to brown dwarfs. This data will stimulate the development of new models for the interior structure, thermal evolution and internal dynamics of massive exoplanets and brown dwarfs. \acknowledgments We thank N.\ Nettelmann, M.\ French, D.\ Cebulla, M.\ Sch\"ottler, W.\ Lorenzen, and S.\ Hamel for helpful discussions and the anonymous referee for providing useful comments. This work was supported by the Deutsche Forschungsgemeinschaft within the SFB~652 and FOR 2440. The DFT-MD simulations were performed at the North-German Supercomputing Alliance (HLRN) and at the IT and Media Center of the University of Rostock. Mandy Bethkenhagen further acknowledges support by the U.S.\ Department of Energy at the Lawrence Livermore National Laboratory under Contract No.\ DE-AC52-07NA27344. \bibliographystyle{apj}
\section{Introduction} \label{sec:intro} \input{intro} \section{Related Work} \label{sec:related} \input{related} \section{Mining Hard Examples from Videos} \label{sec:method_hnm} \input{method_hnm} \section{Experiments} \label{sec:experiment} \input{experiment} \section{Discussion} \label{sec:discussion} \input{discussion} \section{Conclusion} \label{sec:conclusion} \input{conclusion} \section*{Acknowledgment} This research is based in part upon work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA) under contract number 2014-14071600010 and in part on research sponsored by the Air Force Research Laboratory and DARPA under agreement number FA8750-18-2-0126. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of ODNI, IARPA, the Air Force Research Laboratory and DARPA or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright annotation thereon. \bibliographystyle{splncs04} \subsection{On the Entropy of the False Positive Distribution} \noindent\textbf{On the Entropy of the False Positive Distribution.} In mining thousands of hard negatives from unlabeled video, we noticed a striking pattern in the hard negatives of face detectors. A large percentage of false positives were generated by a few types of objects. Specifically, a large percentage of hard negatives in face detectors seem to stem from human hands, ears, and the torso/chest area. Since it appears that a large percentage of the false positives in face detection are the result of a relatively small number of phenomena, this could explain the significant gains realized by modeling hard negatives. In particular, characterizing the distribution of hard negatives, and learning to avoid them, may involve a relatively small set of hard negatives. \input{exp_fddb} \input{exp_other_classes} \subsection{Retraining Detectors with Mined Hard Examples} \label{sec:fine-tuning} We experimented with two ways to leverage our mined \textit{hard negative} samples. In our initial experiments, a single mini-batch is formed by including one image from the original labeled training dataset and another image sampled from our automatically-mined hard negative video frames. In this way, positive region proposals are sampled from the original training dataset image, based on manual annotation, while negative region proposals are sampled from both the original dataset image and the mined hard negative video frame. Thus, we can \textit{explicitly} force the network to focus on the hard negatives from the mined video frame. However, this method did not produce better results in our initial experiments. An alternate approach was found to be more effective -- we simply provided the \textit{pseudo-positives} in the mined video frames as true object annotations during training and \textit{implicitly} allowed the network to pick the hard-negatives. The inclusion of video frames with \textit{hard positives} is more straightforward -- we can simply treat them as additional images with object annotations at training time. The models were fine-tuned with and without OHEM, and we consistently chose the setting that gave the best validation results. While OHEM would increase the likelihood of hard negatives being selected in a mini-batch, it would also place extra emphasis on any mislabels in the hard examples. This would magnify the effect of a small amount of label noise and can in some cases decrease the overall performance. \subsection{Ablation Settings} \label{sec:ablation_study} In addition to the comparisons to the baseline Faster R-CNN detectors, we conduct various ablation studies on the Caltech Pedestrian and WIDER Face datasets to address the effectiveness of hard example mining. \noindent\textbf{Effect of training iterations.} To account for the possible situation where simply training the baseline model longer may result in a gain in performance, we create another baseline by fine-tuning the original model for additional iterations with a lower learning rate, matching the number of training iterations used in our hard example trained models. We refer to this model as ``\texttt{w/ more iterations}''. \noindent\textbf{Effect of additional video frames.} Unlike the baseline detector, our fine-tuned models use additional video frames for training. It's possible that just using the high-confidence detection results on unlabeled video frames as \textit{pseudo-groundtruths} during training is sufficient to boost performance, without correcting the hard negatives using our detector flicker approach. Therefore we train another detector, ``\texttt{Flickers as Positives}'', starting from the baseline model, that takes exactly the same training set as our hard negative model, but where \textit{all} the high-confidence detections on the video frames are used as positive labels. \noindent\textbf{Effect of automatically mined hard examples.} We include the results from our proposed method of considering detector flickers as hard negatives and hard positives separately -- ``\texttt{Flickers as HN}'' and ``\texttt{Flickers as HP}''. Finally, we report results from fine-tuning the detector on the union of both types of hard examples (\texttt{Flickers as HN + HP}). \subsection{Pedestrian Detection} \label{sec:pedes} \input{exp_pedestrian} \subsection{Face Detection} \label{sec:face_wider} \input{exp_face} \begin{figure}[t] \centering \begin{tabular}{@{\extracolsep{2pt}}ccc} \includegraphics[width=0.32\linewidth]{hn_face/face2.jpg} & \includegraphics[width=0.32\linewidth]{hn_face/face4.jpg} & \includegraphics[width=0.32\linewidth]{hn_face/face5.jpg} \\ \includegraphics[width=0.32\linewidth]{hn_pede/pede1.jpg} & \includegraphics[width=0.32\linewidth]{hn_pede/pede3.jpg} & \includegraphics[width=0.32\linewidth]{hn_pede/pede6.jpg} \\ \end{tabular} \caption{{\bf Examples of hard negatives.} Visualization of mined hard negatives for faces (\textit{top row}) and pedestrians (\textit{bottom row}). Red boxes denote the ``detection-flicker cases'' among the high confidence detections (green boxes).} \label{fig:hardnegatives} \end{figure} \begin{figure} \centering \begin{tabular}{c c c c c c c } & Groundtruth & Baseline & HN & HP & HP+HN \\ F1 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/gt_0--Parade_0_Parade_Parade_0_247} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/baseline_0--Parade_0_Parade_Parade_0_247} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_0--Parade_0_Parade_Parade_0_247} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hp_0--Parade_0_Parade_Parade_0_247} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_hp_0--Parade_0_Parade_Parade_0_247} \end{minipage} \\ F2 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/gt_0--Parade_0_Parade_marchingband_1_556} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/baseline_0--Parade_0_Parade_marchingband_1_556} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_0--Parade_0_Parade_marchingband_1_556} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hp_0--Parade_0_Parade_marchingband_1_556} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_hp_0--Parade_0_Parade_marchingband_1_556} \end{minipage} \\ F3 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/gt_26--Soldier_Drilling_26_Soldier_Drilling_Soldiers_Drilling_26_832} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/baseline_26--Soldier_Drilling_26_Soldier_Drilling_Soldiers_Drilling_26_832} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_26--Soldier_Drilling_26_Soldier_Drilling_Soldiers_Drilling_26_832} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hp_26--Soldier_Drilling_26_Soldier_Drilling_Soldiers_Drilling_26_832} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_hp_26--Soldier_Drilling_26_Soldier_Drilling_Soldiers_Drilling_26_832} \end{minipage} \\ F4 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/gt_28--Sports_Fan_28_Sports_Fan_Sports_Fan_28_751} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/baseline_28--Sports_Fan_28_Sports_Fan_Sports_Fan_28_751} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_28--Sports_Fan_28_Sports_Fan_Sports_Fan_28_751} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hp_28--Sports_Fan_28_Sports_Fan_Sports_Fan_28_751} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_wider_dets/hn_hp_28--Sports_Fan_28_Sports_Fan_Sports_Fan_28_751} \end{minipage} \\ \\ P1 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/gt_set07_V003_1620} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/baseline_set07_V003_1620} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_set07_V003_1620} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hp_set07_V003_1620} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_hp_set07_V003_1620} \end{minipage} \\ P2 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/gt_set06_V001_1590} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/baseline_set06_V001_1590} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_set06_V001_1590} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hp_set06_V001_1590} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_hp_set06_V001_1590} \end{minipage} \\ P3 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/gt_set06_V006_330} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/baseline_set06_V006_330} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_set06_V006_330} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hp_set06_V006_330} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_hp_set06_V006_330} \end{minipage} \\ P4 & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/gt_set06_V004_1350} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/baseline_set06_V004_1350} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_set06_V004_1350} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hp_set06_V004_1350} \end{minipage} & \begin{minipage}{.18\textwidth} \includegraphics[width=\linewidth]{image/viz_caltech_dets/hn_hp_set06_V004_1350} \end{minipage} \\ \end{tabular} \caption{\textbf{Qualitative comparison.} Faster R-CNN detections for faces (F1-4) and pedestrians (P1-4).The detector fine-tuned with hard negatives (HN) reduces false positives compared to the Baseline (F-1,3,4; P-1,2,3), but can sometimes lower the recall (P4). Hard positives (HP) increases recall (F2, P4) but can also introduce false positives (F4). Using both (HP+HN) the detector is usually able to achieve a good balance.} \label{fig:vis_dets_hn_hp} \end{figure} \subsection{Video Collection} \label{sec:data-collect} To mine hard examples for face detection, we used 101 videos from sitcoms, each with a duration of 21-25 minutes and a full-length movie of 1 hour 47 minutes, \textit{``Hannah and her sisters''}~\cite{ozerov2013evaluating}. Further, we performed YouTube searches with keywords based on: \textit{public address}, \textit{debate society}, \textit{orchestra performance}, \textit{choir practice} and \textit{courtroom}, downloading 89 videos of durations ranging from 10 to 25 minutes. We obtained videos that were expected to feature a large number of human faces in various scenes, reflecting the everyday settings of our face benchmarks. Similarly, for pedestrian detection, we collected videos from YouTube by searching with the two key phrases: {\em driving cam videos} and {\em walking videos}. We obtained 40 videos with an average duration of about 30 minutes. \subsection{Hard Negative Mining} \label{sec:mining} Running a pre-trained face detector on every frame of a video gives us a large set of detections with noisy labels. We crucially differ here from recent bootstrapping approaches~\cite{wan2016bootstrapping,sun2017face} by (a) using large amounts of \textit{unlabeled} data available on the web instead of relying only on the limited fully-supervised training data from WIDER Face~\cite{yang16wider} or Caltech Pedestrians~\cite{dollar2009pedestrian}, and (b) having a novel filtering criterion on the noisy labels obtained from the detector that retains the hard negative examples and minimizes noise in the obtained labels. The raw detections from a video were thresholded at a relatively high confidence score of 0.8. For every detection in a frame, we formed a short tracklet by performing template matching in adjacent frames, within a window of $\pm 5$ frames --- the bounding box of the current detection was enlarged by 100 pixels and this region was searched in adjacent frames for the best match using normalized cross correlation (NCC). To account for occlusions, we put a threshold on the NCC similarity score (set as 0.5) to reject cases where there was a lot of appearance-change between frames. Now in each frame, if the maximum intersection-over-union (IoU) between the tracklet prediction and detections in the adjacent frames was below 0.2, we considered it to be an isolated detection resulting from \textbf{detector flicker}. These isolated detections were taken as \textbf{\textit{hard negatives}}. The detections that \textit{were} found to be consistent with adjacent frames were considered to have a high probability of being true predictions and were termed \textbf{\textit{pseudo-positives}}. For the purpose of creating the re-training set, we kept only those frames that had at least one pseudo-positive detection in addition to one or more hard negatives. Illustrative examples of this procedure are shown in Figure~\ref{fig:example_face_negative}, where we visualize only the previous and next frames for simplicity. \subsection{Results of Automatic Hard Negative Mining} \label{sec:stats} Our initial mining experiments were performed using a standard Faster R-CNN detector trained on WIDER Face~\cite{yang16wider} for faces and Caltech~\cite{dollar2009pedestrian} for pedestrians. We collected 13,888 video frames for faces, where each frame contains at least one pseudo-positive and one hard negative (detector flicker). To verify the quality of our automatically mined hard negatives, we randomly sampled 511 hard negatives for inspection. 453 of them are true negatives, while 16 samples are true positives, and 42 samples are categorized as {\em ambiguous}, which correspond extreme head pose or severe occlusions. The precision for true negatives is 88.65\% and precision for true negatives plus {\em ambiguous} is 96.87\%. For pedestrians, we collected 14,967 video frames. We manually checked 328 automatically mined hard negatives, where 244 of them are true negatives and 21 belong to \emph{ambiguous}. The precision for true negatives is 74.48\% and precision for true negatives plus \emph{ambiguous} is 82.18\%. To further validate our method on an existing fully-annotated video dataset, we used the Hannah dataset~\cite{ozerov2013evaluating}, which has every frame annotated with face bounding boxes. Here, out of 234 mined hard negatives, 187 were true negatives, resulting in a precision of 79.91\%. We note that the annotations on the Hannah movie are not always consistent and involve a significant domain shift from WIDER. Considering the fact no human supervision is provided, the mined face hard negatives are consistently of high quality across various domains. \subsection{Extension to Hard Positive Mining} \label{sec:hpm} In principle, the same concept for using detector flickers can be directly applied to obtaining \textbf{\textit{hard positives}}. The idea is to look for ``off-flickers" of a detector in a video tracklet -- given a series of detections of an object in a video, such as a face, we can search for single frames that have no detections but are surrounded by detections on either side. Of course, these could be caused by short-duration occlusions, for example, but a large percentages of these ``off-flickers'' are hard positives, as in Fig.~\ref{fig:hardpositive}. We generate tracklets using the method from~\cite{erdosrenyi} and show results incorporating hard positives on pedestrian and face detection in the experiments section. The manually calculated purity over 300 randomly sampled frames was 94.46\% for faces and 83.13\% for pedestrians. \begin{figure}[tb] \centering \begin{tabular}{@{\extracolsep{2pt}}ccccc} \includegraphics[width=0.19\linewidth]{image/hp2} & \includegraphics[width=0.19\linewidth]{image/hp2} & \includegraphics[width=0.19\linewidth]{image/hp3} & \includegraphics[width=0.19\linewidth]{image/hp4} & \includegraphics[width=0.19\linewidth]{image/hp5} \\ frame $f$-2 & frame $f$-1 & frame $f$ & frame $f$+1 & frame $f$+2\\ \end{tabular} \caption{{\bf Hard positive samples.} Given a sequence of video frames, the face of the actor is consistently detected except at frame $f$. Such isolated ``off-flickers'' can be harvested in an unsupervised fashion to form a set of \textit{hard positives}. } \label{fig:hardpositive} \end{figure}
\section{Introduction} In recent years, growing research interest is witnessed in automated driving systems (ADS) and advanced driver-assistance systems (ADAS). As one of the essential modules, road segmentation perceives the surroundings, detects the drivable region and builds an occupancy map \cite{hillel2014RoadDetection}\cite{alahi2016LSTM_Human_Traj}\cite{lyu2018ISCAS}\cite{lyu2018chipnet}. A drivable region is a connected road surface area that is not occupied by any vehicles, pedestrians, cyclists or other obstacles. In the ADS workflow, road segmentation contributes to other perception modules and generates an occupancy map for planning modules. Therefore, an accurate and efficient road segmentation is necessary. Camera-based road segmentation has been investigated for decades since cameras generate high-resolution frames frequently and they are cost effective. Traditional computer vision algorithms employed manually defined features such as edges \cite{yoo2013gradient} and histogram \cite{yoo2013IlluminationRobustLaneDetection} for road segmentation. Those features, however, worked on limited situations and were difficult to extend to new scenarios \cite{hillel2014RoadDetection}. Convolutional neural network (CNN) based algorithms attracted research interest in recent years. By implementing massive convolutional kernels to a deep neural network, CNNs are capable to handle various driving scenarios. Existing CNN based road segmentation algorithms such as FCN \cite{long2015fully}, SegNet \cite{badrinarayanan2015Segnet}, StixelNet \cite{levi2015stixelnet}, Up-conv-Poly \cite{oliveira2016UpConv} and MAP \cite{laddha2016map} generated a precise drivable region but required large computational. Table \ref{Table: Evaluation result} presents their performance on KITTI road benchmark as well as their parameter counts, floating-point operations and running time for each frame processing. Recent research proposed several efficient networks and network structures such as MobileNet \cite{Howard2017MobileNets_Google} and Xception \cite{DBLP:journals/corr/Chollet16a}. However, they were still too large to work on embedded systems. In our previous work \cite{zhou2018RoadNet} we explored the use of CNN stack to process the camera data and implemented on a VLSI die but experienced high memory usage. Long-Short Term Memory (LSTM) is a kind of recurrent neural networks (RNNs) that are often used to process streaming data such as an audio signal and video sequences. By introducing memory cells and gates, LSTM units are capable to extract context features in a long sequence of inputs. Recently, distributed LSTMs are introduced to share the LSTM kernel weights in multi-sequence processing. However, LSTM and distributed LSTM algorithms only focus on time-domain processing. In this paper, we introduce the distributed LSTM to work on spatial domain and process row sequences on camera frames and corresponding feature maps. This is one of the first efforts to LSTM on spatial sequence processing. We also propose a deep neural network that combines the convolutional layer and distributed LSTM layers on the spatial domain to solve road segmentation tasks. The proposed network is trained and tested on the KITTI road benchmark \cite{fritsch2013KITTI_road}. It is shown that the proposed method achieves comparable accuracy to the existing solutions but takes fewer calculations and less processing time. The result shows that LSTM structures significantly enhance the context feature extraction in a large feature map. The rest of the paper is organized as follows: Section \ref{sec:Comparison of CNN and distributed LSTM}compares the scheme of the convolutional layer and the distributed LSTM layer on feature map processing. Section \ref{sec:RoadNet-v2} introduces the proposed network that combines CNN and distributed LSTM. In Section \ref{sec:Network implementation =000026 training}, we evaluate the proposed network in the KITTI road benchmark. Section \ref{sec:Conclusion} concludes the paper. \section{Comparison of convolutional layer and distributed LSTM layer\label{sec:Comparison of CNN and distributed LSTM}} In this section, we compare the scheme, sensing area and computational complexity of CNN and distributed LSTM structure in a feature map processing and try to show their advantages and disadvantages in feature map processing. Suppose we have a feature map that is formatted as a $w_{1}\times h_{1}\times d_{1}$ tensor. A convolutional kernel of size $w_{k}\times h_{k}\times d_{x}$, stride $(s_{w},s_{h})$ and padding $(p_{w},p_{h})$ is designed to process the feature map. The scheme is described in Figure \ref{Fig: Scheme of Convolutional Neural Network}(a). The kernel initially convolutes the first patch in red and generates a $1\times1\times d_{k}$ vector. Then the kernel strides certain pixels to the right and convolutes the next patch. After all available patches are convoluted, a $w_{2}\times h_{2}\times d_{2}$ output tensor is generated. (1) - (3) presents the relationship between the size of output tensor, input tensor and kernel settings. In each step there are $w_{k}\times h_{k}\times d_{1}$ inputs contribute to a $1\times1\times d_{k}$ output vector. Floating-point operations for this layer is $w_{2}\times h_{2}\times d_{1}\times w_{k}\times h_{k}\times d_{k}\times2$. \begin{equation} w_{2}=\left[\frac{w_{1}+2p_{w}}{s_{w}}\right] \end{equation} \begin{equation} h_{2}=\left[\frac{h_{1}+2p_{h}}{s_{h}}\right] \end{equation} \begin{equation} d_{2}=d_{k} \end{equation} On the other hand, suppose we have a feature map of the same size, and we now have $h_{1}$ distributed LSTM units with $d_{l}$ memory cells. The units share the same weights and bias but work on different rows of the feature map. In addition, we configure the LSTM units to return an output vector in each step. The scheme is illustrated in Figure \ref{Fig: Scheme of Convolutional Neural Network}(b). In each step, each distributed LSTM unit inputs a $1\times1\times d_{1}$ vector, updates its memory states through gate functions and output a $1\times1\times d_{l}$ vector. Therefore, the distributed LSTM layer generates a $w_{1}\times h_{1}\times d_{l}$ output tensor. In the $i^{th}$ step, there are $i\times d_{1}$ inputs contribute to a $1\times1\times d_{l}$ output tensor. Floating-point operations for this layer is $w_{1}\times h_{1}\times8\times d_{1}\times d_{l}$. Comparing the convolutional layer and distributed LSTM layer, we have the following conclusions: (1) If convolutional layer and distributed LSTM layer have the same output size, the ratio of the floating-point operations is $w_{k}\times h_{k}:4$. Considering that $w_{k}\geqslant3$ and $h_{k}\geqslant3$ , a distributed LSTM layer save at least 56\% floating-point operations than a convolutional layer. (2) If convolutional layer and distribute LSTM layer have the same output size, the ratio of the average number of contributing input cells is $9:w_{1}/2$. Considering that $w_{1}$ is hundreds to thousands in a feature map, a distributed LSTM layer has a much larger sensing area than convolutional layers. (3) Each kernel in a convolutional layer has a sensing area covering multiple rows but each unit in a distributed LSTM layer works on a single row. Therefore, a convolutional layer has a better feature extraction vertically. (4) A convolutional layer can generate a smaller feature map by setting the $s_{w}$ and $s_{h}$ greater than one, but a distributed LSTM layer cannot. Therefore, in a deep neural network, a convolutional layer is useful to narrow the feature map to enlarge the equivalent sensing area for the following layers and save their floating-point operations. (5) We can combine the convolutional layer and distributed LSTM layer layers in a deep neural network, and the new network should take fewer calculations but has an enhanced ability to extract context features in horizontal. \begin{figure} \begin{centering} \begin{tabular}{cc} \multicolumn{2}{c}{\includegraphics[width=0.9\columnwidth]{0_home_yecheng_ISCAS2019_Scheme_Comparison.png}}\tabularnewline (a) Convolutional Layer & (b) Distributed LSTM layer\tabularnewline \end{tabular} \par\end{centering} \caption{Comparison of convolutional layer and distributed LSTM layer schemes\label{Fig: Scheme of Convolutional Neural Network}} \end{figure} \section{Proposed Network \label{sec:RoadNet-v2}} This section introduces the proposed neural network. The network targets to solve a sequential regression problem whose input is a multi-layer feature and whose output is a row vector that has the same width of the input. The network contains three (1) a CNN based local feature encoder, (2) a CNN and LSTM based feature processor, and (3) a CNN based output decoder. Figure \ref{fig: Network-Diagram} presents an overview of network architecture. \subsection{Local feature encoder} The local feature encoder is a group of convolutional layers designed to extract local features and narrow the feature map size. Commonly a CNN based encoder cascades several convolutional layers with small kernels into blocks because those blocks have fewer parameters to train but work better in non-linear feature extraction. Those blocks are obvious in FCN \cite{long2015fully}, SegNet \cite{badrinarayanan2015Segnet}, and StixelNet \cite{levi2015stixelnet}. In our work, we cascade six convolutional layers with a $3\times3\times64$ kernel and group them two by two. The first layer in each group is configured to $stride=(2,2)$ and the second layer is configured to $stride=(1,1)$. Therefore, in each group the size of output tensor is half the size of its input tensor in both in both axes. Eventually an input tensor of size $w_{1}\times h_{1}\times d_{1}$ will result in a $\frac{w_{1}}{8}\times\frac{h_{1}}{8}\times64$ output tensor. \subsection{Feature Processor} The feature processor is designed to extract context features over the entire feature map. It is built by several blocks of convolutional layers and distributed LSTM layers. Each block includes a convolutional layer of $3\times3\times64$ kernel and a distributed LSTM layer of $64$ memory states. In the feature processor blocks, there is no pooling layer added so that the input and output tensor have the same size. \subsection{Output decoder} The output decoder is designed to decode the output tensor of the feature processor to a final row vector. The decoder upsamples the feature map in horizontal but further narrow the feature map in vertical. Since our decoder concentrates on the upper boundary of the drivable region that connects to the bottom of image frame, it has fewer layers, parameters and calculations than the decoder in SegNet. The decoder includes several convolutional layers, and an upsampling layer. The output size is $w_{1}\times1\times1$. \begin{figure} \begin{centering} \includegraphics[width=0.9\columnwidth]{1_home_yecheng_ISCAS2019_Network_Structure.png} \par\end{centering} \caption{Diagram of the proposed network\label{fig: Network-Diagram}} \end{figure} \section{Network implementation, training and testing \label{sec:Network implementation =000026 training}} In this section, we evaluate the performance of the proposed network using KITTI road benchmark. We first introduce the benchmark and then present our solution using the proposed network. We also present the training scheme for the training set and test result from the testing set. \subsection{KITTI road benchmark} KITTI road benchmark is a widely used benchmark for drivable region segmentation. It contains $290$ training samples and $289$ testing samples recorded in a real driving scenario. The size of camera frames in the benchmark is $1242\times375$ or $1224\times370$. The drivable region is manually labeled in a binary map of the same size. In the KITTI road benchmark, F1-score (F1) and average precision (AP) are the main metrics to evaluate the accuracy of road segmentation solutions. Other metrics are precision (PRE), recall (REC), false positive rate (FPR), false negative rate (FNR) and running time. The metrics are calculated as in (4) - (9) where TP, TN, FP, FN denote true positive, true negative, false positive, and false negative. \begin{equation} PRE=\frac{TP}{TP+FP} \end{equation} \begin{equation} REC=\frac{TP}{TP+FN} \end{equation} \begin{equation} FPR=\frac{FP}{TP+FP} \end{equation} \begin{equation} FNR=\frac{FN}{TP+FN} \end{equation} \begin{equation} F1=\frac{2\cdot PRE\cdot REC}{PRE+REC} \end{equation} \begin{equation} AP=\frac{TP+TN}{TP+FP+TN+FN} \end{equation} \subsection{Scheme of road segmentation } \subsubsection{Pre-processing} In pre-processing, we apply a pyramid approach that generates two input tensors from each camera frame. The first input tensor focus on near-range segmentation and the second one focus on far-range segmentation. For the first one, the camera frame is scaled to size $600\times160$. For the second input tensor, however, the camera frame is cropped to size $600\times160$ in the center. Those two images are then fed into the tensors together with their horizontal and vertical indexes in their own image coordinate. The pyramid scheme narrows the difference between local features in the near range and far range. It also enlarges the training set for better parameter tuning. After pre-processing, those two input tensors of size $600\times160\times5$ are processed by two network instances in parallel. \subsubsection{Network implementation} The proposed network is implemented in the Keras platform with TensorFlow backend as described in Section \ref{sec:RoadNet-v2}. The details of each layer are presented in Table \ref{Table:Detailed-Network-Blocks}. The network has 348,801 parameters and takes 3.45 billion floating-point operations to process each input tensor. Table \ref{Table: Evaluation result} compares the proposed network with related works on accuracy, network parameters, floating-point operations and running time for each camera frame. The proposed network has only 24\% parameters and takes 1.36\% floating-point operations when comparing to SegNet. \begin{table} \caption{Detailed Network Blocks\label{Table:Detailed-Network-Blocks}} \centering{}% \begin{tabular}{|>{\centering}m{1.4cm}|>{\centering}m{1.7cm}|>{\centering}m{1.6cm}|>{\centering}m{1.7cm}|} \hline Layer & Kernel $(w_{1}\times h_{1}\times d_{1})$ & Input $(w\times h\times d)$ & Output $(w_{2}\times h_{2}\times d_{1})$\tabularnewline \hline Input & $-$ & $600\times160\times5$ & $-$\tabularnewline \hline Conv1 s=2 & $3\times3\times64$ & $600\times160\times5$ & $600\times160\times64$\tabularnewline \hline Conv2 & $3\times3\times64$ & $600\times160\times64$ & $600\times160\times64$\tabularnewline \hline Conv3 s=2 & $3\times3\times64$ & $300\times80\times64$ & $300\times80\times64$\tabularnewline \hline Conv4 & $3\times3\times64$ & $300\times80\times64$ & $300\times80\times64$\tabularnewline \hline Conv5 s=2 & $3\times3\times64$ & $150\times40\times64$ & $150\times40\times64$\tabularnewline \hline Conv6 & $3\times3\times64$ & $150\times40\times64$ & $150\times40\times64$\tabularnewline \hline Conv7 & $3\times3\times64$ & $75\times20\times64$ & $75\times20\times64$\tabularnewline \hline D-LSTM 1 & $64$ & $75\times20\times64$ & $75\times20\times64$\tabularnewline \hline Conv8 & $3\times3\times64$ & $75\times20\times64$ & $75\times20\times64$\tabularnewline \hline D-LSTM 2 & $64$ & $75\times20\times64$ & $75\times20\times64$\tabularnewline \hline Conv9 & $1\times5\times64$ & $75\times20\times64$ & $75\times4\times64$\tabularnewline \hline Conv10 & $1\times4\times1$ & $75\times4\times64$ & $75\times1\times$1\tabularnewline \hline Up- sample & $8\times1\times1$ & $75\times1\times1$ & $600\times1\times1$\tabularnewline \hline Output & $-$ & $-$ & $600\times1\times1$\tabularnewline \hline \end{tabular} \end{table} \subsubsection{post-processing} After processing two input tensors in the network, we now have results as two row vectors. The elements in the row vector denote the vertical position of the drivable region boundary in the corresponding column. To transform the row vectors to a drivable region on the camera frame, we draw a polygon that connects corresponding vertices and the bottom line. At last, we scale the first result map to the original size and overwrite the center pixels using the second result map as illustrated in Figure \ref{Fig: Pyramid Prediction}. \begin{table*}[!t] \centering{}\caption{Comparison between networks on the KITTI\cite{fritsch2013KITTI_road} road segmentation challenge: F1-score (F1), average precision (AP), precision (PRE), recall (REC), false positive rate (FPR), false negative rate (FNR), number of parameters (Para), floating operations (FL-OPs) and runtime\label{Table: Evaluation result}} \begin{tabular}{|c|c|c|c|c|c|c|c|c|c|} \hline Method & F1 & AP & PRE & REC & FPR & FNR & Para & FLOPs & Runtime\tabularnewline \hline \hline ours & 89.08\% & 91.60\% & 88.12\% & 90.06\% & 6.69\% & 9.94\% & 0.35M & 6.9B & 16 ms\tabularnewline \hline ours without LSTM & 81.84\% & 73.27\% & 81.66\% & 82.02\% & 10.15\% & 17.98\% & 0.36M & 7.0B & 16 ms\tabularnewline \hline MAP\cite{laddha2016map} & 87.80 \% & 89.96\% & 86.01\% & 89.66\% & 8.04\% & 10.34\% & 457.43M & 7.15B & 280ms\tabularnewline \hline StixelNet\cite{levi2015stixelnet} & 89.12\% & 81.23\% & 85.80\% & 92.71\% & 8.45\% & 7.29\% & 6.82M & 43.0B & 1s\tabularnewline \hline Up-Conv-Poly\cite{oliveira2016UpConv} & 93.83\% & 90.47\% & 94.00\% & 93.67\% & 3.29\% & 6.33\% & 19.44M & 31.5B & 83ms\tabularnewline \hline \end{tabular} \end{table*} \begin{figure} \includegraphics[width=0.95\columnwidth]{2_home_yecheng_ISCAS2019_Pyramid_Prediction.png}\caption{An illustration of the pyramid prediction scheme} \label{Fig: Pyramid Prediction} \end{figure} \subsection{Network training and testing } The proposed network is trained in KITTI road training set. There are $289$ training samples and the image sizes range from $1242\times375$ to $1224\times370$. The ground truth of each sample is formatted as a binary image with the same size. To augment the training set we scale the sample images by $0.5$ and $1.0$ and then use a sliding window of size $600\times160$ to capture the images and labels. The stride of the sliding window is $60$ pixels in horizontal and $20$ pixels in vertical. Finally, $20,808$ samples are generated. Those samples are separated into a $20,000$ sample training set and an $808$ sample validating set. We also add Gaussian noise to the input data with a standard deviation of $0.02\%$ for additional diversity. Adam \cite{Kingma2015Adam} is a gradient descent based optimizer that adjusts learning rate on each neuron according to the estimation of lower-order moments of the gradients. We choose this optimizer because it accelerates the converging process in the beginning and slows it down near optimum. During training, the input batch size is set to $100$ and reference learning rage is set to $1e^{-5}$. After training $80$ epochs we get $0.0185$ mean average error on validation data. We then apply the network on the KITTI road testing set and submit to the benchmark server. The result shows that the proposed solution achieved $89.08\%$ in F1-score and $91.60\%$ in average precision (AP), which are comparable to the existing approaches. In Table \ref{Table: Evaluation result} our work is compared to the related solutions listed on the KITTI road benchmark. It shows that our work has a similar F1-score and AP to other works but a higher precision and lower false positive rate. The proposed network has fewer parameters to train and takes less floating-point operations to process. When testing on an NVidia GTX 950M GPU, the proposed solution achieved 16 ms/frame network runtime. We also trained a pure-CNN network by replacing the distributed LSTM layers with $3\times3$ convolutional layers. The accuracy of the pure-CNN solution is worse than that of CNN-LSTM solution, as shown in Table \ref{Table: Evaluation result}. Figure \ref{Fig: Typical Result} shows the typical result of the proposed road detector. Green pixels are true positives, red pixes are false negatives, and blue pixels are false positives. It is obvious that most of the road surface is detected, and obstacles such as vehicles and railways are separated to avoid collisions. False negatives occasionally appear at road-vehicle and road-sidewalk interfaces , which is not a safety concern for automated driving. However, false positive on the sidewalks needs further corrections. \begin{figure} \begin{centering} \begin{tabular}{c} \includegraphics[width=0.75\columnwidth]{3_home_yecheng_ISCAS2019_typical_result1.png}\tabularnewline \includegraphics[width=0.75\columnwidth]{4_home_yecheng_ISCAS2019_typical_result2.png}\tabularnewline \end{tabular} \par\end{centering} \caption{Typical road segmentation results } \label{Fig: Typical Result} \end{figure} \section{Conclusion \label{sec:Conclusion}} In this paper, we compare the convolutional layer and distributed LSTM layer and demonstrate the advantages of combing the CNN and LSTM structures for spatial feature map processing. We also propose a neural network to evaluate its performance. The test result on the KITTI road benchmark shows that our solution achieves 89.08\% in F1-score and 91.60\% in average precision. However, the image-based road segmentation is subjected to illumination conditions. Shadows, blurs, and ambiguous textures can cause false positives and false negatives. In future work, a fusion of multiple sensors including camera, LiDAR and radar will be applied to improve the road segmentation as well as object detection. \section{Acknowledgement} This work is supported by U.S. NSF Grant CNS-1626236. \newpage{} \bibliographystyle{unsrt}
\section{Introduction}\label{sectionintroduction} If you can solve the differential equation $f'(t)-iwf(t)=g(t)$ and compute a simple contour integral then you can prove the Fourier transform inversion theorem. In this paper we prove an elementary inversion formula for the Fourier transform. Our proof depends on a contour integral representation of the Heaviside step function and requires solving a linear first order ordinary differential equation, for which a solution integral is well known. We have stated our results for Lebesgue integrals but it is easy enough to rephrase them for absolutely convergent improper Riemann integrals. If $f\!:\!{\mathbb R}\to{\mathbb R}$ then its Fourier transform is $\hat{f}(s)=\int_{-\infty}^{\infty} e^{-isx}f(x)\,dx$ where $s\in{\mathbb R}$. A sufficient condition for existence of $\hat{f}$ on ${\mathbb R}$ is that $\int_{-\infty}^{\infty} \abs{f(x)}\,dx$ exists, i.e., $f\in L^1({\mathbb R})$. In this case, $\hat{f}$ is uniformly continuous on ${\mathbb R}$ and $\lim_{\abs{s}\to\infty} \hat{f}(s)=0$ (Riemann--Lebesgue lemma). The inversion formula is \begin{equation} f(x)=\frac{1}{2\pi}\int_{-\infty}^{\infty} e^{isx}\hat{f}(s)\,ds.\label{inversionformula} \end{equation} However, this equation must be taken with a grain of salt since in general the integral diverges! If $f\in L^1({\mathbb R})$ then $\hat{f}$ is continuous so we will have local integrability of $e^{isx}\hat{f}(s)$ over compact intervals in $s$ but unless further conditions are imposed on $f$ then we need not have $\hat{f}\in L^1({\mathbb R})$. In Theorem~\ref{theoremtransform} we prove an inversion theorem under the hypothesis that $f$ is absolutely continuous with $f$ and $f'$ in $L^1({\mathbb R})$ and then the integral in \eqref{inversionformula} converges as a principal value integral in the sense $\lim_{R\to\infty}\int_{-R}^R e^{isx}\hat{f}(s)\,ds$. Our proof readily extends to functions of several variables, for which we need a discussion of Carath\'{e}odory's notion of absolute continuity. We obtain the inversion theorem in ${\mathbb R}^2$ in Theorem~\ref{theoremtransformxy}, from which it is clear how inversion in ${\mathbb R}^n$ would be proved. The method also makes it easy to prove Riemann's localization result (Corollary~\ref{corollarylocalisation}). The literature on Fourier analysis is vast and there are many methods of obtaining formulas similar to \eqref{inversionformula} under various hypotheses. One such hypothesis is that if $f$ and $\hat{f}$ are in $L^1({\mathbb R})$ then \eqref{inversionformula} holds \cite[Theorem~8.26]{folland}. A sufficient condition for $\hat{f}\in L^1({\mathbb R})$ is that $f,f',f''\in L^1({\mathbb R})$ with $f'$ absolutely continuous. The result follows integration by parts using Lemma~\ref{lemmaff'} below- see also \cite{gasquet}. Some other methods are: extending Fourier series results \cite{bachman}, \cite{boas}; convolution with a summability kernel (approximate identity) in the $L^p$ norm for $1\leq p\leq 2$ \cite{bachman}, \cite{folland} (When $p=2$ this is called convergence in the mean sense.); spectral resolution of the differential operator $d^2/dx^2 + s^2$ using the Titchmarsh--Weyl--Kodaira theorem and integral representation of the Green function \cite[pp.~1380-1382]{dunfordschwartz}, \cite[7.3]{stakgold}, \cite{titchmarsheigen}, \cite[p.~256]{weidmann}, \cite[p.~194]{yosida}. Various other methods are covered in \cite{bachman} and \cite{titchmarsh}. Many of the methods in the above literature require substantial machinery. The proofs we give do not depend on any other results from Fourier analysis but only on elementary manipulations of integrals on the real line and in the complex plane, and solution of a simple ordinary differential equation. We will see that there are two essential ingredients. One is the fundamental theorem of calculus in the form $\int_a^bF'(x)\,dx=F(b)-F(a)$ for an absolutely continuous function $F$ and $d/dx \int_{-\infty}^x f(t)\,dt=f(x)$ almost everywhere for an $L^1$ function $f$. Notice that absolute continuity is a local condition and tells us that $\abs{F'}$ is integrable on compact intervals but says nothing about integrability of $F'$ over ${\mathbb R}$. Our inversion theorem (Theorem~\ref{theoremtransform}) includes an hypothesis that gives integrability of the derivative. The other ingredient in our proof is the Fourier transform of the function $t\mapsto 1/(t-w)$ for a complex parameter $w$ with nonzero imaginary part. A contour integral calculation shows this gives the product of a complex exponential with the Heaviside step function. Hence, once the Fourier integral representation is known in this one case, it follows for all absolutely continuous functions. If the Dirac distribution can be written as a Fourier transform this gives a distributional (generalized function) version of the inversion theorem. In some sense our method is an integral version of this since the Heaviside step function is the integral of the Dirac distribution. However, our inversion formula holds pointwise everywhere rather than in a distributional sense. \section{Fourier transform inversion}\label{sectionft} The key to our proof of the inversion theorem is the following integral representation of the Heaviside step function. The Heaviside step function is \begin{equation} H(x)=\left\{\begin{array}{cl} 1, \text{ if } x>0\\ 1/2, \text{ if } x=0\\ 0, \text{ if } x<0. \end{array} \right. \end{equation} \begin{lemma}\label{lemmaperron1} Let $p$ be a real number and let $w$ be a complex number with positive imaginary part. Then $$ \frac{1}{2\pi i}\int_{-\infty}^{\infty} \frac{e^{ipz}}{z-w}dz =e^{ipw}H(p). $$ Carrying out the same calculation with $w=0$ shows that $\int_0^\infty [\sin(x)/x]\,dx=\pi/2$. \end{lemma} If $p\not=0$, the integral converges conditionally as an improper Riemann integral (and as a Henstock--Kurzweil integral and as a Cauchy--Lebesgue integral). If $p=0$ or $w$ is real, the integral exists in the principal value sense. Sometimes this is known as Perron's lemma. For a proof see Section~\ref{sectionperron}. Although it is an old result we include a proof because we will need estimates from it to justify some limit operations in the proof of Theorem~\ref{theoremtransform}. The lemma was used by Perron for finding partial sums of Dirichlet series; for example, \cite[\S11.12]{apostol}. Now we are ready for the inversion theorem. \begin{theorem}\label{theoremtransform} Let $f$ be an absolutely continuous function on ${\mathbb R}$ such that $f$ and $f'$ are in $L^1({\mathbb R})$. For each $x\in{\mathbb R}$, $$ f(x)=\frac{1}{2\pi}\lim_{R\to\infty}\int_{-R}^R e^{ixs}\int_{-\infty}^{\infty} e^{-ist}f(t)\,dt\,ds. $$ \end{theorem} In the proof of the theorem $f$ is written as the solution of a simple differential equation. Note, however, that the inversion formula can hold at points where $f$ is not differentiable, provided $f$ is absolutely continuous. At points of differentiability the method of P.R. Chernoff can also be applied to give a proof \cite{koekoek}. \begin{proof} Write $w=\xi+i\eta$ with $\xi\in{\mathbb R}$ and $\eta>0$. Define $g=f'-iw f$. This determines $g$ almost everywhere. Then $$ f(x)=e^{iwx}\int_{-\infty}^x e^{-iwt}g(t)\,dt. $$ The condition $\eta>0$ ensures this integral exists for each $x\in{\mathbb R}$. The fundamental theorem of calculus for Lebesgue integrals shows that $f$ satisfies the differential equation for almost all $x$. To show the differential equation has a unique absolutely continuous solution, suppose there were solutions $u_1$ and $u_2$. Let $u=u_1-u_2$. Then $u'(x)-iw\,u(x)=0=e^{iw x}\frac{d}{dx}\left[e^{-iw x}u(x)\right]$. Notice that $e^{iw x}=e^{-\eta x}[\cos(\xi x)+i\sin(\xi x)]$, which does not vanish for any $x$. Since $u$ is absolutely continuous we then have $u(x)=ce^{iw x}$ for some constant $c$. But $u\in L^1({\mathbb R})$ so $c=0$. We can now use the integral representation of the Heaviside step function in Lemma~\ref{lemmaperron1} to write \begin{equation} f(x) = \int_{-\infty}^{\infty} H(x-t)e^{iw (x-t)}g(t)\,dt = \frac{1}{2\pi i}\int_{-\infty}^{\infty}\lim_{R\to\infty}\int_{-R}^R\frac{e^{i(x-t)z}}{z-w}\,dz\,g(t)\,dt.\label{Rlimitint} \end{equation} We would like to bring the limit as $R\to\infty$ outside the integral. Since $f,f'\in L^1({\mathbb R})$ we have $g\in L^1({\mathbb R})$ and it suffices to show the integral over $z$ is bounded as a function of $t$, uniformly as $R\to\infty$. The proof of Lemma~\ref{lemmaperron1} shows this. In that proof (below), the required integral is the difference of the residue and the integral $I_R$. When the imaginary part of $w$ is positive, the residue, $e^{i(x-t)w}$, has modulus at most $1$. The estimate in equation \eqref{contourestimate} shows $I_R$ is bounded as $R\to\infty$. Then, by dominated convergence, \begin{equation} f(x) = \frac{1}{2\pi i}\lim_{R\to\infty}\int_{-\infty}^{\infty}\int_{-R}^R\frac{e^{i(x-t)z}}{z-w}\,dz\,g(t)\,dt. \end{equation} The estimate $\abs{e^{i(x-t)z}/(z-w)}\leq 1/\eta$ shows we can use the Fubini--Tonelli theorem to interchange the $z$ and $t$ integrals. Then integrate by parts. We have \begin{eqnarray*} f(x) & = & \frac{1}{2\pi i}\lim_{R\to\infty}\int_{-R}^R\int_{-\infty}^{\infty}\frac{e^{i(x-t)z}}{z-w}[f'(t)-iw f(t)]\,dt\,dz\\ & = & \frac{1}{2\pi i}\lim_{R\to\infty}\int_{-R}^R\frac{e^{ixz}}{z-w}\left\{\left[e^{-itz}f(t)\right]_{-\infty}^\infty +i(z-w)\int_{-\infty}^{\infty} e^{-itz}f(t)\,dt\right\}\,dz\\ & = & \frac{1}{2\pi}\lim_{R\to\infty}\int_{-R}^R e^{ixz}\int_{-\infty}^{\infty} e^{-itz}f(t)\,dt\, dz, \end{eqnarray*} provided $\lim_{\abs{x}\to\infty}f(x)=0$. But this is shown in Lemma~\ref{lemmaff'} below. \end{proof} \begin{lemma}\label{lemmaff'} Suppose $f,f'\in L^1({\mathbb R})$ and $f$ is absolutely continuous. Then\\ $\lim_{\abs{x}\to\infty} f(x)=0$. \end{lemma} \begin{proof} It suffices to prove the lemma for $x\to\infty$. Let $x>0$. Integration by parts establishes that $$ f(x)=\frac{1}{x}\int_0^xf(t)\,dt+\frac{1}{x}\int_0^xtf'(t)\,dt. $$ And, $$ \abs{f(x)}\leq \frac{\norm{f}_1}{x}+\norm{f'}_1. $$ Since $f$ is continuous, this shows that $f$ is bounded on ${\mathbb R}$. Similarly, let $x>1$. Then $$ f(x)=\frac{1}{x}\int_{\sqrt{x}}^xf(t)\,dt+\frac{1}{x}\int_{\sqrt{x}}^xtf'(t)\,dt +\frac{f(\sqrt{x})}{\sqrt{x}}. $$ And, $$ \abs{f(x)}\leq \frac{\norm{f}_1}{x}+\int_{\sqrt{x}}^x\abs{f'(t)}\,dt +\frac{\norm{f}_\infty}{\sqrt{x}}. $$ \end{proof} If $f\in L^1({\mathbb R})$ then $\hat{f}$ need not be in $L^1({\mathbb R})$. For example, let $f(x)=1$ if $\abs{x}\leq 1$ and $f(x) =0$, otherwise. Then $\hat{f}(s)=2\sin(s)/s$ for $s\not=0$ and $\hat{f}(0)=2$. Although $\hat{f}$ is continuous and has limit $0$ at infinity it is not in $L^1({\mathbb R})$. However, it has a conditionally convergent integral. It is not known if the conditions of Theorem~\ref{theoremtransform} imply $\hat{f}\in L^1({\mathbb R})$. It is known from an example due to du Bois-Reymond (1876) that there is a continuous function whose Fourier series diverges at a point. The same applies to Fourier transforms. In the following example, based on \cite[\S4.12]{hardy}, we construct a continuous function in $L^1({\mathbb R})$ for which the inversion formula of Theorem~\ref{theoremtransform} fails to hold. \begin{example}\label{hardyexample} By the Fubini--Tonelli theorem we can write the inversion formula as $$ f(x)=\frac{1}{\pi}\lim_{R\to\infty}\int_{-\infty}^{\infty} f(t+x)\frac{\sin(Rt)}{t}\,dt. $$ Define $f\!:\!{\mathbb R}\to{\mathbb R}$ by $$ f(t)=\left\{\begin{array}{cl} a_k\sin(n_kt), & \pi/n_k\leq t\leq \pi/n_{k-1}\quad\text{ for some } k\in{\mathbb N}\\ 0, & \text{ otherwise.} \end{array} \right. $$ The sequences $a_k=1/k^2$ and $N_k=2^{k^3}$ are such that $\sum a_k<\infty$ and $a_k\log(N_k)\to\infty$ as $k\to\infty$. Define $n_k=N_1N_2\cdots N_k$ for $k\in{\mathbb N}$ and $n_0=1$. Then $f$ is continuous and vanishes outside the interval $[0,\pi]$ so $f\in L^1({\mathbb R})$. Note that $f$ is not absolutely continuous. For, \begin{eqnarray*} \int_0^\pi\abs{f'(t)}\,dt & = & \sum_{k=1}^\infty a_k n_k\int_{\pi/n_k}^{\pi/n_{k-1}}\abs{\cos(n_kt)}\,dt\\ & = & \sum_{k=1}^\infty a_k\int_{\pi}^{N_k\pi}\abs{\cos(t)}\,dt=2\sum_{k=1}^\infty a_k(N_k-1)=\infty. \end{eqnarray*} This shows $f$ is not of bounded variation and so not absolutely continuous. With this function $f$ the hypotheses of Theorem~\ref{theoremtransform} are not fulfilled. Note that $f(0)=0$. We will show the inversion theorem fails at the origin. Since $n_k\to\infty$, it suffices to let $J_k=\int_0^\pi f(t)(\sin(n_kt)/t)\,dt$ and show $J_k$ does not have limit $0$ as $k\to\infty$. We have \begin{equation} J_k=\sum_{m=1}^\infty a_m\int_{\pi/n_m}^{\pi/n_{m-1}}\frac{\sin(n_kt)\sin(n_mt)}{t}\,dt.\label{Jk} \end{equation} In this series the term with $m=k$ is \begin{eqnarray*} \frac{a_k}{2}\int_{\pi/n_k}^{\pi/n_{k-1}}\frac{1-\cos(2n_kt)}{t}\,dt & = & \frac{a_k}{2}\log(n_k/n_{k-1})-\frac{a_k}{2}\int_{2\pi}^{2\pi n_k/n_{k-1}}\frac{\cos(t)}{t}\,dt\\ & = & \frac{a_k}{2}\log(N_k)-\frac{a_k}{2}\int_{2\pi}^{2\pi N_k}\frac{\cos(t)}{t}\,dt. \end{eqnarray*} Integration by parts establishes that if $a>0$ is fixed then $\int_a^y(\cos(t)/t)\,dt$ is bounded for $y>a$. (For $y=\infty$ the integral converges conditionally.) We can then define $C=\sup_{\pi/2\leq x<y}\abs{\int_x^y(\cos(t)/t)\,dt}$ and $$ \frac{a_k}{2}\int_{\pi/n_k}^{\pi/n_{k-1}}\frac{1-\cos(2n_kt)}{t}\,dt\geq \frac{a_k}{2}\log(N_k)- \frac{a_k}{2}C. $$ Since $a_k\to 0$ and $a_k\log(N_k)\to\infty$ this term of the series tends to infinity. Now show the sum over all other terms remains finite as $k\to\infty$. For $m\not= k$ the summands of \eqref{Jk} are \begin{align*} &\left|\frac{a_m}{2}\int_{\pi/n_m}^{\pi/n_{m-1}}\frac{\cos(\abs{n_k-n_m}t)-\cos((n_k+n_m)t)}{t}\,dt\right|\\ &=\left|\frac{a_m}{2}\int_{\pi\abs{n_k-n_m}/n_m}^{\pi\abs{n_k-n_m}/n_{m-1}}\frac{\cos(t)}{t}\,dt -\frac{a_m}{2}\int_{\pi(n_k+n_m)/n_m}^{\pi(n_k+n_m)/n_{m-1}}\frac{\cos(t)}{t}\,dt\right|\\ &\leq a_mC. \end{align*} We see this because $\abs{n_k\pm n_m}/n_m=\abs{n_k/n_m\pm1}$. If $k>m$ then $n_k/n_m\geq N_1=2$. If $k<m$ then $n_k/n_m\leq 1/N_1=1/2$. \end{example} Riemann's localization theorem was originally given for Fourier series but applies equally well to Fourier transforms. It says that the inversion formula for $f(x)$ in Theorem~\ref{theoremtransform} only depends on the behavior of $f$ in a neighborhood of $x$. We get this as a corollary, following the method of proof in Theorem~\ref{theoremtransform}. \begin{corollary}[Localization]\label{corollarylocalisation} Let $f$ be an absolutely continuous function on the interval $[x_1,x_2]$. Let $x_1<x<x_2$. Then $$ f(x)=\frac{1}{2\pi}\lim_{R\to\infty}\int_{-R}^R e^{ixs}\int_{x_1}^{x_2} e^{-ist}f(t)\,dt\,ds. $$ \end{corollary} Notice that it is immaterial if $f$ is defined outside the interval $[x_1,x_2]$. \begin{proof} With $g=f'-iwf$ we have \begin{equation} f(x)=e^{iwx}\int_{x_1}^x e^{-iwt}g(t)\,dt +f(x_1)e^{iw(x-x_1)}. \end{equation} The proof is similar to the corresponding result in Theorem~\ref{theoremtransform}. Using Lemma~\ref{lemmaperron1} we have $$ f(x) = \frac{1}{2\pi i}\int_{x_1}^{x_2}\lim_{R\to\infty}\int_{-R}^R \frac{e^{i(x-t)z}}{z-w}\,dz\, g(t)\,dt +f(x_1)e^{iw(x-x_1)}. $$ The Heaviside function $H(x-t)$ lets us replace the upper limit of integration in $t$ with $x_2$. As before, we can bring the $R$ limit outside the integrals and interchange the order of integration. Then integration by parts yields \begin{eqnarray*} f(x) & = & \frac{1}{2\pi i}\lim_{R\to\infty}\int_{-R}^R\frac{e^{ixz}}{z-w} \left\{\left[e^{-itz}f(t)\right]_{x_1}^{x_2}+i(z-w)\int_{x_1}^{x_2}e^{-itz}f(t)\,dt\right\}dz\\ & & \qquad+f(x_1)e^{iw(x-x_1)}\\ & = & f(x_2)H(x-x_2)e^{iw(x-x_2)}+\frac{1}{2\pi}\lim_{R\to\infty}\int_{-R}^Re^{ixz}\int_{x_1}^{x_2}e^{-itz}f(t)\,dt\,dz\\ & = & \frac{1}{2\pi}\lim_{R\to\infty}\int_{-R}^Re^{ixz}\int_{x_1}^{x_2}e^{-itz}f(t)\,dt\,dz. \end{eqnarray*} \end{proof} To see localization in practice consider the following example. \begin{example} First take $f(t)=1$. Then $$ \int_{x_1}^{x_2}f(t)e^{-ist}\,dt=i\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right). $$ And, \begin{eqnarray*} i\int_{-R}^R e^{ixs}\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right)ds & = & \int_{-R}^R \frac{\sin((x_2-x)s)+\sin((x-x_1)s)}{s}ds\\ & = & \int_{-R(x_2-x)}^{R(x_2-x)}\frac{\sin(s)}{s}ds +\int_{-R(x-x_1)}^{R(x-x_1)}\frac{\sin(s)}{s}ds. \end{eqnarray*} As $R\to\infty$ this approaches $2\int_{-\infty}^{\infty} \frac{\sin(s)}{s}ds=2\pi$, in accordance with Theorem~\ref{corollarylocalisation}. The integral $\int_{-\infty}^{\infty} \frac{\sin(s)}{s}ds=\pi$ is computed in Lemma~\ref{lemmaperron1}. Now consider $f(t)=t^n$ for $n\in{\mathbb N}$. Then $$ \int_{x_1}^{x_2}f(t)e^{-ist}\,dt = i^n\frac{\partial^n}{\partial s^n}\int_{x_1}^{x_2}e^{-ist}\,dt = i^{n+1}\frac{\partial^n}{\partial s^n}\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right). $$ And, integrating by parts $n$ times, \begin{align} &i^{n+1}\int_{-R}^R e^{ixs}\frac{\partial^n}{\partial s^n}\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right)ds\\ &\quad=i^{n+1}\Bigg\{\sum_{k=1}^n(-ix)^{k-1} \left[e^{ixs}\frac{\partial^{n-k}}{\partial s^{n-k}}\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right) \right]_{s=-R}^R\label{exampleR}\\ &\qquad\qquad+(-1)^n(ix)^n\int_{-R}^R e^{ixs}\left(\frac{e^{-is{x_2}}-e^{-isx_1}}{s}\right)ds\Bigg\}.\label{exampleRR} \end{align} As $R\to\infty$, the term in \eqref{exampleR} vanishes and, as in the case $n=0$ above, the term in \eqref{exampleRR} tends to $2\pi x^n$. \end{example} \section{Multivariable} The method used in Section~\ref{sectionft} to obtain the Fourier integral representation applies with little change to functions of several variables. We will show this for functions of two variables from which it will be clear how to proceed with $n$ variables. For functions of two or more variables there is more than one type of absolute continuity. The most appropriate for the problem at hand is the Carath\'{e}odory definition, which we discuss below. \begin{theorem}\label{theoremtransformxy} Let $f\in C^2({\mathbb R}^2)$ such that the functions $f$, $f_x$, $f_y$ and $f_{xy}$ are all in $L^1({\mathbb R}^2)$. Then for each $(x,y)\in{\mathbb R}^2$, $$ f(x,y)=\frac{1}{(2\pi)^2}\lim_{R_1\to\infty}\lim_{R_2\to\infty}\int_{-R_1}^{R_1}\int_{-R_2}^{R_2}\! e^{i(xs+yt)} \int_{-\infty}^{\infty}\intinf\! e^{-i(su+tv)}f(u,v)\,dv\,du\,dt\,ds. $$ \end{theorem} We have given elementary conditions under which the inversion theorem holds. Following the proof of the theorem we consider how these can be weakened. \begin{proof} Define function $g\!:\!{\mathbb R}^2\to{\mathbb R}$ by $g(x,y)=f_{xy}(x,y)-iw[f_x(x,y)+f_y(x,y)]-w^2f(x,y)$ where $w=\xi+i\eta$ with $\xi,\eta\in{\mathbb R}$, $\eta>0$. Subscripts denote partial derivatives with respect to the indicated variable. Then \begin{equation} f(x,y)=e^{iw(x+y)}\int_{-\infty}^x\int_{-\infty}^y e^{-iw(s+t)}g(s,t)\,dt\,ds.\label{fxy} \end{equation} Partial differentiation and the Fubini--Tonelli theorem show that $f$ satisfies the partial differential equation. To show all solutions of this partial differential equation are given by this formula, suppose there were two solutions and $F$ was their difference. Then \begin{eqnarray} 0 & = & F_{xy}(x,y)-iw[F_x(x,y)+F_y(x,y)]-w^2F(x,y)\notag\\ & = & e^{iw(x+y)}\partial_{xy}\left[e^{-iw(x+y)}F(x,y)\right].\label{partiale} \end{eqnarray} The solutions of the partial differential equation $\phi_{xy}=0$ are $\phi(x,y)=A(x)+B(y)$ for differentiable functions $A$ and $B$ of one variable. But then $F(x,y)=e^{i(\xi+i\eta)(x+y)}(A(x)+B(y))$. By the Fubini--Tonelli theorem the function $x\mapsto F(x,y)$ is in $L^1({\mathbb R})$ for almost all $y\in{\mathbb R}$. So the function $x\mapsto e^{-\eta x}\abs{A(x)+B(y)}$ is in $L^1({\mathbb R})$ for almost all $y\in{\mathbb R}$. And the function $y\mapsto e^{-\eta y}\abs{A(x)+B(y)}$ is in $L^1({\mathbb R})$ for almost all $x\in{\mathbb R}$. This shows $A$ and $B$ are constants with $A+B=0$. Using Lemma~\ref{lemmaperron1} we can write \begin{eqnarray} f(x,y) & = & \int_{-\infty}^{\infty}\int_{-\infty}^{\infty}H(x-s)H(y-t) e^{iw(x-s)}e^{iw(y-t)}g(s,t)\,dt\,ds\label{fHH}\\ & = & -\frac{1}{(2\pi)^2}\int_{-\infty}^{\infty}\int_{-\infty}^{\infty} \int_{-\infty}^{\infty}\frac{e^{i(x-s)z_1}}{z_1-w}\int_{-\infty}^{\infty}\frac{e^{i(y-t)z_2}}{z_2-w} g(s,t)\,dz_2\,dz_1\,dt\,ds.\notag \end{eqnarray} The rest of the proof follows as in the proof of Theorem~\ref{theoremtransform}. We need the following limits: $\lim_{\abs{y}\to\infty}f(x,y)=0$ for each $x$, $\lim_{\abs{x}\to\infty}f(x,y)=0$ for each $y$, $\lim_{\abs{y}\to\infty}f_x(x,y)=0$ for each $x$ (or, if the $s$ and $t$ integrals are interchanged, $\lim_{\abs{x}\to\infty}f_y(x,y)=0$ for each $y$). These follow from the hypotheses of the theorem and Lemma~\ref{lemmaff'}. \end{proof} The hypothesis $f\in C^2({\mathbb R}^2)$ in the theorem can be weakened in several ways. To prove $f$ satisfies the partial differential equation we only need $f_{xy}=f_{yx}$ almost everywhere. There is an extensive literature on equality of mixed partial derivatives. See \cite{minguzzi} and references. See \cite{mykhaylyuk} for conditions for equality and seemingly reasonable conditions under which the mixed partial derivatives can fail to be equal on a set of positive measure. Some of these conditions are quite complicated. A simple one due to Currier \cite{currier} is existence of $f_x$ and $f_y$ everywhere and existence of $f_{xx}$, $f_{xy}$, $f_{yx}$, $f_{yy}$ almost everywhere. In \eqref{fxy}, the two iterated integrals are equal by the Fubini--Tonelli theorem, provided $f$, $f_x$, $f_y$ and $f_{xy}$ are all in $L^1({\mathbb R}^2)$. The usual version is proved, for example, in \cite{folland}. An extension is given by Moricz in \cite{moricz}. Following \eqref{fHH} we integrate by parts. This requires that for almost all $x\in{\mathbb R}$ the function $y\mapsto f_x(x,y)$ be absolutely continuous on ${\mathbb R}$ and $\lim_{\abs{y}\to\infty}f_x(x,y)=0$. Notice that the assumptions $f_x\in L^1({\mathbb R}^2)$ and $f_{xy}\in L^1({\mathbb R}^2)$ and the Fubini--Tonelli theorem tell us that the functions $y\mapsto f_x(x,y)$ and $y\mapsto f_{xy}$ are in $L^1({\mathbb R})$ for almost all $x\in{\mathbb R}$. Lemma~\ref{lemmaff'} then says $\lim_{\abs{y}\to\infty}f_x(x,y)=0$. Or, if the $s$ and $t$ integrals in \eqref{fHH} are interchanged we can repeat the above with $x$ and $y$ interchanged. Then we also require the function $x\mapsto f(x,y)$ be absolutely continuous on ${\mathbb R}$ for almost all $y\in{\mathbb R}$ and $\lim_{\abs{x}\to\infty}f(x,y)=0$. As above, this limit follows from Lemma~\ref{lemmaff'} and the assumptions $f,f_x\in L^1({\mathbb R}^2)$. And a similar condition with $x$ and $y$ interchanged. \begin{corollary}\label{corollarycaratheodory} The conclusion of Theorem~\ref{theoremtransformxy} holds if $f\!:\!{\mathbb R}^2\to{\mathbb R}$ such that $f_x$ and $f_y$ exist on ${\mathbb R}^2$ and $f_{xx}$, $f_{xy}$, $f_{yx}$, $f_{yy}$ exist almost everywhere such that $f$, $f_x$, $f_y$ and $f_{xy}$ are all in $L^1({\mathbb R}^2)$; the function $x\mapsto f(x,y)$ is absolutely continuous on ${\mathbb R}$ for each $y\in{\mathbb R}$, the function $y\mapsto f(x,y)$ is absolutely continuous on ${\mathbb R}$ for each $x\in{\mathbb R}$, the function $y\mapsto f_x(x,y)$ is absolutely continuous on ${\mathbb R}$ for almost every $x\in{\mathbb R}$ (or, the function $x\mapsto f_y(x,y)$ is absolutely continuous on ${\mathbb R}$ for almost every $y\in{\mathbb R}$). \end{corollary} For $L^1$ functions of one variable, absolute continuity gives necessary and sufficient conditions under which derivatives can be integrated and under which indefinite integrals can be differentiated. There does not appear to be a single such condition for integration in ${\mathbb R}^2$. There are notions of absolute continuity for functions of two variables due to Carath\'{e}odory, Tonelli, and other authors. Each extends some properties of absolute continuity on the real line to the plane, while other properties are lost. See \cite[p.~169]{saks} for Tonelli's definition and \cite{sremr} for references to other authors. Carath\'{e}odory's definition seems the most relevant here. \begin{defn}[Carath\'{e}odory absolute continuity] Let $F\!:\!{\mathbb R}^2\to{\mathbb R}$ such that \begin{enumerate} \item[(a)] For each $\epsilon>0$ there is $\delta>0$ such that if $P_i$ are mutually disjoint open intervals with $\sum_{j=1}^k\abs{P_j}<\delta$ then $\sum_{j=1}^k\abs{F(P_j)}<\epsilon$. Here, $\abs{P_j}$ is the area of rectangle $P_j$ and $F((x_1,y_1)\times(x_2,y_2)) =F(x_1,y_1)-F(x_2,y_1)-F(x_1,y_2)+F(x_2,y_2)$. \item[(b)] The function $x\mapsto F(x,y_0)$ is absolutely continuous on the real line for some fixed $y_0\in{\mathbb R}$; the function $y\mapsto F(x_0,y)$ is absolutely continuous on the real line for some fixed $x_0\in{\mathbb R}$. \end{enumerate} \end{defn} This is a slight modification of Carath\'{e}odory's definition. See \cite{sremr} where there is also a reference to Carath\'{e}odory's original work. This type of absolute continuity implies equality of the mixed partial derivatives and the one-variable absolute continuity conditions in Corollary~\ref{corollarycaratheodory}. It also implies existence of a function $\phi\in L^1({\mathbb R}^2)$ so that $f(x,y)=\int_{-\infty}^x\int_{-\infty}^y \phi(s,t)\,dt\,ds +\chi(x)+\psi(y)$ for some absolutely continuous functions $\chi$, $\psi$ on the real line, as we saw in the proof of Theorem~\ref{theoremtransformxy}. Hence, the hypotheses can be replaced with Carath\'{e}odory absolute continuity. \begin{corollary}\label{corollarycaratheodory2} The conclusion of Theorem~\ref{theoremtransformxy} holds if $f\!:\!{\mathbb R}^2\to{\mathbb R}$ such that $f$, $f_x$, $f_y$ and $f_{xy}$ are all in $L^1({\mathbb R}^2)$ and $f$ is absolutely continuous in the sense of Carath\'{e}odory. \end{corollary} \section{Perron's Lemma}\label{sectionperron} In this section we prove Lemma~\ref{lemmaperron1}. \begin{proof} Write $z=x+iy$ and $w=\xi+i\eta$ with $\eta>0$. Let $R$ be a real number larger than $2\abs{w}$. Suppose $p>0$. Let $\Gamma_R$ be the upper half-circle $z=Re^{i\theta}$ for $0\leq\theta\leq\pi$. Let $\Gamma$ be the closed contour consisting of $\Gamma_R$ oriented counterclockwise and the $x$-axis from $x=-R$ to $x=R$. The integrand is analytic in $\Gamma$ except for a simple pole at $z=w$, with residue $e^{ipw}$. By Cauchy's theorem, \begin{equation} \frac{1}{2\pi i}\oint_\Gamma\frac{e^{ipz}}{z-w}dz= e^{ipw}.\label{cauchy} \end{equation} Now show the integral over $\Gamma_R$ vanishes as $R$ tends to infinity. On $\Gamma_R$ we have $$ I_R=\int_{0}^{\pi}\frac{e^{ipR(\cos\theta+i\sin\theta)}iRe^{i\theta}\,d\theta}{Re^{i\theta}-w} $$ so that $$ \abs{I_R} \leq \frac{2R}{R-\abs{w}}\int_{0}^{\pi/2}e^{-pR\sin\theta}\,d\theta. $$ For $0\leq\theta\leq\pi/2$ we have $\sin\theta\geq 2\theta/\pi$ (Jordan's inequality). This gives \begin{equation} \abs{I_R} \leq \frac{2}{1-\abs{w}/R}\int_{0}^{\pi/2}e^{-2pR\theta/\pi}\,d\theta \leq \frac{2\pi}{pR}\left[1-e^{-pR}\right] \to 0 \text{ as } R\to\infty.\label{contourestimate} \end{equation} When $p<0$ we use the lower half-circle given by $z=Re^{i\theta}$ for $-\pi\leq\theta\leq 0$. The analysis is similar except that now the integrand is analytic and we get zero for the required integral. When $p=0$ the integral exists only in the principal value sense. We have \begin{eqnarray*} \int_{-R}^R \frac{dx}{(x-\xi)-i\eta} & = & \int_{-R}^R \frac{(x-\xi)\,dx}{(x-\xi)^2+\eta^2} + i\eta\int_{-R}^R \frac{dx}{(x-\xi)^2+\eta^2}\\ & = & \frac{1}{2}\log\left[\frac{(1-\xi/R)^2+(\eta/R)^2}{(1+\xi/R)^2+(\eta/R)^2}\right]\\ & & \qquad+i\left[ \arctan\left(\frac{R-\xi}{\eta}\right)+\arctan\left(\frac{R+\xi}{\eta}\right)\right]\\ & \to & i\pi \text{ as } R\to\infty. \end{eqnarray*} If $w=0$ and $p>0$ then $$ \int_{-R}^R \frac{e^{ipz}}{z}dz=2i\int_{0}^R \frac{\sin(px)}{x}dx $$ since the real part is odd. The same calculation as above shows $I_R\to 0$ as $R\to\infty$. Now the pole is at the origin so we need to let $z=\epsilon e^{i\theta}$ and integrate over a semicircle of radius $\epsilon$ for $0\leq\theta\leq\pi$. Using dominated convergence, this becomes $$ \int_0^\pi\frac{e^{ip\epsilon(\cos\theta+i\sin\theta)}\epsilon i e^{i\theta}}{\epsilon e^{i\theta}}d\theta=i \int_0^\pi e^{ip\epsilon\cos\theta}e^{-p\epsilon\sin\theta}\,d\theta\to i\pi \text{ as } \epsilon\to 0. $$ \end{proof} When $p\not=0$ and the imaginary part of $w$ is positive it is also possible to use a rectangular contour with one edge on the $x$-axis. This shows that the two integrals $\int_0^\infty [e^{ipz}/(z-w)]\,dz$ and $\int^0_{-\infty}[e^{ipz}/(z-w)]\,dz$ exist independently. However, the estimate on $I_R$ used in the proof of Theorem~\ref{theoremtransform} required the symmetric form.
\section{Introduction} In the trend towards miniaturization of magnetic data storage media, the ultimate size reduction of the information units is limited by the superparamagnetism of nanosized magnetic media as well as by the complexity of achieving controlled electrical contacts at the nanoscale with a low dissipation \cite{White2000,Richter2009,Moser2002}. An appealing solution to both challenges would be a combination of functional switchable molecules as bits and the use of light irradiation as read/write protocols \cite{Andreasson2015,Pischel2010,Dvornikov2009}. Single molecules have already shown to mimic electronic device architectures, suggesting the viability of this approach \cite{Song2011,Bogani2008,Mannini2009,Weibel2007}. Among them, iron(II)-based spin crossover complexes are a paradigmatic example of bistable materials where the magnetic state can be changed from a low-spin (LS) diamagnetic configuration into a high-spin (HS) paramagnetic one through a variety of external stimuli, including light irradiation, temperature variation and pressure application \cite{Halcrow2013,Decurtins1984,Decurtins1985,Gutlich2005}. Another class of materials characterized by the possibility of reversibly switching among different electronic states is the one of Valence Tautomers (VT) \cite{Tezgerevska2014,Gutlich1997,Pierpont2001,Adams1993,Carbonera2004,Tao2006,Caneschi1998,Dei2010}. VT are constituted by a metal ion bound to a redox-active ligand: in these systems the two states can be interconverted by an intramolecular electron transfer between the metal ion and the ligand, followed by a change of the spin state of the ion. In the most investigated family of VTs, the two main building blocks are a cobalt ion and an organic ligand belonging to the dioxolene family (Fig. \ref{Fig:structure}a). Two different electronic states can be realized (Fig. \ref{Fig:structure}b): LS-Co(III) coupled to the ligand in its binegative diamagnetic state (Co(III)-catecholato state, with two electrons in the $\pi$ organic ligand molecular orbital) and HS-Co(II) bound to the ligand in its oxidized mononegative radical form (Co(II)-semiquinonato state, with only one electron in the $\pi$ orbital of the ligand) \cite{Dapporto2008} (we will refer to the low spin and high spin magnetic states with LS and HS, respectively, for the sake of simplicity). The interconversion between the two states can be driven by the temperature. The technological interest for these systems originates from the possibility to control the spin state via thermal, structural, optical and magnetic perturbations \cite{Poneti2010}, suggesting the use of these materials in the next generation of molecular spintronic devices \cite{Droghetti2011}. Moreover, it is possible to nanostructure them on a solid substrate via wet chemistry strategies, while keeping switchability at the nanoscale \cite{Poneti2015,Vazquez2016}. Furthermore, VT are, together with spin-crossover systems, good candidates for pressure sensors \cite{Roux1996,Caneschi2001,Li2008b,Gutlich2004}, since the VT transition can be tuned by pressure and be revealed by a change in the light absorption spectrum of the material. \begin{figure}[h] \centering \subfigure[]{\includegraphics[width=9 cm, height=7 cm,trim={0 0 0 0}]{FIG1a.eps}} \subfigure[]{\includegraphics[width=11 cm, height=8 cm,trim={0 0 0 0}]{FIG1b.eps}} \caption{a) Molecular structure of Co(Me$_{2}$tpa)(DBCat)]PF$_{6}$ (Me$_{2}$tpa = bis(6-methyl-(2-pyridylmethyl))(2-pyridylmethyl)amine, DBCat = 3,5-di-tert-butylcatecholato). Color code: Cobalt (grey ball), oxygen (red ball), nitrogen (violet ball), carbon (grey stick). Hydrogen atoms are omitted for clarity. b) The two electronic configurations involved in the VT interconversion yielding the LS diamagnetic and the HS paramagnetic state.} \label{Fig:structure \end{figure Remarkably, at low temperature cobalt-dioxolene electronic state can be switched with light irradiation \cite{Sato2007,Dapporto2008}. In order to exploit this feature to implement them as logic units, it is necessary to investigate both the lifetime of the photoinduced HS state as well as its spin dynamics. To determine the former, we have used a SQUID magnetometer coupled to an IR laser diode, while for the latter we have investigated the spin dynamics by means of magnetic resonance techniques. In particular, it is of major importance to determine how the spin fluctuations in VT evolve with temperature when the system is driven to the HS state by light irradiation, by using local-probe techniques as nuclear magnetic resonance (NMR) and muon spin relaxation ($\mu$SR), since these fluctuations determine how long the information will be preserved before it gets lost. Moreover these techniques can be used to detect the effect of an external pressure on the VT state \cite{Sato2002,Adams1995,Sato2007,Dapporto2008,Poneti2015,Cui2004,Dai2013}. We start by discussing the results of the SQUID experiments, which allowed to derive the temperature dependence of the magnetization, its build-up times under light irradiation and the effect of the external pressure on the LS-HS crossover temperature. Then we show how $^{1}$H NMR and $\mu$SR allow us to investigate the low temperature dynamics of the HS molecules and the microscopic effects of the light and external pressure. Finally, $^{59}$Co NMR is exploited to deeply investigate the spin fluctuations of the light induced HS molecules at low temperatures. \section{Experimental methods and results} \subsection{SQUID} The synthesis of the powder sample was carried out following a previously published procedure \cite{Dapporto2008}. The temperature dependence of the magnetic susceptibility $\chi_{M}$ was measured with an MPMSXL7 SQUID magnetometer, by cooling (4 K/min) in 0.1 T (inset of Fig. \ref{Fig:Mag_P}). A clear reduction of $\chi_{M}\cdot T$ is observed, with a broad crossover from the HS to the LS state extending from 200 to 100 K and centered around 160 K \cite{Dapporto2008}. This crossover most likely reflects the presence of two overlapping transitions, which are associated with crystallographically inequivalent molecules in the lattice \cite{Dapporto2008}. The temperature dependence of $\chi_{M}\cdot T$ was also investigated at different external pressures, by using a CuBe pressure cell (EasyLab, Mcell 10). Even if the background contribution from the cell modifies the shape of $\chi_M(T)$ curves, upon increasing the pressure (measured with a Sn manometer) there is a clear progressive increase in the LS-HS crossover temperature (Fig. \ref{Fig:Mag_P}). \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG2.eps} \caption{Temperature dependence of $\chi_{M}\cdot T$ for different values of the applied pressure, for a 0.1 T magnetic field. The ambient pressure measurement (P = 0.00 kbar) has been performed inside the pressure cell and it is affected by its background contribution, yielding a slight different shape from the inset of Fig. \ref{Fig:Mag_P}. The inset shows the temperature dependence of the VT magnetic susceptibility multiplied by temperature, for a 0.1 T magnetic field \cite{Dapporto2008}. The horizontal dashed line refers to the high temperature plateau.} \label{Fig:Mag_P} \end{figure} In order to irradiate the sample an optical fiber was placed along the SQUID stick and coupled with an external infrared Laser diode (Thorlabs M940F1), with a central wavelength of 940 nm and a measured output power around 6 mW at the end of the fiber. Under light irradiation, in the 4 - 55 K temperature range, $\chi_{M}\cdot T$ was found to increase with time (Fig. \ref{Fig:mag_grow}). The susceptibility build-up can nicely be fit with a stretched exponential recovery law plus a constant term $\chi _{1}$ corresponding to the susceptibility value prior to irradiation: \begin{equation} \chi _{M}(t) =\chi _{0}\cdot \biggl(1- e^{-{({t}/{T_{irr}}})^{\alpha_{M}}} \biggr) + \chi _{1} \label{Mag_irr}. \end{equation} $\chi _{0}$ is the light enhanced magnetic susceptibility, $T_{irr}$ the build-up time and $\alpha_{M}$ a stretching exponent with values ranging from 0.50, at T = 4 K, to 0.70, at T = 55 K. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG3.eps} \caption{$\chi_{M}\cdot T$, at $T= 47$ K for a 0.1 T magnetic field, as a function of the time elapsed after the infrared light has been turned on. The solid line is the best fit according to Eq.\ref{Mag_irr}. The inset shows the temperature dependence of the build-up rate in a 0.1 T magnetic field. The line is a guide to the eye.} \label{Fig:mag_grow} \end{figure} The build-up time increases at low temperatures and reaches several hours at 10 K. After switching off the light irradiation the susceptibility decays back to its thermal equilibrium value with an initial stretched exponential decay \cite{Beni2006,Li2008}, with a different decay time, reaching about $2 \cdot 10^{4}$ s at 20 K (see Supplementary Material). \subsection{Nuclear Magnetic Resonance} $^1$H (nuclear spin $I=1/2$) NMR experiments have been performed in 1.5, 1.1 and a 0.67 T in the 5 - 300 K temperature range. The $^1$H NMR spectrum was derived from the Fourier transform of half of the echo signal after a solid echo pulse sequence. The spectrum is characterized by a Gaussian shape with a weakly temperature dependent linewidth, increasing from 20 to 30 kHz by decreasing the temperature down to 10 K. $^1$H nuclear spin-lattice relaxation rate $1/T_{1H}$ was derived from the recovery of nuclear magnetization $m(t)$ after a saturation recovery pulse sequence. The recovery law was a stretched exponential: \begin{equation} m(t)=m_{0}\cdot \biggl[1-e^{-({t}/{T_{1H}})^{\alpha_{H}}}\biggr] \,\, , \label{rec} \end{equation} where $m_{0}$ is the $^1$H thermal equilibrium magnetization and $\alpha_{H}$ a stretching exponent, ranging between 0.70 and 0.95, which accounts for a distribution of relaxation times due to the presence of inequivalent $^1$H sites. The temperature dependence of $1/T_{1H}$ is shown in Fig. \ref{Fig:T11H}, for different values of the external magnetic field, for a cooling rate of 1 K/min. One notices a very slight decrease of the relaxation rate around room temperature by increasing the magnetic field strength (see Fig \ref{Fig:T11H}). The temperature dependence of $1/T_{1H}$ is characterized by a high temperature plateau, by a drop on cooling across the HS-LS crossover and then by a marked peak centered around 20 K. This peak was investigated also with a faster cooling rate (6 K/min) at two different magnetic fields, as shown in Fig. \ref{Fig:peakfield}. By comparing the results shown in Figs. 4 and 5 for $H=1.5$ T, one can notice that the peak in $1/T_1$ strongly depends on the cooling rate. Moreover, by increasing the magnetic field the peak intensity decreases. Irradiation was achieved by using two 910 nm LEDs (Thorlabs LED910E), with an output power of 8 mW, placed close to the sample. The LEDs were switched on at room temperature, then the sample was cooled down to 15 K, kept at this temperature for several hours and then the measurements were carried out upon increasing the temperature, with LEDs switched on. One observes a slight increase of $1/T_{1H}$ low $T$ peak under light irradiation (Fig. \ref{Fig:peakfield}). \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG4.eps} \caption{Temperature dependence of $^1$H nuclear spin-lattice relaxation rate with LEDs OFF at: 1.50 T (full black squares), 1.10 T (half left green squares) and 0.67 T (half right blue squares). Fit according to Eq. \ref{BPP}. Fit parameters are reported in Table \ref{Tbl:BPPCo}.} \label{Fig:T11H} \end{figure} \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG5.eps} \caption{Temperature dependence of $^1$H nuclear spin-lattice relaxation rate for different external magnetic fields: 1.50 T and LED OFF (full black squares), 1.50 T and LED ON (half left red squares), 0.67 T and LED OFF (half right blue squares). This measurements have been performed with a cooling rate of 6 K/min.} \label{Fig:peakfield} \end{figure} To explore the effect of pressure on the LS-HS conversion, high pressure $^1$H NMR experiments have been performed in a 4.69 T magnetic field at 300 K. The applied pressure ranged from 0 to 14 kbar, and was progressively increased in 2 kbar steps. The proton spin-lattice relaxation rate pressure dependence is shown in Fig. \ref{Fig:1H_P}. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG6.eps} \caption{$^1$H spin-lattice relaxation rate pressure dependence in a 4.69 T magnetic field at 300 K.} \label{Fig:1H_P} \end{figure} $^{59}$Co ($I=7/2$) NMR measurements have been performed in a 6.95 T magnetic field. $^{59}$Co NMR powder spectrum, broadened by the quadrupolar coupling, was derived by recording the amplitude of the echo obtained after a Hahn echo saturation recovery sequence upon varying the irradiation frequency. The spectrum (see the inset to Fig.\ref{Fig:T1CoSpectrum}, for T = 5 K) is characterized by a central peak, associated with the $m_I= +1/2\leftrightarrow -1/2$ central transition, and by featureless less intense shoulders associated with the satellite transitions, which extend over several MHz. The spin-lattice relaxation rate $1/T_{1Co}$ has been measured irradiating the central transition. The intensity of this line is observed to significantly decrease upon increasing the temperature and the signal could be detected only up to about 180 K (Fig. \ref{Fig:CoSignal}). At higher temperature, where almost all VT are in the HS state the fast nuclear relaxation prevents the observation of the $^{59}$Co NMR signal. In other terms, the signal being detected is the one arising from nuclei of VT molecules in the LS state. $1/T_{1Co}$ was derived by fitting the recovery of the nuclear magnetization after a saturation recovery pulse sequence with the recovery law for the central NMR line of $I=7/2$ nuclei \cite{Suter1998}. The temperature dependence of $1/T_{1Co}$ is shown in Fig.\ref{Fig:T1CoSpectrum}. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG7.eps} \caption{Temperature dependence of $^{59}$Co nuclear spin-lattice relaxation rate at 6.95 T. The inset graph shows $^{59}$Co spectrum at 5 K at the same magnetic field (the line is a guide to the eye). } \label{Fig:T1CoSpectrum} \end{figure} Fig. \ref{Fig:CoSignal} shows the decrease of the product of the normalized signal intensity with the temperature. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG8.eps} \caption{Temperature dependence of $^{59}$Co NMR signal intensity, multiplied by temperature, in a 6.95 T magnetic field.} \label{Fig:CoSignal} \end{figure} As in the case of $^1$H NMR experiments, the sample was irradiated with two LEDs (Thorlabs LED910E) mounted close to the sample and a cooling rate of 6 K/min was used during the $^{59}$Co NMR measurements, and the same heating sequence used for $^1$H NMR measurements was followed (except that the sample was cooled down to 5 K instead of 15 K). The light irradiation is found to cause a significant increase in $1/T_{1Co}$ (Fig.\ref{Fig:T1Co}) below 100 K. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG9.eps} \caption{Temperature dependence of $^{59}$Co nuclear spin-lattice relaxation rate at 6.95 T: LED OFF (full black circles), LED ON (half up red circles). Fit according to Eq. \ref{BPP}. Fit parameters are reported in Table \ref{Tbl:BPPCo}. The inset shows the temperature dependence of the difference between $^{59}$Co nuclear spin-lattice relaxation rate in the presence and in the absence of infrared light irradiation. Fit according to Eq. \ref{BPP}. Fit parameters are reported in Table \ref{Tbl:BPPCo}.} \label{Fig:T1Co} \end{figure} \subsection{Muon Spin Relaxation} $\mu$SR experiments have been carried out at ISIS facility on HIFI beam line. The measurements have been performed both in Zero Field (ZF) and in a 200 Gauss Longitudinal magnetic field (LF). The decay of the muon asymmetry in ZF, after background corrections, has been fit with a simple exponential decay \begin{equation} A(t)= A_1 e^{-\lambda_{ZF} t} \, , \label{relZF} \end{equation} where $\lambda_{ZF}$ is the muon's ZF decay rate. It is noticed that $A_1$ in zero field corresponds to about half of the total initial asymmetry, likely due to the presence of a muonium fraction \cite{Patterson1988}. The application of the longitudinal field causes both an increase in the initial asymmetry and a slowing down of the relaxation at high temperatures (see Supplementary Material). Muon's asymmetry in LF runs can be reproduced with a stretched exponential decay: \begin{equation} A(t)= A_0 e^{-(\lambda_{LF} t)^{\beta_{LF}}}, \label{relLF} \end{equation} where $\lambda_{LF}$ is the longitudinal relaxation rate and $\beta_{LF}$ a stretching exponent, with values ranging from about 0.35 at low temperatures to 0.60 at 20 - 25 K and to 0.50 at higher temperature. As it can be noticed from Fig. \ref{Fig:lambdazf}, muon relaxation is faster at low temperature and both in ZF and LF experiments a peak around 20 K is detected. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG10.eps} \caption{Temperature dependence of the muon spin relaxation rate for a 200 Gauss longitudinal magnetic field. Lines are fit according to Eq. \ref{BPP}, with parameters: $\delta h_{\bot}^{2}$ = (3.2 $\pm$ 0.1) $\cdot 10^{-10}$ T$^{2}$, $\tau$ = (1.5 $\pm$ 0.9)$\cdot 10^{-10}$ s, E$_A$ = 77 $\pm$ 5 K, $\Delta$ = 54 $\pm$ 4 K. The inset shows the temperature dependence of the muon spin relaxation rate in ZF experiments.} \label{Fig:lambdazf} \end{figure} \section{Discussion} The temperature dependence of $\chi_M\cdot T$ (inset of Fig.\ref{Fig:Mag_P}) clearly shows that all molecules are paramagnetic at high temperature and start becoming diamagnetic upon decreasing the temperature below 200 K, as expected for this compound.\cite{Poneti2010,Dapporto2008} The high temperature plateau ($\chi_{M}\cdot T =$ 2.67 emu $\cdot$K/mol, corresponding to 3.35 $\times$ 10$^{-5}$ m$^3$$\cdot$K/mol, there is a $4\pi\times 10^{-6}$ conversion factor between CGS and SI units) is expected for an ensemble of non interacting paramagnetic molecules: \begin{equation} \chi_{M}\cdot T = \frac{g^{2}\mu_{B}^{2}S(S+1)N_{A}}{3K_{B}}, \label{curie} \end{equation} where $N_{A}$ is the Avogadro number and $g\simeq 2$ the Land\'e factor. The sum of the contribution from the uncoupled radical (S=${1}/{2}$, $\chi_{M}\cdot T = 0.375$ emu $\cdot$K/mol) and from the high spin Co(II) ($\chi_{M}\cdot T = 2.4-2.6$ emu $\cdot$K/mol that is the sum of a S=3/2 contribution (see Fig. 1) with $\chi_{M}\cdot T = 1.875$ emu $\cdot$K/mol and of an orbital term) yields a value around 2.9 emu $\cdot$K/mol \cite{Dapporto2008}, close to the experimental one. On the other hand, a ferromagnetic coupling between the HS-Co(II) ion and the radical would give rise to a local S = 2 spin, which would yield a $\chi_{M}\cdot T$ value of about 3.2 - 3.4 emu $\cdot$K/mol, which is above the detected one. Notice that an antiferromagnetic coupling, would yield an S=1 state and a value for $\chi_{M}\cdot T$ = 1 emu $\cdot$K/mol, quite different from the experimental. Hence, the configuration with a local S=3/2 Co(II) ion decoupled from the S=1/2 radical seems to provide the best description for the high temperature HS state \cite{Dapporto2008}. The fraction $HS_{LT}$ of molecules which remain in the HS state even at low temperatures is given by: \begin{equation} HS_{LT} = \frac{\chi_{M}-\chi_{LS}}{\chi_{pure}-\chi_{LS}}, \label{remaining} \end{equation} where $\chi_{LS}$ is the magnetic susceptibility of the LS state and $\chi_{pure}$ is the magnetic susceptibility of an isostructural compound, not displaying the VT transition, which remains in the HS state over the whole temperature range \cite{Beni2008}. It is found that about 3 $\%$ of the molecules remain in the HS state at 5 K, a value close to that found in the same compound \cite{Tayagaki2005}. Irradiation at cryogenic temperatures with infrared light promotes molecules from the LS to the HS state and enhances the magnetization (Fig. \ref{Fig:mag_grow}) \cite{Dapporto2008,Neuwahl2002,Gentili2005,Schmidt2010,Beni2007}. The build-up times can reach several hours \cite{Schmidt2010}, making the whole process quite slow. The efficiency of the conversion, namely the fraction of molecules converted in the HS state, can be estimated as: \begin{equation} \epsilon = \frac{\chi_{O}-\chi_{M}}{\chi_{pure}-\chi_{M}}\,\,\,\, . \label{efficiency} \end{equation} As the temperature is decreased the light conversion efficiency improves, due to the increased HS lifetime (Fig. \ref{Fig:eff}). In other terms, as the temperature increases, thermal relaxation, driving the VT back to thermal equilibrium with the lattice (i.e. to the LS state), hinders the efficiency of light irradiation. The incomplete conversion achieved at 4 K (98 $\%$) may also be due to the partial penetration of the light throughout the sample volume. It takes more than 8 hours to reach a conversion efficiency around 22 $\%$ (Fig. \ref{Fig:eff}). The efficiency seems to scale with $T_{irr}$ following a power-law as shown in Fig. \ref{Fig:eff}, suggesting that light penetration in the solid may be a key issue in determining the photoconversion time. \begin{figure}[h] \centering \includegraphics[width=9 cm, height=6 cm]{FIG11.eps} \caption{Temperature dependence of IR irradiation efficiency, according to Eq. \ref{efficiency}, as derived from SQUID experiments. The line is a guide to the eye. The inset shows the irradiation efficiency over build-up times, with temperature as an implicit parameter. The line is a power-law fit with coefficient a= 0.11 $\pm$ 0.03 and exponent b= 0.48 $\pm$ 0.02.} \label{Fig:eff} \end{figure} The decay time of the light-induced HS state, driven by phonon processes, was derived at three different temperatures and found to decrease with increasing temperature. In order to compare with previous results in the literature we considered just the data above 30 K and fit them with a thermally activated law \cite{Beni2006,Li2008} \begin{equation} T_{dec}(T)=T_{0}\cdot e^{\frac{\Delta E}{k_{B}T}} \,\, . \label{arrhenius} \end{equation} Even if characterized by a large uncertainty, one can roughly estimate an activation barrier $\Delta E\simeq 350$ K for T $>$ 30 K (data are reported in the Supplementary Material), which is consistent with the 390 K activation barrier previously reported \cite{Dapporto2008}. Some computational studies based on the Density Functional Theory have been carried out in Co-based valence tautomers \cite{Adams1997,Bencini2003,Sato2010,Starikov2011} similar to the one used in this work in order to estimate the barrier between the LS and HS states and a reasonable agreement with the experimental values was found. The information on the temperature evolution of the VT spin state and on the HS lifetime derived by SQUID magnetometry can be suitably complemented by that derived from local probes, as nuclei and muons, which can provide information on the spin dynamics of HS molecules and on how it is affected by external stimuli. $^1$H NMR spin-lattice relaxation is nearly constant above 200 K as it is expected for weakly coupled spins in the high temperature limit \cite{slichter}. The slight magnetic field dependence of $1/T_{1H}$ observed at high temperatures (Fig.\ref{Fig:T11H}), suggests the presence of low-frequency diffusive spin fluctuations, similar to those of low-dimensional paramagnets \cite{Carretta2004,FBranzoli2009}, or due to molecular motions. Below 200 K $1/T_{1H}$ drops, due to the VT transition. At 100 K, when most VT molecules are diamagnetic, $1/T_{1H}$ is reduced by 50 \%, since the mean squared amplitude of the fluctuating local fields at the $^1$H nuclei is strongly diminished by the conversion. At low temperatures (5 - 80 K) $^1$H $1/T_{1H}$ displays a peak around 20 K, suggesting a slowing down of the spin fluctuations to frequencies approaching the nuclear Larmor frequency for that fraction of VT molecules which are still in the HS state at low temperature, those yielding the non-zero contribution to $\chi_{M}\cdot T$ =0.24 emu$\cdot$K/mol. This behaviour is similar to that observed in molecular magnets, where a peak in $1/T_1$ is detected at temperatures of the order of the energy separation between the ground and the first excited states \cite{FBranzoli2009,Branzoli2009,Papinutto2005} (for a complete list see Ref. \cite{MRbook}, pg 29-70, and references therein). The magnetic field dependence shown in Fig. \ref{Fig:peakfield} confirms this hypothesis, since the peak intensity decreases with the nuclear Larmor frequency(see also Eq. \ref{BPP} in the following). Thus, the fraction of VT in the HS state at a given temperature can be described as an ensemble of paramagnetic impurities embedded in a diamagnetic matrix, whose spin progressively slow down to frequencies approaching the tens of MHz range around 20 K. If one considers that the thermal population of the HS molecule states is given by $p(T)=exp(-E_{A}/T)/Z,$ with $E_{A}$ an effective barrier between the low-energy levels involved in the HS fluctuations and $Z$ the corresponding partition function, one can weight the amplitude of the local field fluctuations driving the spin-lattice relaxation by $p(T)$. Then, by assuming a Lorentzian broadening of the HS state due to phonon scattering processes, one can write for the spin-lattice relaxation rate \cite{bppBPP1948,Corti1997,Carretta1993}: \begin{center} $\frac{1}{T_{1}}\cong\frac{\gamma^{2}}{2}\frac{\delta h_{\bot}^{2}}{\omega_{n}\Delta} p(T) T \biggr[ \arctan\left[\omega_{n}\tau_{0}\exp\left(\frac{E_{A}+\Delta}{T}\right)\right]+$ \begin{equation} \label{BPP} -\arctan\left[\omega_{n}\tau_{0}\exp\left(\frac{E_{A}-\Delta}{T}\right)\right]\biggl]. \end{equation} \end{center} We have considered a rectangular distribution for the activation energy $E_A$ with width $\Delta$. $\tau_{0}$ is the high temperature limit of the correlation time, $\delta h_{\bot}^{2}$ is the mean squared amplitude of the local field fluctuations, $\gamma$ the nuclear gyromagnetic ratio and $\omega_n$ the nuclear Larmor frequency. The fit yields an average barrier $E_A\simeq 90$ K and a smaller $\Delta\simeq 60$ K (see Table \ref{Tbl:BPPCo}), as one may deduce from the narrow peak reported in Fig.\ref{Fig:T11H}. Notice that $E_A$, significantly smaller than $\Delta E$, is not a barrier separating the LS and HS states. As it can be noticed from Fig. \ref{Fig:peakfield} light irradiation slightly enhances the proton spin-lattice relaxation rate without affecting the temperature dependence close to the peak. $\mu$SR measurements, both in ZF and LF, show that muon relaxation rate is not much sensitive to the VT transition (Fig. \ref{Fig:lambdazf}), suggesting that around 160 K the spin dynamics are much faster than the muon lifetime ($\simeq 2.2\mu$s). On the other hand, at low temperature, around 20 K, ZF and LF relaxation rates show a neat peak (Fig. \ref{Fig:lambdazf}) analogous to the one detected by $^1$H spin-lattice relaxation rate. A similar behavior of the muon spin relaxation rates has been also reported for spin crossover systems \cite{Blundell2004} as well as for other systems characterized by a spin freezing \cite{Campbell1994,Murnick1976}. In the LF measurements, where the nuclear dipolar contribution to the muon relaxation is suppressed, one observes a temperature dependence which is rather similar to that of $1/T_{1H}$. In fact, by fitting $\lambda_{LF}$ data with Eq. \ref{BPP}, one finds values for $E_A= 77\pm 5$ K and $\Delta= 54\pm 4$ K, which are close to those derived from $1/T_{1H}$, confirming the hypothesis of the spin freezing of the HS molecules. To get a deeper insight on the HS molecules spin dynamics we now turn to the discussion of $^{59}$Co spin-lattice relaxation rate which is a more sensitive to spin fluctuations, thanks to the hyperfine coupling with the paramagnetic ion. As pointed out in Sect. II.2, the signal being detected is the one from $^{59}$Co nuclei belonging to VT in the LS state. In fact, as it is shown in Fig. \ref{Fig:CoSignal} the normalized signal intensity decreases above the LS-HS transition temperature and vanishes at high temperatures. It is pointed out that at 180 K $1/T_{1Co}$ is much larger than $1/T_{1H}$ (Fig. \ref{Fig:T1CoSpectrum}), which is unexpected since the relaxation rate should scale with the square of the gyromagnetic ratio (4.21 times larger for $^1$H) and the average hyperfine coupling is expected to be larger for $^1$H rather than for $^{59}$Co nuclei in the LS state, which on average are farther from the centre of the molecule. Hence, it is likely that the relaxation rate of $^{59}$Co nuclei in LS VT is enhanced through nuclear spin diffusion by the relaxation of $^{59}$Co nuclei in HS VT. In other terms, $1/T_{1Co}$ is probing a weighted average of the relaxation of the nuclei in LS and HS molecules but since the relaxation in the latter ones is much faster one is basically probing the relaxation of $^{59}$Co nuclei in LS molecules. The spin transition driven by the electron transfer causes a marked reduction of $^{59}$Co nuclear spin-lattice relaxation rate, with a decrease of $1/T_{1Co}$ by more than two orders of magnitude between 180 and 50 K. At lower temperature, around 25 K, a small peak is observed (see Fig. \ref{Fig:T1Co}). This peak is analogous to the one observed for $1/T_{1H}$. The points in the range (5 - 55 K) were fit using equation \ref{BPP} (see Table \ref{Tbl:BPPCo}) and a value for the $E_A$ barrier similar to that derived from $^{1}$H or muon spin relaxation was derived. \begin{table} \begin{tabular}{|c|c|c|c|c|} \hline &$\delta h_{\bot}^{2} (T^{2})$ &$\tau_{0} (s) $ &$E_A (K) $ &$\Delta (K)$\tabularnewline \hline $^{59}$Co OFF & $4.1 \pm 0.9 \cdot 10^{-7}$ & $1.7 \pm 0.1 \cdot 10^{-10}$ & $53 \pm 16$& $43 \pm17$ \tabularnewline \hline $^{59}$Co ON & $1.8 \pm 0.3 \cdot 10^{-6}$& $1.1 \pm 0.5 \cdot 10^{-10}$ & $74\pm 17$& $60 \pm 17$ \tabularnewline \hline $^{59}$Co DIF. & $1.4 \pm 0.3 \cdot 10^{-6}$& $5.6 \pm 3.8 \cdot 10^{-11}$& $88\pm 20$& $72\pm 18$ \tabularnewline \hline $^1$H OFF & $2.8 \pm 0.4 \cdot 10^{-6}$& $3.5 \pm 0.8 \cdot 10^{-11}$& $90 \pm 12$& $60 \pm 10$ \tabularnewline \hline LF $\mu$SR & $3.2 \pm 0.1 \cdot 10^{-10}$& $1.5 \pm 0.9 \cdot 10^{-10}$& $77 \pm 5$& $54 \pm 4$ \tabularnewline \hline \end{tabular} \caption{Fit results according to Eq. \ref{BPP} for $^{59}$Co, $^{1}$H and muon relaxation data.} \label{Tbl:BPPCo} \end{table} Infrared light irradiation enhances the $1/T_{1Co}$ at low temperature (Fig. \ref{Fig:T1Co}) because of the increase in the number of molecules in the HS state, a much more marked effect than that obtained on protons. Moreover, under light irradiation $1/T_{1Co}$ value remains significantly lower than at $T\simeq 180$ K, pointing out that the conversion efficiency in the NMR experiments is lower than in SQUID magnetization measurements. This could be due to the limited penetration of the infrared radiation over the whole volume of the sample used in the NMR experiments. Eventhough, the enhancement of $1/T_{1Co}$ allows to probe the spin dynamics of those molecules which have been promoted to the HS state. The low-temperature behaviour of $1/T_{1Co}$ upon irradiation can still be fit with Eq. \ref{BPP} below 50 K with similar values for the activation energies (see Tab.\ref{Tbl:BPPCo}). In order to consider the spin dynamics due to the light-induced HS molecules only, we have subtracted the behaviour of $1/T_{1Co}$ before irradiation from the one in presence of irradiation. The resulting temperature dependence, shown in the inset of Fig. \ref{Fig:T1Co}, was fit again with Eq. \ref{BPP} and the best fit was achieved for $E_A= 88\pm 20$ K and $\Delta= 72\pm 18$ K. Thus, it is noticed that there is a low-frequency (MHz range) dynamic which persists at low temperature with a barrier which is similar to that derived from $^1$H spin-lattice relaxation rate measurements. These values are significantly lower than the barrier $\Delta E$ estimated from the decay of the magnetization after light irradiation with the SQUID magnetometer. Indeed while this latter is the barrier needed to switch between the two VT states, the spin fluctuations probed by NMR and $\mu$SR relaxations may involve transitions among states of the HS molecules characterized by a different energy separation. In view of future application these low-frequency fluctuations must be somewhat reduced or even removed by playing with the chemical structure of the molecule. Finally we discuss the effect of an external pressure on the VT conversion. In Fig. \ref{Fig:Mag_P} one observes that moderate pressures, of the order of a few kbar, shift the transition detected by $M(T)$ measurements close to room temperature. The $1/T_{1H}$ measurements performed at 300 K do support the magnetization results. As it is shown in Fig. \ref{Fig:1H_P}, $^1$H spin-lattice relaxation rate decreases with increasing pressure, indicating a progressive transition of the VT from the HS to the LS state, ending at about 10 kbar, while for higher pressures $1/T_{1H}$ does not change and the system remains in the LS state. In fact, the LS state is favoured by high pressures since it is characterized by a smaller volume giving rise to larger crystal field splittings with respect to the HS state \cite{Tezgerevska2014,Evangelio2005,Dei2010b}. The observation of a pressure induced transition at room temperature is relevant for the application of VT as sensors. \section{Conclusion} By means of macroscopic magnetization and of nuclear and muon spin-lattice relaxation rate measurements we have investigated the magnetic properties of a cobalt compound showing Valence Tautomerism. In particular we have focused on the effect of infrared light irradiation at low temperatures and that of an external pressure on the interconversion between the two spin states associated with different intramolecular charge distribution. The SQUID magnetometry data result in good agreement with earlier reports and and point out two important facts: quite long build-up times (up to 9 hours) are needed to reach a conversion efficiency close to 100 \% and the decay rate of light-induced magnetization is determined by an energy barrier which leads to many hours lifetimes for the HS state at low temperatures. On the other hand, by means of NMR and $\mu$SR we have evidenced that spin fluctuations in the MHz range persist at low temperature. By increasing the number of HS molecules with infrared light irradiation the temperature evolution of the spin dynamics does not change significantly. Hence, although the light-induced HS state of VT can persist for hours at $T\simeq 10$ K, spin dynamics can be faster approaching timescale of seconds at temperatures around few Kelvin degrees. These results show that application of this material as a logic unit still needs further developments. On the other hand, we have shown that the VT transition can suitably be tuned by an external pressure and reaches room temperature at $P\simeq 10$ kbar, an observation which could pave the way to immediate application of valence tautomers as sensors. The marked increase in the crossover temperature with pressure suggests that the spin dynamics could also be significantly affected and possibly reduced by an external pressure. \section*{Acknowledgements} Marco Moscardini is gratefully acknowledged for his technical assistance during the setup of the light irradiation experiments in the SQUID magnetometer. James Lord is gratefully acknowledged for his assistance during $\mu$SR experiments carried out at the ISIS facility. Lorenzo Sorace is widely acknowledged for the fruitfull discussion during the revision of the manuscript.
\section{Introduction} What is base 3/2? How does one even think about a fractional base anyway? Our readers will be familiar of course with base 10, or decimal, but there are many uses for other bases, such as base 2, 12, and 60. Base 2, or binary, is useful because there are only two states for each place value, meaning that it can be represented easily by a series of transistors that are either on or off, and forms the basis for machine language. Base 12 and 60 are useful because they have a large number of factors and hence can be divided nicely into smaller increments. We use these bases to partition time. One way of thinking about how integer bases such as these work, invented by James Tanton, is the idea of exploding dots \cite{JT}. This idea allows a natural extension into fractional bases. Our main base is base 3/2. We explain exploding dots and base 3/2 in detail in Section~\ref{sec:expdots}. We start by observing how integers are represented in base 3/2. The integers use 0, 1, and 2 as digits. The beginnings of integers are very restricted, but the endings are not. We discuss this in Sections~\ref{sec:patterns}. Even integers can be naturally placed into vertices of a tree with alternating branches. The base 3/2 representation of an even integer can be read from the tree as explained in Section~\ref{sec:begin}. We devote some time to studying properties of the largest and smallest integers with a given number of digits in base 3/2. We also discuss the connection of base 3/2 to a greedy partition of non-negative integers into subsequences not containing a 3-term arithmetic progression. In Section~\ref{sec:divisibility} we briefly talk about divisibility properties. We show that divisibility by 5 in base 3/2 is similar to divisibility by 11 in base 10. By using exploding dots to define base 3/2, we can now begin to examine how sequences behave in new, less studied environments. Our goal in this paper is to briefly explore the behavior of various sequences in base 3/2. We study in particular sequences which depend on their positional representation, so that a different base causes them to behave in new ways, as we discuss in Section~\ref{sec:sequences}. We notice that powers of 2 and 3 exhibit awesome properties in base 3/2. Integer $3^n$ in base 3/2 is $2^n$ followed by $n$ zeros. The Look-and-say sequence in base 3/2 begins similarly to base 10, but differs after the first five terms. Fibonacci numbers are incredibly beautiful, but because they are not dependent on base, their base 3/2 expression might not be particularly interesting. By tweaking the Fibonacci sequence using sorting of the digits as one of the steps, we are able to create sequences related to base representations that are inspired by the Fibonacci sequence. We study the eventual behavior of such sequences. \section{Exploding dots and base 3/2}\label{sec:expdots} Essentially, exploding dots is a machine made up of boxes with rules to describe what happens when you have a certain number of dots in a box \cite{JT}. In base 10, whenever there is a group of 10 dots in one box, they explode into 1 dot in the next box up. Similarly, we could use this to describe binary by having 2 dots explode into 1, and so on for any base. For example, to write 11 in base 3, we would first have 11 dots in the rightmost box as in Figure~\ref{fig:11base3step1}. \begin{figure}[htb] \centering \scalebox{-1}[1]{ \includegraphics[scale=0.4]{11base3step1.png}} \caption{11 base 3: step 1.} \label{fig:11base3step1} \end{figure} Then each group of 3 dots in the rightmost box would explode, and one dot per group will appear in the box to the left as in Figure~\ref{fig:11base3step2}. \begin{figure}[htb] \centering \scalebox{-1}[1]{ \includegraphics[scale=0.4]{11base3step2.png}} \caption{11 base 3: step 2.} \label{fig:11base3step2} \end{figure} Finally, the three dots in the second box would explode into 1 dot to its left, as shown in Figure~\ref{fig:11base3step3}. \begin{figure}[htb] \centering \scalebox{-1}[1]{ \includegraphics[scale=0.4]{11base3step3.png}} \caption{11 base 3: step 3.} \label{fig:11base3step3} \end{figure} By reading the number of dots from left to right, 11 in base 3 is 102. But the interesting thing here is that there is no reason this model should be exclusive to integer bases \cite{JT}. Suppose, instead, our rule is that 3 dots explode into 2 dots in the next box. To represent 11 in this base, we use a similar process, shown in Figure~\ref{11base3Over2.png}. \begin{figure}[htb] \centering \scalebox{-1}[1]{ \includegraphics[scale=0.4]{11base3Over2.png}} \caption{11 base 3/2.} \label{11base3Over2.png} \end{figure} Each group of three explodes into two in the next box. Using this system, 11 is 2102. This representation behaves quite a bit like base 3/2. The rightmost box represents $(\frac{3}{2})^0$, the next $(\frac{3}{2})^1$, then $(\frac{3}{2})^2$, and so on. Number $2\cdot (\frac{3}{2})^3+1 \cdot (\frac{3}{2})^2+0 \cdot (\frac{3}{2})^1+2 \cdot(\frac{3}{2})^0$ is indeed equal to 11. We can use this just like any other base to represent numbers. \section{Patterns in integers written in base 3/2.}\label{sec:patterns} The first few non-negative integers are expressed in base 3/2 as: \[0,\ 1,\ 2,\ 20,\ 21,\ 22,\ 210,\ 211,\ 212,\ 2100,\ 2101,\ 2102,\ 2120, \ldots.\] This is sequence \seqnum{A024629} in the database. We start by studying the patterns at the beginning of the integers. \subsection{Beginning digits}\label{sec:begin} Here are several properties of integers written in base 3/2 that are easy to observe \cite{CM}: \begin{enumerate} \item From 2 onwards all integers start with 2. \item From 6, or 210 in base 3/2, onwards all integers start with 21. \item The only integer with more than one digit that has all of the same digit is 5, which is 22 in base 3/2. \item From 8 onward, the third digit changes between 0 and 2. \item No integer other than 7 starts with 211. \end{enumerate} These properties are easy to prove. For example, the first property is true because each carry adds 2 \cite{JT}. The second and the fourth properties can be proven with a similar argument. The third/fifth property follows from the second/fourth property, respectively. Notice that a prefix of any integer written in base 3/2 is an even integer. For example, integer 32 in base 3/2 is 212022. After removing the last digit we get 21202, which is 20 in base 3/2. \begin{lemma} Removing the last digit of integer $n$ in base 3/2 produces integer $2 \cdot \lfloor \frac{n}{3}\rfloor$. \end{lemma} \begin{proof} Exactly $2 \cdot \lfloor \frac{n}{3}\rfloor$ dots move to the left after all explosions in the units digit. \end{proof} In the example above $2 \cdot \lfloor \frac{32}{3}\rfloor = 20$. This observation that, in base 3/2 a proper prefix of an integer is an even integer allows us to arrange even integers in a tree. At each vertex we have a digit and an even integer value as a subscript. The tree is pictured in Figure~\ref{fig:tree}. Even integers are written from top to bottom left to right. If a vertex is marked with integer $x$, then we concatenate the digits on the path from the root to $x$ to get the representation of $x$ in base 3/2. The tree is built recursively starting with integer 2, which is 2 in base 3/2. The recursive rule is: If the integer at the vertex $x$ divided by 2 is odd, then exactly one edge goes out, and the resulting node is labeled 1. The corresponding integer is $3x/2+1$. Otherwise, if the half is even, then we draw two edges and add 0 for $3x/2$ and add 2 for $3x/2+2$ to them. Note that the nodes branch alternatively corresponding to their integer values. \begin{figure}[h]\label{fig:tree} \centering \scalebox{1.3}{ \begin{forest} [$2_{2}$[$1_{4}$[$0_{6}$[$1_{10}$[$1_{16}$[$0_{24}$[$0_{36}$][$2_{38}$]][$2_{26}$[$1_{40}$]]]]][$2_{8}$[$0_{12}$[$0_{18}$[$1_{28}$[$0_{42}$][$2_{44}$]]][$2_{20}$[$0_{30}$[$1_{46}$]][$2_{32}$[$0_{48}$][$2_{50}$]]]][$2_{14}$[$1_{22}$[$1_{34}$[$1_{52}$]]]]]]] \end{forest} } \caption{The tree of even integers} \end{figure} Note that the tree is mentioned in \seqnum{A005428} in a different context. The sequence \seqnum{A005428} is described as the number of nodes at level $n$ of a planted binary tree with alternating branching and non-branching nodes. As we saw above our tree branches out when the corresponding even number is divisible by 4. As even numbers divisible by 4 alternate with even numbers that are not divisible by 4, our tree is the same tree as in the sequence. James Propp and Glen Whitney directed us to the tree \cite{JP, GW}. Each vertex on level $k$ of the tree, counting from top to bottom, corresponds to an integer that has $k$ digits in its base 3/2 representation. See sequence \seqnum{A246435} that represents the number of digits of integers in base 3/2. The number of nodes at distance $k-1$ from the root is the number of even numbers with $k$ digits. The corresponding sequence is: \[1,\ 1,\ 2,\ 3,\ 4,\ 6,\ 9,\ 14,\ 21,\ 31,\ 47,\ 70, \ldots.\] This is sequence \seqnum{A005428}: $a(n) = \lceil 1 + \textrm{sum of preceding terms} /2\rceil$. It is also a shifted sequence \seqnum{A073941}. The number of all integers and the number of even integers of a given length in base 3/2 are related in the following manner. \begin{lemma} Given a prefix $p$, thrice the number of even integers of length $k$ with prefix $p$ is the number of all integers of length $k+1$ with prefix $p$. \end{lemma} \begin{proof} Any integer can be written as an even integer with one of the digits 0, 1, and 2 attached at the end. \end{proof} It follows that the number of integers with $k+1$ digits in base 3/2 is thrice the number of even integers with $k$ digits. The following sequence, \seqnum{A081848}, describes the total number of integers of length $k$ in base 3/2: \[\seqnum{A081848}(n) = 3,\ 3,\ 3,\ 6,\ 9,\ 12,\ 18,\ 27,\ 42,\ 63,\ 93,\ 141,\ 210,\ \ldots.\] \begin{lemma} \seqnum{A081848}$(n) = 3\lceil \textrm{sum of preceding terms}/2 \rceil - \textrm{sum of preceding terms}$. \end{lemma} \begin{proof} Denote the sum of the preceding terms $S$, that is, $S$ is the total number of non-negative integers with less than $k$ digits in base 3/2. Also $S$ is the smallest integer with $k$ digits (remember that we are counting 0). The smallest integer with $k+1$ digits is $3\lceil S/2\rceil$. The total number of $k$-digit base 3/2 integers is the difference: $3\lceil S/2\rceil- S$. \end{proof} \subsection{Ending digits} The beginning strings of integers are relatively sparse. What about the ending strings? The last $k$ digits are repeated in a cycle which length is a multiple of 3. This is because for every three numbers only the last digit changes. The cycle repeats after the first occurrence of a number with $k$ zeros at the end. \begin{lemma} The last $k$ digits of integers in base 3/2 cycle with period $3^k$. \end{lemma} \begin{proof} The number $3^k$ has $k$ zeros at the end. That means integers $x$ and $x+3^k$ have the same $k$ digits at the end. Now we need to show that there are no smaller cycles. Suppose two integers $x<y$ end with the same $k$ digits. Then $y-x$ ends with $k$ zeros. It follows that $y-x$ is divisible by $3^k$. This means the cycle must be a multiple of $3^k$. \end{proof} Interestingly, the endings of integers behave differently from the beginnings: at the end, any combination of the last several digits is possible. \subsection{The largest and smallest integers with a given number of digits} We look at the largest and smallest integers with a given number of digits expressed in base 3/2. The smallest number $S_k$ with $k>0$ digits in base 3/2: \[0,\ 20,\ 210,\ 2100,\ 21010,\ 210110,\ 2101100,\ 21011000,\ 210110000, \ldots.\] This is now sequence \seqnum{A304023}. The values of these integers in base-10 form sequence \seqnum{A070885}: \[1,\ 3,\ 6,\ 9,\ 15,\ 24,\ 36,\ 54,\ 81,\ 123,\ 186,\ 279,\ 420,\ 630,\ 945, \ldots.\] The recursive formula for this sequence is: $a(n+1) = 3a(n)/2$, if $a(n)$ is even, and $a(n+1) = 3a(n+1)/2$ if $a(n)$ is odd \cite{JT}. Correspondingly, the largest number $L_k$ with $k>0$ digits in base 3/2 is now sequence \seqnum{A304024}: \[2,\ 22,\ 212,\ 2122,\ 21222,\ 212212,\ 2122112,\ 21221112,\ \ldots.\] Writing $L_k$ in base-10, we get a new sequence \seqnum{A304025}: \[2,\ 5,\ 8,\ 14,\ 23,\ 35,\ 53,\ 80,\ \ldots.\] These sequences are connected. The smallest number with $k+1$ digits is the largest number with $k$ digits plus 1: $S_{k+1} = L_k + 1$. In base 3/2, the largest number does not have zeros, and the smallest does not have twos except as the first digit. We prove the following necessary and sufficient condition. \begin{lemma}\label{lemma:SL} An integer is the largest integer with a given number of digits in base 3/2 if and only if it is represented without zeros and the last digit is 2. Similarly, an integer is the smallest integer with a given number of digits in base 3/2 if and only if it ends in zero and is represented without twos except for the first digit. \end{lemma} \begin{proof} If an integer is expressed without 0s and the last digit is 2, when we add 1 to the number, we will always be carrying over 2 to the next place. Then, we will keep on carrying all the way to the first digit and then carry over to have one more digit. On the other hand, if the last digit is not 2, we can always add 1 without changing the number of digits. If the last digit is 2 and the number has a zero in the middle, then the carry will stop at the first encountered zero and the number of digits will not increase. If an integer does not end in 0 or has an extra 2 that is not at the beginning, we can always subtract one from it to get to a smaller integer with the same number of digits. If it ends with 0 and does not have 2s other than the first digit, then subtracting 1 will decrease the number of digits. \end{proof} We can get $L_n$ directly from $S_{n+1}$ written in base 3/2: replace 21 at the beginning with 2 and 0 at the end with 2, then shift the rest of the digits up by 1. For example, 210110000 is divided into three groups: 21-011000-0. Replacing the first and the last group and shifting the middle, we get: 2-122111-2. The final result is 21221112. If we remove the last digit from a $k$-digit smallest/largest integer, we get the smallest/largest even integer with $k-1$ digits. Thus, it is important to also look at even smallest/largest integers. \subsection{The largest and smallest even integers with a given number of digits} In this section we only consider even integers. Consider sequences $s_n$ and $l_n$ of the smallest and largest even positive integers with $n$ digits in base 3/2, where $n > 0$: $l_n+2 = s_{n+1}$. Sequence $s_n$ expressed in base 3/2 is now \seqnum{A303500} in the database and it starts as: \[2,\ 21,\ 210,\ 2101,\ 21011,\ 210110,\ 2101100,\ 21011000,\ 210110001,\ \ldots.\] Similarly, $l_n$ in base 3/2 is now \seqnum{A304272}: \[2,\ 21,\ 212,\ 2122,\ 21221,\ 212211,\ 2122111,\ 21221112, 212211122, \ldots.\] \begin{lemma} In base 3/2, if we remove the last digit from integers $s_n$ and $l_n$, we get $s_{n-1}$ and $l_{n-1}$ correspondingly. \end{lemma} \begin{proof} The smallest/largest integers form the leftmost/rightmost paths of the tree. \end{proof} Even integers are connected to all integers: either $s_n = S_n$ or $s_n = S_n+1$. Similarly, either $l_n = L_n$ or $l_n = L_n-1$. In any case, the following corollary follows from Lemma~\ref{lemma:SL}. \begin{corollary} The integers $l_n$ do not contain zeros when written in base 3/2. The integers $s_n$ do not contain twos except as the first digit when written in base 3/2. \end{corollary} Given that the smallest/largest even integer when written in base 3/2 with a given number of digits is a substring of the next one, we can create an infinite string representing all of the smallest/largest integers. We call this infinite string \[2101100011010011010100110100101000\ldots.\] corresponding to the smallest integers the \textit{ultimate smallest even integer}. Its digits are now sequence \seqnum{A304273}. We call this sequence of digits the \textit{evenberry} sequence. Similarly, the \textit{evenmelon} sequence is the sequence of digits of the \textit{ultimate largest even integer} \[212211122121122121211221211212112\ldots\] and is now sequence \seqnum{A304274}: We can get the ultimate smallest even integer from the ultimate largest even integer by adding 2. That means, by replacing the first 2 with 21 and shifting all other digits down by 1. The integer value of sequence $s_n$ in base-10 is now sequence \seqnum{A305498}: \[2,\ 4,\ 6,\ 10,\ 16,\ 24,\ 36,\ 54,\ 82,\ \ldots.\] The integer $\frac{3}{2}s_n$ is written in base 3/2 as $s_n$ in base 3/2 with zero at the end. Therefore, $\frac{3}{2}s_n$ is the smallest integer with $n+1$ digits: $\frac{3}{2}s_n = S_{n+1}$. The latter might not be even. Therefore, we can say that $s_{n+1} = \frac{3}{2}s_n$, if $s_n$ is divisible by 4, and that $s_{n+1} = \frac{3}{2}s_n + 1$ otherwise. Combining this together we get: \[s_{n+1} = 2 \left \lceil\frac{3}{4}s_{n} \right \rceil. \] Sequence $s_n$ is twice sequence \seqnum{A061419} in OEIS which is defined as: $a(n) = \lceil a(n-1)3/2\rceil$ with $a(1) = 1$. Similarly, we can generate a recursive formula for the value of largest even number with $n$ digits in base 3/2, which is now sequence \seqnum{A305497}: \[2,\ 4,\ 8,\ 14,\ 22,\ 34,\ 52,\ 80,\ \ldots.\] The number $3/2\cdot l_n$ is an integer, and it is written in base 3/2 as $l_n$ with a zero at the end. That means the largest integer with $n+1$ digits is $3/2\cdot l_n+2$. This number might not be even. If it is odd, we need to subtract 1. Therefore, the largest even number is $2\cdot \lfloor (3/2\cdot l_n+2)/2\rfloor$. In other words: \[l_{n+1} = 2 \left \lfloor\frac{3}{4}l_{n} \right \rfloor +2. \] Sequence $l_n$ is twice sequence \seqnum{A006999} as we prove later. The description of sequence \seqnum{A006999} is the following: Partitioning integers to avoid arithmetic progressions of length 3. Given this does not provide enough detail, we provide a more detailed description following \cite{GPS}. Keep in mind that definition of \seqnum{A006999} has nothing to do with base 3/2. Consider a greedy partition of non-negative integers into subsequences not containing a 3-term arithmetic progression. For example, the starting sequence $T_0$ is sequence \seqnum{A005836}: 0, 1, 3, 4, 9, 10, 12, and so on. This is the lexicographically earliest increasing sequence of nonnegative integers that contains no arithmetic progression of length 3. It is also the sequence of integers whose base 3 representation contains no 2. We take the leftover numbers and build out of them the lexicographically earliest increasing sequence $T_1$ of nonnegative integers that contains no arithmetic progression of length 3: 2, 5, 6, 11, 14, 15, and so on. We take the leftover numbers and continue building $T_2$: 7, 8, 16, 17, 19, 20, and so on. We define the characteristic sequence $a(n)$, so that $a(n) = k$ when $n \in T_k$. That is: \[a(n) = 0,\ 0,\ 1,\ 0,\ 0,\ 1,\ 1,\ 2,\ 2,\ 0,\ 0, \ldots.\] The latter is sequence \seqnum{A006997}. The database provides a formula for \seqnum{A006997}: $a(3n+k) = [ (3a(n)+k)/2 ]$, where $0 \leq k \leq 2$. Sequence \seqnum{A006999} is defined through sequence \seqnum{A006997}: \seqnum{A006999}$(n) = \seqnum{A006997}(3^n-1)$. It is known that \seqnum{A006999}$(n)$ is the largest of the first $3^n$ terms of $a(n)$ \cite{GPS}. That means \seqnum{A006999}$(n)$ counts the number of sequences that appear in the greedy partition up to when integer $3^n$ is reached. \begin{lemma} Sequence $l_n$ is twice sequence \seqnum{A006999}. \end{lemma} \begin{proof} The database provides a formula for \seqnum{A006997}: $a(3n+k) = \lfloor (3a(n)+k)/2 \rfloor$, where $0 \leq k \leq 2$. We can use this formula to make a recursive formula for \seqnum{A006999}$(n) = \seqnum{A006997}(3^n-1)$. First, we rewrite $\seqnum{A006997}(3^n-1)= \seqnum{A006997}(3^n-3+2) = \seqnum{A006997}(3(3^{n-1}-1)+2)$. Next, by the formula, $\seqnum{A006997}(3^n-1) = \lfloor (3\seqnum{A006997}(3^{n-1}-1)+2)/2 \rfloor$. Therefore, \[\seqnum{A006999}(n) = \lfloor (3\seqnum{A006999}(n-1)+2)/2 \rfloor = \lfloor 3\cdot 2\seqnum{A006999}(n-1)/4 \rfloor + 1.\] If we denote $2\seqnum{A006999}(n)$ as $b(n)$, we get \[b(n) = 2\lfloor 3\cdot b(n-1)/4 \rfloor + 2,\] which is the same recursion as the one for sequence $l_n$. After checking the initial term, we confirm that $l_n = 2\seqnum{A006999}(n)$. \end{proof} \section{Divisibility}\label{sec:divisibility} We start with divisibility by powers of 3, see also \cite{JT}. \begin{lemma}\label{lemma:div3} An integer in base 3/2 has $k$ zeros at the end if and only if it is divisible by $3^k$. \end{lemma} \begin{proof} Suppose 3-adic value of an integer $n$ is $k$. If we put $n$ dots in the units place, then, after exploding, we get 0 dots in the units place and $2n/3$ dots in the next place to the left. Continuing, we get exactly $k$ zeros at the end of the number $n$ in base 3/2. \end{proof} There is also a simple rule for divisibility by 5. It is similar to divisibility by 11 in base 10. \begin{lemma} The alternating sum of the digits of an integer in base 3/2, read from right to left, has the same remainder modulo 5 as the integer itself. \end{lemma} \begin{proof} $3/2 \equiv -1 \pmod{5}.$ \end{proof} \section{Sequences}\label{sec:sequences} Here we discuss some sequences that we studied. \subsection{Powers} We start with powers of 3 written in base 3/2, which is now sequence \seqnum{A305658}: \[1, 20, 2100, 212000, 210110000, 21202200000, 21200101000000, \ldots.\] It follows from Lemma~\ref{lemma:div3} that $a(n) = 3^n$ in the above sequence of powers of 3 has $n$ zeros at the end. The following is the sequence of powers of 2. Notice how it is similar to powers of 3: \[ 1, 2, 21, 212, 21011, 212022, 21200101, 2101100202, 21202202121, \ldots.\] This is now sequence \seqnum{A305659}. \begin{lemma} An integer $3^n$ expressed in base $\frac{3}{2}$ is equal to $2^n$ in the same base with $n$ zeros appended at the end. \end{lemma} \begin{proof} In order to change a number from $2^n$ to $3^n$ in any base, we would need to multiply $2^n$ by $\frac{3^n}{2^n} = \frac{3}{2}^n$, which, because we are using base $\frac{3}{2}$, means that $n$ zeros would just be added to the end of the number. \end{proof} \subsection{Look-and-say} The base-10 look-and-say sequence, sequence \seqnum{A005150} in the OEIS, is the sequence of integers beginning as follows: \[\textrm{Look-and-say: } 1,\ 11,\ 21,\ 1211,\ 111221,\ 312211,\ 13112221,\ 1113213211,\ \ldots.\] It is a recursive sequence where the term $a(n+1)$ is defined by reading off the digits of $a(n)$, counting the number of digits in groups of the same digit. For example, 1211 is read off as ``one 1, one 2, then two 1s'' or 111221. We study this sequence in base 3/2. The first five terms are the same as in the sequence base 10. For the next term, however, we need to read out three 1s, which in base 3/2 is 20 1s. Therefore, the sequence continues: \[\textrm{Look-and-say}_{3/2}: 1,\ 11,\ 21,\ 1211,\ 111221,\ 2012211,\ 1210112221,\ \ldots.\] This is now sequence \seqnum{A305660}. \begin{lemma} Each term in the Look-and-say sequence in base 3/2 has not more than 1 zero, 3 ones and 3 twos in a row. \end{lemma} \begin{proof} Each string in this sequence can be divided into pairs of numbers: the first number counts how many of the second number are in the sequence. We call the first number the \textit{counting} number and the second number the \textit{what}-number. The neighboring what-numbers have to be different. We proceed by induction. Observing several initial terms of the sequence, the base of induction holds. After that, by our induction hypothesis, the counting numbers can be only 1, 2, and 20. Let us look at zeros. If the new term contains a zero as a what-number, it has to have 1 as a counting number in front and it has to have a counting number that does not start with zero after it. Therefore, the what-number that is zero must be isolated. Suppose we have 0 as a part of a counting number, then it has 2 before it. Also, by the induction hypothesis, it has to have 1 or 2 after it. Suppose the new term has at least 4 ones. Then one of these ones has to be a what-number. If there is a 1 after it, then it has to be followed by 0 or 2. If there is a 1 before it, this 1 is a counting number for our what-number 1. Before that 1 there only could be 0 or 2. Therefore, we cannot have more than 3 ones in a row. Suppose the new term has at least 4 twos. Then one of these twos has to be a what-number. If there is a 2 after it as part of the counting number, then the counting number has to be either 2 or 20. In either case, the next digit must be not 2. If there is a 2 before the what-number 2, then the counting number is 2, and the digit before it has to be different from 2. Therefore, we cannot have more than 3 twos in a row. \end{proof} \subsection{Sorted Fibonacci} John H.~Conway likes tweaking the Fibonacci rule to invent new sequences. He usually calls such sequences \textit{fibs}. We are following this tradition to emphasize that this is not a Fibonacci sequence. The \textit{sorted Fibs} sequence is defined as follows. To calculate the next term we add two previous terms and sort the digits in increasing order. In base-10 this sequence is \seqnum{A069638}: \[0,\ 1,\ 1,\ 2,\ 3,\ 5,\ 8,\ 13,\ 12,\ 25,\ 37,\ 26,\ \ldots.\] It is known that this sequence is periodic with the maximum value of 667. We study analogues of this sequence in base 3/2. We start with the sorted Fibs sequence $f_n$ that have two initial values the same as in the Fibonacci sequence: $f_0=0$ and $f_1=1$. To calculate $f_{n+1}$ we add $f_{n-1}$ and $f_n$ in base 3/2 and sort the digits in increasing order. It follows that numbers in the sequence are represented with several ones followed by several twos. Unlike base-10, the sequence is not periodic and grows indefinitely: \[0,\ 1,\ 1,\ 2,\ 2,\ 12,\ 12,\ 112,\ 112,\ 1112,\ 1112,\ 11112,\ \ldots.\] This sequence plays a special role in base 3/2 sorted Fibs. We call this sequence the \textit{Pinocchio} sequence. It is now sequence \seqnum{A305753}. From now on we use the notation $\delta_k$ to denote a string of $k$ digits $\delta$ in a row. If there is only one digit we drop the index. The following lemma proves the pattern that can be seen in the Pinocchio sequence. \begin{lemma} In the Pinocchio sequence, we have $f_{2k} = f_{2k-1} = 1_{k-1}2$, where $k > 1$. \end{lemma} \begin{proof} We prove this by induction. The base case holds. To calculate $f_{2k+1}$ we need to add $f_{2k-1}$ and $f_{2k}$, that is two numbers $1_{k-1}2$. The result is equal to $2_{k-1}4$ before the carries. Adding 2 and 2 means writing one and carrying two. As we continue carrying two to the beginning of the number we end up with $21_k$. After sorting we get the desired result. To calculate $f_{2k+2}$ we need to add $f_{2k}$ and $f_{2k+1}$. By the induction hypothesis $f_{2k+1} = f_{2k} + 10_k = f_{2k-1} + 10_k$. Using the previous calculation, $f_{2k} + f_{2k+1} = 21_k + 10_k = 201_k$. After sorting we get the desired result. \end{proof} The next interesting question is how the behavior of this sequence depends on the starting numbers. After the second number all terms of the sequence are sorted. From now on, we assume that we start with sorted numbers. Here are examples of two starting numbers when we end in the same pattern as above: (1,1), (2,112), or (1,12). However, not all starting numbers end in the Pinocchio sequence. Starting with 2 and 22 we get 2, 22, 112, 122, 1122, 122, 122, 112, 1122, 1122, 112, 1122, and so on. It becomes periodic with a period-3 cycle: 112, 1122, 1122. Our goal is to show that for any starting terms the sequence eventually turns either into the Pinocchio sequence or into the 3-cycle above. When we add two sorted numbers, we can represent the result as the sum $1_a2_b3_c4_d$ before we do the carries. The following lemma describes the result after the carries and sorting. \begin{lemma}\label{lemma:carry} Given the string $1_a2_b3_c4_d$, after performing the carries and sorting, the resulting string is the following: \begin{enumerate} \item $a >0$ and $d > 1$: $1_{c+1}2_d$. \item $a = 0$ and $d > 1$: $1_{c+2}2_{d-1}$. \item $d=1$: $1_{b+1}2_{c+1}$. \item $c > 0$ and $d = 0$: $1_{b}2_{c}$. \item $c=0$ and $d =0$: $1_{a}2_{b}$. \end{enumerate} \end{lemma} \begin{proof} We start by assuming $a >0$ and $d > 1$. After the carries we get: $20_{a-1}20_{b}1_c2_{d-2}01.$ Then after sorting we get: $1_{c+1}2_d$. If $a = 0$ and $d > 1$, after the carries we get $210_b1_c2_{d-2}01.$ Then after sorting we get $1_{c+2}2_{d-1}$. If $d=1$, after the carries we get $20_a1_b2_c1$. When sorted, we get $1_{b + 1}2_{c + 1}$. If $d = 0$ and $c > 0$ after carries we get $20_a1_b2_{c-1}0$. After sorting we get $1_b2_c$. Finally, if $c=0$ and $d =0$. There are no carries and after sorting the result is the same: $1_a2_b$. \end{proof} Numbers $a$, $b$, $c$, and $d$ play a big role in the coming proofs. For this reason, we want to associate them with every term of the sequence. That is, $a_n$, $b_n$, $c_n$, and $d_n$ correspond to the sum of $f_{n-2}$ and $f_{n-1}$ before carry. In our assumption, all terms of the sequence are sorted. Let $z_n$ be the number of 2s in the $n^{th}$ entry, and let $y_n$ be the number of 1s in the $n^{th}$ entry. Integers $a_n$, $b_n$, $c_n$, and $d_n$ give us some information about $f_{n-2}$ and $f_{n-1}$. For example, we know the minimum of the number of twos: \[\min\{z_{n-2},z_{n-1}\} = d.\] For the maximum there are two possibilities: \[\max\{z_{n-2},z_{n-1}\} = c+d \quad \text{ or} \quad \max\{z_{n-2},z_{n-1}\} = b+c+d.\] The second situation happens when one of the numbers is $1_c2_d$ and the other is $1_a2_{b+c+d}$. We can also estimate the total number of digits: \[c+d \leq \min\{y_{n-2}+z_{n-2},y_{n-1}+z_{n-1}\} \leq b+c+d\] and \[\max\{y_{n-2}+z_{n-2},y_{n-1}+z_{n-1}\} = a+b+c+d.\] Every term in the sorted Fibs sequence, except for the first few terms, has at least one 1 and one 2 as the following corollary explains. \begin{corollary} For a sorted Fibs sequence that starts with sorted strings, if $n \geq 2$, then $z_n > 0$. Also, if $n \geq 4$, then $y_n > 0$. \end{corollary} \begin{proof} The only case in the list in Lemma~\ref{lemma:carry} when the resulting number of 2s is zero is the last one when $b = c= d = 0$. This case is impossible as we are summing up two non-zero numbers, and the last digit before carry must be greater than 1. When there is at least one 2 in each number, then the last digit of the next number in the sequence will be $2+2\implies 1$, so there must be a 1 in the number. \end{proof} We can bound sequence $z_n$ of the number of twos. \begin{lemma} If $n \geq 4$, then $z_n \leq \max\{z_{n-1},z_{n-2}\}$. \end{lemma} \begin{proof} If $n \geq 4$, then both $f_{n-1}$ and $f_{n-2}$ have twos. That means $d_n >0$. Therefore, from Lemma~\ref{lemma:carry}, we have $z_n$ is one of: $d_n$, $d_n-1$, or $c_n+1$. In either case, $z_n \leq c_n+d_n$. On the other hand, one of the previous numbers has at least $c_n+d_n$ twos. \end{proof} Let us denote the maximum number of twos in two consecutive terms $f_n$ and $f_{n+1}$ as $m_n$: $m_n = \max\{z_n,z_{n+1}\}$. From the previous lemma it follows that $m_{n+1} \leq m_n$, for $n \geq 5$. As our sequence is infinite, it follows that $m_n$ stabilizes. As we are interested at the eventual behavior of sorted Fibs, we proceed by studying sequences where $m_n$ is fixed and equal to $M$. We call such sequences \textit{M-stable}. Let us assume that sequence $f_n$ is M-stable. One example, is the Pinocchio sequence, starting from index 3, where $z_n = 1$. \begin{lemma}[Fluctuation Lemma] An M-stable sequence for $n>0$ is either a subsequence of the Pinocchio sequence, or, for that sequence, $z_n$ can have only two values: $M$ and 1. \end{lemma} \begin{proof} We consider cases depending on the behavior of the number of twos: \begin{enumerate} \item $z_n =M > 1$ for any $n$; \item $z_n = M = 1$ for any $n$; \item $z_n$ varies. \end{enumerate} Case 1. Suppose the number of twos does not change and is more than 1: $z_n =M > 1$. Given that $z_{n-2} = z_{n-1} =M$, we get $c_n=0$ and $d_n =M$. From the fact that $z_n =M >1$, it follows that this could only be case 1 from Lemma~\ref{lemma:carry} and $f_n = 12_d$. Similarly, $f_{n+1} = 12_d$. Summing them up, we get $f_{n+2} = 1112_{d-1}$: the number of twos is reduced, which is a contradiction. Case 2. Suppose the number of twos does not change and is 1: $z_n =M = 1$. The sequence of the number of ones can start as: \begin{itemize} \item $y_{n-2}=a+b$, $y_{n-1} = b$, where $a > 0$. Then $y_n = b+1$. \item $y_{n-2}=b$, $y_{n-1} = b+1$. \item $y_{n-2}=b$, $y_{n-1} = a+b$, where $a > 1$. Then it continues as $y_n = b+1$, $y_{n+1} = b+2$. \end{itemize} In all cases we get into the Pinocchio sequence. Case 3. Suppose $z_{n-2} = M > z_{n-1}$. Then $c_n > 0$ and $d_n = z_{n-1}$. Then $z_{n} =M$ to guarantee M-stability. Therefore, $z_n \geq c_n + d_n$. On the other hand, from Lemma~\ref{lemma:carry}, $z_n$ must be either $d$, $d-1$, or $c+1$. The only possibility is that $d_n = c_n+d_n$ and $d_n=1$. Therefore, $z_{n-1} =1$. Thus we showed that if $z_n \neq M$, then $z_n = 1$. \end{proof} Next we want to show that if an M-stable sequence has a varying number of twos and $M >2$, then the number of twos strictly alternates between $M$ and 1. We already know that such a sequence $z_n$ cannot have two ones in a row. What is left to show that it does not have two $M$s in a row. We show that if it does have two $M$s in a row, then $M$ does not vary. \begin{lemma} In an M-stable sorted Fibs sequence, suppose that $z_n=z_{n+1}=M>2$. Then $z_{k}=M$, for $k > n+1$. \end{lemma} \begin{proof} The sum of the $n^{th}$ and $(n+1)^{th}$ entry is of the form $1_a 2_b 4_M$, as the terms $f_n$ and $f_{n+1}$ have the same number of twos. If $M>1$, then $z_{n+2}=M$ or $z_{n+2}=M-1$. But $M-1 \neq 1$, so this case is impossible. Therefore, $z_{n+2}=M$. Similarly, $z_{k}=M$, for all consecutive $k$. \end{proof} We showed that if $M > 2$ and varies, then the sequence $z_n$ alternates: $\ldots$, $M$, 1, $M$, 1, $\ldots$. Now we show that sequence $z_n$ cannot have subsequence 1, $M > 1$, 1. \begin{lemma} The case $z_{n-2} = z_n = 1$ and $z_{n-1} > 1$ is impossible. \end{lemma} \begin{proof} If $z_{n-2} = 1$ and $z_{n-1} > 1$, then $d_n=1$, and $c_n > 0$. That means we are in the third case in Lemma~\ref{lemma:carry}, and $z_n = c_n+1$, contradiction. \end{proof} This excludes the alternating case for $M > 2$. It also means, that if $M=2$, then we still cannot have 1, 2, 1 in the sequence $z_n$. Now we are ready for our classification theorem. \begin{theorem} Any sorted Fibs sequence eventually turns into either the Pinocchio sequence or the 3-cycle 112, 1122, 1122. \end{theorem} \begin{proof} We already know that the sequence either turns into the Pinocchio sequence or, starting from some $n$, $m_n=2$ and $z_n$ sequence varies and does not contain a subsequence 1, 2, 1. Therefore, we can find integer $N$, such that $z_{N-2} = z_{N-1} = 2$ and $z_N=1$. That means numbers $a_N$, $b_N$, $c_N$, $d_N$ should correspond to the second case in Lemma~\ref{lemma:carry}. That is, $a_N=0$. Therefore $y_{N-2}=y_{N-1}$. Also $c_N=0$, thus $a_N=112$. For the next step we get $b_{N+1}=c_{N+1}=d_{N+1}=1$. Therefore, the next number is 1122. And we got into our cycle. \end{proof} \subsection{Reverse sorted Fibs} The \textit{reverse sorted Fibs} sequence $r_n$ in base 3/2 is defined as follows: To calculate $r_{n+1}$, we add $r_{n-1}$ and $r_n$ in base 3/2 and sort the digits in decreasing order, ignoring zeros. It follows that numbers in the sequence are represented with several twos followed by several ones. The base-10 analog without discarding zeros exists in the OEIS database: \seqnum{A237575} Fibonacci-like numbers with nonincreasing positive digits. We call the sequence that starts similar to Fibonacci sequence with $r_0=0$ and $r_1=1$, the \textit{proper reverse sorted Fibs}. Here are several terms of the proper reverse sorted Fibs: 0, 1, 1, 2, 2, 21, 21, 221, 2211, 221, 221, 2211, 221, 221, 2211, $\ldots$. This sequence becomes cyclic, starting from $r_7$. As in the previous section, we use the notation $\delta_k$ to denote a string of $k$ digits $\delta$ in a row. If there is only one digit we drop the index. We want to study the eventual behavior of the reverse sorted Fibs depending on the starting terms. By computational experiments, we found a series of 3-cycles that such a sequence can turn into: \[2_k1,\ 2_k1,\ 2_k1_2,\] where $k > 1$. We also found a sequence growing indefinitely: \[2_k1_2,\ 2_k1_2,\ 2_{k+1}1_2,\ 2_{k+1}1_2,\ 2_{k+2}1_2,\ 2_{k+2}1_2,\] and so on, where $k > 1$. We were surprised by the fact that the sorted Fibs and the reverse sorted Fibs were so similar. They both have exactly one sequence that grows indefinitely. To emphasize this analogy, we reversed the word Pinocchio to call this growing reverse Fibs sequence the \textit{Oihcconip} sequence. Our goal is to prove that the eventual behavior of a reverse sorted Fibs sequence must be one of the 3-cycles or the tail of the Oihcconip sequence. Let us compute a sum of two sorted numbers before carry. It could be of the form $2_a 1_b 3_c 2_d$, or it could be of the form $2_a 4_b 3_c 2_d$, where some of the indices might be zero. The first case happens when the number of ones of one of the numbers is greater or equal to the number of digits of the other number. Alternatively, we can say that the cases depend on whether the positions of twos overlap or not. For the first case, we have $2_a 1_b 3_c 2_d= 2_a 1_{b-1} 3 2_{c-1} 0 2_d=2_a 3 0_{b-1} 2_{c-1} 0 2_d=2 1_{a}0 0_{b-1} 2_{c-1} 0 2_d$, which sorts to $2_{c+d}1_{a}$, assuming $b, c \geq 1$. If $c = 0$, then there is no carry, and the result is $2_{a+d}1_b$. When $b = 0$ and $c > 0$ we get $2_a 3_c 2_d = 2_{a-1} 4 2_{c-1} 0 2_d=2 1_{a} 2_{c-1} 0 2_d$, which sorts to $2_{c+d}1_{a}$. We summarize this into Table~\ref{tab:case1}. \begin{table}[htb!] \begin{center} \begin{tabular}{ |c |r |r|} \hline case & before carry & after carry \\ \hline $c>0$ & $2_a 1_b 3_c 2_d$ & $2_{c+d}1_{a}$ \\ $c=0$ & $2_a 1_b 2_d$ &$2_{a+d}1_b$ \\ \hline \end{tabular} \end{center} \caption{Case 1.}\label{tab:case1} \end{table} For the second case, we have $2_a 4_b 3_c 2_d=2_a 4_{b-1} 6 2_{c-1} 0 2_d=2_a 8 2_{b-2} 0 2_{c-1} 0 2_d=2 1 0_{a} 22_{b-2} 0 2_{c-1} 0 2_d$, which sorts to $2_{b+c+d-1} 1$, assuming $b \geq 2$ and $c \geq 1$. For this case, we do not need to check $b=0$, as it is a subcase of the first case. We do need to check the cases $c=0$ and/or $b=1$. The summary is in Table~\ref{tab:case2}. \begin{table}[htb!] \begin{center} \begin{tabular}{ |c|r |r |} \hline case & before carry & after carry \\ \hline $b>1$ $c>0$ & $2_a 4_b 3_c 2_d$ & $2_{b+c+d-1} 1$ \\ $b>1$ $c=0$ & $2_a 4_b 2_d$ & $2_{b+d-1}1_{2}$ \\ $b=1$ $c>0$ & $2_a 4 3_c 2_d$ & $2_{c+d}1$ \\ $b =1$ $c=0$ & $2_a 4 2_d$ & $2_{d+1}1_{a+1}$ \\ \hline \end{tabular} \end{center} \caption{Case 2.}\label{tab:case2} \end{table} Combining two cases together and adding a column for previous terms we get Table~\ref{tab:twocases}. \begin{table}[htb!] \begin{center} \begin{tabular}{ |c|r |r | r|} \hline case & before carry & after carry & previous numbers\\ \hline Case 1. $c>0$ & $2_a 1_b 3_c 2_d$ & $2_{c+d}1_{a}$ & $2_a1_{b+c+d}$ and $2_c1_d$\\ Case 1. $c=0$ & $2_a 1_b 2_d$ &$2_{a+d}1_b$ & $2_a1_{b+d}$ and $1_d$\\ Case 2. $b>0$ $c>0$ & $2_a 4_b 3_c 2_d$ & $2_{b+c+d-1} 1$ & $2_{a+b}1_{c+d}$ and $2_{b+c}1_d$; $2_{a+b+c}1_{d}$ and $1_{c+d}$; \\ Case 2. $b>1$ $c=0$ & $2_a 4_b 2_d$ & $2_{b+d-1}1_{2}$ & $2_{a+b}1_{d}$ and $2_b1_d$\\ Case 2. $b =1$ $c=0$ & $2_a 4 2_d$ & $2_{d+1}1_{a+1}$ & $2_{a+1}1_{d}$ and $21_d$\\ \hline \end{tabular} \end{center} \caption{Two cases together}\label{tab:twocases} \end{table} We start with discussing the number of twos. \begin{lemma} Starting from $n>1$, each element of a reverse sorted Fibs sequence contains 2. \end{lemma} \begin{proof} If the sum of two terms has a carry, the result has to have a two. If it does not, the last digits of the previous terms have to be ones, and the result has to have a two. \end{proof} That means we can remove some cases from Table~\ref{tab:twocases} to generate the new Table~\ref{tab:leftovercases}. \begin{table}[htb!] \begin{center} \begin{tabular}{ |c|c|r |r | r|} \hline line & case & before carry & after carry & previous numbers\\ \hline L1 & $a>0$ $c>0$ & $2_a 1_b 3_c 2_d$ & $2_{c+d}1_{a}$ & $2_a1_{b+c+d}$ and $2_c1_d$\\ L2 & $c>0$ $b > 0$ & $2_a 4_b 3_c 2_d$ & $2_{b+c+d-1} 1$ & $2_{a+b}1_{c+d}$ and $2_{b+c}1_d$ \\ L3 & $b>1$ $c=0$ & $2_a 4_b 2_d$ & $2_{b+d-1}1_{2}$ & $2_{a+b}1_{d}$ and $2_b1_d$\\ L4 & $b =1$ $c=0$ & $2_a 4 2_d$ & $2_{d+1}1_{a+1}$ & $2_{a+1}1_{d}$ and $21_d$\\ \hline \end{tabular} \end{center} \caption{Leftover cases}\label{tab:leftovercases} \end{table} We can see that now the result contains at least one one. Therefore, we can assume that $d > 0$. Now we are ready to study the eventual behavior of reverse sorted Fibs sequences. We consider each line in Table~\ref{tab:leftovercases} separately starting from Line 2. \begin{lemma} If we start in Line 2, then we end up in a cycle sequence. \end{lemma} \begin{proof} Recall that $b,c,d > 0$. The sum of $r_0$ and $r_1$ before carry is $2_a 4_b 3_c 2_d$ forcing $r_2 = 2_{b+c+d-1} 1$. We consider two cases based on the order of the previous terms. \textbf{Case 1.} $r_0=2_{a+b}1_{c+d}$ and $r_1= 2_{b+c}1_d$. If $r_1 = r_2$, that is $d=1$, we are in a cycle sequence. If not, then $r_3= 2_{b+c+d-1} 1 =r_2$, and we get into a cycle sequence anyway. \textbf{Case 2.} $r_0= 2_{b+c}1_d$ and $r_1=2_{a+b}1_{c+d}$. As $c+d > 1$, for the next number we are in Line 2 again, and $r_3 = 2_{b+c+d-1} 1$. We end up in a cycle sequence again. In any case $r_2$ is in a cycle. \end{proof} Now we go to Line 3. \begin{lemma} If we start in Line 3, then we end up in a cycle if $d \neq 2$. We also end in a cycle if $r_0=21_2$ and $r_1=2_{a+1}1_2$. Otherwise, we end in the Oihcconip sequence. \end{lemma} \begin{proof} Recall that $b,d > 0$. The sum of $r_0$ and $r_1$ before carry is $2_a 4_b 2_d$. We consider two cases based on the order of the previous terms. \textbf{Case 1.} Suppose $r_0=2_{a+b}1_{d}$ and $r_1=2_b1_d$. Then $r_2 = 2_{b+d-1} 1_2$. We consider cases. \begin{itemize} \item If $b=d=1$, then $r_1 = 21$, $r_2 = 21_2$, $r_3 = 2_21$, and $r_4 = 2_21$. We are in a cycle sequence starting from $r_3$. \item If $d \neq 2$ and $b+d > 2$, then $r_1$ and $r_2$ correspond to Line 2 and the next term, $r_3$ must be in a cycle sequence. \item If $d = 2$ and $b>1$, then $r_1=2_b1_2$ and $r_2 = 2_{b+1} 1_2$ and we are in the Oihcconip sequence starting from $r_1$. \item If $d = 2$ and $b=1$, then $r_1=2_11_2$, $r_2 = 2_2 1_2$, and $r_3 = 2_31_2$. We are in the Oihcconip sequence starting from $r_2$. \end{itemize} \textbf{Case 2.} Suppose $r_0=2_b1_d$ and $r_1=2_{a+b}1_{d}$. We can assume that $a>0$, otherwise we are covered by the previous case. Then $r_2 = 2_{b+d-1} 1_2$. We consider cases. \begin{itemize} \item If $d \neq 2$, then $r_1$ and $r_2$ correspond to Line 2 and the next term, $r_3$, must be in a cycle sequence. \item If $d=2$ and $b \geq 1$, we have $r_1 = 2_{a+b}1_2$ and $r_2 = 2_{b+1}1_2$. As $b> 1$, we are now in Line 3, and $r_3 = 2_{b+2}1_2$. Therefore, we are in the Oihcconip sequence starting from $r_2$. \end{itemize} \end{proof} Now we go to Line 1. \begin{lemma} If we start in Line 1, then we end up in the Oihcconip sequence or a cycle. \end{lemma} \begin{proof} The two previous terms are $2_a1_{b+c+d}$ and $2_c1_d$. Also, $a, c, d > 0$. We already know that we must eventually enter a cycle or the Oihcconip sequence if we get to Line 2 or 3. We consider two cases based on the order of the previous terms. \textbf{Case 1.} Suppose $r_0 = 2_a1_{b+c+d}$, $r_1 = 2_c1_d$, and $r_2 = 2_{c+d}1_{a}$. Now we see which line corresponds to $r_1$ and $r_2$. \begin{itemize} \item If $a < d$ we are on Line 2. \item If $a = d$, and $c > 1$, we are on Line 3. \item If $a=d$, and $c=1$, we have $r_2 = 2_{d+1}1_{d}$ and we get $r_3 = 2_{d+1}1_{d+1}$ putting us on Line 2. \item If $d < a < c+d$, we are on Line 3. \item If $a \geq c+d$, we get $r_3=2_{c+d} 1_{c+d}$. For the next step we have subcases. a) If $c+d\leq a<2c+2d$, we are on Line 2. b) If $a \geq 2c+2d$, then we are on Line 1 and $r_4=2_{2c+2d}1_{c+d}$. After that we get to Line 3 again. \end{itemize} \textbf{Case 2.} Suppose $r_0 = 2_c1_d$ and $r_1 = 2_a1_{b+c+d}$, and $r_2 = 2_{c+d}1_{a}$. \begin{itemize} \item If $a > b+c+d$, we are on Line 2. \item If $a = b+c+d$, we are on Line 3. \item If $b < a < b+c+d$, we are on Line 2. \item If $a \leq b$, then we are on Line 1 and $r_3=2_{c+d+a}1_a$. For the next step we are on Line 3. \end{itemize} \end{proof} Finally we go to Line 4. \begin{lemma} If we start in Line 4, then we end up in the tail of the Oihcconip sequence or a cycle. \end{lemma} \begin{proof} The two previous terms are $2_{a+1}1_{d}$ and $21_d$. Also $d > 1$. We already know that we must eventually enter a cycle or the Oihcconip sequence if we get to Line 1, 2 or 3. We consider two cases based on the order of the previous terms. Now we see which line corresponds to $r_1$ and $r_2$. \textbf{Case 1.} Suppose $r_0= 2_{a+1}1_{d}$, $r_1 = 21_d$, then $r_2 = 2_{d+1}1_{a+1}$. \begin{itemize} \item If $a \geq d$, we are on Line 1. \item If $a = d-1$, then $r_2 = 2_{d+1}1_{d}$ and $r_3 = 2_{d+1}1_{d+1}$. Now we get on Line 3. \item If $a < d-1$, we are on Line 3. \end{itemize} \textbf{Case 2.} Suppose $r_0 = 21_d$ and $r_1 = 2_{a+1}1_{d}$, and $r_2 = 2_{d+1}1_{a+1}$. \begin{itemize} \item If $a+1 \neq d$, we are on Line 2. \item If $a+1 = d \neq 1$, then we are on Line 3. \item If $a+1 =d=1$, then $r_1=21$ and $r_2=2_21$. Then $r_3= 2_21_2$ and we get into a cycle. \end{itemize} \end{proof} We can summarize the results into the following theorem. \begin{theorem} We always end in a cycle or the tail of the Oihcconip sequence. \end{theorem} \section{Acknowledgements} We are grateful to PRIMES STEP for allowing us to do this research. We also want to thank Prof.~James Propp for helpful suggestions and Glen Whitney for pointing us to the tree.
\section{Introduction} The collective expansion of dense matter created in relativistic nuclear collisions creates strong correlation between emitted particles \cite{Heinz:2013th,Gale:2013da,Ollitrault:2010tn}. The azimuthal asymmetry of the collective flow gives rise to an asymmetry of particle spectra \begin{eqnarray*} \frac{dN}{d\phi} &\propto & 1+ v_2 \cos\left( 2(\phi -\Psi_2)\right) \nonumber \\ & + & v_3 \cos\left( 3(\phi -\Psi_3)\right) + \dots \ . \end{eqnarray*} In the above equation the elliptic $v_2$ and triangular $v_3$ flows and the flow angles $\Psi_n$ are collective parameters of the spectra that fluctuate from event to event. The harmonic flow coefficients can be extracted from two (or higher) particle correlations. The study of the flow coefficients in heavy-ion collisions at different centralities is a way to extract the properties of the expanding medium, in particular the value of shear viscosity. The collective parameters can depend on particle transverse momentum or pseudorapidity $v_n(p_\perp,\eta)$, $\Psi_n(p_\perp,\eta)$. Using correlations of two particles at different pseudorapidities \cite{Bozek:2010vz} or different transverse momenta \cite{Gardim:2012im} the decorrelation of the flow parameters at different $p_\perp$ or $\eta$ can be observed. The phenomenon is known as flow factorization breaking in pseudorapidity or transverse momentum. It has been measured experimentally \cite{Acharya:2017ino,Aad:2014lta,Khachatryan:2015oea,Aaboud:2017tql} and calculated in models \cite{Gardim:2012im,Heinz:2013bua,Kozlov:2014fqa,Lin:2004en,Pang:2015zrq,Xiao:2015dma}. It is found that the factorization breaking coefficient is sensitive to fluctuations in the initial state. The initial fluctuations are transformed by the collective expansion into a small decorrelation of flow parameters at two transverse momenta or pseudorapidities. The predicted decorrelation is not strongly dependent on the viscosity. Factorization breaking coefficients from two-particle correlations measure the overall flow decorrelation, which is a combined effect of the decorrelation of the collective flow magnitudes $v_n(p_\perp,\eta)$ and of the decorrelation of the flow angles $\Psi_n(p_\perp,\eta)$ at two different transverses momenta or rapidities. By using $4$-particle correlators the flow angle decorrelation and the overall flow decorrelation in pseudorapidity can be measured separately \cite{Aaboud:2017tql,Jia:2017kdq}. Experimental data and hydrodynamic model simulations \cite{Bozek:2017qir,Wu:2018cpc} show that the angle decorrelation accounts for only a part of the overall flow decorrelation in pseudorapidity. In this paper the analogous effect is studied for the harmonic flow decorrelation in transverse momentum. In the hydrodynamic model the flow angle and the flow magnitude decorrelations at different transverse momenta are studied separately and compared to the overall flow decorrelation (Sect. \ref{sec:angmag}). Model calculations show that the flow decorrelation in a particular event is correlated to the flow magnitude in the same event. This could be measured experimentally by using correlators weighed with different powers of $v_n$ (Sect. \ref{sec:decmag}). In order to measure the flow angle or flow magnitude decorrelations separately $4$-particle correlations must be used. Unlike for the decorrelation in pseudorapidity, where the flow angle decorrelation can be estimated, for the factorization breaking in transverses momentum a measure of the flow magnitude decorrelation can be naturally defined (Sect. \ref{sec:flowmagn}). The flow magnitude decorrelation accounts for about one half of the overall flow decorrelation at two different transverse momenta. The findings are consistent with the principal component analysis of correlation matrices of higher powers of harmonic flow (Sect. \ref{sec:pca}). \section{Model \label{sec:model}} I use 3+1 dimensional relativistic viscous hydrodynamics with Monte Carlo Glauber model initial conditions ~\cite{Schenke:2010rr,Bozek:2011ua} to model Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV. The initial entropy deposition in the transverse plane is given as a sum of contributions from $N_p$ participant nucleons \begin{equation} s(x,y)=\sum_{i=1}^{N_p} g_i(x,y) \ \label{eq:entropy} \end{equation} (the form of the initial distribution in the longitudinal direction is skipped here for simplicity, it follows the parametrization given in Ref. \cite{Bozek:2011ua}). Each nucleon gives a Gaussian-smeared contribution \begin{eqnarray} g_i(x,y)& = & \kappa \left( (1-\alpha)+\alpha c_i \right) \nonumber \\ & & \exp\left( - \frac{(x-x_i)^2+(y-y_i)^2}{2\sigma^2}\right) , \end{eqnarray} where $c_i$ is the number of collisions for nucleon $i$ at position $(x_i,y_i)$ and $\kappa$ is adjusted to reproduce the charged particle density in pseudorapidity. For Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV $\alpha=0.1$ is taken to describe the centrality dependence of the charged particle density. At the freeze-out temperature $150$~MeV statistical emission of hadrons takes place \cite{Chojnacki:2011hb}. For each hydrodynamic event I generate $150$ or $600$ events for centralities $0-5$\% and $30-40$\%. For each hydrodynamic event the collective flow is calculated by combining these events. This procedure reduces statistical errors and non-flow contributions in multiparticle correlators \cite{Bozek:2017thv}. The event-by-event reconstruction of the flow vectors in the model allows to calculate the flow angle or flow magnitude decorrelation separately. The flow correlations are analyzed in the transverse momentum range $p_\perp \in [0.3,3.0]$~GeV. The $p_\perp$ range is divided into bins of unequal width, but of equal mean particle multiplicity in each bin \cite{Bozek:2017thv}. This choice guarantees that the statistical errors for the all the elements of correlators in two $p_\perp$ bins are similar. \section{Flow angle and flow magnitude decorrelation \label{sec:angmag}} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cor205.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cor305.pdf} \end{center} \vspace{-5mm} \caption{Correlator for the flow angle from Eq.~(\ref{eq:dvnang}) (dot-dashed line), for the flow magnitude from Eq.~(\ref{eq:dvnmag}) (dashed line), and for the harmonic flow from Eq.~(\ref{eq:rn}) (solid line) for two bins in transverse momentum. Panels (a) and (b) show the results for the second- and third-order harmonic flow, respectively. Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV for centrality 0-5\%. \label{fig:vam05}} \end{figure} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cor23040.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cor33040.pdf} \end{center} \vspace{-5mm} \caption{Same as Fig. \ref{fig:vam05} but for centrality 30-40\%. \label{fig:vam3040}} \end{figure} The decorrelation of harmonic flow at two different transverse momenta $p_a$ and $p_b$ is measured using the factorization breaking coefficient \cite{Gardim:2012im} \begin{equation} r_n(p_a,p_b)=\frac{\langle q_n(p_a) q_n^\star(p_b) \rangle} {\sqrt{\langle v_n(p_a)^2 \rangle \langle v_n(p_p)^2 \rangle }} \ , \label{eq:rn} \end{equation} where \begin{equation} q_n(p) = \frac{1}{N} \sum_{j} e^{ i n \phi_j} = v_n(p) e^{i n \Psi_n(p)} \end{equation} is the $q$ vector of the n-th order harmonic flow calculated from the azimuthal angles $\phi_j$ of $N$ particles in the bin at transverse momentum $p$ and $\langle \dots \rangle$ denotes the average over events. The n-th harmonic at transverse momentum $p$ can be written as \begin{equation} \langle v_n(p)^2 \rangle = \langle q_n(p) q_n^\star(p) \rangle =\frac{1}{N(N-1)}\sum_{j\neq k} e^{i n (\phi_j-i \phi_k)} \ . \end{equation} In this paper I use the convention that selfcorrelation terms are dropped from sums over particles in the same bin. For flow dominated correlations between emitted particles the factorization breaking coefficient $r_n$ measures the correlation coefficient of the flow vectors $q_n$ at different transverse momenta. In that case $r_n(p_a,p_b)\le 1$ \cite{Gardim:2012im}. The value $r_n(p_a,p_b) <1$ means that the harmonic flow at the transverse momenta $p_a$ and $p_b$ is partially decorrelated. This decorrelation can be due to a flow magnitude or a flow angle decorrelation \cite{Jia:2014vja}. Flow angle decorrelation means that event-by-event differences in the effective flow angles $\Psi_n(p_a)$ and $\Psi_n(p_b)$ at the two transverse momenta appear. The flow angle difference $\Psi(p_a)-\Psi_n(p_b)$ contributes a factor $\cos\left\{ n \left[\Psi_n(p_a) -\Psi_n(p_b)\right] \right\}$ in the numerator of of the factorization breaking coefficient $r_n(p_a,p_b)$. The decorrelation of the harmonic flow angles is defined as \begin{equation} \langle \cos\left \{ n \left[\Psi_n(p_a) -\Psi_n(p_b)\right] \right \} \rangle \ . \label{eq:dvnang} \end{equation} The decorrelation of the magnitude of the harmonic flow at two transverse momenta can be defined as \begin{equation} \frac{\langle v_n(p_a) v_n(p_b)\rangle}{\sqrt{\langle v_n(p_a)^2 \rangle \langle v_n(p_p)^2 \rangle }} \ . \label{eq:dvnmag} \end{equation} Please note that the angle (\ref{eq:dvnang}) and magnitude (\ref{eq:dvnmag}) decorrelations cannot be calculated from experimental data. On the other hand, these quantities can be estimated in the hydrodynamic model integrating over the particle distributions in momenta, instead of a summation over particles in an event. In practice this integration is performed using a Monte Carlo method by generating a large number of particles at the freeze-out hypersurface, as described in Sect. \ref{sec:model}. If the angle and magnitude decorrelation factorize, on has \begin{eqnarray} & & r_n(p_a,p_b)\simeq \nonumber \\ & & \frac{\langle v_n(p_a) v_n(p_b)\rangle}{\sqrt{\langle v_n(p_a)^2 \rangle \langle v_n(p_p)^2 \rangle }}\langle \cos\left \{ n \left[\Psi_n(p_a) -\Psi_n(p_b)\right] \right \} \rangle \ . \label{eq:appfac} \end{eqnarray} In Figs. \ref{fig:vam05} and \ref{fig:vam3040} are compared the factorization breaking coefficients $r_n(p_a,p_b)$, the angle decorrelation (\ref{eq:dvnang}), and the magnitude decorrelation (\ref{eq:dvnmag}). The factorization breaking coefficient is not a simple product of the angle and magnitude decorrelations as in Eq. \ref{eq:appfac}. In fact, an inverted hierarchy of decorrelations appears. The angle decorrelation (\ref{eq:dvnang}) is stronger than the flow decorrelation given by the factorization breaking coefficient $r_2$. The reason for the inverted hierarchy is that the three averages in Eq. \ref{eq:appfac} are weighted with different powers of $v_n$ \cite{Bozek:2017qir}. The decorrelation of the flow angles is anticorrelated with the overall magnitude of the flow in an event. Therefore the average (\ref{eq:dvnang}), that is weighted with a zeroth power of $v_n$, gives a larger deviation from $1$, i.e. a stronger decorrelation than the other two averages in Figs. \ref{fig:vam05} and \ref{fig:vam3040}. \section{Correlation of the overall flow magnitude and of the flow decorrelation\label{sec:decmag}} On an event-by-event basis an anti-correlation occurs between the magnitude of the flow $v_n^2$ in the event and the factorization breaking coefficient. In events with a larger flow the the decorrelation is smaller ($r_n$ is bigger, closer to $1$). This effect has been observed in model calculations for the decorrelation in pseudorapidity \cite{Bozek:2017qir}. The same effect can be evidenced for the decorrelation of flow in transverse momentum. Experimentally factorization breaking coefficients weighted with different powers of $v_n$ can be defined \begin{equation} r_{n|n;1}^{n;2k}(p_a,p_b)=\frac{\langle v_n^{2k} q_n(p_a) q_n^\star(p_b) \rangle} {\sqrt{\langle v_n^{2k} v_n(p_a)^2 \rangle \langle v_n^{2k} v_n(p_p)^2 \rangle }} \ . \label{eq:rvk} \end{equation} For $k=0$ the above formula reduces to the standard factorization breaking coefficient $r_n(p_a,p_b)$. The correlators in the numerator and denominator of Eq. \ref{eq:rvk} involve summation over $2+2k$ particles. Self-correlations must be subtracted in the summation. In experiment non-flow effects can be reduced using rapidity gaps. \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{corvk205.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{corvk305.pdf} \end{center} \vspace{-5mm} \caption{Correlator of the flow (solid line), of the flow weighted with $v_n^2$ (dashed line), and of the flow weighted with $v_n^4$ (dotted line) at two different transverse momenta. The dash-dotted line represent the correlator for the flow angle (\ref{eq:dvnang}). Panels (a) and (b) show the results for the second- and third-order harmonic flow, respectively. Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV for centrality 0-5\%. \label{fig:vv05}} \end{figure} In Figs. \ref{fig:vv05} and \ref{fig:vv3040} are shown the correlators $r_{n|n;1}^{n;2k}(p_a,p_b)$ for $k=0,1,2$. The flow magnitude in the weighting factor $v_n^{2k}$ corresponds to the integrated flow in $p_\perp \in [0.3,3.0]$~Gev. For correlators with higher powers of the weighting factor $v_n^{2k}$ the decorrelation is weaker. This prediction could be tested in experiment in order to evidence the relation between the overall flow magnitude and the flow decorrelation in transverse momentum. The angle decorrelation (\ref{eq:dvnang}) is shown in Figs. \ref{fig:vv05} and \ref{fig:vv3040} as well (dash-dotted lines). This quantity give the strongest decorrelation, as it corresponds to having effectively a weighting factor $v_n^{-2}$. This last correlator can be estimated in the model but not in the experiment. \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{corvk23040.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{corvk33040.pdf} \end{center} \vspace{-5mm} \caption{Same as Fig. \ref{fig:vv05} but for centrality 30-40\%. \label{fig:vv3040}} \end{figure} \section{Higher order flow correlators} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cor22compare05.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cor33compare05.pdf} \end{center} \vspace{-5mm} \caption{Correlator of the flow (solid line), of the flow squared (dashed line), and of the flow to power $3$ (dotted line) at two different transverse momenta. Solid lines with symbols represent second and third powers of the standard flow correlator $r_2$. Panels (a) and (b) show the results for the second- and third-order harmonic flow, respectively. Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV for centrality 0-5\%. \label{fig:qq05}} \end{figure} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cor22compare3040.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cor33compare3040.pdf} \end{center} \vspace{-5mm} \caption{Same as Fig. \ref{fig:qq05} but for centrality 30-40\%. \label{fig:qq3040}} \end{figure} Correlators of higher powers of the flow in two different pseudorapidity bins have been measured experimentally \cite{Aaboud:2017tql} and calculated in the hydrodynamic model \cite{Bozek:2017qir,Wu:2018cpc}. The simplest higher order correlators involve higher powers of the $q$ vectors \begin{equation} r_{n|n;k}(p_a,p_b)=\frac{\langle q_n(p_a)^k q_n^\star(p_b)^k \rangle} {\sqrt{\langle v_n(p_a)^{2k} \rangle \langle v_n(p_p)^{2k} \rangle }} \ . \label{eq:hiq} \end{equation} For $k=1$ one recovers the factorization breaking coefficient (\ref{eq:rn}) $r_{n|n;1}(p_a,p_b)=r_n(p_a,p_b)$. Correlators involving higher powers of the flow vector yield stronger decorrelation, $r_{n|n;3}(p_a,p_b)<r_{n|n;2}(p_a,p_b)<r_{n|n;1}(p_a,p_b)$ (Figs. \ref{fig:qq05} and \ref{fig:qq3040}). Factorization breaking coefficients for higher powers of flow vectors do not factorize into powers of the basic factorization coefficient \begin{equation} r_{n|n;k}(p_a,p_b)\neq r_{n}(p_a,p_b)^k \ \ . \end{equation} \section{Measuring flow magnitude factorization breaking \label{sec:flowmagn}} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cork2205.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cork2305.pdf} \end{center} \vspace{-5mm} \caption{Correlator for the flow squared (solid line) and for the flow magnitude squared (dashed line). Panels (a) and (b) show the results for the second- and third-order harmonic flow, respectively. Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV for centrality 0-5\%. \label{fig:k205}} \end{figure} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{cork223040.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{cork233040.pdf} \end{center} \vspace{-5mm} \caption{Same as Fig. \ref{fig:k205} but for centrality 30-40\%. \label{fig:k23040}} \end{figure} The angle and magnitude factorization breaking coefficients discussed in Sect. \ref{sec:angmag} given by Eqs. \ref{eq:dvnang} and \ref{eq:dvnmag} cannot be measured experimentally. The angle decorrelation in pseudorapidity can been measured separately using a $4$-bin correlator \cite{Aaboud:2017tql,Jia:2017kdq}. That correlator involves $4$ $q_n$ vectors and should be compared to the correlator of the square of the $q_n$ vectors in two bins. It was found that the flow decorrelation (involving flow magnitude and flow angle decorrelation combined) is twice as strong than the flow angle decorrelation alone, both in experiment \cite{Aaboud:2017tql} and in model calculations \cite{Bozek:2017qir,Wu:2018cpc}. The situation is slightly different for the decorrelation of the harmonic flow in transverse momentum. One can define a correlator measuring the decorrelation of the flow magnitude squared \begin{equation} r_{n}^{v_n^2}(p_a,p_b)=\frac{\langle v_n(p_a)^2 v_n(p_b)^2\rangle }{\sqrt{ \langle v_n(p_a)^4 \rangle\langle v_n(p_b)^4 \rangle}} \ . \label{eq:dvmag2} \end{equation} The above correlator can be compared to the correlator of flow vector squared $r_{n|n;2}(p_a,p_b)$ (\ref{eq:hiq}). Both correlators $r_{n}^{v_n^2}(p_a,p_b)$ and $r_{n|n;2}(p_a,p_b)$ involve averages of $4$ $q_n$ vectors and both correlators can be measured in the experiment. The first one measures the flow magnitude decorrelation alone, while the second one measures the flow magnitude and flow angle decorrelations combined. The predictions for the two correlators for two centralities are presented in Figs. \ref{fig:k205} and \ref{fig:k23040}. The decorrelation of the flow magnitude is significantly smaller than the flow decorrelation. Both for the elliptic and triangular flows, I find that the flow magnitude decorrelation accounts for roughly half of the total flow decorrelation \begin{equation} 1-r_{n}^{v_n^2}(p_a,p_b) \simeq \frac{1}{2} \left( 1- r_{n|n;2}(p_a,p_b) \right) \ \ . \label{eq:simfac} \end{equation} \section{Principal component analysis \label{sec:pca}} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{vec2205.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{vec3305.pdf} \end{center} \vspace{-5mm} \caption{Leading (solid line) and subleading (dashed line) eigenmodes of the correlation matrix of the square of the harmonic flow at two transverse momenta. The dotted and dash-dotted lines denote the leading and subleading eigenmodes for the correlation matrix of the square of the magnitude of the harmonic flow. Panel (a) and (b) present results for the elliptic and triangular flow respectively. Pb+Pb collisions at $\sqrt{s_{NN}}=5.02$~TeV for centrality 0-5\%. \label{fig:vec05}} \end{figure} \begin{figure} \begin{center} \includegraphics[angle=0,width=0.41 \textwidth]{vec223040.pdf} \vspace{4mm} \includegraphics[angle=0,width=0.41 \textwidth]{vec333040.pdf} \end{center} \vspace{-5mm} \caption{Same as Fig. \ref{fig:vec05} but for centrality 30-40\%. \label{fig:vec3040}} \end{figure} The correlation matrix of the harmonic flow can be decomposed into its principal components \cite{Bhalerao:2014mua} \begin{eqnarray} && \langle\langle q_n(p_a) q_n^\star(p_b) \rangle \rangle = \langle q_n(p_a) q_n^\star(p_b) \rangle -\langle q_n(p_a) \rangle \langle q_n^\star(p_b) \rangle \nonumber \\ & & = \langle q_n(p_a) q_n^\star(p_b) \rangle = \nonumber \\ & & v_n^{(0)}(p_a)v_n^{(0)}(p_b)+ v_n^{(1)}(p_a)v_n^{(1)}(p_b) + \dots \ , \label{eq:corrmat} \end{eqnarray} where the leading eigenmode is $v_n^{(0)}(p_a) \simeq \sqrt{\langle v_n(p_a)^2 \rangle } $. If the subleading modes can be neglected the correlation matrix factorizes \begin{equation} \langle\langle q_n(p_a) q_n^\star(p_b) \rangle \rangle \simeq \sqrt{\langle v_n(p_a)^2 \rangle\langle v_n(p_b)^2 \rangle } \ . \end{equation} The factorization breaking coefficient can be written as \cite{Bhalerao:2014mua} \begin{equation} r_n(p_a,p_b)=1-\frac{1}{2}\left| \frac{v_n^{(1)}(p_a)}{v_n^{(0)}(p_a)}- \frac{v_n^{(1)}(p_b)}{v_n^{(0)}(p_b)}\right|^2 \ . \end{equation} The principal component decomposition of the flow correlation matrix (\ref{eq:corrmat}) carries the information about the flow factorization breaking. The flow magnitude decorrelation discussed in the previous section involves a correlation of higher powers of the flow vectors. One can define the decomposition \begin{eqnarray} & & \langle v_n^2(p_a)v_n^2(p_b) \rangle = \nonumber \\ & & v_{v_n^2}^{(0)}(p_a)v_{v_n^2}^{(0)}(p_b)+ v_{v_n^2}^{(1)}(p_a)v_{v_n^2}^{(1)}(p_b) + \dots \ . \label{eq:corv2} \end{eqnarray} The flow magnitude factorization breaking is \begin{equation} r_n^{v_n^2}(p_a,p_b)=1-\frac{1}{2}\left| \frac{v_{v_n^2}^{(1)}(p_a)}{v_{v_n^2}^{(0)}(p_a)}- \frac{v_{v_n^2}^{(1)}(p_b)}{v_{v_n^2}^{(0)}(p_b)}\right|^2 \ . \end{equation} Please note that the correlator $\langle v_n^2(p_a)v_n^2(p_b) \rangle$ is not a correlation matrix. The proper correlation matrix for $v_n^2$ is \begin{eqnarray} & & \langle \langle v_n^2(p_a)v_n^2(p_b) \rangle \rangle = \nonumber \\ & & \langle v_n^2(p_a)v_n^2(p_b) \rangle - \langle v_n^2(p_a) \rangle \langle v_n^2(p_b) \rangle = \nonumber \\ & & \tilde{v}_{v_n^2}^{(0)}(p_a)\tilde{v}_{v_n^2}^{(0)}(p_b)+ \tilde{v}_{v_n^2}^{(1)}(p_a)\tilde{v}_{v_n^2}^{(1)}(p_b) + \dots \ . \label{eq:corprop} \end{eqnarray} The eigenmode decompositions of the two matrices (\ref{eq:corv2}) and (\ref{eq:corprop}) are related with \begin{equation} \tilde{v}_{v_n^2}^{(1)}(p_a)\simeq {v}_{v_n^2}^{(1)}(p_a) \ \ . \label{eq:eqsubl} \end{equation} On the other hand, the dominance of the leading mode gives \begin{equation} v_n^{(0)}(p_a)\simeq v_{v_n^2}^{(0)}(p_a) \ . \label{eq:eqlead} \end{equation} In Figs. \ref{fig:vec05} and \ref{fig:vec3040} are shown the eigenmodes for the matrices $\langle\langle q_n(p_a) q_n^\star(p_b) \rangle \rangle$ and $\langle \langle v_n^2(p_a)v_n^2(p_b) \rangle \rangle$ (due to the relations (\ref{eq:eqsubl}) and (\ref{eq:eqlead}) the eigenmodes for $\langle v_n^2(p_a)v_n^2(p_b) \rangle$ overlap with the curves on the plot). The subleading mode is much smaller than the leading one, which is consistent with small factorization breaking. The subleading modes are similar in shape \begin{equation} v_{v_n^2}^{(1}(p_a)\simeq \tilde{v}_{v_n^2}^{(1)}(p_a)\simeq 0.7 v_n^{(1)}(p_a) \ , \end{equation} which leads to a similar shape of the factorization breaking of the flow and of the flow magnitude (Eq. \ref{eq:simfac}). \section{Summary} The factorization breaking of harmonic flow at two different transverse momenta is studied in the hydrodynamic model. In the model the decorrelation of the flow angle and of the flow magnitude is calculated. The flow angle decorrelation is strongly correlated with the overall flow magnitude in an event. A way to measure this correlation in experiment is discussed, and predictions are made within the hydrodynamic model. The separate decorrelation of the flow angle and flow magnitude observed in the model cannot be measured in experiment using two-particle correlation. The flow magnitude decorrelation could be measured in experiment using a $4$-particle correlations. The hydrodynamic model with Monte Carlo Glauber initial conditions predicts that the flow magnitude decorrelation is about one half of the overall flow decorrelation. The difference in the flow factorization breaking or the flow magnitude factorization breaking can be studied using the principal component analysis of the relevant $4$-particle correlation matrices. The hierarchy of the eigenmodes in the principal component analysis is consistent with results on factorization breaking. \section*{Acknowledgments} Research supported by the AGH UST statutory funds, by the National Science Centre grant 2015/17/B/ST2/00101, as well as by PL-Grid Infrastructure.
\section{Introduction.} In 1993, the homophonic quotient groups for French and English (the quotient of the free group generated by the French (respectively the English) alphabet determined by relations representing standard pronunciation rules) were explicitly characterized \cite{QHGL}. Some references mention an analogous characterization for Japanese, but that result does not seem to be easily accessible. In this paper we apply the same methodology to three different language systems:\ German, Korean, and Turkish. The analysis for German was circulated in unpublished form for a while; the Korean and the Turkish analyses are new. As we suggest in the final section of this paper, our results may point to some interesting differences between these three languages (or at least their current script systems). The paper is organized in a straightforward manner, with each numbered section presenting the analysis for one language. In particular Section \ref{S:German} presents our results for German, while Section \ref{S:Korean} presents our results for Korean, and Section \ref{S:Turkish} presents our results for Turkish. A final section brings together these analyses and offers some thoughts on what we might gain from this comparative study. \section{German} \label{S:German} In their phonetically calibrated paper \cite{QHGL}, Mestre, Schoof, Washington, and Zagier have shown that the homophonic quotient of the free group on the 26 letters of the alphabet is trivial for both the French and the English language. As already foreshadowed in that paper, we obtain the same answer for the German language. \smallskip Let $G$ be the quotient of the free group on 26 letters $a,\,b,\,c,\,\dots,z$ by the relations $A=B$ provided there are words $A$ and $B$ in the German language whose pronunciations agree. \medskip We justify the term ``agree'' by invoking standard dictionaries like \cite{Duden1} or \cite{Duden2}, whose name ``Duden'' has become synonymous with the official norm, as well as its online version \url{http://www.duden.de/suchen/dudenonline}, accessed last on December 18, 2016. Alternatively, for most of the pairs of words below, we can use an automatic phonetic converter such as the one at \url{http://familientagebuch.de/rainer/2007/38.html#4}, accessed last on December 18, 2016. \begin{theorem} The group $\,G\,$ is trivial. \end{theorem} \smallskip\noindent {\bf Proof:} We successively eliminate letters using specific properties of spoken German. For homophonicity we need to distinguish in particular between long and short vowels as well as between voiced and unvoiced consonants. \medskip\noindent {\bf Vowels} (methods of idempotents (cf.~\cite{QHGL}) and of vanishing with h). \begin{enumerate} \item [(a)] For instance, `aa', `ah' and `a' may often be pronounced alike, in particular they often have the same length, like ``Waage'' [scales] and ``wage'' [(I) dare] or ``Wahl'' [choice] and ``Wal'' [whale]. \item [(e)] Similarly, `ee', `eh' and sometimes `e' can sound the same: ``Meer'' [the sea] and ``mehr'' [more]. \item [(o)] Both `oo' and `oh' are often used within words, and can both be pronounced like a single `o' (``Boot'' [boat] and ``bot'' [(he) offered], and ``hohle'' [hollow (pl.)] vs.~``hole'' [(I) fetch]). \end{enumerate} We note that for `i' and `u' the corresponding identifications do not work; e.g., while both `ie' and `ih' indicate a long `i', the former can never occur at the beginning of a word where it is instead replaced by the second one (``ihnen'' [(to) them], ``ihr'' [her]), and `ii' in a word (like ``liieren'' [(to) liaise]) is pronounced with a glottal stop between the `i's. Similarly, the `uu' in words like ``Kontinuum'' or ``Trauung'' indeed comes across as two `u's, and there aren't any words with a `uu' that would sound like a long `u', say. Hence we need to treat these two vowels separately. \bigskip\noindent {\bf Consonants}. \begin{enumerate} \item[(g/b/n)] (Voiceless in the end.) At the end of a word, a voiced consonant is pronounced in the same way as the corresponding unvoiced one (like ``Bug'' [(nautical) bow] and ``buk'' [(he) baked], or ``Alb'' and ``Alp'' [both for nightmare]). Similarly, an `nn' at times sounds like a single `n' (``Mann'' [man] and ``man'' [one/you (pronoun)]). \item[(v/w)] (WVF?) The consonant `v' is typically pronounced in one of two ways: like `f' or like `w', depending mostly on the etymological origin of the word (``viel'' [many] vs. ``fiel'' [(he) fell] and ``vage'' [vague] vs. ``wage'' [(I) dare]). \item[(l/r/f/p/s)] (Idempotents.) By combining certain consonants we can further minimise the influence of a single contributing consonant, so while it is hard to find the same sounds for `ll' and `l' at the end of a word, one can add a `t' to it and succeeds (``hallt'' [(it) reverberates/echoes] vs. ``Halt'' [halt]). Similar comments apply to `rr' and `r' (``starrt'' [(he) stares] vs. ``Start'' [start]), for `ff' and `f' (``schafft'' [(he) manages] vs. ``Schaft'' [shaft]) as well as `pp' and `p' (``klappst'' [(you) flap/fold] vs. `klapst' [(he) claps lightly]; alternatively, ``schnippst'' and ``schnipst'' (both from schnipsen [(to) clip])). Furthermore, ``fasst'' [(he) catches] and ``fast'' [almost] are homophonic. \item[(t/d)] (Little dt for tt.) A related case is the combination `th' which also often assures that a preceding vowel is pronounced as a short one: e.g. ``Zithern'' [zithers] and ``zittern'' [(to) tremble] are pronounced the same way; another means to the same end is the use of `dt' in place of `tt', giving e.g. that ``Stadt'' [city] and ``statt'' [instead of] are homophonic. \item[(m)] A variant of the idempotent method, using also the voiced/unvoiced consonant at the end of a word, is ``hemmt'' [hinders] vs. ``Hemd'' [shirt]. \item[(c)] (Departing of the c.) Other constructs that make sure that a vowel is short are to follow it up with a `ck' rather than a `k', and the words ``packt'' [(he) packs] and ``Pakt'' [(a) pact] sound alike. Note, however, that in a very similar setting the words ``hackt'' [(he) hacks] and ``hakt'' [(he) hooks] are pronounced differently, as the latter `a' then denotes a {\em long} vowel. \item[(z)] A further peculiarity is the pronunciation of `z', typically equivalent to the combination `t-s' (with obvious exceptions for loanwords like ``Jazz'' where the educated citizen will make an attempt to sound more anglophonic), so we can identify the genitive ``Kitts'' of ``Kitt'' [glue] with ``Kitz'' [fawn]. \item[(x)] In the same vein as `z', the letter `x' is pronounced `k-s' which is also the pronunciation of `chs', i.e. when `ch' precedes `s' it often becomes `k'); so we find ``lax'' [lax] to be homophonic to ``Lachs'' [salmon]. \end{enumerate} The remaining letters `k', `u', `i', `y', `j' and `q' are somewhat harder to trivialise, but modulo the above this is doable, albeit by using loanwords from different languages (English, Italian, Hungarian). \begin{enumerate} \item[(k)] The English word ``Clip'' for office equipment is often used and is homophonic to ``klipp'' (e.g.~from ``klipp und klar'' [in no uncertain terms]). \item[(u)] The Italian word ``ciao'' has been assimilated as ``tschau'', both terms being used. \item[(i)] The word ``roien'' [(to) row] is homophonic to ``reuen'' [(to) rue], the former being used mainly in ``Niederdeutsch'', i.e.~in the North of Germany. Alternatively, the loanword (from the English language) ``beaten'' [(to) make beat music] is acceptable according to \cite{Duden1}, and it is homophonic to ``bieten'' [(to) offer]. \item[(y)] The word ``toi'' from the saying ``toi, toi, toi'' [break a leg] sounds like ``Toy'' [sex toy]. Alternatively, a ``Bayer'' [Bavarian] can be spelled ``Baier''. (We could also invoke the ambiguous spelling of `Yoghurt' and `Joghurt'. For yet another possibility, the Hungarian word ``Gulyas'' [goulash] has been assimilated also as ``Gulasch''.) \item[(j)] As to `j', we use the word ``Yak'' [yak] (from the Tibetan `gyag') and its similarity to ``Jacke'' [jacket] which are not homophonic as such, but their respective diminutives ``Y\"akchen'' and ``J\"ackchen" (note the ensuing umlaut for either case) are. \item[(q)] Finally, for the quite rare letter `q', we can use the French word ``clique'' (which has been adapted into German with a short `i'), whose pronunciation agrees with that of ``klicke'' [(I) click]. Another possibility is to note that the letter ``Q'' itself can be used as a word (say, as the Q in a game of Scrabble) and is homophonic to ``Kuh'' [cow]). \end{enumerate} In the table below we successively eliminate the letters on the left using the homophonic ambiguity displayed on their right, completing the proof of the theorem. \smallskip\noindent{\small \halign{\hskip3truecm#&$#|$&\quad#\hfill\cr a&&Waage --- wage\cr h&&Wahl --- Wal\cr e&&Meer --- mehr\cr o&&Boot --- bot\cr g&&Bug --- buk\cr b&&Alb --- Alp\cr n&&Mann --- man\cr v&&viel --- fiel\cr w&&wage --- vage\cr l&&gewallt --- Gewalt\cr r&&starrt --- Start\cr f&&schafft --- Schaft\cr p&&klappst --- klapst\cr s&&fasst --- fast\cr t&&Zittern --- Zithern\cr d&&Stadt --- statt\cr m&&hemmt --- Hemd\cr c&&packt --- Pakt\cr z&&Kitz --- Kitts\cr x&&lax --- Lachs\cr k&&klipp --- Clip\cr u&&tschau --- ciao\cr i&&roien --- reuen\cr y&&Toy --- toi\cr j&&J\"ackchen --- Y\"akchen \cr q&&Clique --- klicke. \qquad \qquad \hfil $\Box$\cr}} \bigskip {\bf Generalizations.} One can also try to include the umlaute \"a, \"o, \"u, and the ``sharp s'' \ss\ into these investigations. The result remains the same. Our suggestion for the corresponding trivializations are the following: for `\"a' we invoke that in combination with `u' the diphthongs `\"au' and `eu' sound alike, for instance in the words ``h\"autig'' [of a skinny texture] and ``heutig'' [contemporarily]; alternatively, we can use that a long `\"a' can sound like the `ai' for certain loanwords from the English language, for example in ``F\"ahre'' [ferry] and ``faire'' [fair]; for `\"o' we use that certain words are spelled with both the original French `eu' and the assimilated German `\"o', like ``Fris\"or'' and ``Friseur''; furthermore, the pronunciation of `\"u' is often the same as that of `y', like in the Greek letter ``My'' [mu] and ``m\"uh'' [(I) labour], or, a far better one due to Martin Brandenburg, ``Mythen'' [myths] and ``m\"uhten'' [(they) laboured]. Finally, a `sharp s' at the end of a word is typically preceded by a long vowel, and hence it is not difficult to construct word pairs like ``a\ss'' [(I) ate] and ``Aas'' [(rotten) carcass]. \medskip \halign{\hskip3truecm#&&\quad#\hfill\cr \"a&&h\"autig --- heutig\cr \"o&&Fris\"or --- Friseur\cr \"u&& m\"uh -- My\cr \ss&&a\ss\ --- Aas.\cr} \section{Korean} \label{S:Korean} What differentiates Korean from the languages discussed in \cite{QHGL} is the number of alphabets and some fundamental grammar structures. Nevertheless, there exist many rules regarding homophones, so the first natural assumption would be that the resulting quotient group shouldn't have too many elements. It turns out that this is indeed the case. Here we note that this mathematical analysis of Korean does not describe the entire structure of the Korean language. It takes the phonetic aspect of the language and restructures the alphabets into a free group with a very specific and somewhat restrictive equivalence relation. Using such a structure, we inevitably lose a lot of information about Korean language, but are, however, rewarded with a unique finite group that characterizes it. Now, let us begin with describing some necessary concepts about the Korean language. \subsection{Some Basics of Korean} Korean characters, like English, consist of {\it vowels} and {\it consonants}. The alphabet contains 19 consonants and 21 vowels. The exact list is shown below in Table \ref{T:KoreanCharacters}. \begin{table}[h!] \centering \begin{tabular}{|c|c|}\hline Consonants & ㄱㄲㄴㄷㄸㄹㅁㅂㅃㅅㅆㅇㅈㅉㅊㅋㅌㅍㅎ \\ \hline Vowels & ㅏㅐㅑㅐㅓㅔㅕㅖㅗㅘㅙㅚㅛㅜㅝㅞㅟㅠㅡㅢㅣ \\ \hline \end{tabular} \caption{Korean characters \cite{KLI}.} \label{T:KoreanCharacters} \end{table} Because of the complications arising from the unique structure of Korean, from here on, each of the above symbols in the table will be called {\it characters}. To show why such clarification is crucial, let us take a look at a Korean word that stands for ``number''. It is written as 수. This word is comprised of a single letter, and that letter is comprised of a consonant and a vowel, which are, in this case, ㅅ and ㅜ. These letters form the bases of Korean words, as no single consonant or vowel is ever used alone without the other. However, this is not the end. To add to the already complex structure, a single letter can be made up of multiple consonants and a vowel, up to 3 consonants and one vowel. Denoting vowels and consonants as $v$ and $c$ in respective order, the possible combinations are, $\{c+v, c+v+c, c+v+c+c\}$. From here on forth, expressions of the form $c+v+\cdots$ will be called the ordered decomposition. The fact that these are the only combinations, however, effectively erases the need to distinguish between letters and combinations of characters. We present the needed argument below. \begin{theorem} Ordered decomposition uniquely encodes any formal composition of Korean letters or words. Or equivalently, the formal expression of a Korean word is uniquely encoded in the ordered decomposition. \end{theorem} \begin{proof} \normalfont For the base case, a word comprised of one letter is always trivially identifiable in Korean because it will be one of the form $c+v$, $c+v+c$, or $c+v+c+c$. It is clear that none of the three forms can be divided up to form a word of two letters. Now, suppose that a word comprised of n letters is uniquely identifiable. Now the final word in that letter can either end with a consonant or a vowel. If the word of n letters ended on a vowel, the possible $n+1^{th}$ letter after that vowel can be of the form $c+v$, $c+v+c$, or $c+v+c+c$. The three possibilities of this word with the $n+1^{th}$ letter is $c+\cdots +v+c+v$, $c+\cdots +v+c+v+c$, or $c+\cdots +v+c+v+c+c$. In any case, it is impossible to divide up $v+c+v$, $v+c+v+c$, or $v+c+v+c+c$ to end with a letter other than to divide between the first two $v$ and $c$. The same argument holds for the case when the $n^{th}$ letter ended on a consonant. \end{proof} Now that we've established some basics we will examine the homophonic structure of the quotient group $G$ of the free group on 40 Korean characters, given by the equivalence relation A=B whenever A and B have the same pronunciation in Korean. We will use a standard pronunciation guide such as \cite{KLI} for reference. \subsection{Triviality of Consonants} We first show that all consonants are trivial. We do this in three steps. \subsubsection{ ㅇ is trivial} To show this, let us take a look at the word 안일하다 (to be idle). 안일하다 has exactly the same pronunciation as 아닐하다 \cite{KLI}. Just by looking at the two words, 하다 is present on both sides, so it can be canceled out. Now the equivalence relation is between ㅇㅏㄴㅇㅣㄹ and ㅇㅏㄴㅣㄹ. Clearly after canceling out, ㅇ=1, and hence ㅇ is trivial. \subsubsection{ ㄱ=ㄲ=ㅋ, ㄷ=ㅅ=ㅆ=ㅈ=ㅊ=ㅌ, ㅂ=ㅍ} To show the above equivalence relations, let us examine the words containing letters of the form $c+v+c$. First, we will examine the words 부엌 (kitchen), 밖 (outside). By the equivalence relation defined above, 부엌=부억 and 밖=박. By rewriting these relations in ordered decomposition, ㅂ+ㅜ+ㅇ+ㅓ+ㅋ=ㅂ+ㅜ+ㅇ+ㅓ+ㄱ and ㅂ+ㅏ+ㄲ=ㅂ+ㅏ+ㄱ. Now it is clear that ㄱ=ㅋ and ㄱ=ㄲ. By the transitive property ㅋ=ㄲ=ㄱ. For the second part we can examine the equivalence relations, 낫 (scythe) =낟, 낮 (day) =낟, 낯 (face) =낟, 밭 (field) =받. Clearly ㄷ=ㅅ=ㅈ=ㅊ=ㅌ. Proving ㄷ=ㅆ is a bit more difficult as there are no single lettered words in Korean ending in ㅆ. To prove this we need to look at a two lettered word 불소 (fluorine). By the equivalence relation 불소=불쏘, and clearly ㅅ=ㅆ. Since we already know ㅅ=ㄷ, by the transitive property, ㄷ= ㅆ, thus concluding our proof of the second equivalence relation. For the last equivalence relation, we can look at 짚 (hay) = 집, and can conclude that ㅂ = ㅍ. By proving these relations, we've reduced the set of consonants into $\{$ㄱ,ㄴ,ㄷ,ㄸ,ㄹ,ㅁ,ㅂ,ㅃ,ㅉ,ㅎ$\}$. \subsubsection{Consonants are trivial} To further reduce the set of consonants let us look at the equivalence relation 앞마당 (lawn) = 암마당. This shows that ㅁ = ㅍ, and ㅍ = ㅂ so, ㅁ = ㅂ. Also 있는 (existing) = 인는, and so ㄴ = ㅆ = ㄷ. Also, 국물 (soup) = 궁물, and 놓는 (lay down) = 논는, so ㄱ is trivial and ㄷ = ㄴ = ㅎ. Observe that 숱하다 (to be in abundence) = 수타다, which shows that ㅎ is also trivial. Since ㄷ = ㅎ and ㅎ is trivial, ㄷ is also trivial. Now, there only remain five nontrivial consonants, $\{$ㄸ,ㄹ,ㅂ,ㅃ,ㅉ$\}$. Let's look at the equivalence relation 웃다 (smile) = 욷따, which in ordered decomposition is, ㅇ+ㅜ+ㅅ+ㄷ+ㅏ = ㅇ+ㅜ+ㄷ+ㄸ+ㅏ. We know ㅇ,ㅅ = ㄷ are trivial, so ㅜ+ㅏ = ㅜ+ㄸ+ㅏ. Hence ㄸ = 1 and so ㄸ is also trivial. 약지 (ring finger) = 약찌, hence ㅉ = ㅈ = ㄷ = 1 and ㅉ is trivial. 막론 (whether) = 망논, which can be rewritten as ㅁ+ㅏ+ㄱ+ㄹ+ㅗ+ㄴ = ㅁ+ㅏ+ㅇ+ㄴ+ㅗ+ㄴ, and since ㄱ,ㄴ = ㄷ are both trivial, ㅁ+ㅏ+ㄹ+ㅗ = ㅁ+ㅏ+ㅗ, and so ㄹ is trivial. 국밥 (soup and rice) = 국빱 implies that ㅂ = ㅃ. There remains only one non-trivial consonant, ㅂ. Lastly we need to examine a word with a letter of the form $c+v+c+c$. 넓다 (wide) = 널따, and we know that ㄴ,ㄹ,ㄷ,ㄸ are all trivial. So, after canceling both sides, we have ㅓ+ㅂ+ㅏ = ㅓ+ㅏ, and so ㅂ is trivial. Hence we've proved the triviality of all Korean consonants. \subsection{Vowels have 2 Non-trivial Elements: Vowels = $\{$ㅏ,ㅗ$\}$} While the in examining consonants we only needed to look at a single equivalence relation, vowels are not so easy. There are multiple equivalence relations between 3 or more vowels, so we need to sort through these relations to see how they can be reduced. Let us begin examining the vowels by the equality 가지어 (have) = 가져 = 가저. All consonants are trivial, so we can simply look at ㅏ+ㅣ+ㅓ = ㅏ+ㅕ = ㅏ+ㅓ. From this we can conclude that ㅣ is trivial and ㅓ = ㅕ. Also, 통계 (statistics) = 통게 implies that ㅖ = ㅔ. 희미 (faint) = 히미 implies ㅢ = ㅣ. Since ㅣ is trivial ㅢ is trivial. 금괴 (gold bar) = 금궤 (metal box) implies ㅚ = ㅞ. Also, it is allowed that 위 is pronounced as 우+이, and so ㅟ = ㅜ.(누이다 = 뉘다) 되어 = 돼 implies ㅚ+ㅓ = ㅗ+ㅓ = ㅙ = ㅗ+ㅐ. 싸이다 = 쌔다 implies ㅏ+ㅣ = ㅏ = ㅐ. 트이다 = 틔다 = 티다 implies that ㅡ is also trivial. 미아 = 먀 implies ㅏ = ㅑ. 쏘이다 = 쐬다 implies ㅗ+ㅣ = ㅗ = ㅚ. Also, ㅚ = ㅞ, so ㅗ = ㅚ = ㅞ. Listing these rules into an easily decipherable form we get: \begin{multicols}{2}{ \begin{enumerate} \item ㅣis trivial \item ㅓ=ㅕ \item ㅖ=ㅔ \item ㅢ=ㅣ \item ㅚ=ㅞ \item ㅟ=ㅜ+ㅣ $\Leftrightarrow$ ㅟ=ㅜ \item ㅚ+ㅓ=ㅙ \item ㅏ+ㅣ=ㅐ $\Leftrightarrow$ ㅏ=ㅐ \item ㅡ+ㅣ=ㅣ $\Leftrightarrow$ ㅡ=1 \item ㅣ+ㅏ=ㅑ $\Leftrightarrow$ ㅏ=ㅑ \item ㅗ+ㅣ=ㅚ $\Leftrightarrow$ ㅗ=ㅚ \item ㅢ=ㅔ $\Leftrightarrow$ ㅔ=1 \item ㅗ+ㅐ=ㅙ \item ㅝ=ㅜ+ㅓ \item ㅛ=ㅣ+ㅗ \item ㅠ=ㅣ+ㅜ \end{enumerate}} \end{multicols} \vspace{1pc} Just by looking at these rules, we can reduce the the set $\{$ㅏㅐㅑㅐㅓㅔㅕㅖㅗㅘㅙㅚㅛㅜㅝㅞㅟㅠㅡㅢㅣ$\}$ of vowels into $\{$ㅏㅓㅗㅘㅙㅛㅜㅝㅞㅠ$\}$. Now we outline the rest of the process: \begin{itemize} \item 13) and 8) combine to show that ㅗ+ㅐ=ㅗ+ㅏ=ㅘ=ㅙ, implying ㅘ=ㅙ. \item 5) and 11) combine to show that ㅗ=ㅞ=ㅜ+ㅔ, and since 12) stated that ㅔ is trivial, ㅗ=ㅜ. \item As a direct result of ㅗ=ㅜ, 14), 13), 11), 7) and 1), ㅝ=ㅜ+ㅓ=ㅗ+ㅓ=ㅗ+ㅣ+ㅓ=ㅚ+ㅓ=ㅙ=ㅗ+ㅐ. So ㅝ=ㅙ=ㅘ. \item 1) and 15) together shows that ㅗ=ㅛ. \item Since ㅠ=ㅣ+ㅜ and we've concluded that ㅗ=ㅜ, ㅠ=ㅣ+ㅜ=ㅣ+ㅗ=ㅗ. \item Recall that from 7) and 13), we have ㅚ+ㅓ=ㅙ=ㅗ+ㅐ. However, ㅚ=ㅗ+ㅣ=ㅗ, so ㅗ+ㅓ=ㅗ+ㅐ, and by cancelling ㅗ, we have that ㅓ=ㅐ. \item 8) states that ㅏ=ㅐ, so with the above result, ㅏ=ㅓ. \item Since ㅘ=ㅗ+ㅏ, ㅘ is generated by ㅗ and ㅏ. \end{itemize} \noindent Ultimately, after all iterations of the 16 rules, we are left with a free group that is generated by the free generating set $\{$ㅏ,ㅗ$\}$. \section{Turkish} \label{S:Turkish} In this section we determine the homophonic quotient group for Turkish. There are several Turkic languages and alphabets encoding them have many commonalities. We will exclusively focus on the Modern Turkish alphabet used in Turkey to encode Turkish. \subsection{The Sounds of Turkish} The Modern Turkish alphabet was introduced in 1928 along with a wide-reaching literacy campaign. The Latin-based script was developed to replace the use of the Arabic script, and contains a total of 29 letters (8 vowels and 21 consonants) as seen in Table \ref{T:TurkishLetters}: \begin{table}[h!] \centering \begin{tabular}{|c|c|} \hline Consonants & b \; c \; \c{c} \; d \; f \; g \; \u{g} \; h \; j \; k \; l \; m \; n \; p \; r \; s \; \c{s} \; t \; v \; y \;z\\\hline Vowels& a \; e \; {\i} \; i \; o \; \"{o} \; u \; \"{u} \\ \hline \end{tabular} \caption{Letters of the Modern Turkish script (only lowercase letters are given).} \label{T:TurkishLetters} \end{table} This set of letters was specifically selected to represent the sounds present in the spoken language of the time, taking the Istanbul dialect as the standard. Each letter is supposed to represent a unique sound of the spoken language (except the so-called {\it soft g}, {\it \u{g}}, which tends to extend the vowel before it and blends it to a following vowel if there is one, but is otherwise completely silent; see \cite{Fuchs} for more on the soft g). For more on the sound system of Modern Turkish, see \cite{Yavuz}. To this day the Modern Turkish script retains most of its phonetical representativeness \cite{KY}. Indeed many hold that there are no homophones in Turkish; see for instance \cite{RW} where Turkish is described as a ``completely transparent writing system" with ``invariant and context-independent one-to-one mappings between orthography and phonology". This suggests that the free group generated by the 29 sound representatives will not shrink much if at all when we try introducing homophonic equivalences. Nonetheless there are indeed some relations we might use if we consider ``how words are actually pronounced by real live people".\footnote{In his MathSciNet review (MR1273406 (95e:00027)), James Wiegold notes that the authors of \cite{QHGL} ``have [perhaps deliberately?] neglected all considerations of how words are actually pronounced by real live people.'' Clearly if we were to take into consideration each native speaker's distinct pronunciation patterns, the homophonic quotients problem would become quite intractable. However we will indeed introduce some of this complication into our analysis of Turkish. This may be justified by the fact that there is deemed to be a standard spoken Turkish, and it is indeed distinct from most formal descriptions of the orthography / phonology correspondence for the language.} \subsection{The soft g disappears} As noted above the soft g is often not a distinctly pronounced consonant but instead helps to accentuate or blend the surrounding vowels. Most native speakers would agree that we can identify the following encodings of the male name meaning ``Khan": \begin{center} Kaan = Ka\u{g}an. \end{center} Thus in the quotient group we would identify the soft g with identity. \subsection{Other disappearance acts: h and t} The standard pronunciation of the word ``dershane" (classroom) overlaps with the pronunciation of ``dersane", thus allowing us to conclude that $h$ too is trivial in the quotient. Similarly the double t's in the words ``Hacettepe" and ``An{\i}ttepe" (two location names in Ankara) are most commonly pronounced as if they were written as ``Hacetepe" and ``An{\i}tepe" respectively. Thus we can identify {\it tt} with {\it t}, trivializing {\it t}. \subsection{Vowel Confusion: the transformations of {\it a} and {\it e} into {\it \i} and {\it i} and two final disappearance acts} The Turkish language captures the phrase ``let me look" in the single word ``bakay{\i}m". The native speaker pronounces the latter in the same way that she would read the letter collection ``bak{\i}y{\i}m". This allows us to identify $a = \i$. Similarly the phrase ``i\c{c}ecek" (drink) is pronounced the same way that one would read ``i\c{c}icek" and so we identify $e = i$. Finally the word ``a\u{g}abey" for older brother has an almost universally accepted informal spelling, ``abi", representing the way people actually pronounce the word. This gives us two additional trivializations, of $a$ and $y$. Putting the above reductions together we conclude that the homophonic quotient group for Turkish is a free group on 22 generators: \begin{center} b \; c \; \c{c} \; d \; e (= i) \; f \; g \; j \; k \; l \; m \; n \; o \; \"{o} \; p \; r \; s \; \c{s} \; u \; \"{u} \; v \;z \end{center} \section{Final Words: Bringing the three threads together} \parskip=3pt In this paper we investigated three different languages and their writing systems. We believe that our results offer a neat example of applied algebra. Algebraic structures have been identified in various symmetrical constructions of nature such as crystals as well as in a range of sociological and anthropological contexts such as the kinship structure of the Warlpiri of Australia.\footnote{As ethnomathematician Marcia Ascher describes in detail in her book, the kinship structure of the Warlpiri, an indigeneous people in Australia, can be accurately and succinctly represented by the dihedral group of order $8$. See Chapter 3 of \cite{Ascher} for details.} In this note, we explored how the writing system of a modern language and its correspondence with the sounds of that language can be encoded in group theory. It is important to note that our methods do not address the full phonetic structure of any single language. Our work only pertains to the relationship between orthography and phonology of a language, that is, the extent to which a single symbol may represent a multiplicity of sounds of a given language. A simplistic interpretation of our method would suggest that if the generating set for the resulting quotient group is small, there are, on average, more sounds represented by a single symbol. We should also note that the complexity of the resulting group may be correlated not directly with the complexity of the sound system of a given language but perhaps more with the maturity of the particular writing system associated to it. Languages evolve, and oral traditions evolve much faster than written ones. Thus a young script like Modern Turkish might be naturally more representative of the phonetical structure of the language and equivalently offer fewer homophones than a script which is more mature, such as the Korean one, which in turn may offer fewer homophones than an even older script such as the German one. \smallskip \noindent {\bf Acknowledgment.} The authors thank the reviewer for helpful suggestions.
\section{The Mori-Zwanzig formalism}\label{sec:mz} The starting point of the M-Z formalism is to divide all the variables into resolved and unresolved ones. The basic idea is to project functions of all variables into the space of functions of only the resolved variables. The original dynamical system then becomes an equation for the resolved variables with memory and noise. This equation is called the Generalized Langevin Equation (GLE). Below we first demonstrate the idea of the M-Z formalism using a simple linear example. We then use the Kuramoto-Sivashinsky equation as an example to show how M-Z formalism help us develop a reduced model. \subsection{A brief review to the M-Z formalism}\label{ssec:mz_1} Consider a linear system \begin{eqnarray} \dot{x}=A_{11}x+A_{12}y, \label{eq:linear1} \\ \dot{y}=A_{21}x+A_{22}y, \label{eq:linear2} \end{eqnarray} with initial value $x(0)=x_0$, $y(0)=y_0$. We take $x$ as the resolved variable, $y$ as the unresolved variable, and want to develop a reduced system for $x$. To achieve this, we can first fix $x$ in \eqref{eq:linear2} and solve for $y$, and then insert the result into \eqref{eq:linear1}. In this way we get \begin{equation}\label{eq:linear_gle} \dot{x}=A_{11}x+A_{12}\int_0^t e^{A_{22}(t-s)}A_{21}x(s)ds+A_{12}e^{A_{22}t}y_0. \end{equation} There are three terms at the right hand side of \eqref{eq:linear_gle}. The first term $A_{11}x$ is a Markovian term of $x$; the second term $A_{12}\int_0^t e^{A_{22}(t-s)}A_{21}x(s)ds$ is a memory term. The third term $A_{12}e^{A_{22}t}y(0)$ contains the initial value of $y$, this term will be viewed as a noise term. Hence, by eliminating $y$ from the original linear system, we obtain an equation for $x$ with memory and noise. Similar deduction can be applied to non-linear ODE systems. Assume we have a system \begin{equation} \frac{d\phi}{dt}=R(\phi),\ \ \ \ \phi(0)=x, \end{equation} with $\phi$ and $x$ being vectors, and we split $\phi$ into $\phi=(\hat{\phi},\tilde{\phi})$ and take $\hat{\phi}$ as resolved variables, then by the Mori-Zwanzig formalism we can get a GLE for $\hat{\phi}$, \begin{equation}\label{eq:gle2} \frac{\partial}{\partial t}\hat{\phi}_j(x,t)=R_j(\hat{\phi}(x,t))+\int_0^t K_j(\hat{\phi}(x,t-s),s)ds+F_j(x,t). \end{equation} In \eqref{eq:gle2}, $\hat{\phi}(x,t)$ denotes $\hat{\phi}$ at time $t$ with initial value $x$. Although \eqref{eq:gle2} is more complicated than \eqref{eq:linear_gle}, the essential ingredients are similar. The M-Z formalism tells us that model reduction leads to memory effects, and inspired us to pursuing the application of RNNs as a tool for performing efficient yet rigorous model reduction. \subsection{Application to the K-S equation}\label{ssec:mz_2} Going back to the K-S equation \eqref{eq:ks}, let $\hat{u}$ and $\hat{G}$ be Fourier transforms of solution $u$ and filter $G$, respectively. Then, by \eqref{eq:avg}, we have $\hat{\bar{u}}_k=\hat{G}_k\hat{u}_k$ for all frequency $k$. Here, we take a spectrally sharp filter $G$ which satisfies \begin{equation*} \hat{G}_k=\left\{ \begin{array}{cc} 1 & if\ |k|\leq K, \\ 0 & if\ |k|>K , \end{array}\right. \end{equation*} for a certain positive integer $K$. Then, the Fourier transform of $\bar{u}$ is a truncation of the Fourier transform of $u$, and our resolved variables are those $\hat{u}_k$ with $|k|\leq K$. Writing the K-S equation in Fourier space, and put all terms with unresolved variables to the right hand side of the equation, we can get \begin{equation}\label{eq:ks_spec2} \frac{\partial \hat{u}_k}{\partial t}+(k^4-k^2)\hat{u}_k+\frac{ik}{2}\sum_{\footnotesize\substack{ p+q=k \\ |p|\leq K\\ |q|\leq K}}\hat{u}_p \hat{u}_q = -\frac{ik}{2}\sum_{\footnotesize\substack{p+q=k \\ |p|>K\\ or\ |q|>K}} \hat{u}_p \hat{u}_q. \end{equation} Applying Fourier transform to \eqref{eq:ks_avg2}, and compare with \eqref{eq:ks_spec2}, we have \begin{equation} \hat{\tau}_k=\sum_{\footnotesize\substack{p+q=k \\ |p|>K\ or\ |q|>K}} \hat{u}_p \hat{u}_q, \end{equation} for $|k|\leq K$. Using the M-Z theory, the sub-grid stress can be expressed as a memory term and a noise term. By Galilean invariance, the sub-grid stress can be expressed as a function of the history of the resolved strain, $\partial \bar{u}/\partial x$, when the noise effect is negligible. \section{Recurrent Neural Networks and LSTM}\label{sec:rnn} In this section, we briefly introduce recurrent neural networks and long short-term memory networks. \subsection{Recurrent neural networks} RNNs are neural networks with recurrent connections, designed to deal with time series. Usually, a recurrent connection links some units in a neural network to themselves. This connection means that the values of these units depend on their values at the previous time step. For a simple example, consider a one-layer RNN with time series $\{x_t\}$ as input. Let $h_t$ and $y_t$ be the hidden values and output values at time step $t$, respectively. Then, the simplest RNN model is given by \begin{eqnarray} h_{t+1}&=&\sigma(Wh_t+Ux_{t+1}+b), \\ y_{t+1}&=&Vh_{t+1}+d, \nonumber \end{eqnarray} where $U$, $V$, $W$, $b$, and $d$ are matrices or vectors of trainable parameters, and $\sigma(\cdot)$ is a nonlinear activation function. To deal with complicated time series, sometimes the output of an RNN is fed to another RNN to form a multi-layer RNN. Note that in RNNs the same group of parameters are shared by all time steps. In this sense, RNNs are stationary models. Among other things, this allows RNNs to learn information in long time series without inducing too many parameters. The training of RNNs is similar to the training of regular feed-forward neural networks, except that we have to consider gradient through time direction, such as the gradient of $y_t$ with respect to $h_{s}$ for $s<t$. Usually RNNs are trained by the so-called back-propagation through time (BPTT) method. \subsection{Long short-term memory networks} Theoretically, RNNs is capable of learning long-term memory effects in the time series. However, in practice it is hard for RNN to catch such dependencies, because of the exploding or shrinking gradient effects \cite{bengio1994}, \cite{pascanu2013}. The Long Short-Term Memory (LSTM) network is designed to solve this problem. Proposed by Hochreiter et al. \cite{hochreiter1997}, the LSTM introduces a new group of hidden units called states, and uses gates to control the information flow through the states. Since the updating rule of the states is incremental instead of compositional as in RNN, the gradients are less likely to explode or shrink. The computational rule of an LSTM cell is \begin{eqnarray*}\small f_t & = & \sigma(W_f\cdot[h_{t-1},x_t]+b_f), \\ i_t & = & \sigma(W_i\cdot[h_{t-1},x_t]+b_i), \\ o_t & = & \sigma(W_o\cdot[h_{t-1},x_t]+b_o), \\ \tilde{S}_t & = & \tanh(W_S\cdot[h_{t-1},x_t]+b_S), \\ S_t & = & (1-f_t)\cdot S_{t-1}+i_t\cdot\tilde{S}_t, \\ h_t & = & o_t\cdot\tanh(S_t), \end{eqnarray*} where $f_t$, $i_t$, $o_t$ are called the forget gate, input gate, and output gate, respectively, $S_t$ is the state, and $h_t$ is the hidden value. The LSTMs can also be trained by BPTT. \section{The Two Training Models}\label{sec:model} For simplicity, we will focus on learning the memory-dependent terms in the GLE, neglecting for now the noise term. For the K-S equation, as shown in Figure \ref{fig:kstrain}, by directly fitting the stress using the history of the strain, we can reduce the error to nearly $1\%$ while maintaining a small gap between the testing and training error. This shows that we are not overfitting, and the history of the strain determines most of the stress. We will discuss two models for learning the memory effect: a direct training model and a coupled training model. For both models, we generate data using direct numerical simulation (DNS). In the direct training model, after generating the data, we directly train the RNN to fit the sub-grid stress $\tau$ using the time history of the strain. The loss function is defined as the difference between the output of the RNN and the true stress. The neural network model for the stress is then used in the macro-scale equation for the reduced system. In the coupled training model, the loss function is defined as the difference between the solutions of the reduced model (with stress represented by the neural network) and the ground truth solution. Therefore in the coupled model, the RNN is coupled with the solver of the macro-scale equation when training. \subsection{The direct training model} In the direct training model, a RNN is used to represent the stress as a function of the time history of the macrocell strain. The loss function is simply the squared difference of the predicted stress and the ground truth stress. This RNN model is then used in the reduced system. Figure \ref{fig:model1} shows the flow chart of the direct training model. \begin{figure}[t] \centering \includegraphics[width=0.6\textwidth, height=0.4\textwidth]{diag12.png} \caption{The flow chart of the direct training model.}\label{fig:model1} \end{figure} \subsection{The coupled training model}\label{ssec:couple} In the direct training model, we train an accurate stress model and we hope that this stress model can help produce accurate results for the macro-scale solution. In the coupled model, getting accurate macro-scale solutions is ensured by defining the loss function to be the difference between the solution of the reduced system and the ground truth, with the stress in the reduced system represented by a RNN. Specifically, in every epoch, we solve the reduced system for $L$ steps from some initial condition $u_0$ and get a prediction of the solution $L$ steps later ($u_L$). We use $\tilde{u}_L$ to denote the predicted solution. The loss function is defined to be some function of $u_L-\tilde{u}_L$. From another perspective, we can also view this coupled system as a single large RNN, part of the hidden units of this RNN is updated according to a macro-scale solver. Let $\tilde{u}_l$ be the predicted solution at the $l$-th step, and $h_l$, $\tau_l$, $s_l$ be the state of RNN, stress, and strain at the $l-th$ step, respectively. Then the update rule of this large RNN can be written as \begin{eqnarray} &&\tau_{l+1}, h_{l+1}=\mbox{RNN}(h_l,s_l), \label{eq:coupled1} \\ &&\tilde{u}_{l+1}, s_{l+1}=\mbox{Solver}(\tilde{u}_l,\tau_l).\label{eq:coupled2} \end{eqnarray} Figure \ref{fig:model2} shows part of the computational graph of the coupled training model. \begin{figure}[h] \centering \includegraphics[width=0.6\textwidth]{diag22.png} \caption{The computation graph of the coupled training model.}\label{fig:model2} \end{figure} \paragraph{Computation of the gradient} In the coupled training model, the trainable parameters are still in the RNN, but to compute the gradient of the loss with respect to the parameters, we have to do back-propagation (BP) through the solver of the macro-scale equation, i.e. through \eqref{eq:coupled2}. In many applications, this solver is complicated and it is hard to do BP through the solver. To deal with this problem, we take one step back to perform BP directly through the differential equations. This is done by writing down the differential equation satisfied by the gradient, which we call the {\it backward equation}. Another solver is used to solve this backward equation. In this way, BP is done by solving the backward equation, and is decoupled from the macro-scale solver. As an illustration, let $\hat{u}(t)$ be the solution of the K-S equation at time $t$ in the Fourier space, and assume that we want to perform back-propagation through the K-S equation from time $t+\delta$ back to $t$, which means we are going to compute the Jacobian $\partial \hat{u}(t+\delta)/\partial \hat{u}(t)$. Let \begin{equation} J(s)=\frac{\partial \hat{u}(t+s)}{\partial \hat{u}(t)}, \end{equation} then we have $J(0)=I$ and we want to compute $J(\delta)$. In the reduced system, we solve the K-S equation with stress, \begin{equation}\label{eq:ks_reduced_spec} \frac{d\hat{u}}{dt}=\mbox{diag}(k^2-k^4)\hat{u}-\frac{i}{2}\mbox{diag}(k)\hat{u}\ast \hat{u}-\frac{i}{2}\mbox{diag}(k)\hat{\tau}, \end{equation} where $\hat{\tau}$ is the sub-grid stress in Fourier space, $\ast$ means convolution, and $\mbox{diag}(v)$ represents a diagonal matrix with vector $v$ being the diagonal entries. Taking derivative of $J$ with respect to $s$, and assuming that $\partial \hat{\tau}(t)/\partial \hat{u}(t)=0$, we obtain \begin{equation}\label{eq:bp_j} \frac{d J(s)}{ds}=\mbox{diag}(k^2-k^4)J(s)-ik\hat{u}(t+s)\ast J(s). \end{equation} Hence, as long as we know the solution $\hat{u}(t+s)$ for $0\leq s\leq\delta$, we can compute the Jacobian $J(\delta)$ by solving the equation \eqref{eq:bp_j} from $0$ to $\delta$, with initial condition $J(0)=I$. \section{Numerical Experiments}\label{sec:num} We now present some numerical results of the proposed models for the K-S equation and the 2-dimensional shear flow problem. Below when we talk about true solution or ground truth, we mean the exact solution after filtering. \subsection{The Kuramoto-Sivashinsky equation}\label{ssec:ks} \paragraph{Experiment setting} The K-S equation is considered in the Fourier space. To generate the training data, we solve the K-S equation with $N=256$ Fourier modes to approximate the accurate solution, using a $3^{rd}$ order integral factor Runge-Kutta method \cite{shu1988}. We set $L=2\pi/\sqrt{0.085}$ and the time step $dt=0.001$. The settings are similar to that in \cite{Lu16}. The micro-scale equation is solved for $1.2\times10^5$ time units and filterd outputs are saved for every $0.1$ time units. We drop the results of the first $10^4$ time units, and take the results from the following $10^5$ time units as the training data, and the results of the last $10^4$ time units as the testing data. For the reduced system, we solve \eqref{eq:ks_avg2} in Fourier space. We take $K=16$ Fourier modes and the time step $dt_r=0.1$. The macro-scale solver is still a $3^{rd}$ order integral factor Runge-Kutta method. The solver works in the Fourier space, and takes the output of the RNN as the sub-grid stress. On the machine learning side, we use an LSTM to predict the stress. The LSTM has two layers and $64$ hidden units in each layer. An output layer with linear activation is applied to ensure that the dimension of the outputs is $16$. The LSTM works in the physical space: it takes strains in the physical space as inputs, and outputs predicted stresses in the physical space. A Fourier transform is applied to the output of the LSTM before feeding it into the macro solver. \paragraph{Direct training} For the direct training model, we train the LSTM to fit the stress as a (memory-dependent) function of the strains for the last $20$ time steps. The network is trained by the Adam algorithm \cite{kingma2014} for $2\times10^5$ iterations, with batch size being $64$. Figure \ref{fig:kstrain} shows the relative training and testing error during the training process. We can see that the two curves go down simultaneously, finally reaching a relative error of about $1\%$. There is almost no gap between the training and the testing error, hence little overfitting. This also suggests that most contribution to the sub-grid stress can be explained by the time history of the strain. \begin{figure}[h] \centering \includegraphics[width=0.8\textwidth, height=0.35\textwidth]{kstrain.png} \caption{Relative training and testing error during training.}\label{fig:kstrain} \end{figure} First we consider some a priori results. Figure \ref{fig:kscorr} presents the relative error and the correlation coefficients between the predicted stress and the true stress at different locations in the physical space. We can see that our prediction of the stress has relative errors of about $1\%$ and correlation coefficients very close to $1$. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{kserror.png} \includegraphics[width=0.4\textwidth]{kscorr.png} \caption{Relative error and correlation coefficients of the prediction at different locations in the physical space.}\label{fig:kscorr} \end{figure} We next examine some a posteriori results. After training the model, we pick some times in the testing set, and solve the reduced system initialized from the true solution at these times. Then, we compare the reduced solution with the true solution at later times. Figure \ref{fig:diphy} shows two examples. In these figures, the $x$-axis measures the number of time units from the initial solution. From these figures we can see that the reduced solution given by the direct training model produces satisfactory prediction for $150$-$200$ time units ($1500$-$2000$ time steps of macro-scale solver). As for the eventual deviation between the two solutions, it is not clear at this point what is more responsible, the intrinsic unstable behavior in the model or the model error. We will conduct careful studies to resolve this issue in future work. \begin{figure}[ht] \centering \includegraphics[width=0.4\textwidth]{direct_phy1.png} \includegraphics[width=0.4\textwidth]{direct_phy2.png} \caption{Comparison of the reduced solution given by the direct training models and the true solution. The lines shows values of the solutions at a certain location in the physical space.} \label{fig:diphy} \end{figure} Next we compare the long-term statistical properties of the solution to the reduced model with the true solution. We solve the reduced system for a long time ($10^4$ time units in our case). We then compute the distributions and the autocorrelation curves of Fourier modes of the reduced solution, and compare with that of the true solution. Figure \ref{fig:didist} shows some results. From these figures we see that the reduced model can satisfactorily recover statistical properties of the true solution. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{dist.png} \includegraphics[width=0.4\textwidth]{corr.png} \caption{ Distribution and auto-correlation of the real part of the Fourier mode with wave number $k=1$. The direct training model and the coupled training model.}\label{fig:didist} \end{figure} \paragraph{Coupled training} For the coupled training model, we train the LSTM together with the equation solver. A detailed description of this training model is given in Section \ref{ssec:couple}. Here we choose $L=20$ during training. The size of the LSTM is the same as that in the direct training model. A simple one-step forward scheme is used to solve the backward equation for the Jacobian \eqref{eq:bp_j}. $2\times10^4$ iterations were performed using an Adam optimizer with batch size $16$. During the training process, we measured the relative error of predicted solutions $l$ steps later from the initial true solution. The results for different $l$'s are given in Figure \ref{fig:train}. From the figure we can see that the relative error for different $l$ goes down to $6-7\%$ after training, and there is no gap between the different curves, which means that solutions with different steps from the initial time are fitted nearly equally well. \begin{figure} \centering \includegraphics[width=0.75\textwidth]{train.png} \caption{Relative error at different number of steps from the initial true solution during the training process.}\label{fig:train} \end{figure} Short-term prediction and long-term statistical performance are also considered for the coupled training model. Results are shown on Figure \ref{fig:cpphy} and \ref{fig:didist}. From the figures we see that, the reduced system trained by the coupled training model gives satisfactory prediction for $50-100$ time units, which is shorter than the direct training model. However, the auto-correlation of Fourier modes match better with the true solution, while the distribution is as good as the direct training model. This suggests that, compared to the direct training model, the coupled model is less competitive for short-term prediction, but performs better for long-term statistical properties. \begin{figure}[t] \centering \includegraphics[width=0.4\textwidth]{cpphy1.png} \includegraphics[width=0.4\textwidth]{cpphy2.png} \caption{Comparison of the reduced solution and the true solution on the physical space. }\label{fig:cpphy} \end{figure} \subsection{The $2$-dimensional shear flow}\label{ssec:2d} \paragraph{Experiment setting} Consider the $2$-dimensional shear flow in channel, whose governing equation is given by \eqref{eq:2dshear}. We take $(x,y)\in[0,100]\times[-1,1]$ and use periodic boundary condition in $x$ direction and zero boundary condition at $y=\pm1$. We choose $Re=10000$, and $f=2/Re$ as a constant driving force. To numerically solve the equation, we employ the spectral method used in \cite{weinan2016}. We take $256$ Fourier modes in $x$ direction and $33$ Legendre modes in $y$ direction. The time step $\Delta t$ are chosen to be $0.005$. For ease of implementation, we only do model reduction for Fourier modes in $x$ direction, and keep all Legendre modes in $y$ direction. The macro solution has $64$ Fourier modes in $x$ direction. Still, we generate accurate solution by DNS and compute the macro-scale strain and stress, and use an LSTM to fit the stress as a function of the history of the strain. In this experiment, the neural network we use is a $4$-layer LSTM with $256$ hidden units in each layer. As for the K-S equation, the input and output of the LSTM are in the physical space. In this problem, the stress has $3$ components ($\tau_{11}=\overbar{uu}-\bar{u}\bar{u}$, $\tau_{12}=\overbar{uv}-\bar{u}\bar{v}$, $\tau_{22}=\overbar{vv}-\bar{v}\bar{v}$). Since each component has $33\times64=2112$ modes in the spectral space, we need at least $2112$ variables in the physical space to represent the stress. If directly fit the stress, our LSTM will have about $6$ thousand outputs. This can make the training very difficult. Here, noting that both the stress and the strain are periodic in the $x$ direction, we choose to fit the stress by column. We train an LSTM to predict one column of the stress (the stress at the same $x$ in the physical space), using strains at this column and the neighboring columns. Figure \ref{fig:fitcol} shows this idea. In practice, when predicting the $k$-th column of the stress, we use strains from the $(k-2)$-th to the $(k+2)$-th column. \begin{figure} \centering \includegraphics[width=0.8\textwidth]{fitcol.png} \caption{The LSTM predicts one column of the stress each time, using strains at this column and the neighboring columns.}\label{fig:fitcol} \end{figure} For the $2$-dimensional shear flow problem, we only show results from the direct training model. The LSTM is trained by an Adam optimizer for $10^5$ steps, with batch size being 64. Still, the stress is predicted using the strains from the last $20$ time steps. \paragraph{Numerical results} Figure \ref{fig:2dtrain} shows the relative training and testing error during the training process. We can see that the training error goes down to $3-4\%$, while the testing error goes down to about $5\%$. Figure \ref{fig:corr} shows the correlation coefficients of the predicted stress and the true stress at different $y$. The three curves represent three components of the stress, respectively. we can see that the correlation coefficients are close to $1$ except in the area close to the boundary. Considering the boundary condition, the stress near the boundary is close to $0$. Hence, its reasonable for the prediction to have a low correlation with the true stress. \begin{figure} \centering \includegraphics[width=0.8\textwidth, height=0.35\textwidth]{2dtrain.png} \caption{Training and testing error of 2D shear flow.}\label{fig:2dtrain} \end{figure} \begin{figure} \centering \includegraphics[width=0.8\textwidth, height=0.35\textwidth]{corr1.png} \caption{ Correlation coefficients of predicted stress and true stress at different $y$.}\label{fig:corr} \end{figure} Next, we solve the reduced system initialized from a true solution, and compare the quality of the reduced solution at later times with the solution given by the Smagorinsky model \cite{sm63}. The Smagorinsky model is a classical and widely used model for large eddy simulation (LES). In the two dimensional case, the Smagorinsky model for the sub-grid stress can be written as \begin{equation} \tau_{ij}-\frac{1}{2}\tau_{kk}\delta_{ij}=-2\nu_t\bar{S}_{ij}, \end{equation} where $\tau_{kk}=\tau_{11}+\tau_{22}$, $\nu_t$ is called the turbulent eddy viscosity, and \begin{equation*} \bar{S}_{11}=\frac{\partial \bar{u}}{\partial x},\ \bar{S}_{12}=\bar{S}_{21}=\frac{1}{2}\left(\frac{\partial\bar{u}}{\partial y}+\frac{\partial\bar{v}}{\partial x}\right),\ \bar{S}_{22}=\frac{\partial \bar{v}}{\partial y}. \end{equation*} The turbulent eddy viscosity can be expressed as \begin{equation} \nu_t=(C_s\Delta)^2\sqrt{2\bar{S}_{ij}\bar{S}_{ij}}, \end{equation} with $\Delta$ being the grid size and $C_s$ being a constant. In Figure \ref{fig:error}, we compare the deviation of our reduced solution and Smagorinsky solution from the true solution. We see that the prediction given by our reduced system is much better than that by the Smagorinsky model. \begin{figure} \centering \includegraphics[width=0.8\textwidth, height=0.35\textwidth]{error_smag.png} \caption{Distance of the reduced solution and the true solution, compared with the Smagorinsky method.}\label{fig:error} \end{figure} \section{Conclusion}\label{sec:con} Much work needs to be done to develop the methods proposed here into a systematic and practical approach for model reduction for a wide variety of problems. For example, in the coupled training model, it is crucial to find an accurate and efficient way to compute the Jacobian. How to make the method scalable for larger systems is a problem that should be studied. For reduced systems where the noise effects cannot be neglected, how to model the noise term in the GLE is a problem that should be dealt with. Finally, we also need theoretical understanding to answer questions such as how to choose the size of the neural network, and how large the dataset should be in order to obtain a good reduced system. \bibliographystyle{unsrt}
\section{Introduction} \label{sec:intro} The Murchison Widefield Array (MWA) is a low radio-frequency interferometer located in the western Australian outback, at the Murchison Radio-astronomy Observatory (MRO). One of the observational strengths of the MWA is its substantial field of view. Each receiving element (tile) in the interferometer consists of a $4\times4$ grid of bow-tie dipoles mounted on a $5\,\mathrm{m} \times 5\,\mathrm{m}$ reflective ground screen. Analogue beamformers are used to create and electronically steer the MWA primary beam, which has a full-width half-maximum of $\sim 25^\circ$ at 150$\,$MHz~\citep{Tingay2013}. The regular spacing of the dipoles means that the quantised beamformer delays are exactly correct for a set of pointings, reducing the complexity of the instrument. By using identical receiving elements, a number of computational simplifications can be made to calibration and imaging, as beam corrections can be made in image space, avoiding costly convolutions in visibility space. Many calibration schemes make assumptions on beams/receiving elements~\citep[e.g.][]{Kazemi2013,Tasse2013}, and others explicitly use the beam shape during calibration/imaging~\citep[][specifically for the MWA]{Mitchell2008,Sullivan2012}. However, for these assumptions to be valid, each tile must actually produce identical beam shapes, and that beam shape must be correctly modelled. The exact degree of precision required of a primary beam and model depends on the science case, but epoch of reionisation (EoR) science is perhaps in the greatest need of well understood beam shapes. Particularly, the spectral behaviour of the beam is a significant possible contaminant of a detection~\citep{Barry2016,Trott2016b}. \citet{Barry2016} state that the frequency response of an EoR experiment should have spectral features no larger than $10^{-5}$. This kind of spectral behaviour could be injected via calibration using an incorrect beam model. Estimating the degree of precision of a beam model required for EoR science is an ongoing area of research. The effects of incorrect beam modelling on output data products can be subtle, and will change according to the calibration scheme used. To fully estimate the effects on an MWA EoR power spectrum experiment\citep[e.g.][]{Jacobs2016}, one has to take the following points into consideration: \begin{itemize} \item The primary beam is often used as a gridding kernel. An incorrect model would bias the gridded data used to either image or create a power spectrum \item Errors on the beam model can be direction dependent. As the MWA primary beam is stationary during a 2 minute observation, primary calibrators will move through these errors during the observation. The MWA EoR observing strategy often employs the same pointing for $\sim30\,$minutes, potentially injecting time-dependent calibration errors \item If the primary beam varies from tile to tile, the spatial scales that are measured by each baseline are affected differently. The effect of this upon a measured power spectrum is hard to estimate. \end{itemize} We plan to investigate the points above in future work, using simulated observations and power spectrum measurements to directly quantify the effects on potential EoR science. As the accuracy of the beam model can affect science outputs, significant work has gone into both simulating and measuring the MWA primary beam. The MWA is a full Stokes instrument, and as such the beam model must accurately describe the instrument in all polarisations. Of particular interest is `leakage' from Stokes I to other polarisations, whereby flux density from Stokes I is transferred into other Stokes parameters. This effect is often elevation dependent, and can be attributed to an incorrect beam model~\citep{Lenc2016,Lenc2017}. The sophistication of the MWA's beam model has progressed through a number of stages. The first model was a simple analytical short-dipole radiation pattern multiplied by the tile array factor~\citep{Ord2010}. The tile array factor is a direction dependent function that describes the cumulative beam shape effects of the superposition of the individual dipoles, in this case generated purely through the geometrical $4\times4$ layout of the tile. The first advanced model was the `average' embedded element (AEE) model, presented by~\citet{Sutinjo2015a}. This model used numerical simulations generated using the commercially available FEKO\footnote{\url{https://www.feko.info/}} simulation package, including mutual coupling effects, to create an average dipole radiation pattern, which was assumed identical for all dipoles. In addition, the model includes mutual-coupling induced changes to dipole impedance, which affects the array factor depending on pointing direction. Whilst this model was shown to reduce leakage,~\citet{Sutinjo2015a} showed that leakage still remained, and suggested that a `fully' embedded element (FEE) model was required. This was verified as the AEE model was used in calibration and image-based primary beam correction on GaLactic and Extragalactic All-sky MWA survey~\citep[GLEAM,][]{Wayth2015} data. Frequency/elevation dependent errors in the model produced polarisation leakage and incorrect absolute flux density of sources in the images~\citep[sometimes $>10$\%; see][for details]{Hurley-Walker2017}. Given catalogues such as GLEAM are often used to calibrate observations, a correct flux scale is of paramount importance. As a response, the FEE model was presented in~\citet{Sokolowski2017}. This model more rigorously takes into account mutual coupling, amongst other improvements. \citet{Sokolowski2017} were able to use GLEAM observations to show reduced leakage compared to the AEE model. Using polarisation leakage to test beam performance is a valuable metric, but is a measure of average beam effects, rather than the beam pattern itself. To validate a beam model, one must directly measure the actual beam shape of individual tiles. The simplest way to do this is to have a radio emitter of known location and strength, and use the instrument to measure the flux density seen from the emitter from various locations. Recent advances have been made in using commercially available drones to fly a radio emitter to achieve this~\citep[e.g.][]{Ustuner2014,Chang2015,Picar2015,Pupillo2015,Paonessa2016}. These experiments have the advantage of being able to run at multiple frequencies and along a controlled flight path. The disadvantage is that these experiments happen in the near-field of the instrument; observations occur in the far-field. Even with this limitation, once the stability of the drones and repeatability of results improves, this approach could provide accurate beam measurements in the future. Another option lies in using transiting satellites, bright in the MWA frequency band, as locatable emitters. \citet{Neben2015} have successfully used ORBCOMM satellites\footnote{\url{https://www.orbcomm.com/en/networks/satellite}} to measure an MWA tile beam shape in an experimental setup at the National Radio Astronomy Observatory in Green Bank, West Virginia. The constellation of ORBCOMM satellites operate at 137$\,$MHz, which does limit any experiment to a single frequency band, but the sky coverage and intrinsic brightness of the satellites allows a beam map to be made across the entire MWA primary beam. Satellites have the advantage of naturally being in the far-field of the instrument. \citet{Neben2016} were able to apply this method to the Hydrogen Epoch of Reionisation Array\footnote{HERA - \url{http://reionization.org/}}, to both measure beam shapes, and comment on the implications to their science goals. The success of Neben et al. has motivated a comparison of ORBCOMM and drone-based beam mapping techniques~\citep{Jacobs2017}, aimed towards being able to conduct reliable onsite experiments. To date, no one has actually directly measured the individual MWA tile beam shapes onsite at the MRO. Given the discussion above, we suggest the ideal MWA beam measurement experiment should: \begin{itemize} \item occur onsite at the MRO using actual MWA tiles \item cover the whole observable sky, in the far-field \item measure multiple tiles simultaneously to establish similarities/differences \item span the entire frequency range covered by the MWA \item measure both XX and YY polarisations so Stokes parameters can be calculated \item cover as many pointings as possible to fully explore predictive powers of any model \item compare any measured beams to the FEE model. \end{itemize} For a single experiment, this is a daunting list. In this paper, we make a first step towards onsite beam measurements, and choose to limit ourselves to checking for variance in tile to tile beam patterns. The goals of this paper are: make an initial assessment of the accuracy of the new FEE model in describing the primary beam shape generated by onsite MWA tiles; quantitatively measure how similar primary beam shapes are from tile to tile; use the results to inform follow-up experiments covering the items on the list above. The paper is organised as follows. In Section~\ref{sec:exsetup}, we describe our experimental setup and data collection method. In Section~\ref{sec:analysis} we detail our data analysis, and present our results, along with some experimental biases, in Section~\ref{sec:results}. We discuss our results and outline a possible future direction in Section~\ref{sec:discussion}. \section{Experimental Setup and Data Collection} \label{sec:exsetup} Our experimental approach builds upon the work of~\citet{Neben2015}, however the basic premise of the experiment is worth repeating here. Any antenna beam shape can be mapped by measuring the power received when a transiting satellite passes, as long as one simultaneously observes using a reference antenna with a known beam response. The antenna under test (AUT), an MWA tile, and a reference antenna, receive powers $P_{\mathrm{AUT}}$ and $P_{\mathrm{ref}}$, respectively. The power received by each antenna is a combination of their beam responses, $B_{\mathrm{AUT}}$ and $B_{\mathrm{ref}}$, and the incident flux density from the satellite $F$, such that $P_{\mathrm{AUT}} = B_{\mathrm{AUT}}F$ and $P_{\mathrm{ref}} = B_{\mathrm{ref}}F$. The desired beam response can then be recovered through \begin{equation} B_{\mathrm{AUT}} = \dfrac{P_{\mathrm{AUT}}}{P_{\mathrm{ref}}} B_{\mathrm{ref}}. \label{eq:beam} \end{equation} By observing enough satellite passes the beam response can then be measured across the entire sky. The key differences between our experiment and \citet{Neben2015} are: \begin{itemize} \item we conduct our measurements on four actual MWA tiles that form part of the telescope located at the MRO \item our measurement system uses small, inexpensive, hand-held spectrum analysers and single-board computers to record raw power data from each tile \item we use only open-source ephemeris and transmission-frequency data for the satellites in our analysis (as we did not have access to an `ORBCOMM user interface box'). \end{itemize} A block diagram of our experimental setup is shown in Figure~\ref{fig:block_diagram}. We simultaneously record raw, radio-frequency power (RF) from two reference antennas and four MWA tiles. The reference antennas are required to remove the unknown intrinsic beam shapes and transmission powers of the individual ORBCOMM satellites. They each consist of a single MWA dipole sitting in the centre of a $5\,\mathrm{m}\times5,\mathrm{m}$ conducting mesh grid. We tap the RF from the tiles using beam-splitters inside the receiver box that houses the first stage of MWA signal conditioning (see \citealt{Tingay2013}). The RF is tapped after some initial analogue signal conditioning (including bandpass filtering and amplification) and prior to digitisation. The RF is low-pass filtered prior to input into the RF Explorer\footnote{\url{http://rfexplorer.com}} spectrum analysers, which record the raw RF data. The low-pass filtering is used to remove a known Radio Frequency Interference (RFI) signal generated by the RF Explorers, at around 400~MHz. \begin{figure*}[h!] \centering \includegraphics[width=1.95\columnwidth,clip,trim=130 50 80 50]{System_diagram_4_tiles.pdf} \caption{\textsf{Block diagram of our experimental setup to measure four MWA tile beam shapes using ORBCOMM satellites. \textbf{Left:} The signal path for the reference dipoles. ORBCOMM signals are received by the reference dipoles where they are amplified by Low Noise Amplifiers (LNAs) attached to each dipole. Coaxial cables connected to bias-Ts in the field box both supply 12$\,$V DC to power the LNAs and also carry the Radio Frequency (RF) signal to the field box. Following further amplification by LNAs within the field box, the RF signal is fed via coaxial cable into the RFI-shielded hut where it forms the input to the RF Explorer spectrum analysers. The RF Explorers are connected via a powered USB hub to a single Raspberry Pi computer. The USB connection both powers the RF Explorers and provides the data transfer to the Raspberry Pi. The output of the RF Explorers (power measurements in dBm for 112 frequency channels at a rate of 7 samples per second) is recorded on the Rasperry Pi. The Raspberry Pi is accessed remotely via ssh from the MWA network to control recording and to transfer data for further processing. \textbf{Right:} The signal path for the Antennas Under Test (MWA tiles). For each MWA tile, the ORBCOMM signals are received by the dipoles and fed to the analogue beamformer. For our zenith-pointed observations all beamformer delays are set to zero. The signals are combined and transmitted via coaxial cable to an MWA receiver in the field. Inside the receiver the RF signal undergoes some amplification and filtering in the Analogue Signal Conditioning (ASC) stage before being split (resulting in a 3~dB drop in amplitude) and fed into a low-pass filter (LPF). From here the signal is fed to the RF Explorer which performs the spectral analysis and transmits the digital data via a powered USB hub to a Raspberry Pi computer. The Raspberry Pi is accessed remotely via ssh from the MWA network to control recording and to transfer data for further processing.}} \label{fig:block_diagram} \end{figure*} The tiles selected for testing were named S21-S24, which form part of the southern `hex' used in the compact configuration of the MWA (Wayth et al. in preparation). Tiles were removed from the observing program and pointed to zenith by setting all analogue beam-former delays to zero. This was done to maximise the number of satellite passes for one particular pointing, as we had limited time to conduct the experiment. Power and data transfer to and from the reference antennas was provided by a custom-built circuit, housed in an RFI-shielded box and placed in the field between the two antennas (see Figure~\ref{fig:ref_antennas}). This box was connected via coaxial cable to the RF Explorer and Raspberry Pi system set up inside the small RFI-shielded hut located approximately 50$\,$m away. \begin{figure} \centering \includegraphics[width=1.0\columnwidth]{reference_antenna_NESW.pdf} \caption{\textsf{The reference antennas as deployed on site. The RFI-shielded box containing the power and data transfer electronics was protected by bricks, as can be seen near the image centre.}} \label{fig:ref_antennas} \end{figure} The RF explorers recorded 112 frequency channels between 137.150 and 138.550$\,$MHz at a spectral resolution of 12.5$\,$kHz. This automatically set the RF explorer to sample the power at temporal rate of 7$\,$Hz. We used Raspberry Pi\footnote{\url{https://www.raspberrypi.org}} (RP) single-board computers to record the data. We used the default Raspbian\footnote{\url{https://www.raspberrypi.org/downloads/}} operating system and a custom \texttt{python}\footnote{\url{http://www.python.org/}} script, using the \texttt{pySerial}\footnote{\url{https://pythonhosted.org/pyserial/pyserial.html}} module to control the RF Explorers. We utilised the \texttt{at}\footnote{\url{http://man.he.net/?topic=at&section=all}} command to schedule observing. We used the same NTP server to synchronise the two separate RPs. As the RPs were connected to the local network, which in turn was connected to the internet, were we able to remotely schedule observing once we left the site. Using this setup we collected 403 hours of data between the 17$^{\mathrm{th}}$ of August and the 5$^{\mathrm{th}}$ of September 2017, while the MWA telescope was offline. \section{Data Analysis and Method} \label{sec:analysis} An example of the raw data are shown in Figure~\ref{fig:waterfall}. Individual ORBCOMM satellite passes are clearly visible, and emit within a single channel due to the small transmission bandwidth. \citet{Neben2015} took advantage of an `ORBCOMM user inferface box', which is able to explicitly match the satellite transmission frequency to the correct satellite ephemeris. These boxes are not commercially available however. Instead, we pulled ephemeris data from the online service Space-Track\footnote{\url{https://www.space-track.org/auth/login}}. We then produced waterfall plots, such as those shown in Figure~\ref{fig:waterfall}, and matched the timing of the visible passes with satellites that were above the horizon. Although individual ORBCOMM satellites are known to periodically switch frequency channels, we found during our observations that most satellites tended to remain emitting at the same frequencies. \begin{figure*} \centering \includegraphics[width=1.95\columnwidth]{waterfall_S24+rf0.png} \caption{\textsf{The raw data taken beginning 21:20 on 28/07/2017 for: (i) tile S24, (ii) reference antenna RF0. The colour scale on both plots spans the same dynamic range (40$\,$dB) to compare the signal to noise for each antenna. A number of features are annotated and labelled at the same position on each plot. ORBCOMM satellites typically emit in two distinct frequency channels; the A and B labels point out two different satellite passes. As each satellite rises and then sets (moves from top to bottom on the waterfall), the power seen by both S24 and RF0 increases and then decreases. The effects of the MWA primary beam can be clearly seen at C in (i). As the satellite passes through the nulls of the beam, the power seen drops to~$\sim$zero; this is not seen in (ii). This satellite pass is from a weather satellite with more broadband emission than an ORBCOMM satellite. These weather satellites were not used in our data analysis. Finally, D shows a frequency channel with constant power. We believe this is internally generated RFI from the RP itself.}} \label{fig:waterfall} \end{figure*} \subsection{Quality cuts} \label{subsec:qualcuts} We made a number of necessary quality cuts on the data. The first was to set a lower limit on the elevation of the satellite passes that we used. We set this to an elevation of $10^\circ$, as below this we found the results to have a very low signal to noise ratio. The second cut was a noise cut on both $P_{\mathrm{AUT}}$ and $P_{\mathrm{ref}}$. As can be seen in Figure~\ref{fig:waterfall}, $P_{\mathrm{AUT}}$ and $P_{\mathrm{ref}}$ were well constrained to a single RF explorer frequency channel. To establish a noise floor, we took the data from the adjoining three frequency channels either side of the channel containing the pass, for the full duration of the pass, and took a median $\mu_{\textrm{noise}}$ and median absolute deviation $\sigma_{\textrm{noise}}$ of the data. We then made a criterion that $P_t > \mu_{\textrm{noise}} + \sigma_{\textrm{noise}}$, where $P_t$ was the power seen at any time-step within the pass. This procedure was completed for both the AUT and reference antenna; if either failed, the time-step data were discarded. The third cut was a timing cut. As mentioned in Section~\ref{sec:exsetup}, we used the scheduling command \texttt{at} to run our controlling script. The reference antennas and AUTs were controlled by two separate RPs, that were set to the same local time via an internet sync on the Raspian OS. We assume that these two clocks were well synchronised, however each data dump from the RF explorers carried a time stamp, which revealed that at the start of each observation, a small timing offset of around 0.1-0.5$\,$s existed between the reference antenna and the AUT. This offset could be due to the \texttt{at} command itself, or perhaps because the RP controlling the AUT RF explorers had to launch multiple jobs simultaneously. A further complication arose in a faulty USB hub connecting the reference antenna RF explorers, which required us to restart the hub every half an hour.\footnote{The MRO is \textit{very} isolated, and it was quicker to spend the better part of a day finding a software solution than to drive and buy a replacement} As a result, each half hour observation had a differing timing offset between reference and AUT. We found that a robust way to treat the timing offset for each observation, reference antenna, and AUT, was to align the time series from the reference and AUT in such a way as to minimise the timing offsets $t_{\mathrm{off}}$. We then took a mean $\mu_{\textrm{t}}$ and standard deviation $\sigma_{\textrm{t}}$ of all $t_{\mathrm{off}}$, and required for a data point to match between the reference and AUT, that $t_{\mathrm{off}} < \mu_{\textrm{t}} + \sigma_{\textrm{t}}$. We found setting a single cutoff for $t_{\mathrm{off}}$ to be too inflexible given that the timing offsets varied, and often either under or over penalised data, giving poor results. The final cut was a visual inspection of the results. As mentioned in Section~\ref{sec:analysis}, ORBCOMM satellites are known to periodically switch transmission frequencies. A number of passes $(\mathcal{O}(10)$) were clearly noise-like, which could be due to frequency channel misallocation. These passes were manually flagged and discarded. After a combination of the number and duration of satellite passes $>10^\circ$ elevation during our observational window, and the time matching and noise cuts, 137 hours of data remained (34\% of our 403 observed hours). \subsection{Map making} \label{subsec:map_making} To create beam maps, we used the satellite ephemeris to grid $P_{\mathrm{AUT}} / P_{\mathrm{ref}}$ for each time step onto a Healpix~\citep{Gorski2004} map with an $N$-side of 32. This corresponds to an angular resolution of 110 arcmins, which we found to give a good balance between detail on the sky, and the amount of signal integrated per pixel. Once gridding was complete, we were left with a distribution of values in each pixel that typically contained multiple outliers. We therefore took the median of each pixel, before multiplying by our model for $B_{\mathrm{ref}}$ to complete Equation~\ref{eq:beam}. \section{Results} \label{sec:results} Whilst carrying out our analysis, we performed a null test using both reference antennas. As both reference antennas (hereto referred to as ref$_0$ and ref$_1$) should have identical beam responses, $P_{\mathrm{ref_0}} / P_{\mathrm{ref_1}} = 1$ should hold across all satellite passes. Upon investigation, we saw direction dependent deviations away from a ratio of one in the null test, beyond the error terms (as the raw RF data $P_{\mathrm{ref_0}}$, $P_{\mathrm{ref_1}}$ contain satellite beaming effects, we used the median absolute deviation of the distribution of measured values in each healpixel as an error term). This deviation away from unity prompted us to check the physical condition of the reference antennas. The onsite operational team took measurements and discovered that the ground meshes were not symmetric, and furthermore the dipoles themselves were not central within the ground screen. To mitigate these effects, we ran new reference antenna simulations. \subsection{New reference models} \label{subsec:reference_models} We ran the same FEKO simulations used to generate the FEE, using the reference ground screen and dipole configurations as measured onsite, to generate new reference antenna models. Figure~\ref{fig:null} shows the raw RF data recorded (in subplots~\ref{fig:null}{\color{blue}(i)}-{\color{blue}(iv)}) for each reference antenna, after all quality cuts. We label the two FEKO reference antenna models EAST and WEST. The models were fit to the data by a single multiplicative gain factor through a least-squares minimisation, and show good agreement to the data, with the WEST model matching ref$_0$, and the EAST model matching ref$_1$. The plots show slices in east-west and north-south directions, taken by slicing healpix maps created as described in Section~\ref{subsec:map_making}. We gridded the FEKO models onto a healpix map for direct comparison. The difference between the model and the raw RF data is also plotted in subplots~\ref{fig:null}{\color{blue}(i)}-{\color{blue}(iv)}, with a third order polynomial fit. This functional form was chosen as it is smooth, and captures the behaviour of the offsets well. We label these fits to the offsets as $\Delta$ref$_0$ and $\Delta$ref$_1$. Subplots~\ref{fig:null}{\color{blue}(v)} and {\color{blue}(vi)} show the null test between the two reference antennas. The test shows the models and data agree in the east-west slice, but a discrepancy is seen in the north-south direction. There are multiple factors that could cause the model to poorly describe the data, including: the ground could have a local gradient, pointing the antenna bore-sight away from zenith; the ground screen could be warped; the antennas could be faulty; the antennas could be coupled to their surrounding, or blocked in some way. Closer investigation of subplot~\ref{fig:null}{\color{blue}(iv)} reveals a bump in the data, away from the model, between a zenith angle of 50-75$^\circ$. Figure~\ref{fig:ref_antennas} shows that for the eastern tile, a rather large bush sits just to the south. It is quite possible that the bush is interfering with the both reference antennas, but more so for ref$_1$. Unfortunately, hardware limits such as cable length, and geographical limits of flat space close enough to the RFI-shielded hut providing power limited our deployment options. To verify whether the deviations away from the models seen from the raw data are due to the reference antennas themselves, rather than the satellite beaming effects that are present within the raw RF data, the fits to the offsets taken in the lower panel were compared the null test. In~\ref{fig:null}{\color{blue}(v)} and {\color{blue}(vi)}, we plot $\Delta\mathrm{ref}_1 - \Delta\mathrm{ref}_0$, in the same way as the null test. Good agreement is shown between the model offset fits and the null test, giving us confidence that $\Delta$ref$_0$ and $\Delta$ref$_1$ can be used to predict systematic effects when generating beam maps, which we do in the following Sections. \begin{figure*} \centering \includegraphics[width=1.6\columnwidth]{normed_and_matched_reference.pdf} \includegraphics[width=1.6\columnwidth]{null_test.pdf} \caption{\textsf{\textit{(i) \& (ii)}: in the upper panels, the raw RF data collected for ref$_0$ and ref$_1$, respectively, mapped onto a healpix grid and then sliced along the east-west direction (blue circles). Each data point is the median value in the healpixel, with median absolute deviation as the error bars. The EAST and WEST reference antenna models described in Section~\ref{subsec:reference_models} are over-plotted (orange line). In the lower panels, the difference between the RF data and the model are plotted (black circles), with a third order polynomial fit (blue line) over-plotted. \textit{(ii) \& (iv)}: same as (i) \& (ii), but in the north-south direction. \textit{(v) \& (vi)}: the null test in the east-west and north-south directions, respectively, performed by subtracting the ref$_0$ data from the ref$_1$ (blue circles). The errors bars come from a simple error propagation from plots (i)-(iv). The expected result of the null test from the FEKO models is also plotted (orange line), as well as the expected result given the fitted offsets found in (i)-(iv) (magenta line).}} \label{fig:null} \end{figure*} \subsection{Tile maps} \label{subsec:tilemaps} We created maps using the method described in Section~\ref{subsec:map_making} using ref$_0$, as it showed smaller deviations away from the FEKO model than ref$_1$. An example map for tile S24 is compared to the FEE model in Figure~\ref{fig:S24} (top row). Both maps have been normalised to zenith. We normalised the measured map by fitting the map to the FEE model with a single gain factor using a least-squares minimisation, using a map cut-off of a zenith angle $<20^\circ$. This cut-off defines a region of the primary beam with high gain, as well as where the ORBCOMM signal transmission strength peaks. The primary beam shape is clearly captured in the map (see Figure~\ref{fig:S24}{\color{blue}(ii)}). Upon the creation of the beam map for S21, it was clear that the full FEE model was not a good match. As the MRO is situated in an inhospitable desert environment, components fail from time to time. It is standard practice at the MWA to regularly test components, and if the signal path to an individual dipole within a tile fails testing, it is excluded from the beamforming stage. With this in mind, we compared the map for tile S21 to FEE models where the gain of a single dipole was zero. We found that a model where one of the central dipoles was missing matched well, as shown in the bottom row of Figure~\ref{fig:S24}. The position of the missing dipole within the $4\times4$ arrangement greatly affects the resultant beam shape. After checking with the operations team, a dipole from the centre of S21 had indeed been excluded from the beamforming stage, matching our prediction. Figure~\ref{fig:good_maps} compares the maps generated for tiles S21 - S24 in subplots ~\ref{fig:good_maps}{\color{blue}(i)}-{\color{blue}(iv)}, as well as the ratios\footnote{these are differences in units of dB, which are on a log scale, and so are in fact ratios} of these normalised maps to the FEE model, shown in~\ref{fig:good_maps}{\color{blue}(v)}-{\color{blue}(viii)}. S21 was compared to the 15 dipole FEE model, with the other tiles compared to the full 16 dipole FEE model. The ratio maps show that there is tile to tile variation. Interestingly, the ratio map for S22 suggests a north-south gradient across the central lobe. We would like to emphasize that as all maps were made using ref$_0$, any systematic errors from the reference antenna are identical within the maps, and so the variations seen are purely from the tiles and their signal paths. \begin{figure*} \centering \includegraphics[width=1.6\columnwidth]{FEE_comparison_maps.pdf} \caption{\textsf{\textit{(i)}: the zenith pointing FEE model for the XX polarisation with all 16 dipoles; \textit{(ii)}: the measured primary beam for tile S24; \textit{(iii)}: the zenith pointing FEE model for the XX polarisation with a central dipole missing; \textit{(iv)}: the measured primary beam for tile S21. All maps are normalised to zenith, and plotted with the same colour scale range for direct comparison.}} \label{fig:S24} \end{figure*} \begin{figure*} \centering \includegraphics[width=1.4\columnwidth]{good_beammaps.pdf} \includegraphics[width=1.4\columnwidth]{good_diffmaps.pdf} \caption{\textsf{\textit{(i)-(iv)}: measured beam maps for tiles S21-S24, respectively; \textit{(v)-(viii)}: the ratio between the measured beam maps and the FEE. S21 is compared to the FEE model with a missing central dipole; all other maps are compared to the full 16 dipole FEE model. For clarity, the ratio maps are masked where the full 16 dipole FEE model beam is predicted to have $P < -30\,$dB.}} \label{fig:good_maps} \end{figure*} In Figure~\ref{fig:good_slices}, we compare the FEE model to the beam maps for S21-S24 in the east-west direction (\ref{fig:good_slices}{\color{blue}(i)}-{\color{blue}(iv)}) and the north-south direction (\ref{fig:good_slices}{\color{blue}(v)}-{\color{blue}(viii)}). Excellent agreement to the FEE model (15 dipole model for S21 and 16 dipole model for all other tiles) is shown for all tiles in the east-west direction, even down to $-30\,$dB and below. As predicted from the null test in Section~\ref{subsec:reference_models}, the maps perform worse in the north-south direction. The model and data still agree well in the central lobe (with exception of S22 which shows a gradient away from zero), but disagree out in the sidelobes. For each comparison, we have also plotted the difference in dB between the measured map and the FEE model. Plotted with the differences are shaded grey areas. These are the probable biases introduced by ref$_0$, estimated using the fitted deviations away from the WEST reference antenna model, $\Delta\mathrm{ref}_0$. \begin{figure*} \centering \includegraphics[width=1.4\columnwidth]{good_EW_slice.pdf} \includegraphics[width=1.4\columnwidth]{good_NS_slice.pdf} \caption{\textsf{East-west \textit{(i)-(iv)} and north-south \textit{(v)-(viii)} beam map slices for tiles S21-S24, respectively. For each subplot, the upper panel shows the healpixel median value and absolute deviation (blue circles with error bars), with the FEE model over-plotted (orange line). In the lower panel, the difference in dB between the FEE model and the data are plotted (black circles), with a reference dashed line at zero (a ratio of one). Again, S21 is compared to the FEE model with a missing central dipole; all other maps are compared to the full 16 dipole FEE model.The grey shaded areas are an estimate of the systematic error introduced by ref$_0$, using the fit to the offsets from the FEKO reference antenna model found in Figure~\ref{fig:null} (explicitly, we have used $1 / \Delta\mathrm{ref}_0$).}} \label{fig:good_slices} \end{figure*} \section{Discussion and next steps} \label{sec:discussion} The first step in furthering this experiment would be to move the reference antennas, replace the ground mesh and make sure the layout of the reference antennas are identical. The next obvious step is to also test the YY polarisation: this would allow us to compare to polarisation leakage tests. Increasing the number of tiles under test would allow an instrument-wide characterisation of the tile-to-tile variation. The method we have developed is simple to implement, but as noted in Figure~\ref{fig:block_diagram}, we currently split the RF signal to measure it, which results in a $3\,$dB drop in signal through to the correlator. Further work is required to assess the impact this has on the noise floor of the instrument and in turn on the scientific outcomes of affected programs. If the scientific impact is acceptable, we plan to collect ORBCOMM data during normal operations. Over the course of an observing season, a greater number of pointings can be explored. Leakage seen from calibrated visibilities can then be compared to that inferred from the beam measurements, as a function of pointing direction. We could also measure the stability of the beam shapes over time. Not only could this help improve beam models, but it could potentially inform calibration pipelines. During the analysis of the data, we found that our original reference beam models did not match our measured reference beam shapes. We observed that the exact component sizes, layout, and surrounding environment all contributed to changing the in situ beam shape. This result emphasizes that antenna configurations need to be accurately deployed to obtain the expected results, and the need to conduct onsite measurements to be sure that the behaviour in the field matches laboratory measurements. Considering all 4 maps together, and all pixels down to $10^\circ$ elevation ($4\times5056$ pixels), we find the median absolute offset from the FEE model to be $1.4\pm1.1\,$dB, where the error is the median absolute deviation. If we only consider the east-west slices (shown in Figure~\ref{fig:good_slices}{\color{blue}(i)}-{\color{blue}(iv)}), we find the median absolute offset from the model to be $0.7\pm0.4\,$dB. We therefore conclude that the MWA analogue beamformers reliably create the same zenith beam shape to within~$\sim 1$dB, and that the FEE model is able to predict this beam shape even with a missing dipole. As mentioned in Section~\ref{sec:intro}, the major advantage of having the same beam shape for each receiving element is the reduction in the complexity of the software required to reduce the collected visibilities. Not only does this reduce computational loads, but the simpler the calibration and imaging approach, the easier it is to understand the impact on the created data products. This directly relates to the upcoming SKA science data processor\footnote{https://www.skatelescope.org/sdp/}, which will deliver calibrated science-ready data products in `soft-realtime'. Any real time processing instrument benefits from a calibration scheme and hardware build that have a complimentary philosophical design. It is still unclear, however, if the beam-to-beam variations measured here are small enough to not affect a possible EoR detection. As discussed in Section~\ref{sec:intro}, there are a number of ways beam errors can affect the data. We plan on using the beam variations seen here in future simulation work to assess the possible impacts on EoR science: in particular, the impact of missing dipoles from tiles. \section{Conclusions} We have measured the XX polarisation primary beam shape for 4 onsite MWA tiles. The coverage of the ORBCOMM constellation above the MRO allows full sky coverage down to an elevation of $10^\circ$, if one can continually observe with a single pointing over a period of two weeks. The maps have a dynamic range of $>30\,$dB, and show good agreement with the cutting-edge FEE model of \citet{Sokolowski2017} in the east-west direction. Geographical and hardware limitations reduce that agreement, and the reliability of the maps, in the north-south direction. We observe that the FEE model is able to accurately describe the zenith beam pointing of an MWA tile, even when one dipole is missing. We also demonstrate the strong dependence of the primary beam shape on the number of contributing dipoles. This is important since the MRO is an inhospitable environment and it is common for dipoles to fail. We have developed a method for collecting raw RF data from the tiles using relatively inexpensive and commercially available RF Explorers and Raspberry Pis. Most importantly, not only can all of this equipment easily fit within a receiver box, it can be remotely controlled and scheduled. This will allow us to easily expand this method to measure both instrumental polarisations and multiple beam pointings in future work, enabling a better understanding of instrumental performance, which will benefit all scientific programs of the MWA. \section{Acknowledgements} \label{sec:acknowledgements} J.~L.~B.~Line would like to thank the MWA operations team; without their engineering expertise and tireless efforts this work would never have been completed. This scientific work makes use of the Murchison Radio-astronomy Observatory, operated by CSIRO. We acknowledge the Wajarri Yamatji people as the traditional owners of the Observatory site. Parts of this research were conducted by the Australian Research Council Centre of Excellence for All-sky Astrophysics (CAASTRO), through project number CE110001020. \bibliographystyle{pasa}
\section{Introduction} Recently, deep learning has shown promising results to automate many tasks in radiology such as skin lesion classification \cite{Esteva2017-ry} and diabetic eye disease detection \cite{Gulshan2016-pc}. The performance of these deep convolutional neural networks (DCNNs) are sometimes on par with clinicians but usually require a large amount of training images and labels. Training a DCNN that performs equally well across different patients is challenging because some pathologies and congenital diseases are rare. Without enough training data for rare pathologies, DCNNs might not perform well on these patients even though they often require the most clinical care. \subsection{Automated myocardium segmentation LGE scans} Late-gadolinium enhancement (LGE) imaging is an established method to detect myocardial scarring and measure infarct size. Not all LGE scans have visible scar tissue. Contrast accumulates in regions of the myocardium that contain a high proportion of fibrosis (scar tissue) which results in a high signal intensity (hyperenhancement) on the acquired images. Automated myocardium segmentation can be combined with Full-Width-at-Half-Maximum (FWHM) method or n-SD thresholding methods to provide quantitative analysis on LGE scans. \cite{Schulz-Menger2013-xp} We apply a U-Net segmentation network \cite{Ronneberger2015-hz} to predict segmentation mask of the left myocardium but it does not perform well on patients with scar tissue. The subtle differences between scar tissue and blood pool are extremely challenging for DCNNs and sometimes experts to delineate, especially when the scar tissue is subendocardial. Other challenges in identifying scar tissue include low signal-to-noise ratio, motion blurring and image artifacts. \cite{Karim2016-zu} \subsection{ScarGAN} We propose ScarGAN, an approach utilizing chained generative adversarial networks (GANs) to simulate scar tissue in the LV myocardium on LGE scans of healthy patients as data augmentation. Fig. \ref{fig:sim_results} shows examples of simulated scar tissue grouped by their enhancement patterns. Overview of the ScarGAN architecture can be seen in Fig. \ref{fig:scargan}. ScarGAN has three main components: \begin{enumerate} \item A mask generator $ M(x) $ to generate the shape of the scar tissue given an input segmentation mask of the ventricles; \item A domain-specific heuristic to apply the shape of the simulated scar tissue to the image; \item A refining generator $ R(x) $ to refine the initial simulation to provide realistic-looking scar tissue. \end{enumerate} The main contributions of this work are: \begin{itemize} \item We present ScarGAN to simulate scar tissue in healthy myocardium on LGE CMR scans; \item We factorize the simulation process into multiple steps and allow domain-specific heuristics to be added to reduce the difficulty of GAN training; \item We present qualitative and quantitative results to demonstrate that scar tissue simulated by ScarGAN is highly realistic and cannot be distinguished from real scar tissue by radiologists; \item We demonstrate that simulated scar tissue can improve myocardium segmentation networks without collecting more scans and annotations of a specific pathology. \end{itemize} \section{Related Work} The GAN framework was first proposed by Goodfellow et al. \cite{Goodfellow2014-dw} and consists of 2 networks: a generative network $ G(z) $ that transforms a noise vector $ z $ into realistic samples, and a discriminator network $ D(x) $ that classifies samples as real or fake. The training process of these 2 networks is a minimax game because the objective of $ G(x) $ is to ``fool" $ D(x) $. Redford et al. \cite{Radford2015-fc} propose DCGAN that uses deconvolutional layers in the generator to produce more realistic samples. More recently, pix2pix was proposed by Isola et al. \cite{Isola2016-ks} wherein a fully convolutional U-Net in the generator performs image translation; the generative network receives an image in one domain and outputs the corresponding image of another domain. Both of the GANs in ScarGAN are based on pix2pix. Previous works have used GANs to refine the results of a simulator (\cite{Shrivastava2016-pf}, \cite{Sixt2016-aa}). SimGAN \cite{Shrivastava2016-pf} proposed by Shrivastava et al, an approach wherein the generator refines the output of a simulator, is structurally similar to our method; however, the "simulator" in ScarGAN is also a GAN and no manual modelling of scar tissue is required. GANs have been also used in medical imaging for data augmentation. Costa et al. \cite{noauthor_undated-uc} and Zhao et al. \cite{Zhao2017-hc} use pix2pix to generate retinal images from the vessel segmentation mask. Synthetic training samples (such as skin lesions \cite{Baur2018-ka}, liver lesions \cite{Frid-Adar2018-gi} and lung nodules \cite{Chuquicusma2018-ej}) are generated by GAN to increase the size of the training dataset or as educational purposes for radiologists. GANs are also being used to help segmentation networks to work well across different modalities, e.g CycleGAN proposed by Zhu et al. \cite{Zhu2017-lh} to segment brain images in both CT and MRI \cite{Wolterink2017-mo}. Salehinejad et al. \cite{Salehinejad2017-af} use DCGAN to synthesize X-ray chest scans with under-represented diseases and to classify lung diseases. The motivation of the work from Salehinejad et al. is most similar to ours but instead of generating images from scratch, ScarGAN simulates diseases on scans of healthy patients. \section{ScarGAN} \begin{figure}[t] \centering \includegraphics[scale=0.20]{scargan_overview.pdf} \caption{Overview of ScarGAN. A mask generator $ M(x) $ simulates the shape of scar tissue on a segmentation mask; a heuristic-based method provides an initial simulated scar tissue using the simulated shape; a refining generator $ R(x) $ add details of scar tissue to the image.} \label{fig:scargan} \end{figure} The overall objective of ScarGAN is to learn a function $ f $ that translates an image without scar tissue $ x\textsubscript{no scar} $ to an image with simulated scar tissue $ x\textsubscript{simulated scar} $, i.e $ f: x\textsubscript{no scar} \to x\textsubscript{simulated scar} $ We formulate this problem as an image translation task and thus follow pix2pix. We implement $ f(x) $ as a series of GANs and heuristic-based image processing methods described in detail as follows. \subsection{Mask Generator $ M(x) $} In the first stage, ScarGAN uses a mask generator $ M(x) $ to simulate the shape of the scar tissue in the myocardium given an input segmentation mask $ x $ on a slice of a short-axis (SAX) LGE CMR scan. The input of the mask generator is a 192x192px segmentation mask which includes right ventricular endocardium (RV endo), LV myocardium (LV myo) and LV endocardium (LV endo). The output of the mask generator is also a 192x192px segmentation mask which includes simulated scar tissue, RV endo, LV myo and LV endo. Both the input and output include RV endo, LV myo and LV endo to encourage the generator to learn anatomical structures before the discriminator gets too strong which will destabilize training. Unlike pix2pix, the output nonlinearity is softmax instead of tanh because both input and output are segmentation masks instead of images. The mask generator is a fully convolutional U-Net with 64 initial convolutional filters and skip connections between the corresponding downsampling and upsampling layer blocks. Each of the downsampling or upsampling layer-group consists of a convolutional (or deconvolutional) layer, a batch normalization layer, and a ReLU nonlinearity layer before the downsampling or upsampling operation. Downsampling and upsampling operations are performed via strided convolutions (or deconvolutions.) We add noise to the generator by using dropout layers (p=0.25) after each nonlinearity layer. The input of the mask discriminator is a 192x192px segmentation mask of RV endo, LV myo and LV endo with real scar tissue or a mask with simulated scar tissue. The discriminator is a relatively shallow network consisting of 4 layer blocks, each contains a convolutional layer, a batch normalization layer, and a leaky ReLU nonlinearity layer ($ \alpha = 0.2 $). The discriminator also downsamples by using strides in its convolutional layers. Unlike pix2pix, we do not follow PatchGAN in which the discriminator classifies patches of the images, and instead classify the whole image as real or simulated. Following LSGAN \cite{Mao2016-mi}, we use squared error as the main loss function. Thus the discriminator has no nonlinearity in its last layer. To regularize the generator, we add multi-class cross-entropy between the input and output segmentation masks to encourage the network to produce reasonable masks. We train the mask discriminator for 2 gradient steps for every gradient step performed on the mask generator. The loss of the mask generator is as follows: $$ L_{M} = (1 - D_M(M(x\textsubscript{no scar})))^2 + \alpha xent(M(x\textsubscript{no scar}), x\textsubscript{no scar}) $$ where $ D_M $ is the mask discriminator, $ \alpha $ is a hyperparameter which controls the strength of regularization where we set $ \alpha = 1.0 $, $ xent $ is the per-pixel multiclass cross-entropy, $ x\textsubscript{no scar} $ is a segmentation mask with no scar tissue and $ x\textsubscript{real} $ is a segmentation mask with real scar tissue. To prevent mode collapse, half of the simulated masks are stored in a buffer for ``experience replay" (\cite{Pfau2016-cg}, \cite{Shrivastava2016-pf}). Half of the training batches for the discriminator are randomly drawn from this buffer. The previously simulated samples stabilize training for both the discriminator and generator and prevent the generator from exploiting the discriminator by generating scar tissue of one specific shape which the discriminator has ``forgotten". \subsection{Heuristic-based simulation} \label{heuristic-based-simulation} In the second stage, we apply the shape of the simulated scar tissue from the mask to the image using a heuristic-based method, leveraging the domain-specific knowledge that scar tissue is hyperintense and has a similar signal intensity to the LV blood pool. We replace the corresponding pixels within generated scar tissue with the 10th percentile intensity of the LV endo pixels. However this causes the intensities within the scar tissue to become uniform, which is not characteristic of real scar tissue. Although this approach does not produce photorealistic simulation of the scar tissue, it provides a good starting point for another GAN to refine the initial simulation. The result of this initial heuristic-based simulation can be seen in Fig. \ref{fig:scargan}. \subsection{Refining generator $ R(x) $} In the final stage, ScarGAN uses a refining network $ R(x) $ to add details to the initial simulation from the heuristic-based method described above. This stage is inspired by SimGAN \cite{Shrivastava2016-pf} but $ R(x) $ in ScarGAN refines results from another GAN instead of a simulator. The input to the refining generator is a 192x192px image with a heuristic-based simulated scar tissue described in Section \ref{heuristic-based-simulation} and its output is a 192x192px refined image with simulated scar tissue. The network architectures of the refining generator and refining discriminator are the same as those described in the mask generator section. We do not need to increase the capacity of the generator given the initial simulation provide a good starting point. Similar to the mask generator, we follow LSGAN and use squared error as the main loss function. To regularize the generator, we use absolute error between the input and the refined image, which encourages the generator to modify small regions of the image. We train the discriminator for 3 gradient steps for every 1 gradient step performed on the refining generator. The loss of the refining generator is as follows: $$ L_{R} = (1 - D_R(R(x\textsubscript{scar heuristic})))^2 + \alpha (R(x\textsubscript{scar heuristic}) - x\textsubscript{scar heuristic}) $$ where $ D_R $ is the refining discriminator, $ \alpha $ is a hyperparameter which controls the strength of regularization, and $ x\textsubscript{scar heuristics} $ is a SAX slice with scar tissue simulated by the heuristic method. We note that $ \alpha $ is a very important hyperparameter as it controls how similar the refined image should be with the input image. If $ \alpha $ is too high, the refining network will be unable to change much of the image; if it is too low, the network might produce artifacts outside the myocardium to exploit the discriminator. We empirically find that setting $ \alpha = 10 $ provides a good balance. We also use an experience replay buffer to store past simulated samples but we find that mode collapse is not an issue in $ R(x) $ because the image is heavily conditioned by the shape of scar tissue generated by $ M(x) $. \section{Results and Evaluation} \subsection{Dataset} We evaluate our approach using a dataset with 159 LGE SAX CMR scans of which 69 have visible scar tissue on at least one of the SAX slices. We note that our labelled dataset is curated to have a higher proportion of scans with scar tissue (43.4\%) than in our unlabelled dataset ($ \approx25\% $). Our dataset consists of scans acquired by multiple types of scanners across multiple regions and countries. Ground truth segmentation masks are collected from 3 physicians with extensive experience analyzing CMR scans. RV endo, LV myo and LV endo segmentation masks are collected by drawing splines around the ventricles. Ground truth scar masks are collected using the FWHM method in accordance with the Society of Cardiovascular Magnetic Resonance imaging (SCMR) guidelines \cite{Schulz-Menger2013-xp}. One small region-of-interest (ROI) is drawn on part of the scar tissue and the FWHM method is applied to derive the full ground truth scar mask. No ROI is drawn if there is no visible scar tissue. Even though FWHM is the recommended method, it achieve relatively low precision of the actual scar tissue \cite{Zhang2016-mo}. In cases where the presence of scar tissue is ambiguous, physicians are able to view LGE scans of other acquisition angles (such as the long-axis) if available, but no segmentation is collected in views other than SAX. \subsection{Generating a Dataset with Diverse Simulated Scar Tissue using ScarGAN} \begin{figure} \centering \includegraphics[scale=0.38]{process.pdf} \caption{ScarGAN simulation pipeline. From left to right: original image with no scar tissue; mask with RV endo (light blue), LV myo (green), and LV endo (orange) and simulated scar tissue (red); heuristic-based simulation; output from $ R(x) $; blending mask; final image with simulated scar tissue.} \label{fig:sim_process} \end{figure} In this section, we describe in detail the pipeline we use to simulate scar tissue on healthy myocardium in order to augment the LGE dataset. This dataset is used to train a segmentation network to segment RV endo, LV epicardium (LV epi) and LV endo. Although it is possible to train a network to directly segment scar tissue, analyzing LGE scans using scar tissue segmentation is not part of the recommended guidelines. \cite{Schulz-Menger2013-xp} Despite using an experience replay buffer, we still sometimes observe mode collapse in $ M(x) $: we monitor the simulated scar tissue throughout the training process and notice that $ M(x) $ sometimes predicts scar tissue of similar shapes in most of the training set. To obtain diverse scar tissue, we try to condition the input by a noise vector or inject noise using dropout at inference time. However neither of these methods yield scar tissue with significantly different shapes. We note that this phenomenon is consistent with the findings in pix2pix. \cite{Isola2016-ks} Instead, we snapshot the weights of $ M(x) $ for every 10,000 training steps. We pick 5 of these snapshots by visually inspecting the shape of some of the simulated scar tissue. These weight snapshots are selected if simulated scar tissue is of relatively diverse shapes within the training set and across the snapshots. As a final post-processing step, we create a blending mask to combine the refined image from $ R(x) $ and the original image. This step removes any artifacts created by $ R(x) $ outside the myocardium. We initialize the blending mask as the myocardium mask and then apply Gaussian blur with a kernel size of 5px because the boundary between LV blood pool and LV myocardium is not clear-cut. The final image is created by computing a per-pixel weighted average between the refined image from $ R(x) $ and the original image. \subsection{Quantitative Evaluation of Simulated Scar Tissue} \begin{figure} \centering \includegraphics[scale=0.45]{visual-turing-test.pdf} \caption{Samples of simulated and real scar tissue grouped by the majority consensus responses from the physicians.} \label{fig:visual_turing_test} \end{figure} To quantitatively evaluate the realism of the scar tissue simulated by ScarGAN, we ask 3 physicians, including 2 radiologists with more than 10 years of experience, to classify whether the scar tissue on 30 LGE SAX slices are simulated or not. 15 slices have real scar tissue and 15 have scar tissue simulated by ScarGAN. These slices are shown in random order and are randomly drawn from a held-out set. We do not impose any time limit for the physicians to classify the images. The classification accuracies of the physicians are 60\% (p=0.388), 47\% (p=0.804) and 50\% (p=0.607). The majority consensus has an accuracy of 53\% (p=0.791). The results demonstrate that experienced physicians are unable to reliably distinguish simulated scar tissue from real scar tissue and that scar tissue simulated by ScarGAN are highly realistic. Fig. \ref{fig:visual_turing_test} shows samples of simulated and real scar tissue grouped by the majority consensus responses. \subsection{Segmenting LGE Scans} \begin{figure} \centering \includegraphics[scale=0.56]{pred_contours.pdf} \caption{Comparison of predicted and ground truth contours on the LGE SAX images from 2 unique patients. Light red mask is scar tissue correctly included in myocardium; dark red mask is scar tissue erroneously included in blood pool (also indicated by black arrows). The green and blue lines show the predicted LV epi and LV endo contours, respectively.} \label{fig:pred_contours} \end{figure} We evaluate the effectiveness of ScarGAN as a data augmentation technique by adding scans with simulated scar tissue in the training dataset of a segmentation network that segments RV endo, LV endo and LV epi. We note that LV myo can be derived by subtracting LV endo from LV epi at inference time. The segmentation network is a U-Net-based DeepVentricle \cite{Lieman-Sifry2017-cm} with 96 initial filters, 4 downsampling layers, 3 convolutional layers before each downsampling or upsampling operations, and skip connection between the corresponding downsampling and upsampling layers. This segmentation network is first trained on 1143 steady-state free precession (SSFP) SAX CMR scans with per-pixel cross-entropy as the objective function and optimized using Adam \cite{Kingma2014-kl} with a learning rate of $ 1e^{-4} $. The network is then fine-tuned on the 159 LGE CMR scans dataset described above. We note that scar tissue is not visible in standard SSFP scans as no contrast agents have been administered. Thus the network must learn all knowledge about scar tissue from the LGE dataset. We apply traditional data augmentation to all networks such as translation, scale, rotation and elastic deformation. We first naively fine-tune U-Net on the LGE dataset but we find that it is unable to discriminate between blood pool and scar tissue, which have similar intensities. We make two changes to the LGE-specific segmentation network to address this failure mode: \begin{enumerate} \item Other than the three ventricular structures, the LGE segmentation network also predicts the ground truth scar tissue mask derived from FWHM or the simulated scar mask as an auxiliary task. \item We modify the loss function such that a higher weighting is assigned to the pixels within scar tissue. We note that this weighting is an important hyperparameter -- if it is too high, the network will overestimate the proportion of scar tissue by erroneously including blood pool as part of the myocardium; if it is too low, the proportion of scar tissue will be underestimated by erroneously missing scar tissue in the myocardium prediction. \end{enumerate} We evaluate the model on the percentage of scar tissue pixels erroneously included in LV endo and the percentage of scar tissue pixels correctly included in LV myo in each scan. We perform 4-fold cross-validation on the segmentation network and ScarGAN networks. The dataset is split using anonymized patient IDs such that all scans of one patient are assigned to a single fold. We keep the validation set intact and no scans with simulated scar tissue are added to the validation set. As shown in Table \ref{tab:eval_results}, we train the segmentation models on different subsets of the dataset: 1) ScarGAN 0x: only scans with scar tissue, 2) ScarGAN 0x+: all scans with and without scar tissue, 3) ScarGAN $ kx $: scans with real and simulated scar tissue where $ k $ is the number of $ M(x) $ weight snapshots we used to simulate scar tissue. We notice that adding scans without scar tissue is detrimental to the network’s ability to distinguish scar tissue. In contrast, adding simulated scar tissue reduces the average percentage of scar tissue pixels erroneously included in LV endo from 10.66\% to 7.55\%, and increases the average percentage of scar tissue pixels correctly included in LV myo from 75.9\% to 80.5\%. The mean LV endo and LV epi contour dice coefficients are 0.869 and 0.906. Fig. \ref{fig:pred_contours} shows predicted and ground truth LV endo and LV epi contours in the test set. This indicates that it is possible to improve model performance on patients with pathologies by collecting scans without any pathologies and using ScarGAN to simulated those pathologies. \begin{table}[] \centering \resizebox{\textwidth}{!}{ \begin{tabular}{ | c | c | c | c | } \hline \textbf{Dataset subset} & \textbf{Training data} & \textbf{\% of scar} & \textbf{\% of scar} \\ & (number of scans with real scars & \textbf{in LV myo} & \textbf{in LV endo} \\ & / no scars / simulated scars) & & \\ \hline ScarGAN 0x & 69 / 0 / 0 & 75.9 (2.1) & 10.7 (1.8) \\ \hline ScarGAN 0x+ & 69 / 90 / 0 & 71.8 (2.4) & 14.1 (2.2) \\ \hline ScarGAN 1x & 69 / 0 / 90 & 79.7 (2.2) & 7.6 (1.3) \\ \hline ScarGAN 3x & 69 / 0 / 270 & 79.2 (2.2) & 8.4 (1.6) \\ \hline ScarGAN 5x & 69 / 0 / 450 & \textbf{80.5 (2.0)} & \textbf{7.5 (1.4)} \\ \hline \end{tabular} } \newline \caption{Evaluation metrics of model trained on LGE scans with and without simulated scars.} \label{tab:eval_results} \end{table} \section{Conclusions and Future Works} We propose ScarGAN, a framework that can simulate scar tissue on LGE scans of healthy patients to reduce the need to collect scans from patients with rare pathologies. Unlike existing generative approaches, we factorize the simulation process into multiple steps to reduce the difficulty of training generative networks, and allow domain-specific knowledge to be included in the simulation process. We find that scans with simulated scar tissue cannot be distinguished by physicians and they can improve segmentation performance without additional data and annotation collection. In the future, we can evaluate ScarGAN with other pathologies and on other tasks such as classification. We can also train both the mask generator and refining generator end-to-end. Further improvements in GAN techniques can be incorporated including the use of Wasserstein distance \cite{Gulrajani2017-gu} and minibatch discrimination layer \cite{Karras2017-bu}. \bibliographystyle{splncs04}
\section{Introduction} Although Deep Convolutional Neural Networks (DCNNs) form the state of the art in object detection~\cite{schmidhuber2015deep}, they typically require a high number of training iterations to converge. In object detection and robotic pick-up frameworks like the \emph{Factory of the Future}~\cite{lasi2014industry}, a combination of low training times and accurate object detection is vital to ensure minimal turnaround times. This paper introduces an innovative method for fast convergence of DCNNs performing object detection tasks, using an auxiliary network dubbed {\textsc{Converge-Fast-\auxnet}}. Our method combines multiple, synergistic loss functions to improve both the accuracy and convergence speed of DCNNs. We use an image segmentation DCNN for object detection, and use the auxiliary neural network to learn optimal weights for its multiple loss functions during training. No pre-processing is required on the error metrics, and no additional hyper-parameters are introduced. The approach is tested in a {{RoboCup@Work}}~\cite{kraetzschmar2014robocup} setup, simulating the requirements for the Factory of the Future. Figure~\ref{fig:pickup} shows a typical pickup operation in the RoboCup@Work competition. Results illustrate that {\textsc{Converge-Fast-\auxnet}} outperforms the state of the art in accuracy, convergence speed, and stability. Necessary training iterations are reduced on average by $24.5\percent$, or roughly an hour of training on a NVIDIA Titan X. The probability of a successful picking operation is improved by $15.8\percent$ on average ($9\percent$ absolute difference). The IoU measure is improved by $10.5\percent$. Our main contributions can thus be summarized as follows: \begin{enumerate}[i] \item the introduction of the {\textsc{Auxnet}} approach, which learns optimal weights on-line in a multi-objective environment, \item the combination of the commonly used Intersection over Union (IoU) metric and a Euclidean distance loss for faster convergence, \item providing a labeled object classification and detection benchmark dataset, which is publicly available.\footnote{See \tt{https://airesearch.de/ObjectDetection@Work/}} \end{enumerate} The remainder of this paper is organized as follows: Section~\ref{sec:bg} provides background in object detection and presents related work. Section~\ref{sec:impl} introduces the {\textsc{Converge-Fast-\auxnet}} approach and describes the introduced loss functions in detail. Section~\ref{sec:exp} describes the experimental setup. Finally, Section~\ref{sec:res} presents and compares the experimental results and Section~\ref{sec:conc} concludes the paper. \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{imgs/pickup.pdf} \label{fig:pickup} \caption{Picking an object from the position indicated by the activations of the DCNN (lower right). The dominant axis of the activations is regarded as the facing of the object, and the gripper oriented perpendicular to it.} \end{figure} \section{Background and Related Work} \label{sec:bg} Object detection is a well-researched task in the field of computer science and artificial intelligence. The purpose is to output a list of pre-trained objects that are present in a given image, along with their positions in the image~\cite{guo2016deep}. Major breakthroughs using DCNNs in the last years have advanced the performance of neural network object predictors such that DCNNs are now the leading type of classifier in many image recognition~\cite{deng2009imagenet} or detection benchmarks, most notably, the Pascal VOC Challenge~\cite{everingham2010pascal}. State-of-the-art approaches such as Faster-RCNN~\cite{ren2017faster} or YOLO9000~\cite{redmon2017yolo9000} pass an image through the network once, then propose regions for bounding boxes which are subsequently refined. Another way to detect objects, avoiding bounding box creation, is using semantic segmentation~\cite{long2015fully}. A semantic segmentation network features input and output layers of the same dimension, with each output pixel denoting which of the trained classes it belongs to. This effectively allows a different object to be predicted at every pixel. Further processing, such as clustering, is required to obtain the position of each object. The DCNN used in this research is based on the segmentation approach. Multi-task learning can be used to improve both training time and prediction accuracy by learning a shared representation for multiple objectives simultaneously~\cite{caruana1998multitask}. Multiple tasks can be learned by a single network by combining the respective task loss functions. Commonly, multi-task learning is employed to learn related, but independent tasks by a shared model, such as object detection and classification~\cite{sermanet2014overfeat}. Combining error functions typically consists of scaling, weighting and finally summing them. These weights are conventionally modeled as hyperparameters~\cite{girshick2015fast}. Kendall et al.~\cite{kendall2017multi} present a statistically sound way to learn optimal weights, assuming that the epistemic error in the model will be eliminated with enough learning, and the dominant form or error remaining will be the homoscedastic uncertainty, which can be captured by measuring the variance of the loss over time. An error function with lower variance will then gain a higher relative weight, and vice versa. We will refer to this weighting method as \emph{KGC-weighting}, after the initials of the authors. The combined loss $\mathcal{L}_{KGC}$ is defined in terms of the individual losses $\mathcal{L}_i$, and their respective variances $\sigma^2_i$ are defined as shown in Equation~\ref{eq:kgc}. \begin{equation} \label{eq:kgc} \mathcal{L}_{KGC} = \sum_{i}\frac{1}{2\sigma^2_i}\mathcal{L}_i+\log\sigma^2_i \end{equation} An immediate limitation of this approach is that functions with extremely low variances, such as an IoU with little or no overlap, may not train well as they can produce exploding gradients. Section~\ref{sec:res:owl} presents two approaches to address this issue: $KGC_{+\epsilon}$ and $KGC_{\nicefrac{}{Mean}}$-weighting. \section{Approach} \label{sec:impl} In this work, we will show that combining mutually \emph{dependent} error functions can provide a significant improvement in both convergence time and the resulting classifier accuracy. Common practice is to train multi-objective networks using mutually \emph{independent} error functions, that is, when training one independent function, the values of the others are not affected. While~\cite{caruana1998multitask} hints that tasks can be too similar to gain improved performance from training a shared model, we will demonstrate that in an object detection framework, training a shared model minimizing two mutually dependent loss functions, i.e., loss functions that are dependent in such a way that training one may also reduce the other, provides a significant improvement over learning just one. We then present {\textsc{Converge-Fast-\auxnet}}, a method that models the learning of optimal error function weights as an auxiliary task~\cite{zhang2014supervised}. The joint error function can be described as minimizing the scaled, summed up error of all the available error functions, while optimizing their weights for fastest reduction. As an auxiliary network, we use a fully connected neural network with input features being the current value, the average, and standard deviation of every error function. The hidden layer consists of 24 ReLU neurons, which are combined into the two weights used to scale the two error functions. Figure~\ref{fig:auxnet} displays the auxiliary network layout. While the number of neurons in the hidden layer may be seen as an additional hyper-parameter, they should only depend on the number of error functions to be weighted, not the type or scale of the functions used. The \emph{total loss} of the DCNN, $\mathcal{L}_{Total}$ is derived from summing all weighted individual functions. The learned weights for every individual error function are applied to the respective loss value in a manner similar to \emph{KGC-weighting}, i.e., dividing each loss value $\mathcal{L}_i$ by the respective weight $w_i$ and adding the natural logarithm of the weight, as shown in Equation~\ref{eq:auxnet}. Weighting the terms as shown introduces self-regulating properties of the weights compared to a simple multiplication with the loss. The auxiliary network is maximizing the rate of decline in \emph{total loss}, the term to be minimized is provided in Equation~\ref{eq:auxnet_err}. $\mathcal{L}_{Total}$ and $\mathcal{L}_{\textsc{Auxnet}}$ are optimized with two different Adam instances, both initialized with the same parameters as listed in Section~\ref{sec:bg}. The individual error functions to be weighted and subsequently collectively minimized are presented in Section~\ref{sec:errfunc}. \begin{figure}[tb] \centering \includegraphics[width=0.8\linewidth]{imgs/auxnet.pdf} \caption{The layout of {\textsc{Auxnet}}. The current losses $\mathcal{L}_i$ are averaged to $\overline{\mathcal{L}}_i$ over the course of the training session using exponential moving averages. The standard deviation $\sigma_i$ is obtained likewise. The fully connected hidden layer produces output weights, which are inserted into Equation~\ref{eq:auxnet}. The network optimized to the gradient of the DCNN error reduction, as detailed in Equation~\ref{eq:auxnet_err}.} \label{fig:auxnet} \end{figure} \begin{equation} \label{eq:auxnet} \mathcal{L}_{Total} = \sum_{i}\frac{1}{w_i}\mathcal{L}_i+\log w_i \end{equation} \begin{equation} \label{eq:auxnet_err} \mathcal{L}_{\textsc{Auxnet}} = \frac{\mathcal{L}_{Total} - \overline{\mathcal{L}_{Total}}}{\overline{\mathcal{L}_{Total}}} \end{equation} \subsection{Network} The layout of the DCNN used was inspired by the networks described in~\cite{simonyan2014very}, but was extended to feature the traditional hour-glass shape of semantic segmentation networks~\cite{long2015fully}. The derived network features four instead of the common three input channels, with the fourth channel encoding distance information obtained by using an Intel SR300 3D camera for construction of the dataset. The number of filters per layer was tweaked by hand, and the number of output layers reflects the number of different objects to be distinguished by the network. Before being presented to the network, all images are scaled down from the native resolution of $640 \times 480$ pixels to a more manageable size of $256 \times 192$ pixels. All activation functions are ReLUs. Regularization is introduced in the form of dropout regularization, with a $15\percent$ dropout chance in the convolutional layers 6 and 7. The innermost layer doubles as a classification vector. If a specific object is to be retrieved, only the activations on the corresponding layer are taken into account. A detailed description of the network can be found in Figure~\ref{fig:hourglass_net}. \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{imgs/hourglass2.pdf} \caption{The network layout used. Numbers above the layers indicate pixel dimensions, numbers below the image denote the number of channels or filters. All layers are convolutional/inverse convolutional, using ReLU activation functions. It is trained on either minimizing the IoU or distance error for a queried object on the corresponding output layer, or on a combination of both using Equation~\ref{eq:auxnet}.} \label{fig:hourglass_net} \end{figure} \subsection{Error Functions} \label{sec:errfunc} Commonly, object detection or semantic segmentation networks are trained on minimizing the cross entropy between the network output and the labeled ground truth. Training to maximize the IoU between the predicted and actual bounding boxes is not possible out of the box, as this function is not differentiable; however, one can use an approximate IoU measure instead, which~\cite{rahman2016optimizing} argue converges more quickly. Note that in this paper we are mainly minimizing the \emph{IoU Error}, defined as $1 - IoU$. Figure~\ref{fig:func_iou} visualizes how the IoU measure is calculated from a prediction and approximate segmentation data, obtained by a conventional object detection approach. \begin{figure}[tb] \centering \includegraphics[width=0.49\linewidth]{imgs/newExample_Inp.png} \includegraphics[width=0.49\linewidth]{imgs/newExample_Activ_Errs.png} \caption{Left: An example input image. Right: The output of the layer detecting $40\times\SI{40}{\mm}$ aluminium profiles. The ratio of activations inside the area of the object, displayed in blue, divided by the sum of all activations and the size of the blue area produces the IoU. The Euclidean distance error between weighted center of activations and ground truth annotation is displayed in red.} \label{fig:func_iou} \end{figure} In case the prediction and ground truth do not overlap, the IoU does not produce a usable gradient and training can get stuck. The Euclidean distance between prediction and label, however, is always well defined and produces a slope a gradient descent algorithm can follow. Because of this, and because the measure of quality for a picking operation will ultimately be a function of the distance between predicted and actual position of the object, one might train the network on this measure immediately. The object prediction is produced by obtaining the weighted average of activations on the corresponding output layer, as indicated in red in Figure~\ref{fig:func_iou}. Minimizing this \emph{distance error} lets the network converge faster and to a lower error, as Figure~\ref{fig:one_error_funcs} demonstrates. However, low-frequency filters appear to dominate the output, in turn leading to activations being spread over the greater part of the image, as opposed to tightly localized around the desired position. Figure~\ref{fig:sparse_activation_distance} shows this behavior. The distinction between multiple objects on the same layer using clustering is therefore impossible. As the IoU measure produces strongly localized activations, but the distance error converges much faster, we hypothesize that a combination of both can produce superior results. \begin{figure}[b] \centering \includegraphics[width=1\linewidth]{imgs/1errorFuncExample.pdf} \caption{Training directly on the distance error metric (blue) leads to faster convergence and lower error than training on cross entropy (green) or IoU (red). Averaged from 20 runs with equal hyperparameters.} \label{fig:one_error_funcs} \end{figure} An inherent weakness of the \emph{distance error} in pixels or centimeters is its lack of expressiveness. Although it does describe the visual offset between prediction and label, it fails to capture the quality of this prediction: While halving an error from e.g. \SI{0.8}{\cm} to \SI{0.4}{\cm} will not result in any increased chance of a successful pick-up operation, halving the error from \SI{2}{\cm} to \SI{1}{\cm} will greatly increase the probability. The relation between a successful pickup and the distance error is therefore not linear. During empirical testing of the picking operation, we observed that for small objects, a distance error of \SI{1}{\cm} results in a failed grasp $50\percent$ of the time; for a distance offset of \SI{3}{\cm}, the probability of failure rises to $90\percent$. We thus model the \emph{pickup error} by applying a negative exponent power function to the error in centimeters, coinciding in $E_{Distance}(0) = E_{Pickup}(0) = 0$, and $E_{Pickup}$ asymptotically approaching $1$ for $E_{Distance}\to\infty$, resulting in Equation~\ref{eq:pickup_error}. \begin{equation} \label{eq:pickup_error} E_{Pickup} = \frac{-1}{(E_{Distance})^2+1} + 1 \end{equation} Figure~\ref{fig:pickup_error_func} plots the distance error metric versus the pickup error in the usually occurring range. Using the pickup error metric readily scales the distance error in the same range as the IoU, between $0$ and $1$. Early results showed that training on pickup error directly was unsuccessful, due to the gradient of the function being too low for higher error values. However, we will use the pickup error and the \emph{pickup rate}, defined as $1 - E_{Pickup}$, as an accurate scaling method when comparing or adding pickup and IoU errors. \begin{figure}[tb] \centering \includegraphics[width=0.32\linewidth]{imgs/activations_origin.png} \includegraphics[width=0.32\linewidth]{imgs/activations_iou.png} \includegraphics[width=0.32\linewidth]{imgs/activations_dist.png} \caption{Left: The input image leading to the activations shown right. Middle: Activations on the \enquote{Bearing} layer for a network trained on IoU. Right: Activations when trained on distance error alone. The object position is predicted accurately by constructing the weighted average of the activations, however, the majority of the filter weights are zero, and most of the activations are not close to or within the object. Note that the size of the activated pixels was increased for better visibility.} \label{fig:sparse_activation_distance} \end{figure} \begin{figure}[b] \centering \includegraphics[width=\linewidth]{imgs/pickupFunc.pdf} \caption{The probability of a failed pickup (blue) and its derivative (light blue) plotted in a range of 0 to \SI{14}{\cm} of distance error.} \label{fig:pickup_error_func} \end{figure} \section{Experiments} \label{sec:exp} To measure the convergence speed and resulting quality of employing different error functions and combinations thereof, each setup was trained for 100000 steps ($\approx 67$ epochs) with a batch size of 8. An Adam optimizer~\cite{kingma2014adam} was used to minimize the loss term, with a learning rate of \num{1e-5}, $\beta_1=0.9$, $\beta_2=0.999$, and $\epsilon=\num{1e-08}$. Initial tests showed that all methods tested could train and converge with these values, so the hyperparameters for the neural networks to be trained were frozen at these values. In order to achieve statistical significance, 20 networks were trained for every method. A full training run with 100000 iterations takes about 10 hours to complete on an NVIDIA Titan X graphics card, regardless which of the methods we present is used. Every 500 iterations during training, the networks were tested on the entire validation set to get an accurate estimate of their performance on unknown data. This data forms the basis for all results to be presented. \subsection{Dataset} Employing the {{RoboCup@Work}} challenge as a Factory of the Future simulation, the up-to-date version of team \emph{smARTLab@Work}'s previously world-cup winning~\cite{broecker2014winning} hard- and software was used to produce a dataset. More than $35000$ RGBD 3D images were taken with an Intel SR300 3D camera, and over $14000$ images were manually labeled for object detection. Alternative RGBD benchmark datasets containing {{RoboCup@Work}} objects are scarse. Distinct training and evaluation sets were recorded, mimicking the Industry~4.0 requirements such that both are comparatively small with about 12000 images for training, and 2000 images for validation. Each of the 13 {{RoboCup@Work}} object types is recorded from multiple angles, placed on platforms as defined in the official rule book\footnote{Available on \tt{http://www.robocupatwork.org/}}. Figure~\ref{fig:dataset_example} shows an example. The training and validation sets were manually labeled with the center of gravity, or \enquote{pickup point}, of each object. The dataset can be retrieved from {\footnotesize \tt{https://airesearch.de/ObjectDetection@Work/}.} \begin{figure}[tb] \centering \includegraphics[width=0.32\linewidth]{imgs/dataset_example_color.png} \includegraphics[width=0.32\linewidth]{imgs/dataset_example_depth.png} \includegraphics[width=0.32\linewidth]{imgs/dataset_example_annot.png} \caption{Left: An example image from the dataset, displaying multiple {{RoboCup@Work}} objects. Center: The corresponding depth image. Right: Imperfect segmentation mask obtained by the current {{RoboCup@Work}} software. Manually labeled pickup positions marked in red.} \label{fig:dataset_example} \end{figure} \section{Results} \label{sec:res} The results of the experiments conducted are split into analyzing how and which weights are derived by the available methods to weight error functions, and their respective performance regarding convergence speed and error reduction. \subsection{Optimal Weight Learning} \label{sec:res:owl} In order to compare \emph{KGC-weighting} to the weighting learned by the auxiliary task network \textsc{Auxnet}, we are testing both methods to empirically evaluate their respectively derived combinations of the distance error and IoU error measures. To produce a valid \emph{KGC-weighting}, scaling the error functions between 0 and 1 is required. The IoU error is produced in this range by design, but the pixel distance error may range from 0 to 320 pixels, i.e. the diagonal of the image. In practice however, distances over 70 pixels do not occur. As a compromise, we divide the pixel distance by 100 in order to scale it in the required range. Tests using the pickup error as scaled distance error term during training were unsuccessful, evidently due to the lack of slope of the error function throughout most of its range. Training the network on the \emph{KGC-weighted} downscaled pixel distance and IoU posed another challenge, as frequently, the network would irrecoverably die out, most certainly due to the ReLU activation functions getting stuck with negative weights, a well known problem with ReLU activation function and steep gradients~\cite{maas2013rectifier}. In order to get 20 successful training runs, 30 networks had to be trained, as one third of them did not converge. A contributing factor to the dying ReLUs appears to be the extreme weights derived from the task variance. Dividing by the very low values of initial IoU variance leads to extreme weights, which in turn can lead to a gradient explosion. Adding an epsilon of \num{1e-3} to both variances mitigated the neuron decay, however, with a detrimental effect on the prediction performance. We call this method \emph{$KGC_{+\epsilon}$-weighting}. Another way to combat exploding gradients is to divide the error variance by the error mean, assuming that an error function with a higher error in general will also feature a higher absolute variance. This \emph{$KGC_{\nicefrac{}{Mean}}$-weighting} performs comparable to regular \emph{KGC-weighting}, and does not require explicit scaling of the error functions to a 0 to 1 range. It also appears to generate more sensible weights, as the network converged in all 20 out of 20 runs. Table~\ref{tab:weights_Learned} shows the extreme values of the learned weights. Figure~\ref{fig:kgc_weights_chart} presents the weight history over a full training episode. For these charts, the weights were normalized and inverted, so a larger area means a higher contribution of the weight to the loss term. As $KGC_{\nicefrac{}{Mean}}$ and {\textsc{Auxnet}} are trained on the raw pixel distance rather than a scaled distance between 0 and 1, their weights are scaled accordingly by 100. Figure~\ref{fig:kgc_charts} shows the effect of the different weight learning methods on error reduction during training. \begin{table}[tb] \centering \setlength\tabcolsep{4.5pt} \begin{tabular}{|l|c|c|} \hline Learning method & $W_{Distance}$ & $W_{IoU}$ \\ \hline \emph{KGC-weighting} & & \\ \hspace{2em} min & \num{6.14e-6} & \num{2.26E-07} \\ \hspace{2em} max & \num{8.57e-2} & \num{2.18E-01} \\ \hline \emph{$KGC_{+\epsilon}$-weighting} & &\\ \hspace{2em} min & \num{2.25E-01} & \num{1.00E-03} \\ \hspace{2em} max & \num{8.29E+02} & \num{2.19E-01} \\ \hline \emph{$KGC_{\nicefrac{}{Mean}}$-weighting} & & \\ \hspace{2em} min & \num{7.98E-01} & \num{3.98E-05} \\ \hspace{2em} max & \num{6.44E+01} & \num{2.92E-02} \\ \hline {\textsc{Auxnet}} & & \\ \hspace{2em} min & \num{2.71E-04} & \num{4.95E-03} \\ \hspace{2em} max & \num{7.76E-03} & \num{5.17E-02} \\ \hline \end{tabular} \caption{Extreme values for the error function weights learned by different methods. \emph{KGC-weighting} can produce the most extreme gradients, dividing the losses by the smallest weights. {\textsc{Auxnet}} appears to provide the most stable weights.} \label{tab:weights_Learned} \end{table} \begin{figure}[tb] \centering \begin{minipage}{0.49\linewidth}\centering $KGC$ \end{minipage}\begin{minipage}{0.49\linewidth}\centering $KGC_{+\epsilon}$ \end{minipage}\\ \includegraphics[width=0.49\linewidth]{imgs/weights_kgc.pdf} \includegraphics[width=0.49\linewidth]{imgs/weights_kgce.pdf} \begin{minipage}{1\linewidth}\vspace{0.2cm}\end{minipage} \begin{minipage}{0.49\linewidth}\centering $KGC_{\nicefrac{}{Mean}}$ \end{minipage}\begin{minipage}{0.49\linewidth}\centering {\textsc{Auxnet}} \end{minipage}\\ \includegraphics[width=0.49\linewidth]{imgs/weights_kgcdba.pdf} \includegraphics[width=0.49\linewidth]{imgs/weights_aux.pdf} \caption{Normalized and inverted weights derived from the different methods. Positive contribution to distance error is shown in blue, contribution to the IoU error is shown in red. All $KGC$-measures start off with training almost exclusively on IoU. Adding an epsilon balances the weights more. {\textsc{Auxnet}} features more balanced weights from the start, explaining the fast early convergence. The weights appear to be more stable than $KGC$'s.} \label{fig:kgc_weights_chart} \end{figure} \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{imgs/kgcCompDistCm.pdf} \\ \includegraphics[width=1\linewidth]{imgs/kgcCompCombined.pdf} \\ \caption{Charts comparing the reduction of different error measures for (blue) \emph{KGC-weighting}, (red) \emph{$KGC_{+\epsilon}$-weighting}, (green) \emph{$KGC_{\nicefrac{}{Mean}}$-weighting} and (black) weighting by {\textsc{Auxnet}}. The first chart plots the distance error in cm, the second shows the reduction of an added pickup- and IoU error measure. Charts are averaged from all 20 runs and obtained on the entire evaluation set during training.} \label{fig:kgc_charts} \end{figure} \subsection{Convergence Speed and Accuracy} To compare the trained classifiers, convergence speed and error after convergence are measured separately, as in different scenarios, users may value time and quality constraints differently. Using dropout regularization effectively prevented our networks from overtraining; however, it also introduced fluctuations of the error value after convergence. These fluctuations prohibit the use of an epsilon threshold on the discrete derivative of the error as convergence measure, as the relation between selected epsilon and the resulting convergence point is highly nonlinear, and varies for networks trained on different error functions. For our convergence point determination method, we instead assume a normal distribution of errors around the mean error after convergence. Further, we assume that the longer we train a network, the more it converges, i.e., that it does not diverge and also that it always reaches convergence within 100000 iterations. Visual analysis of the error charts supports these assumptions, as hinted by $15$ randomly selected charts all converging, shown in Figure~\ref{fig:many_charts}. \begin{figure}[tb] \centering \includegraphics[width=0.19\linewidth]{imgs/grid_01.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_02.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_03.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_04.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_05.pdf} \includegraphics[width=0.19\linewidth]{imgs/grid_06.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_07.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_08.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_09.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_10.pdf} \includegraphics[width=0.19\linewidth]{imgs/grid_11.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_12.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_13.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_14.pdf}\includegraphics[width=0.19\linewidth]{imgs/grid_15.pdf} \caption{All test runs were examined for proper convergence. $15$ randomly selected, successfully converging charts are shown here for convenience.} \label{fig:many_charts} \end{figure} We then iteratively remove the earliest data points that do not fit a normal distribution around the mean error with regards to the standard deviation, and shrink the acceptance window to the newly obtained mean and standard deviation. Figure~\ref{fig:howto_converge} illustrates this process. The first entry of the remaining data is considered to be the convergence point, and the average of the remaining data can be considered the average error after convergence. \begin{figure*}[tb] \centering \includegraphics[width=0.32\linewidth]{imgs/convergence_method_1.pdf}\includegraphics[width=0.32\linewidth]{imgs/convergence_method_2.pdf}\includegraphics[width=0.32\linewidth]{imgs/convergence_method_3.pdf} \caption{The convergence point determining process in detail. Left: An acceptance window (green) is created from the average error and the standard deviation. Middle: While rejecting points (red), the acceptance window shrinks. Right: The leftmost point within the acceptance window becomes the convergence point. For the amount of noise present in our data, a window of $\pm\nicefrac{\sigma}{2}$ produced best results.} \label{fig:howto_converge} \end{figure*} Figure~\ref{fig:double_box_plot} displays the convergence speed and resulting error after convergence in a double box plot. This plot shows that training on the distance error alone yields the highest error, although it trains comparatively fast. Training on IoU error alone converges very slowly, but to a lower error compared to the distance error metric. This is due to the fact that training on IoU error reduces both the IoU and distance error, but training on the distance error does not lower the IoU error. Training on a simple addition of distance error and IoU results in reduced error compared to either. Both \emph{KGC-weighting} and \emph{$KGC_{\nicefrac{}{Mean}}$-weighting} significantly reduce the combined error, but do not improve the convergence time. While {\textsc{Auxnet}} features a higher deviation in both convergence speed and quality, the majority of the runs perform significantly better than any other combination method, reducing the average summed error by $15.85\percent$ compared to \emph{KGC-weighting}; it also proved to be more stable, as all 20 test runs converged. {\textsc{Auxnet}} manages to weight the error terms such that the network can converge on average in $26800$ iterations, much faster than \emph{KGC-weighting} with an average of $34850$ iterations -- reducing it by nearly $25\percent$, or saving about one hour of training on an Nvidia Titan X. Table~\ref{tab:improvements} shows the relative improvement of {\textsc{Auxnet}} compared to just training on the distance error, IoU error, on a simple addition of IoU and Distance Error, and \emph{KGC-weighting}. \begin{table}[tb] \centering \setlength\tabcolsep{4.5pt} \begin{tabular}{|l|c|c|c|c|} \hline {\textsc{Auxnet}} vs. & Convergence Time & Pickup Rate & IoU \\ \hline Distance Error & ~$+0.48\percent$ & $+11.83\percent$ & $+35.31\percent$\\ IoU Error & $-42.48\percent$ & $+39.90\percent$ & ~$+3.31\percent$\\ Distance+IoU & $-16.90\percent$ & $+21.53\percent$ & $+24.41\percent$\\ \emph{KGC-weighting} & $-24.53\percent$ & $+15.85\percent$ & $+10.48\percent$\\ \hline \end{tabular} \caption{Relative improvements of {\textsc{Auxnet}} over selected other methods. Data is averaged from 20 runs. {\textsc{Auxnet}} converges faster and produces a higher pickup rate and IoU than the other tested methods, an exception being the distance error converging marginally faster.} \label{tab:improvements} \end{table} The high variation of quality and convergence can be explained by analyzing the charts of the more slowly converging outliers. Figure~\ref{fig:comp_fast_slow} shows that these network experienced near-death scenarios, in which part of the network died out, from which they never fully recovered. It shall be noted that optimal weights for error functions will automatically also pose a higher threat of neuron death for the network, as optimal weights will produce steeper gradients, which in combination with Adam's learned momenta may lead to ReLU neurons getting stuck with negative activations and dying. An obvious solution may be converting the DCNN to leaky ReLUs. \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{imgs/doubleBoxPlot.pdf} \caption{A double box plot showing the median and quartiles from twenty networks trained on each error function or combination thereof. Extents along the X-Axis describe variation in convergence speed, while the Y-Axis shows the summed \emph{pickup}- and IoU error. The median convergence and error measures for {\textsc{Auxnet}} are significantly better than for any compared method.} \label{fig:double_box_plot} \end{figure} \begin{figure*}[tb] \centering \includegraphics[width=0.49\linewidth]{imgs/fastestConverging.pdf}\includegraphics[width=0.49\linewidth]{imgs/slowestConverging.pdf} \caption{Convergence plots of the fastest (left) and slowest (right) converging networks trained using {\textsc{Auxnet}}. Distance error (red) is converted to a pickup error and added to the IoU error (blue) to form the combined error (green). The dark green box indicates the converged region, its average error, and standard deviation. The distance error plot on the right side shows that the network suffered traumatic experiences during early training, from which it could never fully recover, resulting in overall higher error and slower convergence.} \label{fig:comp_fast_slow} \end{figure*} \subsection{Significance} The distributions of error values and convergence points were tested against each other with a two-sample Kolmogorov-Smirnov (KS) test, using $\alpha = 0.05$, the null hypothesis being that the different sources can not be distinguished. All error distributions were statistically significantly different. Table~\ref{tab:significance} shows the results of the convergence tests. With distributions too similar or variations too high in either sample, some of the null hypotheses could not be rejected for the number of test runs. \begin{table*}[tb] \centering \begin{tabular}{|l|c|c|c|c|c|c|c|} \hline Learning method & Distance Error & IoU Error & Distance+IoU & $KGC$ & $KGC_{+\epsilon}$ & $KGC_{\nicefrac{}{Mean}}$ & {\textsc{Auxnet}}\\ \hline Distance Error & \cellcolor{gray} & $\checkmark$ & $\checkmark$ & --- & $\checkmark$ & --- & --- \\ IoU Error & $\checkmark$ & \cellcolor{gray} & $\checkmark$ & $\checkmark$ & $\checkmark$ & $\checkmark$ & $\checkmark$\\ Distance+IoU & $\checkmark$ & $\checkmark$ & \cellcolor{gray} & $\checkmark$ & $\checkmark$ & $\checkmark$ & $\checkmark$\\ $KGC$ & --- & $\checkmark$ & $\checkmark$ & \cellcolor{gray} & $\checkmark$ & --- & $\checkmark$ \\ $KGC_{+\epsilon}$ & $\checkmark$ & $\checkmark$ & $\checkmark$ & $\checkmark$ & \cellcolor{gray} & $\checkmark$ & --- \\ $KGC_{\nicefrac{}{Mean}}$ & --- & $\checkmark$ & $\checkmark$ & --- & $\checkmark$ & \cellcolor{gray} & $\checkmark$\\ {\textsc{Auxnet}} & --- & $\checkmark$ & $\checkmark$ & $\checkmark$ & --- & $\checkmark$ & \cellcolor{gray} \\ \hline \end{tabular} \caption{Checkmarks indicating whether $H_0$ could be rejected by a two-sample KS-Test, $\alpha = 0.05$. All networks were compared with respect to their convergence. With few exceptions, most differences are significant, most importantly, between $KGC$ and {\textsc{Auxnet}}.} \label{tab:significance} \end{table*} \section{Conclusion} \label{sec:conc} We have shown that error functions do not have to be independent in order to speed up convergence and produce lower error. We have introduced the {\textsc{Converge-Fast-\auxnet}} approach, a method to learn a weighting between these error functions in a manner that improves convergence and the reduction of error even more. Repeated test runs have shown that improvements on state-of-the-art methods to derive optimal weightings are significant. In conclusion, object detection tasks can be improved in accuracy and training times by further constraining the network using a combination of available error metrics, and using approaches such as {\textsc{Auxnet}} to learn optimal weights between them. The \emph{Factory of the Future} benefits especially from the faster convergence, enabling it to train object detectors for each new task in near real time. Future work includes extending {\textsc{Converge-Fast-\auxnet}} to a recurrent network that can learn the decrease along the gradients of the network, and modify the output weights in accordance. We also plan to test our approach on common datasets such as the Pascal VOC Challenge or the Cityscapes Dataset~\cite{cordts2016cityscapes}. As the use of ReLU neurons appeared to pose problems to the combination of weight learning (as in \emph{KGC-weighting} or {\textsc{Auxnet}}) and the Adam optimizer, a next logical step would be to test other activation functions for the DCNN, such as leaky ReLUs. Lastly, we are planning to investigate further why training on the pickup error was unsuccessful, and aim to modify the function such that it still reflects pickup probabilities, but can also be used as a better scaled version of the distance error for KGC-weighting.
\section{Introduction} Developing single-photon sources is an important task of optical quantum technologies \cite{Eisaman:2011cc,Takeuchi2014,Caspani:2017gq}. In particular, CMOS-compatible on-chip devices are especially demanded for creating scalable and compact quantum photonic circuits \cite{Politi2009,Harris:2014kj,Caspani:2017gq}. In this respect, heralded single-photon sources based on spontaneous four-wave mixing (SFWM) in microring resonators are of great interest since they allow one to achieve within the framework of integrated optics high efficiency of the nonlinear process \cite{Gaeta:2008bc,Azzini:2012io,Savanier:2016kb}, narrow spectral width of generated photons \cite{Reimer:2014ev}, and to approach deterministic emission of them using multiplexing techniques \cite{Collins:2013eu,Heuck:2018km}. The latter is expected to be quite efficient when using photon number resolving detectors \cite{Christ:2012bs}. In addition, the sources can be designed to produce pure single-photon states (transform--limited single-photon wave packets) \cite{Helt:10,Vernon:17}, which is crucially important for observing quantum interference effects and implementing optical quantum computing \cite{Kok2016}. It is also worth noting that cryogenic temperatures in this case are not required, in contrast to single-photon sources based on single quantum emitters such as quantum dots or color centers. In the present paper, we develop a scheme for generating pure single-photon states via SFWM in a system of coupled ring microresonators. In the SFWM process, two pump laser photons are converted into a pair of daughter photons, usually called signal and idler, in a third-order nonlinear optical material. The photon number correlation between the resulting fields can be exploited to herald the existence of one photon by detection of its partner, which underlies the conditional preparation of single-photon states. Energy conservation requires the signal and idler photons to be generated at frequencies that are symmetrically distributed around the pump frequency. In a general case, due to such a spectral correlation, the heralded photons prove to be in a mixed state. High purity of the emitted photons is achieved when the joint spectral amplitude (JSA) of the biphoton field is a factorable function in the frequency domain \cite{Ren2005}, which is possible for a sufficiently broadband pump field. Similar to \cite{Vernon:17}, for the latter to be used we take advantage of a smaller pump quality factor, which makes the linewidth of the microresonator for the pump broader than those for the signal and idler fields. However, instead of using two coupling points via Mach--Zehnder interferometers, we suggest to use additional microrings. An important advantage of our scheme is that the microrings can be fabricated of special sizes and tuned in resonance only with three interacting modes thereby making additional spectral filtering unnecessary. In addition, the present scheme may be easily realized not only with microring resonators but also with other types of resonators such as microspheres and microtoroids. \section{Basic model} In the present paper, we consider a system of three microring resonators coupled to a central one and connected with strait waveguides (buses) (Fig.~\ref{Scheme}). \begin{figure}[t] \includegraphics[width = 0.45\textwidth]{Fig_1.pdf} \caption{Scheme of coupled microring resonators connected with three waveguides (buses).} \label{Scheme} \end{figure} The SFWM process occurs in the central ring, while other rings are used for loading the pump field and unloading the generated photons. For simplicity, we consider a degenerate pump scheme. It is assumed that the pump field corresponds to a resonator mode in the zero-dispersion region of the central ring microresonator so that the signal and idler photons can be emitted into the adjacent modes that are separated from the pump mode by equal frequency intervals (the group velocity dispersion is negligible). One of the outer rings is tuned in such a way that one of its resonances coincides with the pump mode of the central ring, whereas other resonances do not coincide with the signal and idler modes. On the contrary, other outer rings should be out of resonance with the pump mode but in resonance with the signal and idler modes. When the free spectral range of the outer rings is two times smaller than that of the central ring, the system is similar to that of \cite{Vernon:17}. However, it is possible to make these rings of other sizes so that only three modes of the central ring prove to be effectively coupled to the strait waveguides. The Hamiltonian for the system is \begin{equation}\label{Hamilt} \mathcal{H} = \mathcal{H}_{sys}+\mathcal{H}_{bath}+\mathcal{H}^{internal}_{int}+\mathcal{H}^{bath}_{int}, \end{equation} where \begin{eqnarray*}\label{exten_hamilt2} \mathcal{H}_{sys} = &&\hbar\omega_{0x,p}\, x_p^\dagger x_p + \sum_{n=p,i,s} \hbar\omega_{0y,n}\,y_n^\dagger y_n \\ &&+ \sum_{m={i,s}} \hbar\omega_{0z,m}\, z_m^\dagger z_m \end{eqnarray*} is the free-field Hamiltonian for the cavities, \begin{equation*} \mathcal{H}_{bath} = \int d\omega\,\hbar\omega \Big[ a_p^\dagger (\omega) a_p(\omega) + \sum_{m=i,s} b_m^\dagger(\omega) b_m(\omega) \Big] \end{equation*} is the external bath Hamiltonian, \begin{equation*} \mathcal{H}_{int}^{internal} = i\hbar g_p x_p^\dagger y_p+i \hbar g_i z_i^\dagger y_i + i \hbar g_s z_s^\dagger y_s+ h.c. \end{equation*} is the coupling between the rings, and \begin{eqnarray*} \mathcal{H}_{int}^{bath} = &&\frac{i\hbar}{\sqrt{2\pi}} \int d\omega\, \big[ \sqrt{\kappa_p}\, x_p^\dagger a_p(\omega) + \sqrt{\kappa_i}\,z_i^\dagger b_i(\omega)\\ &&+\sqrt{\kappa_s}\,z_s^\dagger b_s(\omega)+h.c.\big] \end{eqnarray*} is the coupling to the external modes. Here $m =\{i,s\}$, $n=\{i,s,p\}$, $\omega_{0x,p},\omega_{0y,n},\omega_{0z,m}$ are the central frequencies of the microresonators, $\kappa_p$, $\kappa_{i,s}$ are the coupling parameters between the waveguide and rings, $g_p$, $g_{i,s}$ are coupling parameters between the rings, $x_p$, $y_n$ and $z_m$ are annihilation operators for the photons corresponding to the different modes in the rings. Non-zero commutation relations read: $[x_p,x_p^\dagger]=[y_n,y_n^\dagger]=[z_m,z_m^\dagger]=1$ and $[a_p(\omega), a_p^\dagger(\omega')]=[b_m(\omega), b_m^\dagger(\omega')]=\delta(\omega-\omega')$. By applying the input--output formalism \cite{Walls}, from Eq.~(\ref{Hamilt}) we obtain the following Heisenberg-Langevin equations: \begin{equation}\label{Heis_Lang1} \eqalign{ \left[\partial_t+i\omega_{0x,p} +\frac{\kappa_p}{2}\right] x_p -g_p y_p= \sqrt{\kappa_p}\, a_{in;p},\cr [\partial_t+i\omega_{0y,i}] y_i+g_i z_i =0,\cr [\partial_t+i\omega_{0y,p}] y_p+g_p x_p=0,\cr [\partial_t+i\omega_{0y,s}] y_s+g_s z_s=0,\cr [\partial_t+i\omega_{0z,i} +\frac{\kappa_i}{2}] z_i -g_i y_i=\sqrt{\kappa_i}\,b_{in;i},\cr [\partial_t+i\omega_{0z,s} +\frac{\kappa_s}{2}] z_s -g_s y_s=\sqrt{\kappa_s}\,b_{in;s,}\cr a_{in;p}-a_{out;p} = \sqrt{\kappa_p}\, x_p,\cr b_{in;i}-b_{out;i}=\sqrt{\kappa_i}\, z_i,\cr b_{in;s}-b_{out;s}=\sqrt{\kappa_s}\, z_s, } \end{equation} where we used Markov approximation $\kappa_p (\omega) \approx \kappa_p = \rm{const}$, $\kappa_{i}(\omega) = \kappa_{s}(\omega) \approx \kappa_{is}= \rm{const}$, $g_p(\omega) \approx g_p = \rm{const} $ and $g_i(\omega) = g_s (\omega) \approx g_{is} = \rm{const}$. In what follows, we also assume that the same modes in the different rings are matched with each other: $\omega_{0x,p}=\omega_{0y,p}=\omega_{0p}$, $\omega_{0z,m}=\omega_{0y,m}=\omega_{0m}$, which is a natural condition for an efficient energy transfer. \section{Input--output relations} By taking the Fourier transform of (\ref{Heis_Lang1}), we obtain the system of algebraic equations \begin{equation}\label{Heis_Lang_fourier} \eqalign{ \left[i\Delta_{p} +\frac{\kappa_p}{2}\right] x_p(\omega) -g_p y_p(\omega)= \sqrt{\kappa_p}\, a_{in;p}(\omega),\cr i\Delta_{p} y_p(\omega)+g_p x_p(\omega)=0,\cr i\Delta_{m} y_m(\omega)+g_{is} z_m(\omega)=0,\cr \left[i\Delta_{m} +\frac{\kappa_{is}}{2}\right] z_m(\omega) -g_{is} y_m(\omega)=\sqrt{\kappa_{is}}\,b_{in;m}(\omega),\cr a_{in;p}(\omega)-a_{out;p}(\omega) = \sqrt{\kappa_p}\,x_p(\omega),\cr b_{in;m}(\omega)-b_{out;m}(\omega)=\sqrt{\kappa_{is}}\, z_m(\omega), } \end{equation} where we introduce $\Delta_{n} = \omega_{0n}-\omega$, and for all the annihilation operators the Fourier transform is defined as $u(t)=\frac{1}{\sqrt{2\pi}}\int d\omega\, e^{-i\omega t} u(\omega)$. Let us consider the case when $a_{in;p}=1$, and $b_{in;m}=0$, which corresponds to the loading of the pump field. Then we obtain the input-output relations for the pump field operators \begin{equation}\label{in-out_pump} y_p(\omega)=M_p a_{in;p}(\omega)=\frac{2g_p\sqrt{\kappa_p}\,a_{in;p}(\omega)}{-2\Delta_{p}^2+2g_p^2+i\Delta_{p}\kappa_p}. \end{equation} Similarly, in the case when $a_{in;p}=0$, and $b_{in;m}=1$, which corresponds to the loading of the signal and idler fields (and unloading them for the reversed time), we get \begin{equation}\label{in-out_m} y_m(\omega)=M_m b_{in;m}(\omega)=\frac{2g_{is}\sqrt{\kappa_{is}}\,b_{in;m}(\omega)}{-2\Delta_{m}^2+2g_{is}^2+i\Delta_{m}\kappa_{is}}. \end{equation} To express the cavity field operators $y_n$ in terms of the output fields $a_{out;p}(\omega)$, and $b_{out;m}(\omega)$, $M_n$ in Eqs.~(\ref{in-out_pump}), (\ref{in-out_m}) should be replaced by $M^*_n$. \section{Optimal coupling} To suppress the phase dispersion in the central microring, which is necessary for the effective loading of the pump field at frequency $\omega_{0p}$ into it and unloading the generated photons at the frequencies $\omega_{0i}$, $\omega_{0s}$ from it through the outer microrings, we apply the following condition of the closeness of the frequency dependence of the phase to the linear one: \begin{equation} \Bigl. \partial^l_{\omega}\textrm{Argument}(M_n)\Bigr|_{\omega=\omega_{0n}}=0,\quad l=2,3,... \end{equation} In our system, we can impose the condition for $l=3$, which leads to \begin{equation} \eqalign{ \Bigl. \partial^3_{\omega}\textrm{Arctan}\left[\frac{\Delta_{p}\kappa_p}{2\Delta_{p}^2-2g_p^2}\right] \Bigr|_{\omega=\omega_{0p}}=0,\cr \Bigl. \partial^3_{\omega}\textrm{Arctan}\left[\frac{\Delta_{m}\kappa_{is}}{2\Delta_{m}^2-2g_{is}^2}\right] \Bigr|_{\omega=\omega_{0m}}=0, } \end{equation} and obtain the following optimal ratios between the coupling parameters \begin{equation}\label{optimalratio} g_{p,\rm{opt}}=\kappa_p/\sqrt{12},~ g_{is,\rm{opt}}=\kappa_{is}/\sqrt{12}. \end{equation} The remaining conditions for $l>3$ lead to $\kappa_{p,is}\rightarrow\infty$. Physically, this means that the maximum possible experimental values of $\kappa_{p,is}$ should be used. To conveniently visualize the dispersion effects, we introduce the delay function $T_p(\omega)=\textrm{Argument}(M_p)/(\omega-\omega_{0p})$ which shows the difference in a time delay of signals at different frequencies near the central frequency $\omega_{0p}$ (the case of unloading of signal and idler fields can be described similarly). Fig.~\ref{opt_coupl} demonstrates the difference between the three cases, $g_p = \{0.9g_{p,\rm{opt}}, g_{p,\rm{opt}} , 1.1g_{p,\rm{opt}}\}$. \begin{figure}[t] \includegraphics[width=0.45\textwidth]{Fig_2.pdf} \caption{Relative delay $T_p(\omega)/T_p(0)$ as a function of $(\omega-\omega_{0p})/k_p$ for three cases: $g_p=0.9g_{p,\rm{opt}}$ (dashed line), $g_p=g_{p,\rm{opt}}$ (solid line), and $g_p=1.1g_{p,\rm{opt}}$ (dash-dot line), where $g_{p,\rm{opt}}=\kappa_p/\sqrt{12}$.} \label{opt_coupl} \end{figure} It can be seen that the maximum size of the plateau, corresponding to the maximum suppression of negative dispersion effects for the pump field in the central ring, is attained for the ratio (\ref{optimalratio}). Such dispersion suppression is necessary to improve the quality of the heralded photons to the extent possible. \section{Purity of the state} The SFWM theory in the microrings was developed in a number of papers \cite{savanier2016photon, Helt:10, Chen:11, Helt:12, Camacho:12, PhysRevA.92.033840, PhysRevA.91.053802, Vernon:16, Vernon:17}. To calculate the state of the biphoton field, we can take advantage of the first-order perturbation SFWM theory in an optical waveguide or fiber (see, for example, Ref. \cite{GarayPalmett:2010hf}), which is modified taking into account the input--output relations. This approach was used for the analysis of the cavity-assisted SFWM in Refs.~\cite{Chen:11,GarayPalmett:2012bv,Chuprina2017}. The SFWM process in the central resonator is described by the effective Hamiltonian \begin{equation} \mathcal{H}_{SFWM}(t) = \zeta y_p(t) y_p(t) y^\dagger_s(t) y^\dagger_i(t), \end{equation} where $\zeta$ is the effective nonlinearity that takes into account $\chi^{(3)}$ of the nonlinear material, microresonator mode functions and other parameters, which are not important for the present analysis. By applying the first-order perturbation theory, the state vector of the generated biphoton field is calculated as $\ket{\psi}=[1-i/\hbar \int dt\, \mathcal{H}_{SFWM}(t)]\ket{0}\ket{\alpha}$, which gives \begin{eqnarray} \ket{\psi}=&&\ket{0}\ket{\alpha}-\frac{i\zeta}{\hbar(2\pi)^2} \int dt d\omega_p d\omega_i d\omega_s \times\nonumber\\ && y_p(\omega_p) y_p(\omega_p)y^\dagger_i(\omega_i) y^\dagger_s(\omega_s) e^{i\Delta\omega t} \ket{0}\ket{\alpha}, \end{eqnarray} where $\ket{0}=\ket{0_s}\ket{0_i}$ is the vacuum state of the signal and idler fields, $\ket{\alpha}$ is the coherent state of the pump field with a complex amplitude $\alpha$ (i.e., $y_p(t)\ket{\alpha}=\alpha(t)\ket{\alpha}$), and $\Delta\omega=2\omega_p-\omega_i-\omega_s$ is the frequency detuning. Now, taking into account the input--output relations (\ref{in-out_pump},\ref{in-out_m}) we obtain \begin{eqnarray} \ket{\psi} = &&\ket{0}\ket{\alpha}- \frac{i\zeta}{\hbar \sqrt{2\pi}^3} \int d\omega_i d\omega_s \mathcal{F}(\omega_i, \omega_s) \times\nonumber\\ && y^\dagger_{out;i}(\omega_i) y^\dagger_{out;s}(\omega_s) \ket{0}\ket{\alpha}, \end{eqnarray} where \begin{equation} \mathcal{F}(\omega_i, \omega_s)=\mathcal{I}_p (\omega_i,\omega_s) M_i(\omega_i) M_s(\omega_s) \end{equation} is the JSA of the biphoton field, and \begin{eqnarray} \mathcal{I}_p (\omega_i,\omega_s) = &&\int d\omega_p M_p(\omega_s+\omega_i-\omega_p)M_p(\omega_p) \times\nonumber\\ && \alpha(\omega_s+\omega_i-\omega_p) \alpha(\omega_p) \end{eqnarray} is the convolution of the spectral amplitude of the pump field $\alpha(\omega_p)$ in the resonator. To illustrate spectral correlations between the emitted photons, it is convenient to use the joint spectral intensity (JSI) $\mathcal{P}(\omega_i, \omega_s)=\left|\mathcal{F}(\omega_i, \omega_s)\right|^2$. In addition, for quantitative analysis we can take advantage of a Schmidt decomposition of the JSA \cite{Law:2000fm,Fedorov:2014dc}, which can be written as \begin{equation} \mathcal{F}(\omega_i, \omega_s)=\sum_n\sqrt{\lambda_n}\,\psi_n(\omega_i)\phi_n(\omega_s), \end{equation} where the Schmidt coefficients satisfy the condition $\sum_n\lambda_n=1$. Then the Schmidt number $K=1/\sum_n\lambda_n^2$ is usually used as a measure of entanglement in the photon pairs \cite{Law:2004hw,Fedorov:2006jk}, while the purity of the heralded single-photon state is equal to $\gamma=1/K$. A two-photon state for which $K=1$ (the minimum value) represents a factorable state, which exhibits no spectral entanglement and gives rise to pure heralded single photons. \begin{figure}[ht] { \includegraphics[clip,width=\columnwidth]{Fig_3a.pdf} } {\includegraphics[clip,width=\columnwidth]{Fig_3b.pdf} } \caption{JSI of the biphoton field for the equal resonator linewidths $\kappa_p=\kappa_{is}$ (a) and for the broader pump linewidth $\kappa_p=10\kappa_{is}$ (b). The Schmidt number is $K = 1.07$ $(\gamma = 0.94)$ and $K = 1.00006$ $(\gamma = 0.9999)$, respectively.} \label{JSI} \end{figure} Fig.~(\ref{JSI}) illustrates the JSI distributions calculated numerically for the equal resonator linewidths $\kappa_p=\kappa_{is}$ and for the broader pump linewidth $\kappa_p\gg\kappa_{is}$. In both cases, the optimal ratio between the coupling parameters (\ref{optimalratio}) is maintained, and the pump pulse is assumed to be Gaussian, $\alpha(\omega)=(2\pi\sigma)^{-1/4}\exp(-(\omega-\omega_{0p})^2/4\sigma)$, with a spectral width, $\Delta\omega_{1/2}=\sqrt{8\sigma\ln 2}$, optimized for providing the minimum value of the Schmidt number. Similar to \cite{Vernon:17}, the calculations show near perfect separability of the biphoton field in the case of the broad pump linewidth. However, we managed to obtain even smaller Schmidt numbers by optimizing the coupling parameters and spectral width of the pump pulse. In particular, for the ratio of $\kappa_p/\kappa_{is}=6.6$ and the optimal spectral width of $\Delta\omega_{1/2}=0.45\kappa_p$, we have $K=1.0003$. A further increase in $\kappa_p/\kappa_{is}$ to 10 provides $K = 1.00006$, which corresponds to the purity of heralded photons of $\gamma=0.9999$. \section{Conclusion} We have shown that a system of optimally coupled ring microresonators is capable of producing almost factorable joint spectral amplitude of the biphoton field, thereby generating near pure heralded single-photon states via spontaneous four-wave mixing. By optimizing the coupling parameters of the system, we present a way for suppressing negative dispersion effects, which, in combination with the optimal spectral width of the pump pulse, provides highest possible purity of the heralded photons generated in such a scheme. The use of resonant coupling via microrings makes it possible to load and unload only required field modes, which may simplify implementation of integrated sources of indistinguishable single photons. \ack The work was partially supported by the Russian Science Foundation (project No. 16-12-00045). The results of Sec.~4 were obtained within the state assignment theme No.~0217-2018-0005. \section*{References} \bibliographystyle{iopart-num}
\section{Introduction} This note attempts to unify and generalize certain bijections involving support $\tau$-tilting modules. Support $\tau$-tilting module is the central notion in the $\tau$-tilting theory introduced by Adachi-Iyama-Reiten~\cite{AIR}, which can be regarded as a generalization of the classical tilting module. Since its appearance, support $\tau$-tilting module has been rapidly found to be linked up with various important objects in representation theory, such as torsion class, (co)-$t$-structure, cluster tilting object, silting object and so on, see~\cite{AIR,IJY,CZZ,LX,YZ,YZZ} for instance. Among others, Adachi-Iyama-Reiten~\cite{AIR} proved that for a $2$-Calabi-Yau triangulated category $\mathcal{T}$ with a basic cluster tilting object $T$, there is a one-to-one correspondence between the set of basic cluster tilting objects of $\mathcal{T}$ and the set of basic support $\tau$-tilting $\opname{End}_\mathcal{T}(T)$-modules. It is known that there exist $2$-Calabi-Yau triangulated categories which have no cluster tilting objects but only maximal rigid objects. Then the correspondence was generalized to such kind of 2-Calabi-Yau triangulated categories by Chang-Zhang-Zhu~\cite{CZZ} and Liu-Xie~\cite{LX}. The Adachi-Iyama-Reiten's correspondence has been further generalized by Yang-Zhu ~\cite{YZ}. More precisely, let $\mathcal{T}$ be a Krull-Schmidt, Hom-finite triangulated category with suspension functor $[1]$. Assume that $\mathcal{T}$ admits a Serre functor and a cluster tilting object $T$. By introducing the notion of $T[1]$-cluster tilting objects as a generalization of cluster tilting objects, Yang-Zhu~\cite{YZ} established a one-to-one correspondence between the set of $T[1]$-cluster tilting objects of $\mathcal{T}$ and the set of support $\tau$-tilting modules over $\opname{End}_\mathcal{T}(T)$. On the other hand, for a Krull-Schmidt, Hom-finite triangulated category $\mathcal{T}$ with a silting object $S$, Iyama-J{\o}rgensen-Yang~\cite{IJY} proved that the two-term silting objects of $\mathcal{T}$ with respect to $S$ which belong to the finitely presented subcategory $\opname{pr}(S)$ are in bijection with support $\tau$-tilting modules over $\opname{End}_\mathcal{T}(S)$. In this note, we work in the following general setting. Let $\mathcal{T}$ be a Krull-Schmidt, Hom-finite triangulated category with suspension functor $[1]$ and $R$ a basic rigid object of $\mathcal{T}$ with endomorphism algebra $\Gamma=\opname{End}_\mathcal{T}(R)$. Denote by $\opname{pr}(R)$ the subcategory of objects finitely presented by $R$. Following~\cite{YZ}, we introduce the $R[1]$-rigid object of $\mathcal{T}$ and the maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ ({\it cf.}~Definition~\ref{d:definition}). We prove that the $R[1]$-rigid objects in $\opname{pr}(R)$ are in bijection with $\tau$-rigid $\Gamma$-modules, and the maximal $R[1]$-rigid objects with respect to $\opname{pr}(R)$ are in bijection with support $\tau$-tilting $\Gamma$-modules ({\it cf.} Theorem~\ref{t:thm1}). When $R$ is a cluster tilting object of $\mathcal{T}$, we show that the bijection reduces to the bijection between the set of basic $R[1]$-cluster tilting objects of $\mathcal{T}$ and the set of basic support $\tau$-tilting $\Gamma$-modules obtained by Yang-Zhu~\cite{YZ} (Corollary~\ref{c:YZ}). We remark that, compare to ~\cite{YZ}, we do not need the existence of a Serre functor for $\mathcal{T}$ ({\it cf.} also~\cite{YZZ}). Since tilting modules are faithful support $\tau$-tilting modules, we also obtain a characterization of tilting $\Gamma$-modules via the bijection ({\it cf.} Theorem~\ref{t:thm2}). We apply the aforementioned bijection to the cases of silting objects, $d$-cluster tilting objects and maximal rigid objects in Section~\ref{S:silting} and Section~\ref{S:d-rigid} respectively. When $R$ is a silting object of a triangulated category $\mathcal{T}$, we proved that the maximal $R[1]$-rigid objects with respect to $\opname{pr}(R)$ coincide with the silting objects of $\mathcal{T}$ in $\opname{pr}(R)$ ({\it cf.} Theorem~\ref{t:case d=infinite}). As a consequence, Theorem~\ref{t:thm1} recovers the bijection between the set of basic silting objects of $\mathcal{T}$ in $\opname{pr}(R)$ and the set of basic support $\tau$-tilting $\opname{End}(R)$-modules obtained by Iyama-J{\o}rgensen-Yang~\cite{IJY} ({\it cf.} Corollary~\ref{c:IJY}). If $\mathcal{T}$ is a $d(\geq 2)$-cluster category and $R$ is a $d$-cluster tilting object of $\mathcal{T}$, then Theorem~\ref{t:thm1} reduces to the bijection obtained by Liu-Qiu-Xie~\cite{LQX} ({\it cf.} Corollary~\ref{c:LQX}). Assume that $\mathcal{T}$ is a $2$-Calabi-Yau triangulated category and $R$ is a basic maximal rigid object of $\mathcal{T}$. We show that Theorem~\ref{t:thm1} implies the bijection between the set of basic maximal rigid object of $\mathcal{T}$ and the set of basic support $\tau$-tilting $\Gamma$-modules obtained in~\cite{LX,CZZ} ({\it cf.} Corollary~\ref{c:CZZ-LX}). \subsection*{Convention} Let $k$ be an algebraically closed field. Throughout this paper, $\mathcal{T}$ will be a Krull-Schmidt, Hom-finite triangulated category over $k$ unless stated otherwise. For an object $M\in \mathcal{T}$, denote by $|M|$ the number of non-isomorphic indecomposable direct summands of $M$. Denote by $\opname{add}\nolimits M$ the subcategory of $\mathcal{T}$ consisting of objects which are finite direct sum of direct summands of $M$. \section{R[1]-rigid objects and $\tau$-rigid modules }~\label{S:basic-notions} \subsection{Recollection on $\tau$-tilting theory} We follow~\cite{AIR}. Let $A$ be a finite dimensional algebra over $k$. Denote by $\mod A$ the category of finitely generated right $A$-modules and $\opname{proj} A$ the category of finitely generated right projective $A$-modules. For a module $M\in \mod A$, denote by $|M|$ the number of non-isomorphic indecomposable direct summands of $M$. Let $\tau$ be the Auslander-Reiten translation of $\mod A$. An $A$-module $M$ is {\it $\tau$-rigid} if $\opname{Hom}_A(M,\tau M)=0$. A {\it $\tau$-rigid pair} is a pair of $A$-modules $(M,P)$ with $M \in\mod A$ and $P \in \opname{proj} A$, such that $M$ is $\tau$-rigid and $\opname{Hom}_A(P,M) = 0$. A basic $\tau$-rigid pair $(M,P)$ is a {\it basic support $\tau$-tilting pair} if $|M|+|P| = |A|$. In this case, $M$ is a {\it support $\tau$-tilting} $A$-module and $P$ is uniquely determined by $M$. It has been proved in~\cite{AIR} that for each $\tau$-rigid pair $(M,P)$, we always have $|M|+|P|\leq |A|$ and each $\tau$-rigid pair can be completed into a support $\tau$-tilting pair. The following criterion for $\tau$-rigid modules has been proved in~\cite{AIR}. \begin{lem}~\label{l:tau-rigid} For $M\in \mod A$, denote by $P_1^M\xrightarrow{f} P_0^M\rightarrow M\rightarrow 0$ a minimal projective presentation of $M$. Then $M$ is $\tau$-rigid if and only if \[\opname{Hom}_{A}(f,M):\opname{Hom}_{A}(P_0^M,M)\rightarrow \opname{Hom}_{A}(P_1^M,M)\] is surjective. \end{lem} \subsection{R[1]-rigid objects} Let $\mathcal{T}$ be a Krull-Schmidt, Hom-finite triangulated category with shift functor $[1]$. For $X, Y, Z\in \mathcal{T}$, we denote by $Z(X,Y)$ the subgroup of $\opname{Hom}_\mathcal{T}(X,Y)$ consisting of morphisms which factor through $\opname{add}\nolimits Z$. An object $X\in \mathcal{T} $ is called {\it rigid} if $\Hom_{\mathcal{T}}(X,X[1])=0$. It is {\it maximal rigid} if it is rigid and $\Hom_{\mathcal{T}}(X\oplus Z,X[1]\oplus Z[1])=0$ implies $Z\in \opname{add}\nolimits X$ for any $Z\in \mathcal{T}$. Let $\mathcal{C}\subseteq \mathcal{T}$ be a full subcategory of $\mathcal{T}$. An object $X\in \mathcal{C}\subseteq \mathcal{T}$ is called {\it maximal rigid with respect to $\mathcal{C}$} provided that it is rigid and for any object $Z\in \mathcal{C}$ such that $\Hom_{\mathcal{T}}(X\oplus Z, X[1]\oplus Z[1])=0$, we have $Z\in \opname{add}\nolimits X$. It is clear that a maximal rigid object of $\mathcal{T}$ is just a maximal rigid object with respect to $\mathcal{T}$. Let $R$ be a basic rigid object of $\mathcal{T}$. An object $X$ is {\it finitely presented} by $R$ if there is a triangle $R_1^X\to R_0^X\to X\to R_1^X[1]$ with $R_0^X,R_1^X\in \opname{add}\nolimits R$. Denote by $\opname{pr}(R)$ the subcategory of $\mathcal{T}$ consisting of objects which are finitely presented by $R$. Throughout this section, $R$ will be a basic rigid object of $\mathcal{T}$. We introduce the relative rigid objects with respect to $R$ ({\it cf.}~\cite{YZ,CZZ}). \begin{df}~\label{d:definition} Let $R\in\mathcal{T}$ be a basic rigid object. \begin{enumerate} \item An object $X\in\mathcal{T}$ is called {\it $R[1]$-rigid} if $R[1](X,X[1])=0$. \item An object $X\in\opname{pr}(R)\subseteq \mathcal{T}$ is called {\it maximal $R[1]$-rigid with respect to $\opname{pr}(R)$} if $X$ is $R[1]$-rigid and for any object $Z\in \opname{pr}(R)$ such that $R[1](X\oplus Z, X[1]\oplus Z[1])=0$, then $Z\in\opname{add}\nolimits X$. \end{enumerate} \end{df} By definition, it is clear that rigid objects are $R[1]$-rigid, but the converse is not true in general. We are interested in $R[1]$-rigid objects of $\mathcal{T}$ which belong to the subcategory $\opname{pr}(R)$. We have the following observation. \begin{lem}~\label{l:R[1]-rigid} Let $R_1\xrightarrow{f} R_0\xrightarrow{g} X\xrightarrow{} R_1[1]$ be a triangle in $\mathcal{T}$ with $R_0,R_1\in\opname{add}\nolimits R$. Then $X$ is $R[1]$-rigid if and only if $$\opname{Hom}_{\mathcal{T}}(f,X):\opname{Hom}_{\mathcal{T}}(R_0,X)\rightarrow \opname{Hom}_{\mathcal{T}}(R_1,X)$$ is surjective. \end{lem} \begin{proof} Applying the functor $\Hom_{\mathcal{T}}(-,X)$ to the triangle $X[-1]\xrightarrow{h}R_1\xrightarrow{f} R_0\xrightarrow{g} X$ yields a long exact sequence \[\Hom_{\mathcal{T}}(R_0,X)\xrightarrow{f^*}\Hom_{\mathcal{T}}(R_1,X)\xrightarrow{h^*}\Hom_{\mathcal{T}}(X[-1],X)\xrightarrow{} \Hom_{\mathcal{T}}(R_0[-1],X),\] where $f^*=\Hom_{\mathcal{T}}(f,X)$ and $h^*=\Hom_{\mathcal{T}}(h,X)$. Suppose that $X$ is $R[1]$-rigid, that is $R[1](X,X[1])=0$. It follows that $h^*=0$ and hence $f^*$ is surjective. Now assume that $f^*$ is surjective. To show $X$ is $R[1]$-rigid, it suffices to prove that $R(X[-1], X)=0$. Let $a\in R(X[-1],X)$ and $a=b\circ c$, where $c: X[-1]\rightarrow R$ and $b:R\rightarrow X$. As $R$ is rigid, we know that each morphism from $X[-1]$ to $R$ factors through $h$. Hence there is a morphism $c':R_1\rightarrow R$ such that $c=c'\circ h$. Since $f^*$ is surjective, there is a morphism $b':R_0\rightarrow X$ such that $b\circ c'=b'\circ f$. Then we have $a=b\circ c=b\circ c'\circ h=b'\circ f\circ h=0$ ({\it cf.} the following diagram). \[ \xymatrix{ X[-1]\ar[r]^{h}\ar[d]^c&R_1\ar[r]^f\ar@{.>}[dl]_{c'}&R_0\ar[r]\ar@{.>}[dl]_{b'}&X\ar[r]&R_1[1]\\ R\ar[r]^b&X&&& } \] \end{proof} \subsection{From $R[1]$-rigid objects to $\tau$-rigid modules} Recall that $R$ is a basic rigid object of $\mathcal{T}$. Denote by $\Gamma:=\opname{End}_\mathcal{T}(R)$ the endomorphism algebra of $R$ and $\mod \Gamma$ the category of finitely generated right $\Gamma$-modules. Let $\tau$ be the Auslander-Reiten translation of $\mod \Gamma$. It is known that the functor $\opname{Hom}_\mathcal{T}(R,-): \mathcal{T}\to \mod \Gamma$ induces an equivalence of categories \begin{equation}~\label{f:equivalence} \opname{Hom}_\mathcal{T}(R,-): \opname{pr}(R)/(R[1])\to \mod \Gamma, \end{equation} where $\opname{pr}(R)/(R[1])$ is the additive quotient of $\opname{pr}(R)$ by morphisms factorizing through $\opname{add}\nolimits(R[1])$ ({\it cf.} \cite{IY}). Moreover, the restriction of $\opname{Hom}_\mathcal{T}(R,-)$ to the subcategory $\opname{add}\nolimits R$ yields an equivalence between $\opname{add}\nolimits R$ and the category $\opname{proj} \Gamma$ of finitely generated projective $\Gamma$-modules. The following result is a direct consequence of the equivalence ~(\ref{f:equivalence}) and the fact that $R$ is rigid. \begin{lemma}~\label{l:morphism} For any $R'\in \opname{add}\nolimits R$ and $Z\in \opname{pr}(R)$, we have \[\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R,R'),\Hom_{\mathcal{T}}(R,Z))\cong \opname{Hom}_{\mathcal{T}}(R',Z).\] \end{lemma} Now we are in position to state the main result of this note. \begin{theorem}~\label{t:thm1} \begin{itemize} \item[$(a)$] Let $X$ be an object in $\opname{pr}(R)$ satisfying that $\opname{add}\nolimits X\cap\opname{add}\nolimits(R[1])=\{0\}$. Then $X$ is $R[1]$-rigid if and only if $\opname{Hom}_{\mathcal{T}}(R, X)$ is $\tau$-rigid. \item[$(b)$] The functor $\opname{Hom}_\mathcal{T}(R, -)$ yields a bijection between the set of isomorphism classes of basic $R[1]$-rigid objects in $\opname{pr}(R)$ and the set of isomorphism classes of basic $\tau$-rigid pairs of $\Gamma$-modules. \item[$(c)$] The functor $\opname{Hom}_\mathcal{T}(R, -)$ induces a bijection between the set of isomorphism classes of basic maximal $R[1]$-rigid objects with respect to $\opname{pr}(R)$ and the set of isomorphism classes of basic support $\tau$-tilting $\Gamma$-modules. \end{itemize} \end{theorem} \begin{proof} Let $R_1\xrightarrow{f}R_0\xrightarrow{g} X\to R_1[1]$ be a triangle in $\mathcal{T}$ with $R_1,R_0\in \opname{add}\nolimits R$ such that $g$ is a minimal right $\opname{add}\nolimits R$-approximation of $X$. As $R$ is rigid and $\opname{add}\nolimits X\cap\opname{add}\nolimits(R[1])=\{0\}$, applying the functor $\opname{Hom}_\mathcal{T}(R,-)$, we obtain a minimal projective resolution of $\opname{Hom}_\mathcal{T}(R,X)$ \[\Hom_{\mathcal{T}}(R,R_1)\xrightarrow{\Hom_{\mathcal{T}}(R,f)}\Hom_{\mathcal{T}}(R,R_0)\rightarrow \Hom_{\mathcal{T}}(R,X)\rightarrow 0.\] According to Lemma~\ref{l:morphism}, we have the following commutative diagram \[\xymatrix{\Hom_{\mathcal{T}}(R_0,X)\ar[dd]^{\Hom_{\mathcal{T}}(f,X)}\ar[rr]^-\cong&&\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R,R_0), \Hom_{\mathcal{T}}(R,X))\ar[dd]^{\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R,f),\Hom_{\mathcal{T}}(R,X))}\\ \\ \Hom_{\mathcal{T}}(R_1,X)\ar[rr]^-\cong&&\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R,R_1), \Hom_{\mathcal{T}}(R,X)). } \] Now it follows from Lemma~\ref{l:tau-rigid} and Lemma~\ref{l:R[1]-rigid} that $X$ is $R[1]$-rigid if and only if $\Hom_{\mathcal{T}}(R,X)$ is $\tau$-rigid. This finishes the proof of $(a)$. Let us consider the statement $(b)$. For each object $X\in \opname{pr}(R)$, $X$ admits a unique decomposition as $X\cong X_0\oplus R_X[1]$, where $R_X\in \opname{add}\nolimits R$ and $X_0$ has no direct summands in $\opname{add}\nolimits R[1]$. We then define \[F(X):=(\Hom_{\mathcal{T}}(R,X_0), \Hom_{\mathcal{T}}(R,R_X))\in \mod \Gamma\times \opname{proj} \Gamma. \]If $X$ is $R[1]$-rigid, according to $(a)$, we deduce that $\Hom_{\mathcal{T}}(R, X_0)$ is a $\tau$-rigid $\Gamma$-module. And by Lemma~\ref{l:morphism}, we know $\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R,R_X),\Hom_{\mathcal{T}}(R, X_0))=0$. That is, $F$ maps a basic $R[1]$-rigid object to a basic $\tau$-rigid pair of $\Gamma$-modules. We claim that $F$ is the desired bijection. Since $\Hom_{\mathcal{T}}(R,-):\opname{pr}(R)/(R[1])\to \mod \Gamma$ is an equivalence, we clearly know that $F$ is injective. It remains to show that $F$ is surjective. For each basic $\tau$-rigid pair $(M,P)$ of $\Gamma$-modules, denote by $\hat{P}\in \opname{add}\nolimits R$ the object in $\opname{pr}(R)$ corresponding to $P$ and similarly by $\hat{M}\in \opname{pr}(R)$ the object corresponding to $M$, which has no direct summands in $\opname{add}\nolimits R[1]$. By definition, we clearly have $F(\hat{M}\oplus \hat{P}[1])=(M,P)$. It remains to show that $\hat{M}\oplus \hat{P}[1]$ is $R[1]$-rigid, which is a consequence of $(a)$, Lemma~\ref{l:morphism} and the fact that $R$ is rigid. This completes the proof of $(b)$. For $(c)$, let $X=X_0\oplus R_X[1]$ be a basic maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$, where $R_X\in \opname{add}\nolimits R$ and $X_0$ has no direct summands in $\opname{add}\nolimits R[1]$. We claim that $F(X)$ is a support $\tau$-tilting pair. Otherwise, at least one of the following two situations happen: \begin{itemize} \item[$(i)$] there is an indecomposable object $R_{X^c}\in \opname{add}\nolimits R$ such that $R_{X^c}\not\in \opname{add}\nolimits R_X$ and $(\Hom_{\mathcal{T}}(R, X_0), \Hom_{\mathcal{T}}(R, R_X\oplus R_{X^c}))$ is a basic $\tau$-rigid pair; \item[$(ii)$] there is an indecomposable object $X_1\in \opname{pr}(R)\backslash \opname{add}\nolimits R[1]$ such that $X_1\not\in \opname{add}\nolimits X_0$ and $(\Hom_{\mathcal{T}}(R, X_0\oplus X_1), \Hom_{\mathcal{T}}(R, R_X))$ is a basic $\tau$-rigid pair. \end{itemize} Let us consider the case $(i)$. By definition, we have \[\Hom_{\Gamma}(\Hom_{\mathcal{T}}(R, R_X\oplus R_{X}^c), \Hom_{\mathcal{T}}(R, X_0))=0.\] According to Lemma~\ref{l:morphism}, we clearly have $\Hom_{\mathcal{T}}(R_X\oplus R_{X^c}, X_0)=0$. Now it is straightforward to check that $X\oplus R_{X^c}[1]\in \opname{pr}(R)$ is $R[1]$-rigid. Note that we have $R_{X^c}[1]\not\in \opname{add}\nolimits X$, which contradicts to the assumption that $X$ is a basic maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$. Similarly, one can obtain a contradiction for the case $(ii)$. Now assume that $(M,P)$ is a basic support $\tau$-tilting pair of $\Gamma$-modules. According to $(b)$, let $\hat{M}\oplus \hat{P}[1]$ be the basic $R[1]$-rigid object in $\opname{pr}(R)$ corresponding to $(M,P)$. We need to prove that $\hat{M}\oplus \hat{P}[1]$ is maximal with respect to $\opname{pr}(R)$. By definition, we show that if $Z\in \opname{pr}(R)$ is an object such that $R[1](\hat{M}\oplus \hat{P}[1]\oplus Z, \hat{M}[1]\oplus \hat{P}[2]\oplus Z[1])=0$, then $Z\in \opname{add}\nolimits(\hat{M}\oplus \hat{P}[1])$. Without loss of generality, we assume that $Z$ is indecomposable. We separate the remaining proof by considering whether the object $Z$ belongs to $\opname{add}\nolimits R[1]$ or not. If $Z\not\in \opname{add}\nolimits R[1]$, then $M\oplus \Hom_{\mathcal{T}}(R,Z)$ is a $\tau$-rigid $\Gamma$-module by $(a)$. Moreover, according to $R[1](\hat{M}\oplus \hat{P}[1]\oplus Z, \hat{M}[1]\oplus \hat{P}[2]\oplus Z[1])=0$, we have \[\Hom_{\Gamma}(P, \Hom_{\mathcal{T}}(R, Z))=\Hom_{\mathcal{T}}(\hat{P}, Z)=0.\] Consequently, $(M\oplus \Hom_{\mathcal{T}}(R,Z), P)$ is a $\tau$-rigid pair. By the assumption that $(M,P)$ is a basic support $\tau$-tilting pair, we conclude that $\Hom_{\mathcal{T}}(R,Z)\in \opname{add}\nolimits M$ and hence $Z\in \opname{add}\nolimits \hat{M}\subseteq \opname{add}\nolimits(\hat{M}\oplus \hat{P}[1])$. Similarly, for $Z\in \opname{add}\nolimits R[1]$, one can show that $(M, P\oplus \Hom_{\mathcal{T}}(R, Z[-1]))$ is a $\tau$-rigid pair of $\Gamma$-modules. Consequently, we have $Z\in \opname{add}\nolimits \hat{P}[1]\subseteq \opname{add}\nolimits(\hat{M}\oplus \hat{P}[1])$. This completes the proof of $(c)$. \end{proof} Since all basic support $\tau$-tilting pairs of $\Gamma$-modules have the same number of non-isomorphic indecomposable direct summands \cite{AIR}. As a byproduct of the proof, we have \begin{cor}~\label{c:number-direct-summand} \begin{enumerate} \item Each $R[1]$-rigid object in $\opname{pr}(R)$ can be completed to a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$. \item All basic maximal $R[1]$-rigid objects with respect to $\opname{pr}(R)$ have the same number of non-isomorphic indecomposable direct summands. \end{enumerate} \end{cor} Recall that an object $T\in \mathcal{T}$ is a {\it cluster tilting object} provided that \[\opname{add}\nolimits T=\{X\in \mathcal{T}~|~\Hom_{\mathcal{T}}(T,X[1])=0\}=\{X\in \mathcal{T}~|~\Hom_{\mathcal{T}}(X,T[1])=0\}. \] It is clear that cluster tilting objects are maximal rigid. Let $R$ be a cluster tilting object of $\mathcal{T}$. In this case, we have $\opname{pr}(R)=\mathcal{T}$ ({\it cf.}~\cite{IY,KZ}). An object $X\in\mathcal{T}$ is called {\it $R[1]$-cluster tilting} if $X$ is $R[1]$-rigid and $|X|=|R|$~({\it cf.}~\cite{YZ}). As a direct consequence of Corollary~\ref{c:number-direct-summand}, we have \begin{lemma}~\label{l:cluster-tilting} Let $R$ be a cluster tilting object of $\mathcal{T}$. Then an object $T\in \mathcal{T}$ is maximal $R[1]$-rigid with respect to $\mathcal{T}$ if and only if $T$ is $R[1]$-cluster tilting. \end{lemma} Combining Lemma~\ref{l:cluster-tilting} with Theorem~\ref{t:thm1}, we obtain the following result of Yang-Zhu~\cite[Theorem 1.2]{YZ}. \begin{corollary}~\label{c:YZ} Let $R$ be a cluster tilting object of $\mathcal{T}$ with endomorphism algebra $\Gamma=\opname{End}_\mathcal{T}(R)$. There is a bijection between the set of isomorphism classes of basic $R[1]$-cluster tilting objects and the set of isomorphism classes of basic support $\tau$-tilting $\Gamma$-modules. \end{corollary} \subsection{A characterization of tilting modules} Recall that a basic $\Gamma$-module $M$ is a {\it tilting module} provided that \begin{enumerate} \item[$\bullet$] $\opname{pd}_\Gamma M\leq 1$; \item[$\bullet$] $\opname{Ext}^1_{\Gamma}(M,M)=0$; \item[$\bullet$] $|M|=|\Gamma|$. \end{enumerate} It has been observed in~\cite{AIR} that tilting $\Gamma$-modules are precisely faithful support $\tau$-tilting $\Gamma$-modules. As in \cite{LX2014,BBT}, we consider the projective dimension of $\Gamma$-modules and give a characterization of tilting $\Gamma$-modules via $\opname{pr}(R)$. \begin{theorem}~\label{t:thm2} For an object $X\in \opname{pr}(R)$ without direct summands in $\opname{add}\nolimits R[1]$, we have \[\opname{pd}_\Gamma \opname{Hom}_\mathcal{T}(R, X)\leq 1~\text{ if and only if}~ X(R[1], R[1])=0.\] In particular, for a basic object $X\in \opname{pr}(R)$ which has no direct summands in $\opname{add}\nolimits R[1]$, $\opname{Hom}_\mathcal{T}(R,X)$ is a tilting $\Gamma$-module if and only if $X(R[1], R[1])=0$ and $X$ is maximal $R[1]$-rigid with respect to $\opname{pr}(R)$. \end{theorem} \begin{proof} Since $X\in \opname{pr}(R)$, we have a triangle $R_1\xrightarrow{f}R_0\xrightarrow{g} X\xrightarrow{h} R_1[1]$ in $\mathcal{T}$ such that $R_0,R_1\in \opname{add}\nolimits R$ and $g$ is a minimal right $\opname{add}\nolimits R$-approximation of $X$. Applying the functor $\Hom_{\mathcal{T}}(R,-)$, we obtain a long exact sequence \[\Hom_{\mathcal{T}}(R,X[-1])\xrightarrow{\Hom_{\mathcal{T}}(R,h[-1])}\Hom_{\mathcal{T}}(R, R_1)\xrightarrow{\Hom_{\mathcal{T}}(R,f)}\Hom_{\mathcal{T}}(R,R_0)\xrightarrow{}\Hom_{\mathcal{T}}(R,X)\to 0. \] Assume that $X(R[1],R[1])=0$. It follows that $\Hom_{\mathcal{T}}(R,h[-1])=0$ and $\Hom_{\mathcal{T}}(R,f)$ is injective. That is, $\opname{pd}_\Gamma \Hom_{\mathcal{T}}(R,X)\leq 1$. Suppose that $\opname{pd}_\Gamma \Hom_{\mathcal{T}}(R,X)\leq 1$. Then $\Hom_{\mathcal{T}}(R,f)$ is injective and $\Hom_{\mathcal{T}}(R,h[-1])=0$. It suffices to prove that $X[-1](R,R)=0$. Let $s: R\to X[-1]$ be a morphism from $R$ to $X[-1]$ and $t: X[-1]\to R$ a morphism from $X[-1]$ to $R$. We need to show that $t\circ s=0$. Since $R$ is rigid, we know that the morphism $t:X[-1]\to R$ factors through the morphism $h[-1]$. In particular, there is a morphism $t':R_1\to R$ such that $t=t'\circ h[-1]$. On the other hand, by $\Hom_{\mathcal{T}}(R,h[-1])=0$, we deduce that $h[-1]\circ s=0$. Consequently, $t\circ s=t'\circ h[-1]\circ s=0$. Now we assume that $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ such that $X(R[1],R[1])=0$. By Theorem~\ref{t:thm1}, $\Hom_{\mathcal{T}}(R,X)$ is a support $\tau$-tilting $\Gamma$-module. Since $X$ does not admit an indecomposable direct summand in $\opname{add}\nolimits R[1]$, we have $|\Hom_{\mathcal{T}}(R,X)|=|X|=|R|=|\Gamma|$ by Corollary~\ref{c:number-direct-summand}. The condition $X(R[1],R[1])=0$ implies that $\opname{pd}_\Gamma \Hom_{\mathcal{T}}(R,X)\leq 1$. Putting all of these together, we conclude that $\Hom_{\mathcal{T}}(R,X)$ is a tilting $\Gamma$-module. Conversely, let us assume that $\Hom_{\mathcal{T}}(R,X)$ is a tilting $\Gamma$-module. Since tilting modules are support $\tau$-tilting modules, we know that $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ by Theorem~\ref{t:thm1} (c). By definition of tilting modules, we have $\opname{pd}_\Gamma \Hom_{\mathcal{T}}(R,X)\leq 1$. Consequently, $X(R[1],R[1])=0$ and we are done. \end{proof} \section{ $R[1]$-rigid objects and presilting objects}~\label{S:silting} \subsection{(Pre)silting objects} Recall that $\mathcal{T}$ is a Krull-Schmidt, Hom-finite triangulated category with shift functor [1]. Following~\cite{AI}, for $X,Y\in \mathcal{T}$ and $m\in \mathbb{Z}$, we write the vanishing condition $\Hom_{\mathcal{T}}(X,Y[i])=0$ for $i>m$ by $\Hom_{\mathcal{T}}(X,Y[>m])=0$. An object $X\in\mathcal{T}$ is called {\it presilting} if $\Hom_{\mathcal{T}}(X,X[>0])=0$; $X$ is called {\it silting} if $X$ is presilting and the thick subcategory of $\mathcal{T}$ containing $X$ is $\mathcal{T}$; $X$ is called {\it partial silting} if $X$ is a direct summand of some silting objects. It is clear that (pre)silting objects are rigid. The following result has been proved in~\cite{AI}. \begin{lem}\label{l:number-direct-summands-silting} All silting objects in $\mathcal{T}$ have the same number of non-isomorphic indecomposable summands. \end{lem} In general, it is not known that whether a presilting object is partial silting. The following is proved in~\cite{A}. \begin{lem}\label{l:2-term presilting is partial silting} Let $R$ be a silting object and $X$ a presilting object of $\mathcal{T}$. If $X\in \opname{pr}(R)$, then there is a presilting object $Y\in \opname{pr}(R)$ such that $X\oplus Y$ is a silting object of $\mathcal{T}$. \end{lem} \subsection{From $R[1]$-rigid objects to (pre)silting objects } \begin{lem} \label{l:presilting case} Let $R$ be a presilting object and $X\in \opname{pr}(R)$. Then $\Hom_{\mathcal{T}}(X,X[>1])=0$. \end{lem} \begin{proof} As $X\in \opname{pr}(R)$, we have the following triangle \begin{equation}\label{tr:presilting} R_1\xrightarrow{f}R_0\xrightarrow{g}X\xrightarrow{h}R_1[1], \end{equation} where $R_0,R_1\in \opname{add}\nolimits R$. Applying the functor $\Hom_{\mathcal{T}}(R,-)$ to the triangle yields a long exact sequence \[\cdots \to \Hom_{\mathcal{T}}(R, R_0[i])\to\Hom_{\mathcal{T}}(R,X[i])\to \Hom_{\mathcal{T}}(R, R_1[i+1])\cdots. \] Then the assumption that $R$ is presilting implies that \begin{equation}\label{eq:presilting} \Hom_{\mathcal{T}}(R, X[>0])=0. \end{equation} On the other hand, applying the functor $\Hom_{\mathcal{T}}(-,X[i])$ to the triangle \eqref{tr:presilting}, we obtain a long exact sequence \[\cdots\to\Hom_{\mathcal{T}}(R_1[1],X[i])\rightarrow \Hom_{\mathcal{T}}(X,X[i])\rightarrow \Hom_{\mathcal{T}}(R_0,X[i])\to \cdots. \] Then \eqref{eq:presilting} implies that $\Hom_{\mathcal{T}}(X,X[>1])=0$. \end{proof} \begin{thm}\label{t:case d=infinite} Let $X$ be an object in $\opname{pr}(R)$. \begin{enumerate} \item If $R$ is a presilting object, then the followings are equivalent. \begin{itemize} \item[(a)] $X$ is an $R[1]$-rigid object; \item[(b)] $X$ is a rigid object; \item[(c)] $X$ is a presilting object. \end{itemize} \item If $R$ is a silting object, then $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ if and only if $X$ is a silting object. \end{enumerate} \end{thm} \begin{proof} For $(1)$, according to Lemma~\ref{l:presilting case}, it suffices to prove that each $R[1]$-rigid object is rigid. Let us assume that $X$ is an $R[1]$-rigid object in $\opname{pr}(R)$. Then there exists a triangle \begin{equation}\label{tr:rigid} R_1\to R_0\to X\xrightarrow{h} R_1[1] \end{equation} with $R_0,R_1\in \opname{add}\nolimits R$. By applying the functor $\Hom_{\mathcal{T}}(R,-)$ to the triangle \eqref{tr:rigid}, we obtain an exact sequence \[\cdots\to \Hom_{\mathcal{T}}(R, R_0[1])\to \Hom_{\mathcal{T}}(R, X[1])\to \Hom_{\mathcal{T}}(R, R_1[2])\to \cdots. \] Since $R$ is a presilting object and $R_0,R_1\in \opname{add}\nolimits R$, we have \[\Hom_{\mathcal{T}}(R, R_0[1])=0=\Hom_{\mathcal{T}}(R,R_1[2]).\] Consequently, $\Hom_{\mathcal{T}}(R,X[1])=0$. Now applying the functor $\Hom_{\mathcal{T}}(-,X[1])$ to \eqref{tr:rigid}, we obtain an exact sequnece \[\Hom_{\mathcal{T}}(R_1[1],X[1])\rightarrow \Hom_{\mathcal{T}}(X,X[1])\rightarrow 0. \] In other words, each morphism from $X$ to $X[1]$ factors through the morphism $h: X\to R_1[1]$. However, we have $R[1](X,X[1])=0$, which implies that $\Hom_{\mathcal{T}}(X,X[1])=0$ and hence $X$ is rigid. This completes the proof of $(1)$. Now suppose that $R$ is a silting object. If $X$ is a silting object, then $X$ is an $R[1]$-rigid object by $(1)$. By Lemma \ref{l:number-direct-summands-silting}, we have $|X|=|R|$. Hence, $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ by Corollary \ref{c:number-direct-summand}. On the other hand, if $X$ is a maximal $R[1]$-rigid object, then $X$ is a presilting object by $(1)$. Since $X\in \opname{pr}(R)$, $X$ is a partial silting object by Lemma \ref{l:2-term presilting is partial silting}. According to Corollary \ref{c:number-direct-summand}, we know that $|X|=|R|$. Therefore, $X$ must be a silting object by Lemma \ref{l:number-direct-summands-silting}. \end{proof} Combining Theorem~\ref{t:thm1} with Theorem~\ref{t:case d=infinite}, we obtain the following bijection, which is due to Iyama-J{\o}rgensen-Yang ({\it cf.}~\cite[Theorem~0.2]{IJY}). \begin{corollary}~\label{c:IJY} Let $R$ be a basic silting object of $\mathcal{T}$ with endomorphism algebra $\Gamma=\opname{End}_\mathcal{T}(R)$. There is a bijection between the set of presilting objects which belong to $\opname{pr}(R)$ and the set of $\tau$-rigid pair of $\Gamma$-modules, which induces a one-to-one correspondence between the set of silting objects in $\opname{pr}(R)$ and the set of support $\tau$-tilting $\Gamma$-modules. \end{corollary} \section{R[1]-rigid objects and $d$-rigid objects in $(d+1)$-Calabi-Yau category}~\label{S:d-rigid} Let $d$ be a positive integer. Throughout this section, we assume that $\mathcal{T}$ is $(d+1)$-Calabi-Yau, {\em i.e.}\ we are given bifunctorial isomorphisms \[\Hom_{\mathcal{T}}(X,Y)\cong\mathbb{D}\Hom_{\mathcal{T}}(Y,X[d+1]) ~\text{for}~ X,Y\in \mathcal{T},\] where $\mathbb{D}=\opname{Hom}_k(-,k)$ is the usual duality over $k$. \subsection{From $R[1]$-rigid objects to $d$-rigid objects} An object $T\in\mathcal{T}$ is called {\it $d$-rigid} if $\Hom_{\mathcal{T}}(T,T[i])=0$ for $i=1, 2, \cdots, d$. It is {\it maximal $d$-rigid} if $T$ is $d$-rigid and for $i=1,\cdots,d, ~\Hom_{\mathcal{T}}(T\oplus X,(T\oplus X)[i])=0$ implies that $X\in\opname{add}\nolimits T$. An object $T\in \mathcal{T}$ is a {\it $d$-cluster-tilting object} if $T$ is $d$-rigid and for $i=1,\cdots,d$, $\Hom_{\mathcal{T}}(T, X[i])=0$ implies that $X\in \opname{add}\nolimits T$. \begin{lem}~\label{l:rigid-d-rigid} Let $R$ be a $d$-rigid object of $\mathcal{T}$ and $X\in \opname{pr}(R)$. Then $X$ is rigid if and only if $X$ is $d$-rigid. \end{lem} \begin{proof} It is obvious that a $d$-rigid object is rigid. Now suppose that $X$ is rigid. As $X\in \opname{pr}(R)$, we have a triangle \begin{equation}\label{eq: rigid-d-rigid} R_1\xrightarrow{f}R_0\xrightarrow{g}X\xrightarrow{h}R_1[1] \end{equation} with $R_0,R_1\in \opname{add}\nolimits R$. Note that we have $\Hom_{\mathcal{T}}(R,R[i])=0$ for $i=1,2,\cdots, d$. Applying the functor $\Hom_{\mathcal{T}}(R, -)$ to the triangle \eqref{eq: rigid-d-rigid}, we obtain a long exact sequence \[\cdots\to\Hom_{\mathcal{T}}(R, R_0[i])\to \Hom_{\mathcal{T}}(R, X[i])\to \Hom_{\mathcal{T}}(R,R_1[i+1])\to \cdots. \] Consequently, \begin{equation}\label{eq: relation} \Hom_{\mathcal{T}}(R, X[i])=0, \quad i=1,\cdots, d-1. \end{equation} On the other hand, applying the functor $\Hom_{\mathcal{T}}(-, X[i])$ to the triangle \eqref{eq: rigid-d-rigid} yields a long exact sequence \[\cdots\to \Hom_{\mathcal{T}}(R_1[1],X[i])\rightarrow \Hom_{\mathcal{T}}(X,X[i])\rightarrow \Hom_{\mathcal{T}}(R_0,X[i])\to \cdots. \] Then \eqref{eq: relation} implies that $\Hom_{\mathcal{T}}(X,X[i])=0$ for $i=2,\cdots, d-1$. Recall that $X$ is rigid and $\mathcal{T}$ is $(d+1)$-Calabi-Yau, we have \[\Hom_{\mathcal{T}}(X,X[d])\cong \mathbb{D}\Hom_{\mathcal{T}}(X,X[1])=0. \] Hence $X$ is a $d$-rigid object of $\mathcal{T}$. \end{proof} \begin{thm}\label{t:case d>1} Let $R\in\mathcal{T}$ be a $d$-rigid object and $X\in \opname{pr}(R)$. Then the followings are equivalent. \begin{enumerate} \item $X$ is an $R[1]$-rigid object. \item $X$ is a rigid object. \item $X$ is a $d$-rigid object. \end{enumerate} \end{thm} \begin{proof} According to Lemma~\ref{l:rigid-d-rigid}, it suffices to prove that each $R[1]$-rigid object is rigid. Let us first consider the case that $d\geq 2$. Applying the functor $\Hom_{\mathcal{T}}(R,-)$ to the triangle \eqref{eq: rigid-d-rigid} yields a long exact sequence \[\cdots\to \Hom_{\mathcal{T}}(R, R_0[1])\to \Hom_{\mathcal{T}}(R, X[1])\to \Hom_{\mathcal{T}}(R, R_1[2])\to \cdots. \] As $R$ is $d$-rigid and $R_0,R_1\in \opname{add}\nolimits R$, we conclude that $\Hom_{\mathcal{T}}(R,X[1])=0$. Applying the functor $\Hom_{\mathcal{T}}(-,X[1])$ to the triangle \eqref{eq: rigid-d-rigid}, we obtain an exact sequence \[\Hom_{\mathcal{T}}(R_1[1],X[1])\xrightarrow{\Hom_{\mathcal{T}}(h, X[1])} \Hom_{\mathcal{T}}(X,X[1])\rightarrow 0. \] In particular, each morphism from $X$ to $X[1]$ factors through the morphism $h:X\to R_1[1]$. Hence the assumption that $X$ is an $R[1]$-rigid object implies that $X$ is rigid. Now suppose that $d=1$. In this case, $\mathcal{T}$ is a $2$-Calabi-Yau triangulated category. Applying the functor $\Hom_{\mathcal{T}}(-,X[1])$ to \eqref{eq: rigid-d-rigid} yields a long exact sequence \[\cdots\to \Hom_{\mathcal{T}}(R_1[1],X[1])\xrightarrow{\Hom_{\mathcal{T}}(h,X[1])}\Hom_{\mathcal{T}}(X,X[1])\xrightarrow{\Hom_{\mathcal{T}}(g, X[1])}\Hom_{\mathcal{T}}(R_0,X[1])\to \cdots. \] Then the assumption that $X$ is $R[1]$-rigid implies that $\Hom_{\mathcal{T}}(g,X[1])$ is injective. Consequently, the morphism \[\mathbb{D}\Hom_{\mathcal{T}}(g,X[1]): \mathbb{D}\Hom_{\mathcal{T}}(R_0,X[1])\to \mathbb{D}\Hom_{\mathcal{T}}(X,X[1]) \] is surjective. Thanks to the $2$-Calabi-Yau property, we have the following commutative diagram \[\xymatrix{\mathbb{D}\Hom_{\mathcal{T}}(R_0,X[1])\ar[d]^{\cong}\ar[rr]^{\mathbb{D}\Hom_{\mathcal{T}}(g,X[1])}&&\mathbb{D}\Hom_{\mathcal{T}}(X,X[1])\ar[d]^{\cong}\\ \Hom_{\mathcal{T}}(X,R_0[1])\ar[rr]^{\Hom_{\mathcal{T}}(X,g[1])}&&\Hom_{\mathcal{T}}(X,X[1]). } \] In particular, $\Hom_{\mathcal{T}}(X,g[1]):\Hom_{\mathcal{T}}(X,R_0[1])\to \Hom_{\mathcal{T}}(X,X[1])$ is surjective. Again, $R[1](X,X[1])=0$ implies that $\Hom_{\mathcal{T}}(X,g[1])=0$ and then $\Hom_{\mathcal{T}}(X,X[1])=0$. \end{proof} \subsection{$d$-cluster-tilting objects in $d$-cluster categories} This subsection concentrates on $d$-cluster categories, a special class of $(d+1)$-Calabi-Yau triangulated categories. We refer to \cite{K, T} for definitions and ~\cite{ZZ09,W} for basic properties of $d$-cluster categories. Among others, the following result proved in \cite{ZZ09,W} is useful. \begin{lem}~\label{l:d cluster tilting objects are equivalent to maximal rigid object} Let $\mathcal{T}$ be a $d$-cluster category. Then an object $T$ is a $d$-cluster tilting object if and only if $T$ is a maximal $d$-rigid objects. Moreover, all $d$-cluster tilting objects have the same number of non-isomorphic indecomposable direct summands. \end{lem} Then for relative rigid objects, we have the following. \begin{proposition}\label{p:case d>1-2} Let $\mathcal{T}$ be a $d$-cluster category and $R$ be a $d$-cluster tilting object in $\mathcal{T}$. Assume $X\in \opname{pr}(R)$, then $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ if and only if $X$ is a $d$-cluster tilting object. \end{proposition} \begin{proof} Let $X$ be a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$. By Corollary \ref{c:number-direct-summand}, we have $|X|=|R|$. According to Theorem \ref{t:case d>1}, $X$ is $d$-rigid and hence a maximal $d$-rigid object in $\mathcal{T}$. It follows from Lemma \ref{l:d cluster tilting objects are equivalent to maximal rigid object} that $X$ is a $d$-cluster tilting object in $\mathcal{T}$. Conversely, assume that $X$ is a $d$-cluster tilting object. According to Lemma~\ref{l:d cluster tilting objects are equivalent to maximal rigid object}, $X$ is a maximal $d$-rigid object with $|X|=|R|$ and hence a maximal $R[1]$-rigid object respect to $\opname{pr}(R)$ by Theorem~\ref{t:case d>1}. \end{proof} Combining Theorem~\ref{t:thm1}, Thereom~\ref{t:case d>1} with Proposition~\ref{p:case d>1-2}, we obtain the following main result of~\cite{LQX}. \begin{corollary} ~\label{c:LQX} Assume that $d\ge 2$. Let $\mathcal{T}$ be a $d$-cluster category with a $d$-cluster-tilting object $R$. Denote by $\Gamma=\opname{End}_\mathcal{T}(R)$ the endomorphism algebra of $R$. The functor $\Hom_{\mathcal{T}}(R,-)$ yields a bijection between the set of isomorphism classes of $d$-rigid objects of $\mathcal{T}$ which belong to $\opname{pr}(R)$ and the set of isomorphism classes of $\tau$-rigid $\Gamma$-modules. The bijection induces a bijection between the set of isomorphism classes of $d$-cluster tilting objects of $\mathcal{T}$ which belong to $\opname{pr}(R)$ and the set of isomorphism classes of support $\tau$-tilting $\Gamma$-modules. \end{corollary} \subsection{Maximal rigid objects in $2$-Calabi-Yau categories} In this subsection, we assume that $\mathcal{T}$ is a $2$-Calabi-Yau category and $R$ a basic maximal rigid object of $\mathcal{T}$. It has been proved in~\cite{BIRS, ZZ11} that each rigid object of $\mathcal{T}$ belongs to $\opname{pr}(R)$. The following proposition is a direct consequence of Theorem~\ref{t:case d>1} and Corollary~\ref{c:number-direct-summand}. \begin{proposition}\label{p:case d=1} Let $\mathcal{T}$ be a $2$-Calabi-Yau triangulated category and $R$ a basic maximal rigid object of $\mathcal{T}$. Let $X$ be an object of $\mathcal{T}$, then $X$ is a maximal $R[1]$-rigid object with respect to $\opname{pr}(R)$ if and only if $X$ is a maximal rigid object of $\mathcal{T}$. \end{proposition} Combining Theorem~\ref{t:thm1} with Proposition~\ref{p:case d=1}, we obtain the main result of ~\cite{CZZ,LX}. \begin{corollary}~\label{c:CZZ-LX} Let $\mathcal{T}$ be a $2$-Calabi-Yau category with a basic maximal rigid object $R$. Denote by $\Gamma=\opname{End}_\mathcal{T}(R)$ the endomorphism algebra of $R$. Then there is a bijection between the set of isomorphism classes of rigid objects of $\mathcal{T}$ and the set of isomorphism classes of $\tau$-rigid $\Gamma$-modules, which induces a bijection between the set of isomorphism classes of maximal rigid objects of $\mathcal{T}$ and the set of isomorphism classes of support $\tau$-tilting $\Gamma$-modules. \end{corollary}
\section{Introduction} Genomes encode and store information that defines any living organism. They may be represented as sequences of symbols from the nucleotide alphabet $\{A,C,G,T\}$. A segment of $k$ consecutive nucleotides is called a \emph{genomic word} of length $k$. For each length $k$ there are $4^k$ distinct words. Some words have a well-defined biological function, and several functionally important regions of the genome can be recognized by searching for sequence patterns, also called `motifs' \cite{macisaac2006}. For instance, the trinucleotide $ATG$ serves as an initiation site in coding regions, i.e. a marker where translation into proteins begins~\cite{nakamoto2009}. Also the word CG is interesting. Although CG dinucleotides are under-represented in the human genome, clusters of CG dinucleotides (`CpG islands') are used to help in the prediction and annotation of genes~\cite{bajic2003}. Furthermore, CpG islands are known to be associated with the silencing of genes~\cite{deaton2011,jacinto2007,saxonov2006}. These examples illustrate the importance of identifying word patterns in genomic data. A particular characteristic of a genomic word is its distribution pattern. The distribution pattern of a word along a genomic sequence can be characterized by the distances between the positions of the first symbol of consecutive occurrences of that word. The \emph{distance distribution} of the word is the frequency of each lag in the DNA sequence. Patterns in distance distributions have been studied through several approaches (see e.g. ~\cite{afreixo2014,tavares2016,tavares2017}) and form an interesting research topic due to their link with positive or negative selection pressures during evolution~\cite{burge1992,leung1996}. In this paper we look for clusters of genomic word distance distributions. Because of the particularly spiked nature of these distributions, we have developed a 3-step procedure. First, we fit a smooth baseline distribution using an outlier-robust fitting technique. Secondly, we identify and characterize the peak structure on top of that baseline. Finally, a clustering procedure is applied to the characterization obtained in the first two steps. The paper is organized as follows. Section 2 describes distance distributions and the proposed clustering procedure. Section 3 is a simulation study which measures the performance of the proposed method. Section 4 clusters real data, consisting of distance distributions of words in the human genome. Section 5 concludes and outlines future research directions. \section{Methodology} \label{sec:method} \subsection{Word distance distributions} In a simple random sequence with words generated independently from an identical distribution, the distance distribution of a word (without overlap structure) follows a geometric distribution~\cite{percus2002}, whose continuous approximation is an exponential distribution. By adding some correlation structure between a symbol and the symbols at preceding positions, a more refined DNA model is obtained. This can be achieved by assuming a $k$-th order Markov model~\cite{fu1996,tavares2016}. However, real genomic sequences are more complex and do not follow the simple models mentioned above. Many unexpected patterns occur in the distance distributions of genomic words. For instance, Figure~\ref{fig:k4} shows the distance distributions of the words $w=TACT$ and $w=ACGG$ in the human genome assembly. They have strong peaks, which correspond to distances that occur much more often than others. \begin{figure}[ht] \centering \includegraphics[width=0.8\textwidth] {fig_k4-eps-converted-to.pdf} \vskip-0.5cm \caption{Distance distribution of the genomic words $w=TACT$ (left) and $w=ACGG$ (right) in the human genome. Both distributions exhibit over-favored distances (peaks). The strongest peaks correspond to distances 54 (left) and 340 (right).} \label{fig:k4} \end{figure} \subsection{Decomposition of distance distributions} \label{sec:model} In this study we decompose a distance distribution into a smooth underlying distribution (the `trend') and a peak function. This decomposition allows us to separate the two essential properties of a distribution. Consider a genomic word $w$ of length $k$ and denote its relative frequency (histogram) by $f$, observed on a domain consisting of lags $\{k+1, k+2, \ldots, L\}$. Note that $\sum_{j= k+1}^{L}{f(j)} = 1$. Such a distribution typically consists of an overall trend and some upward peaks. Therefore, we model the distribution as a mixture of a baseline distribution $f_b$ and a peak function $f_{pk}$\,: \begin{equation} f = f_b + f_{pk}\;\;. \label{eq:model} \end{equation} We will denote the mass of the baseline component as $m_b=\sum_{j = k+1}^{L} f_b(j)$ and that of the peak function as $m_{pk}=\sum_{j = k+1}^{L} f_{pk}(j)$. Both $f_b$ and $f_{pk}$ are nonnegative hence $0\leq m_b\leq 1$ and $0\leq m_{pk}\leq 1$, with $m_b+m_{pk}=1$. From many trial fits on distance distributions of genomic words we concluded that a properly scaled gamma density function provides a good fit of the underlying trend. Therefore we set $f_b =\alpha f_\gamma$ with $\alpha\geq 0$ and \begin{equation} f_\gamma(x; \theta, \lambda) = \frac{\lambda^{\theta} x^{\theta-1} e^{-\lambda x}}{\Gamma(\theta)} I(x>0) \label{eq:gamma} \end{equation} where $\theta>0$ is the shape parameter, $\lambda>0$ is the rate parameter (note that $1/\lambda$ is a scale parameter), and $\Gamma(.)$ is Euler's gamma function~\cite{abramowitz1964}. The gamma distribution includes the exponential distribution as a special case (with $\theta=1$) and can therefore be seen as an extension of the model in \cite{percus2002}. The peak function $f_{pk}$ describes the mass excess above the baseline. If there is a peak at lag $j$ it follows that $f_{pk}(j)=f(j)-f_b(j)$, and if there is no peak $f_{pk}(j)=0$. Figure \ref{fig:decomp1} illustrates the decomposition of the distance distribution of the word $w = ACGG$ shown in Figure \ref{fig:k4} into a smooth baseline function $f_b$ and a peak function $f_{pk}$. \begin{figure}[ht] \centering \includegraphics[width=0.8\textwidth] {ACGG_decomposition2-eps-converted-to.pdf} \vskip-0.3cm \caption{Decomposition of the distance distribution of the genomic word $w=ACGG$ into $f_b$ (left) and $f_{pk}$ (right).} \label{fig:decomp1} \end{figure} \subsection{Estimating the baseline} \label{sec:LTS} To estimate the baseline distribution $f_b$ we need to fit a scaled gamma curve $\alpha f_\gamma$ to the points $(j,f(j))$ of the observed histogram, where $j = k+1, k+2, \ldots, L$\,. Note that $f_b$ is defined by three parameters: $\alpha$, $\theta$ and $\lambda$, so we have to estimate all three together. A first thought would be to work with the residuals $f(j)-\widehat{f_b}(j)$, but these suffer from heteroskedasticity as the variability in $f(j)$ is larger for low $j$ than for high $j$. In fact, if we generate $n$ data points from the model (\ref{eq:model}) the observed {\it absolute} frequency $f_{ob}(j)$ at a lag $j$ in which there is no peak follows a binomial distribution with $n$ experiments and success probability $f_b(j)$\,. (Note that in the real data $n$ is the total number of times the word $w$ occurs in the genome.) When the success probability is low and $n$ is high the binomial distribution can be well approximated by a Poisson distribution with mean and variance $n\,f_b(j)$. The standard deviation of that Poisson distribution is thus $\sqrt{n\,f_b(j)}$ and therefore decreasing in $j$, which implies heteroskedasticity of $f_{ob}(j)-n\widehat{f_b}(j)$. On the other hand, it is known that the square root of a Poisson variable has a nearly constant standard deviation. Therefore, we will fit the function $\sqrt{n\,f_b}$ to the transformed data $\sqrt{f_{ob}}$\,. We thus use the square root as a variance-stabilizing transform for the Poisson distribution. In practice, we will consider the residuals \begin{equation} r(j) = \sqrt{f_{ob}(j)} - \sqrt{n\,\widehat{f_b}(j)} \label{eq:res} \end{equation} whose standard deviation is roughly constant at those $j$ in which there is no peak, so we are in the usual homoskedastic setting. The next question is how to combine these residuals in an objective function to be minimized. The standard approach for this is the least squares (LS) objective, which is simply the sum of all squared residuals $\sum_{j=k+1}^L r^2(j)$\,. However, this does not work in our case because of the peaks in the data, which are outliers. Minimizing the LS objective would assign very high weight to the outliers, which do not come from the baseline $f_b$\,. Instead we apply the least trimmed squares (LTS) approach of~\cite{Rousseeuw:LMS}. This method minimizes the sum of the $h$ smallest squared residuals, so that \begin{equation} (\hat{\alpha},\hat{\theta}, \hat{\lambda})\;\; \mbox{ minimizes }\; \sum_{i=1}^h (r^2)_{(i)} \label{eq:LTS} \end{equation} where $(r^2)_{(1)} \leqslant (r^2)_{(2)} \leqslant \ldots$ are the ordered squared residuals. In this application we set $h$ equal to $95\%$ of the number of values $j$ in the domain. By using only the $95\%$ smallest squared residuals, the LTS method does not fit the peaks of the distribution and focuses only on the trend. To avoid overemphasizing the high lags $j$ where the fit is close to zero and to get a more accurate fit for the lower lags, we carry out the LTS fit on a shorter set $j\in\{k+1,\ldots,L^*\}$ with $L^* < L$. \subsection{Estimating the peak function} \label{sec:peak} We now want to flag the peaks in the observed absolute frequencies $f_{ob}(j)$, noting that even in lags $j$ without a peak we do not expect $f_{ob}(j)$ to be exactly equal to $n \widehat{f_b}(j)$ because $f_{ob}(j)$ exhibits natural Poisson variability with mean and variance $n \widehat{f_b}(j)$. Therefore we assess the extremity of the observed frequency $f_{ob}(j)$ by comparing it with a high quantile $Q(j)$ (e.g. with probability $0.99$) of the Poisson distribution with mean $n \widehat{f_b}(j)$. That is, we flag a peak at the lag $j$ if and only if \begin{equation} f_{ob}(j) > Q(j)\;\;. \label{eq:flag} \end{equation} At any lag $j$ that is flagged we set the peak function value equal to the difference between the observed and the expected relative frequencies, i.e. $f_{pk}(j) = f(j)-\widehat f_b(j)>0$. At all the other lags we set $f_{pk}(j) = 0$\,. \subsection{Dimension reduction} Suppose now that we wish to analyze $m$ genomic words, where $m$ could be the number of words of length $k$ in the genome. The raw data is then a matrix of size $m\times (L-k)$ containing the $m$ observed lag distributions. Each row corresponds to a discrete distribution (a vector of length $L-k$), denoted by $f$, which sums to one. In the preceding subsections we have seen how each row $f$ can be decomposed into the sum of a baseline and a peak function. First consider the baseline functions. In what follows we are interested in computing a kind of distance between such functions. Since each baseline function $f_b$ is characterized by a triplet of parameters $(\alpha,\theta,\lambda)$, a simple idea would be to compute the Euclidean distance between such triplets. However, the three parameters have different scales, and triplets with relatively high Euclidean distance can describe similar-looking curves and vice versa. To remedy this, we first construct the cumulative distribution function (CDF) of each baseline, given by $F_b(j) = \sum_{i=k+1}^{j} f_b(i)$ for $j = k+1, \ldots, L$. The left panel of Figure \ref{fig:decomp2} illustrates this for the word $w = ACGG$, the lag distribution of which was shown in Figure \ref{fig:k4} and decomposed in Figure \ref{fig:decomp1}. Note that $F_b(L) = m_b < 1$ when $m_{pk} > 0$. \begin{figure}[ht] \centering \includegraphics[width=0.8\textwidth] {ACGG_decomposition3-eps-converted-to.pdf} \vskip-0.3cm \caption{Cumulative distribution functions of the baseline (left) and the peak function (right) of the genomic word $w = ACGG$.} \label{fig:decomp2} \end{figure} We can then think of the Euclidean distance between two CDFs $F_b$ and $G_b$ as a way to measure their dissimilarity. Note that these CDFs still have $L-k$ dimensions, which is usually very high. Therefore, in the second step we apply a principal component analysis (PCA) to these $m$ high-dimensional vectors. This operation preserves much of the Euclidean distances. The number of components we retain, $q_b$\,, is selected such that at least a given percentage of the variance is explained. Typically $q_b \ll L-k$ so the dimension is reduced substantially. The scores associated to the first $q_b$ components yield a data matrix of much smaller size $m\times q_b$\,. Note that these scores are uncorrelated with each other by construction. For the peak functions, stacking the $m$ rows on top of each other also yields a matrix of size $m\times (L-k)$. This data matrix is sparse in the sense that few of its elements are nonzero. We then follow the same strategy to that used for the baseline functions: first we convert the peak functions to CDFs as illustrated in the right panel of Figure \ref{fig:decomp2}, and then we apply PCA yielding $q_{pk}$ components, where $q_{pk}$ is selected to attain at least a given explained variance. The resulting score matrix has size $m\times q_{pk}$\,. \subsection{Clustering} \label{sec:clusproc} Clustering, also known as unsupervised classification, aims to find groups in a dataset (see e.g.~\cite{kaufman1990}). Here our dataset is a matrix of size $m \times (q_b + q_p)$ obtained by applying the above preprocessing to all of the $m$ frequency distributions. We explore clustering based on only the peak component \emph{(Method 1)}, only the baseline component \emph{(Method 2)}, and based on both \emph{(Method 3)}. To each of these datasets we apply the k-means method, in which $k$ stands for the number of clusters which is specified in advance. (The letter `k' in the name of this method differs from the word length $k$ used elsewhere in this paper.) This approach defines the center of a cluster as its mean, and assigns each object to the cluster with the nearest center. Its goal is to find a partition such that the sum of squared distances of all objects to their center is as small as possible. The algorithm starts from a random initialization of cluster centers and then iterates from there to a local minimum of the objective function. This is not necessarily the global minimum. As a remedy for this problem, multiple initial configurations are generated and iterations are applied to them, after which the final solution with the lowest objective is retained. Since k-means looks for spherical clusters, it works best when the input variables are uncorrelated and have similar scales. The preprocessing by PCA in the previous step has created uncorrelated variables, and in our experiments their scales were of the same order of magnitude. \subsection{Selecting the number of clusters} The result of $k$-means clustering depends on the number of clusters $k$, which is often hard to choose a priori. Therefore it is common practice to run the method for several values of $k$, and then select the `best' value of $k$ as the one which optimizes a certain criterion called a validity index. Many such indices have been proposed in the literature. Here we will focus on three of them: the Calinski-Harabasz (CH) index, the C index, and the silhouette (S) index. The CH index~\cite{calinski1974} evaluates the clustering based on the average between- and within-cluster sums of squares. The approach selects the number of clusters with the highest CH index. The C index reviewed in~\cite{hubert1976} relates the sum of distances over all pairs of points from the same cluster (say there are $N$ such pairs) to the sum of the $N$ smallest and the sum of the $N$ largest distances between pairs of points in the entire data set. It ranges from 0 to 1 and should be minimized. To compute the C index all pairwise distances have to be computed and stored, which can make this index prohibitive for large datasets. The S index~\cite{rousseeuw1987} is the average silhouette width over all points in the dataset. The silhouette width of a point relates its average distance to points of its own cluster to the average distance to points in the `neighboring' cluster. The silhouette index ranges from $-1$ to $+1$ and large values indicate a good clustering. The performance of these measures depends on various data characteristics. An early reference for comparing clustering indices is \cite{milligan1985examination}, which concludes that CH and C exhibit excellent recovery characteristics in clean data (the S index was not yet proposed at that time). More recent works evaluate clustering indices also in datasets with outliers and noise, see e.g. \cite{guerra2012,liu2010}). Guerra et al.~\cite{guerra2012} rank CH and S in top positions, and report poor performance of the C index in that situation. Rather than choosing one of these indices we will compute all three in our study, and plot each of them against the number of clusters. The local extrema in these curves can be quite informative. \section{Simulation study} To better understand the behavior of the proposed procedure, a simulation study is performed. To assess how well a clustering method performs, we compute a measure of agreement between the resulting partition and the true one. \subsection{Study design} Experiments are performed on datasets consisting of three distinct groups of discrete distributions, denoted by $G_1$, $G_2$ and $G_3$, whose characteristics are defined by a five factor factorial design. The factors and levels used in the study are listed in Table~\ref{tab:design}. They have the following meaning. \begin{itemize} \item Trend ($T$) is defined by the Gamma parameters $\theta$ (shape) and $\lambda$ (rate). When $T$ is `same' the distributions in all groups have the same baseline parameters. \item Number of peaks ($NP$) gives the number of peaks generated in each distribution. When $NP$ is `same' all distributions exhibit the same number of peaks, $np$, set as 10. In case $NP$ is `distinct' the number of peaks is set to 20 in $G_1$, 10 in $G_2$, and 5 in $G_3$. \item Peak locations ($PL$). In each group the `mean locations' ($ml$) are generated uniformly on the domain. For each member of that group the peak locations are generated around the mean locations of that group ($ml\pm h$, with $h=3$). When $PL$ is `similar' all groups have the same mean locations. \item Peak mass ($PM$) corresponds to the amount of mass $m_p$ in the peaks of the distribution, so the mass of the baseline is $1-m_p$. Three levels are considered: distributions of all groups have the same $m_p>0$; distributions of distinct groups have different $m_p>0$; distributions of $G_1$ and $G_2$ have different $m_p>0$ and distributions from $G_3$ have $m_p=0$. Note that the factors $NP$ and $PM$ are not independent, as $NP=1$ implies $PM\neq3$, and $PM=3$ implies that the distributions in $G3$ have no peaks ($np=0$). \item Sample size ($SS$) describes the number of elements in each group. In the `balanced' setting all groups have the same number of distributions. \end{itemize} Each simulated distribution is constructed from a baseline function and a peak function. All distributions belonging to the same group have the same factor levels. \begin{table}[htbp] \centering \caption{Factors of the experimental study and corresponding levels. Factors: trend, $T$; number of peaks, $NP$; peak locations, $PL$; peak mass, $PM$; sample size per group, $SS$.} \renewcommand{\arraystretch}{1.0} \setlength\tabcolsep{2.5pt} \normalsize \vskip0.3cm \begin{tabular}{llrrrr} \toprule \multirow{2}[2]{*}{Factor} & \multicolumn{1}{l}{\multirow{2}[2]{*}{Level}} & \multicolumn{1}{c}{Para-} & \multicolumn{3}{c}{Groups} \\ & \multicolumn{1}{c}{} & \multicolumn{1}{c}{meters} & G1 & G2 & G3 \\ \midrule \multirow{4}[2]{*}{Trend (T)} & \multicolumn{1}{l}{\multirow{2}[1]{*}{1. same}} & $\theta$ & 0.8 & 0.8 & 0.8 \\ & \multicolumn{1}{c}{} & $\lambda$ & 0.0005 & 0.0005 & 0.0005 \\ & \multicolumn{1}{l}{\multirow{2}[1]{*}{2. distinct}} & $\theta$ & 0.6 & 0.8 & 0.95 \\ & \multicolumn{1}{c}{} & $\lambda$ & 0.0001 & 0.0005 & 0.001 \\ \hline Number of Peaks & 1. same & $np$ & 10 & 10 & 10$^\ast$ \\ ($NP$) & 2. distinct & $np$ & 20 & 10 & 5$^\ast$ \\ \hline Peak Locations & 1. similar & - & - & - & - \\ ($PL$) & 2. distinct & - & - & - & - \\ \hline \multirow{3}[2]{*}{Peak Mass (PM)} & 1. same & $m_p$ & 0.05 & 0.05 & 0.05 \\ & 2. distinct & $m_p$ & 0.1 & 0.05 & 0.02 \\ & 3. distinct with 0 & $m_p$ & 0.1 & 0.05 & 0 \\ \hline \multirow{2}[2]{*}{Sample Size (SS)} & 1. balanced & & 200 & 200 & 200 \\ & 2. not balanced & & 50 & 150 & 400 \\ \bottomrule \end{tabular}\\ \begin{flushleft} $^\ast$These values are replaced by 0 in case factor $PM$ takes level 3. \end{flushleft} \label{tab:design \end{table Note that for the baseline function (\ref{eq:gamma}) only the parameters $\theta$ and $\lambda$ are user-defined, while $\alpha$ is not. This is because $\alpha$ is determined from the peak mass $m_p$ by \begin{equation} \alpha=(1-m_p)/\sum_{j=k+1}^L f_\gamma(j;\theta,\lambda)\;\;. \label{eq:alpha} \end{equation} Therefore the baseline functions are determined by the trend $T$ and the total peak mass $PM$. Since the baseline construction depends on $PM$, it is required that the peak mass takes the same value in all groups ($PM$=1) in order to obtain similar baselines ($T$=1).\\ We will say that groups have \emph{similar baselines} when their $T$ is `same' and peak mass $PM$ is `same', and that they have \emph{distinct baselines} when $T$ is `distinct'. Also, when number of peaks $NP$ is `same' and peak location $PL$ is `similar', we will say that the groups have \emph{similar peak functions}, and when $PL$ is `distinct' they are said to have \emph{distinct peak functions}.\\ We are interested in the following three scenarios: \begin{itemize} \item[] \textbf{Scenario 1} - Groups have similar baselines and distinct peak functions; \item[] \textbf{Scenario 2} - Groups have similar peak functions and distinct baselines; \item[] \textbf{Scenario 3} - Groups have distinct baselines and distinct peak functions. \end{itemize} The remaining case where both the baselines and the peaks are similar is not of interest since its groups are basically the same. The combination of the three scenarios of interest with the possible levels of the design factors leads to 20 possible data configurations: 4 cases for scenario 1, 4 cases for scenario 2 and 12 cases for scenario 3, as can be seen in Table~\ref{tab:scenarios}. For each case 100 independent samples were generated, and the clustering methods described in section~\ref{sec:clusproc} were applied to each sample. \begin{table}[htb] \centering \caption{Possible combinations of factor levels, leading to 20 data conditions, \mbox{organized} by scenario (1, 2 or 3).} \vskip0.7cm \renewcommand{\arraystretch}{1.0} \setlength\tabcolsep{2.5pt} \normalsize \begin{tabular}{ccp{2cm}p{4.5cm}p{4.5cm}} \cline{4-5} & & & \multicolumn{2}{c}{ Peak Functions} \\ & & & \multicolumn{1}{c}{Similar } & \multicolumn{1}{c}{Distinct} \\ \cline{3-5} & & \multicolumn{1}{c}{Factor} & \multirow{2}{*}{$\qquad NP$=$PL$=1} & \multirow{2}{*}{$\qquad PL\neq$1} \\ & & \multicolumn{1}{c}{Levels} & & \\ \cline{1-5} \multicolumn{1}{c}{\multirow{8}[4]{*}{\begin{sideways}Baselines\end{sideways}}} & \multicolumn{1}{c}{\multirow{4}[2]{*}{\begin{sideways}Similar\end{sideways}}} & & \cellcolor{gray!25} & \multicolumn{1}{c}{\textbf{Scenario 1}} \\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{$T=1$} & \cellcolor{gray!25} & $T=1$; $NP\in\{1,2\}$; \\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{and} & \cellcolor{gray!25} & $PL=2$; $PM=1$;\\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{$PM=1$} & \cellcolor{gray!25} & $SS\in\{1,2\}$\\ \cline{3-5} \multicolumn{1}{c}{} & \multicolumn{1}{c}{\multirow{4}[2]{*}{\begin{sideways}Distinct\end{sideways}}} & &\multicolumn{1}{c}{\textbf{Scenario 2}} & \multicolumn{1}{c}{\textbf{Scenario 3}}\\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & $T=2$; $NP=1$; & $T=2$; $NP\in\{1,2\}$; \\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{$T=2$} & $PL=1$; $PM\in\{1,2\}$; & $PL=2$; $PM\in\{1,2,3\}$; \\ \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & \multicolumn{1}{c}{} & $SS\in\{1,2\}$ & $SS\in\{1,2\}$\\ \bottomrule \end{tabular} \vskip0.5cm \label{tab:scenarios} \end{table} \subsection{Data generation} The data sets were generated according to the corresponding levels of the factors $T$, $NP$, $PL$, $PM$ and $SS$. All data sets consist of $m=600$ discrete distributions on $L=1500$ lags, with their peaks located in the first 1000 lags. The distributions are labeled by group ($G_1$, $G_2$ and $G_3$). {\it Baseline distribution.} The baseline distributions $f_b$ are given by $\alpha$ times the gamma density $f_\gamma(\theta,\lambda)$ of (\ref{eq:gamma}). The gamma parameters $\theta$ and $\lambda$ are determined by the factor $T$ with parameter values shown in Table \ref{tab:design}, plus Gaussian noise. The formula is \begin{equation} f_b(j) = \alpha f_\gamma(j; \theta+\delta_\theta, \lambda+\delta_\lambda) \end{equation} where $\delta_\theta\sim N(0,0.01)$, $\delta_\lambda\sim N(0,0.00001)$ and $\alpha$ is determined from the triplet $(\theta+\delta_\theta, \lambda+\delta_\lambda, m_p)$ according to (\ref{eq:alpha}).\\ {\it Peak function.} To define a peak function $f_{pk}$ we first determine the peak locations from the factors $PL$ and $NP$ (as described above), and their magnitudes from $PM$ and $T$. In all non-peak positions the peak function is set to zero.\\ {\it Sampling variability.} The generated baseline function and peak function together yield a discrete distribution $f$ as in formula (\ref{eq:model}). We then sample a dataset with 50,000 observations from this population distribution, in a natural way. We first construct the CDF of $f$, given by $F(j) = \sum_{i \leqslant j} f(i)$ for all $j$ in the domain. Then we consider the quantile function denoted as $F^{-1}$: for each value $u$ in $]0,1[$ we set $F^{-1}(u)=\min\{ j\, ;\, F(j) \geqslant u\}$. This quantile function takes only a finite number of values. Now we draw 50,000 random values from the uniform distribution on $]0,1[$ and apply $F^{-1}$ to each, which yields 50,000 lags in the domain that are a random sample from the distribution $f$ given by ~(\ref{eq:model}). This sample forms an empirical probability function $f_{ob}$\,. We then apply the procedure of Section \ref{sec:method} to carry out a clustering on 600 such empirical distributions. \subsection{Performance evaluation} Each replication takes a set of 600 distributions and returns a partition of these data. To assess the performance of the method, a measure of agreement between the resulting partition and the true partition is needed. Milligan and Cooper~\cite{milligan1986study} evaluated different indices for measuring the agreement between partitions and recommended the Adjusted Rand Index (ARI), introduced in~\cite{hubert1985}. The ARI takes values between -1 and 1, has a maximum value of 1 for matching classifications and has an expected value of zero for random classifications. For each case we report the mean and standard deviation of ARI over the 100 replications. \subsection{Results} Table \ref{tab:ARI} summarizes the results of the simulation. Each row in the table corresponds to a particular case, determined by the levels of the 5 factors (T, NP, PL, PM, SS). The rows are grouped by the 3 scenarios listed in Table \ref{tab:scenarios}. Scenario 1 has distinct peak functions, scenario 2 has distinct baselines, and scenario 3 has both. The first columns of Table \ref{tab:ARI} describe the factor levels, followed by columns for each of the three methods. In each of those the mean and the standard deviation (in parentheses) of the Adjusted Rand Index over the 100 replications are listed. The final columns list the number of principal components retained for the baselines (b) and the peak functions (pk). These numbers were obtained by requiring that the percentage of explained variance is at least 90\%. We see that the baselines require only 2 components. For the peaks the number is high when the peak masses are the same (PM=1) and low otherwise (in the latter case it requires few PCs to explain the larger peaks). \begin{table}[!ht] \centering \caption{Mean and standard deviation of the Adjusted Rand Index obtained from 100 replicas of each case. Results are organized by scenario and method. Each case is defined by a combination of five factors: trend, T; number of peaks, NP; peak locations, PL; peak mass, PM; and sample size per group, SS. The final columns list the number of principal components retained for the baselines (b) and the peak functions (pk).} \vskip0.5cm \renewcommand{\arraystretch}{0.8} \setlength\tabcolsep{3pt} \normalsize \begin{tabular}{rrrrrrrrrrrrrrrrr} \toprule \multicolumn{5}{c}{\textbf{Factors}} & & \multicolumn{2}{c}{\textbf{Method 1}} & & \multicolumn{2}{c}{\textbf{Method 2}} & & \multicolumn{2}{c}{\textbf{Method 3}} & & \multicolumn{2}{c}{\#\textbf{PC}} \\ \multicolumn{1}{l}{\small{T}} & \multicolumn{1}{l}{\small{NP}} & \multicolumn{1}{l}{\small{PL}} & \multicolumn{1}{l}{\small{PM}} & \multicolumn{1}{l}{\small{SS}} & & && & && & && & \multicolumn{1}{r}{b} & \multicolumn{1}{r}{pk}\\ \midrule \multicolumn{5}{l}{Scenario 1:} && \\ 1 & 1 & 2 & 1 & 1 && 0.989 & (0.046) & & 0.000 & (0.003) & & 0.817 & (0.255) && 2 & 62 \\ 1 & 1 & 2 & 1 & 2 && 0.886 & (0.224) & & 0.000 & (0.007) & & 0.493 & (0.245) && 2 & 58 \\ 1 & 2 & 2 & 1 & 1 && 0.987 & (0.052) & & 0.000 & (0.002) & & 0.837 & (0.245) && 2 & 55 \\ 1 & 2 & 2 & 1 & 2 && 0.821 & (0.245) & & -0.002 & (0.007) & & 0.530 & (0.208) && 2 & 39 \\ \multicolumn{5}{l}{Scenario 2:} && \\ 2 & 1 & 1 & 1 & 1 && 0.082 & (0.131) & & 0.966 & (0.019) & & 0.969 & (0.018) && 2 & 42 \\ 2 & 1 & 1 & 1 & 2 && 0.043 & (0.085) & & 0.934 & (0.036) & & 0.940 & (0.036) && 2 & 45 \\ 2 & 1 & 1 & 2 & 1 && 1.000 & (0.000) & & 0.987 & (0.008) & & 1.000 & (0.000) && 2 & 3 \\ 2 & 1 & 1 & 2 & 2 && 1.000 & (0.000) & & 0.989 & (0.008) & & 1.000 & (0.000) && 2 & 2 \\ \multicolumn{5}{l}{Scenario 3:} && \\ 2 & 1 & 2 & 1 & 1 && 0.976 & (0.060) & & 0.965 & (0.019) & & 0.999 & (0.002) && 2 & 58 \\ 2 & 1 & 2 & 1 & 2 && 0.919 & (0.183) & & 0.988 & (0.009) & & 1.000 & (0.000) && 2 & 58 \\ 2 & 1 & 2 & 2 & 1 && 1.000 & (0.000) & & 0.992 & (0.006) & & 1.000 & (0.000) && 2 & 5 \\ 2 & 1 & 2 & 2 & 2 && 1.000 & (0.000) & & 0.998 & (0.003) & & 1.000 & (0.000) && 2 & 5 \\ 2 & 1 & 2 & 3 & 1 && 1.000 & (0.000) & & 0.933 & (0.036) & & 0.999 & (0.004) && 2 & 3 \\ 2 & 1 & 2 & 3 & 2 && 1.000 & (0.000) & & 0.988 & (0.008) & & 1.000 & (0.000) && 2 & 2 \\ 2 & 2 & 2 & 1 & 1 && 0.989 & (0.030) & & 0.989 & (0.008) & & 1.000 & (0.000) && 2 & 56 \\ 2 & 2 & 2 & 1 & 2 && 0.900 & (0.203) & & 0.992 & (0.007) & & 1.000 & (0.000) && 2 & 40 \\ 2 & 2 & 2 & 2 & 1 && 1.000 & (0.000) & & 0.997 & (0.004) & & 1.000 & (0.000) && 2 & 6 \\ 2 & 2 & 2 & 2 & 2 && 1.000 & (0.000) & & 0.964 & (0.022) & & 0.999 & (0.002) && 2 & 4 \\ 2 & 2 & 2 & 3 & 1 && 1.000 & (0.000) & & 0.929 & (0.042) & & 0.999 & (0.002) && 2 & 3 \\ 2 & 2 & 2 & 3 & 2 && 1.000 & (0.000) & & 0.988 & (0.009) & & 1.000 & (0.000) && 2 & 2 \\ \bottomrule \end{tabular} \label{tab:ARI} \end{table} \paragraph{Method 1} The first method applies the clustering to the PCA scores obtained from the peak functions. Therefore, good performance is expected in scenarios with distinct peak locations between the groups (scenarios 1 and 3). Indeed, Method 1 performs very well in scenario 1 ($\mbox{ARI}\geqslant 0.821)$ and scenario 3 ($\mbox{ARI}\geqslant 0.900$). In scenario 2 the peak locations are the same. In the first two cases the peak masses are similar and in the other two cases the peak masses are distinct. As expected, Method 1 recovers the peak differences in the latter cases, whereas there are no differences to recover in the former. \paragraph{Method 2} This method clusters the PCA scores of the baselines, so it is expected to work well in scenarios 2 and 3 in which the trends are distinct, and not in scenario 1 in which the baselines are similar. The simulation results confirm this, as the groups are not recovered in scenario 1 ($\mbox{ARI}\approx 0$) and are identified with high accuracy in scenarios 2 and 3 ($\mbox{ARI}\geqslant 0.929$). \paragraph{Method 3} The input for Method 3 are the scores of the baselines as well as those of the peaks, and indeed it is the best performer in scenario 3 where the groups have distinct baselines combined with distinct peaks ($\mbox{ARI}\geqslant 0.999$). In that scenario it is also good at distinguishing groups with peaks from groups without peaks ($PM=3$). Also in scenario 2 we see that Method 3 works well, in fact it even slightly outperforms the other methods in that situation. Only in scenario 1 does Method 3 perform less well. It is still fine when the groups have balanced sizes ($SS=1$) but becomes weaker when the groups are unbalanced ($SS=2$). \begin{figure}[ht] \centering \includegraphics[width=0.75\textwidth] {ARI-eps-converted-to.pdf} \vskip-0.4cm \caption{Performance of each method, given by the mean ARI of all replications from cases in each scenario: groups with similar trends and distinct peak locations (scenario 1); groups with distinct trends and similar peak locations (scenario 2); and groups with distinct trends and distinct peak locations (scenario 3). The clustering methods 1, 2 and 3 correspond to the three broken lines.} \label{fig:ARI} \end{figure} Figure~\ref{fig:ARI} provides a rough summary of the simulation results by showing the ARI averaged over all cases of each scenario. The performance of a method is thus measured by three numbers. We note that no method is best in all scenarios. Method 2, which ignores the peak information, is never the best method. Method 1 is the best in scenario 1, and Method 3 is the best in scenarios 2 and 3. For a given dataset it is recommended to carry out a preliminary inspection to determine which scenario it corresponds to, before selecting the clustering method. \section{Application to real data} In this section we analyze two datasets, consisting of the lag distributions of all words of length $k = 3$ and $k = 5$ in the complete human genome. These datasets are denoted by $DD_k$ where $k$ identifies the word length. $DD_3$ consists of 64 distributions and $DD_5$ contains 1024 distributions. A preliminary visual inspection of these histograms revealed that there are substantial differences in both the trends and the peak structures, so in accordance with the conclusions of the simulation study we selected Method 3 (described in Section~\ref{sec:clusproc}) for clustering the words in each dataset. \subsection{Data and data processing} We used the complete DNA sequence of the human genome assembly, downloaded from the website of the National Center for Biotechnology Information. The available assembled chromosomes (in version GRCh38.p2) were processed as separate sequences and all non-ACGT symbols were considered as sequence separators. The counts of word lags were obtained by a dedicated C program able to handle large datasets (the haploid human genome has over 3 billion symbols). We analyzed the absolute frequences of the lags $j=k+1,\ldots,L$ where $L=1000$ for $k=3$ and $L=4000$ for $k=5$. The R language was used to decompose the lag distributions, to perform the principal component analysis and the clustering and to carry out further statistical analysis. The R code used in this report, as well as the data sets and a script analyzing them and reproducing the figures can be downloaded from\\ \mbox{{\it https://wis.kuleuven.be/stat/robust/software}}\,. \subsection{Decomposing the lag distributions} In both datasets we first estimated the baseline distribution by LTS as described in Subsection \ref{sec:LTS}, in which we set $L^*=200$ for $DD_3$ and $L^*=1500$ for $DD_5$. The peak functions were then estimated as described in Subsection \ref{sec:peak}. \subsection{Clustering words of length 3} Each distribution in $DD_3$ is summarized by 4 values, as the PCA retains 2 components for the peaks and 2 components for the baselines. Figure \ref{fig:indexk3_10} plots the validation indices against the number of clusters ($<10$). The CH index has a local maximum at 3 clusters and is high again at 6 clusters or more, whereas the silhouette index is highest for 2 clusters and the C index is lowest (best) for 2 clusters and gets low again for over 6 clusters. From the 3 indices together it would appear natural to select 2 clusters, for which $\mbox{CH}=108$, $S=0.68$ and $C=0.052$. The cluster $C_1$ has 8 elements, and cluster $C_2$ has 56. \begin{figure}[ht] \centering \includegraphics[width=1.0\textwidth] {fig_indexk3_10-eps-converted-to.pdf} \vskip-0.7cm \caption{Validation indices for clustering $DD_3$ by the number of clusters $nc$: the Calinsky-Harabasz index (left), silhouette coefficient (center) and C-index (right). } \label{fig:indexk3_10} \end{figure} To test the stability of this clustering we follow the approach of Hennig \cite{hennig2008}. We draw a so-called bootstrap sample, which is a random sample with replacement from the 64 objects in the $DD_3$ dataset. This creates a different dataset with 64 objects, some of which coincide. We then apply the same clustering method to it, set to 2 clusters. Let us call the new clusters $D_a$ and $D_b$. Then we compute the so-called Jaccard similarity coefficient of $C_1$ with the new clustering, defined as \begin{equation} J(C_1) = \mbox{max} \Big( \frac{|C_1 \cap D_a|} {|C_1 \cup D_a|}\,, \frac{|C_1 \cap D_b|} {|C_1 \cup D_b|}\Big) \leqslant 1 \label{eq:Jaccard} \end{equation} where $|\ldots|$ stands for the number of elements. A high value $J(C_1)$ indicates that $C_1$ is similar to one of the clusters of the new partition. We compute $J(C_2)$ analogously. Then we repeat this whole procedure for a new bootstrap sample and so on, 200 times in all. The average of the 200 values of $J(C_1)$ equals 0.952, which means that the cluster $C_1$ is very stable. For cluster $C_2$ we attain the stability index $0.978$ which is even higher. \begin{figure}[htb] \centering \includegraphics[width=0.9\textwidth] {figclustk3_2-eps-converted-to.pdf} \vskip-0.3cm \caption{Clustering of the dataset $DD_3$ in clusters $C_1$ and $C_2$. The lag distributions are shown on the left, and the corresponding baselines on the right. Cluster $C_1$ is in black and $C2$ in red.} \label{fig:clustk3_2} \end{figure} Figure \ref{fig:clustk3_2} depicts the clusters $C_1$ and $C_2$. The lag distributions in $C_1$ are flatter than those in $C_2$. It turns out that all the words in $C_1$ contain the dinucleotide CG (known as CpG). In fact, $C_1$ consists exactly of the 8 words of length 3 that contain CG (i.e., ACG, CCG, GCG, TCG, CGA, CGC, CGG, CGT), so $C_2$ contains no words with CG. The special behaviour of the CG dinucleotide in the human genome is well reported in the literature. Although human DNA is generally depleted in the dinucleotide CpG (its occurrence is only 21\% of what would be expected under randomness), the genome is punctuated by regions with a high frequency of CpG's relative to the bulk genome. This DNA characteristic is related to the CpG methylation \cite{international2001,gardiner1987}. We may conclude that the clustering of $DD_3$ has biological relevance. It is worth noting that if one considers all k-means clusterings into 2 to 40 clusters, the second best silhouette coefficient is attained for 26 clusters, which also corresponds to the point where the CH index has a large increase and the C-index is very small ($CH= 436$, $S=0.61$ and $C= 0.0046$). In this partition with 26 clusters, over half of the clusters are formed by pairs of words that are reversed complements of each other, i.e., obtained by reversing the order of the word's symbols and interchanging A-T and C-G. The similarity between lag patterns of reversed complements is a well-known feature described in the literature, see e.g. \cite{tavares2015}. \subsection{Clustering words of length 5} \begin{figure}[ht] \centering \includegraphics[width=0.8\textwidth] {plots_functions_k5-eps-converted-to.pdf} \vskip-0.3cm \caption{Lag distributions of some words of length $k=5$, with the corresponding baselines indicated in red.} \label{fig:plotsk5} \end{figure} Also the lag distributions of $DD_5$ contain quite distinct baselines and peak structures. Figure~\ref{fig:plotsk5} shows four lag distributions, with their corresponding estimated baselines. Our procedure retains 3 principal components for the peaks and 2 components for the baselines, so that each lag distribution is converted into 5 scores. Carrying out k-means clustering for different numbers of clusters yields the plots of validation indices in Figure \ref{fig:indexk5}. They do not all point to the same choice, however. The CH and S indices have local maxima at 2 and 6 clusters, while the C-index would support a choice of 5 or more clusters. It would appear that 2 or 6 clusters are appropriate. \begin{figure}[ht] \centering \includegraphics[width=1.0\textwidth] {fig_indexk5_10-eps-converted-to.pdf} \vskip-0.7cm \caption{Validation indices for clustering $DD_5$ by the number of clusters $nc$: the Calinsky-Harabasz index (left), average silhouette width (center) and C-index (right).} \label{fig:indexk5} \end{figure} When choosing 2 clusters we obtain clusters with 278 and 746 members, and when choosing 6 clusters they have sizes 19, 92, 166, 141, 367 and 239. We verified that both these partitions are very stable. For this we again drew 200 bootstrap samples, and partitioned each of them followed by computing the Jaccard similarity coefficient of the original clusters. In the case of 2 clusters the average Jaccard (stability) indices were 0.94 and 0.97. In the case of 6 clusters they were 0.84, 0.91, 0.93, 0.92, 0.93 and 0.93. Since we aim to decompose the $DD_5$ dataset of 1024 distributions into smaller groups with similar patterns, we will focus on the solution with 6 clusters from here onward. The 6-cluster partition consists of two large clusters ($|C_5|=367$ and $|C_6|= 239$), three middle-sized clusters ($|C_2|= 92$, $|C_3|=166$ and $|C_4|= 141$), and the much smaller cluster $C_3$ with only 19 elements. Figure \ref{fig:clustk5} shows the lag distributions of each cluster. As a graphical summary we also consider the {\it median function} of each cluster, which in each domain point (lag) equals the median of the cluster's function values in that point. \begin{figure*}[htb] \centering \includegraphics[width=\textwidth] {figclustk5_6_compr.pdf} \vskip-0.3cm \caption{Clustering of $DD_5$ in six clusters. In each cluster the lag distributions are shown in grey, and the cluster's median function is in color (top). The median functions are also shown with a scaled vertical axis (bottom).} \label{fig:clustk5} \end{figure*} We see the most pronounced peaks in the clusters $C_1$, $C_3$ and $C_4$. Those in the small cluster $C_1$ are the strongest. Several of them occur in the same location for most of the cluster members, which explains why they remain visible in the median function. The words in $C_1$ are listed in Table \ref{tab:k5_C3}. \begin{table}[htbp] \centering \caption{List of words in cluster $C_1$ of the partition of $DD_5$ in six clusters.} \vskip0.3cm \renewcommand{\arraystretch}{0.9} \setlength\tabcolsep{3.5pt} \normalsize \begin{tabular}{llllll} \toprule AAACG & AACGG & ACGGG & AGCGC & CGAGA & CGCTT \\ CGGGA & CGTTC & CGTTG & CTTCG & GAGGC & GCCTC \\ GCGCT & GCGTT & TCGTA & TCGTT & TCTCG & TTCGT \\ TTTCG\\ \bottomrule \end{tabular} \label{tab:k5_C3} \end{table} The distributions in $C_4$ have most of their peaks before lag 500, with little going on after that. Cluster $C_3$ is quite different, as strong peaks occur over the whole domain. The distributions in clusters $C_2$, $C_5$ and $C_6$ have rather small peaks, so few major irregularities. Their main difference is in the baselines: those of $C_2$ have a high rate $\lambda$, whereas the baselines of $C_6$ are much flatter. We also explore the composition of the words in each cluster, by computing the percentage of words that contain a given dinucleotide or trinucleotide. Clusters $C_1$, $C_2$ and $C_3$ stand out in this respect. Cluster $C_2$ contains the largest proportion of words with the dinucleotides AA (47\%) and TT (49\%), which is also reflected in the high frequency of AAA and TTT (25\% and 26\%, respectively). The clusters $C_1$ and $C_3$ have a lot of words containing the dinucleotide CG (89\% and 98\%). This is very different from the other clusters: only 9\% of the words in $C_2$ contain CG, in $C_4$ this is 11\%, in $C_5$ only 1\%, and in $C_6$ 16\%. Even though both $C_1$ and $C_3$ have many CG dinucleotides, these occur in different trinucleotides: $C_1$ has many words containing CGT and TCG (both 32\%), whereas in $C_3$ many words contain CGA (27\%) and ACG (23\%). \section{Summary and conclusions} In this work we have proposed a methodology for decomposing the lag distribution of a genomic word into the sum of a baseline distribution (the `trend') and a peak function. The baseline component is estimated by robustly fitting a parametric function to the data distribution, in which the residuals are made homoskedastic and the robustness to outliers is essential. The peak function is then obtained by comparing the absolute frequency at each lag to a quantile of a Poisson distribution. When analyzing a dataset consisting of many genomic words we can apply principal component analysis to the set of baselines and the set of peak functions, which greatly reduces the dimensionality. This lower-dimensional data set has uncorrelated scores and retains much of the original information, such as that in the Euclidean distances. This allows us to carry out k-means clustering, in which we have the choice whether to use only the baseline information, only the peak information, or both. The performance of this approach was evaluated by a simulation study, which concluded that in situations where both distinct baselines as well as distinct peak functions occur, the clustering procedure using the combined information performs very well. This procedure was applied to the data set $DD_3$ of all genomic words of 3 symbols in human DNA, as well as the set $DD_5$ of all words of length 5. This resulted in clusters of words with specific distribution patterns. By looking at the composition of the words in each cluster we found connections with the frequency of certain trinucleotides and dinucleotides, such as CG which plays a particular biological role. Topics for further research are the analysis of longer words, and the application of other statistical methods (such as classification) on genomic data after applying the decomposition technique developed here. \vskip0.8cm \noindent{\large{\bf Acknowledgements}} This work was partially supported by the Portuguese Foundation for Science and Technology (FCT), Center for Research \& Development in Mathematics and Applications (CIDMA) and Institute of Biomedicine (iBiMED), within projects UID/MAT/04106/2013 and UID/BIM/04501/ 2013. A. Tavares acknowledges the PhD grant PD/BD/105729/ 2014 from the FCT. The research of P. Brito was financed by the ERDF - European Regional Development Fund through the Operational Programme for Competitiveness and Internationalization - COMPETE 2020 Programme within project POCI-01-0145-FEDER-006961, and by the FCT as part of project UID/EEA/50014/2013. The research of J. \mbox{Raymaekers} and P. J. Rousseeuw was supported by projects of Internal Funds KU Leuven.
\section{Introduction} Recent advances in deep learning and computational resources in addition to new data recordings and sensor technologies have the potential to revolutionize our understanding of the physical world in modern application areas such as image recognition \cite{krizhevsky2012imagenet}, drug discovery \cite{gawehn2016deep}, and bioinformatics \cite{alipanahi2015predicting}. Moreover, many concepts from deep learning can be integrated with classical methods in mathematical physics to help us solve sophisticated data assimilation and inverse problems involving complex dynamical systems. This integration of nonlinear dynamics and deep learning opens the door for principled methods for model construction and predictive modeling. Furthermore, recent developments in \emph{physics-informed deep learning} have enabled us to train deep neural networks with millions of parameters using very few training examples, for cases where the available data are known to respect a given physical law described by a system of partial differential equations \cite{raissi2017physics_I,raissi2017physics_II}. The prior knowledge of an underlying physical law introduces important structure that effectively regularizes the minimization procedure in the training of neural networks, and enables them to generalize well even when only a few training examples are available. An important class of these physical laws govern the fluid motions in nature, which will be the focus of the present work.\\ Quantifying the flow dynamics essentially requires the knowledge of spatio-temporal fluid velocity and pressure fields, and has been the centerpiece of experimental and theoretical fluid mechanics for centuries. Traditionally, this has been achieved by measuring the instantaneous fluid velocity and pressure experimentally, or by solving the governing equations of fluid mechanics in a precisely defined geometry with proper initial and boundary conditions. Despite significant advances in experimental fluid mechanics (e.g., with the emergence of particle image velocimetry), the use of measurements to reliably infer fluid velocity and pressure/stress fields is not a straightforward task. Furthermore, although experimental measurements of external flows (e.g., flow past a bluff object) are obtained relatively easily, albeit in small subdomains, leading to two or even three dimensional vector fields for velocity, the quantification of velocity fields for internal flows (e.g., blood flow in the vascular networks) could become very difficult or impractical. From the theoretical standpoint, the governing equations of fluid mechanics have been derived from conservation laws (i.e., conservation of mass, momentum and energy) leading to partial differential equations such as the well-known Navier-Stokes equations for Newtonian fluids \cite{batchelor2000introduction}. With the increasing computational power, accurate solutions of such equations in a ``forward" setting are now available with lower cost even in the turbulence regime using Direct Numerical Simulations (DNS), hence resolving all energetically important scales down to Kolmogorev dissipation scales. However, the assimilation of experimental fluid mechanics data into the mathematical models to infer velocity and pressure fields in an ``inverse" setting has not been adequately addressed so far. The main objective of this article is to extend and incorporate the aforementioned physics-informed deep learning algorithms \cite{raissi2017physics_I,raissi2017physics_II} to leverage the hidden physics of fluid mechanics to infer the latent quantities of interest (e.g., the velocity and pressure fields) through minimalistic usage of data obtained by the ``passive scalar" transport (e.g., transport of dye or smoke).\\ Let us consider the transport of a passive scalar field $c$ by a velocity field $\bm{u}$. Such a problem arises, for example, while studying the spreading of smoke or dye advected by a given velocity field and subject to molecular diffusion. We expect the dynamics of $c$ to be governed by an effective transport equation \cite{vergassola1997scalar} written in the form of \begin{equation}\label{eq:transC} \rho \left(\partial_t c + \bm{u} \cdot \nabla c \right) = \kappa \nabla^2 c, \end{equation} where $\kappa$ is the molecular diffusivity and $\rho$ is the density. Transport of scalar fields in fluid flow has been studied in numerous applications such as aerodynamics, biofluid mechanics, and non-reactive flow mixing to name a few. The use of smoke in wind tunnels or dye in water tunnels for flow visualization and quantification has long been practiced in experimental fluid mechanics \cite{barlow2015low}. Moreover, recent techniques in planar laser induced fluorescence imaging combined with particle image velocimetry have been developed to assess the relationships between scalar and velocity/vorticity fields \cite{koochesfahani1985laser,crimaldi2008planar}. The use of scalar transport in conjunction with advanced imaging modalities to quantify blood flow in the vascular networks is now a common practice. For example, coronary computed tomography (CT) angiography is typically performed on multidetector CT systems after the injection of non-diffusible iodine contrast agent, which allows coronary artery visualization and the detection of coronary stenoses \cite{voros2011coronary}. Another example is the quantification of cerebral blood flow, which is detrimental in the prognostic assessments in stroke patients using a contrast agent and perfusion CT \cite{wintermark2002prognostic}, and in cognitive neuroscience with the use of functional magnetic resonance imaging that only relies on the blood-oxygen-level dependent contrast to measure brain activity \cite{aron2007triangulating}.\\ Inspired by recent developments in \emph{physics-informed deep learning} \cite{raissi2017physics_I,raissi2017physics_II} and \emph{deep hidden physics models} \cite{raissi2018deep}, we propose to leverage the hidden physics of fluid mechanics (i.e., the Navier-Stokes equations) and infer the latent quantities of interest (e.g., the velocity and pressure fields) by approximating them using deep neural networks. This choice is motivated by modern techniques for solving forward and inverse problems associated with partial differential equations, where the unknown solution is approximated either by a neural network \citep{raissi2017physics_I,raissi2017physics_II,raissi2018forwardbackward,raissi2018multistep} or a Gaussian process \citep{raissi2018numerical,raissi2018hidden,raissi2017inferring,raissi2017machine,raissi2017parametric,perdikaris2017nonlinear,raissi2016deep}. Moreover, placing a prior on the solution itself is fully justified by the similar approach pursued in the past century using classical methods of solving partial differential equations such as finite elements and spectral methods, where one would expand the unknown solution in terms of an appropriate set of basis functions. Our focus here is the transport of a passive scalar by incompressible Newtonian flows in both unbounded geometries (i.e., external flows) and confined internal flows. We demonstrate the success of our Navier-Stokes informed deep learning algorithm by recovering the flow velocity and pressure fields solely from time series data collected on the passive scalar in arbitrary domains. \section{Problem Setup and Solution Methodology} Starting with the transport equation \eqref{eq:transC}, we can rewrite it in the following non-dimensional form \begin{equation}\label{eq:C} c_t + u c_x + v c_y + w c_z = \text{\footnotesize Pec}^{-1} (c_{xx} + c_{yy} + c_{zz}), \end{equation} which governs the evolution of the normalized concentration $c(t,x,y,z)$ of a passive scalar transported by an incompressible Newtonian fluid whose dynamics are described by the Navier-Stokes and continuity equations (also non-dimensional) given below \begin{equation}\label{eq:NS} \begin{array}{l} u_t + u u_x + v u_y + w u_z = - p_x + \text{\footnotesize Re}^{-1} (u_{xx} + u_{yy} + u_{zz}),\\ v_t + u v_x + v v_y + w v_z = - p_y + \text{\footnotesize Re}^{-1} (v_{xx} + v_{yy} + v_{zz}),\\ w_t + u w_x + v w_y + w w_z = - p_z + \text{\footnotesize Re}^{-1} (w_{xx} + w_{yy} + w_{zz}),\\ u_x + v_y + w_z = 0. \end{array} \end{equation} In equations \eqref{eq:C} and \eqref{eq:NS}, $u$, $v$, and $w$ are the $x$, $y$, and $z$ components of the velocity field $\bm{u}=(u,v,w)$, respectively, and $p$ denotes the pressure. A passive scalar is a diffusive field in the fluid flow that has no dynamical effect (such as the effect of temperature in a buoyancy-driven flow) on the fluid motion itself. Smoke and dye are two typical examples of passive scalars. Here, Re represents the Reynolds number, a dimensionless quantity in fluid mechanics, and Pec denotes the P\'{e}clet number, a dimensionless quantity relevant in the study of transport phenomena in flowing fluids. In this work, we assume that the only observables are noisy data $\{t^n,x^n,y^n,z^n,c^n\}_{n=1}^N$ on the concentration $c(t,x,y,z)$ of the passive scalar. Given such data, scattered in space and time, we are interested in inferring the latent (hidden) quantities $u(t,x,y,z)$, $v(t,x,y,z)$, $w(t,x,y,z)$, and $p(t,x,y,z)$. To solve the aforementioned data assimilation problem, we would like to design an algorithm that is agnostic to the geometry as well as the initial and boundary conditions. This is enabling as it will give us the flexibility to work with data acquired in arbitrarily complex domains such as human arteries or brain aneurysms.\\ One question that would naturally arise is whether the information on the passive scalar in the training domain and near its boundaries is sufficient to result in a unique velocity field. The answer is that normally there are no guarantees for unique solutions unless some form of boundary conditions are explicitly imposed on the domain boundaries. However, as shown later for the benchmark problems studied in the current work, an informed selection of the training boundaries in the regions where there are sufficient gradients in the concentration of the passive scalar would eliminate the requirement of imposing velocity and pressure boundary conditions. In addition to the proper design of the training domain and the use of the passive scalar $c$, we can improve the model predictions further by introducing an auxiliary variable $d := 1-c$ (essentially the complement of $c$) that satisfies the transport equation \begin{equation}\label{eq:D} d_t + u d_x + v d_y + w d_z = \text{\footnotesize Pec}^{-1} (d_{xx} + d_{yy} + d_{zz}). \end{equation} This can be clearly seen by a change of variable from $c$ to $d = 1-c$ and using equation \eqref{eq:C}. The complementary nature of the auxiliary variable $d$ helps the algorithm better detect the geometry and the corresponding boundary conditions. This makes the training algorithm agnostic to the physical geometry of the problem, hence, keeping the implementation and training significantly simpler. In addition, the region of interest becomes very flexible to be chosen with its boundaries no longer required to be the physical boundaries. Another advantage of the use of $d$ is the improvement in the accuracy of the algorithm predictions with no additional cost.\\ \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{BestPhILM.png} \caption{\emph{Navier-Stokes informed neural networks:} A plain vanilla densely connected (physics uninformed) neural network, with 10 hidden layers and 50 neurons per hidden layer per output variable (i.e., $6 \times 50 = 300$ neurons per hidden layer), takes the input variables $t, x, y, z$ and outputs $c, d, u, v, w$, and $p$. As for the activation functions, we use $\sigma(x) = \sin(x)$. For illustration purposes only, the network depicted in this figure comprises of 2 hidden layers and 7 neurons per hidden layers. We employ automatic differentiation to obtain the required derivatives to compute the residual (physics informed) networks $e_1$, $e_2$, $e_3$, $e_4$, $e_5$, and $e_6$. If a term does not appear in the blue boxes (e.g., $u_{xy}$ or $u_{tt}$), its coefficient is assumed to be zero. It is worth emphasizing that unless the coefficient in front of a term is non-zero, that term is not going to appear in the actual ``compiled" computational graph and is not going to contribute to the computational cost of a feed forward evaluation of the resulting network. The total loss function is composed of the regression loss of the passive scalar $c$ and its complement $d$ on the training data, and the loss imposed by the differential equations $e_1 - e_6$. Here, $I$ denotes the identity operator and the differential operators $\partial_t, \partial_x, \partial_y$, and $\partial_z$ are computed using automatic differentiation and can be thought of as ``activation operators". Moreover, the gradients of the loss function are backpropogated through the entire network to train the parameters using the Adam optimizer.}\label{fig:BestPhILM} \end{figure} Following our earlier work on physics-informed deep learning \cite{raissi2017physics_I, raissi2017physics_II} and \emph{deep hidden physics models} \cite{raissi2018deep}, we approximate the function \[ (t,x,y,z) \longmapsto (c,d,u,v,w,p) \] by a deep neural network and obtain the following \emph{Navier-Stokes informed neural networks} (see figure \ref{fig:BestPhILM}) corresponding to equations \eqref{eq:C}, \eqref{eq:NS}, and \eqref{eq:D}; i.e., \begin{equation}\label{eq:NN} \begin{array}{l} e_1 := c_t + u c_x + v c_y + w c_z - \text{\footnotesize Pec}^{-1} (c_{xx} + c_{yy} + c_{zz}),\\ e_2 := d_t + u d_x + v d_y + w d_z - \text{\footnotesize Pec}^{-1} (d_{xx} + d_{yy} + d_{zz}),\\ e_3 := u_t + u u_x + v u_y + w u_z + p_x - \text{\footnotesize Re}^{-1} (u_{xx} + u_{yy} + u_{zz}),\\ e_4 := v_t + u v_x + v v_y + w v_z + p_y - \text{\footnotesize Re}^{-1} (v_{xx} + v_{yy} + v_{zz}),\\ e_5 := w_t + u w_x + v w_y + w w_z + p_z - \text{\footnotesize Re}^{-1} (w_{xx} + w_{yy} + w_{zz}),\\ e_6 := u_x + v_y + w_z. \end{array} \end{equation} We acquire the required derivatives to compute the residual networks $e_1$, $e_2$, $e_3$, $e_4$, $e_5$, and $e_6$ by applying the chain rule for differentiating compositions of functions using automatic differentiation \cite{baydin2015automatic}. A schematic representation of the resulting \emph{Navier-Stokes informed neural networks} is given in figure \ref{fig:BestPhILM}. It is worth emphasizing that automatic differentiation is different from, and in several respects superior to, numerical or symbolic differentiation -- two commonly encountered techniques of computing derivatives. In its most basic description \cite{baydin2015automatic}, automatic differentiation relies on the fact that all numerical computations are ultimately compositions of a finite set of elementary operations for which derivatives are known. Combining the derivatives of the constituent operations through the chain rule gives the derivative of the overall composition. This allows accurate evaluation of derivatives at machine precision with ideal asymptotic efficiency and only a small constant factor of overhead. In particular, to compute the required derivatives we rely on Tensorflow \cite{abadi2016tensorflow}, which is a popular and relatively well documented open-source software library for automatic differentiation and deep learning computations. In TensorFlow, before a model is run, its computational graph is defined statically rather than dynamically as for instance in PyTorch \cite{paszke2017automatic}. This is an important feature as it allows us to create and compile the computational graph for the Navier-Stokes informed neural networks \eqref{eq:NN} only once and keep it fixed throughout the training procedure. This leads to significant reduction in the computational cost of the proposed framework.\\ The shared parameters of the neural networks for $c$, $d$, $u$, $v$, $w$, and $p$ can be learned by minimizing the following sum of squared errors loss function \begin{eqnarray}\label{SSE} SSE &=& \sum_{n=1}^N |c(t^n,x^n,y^n,z^n) - c^n|^2 \nonumber\\ &+& \sum_{n=1}^N |d(t^n,x^n,y^n,z^n) - d^n|^2 \\ &+& \sum_{i=1}^6 \sum_{n=1}^N |e_i(t^n,x^n,y^n,z^n)|^2.\nonumber \end{eqnarray} Here, $d^n = 1 - c^n$ and the first two terms correspond to the training data on the concentration $c(t,x,y,z)$ of the passive scalar while the last term enforces the structure imposed by equations \eqref{eq:C}, \eqref{eq:NS}, and \eqref{eq:D} at a finite set of measurement points whose number and locations are taken to be the same as the training data. However, it should be pointed out that the number and locations of the points on which we enforce the set of partial differential equations could be different from the actual training data. Although not pursued in the current work, this could significantly reduce the required number of training data on the concentration of the passive scalar. \section{Results} To generate high-resolution datasets for different benchmark problems studied in the current work, we have employed the spectral/hp-element solver NekTar in which the Navier-Stokes equations \eqref{eq:NS} along with the transport equation \eqref{eq:C} are approximated using high-order semi-orthogonal Jacobi polynomial expansions \cite{karniadakis2013spectral}. The numerical time integration is performed using a third-order stiffly stable scheme until the system reaches its stationary state. In what follows, a small portion of the resulting dataset corresponding to this stationary solution will be used for model training, while the remaining data will be used to validate our predictions. Our algorithm is agnostic to the choice of initial and boundary conditions as well as the geometry. However, we choose to provide this information for every benchmark problem for the sake of completeness and reproducibility of the numerically generated data. Moreover, all data and codes used in this manuscript are publicly available on GitHub at \url{https://github.com/maziarraissi/HFM}.\\ To obtain the results reported in the remainder of this manuscript, we represent each of the functions $c$, $d$, $u$, $v$, $w$, and $p$ by a 10-layer deep neural network with 50 neurons per hidden layer (see figure \ref{fig:BestPhILM}). As for the activation functions, we use $\sin(x)$. In general, the choice of a neural network's architecture (e.g., number of layers/neurons and form of activation functions) is crucial and in many cases still remains an art that relies on one's ability to balance the trade off between \emph{expressivity} and \emph{trainability} of the neural network \citep{raghu2016expressive}. Our empirical findings so far indicate that deeper and wider networks are usually more expressive (i.e., they can capture a larger class of functions) but are often more costly to train (i.e., a feed-forward evaluation of the neural network takes more time and the optimizer requires more iterations to converge). Moreover, the sinusoid (i.e., $\sin(x)$) activation function seems to be numerically more stable than $\tanh(x)$, at least while computing the residual neural networks $e_i$, $i=1,\ldots,6$ (see equation \eqref{eq:NN}). However, these observations should be interpreted as conjectures rather than as firm results\footnote{We encourage the interested reader to check out the codes corresponding to this paper on GitHub at \url{https://github.com/maziarraissi/HFM} and experiment with different choices for the neural networks' architectures.}. In this work, we have tried to choose the neural networks' architectures in a consistent fashion throughout the manuscript. Consequently, there might exist other architectures that could possibly improve some of the results reported in the current work.\\ As for the training procedure, our experience so far indicates that while training deep neural networks, it is often useful to reduce the learning rate as the training progresses. Specifically, the results reported in the following are obtained after $250$, $500$, and $250$ consecutive epochs of the Adam optimizer \cite{kingma2014adam} with learning rates of $10^{-3}$, $10^{-4}$, and $10^{-5}$, respectively. Each epoch corresponds to one pass through the entire dataset. The total number of iterations of the Adam optimizer is therefore given by $1000$ times the number of data divided by the mini-batch size. The mini-batch size we used is $10000$ and the number of data points are clearly specified in the following on a case by case basis. Every $10$ iterations of the optimizer takes around $1.9$ and $3.8$ seconds, respectively, for two and three dimensional problems on a single NVIDIA Titan X GPU card. \subsection{External flows} As a first example, we consider the prototypical problem of a two dimensional flow past a circular cylinder, known to exhibit rich dynamic behavior and transitions for different regimes of the Reynolds number $\text{Re} = U_{\infty} D/\nu$. Assuming a non-dimensional free stream velocity $U_{\infty} = 1$, cylinder diameter $D = 1$, and kinematic viscosity $ \nu = 0.01$, the system exhibits a periodic steady state behavior characterized by an asymmetrical vortex shedding pattern in the wake of the cylinder, known as the K\'{a}rm\'{a}n vortex street \cite{batchelor2000introduction}. Importantly, the passive scalar is injected at the inlet within the interval [-2.5, 2.5] using a step function (see figure \ref{fig:cylinder_2D_flower}). The choice of this boundary condition only depends on the region of interest in which velocity and pressure fields are inferred using the concentration field. Furthermore, a constant value of diffusivity for the passive scalar is assumed to be given by $\kappa = 0.01$ resulting in $\text{Pec} = U_{\infty} \kappa/\nu = 100$. Here, we use zero-slip and zero-concentration boundary conditions on the cylinder wall. Whereas the P\'eclet number is chosen to be equal to the Reynolds number, there is no restriction on its value as shown for the internal flow benchmark problem. Physically, for the flow of gases such as air with smoke as a passive scalar $\text{Pec} \approx \text{Re}$. This is not, however, the case for liquid flows with dye as the passive scalar since diffusivity of dyes are typically smaller than most fluids, which leads to higher P\'eclet numbers.\\ \begin{figure}[!t] \centering \includegraphics[width=0.8\textwidth]{Cylinder2D_flower_data.png} \caption{\emph{2D Flow past a circular cylinder:} 2D sketch of the simulation domain in which data on the concentration field is generated. We have assumed a uniform free stream velocity profile at the left boundary, a zero pressure outflow condition imposed at the right boundary located $30D$ $(D=1)$ downstream of the cylinder, and periodicity for the top and bottom boundaries of the $[-10,30]\times[-10,10]$ domain. The passive scalar is injected at the inlet from [-2.5, 2.5]. A completely arbitrary training domain in the shape of a flower is depicted in the wake of the cylinder. No information on the velocity is given for this training domain. Another training domain is also shown by a rectangle that includes the cylinder. Information on the velocity is only given on the left boundary of the rectangular domain shown by the dashed line.}\label{fig:cylinder_2D_flower} \end{figure} A representative snapshot of the input data on the concentration field is shown in figure \ref{fig:cylinder_2D_flower}. As illustrated in this figure, the shape and extent of the boundaries of the training domains that we choose for our analysis could be \emph{arbitrary} and may vary by problem. However, it should be pointed out that there are two important factors that need to be considered when choosing the training domain. First, the concentration field of the passive scalar must be present within the training domain, such that its information can be used to infer other flow variables. Second, to avoid the need for specifying appropriate boundary conditions for velocities, there must exist enough concentration gradient normal to the boundaries (i.e., $\partial c/\partial n \neq 0$) in order for our method to be able to infer a unique solution for the velocity field. As shown in figure \ref{fig:cylinder_2D_flower_results}, excellent agreement can be achieved between the predictions of our algorithm and the exact data within a completely arbitrary training domain downstream of the cylinder, while the inclusion of auxiliary variable $d=1-c$ can improve the accuracy of predictions further (see figure \ref{fig:Cylinder2D_flower_results_errors}). Here, no input information other than the concentration field for the passive scalar $c$ is passed to the algorithm.\\ \begin{figure}[!t] \includegraphics[width=\textwidth]{Cylinder2D_flower_results.png} \caption{\emph{2D Flow past a circular cylinder:} A representative snapshot of the input data on the concentration of the passive scalar is shown in the top left panel of this figure, where on the right the same concentration field is reconstructed based on the predictions of our algorithm. The algorithm is capable of accurately reconstructing the velocity $u, v$ and the pressure $p$ fields shown in the third row. The exact velocity and pressure fields at the same point in time are plotted for comparison in the second row. Note that the pressure is off by a constant since this is an incompressible flow.}\label{fig:cylinder_2D_flower_results} \end{figure} \begin{figure}[!t] \includegraphics[width=\textwidth]{Cylinder2D_flower_results_errors.png} \caption{\emph{2D Flow past a circular cylinder:} Relative $L_2$ errors between predictions of the model and the corresponding exact concentration, velocity, and pressure fields for the arbitrary training domain downstream of the cylinder. 31 million data points, scattered in space and time, are used both to regress the concentration field and enforce the corresponding partial differential equations. Furthermore, the training is performed with the auxiliary variable $d$ (blue line) and without $d$ (red dashed line) for comparison.}\label{fig:Cylinder2D_flower_results_errors} \end{figure} Next, we choose the region of interest to contain the cylinder (see the rectangular domain in figure \ref{fig:cylinder_2D_flower}) so that the fluid forces acting on the cylinder can be inferred. As shown in figure \ref{fig:cylinder_2D_Pec100_included_results}, the algorithm is capable of accurately reconstructing the velocity and the pressure fields without having access to sufficient observations of these fields themselves. Note that we use a very small training domain that cannot be used in classical computational fluid dynamics to obtain accurately the Navier-Stokes solutions. It should be emphasized that other than the velocity on the left boundary, no other boundary conditions are given to the algorithm. We need to impose a Dirichlet boundary condition for the velocity at the left boundary simply because the observations of the concentration are not providing sufficient information (i.e., gradients) in front of the cylinder. More notably, there is no need to impose the no-slip condition on the cylinder wall. The presence of the normal concentration gradient naturally allows our algorithm to infer the zero velocity condition on the walls. In regards to the predicted pressure field, we note that due to the nature of the Navier-Stokes equations for incompressible flows, the pressure field is only identifiable up to a constant.\\ \begin{figure}[!t] \includegraphics[width=\textwidth]{Cylinder2D_results.png} \caption{\emph{2D Flow past a circular cylinder:} A representative snapshot of the input data on the concentration of the passive scalar is shown in the top left panel of this figure, where on the right the same concentration field is reconstructed based on the predictions of our algorithm. The algorithm is capable of accurately reconstructing the velocity $u, v$ and the pressure $p$ fields shown in the third row. The exact velocity and pressure fields at the same point in time are plotted for comparison in the second row. Note that the pressure is off by a constant since this is an incompressible flow.}\label{fig:cylinder_2D_Pec100_included_results} \end{figure} The learned pressure and velocity fields can be used to obtain the lift and drag forces exerted on the cylinder by the fluid as shown in figure \ref{fig:lift_drag}. The fluid forces on the cylinder are functions of the pressure and velocity gradients. Consequently, having trained the neural networks, we can use \begin{eqnarray*} F_L = \oint \left[-p n_y + 2 \text{\footnotesize Re}^{-1} v_y n_y + \text{\footnotesize Re}^{-1} \left(u_y + v_x\right)n_x\right]ds,\\ F_D = \oint \left[-p n_x + 2 \text{\footnotesize Re}^{-1} u_x n_x + \text{\footnotesize Re}^{-1} \left(u_y + v_x\right)n_y\right]ds, \end{eqnarray*} to obtain the lift and drag forces, respectively. Here, $\bm{n} = (n_x,n_y)$ is the outward normal on the cylinder and $ds$ is the arc length on the surface of the cylinder. We use the trapezoidal rule to approximately compute these integrals. Interestingly, the predicted lift and drag forces are in excellent agreement with the exact ones, both in terms of the frequency of oscillations and the amplitude. The resulting error is within 1\% of the test data. Some discrepancy, however, can be observed for the few initial and final time instants, which can be attributed to the lack of data. This can be further clarified by the relative $\mathcal{L}_2$-norm of error results shown in figure \ref{fig:Cylinder2D_results_errors}. Lack of training data on $c$ for $t < 0$ and $t > 16$ leads to weaker neural network predictions for the initial and final time instants. Thus, one should take this into consideration when inference is required within a certain time interval. Note that to compute lift and drag forces, the gradient of the velocity has to be computed on the wall, which can be done analytically using the parametrized surrogate velocity field (i.e., the neural networks). Although no numerical differentiation is needed to compute the gradients, the integration of forces on the surface of the cylinder is approximated by a summation.\\ \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{Cylinder2D_results_lift_drag.png} \caption{\emph{Non-dimensional lift and drag forces on 2D cylinder:} Comparison between the exact (spectral element solution) and predicted lift (left) and drag (right) forces per unit length of the cylinder.}\label{fig:lift_drag} \end{figure} In addition to the velocity and pressure fields, it is possible to discover other unknown parameters of the flow field such as the Reynolds and P\'{e}clet numbers. Although these parameters were prescribed in the 2D flow past the cylinder example, we have tested a case in which both parameters are free to be learned by the algorithm. The results are given in table \ref{tab:cylinder_2D_RePec}, which shows very good agreement with the exact values. From the practical standpoint, the passive scalar diffusivity and the fluid viscosity (hence, their ratio i.e., the Prandtl number $\text{Pr} \equiv \nu/\kappa$) may be known in advance. Therefore, discovering the Reynolds number would be sufficient whereas the P\'{e}clet number can be computed by Pec = Re Pr.\\ \begin{figure}[!t] \includegraphics[width=\textwidth]{Cylinder2D_results_errors.png} \caption{\emph{2D Flow past a circular cylinder:} Relative $L_2$ errors between predictions of the model and the corresponding exact concentration, velocity, and pressure fields for the rectangular training domain that contains the cylinder. 2.8 million data points scattered within the training domain and in time are used for both regressing the concentration field and enforcing the corresponding partial differential equations.}\label{fig:Cylinder2D_results_errors} \end{figure} \begin{table} \caption{\emph{2D flow past a circular cylinder:} Learned Reynolds and P\'{e}clet numbers considered as free parameters of the model.}\label{tab:cylinder_2D_RePec} \begin{center} \footnotesize \begin{tabular}{ |c|c|c|c| } \hline & Exact & Learned & Rel. Error \\ \hline \hline Pec & 100 & 92.39 & 7.60\% \\ \hline Re & 100 & 92.47 & 7.52\% \\ \hline \end{tabular} \end{center} \end{table} The previous benchmark example was a two-dimensional (2D) flow, where we could safely neglect the $z$-coordinate and $w$-component of the velocity from the input and output variables, respectively. For the flow past a cylinder, if we simply increase the Reynolds number beyond a threshold value of $\approx 185$ \cite{ma2002low}, the spanwise velocity $w$ becomes more prominent due to the effect of the so-called ``vortex stretching'' \cite{batchelor2000introduction,karniadakis1992three}. To test the capability of the proposed algorithm in inferring three-dimensional (3D) flow fields, we design another prototype problem of the 3D flow past a finite-size circular cylinder confined between two parallel plates as shown in figure \ref{fig:cylinder3d}, where similar to the previous example, we set $\text{Re} = \text{Pec} = 100$. Downstream of the cylinder, the flow exits to an open region, which causes strong 3D effects in the wake of the cylinder. Hence, we set the training domain in the wake of cylinder.\\ \begin{figure}[!t] \centering \includegraphics[width=0.7\textwidth]{cylinder3d.png} \caption{\emph{3D flow past a circular cylinder:} 3D sketch for the prototypical problem of flow past a circular cylinder of diameter $D = 1$. Two parallel planes are located $10D$ apart along the $z-$axis. Flow is bounded between the plates for $10D$ along $x-$axis. Periodic boundary conditions are prescribed parallel to the $xz$ plane at $y = -10$ and $10$, and parallel to the $xy$ plane at $z = 0$ and $10$ starting from the location where the walls end. All the physical boundaries are shown in black, whereas the gray box located behind the cylinder shows the domain of interest where model training is performed. Zero-Neumann boundary conditions are imposed for velocities and concentration along with zero pressure at the outflow located $30D$ downstream of the cylinder. A uniform $U_{\infty} = 1$ is imposed at the inlet located $8D$ upstream of the cylinder. Passive scaler is injected at the inlet through a finite region $[-2.5, 2.5]\times[0, 10]$. Zero-velocity and concentration boundary conditions are imposed on each physical boundary. Note that no information on the surfaces of the training (gray box) domain is given.}\label{fig:cylinder3d} \end{figure} A representative snapshot of the input data on the concentration field in the wake of the cylinder is plotted in the top left panel of figure \ref{fig:cylinder_3D_Pec100_results}. The iso-surfaces for all of the fields are also plotted for comparison between the exact data and the predictions of our algorithm. The algorithm is capable of accurately reconstructing the velocity and the pressure fields without having access to any observations of these fields. In particular, no information on the velocity is given on the boundaries of the domain of interest in the training phase. Qualitative comparison between the predictions of our algorithm and the exact data shows good agreement for 3D flows as well, however, the relative $\mathcal{L}_2$-norm errors for velocity and pressure fields are slightly higher than the values for the 2D flow predictions as shown in figure \ref{fig:Cylinder3D_errors}. Similar to 2D results, the neural network training lack sufficient data for the initial and final time instants that leads to larger errors in the predictions. \begin{figure}[!t] \centering \includegraphics[width=0.8\textwidth]{cylinder_3D_Pec100_results.png} \caption{\emph{3D flow past a circular cylinder:} The iso-surfaces of exact data and the predictions of our algorithm on the concentration of the passive scalar are shown in top row for a representative time instant within the selected training domain. Using the information on the concentration only, the velocity fields $u, v, w$ are inferred, are shown in the third row, and are compared with the exact data in the second row. In addition, the exact and predicted pressure $p$ fields are plotted in the last row. Note the range of contour levels are set equal between the exact and predicted iso-surfaces of concentration fields and velocity components for better comparison.}\label{fig:cylinder_3D_Pec100_results} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.9\textwidth]{Cylinder3D_errors.png} \caption{\emph{3D flow past a circular cylinder:} Relative $L_2$ errors between predictions of the model and the corresponding exact concentration, velocity, and pressure fields. 37 million data points scattered within the training box and in time are used for both regressing the concentration field and enforcing the corresponding partial differential equations.}\label{fig:Cylinder3D_errors} \end{figure} \subsection{Internal flows} We now turn our attention to an important class of flows in confined geometries also known as ``internal flows". While measuring average flow velocity and pressure in ducts, pipes and even blood vessels is now a common practice, quantifying the spatial fields, specifically the shear stresses on the boundaries, is not a trivial task. The first benchmark problem considered here is the transient flow over an obstacle in a 2D channel as shown in figure \ref{fig:Stenosis2D_data}. To make the flow unsteady, we impose a velocity waveform at the inlet of the channel. Passive scalar value on the boundaries is set to zero, where the boundaries are assumed to be impenetrable. It is clear that the auxiliary variable $d := 1-c$ is equal to one on the channel boundaries. In other words, while the passive scalar concentration $c$ is convected downstream from the inflow, the complement scalar $d$ is ``virtually" infused from the boundaries to the flow stream as shown in figure \ref{fig:Stenosis2D_data}. The presence of the obstacle breaks the symmetry in the flow for which analytical solutions do not exist. Thus, to estimate the velocity field, direct measurements or forward numerical simulations are required.\\ A representative snapshot of the input data on the concentration field along with its neural network approximation are depicted in the top panel of figure \ref{fig:stenosis_2D_included_results}. As shown in figure \ref{fig:stenosis_2D_included_results}, predictions of the algorithm for velocity and pressure fields are in excellent agreement with the exact data. Note that no information for velocity is given on the boundaries of the channel or the obstacle. It should be mentioned that while the concentration gradients normal to the physical boundaries are sufficient to infer the flow variables without the knowledge of the boundary conditions (i.e., no-slip velocity on the wall), the \emph{free} information from the auxiliary variable $d$ in addition to $c$ helps the algorithm improve the accuracy of predictions (shown in figure \ref{fig:Stenosis2D_results_errors}) at practically no additional cost.\\ \begin{figure}[ht] \centering \includegraphics[width=\textwidth]{Stenosis2D_data.png} \caption{\emph{2D channel flow over an obstacle:} Contours of the concentration field within a 2D channel at a representative time instant. A pulsatile velocity profile $u(t)$ ($v=0$) is imposed at the inlet (shown as the inset on the left), and a uniform concentration $c = 1$ for the passive scalar is injected to the channel. At the outlet, a zero-Neumann boundary condition for the velocity and concentration is considered, while the pressure is set to zero. Furthermore, the velocity and concentration on the walls are set to zero. The flow $\text{Re} = \bar{U} H/\nu = 60$ is calculated based on the mean inflow velocity $\bar{U}=1$ and channel hight $H=12$, whereas we choose a smaller diffusion constant for the passive scalar leading to higher $\text{Pec} = \bar{U} H/\kappa = 180$. The training domain (white rectangle) is considered to contain the obstacle with the upper and lower boundaries being the physical wall boundaries. Also shown are contours of the auxiliary variable $d$, which signifies the important role of this variable in helping the algorithm detect the boundaries of the training domain.}\label{fig:Stenosis2D_data} \end{figure} One of the real-world examples of the above benchmark problem is encountered in cardiovascular fluid mechanics, where one or multiple coronary arteries are partially blocked by atherosclerosis plaques formed by the lipid accumulation \cite{hansson2005inflammation}. An accurate prognosis of these ``stenotic'' vessels is an extremely important step in the treatment planning and decision-making process for patients with cardiovascular disease \cite{budoff2008diagnostic}. Direct measurements of pressure in the vessel is invasive and bears high risk, whereas computational fluid modeling of blood in the coronaries requires correct reconstruction of the geometry as well as the knowledge of all the inflow/outflow boundary conditions. The proposed inverse approach to infer the velocity and pressure fields with the use of a passive scalar, however, offers a promising alternative to the conventional methods. Here, the passive scalar could be the bolus dye that is typically injected to the blood stream for the purpose of blood flow monitoring and medical imaging.\\ \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{Stenosis2D_results.png} \caption{\emph{2D channel flow over an obstacle:} A representative snapshot of the input data on the concentration field within the training domain is plotted in the top left panel alongside the prediction of our algorithm. The algorithm is capable of accurately reconstructing the velocity and the pressure fields without having access to any observations of these fields (shown in the second and third rows). Furthermore, no boundary conditions are specified on the boundaries of the training domain including the physical wall boundaries.}\label{fig:stenosis_2D_included_results} \end{figure} Using the predicted velocity fields, we are able to compute shear stresses everywhere in the training domain. Of particular interest are wall shear stresses, which can be computed using the following equations in 2D; \[ \begin{array}{l} \tau_{x} = 2 \text{\footnotesize Re} \left[u_x n_x + \frac{1}{2}(v_x + u_y)n_y\right],\\ \tau_{y} = 2 \text{\footnotesize Re} \left[\frac{1}{2}(u_y + v_x) n_x + v_y n_y\right]. \end{array} \] Here, $\bm{n} = (n_x,n_y)$ is the outward normal on the boundary of the domain. Note that to compute wall shear stresses $\bm{\tau} = (\tau_{x}, \tau_{y})$, the gradient of the velocity is required, which can be computed using automatic differentiation. Wall shear stresses are important quantities of interest in many biological processes e.g., in the pathogenesis and progression of vascular diseases that cause aortic aneurysms. Here, we have estimated the temporal wall shear stress magnitudes, $\text{WSS}(x,t) = \sqrt[]{\tau_{x}^2 + \tau_{y}^2}$, acting on the lower wall using the predictions of neural networks for the 2D channel flow over the obstacle, and plotted them against the results from the spectral/hp element solver in figure \ref{fig:Stenosis2D_results_shears}. The results show excellent agreement between the predictions and numerical estimations. Note that the numerical estimations suffer from a slight aliasing effect (noisy oscillations in the $x$ direction) for which dealiasing is required to retrieve a smooth distribution of wall shear stresses. Interestingly, the neural networks prediction is smooth as the velocity gradients of a parameterized velocity field are taken analytically. Furthermore, similar to the previous benchmark problems, slight discrepancies can be observed close to the initial and final times ($t \sim 0,\ 20$) due to the lack of training data. This is further explained in figure \ref{fig:Stenosis2D_results_errors}, where relative $\mathcal{L}_2$-norm of errors in the velocity fields show a peak close to the initial and final time instants out of the entire prediction time interval. Also shown in the figure is the enhancement in the model prediction accuracy when the auxiliary variable $d$ is used as opposed to when $d$ is not included during the training phase.\\ \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{Stenosis2D_results_shears.png} \caption{\emph{2D channel flow over an obstacle:} Wall shear stress magnitude, $\text{WSS}(x,t)$, computed on the lower wall ($15 \leq x \leq 55$) in the training domain of figure \ref{fig:Stenosis2D_data} as a function of time ($0 \leq t \leq 20$). Strong wall shear stress values are observed on the surface of the cylinder ($25 \leq x \leq 35$). The plot also shows the periodicity in the flow field.}\label{fig:Stenosis2D_results_shears} \end{figure} Similar to the external flow problem past the cylinder, the algorithm is able to learn the Reynolds and P\'{e}clet numbers as free parameters. The predicted values of these two parameters are given in table \ref{tab:Stenosis2D_RePec}, which shows excellent agreement with the exact values. Note that unlike the flow past the cylinder, the physical Re and Pec numbers are not the same. Remarkably, the algorithm is capable of inferring the underlying physics without knowledge of initial and boundary conditions and physical boundaries, where the information is provided only on the transported passive scalar.\\ \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{Stenosis2D_results_errors.png} \caption{\emph{2D channel flow over an obstacle:} Relative $L_2$ errors between predictions of the model and the corresponding exact concentration, velocity, and pressure fields. 10 million data points scattered within the training domain and in time are used for both regressing the concentration field and enforcing the corresponding partial differential equations. Furthermore, the training is performed with the auxiliary variable $d$ (blue line) and without $d$ (red dashed line) for comparison.}\label{fig:Stenosis2D_results_errors} \end{figure} \begin{table}[!t] \caption{\emph{2D channel flow over an obstacle:} Learned Reynolds and P\'{e}clet numbers considered as free parameters of the model.}\label{tab:Stenosis2D_RePec} \begin{center} \footnotesize \begin{tabular}{ |c|c|c|c| } \hline & Exact & Learned & Rel. Error \\ \hline \hline Pec & 180 & 178.95 & 0.58\% \\ \hline Re & 60 & 59.92 & 0.12\% \\ \hline \end{tabular} \end{center} \end{table} To further illustrate the implications of the \emph{Navier-Stokes informed neural networks} in addressing real-world problems, we consider 3D physiologic blood flow in a realistic intracranial aneurysm (ICA) shown in figure \ref{fig:ICA_data}. The aneurysm is located in the cavernous segment of the right internal carotid artery at the level of the eye and beneath the brain \cite{baek2012convergence}. Exact concentration fields are generated numerically using realistic boundary conditions, which is a physiologic flow waveform at the inlet along with a uniform concentration for the passive scalar. The strength of the proposed algorithm is its ability to stay agnostic with respect to the geometry as well as initial and boundary conditions. Hence, it is possible to focus only on the regions where velocity and pressure fields are needed, which will significantly reduce the size of data and the cost of training.\\ We first crop the aneurysm sac out from the rest of geometry, and then use only the scalar data within the ICA sac (right panel of figure \ref{fig:ICA_data}) for training where no information is used for the boundary conditions. The exact and predicted concentration, velocity and pressure fields within the ICA sac at a sample time instant are then interpolated on two separate planes perpendicular to $y$- and $z$-axis, which are shown in figure \ref{fig:ICA_results}. We observe excellent agreement between the exact and predicted fields given the complexity of the flow field. Furthermore, the relative $\mathcal{L}_2$-norm of errors plotted in figure \ref{fig:ICA_errors} show a significant drop in the prediction errors away from the initial and final time instants, which justifies an accurate analysis of model predictions in the time interval $ 10 \leq t \leq 25$. \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{ICA_data.png} \caption{\emph{A 3D intracranial aneurysm:} The middle panel shows the simulation domain and pressure field at a time instant, whereas on the right the training domain containing only the ICA sac is shown. Two perpendicular planes have been used to interpolate the exact data and the predicted ones for plotting 2D contours in figure \ref{fig:ICA_results}. A physiologic flow waveform $Q(t)$ (shown in the inset figure) is prescribed at the inlet along with the uniform concentration for the passive scalar. At the outlet, zero-Neumann boundary conditions are imposed for velocities and concentration, whereas a ``Windkessel'' type boundary condition is used for the pressure to represent the truncated geometry downstream \cite{grinberg2008outflow}. The Reynolds and P\'{e}clet numbers are estimated based on the mean velocity and lumen diameter at the inlet. Using the kinematic viscosity of blood and assuming a diffusivity constant $\kappa$ for the passive scalar equal to the viscosity, we obtain $\text{Re} = \text{Pec} = 98.2$.}\label{fig:ICA_data} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{ICA_results.png} \caption{\emph{A 3D intracranial aneurysm:} Contours of the exact fields and model predictions are plotted on two perpendicular planes (shown in figure \ref{fig:ICA_data}) for concentration $c$, velocity $u, v, w$, and pressure $p$ fields in each row. The first two columns show the results interpolated on a plane perpendicular to the $z$-axis, and the next two columns are plotted for a plane perpendicular to the $y$-axis. Note that the range of contour levels are set equal for all fields for better comparison.}\label{fig:ICA_results} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=\textwidth]{ICA_errors.png} \caption{\emph{A 3D intracranial aneurysm:} Relative $L_2$ errors between predictions of the model and the corresponding exact concentration, velocity, and pressure fields. 29 million data points scattered within the aneurysm sac and in time are used for both regressing the concentration field and enforcing the corresponding partial differential equations.}\label{fig:ICA_errors} \end{figure} \section{Discussion and Concluding Remarks} The algorithm developed here is agnostic to the geometry, initial, and boundary conditions, which makes it highly flexible in choosing the domain of interest for data acquisition as well as subsequent training and predictions. Moreover, the current methodology allows us to construct computationally efficient and fully differentiable surrogates for velocity and pressure fields that can be further used to estimate other quantities of interest such as shear stresses and vorticity fields. The predictions presented here are among those cases where a pure machine learning algorithm or a mere scientific computing approach simply cannot reproduce. A pure machine learning strategy has no sense of the physics of the problem to begin with, and a mere scientific computing approach relies heavily on careful specification of the geometry as well as initial and boundary conditions.\\ Assuming the geometry to be known, to arrive at similar results as the ones presented in the current work, one needs to solve significantly more expensive optimization problems, using conventional computational methods (e.g., finite differences, finite elements, finite volumes, spectral methods, and etc.). The corresponding optimization problems involve some form of ``parametrized" initial and boundary conditions, appropriate loss functions, and multiple runs of the conventional computational solvers. In this setting, one could easily end up with very high-dimensional optimization problems that require either backpropagating through the computational solvers \cite{chen2018neural} or ``Bayesian" optimization techniques \cite{shahriari2016taking} for the surrogate models (e.g., Gaussian processes). If the geometry is further assumed to be unknown (as is the case in this work), then its parametrization requires grid regeneration, which makes the approach almost impractical.\\ It must be mentioned that we are avoiding the regimes where the Navier-Stokes equations become chaotic and turbulent (e.g., as the Reynolds number increases). In fact, it should not be difficult for a plain vanilla neural network to approximate the types of complicated functions that naturally appear in turbulence. However, as we compute the derivatives required in equation \eqref{eq:NN}, minimizing the loss function \eqref{SSE} might become a challenge \cite{raissi2018deep}, where the optimizer may fail to converge to the right values for the parameters of the neural networks. It might be the case that the resulting optimization problem inherits the complicated nature of the turbulent Navier-Stokes equations. Hence, inference of turbulent velocity and pressure fields could be considered in future extensions of this line of research.\\ The emphasis of this study was to demonstrate, through several prototypical and realistic examples, the ability of the current algorithm to infer the hidden states of the system from partial knowledge of some relevant quantities by leveraging the known underlying dynamics of the system. We have verified that with the use of governing physical laws, our algorithm is able to make accurate predictions for complex 2D/3D flows. One possible limitation of the current study is the use of synthetically generated data on the passive scalar, which are relatively noiseless and clean compared to the realistic measurements. Whereas 3D reconstruction of a passive scalar from a stack of 2D projections is possible, it is not a common practice in the clinical and industrial settings due to the technological complexities as well as computational and processing costs. Thus, extracting information from 2D images directly by taking into account the angle of projections seems to be a more realistic approach. Furthermore, different imaging modalities (e.g., magnetic resonance vs. computed tomography angiography of bolus dye in coronary arteries) have different spatial/temporal resolutions. To address the lack of resolution in time, a viable strategy is to use a high-order time-stepping scheme such as implicit Runge-Kutta for resolving the equations in time using very few snapshots \cite{raissi2017physics_I,raissi2017physics_II}. These are certainly important factors that have to be taken into account moving forward using the proposed algorithm for real-world fluid mechanics applications, and will be addressed carefully in future implementations.\\ In this work we have been operating under the assumption of Newtonian and incompressible fluid flow governed by the Navier-Stokes equations. However, the proposed algorithm can also be used when the underlying physics is non-Newtonian, compressible, or partially known. This in fact is one of the advantages of the algorithm in which other unknown parameters such as the Reynolds and P\'eclet numbers can be inferred in addition to the velocity and pressure fields. When the fluid is non-Newtonian (e.g., blood flow in small vessels), one can encode the momentum equations, where the ``constitutive" law for the fluid's stress-strain relationship is unknown, into a physics-informed deep learning algorithm. Having data on the velocity (or even the passive scalar), it should be possible to learn the constitutive law as well \cite{zhao2018active}.\\ As demonstrated in this work, a direct implication of the current method is quantifying the hemodynamics in the vasculature. This could potentially have significant impact on the clinical diagnosis (especially with the non-invasive methods) of vascular diseases associated with important pathologies such as heart attack and stroke. Blood shear stresses acting on the vascular wall are crucial in the prognosis of a vascular disease and their quantification is significantly important clinically \cite{shaaban2000wall,zarins1983carotid}. Using the proposed method, it is possible to estimate the wall shear stresses at no extra cost. This will simplify the complexities of the state-of-the-art methods in which extracting the exact boundaries of the vessels from the clinical images is required \cite{boussel2009phase}. In addition to the shear stresses estimation that is of interest, quantification of blood distribution and oxygenation in cerebral arteries using modalities such as perfusion CT \cite{wintermark2002prognostic} and functional magnetic resonance imaging \cite{calamante1999measuring} has been practiced and is crucial in the assessment of brain activity for the majority of neurodegenerative diseases such as Alzheimer’s disease \cite{greicius2004default} and in cognitive neuroscience \cite{aron2007triangulating}. Furthermore, recent advances in imaging such as the functional photoacoustic microscopy allows 3D blood oxygenation imaging with ``capillary-level" resolution \cite{yao2015high}. Encoding the one-dimensional hemodynamics and oxygen transport equations into physics-informed neural networks, and using the concentration profiles from different imaging modalities will lead to quantifying brain hemodynamics at various length scales.\\ In conclusion, we have introduced an effective algorithm based on the recently developed \emph{physics-informed neural networks} framework that is capable of encoding the underlying physical laws that govern a given dataset. Specifically, we have applied the algorithm to an important class of physical laws governing fluid motions. Our inverse approach in this article is unique as we have designed a methodology to infer velocity and pressure fields merely from the knowledge of the time-evolution of a passive scaler. \section*{Acknowledgements} This work received support by the DARPA EQUiPS grant N66001-15-2-4055, the AFOSR grant FA9550-17-1-0013, the NIH grant U01HL116323, and the NSF grant DMS-1736088. Generation of data was performed on XSEDE resources supported by award No.~TG-DMS140007. Moreover, all data and codes used in this manuscript will be publicly available on GitHub at \url{https://github.com/maziarraiss/HFM}. \bibliographystyle{model1-num-names}
\section{Introduction} Inflation as a theory, has been successfull in describing the structure and evolution of our universe \cite{guth1981,starobinsky1980}. As ordinary matter or radiation can not source inflation, several models have been built to describe inflation where a hypothetical field may it be scalar, vector or tensor drives the inflation \cite{martin2014}. Many theories have considered the scalar field called ``inflaton" as the source for inflation and are able to describe the cosmology of universe \cite{gottlober1990,roberts1994,parsons1995,barrow1995,linde1986,linde1993}. Most of the scalar field models having simple form of potential are ruled out as they are not compatible with the Planck's observational data for the cosmic microwave background \cite{martin2014,yuan2011,gomes2018}. Another class of models considers a vector field as an alternative to the inflaton \cite{ford1989,burd1991,golovnev2008,darabi2014,bertolami2015}. But almost all of these models suffer from instabilities like ghost instability \cite{peloso2009} and gradient instability \cite{ryonamba2017} which leads to an unstable vacuum. As the quantum corrections in cosmology and their possible phenomenological implications are becoming relevant \cite{fabris2012}, models with connections to high energy theories like the string theories provide an interesting alternative to traditional inflation model building. A particular theory of interest is that of a rank-2 antisymmetric tensor field, which appears in all superstring models \cite{rohm1986,ghezelbash2009}. Antisymmetric tensors have been studied before in several aspects, including phase transitions, strong-weak coupling duality \cite{quevedo1996,olive1995,polchinski1995,siegel1980,hata1981,buchbinder1988,duff1980,bastianelli2005a,*bastianelli2005b} and even some astrophysical aspects \cite{damour1994}. More recently, quantum aspects of antisymmetric fields in different settings have been studied \cite{altschul2010,buchbinder2008,shapiro2016,aashish2018,aashish2018b}. However, efforts for cosmological studies with antisymmetric tensors were rare until the past decade. A few pertinent works with regard to inflation scenarios with $N$-form fields in anisotropic spacetime was carried out in Refs. \cite{koivisto2009a,koivisto2009b} and near a Schwarzschild metric in Ref. \cite{prokopec2006}. More recently, two-form fields have been studied in the context of anisotropic inflation \cite{asuka2015} and gravitational waves \cite{obata2018}. In this paper, we study the possibility of inflation with antisymmetric tensor field by considering minimal and nonminimal models originally considered in Altschul \textit{et al}. \cite{altschul2010}. We find that the minimal model does not support inflation. However, introducing a new parameter in the form of nonminimal coupling to gravity helps to achieve inflation. The nonminimal coupling terms we incorporate here are part of a general action constructed in \cite{altschul2010} and are inspired by spontaneous Lorentz violation theories. The most general nonminimal nonderivative couplings upto quadratic order in antisymmetric tensor $B_{\mu\nu}$ (restricted to parity-even terms) are written as \cite{altschul2010} \begin{eqnarray} \mathcal{L}_{NM}=\frac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R + \frac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu} + \frac{1}{2 \kappa}\gamma B^{\kappa\lambda}B^{\mu\nu}R_{\kappa\lambda\mu\nu} \end{eqnarray} Demanding a stable Schwarzschild solution, we do not consider the coupling with $R_{\kappa\lambda\mu\nu}$, but we will consider the remaining couplings ($\xi$ and $\zeta$ term) because our model does not contain the cosmological constant ($\Lambda$) \cite{prokopec2006}. We also set up a perfect slow roll scenario for this inflationary model, prior to developing a full perturbation theory for antisymmetric tensor in future works. However, an instability analysis for the perturbations to only the antisymmetric tensor field is performed. Although, in Ref. \cite{koivisto2009a} a similar instability analysis was done for $R$ coupling and possibility of ghosts was found, the present analysis is different in the following ways: (i) the spacetime is isotropic and homogeneous; (ii) background structure of $B_{\mu\nu}$ is specified; and (iii) choice of parameter space takes into account the conditions for slow-rolling inflation. This work is organized as follows. In Sec. \ref{sec2}, we introduce background structures of the metric and the antisymmetric tensor, and establish the general setup of our analysis through a simple model of a massive antisymmetric tensor field minimally coupled to gravity. It is shown that minimal model cannot give rise to inflation. Three cases of nonminimally coupled extensions of this model are considered in Sec. \ref{sec3}. The conditions for inflation and the de-Sitter space solutions have been derived. In Sec. \ref{sec4}, we check the stability of possible de-Sitter space. In Sec. \ref{sec5}, the slow roll parameters for the nonminimal models are constructed and the number of e-folds are calculated. Sec. \ref{sec6} presents stability analysis for perturbations to antisymmetric tensor field, while keeping the metric unperturbed. \section{\label{sec2}Minimal model and the setup} \subsection{Setup} As a first step towards studying an inflation model and as a precursor to extracting phenomenological results like the power spectrum, which come from the dynamics of perturbations to background fields (the metric and inflation field), it makes sense to establish a theory of background fields that ensures \cite{dodelson2003,weinberg2008}: \begin{enumerate} \item a de-Sitter space solution exists, \item the de-Sitter space should be stable, i.e. perturbations to solutions must decay with time, and \item more than 70 efolds of slow-roll inflation. \end{enumerate} An obvious choice for the background metric is the Friedmann–Lemaître–Robertson–Walker (FLRW) metric, motivated by the cosmological principle that imposes homogeneity and isotropy symmetries on the background universe. With the choice of metric signature ($-+++$), the (background) metric components $g_{\mu\nu}$ read, \begin{equation} \label{amms1} g_{00} = -1, \quad g_{ij} = a(t)^2 \delta_{ij}, \end{equation} where $a(t)$ is the scale factor for expansion of universe. The Riemann–Christoffel tensor, Ricci tensor and Ricci scalar in terms of metric components in Eq. (\ref{amms1}) are given by, \begin{equation} \label{amms2} R_{0i0j} = - a\ddot{a}\delta_{ij}, \quad \quad R_{ijkl} = \delta_{ik} \delta_{jl} (a\dot{a})^2 \quad i<j; \end{equation} \begin{equation} \label{amms3} R_{00} = - 3\frac{\ddot{a}}{a}, \quad \quad R_{ij} = \delta_{ij}(a\ddot{a} + 2\dot{a}^2); \end{equation} \begin{equation} \label{amms4} R = 6\Big[ \frac{\ddot{a}}{a} + \Big(\frac{\dot{a}}{a} \Big)^2 \Big]. \end{equation} We are interested in a theory where the inflation-driving field is an antisymmetric tensor $B_{\mu \nu}$, \begin{equation} \label{amms5} B_{\mu \nu} = - B_{\nu \mu}. \end{equation} In general, $B_{\mu\nu}$ has six independent components and a structure similar to that of the electromagnetic field strength tensor. A convenient representation of $B_{\mu\nu}$, analogous to the electrodynamic decomposition of field strength into electric and magnetic fields, is given by \cite{altschul2010}, \begin{eqnarray} \label{amms6} B_{0j}=-\Sigma^{j}, \quad B_{jk}=\epsilon_{jkl}\Xi^{l}. \end{eqnarray} An interesting but also challenging aspect of cosmology with antisymmetric tensors is that the perturbations to all six components will play a role in the dynamics, and could offer important phenomenology. However, for setting up the background dynamics, we can exploit the freedom to choose a structure for $B_{\mu\nu}$ that simplifies the calculations of the present work without losing generality. As will be seen shortly, this choice of $B_{\mu\nu}$ structure manifests in the constraint equations for off-diagonal components of spatial part of energy-momentum tensor, ensuring homogeneity and isotropy of background metric $g_{\mu\nu}$. For our convenience, we choose $\Sigma^{j}=0$, and $\Xi^{l}=B(t)$, $l=1,2,3$, so that, \begin{equation} \label{bmms1} B_{\mu \nu} = \begin{pmatrix} 0 & 0 & 0 & 0 \\ 0 & 0 & B(t) & -B(t) \\ 0 & -B(t) & 0 & B(t) \\ 0 & B(t) & -B(t) & 0 \end{pmatrix}. \end{equation} \subsection{Minimal model} At this point, to set up our approach, we consider a ``minimal" model of an antisymmetric tensor first considered in Ref. \cite{altschul2010}, \begin{equation} \label{bmms2} S = \int d^4x \sqrt{-g} \Big[ \frac{R}{2\kappa} - \frac{1}{12} H_{\lambda\mu\nu}(B) H^{\lambda\mu\nu}(B) - V(B)\Big], \end{equation} where $H_{\lambda \mu \nu} = \nabla_{\lambda} B_{\mu \nu} + \nabla_{\mu} B_{\nu \lambda} + \nabla_{\nu} B_{\lambda \mu}$ is the gauge-invariant kinetic term \cite{altschul2010} ($\nabla_{\mu}$ is the covariant derivative), and $V(B)$ is the potential term. Rest of the symbols have their usual meanings, with $g$ being the metric determinant, $R$ the Ricci scalar and $\kappa$ the inverse square of Planck mass $M_{pl}$. For the present problem, we will only consider quadratic potential of the form $m^{2}B_{\mu\nu}B^{\mu\nu}/4$, though some of the expressions (especially for slow roll analysis) will be written in terms of $V(B)$ for generality. Here onwards, we omit the arguments of functions and functionals ($a(t), B(t), V(B)$, etc.) for notational convenience and their functional dependence is assumed until stated otherwise. Our starting point for finding de-Sitter space solutions is the Einstein equation, obtained by varying the action (\ref{bmms2}) with respect to metric $g_{\mu\nu}$, \begin{eqnarray} \label{bmms3} G_{\mu\nu}=\kappa T^{M}_{\mu\nu}, \end{eqnarray} where, $G_{\mu\nu}$ is the Einstein tensor and the energy momentum tensor $T^{M}_{\mu\nu}$ is given by, \begin{eqnarray} \label{dmms1} T^{M}_{\mu\nu}=\dfrac{1}{2}H^{\alpha \beta}_{\quad \mu} H_{\nu \alpha \beta}+ m^2 B^{\alpha}_{\ \mu} B_{\alpha \nu} - g_{\mu \nu} (\frac{1}{12} H_{\alpha \beta \gamma} H^{\alpha \beta \gamma} + \frac{1}{4}m^2 B_{\alpha \beta}B^{\alpha \beta}). \end{eqnarray} It can be inferred from Eq. (\ref{dmms1}) that $T^{M}_{\mu\nu}$ in general has off-diagonal elements. One can always choose a structure for $B_{\mu\nu}$ that renders the off-diagonal elements of the spatial components of EM tensor, $T^{M}_{ij}$, equal to zero albeit with a caveat that the pressure ($T^{M}_{ii}$) becomes anisotropic, i.e. $T^{M}_{11}\neq T^{M}_{22} \neq T^{M}_{33}$. For our choice of $B_{\mu\nu}$, Eq. (\ref{bmms1}), the isotropy of pressure is ensured while introducing an additional constraint on the off-diagonal components $T^{M}_{ij}$. We define, \begin{equation} \label{cmms4} B(t) = a(t)^2 \phi(t), \end{equation} so as to obtain a familiar form of equations of motion, resembling that of scalar field models. Choosing the quadratic potential, $V(B) = m^{2}B_{\mu\nu}B^{\mu\nu}/4 = 3m^{2}\phi^{2}/2$ in the background FRW metric Eq. (\ref{amms1}) and the background tensor field Eq. (\ref{bmms1}), Eq. (\ref{bmms3}) takes the form, \begin{eqnarray} \label{bmms4} G_{00}=T^{M}_{00} &\implies & H^2 = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 +m^{2}\phi^{2}], \\ \label{bmms5} G_{ij}=T^{M}_{ij} &\implies & 2\dot{H} + 3H^{2} = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}], \quad i=j, \end{eqnarray} As pointed out before, in addition to Eqs. (\ref{bmms4}) and (\ref{bmms5}), the off-diagonal components $T^{M}_{ij}$ ($i\neq j$) satisfy the following constraint equation: \begin{eqnarray} \label{bmms6} \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}] = 0, \end{eqnarray} ensuring that the symmetries of spacetime (homogeneity and isotropy) are maintained. The equation of motion for $\phi$ can be obtained from the energy-momentum conservation equation $\nabla^{\mu}T^{M}_{\mu\nu} = 0$, but we do not write it here explicitly because it is not an independent equation and hence is irrelevant for the current calculations. Using the constraint Eq. (\ref{bmms6}) in Eq. (\ref{bmms5}), we obtain \begin{eqnarray} \label{bmms7} \frac{\ddot{a}}{a} = -\dfrac{H^{2}}{2}. \end{eqnarray} Clearly, the acceleration of $a(t)$ is negative and hence the minimal model does not support the possibility of inflation. Eq. (\ref{bmms7}) provides an insight into what modifications could be made to the action (\ref{bmms2}) to allow inflation. A straightforward solution for positive acceleration would be to incorporate additional parameter in the rhs of Eq. (\ref{bmms7}) such that $\ddot{a}$ has nontrivial solutions. In subsequent sections, we consider an extension of this model consisting of nonminimal coupling of $B_{\mu\nu}$ with gravity that resolves this issue. \section{\label{sec3}Nonminimal models} \subsection{The models} The requirement of positive acceleration of the scale factor is met by a simple extension of theory (\ref{bmms2}) consisting of a nonminimal coupling to gravity \cite{altschul2010} given by: \begin{eqnarray} \label{anon1} S = \int d^{4}x \sqrt{-g} \Big[ \frac{R}{2\kappa} - \frac{1}{12} H_{\lambda \mu \nu} H^{\lambda \mu \nu} - \dfrac{m^{2}}{4} B_{\mu\nu}B^{\mu\nu} + \mathcal{L}_{NM}\Big] , \end{eqnarray} where $\mathcal{L}_{NM}$ is the non-minimal coupling term. As mentioned before, we will consider two cases, with $\mathcal{L}_{NM}=\frac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R$ and $\mathcal{L}_{NM} = \frac{1}{2 \kappa}\zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$ separately, for convenience. The non-minimal coupling term $\mathcal{L}_{NM}$, is parametrized by $\xi$ and $\zeta$ for couplings with $R$ and $R_{\mu\nu}$ respectively. The parameters $\xi$ and $\zeta$ have dimensions of $M_{pl}^{-2}$. \subsubsection{Case: $\mathcal{L}_{NM}=\frac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R$} With $\mathcal{L}_{NM}=\frac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R$ in Eq. (\ref{anon1}), the corresponding energy momentum tensor is given by, \begin{eqnarray} \label{cnon1} T_{\mu\nu} = T_{\mu\nu}^{M} + T_{\mu\nu}^{\xi}, \end{eqnarray} where, \begin{eqnarray} \label{cnon2} T_{\mu\nu}^{\xi} = \dfrac{\xi}{\kappa}\left[\nabla_{\mu} \nabla_{\nu}(B_{\alpha \beta}B^{\alpha \beta}) - g_{\mu \nu} \nabla^{\lambda} \nabla_{\lambda} (B_{\alpha \beta}B^{\alpha \beta}) - G_{\mu \nu} (B_{\alpha \beta}B^{\alpha \beta}) - 2R B^{\alpha}_{\ \mu} B_{\alpha \nu} \right]. \end{eqnarray} Following the steps of previous section, we write the Einstein equations, \begin{eqnarray} \label{bnon1} G_{00}= \kappa T_{00} &\implies & H^2 + 6\xi (2H\phi \dot{\phi} + H^2 \phi^2) = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 +m^{2}\phi^{2}], \\ \label{bnon2} G_{ij}=\kappa T_{ij} &\implies & 2\dot{H} + 3H^{2} + 6\xi (2\phi \ddot{\phi} + 2\dot{\phi}^2 - 2\dot{H}\phi^2 - 5 H^2\phi^2 + 4H\phi \dot{\phi} ) \nonumber \\ && = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}], \quad i=j, \end{eqnarray} Similarly, the constraint equation for off-diagonal components of $T_{ij}$ becomes, \begin{eqnarray} \label{bnon3} \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}] = -6\xi(\dot{H} + 2H^{2})\phi^{2}. \end{eqnarray} \subsubsection{Case: $\mathcal{L}_{NM} = \frac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$} Substituting $R_{\mu \nu}$ coupling term, $\mathcal{L}_{NM} = \zeta \frac{\sqrt{-g}}{2 \kappa} B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$, in the action (\ref{anon1}), the energy momentum tensor in this case is given by, \begin{eqnarray} \label{nbon1} T_{\mu\nu} = T_{\mu\nu}^{M} + T_{\mu\nu}^{\zeta}, \end{eqnarray} where, \begin{eqnarray} \label{nbon2} T^{\zeta}_{\mu \nu} = \frac{\zeta}{\kappa} \Big[ \frac{1}{2} g_{\mu \nu} (B^{\alpha \gamma} B^{\beta}_{\ \gamma}R_{\alpha \beta} - \nabla_{\alpha} \nabla_{\beta} B^{\alpha \gamma} B^{\beta}_{\ \gamma}) - B^{\alpha }_{\ \mu} B^{\beta}_{\ \nu}R_{\alpha \beta} -B^{\alpha \beta} B_{\mu \beta}R_{ \nu \alpha} - B^{\alpha \beta} B_{\nu \beta}R_{ \mu \alpha}&& \nonumber \\ + \frac{1}{2}(\nabla_{\alpha} \nabla_{\mu} B_{\nu \beta} B^{\alpha \beta} +\nabla_{\alpha} \nabla_{\nu} B_{\mu \beta} B^{\alpha \beta} - \nabla^{\lambda} \nabla_{\lambda} B^{\alpha}_{\ \mu} B_{\alpha \nu}) \Big], \end{eqnarray} Similarly, the Einstein equations are found to be \begin{eqnarray} \label{nbnon3} G_{00}= \kappa T_{00} &\implies & H^2 + 2\zeta H\phi \dot{\phi} = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 +m^{2}\phi^{2}], \\ \label{nbnon4} G_{ij}=\kappa T_{ij} &\implies & 2\dot{H} + 3H^{2} + \zeta (2\phi \ddot{\phi} + 2\dot{\phi}^2 - 4\dot{H}\phi^2 - 12 H^2\phi^2 ) \nonumber \\ && = \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}], \quad i=j, \end{eqnarray} For the off-diagonal components, the constraint equation reads, \begin{equation} \label{nbnon5} \frac{\kappa}{2}[(\dot{\phi} + 2 H\phi)^2 - m^{2}\phi^{2}] = -\zeta(\dot{H} + 3H^{2})\phi^{2}+ \frac{\zeta}{2}(\phi \ddot{\phi} + \dot{\phi}^2 + 3H\phi \dot{\phi}), \quad i\neq j \end{equation} \subsection{de-Sitter solutions} To find the de-Sitter solutions, we consider the fact that an exponential expansion of the universe (during inflation) implies a constant Hubble parameter, $H=H_{0}$. Moreover, it helps to further take into account the slow rolling of field $\phi$ during inflation, so that it can be thought of as nearly constant, $\phi\approx\phi_{0}$. The question of whether an exact de-Sitter space exists boils down to finding non-zero solutions ($\phi_{0},H_{0}$) to the Einstein equations (\ref{bnon1}) $-$ (\ref{bnon3}) in the de-Sitter limit, $ \dot{H} = \dot{\phi} = 0$. First, using the constraint Eq. (\ref{bnon3}) in Eq. (\ref{bnon2}), we get for the coupling with $R$, \begin{eqnarray} \label{bnon4} 2\dot{H} + 3H^{2} + 12\xi (\phi \ddot{\phi} + \dot{\phi}^2 + 2H\phi \dot{\phi} - \frac{1}{2}\dot{H}\phi^2 - \frac{3}{2} H^2\phi^2 ) = 0. \end{eqnarray} Then, applying the de-Sitter limit to Eqs. (\ref{bnon1}) and (\ref{bnon4}), de-Sitter solutions $\phi_0$ and $H_0$ are obtained. The results, including a similar calculation for the $R_{\mu\nu}$ coupling, are given in Table \ref{tab1} above. \begin{table}[h!] \begin{center} \begin{tabular}{|c|c|c|c|} \hline $\mathcal{L}_{NM}$ & \ $\phi_{0}^{2}$ \ & $H_{0}^{2}$ & Condition\\ \hline $\dfrac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R$ & $\dfrac{1}{6\xi}$ & $\dfrac{\kappa m^{2}}{4(6\xi - \kappa)}$ & $\xi > \dfrac{\kappa}{6}$\\ \hline $\dfrac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$ & $\dfrac{1}{3\zeta}$ & $\dfrac{\kappa m^2}{2(3 \zeta - 2 \kappa)}$ & $\zeta > \dfrac{2 \kappa}{3}$\\ \hline \end{tabular} \caption{The de-Sitter space solutions of $\phi$ and $H$, along with the condition on parameters $\xi$ and $\zeta$ corresponding to $R$ and $R_{\mu\nu}$ coupling terms respectively.} \label{tab1} \end{center} \end{table} It is worth noting that value of $\phi$ is sub-planckian in both cases. An interesting observation in the context of theories (\ref{bmms2}) and (\ref{anon1}) is that adding a nonminimal coupling gives rise to de-Sitter solutions, which are otherwise absent in minimal model. This is a unique feature of antisymmetric field models in contrast to the nonminimal models of scalar field inflation (see \cite{nakanishi2018} and references therein). \section{\label{sec4}Stability analysis of the De-Sitter background} In this section, the dynamics of nonminimal model (\ref{anon1}) around the de-Sitter background is analyzed. Whether a stable de-Sitter background is possible or not, can be checked by perturbing the field $\phi(t)$ and Hubble parameter $H(t)$ about de-Sitter solutions $H_{0}$ and $\phi_{0}$. The condition for stability is that the perturbations $\delta\phi (t)$ and $\delta H (t)$ must decay over time. The corresponding perturbations are given by, \begin{equation} \label{asta1} H = H_0 + \delta H; \quad \quad \phi = \phi_0 + \delta \phi, \end{equation} where $\delta H$ and $\delta \phi$ are small perturbation about $(H_0,\phi_0)$ in linear order. Substituting Eq. (\ref{asta1}) in Eqs. (\ref{bnon1}) and (\ref{bnon4}), and using the results in Table \ref{tab1}, we obtain, upto first order in perturbations, \begin{eqnarray} \label{asta4} \dot{\delta \phi} &=& \dfrac{6\xi}{6\xi - \kappa} H_0 \delta \phi - 2 \phi_0 \delta H, \\ \label{asta5} \dot{\delta H} &=& \left(\dfrac{12\xi(8\xi - \kappa)}{(6\xi - \kappa)^{2}}\right)\kappa H_{0}^{2}\phi_{0}\delta\phi - \dfrac{8}{3}\left(\dfrac{9\xi - \kappa}{6\xi - \kappa}\right)H_{0}\delta H. \end{eqnarray} Eq.(\ref{asta4}) and Eq.(\ref{asta5}) can be together expressed in the matrix form as follows: \begin{equation} \label{asta6} \dot{\Theta} = A \Theta, \end{equation} where $\Theta$ is a column matrix and $A$ is a $(2\times 2)$ square matrix, given by, \begin{eqnarray} \label{asta7} \Theta = \begin{pmatrix} \delta \phi \\ \delta H \end{pmatrix}; \quad \quad A = \begin{pmatrix} \dfrac{6\xi}{6\xi - \kappa} H_0 & - 2 \phi_0 \\ \left(\dfrac{12\xi(8\xi - \kappa)}{(6\xi - \kappa)^{2}}\right)\kappa H_{0}^{2}\phi_{0}\ & - \dfrac{8}{3}\left(\dfrac{9\xi - \kappa}{6\xi - \kappa}\right)H_{0} \end{pmatrix}. \end{eqnarray} Upon solving Eq. (\ref{asta6}) the solution for $\Theta (t)$ has a general form, \begin{eqnarray} \label{csta0} \Theta (t) = A_{1}e^{\lambda_{1}t} + A_{2}e^{\lambda_{2}t}. \end{eqnarray} The eigenvalues $\lambda_1$ and $\lambda_2$ of the matrix $A$ can be calculated from its trace and determinant, which are \begin{eqnarray} \label{asta8} Tr[A] &=& \lambda_1 + \lambda_2 = -H_{0}\left(3 + \dfrac{\kappa}{3(6\xi - \kappa)}\right) \equiv -\tau H_{0},\\ \label{asta9} \det[A] &=& \lambda_1 \lambda_2 = - 4H_{0}^{2}. \end{eqnarray} From Eqs. (\ref{asta8}) and (\ref{asta9}), one can deduce that one of the $\lambda_1$ and $\lambda_2$ is negative, and the negative eigenvalue strongly dominates the positive one. Moreover, due to the condition on $\xi$ as in Table \ref{tab1}, $\lambda_1 + \lambda_2 < -3H_{0}$. In view of Eq. (\ref{csta0}), it implies that the perturbations will grow exponentially over time due to the small positive eigenvalue, and thus will be unstable. However, it should still be possible to suppress this instability by constraining the coefficient of the growing part of $\Theta (t)$ in Eq. (\ref{csta0}), but it needs to be checked whether or how that can be achieved for the epoch of interest. In fact, considering the explicit solutions for $\lambda_{1,2}$, \begin{eqnarray} \label{bsta0} \lambda_{1(2)} = -\dfrac{H_{0}}{2}[\tau - (+) \sqrt{\tau^{2} + 16}], \end{eqnarray} in the limiting case where $6\xi/\kappa \to 1^{+}$, $\lambda_{1}\to 0$ and $\lambda_{2}<< 0$. Substituting in Eq. (\ref{csta0}) leads to $\Theta (t) \approx A_{1} + A_{2}e^{\lambda_{2}t}$, and will provide a decaying solution if $A_{1}\approx 0$. Though, it is not clear at this time how such a solution can be obtained without heavily constraining the parameters ($\xi,\zeta$) and coefficients ($A_{1,2}$), thus we leave this problem for consideration in future. \subsubsection{Case: $\mathcal{L}_{NM} = \frac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$} A similar analysis for the second case, $\mathcal{L}_{NM} = \frac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$, leads to the following structure for matrix $A$ of Eq. (\ref{asta6}), \begin{eqnarray} \label{bsta1} A = \begin{pmatrix} \dfrac{3 \zeta}{\zeta - \kappa} H_0 & \dfrac{ 2\kappa - 3 \zeta}{\zeta - \kappa} \phi_0 \\ -9 \dfrac{(\zeta - 4\kappa)(2\zeta - \kappa)}{(\zeta - \kappa)} H_{0}^{2}\phi_{0}\ & - \dfrac{(2\zeta + \kappa)(3\zeta - 2\kappa)}{\zeta (\zeta - \kappa)}H_{0} \end{pmatrix}. \end{eqnarray} The eigen values are calculated to be \begin{eqnarray} \label{bsta2} \lambda_{1(2)} = -\dfrac{3H_{0}}{2}\left\{-1 - \dfrac{2\kappa}{3\zeta}- (+) \sqrt{\Big[1+\dfrac{2\kappa}{3\zeta}\Big]^{2} + 16\Big[1-\dfrac{2\kappa}{3\zeta}\Big]}\right\}, \end{eqnarray} which are again similar to $\xi$ case, Eq. (\ref{bsta0}), in the sense that one of the eigenvalues dominates over the other. \section{\label{sec5}Slow roll parameters} We now consider a nearly de-Sitter spacetime for building an inflationary model. For a successful inflation, the duration of inflation should be more than 70 efolds \cite{dodelson2003}. Slow roll parameters are introduced in a theory to control (i) the acceleration of universe, and (ii) the duration of inflation. One of the slow roll conditions relevant for the acceleration is $\epsilon$, given in terms of Hubble parameter, \begin{equation} \label{aslo3} \epsilon = - \frac{\dot{H}}{H^2}. \end{equation} Eq. (\ref{aslo3}) can be rewritten as \begin{eqnarray} \label{bslo0} \frac{\ddot{a}}{a} = H^2(1- \epsilon), \end{eqnarray} and it can be seen that $\epsilon$ has to be small in order for acceleration to be positive. A second slow roll parameter in terms of $\phi$ must be introduced to control the duration of inflation. A standard approach is to choose a parameter such that the equations of motions can be expressed in terms of slow roll parameters, and a relation between the two parameters can be obtained. Slow roll condition is satisfied if the smallness of one parameter is compatible with that of the other. For any arbitrary potential the equations of motion for this model can be written as \begin{eqnarray} \label{aslo1} H^2 + (6\xi - 2\kappa)H^2\phi^2 + (12\xi - 2\kappa)H\phi\dot{\phi} - \frac{\kappa}{2}\dot{\phi}^2 - \frac{\kappa V}{3} = 0, \\ \label{aslo2} 2\dot{H} + 3H^{2} + 12\xi (\phi \ddot{\phi} + \dot{\phi}^2 + 2H\phi \dot{\phi} - \frac{1}{2}\dot{H}\phi^2 - \frac{3}{2} H^2\phi^2 ) = 0. \end{eqnarray} We now introduce a second slow roll parameter $\delta \equiv \dfrac{\dot{\phi}}{H\phi}$. Dividing by $H^{2}$, Eq. (\ref{aslo2}) can be expressed in terms of the new slow roll parameter $\delta$, \begin{eqnarray} \label{bslo1} 3-18\tau - 2\epsilon + 12\tau[\dfrac{\dot{\delta}}{H} + 2\delta^{2} + (2-\epsilon)\delta + \dfrac{\epsilon}{2}] = 0, \end{eqnarray} where, $\tau \equiv \xi\phi^{2}$. During inflation, we can take the value of $\tau$ to be of the same order as that in a de-Sitter spacetime, i.e. $\tau\approx 1/6$. In Eq. (\ref{aslo1}), using the slow roll condition $\dot{\phi}^{2}<V$ and taking its derivative, we obtain \begin{eqnarray} \label{bslo3} \epsilon = \delta\left[\dfrac{(6\xi - 2\kappa)\phi^{2}}{1 + (6\xi - 2\kappa)\phi^{2} + \delta(12\xi - 2\kappa)\phi^{2}} - \dfrac{\phi V_{\phi}}{2V}\right]. \end{eqnarray} where $V_{\phi}=dV/d\phi$. An explicit relation between $\epsilon$ and $\delta$ is obtained by using the flat potential condition, $V_{\phi}<<V$. The results for the two cases of nonminimal couplings are given in Table \ref{tab2}. \begin{table}[h!] \centering \begin{tabular}{|c|c|} \hline $\mathcal{L}_{NM}$ & \ $\epsilon$ \ \\ \hline $\dfrac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R$ & $\epsilon \approx \dfrac{\delta}{(6\xi - 2\kappa)^{-1}\phi^{-2} + 1}\sim \delta $ \\ \hline $\dfrac{1}{2 \kappa} \zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$ & $\epsilon \approx \dfrac{\delta}{1- (2 \kappa \phi^2)^{-1} } \sim \delta$ \\ \hline \end{tabular} \caption{Relation between the slow-roll parameters $\epsilon$ and $\delta$ for each case of nonminimal coupling.} \label{tab2} \end{table} The small $\delta$ indicates that the background field should be nearly constant which eventually leads to flat potential satisfying the requirement of slow roll. It is evident from Table \ref{tab2} that in both cases of nonminimal coupling, small $\delta$ gives rise to small $\epsilon$, thereby allowing slow-roll inflation. The duration of inflation can be expressed by the number of e-folds. Before calculating the number of e-fold it is important to calculate $\dot{\delta}$. \begin{equation} \label{aslo8} \dot{\delta} = \frac{\ddot{\phi}}{H \phi} - \frac{\dot{\phi}^2}{H\phi^2} - \frac{\dot{\phi} \dot{H}}{\phi H^2} = H \delta (\epsilon - \delta). \end{equation} During inflation $H$ is nearly constant which says that $\dot{\delta}$ is approximately zero or $\delta$ is nearly constant during inflation. Now, the number of e-folds can be calculated to be, \begin{equation} \label{aslo9} N = \int_{t_i}^t H dt = \int_{\phi_i}^{\phi} d\phi \frac{H}{\dot{\phi}} = \frac{1}{\delta} \int_{\phi_i}^{\phi} \frac{d\phi}{\phi} = \frac{1}{\delta} ln\left(\frac{\phi}{\phi_i}\right). \end{equation} Clearly, it is feasible now to get 70 or more e-folds since $\delta$ is the only controlling parameter, and its smallness ensures sufficient duration of slow-rolling inflation. \section{\label{sec6}Stability of perturbations to $B_{\mu\nu}$} Although this model is able to provide a stable de-sitter type inflation with a lightly tuned nonminimal coupling with curvature terms, it should be free from the instabilities in order to give a sustainable inflationary model. A complete stability analysis would include perturbations to $B_{\mu\nu}$ and the metric. However, as an initial check, we consider here only the perturbations to the background antisymmetric tensor field $B_{\mu\nu}$, leaving the metric unperturbed. A similar analysis for the $R$ coupling was performed in Ref. \cite{koivisto2009a} in anisotropic spacetime. In the present case, we consider both couplings, i.e. $\mathcal{L}_{NM}=\frac{1}{2\kappa}\xi B^{\mu \nu} B_{\mu \nu} R + \frac{1}{2 \kappa}\zeta B^{\lambda \nu} B^{\mu}_{\ \nu} R_{\lambda \mu}$, and the spacetime background is homogeneous and isotropic. The choice of background structure of $B_{\mu\nu}$ remains the same as in Eq. (\ref{bmms1}). The perturbed field is given by $B_{\mu \nu} + \delta B_{\mu\nu}$, where \begin{eqnarray} \label{aper1} \delta B_{0i} = - E_i , \quad \quad \delta B_{ij} = \epsilon_{ijk} M_k. \end{eqnarray} Substituting this perturbation in the action (\ref{anon1}) results in the perturbed action containing terms upto quadratic order in perturbation. We are essentially interested in the terms of second order in perturbation, because these contain kinetic terms corresponding to perturbations $E_{i}$ and $M_{i}$. The second order part of the perturbed action reads, \begin{eqnarray} \label{aper2} S_2 = \int d^4 x \ \Bigg[ \frac{1}{2 a}\left( \dot{\vec{M}}\cdot\dot{\vec{M}} + 2\dot{\vec{M}}\cdot(\vec{\nabla} \times \vec{E}) + (\vec{\nabla} \times \vec{E}) \cdot(\vec{\nabla} \times \vec{E}) \right) - \frac{1}{2 a^3}(\vec{\nabla}\cdot\vec{M})^2 \nonumber\\ + \left( \frac{m^2}{2} - \dfrac{(6\xi + 2\zeta)}{\kappa} \dot{H} - \dfrac{(12\xi + 3\zeta)}{\kappa} H^2 \right)a(\vec{E}\cdot\vec{E}) \nonumber \\ - \left( \frac{m^2}{2} - \dfrac{(6\xi + \zeta)}{\kappa} \dot{H} - \dfrac{(12\xi + 3\zeta)}{\kappa} H^2 \right)\dfrac{(\vec{M}\cdot\vec{M})}{a} \Bigg]. \end{eqnarray} From Eq. (\ref{aper2}), it can be observed that the $E_{i}$ are non-dynamic modes since no $\dot{E}_{i}$ terms are present. Hence, $E_{i}$'s are merely auxiliary fields, whose equations of motion give unique solutions to $E_{i}$ in terms of the dynamical modes $M_{i}$. To proceed, it is convenient to transform to 3-momentum space in order to get rid of the spatial derivatives. A further simplification is introduced by choosing the $z-$axis along the direction of 3-momentum $\vec{k}$, so that \begin{eqnarray} \label{bper0} \dfrac{\partial f(t,\vec{x})}{\partial z} &=& -i\int d^{3}k k e^{-ikz}\tilde{f}(t,\vec{k}); \nonumber \\ \dfrac{\partial f(t,\vec{x})}{\partial x} &=& 0 = \dfrac{\partial f(t,\vec{x})}{\partial y} . \end{eqnarray} Substituting Eq. (\ref{bper0}) into Eq. (\ref{aper2}) yields, \begin{eqnarray} \label{aper3} S_{2}^{FT} = \int dt \ d^3k \ \Big[\frac{1}{2a} \left( \dot{\vec{\tilde{M}}}^{\dagger}\cdot\dot{\vec{\tilde{M}}} +ik(\dot{\tilde{M}}_x^{\dagger} \tilde{E}_y + h.c) - ik(\dot{\tilde{M}}_y^{\dagger} \tilde{E}_x + h.c ) + k^2(\tilde{E}_x^{\dagger}\tilde{E}_x + \tilde{E}_y^{\dagger}\tilde{E}_y) \right) -\frac{k^2}{2a^3}\tilde{M}_z^{\dagger}\tilde{M}_z \nonumber \\ + \left( \frac{m^2}{2} - \dfrac{(6\xi + 2\zeta)}{\kappa} \dot{H} - \dfrac{(12\xi + 3\zeta)}{\kappa} H^2 \right)a(\vec{\tilde{E}}^{\dagger}\cdot\vec{\tilde{E}}) - \left( \frac{m^2}{2} - \dfrac{(6\xi + \zeta)}{\kappa} \dot{H} - \dfrac{(12\xi + 3\zeta)}{\kappa} H^2 \right)\dfrac{(\vec{\tilde{M}}^{\dagger}\cdot\vec{\tilde{M}})}{a} \Big], \end{eqnarray} where, the notations are as follows: for any function $f$, $\tilde{f}\equiv \tilde{f}(t,\vec{k})$ and $\tilde{f}^{\dagger}\equiv \tilde{f}(t,-\vec{k})$. Now, varying the action with respect to $E_{x}^{\dagger}$, $E_y^{\dagger}$, $E_z^{\dagger}$, their equations of motion are found to be, \begin{eqnarray} \label{aper4} \tilde{E}_{x(y)} &=& +(-) \dfrac{ik\kappa\dot{\tilde{M}}_{y(x)}}{ \kappa [k^2+m^2 a^2] - [12\xi + 4\zeta] a^2\dot{H} - [24\xi + 6\zeta] a^2 H^2}; \nonumber \\ \tilde{E}_{z} &=& 0. \end{eqnarray} Substituting Eq. (\ref{aper4}) in Eq. (\ref{aper3}) yields an effective action, $S_{eff}$, with only quadratic kinetic terms, namely $\dot{\tilde{M}}_x^{\dagger} \dot{\tilde{M}}_x$, $\dot{\tilde{M}}_y^{\dagger} \dot{\tilde{M}}_y$ and $\dot{\tilde{M}}_z^{\dagger} \dot{\tilde{M}}_z$. The complete expression of $S_{eff}$ is not of present interest, except for the kinetic part which is given by, \begin{eqnarray} \label{bper1} \left(S_{eff}\right)_{Kin.} = \int dt \ d^3k \left[\dfrac{N}{2a(N - \kappa k^2)} \dot{\tilde{M}}_x^{\dagger}\dot{\tilde{M}}_x + \dfrac{N}{2a(N - \kappa k^2)} \dot{\tilde{M}}_y^{\dagger} \dot{\tilde{M}}_y + \dfrac{1}{2a}\dot{\tilde{M}}_z^{\dagger} \dot{\tilde{M}}_z \right], \end{eqnarray} where, $N = \kappa(2k^2+m^2 a^2)- (12\xi + 4\zeta)a^2\dot{H} - (24\xi + 6\zeta)a^2 H^2$. Clearly, Eq. (\ref{bper1}) implies that there is no ghost instability in the longitudinal mode $\tilde{M}_z$ whereas the coefficients of the remaining two transverse modes may come with a negative sign and hence give rise to instability. This possibility of ghosts is similar to that of vector inflation models, where the condition is reversed: the longitudinal mode causes instability while transverse modes are stable \cite{peloso2009}. We also note that for $\zeta = 0$ case, our result is in agreement with the conclusion of Ref. \cite{koivisto2009a}, and that instabilities exist for both isotropic and anisotropic spacetimes. Moreover, adding $R_{\mu\nu}$ coupling ($\zeta\neq 0$) does not help in treating the instability. If we demand that $S_{eff}$ be free of ghosts, then the following condition needs to be satisfied: \begin{eqnarray} \label{aper5} \frac{k^2}{a^2}+m^2 > \frac{H^2}{\kappa} \left( (24\xi + 6\zeta) - (12\xi + 4\zeta)\epsilon \right). \end{eqnarray} In a special case of exact de-sitter space and taking $\zeta = 0$, the condition (\ref{aper5}) translates to, \begin{eqnarray} \label{aper6} k^2 > 4 a^2 H_0^2. \end{eqnarray} Eq.(\ref{aper6}) indicates that there will be no ghost in the action for sub-horizon modes only. While for super-horizon modes the action will encounter ghost. This too is a familiar situation encountered in vector field models of inflation\cite{padhy2018}. \section{\label{sec7}Conclusion} We study the possibility of inflation with minimal and nonminimal models of rank-2 antisymmetric tensor fields. We find that the minimal model does not support inflation. Interesting features appear when a model with non-minimal coupling to gravity is considered, as a way to introduce a new parameter in the form of couplings $\xi$ and $\zeta$. It is possible to have solutions for de-Sitter space in nonminimal model that can support inflation. A simple bound on the couplings $\xi$ and $\zeta$ has been obtained from the de-Sitter solutions, and can support stable de-Sitter space under certain conditions. A detailed fixed point analysis will be carried out in future to ascertain the issue of stability of de-Sitter solutions. To study inflation, the slow roll analysis has been performed, and corresponding slow roll parameters $\epsilon$ and $\delta$ have been obtained. Validity of slow roll conditions has been checked. A notable feature of the present analysis is that the values of $\xi$, $\zeta$ and $\phi$ are sub-planckian in these models. The ghost instability analysis has been performed for perturbations to $B_{\mu\nu}$ (keeping the metric unperturbed). We find that while the longitudinal modes are ghost free, the transverse modes may admit ghosts. For a special case of exact de-Sitter space and $\zeta= 0$, only the sub-horizon modes are ghost free. It is noteworthy that the conditions encountered here are common in vector field models as well \cite{peloso2009,padhy2018}. The structure of Eqs. (\ref{bper1}) and (\ref{aper5}) hints towards the kind of modifications one would have to include in action (\ref{anon1}) to build a successful model of inflation with antisymmetric tensor field. An interesting possibility arises by adding a $U(1)$ symmetry breaking kinetic term to Eq. (\ref{anon1}): there are kinetic coulings between $E_{i}$ and $M_{i}$ modes, and any claim about instabilities cannot be made until one solves the coupled dynamical equations. This will be the subject of our subsequent study, and we speculate that possibly, instability problems could be resolved. In a future work, the full perturbation theory for such models may be developed, which will allow for phenomenologically relevant calculations. Possible extensions of this study include considering more combinations of coupling terms involving Ricci tensors and scalars, particularly $R^{2}$ coupling to tackle possible instabilities. Further studies may also involve the study of spontaneous Lorentz violation with antisymmetric fields in cosmological context and could provide significant insights for investigating signatures of new physics. \begin{acknowledgments} The manipulations in Sec. \ref{sec6} were done using Maple\texttrademark \footnote{Maple 2017.3, Maplesoft, a division of Waterloo Maple Inc., Waterloo, Ontario.} and cross-checked by hand. This work is partially supported by DST (Govt. of India) Grant No. SERB/PHY/2017041. The authors thank Tomi Koivisto for pointing out the results of Ref. \cite{koivisto2009a}. \end{acknowledgments}
\section{Acknowledgements} \section{Conclusion} We have presented an approach for generating unified connectivity-based human brain atlases bases on consensus clustering. The method is based on finding a pseudo average over the set of individual partitions. Our approach outperforms standard a anatomical parcellation on several important metrics, including agreement with dense connectomes, improved relevance to biological data, and even improved symmetry. Because our approach is entirely data driven an requires no agreement between individual parcellation labels, it combines both the flexibility of individual parcellations and the interpretability of simple unified atlases. \section{Experiments} \subsection{Data description} We use construct continuous connetocmes of 400 subjects from the Human Connectome Project S900 release \cite{HCP} following \cite{ConCon}. We use an icosahedral spehrical sampling, at a resolution of $10242$ mesh vertices per hemisphere. We used Dipy's implementation of constrained spherical deconvolution (CSD) to perform probabilistic tractography. Prior to clustering, we exclude all mesh vertices that were labeled by FreeSurfer as corpus callosum or cerebellum. \subsection{Experimental pipeline} Our experiments are summarized as follows: \begin{enumerate} \item For each subject we reconstruct its Continuous Connectome. \item For each Continuous Connectome we iteratively run Louvain clustering algorithm, as described above. Subgraphs of having less then 1 percent of original graph vertices were not divided. \item Next we aggregate individual subject partitions and obtain consensus clustering. Aggregation was done over 400 HCP subjects. Further, after finding the optimal parcellation, we obtain two parcellations based on two disjoint sets of 200 HCP subjects in order to compute reproducibility. \item We aggregate partitions of the same level (I-II-III) using CSPA and HE. \item We compare obtained partitions between themselves and with FreeSurfer's Desikan-Killiani parcellation using Kullback-Leibler and Jensen-Shannon divergence. We compute goodness of an ensemble and parcellation symmetry using AMI. \item We compare performance of simplified connectomes on a binary classification task using Logistic Regression with $l_1$ penalty. Classification results are measured in terms of ROC AUC score, with averaging over $10$ cross-validation folds. \end{enumerate} \begin{table} \label{tab:results} \scriptsize \centering \begin{tabular}{C{1.8cm}C{1.3cm}C{1.3cm}C{1.5cm}C{1.3cm}C{1.3cm}C{1.3cm}C{1.3cm}} \hline \\ & cspa $P^{\text{I}}$ & cspa $P^{\text{II}}$ & cspa $P^{\text{III}}$ & HE $P^{\text{I}}$ & HE $P^{\text{II}}$ & HE $P^{\text{III}}$ & DKT\\ \\ \hline \\ KL&$1.22 \pm .07$ &$1.18 \pm .07$ & $1.15 \pm .07$ & $1.16 \pm .07$ & $.86 \pm .05$ & $\mathbf{.66 \pm .04}$& $.83 \pm .05$ \\ \\ JS& $.20 \pm .00$&$.19 \pm .00$ &$.19 \pm .00$ &$.20 \pm .00$ & $.17 \pm .00$ & $\mathbf{.14 \pm .00}$& $.16 \pm .00$ \\ \\ \hline \hline \\ Gender Classification& $.63\pm .04$ & $.64 \pm .04$ &$.69 \pm .03$ & $.64\pm .03$ & $.75 \pm .03$ & $\mathbf{.86 \pm .02}$ & $.81 \pm .03$ \\ \\ \hline \hline \\ Hemisphere symmetry& $.15$&$.24$ &$.32$ &$.26$ &$.55$ &$\mathbf{.66}$& $.64$ \\ \\ Ensemble goodness& $.47\pm .06$&$.40\pm.02$ &$.35\pm .00$ &$.53\pm.05$ &$.64\pm .02$ &$\mathbf{.70\pm.01}$ & $-$ \\ \\ \hline \\ Number of ROIs &5&7&8&7&30&83&68 \\ \hline \\ \end{tabular} \caption{All results are rounded to 2 significant digits. Where it possible results are reported with standard deviation. Best result in each row is colored. KL, JS divergences, \textbf{lower is better}; binary Gender Classification was measured in terms of ROC AUC score, higher - better; Ensemble goodness and Hemisphere symmetry were measured using AMI, Ensemble goodness is an average AMI between consensus partition and all individual partitions, higher - better.} \end{table} \begin{figure}[!h] \center{\includegraphics[width=1\linewidth]{pictures/all_hem.png}} \label{pic:hierarchy} \caption{Left column: Desikan-Killiany parcellation. Right column: HE $P^{\text{III}}$ parcellation. Lateral and Medial views, left hemisphere.} \end{figure} \subsection{Results} Table 1 represent all comparison results. First we can see that CSPA algorithm failed to find good clustering ensemble which result in poor classification performance and high KL and JS divergences. Greedy algorithm performed on $P^{\text{III}}$ on the other hand outperforms standard Desikan atlas accross all comparison metrics (except number of parcels, 68 versus 83). Surprisingly, greedy ensemble of second level partition ($P^{\text{II}}$) performs comparatively with Desikan , despite having twice as lower number of parcels (30 versus 68). Another interesting property that we get automatically is parcellation symmetry. Our clustering algorithm known nothing about brain topology (all information was contained in graph connectivity), still reconstruct parcellations which are highly symmetrical. For standard Desikan atlas hemisphere symmetry is $0.64$, and for our best parcellation this value even higher ($0.66$), and still remains quite high for second level partition ($0.55$). Finally we check if our best ensemble parcellation, which combines $400$ individual partitions is stable. We split $400$ subjects into $2$ groups of $200$ subjects and independently combine their partitions. We compare resulting parcellations: $\bar{P}_{1,200}$ and $\bar{P}_{201,400}$ between themselves and with original $\bar{P}$ (which is an ensemble of all $400$ subjects) again using Adjusted Mutual Information. Both $\bar{P}_{1,200}$ and $\bar{P}_{201,400}$ shows AMI value greater than $0.80$ ($0.83$ and $0.82$ respectively) when compare with $\bar{P}$, they also highly similar between themselves. \section{Methods} \subsection{Continuous Connectome} The continuous connectome model (ConCon) treats each tract as an observation of an inhomogeneous symmetric Poisson point process with the intensity function given by \begin{equation} \lambda: \Omega \times \Omega \rightarrow \mathbb{R}^+, \end{equation} where $\Omega$ denote union of two disjoint toplogically spherical brain hemispheres, representing cortical white matter boundaries. In practice, ConCon uses cortical mesh vertices as nodes of connectivity graph. From such a representation, a ``discrete'' connectivity graph could be computed from any particular cortical parcellation $P$. We follow definitions from \cite{ConCon} and call $P = \{E_i\}_{i=1}^{N}$ a parcellation of $\Omega$ if $E_1\ldots E_k \subseteq \Omega$ such that $ \cup_i E_i = \Omega$, and $N$ is the number of parcels (ROIs). Edges between regions $E_i$ and $E_j$ can then be computed by integration of the intensity function: \begin{equation} \mathcal{C}(E_i, E_j) = \iint_{E_i, E_j} \lambda(x,y) dxdy, \end{equation} Due to properties of the Poisson Process, $\mathcal{C}(E_i,E_j)$ is the expectation of the number of observed tracts between $E_i$ and $E_j$. In the context of connectomics, this is the expected edge strength. \subsection{Graph Clustering} Once we obtain all individual continuous connectomes, we partition each independently into a set of disjoint communities. For graph clustering we use the Louvain modularity algorithm \cite{louvain}, as it has shown good results in multiple neuroimaging studies \cite{neuro_louvain1}, \cite{neuro_louvain2}, \cite{neuro_clustering}, \cite{modular_brain}. This algorithm consist of two steps. The first step combines locally connected nodes into communities, while the second step builds new meta graph. The nodes of the meta-graph are communities from the previous step, and the edges are defined as the sum of all inter-community connections of the new nodes. The algorithm in \cite{louvain} cycles over these steps iteratively, converging when further node clustering leads to no increase in modularity. \begin{figure}[!h] \center{\includegraphics[width=6cm]{pictures/adj_concon.png}} \label{pic:hierarchy} \caption{Adjacency matrix of a sample continuous connectome. Rows and columns are reordered according to partition of the third hierarchical level. Boxes of different color represents clusters of different hierarchical levels. $P^{\text{I}}$ clusters are obtained first, next we reapply clustering on each detected $P^{\text{I}}$ cluster and obtain $P^{\text{II}}$. This is repeated once more to obtain $P^{\text{III}}$} \end{figure} We follow the hierarchical brain concept \cite{modular_brain}, repeating the clustering procedure iteratively. After the initial parcellation, we further cluster each individual parcel as an independent graph. In this work, we repeat the process three times. For each ($i$'th) continuous connectome this procedure yields a three-level hierarchically embedded partition: $P^{\text{I}}_i, P^{\text{II}}_i, P^{\text{III}}_i$, (see \textbf{Figure 1}). \subsection{Consensus clustering} In order to obtain a unified parcellation for all subjects, we use consensus clustering. The concept was developed for aggregating multiple partitions of the same data into a single partition. We define the \textit{average} partition over all individual partitions $\{P_i\}$ as: \begin{equation} \label{eq:consensus_loss} \bar{P} == \text{argmin}_P \sum_i d(P, P_i), \end{equation} where $\bar{P}$ is used to denoted desirable \textit{average} partition, $K$ is a number of averaged partitions, $d(P_i, P_j)$ is a distance measure between two partitions and we want to minimize average distance from $\bar{P}$ to all given partitions $P_i$. All partitions are represented by a vector of length $M$, where $M$ is a number of clustered objects (vertices of a graph in our case). It contains values from $1$ up to $N$, where $N$ is a number of clusters (parcels). This task is generally NP complete \cite{cl_ensemble}, but there are many approximate algorithms. We use two approaches: Cluster-based Similarity Partitioning Algorithm (cspa) \cite{cl_ensemble_cspa} and greedy algorithm from \cite{cl_ensemble_HE}. CSPA defines a similarity between data points based on co-occurrence in a same cluster across different partitions, and then partitions a graph induced by this similarity. Specifically, given multiple partitions $P_1,\ldots P_K$ of a data points $x_1,\ldots x_M$. One can define similarity between points $x_i, x_j$ as follow: \begin{equation} S(x_i, x_j) = \sum_{k=1}^{K} \delta(P_k(x_i), P_k(x_j)), \end{equation} Here $\delta$ is Kroneker delta. Thus $S(x_i, x_j)$ is just number of partitions in which points $x_i$ and $x_j$ were in the same cluster. Next we build a graph, with nodes correspond to data points and edge between node $x_i$ and $x_j$ is equal to $S(x_i, x_j)$. We the partition this graph into communities using some clustering algorithm and the resulting partition is our clustering consensus partition. Another way to find such \textit{average} clustering is to optimize loss function given by Equation \ref{eq:consensus_loss}. The authors of \cite{cl_ensemble_HE} propose a greedy approach (Hard Ensemble - HE). Given multiple partitions $P_1 \ldots P_K$ it combines them iteratively, first it finds average of $\bar{P}_{1,2} = \min_{\bar{P}} (d(\bar{P},P_1) + d(\bar{P},P_2))$, next average of $P_{1,2}$ and $P_3$ and so on. As a measure of distance the authors take the average square distance between membership functions: \begin{equation} d(P_i, P_j) = \frac{1}{N} \sum_{k=1\ldots N} ||p^k_i - p^k_j||^2, \label{eq:dist} \end{equation} Exclusively for this definition we use another way to encode object's memberships: $P_i$ is a matrix of size $M \times N$ (number of objects times number of clusters) \begin{equation} P_i^{m,n} = \begin{cases} 1 & \mbox{if } m \mbox{'th object belongs to } n \mbox{'th cluster}\\ 0 & \mbox{otherwise.} \end{cases} \end{equation} In Equation \ref{eq:dist} $p_i^k$ and $p_j^k$ are $k^{\text{th}}$ rows of memberships matrices $P_i$ and $P_j$ respectively. They correspond to membership vector of the $k^{\text{th}}$ object. Since we are looking for disjoint clusters, only a single element of such row vector is equal to $1$. This representation is defined up to any column permutation $\pi$ of matrix $P$, thus the optimization procedure is done subject to all possible column permutations. \subsection{Comparison metrics} Once we find individual partitions and combine them into an average partition, we want to access their quality. We use two different approaches. First, we compare representation strength of different parcellations by measuring distance between original $\lambda(x,y)$ and its piece-wise approximation given by: \begin{equation} \gamma(x,y) = \frac{1}{|E_i||E_j|} \mathcal{C}(E_i, E_j), \end{equation} where $x\in E_i$ and $y\in E_j$. Natural way to compare two statistical distributions is to measure distance between their probability density functions, we will use Kullback-Leibler divergence \cite{KL_div}. For two probability distributions with densities $\lambda(x)$ and $\gamma(x)$ the KL divergence is: \begin{equation} KL(\lambda,\gamma)=\int_{-\infty}^{\infty}\lambda(x)\log\frac{\lambda(x)}{\gamma(x)}dx, \end{equation} It takes values close to 0 if two distributions are equal almost everywhere. Similar but symmetrized version of KL divergence is Jensen-Shannon divergence \cite{JS}. Again for two probability distributions with densities $\lambda(x)$ and $\gamma(x)$ it is given by: \begin{equation} JS(\lambda,\gamma)=\frac{1}{2}(KL(\lambda,r) + KL(\gamma,r)), \end{equation} where $r(x)=\frac{1}{2}(\lambda(x)+\gamma(x))$. Second, we compare performance of different parcellations on a gender classification task. We use Logistic Regression model with (small) $l_1$ regularization on a vectors of edge weights (the upper triangle of adjacency matrix excluding diagonal). Classification perfomance is measured in terms of ROC AUC score, which is typical for binary classification tasks. Finally, in order to quantify goodness of consensus clustering and access hemisphere symmetry we use Adjusted Mutual Information \cite{clustering_comparison}. It measures similarity between two partitions, with value 1 corresponds to identical partitions and values close to zero for partitions that are very different. Using AMI we access ensemble goodness (how good clustering ensemble algorithm combines multiple partitions) using modified \ref{eq:consensus_loss}: \begin{equation} \text{Ensemble goodness} = \sum_i^{K} \text{AMI}(\bar{P}, P_i), \end{equation} We compute parcellation symmetry by comparing hemisphere parcels (labels): \begin{equation} \text{Symmetry} = \text{AMI} (\bar{P}_{\textbf{LH}}, \bar{P}_{\textbf{RH}}). \end{equation} \section{Introduction} The ability to quantify how the human brain is interconnected in vivo has opened the door to a number of possible analyses. In nearly all of these, brain parcellation plays a crucial role. Variations in parcellation significantly impact connectome reproducibility, derived graph-theoretical measures, and the relevance of connectome measures with respect to biological questions of interest \cite{Petrov_35_connectomes}. A natural approach is then to use individual densely sampled connectomes to drive the parcellation directly, leading to a more compact, connectivity-aware set of brain regions and resulting graph, as done in e.g. \cite{multimodal_parcel}. A comprehensive review of parcellation methods and their effects on the derived connectome quality is given in \cite{Arslan_parcellation_compare}. Because individual connectivity data is at once very informative and highly redundant, there is a great flexibility in how parcels can be derived from dense, highly resolute graphs. It is possible for example to derive (1) a unified population-based atlas, (2) individual-level parcellations with cross-subject label mapping, or (3) individual parcellations with no inter-subject label correspondence. While the first approach is appealing for its simplicity and ease of interpretation, the second and third may enable the researcher to reveal some individual aspect of the connectome that is lost in the aggregate atlas. In this work, we attempt to bridge these three approaches by first constructing maximally flexible hierarchical parcellations, and then finding a unifying set of labels and parcels to maximize individual agreement. We use the a continuous representation of a brain connectivity \cite{ConCon} as our initial dense connectome representation. Continuous connectivity is a parcellation-free representation of tractography-based, or ``structural'' connectomes that is based on the Poisson point process. Once individual parcellations are computed, we obtain a group-wise parcellation using partition ensemble algorithm. We access quality of the resulting parcellations in three ways. (1) We use the continuous connectome framework to compare parcellation-approximate and exact edge distribution functions. (2) We compare perfomance of the resulting graphs on a gender classification task. (3) We also show that without any explicit knowledge of brain geometry and based solely on graph connectivity we obtain comparatively symmetric parcellations.
\section{Introduction} Generating randomized paths for \textit{Non-Player Characters} (NPCs) is a common task in game design. Simple random walks, however, are unsatisfying, in tending to unrealistic, jagged, fractal-like trajectories with erratic space coverage~\cite{lawler}. Better results are possible by making use of higher-level navigation models, such as a waypoint graphs or flow models, but it is in general not an easy task to do for non-programmers, requiring substantial algorithmic development and significant programming effort to ensure simple, frequently desired properties, such as avoiding self-intersection, forming closed loops, and encircling obstacles. In this work we describe an example-based approach to path generation with a simple, flexible interface. Our design is based on the \textit{Wave Function Collapse} (WFC) algorithm~\cite{GuminWFC}, an example-based approach to texture generation. We modify and augment WFC to form a workflow that takes a representative path design and game level as input, and produces a usable set of paths respecting the given path properties and level (obstacle) constraints. Simple modifications to the input path design can be done with any image editor, and can then be used to control properties of the resulting paths. Our approach is realized in the Unity framework, and we show how the algorithm scales to significant, practical level sizes. For easy use and experimentation, the tool is able to read in actual game levels expressed in ASCII form, as from the \textit{Moving AI} benchmark suite \cite{sturtevant2012benchmarks}. Contributions of our work are as follows: \begin{itemize} \item We define modifications to the basic WFC algorithm to allow for small, generic images to be used as general models of path design. Basic, easily modified properties of the image then control useful properties of the path output. Our approach includes non-trivial changes necessary to accommodate the densely constrained output context of typical game levels. \item A complete realization in Unity is shown and made available \footnote{https://github.com/hugoscurti/path-wfc} , including a full workflow that reads in game levels and generates abstract path data structures. This work includes post-processing steps to filter and smooth the output paths. \end{itemize} \section{WFC Background} Our approach builds heavily on the \textit{Wave Function Collapse} algorithm developed by \citeauthor{GuminWFC} \shortcite{GuminWFC}, more precisely the overlapping version of the algorithm. This algorithm builds random output textures based on smaller input textures by looking at overlapping patterns in the input texture sample. Understanding this algorithm is critical to understanding our modifications, so we summarize the main steps below. Further detail can be found in the code itself. \begin{enumerate} \item Extract all possible unique $n \times n$ patterns from a discretized input image; the frequency of each unique pattern in the input is also later used as a sampling distribution. \label{wfc:stepA} \item Compute all the possible overlap combinations between each pattern. The (im)possibility of overlap between patterns results in the main set of constraints used to build an output image.\label{wfc:stepB} \item Each discretized tile in the output sample maintains a list of legal patterns that could define the pixel value(s) in that tile. Absent any constraints, such as at the start of the algorithm, every pattern is legal in any tile.\label{wfc:stepC} \item Choose a tile in the output sample and commit the value based on one of the legal patterns that cover the tile. This choice follows an entropy calculation that looks for the tile that has the fewest available patterns, and thus is most constrained. The frequency distribution of basic patterns computed in step~\ref{wfc:stepA} is used to bias selection of the pattern. This is referred to as the \textbf{observe} step of the algorithm.\label{wfc:stepD} \item The overlap combinations computed in step~\ref{wfc:stepB} are used to filter out any now illegal patterns covering adjacent positions, and this is applied recursively throughout the output image. This is referred to as the \textbf{propagate} step.\label{wfc:stepE} \item Repeat steps~\ref{wfc:stepD} and~\ref{wfc:stepE}, observing and propagating until no further progress can be made. At that point either all tiles are fixed to one pattern (the algorithm succeeded), or at some point a tile has no more patterns available (the algorithm failed). In the latter case the algorithm is restarted with a different random seed.\label{wfc:stepF} \end{enumerate} The original implementation adds a few helpful options for texture generation, such as the ability to set boundary patterns, wrap periodically, and extend the range of available patterns by adding rotations and reflections of patterns sampled from the input. \section{WFC for Path Generation} We aim to use WFC to enable example-based path generation. A user supplies a single path sketch, showing an example path, and this is applied to an output level, filling the level with paths that have characteristics similar to the original example. Unfortunately, while the basic WFC algorithm excels at creating randomized images respecting the constraints of immediate pattern adjacency, it has difficulty guaranteeing non-local properties. For path generation we require a mixture of local properties, such as angle of movement and proximity to obstacles, and properties that are highly non-local, such as control over relative shape, the ability to form closed curves, and encircle/contain other features. Our output images are also existing game levels, already densely constrained by obstacles, complicating the creation of initial constraints and making WFC's core trial-and-error approach highly inefficient, or even impossible. Below we describe 3 main techniques we used to modify WFC to better handling pathing. \subsection{Output constraints and pre-processing} The original WFC algorithm lets users fix specific tiles in the output to enforce initial output constraints. This builds on the basic algorithm process, manually choosing/reducing the set of legal patterns at a specific location and propagating the resulting constraints. For a large map, filled with obstacles, this would be extremely tedious, and some initial pre-processing is thus necessary to dynamically fix tiles in the output to guarantee the result continues to faithfully represent the original game level. The process is essentially a batched, automated version of the basic manual fixing. We filter the input level representation, constructing an initial output image with tiles designed as either free-form, pathable space (represented by a white pixel) or obstacles (represented by a red pixel); path fragments (black pixels) could also be incorporated. Interiors of obstacles are thus constrained to a single pattern based on being filled with a single, unique colour, while the patterns permitted to cover perimeters of obstacles are reduced to match the boundary edge. \begin{figure}[htbp] \centering \includegraphics[width=2.8in]{FixedOutputGoodBad.png} \caption{Different outputs making the algorithm succeed (output 1) and fail (output 2).} \label{fig:FixedOutputGoodBad} \end{figure} The process is flexible, and also provides early warning of unsatisfiable constraints. Figure \ref{fig:FixedOutputGoodBad} shows a specific \textit{Input} path image/template, representing a path encircling an obstacle. For \textit{Output~1} a solution is possible; a level such as \textit{Output~2}, however, fails, as the notched obstacle cannot be filled by any pattern found in the input. \subsection{Arbitrary colours as ``stretch space''} An important goal is that generated paths have at least some heuristic, qualitative similarity to the example input. Overly literal interpretation of the input image, however, tends to generate paths that are either too strict or under-constrained. Figure~\ref{fig:NonstretchExamples} shows examples of trying to use an input sketch to imply paths should generally encircle the obstacle. In example~1 the result is under-constrained. The distance between the example path and the obstacle means patterns exist that do not contain both the path and obstacle colours. Generated paths thus meander arbitrarily, more or less oblivious to the obstacle. Example~2 shows an attempt to solve this by putting the path close to the obstacle, but this results in only generating paths strictly one unit away from the obstacle (or from another path edge). \begin{figure}[ht] \centering \includegraphics[width=2.8in]{NonStretchExamples1.png} \caption{Execution of the algorithm without using stretch space.} \label{fig:NonstretchExamples} \end{figure} We introduce the notion of \textit{stretch space} to alleviate this issue. We use a unique, designated color in the input image to represent the space between an obstacle and the path that goes around it. We make sure that one pattern can be filled entirely with this color so that the overlapping nature of the algorithm will make it overlap with itself, therefore making the space between obstacles and paths \textit{stretchable}. This helps generated paths behave more closely to their inputs as it restricts the sets of overlapping patterns for each pattern that contains a path. Figure~\ref{fig:StretchSpace} shows an example, using light blue to indicate stretch space. The blank area of the output can then be filled with stretch space, ensuring path pixels have some relation to obstacles (or other path segments): blue patterns may be selected to extend the stretch area, eventually and necessarily reaching path/obstacle patterns that close the path. \begin{figure}[ht] \centering \includegraphics[width=2.8in]{StretchSpace2.png} \caption{\begin{small} Example of using stretch space propagating out from an obstacle corner. On the top, the stretching is terminated by a vertical path line, defining a generated path one unit away from the obstacle. The bottom instance shows a different, random choice, selecting empty stretch space to push the path tile away further. Note that similar to Gumin's implementation, the images show progress during the execution of the algorithm, averaging the color from the set of all surrounding legal patterns until it is filled by one pattern, rather than just showing blank/white pixels. This results in a blurry effect while patterns are being unveiled. \end{small}} \label{fig:StretchSpace} \end{figure} Using stretch space allows for greater versatility and generally better correspondence with the path behaviour of the input example. It is, however, a heuristic trade-off in permissiveness. Patterns will typically exist with no obstacle pixels, allowing construction of (usually smaller) paths enclosing only stretch space, and thus not necessarily encircling an obstacle. We give the option to remove these as a post-processing step. \subsection{Masks} Input examples are meant to be simple, schematic drawings. Outside trivial situations, these are unlikely to include all possible patterns needed to fill the output level map---complex and varied obstacle and boundary shapes in the intended level space generate output constraints that will in general not be satisfiable. Path generation, however, has the advantage over other WFC applications in that it is not strictly necessary to find a complete solution. A partial solution that establishes paths can be a sufficient, even if the set of pattern constraints cannot be fully propagated to cover every tile in the output. We thus introduce \textit{masks} to help cover tiles for which we do not have an appropriate input pattern. We do this by automatically creating patterns from the output map. We analyze the output for all patterns that contain obstacles. Then, for each pattern, we replace white tiles around obstacles by various masks depending on their relative position to an obstacle. Tiles that are adjacent to an obstacle contain a mask that allows everything but the path color and all other tiles contain a mask that allows any color. This design enables input-derived patterns to propagate up to obstacles, but not fail constraints due to being unable to align with the exact obstacle boundary---even if not explicitly sketched in the input example, any obstacle in the output can be dealt with and can have paths, free space and stretch space around it. \begin{figure}[ht] \includegraphics[width=3.2in]{MaskExecution.png} \caption{\begin{small} Execution of the algorithm using masks on output boundaries. Masks are represented as transparent tiles.\end{small}} \label{fig:MaskExecution} \end{figure} Figure~\ref{fig:MaskExecution} shows an example. The input example does not include a concave notch in the obstacle, and thus a naive WFC will be unable to find a solution given the limited set of patterns present in the input. Using a mask we can effectively ignore the aberration, successfully generating a cyclic path around the obstacle even though no pattern from the input fits the upper right notch. Masks obviously represent a trade-off between successful generation and strictly following input constraints. Our tool design allows masks to be toggled on or off, depending on the path generation goals. \subsection{Post processing} The heuristic nature of our approach is augmented with some post-processing steps to filter out degenerate constructions, help visualize results, and generally better prepare paths for integration into a game environment. Figure~\ref{fig:PostProcessing} shows an execution flow for of all processing steps. With the exception of the initial conversion, all steps mentioned below are optional and can be used independently. \subsubsection{Conversion to usable path} The WFC image output is converted into a waypoint format that can be used in a game environment. We generate paths by following path tiles incrementally until a path is complete. The actual 3D model requirements are of course game dependent, but we provide a baseline conversion for easy visualization, using simple cubes for obstacles, and line renderers for paths. \subsubsection{Path filtering} As a result of using overlapping patterns and masks, outputs may contain smaller paths that are not necessarily appealing. We enable the option to filter out paths that are smaller than a specified length threshold. \subsubsection{Path Simplification} Depending on the input patterns, some paths can get complicated and have a significant amount of redundant turns or detours. We provide a post-processing option to simplify paths, based on the \textit{Ramer-Douglas-Peucker algorithm (RDP)} \cite{RAMER1972244,DouglasPeucker} to remove redundant vertices. We modified the algorithm to avoid obstacle intersection when simplifying a path segment. \subsubsection{Path Smoothing} Since they are generated using $3 \times 3$ patterns, output paths naturally have sharp turns and corners. We thus also provide smoothing using \citeauthor{Chaikin1974}'s curve generation algorithm \cite{Chaikin1974}. Similar to path simplification, we modified the algorithm to make sure that we do not cut a corner if a modified path segment intersects an obstacle. \begin{figure}[ht] \centering \includegraphics[width=2.8in]{PostProcessing.png} \caption{\begin{small} Execution of all post-processing steps in their respective order. Output map is ``arena'' from the \textit{Dragon Age: Origins} benchmark set.\end{small}} \label{fig:PostProcessing} \end{figure} \section{Experimentation} The precise intention of a user's input path example is of course open to multiple interpretations. Experimental work is thus aimed at providing proof-of-concept evidence that the input image does allow for control over the output, with a qualitatively clear correspondence of features. We also address performance concerns, showing that the process scales to relatively large output maps typical of modern games. \subsection{Setup} Our setup is based on a custom Unity implementation of our modified WFC algorithm. We use custom inputs, extracting patterns of size $3 \times 3$ as sufficient to represent useful path properties without introducing major scaling issues. Input and output 2D maps use small monochromatic sprites to represent tiles and interactively show the execution of the algorithm. When the execution succeeds, post processing steps can be applied to generate paths in a 3D representation of the output map, along with an agent that can walk through generated paths. The algorithm was used on a 64-bit Windows 10 machine with an Intel Core i5-4200U CPU running at 1.60 GHz, an Nvidia GeForce GT 750M GPU, and 8 GBs of RAM. The algorithm was tested with maps representing game levels from \textit{Dragon Age: Origins} and \textit{Baldur's Gate II}, as extracted from the Moving AI benchmark sets \cite{sturtevant2012benchmarks}. \subsection{Controlling the output} Output properties are affected by changes to the base WFC algorithm, as well as by the given input example. Below we show representative examples to illustrate the range of results and give an indication of how the output can be controlled. \subsubsection{Stretch space} Use of stretch space was motivated by the desire for better correspondence with the input. Both types of input, with and without stretch space, however, generate interesting paths that may be useful for different purposes, with the latter having a much higher degree of randomness. \begin{figure}[ht] \centering \includegraphics[width=2.8in]{BufferVsNonBuffer.png} \caption{\begin{small}Comparison between output generated without and with stretch space. \end{small}} \label{fig:BufferVsNonBuffer} \end{figure} Figure~\ref{fig:BufferVsNonBuffer} shows the effect of using stretch space or not in an otherwise identical input/output context. In contrast to example 1 from figure~\ref{fig:NonstretchExamples} where paths are not closed, execution without stretch space (figure~\ref{fig:BufferVsNonBuffer}, left) in a larger output bounded by obstacles results in reasonable closed routes, although more meandering than the rectangular paths generated by using stretch space (right). The effect of stretch space is driven by the constraints between pattern overlaps, where having different colors inside and outside the cyclic path prevents corners from acting as both inside and outside turns. This gives us two different ways of generating paths with one input, using a less constrained interpretation to generate a broader range of outputs, or a stricter view that generates results more similar to the shape of the input path. \subsubsection{Frequency distribution} Using weights to select patterns also gives us control over the outcome of the algorithm. We use the same pattern selection mechanism as in the base WFC algorithm: the frequency of each pattern extracted from the input gives a frequency distribution, which is then used to calculate the entropy of given tiles in order to select the next tile and pattern during the \textbf{observe} step. The relative extent of identical features in the input thus gives control over the likelihood of choosing a corresponding pattern in the output. Figure~\ref{fig:RectangleInput} shows the effect. Even though horizontal and vertical rectangles and squares have identical sets of input patterns, the relative number of each pattern biases the output. \begin{figure}[htbp] \centering \includegraphics[width=3in]{RectangleInput.png} \caption{\begin{small}Comparison between output generated with different types of input. Rotations and reflections are disabled in order to accentuate the differences.\end{small}} \label{fig:RectangleInput} \end{figure} Further control is possible using the same mechanism. Tuning the ratio of white tiles to stretch tiles, for example, will affect the output in terms of how many paths there will be and how big paths will get. \subsubsection{Uniform distribution} Pattern/tile selection can also be done without regard to pattern frequency. Figure~\ref{fig:RandomDistro} shows two outputs generated from the same input and random seed. The first output uses the normal frequency distribution, while the second output uses a uniform distribution. As we can see, the preponderance of vertical rectangles apparent in the first case is not reproduced in the second output, since the distribution of patterns is the same for each pattern. There is also less overall coverage, due to the fact that stretch space tiles are now less frequent than in the first output. \begin{figure}[ht] \centering \includegraphics[width=2.8in]{RandomWeightsComparison.png} \caption{\begin{small}Comparison between output generated with different types of distribution. Rotations and reflections are disabled.\end{small}} \label{fig:RandomDistro} \end{figure} \subsubsection{Different input/output combinations} To support the argument that the algorithm works for different combinations of input and output, we show examples on 2 larger inputs, namely \textit{Arena2} ($281 \times 209$) and \textit{Lak519d} ($168 \times 145$) from the \textit{Dragon Age: Origins} benchmark set. \begin{figure}[ht] \centering \includegraphics[width=3.2in]{Arena2Example.png} \caption{\begin{small}Example of execution with the Arena2 map.\end{small}} \label{fig:Arena2Example} \end{figure} Figure~\ref{fig:Arena2Example} shows a result of the algorithm on the \textit{Arena2} map. Here we used a complex polygon as the input, incorporating both a concave notch and edges with different angles. Rotations are reflections are also enabled. The resulting paths are more organic, with many more complex turns and routes. \begin{figure}[ht] \centering \includegraphics[width=3in]{Lak519dExample.png} \caption{\begin{small}Example of execution with the Lak519d map.\end{small}} \label{fig:Lak519dExample} \end{figure} Figure~\ref{fig:Lak519dExample} shows a result on the \textit{Lak519d} map using an octagon as the input. For this input, enabling rotations and reflections is irrelevant as it would add no additional pattern. The more limited pattern set available in this output results in output quite different from figure~\ref{fig:Arena2Example}, with path shapes that have a strong similarity to the input. Note that here we also added obstacle tiles in the input's corners to cover up white space and even out the ratio between white space and stretch space. \subsection{Performance} The performance of WFC mainly depends on 2 factors, the number of patterns extracted from the input, as well as the size of the generated output. Our design integrates optimizations introduced by \citeauthor{FehrCourantFast} \shortcite{FehrCourantFast}. We also make use of Unity's \textit{Job System}, using it to help parallelize the post-processing path generation step. Measurements are gathered by running the algorithm 10 times on each test set and compare the change in average execution time. We discard the first execution for each test as a cache warm up. \begin{table}[ht] \begin{small} \centering \caption{\begin{small}Average time in seconds for varying inputs/outputs.\end{small}} \label{table:inputoutput} \centerline{ \begin{tabularx}{\columnwidth}{ |c|c|X|c|X|X| } \toprule Input & Output & Nb. Patt. & Size & Time (sec.) & Std Dev. \\ \midrule Poly 2 & arena1 & 206 & $49\times49$ & 0.89 & 0.012 \\ Poly 2 & orz000d & 253 & $79\times137$ & 7.61 & 0.118 \\ Square & lak519d & 304 & $168\times145$ & 49.59 & 0.821 \\ Octagon & lak519d & 320 & $168\times145$ & 53.11 & 1.024 \\ Poly 1 & lak519d & 348 & $168\times145$ & 58.71 & 0.436 \\ Poly 2 & lak519d & 376 & $168\times145$ & 61.02 & 1.388 \\ Poly 2 & arena2 & 267 & $281\times209$ & 78.43 & 0.431 \\ \bottomrule \end{tabularx} } \end{small} \end{table} Table \ref{table:inputoutput} shows executions with different inputs and outputs. We used a specific input (Poly 2) with varying outputs as well as a specific Output (lak519d) with varying inputs. As shown by the average execution time (column Time), using inputs that generate more patterns increases the running time, however execution time grows notably more as the output size grows. Despite these variations, execution on significantly large maps is done in a reasonable amount of time. \section{Related work} Our work relies heavily on the WFC algorithm as it is an adaptation of the WFC overlap model. The WFC algorithm has seen a few notable ports and forks. \citeauthor{KarthWFC} released a paper on WFC in which they describe the algorithm in depth, discuss its influence and contextualize it in terms of constraint solving \cite{KarthWFC}. \citeauthor{FehrCourantFast} have developed a faster version of the algorithm written in C++ \cite{FehrCourantFast} which introduces modifications such as reducing the number of overlaps per pattern processed by the algorithm. \citeauthor{lefebvre:hal-01706539} have experimented with hiding messages in the generated images from the tiled model, with an emphasis on the fact that embedded images are not distinguishable from normal generated images \cite{lefebvre:hal-01706539}. Among a few others, \citeauthor{Gumin3dWFC} also developed a 3D version of the tiled model to generate 3D images using voxels \cite{Gumin3dWFC}. \subsection{PCG} Path generation itself is generically part of the field of \textit{Procedural Content Generation (PCG)}. This field applies mostly to games and consists of algorithms that generate content such as textures, levels, terrains, quests, items, or other game-related concepts. The key idea is that the content is created in a random and algorithmic way with minimal user input, in contrast to content being manually crafted by game designers. Many generative techniques have been explored, including constraint models, based on understanding the rhythm or pacing of player experience, such as the \citeauthor{smith2010tanagra}'s \textit{Tanagra} tool for 2D platformer levels \shortcite{smith2010tanagra}, and machine-learning approaches that demonstrate it is possible to construct levels without domain-specific knowledge~\cite{snodgrass2018markov}. Although less common, PCG algorithms have been applied to path generation previously as well. \citeauthor{xu-14-generative} \shortcite{xu-14-generative} developed a tool to randomly place guards and cameras in stealth game levels. Their approach concentrated on visibility and coverage properties, aiming to heuristically control level difficulty. More information on PCG can be found in \citeauthor{shaker2016procedural}'s book \shortcite{shaker2016procedural}. \subsection{Roadmap Generation} Higher-level navigation systems, such as roadmaps, can also be used as a basis for creating randomly wandering NPC motion, presenting seemingly goal-directed behaviour by defining random path choices at a larger scale. Paths based on optimal roadmaps, however, tend to scrape obstacles~\cite{nilsson69}, which is both not human-like, and a source of error in game simulation. For games, NPC movement is better shifted away from obstacles. Convex decompositions or \textit{navigation meshes} can be used to give more movement freedom. Triangulations are a natural choice in this respect, and many systems build roadmaps from the triangulation dual. \citeauthor{Demyen:2006:ETP:1597538.1597687} \shortcite{Demyen:2006:ETP:1597538.1597687}, for instance, show that it is efficient to build a graph for pathfinding by using constrained Delaunay triangulations, a technique also used by \citeauthor{DBLP:journals/corr/LensB16} \shortcite{DBLP:journals/corr/LensB16} to build roadmaps with controlled distance from obstacles. \citeauthor{AmatoRandomizedRoadmap} \shortcite{AmatoRandomizedRoadmap} generate roadmaps by randomly selecting candidate points on the boundaries of a shape and using the midpoint between lines connecting pairs of candidates to form a roadmap. In defining routes that well avoid obstacles, roadmap algorithms tend to approximate the \textit{medial axis skeleton} \cite{Blum:1967:ATF}, a simplified graph that defines points equally distant from internal obstacles. This has a natural appeal for roadmaps, and thus pathing, and use of the medial axis has been experimented with by many authors \cite{AmatoPRMMedialAxis,GuibasPRMMedialAxis}. \citeauthor{singh-15-using-TH} \shortcite{singh-15-using-TH} has taken this concept even further and used medial skeletons in a 3D environment (2D map with 3rd dimension as time) to generate roadmaps in a dynamic environment for stealth games. Other pathfinding systems also lend themselves to path generation. The hierarchical pathfinding algorithm developed by \citeauthor{botea2004near} \shortcite{botea2004near} creates an abstract graph of a map by separating the map into clusters, which could be adapted to be used generatively. Search graphs of various forms can be used in a similar fashion. \textit{Rapidly exploring random trees (RRTs)}, for example, can be used to generate random paths in fixed maps \cite{LavalleRRT}. The idea of RRTs is to grow a randomized tree structure from a certain position in order to fill the map with many different random paths. This could be adapted to generate random meandering paths by setting a starting point and letting the RRT search grow, perhaps also including constraints on how it connects new nodes for controlling variety. In contrast to pathfinding, dynamic systems can also be used to randomly move agents around obstacles. One can use steering behaviours \cite{reynolds1999steering} along with obstacle attraction \cite{fajen2003dynamical} to make an agent move around an obstacle. In a similar fashion, using flow fields for crowd pathing \cite{emerson2013crowd}, one can generate flow fields that gravitate around obstacles and make agents move along those flow fields. \section{Conclusion \& Future Work} In this paper, we have presented a modification to the Wave Function Collapse algorithm that handles random path generation using input texture samples and fixed output maps. The algorithm extends the original WFC algorithm by generating paths similar to the input by using stretch space, and by using masks to enable new patterns based on the shape of obstacles from the output map. We have included post-processing options to filter out small paths and to make remaining paths smoother. We presented a convenient tool developed in Unity that lets any user, with our without programming knowledge, use the algorithm for path generation purposes. Using a texture generation algorithm to generate paths has a few inherent limitations. First of all, there is no defined way to enforce true global constraints on the output to satisfy the global shape of the input path. Moreover, since paths are defined by pixels, intersecting paths introduce ambiguity in converting the 2D image into waypoints for a game level. Future work on the algorithm could include using heuristics on intersecting tiles to determine which neighbour is the next path segment. Further development include enforcing additional constraints to make paths meet certain evaluation criteria, such as the number of turns taken or the number of obstacles that paths enclose. A more complex constraint would be to augment our algorithm with a frequency distribution on pairs of patterns, which could bind the selection of a pattern to previously selected neighbour patterns. \clearpage \bibliographystyle{aaai}
\section{Introduction}\label{intro} It is well known that the optimal portfolio strategy for terminal wealth (amount of money) utility maximization problems in a Black-Scholes market can be approximated by a wealth- and time-independent strategy if the planning horizon is distant (investment over the long run) and the terminal wealth utility behaves asymptotically like a power utility. This is called the {\it turnpike property} for investment, see Back et al. (1999), Bian and Zheng (2015), Cox and Huang (1992), and Huang and Zariphopoulou (1999) for expositions on the topic. It is highly interesting to know if the turnpike property still holds for optimal investment and consumption problems. Consider the following utility maximization problem: \begin{equation} \label{primal_problem} \sup_{\pi, c} E\left[\int_0^T e^{-\delta t} U_2(c_t)dt +e^{-\delta T}U_1(X_T)\right], \end{equation} where $\delta$ is a discount factor, $T$ is the planning horizon, $X_T$ is the wealth at time $T$ and $X$ is a wealth process satisfying \begin{equation} \label{wealth} dX_t = rX_tdt + X_t\pi_t \sigma (\theta dt + dW_t) - c_tdt, \; t\geq 0, \end{equation} with the initial wealth $X_0=x_0$, $r$ is the riskless interest rate, $\theta=\sigma^{-1}(\mu-r)$ is the Sharpe ratio, $\mu$ and $\sigma$ are the growth and volatility rates of a risky asset, $W$ is a standard Brownian motion, $\pi$ and $c$ are portfolio and consumption processes, $U_i$, $i=1,2$, are utilities for wealth and consumption. Assume $A(x,t)$ is the optimal amount of money invested in the risky asset at time $t$ with wealth $x$. We say the problem (\ref{primal_problem}) has the turnpike property for investment if $A(x,t)$ is approximately a linear function of $x$ when $T$ is distant. If $U_i$ are the same power utility function $(1/p)x^p$, then $$ A(x,t)={\theta\over \sigma (1-p)}x.$$ Jin (1998) proves that if utilities $U_i$ behave asymptotically like power utilities $(1/p_i)x^{p_i}$ for large wealth $x$, then the optimal portfolio $\pi$ and the optimal consumption $c$ at any fixed time $t$ are close to those derived with power utilities $(1/ p_i)x^{p_i}$ in the absolute or mean squared norm if the investment horizon $T$ is distant. Back et al. (1999) discuss portfolio turnpikes for optimal terminal wealth (called consumption in their paper) problems and show that the turnpike property does not hold in the presence of consumption (called consumption withdrawal in their paper) with a counter-example using a shifted power utility. Little is known in the literature if $A(x,t)$ is still approximately a linear function of $x$ for general utilities $U_i$ when $T$ is distant, even less so for the limiting behaviour of the optimal consumption $c(x,t)$. The objective of this paper is to identify the conditions for general utilities $U_i$ under which the optimal portfolio strategy can be approximated by a wealth- and time-independent strategy if the planning horizon is distant. When utilities $U_i$ behave asymptotically like power utilities $(1/p_i)x^{p_i}$ at large wealth $x$, we can give an affirmative answer on whether or not the turnpike property holds. The main contributions of the paper are that we find a threshold value that characterizes precisely the conditions for utilities to have the turnpike property, that we show there is no turnpike property in general for the optimal consumption, and that we estimate the convergence rate of the optimal trading strategies to the limiting ones, which, to the best of our knowledge, is absent in the literature, see Theorems \ref{Main-1}, \ref{Main-1a} and \ref{Main-2}. We next highlight the main results of the papers. In the literature the conditions are normally imposed on utilities $U_i$ for the turnpike property. For example, assume $U_i$ are continuously differentiable, increasing and strictly concave, satisfying $\lim_{x\to\infty}U_i'(x)=0$ and \begin{equation} \label{V-1} \lim_{x\to \infty} {U_i'(x) \over x^{p_i-1}} = 1, \end{equation} for $i=1,2$, where $p_i<1$ and $U_i'$ are derivatives of $U_i$. Condition (\ref{V-1}) means that utilities $U_i$ behave like power utilities $(1/p_i)x^{p_i}$ if the wealth level $x$ is large and is equivalent to \begin{equation} \label{eqn10} \lim_{y\to0} {V_i'(y)\over y^{q_i-1}} = -1, \end{equation} where $q_i:=p_i/(p_i-1)<1$ and $V_i$ are the dual functions of $U_i$, defined by \begin{equation}\label{dual_func_V_i} V_i(y):=\sup_{x\geq 0}\{U_i(x)-xy\} \end{equation} for $y\geq 0$.\footnote{A utility function $U$ and its dual function $V$ are equivalent and can be recovered by each other from the relations $V(y)=\sup_{x>0}(U(x)-xy)$ and $U(x)=\inf_{y>0}(V(y)+xy)$. For example, if $U$ is a power utility $U(x)=(1/p)x^p$ for $x>0$ and $p<1$, then its equivalent dual function is $V(y)=-(1/q)y^q$ for $y>0$ and $q=p/(p-1)$. Furthermore, $U_i(x)=V_i(y)+xy$ if and only if $U'_i(x)-y=0$. Therefore, from $$ {U_i'(x)\over x^{p_i-1}}= \left({y^{q_i-1}\over -V_i'(y)}\right)^{p_i-1} $$ and $U_i'(\infty)=0$, we get the equivalence of conditions (\ref{V-1}) and (\ref{eqn10}). } The key benefit of using dual utilities $V_i$, instead of utilities $U_i$, is the following: When the stochastic control method is used to solve investment and consumption problems, the optimal strategies can be expressed by some functions of derivatives of a solution to a nonlinear partial differential equation (PDE) which is difficult to solve and analyse. Thanks to the dual stochastic control method, we demonstrate that the optimal strategies can be characterized by some functions of derivatives of a solution to a linear PDE and have representations in terms of dual utilities $V_i$, which makes it feasible to derive the turnpike property and estimate the convergence rate. Theorem \ref{Main-1} states that if (\ref{eqn10}) holds\footnote{The result of Theorem \ref{Main-1} can be stated equivalently in terms of $p_i$ defined in (\ref{V-1}), that is, if $p_1>p^*$ or $p_2\geq p^*$, where $p^*=q^*/(q^*-1)\geq 0$, then the turnpike property holds and the optimal amount of investment can be approximated by $ \lim_{T\rightarrow \infty}A(x,t)=(\theta/\sigma)(1-\max\{p_1,p_2\})^{-1}x$.} with $q_1<q^*$ or $q_2\leq q^*$, where $q^* < 0$ is a threshold value,\footnote{Note that $q^*$ only depends on the market price of risk $\theta$, the riskless interest rate $r$ and the utility discount rate $\delta$. } given by \begin{equation} q^*=\alpha - \sqrt{\alpha^2 + {2\delta \over \theta^2}}, \label{threshold_value} \end{equation} where $\alpha={1\over 2}+ {r-\delta \over \theta^2}$, then the turnpike property for investment holds, that is, \begin{equation}\label{turnpike} \lim_{T\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma}(1-\min\{q_1,q_2\})x, \end{equation} which means the optimal amount of investment $A(x,t)$ can be approximated by $\frac{\theta}{\sigma}(1-\min\{q_1,q_2\})x$ when the investment horizon $T$ is distant. Theorem \ref{Main-1a} states that if dual marginal utilities $V_i'$ converge to dual marginal power utilities $-y^{q_i-1}$ at certain speed and $q_1<q^*$ or $q_2<q^*$, then the speed of convergence of the optimal investment strategy to its limiting strategy in (\ref{turnpike}) is exponentially fast. Theorem \ref{Main-2} states that if (\ref{eqn10}) holds with $q_1\geq q^*$ and $q_2> q^*$, then $A(x,t)$ converges to a nonlinear function of $x$ when $T\to\infty$ for general utilities, in other words, the turnpike property does not hold in the classical sense. However, there is a notable exception if the consumption utility $U_2$ is a power utility $(1/p_2)x^{p_2}$ with $0<p_2<1$, in that case $A(x,t)$ still converges to a linear function of $x$, given by $(\theta/\sigma)(1-q_2)x$. We now illustrate the results of Theorems \ref{Main-1} to \ref{Main-2} with both utilities being power utilities. It is well known that the optimal amount of investment $A(x,t)$ is a linear function of the wealth $x$ if there is only terminal wealth utility $U_1$ ($U_2=0$) or only consumption utility $U_2$ ($U_1=0$) or the same utilities $U_1=U_2$. For different power utilities $U_1$ and $U_2$, $A(x,t)$ is a nonlinear function of $x$. It is not clear how behaves if the investment horizon $T$ is distant. Thanks to Theorems \ref{Main-1} to \ref{Main-2}, we conclude that the turnpike property for investment essentially holds, that is, \begin{equation}\label{A(x,t)} \lim_{T\to\infty} A(x,t) = \left\{\begin{array}{ll} \frac{\theta}{\sigma}(1-\min\{q_1,q_2\})x& \mbox{if $q_1<q^*$ or $q_2\leq q^*$}\\ {\theta\over \sigma}(1-q_2)x & \mbox{if $q_1>q^*$ and $q_2>q^*$}, \end{array}\right. \end{equation} where $q_i=p_i/(p_i-1)<0$. Furthermore, the convergence speed is exponentially fast if $q_1<q^*$ or $q_2<q^*$. If $q_1=q^*$ and $q^*<q_2<0$ then $A(x,t)$ converges to a nonlinear function of $x$, see Theorem \ref{Example-1} for details. This is a new result even for power utilities, not to mention our main theorems cover general utilities. We next give a numerical test. The data used are the Sharpe ratio $\theta=0.2$, the discount rate $\delta=0.02+(1/2)r$, which gives the threshold value $q^*=-1$, the volatility rate $\sigma=0.2$, the riskless interest rate $r=0.02$, 0.06, 0.1, which gives the discount rate $\delta=0.03$, 0.05, 0.07, respectively, the time horizon $T-t=1$, 2, 5, 10, 25, 50, and 100 years. We discuss three cases: 1) $q_1=-1/2$ and $q_2=-2$; 2) $q_1=-2$ and $q_2=-1/2$; 3) $q_1=-1/2$ and $q_2=-1/4$. From (\ref{A(x,t)}), we know the optimal proportion of wealth $\pi^*(x,t):=A(x,t)/x$ converges to the Merton portfolio $\pi_M(x,t)=3$ in cases 1 and 2 and converges to $\pi_M(x,t)=1.25$ in case 3 as $T-t$ tends to $\infty$. Table \ref{power_table} lists the values of optimal portfolio $\pi^*(x,t)$ for different time horizons $T-t$ and riskless interest rates $r$. It is clear that as $T-t$ tends to infinite, the exact optimal portfolio converges to the Merton portfolio in (\ref{A(x,t)}). However, the speed of convergence is not consistent for different power utilities: it is fast in cases 1 and 3, but slow in case 2 (when $T-t=200$ the exact optimal portfolio values are 2.9789 for $r=0.02$, 2.9981 for $r=0.06$ and 2.9998 for $r=0.10$). Back et al. (1999) claim with numerical examples that one has the turnpike property only when the investment horizon is very long in a low interest rate economic environment. Case 2 is in line with that finding, but cases 1 and 3 show that the convergence is still reasonably fast. In fact, we can find the exponential convergence rates for all cases. For example, in case 1, convergence rate is 0.055 for $r=0.02$, 0.075 for $r=0.06$ and 0.095 for $r=0.10$. The higher the interest rate, the faster the convergence of optimal portfolio to its limiting portfolio. \begin{table} \begin{center} \begin{tabular}{|l|c|ccccccc|} \hline $q_1, q_2, \pi_M$ &$r\backslash T-t$ & 1&2&5&10&25&50&100\\ \hline $q_1=-1/2$& 0.02&2.6075& 2.7195& 2.8345& 2.9014& 2.9655& 2.9919& 2.9995\\ $q_2=-2$ &0.06&2.6125& 2.7271& 2.8461& 2.9152& 2.9771& 2.9966&2.9999\\ $\pi_M=3$ &0.10& 2.6174& 2.7344& 2.8569& 2.9273 &2.985 &2.9986&3.000\\ \hline $q_1=-2$ &0.02 &2.6099& 2.348& 1.9557& 1.7538 &1.6742& 1.8119& 2.4955\\ $q_2=-1/2$ &0.06&2.6149& 2.362 &1.9924 &1.8107 &1.7963& 2.1486 &2.8421\\ $\pi_M=3$ &0.10&2.6198& 2.3759& 2.0297 &1.8739& 1.9555&2.4723& 2.9532\\ \hline $q_1=-1/2$ &0.02 &1.3928& 1.3458 &1.2944& 1.2714& 1.2571 &1.2527& 1.2507\\ $q_2=-1/4$ &0.06&1.3927& 1.3456 &1.2942 &1.2712& 1.2567& 1.2522 &1.2504\\ $\pi_M=1.25$ &0.10&1.3927&1.3455& 1.294& 1.2708& 1.2563 &1.2518& 1.2502\\ \hline \end{tabular} \end{center} \caption{Optimal portfolios $\pi^*(x,t)$ with different time horizons $T-t$, interest rates $r$, and dual power utilities $V_i(y)=-(1/q_i)y^{q_i}$, or equivalently, power utilities $U_i(x)=(1/p_i)x^{p_i}$, where $p_i=q_i/(q_i-1)$ for $i=1,2$. For $q=-1/4,-1/2,-2$, the corresponding $p=1/5, 1/3, 2/3$, respectively. The threshold value $q^*=-1$, the corresponding $p^*=1/2$. The other data used are the Sharpe ratio $\theta=0.2$, the discount rate $\delta=0.02+(1/2)r$ and the volatility rate $\sigma=0.2$. $\pi_M$ is the Merton portfolio.} \label{power_table} \end{table} The optimal consumption strategies are in general nonlinear functions of $x$ for any $q_1$ and $q_2$, see Theorems \ref{Main-1} and \ref{Main-2}. The economic reason of non-existence of the turnpike property of consumption is that the utility from consumption is over the whole investment period and the initial wealth and consumption may be small, which implies even though the consumption utility behaves like a power utility with large consumption, but at the beginning one has to use the specific consumption utility in deciding the optimal consumption strategy that may be a nonlinear function of the wealth. This phenomenon is present only when there are both terminal and consumption utilities. Theorem \ref{Main-3} states that if \begin{equation}\label{V-wC0} \lim_{y\to0}R_i(y):=\left(-{yV_i''(y)\over V_i'(y)}\right) = 1-q_i,\quad i=1,2, \end{equation} and $q_1, q_2 <q^*$ and some other conditions, then the turnpike property (\ref{turnpike}) holds.\footnote{ Condition (\ref{V-wC0}) is equivalent to the limits of the Arrow-Pratt coefficients of relative risk aversion of utilities $U_i$ being $1-p_i$, that is, \begin{equation}\label{V-2} \lim_{x\to \infty}\left(-{xU_i''(x)\over U_i'(x)}\right) = 1-p_i,\quad i=1,2, \end{equation} and $p_1,p_2>p^*$. This is due to the dual relation of $U_i$ and $V_i$ defined in (\ref{dual_func_V_i}), which implies that if $y=U_i'(x)$ then $x=-V_i'(y)$ and $U_1''(x)=-1/V_1''(y)$, and therefore the equivalence of conditions (\ref{V-wC0}) and (\ref{V-2}). } Conditions (\ref{eqn10}) and (\ref{V-wC0}) are in general not implied by each other, see Footnote \ref{rk4.11} for examples. Condition (\ref{V-wC0}) may be relaxed further for the turnpike property, in particular, $V_1$ is only required to be regularly varying at zero, see Theorem \ref{Main-4} for details. Finally we want to emphasize that the methodology presented in this paper depends on Black-Scholes market with constant investment opportunities. For turnpike problems with only terminal consumption, models with stochastic investment opportunities (incomplete markets) have been studied in Guasoni et al. (2014) and Robertson and Xing (2017), see detailed discussions and other references in these two papers. The rest of the paper is organized as follows. In Section 2 we formulate the model, classify different cases for the turnpike property when both $U_1$ and $U_2$ are power utilities (Theorem \ref{Example-1}), state and discuss the main results of the paper (Theorems \ref{Main-1}--\ref{Main-4}). In Section 3 we apply the main theorems to two examples with power and non-HARA utilities and perform some numerical tests and analysis. Section 4 concludes. The appendix discusses the primal and dual approaches to solving utility maximization problems, derives the optimal investment and consumption strategies, and gives the detailed proofs of all theorems. \section{Turnpike property and convergence rate} Consider a financial market consisting of one riskless asset and one risky asset. The price process of $S$ of the risky asset is modelled by $$ dS_t=S_t(\mu dt+ \sigma dW_t) $$ for $0\leq t\leq T$, where $\mu$ is the return rate and $\sigma$ the volatility rate of the risky asset, both are positive constants, and $W$ is a standard Brownian motion on a complete probability space $(\Omega,\mathcal{F},P)$, endowed with a natural filtration $\{\mathcal{F}_t\}$ generated by $W$. The wealth process $X$ satisfies the SDE (\ref{wealth}), that is, \begin{equation*} dX_t = rX_tdt + X_t\pi_t \sigma (\theta dt + dW_t) - c_tdt, \; X_0=x_0, \end{equation*} where $r>0$ is the riskless interest rate, $\theta=\sigma^{-1}(\mu-r)$ is the Sharpe ratio, $\pi$ is a proportional portfolio process and $c$ a nonnegative consumption rate process, satisfying the standard measurability and integrability conditions. The wealth process $X$ is driven by only one stock. The extension to multiple correlated stocks is straightforward. We therefore focus on the model (\ref{wealth}). Consider the utility maximization problem (\ref{primal_problem}). Assume $U_i$, $i=1,2$, are continuously differentiable, strictly increasing, and strictly concave functions on $R_+:=(0,\infty)$, satisfy $U_i(0)=0$, $U_i'(0)=\infty$ and $U_i'(\infty)=0$, and $ U_i(x)\leq C(1+x^p)$ for $x\geq 0$ and some constants $C>0$ and $0<p<1$. Note that the assumption $U_i(0)=0$ is not needed in Theorem \ref{Example-1} but is required for all other results. To simplify the notation, we define $\tau=T-t$, the time horizon. Then $T\to \infty$ is equivalent to $\tau\to\infty$. We still use $t$ to represent a time horizon variable, instead of $\tau$. Using the dual stochastic control method, we can show that the optimal amount of investment and consumption rate are given by \begin{equation} \label{ICS-1} A(x,t)=x\pi^*(x,t)={\theta\over \sigma}\left(J_1(y,t)+\int_{0}^tJ_2(y,\tau)d\tau \right) ,\ \ \ C(x,t)= c^*(x,t)=-V'_2 (y), \end{equation} where $y =y(x,t)$ is the solution to the budget constraint equation \begin{equation}\label{bce} x= I_1(y,t)+\int_{0}^t I_2(y,\tau)d\tau. \end{equation} and, for i=1, 2, \begin{eqnarray*} I_i(y,t)&=&\frac{e^{\beta t}}{2\sqrt{\pi}}\int_{-\infty}^\infty e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{t}\eta}|V_i'(ye^{a\sqrt{t}\eta})|d\eta\\ J_i(y,t)&=&\frac{e^{\beta t}}{2\sqrt{\pi }}\int_{-\infty}^\infty e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{t}\eta}ye^{a\sqrt{t}\eta} V_i''(ye^{a\sqrt{t}\eta})d\eta, \end{eqnarray*} and $\alpha=\frac{1}{2}+\frac{r-\delta}{\theta^2}$, $a=\frac{\theta}{\sqrt{2}}$, $\beta=-a^2 \alpha^2-\delta $. Define $$ \lambda=\lambda(q): =\beta+(\alpha-q)^2a^2=\frac{1}{2}\theta^2 q(q-1)-rq + \delta(q-1) $$ for $q< 1$. Noting $\lambda(0)=-\delta < 0$ and $\lambda(1)=-r < 0$, we conclude that there is a unique root $q^* <0$ to the equation $\lambda(q)=0$ for $q< 1$, given by (\ref{threshold_value}), and $\lambda(q)<0$ for $q^*<q<1$ and $\lambda(q)>0$ for $q<q^*$. \begin{remark} In this paper we assume there is only one risky asset in the market. It is straightforward to extend the results to a complete market with $n$ assets and $n$ standard Brownian motions. In that case, market price of risk $\theta$ becomes a vector: $\theta=\sigma^{-1}(\mu-r{\bf 1})$, where $\sigma$ is a stock volatility matrix, $\mu$ is a stock growth rate vector, and ${\bf 1}$ is a vector with all components 1. The only change we need to do in the definition of $\lambda(q)$ is to replace $\theta^2$ with $\|\theta\|^2=\theta^T\theta$. The optimal amount of money invested in asset $i$ is given by $A_i(x,t)=x{\bf e_i}^T \pi^*(x,t) = {\bf e_i}^T (\sigma^T)^{-1}\theta \left(J_1(y,t)+\int_{0}^tJ_2(y,\tau)d\tau \right)$, where ${\bf e_i}$ is a vector with all components 0 except the $i$th component which is 1. All results for one risky asset model still hold for this multiple risky asset model. For this reason, we only discuss one risky asset in this paper. \end{remark} \begin{remark} We apply the dual stochastic control method to derive (\ref{ICS-1}) and (\ref{bce}), which are the key relations for the turnpike property. Since the dynamic programming equation (the HJB equation) is used for solving the primal and dual problems, the model must be Markovian and time-consistent, that is, with the current methodology, we cannot cover the model with random coefficients nor mean-variance problems. However, it is possible to extend the model from a complete market unconstrained setting to the one with control constraints (no short selling or no trading of some assets, etc.), that is, $\pi_t\in K$ where $K$ is a closed convex cone in $R^n$. This is because the dual HJB equation (see (\ref{dual_HJB})) is still a linear PDE and can be solved with a Feynman-Kac representation. The only change for the dual HJB equation (\ref{dual_HJB}) is to replace $\theta^2$ with $\|\hat\theta\|^2$, where $\hat\theta := \theta + \sigma^{-1}\hat \pi=\sigma^{-1}(\mu - r{\bf 1}+\hat\pi)$ and $\hat\pi$ is the unique minimizer of a quadratic function $f(\tilde\pi):=\|\theta+\sigma^{-1}\tilde \pi\|^2$ over $\tilde\pi\in \tilde K: =\{p: p' v \geq 0,\;\forall v\in K\}$, the positive polar cone of $K$ in $R^n$. In the presence of control constraints, one cannot use the martingale representation theorem to find the optimal control as in a complete market setting, but may derive them using the stochastic control approach, see further details in Bian et al. (2011) and Bian and Zheng (2015). Since relations (\ref{ICS-1}) and (\ref{bce}) essentially hold for closed convex cone constrained problems, we expect the results for the turnpike property still hold and therefore only focus on the unconstrained case in this paper. \end{remark} Equation (\ref{bce}) is a budget constraint in which the initial wealth $x$ is used to finance the optimal terminal wealth (the first term) and the optimal total consumption (the second term). We want to show one term dominates the other, that is, one term tends to 0 and the other tends to $x$ as $t\to\infty$. Once this is decided, the limiting properties for $A(x,t)$ and $C(x,t)$ are immediate from (\ref{ICS-1}). It turns out $q^*$ is a threshold value that determines which term dominates in (\ref{bce}). The next theorem characterizes the turnpike property when both utilities are power utilities. \begin{theorem}\label{Example-1} Let $U_i(x)=(1/p_i)x^{p_i}$ and $p_i<1$ for $i=1,2$ (if $p_i=0$ then $U_i(x)=\ln x$). Define $q_i:=p_i/(p_i-1) <1$ and $\lambda_i:=\lambda(q_i)$, $i=1,2$. We have \begin{enumerate} \item If $q_1<q^*$ or $q_2\leq q^*$, then \begin{eqnarray*} \lim_{t\rightarrow \infty}A(x,t)&=&\frac{\theta}{\sigma} (1-\min\{q_1, q_2\})x,\\ \lim_{t\to\infty} R(t) C(x,t)&=&x^{\frac{ q_2-1}{\min \{q_1,q_2\}-1}}, \end{eqnarray*} where \begin{equation} \label{R(t)} R(t)=\left\{\begin{array}{lll} e^{\lambda_1 t}+\frac{e^{\lambda_2 t }-1}{\lambda_2}, & q_1=q_2, \\ e^{\frac{q_2-1}{q_1-1}\lambda_1 t}, & q_1<q_2, \\ \frac{e^{\lambda_2 t}-1}{\lambda_2}, & q_1>q_2, \end{array}\right. \end{equation} and $(e^{\lambda_2t}-1)/\lambda_2=t$ if $\lambda_2=0$. \item If $q_1> q^*$ and $q_2> q^*$, then \begin{eqnarray*} \lim_{t\rightarrow \infty}A(x,t)&=&\frac{\theta}{\sigma }(1-q_2)x.\\ \lim_{t\rightarrow \infty}C(x,t) &=&-\lambda_2 x, \end{eqnarray*} \item If $q_1= q^*$ and $q_2> q^*$, then \begin{eqnarray*} \lim_{t\rightarrow \infty}A(x,t)&=&\frac{\theta}{\sigma }[(1-q_1)Y^{q_1-1}-(1-q_2)\frac{1}{\lambda_2}Y^{q_2-1}],\\ \lim_{t\rightarrow \infty}C(x,t) &=&Y^{q_2-1}, \end{eqnarray*} where $Y$ is the unique solution to the equation $y^{q_1-1}-\frac{1}{\lambda_2}y^{q_2-1}=x$. \end{enumerate} \end{theorem} Theorem \ref{Example-1} can be recovered from Theorems \ref{Main-1} and \ref{Main-2} for general utilities if $0<p_i<1$ for $i=1,2$, but not if $p_i\leq 0$ as the condition $U_i(0)=0$ is not satisfied. However, due to the homothetic property of the power utility, Theorem~\ref{Example-1} can be proved without using the condition $U_i(0)=0$, see Appendix for a rigorous proof. We outline the key idea of the proof of Theorem \ref{Example-1}. From (\ref{ICS-1}) we get \begin{equation}\label{control-i} A(x,t)={\theta\over \sigma}\left((1-q_1)e^{\lambda_1 t}y^{q_1-1} + (1-q_2) \frac{e^{\lambda_2 t}-1}{\lambda_2}y^{q_2-1}\right), \quad C(x,t)=y^{q_2-1}, \end{equation} where $y$ is the solution to the equation \begin{equation}\label{relationship} x=e^{\lambda_1 t} y^{q_1-1} +\frac{e^{\lambda_2 t }-1}{\lambda_2} y^{q_2-1}. \end{equation} The initial wealth $x$ is used to finance the optimal terminal wealth and the optimal total consumption. The relation of $q_1$ and $q_2$ determines which term in (\ref{relationship}) dominates as $t$ tends to $\infty$. If the first term dominates, that is, if the first term tends to $x$ and the second term tends to 0 as $t$ tends to $\infty$, then essentially all initial wealth is used for maximizing the utility of the terminal wealth, and the optimal investment strategy is therefore determined approximately by the utility of terminal wealth. This can be easily seen from (\ref{relationship}) and (\ref{control-i}). It is more complicated in finding the limiting relation for the optimal consumption. Similar discussions apply to the cases when the second term dominates or neither term dominates. We next give some discussions on the results of Theorem \ref{Example-1}. In case 1, since $q_1<q^*$ or $q_2\leq q^*$, we have $\lambda_1>0$ or $\lambda_2\geq 0$. This leads to $\lim_{t\rightarrow \infty}R(t)=\infty$ and $\lim_{t\rightarrow \infty}C(x,t)=0$ for any $x>0$, which implies the initial consumption $C(x,t)$ should be close to zero and $R(t)$ is the speed of the consumption tending to zero when the horizon $t$ is distant. From the budget constraint (\ref{relationship}) and $\lambda_1>0$ or $\lambda_2\geq 0$, we have the marginal utility $y=u_x(x,t)$ tends to $\infty$ as $t\to\infty$ for any fixed $x$, which implies one should invest in the risky asset to increase the wealth level and therefore the overall utility. In case 2, since $q_1>q^*$ and $q_2> q^*$, we have $\lambda_1<0$ and $\lambda_2< 0$, which implies the marginal utility $y=u_x(x,t)$ is bounded away from 0 and $\infty$ as $t\to\infty$ (we can prove it by contradiction argument as follows: if $y\to 0$ (or $\infty$) as $t\to\infty$, then the right side of (\ref{relationship}) tends to $+\infty$ (or 0), but $x$ on the left side is a positive number). The second term in (\ref{relationship}) dominates and the optimal trading strategies are determined approximately by the utility of consumption only, which is a Merton strategy. In case 3, since $q_1=q^*$ and $q_2>q^*$, we have $\lambda_1=0$ and $\lambda_2< 0$, which again implies the marginal utility $y=u_x(x,t)$ is bounded away from 0 and $\infty$ as $t\to\infty$. Since neither term in (\ref{relationship}) dominates, the optimal trading strategies are determined jointly by the utilities of terminal wealth and consumption, which results in the optimal investment strategy being a nonlinear function of wealth. We now state and discuss the main results of the paper for general utilities. \begin{theorem} \label{Main-1} Let $q_1<q^*$ or $q_2 \leq q^*$. Assume that $V_i\in C^1(R_+)$ and satisfy (\ref{eqn10}) for $i=1,2$. Then for any $x\in R_+$, we have the turnpike property (\ref{turnpike}). If, for some $\hat q <0$, \begin{equation}\label{V-C-C} \lim_{y\rightarrow \infty} \frac{V'_2(y)}{y^{\hat q-1}}=-1, \end{equation} then, we have \begin{equation}\label{consumption} \lim_{t\rightarrow \infty}R(t)^{\frac{\hat q-1}{q_2-1}}C(x,t) =x^{\frac{ \hat q-1}{\min \{q_1,q_2\}-1}}, \end{equation} where $R(t)$ is defined in (\ref{R(t)}) \footnote{ The limits in conditions (\ref{eqn10}) and (\ref{V-C-C}) are $-1$ which can be replaced by some constants. Specifically, if there exist $k_i>0$, such that $\lim_{y\rightarrow 0}\frac{V_i'(y)}{y^{q_i-1}}=-k_i$, then for $x\in R_+$, we still have the turnpike property (\ref{turnpike}). If, for some $\hat q <1$, $k\geq 0$, $\lim_{y\rightarrow \infty} \frac{V'_2(y)}{y^{\hat q-1}}=-k$, then, we have $\lim_{t\rightarrow \infty}\hat{R}(t)^{\frac{\hat q-1}{q_2-1}}C(x,t) =k x^{\frac{ \hat q-1}{\min \{q_1,q_2\}-1}}$, where $\hat{R}(t)=k_1e^{\lambda_1 t}+k_2\frac{e^{\lambda_2 t}-1}{\lambda_2}$ if $q_1=q_2$, $k_1^{\frac{q_2-1}{\hat{q}-1}}e^{\frac{q_2-1}{q_1-1}\lambda_1 t}$ if $q_1<q_2$, and $k_2\frac{e^{\lambda_2 t}-1}{\lambda_2}$ if $q_1>q_2$. The proof is the same as that of Theorem \ref{Main-1} with some obvious changes to include $k_i$ and $k$. }. \end{theorem} Note that only one of $q_i$ is required to be less than $q^*$; the other $q_i$ can be any constant less than one, which means that the {\it asymptotic marginal behaviour} of the other utility at large wealth ($U_i'(\infty)$) can be like that of negative power utility ($0<q_i<1$) or log utility ($q_i=0$), not necessarily always like that of positive power utility ($q_i<0$), but we still require the value of the utility at zero wealth be zero ($U_i(0)=0$ for $i=1,2$). Condition (\ref{V-C-C}) is equivalent to $\lim_{x\to0} U_2'(x)/x^{\hat p-1}=1$ and $\hat p=\hat q/(\hat q-1)>0$, which means the consumption utility $U_2$ behaves asymptotically like power utility $(1/\hat p)x^{\hat p}$ at small wealth level. The turnpike property for consumption does not hold in general, as the right side of (\ref{consumption}) is a nonlinear function of $x$ even though the investment horizon is remote, This is because the consumption utility is accumulated over the whole investment period, not just at terminal time, so one has to choose a consumption policy which achieves a good balance between the initial consumption with small wealth and the future consumption with large wealth. We next compare our results with those in the literature. Jin (1998) discusses the turnpike property for a class of utilities $U_i$ such that $(U_i')^{-1}=-V_i'$ are regularly varying at zero with index $1-q_i$, that is, \footnote{\label{rk4.11} It is easy to verify that both (\ref{eqn10}) and (\ref{V-wC0}) imply (\ref{R-V}), so (\ref{R-V}) is the weakest condition among three conditions. The function $V'(y)=y^{q-1}\ln y (y\leq Y<1)$ is an example that satisfies (\ref{V-wC0}), but not (\ref{eqn10}) (see Huberman and Ross (1983), page 1346). The function $V'(y)=-y^{q-1}e^{hy\sin\frac{1}{y}}$, where $h<\frac{1-q}{2}$, is an example that satisfies (\ref{eqn10}), but not (\ref{V-wC0}) (see Back et al. (1999), page 178). However, if $\lim_{y\to0} V_i''(y)/y^{q_i-2}$ exists, then both (\ref{eqn10}) and (\ref{V-wC0}) are satisfied with L'Hospital's Rule. } \begin{equation}\label{R-V} \lim_{y\to 0} {V_i'(xy)\over V_i'(y)} = x^{q_i-1}, \quad\forall x>0. \end{equation} Apart from requiring $(U_i')^{-1}$ to be regularly varying at zero, Jin (1998) also asks the existence of finite limits of $(U_i')^{-1}(x)/x^{q_i-1}$ as $x$ tends to 0 (see Jin (1998, page 1007)), which implies utility functions in Jin (1998) also satisfy (\ref{eqn10}). We also need condition (\ref{V-C-C}) for the asymptotic property of optimal consumption policy. There is no explicit counterpart (\ref{V-C-C}) in Jin (1998), but there is a hidden assumption in Jin (1998) (the finiteness of $M_{1,\epsilon}$ and $M_{2,\epsilon}$, toward the bottom of page 1011, which was first pointed out in Back et al.~(1999, page 194)). Condition (\ref{V-C-C}) implies $M_{1,\epsilon}$ is finite, but the finiteness of $M_{2,\epsilon}$ is an additional condition in Jin (1998), so these conditions are not directly comparable. Jin (1998, Theorems 5.1-5.3) states that the optimal portfolio and consumption strategies of $V_i$ at any fixed time can be approximated by those of power utilities if the investment horizon is remote and the error can be made arbitrarily small in the absolute or mean-squared norm. The results of Theorem \ref{Main-1} are different. Firstly, we prove the pointwise convergence in (\ref{turnpike}) and (\ref{consumption}) for every fixed $x$, which is in line with the standard definition of the turnpike property in the literature but does not imply norm convergence in the probability space as discussed in Jin (1998). Secondly, we show the turnpike property holds whenever $q_1<q^*$ or $q_2\leq q^*$ whereas Jin (1998, Theorems 5.4-5.5) requires $q_1=q_2<q^*=0$ ($\delta=0$ in Jin (1998) ) to get the same property. Back et al. (1999) discuss turnpike property of optimal terminal wealth. They claim there is no turnpike property for consumption with a counter example using a translated power utility, see Back et al. (1999, Section 1.1). However, that utility is $-\infty$ in [0,K) and does not satisfy our assumption of $U_2(0)=0$ and condition (\ref{V-C-C}). Therefore, Back et al. (1999) only discuss the turnpike property for terminal-wealth utility maximization, different from the one for consumption and terminal-wealth utility maximization in this paper. We now estimate the rate of convergence of the turnpike property if utilities converge to power utilities at certain speed. The next theorem establishes the rate of convergence when $q_1<q^*$ or $q_2 \leq q^*$, which, to the best of our knowledge, is absent in the literature on the turnpike property with consumption and investment. \begin{theorem} \label{Main-1a} Assume that $V_i\in C^1(R_+)$ and there are constants $\bar{q}\in (\max\{q_1, q_2,0\}, 1)$ and $L>0$, such that \begin{equation}\label{V-C-3} \left|V'_i(y)+y^{q_i-1}\right|\leq L y^{\bar{q}-1},\ y\leq 1. \end{equation} Then $A(x,t)$ converges to $\frac{\theta}{\sigma} (1-\min\{q_1,q_2\})x$ exponentially \footnote{ Assume $f$ and $g$ are well defined functions on $R_+\times R_+$ and $R_+$, respectively. We say $f(x,t)$ converges to $g(x)$ exponentially (or polynomially) as $t\to \infty$ if there exist constants $c>0$ and $\bar T>0$ and a well defined function $D$ on $R_+$, such that $|f(x,t)-g(x)|\leq D(x)e^{-ct}$ (or $|f(x,t)-g(x)|\leq D(x)t^{-c}$) for all $x\in R_+$ and $t\geq \bar T$. Exponential convergence is much faster than polynomial convergence. } as $t\to\infty$ if $q_1<q^*$ or $q_2 < q^*$, and polynomially if $q_1\geq q^*$ and $q_2=q^*$. Furthermore, if there is a constant $\tilde{q}<\min\{\hat q, q_2\}$, such that \begin{equation}\label{V-C-C-C} |V'_2(y)+y^{\hat q-1}|\leq L y^{\tilde{q}-1}, y\geq 1, \end{equation} then, $R(t)^{\frac{\hat q-1}{q_2-1}}C(x,t)$ converges to $x^{\frac{\hat q -1}{\min\{q_1,q_2\}-1}}$ exponentially as $t\to\infty$ if $q_1<q^*$ or $q_2 < q^*$, and polynomially if $q_1\geq q^*$ and $q_2=q^*$, where $R(t)$ is defined in (\ref{R(t)}). \end{theorem} \begin{theorem} \label{Main-2} Let $q_1\geq q^*$ and $q_2> q^*$. Assume that $V_i\in C^1(R_+)$ and satisfies (\ref{eqn10}). Then for any $x\in R_+$, we have \begin{equation}\label{turnpike-2} \lim_{t\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma }[(1-q_1)Y^{q_1-1}1_{\{q_1=q^*\}}-Yh'(Y)], \end{equation} and \begin{equation}\label{consumption-2} \lim_{t\rightarrow \infty}C(x,t) =- V'_2(Y), \end{equation} where $1_{\{q_1=q^*\}}$ is an indicator which equals 1 if $q_1=q^*$ and 0 otherwise, $Y$ is the unique solution to the equation \begin{equation}\label{root} x=y^{q_1-1}1_{\{q_1=q^*\}}+h(y), \end{equation} and \[ h(y)=-\int_{0}^\infty \frac{e^{\beta \tau}}{2\sqrt{\pi }}d\tau\int_{-\infty}^\infty e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{\tau}\eta}V_2'(ye^{a\sqrt{\tau}\eta})d\eta. \] Furthermore, if $V_2$ is the dual function of a power utility, given by $V_2'(y)=-y^{q_2-1}$ with $q_2<0$, and $q_1, q_2>q^*$, then we have the turnpike property \begin{equation} \label{eqn2.18} \lim_{t\to\infty} A(x,t)= \frac{\theta}{\sigma}(1-q_2)x, \quad \lim_{t\to\infty} C(x,t)=- \lambda_2 x. \end{equation} \end{theorem} Note that $q_1,q_2<1$ covers all utilities which asymptotically behave like a power utility (including log and negative power utility). It is clear from (\ref{turnpike-2}), (\ref{consumption-2}) and (\ref{root}) that the turnpike property in the classical sense does not hold in general when $q_1\geq q^*$ and $q_2>q^*$. Since $q^*$ tends to $-\infty$ as $\delta$ tends to $\infty$, we have $q_1,q_2>q^*$ when $\delta$ is sufficiently large and the optimal amount of investment in the risky asset is in general a nonlinear function of the wealth even if the investment horizon is very long. This is not surprising economically as a large discount rate $\delta$ means the utility from terminal wealth in the distant future is negligible and one weighs more on the utility in the near term from consumption, which then clearly depends on the current wealth level. This phenomenon presents only when there are both terminal and consumption utilities. If there is only the terminal utility, then one should still have the turnpike property in the classical sense. We see that the turnpike property with terminal and consumption utilities is fundamentally different from that with terminal utility only. The next two theorems list some other conditions on utilities that ensure the turnpike property for investment, see Footnote \ref{rk4.11} for relations of different sufficient conditions. \begin{theorem} \label{Main-3} Let $q_1, q_2 <q^*$. Assume that $V_i\in C^2(R_+)$ and satisfy (\ref{V-wC0}). Assume further that there are constants $\bar{q}\in (\max\{q_1,q_2,0\}, 1)$, $K>0$ such that\footnote{ If $V_2\equiv 0$, we need only $\bar{q}\in (\max\{q_1, 0\}, 1]$. }. \begin{equation}\label{V-wC} R_i(y)|V_i'(y)|= yV_i''(y) \leq K y^{\bar{q}-1}, \ y \geq 1. \end{equation} Then for any $x\in R_+$, we have the turnpike property (\ref{turnpike}) \end{theorem} Based on the observation: If $V_i'(y)$ satisfies (\ref{R-V}), then for any $t_0>0$, $v_y(y,t_0)$ satisfies (\ref{V-wC0}), we have \begin{theorem}\label{Main-4} Let $q_1, q_2 <q^*$. Assume that $V_1\in C^1(R_+)$ satisfies (\ref{R-V}) with index $1-q_1$, $V_2\in C^2(R_+)$ satisfies (\ref{V-wC0}) with index $1-q_2$ and (\ref{V-wC}) and $\lim_{y\to 0} {V_2'(y)\over V'_1(y)} = k$ for some $k\in[0,\infty]$ if $q_1 = q_2$. Then for any $x\in R_+$, we have the turnpike property (\ref{turnpike}). \end{theorem} If $V_2\equiv 0$, Theorem \ref{Main-4} is Theorem 2 in Back et al. (1999). It shows that for the turnpike property to hold in the presence of consumption, the terminal wealth utility $U_1$ only needs to satisfy a weaker condition (\ref{R-V}), whereas the consumption utility $U_2$ is required to satisfy a stronger condition (\ref{V-wC0}). \section{Examples and numerical tests}\label{Examples} In this section we discuss two examples to illustrate the applications of Theorems \ref{Main-1} and \ref{Main-2}. We will show that if the utility for consumption $U_2$ is not a power utility, then one in general does not have the turnpike property when $q_1>q^*$ and $q_2>q^*$, which is in sharp contrast with the result when $U_2$ is a power utility, see Theorem \ref{Example-1}. For $0<p<1$, define a non-HARA utility function \begin{equation}\label{nonHara} U(x) = -\frac{1}{q}H(x)^{q} - \frac{1}{\bar{q}}H(x)^{\bar{q}} + xH(x) \end{equation} for $x > 0$, where $H(x) = 2^{1-\bar{p}}\left(\sqrt{1 + 4x}-1\right)^{ \bar{p}-1}$ and $\bar{p} = 2p - 1$, $q = \frac{p}{p-1}$, $\bar{q} = \frac{\bar{p}}{\bar{p}-1}$. \footnote{We have $\bar q={1\over 2} (q+1)>q$ and $\bar q-1={1\over 2}(q-1)$. It is easy to verify that $U$ is strictly increasing and strictly concave, $U(0)=0$, $U(\infty)=\infty$, $U'(0)=\infty$ and $U'(\infty)=0$. Therefore $U$ is a utility function in the classical sense. This utility (for $p=3/4$) is used in Bian and Zheng (2015) to illustrate the turnpike property and the convergence rate for a terminal wealth utility maximization problem.} The dual function of $U$ has a simple form, given by $V(y) = -{1\over q} y^{q}-{1\over \bar{q}}y^{\bar{q}}$. \begin{example} \label{ex1} Assume $U_1$ is a non-HARA utility, given by (\ref{nonHara}) with $p=p_1$, and $U_2$ is a power utility, given by $U_2'(x)=x^{p_2-1}$, where $0<p_1,p_2<1$, which corresponds to $q_1,q_2<0$. Conditions (\ref{eqn10}) and (\ref{V-C-C}) are satisfied with $\hat q=q_2$. If $q_1<q^*$ or $q_2 \leq q^*$, then we have the turnpike property for investment (\ref{turnpike}) and the limiting property for consumption (\ref{consumption}). If $q_1> q^*$ and $q_2>q^*$, then we still have the turnpike property for investment (\ref{eqn2.18}) thanks to the consumption utility $U_2$ being a power utility. \end{example} We now do some numerical tests. The data used are the same as those in Table \ref{power_table}. If we choose $q_1=q_2=q=-3$, which corresponds to $p=3/4$, then $\bar q =-1$ for the non-HARA utility in (\ref{nonHara}). We have $\lambda=\lambda(q)=0.16+r$ and $\bar\lambda =\lambda(\bar q) =0$. Since $q_1=q_2=q<q^*$, we have the turnpike property $$ \lim_{t\to\infty} \pi^*(x,t)= \lim_{t\to\infty} A(x,t) /x = {\theta\over \sigma}(1-q)=4$$ for any fixed wealth level $x$. We may compute the exact optimal trading strategies $\pi^*(x,t)$ and $c^*(x,t)$ to see the accuracy of this approximation. To this end, we need to find the unique solution $y$ to the equation $-v_y(y,t)=x$, that is, $ R(t)y^{q-1} + e^{\bar\lambda t} y^{\bar q-1} = x$, where $R(t)=e^{\lambda t} + (e^{\lambda t} -1)/\lambda$. We can solve the equation and get $$ \pi^*(x,t) = {1\over x}\left(4R(t) z^2 + 2 z\right)\quad\mbox{and}\quad c^*(x,t) = z^2, $$ where $z=(-1 + \sqrt{1+ 4xR(t)})/(2R(t))$. The Merton strategy is given by $\pi_M(x,t):=(\theta/\sigma)(1-q)=4$. Table \ref{table1} lists values $\pi^*(x,t)$ (rows 2 to 4) and relative errors to the Merton strategy $e_M(x,t):={\pi_M(x,t)\over \pi^*(x,t)}-1$ (rows 5 to 7) for $x=10$ and various $r$ and $t$. It is clear that the optimal investment strategy $\pi^*(x,t)$ converges to the Merton strategy $\pi_M(x,t)$ as $t$ tends to $\infty$, as expected from Theorem \ref{Main-1}. Relative errors $e(x,t)$ show the extent of over-investment (if $e(x,t)>0$) or under-investment (if $e(x,t)<0$) if one takes the Merton strategy $\pi_M(x,t)$ instead of the optimal strategy $\pi^*(x,t)$. For example, for $t=1$ and $r=0.02$, if one takes the Merton strategy, one has over-invested about 10\% compared with the optimal strategy $\pi^*(x,t)$. If the investment period is 25 years or longer, the Merton strategy would produce a relative error of 1\% or less with the data used in this example. The shorter the investment period, the bigger the relative error, up to 10\% for a one-year investment. \begin{table} \begin{center} \begin{tabular}{|c|c|ccccccc|} \hline &$r\backslash t$ & 1&2&5&10&25&50&100\\ \hline optimal &0.02 &3.6237& 3.7023& 3.8147& 3.8946& 3.9740 &3.9973& 4.0000\\ portfolio &0.06& 3.6288& 3.7099& 3.8264& 3.9084& 3.9829& 3.9989 &4.0000\\ $\pi^*(x,t)$ &0.10&3.6340 &3.7175 &3.8376 &3.9209& 3.9889 &3.9996 &4.0000\\ \hline relative &0.02 &0.1039 &0.0804 &0.0486 &0.0271 &0.0065& 0.0007& 0.0000\\ error&0.06&0.1023 &0.0782& 0.0454& 0.0234 &0.0043 &0.0003 &0.0000\\ $e(x,t)$ &0.10& 0.1007 &0.0760& 0.0423 &0.0202 &0.0028 &0.0001 &0.0000\\ \hline \end{tabular} \end{center} \caption{Optimal portfolios $\pi^*(x,t)$ and relative errors to the limiting (Merton) portfolio $e(x,t)$ with different time horizons $t$ and interest rates $r$. The Merton portfolio $\pi_M(x,t)=4$ for all $x$ and $t$.}\label{table1} \end{table} Table \ref{table2} lists values $c^*(x,t)$ (rows 2 to 4), $R(t)c^*(x,t)$ (rows 5 to 7) and relative errors $f(x,t):={x\over R(t)c^*(x,t)} -1$ (rows 8 to 10) for $x=10$ and various $r$ and $t$. It is clear that $\lim_{t\to\infty}R(t)c^*(x,t)=x$, as expected from Theorem \ref{Main-1}. The longer the investment period, the smaller the consumption rate $c^*(x,t)$. Relative errors $f(x,t)$ show the extent of over-consumption (if $f(x,t)>0$) or under-consumption (if $f(x,t)<0$) if one takes the limiting consumption $x$, discounted by $R(t)$, i.e., $c(x,t)=x/R(t)$. For example, for $t=1$ and $r=0.02$, if one takes the consumption strategy $c(x,t)=$, one has over-consumed about 23\% compared with the optimal consumption strategy $c^*(x,t)$. If the investment period is 25 years or longer, the consumption strategy $c(x,t)$ would produce a relative error of 1\% or less with the data used in this example. The shorter the investment period, the bigger the relative error, up to 23\% for a one year investment. \begin{table} \begin{center} \begin{tabular}{|c|c|ccccccc|} \hline &$r\backslash t$ & 1&2&5&10&25&50&100\\ \hline optimal&0.02 &3.5407& 2.2161& 0.8585& 0.2778& 0.0169& 0.0002& 0.0000\\ consumption&0.06&3.4442& 2.1033 &0.7538 &0.2097& 0.0073& 0.0000& 0.0000\\ $c^*(x,t)$&0.10&3.3497 &1.9947& 0.6593& 0.1564& 0.0031 &0.0000 &0.0000\\ \hline &0.02 &8.1183& 8.5113 &9.0734 &9.4730 &9.8701 &9.9863 &9.9998\\ $R(t)c^*(x,t)$&0.06&8.1441& 8.5497 &9.1318&9.5421 &9.9144 &9.9945 &10.0000\\ &0.10&8.1698 &8.5877& 9.1880 &9.6045& 9.9444 &9.9978 &10.0000\\ \hline relative&0.02&0.2318& 0.1749& 0.1021 &0.0556 &0.0132 &0.0014 &0.0000\\ error&0.06&0.2279 &0.1696 &0.0951 &0.0480& 0.0086 &0.0005 &0.0000\\ $f(x,t)$&0.10&0.2240& 0.1645& 0.0884& 0.0412& 0.0056 &0.0002& 0.0000\\ \hline \end{tabular} \end{center} \caption{Optimal consumptions $c^*(x,t)$, time adjusted optimal consumptions $R(t)c^*(x,t)$, and relative errors to the wealth $f(x,t)$ with different time horizons $t$ and interest rates $r$, the wealth level $x=10$.}\label{table2} \end{table} Table \ref{table3} lists absolute errors to the Merton strategy $\bar e(x,t)=|\pi^*(x,t)-\pi_M(x,t)|$ (rows 2 to 4) and approximate convergence rate $c_n$ (rows 5 to 7) for $x=10$ and various $r$ and $t$.~\footnote{If $\{e_n\}$ is a sequence of errors with exponential convergence, then there are positive constants $M$ and $c$ such that $|e_n|\leq Me^{-cn}$. To find $c$, we may assume $|e_n|\approx Me^{-cn}$, which gives $ c\approx -\ln\left(|e_{n+1}|/|e_n|\right)$. In our numerical tests, we have chosen time horizon $t=1,2,5,10,25,50,100$, which does not have equally spaced intervals. An adjustment is needed to reflect this. Specifically, we estimate $c$ by $ c_n:=- (1/m)\ln \left(|e_{n+m}|/ |e_n|\right)$, where $m$ is an integer indicating the distance of indices $n$ and $n+m$ for errors $e_n$ and $e_{n+m}$. For $n:=1,2,5,10,25,50,100$, the distance between adjacent points are $m=1,3,5,15,25,50$. We form a sequence $\{c_n\}$ to see if there is a limit which would indicate the approximate exponent of the exponential convergence rate. } It is clear from Table \ref{table3} that there is convergence of the error sequence for fixed $r$. For $r=0.02$, 0.06, and 0.10, the exponent of exponential convergence rate is approximately equal to $c=0.09$, 0.11, and 0.13, respectively. \begin{table} \begin{center} \begin{tabular}{|c|c|ccccccc|} \hline &$r\backslash t$ & 1&2&5&10&25&50&100\\ \hline absolute &0.02 &0.3763& 0.2977& 0.1853& 0.1054& 0.0260& 0.0027& 0.0000\\ error &0.06&0.3712 &0.2901 &0.1736 &0.0916 &0.0171 &0.0011 &0.0000\\ $\bar e(x,t)$ &0.10& 0.3660 &0.2825&0.1624& 0.0791& 0.0111 &0.0004& 0.0000\\ \hline convergence &0.02 &&0.2343& 0.1580 &0.1128& 0.0933& 0.0900& 0.0900\\ rate &0.06&&0.2466& 0.1710& 0.1279 &0.1118 &0.1099 &0.1100\\ $c_n$&0.10&&0.2592 &0.1845 &0.1439 &0.1308& 0.1299 &0.1300 \\ \hline \end{tabular} \end{center} \caption{Absolute errors between the optimal portfolios and the Merton portfolio $\bar e(x,t)$, distance between adjacent points $m$, and estimations of rate of convergence $c_n$ with different time horizons $t$ and interest rates $r$.} \label{table3} \end{table} We have done the same set of numerical tests with $q_1=q_2=q=-1/3$ and all other data the same as above, which corresponds to $p=1/4$ and $\bar q =1/3$ for the non-HARA utility in (\ref{nonHara}). Since $q_1=q_2=q>q^*$, we have $\lambda<0$ and $ \lim_{t\to\infty}R(t)=-1/ \lambda$. Numerical tests show that $\lim_{t\to\infty} \pi^*(x,t)=(\theta/\sigma)(1-q)$ and $\lim_{t\to\infty} c^*(x,t)=-\lambda x$. Therefore, the turnpike property for investment still holds due to the consumption utility being a power utility. The numerical tests also indicate that the convergence is exponential although we have not proved this result when $q_1$ and $q_2$ are greater than $q^*$. \begin{example} Assume $U_1$ is a power utility, given by $U_1'(x)=x^{p_1-1}$, and $U_2$ is a non-HARA utility, given by (\ref{nonHara}) with $p=p_2$, where $0<p_1,p_2<1$. Condition (\ref{eqn10}) is satisfied. If $q_1<q^*$ or $q_2 \leq q^*$, then from (\ref{turnpike}), we have $$\lim_{t\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma}(1-\min\{q_1,q_2\})x. $$ If $q_1> q^*$ and $q_2>q^*$, then from (\ref{turnpike-2}) and (\ref{consumption-2}), we have $$ \lim_{t\rightarrow \infty}A(x,t)=-\frac{\theta}{\sigma } Yh'(Y),\quad \lim_{t\rightarrow \infty}C(x,t) =-V_2'(Y), $$ where $Y$ is the unique solution to the equation $x=- (1/\lambda_2) y^{q_2-1} - (1/\bar\lambda_2) y^{\bar q_2-1}$. Solving the equation and substituting $Y$ into the limits above, we get \begin{equation} \label{A_C_ex2} \lim_{t\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma }(1-q_2)\left( x + {1\over 2\bar \lambda_2} Z \right),\quad \lim_{t\rightarrow \infty}C(x,t) =Z^2 + Z, \end{equation} where $Z= 2x\left(\sqrt{\frac{1}{\bar{\lambda}_2^2}-\frac{4x}{\lambda_2}}-\frac{1}{\bar{\lambda}_2}\right)^{-1}$. Clearly, the limiting optimal portfolio and consumption are not linear functions of wealth, in other words, the initial wealth level would affect the behaviour of optimal trading strategies even though the time horizon is very long. The turnpike property in the classical sense does not hold in this scenario. This is in a marked contrast to the case when the consumption utility is a power utility function. We may conclude that there is no turnpike property in general when the consumption utility is a general utility. \end{example} We have done numerical tests with the same data as in Example \ref{ex1}. When $q_1=q_2=q=-3<q^*=-1$, we still have the turnpike property for investment. When $q_1=q_2=q=-1/3>q^*=-1$ and $\bar q_2=\bar q=1/3$, we know there is no turnpike property in general. To illustrate this point numerically, we find the exact optimal investment and consumption strategies $\pi^*(x,t)$ and $c^*(x,t)$ as follows: find the unique solution $y$ to the equation $-v_y(y,t)=x$, that is, $R(t) y^{q-1} + R_1(t) y^{\bar q-1}=x$, where $R(t)=e^{\lambda t} + (e^{\lambda t} -1)/ \lambda$ and $R_1(t)= (e^{\bar\lambda t} -1)/ \bar\lambda$. We can solve the equation and get $$ \pi^*(x,t) = {1\over x}\left({4\over 3}R(t) z^2 + {2\over 3} R_1(t)z\right)\quad\mbox{and}\quad c^*(x,t) = z^2+z, $$ where $z=(-R_1(t)+\sqrt{R_1(t)^2+4xR(t)}/(2R(t))$. Using (\ref{A_C_ex2}), also noting $\theta/\sigma=1$ and $q_2=-1/3$, we can find relative errors $$ e(x,t)= {{4\over 3} (1+{1\over 2\bar\lambda x}Z)\over \pi^*(x,t)}-1 \quad\mbox{and}\quad f(x,t)={Z^2+Z\over c^*(x,t)}-1.$$ The Merton strategy is given by $\pi_M(x,t)=(\theta/\sigma)(1-q)=4/3$. Table \ref{table4} lists values $\pi^*(x,t)$ (rows 2 to 4), relative errors $e(x,t)$ (rows 5 to 7), and relative errors to the Merton strategy $e_M(x,t)$ (rows 8 to 10) for $x=10$ and various $r$ and $t$. It is clear that $\pi^*(x,t)$ does not converge to the Merton strategy as $t$ tends to $\infty$. If one used the Merton strategy, one would greatly over-invest the risky asset compared with the optimal investment strategy $\pi^*(x,t)$. This phenomenon is due to the consumption utility not being a power utility. \begin{table} \begin{center} \begin{tabular}{|c|c|ccccccc|} \hline &$r\backslash t$ & 1&2&5&10&25&50&100\\ \hline optimal &0.02 &1.2008 &1.1328& 1.0290 &0.9519 &0.8710& 0.8353 &0.8222\\ portfolio &0.06& 1.2017& 1.1356& 1.0386& 0.9722& 0.9151& 0.9025& 0.9055\\ $\pi^*(x,t)$ &0.10&1.2027& 1.1384& 1.0478& 0.9912& 0.9538& 0.9540& 0.9588\\ \hline relative &0.02 &-0.3155 &-0.2744 &-0.2012 &-0.1365 &-0.0563& -0.0160 &-0.0003\\ error&0.06&-0.2450& -0.2011& -0.1265& -0.0668& -0.0086& 0.0053& 0.0020\\ $e(x,t)$ &0.10& -0.2023& -0.1573& -0.0845& -0.0321 &0.0059& 0.0056 &0.0006 \\ \hline relative &0.02 &0.1104 &0.1771& 0.2958& 0.4007& 0.5307& 0.5962 &0.6216\\ error&0.06&0.1095& 0.1741 &0.2838& 0.3714 &0.4570 &0.4775& 0.4725\\ $e_M(x,t)$ &0.10& 0.1086 &0.1712 &0.2724 &0.3451 &0.3980 &0.3976& 0.3907\\ \hline \end{tabular} \end{center} \caption{Optimal portfolios $\pi^*(x,t)$, relative errors to the limiting portfolio $e(x,t)$, and relative errors to the Merton portfolio $e_M(x,t)$ with different time horizons $t$ and interest rates $r$. The Merton portfolio $\pi_M(x,t)=4/3$ for all $x$ and $t$.}\label{table4} \end{table} Table \ref{table5} lists values $\pi^*(x,t)$ for different wealth levels $x=1, 10, 100$ and different time horizons $t$ and interest rates $r$. It is clear the optimal portfolios do not converge to the Merton portfolio and are dependant of the wealth level $x$ even when the time horizon is very long. \begin{table} \begin{center} \begin{tabular}{|c|c|ccccccc|} \hline $x$ &$r\backslash t$ & 1&2&5&10&25&50&100\\ \hline &0.02 &1.0014& 0.8922& 0.7845& 0.7365& 0.7045& 0.6944& 0.6912\\ 1 &0.06& 1.0032& 0.8961& 0.7921& 0.7472& 0.7201& 0.7152 &0.7163\\ &0.10&1.0051 &0.8999 &0.7998 &0.7583 &0.7374& 0.7375& 0.7400\\ \hline &0.02 &1.2008 &1.1328& 1.0290 &0.9519 &0.8710& 0.8353 &0.8222\\ 10 &0.06& 1.2017& 1.1356& 1.0386& 0.9722& 0.9151& 0.9025& 0.9055\\ &0.10&1.2027& 1.1384& 1.0478& 0.9912& 0.9538& 0.9540& 0.9588\\ \hline &0.02 &1.2881& 1.2617& 1.2149& 1.1727& 1.1165& 1.0852& 1.0723\\ 100 &0.06& 1.2885& 1.2628& 1.2197& 1.1847& 1.1491 &1.1402 &1.1424\\ &0.10&1.2888 &1.2640 &1.2242& 1.1953 &1.1738& 1.1739& 1.1768\\ \hline \end{tabular} \end{center} \caption{Optimal portfolios $\pi^*(x,t)$ with different wealth levels $x$, time horizons $t$, and interest rates $r$. The Merton portfolio $\pi_M(x,t)=4/3$ for all $x$ and $t$.}\label{table5} \end{table} \section{Conclusions} In this paper we discuss the turnpike property for optimal investment and consumption problems. We use the dual control method to characterize the optimal investment and consumption strategies in terms of the dual value function. We find there exists a threshold value that determines if the turnpike property for investment holds when utilities from consumption and terminal wealth behave like power utilities at large wealth. We show the turnpike property for consumption does not hold in general. We derive the exponential rate of convergence of the optimal strategies to their limiting strategies. We illustrate the main results with two examples using power and non-HARA utilities and some numerical tests. \bigskip {\noindent\bf Acknowledgment}. The authors are grateful to the anonymous reviewer whose comments and suggestions have helped to improve the previous two versions. \section{Appendix} \label{proofs} \noindent{\bf Derivation of optimal trading strategy (\ref{ICS-1}) and budget equation (\ref{bce})}. We may use a standard stochastic control method to solve problem (\ref{primal_problem}). Define the value function $u$ by $$ u(x,t)=\sup_{\pi, c} E\left[\int_t^T e^{-\delta (s-t)} U_2(c_s)ds +e^{-\delta (T-t)}U_1(X_T)\bigg | X_t=x\right] $$ for $(x,t)\in R_+\times [0,T]$. Then $u$ satisfies the HJB equation \begin{equation} \label{HJBE-1} {\partial u\over \partial t}+\max_{\pi} \{ \frac{1}{2}\sigma^2x^2\pi^2 u_{xx}+x\pi\sigma \theta u_x\}+rxu_x-\delta u+\max_{c\geq 0}\{U_2(c)-cu_x\}=0, \end{equation} for $(x,t)\in R_+\times [0,T)$ with the terminal condition $u(x,T)=U_1(x)$ for $x\in R_+$, where $u_x(x,t)$ is the partial derivative of $u$ with respect to $x$ and evaluated at $(x,t)$ (we have omitted $(x,t)$ in equation (\ref{HJBE-1}) to simplify notations), ${\partial\over \partial t}u$ and $u_{xx}$ are defined similarly. Let $V_i$ be the dual functions of $U_i$, $i=1,2$, defined in (\ref{dual_func_V_i}). Then $V_i$ are nonnegative (since $U_i(0)=0$), continuously differentiable, strictly decreasing, strictly convex functions. The optimal investment and consumption strategies in the HJB equation (\ref{HJBE-1}) are given by \begin{equation} \label{ICS-10} \pi^*(x,t)=- \frac{\theta}{\sigma}\frac{u_x}{xu_{xx}},\ \ \ c^*(x,t)=-V'_2 (u_x). \end{equation} The HJB equation (\ref{HJBE-1}) can be written as \begin{equation} \label{HJBE-1a} {\partial u\over \partial t}-\frac{1}{2}\theta^2{u_x^2 \over u_{xx}}+rxu_x-\delta u+V_2(u_x)=0. \end{equation} Equation (\ref{HJBE-1a}) is a fully nonlinear PDE and is in general difficult to solve. In the literature equation (\ref{HJBE-1a}) is solved with some trial-and-error method, which works when $U_1$ and $U_2$ are the same power utility functions. Bian et al. (2011) and Bian and Zheng (2015) apply the dual stochastic control method to solve problem (\ref{primal_problem}) and show that the HJB equation (\ref{HJBE-1}) has a classical solution that can be represented in terms of the dual function of the corresponding dual control problem. The value function $v(y,t)$ of the dual control problem satisfies a linear PDE \begin{equation} \label{dual_HJB} {\partial v\over \partial t} + {1\over 2}\theta^2 y^2 v_{yy} -(r-\delta)yv_y - \delta v +V_2(y) =0 \end{equation} for $(y,t)\in R_+\times [0,T)$, with the terminal condition $v(y,T)=V_1(y)$. Its solution $v$ is continuous on $R_+\times [0,T]$ and $C^{2,1}$ on $R_+\times [0,T)$, and $v$ is strictly decreasing and strictly convex in $y$ for fixed $t<T$. A classical solution to the HJB equation (\ref{HJBE-1}) is given by $$ u(x,t) = v(y, t) + x y, $$ where $y$ is the unique solution to the equation $$ x=-v_y(y,t). $$ This leads to $u_x(x,t)=y$ and $u_{xx}=-1/v_{yy}$. From (\ref{ICS-10}) we conclude that the optimal amount of investment $A(x,t)$ and the optimal consumption rate $C(x,t)$ are given by $$ A(x,t)=x\pi^*(x,t)=\frac{\theta}{\sigma}y v_{yy}(y,t) ,\ \ \ C(x,t)= c^*(x,t)=-V'_2 (y). $$ To simplify the notation, we define $\tau=T-t$, the time horizon. Then $T\to \infty$ is equivalent to $\tau\to\infty$. We still use $t$ to represent a time horizon variable, instead of $\tau$. It is easy to verify that $v_y(y,t)$ is the solution of the initial value problem \begin{equation}\label{x} w_t-\frac{1}{2}\theta^2 y^2 w_{yy}+(r-\delta-\theta^2)yw_y+ \delta w=V_2^{'}(y) \end{equation} for $(y,t)\in R_+\times R_+$ with initial condition $v_y(y,0)=V'_1(y),\ y\in R_+$. By Poisson's formula, the solution of equation (\ref{x}) is given by \begin{equation}\label{PF-2} v_y(y,t)=-I_1(y,t)-\int_{0}^tI_2(y,\tau)d\tau,\ yv_{yy}(y,t)=J_1(y,t)+\int_{0}^tJ_2(y,\tau)d\tau, \end{equation} which proves (\ref{ICS-1}) and (\ref{bce}). \bigskip\noindent {\bf Preliminaries of mathematical proofs}. We need some technical results in proofs. Simple calculus gives that for any constant $A$, \begin{equation}\label{A} \frac{1}{2 \sqrt{\pi }}\int_{-\infty}^{\infty} e^{-\frac{\eta^2}{4}-A\eta}d\eta=e^{A^2 } \end{equation} Hence for any $q<1$, \begin{equation}\label{C-1} \frac{e^{\beta t}}{2\sqrt{\pi }}\int_{-\infty}^\infty e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{t}\eta}(\frac{\eta}{2a\sqrt{t}}+\alpha-1)e^{(q-1)a\sqrt{t}\eta}d\eta =(q-1)e^{\lambda(q) t} \end{equation} and \begin{equation}\label{C-2} \frac{e^{\beta t}}{2\sqrt{\pi }}\int_{-\infty}^\infty e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{t}\eta}|\frac{\eta}{2a\sqrt{t}}+\alpha-1|e^{(q-1)a\sqrt{t}\eta}d\eta \leq [1-q+\frac{1}{a\sqrt{\pi t}}]e^{\lambda(q) t}. \end{equation} For any $y>0$, the convexity of $V_i$ implies that \[ V_i(\frac{y}{2})\geq V_i(y)-\frac{y}{2} V_i'(y), \] which, together with the decreasing property and the nonnegativity of $V$, gives \begin{equation} \label{V-NC} 0\leq -yV_i'(y) \leq 2 V_i(\frac{y}{2}) \leq 2V_i(\frac{1}{2}), \end{equation} for all $y\geq 1$. We need the following algebraic inequality in the proof: \begin{equation}\label{e51} |x^c-y^c|\leq (1+c)\max\{x, y\}^{c-1}|x-y| \end{equation} for all $x,y\geq 0$ and $0<c<\infty$. (\ref{e51}) can be proved as follows: assume $x>y>0$ and let $z=x/y$. Then $z>1$ and (\ref{e51}) is equivalent to $z^c -1 \leq (1+c)(z^c-z^{c-1})$. Let $g(z)=z^c -1-(1+c)(z^c-z^{c-1})$. Then $g'(z)=cz^{c-1}-(1+c)(cz^{c-1}-(c-1)z^{c-2})=-c^2(1-z)z^{c-2}-z^{c-2}\leq 0$ for $z\geq 1$. So $g$ is decreasing and $g(z)\leq g(1)=0$ for $z\geq 1$. We have, for any $q<\bar{q}<1$, $\lambda=\lambda(q), \bar{\lambda}=\lambda(\bar{q})$ \begin{equation}\label{1} e^{\bar{\lambda} t}y^{\bar{q}-1}=(e^{\lambda t}y^{q-1})^{\frac{\bar{q}-1}{q-1}}e^{(\bar{\lambda}-\lambda\frac{\bar{q}-1}{q-1}) t}. \end{equation} and \begin{equation}\label{2} \bar{\lambda}-\lambda\frac{\bar{q}-1}{q-1}=(\bar{q}-q)[\frac{1}{2}\theta^2(\bar{q}-1)+\frac{r}{q-1}]<0. \end{equation} \bigskip\noindent {\bf Proof of Theorem \ref{Example-1}}. Since $U'_i(x)= x^{p_i-1}$ for $i=1,2$, the dual functions are given by $V'_i(y)=-y^{q_i-1}$ where $q_i=p_i/(p_i-1)$. Substituting $V'_i(y)$ into (\ref{PF-2}), also noting (\ref{A}), we have $$ v_y(y,t)=-e^{\lambda_1 t} y^{q_1-1} -\frac{e^{\lambda_2 t }-1}{\lambda_2} y^{q_2-1}.$$ Hence we derive (\ref{control-i}) from (\ref{ICS-1}), where $y$ is the solution to the equation (\ref{relationship}). We next complete the proof by directly discussing three cases. {\it Case 1}. When $q_1<q^*$ or $q_2\leq q^*$, we have $\lambda_1>0$ or $\lambda_2\geq 0$. We know that the solution $y=u_x$ to equation (\ref{relationship}) must tend to $\infty$ as $t$ tends to $\infty$ (otherwise the right side of (\ref{relationship}) tends to $\infty$). We can find the dominating term in (\ref{relationship}) as $t$ tends $\infty$ for different $q_1$ and $q_2$. Assume $q=q_1=q_2 \leq q^*$. It is easy to see from (\ref{ICS-1}) and (\ref{relationship}) that $A(x,t)=\frac{\theta}{\sigma} (1-q)x$ and $C(x,t)=-V'_2 (u_x(x,t))=(u_x(x,t))^{q_2-1}=E(t)x$, where $E(t)=(e^{\lambda_1 t} +\frac{e^{\lambda_2 t }-1}{\lambda_2})^{-1}$. This implies $R(t)C(x,t)=x$. Assume $q_1<\min\{q_2, q^*\}$, then $\lambda_1>\max\{\lambda_2, 0\}$. Noting that \[ \frac{e^{\lambda_2 t }-1}{\lambda_2}=\frac{1-e^{-|\lambda_2| t}}{|\lambda_2|} e^{\lambda^+_2 t}\leq te^{\lambda^+_2 t}, \] we obtain \begin{equation} \label{i-c} \frac{e^{\lambda_2 t }-1}{\lambda_2}y^{q_2-1}\leq (e^{\lambda_1 t}y^{q_1-1})^{\frac{q_2-1}{q_1-1}}te^{(\lambda^+_2-\lambda_1\frac{q_2-1}{q_1-1}) t} \leq x^{\frac{q_2-1}{q_1-1}}te^{(\lambda^+_2-\lambda_1\frac{q_2-1}{q_1-1}) t}. \end{equation} From (\ref{relationship}) and (\ref{2}), we deduce that $\lim_{t\rightarrow \infty}\frac{e^{\lambda_2 t }-1}{\lambda_2}y^{q_2-1}=0$ and $\lim_{t\rightarrow \infty}e^{\lambda_1 t}y^{q_1-1}=x$. Hence from (\ref{control-i}) \[ \lim_{t\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma}(1-q_1)x. \] We have by (\ref{control-i}) \[ e^{\lambda_1\frac{q_2-1}{q_1-1} t}C(x,t)=(e^{\lambda_1 t}y^{q_1-1})^{\frac{q_2-1}{q_1-1}}, \] which implies $\lim_{t\to\infty} R(t) C(x,t)=x^{\frac{q_2-1}{q_1-1}}$. Assume $q_2< q_1$ and $q_2\leq q^*$, then $\lambda_2> \lambda_1$ and $\lambda_2\geq 0$. We have \begin{equation} \label{E} \frac{\lambda_2 }{1-e^{-\lambda_2 t}}\leq E:=\frac{\lambda_2 }{1-e^{-\lambda_2 }} \end{equation} for $t\geq 1$. Then by (\ref{relationship}), for $t\geq 1$ \begin{equation} \label{c-i} e^{\lambda_1 t}y^{q_1-1} = (\frac{e^{\lambda_2 t }-1}{1-e^{-\lambda_2 t}} y^{q_2-1})^{\frac{q_1-1}{q_2-1}} e^{(\lambda_1-\lambda_2\frac{q_1-1}{q_2-1}) t}\leq (Ex)^{\frac{q_1-1}{q_2-1}} e^{(\lambda_1-\lambda_2\frac{q_1-1}{q_2-1}) t}. \end{equation} We deduce from (\ref{relationship}) and (\ref{2}) $\lim_{t\rightarrow \infty}e^{\lambda_1 t}y^{q_1-1}=0$ and $\lim_{t\rightarrow \infty}\frac{e^{\lambda_2 t }-1}{\lambda_2}y^{q_2-1}=x$. Furthermore, we get \[ \lim_{t\rightarrow \infty}A(x,t)=\frac{\theta}{\sigma}(1-q_2)x, \] and $\frac{e^{\lambda_2 t }-1}{\lambda_2}C(x,t)= \frac{e^{\lambda_2 t }-1}{\lambda_2}y^{q_2-1}$, which gives $\lim_{t\to\infty} R(t)c(x,t)=x$. {\it Case 2}. Since $q_1> q^*$ and $q_2>q^*$, we have $\lambda_1, \lambda_2< 0$. From (\ref{relationship}), we deduce that $y=u_x(x,t)$ must have upper bound in $t$ (otherwise, we would have $x=0$, a contradiction). Therefore $x=\lim_{t\to\infty}(-1/\lambda_2)u_x(x,t)^{q_2-1}$. Taking the limit in (\ref{control-i}) leads to the desired results. {\it Case 3}. Since $q_1= q^*$ and $q_2>q^*$, we have $\lambda_1=0$ and $\lambda_2<0$. Again from (\ref{relationship}), we deduce that $y=u_x(x,t)$ must have upper bound. Let $Y$ be the unique solution to the nonlinear equation \[ x=Y^{q^*-1}-\frac{1}{\lambda_2}Y^{q_2-1}, \] then we have $\lim_{t\rightarrow \infty}u_x=Y$. Taking the limit in (\ref{control-i}) leads to the desired results. \hfill $\Box$ \bigskip\noindent {\bf Proof of Theorem \ref{Main-1}}. From (\ref{eqn10}) and (\ref{V-NC}), we conclude that there is constant $\bar{q}\in (\max\{q_1,q_2,0\}, 1)$, for any fixed $\epsilon>0$, there is $K_\epsilon>0$, such that \begin{equation} \label{V-C-1a} |V'_i(y)+ y^{q_i-1}|\leq \epsilon |V'_i(y)| + K_\epsilon y^{\bar{q}-1}. \end{equation} for $i=1, 2$. By (\ref{V-C-1a})(i=1) and (\ref{A}), we get \[ |I_1(y,t)-y^{q_1-1}e^{\lambda_1 t}|\leq \epsilon I_1(y,t)+K_\epsilon y^{\bar{q}-1}e^{\bar{\lambda} t}, \] for all $(y,t)\in R_+\times (0,\infty)$. Taking $\epsilon=1$ and denoting $\bar{K}=K_1$, we get, by (\ref{1}) and (\ref{2}) \[ y^{q_1-1}e^{\lambda_1 t}\leq 2 I_1(y,t)+\bar{K} (y^{q_1-1}e^{\lambda_1 t})^{\frac{\bar{q}-1}{q_1-1}}. \] Since $0<\frac{\bar{q}-1}{q_1-1}<1$, we see that $(y^{q_1-1}e^{\lambda_1 t})^\frac{q_1-\bar{q}}{q_1-1} \leq 2 I_1(y,t)+ \bar{K}$ if $y^{q_1-1}e^{\lambda_1 t}\geq 1$. Hence \[ y^{q_1-1}e^{\lambda_1 t}\leq [2 I_1(y,t)+1+ \bar{K} ]^{\frac{q_1-1}{q_1-\bar{q}}}. \] Similarly, we obtain for $t\geq 1$ \[ y^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}\leq \left[2 \int_{0}^tI_2(y,\tau)d\tau +1+ \frac{\bar{K}E^{\bar{q}-1\over q_2-1}}{|\bar{\lambda}|} \right]^{\frac{q_2-1}{q_2-\bar{q}}}. \] Let $H_1(t)=(u_x(x,t))^{q_1-1}e^{\lambda_1 t}$, $H_2(t)=(u_x(x,t))^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}$, $M_1(t)=(u_x(x,t))^{\bar{q}-1}e^{\bar{\lambda} t}$, $M_2(t)=(u_x(x,t))^{\bar{q}-1}\frac{e^{\bar{\lambda} t}-1}{\bar{\lambda}}$, $H(t)=H_1(t)+H_2(t)$ and $M(t)=M_1(t)+M_2(t)$. Then by (\ref{bce}) \begin{equation} \label{V-E-3} H(t)\leq H:=\left[2x+1+ \bar{K}\right]^{\frac{q_1-1}{q_1-\bar{q}}}+\left[2x +1+ \frac{\bar{K}E^{\bar{q}-1 \over q_2-1}}{|\bar{\lambda}|} \right]^{\frac{q_2-1}{q_2-\bar{q}}}. \end{equation} Recalling $E(t)=(e^{\lambda_1 t}+\frac{e^{\lambda_2 t}-1}{\lambda_2})^{-1}$. For $q_1<q^*$ or $q_2 \leq q^*$, we see $\lambda_1>0$ or $\lambda_2 \geq 0$. Hence $E(t)\leq 1$ for $t\geq 1$ and $\lim_{t\rightarrow \infty}E(t)=0$. We have for all $y>0$, \[ y^{q_1-1}e^{\lambda_1 t}+y^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}\geq E(t)^{-1}\min\{ y^{q_1-1},y^{q_2-1}\} . \] Hence \begin{equation} \label{V-E-y} u_x(x,t) \geq \min\{ (E(t)H(t))^{\frac{1}{q_1-1}}, (E(t)H(t))^{\frac{1}{q_2-1}}\}. \end{equation} This implies, for $t\geq 1$ \begin{equation}\label{V-E-4} u_x(x,t)\geq H^{\frac{1}{\max\{q_1,q_2\}-1}} (E(t))^{\frac{1}{\min\{q_1,q_2\}-1}}, \end{equation} and $\lim_{t\rightarrow \infty}u_x(x,t)=\infty$. Using (\ref{1}) and (\ref{2}), we derive the following estimates: \begin{equation}\label{V-E-m} M(t) \leq \tilde{M}(x,t):=H^{\frac{\bar{q}-1}{q_1-1}}e^{(\bar{\lambda}-\lambda_1\frac{\bar{q}-1}{q_1-1}) t} + \frac{1}{|\bar{\lambda}|} H^{\frac{\bar{q}-1}{\max\{q_1,q_2\}-1}}(E(t))^{\frac{\bar{q}-1}{\min\{q_1,q_2\}-1}}. \end{equation} By (\ref{V-C-1a}), (\ref{bce}) and (\ref{A}), we get \begin{equation} \label{V-E-2} |H(t)-x|\leq \epsilon H(t) + K_\epsilon M(t). \end{equation} Noting that (\ref{2}), (\ref{V-E-m}), and letting $t\to\infty$ and then $\epsilon\to 0$ in (\ref{V-E-2}), we deduce the limiting form of (\ref{relationship}) \begin{equation}\label{V-E-5} \lim_{t\rightarrow \infty}(u_x(x,t))^{q_1-1}e^{\lambda_1 t}+(u_x(x,t))^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}=x. \end{equation} By (\ref{V-C-1a}),(\ref{ICS-1}), (\ref{C-1}) and (\ref{C-2}), we conclude that \begin{eqnarray*} & &\left|yv_{yy}(y,t)-(1-q_1)y^{q_1-1}e^{\lambda_1 t}-(1-q_2)y^{q_2 -1}\frac{e^{\lambda_2 t}-1}{\lambda_2}\right|\\ &\leq& \epsilon \left[(1-q_1+\frac{1}{a\sqrt{\pi}})y^{q_1-1}e^{\lambda_1 t}+(1-q_2+\frac{2Ee^{\lambda^+_2}+1}{a\sqrt{\pi}})y^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}\right]\\ & &{} + K_\epsilon \left[(1-\bar{q}+\frac{1}{a\sqrt{\pi}})y^{\bar{q}-1}e^{\bar{\lambda} t}+(1-\bar{q}+\frac{2Ee^{\lambda^+_2}+1}{a\sqrt{\pi}})y^{\bar{q}-1}\frac{e^{\bar{\lambda} t}-1}{\bar{\lambda}}\right] \end{eqnarray*} for all $(y,t)\in R_+\times [1,\infty)$. Let \[ \bar{D}=\max\{1-q_1+\frac{1}{a\sqrt{\pi}}, 1-q_2+\frac{2Ee^{\lambda^+_2}+1}{a\sqrt{\pi}}\}. \] Noting $q_1,q_2<\bar{q}$, for fixed $x>0$, we obtain \begin{equation} \label{V-E-6} \left|A(x,t)-\frac{\theta}{\sigma}[(1-q_1)H_1(t)+(1-q_2)H_2(t)]\right| \leq \frac{\theta\bar{D}}{\sigma}(\epsilon H(t) +K_\epsilon M(t)). \end{equation} From estimates (\ref{V-E-3}) and (\ref{V-E-m}), letting $t\to\infty$ and then $\epsilon\to 0$ in (\ref{V-E-6}), we derive \begin{equation}\label{V-E-7} \lim_{t\rightarrow \infty}\left[A(x,t)-\frac{\theta}{\sigma}[(1-q_1)H_1(t)+(1-q_2)H_2(t)]\right]=0. \end{equation} Next, dividing the cases: $q_1=q_2 \leq q^*$, $q_1<\min\{q_2, q^*\}$ and $q_2< q_1, q_2\leq q^*$ as in Theorem \ref{Example-1}, we derive the turnpike property (\ref{turnpike}) from (\ref{V-E-5}) and (\ref{V-E-7}). To derive (\ref{consumption}), noting $C(x,t)=-V'_2(u_x(x,t))$, (\ref{V-C-C}), (\ref{V-E-5}) and $\lim_{t\to\infty} u_x(x,t)=\infty$, we have $$ \lim_{t\to\infty} R(t)^{\frac{\hat q-1}{q_2-1}} C(x,t) = \lim_{t\to\infty} \left(R(t)^{1\over q_2-1}u_x(x,t)\right)^{\hat q-1}= x^{\frac{ \hat q-1}{\min \{q_1,q_2\}-1}}. $$ The last equality is derived by discussing three cases for $q_1$ and $q_2$, the same as that in deriving (\ref{turnpike}). \hfill $\Box$ \bigskip\noindent {\bf Proof of Theorem \ref{Main-1a}}. The proof is similar to that of Theorem \ref{Main-1}. With strengthened assumptions, we can give better estimations to some inequalities in the proof of Theorem \ref{Main-1}. From (\ref{V-NC}) we conclude that assumption (\ref{V-C-3}) holds for all $y>0$ with a changed constant $L$. This implies that (\ref{V-E-2}) becomes \begin{equation} \label{V-E-2b} |H(t)-x|\leq LM(t), \end{equation} and (\ref{V-E-3}) becomes \begin{equation} \label{V-E-3b} H(t)\leq H:=(x+1+ L)^{\frac{q_1-1}{q_1-\bar{q}}}+\left[x +1+ \frac{LE^{\bar{q}-1 \over q_2-1}}{|\bar{\lambda}|} \right]^{\frac{q_2-1}{q_2-\bar{q}}}. \end{equation} We have also the estimate (\ref{V-E-m}). (\ref{V-E-6}) becomes \begin{equation} \label{V-E-7b} \left|A(x,t)-\frac{\theta}{\sigma}[(1-q_1)H_1(t)+(1-q_2)H_2(t)]\right| \leq \frac{D\theta}{\sigma}L M(t), \end{equation} where $D= 1-\bar{q}+\frac{2Ee^{\lambda^+_2}+1}{a\sqrt{\pi}}$. Note that $\tilde{q}< \min\{\hat{q}, q_2\}$, (\ref{V-C-C-C}) holds for all $y>0$. Setting $c:=\frac{\hat q -1}{\min\{q_1,q_2\}-1}$, we have, from (\ref{e51}) \begin{equation}\label{consumption-1} |R(t)^{\frac{\hat q-1}{q_2-1}} C(x,t)-x^c| \leq R(t)^{\frac{\hat q-1}{q_2-1}}|V'_2(u_x)+u_x^{\hat q-1}|+|R(t)^{\frac{\hat q-1}{q_2-1}} u_x^{\hat q-1}-x^c|. \end{equation} Noting that $R(t)^{\frac{\hat q-1}{q_2-1}}\leq (E(t))^{\frac{\hat q-1}{q_2-1}}$, we have, from (\ref{V-C-C-C}) and (\ref{V-E-4}) \[ R(t)^{\frac{\hat q-1}{q_2-1}}|V'_2(u_x)+u_x^{\hat q-1}|\leq LR(t)^{\frac{\hat q-1}{q_2-1}} u_x^{\tilde{q}-1}\leq L H^{\frac{\tilde{q}-1}{\max\{q_1,q_2\}-1}} (E(t))^{\frac{\tilde{q}-\hat q}{\min\{q_1,q_2\}-1}}. \] This gives the estimate for the first term in (\ref{consumption-1}). For $q=q_1=q_2\leq q^*$, we deduce from (\ref{V-E-7b}) and (\ref{V-E-2b}), \[ \left|A(x,t)-\frac{\theta}{\sigma}(1-q)x\right| \leq \frac{\theta}{\sigma}L(1-q+D)M(t). \] Let $G=G(x,c)=(1+c)H^{c-1}$ if $c>1$ and $G=G(x,c)=(1+c)x^{c-1}$ if $c\leq 1$. It is clear that $x<H$ since $\frac{q_1-1}{q_1-\bar{q}}>1$ from (\ref{V-E-3b}). Noting $R(t)u_x^{q-1}=H(t)$ and $x \leq \max\{H(t),x\} \leq H$, we deduce the estimate for the second term in (\ref{consumption-1}) by (\ref{V-C-C-C}), (\ref{V-E-2b}) and (\ref{e51}), \[ |R(t)^c u_x^{\hat q-1}-x^c| =|(R(t)u_x^{q-1})^c - x^c|\leq G(x,c)|H(t)-x| \leq LG(x,c)M(t). \] We deduce convergence rate by (\ref{V-E-m}). If $q_1<\min\{q_2, q^*\}$, we have, by (\ref{i-c}), \[ H_2(t)\leq H^{\frac{q_2-1}{q_1-1}}te^{(\lambda^+_2-\lambda_1\frac{q_2-1}{q_1-1}) t}, \] and by (\ref{V-E-2b}) and (\ref{V-E-7b}), \[ \left|A(x,t)-\frac{\theta}{\sigma}(1-q_1)x\right| \leq \frac{\theta}{\sigma}L(1-q_1+D)M(t)+(q_2-q_1)\frac{\theta}{\sigma}H_2(t). \] Note that $R(t)=e^{\frac{q_2-1}{q_1-1}\lambda_1 t}$ in this case, we have $$ |R(t)^c u_x^{\hat q-1}-x^c| = |H_1(t)^c - x^c| \leq G(x,c)|H_1(t) -x| \leq G(x,c)(LM(t)+H_2(t)). $$ If $q_2< q_1, q_2\leq q^*$, we have, by (\ref{c-i}), for $t\geq 1$ \[ H_1(t)\leq (EH)^{\frac{q_1-1}{q_2-1}}e^{(\lambda_1-\lambda_2\frac{q_1-1}{q_2-1}) t}, \] where $E:=\frac{\lambda_2}{1- e^{-\lambda_2}}$. We deduce from (\ref{V-E-2b}) and (\ref{V-E-7b}) \[ \left|A(x,t)-\frac{\theta}{\sigma}(1-q_2)x\right| \leq \frac{\theta}{\sigma}L(1-q_2+D)M(t)+(q_1-q_2)\frac{\theta}{\sigma} H_1(t). \] Noting that $R(t)=\frac{e^{\lambda_2 t}-1}{\lambda_2}$, from (\ref{V-E-2b}), \[ |R(t)^c u_x^{\hat q-1}-x^c| = |(H_2(t))^c -x^c| \leq G(x,c)|H_2(t) -x| \leq G(x,c)(LM(t)+H_1(t)). \] Note that $E(t)$ converges to 0 exponentially as $t\to\infty$ if $q_1<q^*$ or $q_2 < q^*$, and polynomially if $q_1\geq q^*$ and $q_2=q^*$. All other terms converge to 0 exponentially. Combining all discussions above, we have proved the results. \hfill $\Box$ \bigskip\noindent {\bf Proof of Theorem \ref{Main-2}}. In this case, $\lambda_1\leq 0$, $\lambda_2< 0$. From (\ref{eqn10}) and (\ref{V-NC}), we conclude that there is constant $\bar{q}\in (\max\{q_1,q_2,0\}, 1)$, and for any fixed $\epsilon>0$, there is $K_\epsilon>0$, such that \begin{equation}\label{V-C-5-e} \left|V'_i(y)+ y^{q_i-1}\right|\leq \epsilon y^{q_i-1} + K_\epsilon y^{\bar{q}-1}. \end{equation} Let $h(y,t)=\int_{0}^t I_2(y,\tau)d\tau$; then from (\ref{V-C-5-e}) ($i=2$) \begin{equation}\label{h-1} \left|h(y,t)-y^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}\right| \leq \epsilon y^{q_2-1}\frac{e^{\lambda_2 t}-1}{\lambda_2}+ K_\epsilon y^{\bar{q}-1}\frac{e^{\bar{\lambda} t}-1}{\bar{\lambda}}. \end{equation} Hence $h(y,t)$ is increasing and bounded above in $t$. We deduce that $\lim_{t\rightarrow \infty}h(y,t)=h(y)$, which implies that $h(y)$ is well defined and \begin{equation}\label{h-2} \left|h(y)-\frac{1}{|\lambda_2|}y^{q_2-1}\right| \leq \epsilon\frac{1}{|\lambda_2|}y^{{q_2}-1}+ K_{\epsilon} \frac{1}{|\bar{\lambda}|}y^{\bar{q}-1}. \end{equation} Since $|V'_2(y)|$ is decreasing, we conclude that $h(y)$ is strictly decreasing, $h(\infty)=0$ and $h(0)=\infty$ by (\ref{h-2}). Hence equation (\ref{root}) admits a unique solution for any fixed $x>0$. We denote this unique solution by $Y=Y(x)$. Since $h(y)-h(y,t)=\int_{t}^\infty I_2(y,\tau)d\tau$ and $yh'(y)-yh_y(y,t)=\int_{t}^\infty J_2(y,\tau)d\tau$, we have from (\ref{V-C-5-e}) ($i=2$) \begin{equation}\label{h-3} \left|h(y)-h(y,t)-\frac{1}{|\lambda_2|}y^{q_2-1}e^{\lambda_2 t}\right| \leq \epsilon y^{q_2-1}\frac{e^{\lambda_2 t}}{|\lambda_2|}+ K_\epsilon y^{\bar{q}-1}\frac{e^{\bar{\lambda} t}}{|\lambda|}, \end{equation} and \begin{equation}\label{h-4} \left|yh'(y)-yh_y(y,t)-(1-q_2)y^{q_2-1}\frac{e^{\lambda_2 t}}{|\lambda_2|}\right|\leq (1-q_2+\frac{1}{a\sqrt{\pi}})\left[\epsilon y^{q_2-1}\frac{e^{\lambda_2 t}}{|\lambda_2|}+ K_\epsilon y^{\bar{q}-1}\frac{e^{\bar{\lambda} t}}{|\lambda|}\right]. \end{equation} By (\ref{V-C-5-e})(i=1) and (\ref{A}), we get \[ \left|v_y(y,t)+y^{q_1-1}e^{\lambda_1 t}+h(y,t)\right|\leq \epsilon y^{q_1-1}e^{\lambda_1 t}+ K_\epsilon y^{\bar{q}-1}e^{\bar{\lambda} t}. \] Hence for fixed $x>0$ \begin{equation}\label{V-E-8} \left|u_x(x,t)^{q_1-1}e^{\lambda_1 t}+h(u_x(x,t),t)-x\right|\leq \epsilon u_x(x,t)^{q_1-1}e^{\lambda_1 t} + K_\epsilon u_x(x,t)^{\bar{q}-1}e^{\bar{\lambda} t}. \end{equation} Note that $\lambda_1=0$ if $q_1=q^*$, $\lambda_1<0$ if $q_1>q^*$ and $\bar{\lambda}<0$. Taking $\epsilon=\frac{1}{2}$, we see from (\ref{V-E-8}) and (\ref{h-1}) that there exists a constant $\bar{Y}=\bar{Y}(x)$ such that $u_x(x,t)\leq \bar{Y}$. Using (\ref{h-1}) and taking $\epsilon=\frac{1}{2}$, we deduce $\lim_{y\rightarrow 0} h(y,t)=0$ uniformly in $t$ when $t\geq 1$. Hence there exists a lower bound $\underline{Y}=\underline{Y}(x)$, $u_x(x,t)\geq \underline{Y}$. Now assume, for any sequence ${t_k}$, $\lim_{k\rightarrow \infty}t_k=\infty$ and $\lim_{k\rightarrow \infty}u_x(x,t_k)=\hat{Y}$. Then (\ref{h-3}) yields $\lim_{k\rightarrow \infty}h(u_x(x,t_k),t_k)=h(\hat{Y})$. Letting $k\to\infty$ and then $\epsilon\to 0$ in (\ref{V-E-8}) with $t=t_k$, we conclude $\hat{Y}^{q_1-1}1_{\{q_1=q^*\}}+h(\hat{Y})=x$ and $\hat{Y}=Y$, by the uniqueness of solution for equation (\ref{root}). Therefore, $\lim_{t\rightarrow \infty}u_x(x,t)=Y$. This yields (\ref{consumption-2}) directly. By (\ref{V-C-5-e}), (\ref{PF-2}) and (\ref{A}), we get \[ \left|yv_{yy}(y,t)-(1-q_1)y^{q_1-1}e^{\lambda_1 t}-yh_y(y,t)\right| \leq (1-q_1+\frac{1}{a\sqrt{\pi}})\left[\epsilon y^{q_1-1}e^{\lambda_1 t} + K_\epsilon y^{\bar{q}-1}e^{\bar{\lambda} t}\right], \] hence \begin{eqnarray*} &&\left|A(x,t)-\frac{\theta}{\sigma}[(1-q_1)(u_x(x,t))^{q_1-1}e^{\lambda_1 t}-u_x(x,t)h_y(u_x(x,t),t)]\right| \\ &\leq& (1-q_1+\frac{1}{a\sqrt{\pi}})\left[\epsilon u_x(x,t)^{q_1-1}e^{\lambda_1 t} + K_\epsilon u_x(x,t)^{\bar{q}-1}e^{\bar{\lambda} t}\right]. \end{eqnarray*} Noting $\lambda_2, \bar{\lambda} <0$, it yields (\ref{turnpike-2}) by (\ref{h-4}). If $V_2$ satisfies $V_2'(y)=-y^{q_2-1}$ with $q_2<0$, then a simple calculus shows that when $q_2>q^*$, we have $ h(y)=-(1/\lambda_2)y^{q_2-1}$ and $yh'(y)=(q_2-1)h(y)$. If $q_1>q^*$, then relations (\ref{turnpike-2})-(\ref{root}) give (\ref{eqn2.18}). \hfill $\Box$ \bigskip\noindent {\bf Proof of Theorem \ref{Main-3}}. From (\ref{V-wC0}), for any fixed $0<\gamma<1-\max\{q_1,q_2\}$, there is $0<Y=Y_\gamma<1$ such that \[ |R_i(y)-(1-q_i)|\leq \gamma,\ y\leq Y. \] Since $R_i(y)=-yV_i''(y)/V_i'(y)$, we have $$ V_i'(y)=V_i'(Y)e^{\int_y^Y\frac{R_i(\eta)}{\eta}d\eta} $$ for $y>0$. Hence, there exist positive constants $l=l_\gamma$ and $L=L_\gamma$, such that \begin{equation}\label{V-E-11} l y^{q_i+\gamma-1}\leq |V'_i(y)|\leq L y^{q_i-\gamma-1}, \,y\leq Y. \end{equation} We now give some estimates for $I_1(u_x,t)$ and $ \int_{0}^t I_2(y,\tau)d\tau|_{y=u_x}$. Suppose $q_1<\min\{q_2, q^*\}$, we choose $\gamma<\min\{\frac{q_2-q_1}{2}, q^*-q_1\}$. Then \begin{eqnarray*} I_1&\geq& \frac{e^{\beta t}}{2\sqrt{\pi }}\int_{-\infty}^{\frac{1}{a\sqrt{t}} \ln\frac{Y}{y}} e^{-\frac{\eta^2}{4}-(\alpha-1) a\sqrt{t}\eta}|V_1'(ye^{a\sqrt{t}\eta})|d\eta\\ &\geq& \frac{l y^{q_1+\gamma-1}e^{\lambda(q_1+\gamma) t}}{2\sqrt{\pi }}\int_{-\infty}^{\frac{1}{a\sqrt{t}} \ln\frac{Y}{y}+2(\alpha-q_1-\gamma)a\sqrt{t}} e^{-\frac{\xi^2}{4}}d\xi. \end{eqnarray*} Suppose that $\ln\frac{Y}{y}+2(\alpha-q_1-\gamma)a^2 t\geq 0$; then we get $x\geq I_1 \geq \frac{l}{2}u_x^{q_1+\gamma-1}e^{\lambda(q_1+\gamma) t}$. Otherwise, $\ln\frac{Y}{y}+2(\alpha-q_1-\gamma)a^2 t\leq 0$, we have $u_x \geq Y e^{2(\alpha-q_1-\gamma)a^2 t}$. Noting that $\alpha-q\geq \alpha-q^*>0$ for $q\leq q^*$ and $\lambda(q)+2(q-1)(\alpha-q)a^2=-[a^2(q-1)^2+r]<0$, we conclude that \begin{equation}\label{V-wE-1} u_x(x,t)^{q_1+\gamma-1}e^{\lambda(q_1+\gamma) t}\leq \max \{\frac{2x}{l}, Y^{q_1+\gamma-1} \}. \end{equation} Next assume $q_2<\min\{q_1, q^*\}$, we chose $\gamma<\min\{\frac{q_1-q_2}{2}, q^*-q_2\}$. Similarly, we have \[ \int_{0}^t I_2(y,\tau)d\tau\geq\int_{0}^t \frac{l y^{q_2+\gamma-1}e^{\lambda(q_2+\gamma)\tau}}{2\sqrt{\pi }}d\tau \int_{-\infty}^{\frac{1}{a\sqrt{\tau}} \ln\frac{Y}{y}+2(\alpha-q_2-\gamma)a\sqrt{\tau}} e^{-\frac{\xi^2}{4}}d\xi. \] Let $k_0=\frac{\lambda(q_2+\gamma)}{2a^2(1 -q_2-\gamma )(\alpha-q_2-\gamma)}\in (0,1)$ and $E_0=\frac{\lambda(q_2+\gamma)}{1-e^{(k_0-1)\lambda(q_2+\gamma)}}>0$. Assume $\ln\frac{Y}{y}+2(\alpha-q_2-\gamma)a^2 k_0 t\geq 0$, then $x\geq \frac{l}{2E_0}u_x^{q_2+\gamma-1}e^{\lambda(q_2+\gamma) t}$ for $t\geq 1$. Otherwise, we conclude that $u_x \geq Y e^{2(\alpha-q_2-\gamma)a^2 k_0 t}$. We get, for $t\geq 1$, \begin{equation}\label{V-wE-2} u_x(x,t)^{q_2+\gamma-1}e^{\lambda(q_2+\gamma) t}\leq \max \{\frac{2\bar{E}x}{l}, Y^{q_2+\gamma-1}\}. \end{equation} Since $q_2+\gamma<q^*$, we have $\lambda(q_2+\gamma)>0$ and $e^{\lambda(q_2+\gamma)t}\to\infty$ as $t\to \infty$. Noting $q_2+\gamma-1<0$ and (\ref{V-wE-2}), we conclude that $\lim_{t\rightarrow \infty}u_x(x,t)=\infty $. On the other hand, from (\ref{V-NC}), we obtain with a changed $L$ \[ |V'_i(y)|\leq L(y^{q_i-\gamma-1}+y^{\bar{q}-1}), \ y>0. \] Hence we deduce upper bounds \begin{equation}\label{V-wE-1a} I_1\leq K[y^{q_1-\gamma-1}e^{\lambda(q_1-\gamma) t}+y^{\bar{q}-1}e^{\bar{\lambda} t}] \end{equation} and \begin{equation}\label{V-wE-2a} \int_{0}^t I_2(y,\tau)d\tau\leq K\left[y^{q_2-\gamma-1}\frac{e^{\lambda(q_2-\gamma) t}-1}{\lambda(q_2-\gamma)}+y^{\bar{q}-1}\frac{e^{\bar{\lambda} t}-1}{\bar{\lambda}}\right]. \end{equation} Note that \begin{equation} \label{V-wE-3} yV''(y)=-R(y)V'(y)= (q-1)V'(y)+(1-q-R(y))V'(y). \end{equation} From (\ref{V-wC}) and (\ref{V-NC}), we conclude that for any fixed $\epsilon>0$, there is $K=K_\epsilon>0$, such that \begin{equation} \label{V-wE-3a} |(1-q-R(y))V'(y)|\leq \epsilon |V'(y)| + K y^{\bar{q}-1}. \end{equation} Substituting (\ref{V-wE-3}) into (\ref{PF-2}), we get by (\ref{V-wE-3a}) \begin{eqnarray} &&\left|y v_{yy}(y,t)-(1-q_1)I_1-(1-q_2)\int_{0}^t I_2(y,\tau)d\tau\right|\nonumber\\ &\leq& \epsilon\left(I_1+\int_{0}^t I_2(y,\tau)d\tau\right) + K_\epsilon y^{\bar{q}-1}\left(e^{\bar{\lambda} t}+\frac{e^{\bar{\lambda} t}-1}{\bar{\lambda}}\right). \label{V-wE-4} \end{eqnarray} Letting $y=u_x$, $t\to\infty$ and then $\epsilon\to 0$ in (\ref{V-wE-4}), also noting $\bar{q}>q^*$, $\bar{\lambda}<0$ and $\lim_{t\rightarrow \infty}u_x(x,t)=\infty$, we obtain \[ \lim_{t\rightarrow \infty} \left[A(x,t)-\frac{\sigma}{\theta}((1-q_1)I_1+(1-q_2)\int_{0}^t I_2(y,\tau)d\tau)\right]=0. \] If $q_1=q_2 < q^*$, we deduce (\ref{turnpike}) directly. Assume $q_1<\min\{q_2, q^*\}$. By (\ref{V-wE-1}) and (\ref{V-wE-2a}), we get $\lim_{t\rightarrow \infty}\int_{0}^t I_2(u_x,\tau)d\tau=0$, then (\ref{turnpike}). Assume $q_2<\min\{q_1, q^*\}$. By (\ref{V-wE-2}) and (\ref{V-wE-1a}), we get $\lim_{t\rightarrow \infty}I_1=0$ and (\ref{turnpike}). \hfill $\Box$ \bigskip\noindent {\bf Proof of Theorem \ref{Main-4}}. From representation theorem for functions of regular variation (Bingham et al. (1987), Theorem 1.3.1 and equation (1.5.1)), we conclude that (\ref{V-E-11}). Assume $q_1\neq q_2$, we chose $\gamma<\min\{\frac{|q_1-q_2|}{2}, 1-q_1, 1-q_2\}$ in (\ref{V-E-11}). Hence, we get $\lim_{y\to 0} {V_2'(y)\over V'_1(y)} = 0$ if $q_1 < q_2$ and $\lim_{y\to 0} {V_1'(y)\over V'_2(y)} = 0$ if $q_2 < q_1$. We claim that, for any fixed $t_0>0$, $v_y(y,t_0)$ satisfies (\ref{V-wC0}) with index $1-\min\{q_1,q_2\}$ and (\ref{V-wC}). Suppose $q_1 <q_2 $. From Potter's bound (Bingham et al. (1987), Theorem 1.5.6.iii)(see alsoBack et al. (1999), equation (73)), (\ref{PF-2}) and (\ref{V-NC}), for any fixed $t_0>0$, we get, by the dominated convergence theorem, $\lim_{y\to 0} {v_y(y,t_0)\over V'_1(y)} = e^{\lambda_1 t_0}$ and $\lim_{y\to 0} {yv_{yy}(y,t_0)\over V'_1(y)} = (q_1-1)e^{\lambda_1 t_0}$. We have \[ \lim_{y\to 0}R(y,t_0):= {-yv_{yy}(y,t_0)\over v_y(y,t_0)} = 1-q_1. \] Hence $v_y(y,t_0)$ satisfies (\ref{V-wC0}) with index $1-q_1$. By (\ref{PF-2}), (\ref{V-NC}) and Potter's bound, we deduce (\ref{V-wC}). Other cases can be prove similarly. We have shown that $u_x(x,t_0)$ satisfies (\ref{V-2}) with index $1-\max\{p_1, p_2\}$. Consider the following problem: find a solution $u=\bar{u}(x,t)$ satisfying the equation \begin{equation} \label{HJBE-1b} -{\partial u\over \partial t}-\frac{1}{2}\theta^2{u_x^2 \over u_{xx}}+rxu_x-\delta u+V_2(u_x)=0 \end{equation} with the initial condition $\bar{u}(x,0)=u(x,t_0)$ for $x\in R_+$, where $t$ represent a time horizon variable. Note that $u(x,t_0)$ is a utility function. Then we get $\bar{u}(x,t)=u(x,t+t_0)$ and $\bar{A}(x,t)=A(x,t+t_0)$ for all $x\in R_+$ by the uniqueness of solution to the Cauchy problem of the Bellman equation. From Theorem \ref{Main-3} and the dual representation, we deduce $\lim_{t\rightarrow \infty}\bar{A}(x,t)=\frac{\theta}{\sigma}(1-\min\{q_1,q_2\})x$, and the turnpike property (\ref{turnpike}) holds. \hfill $\Box$ \bigskip \noindent{\bf\Large References} \begin{description} \item Back, K., Dybvig, P.H., \& Rogers, L.C.G. (1999). Portfolio turnpikes. {\it Review of Financial Studies}, 12, 165-195. \item Bian, B., Miao, S., \& Zheng, H. (2011). Smooth value functions for a class of nonsmooth utility maximization problems. {\it SIAM Journal on Financial Mathematics}, 2, 727-747. \item Bian, B., \& Zheng, H. (2015). Turnpike property and convergence rate for an investment model with general utility functions. {\it Journal of Economic Dynamics and Control}, 51, 28-49. \item Bingham, N. H., Goldie, C. M., \& Teugels, J. L. (1987). Regular Variation. Cambridge University Press, Cambridge, Mass. \item Cox, J., \& Huang, C. (1992). A continuous time portfolio turnpike theorem. {\it Journal of Economic Dynamics Control}, 2, 491-507. \item Guasoni, P., Kardaras, C., Robertson, S. \& Xing, H. (2014). Abstract, classic, and explicit turnpikes. {\it Finance and Stochastics}, 18, 75-114. \item Huang, C., \& Zariphopoulou, T. (1999). Turnpike behaviour of long-term investments. {\it Finance and Stochastics}, 3, 15-34. \item Huberman, G., \& Ross, S. (1983). Portfolio turnpike theorems, risk aversion, and regularly varying functions. {\it Econometrica}, 51, 1345-1361. \item Jin, X. (1998). Consumption and portfolio turnpike theorems in a continuous-time finance model. {\it Journal of Economic Dynamics and Control}, 22, 1001-1026. \item Robertson, S. \& Xing, H. (2017). Long term optimal investment in matrix valued factor models. {\it SIAM Journal on Financial Mathematics}, 8, 400-434. \end{description} \end{document}
\section{Experimental Details} \label{sec.Experimental Details} \subsection{NV Center Level Structure and ESLAC} \label{sec.NV Center Level Structure and ESLAC} \begin{figure} \begin{center} \begin{subfigure}[c]{0.17 \columnwidth} \includegraphics[width=\columnwidth]{Fig_SI1a.eps} \end{subfigure} \hfill \begin{subfigure}[c]{0.77 \columnwidth} \includegraphics[width=\columnwidth]{Fig_SI1b.eps} \end{subfigure} \caption{Level structure of the NV center. (a) A schematic diagram of the NV center's spin-triplet, orbital-singlet ground state ($^3A_2$) and spin-triplet, orbital-doublet optically excited state ($^3E$). (b) The calculated energies of the six states in the excited $^3E$ manifold as a function of the magnetic field $B_z$ applied along the N-V axis. Each plot is colored according to that state's admixture of spin states with $m_S = +1$ (blue), 0 (black), or -1 (red). The strain splitting between the $E_x$ and $E_y$ orbital branches is set to the value of 5.5 GHz measured for this NV center (see Sec. \ref{sec.Electronic Hamiltonian}). The inset shows the anticrossing between $|E_y\rangle$ and $|E_1\rangle$, and the vertical lines in both plots indicate the applied field.} \label{fig.Electronic Eigenstates Spectrum} \end{center} \end{figure} The NV center has a spin-triplet, orbital-singlet ground state (labeled $^3A_2$) that is optically coupled to a spin-triplet, orbital-doublet excited state (labeled $^3E$), as shown in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Electronic Eigenstates Spectrum}. Strain in the diamond lattice splits the $^3E$ manifold into two orbital branches, as shown in \crefformat{figure}{Fig.~#2#1{(b)}#3}\cref{fig.Electronic Eigenstates Spectrum}. A magnetic field applied along the N-V axis causes a Zeeman shift of the states with nonzero spin projection $m_S$, which results in an excited state level anticrossing (ESLAC) between the states in the lower orbital branch with primarily $m_S=0$ and $m_S=+1$ character, which are respectively labeled $|E_y\rangle$ and $|E_1\rangle$. The specific interactions that give rise to the ESLAC are discussed in more detail in the main text. \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI2.eps} \caption{Spectroscopy of the $\,^3E$ excited state manifold. We measure the PLE spectra of the optical transitions between the $\,^3A_2$ ground state triplet and $\,^3E$ excited state manifold. The initial $\,^3A_2$ state is indicated by the spectrum color and the final $\,^3E$ state is indicated below each line. The arrows, whose colors match those in the pulse sequences shown in Fig. 2 and Secs. \ref{sec.Raman Spectroscopy Sequences} and \ref{sec.Raman Dynamics Sequences}, indicate the transitions or approximate frequencies used to (red) drive the off-resonant Raman transition, (orange) optically pump from $|+1\rangle$ and $|-1\rangle$ to $|0\rangle$, and (light or dark blue) optically pump from $|0\rangle$.} \label{fig.Wavemeter Linescan} \end{center} \end{figure} In order to identify and address the correct optical transitions, we use photoluminescence excitation (PLE) spectroscopy to probe the structure of the $^3E$ excited state manifold. We initialize the NV center to $|0\rangle$ by applying green light at 520 nm and then pumping resonantly on the $|\pm1\rangle\rightarrow|A_2\rangle$ transitions, or we initialize to $|+1\rangle$ or $|-1\rangle$ by initializing to $|0\rangle$ and then applying a non-hyperfine-selective microwave $\pi$ pulse. We then probe the optical transitions to $^3E$ by applying a laser at 637 nm whose frequency is locked to a variable setpoint using a HighFinesse WS-6 wavelength meter. The resulting spectra, which are shown in Fig. \ref{fig.Wavemeter Linescan}, indicate that we can resolve 16 of the 18 possible optical transitions. We can identify the specific transitions by comparing these spectra to the calculated eigenstates of the $\,^3E$ manifold, as described in Sec. \ref{sec.Electronic Hamiltonian}. We then use the wavelength meter to lock our lasers to the appropriate frequencies for driving the Raman and pumping transitions indicated by the arrows in Fig. \ref{fig.Wavemeter Linescan}. \subsection{Raman Spectroscopy Sequences} \label{sec.Raman Spectroscopy Sequences} \begin{figure}[h] \begin{center} \includegraphics[width=\columnwidth]{Fig_SI3.eps} \end{center} \caption{Schematic illustrations of the pulse sequences used to acquire the (a) unpolarized and (b) polarized Raman spectroscopy data shown, respectively, in Figs. 1 and 2. The colors of the APD Gate windows match those of the corresponding data sets.} \label{fig.Raman ESR Pulse Sequence} \end{figure} The Raman spectroscopy measurement is the basic unit with which our various measurements are built. In Fig. \ref{fig.Raman ESR Pulse Sequence}, we illustrate the pulse sequence used to acquire the Raman spectroscopy data shown in Figs. 1 and 2 in the main text. We use the pulse sequence illustrated in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Raman ESR Pulse Sequence} to acquire the unpolarized Raman spectroscopy data shown in Fig. 1(c). First, we apply light at 520 nm to initialize the NV center to the negatively charged state, which causes spectral diffusion of the NV center's optical transitions \cite{Bassett2011}. We negate this spectral diffusion with a preselection stage that tests whether the NV center is in the correct charge state and whether its transitions are resonant with the excitation lasers \cite{Robledo2010}, which are applied for 120 $\mu$s on transitions from all three ground states. This preselection stage is repeated until a sufficient number of photons are detected during the test window. Next, we perform two Raman spectroscopy sequences. In each, we first polarize the electronic spin to $|0\rangle$ by pumping on the $|+1\rangle\rightarrow|E_1\rangle$ and $|-1\rangle\rightarrow|E_2\rangle$ transitions for 4 $\mu$s. These transitions are strong because $|E_1\rangle$ and $|E_2\rangle$ are mostly polarized into $m_S=+1$ and $m_S=-1$, respectively, by the axial magnetic field and these transitions pump efficiently to $|0\rangle$ because of the significant admixture of $m_S=0$ character in $|E_1\rangle$. Moreover, these transitions are nearly degenerate (see Fig. \ref{fig.Wavemeter Linescan}) because the electronic $g$-factors in the ground and excited states are similar, so they can both be driven efficiently by a single laser. We next apply the two Raman lasers for 15 $\mu$s before reading out the population that remains in $|0\rangle$ by exciting the $|0\rangle\rightarrow|E_y\rangle$ transition for 4 $\mu$s. We next perform a control measurement by repeating the Raman spectroscopy sequence without the Raman pulse. We create the two sidebands that drive the Raman transition by applying a modulation frequency $f_\mathrm{mod}=\delta_L/2$ to an electro-optic amplitude modulator (EOM), where $\delta_L$ is the Raman two-photon detuning. We then repeat this pair of sequences 40 times per preselection cycle and sweep $f_\mathrm{mod}$ to map out the range of $\delta_L$ shown in Fig. 1(c). We use a similar sequence, which is illustrated in \crefformat{figure}{Fig.~#2#1{(b)}#3}\cref{fig.Raman ESR Pulse Sequence}, to characterize the nuclear polarization mechanism, as shown in 2(b). As with the Raman spectroscopy measurement, the preselection is performed by pumping on optical transitions from all three ground states that do not, in aggregate, result in polarization of the nuclear spin. For this measurement, the green laser was applied for 12 $\mu$s and the preselection lasers were applied for 30 $\mu$s. The green-preselection stage is collectively represented by the ``Optical Cycling'' stage shown in 2(a) in the main text. After the preselection, we perform two identical copies of the Raman spectroscopy sequence described above with a nuclear polarization stage in between, using a Raman pulse length of 8 $\mu$s for this measurement. The nuclear polarization stage consists of optically pumping from $|+1\rangle$ and $|-1\rangle$ on the same transitions as in the preselection stage and pumping from $|0\rangle$ on the transition to $|E_2\rangle$ instead of $|E_y\rangle$, as we discuss in Sec. \ref{sec.Polarization Mechanism}. This sequence is only performed once per green-preselection cycle. We again sweep the EOM modulation frequency $f_\mathrm{mod}$ to probe all of the possible Raman transitions. \subsection{Raman Dynamics Sequences} \label{sec.Raman Dynamics Sequences} \begin{figure}[ht!] \begin{center} \includegraphics[width=\columnwidth]{Fig_SI4.eps} \end{center} \caption{Schematic illustration of the pulse sequences used to measure population dynamics (a) on the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition, as shown in Fig. 3, and (b) on the $|+1_N\rangle\rightarrow|0_N\rangle$ transition, as shown in Fig. 4. The green-preselection stage is omitted for concision.} \label{fig.Raman Rabi Pulse Sequence} \end{figure} We use the sequences illustrated in \ref{fig.Raman Rabi Pulse Sequence} to measure population dynamics on the $|+1_N\rangle\rightarrow|+1_N\rangle$ and $|+1_N\rangle\rightarrow|0_N\rangle$ transitions. For simplicity, we do not show the green-preselection stage. Unlike in Fig. \ref{fig.Raman ESR Pulse Sequence}, we use the $|0\rangle\rightarrow|E_2\rangle$ transition for preselection instead of the $|0\rangle\rightarrow|E_y\rangle$ transition so that we can polarize the nuclear spin during the preselection stage. As in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Raman ESR Pulse Sequence}, we perform the sequences shown in Fig. \ref{fig.Raman Rabi Pulse Sequence} 40 times per green-preselection cycle. We use the sequence illustrated in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Raman Rabi Pulse Sequence} to measure population dynamics on the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition, as shown in Fig. 3. In this sequence, we perform three iterations of the Raman spectroscopy sequence before repolarizing the nuclear spin to $|+1_N\rangle$ by pumping on the nuclear-polarizing transitions for 20 $\mu$s. In all iterations of the spectroscopy sequence, we excite the $|+1\rangle\rightarrow|E_1\rangle$ and $|-1\rangle\rightarrow|E_2\rangle$ transitions to read out the population that has been transferred to $|+1\rangle$. We tune $\delta_L$ to the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition for the first iteration, we tune $\delta_L$ 2.7 MHz below the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition for the second iteration, and we omit the Raman pulse for the third iteration. We sweep the duration of both Raman pulses to map out the population dynamics during Raman driving. We use the sequence illustrated in \crefformat{figure}{Fig.~#2#1{(b)}#3}\cref{fig.Raman Rabi Pulse Sequence} to measure population dynamics on the $|+1_N\rangle\rightarrow|0_N\rangle$ transition, as shown in Fig. 4(b). In this measurement, we first perform a Raman spectroscopy sequence with $\delta_L$ tuned to the $|+1_N\rangle\rightarrow|0_N\rangle$ transition and a variable Raman pulse duration. We next perform the Raman spectroscopy sequence many times with $\delta_L$ tuned to either the $|+1_N\rangle\rightarrow|+1_N\rangle$ or $|0_N\rangle\rightarrow|0_N\rangle$ transition. This process repetitively maps the nuclear spin population to the electronic spin so that it can be read out. The length of this Raman pulse is set to 3.21 $\mu$s, which was the measured value that maximized the population transfer from $|0\rangle$ to $|+1\rangle$. This mapping sequence is performed 10 times with the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition and 30 times with the $|0_N\rangle\rightarrow|0_N\rangle$ transition, and in Fig. 4 we plot the average signal per repetition. After these repetitions, we optically pump for 20 $\mu$s to repolarize the nuclear spin. The sequence we use to measure nuclear population transfer, as shown in Fig. 4(a), is similar to that illustrated in \crefformat{figure}{Fig.~#2#1{(b)}#3}\cref{fig.Raman Rabi Pulse Sequence} but with three differences. First, we fix the length of the Raman pulse applied on the $|+1_N\rangle\rightarrow|0_N\rangle$ transition to 40 $\mu$s for the brown plot, and we replace that pulse with 40 $\mu$s of waiting for the black plot. In both cases, we remove the brief readout pulse on the $|+1\rangle\rightarrow|E_1\rangle$ and $|-1\rangle\rightarrow|E_2\rangle$ transitions. Second, we only perform one subsequent Raman spectroscopy sequence to read out the nuclear spin. Third, we fix the length of the nuclear readout Raman pulse to 15 $\mu$s and we sweep the EOM modulation frequency $f_\mathrm{mod}$ in order to probe all of the Raman transitions. \subsection{Characterization of Phonon-Induced Mixing} \label{sec.Characterization of Phonon-Induced Mixing} In this section, we characterize the rate of phononic mixing between the $\,^3E$ states, which contributes to the incoherent optical pumping that limits the coherence of our Raman manipulation, as discussed in Sec. \ref{sec.Incoherent Optical Pumping Rates}. We measure this mixing rate using the same technique used in Ref. \cite{Goldman2015} to measure the intersystem crossing (ISC) rates from the individual $\,^3E$ states. We apply a short optical pulse to excite the NV center to the $|A_2\rangle$ state and then measure the decay timescale of the resulting fluorescence. Because the ISC rate from $|A_2\rangle$ is negligible and we apply only a small magnetic field for this measurement, which should not appreciably mix $|A_2\rangle$ and $|A_1\rangle$, we would expect the decay timescale to be roughly equal to the radiative decay timescale measured in Ref. \cite{Goldman2015}. Using the same analysis technique as in Ref. \cite{Goldman2015}, we extract an effective ISC rate of $\tilde{\Gamma}_{A_2}/2\pi=1.2\pm0.5$ MHz. We convert this ISC rate to a sample temperature using the fit and 95\% confidence interval of the ISC rate from $|A_2\rangle$ shown in Fig. 3 of Ref. \cite{Goldman2015}. We find a sample temperature of $14\pm1$ K, which implies that sample mounting chip used to apply our microwave pulses raises the sample temperature by approximately 7 K relative to the coldfinger temperature. We emphasize that microwave pulses were only used for characterization measurements and were not used in any of the pulse sequences described in the previous two sections. The coldfinger temperature was set 1.7 K higher for the Raman measurements shown in Fig. 4 than for this thermometry measurement, so we add the same offset to the extracted sample temperature. We then use the fit of the phonon-induced mixing rate as a function of temperature, which is also described in Ref. \cite{Goldman2015}, to convert this sample temperature to a mixing rate of $2\pi\times(4.1\pm1.7)$ MHz. \section{Nuclear Polarization} \label{sec.Nuclear Polarization} \subsection{Polarization Mechanism} \label{sec.Polarization Mechanism} We now present a qualitative explanation of the nuclear polarization mechanism. The two spectra shown in Fig. 2(b) demonstrate that the transition we use to repump the NV center from $|0\rangle$ to $|+1\rangle$ or $|-1\rangle$ determines whether the nuclear spin is polarized. We can understand this behavior by considering the mechanisms that enable the electronic spin to flip under optical illumination and by analyzing how these mechanisms can also flip the nuclear spin. We first consider the case, labeled ``Optical Cycling'' in Fig. 2(a), of optical pumping that does not polarize the nuclear spin. We excite from $|0\rangle$ to $|E_y\rangle$ and from $|+1\rangle$ to $|E_1\rangle$, which are both strong transitions because $|E_y\rangle$ and $|E_1\rangle$ respectively have mostly $m_S=0$ and $m_S=+1$ character [see Figs. \ref{fig.Wavemeter Linescan} and \crefformat{figure}{#2#1{(b)}#3}\cref{fig.Electronic Eigenstates}]. Therefore, after excitation, the NV center will most likely decay back to the original ground state. However, because we are operating in the vicinity of the ESLAC, where $|E_y\rangle$ and $|E_1\rangle$ are substantially mixed, there is a significant possibility that the NV center will flip the electronic spin by decaying from $|E_y\rangle$ to $|+1\rangle$ ($\Delta m_S=+1$) or from $|E_1\rangle$ to $|0\rangle$ ($\Delta m_S=-1$). Because $|E_y\rangle$ and $|E_1\rangle$ are mixed, in part, by the transverse nuclear hyperfine interaction, there is some probability that flipping the electronic spin by $\Delta m_S=+1$ or $-1$ will be accompanied, respectively, by flipping the nuclear spin by $\Delta m_I=-1$ or $+1$; this is precisely the same physics that gives rise to the Raman transitions that conserve the total spin by flipping both the electronic and nuclear spins. Because of the symmetry of these pumping dynamics --- we pump the electronic spin back and forth between $|0\rangle$ and $|+1\rangle$ by passing through the same ESLAC in both directions --- no net nuclear polarization is induced. We expect that pumping to and from $|-1\rangle$ has a relatively small effect on nuclear polarization. We repump from $|-1\rangle$ via $|E_2\rangle$, which has mostly $m_S=-1$ character. There are nonzero branching ratios from both $|E_y\rangle$ and $|E_1\rangle$ to $|-1\rangle$ but they are relatively small, as are the branching ratios from $|E_2\rangle$ to $|+1\rangle$ and $|0\rangle$. In fact, the dominant decay paths to and from $|-1\rangle$ are expected to be via the intersystem crossing (ISC) through the spin-singlet states. In the spin-singlet states, the two unpaired electrons occupy the same single-electron orbital states as they do in the spin-triplet $\,^3A_2$ ground state, which have relatively little spatial overlap with the $^{14}\mathrm{N}$ nucleus. It is therefore reasonable to assume that the hyperfine interaction in the spin-singlet states is relatively weak, as it is in the $\,^3A_2$ ground state, and that the ISC decay process therefore has a negligible effect on the nuclear spin. Thus, the processes of decaying to and repumping from $|-1\rangle$ likely have little effect on the nuclear polarization in the case of optical cycling. We now consider the case of optical polarization of the nuclear spin. In this case, we repump from $|0\rangle$ by exciting not the strong $|0\rangle\rightarrow|E_y\rangle$ transition but rather the weak $|0\rangle\rightarrow|E_2\rangle$ transition. $|E_2\rangle$ is coupled to $|E_x\rangle$ by the spin-spin, transverse Zeeman, and transverse hyperfine interactions, just as $|E_1\rangle$ is coupled to $|E_y\rangle$. However, $|E_2\rangle$ and $|E_x\rangle$ are separated, for the NV center studied in this Letter, by more than 8 GHz, which is much larger than the $\sim700$ MHz separation between $|E_1\rangle$ and $|E_y\rangle$. The admixture of $m_S=0$ character in $|E_2\rangle$ is accordingly very small, which explains why the $|0\rangle\rightarrow|E_2\rangle$ transition is barely visible in the PLE spectrum shown in Fig. \ref{fig.Wavemeter Linescan}. Nevertheless, the transition is allowed and $|E_2\rangle$, once populated, decays with high probability into $|-1\rangle$, flipping the electronic spin by $\Delta m_S=-1$. From $|-1\rangle$, we excite the NV center back to $|E_2\rangle$, from which it eventually decays back to $|+1\rangle$ and $|0\rangle$ via the ISC. The key to the nuclear polarization mechanism is that pumping from $|+1\rangle$ to $|0\rangle$ via $|E_1\rangle$ and pumping from $|0\rangle$ to $|-1\rangle$ via $|E_2\rangle$ both involve using the transverse hyperfine interaction to flip the electronic spin by $\Delta m_S=-1$, which is accompanied by flipping the nuclear spin by $\Delta m_I=+1$. In the steady state, therefore, this optical cycling results in a net polarization into $|+1_N\rangle$. \subsection{Comparison with Nonresonant Polarization Mechanism} \label{sec.Comparison with Nonresonant Polarization Mechanism} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI5.eps} \caption{ODMR spectra of the $|0\rangle\rightarrow|-1\rangle$ (left) and $|0\rangle\rightarrow|+1\rangle$ (right) transitions, measured at temperatures of 296 K (top) and 7 K (bottom). The presence of three dips is due to hyperfine coupling with the $^{14}\mathrm{N}$ nucleus and imbalance between the depths of the three dips indicates polarization of the $^{14}\mathrm{N}$ spin. All four measurements were conducted using nonresonant optical initialization and readout of the electronic spin at 520 nm.} \label{fig.ESR Comparison} \end{center} \end{figure} We claim that this optical $^{14}\mathrm{N}$ spin polarization mechanism is distinct from the nonresonant mechanism that has previously been studied at room temperature, which also uses the ESLAC to transfer polarization from the electronic spin to the nuclear spin \cite{Jacques2009,Smeltzer2009,Steiner2010,Poggiali2017}. We do, in fact, observe polarization due to this nonresonant mechanism at room temperature but not at cryogenic temperatures. We use microwave fields to perform optically detected magnetic resonance (ODMR) spectroscopy of the $|0\rangle\rightarrow|-1\rangle$ and $|0\rangle\rightarrow|+1\rangle$ transitions, which is the same technique used in Refs. \cite{Jacques2009,Smeltzer2009,Steiner2010,Poggiali2017} to demonstrate nuclear polarization, and display the results in Fig. \ref{fig.ESR Comparison}. Spectroscopy of the $|0\rangle\rightarrow|+1\rangle$ and $|0\rangle\rightarrow|-1\rangle$ transitions, respectively, indicate 81(3)\% and 80(3)\% polarization into the $|+1_N\rangle$ state, but only at room temperature. This degree of nuclear polarization is to be expected, since the polarization mechanism is effective over a range of several hundred gauss around 500 G \cite{Jacques2009} and our magnetic field was permanently aligned at room temperature to be parallel to the N-V axis. We note that all four measurements shown in Fig. \ref{fig.ESR Comparison} were conducted using the same pulse sequence, with the only differences, beyond the sample temperature, being the range of microwave frequencies scanned and the nominal microwave power applied. We adjusted the nominal microwave power in order to compensate for frequency-dependent attenuation between the microwave source and the NV center, so that the $\pi$ pulse duration was approximately constant for all measurements [1.35 (1.40) $\mu$s for the $|0\rangle\rightarrow|+1\rangle(|-1\rangle)$ transition]. The fact that we do not observe significant nuclear polarization due to the nonresonant mechanism at cryogenic temperatures, even when such polarization is present at room temperature, indicates that this mechanism is not responsible for the polarization observed in Fig. 2. There are two possible reasons that we do not observe this nonresonant mechanism at lower temperatures. First, the degree of polarization caused by the nonresonant mechanism is sensitive to a field misalignment of $\sim1^{\circ}$. Because the magnetic field was aligned at room temperature to be parallel to the N-V axis, cooling the cryostat from 296 K to 7 K may have caused enough mechanical drift due to differential thermal expansion to cause significant misalignment of the magnetic field. The ODMR spectra shown in Fig. \ref{fig.ESR Comparison} indicate that the axial field shifts by approximately 400 mG, suggesting the magnetic field does change as the sample is cooled down, and the numerical simulation of the Raman dynamics described in Sec. \ref{sec.Simulation of Coherent Dynamics} is consistent with a magnetic field misalignment of approximately $5^{\circ}$. Alternatively, orbital averaging within the $\,^3E$ manifold, which is suppressed at cryogenic temperatures \cite{Goldman2015}, may be necessary to enable the off-resonant polarization mechanism. The polarization mechanism has been treated theoretically in the presence of orbital averaging \cite{Ivady2015,Nah2016,Poggiali2017}, which enables the $\,^3E$ manifold to be treated more simply as two orbital branches that each consist of a spin triplet with an effective zero-field splitting of 1.43 GHz \cite{Fuchs2008}. In this picture, orbital averaging essentially elides details of the $\,^3E$ fine structure and sample-to-sample inhomogeneities, such as crystal strain \cite{Rogers2009}. However, evaluating how this polarization mechanism functions in the cryogenic regime, where the phonon-induced mixing between the two orbital branches is slower than the optical decay rate \cite{Goldman2015}, would require a detailed treatment of the $\,^3E$ fine structure. To better understand this polarization mechanism, one could carefully measure the degree of nuclear polarization induced by both the resonant and nonresonant mechanisms as a function of magnetic field misalignment and temperature. Combining this experimental input with the detailed theoretical description of the $\,^3E$ manifold given in Sec. \ref{sec.Theoretical Model of Raman Manipulation} and the model of phononic mixing described in Ref. \cite{Goldman2015a} would enable the development of a unified theoretical framework that describes how the $^{14}\mathrm{N}$ nuclear spin can be polarized under a range of experimental conditions. \section{Theoretical Model of Raman Manipulation} \label{sec.Theoretical Model of Raman Manipulation} \subsection{Toy Raman Model} \label{sec.Toy Raman Model} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI6.eps} \caption{Level diagram of the Raman toy model, drawn with the (a) bare excited states and (b) excited states dressed by the interaction of strength $\lambda$.} \label{fig.Toy Model} \end{center} \end{figure} We now develop a theoretical model that provides insight into the factors that limit the coherence of the Raman manipulation techniques described in the main text. Our model includes all of the states of the excited $\,^3E$ manifold and uses the experimentally measured strengths of all of the terms of the $\,^3E$ Hamiltonian to calculate the precise electronic and nuclear spin admixtures of each state. We use this information to calculate the strengths of the coherent Raman couplings between different ground states as well as the off-resonant optical pumping rates that we believe limit the coherence of our Raman manipulation. We then estimate how we might optimize our experimental parameters in order to maximize the strength of the coherent Raman coupling relative to the incoherent pumping rates. First, we may develop an intuition for the inherent limitations of our Raman manipulation by considering a simple toy model. As illustrated in Fig. \ref{fig.Toy Model}, we consider two ground states $|a\rangle$ and $|b\rangle$ that are optically coupled to the excited states $|A\rangle$ and $|B\rangle$ with a common optical Rabi frequency $\Omega$. The states $|A\rangle$ and $|B\rangle$, which are not necessarily degenerate, are coupled by an interaction of strength $\lambda$, so we may define the dressed states \begin{align} \label{eq.Raman dressed states} |+\rangle &= \alpha |A\rangle + \beta |B\rangle \nonumber \\ |-\rangle &= \beta |A\rangle - \alpha |B\rangle, \end{align} where we take $\alpha$ and $\beta$ to be real. These dressed states are separated in energy by $\delta$ and we detune the two driving lasers by $\Delta$ below the transitions from $|a\rangle$ and $|b\rangle$ to $|-\rangle$. These two lasers can drive a Raman transition between $|a\rangle$ and $|b\rangle$ with a Rabi frequency \begin{equation} \label{eq.Raman Rabi freq 1} \tilde{\Omega}_{ab} = \tilde{\Omega}_{ab}^{(+)} + \tilde{\Omega}_{ab}^{(-)} = \frac{\Omega_{b+}^\ast \Omega_{a+}}{\Delta_+} + \frac{\Omega_{b-}^\ast \Omega_{a-}}{\Delta_-}, \end{equation} where $\tilde{\Omega}_{ab}^{(+)}$ ($\tilde{\Omega}_{ab}^{(-)}$) is the Rabi frequency of the Raman transition driven specifically via the dressed state $|+\rangle$ ($|-\rangle$); $\Omega_{a+}=\Omega\langle +|A\rangle$, etc., are the optical Rabi frequencies of the specific transitions between the given ground and dressed excited states; and $\Delta_+=\Delta+\delta$ ($\Delta_-=\Delta$) is the one-photon detuning from $|+\rangle$ ($|-\rangle$). Because $|+\rangle$ and $|-\rangle$ are orthogonal, the relative minus sign in Eq. \ref{eq.Raman dressed states} necessarily appears in the definition of one of the states and so the Raman transitions driven through $|+\rangle$ and $|-\rangle$ interfere destructively with each other when the signs of $\Delta_+$ and $\Delta_-$ are the same. In the far-detuned limit $|\Delta|\gg\delta$, the total Raman Rabi frequency becomes \begin{align} \tilde{\Omega}_{ab} &= \frac{|\Omega|^2 \langle B|+\rangle\langle +|A\rangle}{\Delta_+} + \frac{|\Omega|^2 \langle B|-\rangle\langle -|A\rangle}{\Delta_-} \nonumber \\ &= \frac{|\Omega|^2 \beta\alpha}{\Delta+\delta} + \frac{|\Omega|^2 (-\alpha)\beta}{\Delta} \nonumber \\ &\approx -\frac{|\Omega|^2 \alpha\beta}{\Delta}\frac{\delta}{\Delta}. \end{align} At the same time, these two lasers cause off-resonant optical pumping from both $|a\rangle$ and $|b\rangle$ at an average rate \begin{align} \Gamma_{ab} &= \frac{1}{2}\left(\Gamma_a + \Gamma_b\right) \nonumber \\ &= \frac{1}{2}\left(\frac{|\Omega_{a+}|^2\gamma}{\Delta_+^2} + \frac{|\Omega_{a-}|^2\gamma}{\Delta_-^2} + \frac{|\Omega_{b+}|^2\gamma}{\Delta_+^2} + \frac{|\Omega_{b-}|^2\gamma}{\Delta_-^2} \right) \nonumber \\ &\approx \frac{|\Omega|^2\gamma}{\Delta^2}, \end{align} where $\Gamma_a$ ($\Gamma_b$) is the optical pumping rate out of $|a\rangle$ ($|b\rangle$) and $\gamma$ is the common radiative decay rate from $|A\rangle$ and $|B\rangle$. Because both the Raman Rabi frequency and the optical pumping rate scale as $|\Omega|^2/\Delta^2$ in the far-detuned limit, the advantage that can be gained by simply applying more laser power and detuning farther from the optical transitions saturates quickly once $\Delta>\delta$. More explicitly, the figure of merit \begin{equation} \label{eq.Raman figure of merit} \frac{|\tilde{\Omega}_{ab}|}{\Gamma_{ab}} = \alpha\beta \frac{\delta}{\gamma} \end{equation} has a very simple form and equally simple interpretation: we want the dressed states $|+\rangle$ and $|-\rangle$ to be roughly equal superpositions of $|A\rangle$ and $|B\rangle$ (i.e., maximize the product $\alpha\beta$) in order to enable strong optical coupling to both ground states, but we also want the dressed states $|+\rangle$ and $|-\rangle$ to be widely separated (i.e., $\delta\gg\gamma$) in order to minimize the effect of destructive interference between the Raman transitions driven via the two dressed states. We might ask whether we can maximize $|\tilde{\Omega}|/\Gamma$ by either tuning $|A\rangle$ and $|B\rangle$ to degeneracy to maximize the degree of mixing or by making them widely separated in order to decrease the destructive interference. Neither approach presents an obvious advantage. In the case of degeneracy, the dressed states $|+\rangle$ and $|-\rangle$ are split by twice the coupling strength ($\delta=2\lambda$) and are equal superpositions of $|A\rangle$ and $|B\rangle$ ($\alpha=\beta=1/\sqrt{2}$), so we find that Eq. \ref{eq.Raman figure of merit} simply reduces to \begin{equation} \label{eq.Raman figure of merit 2} \frac{|\tilde{\Omega}_{ab}|}{\Gamma_{ab}} = \frac{\lambda}{\gamma}. \end{equation} In the widely detuned case, when we separate $|A\rangle$ and $|B\rangle$ by a large applied splitting $\Delta_\mathrm{app}\gg\lambda$, we find that $|+\rangle \approx |B\rangle + \lambda/\Delta_\mathrm{app} |A\rangle$ and $\delta \approx \Delta_\mathrm{app}$, which is also results in the simple ratio given by Eq. \ref{eq.Raman figure of merit 2}. We note also that tuning the lasers between $|+\rangle$ and $|-\rangle$ (i.e. $\Delta_+ = -\Delta_- = -\delta/2$) so that the Raman transitions through the two dressed states interfere constructively also results in Eqs. \ref{eq.Raman figure of merit} and \ref{eq.Raman figure of merit 2}. Fundamentally, then, the degree to which we can drive a Raman transition coherently is simply given by the ratio of the strength $\lambda$ of the interaction that enables the Raman transition to the decay rate $\gamma$ that enables off-resonant optical pumping, the primary decoherence mechanism. This result implies that the ratio $|\tilde{\Omega}|/\Gamma_{ab}$ is, to a large degree, set by the fundamental physics of the system and cannot be drastically changed by varying experimental parameters. We next check the results of this toy model by considering the details of the interactions that give rise to the actual Raman transitions that are the focus of this work. \subsection{Electronic Hamiltonian} \label{sec.Electronic Hamiltonian} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI7.eps} \caption{Diagonalization of the $\,^3E$ electronic Hamiltonian. We construct and numerically diagonalize the electronic Hamiltonian $H_\mathrm{el}$, as described in the text. In (a), the eigenenergies of the six $\,^3E$ states are calculated as a function of the transverse strain splitting $\delta$. In (b), we compare the calculated transition energies from the $|0\rangle$ (solid), $|+1\rangle$ (dashed), and $|-1\rangle$ (dotdashed) ground states to the measured transition frequencies extracted from the PLE spectra shown in Fig. \ref{fig.Wavemeter Linescan} (black dots). The low-opacity plots in (b) represent relatively weak transitions. The theoretical transition frequencies are fitted to the measured transition frequencies using only the strain splitting and average transition frequency as free parameters.} \label{fig.Electronic Eigenstates} \end{center} \end{figure} In order to build our model, we first construct the electronic Hamiltonian that determines the fine structure of the $\,^3E$ manifold. This Hamiltonian is given by \begin{equation} \label{eq.Hel} H_\mathrm{el} = H_\mathrm{SO} + H_\mathrm{SS} + H_\mathrm{Strain} + H_\mathrm{Z,s} + H_\mathrm{Z,l}, \end{equation} which includes terms describing the electrons' spin-orbit interaction ($H_\mathrm{SO}$), spin-spin interaction ($H_\mathrm{SS}$), interaction with crystal strain ($H_\mathrm{Strain}$), and Zeeman interaction of a magnetic field with the electronic spin ($H_\mathrm{Z,s}$) and orbital angular momentum ($H_\mathrm{Z,l}$). We use the explicit forms of each of these Hamiltonian terms derived by Doherty, et al. \cite{Doherty2011} but we use the state labels adopted by Maze, et al. \cite{Maze2011}, which are common in the experimental NV center literature. Explicitly, our basis states, which are eigenstates of the spin-orbit Hamiltonian that dominates at zero crystal strain and applied magnetic field, are \begin{align} \label{eq.Basis States} |A_1^{(0)}\rangle &= \frac{1}{\sqrt{2}}\big( |+1\rangle \otimes |E_-^\prime\rangle + |-1\rangle \otimes |E_+^\prime\rangle \big) \nonumber \\ |A_2^{(0)}\rangle &= \frac{-i}{\sqrt{2}}\big( |+1\rangle \otimes |E_-^\prime\rangle - |-1\rangle \otimes |E_+^\prime\rangle \big) \nonumber \\ |E_x^{(0)}\rangle &= |0\rangle \otimes |E_x^\prime\rangle \nonumber \\ |E_y^{(0)}\rangle &= |0\rangle \otimes |E_y^\prime\rangle \nonumber \\ |E_1^{(0)}\rangle &= \frac{i}{\sqrt{2}}\big( |+1\rangle \otimes |E_+^\prime\rangle - |-1\rangle \otimes |E_-^\prime\rangle \big) \nonumber \\ |E_2^{(0)}\rangle &= \frac{1}{\sqrt{2}}\big( |+1\rangle \otimes |E_+^\prime\rangle + |-1\rangle \otimes |E_-^\prime\rangle \big), \end{align} where $|+1\rangle$, $|-1\rangle$, and $|0\rangle$ are the electronic spin wavefunctions, $|E_x^\prime\rangle$ and $|E_y^\prime\rangle$ are the electronic orbital states with zero angular momentum, and \begin{equation} |E_\pm^\prime\rangle = \mp \frac{1}{\sqrt{2}}\big( |E_x^\prime\rangle \pm i |E_y^\prime\rangle \big) \end{equation} are the electronic orbital states with nonzero angular momentum. We include the prime symbol, which is not standard notation, in order to differentiate explicitly between the orbital states $|E_x^\prime\rangle$ and $|E_y^\prime\rangle$ and the eigenstates $|E_x\rangle$ and $|E_y\rangle$ of the full electronic Hamiltonian. One consideration that warrants discussion is the effect of coupling between the magnetic field and the electrons' orbital angular momentum, which Doherty, et al. do not express explicitly in terms of a measured parameter. Following Bassett, et al. \cite{Bassett2014}, we define this interaction as \begin{equation} \label{eq.HZl1} H_\mathrm{Z,l} = \frac{1}{2} \, \mu_B \, g_\mathrm{orb} \, B_z \, \sigma_y \otimes I_3, \end{equation} where $\mu_B$ is the Bohr magneton, $g_\mathrm{orb} =2\,L_z/\mu_B$ parameterizes the $z$ component of the orbital angular momentum, $B_z$ is the axial magnetic field (relative to the N-V axis), $\sigma_y$ is a Pauli matrix that operates in the $\{|E_x^\prime\rangle,|E_y^\prime\rangle\}$ orbital basis, and $I_3$ is an identity matrix that operates in the spin basis. There are no interactions between the orbital angular momentum and transverse magnetic fields \cite{Bassett2014}. Translating into the basis given by Eq. \ref{eq.Basis States}, we find \begin{align} \label{eq.HZl2} H_\mathrm{Z,l} = \frac{i}{2}\, \mu_B \, g_\mathrm{orb} \, B_z \large( & |A_1^{(0)}\rangle\langle A_2^{(0)}| + |E_y^{(0)}\rangle\langle E_x^{(0)}| \nonumber \\ & + |E_2^{(0)}\rangle\langle E_1^{(0)}| \large) + \mathrm{h.c}. \end{align} We use the values for the spin-orbit and spin-spin interaction strengths measured by ultrafast optical spectroscopy \cite{Bassett2014} and the experimentally measured values for the ground and excited state axial $g$-factors $g^{||}_\mathrm{GS} = 2.0028 (3)$ \cite{Loubser1978,He1993,Felton2009}, $g^{||}_\mathrm{ES} = 2.15 (4)$ \cite{Bassett2014}, $g^{||}_\mathrm{orb} = 0.10(1)$ \cite{Reddy1987,Rogers2009}. We use the value of the axial magnetic field measured in Sec. \ref{sec.Comparison with Nonresonant Polarization Mechanism} and we assume negligible off-axis field. The crystal strain is a free parameter and is quantized in terms of the energy splitting $\delta$ between $|E_x\rangle$ and $|E_y\rangle$. We diagonalize $H_\mathrm{el}$ to give the energies of the six $^3E$ eigenstates, which are plotted in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Electronic Eigenstates} as a function of the crystal strain $\delta$. We then use the measured separations of the $\,^3A_2$ states (see Sec. \ref{sec.Comparison with Nonresonant Polarization Mechanism}) to calculate the relative frequencies of all optical transitions from the ground state triplet to the six excited states, which are plotted in \crefformat{figure}{Fig.~#2#1{(b)}#3}\cref{fig.Electronic Eigenstates}. We compare these calculated transition frequencies to those that we extract from the PLE spectrum shown in Fig. \ref{fig.Wavemeter Linescan}. We minimize the sum of the absolute values of the errors between the measured and calculated transition frequencies in order to extract a strain splitting of $\delta = 5.5$ GHz. We find excellent agreement between the measured and calculated relative transition frequencies. \subsection{Hyperfine Hamiltonian} \label{sec.Hyperfine Hamiltonian} We now extend our model to include the nuclear degree of freedom. The electronic-nuclear Hamiltonian in the excited state is given by \begin{equation} H_\mathrm{nuc} = A_{||}^\mathrm{ES}S_z I_z + A_\perp^\mathrm{ES}\left(S_+ I_- + S_- I_+\right) + P I_z^2 + \gamma_{^{14}\mathrm{N}}\mathbf{B}\cdot\mathbf{I}, \end{equation} where $A_{||}^\mathrm{ES}$ and $A_\perp^\mathrm{ES}$ are, respectively, the axial and transverse hyperfine coupling rates, $P$ is the $^{14}\mathrm{N}$ quadrupolar shift, and $\gamma_{^{14}\mathrm{N}}=0.3077$ kHz/G is the $^{14}\mathrm{N}$ gyromagnetic ratio \cite{Felton2009,Smeltzer2009,Fuchs2011,Poggiali2017}. The axial hyperfine coupling rate $A_{||}^\mathrm{ES}/h$ has been measured to be approximately 40 MHz \cite{Steiner2010}. This is much stronger than the ground-state hyperfine coupling rate because optical excitation to the excited state results in a significant shift of unpaired electronic spin density toward the $^{14}\mathrm{N}$ nucleus, which significantly increases both the Fermi contact and dipolar interaction strengths \cite{Gali2009,Doherty2013a}. Although the hyperfine interaction has been assumed to be isotropic \cite{Smeltzer2009,Steiner2010}, recent measurements have indicated that the transverse hyperfine rate is significantly smaller than the axial rate, with a value of $23\pm 3$ MHz \cite{Poggiali2017}. Although there is disagreement in the literature on the sign of $A_{||}^\mathrm{ES}$ and $A_\perp^\mathrm{ES}$, physical reasoning about the mechanisms responsible for the hyperfine interaction \cite{Doherty2013a} and \textit{ab inito} calculations of the $^{15}$N hyperfine coupling parameters \cite{Gali2009} indicate that the signs of the hyperfine coupling rates in the ground and excited state should be different. Therefore, since the ground-state hyperfine coupling rate has been established to be negative \cite{Felton2009,Smeltzer2009,Steiner2010}, we use $A_\perp^\mathrm{ES}/h=23$ MHz for the excited-state transverse hyperfine coupling rate. Following Ref. \cite{Poggiali2017}, we assume that the quadrupolar shift $P$ has the same value in the excited state as in the ground state. The total Hamilonian $H_\mathrm{tot}$ is simply the sum of the electronic-nuclear Hamiltonian $H_\mathrm{nuc}$ and the electronic Hamiltonian $H_\mathrm{el}$. We expand our basis from the 6 electronic states listed in Eq. \ref{eq.Basis States}, which are eigenstates of the spin-orbit Hamiltonian, to an 18-state basis, which is the tensor product of the electronic basis states with the nuclear basis states $\{|+1_N\rangle,|0_N\rangle,|-1_N\rangle\}$. Because the energy scales in $H_\mathrm{nuc}$ are generally smaller than those in $H_\mathrm{el}$, moving to this expanded basis essentially has the effect of splitting each of the electronic eigenstates whose energies are plotted in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Electronic Eigenstates} into three electronic-nuclear eigenstates that are separated by a relatively small ($\lessapprox 80$ MHz) and electronic spin-dependent hyperfine splitting. We can therefore express each eigenstate $|\Psi_j\rangle$ of the total Hamiltonian $H_\mathrm{tot}$ either as a tensor product of the six electronic eigenstates $\{\psi_i\}$ and three nuclear spin states $\{|+1_N\rangle,|0_N\rangle,|-1_N\rangle\}$ or as a tensor product of the two electronic orbital states $O\in\{|E_x^\prime\rangle,|E_y^\prime\rangle\}$, three electronic spin states $\{|+1\rangle,|0\rangle,|-1\rangle\}$, and three nuclear spin states: \begin{align} |\Psi_j\rangle &= \sum_{i,m_I} c_{i,m_I}^{(j)} |\psi_i,m_I\rangle \nonumber \\ &= \sum_{O\in\{E_x^\prime,E_y^\prime\},m_S,m_I} c_{O,m_S,m_I}^{(j)} |O,m_S,m_I\rangle. \end{align} The electronic and nuclear spin makeup of each eigenstate $|\Psi_j\rangle$, which is characterized by the coefficient $c_{O,m_S,m_I}^{(j)}$, directly determines how that eigenstate optically couples to the various ground spin states. \subsection{Coherent Raman Rabi Frequencies} \label{sec.Coherent Raman Rabi Frequencies} We calculate the effective Rabi frequencies of the various Raman transitions between the $|0\rangle$ and $|+1\rangle$ ground states that we consider in the main text. We consider a transition between the ground states $|a\rangle=|m_S=0,m_I=m_I^{(a)}\rangle$ and $|b\rangle=|m_S=+1,m_I=m_I^{(b)}\rangle$ driven via the eigenstate $|\Psi_j\rangle$. The ground states $|a\rangle$ and $|b\rangle$ are optically coupled to the excited eigenstate $|\Psi_j\rangle$ with Rabi frequencies \begin{align} \label{eq.Optical Rabi frequencies} \Omega_{a,j} &= \Omega \langle \Psi_j| E_y^\prime,m_S=0,m_I=m_I^{(a)}\rangle =\Omega \, c_{E_y^\prime,0,m_I^{(a)}}^{(j)\ast} \nonumber \\ \Omega_{b,j} &= \Omega \langle \Psi_j| E_y^\prime,m_S=+1,m_I=m_I^{(b)}\rangle =\Omega \, c_{E_y^\prime,+1,m_I^{(b)}}^{(j)\ast}, \end{align} where we select the components of $|\Psi_j\rangle$ with the $E_y^\prime$ orbital state because we address the two transitions with linearly polarized lasers whose polarizations are set parallel to the $E_y^\prime$ dipole axis. The Raman Rabi frequency for the transition between $|a\rangle$ and $|b\rangle$ is therefore \begin{equation} \label{eq.Raman Rabi freq} \tilde{\Omega}_{ab} = \sum\limits_j \tilde{\Omega}_{ab}^{(j)} = \sum\limits_j \frac{C_{ab}^{(j)}|\Omega|^2}{\Delta_j}, \end{equation} where $\Delta_j$ is the one-photon detuning of the two driving lasers from $|\Psi_j\rangle$ and we have defined the dimensionless transition strength \begin{equation} \label{eq.Transition strength} C_{ab}^{(j)} = c_{E_y^\prime,+1,m_I^{(b)}}^{(j)}c_{E_y^\prime,0,m_I^{(a)}}^{(j)\ast}. \end{equation} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI8.eps} \caption{The transition strengths $C_{ab}^{(j)}$ of the nine possible Raman transitions from $|0\rangle$ to $|+1\rangle$ ($\Delta m_S=+1$), grouped by the change in $m_I$. We plot (a) the transitions strengths for the three individual eigenstates corresponding to $|E_1\rangle$ and (b) the total transition strengths for $|E_y\rangle$ and $|E_1\rangle$, summed coherently over all three eigenstates. Note that we do not consider the detunings $\Delta_j$ or laser power $|\Omega|^2$ in these plots.} \label{fig.Raman transition strengths} \end{center} \end{figure} To understand the observed Raman transition selection rules, we plot in Fig. \ref{fig.Raman transition strengths} the transition strengths $C_{ab}^{(j)}$ of the nine possible Raman transitions from $|0\rangle$ to $|+1\rangle$ driven via the excited state $|E_1\rangle$. We call attention to two features of these plots. First, since $\Delta m_S=+1$ for this transition, we expect the transitions that conserve the nuclear spin ($\Delta m_I=0$) and the total spin ($\Delta m_I=-1$) to be allowed by the spin-spin and hyperfine interactions, respectively, and we expect all others to be suppressed. This trend is generally observed when we consider the strengths of the Raman transitions driven through the individual electronic-nuclear eigenstates, as shown in Fig. \crefformat{figure}{~#2#1{(a)}#3}\cref{fig.Raman transition strengths}, but the distinction between the allowed and disallowed transitions is not especially stark. When we sum the transition strengths over all three electronic-nuclear eigenstates, as shown in Fig. \crefformat{figure}{~#2#1{(b)}#3}\cref{fig.Raman transition strengths}, the expected hierarchy of transition strengths becomes immediately apparent. As we would expect from our toy model, the ratio of the mean strength of the transitions with $\Delta m_I=0$ to the mean strength of the transitions with $\Delta m_I=-1$ (6.08) is approximately equal to the ratio of the interaction strengths that enable those transitions ($\lambda_\mathrm{ss}/A_\perp^\mathrm{ES}=6.70$). Second, the summed strengths of the Raman transitions through the $|E_1\rangle$ and $|E_y\rangle$ eigenstates have nearly equal magnitudes but opposite signs. This fact reflects the statement from the toy model that the Raman transitions driven through the two eigenstates $|+\rangle$ and $|-\rangle$ interfere destructively when $\Delta_+$ and $\Delta_-$ have the same sign, which is here generalized to destructive interference between the two groups of three eigenstates suppressing the rates of all nine Raman transitions. Thus, the simple physical intuition that we extract from our toy model holds independently for the nuclear spin-conserving and total spin-conserving transitions, but only when coherence among the six relevant eigenstates is taken into account. This coherent interference between the Raman transitions through $|E_1\rangle$ and $|E_y\rangle$ is precisely analogous to how the optically excited fine structure must be taken into account when calculating the rates of Raman processes in atomic species \cite{Ozeri2005}. \subsection{Incoherent Optical Pumping Rates} \label{sec.Incoherent Optical Pumping Rates} We must compare the Raman Rabi frequencies to the rates of the processes that introduce decoherence into the Raman transition. We assume that the dominant contribution to this decoherence is due to the fact that the lasers that drive the coherent Raman transition also incoherently excite population to the various excited eigenstates, which is the decoherence mechanism that we consider in our toy model. The optical pumping rate from the ground state $|a\rangle$ to the excited eigenstate $|\Psi_j\rangle$ is given by \begin{equation} \label{eq.Optical pumping rate} \Gamma_a^{(j)} = \frac{|\Omega_{a,j}|^2}{\left(\gamma_j/2\right)^2+\Delta_j^2}\gamma_j = \frac{|\Omega|^2 \, C_{aa}^{(j)}}{\left(\gamma_j/2\right)^2+\Delta_j^2}\gamma_j, \end{equation} where $\gamma_j$ is the sum of the decay rates out of $|\Psi_j\rangle$, $\Delta_j$ is the one-photon detuning of the pumping laser from the $|a\rangle\rightarrow|\Psi_j\rangle$ transition, $\Omega$ and $\Omega_{a,j}$ are the bare and transition-specific optical Rabi frequencies defined in Eq. \ref{eq.Optical Rabi frequencies}, and $C_{aa}^{(j)}$ is the transition strength defined in Eq. \ref{eq.Transition strength}. For completeness, we assume that the two applied Raman lasers can each off-resonantly pump from each of the nine ground states to each of the nine eigenstates corresponding to $|E_y\rangle$, $|E_1\rangle$, and $|E_2\rangle$, which together comprise the entire lower orbital branch. We assign a unique decay rate $\gamma_j$ to each eigenstate $|\Psi_j\rangle$ because $\gamma_j$ contains contributions not only from radiative decay, whose rate $\gamma$ is the same for all states in the $\,^3E$ manifold, but also from phonon-induced mixing between the various $\,^3E$ states and from the intersystem crossing (ISC) from $\,^3E$ states with $|m_S|=1$ character. We estimate that the phonon-induced mixing, which we characterize in Sec. \ref{sec.Characterization of Phonon-Induced Mixing}, contributes approximately $2\pi\times4$ MHz to $\gamma_j$ for all eigenstates, which is small but not completely negligible compared to the radiative decay rate $\gamma=2\pi\times13$ MHz. More careful thermal engineering could largely eliminate this contribution to $\gamma_j$ and could slightly reduce all pumping rates $\Gamma_a^{(j)}$. The ISC provides an additional decay mechanism out of the $|A_1^{(0)}\rangle$, $|E_1^{(0)}\rangle$, and $|E_2^{(0)}\rangle$ states, which are approximately the electronic eigenstates in the regime of low magnetic field and crystal strain. For these experiments, however, moderate crystal strain and the application of a substantial magnetic field have resulted in electronic eigenstates $|\Psi_j\rangle$ that are superpositions of the electronic basis states $|A_1^{(0)}\rangle$, etc., along with an additional nuclear degree of freedom. We can therefore define an effective ISC rate for each eigenstate $|\Psi_j\rangle$, which is given by \begin{align} \Gamma_{\mathrm{ISC},j} =\, &|\langle A_1^{(0)}|\Psi_j\rangle|^2\,\Gamma_{\mathrm{ISC},A_1} \nonumber \\ &+ \left(|\langle E_1^{(0)}|\Psi_j\rangle|^2+|\langle E_2^{(0)}|\Psi_j\rangle|^2\right)\Gamma_{\mathrm{ISC},E_{1,2}}, \end{align} where $\Gamma_{\mathrm{ISC},A_1}$ and $\Gamma_{\mathrm{ISC},E_{1,2}}$ are the measured ISC rates from $|A_1^{(0)}\rangle$ and $|E_{1,2}^{(0)}\rangle$, respectively \cite{Goldman2015}. We sum the different contributions to $\Gamma_{\mathrm{ISC},j}$ incoherently because the three ISC processes from $|A_1^{(0)}\rangle$, $|E_1^{(0)}\rangle$, and $|E_2^{(0)}\rangle$ result in distinguishable final states. The ISC process from $|A_1^{(0)}\rangle$ does not involve the emission of an $E$-symmetric phonon, whereas the processes from $|E_1^{(0)}\rangle$ and $|E_2^{(0)}\rangle$ require phonons of different polarizations to couple the initial state to $|A_1^{(0)}\rangle$ \cite{Goldman2015a}. As a result, the ISC process increases $\gamma_j$ by approximately $2\pi\times0.2$ MHz for the $|E_y\rangle$ eigenstates and by approximately $2\pi\times8.1$ MHz for the $|E_1\rangle$ eigenstates. This increase in the incoherent pumping rates to the $|E_1\rangle$ eigenstates is mostly offset, however, by the fact that $|E_1\rangle$ has a smaller overlap with the $|E_y^\prime\rangle$ orbital state than $|E_y\rangle$, which reduces the factor $C_{aa}^{(j)}$ that enters into the incoherent pumping rate. $|E_1\rangle$ has equal projections onto the $E_x^\prime$ and $E_y^\prime$ orbital states when the crystal strain splitting is low (cf. the electronic basis state $|E_1^{(0)}\rangle$ in Eq. \ref{eq.Basis States}), but its projection onto the $E_y^\prime$ orbital state increases as crystal strain splits the $\,^3E$ manifold into the $E_x^\prime$ and $E_y^\prime$ orbital branches. Explicitly, we find that $|\langle E_y^\prime|E_1\rangle|^2\approx0.74$, which reduces the incoherent pumping rate to the $|E_1\rangle$ eigenstates by roughly the same factor that inclusion of the ISC decay increases those rates. \subsection{Optimizing Parameters} \label{sec.Optimizing Parameters} To quantify the degree of coherence for a given Raman transition between states $|a\rangle$ and $|b\rangle$, we use the figure of merit $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ we defined in the context of the toy model, which is the ratio of the coherent Raman Rabi frequency to the average optical pumping rate out of the initial and final states. This figure of merit generalizes easily to the full model, where $\tilde{\Omega}_{ab}$ is given by Eq. \ref{eq.Raman Rabi freq} and we define \begin{equation} \Gamma_{ab} = \frac{1}{2}\left(\Gamma_a+\Gamma_b\right) = \frac{1}{2}\sum\limits_j \left( \Gamma_a^{(j)}+\Gamma_b^{(j)}\right), \end{equation} where the pumping rates $\Gamma_a^{(j)}$ from a specific ground state to a specific excited eigenstate are given by Eq. \ref{eq.Optical pumping rate}. \crefformat{figure}{Fig.~#2#1{(a)}#3} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI9.eps} \caption{The calculated ratio $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ for the nine possible Raman transitions from $|0\rangle$ to $|+1\rangle$ as a function of the Raman detuning $\Delta$. The transition colors and textures follow the same scheme used in Fig. 1: blue and green indicate the observed transitions that conserve the nuclear and total spin, respectively, and red indicates the other transitions, which were not observed. The vertical black line indicates the approximate detuning used to collect the data shown in Figs. 3 and 4, and the horizontal black lines indicate the calculated ratios for the (upper) $|+1_N\rangle\rightarrow|+1_N\rangle$ and (lower) $|+1_N\rangle\rightarrow|0_N\rangle$ transitions at that detuning.} \label{fig.Coherence ratio vs detuning} \end{center} \end{figure} We plot the ratio $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ in Fig. \ref{fig.Coherence ratio vs detuning}. As we would expect from our analysis of the toy model, the ratio at $\Delta=0$, when the lasers are tuned between the transitions to $|E_y\rangle$ and $|E_1\rangle$, is roughly equal to the ratio when the detuning is set far to either side. We observe that this ratio is substantially reduced when the two Raman lasers come into resonance with transitions to $|E_y\rangle$ around +0.33 GHz, to $|E_1\rangle$ around -0.33 GHz, and, to a lesser extent, to $|E_2\rangle$ around -2.68 GHz. The primary limitation on the ratio $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ stems from this fact, that the off-resonant optical driving that mediates the coherent Raman transition also gives rise to decoherence-inducing optical pumping. However, we must also contend with pumping on transitions other than those that are necessary to drive the Raman transition, which prevents the ratio from reaching its asymptotic value at very high detunings. For example, the dip at +1.27 GHz is due to the lower-frequency laser driving the transition from $|0\rangle$ to $|E_2\rangle$. Consequently, we see that the detuning used to collect the data shown in Figs. 3 and 4 is very nearly optimal. We might gain an increase in coherence by driving the Raman transition at $\Delta=0$, but the gain would be slight and would come at the cost of increased sensitivity to the tuning of our Raman lasers relative to the optical transitions. We also consider the possibility that the applied magnetic field is not perfectly aligned to the N-V axis. This misalignment is important because $|E_y^{(0)}\rangle$ and $|E_1^{(0)}\rangle$ are coupled by the Zeeman interaction with the transverse magnetic field in addition to the electronic spin-spin and transverse hyperfine interactions. For a small misalignment, the transverse Zeeman interaction ($g^{||}_\mathrm{ES}\,\mu_B\,B_\perp/h\approx 190$ MHz for $\theta=5^\circ$, assuming an isotropic $g$-factor), while small compared to the scale of the $\,^3E$ fine structure, is comparable to or larger than the strengths of the spin-spin ($\lambda_\mathrm{ss}/h=154$ MHz) and hyperfine ($A_\perp^\mathrm{ES}/h=23$ MHz) interactions that mediate the Raman transitions. \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI10.eps} \caption{Effect of magnetic field misalignment on the coherence of Raman transitions. We calculate the ratio $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ for the (a) $|+1_N\rangle\rightarrow|+1_N\rangle$ and (b) $|+1_N\rangle\rightarrow|0_N\rangle$ transitions, plotted as a function of the angles from the magnetic field to the N-V axis ($\theta$) and to the $x$-axis ($\phi$), which is defined by the $|E_x^\prime\rangle$ orbital state.} \label{fig.Coherence ratio vs Bperp} \end{center} \end{figure} Since the Zeeman interaction acts separately on the electronic and nuclear spins, we would expect the presence of a transverse magnetic field to significantly enhance or suppress the strength of the nuclear spin-conserving transitions and to have a smaller, higher-order effect on the electronic-nuclear flip-flop transitions. In Fig. \ref{fig.Coherence ratio vs Bperp}, we plot the calculated ratio $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ for the $|+1_N\rangle\rightarrow|+1_N\rangle$ and $|+1_N\rangle\rightarrow|0_N\rangle$ transitions. The pumping rates $\Gamma_{ab}$ for both transitions and the Rabi frequency for the $|+1_N\rangle\rightarrow|0_N\rangle$ transition are mostly unchanged, but a field misalignment of $5^\circ$ can change the Rabi frequency of the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition significantly (by approximately $\pm42$\%). This result underscores the point that the most important quantity for determining the coherence of the Raman transition is the strength of the interaction that mediates the transition divided by the sum of the decay rates out of the intermediate excited state. Because the transverse hyperfine interaction mediates the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition but not the $|+1_N\rangle\rightarrow|0_N\rangle$ transition, a transverse magnetic field can be used to enhance the coherence of the former transition but not of the latter. \section{Simulation of Coherent Dynamics} \label{sec.Simulation of Coherent Dynamics} \subsection{General Approach} \label{sec.General Approach} We have calculated the figure of merit $|\tilde{\Omega}_{ab}|/\Gamma_{ab}$ for the various Raman transitions, but we would like to check the results of our model against the observed population dynamics more directly. To that end, we numerically simulate the dynamics that occur as we drive the two specific Raman transitions studied in the main text. We consider an 18-level system consisting of the nine ground states as well as the nine excited states corresponding to $|E_y\rangle$, $|E_1\rangle$, and $|E_2\rangle$. These simulation basis states are not the electronic-nuclear eigenstates of the full Hamiltonian that are listed in Eq. \ref{eq.Basis States} but rather are the eigenstates of the full Hamiltonian minus the interactions (one component of the spin-spin interaction, the transverse Zeeman interaction, and the transverse hyperfine interaction) that couple $|E_y\rangle$ with $|E_1\rangle$. We make the slight simplification that all 18 basis states have well-defined values of $m_I$ and $m_S$ since, due to the strong axial magnetic field, $|E_1\rangle$ and $|E_2\rangle$ are respectively polarized into $>99.7\%$ $m_S=+1$ and $m_S=-1$. We then add the three interactions that couple $|E_y\rangle$ and $|E_1\rangle$ to each other and the optical transitions that couple them respectively to the $|0\rangle$ and $|+1\rangle$ ground states. Because every state has well-defined electronic and nuclear spin projections, each ground state is optically coupled to only one excited state and vice versa. This approach is conceptually analogous to the picture of the toy model shown in \crefformat{figure}{Fig.~#2#1{(a)}#3}\cref{fig.Toy Model}, where the interaction of strength $\lambda$ between the two unmixed excited states is included explicitly. We numerically simulate the dynamics of the full 18-level system by solving the differential equations from the Heisenberg picture. Using a common set of input parameters, we perform two simulations: one with $\delta_L$ set to drive the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition and another with $\delta_L$ set to drive the $|+1_N\rangle\rightarrow|0_N\rangle$ transition. For each simulation, we assume perfect initial electronic polarization into the $|0\rangle$ state, and we use the initial nuclear populations implied by the measurement shown in Fig. 4(a). Specifically, we extract nuclear populations of 66\% $m_I=+1$, 26\% $m_I=0$, and 8\% $m_I=-1$ from the relative amplitudes of the three nuclear spin-conserving peaks in in the black plot, which shows spectroscopy of the Raman transition performed after nuclear initialization and a 40 $\mu$s wait time. We then extract the three measured quantities of interest. From the simulation of the $|+1_N\rangle\rightarrow|0_N\rangle$ transition, we extract the nuclear spin populations of $|+1_N\rangle$ and $|0_N\rangle$ summed over all three electronic spins. From the simulation of the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition, we extract the population that has been transferred out of $|0\rangle$, summed over $|+1\rangle$ and $|-1\rangle$ and all three nuclear states. Finally, we scale these simulation results to match the nuclear populations measured while driving the $|+1_N\rangle\rightarrow|0_N\rangle$ transition, as shown in Fig. 4(b), as well as the electronic populations measured while driving the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition, as shown in Fig. 3. The two measurements were performed on the same day and under the same experimental conditions. We allow the vertical offset and scaling to vary independently for all three data sets, which accounts for different scalings from population to measured fluorescence. We set the vertical scaling and offset of the two $|+1_N\rangle\rightarrow|0_N\rangle$ simulations to match the endpoints of the corresponding data fits (solid purple and orange lines) shown in Fig. 4(b). We set the vertical offset of the $|+1_N\rangle\rightarrow|+1_N\rangle$ equal to the mean of the grey reference measurement shown in Fig. 3, and we set the scaling to match the endpoint of the data fit at 30 $\mu$s. \subsection{Simulation Inputs} \label{sec.Simulation Inputs} Our simulation uses input values derived from experimental measurements wherever possible. We extract the energy levels of the ground states from microwave ESR measurements similar to those shown in Sec. \ref{sec.Comparison with Nonresonant Polarization Mechanism} and we extract the energy levels of the excited states from the exact diagonalization of the excited state Hamiltonian described in Sec. \ref{sec.Electronic Hamiltonian}, using the known value of the axial magnetic field and the value of the crystal strain splitting extracted from PLE spectroscopy in Sec. \ref{sec.Electronic Hamiltonian}. We estimate the Raman detunings $\Delta$ based on the known modulation frequency of 540 MHz that we applied to the EOM to produce the sideband that resonantly drives the $|0\rangle\rightarrow|E_2\rangle$ transition during the nuclear polarization stage. We include the ISC rates described in Sec \ref{sec.Incoherent Optical Pumping Rates} but we neglect the effect of phonon-induced mixing, which would further contribute to the incoherent optical pumping rates. Because we drive the Raman transition with light that is linearly polarized along the $|E_y^\prime\rangle$ dipole axis, the ratio of the optical Rabi frequencies $\Omega_{E_y}$ and $\Omega_{E_1}$ of the transitions to $|E_y\rangle$ and $|E_1\rangle$ is determined by those states' overlap with the $|E_y^\prime\rangle$ orbital state. As described in Sec. \ref{sec.Incoherent Optical Pumping Rates}, we find that $|\langle E_y^\prime|E_1\rangle|^2\approx0.74$ and $|\langle E_y^\prime|E_y\rangle|^2\approx1$, which sets $\Omega_{E_1}/\Omega_{E_y}=0.86$. We treat the Raman laser power as a free parameter, which we adjust so that the periods of the simulated and observed Rabi oscillations match. We select the value of $\delta_L$ that resonantly drives a given Raman transition by numerically diagonalizing the full 18-state Hamiltonian, including optical driving, and then calculating the energy difference between the two ground states involved in the transition. This approach has the advantage of implicitly correcting $\delta_L$ for Stark shifts of the ground states caused by the Raman lasers. Because all of our basis states have well-defined values of $m_S$ and $m_I$ and because radiative decay should conserve both spin projections, we assume that each excited state radiatively decays solely to the ground state with the same values of $m_S$ and $m_I$. We assume that the NV center decays with 50\% probability to $|0\rangle$ and 25\% probability each to $|+1\rangle$ and $|-1\rangle$ after undergoing the ISC into the metastable spin-singlet states, which is consistent with the balanced branching ratio found in Ref. \cite{Robledo2011}. Because the ISC process from the excited manifold to the spin-singlet states is mediated by electronic spin-orbit coupling and interactions with lattice phonons \cite{Goldman2015a,Thiering2017}, neither of which couples to the nuclear degree of freedom, we assume that the ISC decay pathway conserves $m_I$. The input parameter with the greatest uncertainty and impact on the simulation results is the strength of the transverse Zeeman interaction, which is related to the degree of magnetic field misalignment. As discussed in Sec. \ref{sec.Optimizing Parameters}, the application of a magnetic field in certain directions transverse to the N-V axis can significantly enhance or suppress the Rabi frequencies of the nuclear spin-conserving transitions relative to both the Rabi frequencies of the electronic-nuclear flip-flop transitions and the incoherent optical pumping rates. Instead of parameterizing the transverse Zeeman interaction in terms of the geometric misalignment of the magnetic field, as in Sec. \ref{sec.Optimizing Parameters}, we simply define its strength $\lambda_Z$, which can be either positive or negative to either enhance or suppress the nuclear spin-conserving Rabi frequency. Therefore, by varying the Raman laser power and $\lambda_Z$, we can independently tune the Rabi frequencies of both transitions. \subsection{Comparison with Measurement} \label{sec.Comparison with Measurement} \begin{figure} \begin{center} \includegraphics[width=\columnwidth]{Fig_SI11.eps} \caption{Comparison of simulated and measured Raman dynamics corresponding to driving the (a) $|+1_N\rangle\rightarrow|+1_N\rangle$ and (b) $|+1_N\rangle\rightarrow|0_N\rangle$ transitions. The three sets of simulation plots [red in (a) and red/green in (b)] correspond to simulations performed using different values of the transverse Zeeman interaction strength $\lambda_Z$. We show the best fit and 95\% mean prediction interval (solid line and shaded region) of fits to an exponentially damped sinusoid in (a) and an exponentially damped sinusoid plus an exponential ramp in (b). In (b), we also show the exponential ramp component alone (dashed line).} \label{fig.Raman Simulation} \end{center} \end{figure} In Fig. \ref{fig.Raman Simulation}, we compare the results of our simulation and fitting procedure to the Raman dynamics measured while driving the $|+1_N\rangle\rightarrow|+1_N\rangle$ and $|+1_N\rangle\rightarrow|0_N\rangle$ transitions. As expected, the simulation result for the $|+1_N\rangle\rightarrow|0_N\rangle$ transition is essentially independent of the value of $\lambda_Z$ used, but varying $\lambda_Z$ does enable us to tune the Rabi frequency of the $|+1_N\rangle\rightarrow|+1_N\rangle$ transition. We observe close agreement between the simulated and observed Raman dynamics for $\lambda_Z=-90.5$ MHz, which corresponds to a magnetic field misalignment of approximately $5^\circ$ or more. This close agreement supports our assertion that the coherence with which we can drive the Raman transitions is primarily limited by off-resonant optical pumping by the Raman laser. We can also isolate the oscillatory components of the Raman dynamics observed while driving the $|+1_N\rangle\rightarrow|0_N\rangle$ transition. We use the fits shown in Figs. 4(b) and \crefformat{figure}{#2#1{(b)}#3}\cref{fig.Raman Simulation} (solid purple and orange plots), which include both an exponentially damped sinusoidal term and a simple exponential term, and interpret the simple exponential term and the constant offset (dashed purple and orange plots) to represent the population dynamics associated with incoherent pumping. Subtracting off these terms, we are left with the data shown in Fig. 4(c). We isolate the oscillatory component of the simulation by fitting the simulation results to the the same fit function and performing the same background subtraction procedure. Again, the oscillatory behavior of the simulations agrees with that of the measured data.
\section{Introduction} In recent years, unmanned aerial vehicle (UAV) has attracted a lot of interests in wireless communication due to its high mobility, flexible deployment and low cost\cite{Cheng2018UAV,Chen2018A,Zeng2017Energy,JointWu2018}. Because of the broadcast characteristic of wireless signals, secure wireless transmission in UAV networks is a very challenging problem\cite{Zhao2018Caching}. In the last decade, physical-layer security (PLS) has been heavily and widely investigated in wireless networks \cite{Wyner1975Wire,Wang2012Distributed,Guo2017Exploiting,Liu2017Secure,Ma2017Interference,Shu2017Artificial,Hu2016Artificial,Shu2017Secur e}. In \cite{Wyner1975Wire}, from information-theoretical viewpoint, Wyner first proved and claimed that secrecy capacity may be achievable if the eavesdropping channel is weaker than the desired one. Recently, there are some studies of focusing on the security of UAV systems. In \cite{Liu2017Secure}, the authors combined the transmission outage probability and secrecy outage probability as a performance metric to optimize the power allocation (PA) strategy. In addition, the authors in \cite{Wang2017Improving} utilized the UAV as a mobile relay node to improve secure transmission, where an iterative algorithm based on difference-of-concave program was also developed to circumvent the non-convexity of secrecy rate (SR) maximization. Since the channel from ground base station Alice to UAV Bob can be usually regarded as line-of-sight (LoS) link, directional modulation (DM) technology can be naturally applied to UAV networks\cite{Lee2018UAV,Khuwaja2018A}. As one of the key techniques in PLS, DM is recently attracted an ever-increasing attention from both academia and industry world\cite{Babakhani2008Transmitter,Chen2017A,Zou2015Relay}. To enhance the PLS in DM networks, the artificial noise (AN) is usually exploited to degrade the eavesdropping channel\cite{Negi2005Secret,Goel2008Guaranteeing,Wu2017Secure}. The authors in \cite{Ding2014} first introduced the null-space projection method to project the AN along the eavesdropping direction on the null-space of the steering vector. In the multicast scenario, the leakage-based method is adopted to design both the precoding vector and AN projection matrix\cite{Shu2017Artificial}. In order to maximize the SR, a general power iterative (GPI) scheme was proposed in \cite{Yu2018GPI} to optimize both the useful precoding vector and the AN projection matrix. In DM systems, to implement the DM synthesis, the directional angle should be measured in advance. This generates measurement errors\cite{Shu2017Low}. In the presence of angle measurement errors, the authors in \cite{Hu2016Robust,Shu2017Robust} proposed two robust DM synthesis beamforming schemes to exploit the statical property of these errors. Actually, the two method achieved a substantial SR improvement over existing non-robust ones. And in the absence of the statistical distribution of measurement error, a blind robust main-lobe-integration-based leakage beamformer was proposed to achieve an improved security in DM systems\cite{Shu2018Robust}. In \cite{Hu2016Artificial}, a random frequency diverse (RFD) array was combined with directional modulation with the aid of AN to achieve a secure precise wireless transmission (SPWT). To reduce the circuit cost and complexity of SPWT receiver, the authors in \cite{Shu2017Secure} replaced RFD with random subcarrier selection to achieve a SPWT. Given the fixed beamforming vector and AN projection matrix, PA between confidential messages and AN will have a direct impact on SR performance as shown in the following literature. In \cite{Yang2015Artificial}, the authors first derived the secrecy outage probabilities (SOPs) for the on-off transmission scheme and the adaptive transmission scheme. Using the SOPs, the optimal PA was presented to maximize the SR. Given matched-filter precoder and the NSP of AN, a PA strategy of maximizing secrecy rate (Max-SR) was proposed and shown to make a significant SR gain in the case of small-scale antenna array and low signal-to-noise ratio (SNR) region in \cite{Wan2018Power}. However, in the above literatures, the beamformimg scheme and PA are independently optimized. How to establish the relationship between them? In other words, how to implement the information propagation between them? In this paper, we propose an alternative iterative structure (AIS) between PA and beamforming with the aim of improving the average SR. During the UAV's flight from source to destination, the secrecy sum-rate (SSR) maximum problem is converted into independent subproblems per position. The subproblem of maximizing SR is a joint optimization of the beamforming vector, AN projection vector, and PA factor. This joint optimization problem is very hard. To simplify this problem, the beamforming and AN projection vectors are constructed by the leakage criterion. Then, we maximize SR to get the PA factor. Next, using the designed PA factor, the beamforming and AN projection vectors is computed again. This process is repeated until the terminal condition is satisfied. This forms the AIS proposed by us. From simulations, it follows that the proposed AIS converges quickly and achieves a substantial SR performance gain over fixed beamforming scheme plus fixed PA strategies. The remainder of the paper is organized as follows. In Section II, we present the system model and the problem formulation. In Section III, the beamforming vector and AN projection vector are given, the PA strategy of Max-SR is derived, and the AIS is proposed. Simulation and numerical results are shown in Section IV. Finally, we draw our conclusions in Section V. \emph{Notations:} Throughout the paper, matrices, vectors, and scalars are denoted by letters of bold upper case, bold lower case, and lower case, respectively. Signs $(\cdot)^T$, $(\cdot)^H$, $\mid\cdot\mid$ and $\parallel\cdot\parallel$ represent transpose, conjugate transpose, modulus and norm, respectively. $\textbf{I}_N$ denotes the $N\times N$ identity matrix. \section{System Model} \begin{figure} \centering \includegraphics[width=0.5\textwidth]{model.eps}\\ \caption{Schematic diagram of UAV system with directional modulation.}\label{Sys_Mod} \end{figure} In Fig.~\ref{Sys_Mod}, a UAV network is shown. Here, a legitimate UAV user (Bob) flies along an $L$-meters long direct link between S and D, while receives messages from the base station (Alice). On ground, Alice with $M$ transmit antennas performs as a base station, and sends confidential messages to Bob. Also there exists a potential illegal receiver Eve to wiretap confidential messages. We assume that Alice and Eve are both on the ground and are located at two fixed positions. Bob flies at an altitude of $H$ (m) above ground, with a constant moving speed $V$ (m/s), and the total flight time interval from $S$ to $D$ is $T$ (s). As UAV Bob moves from S to D, we sample its position with equal time spacing $\Delta{t}$ and the total number of sampling points is $N=\frac{T}{\Delta{t}}$. The transmit signal at sampling point $n$ is expressed as \begin{equation}\label{Tx signal s} \mathbf{s}_n=\sqrt{\beta_n P_s}\mathbf{v}_{b,n}x_n+\sqrt{(1-\beta_n)P_s}\mathbf{v}_{AN,n}z_n \end{equation} where $P_s$ is the total transmit power, $n\in\mathcal{N}=\left\{1,2,\cdots,N\right\}$ denotes the $n$th sampling point, $\beta_n$ and $(1-\beta_n)$ stand for the PA parameters for confidential messages and AN, respectively. $\mathbf{v}_{b,n}\in\mathbb{C}^{M\times1}$ denotes the transmit beamforming vector of the confidential message to the desired direction, and $\mathbf{v}_{AN,n}\in\mathbb{C}^{M\times1}$ is the beamforming vector of AN forwarded to the undesired direction, $\mathbf{v}^H_{b,n}\mathbf{v}_{b,n}=1$ and $\mathbf{v}^H_{AN,n}\mathbf{v}_{AN,n}=1$. In (\ref{Tx signal s}), $x_n$ is the confidential message satisfying $\mathbb{E}\left\{x_n^Hx_n\right\}=1$, and $z_n\sim\mathcal{C}\mathcal{N}(0,1)$ denotes the scalar AN being a complex Gaussian random variable with zero mean and unit variance. The corresponding receive signal at Bob can be written as \begin{align}\label{Rx_signal yb} y_{b,n} &=\mathbf{h}^{H}(\theta_{b,n})\mathbf{s}_n+w_{b,n}\nonumber\\ &=\sqrt{g_{ab}\beta_n P_s}\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}x_n\nonumber\\ &+\sqrt{g_{ab}(1-\beta_n)P_s}\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}z_n+w_{b,n} \end{align} where $g_{ab}=\frac{\alpha}{d_{ab}^c}$ represents the path loss from Alice to Bob, $d_{ab}$ is the distance from Alice to Bob, $c$ is the path loss exponent and $\alpha$ is the path loss at reference distance $d_0$, $\mathbf{h}(\theta_{b,n})\in\mathbb{C}^{M\times1}$ represents the steering vector from Alice to Bob, and $\theta_{b,n}$ is the direction angle from Alice to Bob at position $n$. The complex additive white Gaussian noise (AWGN) at Bob is denoted by $w_{b,n} \sim\mathcal{C}\mathcal{N}(0,\sigma_b^2)$. In the same manner, the received signal at Eve is given by \begin{align}\label{Rx_signal ye} y_{e,n} &=\mathbf{h}^{H}(\theta_{e,n})\mathbf{s}_n+w_{e,n}\nonumber\\ &=\sqrt{g_{ae}\beta_n P_s}\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{b,n}x_n\nonumber\\ &+\sqrt{g_{ae}(1-\beta_n)P_s}\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}z_n+w_{e,n} \end{align} where $g_{ae}=\frac{\alpha}{d_{ae}^c}$, $g_{ae}$ denotes the path loss from Alice to Eve, $\mathbf{h}(\theta_{e,n})\in\mathbb{C}^{M\times1}$ denotes the steering vector from Alice to Eve, and $\theta_{e,n}$ means the direction angle from Alice to Eve at position $n$. The complex AWGN at Eve is $w_{e,n}\sim\mathcal{C}\mathcal{N}(0,\sigma_e^2)$. It should be mentioned that the steering vectors in (\ref{Rx_signal yb}) and (\ref{Rx_signal ye}) have the following form \begin{equation}\label{h_theta_b} \mathbf{h}(\theta)=\left[e^{j2\pi\Psi_{\theta}(1)}, \cdots, e^{j2\pi\Psi_{\theta}(m)}, \cdots, e^{j2\pi\Psi_{\theta}(M)}\right]^T \end{equation} and the phase function $\Psi_{\theta}(m)$ is defined by \begin{equation}\label{var_phi} \Psi_{\theta}(m)\triangleq-\frac{(m-(M+1)/2)d\cos\theta}{\lambda}, m=1,2,\cdots, M \end{equation} where $m$ is the index of antenna, $\theta$ is the direction angle, $d$ represents the distance spacing between two adjacent antennas, and $\lambda$ is the carrier wavelength of transmit signal. As per (\ref{Rx_signal yb}) and (\ref{Rx_signal ye}), the achievable rates from Alice to Bob and to Eve at sampling position $n$ can be expressed as \begin{align}\label{Rb} &R_{b,n}=\log_2\nonumber\\ &\left(1+\frac{g_{ab}\beta_n P_s \mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}\mathbf{v}^H_{b,n}\mathbf{h}(\theta_{b,n})}{g_{ab}(1-\beta_n) P_s \mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\mathbf{v}^H_{AN,n}\mathbf{h}^{H}(\theta_{b,n})+\sigma^2_b}\right)\nonumber\\ \end{align} and \begin{align}\label{Re} &R_{e,n}=\log_2\nonumber\\ &\left(1+\frac{g_{ae}\beta_n P_s \mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{b,n}\mathbf{v}^H_{b,n}\mathbf{h}(\theta_{e,n})}{g_{ae}(1-\beta_n) P_s \mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\mathbf{v}^H_{AN,n}\mathbf{h}(\theta_{e,n})+\sigma^2_e}\right)\nonumber\\ \end{align} respectively. Accordingly, the total achievable SSR $R_s$ of covering the flight from $S$ to $D$ can be written as \begin{equation}\label{Rs} R_s=\max\left\{0,\sum_{n=1}^NR_{b,n}-\sum_{n=1}^NR_{e,n}\right\} \end{equation} To maximize the above SSR $R_s$, we need to optimize the suitable beamforming vectors $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$, and PA factor $\beta_n$. Due to the independence of variables at each position $n$, the total achievable SSR maximization problem can be equivalently decomposed into $N$ subproblems of maximizing the SR at each sample point, that is \begin{align}\label{Rsn} \max_{\{\mathbf{v}_{b,n}, \mathbf{v}_{AN,n},\beta_n\}_{n=1}^N}& R_s=\sum_{n=1}^N \max_{\mathbf{v}_{b,n}, \mathbf{v}_{AN,n},\beta_n}R_{s,n}\\ \nonumber &=\sum_{n=1}^N\max_{\mathbf{v}_{b,n}, \mathbf{v}_{AN,n},\beta_n}\max\left\{0, R_{b,n}-R_{e,n}\right\} \end{align} Within the above right side summation, the $n$ term can be casted as the following complex joint optimization problem \begin{align}\label{P1} \mathrm{(P1):}&\max_{\mathbf{v}_{b,n}, \mathbf{v}_{AN,n}, \beta_n}~~~~R_{b,n}- R_{e,n}\nonumber\\ &~~\text{s. t.}~~0\leqslant\beta_n\leqslant1\nonumber\\ &~~~~~~~~\mathbf{v}^H_{b,n}\mathbf{v}_{b,n}=1\nonumber\\ &~~~~~~~~\mathbf{v}^H_{AN,n}\mathbf{v}_{AN,n}=1. \end{align} Obviously, it is very hard to solve the above joint optimization problem. Below, we first design the $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$ in advance by making use of rule of leakage. Provided that $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$ are given, the optimal PA strategy of Max-SR is addressed by the a simplified version of the above optimization problem. Due to the fixed values of $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$, the above joint optimization reduces to a single-variable PA problem as follows \begin{align}\label{PA1} \mathrm{(PA1):}&\max_{\beta_n}~~~~R_{s,n}(\beta_n)\nonumber\\ &~~\text{s. t.}~~0\leqslant\beta_n\leqslant1. \end{align} with $R_{s,n}(\beta_n)=\max\{0,R_{b,n}-R_{e,n}\}$. \section{Proposed AIS scheme} In this section, we first compute $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$ by using the concept of leakage. Following this, the optimal PA strategy of Max-SR will be solved by setting the first-order derivative to zero. Finally, an alternating iterative structure is established between $\{\mathbf{v}_{b,n}, \mathbf{v}_{AN,n}\}$ and $\beta_n$ to further improve the SR performance. Provided that the value of $\beta_n$ is available, the beamforming vectors $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$ are independently designed by the basic concept of leakage in \cite{Sadek2007A,Feng2011Ane} due to their independent property that the AN leakage from Eve to Bob and the confidential message leakage from Bob to Eve. \subsection{Design $\mathbf{v}_{b,n}$ for fixed $\beta_n$} From the aspect of Bob, we design the beamforming vector $\mathbf{v}_{b,n}$ of the useful information-carried signal by minimizing its leakage to Eve. It can be expressed by the following optimization problem \begin{align}\label{P2} \mathrm{(P2):}&\max_{\mathbf{v}_{b,n}}~~~~\mathrm{SLNR}(\mathbf{v}_{b,n}, \text{fixed}~\beta_n)\nonumber\\ &~~\text{s. t.}~~\mathbf{v}^H_{b,n}\mathbf{v}_{b,n}=1 \end{align} where \begin{align} &\mathrm{SLNR}(\mathbf{v}_{b,n}, \text{fixed}~\beta_n)=\\ \nonumber &\frac{\beta_n P_s\mathbf{v}^H_{b,n}\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}}{\mathbf{v}^H_{b,n}(\beta_n P_s\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n})+\sigma_b^2\mathbf{I}_{N})\mathbf{v}_{b,n}} \end{align} Using the generalized Rayleigh-Ritz ratio theorem, the optimal $\mathbf{v}_{b,n}$ for maximizing the SLNR can be obtained from the eigenvector corresponding to the largest eigen-value of the matrix \begin{align}\label{slnr_v_b} \left[\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n})\beta_n P_s+\sigma_b^2 \mathbf{I}_{N}\right]^{-1}\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n}) \end{align} Since the rank of the above matrix is one, we can directly give the closed-form solution to (\ref{P2}) as \begin{align}\label{slo_vb} \mathbf{v}_{b,n}=\frac{[\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n})\beta_n P_s+\sigma^2_b \mathbf{I}_{N}]^{-1}\mathbf{h}(\theta_{b,n})}{\|[\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n})\beta_n P_s+\sigma^2_b \mathbf{I}_{N}]^{-1}\mathbf{h}(\theta_{b,n})\|_2} \end{align} \subsection{Design $\mathbf{v}_{AN,n}$ for fixed $\beta_n$} Similar to $\mathbf{v}_{b,n}$, from the aspect of Eve, we design the beamforming vector $\mathbf{v}_{AN,n}$ of AN by minimizing its leakage to Bob, called maximizing AN-and-leakage-to-noise ratio (ANLNR), which is formed as \begin{align}\label{P} \mathrm{(P3):}&\max_{\mathbf{v}_{AN,n}}~~~~\mathrm{ANLNR}(\mathbf{v}_{AN,n}, \text{fixed}~\beta_n)\nonumber\\ &~~\text{s. t.}~~\mathbf{v}^H_{AN,n}\mathbf{v}_{AN,n}=1 \end{align} where \begin{align} &\mathrm{ANLNR}(\mathbf{v}_{AN,n}, \text{fixed}~\beta_n)=\nonumber\\ &\frac{(1-\beta_n) P_s\mathbf{v}^H_{AN,n}\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}} {\mathbf{v}^H_{AN,n}((1-\beta_n) P_s\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n})+\sigma_e^2\mathbf{I}_{N})\mathbf{v}_{AN,n}} \end{align} In accordance with the generalized Rayleigh-Ritz ratio theorem, the optimal $\mathbf{v}_{AN,n}$ for maximizing the ANLNR is also obtained from the eigenvector corresponding to the largest eigen-value of the matrix \begin{align}\label{slnr_v_an} \left[\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n})(1-\beta_n)P_s+\sigma^2_e \mathbf{I}_{N}\right]^{-1}\mathbf{h}(\theta_{e,n})\mathbf{h}^{H}(\theta_{e,n}) \end{align} which further yields \begin{align}\label{slo_van} \mathbf{v}_{AN,n}=\frac{[\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n})(1-\beta_n)P_s+\sigma_e^2 \mathbf{I}_{N}]^{-1}\mathbf{h}(\theta_{e,n})}{\|[\mathbf{h}(\theta_{b,n})\mathbf{h}^{H}(\theta_{b,n})(1-\beta_n)P_s+\sigma_e^2 \mathbf{I}_{N}]^{-1}\mathbf{h}(\theta_{e,n})\|_2}. \end{align} \subsection{Optimize $\beta_n$ by the Max-SR rule for fixed $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$} In Subsections A and B, both $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$ are obtained by fixing the PA factor $\beta_n$. Now, with the known values of $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$, by introducing the auxiliary variable $t$, the optimization problem (\ref{PA1}) will be casted as \begin{align}\label{PA2} \mathrm{(PA2):}&\max_{\beta_n}~~~~t\nonumber\\ &~~\text{s. t.}~~t=\max\{0,f(\beta_n)\}\nonumber\\ &~~~~~~~~\beta_n\in [0,~1]. \end{align} where \begin{align}\label{Rs_beta_1} &f(\beta_n)=R_{b,n}-R_{e,n}=\log_2\nonumber\\ &\left(1+\frac{g_{ab}\beta_n P_s \mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}\mathbf{v}^H_{b,n}\mathbf{h}(\theta_{b,n})}{g_{ab}(1-\beta_n) P_s \mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\mathbf{v}^H_{AN,n}\mathbf{h}^{H}(\theta_{b,n})+\sigma^2_b}\right)\nonumber\\ &-\log_2\nonumber\\ &\left(1+\frac{g_{ae}\beta_n P_s \mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{b,n}\mathbf{v}^H_{b,n}\mathbf{h}(\theta_{e,n})}{g_{ae}(1-\beta_n) P_s \mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\mathbf{v}^H_{AN,n}\mathbf{h}(\theta_{e,n})+\sigma^2_e}\right)\nonumber\\ &=\log_2\frac{A\beta^2_n+B\beta_n+C}{D\beta^2_n+E\beta_n+F}\nonumber\\ &=\log_2\phi(\beta_n) \end{align} where \begin{align} A&=g_{ab}g_{ae}P_s^2 \|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2\nonumber\\ &\times\left(\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2 -\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}\|_2^2\right),\\ B&=(g_{ae}P_s\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_e^2)\nonumber\\ &\times g_{ab}P_s\left(\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{b,n}\|_2^2-\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2\right)-g_{ae}P_s\nonumber\\ &\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2 \left(g_{ab}P_s\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_b^2\right),\\ C&=\left(g_{ab}P_s\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_b^2\right)\nonumber\\ &\times\left(g_{ae}P_s\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_e^2\right),\\ D&=g_{ab}g_{ae}P_s^2 \|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2\nonumber\\ &\times\left(\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2 -\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{b,n}\|_2^2\right),\\ E&=(g_{ab}P_s\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_b^2)\nonumber\\ &\times g_{ae}P_s\left(\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{b,n}\|_2^2-\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2\right)-g_{ab}P_s\nonumber\\ &\|\mathbf{h}^{H}(\theta_{b,n})\mathbf{v}_{AN,n}\|_2^2 \left(g_{ae}P_s\|\mathbf{h}^{H}(\theta_{e,n})\mathbf{v}_{AN,n}\|_2^2+\sigma_e^2\right) \end{align} with $F=C$. Optimization problem (\ref{PA2}) is a non-convex program due to the first constraint, and it can be solved by one-dimensional exhaustive search method (ESM). To lower the complexity of the one-dimensional ESM, we propose a closed-form solution to optimization problem problem (\ref{PA2}). Considering $f(\beta_n)=0$ at $\beta_n=0$, the first constraint can be rewritten as $t=\max\{f(0),f(\beta_n)\}$, which forms \begin{align}\label{PA3} \mathrm{(PA3):}&\max_{\beta_n}~~~~f(\beta_n)\nonumber\\ &~~\text{s. t.}~~\beta_n\in [0,~1]. \end{align} Observing the definition of function $f(\beta_n)$ shown in (\ref{Rs_beta_1}), it is very clear that $f(\beta_n)$ is a continuous and differentiable function of variable $\beta_n$ in the closed interval $[0,~1]$. Thus, the optimal $\beta_n^*$ must locate at some endpoints or some stationary points. In what follows, we solve this problem in two steps: firstly, find the stationary points by vanishing the first-order derivative of $R_{s,n}$; secondly, select the optimal value of $\beta_n$ by comparing the values of $R_{s,n}$ among the set of candidate points to the critical number. The critical points of $R_{s,n}$ can be solved by \begin{equation}\label{Rs_beta_deri} \frac{\partial R_{s,n}}{\partial\beta_n}=0, \end{equation} which is further reduced to \begin{align} &\frac{\partial \phi(\beta_n)}{\partial\beta_n}=\nonumber\\ &\frac{(AE-BD)\beta^2_n+2C(A-D)\beta_n+C(B-E)}{(D\beta^2_n+E\beta_n+C)^2}=0, \end{align} which yields \begin{align}\label{beta_1} \beta_{n,1}=\frac{-C(A-D)+\sqrt{\Delta}}{AE-BD}, \end{align} and \begin{align}\label{beta_2} \beta_{n,2}=\frac{-C(A-D)-\sqrt{\Delta}}{AE-BD}, \end{align} where \begin{equation} \Delta=C^2(A-D)^2-C(AE-BD)(B-E) \end{equation} In summary, considering $\beta\in[0,1]$, we have the candidate set for the critical number of function $f(\beta_n)$ as follows \begin{align} S_C=\left\{0,\beta_{n,1}, \beta_{n,2}, 1\right\}. \end{align} In what follows, we need to decide which one in set $S_C$ is the final solution to maximize the function $f(\beta_n)$. Obviously, $\beta_n=0$ means that $f(0)=0$. That is, the SR is equal to zero. Thus, the $\beta_n=0$ should be deleted from the above candidate set. We have a reduced candidate set as follows \begin{align}\label{RCS} \tilde{S}_C=\left\{\beta_{n,1}, \beta_{n,2}, 1\right\}. \end{align} Below, let us discuss these two stationary points $\beta_{n,1}$, and $\beta_{n,2}$ under what condition of $\Delta$, i.e., the sign of value of $\Delta$. The first special case is $\Delta<0$, then the two real roots $\beta_{n,1}$ and $\beta_{n,2}$ will not exist. On this basis, we should check the remaining three cases as follows.\\ \textbf{Case 1.} $AE-BD>0$, the rational function $\phi(\beta_n)$ is a monotonously increasing function. It will achieve the maximum value at $\beta_n=1$. \\ \textbf{Case 2.} $AE-BD=0$, the stationary point is $\beta_{n,3}=\frac{E-B}{2(A-D)}$. We need to judge whether $\beta_{n,3}\in(0,1)$. While $\beta_{n,3}\in(0,1)$, we obtain the PA parameter $\beta_n$ by comparing the value of $\phi(\beta_{n,3})$ and $\phi(1)$. Otherwise, the optimal PA factor is selected as $\beta_n=1$.\\ \textbf{Case 3.} $AE-BD<0$, the rational function $\phi(\beta_n)$ is a monotonously decreasing function. Therefore, the PA parameter is $\beta_n=0$. This result leads to a contradiction with the reduced candidate set in (\ref{RCS}). As for $\Delta\geqslant 0$, we need to judge whether the two candidates meeting the conditions that the PA parameter lies in the interval of (0, 1). Then, compare the values of $\phi(\beta_n)$ at the endpoints and corresponding stationary points to get the optimal PA parameter. There are four different cases.\\ \textbf{Case 1.} If $\beta_{n,1}\in(0,1)$, $\beta_{n,2}\in(0,1)$, then compare the values of $\phi(\beta_{n,1})$, $\phi(\beta_{n,2})$ and $\phi(1)$.\\ \textbf{Case 2.} If $\beta_{n,1}\in(0,1)$, $\beta_{n,2}\notin(0,1)$, then compare the values of $\phi(\beta_{n,1})$ and $\phi(1)$.\\ \textbf{Case 3.} If $\beta_{n,1}\notin(0,1)$, $\beta_{n,2}\in(0,1)$, then compare the values of $\phi(\beta_{n,2})$ and $\phi(1)$.\\ \textbf{Case 4.} If $\beta_{n,1}\notin(0,1)$, $\beta_{n,2}\notin(0,1)$, then the value of $\phi(1)$ will be optimal. After making the above comparison, we can get the optimal PA parameter $\beta_n$ of Max-SR given the values of $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$. \subsection{Proposed AIS} \begin{figure} \centering \includegraphics[width=0.45\textwidth]{fig3.eps}\\ \caption{Proposed AIS}\label{fig3} \end{figure} To further enhance the SR performance in our system, an AIS sketched in Fig. \ref{fig3} is established among $\mathbf{v}^i_{b,n}$, $\mathbf{v}^i_{AN,n}$, and $\beta^i_n$ with an initial value of $\beta^0_n$, where superscript $i$ denotes the $i$th iteration of position $n$. Then, the PA parameter $\beta^1_n$ is decided from several candidates via the discussion of different cases according to the process in Subsection C. Subsequently, using the new value of $\beta^1_n$, we compute the values of $\mathbf{v}^1_{b,n}$ and $\mathbf{v}^1_{AN,n}$ based on (\ref{slo_vb}) and (\ref{slo_van}). This process will be repeated until $f(\beta^{i}_{n})-f(\beta^{i-1}_n)$ is smaller than a predefined value. The detailed procedure is also indicated in Fig. \ref{fig22}. To make clear, the iterative algorithm is summarized as Algorithm~\ref{algorithm 1}. \begin{algorithm} Initialization: $i=0, \beta^i_n=0.1, R_s^{i}=0$. \begin{enumerate} \item For given $\beta^i_n$, compute the $\mathbf{v}^i_{b,n}$ and $\mathbf{v}^i_{AN,n}$ based on (\ref{slo_vb}) and (\ref{slo_van}), \item Solve (\ref{PA3}) and discuss aforementioned two scenarios to obtain $\beta^{i+1}_n$, \item Update $\beta^i_n=\beta^{i+1}_n, i=i+1$, \item Compute $R_s^{i}$, \item Until $|f(\beta^{i}_{n})-f(\beta^{i-1}_n)|\leq\epsilon$. \end{enumerate} \caption{Proposed alternating iterative algorithm}\label{algorithm 1} \end{algorithm} \begin{figure} \centering \includegraphics[width=0.45\textwidth]{fig22.eps}\\ \caption{Flow chart of the proposed AIS}\label{fig22} \end{figure} \section{Simulation and Discussion} To evaluate the SR performance of the proposed AIS, simulation results and analysis are presented in the following. The parameters and specifications are used as follows: the spacing between two adjacent antennas is $d=\lambda/2$, the path loss exponent $c=2$, the distance between $S$ and $D$ is $L$=800m, the distance between Alice and Eve is 200m, the flying altitude of UAV Bob is $H$=20m, the UAV speed is $v$=8m/s, the sample interval $\Delta{t}$=1s, and the number of sampling points ${N}=\lfloor T/\Delta{t}\rfloor$. \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{num_iterations.eps}\\ \caption{SR versus number of iterations for the proposed AIS.}\label{iterations_dBm} \end{figure} Fig.~\ref{iterations_dBm} demonstrates the convergence of the proposed AIS. From this figure, we can clearly observe that the proposed AIS can converge rapidly for three distinct transmit powers. It is very obvious that the proposed AIS can converges within one or two iterations. This convergence rate is attractive. More importantly, after convergence, the proposed AIS may achieve an excellent SR improvement before convergence. \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.5_dbm_10.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.5$ and $P_s$=10dBm).}\label{beta_0.5_dbm_10} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.9_dbm_10.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.9$ and $P_s$=10dBm).}\label{beta_0.9_dbm_10} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.5_dbm_20.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.5$ and $P_s$=20dBm).}\label{beta_0.5_dbm_20} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.9_dbm_20.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.9$ and $P_s$=20dBm).}\label{beta_0.9_dbm_20} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.5_dbm_30.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.5$ and $P_s$=30dBm).}\label{beta_0.5_dbm_30} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{beta_0.9_dbm_30.eps}\\ \caption{Histogram of SR versus number of antennas ($\beta=0.9$ and $P_s$=30dBm).}\label{beta_0.9_dbm_30} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{SR_SNR_antennas128.eps}\\ \caption{SR versus $P_s$ of the proposed AIS.}\label{SR_SNR} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.5\textwidth]{SR_SNR_dBm.eps}\\ \caption{SR versus number of antennas of the proposed AIS.}\label{SR_SNR_dBm} \end{figure} Fig.~\ref{beta_0.5_dbm_10} and Fig.~\ref{beta_0.9_dbm_10} show the histograms of SR versus number of transmit antennas $M$ of the proposed AIS with optimal PA parameter $\beta^*$ compared with Max-SLNR plus Max-ANLNR with typical fixed $\beta=0.5$ and $\beta=0.9$ for $P_s$=10dBm, respectively. From the two figures, we can observe that the proposed AIS achieves a substantial and slight SR performance gains over Max-SLNR plus Max-ANLNR with fixed $\beta=0.5$, and $\beta=0.9$, respectively. Next, in Fig.~\ref{beta_0.5_dbm_20}, and Fig.~\ref{beta_0.9_dbm_20}, we increase $P_s$ up to 20dBm. From the two figures, it can be clearly seen that the proposed AIS still shows an appreciated improvements over Max-SLNR plus Max-ANLNR with typical fixed $\beta=0.5$ and $\beta=0.9$, respectively. Lastly, in Fig.~\ref{beta_0.5_dbm_30}, and Fig.~\ref{beta_0.9_dbm_30}, the transmit power $P_s$ is increased up to 30dBm. From the two figures, it can be clearly seen that the proposed AIS still shows an appreciated improvements over Max-SLNR plus Max-ANLNR with typical fixed $\beta=0.5$ and $\beta=0.9$, respectively. Fig.~\ref{SR_SNR} plots the curves of SR versus $P_s$ for the proposed AIS with different numbers of transmit antennas. From this figure, we can see that the SR increases gradually as the transmit power $P_s$ for the fixed number of transmit antennas. Similarly, if we fix the transmit power, we find that increasing the number of transmit antennas will also improve the SR performance obviously. However, for a large number of antennas, the SR performance gain achieved by doubling the number of antennas becomes smaller. Fig.~\ref{SR_SNR_dBm} illustrates the curves of SR versus number of transmit antennas of the proposed AIS. In Fig.~\ref{SR_SNR_dBm}, given three different $P_s$ scenarios $P_S$=10dBm, 20dBm, and 30dBm, the SR performance approaches three different ceils as the number of transmit antennas tends to be large-scale. \section{Conclusion} In our work, we have investigated a UAV-enabled wireless system. An AIS is proposed to realize an iterative operation between beamforming and PA to further improve SR. Firstly, we established a complex joint optimization problem of maximizing SR. To make the complex joint optimization problem more simple, the Max-SLNR and Max-ANLNR criterion is adopted to construct the beamforming vector $\mathbf{v}_{b,n}$ and the AN projection vector $\mathbf{v}_{AN,n}$. Then, given the solved $\mathbf{v}_{b,n}$ and $\mathbf{v}_{AN,n}$, we turn to address the single-variable PA optimization problem of Max-SR. Actually, SR is regarded as a continuous and differentiable function of PA factor $\beta_n$ with $\beta_n$ being in a closed interval $[0,~1]$. By the analysis of the set of critical points, we can attain the optimal value of $\beta_n$. Finally, a low-complexity AIS between the beamforming and AN projection vectors, and the PA factor are proposed to further enhance the secrecy rate. Simulation results show that the proposed AIS can converge rapidly, and the optimal PA strategy can substantially improve the SR performance compared with some typical PA factors such as $\beta=0.5$, and $\beta=0.9$. Moreover, the SR of the proposed AIS grows gradually with the increasing of the $P_s$. Furthermore, our proposed AIS has achieved an appreciated SR performance gain in small-scale number of transmit antennas. \ifCLASSOPTIONcaptionsoff \newpage \fi \bibliographystyle{IEEEtran}
\section{Introduction} \label{sec:intro} In quantum field theory on curved space-time (QFTCS), the renormalized stress-energy tensor (RSET) $\langle {\hat {T}}_{\mu \nu} \rangle $ is an object of central importance. Via the semi-classical Einstein equations \begin{equation} G_{\mu \nu }+ \Lambda g_{\mu \nu } = 8\pi \langle {\hat {T}}_{\mu \nu} \rangle , \label{eq:scee} \end{equation} (where $G_{\mu \nu }$ is the Einstein tensor, $\Lambda $ the cosmological constant and $g_{\mu \nu }$ the metric tensor) the RSET governs the back-reaction of the quantum field on the space-time geometry. The stress-energy tensor operator ${\hat {T}}_{\mu \nu }$ involves products of field operators evaluated at the same space-time point and is therefore divergent. In the point-splitting approach pioneered by DeWitt and Christensen \cite{DeWitt:1975ys,Christensen:1976vb,Christensen:1978yd}, this divergence is regularized by considering the operators acting on two closely-separated space-time points. The RSET is computed by subtracting off the divergences, which are purely geometrical in nature and independent of the quantum state under consideration. The parametrix encoding these geometric divergent terms was originally constructed using a DeWitt-Schwinger expansion \cite{DeWitt:1975ys,Christensen:1976vb,Christensen:1978yd}. This prescription was made more precise by Wald \cite{Wald:1977up,Wald:1995yp} who gave a set of axioms that (almost) uniquely determine the RSET. Wald further showed that encoding the divergences using Hadamard elementary solutions, of which the DeWitt-Schwinger expansion can be thought of as a special case, produced an RSET satisfying these axioms. The Hadamard prescription provides a more elegant and general prescription than the DeWitt-Schwinger approach in that it can be applied for arbitrary field mass and arbitrary dimensions (see, for example, \cite{Decanini:2005eg}). In practice, the computation of the RSET on space-times other than those with maximal symmetry (see, for example, \cite{Kent:2014nya,Ottewill:2012mq}) is a challenging task. Of particular interest are black hole space-times, and there is a long history of RSET computations on asymptotically flat Schwarzschild black hole backgrounds, for both quantum scalar fields \cite{Fawcett:1983dk,Howard:1984qp,Howard:1985yg,Jensen:1992mv,Ottewill:2010hr} and fields of higher spin \cite{Elster:1984hu,Groves:2002mh,Jensen:1988rh,Jensen:1995qv}. In four space-time dimensions, Anderson, Hiscock and Samuel (AHS) \cite{Anderson:1993if,Anderson:1994hg} have developed a general methodology for finding the RSET on a static, spherically-symmetric black hole. Their method makes heavy use of WKB approximations and the RSET is given as a sum of two parts, the first of which is analytic and the second of which requires numerical computation. More recently, Levi, Ori and collaborators \cite{Levi:2016quh,Levi:2016exv} have developed a new method (dubbed ``pragmatic mode-sum regularization'' \cite{Levi:2015eea}) for finding the RSET which does not rely on WKB approximations and has the advantage that it can be applied to stationary as well as static black holes \cite{Levi:2016exv}. Given the challenges of computing the RSET, it is instructive to consider instead the vacuum polarization (VP) $\langle {\hat {\phi }}^{2} \rangle $ of a quantum scalar field ${\hat {\phi }}$. Unlike the tensor RSET, the VP is a scalar object and hence cannot distinguish between the future and past event horizons of a black hole. Nonetheless, the VP shares many features with the RSET, for example, if the VP diverges on a horizon, then it is likely that the RSET will also diverge there. The VP has been computed on asymptotically flat, spherically-symmetric, four-dimensional black hole space-times (see, for example, \cite{Candelas:1980zt,Candelas:1984pg,Anderson:1989vg,Breen:2015hwa,Levi:2015eea,Levi:2016esr}) using both the AHS and Levi-Ori methods. The AHS method uses a Euclideanized black hole space-time, and is therefore most amenable for the computation of the VP in the Hartle-Hawking state \cite{Hartle:1976tp}, while the Levi-Ori method employs a Lorentzian metric and has been applied to the Boulware \cite{Boulware:1975pe} and Unruh \cite{Unruh:1976db} states. The AHS method has the disadvantage that, unless the field is massless and conformally coupled, the analytic part of the expression for the VP diverges at the black hole event horizon. The numeric part also diverges at the horizon, resulting in a quantity which is finite overall \cite{Winstanley:2007tf}. Using Green-Liouville asymptotics, Breen and Ottewill \cite{Breen:2010ux} improved the AHS method by writing the VP as a sum of terms, each of which is manifestly finite. Their method also extends to the RSET \cite{Breen:2011af,Breen:2011aa}. Another approach is to match the Hadamard parametrix to a mode-sum in Minkowski space-time in a suitable choice of coordinates \cite{Ottewill:2010bq,Ferreira:2014ina}, but this approach is not very general and requires a bespoke mapping between Minkowski space-time and the black hole being considered. However, this matching method has been successfully applied to nonspherically-symmetric space-times where the AHS method is not applicable \cite{Ottewill:2010bq,Ferreira:2014ina}. With the exception of \cite{Ferreira:2014ina}, the above discussion focuses on asymptotically flat black hole geometries. Asymptotically anti-de Sitter (adS) black holes have received rather less attention in the QFTCS literature, despite their inherent interest due to the adS/CFT (conformal field theory) correspondence (see, for example, \cite{Aharony:1999ti} for a review). The VP has been computed for a massless, conformally-coupled scalar field on a four-dimensional spherically-symmetric Schwarzschild-adS black hole using the AHS method \cite{Flachi:2008sr} and also on a static, spherically-symmetric adS black hole with asymptotically Lifschitz geometry \cite{Quinta:2016eql}. An AHS-like method has also been used to find the VP on an asymptotically adS black hole with cylindrical rather than spherical symmetry \cite{DeBenedictis:1998be}. The corresponding calculations on the three-dimensional, asymptotically adS BTZ black hole \cite{Banados:1992wn,Banados:1992gq,Carlip:1995qv} are rather simpler than those for four-dimensional black holes and both the VP and RSET for a conformally-coupled scalar field can be found in closed form (both when there is a black hole event horizon and in the naked singularity case \cite{Steif:1993zv,Lifschytz:1993eb,Shiraishi:1993nu,Shiraishi:1993ti,Binosi:1998yu,Worden:2018}). These closed-form expressions have been used to study the back-reaction of the quantum field on the space-time geometry via the semi-classical Einstein equations (\ref{eq:scee}) \cite{Martinez:1996uv,Casals:2016ioo,Casals:2016odj}. In asymptotically adS space-time, unlike asymptotically flat space-time, black holes do not necessarily have spherical event horizon topology (see, for example, \cite{Birmingham:1998nr,Brill:1997mf,Lemos:1994fn,Lemos:1994xp,Lemos:1995cm,Vanzo:1997gw,Cai:1996eg,Mann:1996gj,Smith:1997wx,Mann:1997zn}). This context has received little attention in the literature on semi-classical effects, but provides an interesting dichotomy between the classical and semi-classical Einstein equations. For example, given an asymptotically adS black hole with an event horizon whose geometry is flat, it is straightforward to make identifications that produce a black cylinder or a black torus. However, as these identifications correspond to a choice of boundary conditions, the classical equations themselves are not sensitive to this choice since the PDEs are quasi-local in nature (though obviously a particular solution is picked out by the choice of boundary conditions). On the other hand, the semi-classical Einstein equations (\ref{eq:scee}) are sourced by the expectation value of a field operator in a given quantum state, a state which requires global information in order to be defined and which is sensitive to any such identifications that distinguish between, say, a cylinder and a torus. Since the quantum stress-energy tensors on backgrounds with different topologies (but with the same geometry) are different, the back-reaction effects will be very much sensitive to the global topology. Though we do not consider different identifications for the same black hole geometry in this paper, this context does provide an additional motivation and as a first step in these directions, it is necessary to consider quantum fields on the backgrounds of asymptotically adS black holes with horizons of nonspherical topology. More specifically, we calculate the VP for a massless, conformally-coupled quantum scalar field on the backgrounds of Schwarzschild-adS black holes with event horizons of spherical, planar and hyberboloidal topology. We work in the Hartle-Hawking state \cite{Hartle:1976tp} and follow the recent ``extended coordinates'' methodology of \cite{Taylor:2016edd,Taylor:2017sux}, which gives an efficient numerical method for finding the VP on the Euclideanized space-time. In \cite{Taylor:2016edd,Taylor:2017sux}, the extended coordinates method is developed for static, spherically-symmetric black holes in four or more space-time dimensions. Here we apply the extended coordinates approach to black holes with nonspherical event horizon topology. For our purposes, a distinct advantage of the extended coordinates approach is that the asymptotically adS nature of the space-times we consider does not present any particular difficulties. The outline of the paper is as follows. We review the geometry of topological black holes in Section \ref{sec:bh}, before deriving an expression for the Euclidean Green's function for a massless, conformally-coupled, scalar field on these backgrounds in Section \ref{sec:scalar}. The renormalized VP will be calculated using Hadamard renormalization, and in Section \ref{sec:hadamard} we introduce the Hadamard parametrix, employing the extended coordinates method of \cite{Taylor:2016edd,Taylor:2017sux} to write this as a mode sum, which is amenable to numerical evaluation. Our numerical methodology is outlined in Section \ref{sec:renVP}, together with our numerical results. Section \ref{sec:conc} contains our conclusions and further discussion. Throughout this paper, we use mostly plus space-time conventions, and units in which $G=\hbar = c = k_{B}=1$. \section{Topological black holes} \label{sec:bh} We consider static black hole solutions of the vacuum Einstein equations with a negative cosmological constant $\Lambda $: \begin{equation} G_{\mu \nu }+ \Lambda g_{\mu \nu } = 0. \end{equation} The event horizon is a two-surface of constant curvature, and the metric takes the following form, in Schwarzschild-like coordinates \cite{Birmingham:1998nr,Brill:1997mf,Lemos:1994fn,Lemos:1994xp,Lemos:1995cm,Vanzo:1997gw,Cai:1996eg,Mann:1996gj,Smith:1997wx,Mann:1997zn}: \begin{equation} \label{eq:metric} \rmd s^{2}=-f(r)\, \rmd t^{2}+\frac{\rmd r^{2}}{f(r)}+r^{2} \,\rmd \Omega_{k}^{2}, \end{equation} where $k\in \{ -1,0,1 \} $, corresponding to negative, zero and positive horizon curvature respectively. The function $f(r)$ is given by \begin{equation} f(r)=k-\frac{2M}{r}+\frac{r^{2}}{L^{2}}, \label{eq:f} \end{equation} where $M$ is the black hole mass and $L={\sqrt {-3/\Lambda }}$ is the adS curvature length-scale. The two-metric $\rmd \Omega _{k}^{2}$ is \begin{equation} \rmd \Omega_{k}^{2}=\rmd \theta^{2}+\mathcal{F}_{k}^{2}(\theta) \, \rmd \varphi^{2}, \label{eq:omegak} \end{equation} with \begin{equation} \mathcal{F}_{k}(\theta)=\left\{\begin{array}{ll} \sin\theta, & k=1,\\ \theta, & k=0,\\ \sinh\theta, & k=-1. \end{array}\right. \label{eq:Fk} \end{equation} For all values of $k$, the coordinate $\varphi $ takes values in the interval $[0,2\pi )$ and the event horizon is located at $r=r_{\mathrm{h}}$, with $f(r_{\mathrm{h}})=0$. The $k=1$ case corresponds to spherical symmetry, with the horizon having positive curvature, and this would be the only case permitted if the cosmological constant $\Lambda $ were either positive or zero. Considering instead $\Lambda<0$ opens up the possibility of black hole horizons of negative or vanishing curvature. For $k=1$, the coordinate $\theta $ is the usual spherical polar coordinate with values in the interval $[0,\pi)$. The metric in this case is the usual Schwarzschild anti-de Sitter spacetime. When $k=0$, the event horizon has zero curvature and can be interpreted as a black ``sheet'' in the space-time. In this case $(\theta, \varphi )$ are plane polar coordinates on the event horizon, $\theta $ corresponding to the radial distance from some fixed point on the horizon, so that $\theta \in [0,\infty )$. In the final case, $k=-1$, the horizon has constant negative curvature and can be thought of as a black hyperboloid. Here $\theta $ again takes on all positive real values. When $k=-1$, there is a minimum event horizon radius, given by \begin{equation} \label{eq:rcrit} r_{\rm{h}}^{\rm {min}} = \frac{L}{\sqrt {3}}. \end{equation} When $k=0$ or $-1$, the event horizon is noncompact. By making appropriate identifications (see, for example, the discussion in \cite{Brill:1997mf}), it is possible to construct compact event horizons in this case. For $k=0$, it is straightforward in Cartesian coordinates on the plane to make identifications to give either a cylindrical or toroidal event horizon topology. For $k=-1$, the identifications cannot be realized in terms of coordinates in a straightforward way, but compact event horizons of genus greater than two can be constructed \cite{Brill:1997mf}. In this paper we consider only noncompact horizons when $k=0$ or $-1$. For $k=0$, due to the vanishing curvature of the event horizon, there is no natural length scale associated with the horizon radius and the metric (\ref{eq:metric}) has two scaling symmetries. The first is the standard length rescaling \begin{equation} t\rightarrow \rho t, \qquad r\rightarrow \rho r, \qquad M \rightarrow \rho M, \qquad L \rightarrow \rho L \label{eq:scaling1} \end{equation} where $\rho $ is an arbitrary constant. Under this rescaling $\rmd s^{2}\rightarrow \rho ^{2}\rmd s^{2}$ and $r_{\rm{h}}\rightarrow \rho r_{\rm{h}}$, with $\theta $ invariant. The second rescaling has $L$ invariant and \begin{equation} t\rightarrow \rho ^{-1} t, \qquad r\rightarrow \rho r, \qquad \theta \rightarrow \rho ^{-1}\theta , \qquad M \rightarrow \rho ^{3}M . \label{eq:scaling2} \end{equation} In this case $r_{\rm{h}}\rightarrow \rho r_{\rm{h}}$ but the metric $\rmd s^{2}$ is unchanged. The two scaling symmetries (\ref{eq:scaling1}, \ref{eq:scaling2}) mean that, for $k=0$ it is sufficient to consider just one black hole metric (which could be taken to be, for example, the case $M=4$, $L=1$). Black holes with any other values of the parameters $M$ and $L$ and $k=0$ can be constructed from this particular black hole by appropriate application of the scalings (\ref{eq:scaling1}, \ref{eq:scaling2}). For fixed $k$, the black hole metric (\ref{eq:metric}) is parameterized by two quantities: the adS length scale $L$ and the black hole mass $M$. The metric function $f(r)$ (\ref{eq:f}) has a single zero at $r=r_{\rm{h}}$, which depends on both $M$ and $L$ for each $k$. To ease the comparison of our results for different black holes, it is helpful to change to a dimensionless radial coordinate for which the event horizon radius takes the same value irrespective of the parameters $M$ and $L$. We start by defining a dimensionless parameter $\alpha $ which is related to $M$ and $L$ via \begin{equation} \alpha L\left( 4\alpha ^{2}+k \right) = M \label{eq:alpha} \end{equation} and then define our new radial coordinate $\zeta $ by \begin{equation} \zeta = \frac{4\alpha ^{2}+k}{M}r - 1. \label{eq:zeta} \end{equation} In terms of $\zeta $ the metric (\ref{eq:metric}) takes the form \begin{equation} \rmd s^{2} = -{\overline {f}}(\zeta ) \, \rmd t^{2} + \frac{\alpha ^{2}L^{2} \, \rmd \zeta ^{2}}{{\overline {f}}(\zeta )} + \alpha ^{2}L^{2} \left( \zeta + 1 \right) ^{2} \, \rmd \Omega _{k}^{2}, \end{equation} with the metric function \begin{equation} {\overline {f}}(\zeta ) =f(r)= \frac{\zeta -1}{ \zeta + 1 } h(\zeta),\qquad h(\zeta)\equiv k+\alpha^{2}(\zeta^{2}+4\zeta+7). \label{eq:fzeta} \end{equation} The event horizon $r=r_{\rm{h}}$ is then located at $\zeta =1$ for all $M$ and $L$, and the curvature singularity at $r=0$ is at $\zeta=-1$. For $k=0, 1$, the function $h(\zeta)$ has no real roots for all values of $\alpha$. Moreover, for $k=1$, the asymptotically flat Schwarzschild limit is given by $L\to\infty$ whence the parameter $\alpha$ necessarily vanishes and so $h(\zeta)=1$ in this case. For $k=0$, the scalings (\ref{eq:scaling1}, \ref{eq:scaling2}) do not change $\zeta $; under the first scaling $\alpha $ is invariant, whereas under the second scaling $\alpha \rightarrow \rho \alpha $. For $k=-1$, the function $h(\zeta)$ has no real roots as long as $\alpha^{2}>1/3$ and so we restrict to this range in this case. We will parameterize our black holes by $(k,\alpha, M)$ rather than $(k,L,M)$. As a final note in this section, we point out that in terms of this parametrization, the surface gravity of the black holes and the Ricci curvature scalar are, respectively, \begin{eqnarray} \label{eq:kappaR} \kappa=\frac{1}{2}f'(r_{\mathrm{h}})=\frac{1}{4 M}(12 \alpha^{2}+k)(4 \alpha^{2}+k), \nonumber\\ R=-\frac{12}{L^{2}}=-\frac{12 \alpha^{2}(4\alpha^{2}+k)^{2}}{M^{2}}. \end{eqnarray} \section{Quantum scalar fields on topological black hole space-times} \label{sec:scalar} We wish to consider the VP for a quantum Klein-Gordon field in the Hartle-Hawking state propagating on the (fixed) classical topological black hole space-times discussed in the previous section. We start with a classical field, $\phi(x)$, satisfying \begin{equation} \left\{\Box -\mu^{2}-\xi\,R\right\}\phi(x)=0, \end{equation} where $\Box$ is the D'Alembertian operator, $\mu$ is the field mass and $\xi$ is the coupling of the field to the background curvature. In the quantum theory, the field gets promoted to an operator-valued distribution, $\phi(x)\to\hat{\phi}(x)$, upon which is imposed a set of canonical commutation relations (see, for example, \cite{Birrell:1982ix}). The Feynman two-point function for a unit-norm state $|A\rangle$ is defined by \begin{equation} \label{eq:FeynmannDef} -\rmi G_{{\mathrm {A}}}(x,x')=\langle {\mathrm {A}}| \mathcal{T}\{ \hat{\phi}(x)\hat{\phi} (x') \}|{\mathrm {A}}\rangle \end{equation} where $\mathcal{T}$ denotes the time-ordering operator, and $G_{{\mathrm {A}}}(x,x')$ is a Green's function for the Klein-Gordon operator, satisfying \begin{equation} \label{eq:KGEqn} \left\{\Box -\mu^{2}-\xi\,R\right\}G_{{\mathrm {A}}}(x,x')=-\frac{\delta(x-x')}{\sqrt{|g|}}. \end{equation} Choosing a quantum state is tantamount to choosing a set of boundary conditions for this Green's function. Now the VP in a given quantum state $|{\mathrm {A}}\rangle$, which we denote by $\langle \hat{\phi}^{2}(x)\rangle_{{\mathrm {A}}}$, is provisionally defined by, \begin{equation} \label{eq:VPDef} \langle \hat{\phi}^{2}(x)\rangle_{{\mathrm {A}}}=\rmi \lim_{x'\to x} G_{{\mathrm {A}}}(x,x'). \end{equation} However, it is clear from (\ref{eq:KGEqn}--\ref{eq:VPDef}) that the VP is ill-defined since it involves the coincidence limit (that is, the limit $x'\to x$) of a solution to the wave equation whose source diverges in this limit. Extracting a meaningful finite quantity from this is the essence of the regularization problem which we discuss in the following section. For the remainder of this section, we will focus on constructing the Green's function in the Hartle-Hawking state $|{\mathrm {HH}}\rangle$. Choosing to work in the Hartle-Hawking state is convenient since one can construct the Green's function in this case by working in the Euclidean sector. We perform a Wick rotation $t\to - \rmi \tau$ and enforce regular boundary conditions for the Green's function when one of the points is on the black hole horizon. Moreover, to avoid a conical singularity at the horizon, we must identify in the Euclidean time direction $\tau \rightarrow \tau+2\pi/\kappa$. This identification discretizes the frequency modes in a Fourier expansion of the Green's function which is one of the main advantages of working in the Euclidean sector. The (unregularized) VP for the scalar field in the Hartle-Hawking state is then \begin{equation} \langle \hat{\phi}^{2} \rangle_{\mathrm{HH}}^{\mathrm{unreg}}=\lim_{x'\to x}G_{\mathrm{E}}(x,x'), \label{eq:VPunren} \end{equation} where $G_{\mathrm{E}}(x,x')$ denotes the Green's function on the Euclidean space-time subject to the appropriate regularity conditions. Adopting standard separation of variable procedures for constructing the Green's function, we find that for all permissible $k$-values, the Green's function can be expressed as \begin{equation} \label{eq:EuclideanModeSum} G_{\mathrm{E}}(x,x')=\frac{\kappa}{(2\pi)^{2}}\sum_{n=-\infty}^{\infty}\rme ^{\rmi n \kappa \Delta \tau}\int_{\lambda=0}^{\infty}\rmd \lambda \,\mathcal{P}_{\lambda}^{(k)}(\gamma) g_{n\lambda}(r,r'), \end{equation} where \begin{equation} \mathcal{P}_{\lambda}^{(k)}(\gamma)= \left\{ \begin{array}{@{\kern2.5pt}lL} \hfill (\lambda+\frac{1}{2})P_{\lambda}(\cos\gamma), & \qquad $k=1$,\\ \hfill \lambda J_{0}(\lambda\,\gamma), & \qquad $k=0$,\\ \lambda\,\tanh(\pi\lambda)\,P_{-\frac{1}{2}+\rmi\lambda}(\cosh\gamma), & \qquad $k=-1$. \end{array}\right. \label{eq:pdef} \end{equation} In (\ref{eq:pdef}), $P_{\lambda }(\cos \gamma )$ is a Legendre function, $J_{0}(\lambda, \gamma )$ a Bessel function of the first kind, $P_{-\frac{1}{2}+\rmi\lambda}(\cosh\gamma)$ is a conical (Mehler) function and $\gamma$ is the geodesic distance on $\rmd \Omega_{k}^{2}$ which is related to the coordinates $(\theta,\varphi)$ by \begin{eqnarray} \label{eq:DefGamma} \cos\gamma= \cos\theta\,\cos\theta'+\sin\theta\,\sin\theta'\,\cos\Delta\varphi, &\quad k=1,\nonumber\\ \gamma^{2} =\frac{1}{2}(\theta^{2}+\theta'^{2}-2 \theta\,\theta'\cos\Delta\varphi), &\quad k=0,\nonumber\\ \cosh\gamma= \cosh\theta\,\cosh\theta '-\sinh\theta\,\sinh\theta'\,\cos\Delta\varphi, &\quad k=-1, \end{eqnarray} where $\Delta \varphi = \varphi - \varphi '$. In the spherical case, $k=1$, the eigenvalue $\lambda$ is an integer and the integral above should be replaced by a sum. Nevertheless, for simplicity of notation, we shall use $\int\,\rmd \lambda$ to denote all cases. Many of the quantities considered in this paper depend on $k$; in general we do not explicitly include this dependence in our notation. The one-dimensional radial Green's function $g_{n\lambda}(r,r')$ satisfies the ODE \begin{equation} \fl \Big\{\frac{\rmd }{\rmd r}\Big(r^{2}f(r)\frac{\rmd }{\rmd r}\Big)-\frac{n^{2}\kappa^{2}r^{2}}{f(r)}-\nu_{\lambda}-r^{2}(\mu^{2}+\xi\,R)\Big\}g_{n\lambda}(r,r')=-\delta(r-r'), \label{eq:radialODE} \end{equation} where \begin{equation} \nu_{\lambda}=\left[ \lambda+\sfrac{1}{4}k(k+1)\right] ^{2}-\sfrac{1}{4}k,\qquad k=0,\pm 1. \end{equation} In terms of the $\zeta$-coordinate, and using the explicit expressions (\ref{eq:kappaR}), we obtain \begin{eqnarray} &\Big\{\frac{\rmd }{\rmd \zeta}\Big[(\zeta^{2}-1)h(\zeta)\frac{\rmd }{\rmd \zeta}\Big]-\frac{n^{2}(12\alpha^{2}+k)^{2}(\zeta+1)^{4}}{16(\zeta^{2}-1)h(\zeta)}-\nu_{\lambda}\nonumber\\ &\quad-\alpha^{2}(\tilde{\mu}_{\xi}-2)(\zeta+1)^{2}\Big\}g_{n\lambda}(\zeta,\zeta')=-\frac{(4\alpha^{2}+k)}{M}\delta(\zeta-\zeta'), \label{eq:ginhomo} \end{eqnarray} where we have defined the constant \begin{equation} \tilde{\mu}_{\xi}=\frac{M^{2}\mu^{2}}{\alpha^{2}(4\alpha^{2}+k)}-12(\xi-\sfrac{1}{6}). \end{equation} This definition implies that $\tilde{\mu}_{\xi}=0$ for massless, conformally-coupled scalar fields. Now, to solve the inhomogeneous equation (\ref{eq:ginhomo}), we take a normalized product of homogeneous solutions. In particular, let $p_{n\lambda}(\zeta)$ be an homogeneous solution that is regular on the horizon and $q_{n\lambda}(\zeta)$ be an homogeneous solution regular at infinity, then \begin{equation} g_{n\lambda}(\zeta,\zeta')=\frac{(4\alpha^{2}+k)}{M}\frac{p_{n\lambda}(\zeta_{<})\,q_{n\lambda}(\zeta_{>})}{N_{n\lambda }} \label{eq:radialg} \end{equation} where $\zeta_{<}=\min\{\zeta,\zeta'\}$, $\zeta_{>}=\max\{\zeta,\zeta'\}$ and $N_{n\lambda }=-(\zeta^{2}-1)h(\zeta)W\{p_{n\lambda },q_{n\lambda }\}$ is the normalization constant constructed from the Wronskian of the two solutions. An important point in the construction of the mode-sum representation of the Green's function is that the pathological behaviour in the coincidence limit manifests as the nonconvergence of the mode-sums in (\ref{eq:EuclideanModeSum}). A meaningful way to apply an ultraviolet cut-off is addressed in the next section. \section{Hadamard regularization} \label{sec:hadamard} The na\"{\i}ve expression for the VP (\ref{eq:VPunren}) is ill-defined and requires a prescription that (i) removes the singular terms (a process called regularization) and (ii) absorbs the terms introduced in order to cure the divergences into some other parameters in the theory (a process called renormalization). The conceptual framework for achieving this in a curved space-time, known as the point-splitting scheme, dates back to seminal work by DeWitt and Christensen \cite{DeWitt:1975ys,Christensen:1976vb,Christensen:1978yd}. A more general axiomatic variant of their original point-splitting prescription, known as Hadamard regularization \cite{Wald:1977up,Wald:1995yp,Decanini:2005eg}, is the approach adopted here. \subsection{The Hadamard parametrix} \label{sec:parametrix} In general, the regularized VP for a scalar field in the Hartle-Hawking state is defined by \begin{equation} \label{eq:VPRegDef} \langle \hat{\phi}^{2} \rangle_{\mathrm{HH}}\equiv \lim_{x'\to x}\left[G_{\mathrm{E}}(x,x')-G_{\mathrm{S}}(x,x')\right], \end{equation} where $G_{\mathrm{S}}(x,x')$ is any symmetric two-point distribution which regularizes the Green's function in the coincidence limit, and which depends only on the geometry through the metric and its derivatives. The latter property guarantees that the regularization only introduces terms that can be reabsorbed elsewhere in the semi-classical field equations (\ref{eq:scee}) (albeit with infinite renormalizations of higher-curvature terms). One particular family of two-point distributions with these properties are the Hadamard parametrices, \begin{equation} \label{eq:GHadamard} G_{\mathrm{S}}(x,x')=\frac{1}{8\pi^{2}}\Big[\frac{\Delta^{1/2}(x,x')}{\sigma(x,x')}+V(x,x')\,\log(\sigma(x,x')/\ell^{2})\Big], \end{equation} where $\sigma(x,x')$ is Synge's world function, $\Delta^{1/2}(x,x')$ is the Van Vleck-Morette determinant, and $V(x,x')$ is a symmetric regular biscalar which is a homogeneous solution of the wave equation. For high-order covariant Taylor expansions for these biscalars, see \cite{Decanini:2005eg}. The parameter $\ell$ is an arbitrary length-scale needed to make the argument of the $\log$ dimensionless. By construction, $G_{\mathrm{S}}(x,x')$ satisfies \begin{equation} \left\{\Box -\mu^{2}-\xi\,R\right\}G_{{\mathrm {S}}}(x,x')=-\frac{\delta(x-x')}{\sqrt{|g|}}+W(x,x'), \end{equation} where $W(x,x')$ is a geometric biscalar that is regular in the coincidence limit. This guarantees that the Green's function $G_{\mathrm{E}}(x,x')$ and the two-point distribution $G_{\mathrm{S}}(x,x')$ have the same short-distance singular structure, and hence the difference in (\ref{eq:VPRegDef}) is finite in the coincidence limit. This solves the conceptual problem of how to define the VP. However, computing the VP in practice remains a significant challenge. The crux of the difficulty is how to subtract the Hadamard parametrix (\ref{eq:GHadamard}) from the the mode-sum representation of the Green's function (\ref{eq:EuclideanModeSum}) in such a way that the limit can be meaningfully taken and the result can be numerically computed in a pragmatic way. A very efficient solution to this problem was recently devised by Taylor and Breen \cite{Taylor:2016edd,Taylor:2017sux} in static, spherically-symmetric space-times of arbitrary dimension. This involves expanding the Hadamard parametrix in a set of parameters adapted to the static, spherically-symmetric geometry and performing a simultaneous Fourier frequency and multipole decomposition of the terms in this expansion. The net result is that the Hadamard parametrix $G_{\mathrm{S}}(x,x')$ is expressed in the same set of basis mode functions as the Green's function and hence a mode-by-mode subtraction is amenable, resulting in a convergent mode-sum. Here we generalize this ``extended coordinates'' method to other horizon topologies. We proceed by simplifying matters by considering only a massless, conformally-coupled scalar field. In this case, in a short-distance expansion we have $V\sim\Or (\Delta x^{4})$, implying that the $\log$ term in (\ref{eq:GHadamard}) does not contribute in the coincidence limit. The task now reduces to obtaining a mode-sum representation of the direct part of the Hadamard parametrix $\Delta^{1/2}/\sigma$. Following \cite{Taylor:2016edd,Taylor:2017sux}, we start by defining the expansion parameters adapted to the geometry, which Taylor and Breen call ``extended coordinates''. For our purposes, the approriate extended coordinates are \begin{eqnarray} \label{eq:ExpVar} w^{2} & = &\frac{2}{\kappa^{2}}(1-\cos \kappa\Delta\tau), \nonumber \\ s^{2} &= &\left\{\begin{array}{ll} f(r)\,w^{2}+2 r^{2}(1-\cos\gamma), & k=1,\\ f(r)\,w^{2}+2 r^{2}\gamma^{2}, & k=0,\\ f(r)\,w^{2}+2 r^{2}(\cosh\gamma-1), & k=-1. \end{array} \right. \end{eqnarray} The extended coordinates $w$ and $s$ are formally treated as $\Or (\epsilon)\sim \Or (\Delta x)$ quantities. To leading order, the world function is given simply by $\sigma=\sfrac{1}{2}\epsilon^{2}(s^{2}+\Delta r^{2}/f)+\Or (\epsilon^{3})$, where here and henceforth we insert explicit powers of $\epsilon$ as a book-keeping mechanism for tracking the order of each term in the expansion. Higher order terms in the expansion are obtained by substituting the ansatz \begin{equation} \label{eq:SigmaExp} \sigma=\sum_{ijk}\sigma_{ijk}(r)w^{i}\Delta r^{j}s^{k}\epsilon^{i+j+k} \end{equation} into the defining equation $\nabla_{a}\sigma \nabla^{a}\sigma=2\sigma$ and equating order by order to determine the coefficients $\sigma_{ijk}(r)$. A similar approach is used for the expansion of $\Delta^{1/2}(x,x')$. Since we are ultimately interested in the coincidence limit, we can make a further simplification by taking the partial coincidence limit $\Delta r=0$, then it can be shown that for all event horizon topologies being considered, the direct part of the Hadamard parametrix possesses an expansion of the form \begin{eqnarray} \label{eq:HadamardDirectExp} \frac{\Delta^{1/2}}{\sigma}&= &\sum_{i=0}^{m}\sum_{j=0}^{ i}\mathcal{D}^{(+)}_{ij}(r)\epsilon^{2i-2}\frac{w^{2i+2j}}{s^{2j+2}} \nonumber \\ & & +\sum_{i=1}^{m}\sum_{j=1}^{ i}\mathcal{D}^{(-)}_{ij}(r)\epsilon^{2i-2}w^{2i-2j}s^{2j-2}+\Or (\epsilon^{2m}), \end{eqnarray} where $m$ is the truncation order, that is, we are ignoring terms that tend to zero in the coincidence limit at least as fast as $\epsilon^{2m}$. This is not true for the Hadamard parametrix $G_{\mathrm{S}}(x,x')$ as a whole since the terms we are ignoring in the tail term $V(x,x')\,\log[\sigma (x,x')/\ell ^{2}]$ tend to zero in the coincidence limit like $\Or (\epsilon^{4}\,\log\epsilon)$ for a massless, conformally-coupled scalar field. Hence, taking the truncation order to be $m=2$ above, we have \begin{eqnarray} \label{eq:HadamardExp} \fl G_{\mathrm{S}}(\Delta\tau,\gamma,r)=\frac{1}{8\pi^{2}}\left(\sum_{i=0}^{2}\sum_{j=0}^{ i}\mathcal{D}^{(+)}_{ij}(r)\epsilon^{2i-2}\frac{w^{2i+2j}}{s^{2j+2}}+\sum_{i=1}^{2}\sum_{j=1}^{ i}\mathcal{D}^{(-)}_{ij}(r)\epsilon^{2i-2}w^{2i-2j}s^{2j-2}\right)\nonumber\\ +\Or (\epsilon^{4}\log\epsilon). \end{eqnarray} The goal is to decompose this two-point function in the same basis modes as the corresponding Euclidean Green's function for each horizon topology. This allows us to define the difference in (\ref{eq:VPRegDef}) mode by mode. The resultant mode-sum would converge even if we truncated the expansion of $G_{\mathrm{S}}(x,x')$ in (\ref{eq:HadamardExp}) at $i=0$, though the convergence would be extremely slow and only conditional. Including the $i=1$ and $i=2$ terms serves to speed up the convergence by capturing more of the high-frequency and high-multipole behaviour of the Green's function. However, the terms involving $\mathcal{D}_{ij}^{(-)}(r)$ involve only even positive powers of $w$ and $s$, and hence are polynomial in $\cos\kappa\Delta\tau$. Decomposing such terms in Fourier frequency modes would result in a sum over finite frequencies. That is, these terms do not have a large-frequency contribution and cannot affect the convergence. Similarly, these terms do not have a large-multipole $\lambda$ contribution. This implies that it is redundant to decompose terms involving $\mathcal{D}_{ij}^{(-)}(r)$ in the Hadamard parametrix since they cannot improve the convergence of the resultant mode-sum, because they do not contribute for large $\lambda$ and $n$. These terms are best kept in closed form. Moreover, since we are eventually interested in the coincidence limit, only the zeroth order polynomial survives, that is, the $\mathcal{D}_{ij}^{(-)}$ term with $i=j=1$. Given $\mathcal{D}_{11}^{(-)}(r)=-f'(r)/(6r)$, we may re-express (\ref{eq:HadamardExp}) as \begin{eqnarray} \label{eq:HadamardExpFinal} G_{\mathrm{S}}(\Delta\tau,\gamma,r)=\frac{1}{8\pi^{2}}\left(\sum_{i=0}^{2}\sum_{j=0}^{ i}\mathcal{D}^{(+)}_{ij}(r)\epsilon^{2i-2}\frac{w^{2i+2j}}{s^{2j+2}}-\frac{f'(r)}{6r}\right)+\cdots \end{eqnarray} The dots in this expression now represent the $\Or (\epsilon^{4}\log\epsilon)$ terms that we are ignoring but also some terms that are formally of lower order but which neither contribute in the coincidence limit nor improve the convergence of the mode-sum in the VP. The coefficients ${\mathcal {D}}^{(+)}_{ij}$ are given in Table \ref{tab:Dcoeff}. \begin{table}[h] \centering \begin{tabular}{|c|c|} \hline & $\mathcal{D}^{(+)}_{ij}(r)$ coefficients for topological black holes\\ \hline \hline & \\ $\mathcal{D}_{00}^{(+)}(r)$& $2$ \\ &\textit{} \\\hline & \\ $\mathcal{D}_{10}^{(+)}(r)$& $\displaystyle{-\frac{f(r)\left[-2k+2 f(r)-2 r f'(r)+r^{2}f''(r)\right]}{12 r^{2}}}$ \\ &\\ $\mathcal{D}_{11}^{(+)}(r)$& $\displaystyle{\frac{f(r)\left[4 f(r)^{2}+f(r)(-4 k -4 r f'(r))+r^{2}(-4\kappa^{2}+f'(r)^{2})\right]}{24 r^{2}}}$ \\ &\\\hline &\\ $\mathcal{D}_{20}^{(+)}(r)$& $\begin{array}{c}\displaystyle{\frac{1}{2880 r^{4}}}f(r)\Big\{76 f(r)^{3}-5 r^{2}\left[4\kappa^{2}-f'(r)^{2}\right]\left[ -2k-2 r f'(r)+r^{2}f''(r)\right] \\ -8 f(r)^{2}\left[10 k +19 r f'(r)-7 r^{2}f''(r)+3 r^{3}f'''(r)\right] \\ +f(r)\left[4-40 r^{2}\kappa^{2}+86 r^{2}f'(r)^{2}-20 k r^{2}f''(r)+9 r^{4}f''(r)^{2} \right. \\ \left. +4 r f'(r)(20 k -14 r^{2}f''(r)+3 r^{3}f'''(r))\right]\Big\}\end{array}$ \\ & \\ $\mathcal{D}_{21}^{(+)}(r)$& $\begin{array}{c}\displaystyle{-\frac{1}{2880 r^{4}}}f(r)\Big\{104 f(r)^{4}+r^{4}\left[ 64\kappa^{2}-20\kappa^{2}f'(r)^{2}+f'(r)^{4}\right] \\ +4 f(r)^{3}\left[ -40 k -52 r f'(r)+11 r^{2}f''(r)\right]+r^{2}f(r)\left[ 120 r \kappa^{2}f'(r) \right. \\ \left. -30 r f'(r)^{3}-20\kappa^{2}(-6 k +r^{2}f''(r))+f'(r)^{2}(-30 k+11 r^{2}f''(r)) \right]\\-2 f(r)^{2}\left[ -28+60 r^{2}\kappa^{2}-67 r^{2}f'(r)^{2}+10 k r^{2}f''(r) \right. \\ \left. +f'(r)(-80 k r+22 r^{3}f''(r))\right] \Big\}\end{array}$ \\ & \\ $\mathcal{D}_{22}^{(+)}(r)$& $\begin{array}{c}\displaystyle{\frac{f(r)^{2}\left[ 4 f(r)^{2}+f(r)(-4k-4 r f'(r))+r^{2}(-4\kappa^{2}+f'(r)^{2})\right] ^{2}}{1152 r^{4}}}\end{array}$ \\ & \\\hline \end{tabular} \caption{Hadamard coefficients $\mathcal{D}_{ij}^{(+)}(r)$ for the topological Schwarzschild-adS black hole space-times. The parameter $k$ assumes the values $k=1,0,-1$ corresponding to spherical, planar and hyperboloidal horizons, respectively.} \label{tab:Dcoeff} \end{table} To express $G_{\mathrm{S}}(x,x')$ as a mode-sum, we assume an ansatz of the form \begin{equation} \label{eq:RegParamAnsatz} \frac{w^{2i+2j}}{s^{2j+2}}=\sum_{n=-\infty}^{\infty}\rme ^{\rmi n \kappa\Delta\tau}\int_{\lambda=0}^{\infty}\mathcal{P}_{\lambda}^{(k)}(\gamma)\Psi_{n\lambda}(i,j|r) \, \rmd \lambda \end{equation} which is similar to the mode-sum expression for the Euclidean Green's function $G_{\rm {E}}(x,x')$ (\ref{eq:EuclideanModeSum}). The $\Psi_{n\lambda}(i,j|r)$ are known as regularization parameters. To compute the regularization parameters, we must invert (\ref{eq:RegParamAnsatz}), which is achieved by multiplying across by $\mathcal{P}_{\lambda'}^{(k)}(\gamma) \rme ^{-\rmi n'\kappa\Delta\tau}$ and integrating, applying the orthogonality relations \begin{equation} \int_{0}^{2\pi/\kappa}\rme ^{\rmi (n-n')\kappa \Delta\tau}\rmd \Delta\tau=\frac{2\pi}{\kappa}\delta_{n n'}, \end{equation} and \begin{equation} \int_{0}^{(\pi,\infty)}\mathcal{P}^{(k)}_{\lambda}(\gamma)\mathcal{P}^{(k)}_{\lambda'}(\gamma)\mathcal{F}_{k}(\gamma)\,\rmd \gamma=\beta_{k}(\lambda)\delta(\lambda-\lambda'), \label{eq:calPintegral} \end{equation} where ${\mathcal {F}}_{k}(\gamma )$ is given in (\ref{eq:Fk}). In the integral (\ref{eq:calPintegral}), the upper bound is infinity for the non-compact cases $k=0,-1$ and $\pi$ for the compact case $k=1$. Also, the eigenvalue $\lambda$ is discrete for $k=1$ and the Dirac delta should be replaced by a Kronecker delta. The factor $\beta_{k}(\lambda)$ is \begin{equation} \beta_{k}(\lambda)=\left\{\begin{array}{ll} \lambda+\sfrac{1}{2}, & k=1,\\ \lambda, & k=0,\\ \lambda\,\tanh(\pi\lambda), & k=-1. \end{array}\right. \end{equation} The result of inverting (\ref{eq:RegParamAnsatz}) is the following double integral representation for the regularization parameters \begin{equation} \label{eq:RegParamIntegral} \fl\Psi_{n\lambda}(i,j|r)=\frac{\kappa}{2\pi\beta_{k}(\lambda)}\int_{0}^{2\pi/\kappa}\int_{0}^{(\pi,\infty)}\rme ^{-\rmi n\kappa\Delta\tau}\mathcal{P}_{\lambda}^{(k)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{k}(\gamma) \,\rmd \gamma\, \rmd \Delta\tau. \end{equation} We next derive explicit representations for these double integrals in terms of known functions by considering each event horizon topology separately. \subsection{$k=1$ regularization parameters} For spherical horizons, the integral over $\gamma$ in (\ref{eq:RegParamIntegral}) assumes the form \begin{equation} \fl \int_{0}^{\pi}\mathcal{P}_{\lambda}^{(1)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{1}(\gamma) \, \rmd \gamma=\frac{(\lambda+\frac{1}{2})2^{i-1}}{\kappa^{2i+2j}r^{2j+2}}(1-\cos\kappa\Delta\tau)^{i+j}\int_{0}^{\pi}\frac{P_{\lambda}(\cos\gamma)\,\sin\gamma\, \rmd \gamma}{(z-\cos\gamma)^{j+1}}, \end{equation} where \begin{equation} z=1+\frac{f(r)}{2 r^{2}}w^{2}. \end{equation} Further defining \begin{equation} \eta=\sqrt{1+\frac{f(r)}{\kappa^{2}r^{2}}}, \end{equation} and noting that \begin{equation} \left(\frac{\partial}{\partial z}\right)^{j}=\frac{1}{2^{j}(1-\cos\kappa\Delta\tau)^{j}}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}, \end{equation} we obtain \begin{eqnarray} \label{eq:GammaIntSpherical} & & \hspace{-2cm} \int_{0}^{\pi}\mathcal{P}_{\lambda}^{(1)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{1}(\gamma)\, \rmd \gamma \nonumber \\ & & = \frac{(\lambda+\frac{1}{2})2^{i-j-1}(-1)^j}{\kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}\int_{0}^{\pi}\frac{P_{\lambda}(\cos\gamma)\sin\gamma\,\rmd \gamma}{(z-\cos\gamma)}\nonumber\\ & & = \frac{(\lambda+\frac{1}{2})2^{i-j}(-1)^j}{\kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}Q_{\lambda}(z), \end{eqnarray} where the last line follows from a standard integral identity for the Legendre functions. This must be substituted into (\ref{eq:RegParamIntegral}) and the time integral must be performed, keeping in mind that there is a time-dependence in the definition of $z$ that appears in the argument of the Legendre function of the second kind. In order to do the time integral analytically, we use the Legendre addition theorem, \begin{equation} \label{eq:AdditionSpherical} Q_{\lambda}(z)=\sum_{p=-\infty}^{\infty}(-1)^{p}\rme ^{\rmi p \kappa\Delta\tau}P_{\lambda}^{-|p|}(\eta)Q_{\lambda}^{|p|}(\eta). \end{equation} Combining equations (\ref{eq:GammaIntSpherical}) and (\ref{eq:AdditionSpherical}) in equation (\ref{eq:RegParamIntegral}) gives \begin{eqnarray} \Psi_{n\lambda}(i,j|r)=\frac{\kappa}{2\pi}&\frac{2^{i-j}(-1)^{j}}{\kappa^{2i+2j}r^{2j+2}j!}\sum_{p=-\infty}^{\infty}(-1)^{p}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}P_{\lambda}^{-|p|}(\eta)Q_{\lambda}^{|p|}(\eta)\nonumber\\ & \times \int_{0}^{2\pi/\kappa} \rme ^{\rmi (p-n)\kappa\Delta\tau}(1-\cos\kappa\Delta\tau)^{i} \, \rmd \Delta\tau. \end{eqnarray} The time integral is now straightforward, \begin{equation} \label{eq:TimeIntegral} \int_{0}^{2\pi/\kappa} \rme ^{\rmi (p-n)\kappa\Delta\tau}(1-\cos\kappa\Delta\tau)^{i} \, \rmd \Delta\tau=\frac{2\pi}{\kappa}\frac{i!(2i-1)!!(-1)^{p-n}}{(i-n+p)!(i+n-p)!} , \end{equation} whence the regularization parameters reduce to \begin{equation} \fl \Psi_{n\lambda}(i,j|r)=\frac{2^{i-j}i!(2i-1)!!(-1)^{n+j}}{\kappa^{2i+2j}r^{2j+2}j!}\sum_{p=n-i}^{n+i}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}\frac{P_{\lambda}^{-|p|}(\eta)\,Q_{\lambda}^{|p|}(\eta)}{(i-n+p)!(i+n-p)!}. \end{equation} The truncation of the infinite sum is a result of the presence of the factorials in the denominator of (\ref{eq:TimeIntegral}). \subsection{$k=0$ regularization parameters} For planar horizons, the integral over $\gamma$ in (\ref{eq:RegParamIntegral}) assumes the form \begin{equation} \fl \int_{0}^{\infty}\mathcal{P}_{\lambda}^{(0)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{0}(\gamma) \, \rmd \gamma=\frac{\lambda\,2^{i-1}}{\kappa^{2i+2j}r^{2j+2}}(1-\cos\kappa\Delta\tau)^{i+j}\int_{0}^{\infty}\frac{J_{0}(\lambda\gamma)\,\gamma\,\rmd \gamma}{(z+\gamma^{2})^{j+1}}, \end{equation} where now we have \begin{equation} z=\frac{f(r)}{2 r^{2}}w^{2}. \end{equation} Defining \begin{equation} \eta=\sqrt{\frac{f(r)}{\kappa^{2}r^{2}}}, \end{equation} implies that \begin{equation} \left(\frac{\partial}{\partial z}\right)^{j}=\frac{1}{2^{j}(1-\cos\kappa\Delta\tau)^{j}}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j} \end{equation} and hence we obtain \begin{eqnarray} \label{eq:GammaIntPlanar} \fl\int_{0}^{\infty}\mathcal{P}_{\lambda}^{(0)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{0}(\gamma) \, \rmd \gamma&=\frac{\lambda\,2^{i-j-1}(-1)^{j}}{\kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}\int_{0}^{\infty}\frac{J_{0}(\lambda\gamma) \, \gamma\,\rmd \gamma}{(z+\gamma^{2})}\nonumber\\ &=\frac{\lambda\,2^{i-j-1}(-1)^{j}}{\kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}K_{0}(\lambda\sqrt{z}), \end{eqnarray} where the last line follows from a standard integral identity for the modified Bessel functions. As before, we factor out the time dependence using an appropriate addition theorem, in this case, we employ the identity \begin{equation} \label{eq:AdditionPlanar} K_{0}(\lambda\sqrt{z})=\sum_{p=-\infty}^{\infty}\rme ^{\rmi p \kappa\Delta\tau}I_{p}(\lambda\,\eta)K_{p}(\lambda\,\eta). \end{equation} Combining equations (\ref{eq:GammaIntPlanar}) and (\ref{eq:AdditionPlanar}) in equation (\ref{eq:RegParamIntegral}) gives \begin{eqnarray} \Psi_{n\lambda}(i,j|r)=\frac{\kappa}{2\pi}&\frac{2^{i-j-1}(-1)^{j}}{\kappa^{2i+2j}r^{2j+2}j!}\sum_{p=-\infty}^{\infty}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}I_{p}(\lambda\,\eta)K_{p}(\lambda\,\eta)\nonumber\\ & \times \int_{0}^{2\pi/\kappa} \rme ^{\rmi (n-p)\kappa\Delta\tau}(1-\cos\kappa\Delta\tau)^{i} \, \rmd \Delta\tau. \end{eqnarray} The time integral here is precisely the same as in the spherical case (\ref{eq:TimeIntegral}) and so the result for the regularization parameters is \begin{equation} \fl\Psi_{n\lambda}(i,j|r)=\frac{2^{i-j-1}i!(2i-1)!!(-1)^{n}}{\kappa^{2i+2j}r^{2j+2}j!}\sum_{p=n-i}^{n+i}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}\frac{(-1)^{p+j}I_{p}(\lambda\,\eta)K_{p}(\lambda\,\eta)}{(i-n+p)!(i+n-p)!}. \end{equation} \subsection{$k=-1$ regularization parameters} For hyperboloidal horizons, the integral over $\gamma$ in (\ref{eq:RegParamIntegral}) is \begin{eqnarray} \fl \int_{0}^{\infty}\mathcal{P}_{\lambda}^{(-1)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{-1}(\gamma) \, \rmd \gamma=&\frac{\lambda\,\tanh(\pi \lambda) \, 2^{i-1}}{\kappa^{2i+2j}r^{2j+2}}(1-\cos\kappa\Delta\tau)^{i+j}\nonumber\\ &\times \,\int_{0}^{\infty}\frac{P_{-\frac{1}{2}+\rmi\lambda}(\cosh\gamma)\,\sinh\gamma\,\rmd \gamma}{(z+\cosh\gamma)^{j+1}}, \end{eqnarray} where now we have \begin{equation} z=-1+\frac{f(r)}{2 r^{2}}w^{2}. \end{equation} In this case, we define \begin{equation} \eta=\sqrt{1-\frac{f(r)}{\kappa^{2}r^{2}}}, \end{equation} so that \begin{equation} \left(\frac{\partial}{\partial z}\right)^{j}=\frac{(-1)^{j}}{2^{j}(1-\cos\kappa\Delta\tau)^{j}}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}. \end{equation} Hence, we obtain \begin{eqnarray} \label{eq:GammaIntHyperboloid} \fl\int_{0}^{\infty}\mathcal{P}_{\lambda}^{(-1)}(\gamma)\frac{w^{2i+2j}}{s^{2j+2}}\mathcal{F}_{-1}(\gamma) \, \rmd \gamma & \nonumber \\ & \hspace{-4cm} =\frac{\lambda\,\tanh(\pi\lambda) \, 2^{i-j-1}}{\kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j} \int_{0}^{\infty}\frac{P_{-\frac{1}{2}+\rmi\lambda}(\cosh\gamma)\sinh\gamma\,\rmd \gamma}{(z+\cosh\gamma)}\nonumber\\ & \hspace{-4cm} =\frac{\lambda\,\pi\,\tanh(\pi\lambda) \, 2^{i-j-1}}{\cosh(\pi\lambda) \, \kappa^{2i+2j}r^{2j+2}j!}(1-\cos\kappa\Delta\tau)^{i}\left(\frac{1}{\eta}\frac{\partial}{\partial\eta}\right)^{j}P_{-\frac{1}{2}+\rmi\lambda}(z),\nonumber\\ \end{eqnarray} where the last line follows from a standard integral identity for the conical (Mehler) functions. Factoring out the time dependence using an appropriate addition theorem is a little more subtle than in the other two cases. The first subtlety is associated with the range of the variable $\eta$, which in this case is related to $z$ explicitly by $z=-\eta^{2}-(1-\eta^{2})\cos\kappa\Delta\tau$. Recall that for $k=-1$, we have restricted to the range $\alpha^{2}> 1/3$, which is sufficient to guarantee that $0<\eta^{2}\le 1$. To see this, we note that $\eta^{2}$ is a decreasing function of $r$ and, using the asymptotic values at the horizon and infinity, satisfies the inequality \begin{equation} 1-\frac{1}{\kappa^{2}L^{2}}\le\eta^{2}\le 1. \end{equation} Requiring that $1-1/(\kappa^{2}L^{2})\ge 0$ is equivalent to $(12\alpha^{2}-1)^{2}\ge 16\alpha^{2}$ using (\ref{eq:kappaR}) and (\ref{eq:alpha}). Solving the latter inequality, it can be shown that it is certainly satisfied whenever $\alpha^{2}> 1/3$. With this range in mind, we can employ the addition theorem \begin{eqnarray} \label{eq:AdditionHyperboloid} & & \hspace{-2cm} P_{-\frac{1}{2}+\rmi\lambda}(-\cos\psi\,\cos\psi'-\sin\psi\,\sin\psi'\cos\kappa\Delta\tau) \nonumber \\ & & =\sum_{p=-\infty}^{\infty}\rme ^{\rmi p \kappa\Delta\tau}P^{-p}_{-\frac{1}{2}+\rmi\lambda}(-\cos\psi)P^{p}_{-\frac{1}{2}+\rmi\lambda}(\cos\psi') \end{eqnarray} with $\eta=\cos\psi=\cos\psi'$. The second subtlety in the hyperboloidal case is that this addition theorem is strictly only valid when $0<\psi'<\psi<\pi$ in the sense that the sum does not converge in the limit $\psi'\to\psi$ (or equivalently $\eta'\to\eta$). This is unlike the other cases where the appropriate addition theorems involved convergent sums, albeit sums that are only slowly converging. However, the convergence properties of the sum in (\ref{eq:AdditionHyperboloid}) turn out to be irrelevant since the time integral sets to zero all the terms in the infinite sum apart from a finite number in the range $p\in\{n-i,...,n+i\}$. A more rigorous approach would be to consider (\ref{eq:AdditionHyperboloid}) with $\psi'<\psi$, then perform the time integral before taking the limit $\psi'\to\psi$. The result is however the same as that obtained by using (\ref{eq:AdditionHyperboloid}) with $\psi=\psi'$ and ignoring the fact that the sum does not converge. Finally, by combining equations (\ref{eq:GammaIntHyperboloid}) and (\ref{eq:AdditionHyperboloid}) in equation (\ref{eq:RegParamIntegral}) and performing the time integral using (\ref{eq:TimeIntegral}) gives \begin{eqnarray} \fl\Psi_{n\lambda}(i,j|r)=\frac{\pi\,2^{i-j-1}i!(2i-1)!!(-1)^{n}}{\cosh(\pi\lambda)\, \kappa^{2i+2j}r^{2j+2}j!}\sum_{p=n-i}^{n+i}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}\frac{(-1)^{p}P_{-\frac{1}{2}+\rmi\lambda}^{-p}(-\eta)P^{p}_{-\frac{1}{2}+\rmi\lambda}(\eta)}{(i-n+p)!(i+n-p)!}.\nonumber\\ \end{eqnarray} \subsection{Mode-sum representation of the Hadamard parametrix} \label{sec:hadsummary} To summarize the results of this section succinctly, we have shown that for each event horizon topology considered, the Hadamard parametrix has a mode-sum representation of the form \begin{eqnarray} \fl G_{\mathrm{S}}(\Delta\tau, \gamma,r)=\frac{1}{8\pi^{2}}\sum_{n=-\infty}^{\infty}\rme ^{\rmi n \kappa\Delta\tau}\int_{0}^{\infty} \rmd \lambda \, \mathcal{P}^{(k)}_{\lambda}(\gamma)\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r)-\frac{f'(r)}{48\pi^{2}r}\nonumber\\ \label{eq:modeHad} \end{eqnarray} where the coefficients $\mathcal{D}_{ij}^{(+)}(r)$ are given in Table \ref{tab:Dcoeff} and the regularization parameters $\Psi_{n\lambda}(i,j|r)$ are \begin{eqnarray} \fl\Psi_{n\lambda}(i,j|r)=\frac{2^{i-j}i!(2i-1)!!(-1)^{n}}{\kappa^{2i+2j}r^{2j+2}j!}\sum_{p=n-i}^{n+i}\left(\frac{1}{\eta}\frac{\partial}{\partial \eta}\right)^{j}\frac{\chi_{p\lambda}(\eta)}{(i-n+p)!(i+n-p)!} \label{eq:Psifinal} \end{eqnarray} with \begin{equation} \chi_{p\lambda}(\eta)=\left\{\begin{array}{l l} (-1)^{j}P^{-|p|}_{\lambda}(\eta)Q^{|p|}_{\lambda}(\eta), & k=1,\\ \\ \frac{1}{2}(-1)^{p+j}I_{p}(\lambda\eta)K_{p}(\lambda\eta), & k=0,\\ \\ {\displaystyle {\frac{\pi}{2\cosh(\pi\lambda)}}}(-1)^{p}P_{-\frac{1}{2}+\rmi\lambda}^{-p}(-\eta)P_{-\frac{1}{2}+\rmi\lambda}^{p}(\eta), & k=-1,\end{array}\right. \end{equation} and $\eta$ is defined by \begin{equation} \eta=\sqrt{\left|k+\frac{f(r)}{\kappa^{2}r^{2}}\right|}. \end{equation} \section{Renormalized vacuum polarization} \label{sec:renVP} In the previous section we derived a mode-sum representation of the Hadamard parametrix (\ref{eq:modeHad}), in terms of which the renormalized VP (\ref{eq:VPRegDef}) is \begin{eqnarray} \hspace{-0.5cm}\langle \hat{\phi}^{2} \rangle_{\mathrm{HH}} & \equiv & \lim_{x'\to x}\left[G_{\mathrm{E}}(x,x')-G_{\mathrm{S}}(x,x')\right] \nonumber \\ & = & \lim_{x'\to x} \left\{ \frac{1}{4\pi ^{2}}\sum_{n=-\infty}^{\infty}\rme ^{\rmi n \kappa \Delta \tau}\int_{\lambda=0}^{\infty}\rmd \lambda \,\mathcal{P}_{\lambda}^{(k)}(\gamma) \right. \nonumber \\ & & \left. \times \left[ \kappa g_{n\lambda}(r,r') -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right] -\frac{f'(r)}{48\pi^{2}r} \right\} \nonumber \\ & = & \lim_{\gamma \to 0} \left\{ \frac{1}{4\pi ^{2}}\int_{\lambda=0}^{\infty}\rmd \lambda \sum_{n=-\infty}^{\infty} \,\mathcal{P}_{\lambda}^{(k)}(\gamma) \right. \nonumber \\ & & \left. \times \left[ \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right] -\frac{f'(r)}{48\pi^{2}r} \right\} \nonumber \\ & = & \frac{1}{4\pi ^{2}}\int_{\lambda=0}^{\infty}\rmd \lambda \sum_{n=-\infty}^{\infty}\,\mathcal{P}_{\lambda}^{(k)}(0) \left[ \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right] \nonumber \\ & & -\frac{f'(r)}{48\pi^{2}r}, \label{eq:VPfinal} \end{eqnarray} where we have defined $g_{n\lambda }(\zeta )= \lim _{r'\rightarrow r}g_{n\lambda }(r,r')$ and $g_{n\lambda }(r,r')$ is given by (\ref{eq:radialg}). To compute the renormalized VP numerically, we therefore need to find the mode functions $p_{n\lambda }(\zeta )$, $q_{n\lambda }(\zeta )$, the normalization constants $N_{n\lambda }$, and the regularization parameters $\Psi _{n\lambda }(i,j|r)$, before combining all these quantities into the sums in (\ref{eq:VPfinal}). We describe our numerical methodology for each of these parts before discussing our results. \subsection{Radial functions} \label{sec:radial} The radial functions $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$ satisfy the homogeneous version of the ODE (\ref{eq:radialODE}) subject to the boundary conditions that $p_{n\lambda }$ is regular on the event horizon $\zeta =1$ and $q_{n\lambda }$ is regular as $\zeta \rightarrow \infty $. The radial equation (\ref{eq:radialODE}) is invariant under the mapping $n\rightarrow -n$, so we only need to find the radial functions for $n\ge 0$. Close to the horizon (which is a regular singular point of the ODE), we assume a Frobenius series expansion for $p_{n\lambda }$ of the form \begin{equation} p_{n\lambda }(\zeta ) = \sum _{i=0}^{\infty } a_{i}\left( \zeta - 1\right) ^{(c_{p}+i)}, \label{eq:pseries} \end{equation} where we set $a_{0}$ to be a convenient nonzero constant. The indicial equation for $c_{p}$ has roots $c_{p}= \pm n/2$, therefore we take $c_{p}= \left|n \right| /2$, so that $p_{n\lambda }$ is regular on the horizon. Since the ODE (\ref{eq:radialODE}) is singular at the horizon, we start our integration close to the horizon and use the Frobenius series (\ref{eq:pseries}) to give the initial values of $p_{n\lambda }$ and its first derivative. We then integrate outwards to large $\zeta $. Unlike the asymptotically flat case, infinity is a regular singular point of the ODE (\ref{eq:radialODE}). Thus for large $\zeta$, we can assume a Frobenius series for $q_{n\lambda}(\zeta)$ of the form \begin{equation} q_{n\lambda }(\zeta ) = \sum _{i=0}^{\infty }b_{i}\zeta ^{-c_{q}-i}, \label{eq:qseries} \end{equation} where we set $b_{0}$ to be a convenient nonzero constant. The indicial equation for $c _{q}$ has roots $c_{q}=1$, $2$ when the scalar field is massless and conformally coupled, which means that either choice will give $q_{n\lambda }$ regular as $\zeta \rightarrow \infty $. Since adS space-time is not globally hyperbolic, it is necessary to impose boundary conditions on a quantum scalar field at time-like infinity in order for the time-evolution of the field to be well-defined \cite{Avis:1977yn}. On pure adS space-time, either transparent or reflective boundary conditions can be imposed on a massless, conformally-coupled scalar field at time-like infinity \cite{Avis:1977yn}. There are two possible reflective boundary conditions, which effectively correspond to either Dirichlet or Neumann boundary conditions on the conformal scalar field. Here we make the choice $c_{q}=2$, which corresponds to Dirichlet reflective boundary conditions on the scalar field as $\zeta \rightarrow \infty $. The effect on the renormalized VP of choosing alternative boundary conditions will be explored elsewhere \cite{Morley} (see also \cite{Worden:2018} for the effect of boundary conditions on the renormalized VP on a BTZ black hole). To find $q_{n\lambda }$, we rewrite the homogeneous version of the radial equation (\ref{eq:radialODE}) as a differential equation with independent variable $\zeta ^{-1}$, start our integration at a large value of $\zeta $, using the series (\ref{eq:qseries}) with $c_{q}=2$ to give initial conditions on $q_{n\lambda }$ and its first derivative, and then integrate inwards towards the event horizon. For both $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$, we use the Mathematica routine {\tt {NDSolve}} to integrate the ODE and store the radial functions and their derivatives on a grid of values of $\zeta =1 +10^{-2+3i/100}$ for integer $i\in [1,100]$. Our grid has a greater density of points near the event horizon $\zeta =1$, since we anticipate that the VP will be more quickly varying there. The Wronskian of $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$ enables the normalization constants $N_{n\lambda}$ to be determined via \begin{equation} \left( p_{n\lambda } \frac{\rmd q_{n\lambda }}{\rmd \zeta } - q_{n\lambda } \frac{\rmd p_{n\lambda }}{\rmd \zeta } \right) = -\frac{N_{n\lambda }}{(\zeta ^{2}-1) h(\zeta )} . \label{eq:wronskian} \end{equation} To check the accuracy of our solutions, we evaluate $N_{n\lambda }$ from our numerically computed $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$ (and their derivatives) at each point on our grid, since this should be the same at all grid points for each $n$ and $\lambda $. We find that the relative error \begin{equation} \frac{\max \left\{ N_{n\lambda } \right\} -\min \left\{ N_{n\lambda } \right\}}{\min \left\{ N_{n\lambda } \right\}} \end{equation} in our numerical values of $N_{n\lambda }$ for each $n$ and $\lambda $ considered is typically of the order of $10^{-47}$--$10^{-50}$. The normalization constants $N_{n\lambda }$ are then combined with the radial functions $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$ to give the radial Green's function $g_{n\lambda }(\zeta )$ (\ref{eq:radialg}). We will discuss the range of values of $n$ and $\lambda $ for which we find the radial functions in the next subsection. \begin{figure}[h] \begin{center} \includegraphics[width=10cm]{figure1a.eps}\\[0.2cm] \includegraphics[width=10cm]{figure1b.eps}\\[0.2cm] \includegraphics[width=10cm]{figure1c.eps}\\[0.2cm] \end{center} \caption{Log plots showing the convergence over $n$ in the mode sum expression (\ref{eq:VPfinal}). The blue lines show $\log \left| \kappa g_{n\lambda}(\zeta) -\frac{1}{2}{\mathcal {D}}_{00}^{+}\Psi _{n\lambda }(0,0|r) \right| $, which is $\Or (n^{-3})$ for large $n$. The red lines show $\log \left| \kappa g_{n\lambda}(\zeta) - \frac{1}{2}\sum _{i=0}^{1}\sum _{j=0}^{i}{\mathcal {D}}_{ij}^{+}\Psi _{n\lambda }(i,j|r) \right| $, which is $\Or (n^{-5})$ for large $n$. The orange lines show $\log \left| \kappa g_{n\lambda}(\zeta) -\frac{1}{2} \sum _{i=0}^{2}\sum _{j=0}^{i}{\mathcal {D}}_{ij}^{+}\Psi _{n\lambda }(i,j|r) \right| $, which is $\Or (n^{-7})$ for large $n$. The top plot is for $k=1$, the middle plot for $k=0$, and the bottom plot for $k=-1$. In each case we have set $\alpha =1$, $L=1$, $\lambda =25$ and $\zeta =1+1/{\sqrt{10} }$. Similar results are found for other values of the parameters. } \label{fig:nconvergence} \end{figure} \subsection{Mode sums} \label{sec:modesums} Having found the radial functions $p_{n\lambda }$ and $q_{n\lambda }$, the regularization parameters $\Psi _{n\lambda }(i,j|r)$ (\ref{eq:Psifinal}) are readily computed in Mathematica since we have analytic expressions for these quantities. For each $i$, $j$, we simplify the derivatives in (\ref{eq:Psifinal}) using standard relations for the Legendre, Bessel and conical functions, which speeds up the computation. It remains therefore to combine the radial functions and regularization parameters in the mode sums (\ref{eq:VPfinal}). It is more straightforward computationally to evaluate the sum over $n$ before finding the integral over $\lambda $. The sums over $n$ in (\ref{eq:VPfinal}) converge extremely rapidly, as can be seen in Figure \ref{fig:nconvergence}. Here, for each value of $k=1,0,-1$, we have chosen the space-time parameters to be $\alpha =1$, $L=1$, and plotted the absolute values of the quantities $\kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\mathcal{D}_{00}^{(+)}(r)\Psi_{n\lambda}(0,0|r)$ (blue curves), $\kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{1}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r)$ (red curves) and $\kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) $ (orange curves) for $\lambda =25$ and $\zeta =1 +1/{\sqrt {10}}$. If we subtract just the $i=0$ regularization parameters, the summand is $\Or (n^{-3})$ for large $n$ (see blue curves in Figure \ref{fig:nconvergence}). Subtracting the $i=1$ regularization parameters as well as those for $i=0$, the convergence is quicker and the summand is $\Or (n^{-5})$ (red curves in Figure \ref{fig:nconvergence}). Finally, subtracting the $i=2$ regularization parameters as well gives a summand which is $\Or (n^{-7})$ and a very rapidly converging sum (orange curves in Figure \ref{fig:nconvergence}). We find similar results for other values of $\lambda $ and $\zeta $ and the space-time parameters $\alpha $ and $L$. For each $k$, the asymptotic values of $\left| \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\mathcal{D}_{00}^{(+)}(r)\Psi_{n\lambda}(0,0|r)\right| $ and $\left| \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{1}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r)\right| $ for large $n$ are very similar, while those of $\left|\kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right| $ are larger. This effect was also seen in \cite{Taylor:2016edd,Taylor:2017sux} and is more marked for $k=-1$ than for $k=0$ or $1$. In our mode sums, we have used values of $n$ such that $\left| n \right| \le 70$. We have tested the error involved in truncating the mode sum at $\left| n \right| = 70$ by also evaluating the sums over $n$ with $\left| n \right| \le 60$. The relative error between these two mode sums is typically $\Or (10^{-9})$ or smaller. \begin{figure}[h] \begin{center} \includegraphics[width=7.5cm]{figure2a.eps}\\[0.2cm] \includegraphics[width=7.5cm]{figure2b.eps}\\[0.2cm] \includegraphics[width=7.5cm]{figure2c.eps}\\[0.2cm] \end{center} \caption{Plots showing the convergence over $\lambda $ in the mode sum expression (\ref{eq:VPfinal}). We plot the integrand/summand $\sum _{n}\mathcal{P}_{\lambda}^{(k)}(0) \left[ \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right]$ as a function of $\lambda $ and $\zeta $. The top plot is for $k=1$, the middle plot for $k=0$, and the bottom plot for $k=-1$. In each case we have set $\alpha =1$ and $L=1$. Similar results are found for other values of the parameters. It can be seen that the integrand/summand converges rapidly to zero as $\lambda $ increases, but that this convergence is not uniform. For $k=\pm 1$, the convergence is more rapid for smaller values of $\zeta $, while for $k=0$ the convergence appears to be more rapid as $\zeta $ increases.} \label{fig:lconvergence} \end{figure} Once the sums over $n$ have been computed, the next stage is to perform the sum/integral over $\lambda $ in (\ref{eq:VPfinal}). For $k=1$, this is a sum over $\lambda = 0,1,2,\ldots $, while for $k=0$ and $-1$, we have an integral over $\lambda \in [0,\infty )$. First we check that the sum/integral is convergent for large $\lambda $. In Figure \ref{fig:lconvergence} we plot the integrand/summand $\sum_{n}\mathcal{P}_{\lambda}^{(k)}(0) \left[ \kappa g_{n\lambda}(\zeta ) -\frac{1}{2}\sum_{i=0}^{2}\sum_{j=0}^{i}\mathcal{D}_{ij}^{(+)}(r)\Psi_{n\lambda}(i,j|r) \right]$ as a function of $\lambda $ and $\zeta $, for each value of $k$ and space-time parameters $\alpha =1$, $L=1$. We find similar results for other values of $\alpha $ and $L$. For each value of $k$, it can be seen that the integrand/summand converges rapidly to zero as $\lambda $ increases. However, this convergence is not uniform in $\zeta $. When $k=\pm 1$, the convergence is more rapid for smaller values of $\zeta $, while for $k=0$ the convergence is more rapid for larger values of $\zeta $. For $k=1$, we have to compute a sum over $\lambda = 0,1,2,\ldots $. We find that the summand is $\Or (\lambda ^{-5})$ for large $\lambda $, but, as observed in Figure \ref{fig:lconvergence}, this convergence is not uniform in $\zeta $. Furthermore, we find that the convergence also depends on the value of $\alpha $. In general, higher values of $\lambda $ are required for good accuracy in our final answers if we either increase $\zeta $ with $\alpha $ fixed, or increase $\alpha $ with $\zeta $ fixed. Our general approach for testing the accuracy of our sums is the same as that taken above for the sum over $n$, namely, we find the sums over $\lambda =0,1,\ldots ,\lambda _{\rm {max}}$ and $\lambda =0,1,\ldots ,\lambda _{{\rm {max}}}-10$ for some $\lambda _{\rm {max}}$ and find the relative error between the two values obtained. When $\alpha =1$, with $\lambda _{\rm {max}}=70$, we find a relative error of $\Or (10^{-9})$ for values of $\zeta $ close to the horizon and $\Or (10^{-6})$ for $\zeta \sim 10$. For $\alpha =0.1$, a similar relative error is found near the horizon when $\lambda _{\rm {max}}=70$ and we again find small errors for larger values of $\zeta $ as well. If we consider $\alpha =10$, then although $\lambda _{\rm {max}}=70$ is sufficient to give a small relative error of $\Or (10^{-10})$ near the horizon, we find that we require $\lambda _{\rm {max}}=130$ to obtain a final answer with reasonable accuracy for $\zeta \sim 3$. When $k=0$ or $-1$, we have an integral over positive values of $\lambda $ rather than a sum. To evaluate the integral, we find the modes on a grid of values of $\lambda $ up to $\lambda =\lambda _{\rm {max}}$, and then construct a cubic spline interpolating between the grid points in $\lambda $. The interpolating function is then integrated over $\lambda $. This process involves two sources of error. First, there is the error due to the fact that the integral is truncated at $\lambda =\lambda _{\rm {max}}$ rather than being performed over all positive values of $\lambda $. Second, approximating the integrand by an interpolating function between the grid points in $\lambda $ also introduces an error into the evaluation of the integral. To estimate the first error, we first assume that the integrand for large $\lambda $ takes the power law form $\delta _{\lambda }\lambda ^{-1-\epsilon _{\lambda }}$. Here $\delta _{\lambda }$ and $\epsilon _{\lambda }$ are constants which are estimated by fitting this power law (using the Mathematica function {\tt {FindFit}}) to the values of the integrand computed numerically for $\lambda \in \left( 40,50 \right)$. The values of $\epsilon _{\lambda }$ are approximately equal to $4$, so that the behaviour of the integrand for large $\lambda $ matches that of the summand in the $k=1$ case. Integrating the power law gives an estimate $\delta _{\lambda }\lambda _{\rm {max}}^{-\epsilon _{\lambda }}/\epsilon _{\lambda }$ for the remainder of the integral. We find that the relative error in neglecting this part of the integral is $\Or (10^{-5})$ with $\lambda _{\rm {max}}=50$ for values of $\zeta $ close to the event horizon, and increases as $\zeta $ increases. The integrand varies more rapidly for small values of $\lambda $ than for larger $\lambda $. We therefore employ a grid of values of $\lambda $ with more points for smaller values of $\lambda $. In particular, we use $80$ equally spaced values of $\lambda $ for $\lambda \in (0,4]$ and a further $92$ equally spaced values of $\lambda $ for $\lambda \in (4,50]$. To estimate the error resulting from our grid, we compare the values of the integral obtained using the above grid with that obtained from using a grid containing only half the number of values of $\lambda $. The relative error between the two answers is $\Or (10^{-3})$ close to the event horizon and decreases as $\zeta $ increases. We see that this error is by far the largest contribution to the total error in our computation of the renormalized VP. It would be possible to reduce this error by decreasing the separation of the points in our grid of $\lambda $ values, but this would considerably increase the computational time required to find the radial functions. Once the sum/integral over $\lambda $ has been performed, the final, trivial, part of the computation of the renormalized VP is to subtract the term $-f'(r)/48\pi ^{2}r$ in (\ref{eq:VPfinal}). \subsection{Results for the vacuum polarization} \label{sec:results} We now present our results for the renormalized VP (\ref{eq:VPfinal}) on a selection of topological black holes. The black hole metric (\ref{eq:metric}) depends on three parameters: $k$ (which governs the curvature of the event horizon), $\alpha $ (or, equivalently, the adS curvature length-scale $L$) and the black hole mass $M$. We first consider fixed $k$ and black hole mass $M=0.5$ with varying $\alpha $, and then fix $\alpha $ and $L$ and compare the results for different values of $k$. For large values of $\zeta $, it will be instructive to compare our results for the renormalized VP on the black hole space-times with the renormalized VP for a massless, conformally-coupled scalar field in the vacuum state on pure adS space-time, which is given by \cite{Kent:2014nya} \begin{equation} \langle \hat{\phi}^{2} \rangle _{\rm {adS,vac}}= - \frac{1}{48\pi ^{2}L^{2}}= -\frac{\alpha ^{2}\left(4\alpha ^{2}+k \right) ^{2}}{48\pi ^{2}M^{2}}. \label{eq:adSVP} \end{equation} The vacuum pure adS VP (\ref{eq:adSVP}) is always negative, and its magnitude decreases as the adS curvature length-scale $L$ increases or $\alpha $ decreases. In all our plots below, dots denote values computed numerically, while the curves interpolate between these values. \begin{figure} \begin{center} \includegraphics[width=10cm]{figure3a.eps}\\[0.2cm] \includegraphics[width=10cm]{figure3b.eps}\\[0.2cm] \includegraphics[width=10cm]{figure3c.eps}\\[0.2cm] \end{center} \caption{Renormalized VP (blue curves) for a massless, conformally-coupled scalar field on an asymptotically adS black hole with $k=1$, mass $M=0.5$ and three values of the space-time parameter $\alpha $: $\alpha =0.05$ (top), $\alpha = 0.5$ (middle) and $\alpha = 5$ (bottom). The renormalized VP is shown as a function of the dimensionless radial coordinate $\zeta $. The black dotted lines denote the renormalized VP for a massless, conformally-coupled scalar field in pure adS space-time (\ref{eq:adSVP}).} \label{fig:k=1} \end{figure} \begin{figure} \begin{center} \includegraphics[width=10cm]{figure4a.eps}\\[0.2cm] \includegraphics[width=10cm]{figure4b.eps}\\[0.2cm] \includegraphics[width=10cm]{figure4c.eps}\\[0.2cm] \end{center} \caption{Renormalized VP (red curves) for a massless, conformally-coupled scalar field on an asymptotically adS black hole with $k=0$, mass $M=0.5$ and three values of the space-time parameter $\alpha $: $\alpha =0.05$ (top), $\alpha = 0.5$ (middle) and $\alpha = 5$ (bottom). The results for $\alpha =0.05$ and $\alpha =5$ are obtained from those for $\alpha =0.5$ by applying the scaling (\ref{eq:VPscaling2}). This scaling leaves the dimensionless radial coordinate $\zeta $ unchanged and thus the renormalized VP is shown as a function of the dimensionful radial coordinate $r$. The black dotted lines denote the renormalized VP for a massless, conformally-coupled scalar field in pure adS space-time (\ref{eq:adSVP}).} \label{fig:k=0} \end{figure} \begin{figure} \begin{center} \includegraphics[width=10cm]{figure5a.eps}\\[0.2cm] \includegraphics[width=10cm]{figure5b.eps}\\[0.2cm] \includegraphics[width=10cm]{figure5c.eps}\\[0.2cm] \end{center} \caption{Renormalized VP (orange curves) for a massless, conformally-coupled scalar field on an asymptotically adS black hole with $k=-1$, mass $M=0.5$ and three values of the space-time parameter $\alpha $: $\alpha =0.525$ (top), $\alpha = 0.75$ (middle) and $\alpha = 5$ (bottom). The renormalized VP is shown as a function of the dimensionless radial coordinate $\zeta $. The black dotted lines denote the renormalized VP for a massless, conformally-coupled scalar field in pure adS space-time (\ref{eq:adSVP}).} \label{fig:k=-1} \end{figure} We begin by considering spherical black holes with $k=1$. The renormalized VP in this case has been previously computed in \cite{Flachi:2008sr} using the AHS method, for fixed $L$ and various values of the black hole mass $M$. When $M=5$ and $L=1$, we find excellent agreement between the results in \cite{Flachi:2008sr} and ours obtained using the extended coordinate method. In Figure \ref{fig:k=1} we plot the renormalized VP for black holes with $k=1$ and fixed mass $M=0.5$, with $\alpha = 0.05$, $0.5$ and $5$, plotted as a function of the dimensionless radial coordinate $\zeta $. In each case we also show the value (\ref{eq:adSVP}) of the renormalized VP for a massless, conformally-coupled, scalar field on pure adS space-time. For all values of $\alpha $, the black hole renormalized VP approaches that on pure adS as $\zeta \rightarrow \infty $, with the VP converging to the pure adS value more quickly for larger values of $\alpha $. This is because, with fixed black hole mass $M$, increasing $\alpha $ corresponds to reducing the adS curvature length-scale $L$ (\ref{eq:alpha}), which means that the adS boundary is effectively closer to the event horizon. Alternatively, for large $\alpha $ and small $L$, the black hole is large compared with the adS curvature length-scale. For larger values of $\alpha $, the renormalized VP is negative everywhere on and outside the event horizon, but for small values of $\alpha $, the renormalized VP is positive in a region close to the event horizon. For all values of $\alpha $, we find that the renormalized VP is monotonically decreasing from its value on the horizon to the asymptotic value (\ref{eq:adSVP}). The magnitude of the renormalized VP both on and outside the horizon increases as $\alpha $ increases. We now turn to the topological black holes whose renormalized VP has not previously been considered in the literature. Our results for planar black holes with $k=0$ are shown in Figure \ref{fig:k=0}. In this case the black hole metric possesses two scaling symmetries (\ref{eq:scaling1}, \ref{eq:scaling2}), both of which leave the dimensionless radial coordinate $\zeta $ unchanged. Applying the first scaling (\ref{eq:scaling1}), the parameter $\alpha $ is unchanged, the radial functions $p_{n\lambda }(\zeta )$ and $q_{n\lambda }(\zeta )$ are unchanged, as are the normalization constants $N_{n\lambda }$ (\ref{eq:wronskian}), while the radial Green's function $g_{n\lambda }$, the surface gravity $\kappa $, the coefficients ${\mathcal {D}}_{ij}$ and the regularization parameters $\Psi _{n\lambda }(i,j|r)$ scale as follows: \begin{eqnarray} g_{n\lambda }& \rightarrow &\rho ^{-1}g_{n\lambda }, \qquad \kappa \rightarrow \rho ^{-1}\kappa, \nonumber \\ {\mathcal {D}}_{ij} & \rightarrow & \rho ^{-2i} {\mathcal {D}}_{ij}, \qquad \Psi _{n\lambda }(i,j|r) \rightarrow \rho ^{2i-2} \Psi _{n\lambda }(i,j|r). \end{eqnarray} This means that the renormalized VP (\ref{eq:VPfinal}) scales as \begin{equation} \langle \hat{\phi}^{2} \rangle_{\mathrm{HH}} \rightarrow \rho ^{-2}\langle \hat{\phi}^{2} \rangle_{\mathrm{HH}} . \label{eq:VPscaling1} \end{equation} Under the second scaling (\ref{eq:scaling2}), the radial functions and $\alpha $ are unchanged, and we have \begin{eqnarray} N_{n\lambda } & \rightarrow \rho ^{2}N_{n\lambda }, \qquad g_{n\lambda } \rightarrow \rho ^{-3}g_{n\lambda }, \qquad \kappa \rightarrow \rho \kappa, \nonumber \\ {\mathcal {D}}_{ij} & \rightarrow \rho ^{2i+2j} {\mathcal {D}}_{ij}, \qquad \Psi _{n\lambda }(i,j|r) \rightarrow \rho ^{-2i-2j-2} \Psi _{n\lambda }(i,j|r), \end{eqnarray} which means that the renormalized VP is unchanged. We can use a combination of these two scalings to scale $\alpha $ and $M$ independently. Writing the renormalized VP as a function of $r$, $\alpha $ and the black hole mass $M$, and applying the scaling (\ref{eq:scaling1}) with parameter $\rho _{1}\rho _{2}^{-3}$, followed by the scaling (\ref{eq:scaling2}) with parameter $\rho _{2}$, we find \begin{equation} \langle \hat{\phi}^{2} \rangle_{\mathrm{HH}} (r, \alpha , M)= \rho _{1}^{2}\rho _{2}^{-6}\langle \hat{\phi}^{2} \rangle_{\mathrm{HH}} (\rho _{1}\rho _{2}^{-2}r, \rho _{2}\alpha , \rho _{1}M). \label{eq:VPscaling2} \end{equation} To compare with our results for $k=0$ with those for $k=1$ above and $k=-1$ below, we fix the black hole $M=0.5$. We compute the renormalized VP for $\alpha = 0.5$ and then use the scaling property (\ref{eq:VPscaling2}) to find the corresponding results for other values of $\alpha $. Since the dimensionless radial coordinate $\zeta $ is unchanged by the scaling, we present our results for the renormalized VP as a function of the dimensionful radial coordinate $r$. Unlike the situation for $k=1$, for planar black holes with $k=0$ we find that the renormalized VP is always negative at the event horizon (this would also be the case if we varied the black hole mass $M$, since the VP for different $M$ would be related to that for $M=0.5$ by the scaling relation (\ref{eq:VPscaling1})). As in the $k=1$ case, the renormalized VP is monotonically decreasing as $r$ increases, and converges to the pure adS VP (\ref{eq:adSVP}) for large $r$. The magnitude of the renormalized VP increases as $\alpha $ increases. The effect of the scaling on the radial coordinate $r$ means that the renormalized VP approaches its asymptotic values for large $r$ more slowly as $\alpha $ decreases, although since the scaling leaves $\zeta $ unchanged, the rate of convergence in $\zeta $ is unaffected by changing $\alpha $. In this case, the scaling symmetries of the metric mean that the concept of a ``large'' or ``small'' black hole does not make sense. When $k=-1$ and the event horizon has constant negative curvature, the range of possible values of $\alpha $ for a fixed black hole mass $M$ is restricted by the definition (\ref{eq:alpha}). In particular, when $M=0.5$, we find from considering the real root of (\ref{eq:alpha}) that $\alpha >0.5$. In Figure \ref{fig:k=-1} we plot the renormalized VP for $\alpha =0.525$, $0.75$ and $5$ as a function of the dimensionless radial coordinate $\zeta $. Our results are qualitatively similar to those in the $k=1$ and $0$ cases, with the renormalized VP monotonically decreasing from its value on the event horizon as $\zeta $ increases. On the event horizon, the renormalized VP is negative for all values of $\alpha $ studied. The magnitude of the renormalized VP increases as $\alpha $ increases, as was the case for the other two values of $k$. We also see from Figure \ref{fig:k=-1} that the renormalized VP converges to its asymptotic value (\ref{eq:adSVP}) at smaller $\zeta $ as $\alpha $ increases. This is to be expected since, as in the $k=1$ case, large values of $\alpha $ correspond to small adS curvature length-scale $L$ and large black holes. \begin{figure} \begin{center} \includegraphics[width=11cm]{figure6.eps} \end{center} \caption{Renormalized VP for a massless, conformally-coupled scalar field on an asymptotically adS black hole with $\alpha = 1$ and $L=1$. The renormalized VP is shown as a function of the dimensionless radial coordinate $\zeta $ for $k=1$ (blue curve), $k=0$ (red curve) and $k=-1$ (orange curve). The black dotted line denotes the renormalized VP for a massless, conformally-coupled scalar field in pure adS space-time (\ref{eq:adSVP}).} \label{fig:allk} \end{figure} The plots in Figures \ref{fig:k=1}--\ref{fig:k=-1} show that the qualitative behaviour of the renormalized VP is very similar for all values of $k$, in particular the renormalized VP is monotonically decreasing from its value on the event horizon to the pure adS value (\ref{eq:adSVP}) for large $\zeta $. In Figure \ref{fig:allk} we compare our results for different $k$ by fixing $\alpha = 1$ and the adS curvature length-scale $L=1$ (the black holes will then have different masses given by (\ref{eq:alpha}) for different $k$). For these values of $\alpha $ and $L$, the renormalized VP is negative on the event horizon for all $k$. The magnitude of the renormalized VP on the horizon is of the same order of magnitude for all $k$, but it is larger for $k=0$ (red curve) and smaller for $k=-1$ (orange curve) compared with the $k=1$ case (blue curve). The rate at which the renormalized VP approaches its asymptotic value (\ref{eq:adSVP}) also depends on $k$, with the $k=-1$ case converging most rapidly and the $k=0$ case converging the least rapidly. For the $k=0$ case in particular, the renormalized VP is significantly different from its asymptotic value at comparatively large values of $\zeta $. \section{Conclusions} \label{sec:conc} In this paper we have computed the renormalized VP for a massless, conformally-coupled scalar field on an asymptotically adS topological black hole space-time, for which the event horizon is a two-surface of constant curvature (either positive, negative, or zero). The scalar field is in the Hartle-Hawking state \cite{Hartle:1976tp}, representing a black hole in thermal equilibrium with a heat bath at the Hawking temperature. We have employed Hadamard renormalization and applied the extended coordinate method of \cite{Taylor:2016edd,Taylor:2017sux}, originally developed for spherically-symmetric black holes. This method extends in an elegant way to topological black holes having an event horizon with either zero or negative curvature, and enables the Hadamard parametrix to be written as a mode sum. As a result, the renormalized VP can be computed in a numerically efficient manner. For spherically-symmetric black holes, the resulting expression for the renormalized VP involves a double sum over modes labelled by two integers. One complication for topological black holes is that one of these sums is replaced by an integral over a continuous variable, which labels the eigenvalues of the Laplacian on the event horizon surface. Finding the modes of the scalar field is a computationally intensive process, so we are only able to find these on a discrete grid of values of this continuous variable. The main error in our calculation of the renormalized VP arises from integrating a function which interpolates between the points in this grid. Nonetheless, we are able to present results for the renormalized VP which are accurate to at least three significant figures. Our results show that the qualitative behaviour of the renormalized VP is similar for all event horizon topologies studied, being monotonically decreasing from its value on the event horizon to the (negative) vacuum pure adS value as the time-like adS boundary is approached. This monotonically decreasing behaviour as the radial distance from the event horizon increases is the same as that observed for a massless conformally-coupled scalar field in the Hartle-Hawking state on an asymptotically flat Schwarzschild black hole \cite{Candelas:1984pg}. In the asymptotically flat case, far from the black hole event horizon the renormalized VP approaches the constant value for a thermal state in Minkowski space-time with temperature equal to the black hole's Hawking temperature. In view of this, it is perhaps surprising that in the asymptotically adS case the renormalized VP approaches the vacuum value far from the black hole. However, for thermal states of a quantum scalar field \cite{Ambrus:2018olh,Kent} on pure adS space-time the thermal radiation tends to ``clump'' away from the time-like adS boundary and the VP is not constant throughout the space-time. Instead, near the boundary the VP for a thermal state on pure adS approaches that for the vacuum state, and we find similar behaviour for the thermal Hartle-Hawking state on the asymptotically adS black holes considered here. For all the cases examined where the event horizon has zero or negative curvature, we find that the renormalized VP is negative everywhere on and outside the event horizon, but for small black holes with positive horizon curvature, the VP is positive in a region away from the adS boundary. Small Schwarzschild-adS black holes with positive horizon curvature are thermodynamically unstable, while larger positive horizon curvature black holes are thermodynamically stable \cite{Hawking:1982dh}. The black holes we consider with zero or negative horizon curvature are also thermodynamically stable \cite{Brill:1997mf}. It may be that the sign of the renormalized VP at the horizon of an asymptotically adS black hole reflects the thermodynamic stability of the black hole (that is, if the VP is positive on the horizon, the black hole is thermodynamically unstable; if negative the black hole is thermodynamically stable), but testing this conjecture would involve significantly more computationally intensive calculations of the VP for different values of the space-time parameters than we have presented here. In this paper we have considered the simplest nontrivial expectation value for a quantum scalar field, namely the VP, and found that the topology of the event horizon has interesting effects, both on the rate at which the VP converges to the vacuum adS value far from the horizon, and on the magnitude of the VP at the horizon. Here we have restricted our attention to a massless, conformally-coupled scalar field, and an open question remains whether these effects of the event horizon topology on the VP extend to the massive case or more general couplings to the space-time curvature. It would also be interesting to see the effect of the event horizon topology on the back-reaction of the quantum field on the space-time geometry. This requires a computation of the RSET, which is absent from the existing literature on asymptotically adS black holes even in the case where the event horizon has positive curvature. Either of these extensions to the work presented here would involve finding a representation of the tail part of the Hadamard parametrix, which can be ignored when calculating the renormalized VP for a massless, conformally-coupled scalar field. The extended coordinate method can be used to find a mode-sum representation for the tail \cite{Taylor:2017sux} when the event horizon has positive curvature. Extending this method to horizons with zero or negative curvature is likely to be rather involved, so we leave this for future work. \ack T.M.~thanks the School of Mathematics and Statistics at the University of Sheffield for the provision of a studentship supporting this work. The work of E.W.~is supported by the Lancaster-Manchester-Sheffield Consortium for Fundamental Physics under STFC grant ST/P000800/1 and partially supported by the H2020-MSCA-RISE-2017 Grant No.~FunFiCO-777740. E.W.~thanks Dublin City University for hospitality while this work was in progress. \section*{References}
\section{Introduction} Correlation effects in condensed matter many-body systems could be fundamentally described \textit{via} Hubbard model \cite{1,2,3,4,5,6,7,8,9,10}. It exhibits various different channels for the transition of normal metallic behavior by an independent tunability of the electronic band structure \textit{via} a single tight-binding parameter, \textit{i.e.}, the interlayer hopping amplitude, and the half-filling nature on the hexagonal lattice bilayer system. In this aspect, weak-coupling phenomena of the two-dimensional (2D) Hubbard model is gaining momentum as a new interesting research field recently because of its extraordinarily rich behavior as a function of the carrier density and model parameters. Renormalization Group method is presently the most promising and best controlled analytical approach to low dimensional Fermi systems with competing singularities at weak coupling region \textit{via} Aharonov-Bohm field potential. In this regard, theoretical investigation of spin-wave propagation through van der Waals (vdW) heterostructure provides suitable platform to explore the concept of spin-wave assisted field effect transistor in molecular spintronic \cite{11}. In this aspect, atomically thin 2D materials, like hexagonal-boron nitride (h-BN), graphene (Grp) and its family, transition metal dichalcogenides (TMDCs), black phosphorous (BP), etc. cover interesting field of research because of their rich mechanical \cite{1,2,3}, electronic \cite{4,5}, optical \cite{6,7} and electrochemical assets with an extensive variety of promising applications \cite{8,9,10}. In recent times, multilayer vdWs heterostructures, chemically different 2D structures, have attracted recent research attention unlike monolayer pristine systems, like Grp/h-BN \cite{12}, Grp/TMDC \cite{13}, h-BN/TMDC \cite{14}, Grp/Silicene \cite{15} and TMDC/TMDC \cite{16}. While, many 2D materials (\textit{e.g.} graphene and Mo$S_2$) with efficient carrier mobilities (\textit{i.e.} high \textit{on-off} ratio) \cite{17,18} restrict their nano-dimension heterolayer device applications. In these case, these layered 2D vdW heterostructures possess superior efficiency for carrier inoculation \textit{via} barrier height modulation \cite{19}. In this regard, phosphorene (P), a puckered honeycomb 2D material, possesses fascinating electronic and optical properties, such as finite direct band gap ($\sim$1.5 eV at monolayer) and high mobility (10$^3{cm}^2{V}^{-1}{s}^{-1}$ at 300 K) due to its structural anisotropy \cite{20,21,22,23,24,25}. \\ To analyze prototypic 2D model for the electronic degrees of freedom, Hubbard model including Renormalization Group (RG) theory is promising in case of 2D planes \cite{26}. In particular, 2D Hubbard model is appropriate to explain interesting phenomena of weakly interacting systems which can be tuned by their carrier density. Besides, large scale numerical algorithms are worked out to solve such 2D interacting Hubbard model including related model parameters \cite{27}. In such systems, weak interaction reveals antiferromagnetic ground state close to half-filling and symmetric \textit{s}-wave phase away from half-filling region. In such cases, conventional perturbation theory fails at a certain region close to the half-filling region, where challenging and frequent infrared deviations raise due to weakly interacting Fermion system \cite{28,29,30} and \textit{van Hove singularities} \cite{31} including the Aharonov-Bohm (AB) potential field for 2D graphene monolayer system \cite{32,33,34}. Moreover, theoretical model of 2D weakly interacting Fermi systems having challenging singularities near weakly interacting region is still lacking in the current analytical prospects for vdW heterostructures. Thus, RG theory is presently the most promising and well-ordered technique for such 2D weakly interacting Fermi systems \cite{35,36}. \\ In the present manuscript, we implement RG theory to the 2D Hubbard model of Graphene-Phosphorene (Grp-P) heterostructure considering nearest neighbor hopping amplitudes of dense electron distribution profile close to half-filling region. Here, we particularly calculate the trend of collective two particle couplings in a single loop stage, completely ignoring the inappropriate energy and linear momentum dependency, but considering vital tangential momentum dependency being a dynamic parameter. We further extend the RG theory to obtain the susceptibility values to analyze the physical response of uncertainties gestured by diverging couplings in weakly interacting vdW heterostructure. Charge-density, spin-density and singlet function based susceptibilities have been considered during analytical calculations at various pairing symmetries. Here, spin-density phase diagram has been presented close to half-filling region of this 2D Hubbard model. The obtained results show the critical energy scale behavior away from the half-filling region with perfect nesting and room temperature stability of the designed system for further functionality. The rest of this manuscript is organized as follows: The methodology details covering the field-theoretic formulation and renormalization group approach are given in Section II and Section III, respectively. We present details of the obtained results and corresponding discussions of vertex function findings in Section IV. Lastly, the conclusions of this manuscript are summarized in Section V. \section{FIELD THEORY FRAMEWORK} The Hamiltonian with the order of second quantization ($H_{SQ}$) \citep{37} unfolding the massless 2D Dirac fermions is referred below, as \begin{equation} H_{SQ}=\int dv{\xi}^{\dag}(v)[{{v_{F}[-i{\hbar}\bigtriangledown+eA(v)]\sigma-eV(v)}}]\xi(v) \end{equation} where, e, $\sigma$, $v_{F}$ and ${\xi}^{\dag}$ are the electron charge, spin-wave projection, Fermi velocity and Grassmann variable, respectively. The Coulomb field potential originated due to the net charge of {\it Ze} positioned at the origin is V(v)=${\dfrac{Ze}{4\pi{\varepsilon}_{0}v}}$, similarly the AB field solenoid aligned at the same point provides A(v)=${\dfrac{\Phi}{2\pi}}$(${-\dfrac{y}{v^{2}}},{\dfrac{x}{v^{2}}}$) with a fixed total magnetic flux of $\Phi$. Being the fixed magnetic flux, Pearl's substitution approach is limited in the flow equation. This establishes the Aharonov-Bohm-Coulomb-Dirac (ABCD) field problem in the present model 2D vdW heterostructure \citep{38}. \\ The partial wave expansion can be further expanded using rotational symmetry, which decouples the system Hamiltonian into diverse partial-wave vectors. Here, j=(1/3), (3/2),..... is the net angular momentum and we consider the dimension-free Coulomb field coupling, C=$\dfrac{Ze^{2}}{4\pi \varepsilon_{0}\hslash v_{F}}$. Apart from the kinetic term, each radical Hamiltonian contains the Coulomb field potential and the centrifugal field potential, both of them possess scale-invariant form ({\it i.e. 1/$\upsilon$}). Most interesting physical quantities are the charge density $\rho(v)$=-e{$<$}${\xi}^{\dag}{v}{\xi(v)}${$>$} and current density J(v)=-$ev_{F}${$<$}${\xi}^{\dag}{v}\sigma {\xi(v)}${$>$} in the ground state of the ABCD Hamiltonian equation. The corresponding coupling presents scattering amplitude located at potential center and corresponding energy dependency is to be obtained using RG equations. \section{RENORMALIZATION GROUP THEORY} We have taken weakly interacting spin-half Fermions of single-particle basis state with crystal momentum ($k_{c}$), {\it up} or {\it down} spin-wave projection, $\sigma\epsilon[{\uparrow,\downarrow}]$ and kinetic energy ($E_{k}$). Thus, the behavioral aspects of the system can be determined via following equation, \begin{equation} S[\xi,{\xi}']=\sum_{K}(if_{0}-{\xi}_{k}){\xi}_{K}'{\xi}_{K}-\gamma[\xi,{\xi}'] \end{equation} where, K=($f_{0}$,k,$\sigma$) presents a multi index parameter connecting the frequency ($f_{0}$) with each particle quantum numbers; Grassmann variables (${\xi}_{K}$ and ${\xi}_{K}'$) are allied to the formation and extinction operators, ${\xi}_{K}$=${\epsilon}_{K}$-$\mu$ is the energy related to a particle depending on the chemical potential ($\mu$) and $\gamma[\xi,{\xi}']$ is a random many body coupling factor \citep{39,40}. \\ Here, all the connected flow equations via Green functions can be acheived from the functional which is used for their generation, given below \begin{equation} G[\eta,{\eta}']=log{\int {\partial}{\mu}_{c}[\xi,{\xi}']e^{-\gamma[\xi,{\xi}']}e^{({\xi}',\eta)+\xi,{\eta}'}} \end{equation} with the normalized Gaussian measure.\\ The infinite hierarchy in flow equations is essential to check at a single-loop level to predict dominant structural uncertainties in the vdW system within weakly interacting limit, neglecting other irrelevant components of the effective interactions. Moreover, energy corrections of each iteration step are confined to one-particle vertex function ($\Gamma$) and used for further calculations. The spin-wave structure of $\Gamma$ can be used for a spin rotation invariant system with response flow equation, which is given as follow, \begin{widetext} \begin{equation} \Gamma(K_{1}',K_{2}';K_{1},K_{2})={\Gamma}_{s}(K_{1}',K_{2}';K_{1},K_{2}){\varLambda}^{1/2}S_{{\sigma}_{1}',{\sigma}_{2}';{\sigma}_{1},{\sigma}_{2}}+ {\Gamma}_{t}(K_{1}',K_{2}';K_{1},K_{2}){\varLambda}^{3/2}T_{{\sigma}_{1}',{\sigma}_{2}';{\sigma}_{1},{\sigma}_{2}} \end{equation} \end{widetext} where, $K_{1}$ and $K_{2}$ presents the multi indexed particle quantum numbers for both spin arrangements, singlet {\it S} and triplet {\it T} projection operators are used for two particle spin space, $\varLambda$ is the energy scale varying at a functional trend for singlet and triplet operators. \\ We extend the RG equations to obtain linear response behaviour ({\it i.e.} spin-wave susceptibility value) of the system towards finite applied external electric field \citep{41}. Finite external field ($F_{E}$) leads to an additional contribution to the action of the flow equation, which is given as follow \begin{equation} \zeta[F_{E};\xi,{\xi}']=-\sum_{q}[F_{E}'(q)\Phi(q)+F_{E}(q){\Phi}'(q)] \end{equation} Here, the Grassmann variables in bilinear form (${\Phi}(q)$), Hermitian conjugate (${\Phi}'(q)$) and ${F_{E}}'(q)$ is the complex conjugate of ${F_{E}}(q)$. One can calculate the response of the field interaction towards electronic charge density, $\rho(q)$=$\sum_{k,\sigma}$(${\xi}_{k-q,\sigma}'{\xi}_{k,\sigma}$) and z-direction dependent spin density, $s^{z}$(q)=$\sum_{k}$[${\xi}_{k-q,\uparrow}'{\xi}_{k,\uparrow}$-${\xi}_{k-q,\downarrow}'{\xi}_{k,\downarrow}$] and response to coupling fields which interact with the change in singlet operator, where $\partial(k)$ is an even parity function satisfying the orbital symmetry of the coupling operator ({\it i.e.} s wave). The linear response of the expectation value with the flow equation of the partition function [$F_{E}$]. Here, the susceptibility follows like, \begin{equation} \chi(q)={\xi}^{-1}{\langle{\Phi(q)}{\Phi'(q)}\rangle}_{F_{E}=0} \end{equation} Here, translation and spin rotation invariant systems are considered with conserved charge in the absence of an external field ($F_{E}$). Here, in such normal and non-symmetrical broken phase, $\langle{\Phi(q)}\rangle$, the expectation value nullifies at $F_{E}(q)\rightarrow 0$. \section{VERTEX FUNCTION FINDINGS} The flow of the vertex function ($\Gamma$) and the susceptibility ($\chi$) values have been calculated analytically using RG theory for several choices of the bare interaction, termed as the AB field potential (U>0), the next nearest neighbor hopping amplitude (t<0) and the chemical potential ($\mu$), where t and $\mu$ have been fixed so that the Fermi surface and particle density are approaching to $\varepsilon_{k}$ and half-filling (\textit{i.e.} n$\backsimeq$1, $\shortmid\mu\shortmid\rightarrow$0), respectively. Momentum dependent flow of the vertex functions are obtained for the three considered systems at low dimensional scale. It is observed that the flow of the vertex function achieves a density value (n$\backsimeq$0.992), \textit{i.e.} close to half-filling region at t=0 and $\shortmid\mu\shortmid$=0.005 (plotted in Figure 1). Here, the singlet part of the vertex function is taken at specified values of momenta on the Fermi surface including the values of momenta, where strong renormalization of $\varGamma$ occurs. Most probably, the singlet vertex function possesses its leading values supporting \textit{umklapp} scattering along the diagonal direction of the \textit{k}-space Brillouin zone. It is observed from the RG theory calculation that the density decreases away from half-filling (\textit{i.e.} n$\backsimeq$1, $\shortmid\mu\shortmid\rightarrow$0) region in a step-like manner and the calculations fail into a region, where \textit{s}-wave symmetry dominates with pairing correlations at necessarily low scale energy levels indicating quantum confinement (\textit{i.e.} nanostructuring) in the Grp-P heterostructure system.\\ \begin{figure}[th!] \centering \includegraphics[width=7.5cm,height=5.0cm]{fig_1.png} \caption{\label{Fig:wide}Flow of the singlet vertex function, $\Gamma$, as a function of $\varLambda$ for several selections of momenta values, ${k}_{F1}$, ${k}_{F2}$ and ${k}_{F3}$.} \end{figure} Two types of antiferromagnetic spin-wave (\textit{i.e.} incommensurate and commensurate) susceptibilities have been obtained from the numerical calculations to validate the physical instability associated with the diverging vertex function as a consequence of response functions \cite{42,43,44,45}. It is observed that the incommensurate spin susceptibilities can be neglected compared to their respective commensurate counterparts (shown in Figure 2) due to the incommensurability parameter ($\delta\sim$0) nearing to half-filling (\textit{i.e.} n$\backsimeq$1, $\shortmid\mu\shortmid\rightarrow$0) as a function of energy scale. Moreover, the ratios between the two susceptibility values of monolayer system in case of weakly interacting \textit{s}-wave region are in the same scale, whereas the ratios of free susceptibility are much reduced indicating the validity of response functions for 2D weakly coupled Fermi systems. In addition, the ratio in case of hetero bilayer is much greater compared to its monolayer system. Thus, antiferromagnetic wave vector based spin-wave susceptibility dominates over coupled susceptibilities at low scale energy level (\textit{i.e.} ground state), confirming the existence of antiferromagnetic ground state with rotational spin invariance. \\ \begin{figure \centering \includegraphics[width=7.5cm,height=5.5cm]{fig_2.png} \caption{\label{Fig:wide}The flow of the ratio of weakly interacting and free susceptibility values depending on $\varLambda$ values for the three systems. The model parameters are \textit{U}=t and t=0, and the chemical potential $\shortmid\mu\shortmid$=0.005.} \end{figure} We show the phase diagram of $\mu$ and \textit{U} at half-filling measured by the prevailing uncertainty from the flow equation (shown in Figure 3(a)). The leading uncertainty region in case of commensurate spin-wave density is detached from the \textit{s}-wave coupling region \textit{via} a narrow strip where incommensurate spin-wave density fluctuations show dominant effect with q=($\pi$, $\pi$-$\delta$). For small value of \textit{U}, the region surrounding half-filling is exponentially small, where uncertainties in spin-wave density play a dominant effect. The value of (t, \textit{U}), in-plane phase diagram is shown in Figure 3(b) with $\shortmid\mu\shortmid$=4t and $\mu$<0 (below half-filling). It is observed that the chemical potential is fixed at the van Hove singularity \cite{46} irrespective of the value of spin-wave density, which is decreasing away from half-filling region with growing value of $\shortmid\mu\shortmid$ at 0.048, one critical point in the flow equation. \begin{figure \centering \includegraphics[width=6cm,height=9.0cm]{fig_3.png} \caption{\label{Fig:wide}The ($\mu$, U) phase diagram for t=0 close to half-filling (n=1, $\shortmid\mu\shortmid\rightarrow$0) region; the solid line represents the spin-density-wave regime. (b) The (t,U) phase diagram for 4t<0 value below the half-filling ($\shortmid\mu\shortmid$<0) region; the dotted lines represent the spin-density-wave regime.} \end{figure} The behavioral trend of critical energy scale, $\varLambda_{c}$, depending on the function at t<0 where, $\shortmid\mu\shortmid\rightarrow$0 and U=t is plotted in Figure 4(a). The shrinkage in the value of $\varLambda_{c}$ with growing trend of $\shortmid\mu\shortmid$ confirms that the ${E}_F$ residues on the \textit{van Hove singularity} within the weakly interacting regime having only Fermi surface nesting dominance. Momentum variables of $\varGamma$ have been projected upon the Fermi surfaces at specific points, where the strong renormalization of the vertex function occurs. Here, total 8 fixed points considered for the normalization process. Besides, additional 8 points have been considered in a more refined projection scheme upon the \textit{van Hove surface} to check the collective effect. As a result, sum total 16 points (8 for \textit{Fermi surface} and 8 for \textit{van Hove surface}) have been taken during the flow equation calculations. These refinements, in the response function of the spin-wave density scheme, enhance the analytical calculation efficiency significantly with a reasonable reduction in critical energy scale, without altering $\varGamma$ and $\chi$ values, qualitatively. The variation trend of $\varLambda_{c}$ as a function of the inverse number of discretization points, $N_0$, upon the Fermi surface at fixed choice of model parameters is shown in Figure 4(b). It is noticed that the critical energy scale is varying in a discrete manner with 8 discretization points, and resumes stability for next 8 points with right order of magnitude indicating the controlled trend of flow equation for weakly interacting systems. \\ \begin{figure \centering \includegraphics[width=8.5cm,height=4.0cm]{fig_4.png} \caption{\label{Fig:wide} The critical energy scale, $\varLambda_{c}$, as a function of (a) $\mu$ at U=t and n=1. The dotted black lines present the functions for $\varLambda_{c}$=$\shortmid\mu\shortmid$ and $\varLambda_{c}$=2$\shortmid\mu\shortmid$. (b) number of discretization points, $N_0$, upon Fermi surface at U=t, n=1 and $\shortmid\mu\shortmid$= 0.005. The dotted black lines represent the functions Y=a/($N_0$+$\varLambda_{c}$). The flow of (c) compressibility, $\kappa$, and (d) homogeneous spin susceptibility as a function of $\varLambda$ at fixed value of $\shortmid\mu\shortmid$=0.005 for U=t and n=1.} \end{figure} The values of compressibility and homogeneous spin susceptibility have been calculated depending on the energy scale (shown in Figure 5(a) and (b)), respectively for the three systems. These two parameters can be realized directly from the forward scattering of vertex function \textit{via} Landau equations of Fermi-liquid theory \cite{47}. The free compressibility, ${k}_0$, and spin-wave susceptibility, $\chi$(s,0), are refined ignoring infrared cut-off values as per the Fermi-Liquid theory. As a result, the flow equations of the vertex response function is entirely because of the flow of the Landau functions at the initial stage of the normal random phase approximation of the Hubbard model at critical energy scale value, $\varLambda$=$\varLambda_{c}$. The compressibility is inhibited at low scale energy levels close to half-filling region, which is expected for systems having a finite bandgap near to ‘$\mu$’, with dominant uncertainty in spin-wave density. Besides, the values of the compressibility diverge with respect to the reduction in homogeneous spin-wave susceptibility values away from half-filling region, where \textit{s}-wave uncertainties play major role acting indicating a finite spin-wave bandgap opening trend in any singlet or triplet spin-wave 2D Fermi systems \cite{48}. It is found that the spin-wave susceptibility flows from zero to negative values which implies that our single loop calculation fails, when it reaches strongly interacting regime. This trend is validated only in weakly interacting region applied for 2D Fermi system. Thus, one diverging compressibility is found mentioning a strong tendency toward phase transition and separation. As a result, the increase of \textit{k} sets is very close to the uncertainty, where the renormalized interactions achieve large value that the single loop findings are not further validated. The stability is prominent at higher energy scales (\textit{i.e.} 0.04$\leq\frac{\Lambda}{t}\geq$0.03) from the plot in Figure 5((a) and (b)). Moreover, we have shown the trend of free susceptibilities ($\chi_0$) at specific choice of \textit{t} and $\mu$ values (shown in supplementary information Figures S1) which is strongly supporting the trend of homogeneous spin-wave susceptibility. \\ \begin{figure \includegraphics[width=8.5cm,height=4.0cm]{fig_5.png} \caption{\label{Fig:wide}The flow of (a) compressibility, $\kappa$, and (b) homogeneous spin susceptibility as a function of $\varLambda$ at fixed value of $\shortmid\mu\shortmid$=0.005 for U=t and n=1.} \end{figure} \section{SUMMARY AND CONCLUSIONS} A study on the spin-wave response function behavior of vdW Grp-P heterostructure was presented via field-theory perspective implementing analytical RG method. This formulation can be used systematically to identify coupling uncertainties in 2D weakly interacting Fermi systems. In this system, critical energy can be scaled at specific singular points where vertex functions and susceptibilities diverge and become finite. Moreover, the instabilities are modulated via short range antiferromagnetic correlations present in the system, which is noticed from the flow of vertex functions and susceptibilities. This antiferromagnetic ordering is retained in the ground state of such 2D systems accompanied with rotational spin invariance. The analytical results show an unusual singularity of van Hove kind in 2D heterostructure. This finding supports the quantitative realization of experimental and theoretical systems further from their critical points and before the underlying field theory is well understood. This will also facilitate quantitative analysis of room temperature stability of such systems and \textit{on-state} modeling of electronic devices in future. \\ \begin{acknowledgments} SKB acknowledges DST, Govt. of India for providing INSPIRE Fellowship (IF150325). The authors acknowledge Tezpur University for providing HPCC facility. \end{acknowledgments} \nocite{*}
\section{Introduction} Using high-resolution polarimetric spectra of HD\,149277 acquired with ESPaDOnS at the Canada-France-Hawaii Telescope (CFHT), \citet{Shultz2018} recently reported on the presence of a rather strong longitudinal magnetic field with $\left<B_{\rm z}\right>_{\rm max}=3.3\pm0.1$\,kG. The authors determined a rotation period of 25.4\,d using these mean longitudinal magnetic field measurements. HD\,149277 is a member of the young open cluster NGC\,6178 at an age of $\log\,(t [\mathrm{yr}])=7.15\pm0.22$ \citep{Kharchenko2005}. Its physical properties, $T_{\rm eff}=22\,300\pm 500$\,K, $M=8.75\pm0.40$\,M$_{\odot}$, and $\log (L/L_{\odot})=3.7\pm 0.1$ were reported by \citet{Landstreet2007}. In the column ``remarks'' of their Table~1, \citet{Shultz2018} mention that HD\,149277 is an SB2 system with a B2IV/V magnetic primary, but give no information on the nature of the secondary component or the orbital parameters. According to previous studies by e.g.\ \citet{Carrier2002}, \citet{Hubrig2014}, and \citet{Landstreet2017}, close SB2 systems with magnetic Ap or Bp components are extremely rare. Among the studied binary systems with A and late B-type primaries, only two systems, HD\,98088 and HD\,161701, are known to possess a magnetic Ap star as a companion \citep{Babcock1958,Abt1968,Hubrig2014}, and only a few more SB2 systems with Bp components are currently known \citep{Landstreet2017}. Such systems are of considerable interest in the context of the magnetic field origin, which is still not properly understood. \citet{Ferrario2009} suggested that magnetic Ap and Bp stars are products of a merger of two lower mass protostars. In this scenario, the binaries that we observe now were triple systems earlier in their history. In the following we report on our analysis of the orbital parameters of HD\,149277 and give additional information on the spectral, magnetic, and photometric variability. \section{Orbital analysis} \begin{table} \centering \caption{ Radial velocity measurements carried out for the primary and secondary components in the system HD\,149277. The first observation corresponds to the HARPS spectrum. } \label{tab:RV} \begin{tabular}{ccr@{$\pm$}lr@{$\pm$}l} \hline \multicolumn{1}{c}{HJD} & \multicolumn{1}{c}{Orbital} & \multicolumn{2}{c}{$RV_{\rm A}$} & \multicolumn{2}{c}{$RV_{\rm B}$} \\ 2\,450\,000+& \multicolumn{1}{c}{Phase} & \multicolumn{2}{c}{(km\,s$^{-1}$)} & \multicolumn{2}{c}{(km\,s$^{-1}$)} \\ \hline 4206.3982 & 0.636 & 69.3 & 0.3 & $-$79.7 & 0.5\\ 6112.3310 & 0.103 & $-$113.0 & 0.3 & 119.4 & 0.4\\ 6759.6146 & 0.298 & $-$75.4 & 0.3 & 76.1 & 0.5\\ 6760.4658 & 0.372 & $-$36.9 & 0.3 & 33.6 & 0.6\\ 6812.3925 & 0.880 & 71.6 & 0.3 & $-$83.0 & 0.5\\ 6818.3859 & 0.400 & $-$21.6 & 0.3 & 18.7 & 0.4\\ 6821.3857 & 0.660 & 74.7 & 0.3 & $-$87.5 & 0.5\\ 6822.3910 & 0.748 & 88.7 & 0.3 & $-$103.2 & 0.7\\ 6824.3772 & 0.920 & 51.1 & 0.3 & $-$61.8 & 0.5\\ 7225.2883 & 0.726 & 87.0 & 0.3 & $-$100.4 & 0.5\\ 7226.2343 & 0.808 & 88.8 & 0.3 & $-$103.7 & 0.5\\ 7227.2542 & 0.896 & 64.4 & 0.3 & $-$77.4 & 0.5\\ 7228.2936 & 0.987 & $-$4.1 & 0.4 & $-$1.0 & 0.9\\ 7229.3121 & 0.075 & $-$93.2 & 0.3 & 98.0 & 0.5\\ 7230.3155 & 0.162 & $-$125.4 & 0.4 & 134.4 & 0.8\\ 7231.2850 & 0.246 & $-$100.0 & 0.4 & 104.8 & 0.5\\ 7232.3179 & 0.336 & $-$54.0 & 0.4 & 55.4 & 0.5\\ 7233.2322 & 0.415 & $-$14.0 & 0.4 & 9.1 & 0.5\\ 7234.2364 & 0.503 & 24.4 & 0.4 & $-$32.6 & 0.7\\ 7235.2543 & 0.591 & 55.8 & 0.4 & $-$66.5 & 0.5\\ 7236.3116 & 0.683 & 79.5 & 0.3 & $-$93.3 & 0.5\\ 7604.2298 & 0.624 & 66.6 & 0.3 & $-$78.3 & 0.5\\ 7611.2236 & 0.231 & $-$106.5 & 0.4 & 112.6 & 0.5\\ 7611.2503 & 0.234 & $-$105.4 & 0.4 & 111.4 & 0.5\\ \hline \end{tabular} \end{table} \begin{figure} \centering \includegraphics[width=0.9\columnwidth,height=6.4cm, bb=30 2 510 737]{rvcurve2pa.eps} \caption{ Spectroscopic orbit of the system HD\,149277 using ESPaDOnS spectra obtained from 2012 to 2016 and one HARPS spectrum (red triangles). Open symbols indicate measurements of the secondary component, which is the less massive star. The lower panel shows the residuals: observed minus calculated. Phase zero corresponds to the periastron passage. In the upper panel error bars are smaller than the symbol sizes. } \label{fig:RV} \end{figure} To estimate the orbital parameters of the SB2 system HD\,149277, we downloaded all publically available ESPaDOnS (Echelle SpectroPolarimetric Device for the Observation of Stars) spectra obtained from 2012 to 2016. ESPaDOnS is a spectropolarimeter with a resolving power of about 65\,000, covering the wavelength region from 3700 to 10\,500\,\AA{}. As most of the spectra have a rather low signal-to-noise ratio (S/N) between 85 and 100, we averaged spectra recorded during the same night (separated by up to 3\,h) in order to improve the S/N, obtaining a total of 23 spectra. To this sample we added one available HARPS (High Accuracy Radial velocity Planet Searcher) spectrum taken in 2007. In Table~\ref{tab:RV} we present our radial velocity measurements for the primary and secondary components on 24 phases and in Fig.~\ref{fig:RV} the spectroscopic orbit of the system. The value $v\,\sin\,i_{\rm B}$ consigned in Table~\ref{tab:RV} was determined using the S\,{\sc ii}~5665 line with a low Land\'e factor of 0.5. \begin{table} \centering \caption{ Orbital and fundamental parameters for the SB2 system HD\,149277. } \label{tab:orbit149277} \begin{tabular}{cr@{$\pm$}lc} \hline $P$ (d) & 11.5192 & 0.0005 \\ $T_{\rm conj}$ & 2456802.77 & 0.02 \\ $T_{\rm per}$ & 2456803.51 & 0.06 \\ $V_{\rm o}$ (km\,s$^{-1}$) & $-$2.6 & 0.3 \\ $K_A$ (km\,s$^{-1}$) & 107.8 & 0.7 \\ $K_B$ (km\,s$^{-1}$) & 118.2 & 0.8 \\ $\omega$ & 2.23& 0.03 \\ $e$ & 0.236 & 0.004 \\ $a\,\sin\,i$ ($R_\odot$) & 50.0 & 0.2 \\ $M\,\sin^3\,i$ ($M_\odot$) & 12.66 & 0.16 \\ $M_{\rm A}\,\sin^3\,i$ ($M_\odot$) & 6.62 & 0.09 \\ $M_{\rm B}\,\sin^3\,i$ ($M_\odot$) & 6.04 & 0.08 \\ $q$ & 0.912 & 0.007 \\ \hline $v\,\sin\,i_{\rm A}$ (km\,s$^{-1}$) & 8 & 3$^a$\\ $v\,\sin\,i_{\rm B}$ (km\,s$^{-1}$) & 11.5 & 4\\ \hline \end{tabular}\\ $^a$ \citet{Shultz2018}. \end{table} Assuming the photometric mass derived by \citet{Landstreet2007}, which is consistent with the spectral type, the orbital inclination is estimated to be around $66^{\circ}$. The derived orbital parameters (see Table~\ref{tab:orbit149277}) reveal that the orbit of HD\,149277 is eccentric and that the rotation of the components is not synchronized. In the case of pseudosynchronization we would expect $P_{\rm pseudosync}=8.92$\,d. The primary component shows strong subsynchronous rotation, most probably caused by magnetic breaking in a system without strong rotation-orbital coupling. Given the mass ratio of 0.912, both components are early B-type stars. The secondary is probably by 1000\,K cooler with a spectral type B3$^-$V. \section{Magnetic field measurements} \label{sec:MF} \begin{figure} \centering \includegraphics[width=\columnwidth, height = 12cm, bb=120 30 495 737]{p5074.eps} \caption{ Variability of the magnetically split Fe\,{\sc iii}~5073.6 line over the rotation period in the disentangled spectra of the primary component. Spectra are vertically offset for better visibility and are sorted in rotational phase (see right side; starting at 0.5) from bottom to top. The red lines represent a double-Gaussian fit to the data. } \label{fig:res} \end{figure} One of the most interesting aspects of the system HD\,149277 is the rather strong magnetic field and slow rotation of its primary component. Our inspection of the ESPaDOnS spectra revealed the presence of several resolved Zeeman split lines. Their presence has not been reported previously. A number of Ap and late-type Bp stars with strong magnetic fields show resolved Zeeman split spectral lines, allowing to set additional constraints on the magnetic field geometry by measuring the mean magnetic field modulus, i.e.\ the average over the visible stellar hemisphere of the modulus of the magnetic field vector, weighted by the local line intensity, following the relation given e.g.\ by \citet{HubrigNesvacil2007} and \citet{Mathys2017}. Such Zeeman split lines can only be seen in stars whose projected rotational velocity is sufficiently small and whose magnetic field is strong enough to exceed the rotational Doppler broadening \citep{Mathys1997}. In Fig.~\ref{fig:res} we present the rotational variability of the resolved Zeeman split Fe\,{\sc iii}~5073.6 line in the primary component. Interestingly, as illustrated in this figure and below in Fig.~\ref{fig:4553}, we observe that in certain phases the Zeeman split lines are asymmetric about the line centers with the blue components appearing less deep than the red components, and with the red components deeper in other phases. Such asymmetries occur in the same way in other transitions, indicating that the rotational Doppler effect is non--negligible, i.e. various parts of the stellar surface characterized by different magnetic field strengths contribute to the line profile. \begin{table} \centering \caption{ Measurements of the mean magnetic field modulus in the primary component of HD\,149277. } \label{tab:MF} \begin{tabular}{ccr@{$\pm$}lr@{$\pm$}l} \hline \multicolumn{1}{c}{HJD} & \multicolumn{1}{c}{Rotational} & \multicolumn{2}{c}{$\left\langle B\right\rangle$} \\ 2\,450\,000+& \multicolumn{1}{c}{Phase} & \multicolumn{2}{c}{(kG)} \\ \hline 6112.3310 & 0.718 & 6.32 & 0.24 \\ 6759.6146 & 0.221 & 7.48 & 0.28 \\ 6760.4658 & 0.255 & 7.27 & 0.30 \\ 6812.3925 & 0.301 & 7.01 & 0.24 \\ 6818.3859 & 0.537 & 5.79 & 0.34 \\ 6821.3857 & 0.655 & 6.08 & 0.36 \\ 6822.3910 & 0.695 & 6.23 & 0.49 \\ 6824.3772 & 0.773 & 6.96 & 0.22 \\ 7225.2883 & 0.569 & 5.00 & 0.37 \\ 7226.2343 & 0.607 & 5.51 & 0.39 \\ 7227.2542 & 0.647 & 5.90 & 0.37 \\ 7228.2936 & 0.688 & 6.01 & 0.41 \\ 7229.3121 & 0.728 & 5.92 & 0.36 \\ 7230.3155 & 0.767 & 6.55 & 0.36 \\ 7231.2850 & 0.806 & 7.60 & 0.32 \\ 7232.3179 & 0.846 & 8.11 & 0.34 \\ 7233.2322 & 0.882 & 8.80 & 0.31 \\ 7234.2364 & 0.922 & 9.03 & 0.24 \\ 7235.2543 & 0.962 & 9.04 & 0.22 \\ 7236.3117 & 0.004 & 8.94 & 0.22 \\ 7604.2298 & 0.500 & 5.64 & 0.23 \\ 7611.2236 & 0.776 & 7.46 & 0.26 \\ 7611.2503 & 0.777 & 6.96 & 0.28 \\ \hline \end{tabular} \end{table} \begin{figure} \centering \includegraphics[width=0.95\columnwidth,height=5.5cm, bb=20 30 557 737]{magfie.eps} \caption{ Mean magnetic field modulus, calculated from the Zeeman split Fe\,{\sc iii}~5073.6 line, over the rotation of the primary component of HD\,149277. } \label{fig:MF} \end{figure} In order to estimate the mean magnetic field modulus, we fitted the line $\lambda$5073.9 with two Gaussian profiles. The position and height of both Zeeman components were considered as free parameters, but the Gaussian width was assumed to be the same for both components in all spectra. The use of a fixed value of Gaussian width gives better results in the spectra with lower S/N and eases to measure the position of the components even if they are blended. The values of the mean magnetic field modulus (see Table~\ref{tab:MF} and Fig.~\ref{fig:MF}) were calculated adopting a Land\'e factor $g_\mathrm{eff}=2.01$, taken from the VALD database \citep{Kupka2011}, and are comprised between 5.0 and 9.0\,kG. These measurements were cross-checked with measurements of the Zeeman split Fe\,{\sc ii}~5018.4 line, which however affected by low S/N and blending with the spectral lines of the secondary in several rotation phases. The maximum of the mean magnetic field modulus coincides roughly with the positive extremum of the longitudinal magnetic field, whereas the minimum of the modulus coincides with the negative extremum of the longitudinal magnetic field. The phase curve for the longitudinal magnetic field is presented in Fig.~A20 in the work of \citet{Shultz2018}. Future spectroscopic monitoring at higher S/N will be worthwhile to better characterize the variability of the mean magnetic field modulus in this component. No evidence for a longitudinal magnetic field was seen in the circularly polarized spectra of the secondary component. \section{Spectral and photometric variability} \begin{figure} \centering \includegraphics[width=\columnwidth,height=10cm]{pSiIII_A.eps} \caption{ Variability of three \ion{Si}{iii} line profiles in the disentangled spectra of the primary component of HD\,149277. Labels on the right refer to the rotational phases calculated with $P_{\rm rot}$ and $JD0$ given by \citet{Shultz2018}. The spectra have been shifted vertically for better visibility. The spectra of the faintest line $\lambda$4575 have been scaled by a factor 2. The lower panels show the mean profile and the RMS of residuals (scaled $\times$5) } \label{fig:4553} \end{figure} Like other magnetic Bp stars, HD\,149277 exhibits distinct changes in the line profiles of different elements, probably caused by an inhomogeneous element distribution on the stellar surface. As an example, nitrogen lines become stronger at the phases conciding with the negative extremum of the longitudinal magnetic field. The clearest variations are observed in the profiles of the \ion{Si}{iii} lines. The behaviour of three \ion{Si}{iii} line profiles in the disentangled spectra of the primary is presented in Fig.~\ref{fig:4553}. \begin{figure} \centering \includegraphics[width=0.95\columnwidth,height=10cm,angle=0]{SiIIIsec1.eps} \caption{Line profile of \ion{Si}{iii}~4553 in the disentangled spectra of the secondary component of HD\,149277. The spectra are ordered by JD from bottom to top. The spectra of the faintest line $\lambda$4575 have been scaled by a factor 2. The lower panels show the mean profile and the RMS of residuals (scaled $\times$10) } \label{fig:sec} \end{figure} Since spectral lines of the secondary component are weaker and in many cases are overlapped with variable lines of the primary, the existence of spectral variability cannot definitely be established. In Fig.~\ref{fig:sec} we present the profiles of the \ion{Si}{iii}~4553 line recorded in the spectra of the secondary component on different orbital phases. Missing parts in the spectra correspond to the position of spectral lines of the primary star (all lines deeper than 1\% of the continuum level). Since lines of the primary are certainly variable these regions were not considered in the calculation of the RMS (lower panel). The rotation period of this component could probably be determined from observed line profile variations, provided higher S/N spectra of this system are recorded in future observations. An analysis of the spectral variability of the secondary is of special interest: for the majority of the previously studied close binary systems with $P_{\rm orb} \le 20$\,d possessing one magnetic or chemically peculiar spectrum variable component, the other component is usually an Am star or a normal A or B-type star. To our knowledge, there are only three exceptions: the system 41\,Eri consisting of two spectrum variable HgMn stars \citep{Hubrig2012}, the system HD\,161701 consisting of a spectrum variable HgMn star and a magnetic Ap star \citep{Hubrig2014}, and the system HD\,136504 consisting of two magnetic Bp stars. The magnetic field in the primary of HD\,136504 was detected in low-resolution FORS\,2 observations by \citet{Hubrig2010}, while the discovery of a magnetic field in the secondary was announced by \citet{Shultz2015}. \begin{figure} \centering \includegraphics[width=0.9\columnwidth,height=5.2cm]{pdg1.eps} \includegraphics[width=0.9\columnwidth,height=5.2cm]{lc.eps} \caption{ Photometric variability of the primary. Upper panel: Periodogram obtained using the ASAS3 database. Lower panel: The ASAS3 light curve using $P_{\rm phot}=25.390$\,d. } \label{fig:phot_var} \end{figure} He-rich stars and chemically peculiar stars usually exhibit photometric variability due to the presence of surface chemical abundance spots. Therefore, rotation periods can also be determined from photometry. Using archival data from the ASAS3 survey\footnote{http://www.astrouw.edu.pl/asas/} \citep{Pojmanski1997}, we find in the frequency spectrum only one significant peak, $P_{\rm phot}=25.390 \pm 0.014$\,d (see Fig.~\ref{fig:phot_var}). This value is in good agreements with the previous determination of the rotation period, $P_{\rm rot}=25.380\pm0.007$\,d by \citet{Shultz2018}, which was based on longitudinal magnetic field measurements. The photometric variability of this object with a light curve amplitude of 0.010$\pm$0.005\,mag is reported here for the first time. \section{Discussion} The analysis of the system HD\,149277 is of considerable interest as close main sequence SB2 systems only very rarely contain a magnetic Ap or Bp star as a component. We determined the orbital parameters of the system and studied a few characteristics of the individual components, such as spectroscopic and photometric variability. Similar to a few other SB2 systems with magnetic Bp components compiled in Table~5 in the work of \citet{Landstreet2017}, the orbit is quite eccentric with $e=0.237$, but the rotation period of the primary is the longest among the studied systems. The more massive of the two stars is rotating subsynchronously and exhibits a strongly variable magnetic field modulus. Among the previously studied SB2 systems, the primary in HD\,149277 exhibits the strongest magnetic field and the strongest subsynchronous rotation. The less massive component is apparently non-magnetic, but probably shows spectral variability, which should be analysed in more detail in future higher S/N observations. Such future high S/N observations should also be used to constrain the structure of the magnetic field of the primary in more detail. We note that studies of strongly magnetic stars using the mean magnetic field modulus, measured using magnetically resolved lines, are of importance because they provide the best opportunity to study the effect of a magnetic field on stellar atmospheres. At present, 84~Ap stars are known to show magnetically resolved lines, representing 2.3\% of the total number of known Ap stars \citep{Mathys2017}. The sample of early-type massive Bp stars currently consists of just three members (Hubrig et al., {\sl in preparation}). \section*{Acknowledgements} This work has made use of the VALD database, operated at Uppsala University, the Institute of Astronomy RAS in Moscow, and the University of Vienna. Based on observations made with ESO Telescopes at the La Silla Paranal Observatory under programme ID 079.D-0118(A). JFG thanks financial support from CONICET (PIP 0331) and the Universidad Nacional de San Juan (Proyecto CICITCA), Argentina
\section{Introduction} Black holes are among the most intriguing concepts of general relativity, which could have a deep impact upon the understanding of quantum gravity. Understanding the statistical mechanics of black holes has been a subject of intensive study for several decades. In the pioneering work \cite{IN-Hawking:1974sw,IN-Bekenstein:1972tm,IN-Bekenstein:1973ur}, Hawking and Bekenstein found that black holes possess the temperature and the entropy. Analogous to the laws of thermodynamics, the four laws of black hole mechanics were established in \cite{IN-Bardeen:1973gs}. Studying the phase transitions of AdS black holes is primarily motivated by AdS/CFT correspondence \cite{IN-Maldacena:1997re}. Hawking and Page showed that a first-order phase transition occurs between Schwarzschild AdS black holes and thermal AdS space \cite{IN-Hawking:1982dh}, which was later understood as a confinement/deconfinement phase transition in the context of the AdS/CFT correspondence \cite{IN-Witten:1998zw}. For Reissner-Nordstrom (RN) AdS black holes, authors of \cite{IN-Chamblin:1999tk,IN-Chamblin:1999hg} showed that their critical behavior is similar to that of a Van der Waals liquid gas phase transition. Later, the asymptotically AdS black holes have been studied in the context of extended phase space thermodynamics, where the cosmological constant is interpreted as thermodynamic pressure \cite{IN-Dolan:2011xt,IN-Kubiznak:2012wp}. In this case, the black hole mass should be understood as enthalpy instead of the internal energy \cite{IN-Kastor:2009wy}. The $P$-$V$ criticality study has been explored for various AdS black holes \cite{IN-Wei:2012ui,IN-Cai:2013qga,IN-Xu:2014kwa,IN-Frassino:2014pha,IN-Dehghani:2014caa,IN-Hennigar:2015esa . It showed that the $P$-$V$ critical behaviors of AdS black holes are similar to that of a Van der Waals liquid gas system. A reentrant phase transition occurs if, as one monotonically changes a thermodynamic variable, the system undergoes two (or more) phase transitions and returns to a state macroscopically similar to the initial state. In the context of the extended phase space, the reentrant phase transition has been observed for some AdS black holes, e.g., 4D BI-AdS black holes \cite{IN-Gunasekaran:2012dq}, higher dimensional singly spinning Kerr-AdS black holes \cite{IN-Altamirano:2013ane}, AdS black holes in Lovelock gravity \cite{IN-Frassino:2014pha}, AdS black holes in dRGT massive gravity \cite{IN-Zou:2016sab}, hairy AdS black holes \cite{IN-Hennigar:2015wxa}.\ Nonlinear electrodynamics (NLED) is an effective model incorporating quantum corrections to Maxwell electromagnetic theory. Coupling NLED to gravity, various NLED charged black holes were derived and discussed in a number of papers \cite{IN-Soleng:1995kn,IN-AyonBeato:1998ub,IN-Maeda:2008ha,IN-Hendi:2017mgb,IN-Tao:2017fsy,IN-Guo:2017bru,IN-Mu:2017usw . The thermodynamics of NLED black holes in the extended phase space have been considered in literature, e.g., power Maxwell invariant black holes \cite{IN-Hendi:2012um,IN-Mo:2016jqd,IN-Yerra:2018mni}, non-linear magnetic-charged dS black hole \cite{IN-Nam:2018tpf}. Among the various NLED, there is a famous string-inspired one: Born-Infeld electrodynamics, which encodes the low-energy dynamics of D-branes. Born-Infeld electrodynamics incorporates maximal electric fields and smooths divergences of the electrostatic self-energy of point charges. The Born-Infeld AdS (BI-AdS) black hole solution was first obtained in \cite{IN-Dey:2004yt,IN-Cai:2004eh}. The thermodynamic behavior and phase transitions of BI-AdS black holes were studied in the canonical ensemble \cite{IN-Fernando:2003tz} and in the grand ensemble \cite{IN-Fernando:2006gh}. The critical behavior and thermodynamics of BI-AdS black holes in various gravities were also investigated in \cite{IN-Banerjee:2010da,IN-Banerjee:2011cz,IN-Lala:2011np,IN-Banerjee:2012zm,IN-Azreg-Ainou:2014twa,IN-Hendi:2015hoa,IN-Zangeneh:2016fhy,IN-Zeng:2016sei,IN-Li:2016nll . In the extended phase space, the thermodynamic phase structure and critical behavior of 4D and higher dimensional BI-AdS black holes were studied in \cite{IN-Gunasekaran:2012dq,IN-Zou:2013owa}, respectively. In \cite{IN-Dehyadegari:2017hvd}, the thermodynamics of 4D BI-AdS black holes has recently been discussed in the case, in which the charge of the black hole varies and the pressure is fixed. The reentrant phase transition has been observed in 4D BI-AdS black holes while there was no reentrant phase transition for the system of higher dimensional BI-AdS black holes. Although the properties of BI-AdS black holes are thoroughly investigated in literature, their electrical stabilities have been rarely reported. Recently, a new type of NLED black holes, namely iBorn-Infeld AdS (iBI-AdS) black holes, have been considered in \cite{IN-Baggioli:2016oju} as holographic models behaving as prototypes of Mott insulators. The Lagrangian of the iBorn-Infeld field can be obtained from that of the Born-Infeld field by extending the BI parameter ($a$ in eqn. $\left( \ref{eq:BI}\right) $) to a negative real number. In \cite{IN-Wang:2018hwg}, it showed that the nonlinearity correction tends to reduce/increase the strength of the repulsive force between two electrons for the Born-Infeld/iBorn-Infeld field. So it is natural to expect that the iBI-AdS black hole is dual to a theory with strong interactions between electrons, which could lead to Mott-like behavior. Moreover, negative magneto-resistance and the Mott insulator to metal transition induced by a magnetic field can be realized at low temperatures in the iBorn-Infeld holographic models. Compared to the Born-Infeld case, the iBorn-Infeld case leads to a much richer transport behavior in the dual theory. As shown in \cite{IN-Baggioli:2016oju}, iBI-AdS black holes satisfy the constraints to ensure consistency in the form of ghosty perturbations and/or gradient instabilities at the decoupling limit. However, the thermodynamic behavior and phase structure of iBI-AdS black holes have yet to be discussed. In this paper, we first investigate the thermodynamic behavior of\ generic NLED black holes in the extended phase space. Then, we turn to study the phase structure and critical behavior of BI-AdS and iBI-AdS black holes by studying the phase diagrams in the $Q/l$-$a/l^{2}$ plane. The rest of this paper is organized as follows. In section \ref{Sec:NBH}, we derive the NLED black hole solution, compute its Euclidean action and discuss thermodynamic properties of the black hole. We find that the Smarr relation is satisfied after including dimensionful couplings in NLED in the extended phase space. In section \ref{Sec:BIABH}, we study the phase structure and critical behavior of BI-AdS black holes. The phase diagram for BI-AdS black holes in the $Q/l$-$a/l^{2}$ plane is given in FIG. \ref{fig:DBIQa}, from which one can read the black hole's phase structure and critical behavior. We further explore thermal and electrical stabilities of BI-AdS black holes. In section \ref{Sec:iBIABH}, the phase structure and critical behavior of iBI-AdS black holes are investigated, which can be inferred from the phase diagram in the $Q/l$-$a/l^{2}$ plane, FIG. \ref{fig:iDBIQa}. We also study thermal and electrical stabilities of iBI-AdS black holes. We summarize our results in section \ref{Sec:Con}. In appendix, we present an alternative derivation of the Smarr relation for NLED black holes. \section{NLED Black Hole} \label{Sec:NBH} In this section, we first derive the asymptotically AdS black hole solution in the Einstein-NLED gravity. After its Gibbs free energy is obtained via calculating the Euclidean action, we then discuss the thermodynamic properties of the black hole, e.g., Smarr relation, stability. \subsection{Black Hole Solution} Consider a 4-dimensional model of gravity coupled to a nonlinear electromagnetic field $A_{\mu}$ with the action given b \begin{equation} S_{\text{Bulk}}=\int d^{4}x\sqrt{-g}\left[ R-2\Lambda+\mathcal{L}\left( s,a_{i}\right) \right] , \label{eq:Action \end{equation} where the cosmological constant $\Lambda=-\frac{3}{l^{2}}$, and we take $16\pi G=1$ for simplicity. In the action $\left( \ref{eq:Action}\right) $, we assume that the generic NLED Lagrangian $\mathcal{L}\left( s,a_{i}\right) $ is a function of $s$ and the parameters $a_{i}$, where we build an independent nontrivial scalar using $F_{\mu\nu}=\partial_{\mu}A_{\nu}-\partial_{\nu A_{\mu}$ and none of its derivatives: \begin{equation} s=-\frac{1}{4}F^{\mu\nu}F_{\mu\nu}\text{. \end{equation} The parameters $a_{i}$ characterize the effects of nonlinearity in the NLED. We also assume that the NLED Lagrangian would reduce to the Maxwell Lagrangian for small fields \begin{equation} \mathcal{L}\left( s,a_{i}\right) \approx s. \end{equation} Varying the action $\left( \ref{eq:Action}\right) $ with respect to $g_{ab}$ and $A_{a}$, we find that the equations of motion ar \begin{align} R_{\mu\nu}-\frac{1}{2}Rg_{\mu\nu}-\frac{3}{l^{2}}g_{\mu\nu} & =\frac {T_{\mu\nu}}{2}\text{,}\nonumber\\ \nabla_{\mu}G^{\mu\nu} & =0\text{, \end{align} where $T_{\mu\nu}$ is the energy-momentum tensor \begin{equation} T_{\mu\nu}=g_{\mu\nu}\mathcal{L}\left( s,a_{i}\right) +\frac{\partial \mathcal{L}\left( s,a_{i}\right) }{\partial s}F_{\mu}^{\text{ }\rho F_{\nu\rho}\text{, \end{equation} and we define the auxiliary fields $G^{\mu\nu}$: \begin{equation} G^{\mu\nu}=-\frac{\partial\mathcal{L}\left( s,a_{i}\right) }{\partial F_{\mu\nu}}=\frac{\partial\mathcal{L}\left( s,a_{i}\right) }{\partial s}F^{\mu\nu}. \label{eq:Gab \end{equation} \ To construct a black hole solution with asymptotic AdS spacetime, we take the following ansatz for the metric and the NLED fiel \begin{align} ds^{2} & =-f\left( r\right) dt^{2}+\frac{dr^{2}}{f\left( r\right) }+r^{2}\left( d\theta^{2}+\sin^{2}\theta d\phi^{2}\right) \text{, \nonumber\\ A & =A_{t}\left( r\right) dt\text{.} \label{eq:ansatz \end{align} The equations of motion then take the form \begin{align} -1+f\left( r\right) -\frac{3r^{2}}{l^{2}}+rf^{\prime}\left( r\right) & =\frac{r^{2}}{2}\left[ \mathcal{L}\left( s,a_{i}\right) +A_{t}^{\prime }\left( r\right) G^{rt}\right] ,\label{eq:ttEOM}\\ 2f^{\prime}\left( r\right) -\frac{6r}{l^{2}}+rf^{\prime\prime}\left( r\right) & =r\mathcal{L}\left( s,a_{i}\right) ,\label{eq:rrEOM}\\ \left[ r^{2}G^{rt}\right] ^{\prime} & =0\text{,} \label{eq:NLEDEOM \end{align} wher \begin{equation} s=\frac{A_{t}^{\prime2}\left( r\right) }{2}\text{ and }G^{rt}=-\frac {\partial\mathcal{L}\left( s,a_{i}\right) }{\partial s}A_{t}^{\prime}\left( r\right) \text{.} \label{eq:sGrt \end{equation} It can show that eqn. $\left( \ref{eq:rrEOM}\right) $ can be derived from eqns. $\left( \ref{eq:ttEOM}\right) $ and $\left( \ref{eq:NLEDEOM}\right) $. Eqn. $\left( \ref{eq:NLEDEOM}\right) $ leads t \begin{equation} G^{tr}=\frac{q}{r^{2}}\text{,} \label{eq:Grt \end{equation} where $q$ is a constant. Via eqns. $\left( \ref{eq:sGrt}\right) $ and $\left( \ref{eq:Grt}\right) $, $A_{t}^{\prime}\left( r\right) $ is determined b \begin{equation} \mathcal{L}^{\prime}\left( \frac{A_{t}^{\prime2}\left( r\right) }{2 ,a_{i}\right) A_{t}^{\prime}\left( r\right) =\frac{q}{r^{2}}. \label{eq:QAt \end{equation} Moreover, integrating eqn. $\left( \ref{eq:rrEOM}\right) $ leads to \begin{equation} f\left( r\right) =1-\frac{m}{r}+\frac{r^{2}}{l^{2}}-\frac{1}{2r}\int _{r}^{\infty}drr^{2}\left[ \mathcal{L}\left( \frac{A_{t}^{\prime2}\left( r\right) }{2},a_{i}\right) -A_{t}^{\prime}\left( r\right) \frac{q}{r^{2 }\right] , \end{equation} where $m$ is a constant. For large values of $r$, one finds tha \begin{equation} f\left( r\right) =1-\frac{m}{r}+\frac{r^{2}}{l^{2}}+\frac{q^{2}}{4r^{2 }+\mathcal{O}\left( r^{-4}\right) , \label{eq:f(r)LV \end{equation} which reduces to the behavior of a RN-AdS black hole. At the horizon $r=r_{+}$ where $f\left( r_{+}\right) =0$, the Hawking temperature of the black brane is given b \begin{equation} T=\frac{f^{\prime}\left( r_{+}\right) }{4\pi}\text{. \end{equation} Hence at $r=r_{+}$, eqn. $\left( \ref{eq:ttEOM}\right) $ give \begin{equation} T=\frac{1}{4\pi r_{+}}\left\{ 1+\frac{3r_{+}^{2}}{l^{2}}+\frac{r_{+}^{2} {2}\left[ \mathcal{L}\left( \frac{A_{t}^{\prime2}\left( r_{+}\right) {2},a_{i}\right) -A_{t}^{\prime}\left( r_{+}\right) \frac{q}{r_{+}^{2 }\right] \right\} . \label{eq:HT \end{equation} The charge $Q$ of the black hole can be expressed in terms of the constants $q$. In fact, if we turn on the the external current $J^{\mu}$, the action would include an interaction term: \begin{equation} S_{I}=4\pi\int d^{4}x\sqrt{-g}J^{\mu}A_{\mu}, \end{equation} and hence the equation of motion for $A_{\mu}$ become \begin{equation} \nabla_{\nu}G^{\mu\nu}=4\pi J^{\mu}. \label{eq:GJ \end{equation} The charge passing through a spacelike hypersurface $\Sigma$ is given b \begin{equation} Q=-\int_{\Sigma}d^{3}x\sqrt{\gamma}\sigma_{\mu}J^{\mu}, \end{equation} where $\gamma_{ij}$ is the induced metric, and $\sigma^{\mu}$ is the unit normal vector of $\Sigma$. Using Stokes's theorem and eqn. $\left( \ref{eq:GJ}\right) $, we can express the charge as a boundary integral \begin{equation} Q=-\frac{1}{4\pi}\int_{\partial\Sigma}d^{2}x\sqrt{\tilde{\gamma}}n_{\mu \sigma_{\nu}G^{\mu\nu}, \label{eq:QI \end{equation} where $\partial\Sigma$ is the boundary of $\Sigma$, $\tilde{\gamma}_{ij}$ is the induced metric, and $n_{\mu}$ is the unit outward-pointing normal vector. For the metric in eqn. $\left( \ref{eq:ansatz}\right) $, $\Sigma$ and $\partial\Sigma$ can be a constant-$t$ hypersurface and a two-sphere at $r=\infty$, respectively. In this case, one ha \begin{equation} \sigma_{\mu}=\left( -f^{1/2},0,0,0\right) \text{ and }n_{\mu}=\left( 0,f^{-1/2},0,0\right) \text{. \end{equation} Thus, the charge of the black hole given by eqn. $\left( \ref{eq:QI}\right) $ become \begin{equation} Q=\frac{1}{4\pi}\int d\theta d\phi r^{2}\sin\theta\frac{q}{r^{2}}=q, \end{equation} where we use eqn. $\left( \ref{eq:Grt}\right) $. The gauge potential measured with respect to the horizon i \begin{equation} \Phi=4\pi\int_{r_{+}}^{\infty}A_{t}^{\prime}\left( r\right) =4\pi A_{t}\left( \infty\right) , \label{eq:potential \end{equation} where we fix the gauge field $A_{t}\left( r\right) $ at the horizon to be zero, i.e., $A_{t}\left( r_{+}\right) =0$. The electrostatic potential $\Phi$ plays a role as the conjugated variable to $Q$ in black hole thermodynamics. For asymptotically AdS spaces, the mass may be extracted by comparison to a reference background, e.g., vacuum AdS. Similar to the charge of the black hole, the mass can also be determined by the Komar integra \begin{equation} M=4\int d\theta d\phi r^{2}\sin\theta\left( \sigma_{\mu}n_{\nu}\nabla^{\mu }K^{\nu}\right) -M_{\text{AdS}}, \end{equation} where $K^{\mu}=\left( 1,0,0,0\right) $ is the Killing vector associated with $t$, and $M_{\text{AdS}}$ is Komar integral associated with $K^{\mu}$ for vacuum AdS spac \begin{equation} M_{\text{AdS}}=4\int d\theta d\phi r^{2}\sin\theta\left( \frac{r}{l^{2 }\right) . \end{equation} At spatial infinity, one can use eqn. $\left( \ref{eq:f(r)LV}\right) $ to calculat \begin{equation} \sigma_{\mu}n_{\nu}\nabla^{\mu}K^{\nu}=\frac{1}{2}f^{\prime}\left( r\right) =\frac{m}{2r^{2}}+\frac{r}{l^{2}}+\mathcal{O}\left( r^{-3}\right) . \end{equation} So the mass of the black hole i \begin{equation} M=8\pi m. \end{equation} \subsection{Euclidean Action Calculation} In the Euclidean path integral approach to quantum gravity \cite{NELDBH-Hawking:1978jz,NELDBH-Gibbons:2002du}, one can identify the Euclidean path integral with the thermal partition function \[ Z=\int\mathcal{D}ge^{-S^{E}\left( g\right) }. \] In the semiclassical approximation, the dominant contribution to the path integral comes from the classical solution, and hence one ha \begin{equation} Z\simeq e^{-S^{E}}. \end{equation} Here, $S^{E}$ is the on-shell action which is obtained by substituting the classical solution to the action. In asymptotically AdS spaces, $S^{E}$ needs to be regulated to cancel the divergences coming from the asymptotic region. In the background-substraction method, one can regularize $S^{E}$ by subtracting a contribution from a reference background. In \cite{NELDBH-Chamblin:1999hg}, the background-substraction method was used to compute $S^{E}$ for RN-AdS black holes. On the other hand, there is the counterterm subtraction method \cite{NELDBH-Balasubramanian:1999re,NELDBH-Emparan:1999pm}, in which the action $S^{E}$ is regularized in a background-independent fashion by adding a series of boundary counterterms to the action. Specifically, the Kounterterms method \cite{NELDBH-Olea:2005gb,NELDBH-Olea:2006vd} has been proposed as a regularization scheme for gravity in asymptotically AdS spaces. In \cite{NELDBH-Miskovic:2008ck}, the Euclidean action was computed for black hole solutions of AdS gravity coupled to the Born-Infeld electrodynamics using the Kounterterms method. We now follow the method in \cite{NELDBH-Miskovic:2008ck} to calculate the Euclidean action for the asymptotically AdS NLED black hole solution $\left( \ref{eq:ansatz}\right) $ in canonical ensemble, in which the temperature and charge of the black hole are fixed. The regularized action is then given b \begin{equation} S_{R}=S_{\text{Bulk}}+S_{\text{ct}}+S_{\text{surf} \end{equation} where the boundary terms ar \begin{equation} S_{\text{ct}}=\frac{l^{2}}{4}\int d^{3}yB_{3}\text{ and }S_{\text{surf}}=-\int d^{3}y\sqrt{\gamma}n_{\nu}G^{\mu\nu}A_{\mu}, \end{equation} $B_{3}$ is the 2nd Chern form, and $n^{\mu}$ is the unit outward-pointing normal vector of the boundary. Since the asymptotically AdS spacetime has constant curvature in the asymptotic region, it showed in \cite{NELDBH-Miskovic:2008ck} that after including the boundary term $S_{\text{ct}}$, the action was stationary around the classical solution under arbitrary variations of the metric $g_{\mu\nu}$. To keep the charge of the black hole fixed instead of the potential, the boundary term $S_{\text{surf}}$ has to be added. In fact, varying the action with respect to $A_{\mu}$ give \[ \delta S_{R}=\text{EOM}-\int d^{3}y\sqrt{\gamma}n_{\nu}\delta G^{\mu\nu A_{\mu}=\text{EOM}-\int d^{3}y\frac{\sqrt{h}n_{r}A_{t}}{r^{2}}\delta Q. \] For the Euclidean continuation of the action $S^{E}=iS_{R}$, the horizon at $r=r_{+}$ is shrunk to a point, and the manifold spans between $r=r_{+}$ and $r=\infty$. To avoid a conical singularity at the origin of the radial coordinate, one requires to identify the Euclidean time $\tau=-it$ as $\tau\sim\tau+\beta$, where the period $\beta=T^{-1}$ is the inverse of the Hawking temperature $T$. The Euclidean continuation of the counter term $S_{\text{ct}}$ was calculated in \cite{NELDBH-Miskovic:2008ck} \begin{equation} S_{\text{ct$\;$}}^{E}=-4\pi\beta l^{2}f^{\prime}\left( r\right) \left[ f\left( r\right) -1\right] |_{r=\infty}. \end{equation} The bulk action is \begin{equation} S_{\text{Bulk}}^{E}=-\int_{0}^{\beta}d\tau\int d\Omega\int_{r_{+}}^{\infty }drr^{2}\left[ R+\frac{6}{l^{2}}+\mathcal{L}\left( s,a_{i}\right) \right] =4\pi\beta\left[ r^{2}f^{\prime}\left( r\right) \right] |_{r_{+}}^{\infty }-\beta q\Phi, \end{equation} where we use eqns. $\left( \ref{eq:rrEOM}\right) $ and $\left( \ref{eq:potential}\right) $. The boundary term $S_{\text{surf}}^{E}$ is \begin{equation} S_{\text{surf}}^{E}=\int_{0}^{\beta}d\tau\int d\Omega f^{1/2}\left( r\right) r^{2}\sin\theta\left( n_{\nu}G^{\mu\nu}A_{\mu}\right) |_{r=\infty}=\beta q\Phi, \end{equation} where we use eqn. $\left( \ref{eq:potential}\right) $, $f\left( r\right) \rightarrow1$ as $r\rightarrow\infty$, and $n_{\mu}=\left( 0,f^{-1/2 ,0,0\right) .$ To sum up all terms, the Euclidean action $S^{E}$ is given by \begin{equation} S^{E}=-16\pi^{2}r_{+}^{2}+4\pi\beta\left\{ r^{2}f^{\prime}\left( r\right) -l^{2}f^{\prime}\left( r\right) \left[ f\left( r\right) -1\right] \right\} |_{r=\infty}=\beta\left( M-TS\right) , \end{equation} where the entropy of the black hole is \begin{equation} S=16\pi^{2}r_{+}^{2}, \end{equation} and eqn. $\left( \ref{eq:f(r)LV}\right) $ give \begin{equation} \lim_{r\rightarrow\infty}\left\{ r^{2}f^{\prime}\left( r\right) -l^{2}f^{\prime}\left( r\right) \left[ f\left( r\right) -1\right] \right\} =2m. \end{equation} Since the Euclidean action is calculated at fixed $Q$, $P\left( =6/l^{2}\right) $ and $T$, we can associate it with the Gibbs free energy \begin{equation} F=M-TS. \end{equation} \subsection{Thermodynamic} Here, we study the thermodynamics of the NLED AdS black hole solution in the extended phase space. In such perspective on black hole thermodynamics, one needs to include the cosmological constant $\Lambda$ as a pressure term and interpret the mass of the black hole as a gravitational version of chemical enthalpy. Furthermore, as noted in Lovelock gravity \cite{NELDBH-Kastor:2010gq} and Born-Infeld electrodynamics \cite{IN-Gunasekaran:2012dq}, any dimensionful coupling should be promoted to a thermodynamic variable and hence introduce the associated conjugate, which would add an extra term in the first law and Smarr relation. In terms of the horizon radius $r_{+}$, the mass $M$ can be written a \begin{equation} M=8\pi\left\{ r_{+}+\frac{r_{+}^{3}}{l^{2}}-\frac{1}{2}\int_{r_{+}}^{\infty }drr^{2}\left[ \mathcal{L}\left( \frac{A_{t}^{\prime2}\left( r\right) {2},a_{i}\right) -A_{t}^{\prime}\left( r\right) \frac{Q}{r^{2}}\right] \right\} . \label{eq:Mass \end{equation} So the derivatives of the mass in terms of the entropy and the charge are, respectively, \begin{equation} \frac{\partial M}{\partial S}=\frac{1}{4\pi r_{+}}\frac{\partial m}{\partial r_{+}}=T\text{, \end{equation} and \begin{equation} \frac{\partial M}{\partial Q}=8\pi\left[ -\frac{1}{2}\int_{r_{+}}^{\infty }drr^{2}\mathcal{L}^{\prime}\left( \frac{A_{t}^{\prime2}\left( r\right) }{2},a_{i}\right) A_{t}^{\prime}\left( r\right) \frac{\partial A_{t}^{\prime}\left( r\right) }{\partial Q}+\frac{\Phi}{8\pi}+\frac{Q}{8\pi }\frac{\partial\Phi}{\partial Q}\right] =\Phi, \end{equation} where we use eqns. $\left( \ref{eq:QAt}\right) $ and $\left( \ref{eq:potential}\right) $. Since the pressure $P=6/l^{2}$, one ha \begin{equation} \frac{\partial M}{\partial P}=\frac{4\pi}{3}r_{+}^{3}\equiv V\text{, \end{equation} where $V$ is the thermodynamic volume. For dimensionful couplings $a_{i}$ in $\mathcal{L}\left( s,a_{i}\right) $, we can introduce the associated conjugates $\mathcal{A}_{i}$ \begin{equation} \mathcal{A}_{i}=\frac{\partial M}{\partial a_{i}}. \end{equation} Therefore, the extended first law takes the for \begin{equation} dM=TdS+VdP+\Phi dQ+\sum\limits_{i}\mathcal{A}_{i}da_{i}. \label{eq:firstLaw \end{equation} Performing the dimensional analysis, we assume that $\left[ a_{i}\right] =L^{c_{i}}$. The Euler scaling argument \cite{NELDBH-Kastor:2009wy} gives the Smarr relation for the black hole \begin{equation} M=2\left( TS-VP\right) +\sum\limits_{i}c_{i}a_{i}\mathcal{A}_{i}+Q\Phi. \end{equation} As a check, the Smarr relation are derived directly from the definitions of the thermodynamic quantities of the black hole in the appendix. Till now, our expressions for the thermodynamics quantities, e.g., the Gibbs free energy $F$, the enthalpy $M$, are functions of the horizon radius $r_{+}$ (the entropy $S$), the charge $Q$ and the pressure $P$ (the AdS radius $l$). However, in canonical ensemble with fixed $T$, $Q$ and $P$, we need to express the thermodynamics quantities in terms of $T$, $Q$ and $P$. In doing so, the equation of state $\left( \ref{eq:HT}\right) $ is solved for $r_{+}$: $r_{+}=r_{+}\left( T,Q,P,a_{i}\right) $. Interestingly, the equation of state $\left( \ref{eq:HT}\right) $ can be rewritten a \begin{equation} \tilde{T}=\frac{1}{4\pi\tilde{r}_{+}}\left\{ 1+3\tilde{r}_{+}^{2}+\frac{1 {2}\tilde{r}_{+}^{2}\left[ \mathcal{L}\left( \frac{\tilde{A}_{t}^{\prime 2}\left( \tilde{r}_{+}\right) }{2},\tilde{a}_{i}\right) -\tilde{A _{t}^{\prime}\left( \tilde{r}_{+}\right) \frac{\tilde{Q}}{\tilde{r}_{+}^{2 }\right] \right\} , \label{eq:Ttildal \end{equation} where we defin \begin{equation} \tilde{T}=Tl\text{, }\tilde{r}_{+}=r_{+}/l\text{, }\tilde{Q}=Q/l\text{, }\tilde{a}_{i}=a_{i}l^{-c_{i}}\text{ and }\tilde{A}_{t}^{\prime}\left( r_{+}\right) =lA_{t}^{\prime}\left( r_{+}\right) \text{, \end{equation} and $\tilde{A}_{t}^{\prime}\left( r_{+}\right) $ is determined b \begin{equation} \mathcal{L}^{\prime}\left( \frac{\tilde{A}_{t}^{\prime}\left( r_{+}\right) }{2},\tilde{a}_{i}\right) \tilde{A}_{t}^{\prime}\left( r_{+}\right) =\frac{\tilde{Q}}{\tilde{r}_{+}^{2}}. \end{equation} Solving eqn. $\left( \ref{eq:Ttildal}\right) $, we find that $\tilde{r}_{+}$ can be expressed as a function of $\tilde{T}$, $\tilde{Q}$ and $\tilde{a}_{i $: $\tilde{r}_{+}=\tilde{r}_{+}(\tilde{T},\tilde{Q},\tilde{a}_{i})$. With $\tilde{r}_{+}=\tilde{r}_{+}(\tilde{T},\tilde{Q},\tilde{a}_{i})$, we can express the thermodynamic quantities in terms of $\tilde{T},\tilde{Q}$ and $\tilde{a}_{i}$, e.g., the Gibbs free energy is given b \[ \tilde{F}\equiv F/l=\tilde{F}(\tilde{T},\tilde{Q},\tilde{a}_{i}). \] \begin{figure}[tb] \begin{center} \subfigure[{~\scriptsize Branches around a local minimum of $\tilde{T}=\tilde{T}_{\min}$.}]{ \includegraphics[width=0.95\textwidth]{Min.eps}\label{fig:M:a}} \subfigure[{~\scriptsize Branches around a local maximum of $\tilde{T}=\tilde{T}_{\max}$.}]{ \includegraphics[width=0.95\textwidth]{Max.eps}\label{fig:M:b}} \end{center} \caption{{\footnotesize Branches of black holes around local extremums of $\tilde{T}=\tilde{T}_{\min}$ and $\tilde{T}=\tilde{T}_{\max}$. Right panels: Gibbs free energy vs temperature. The blue branches are thermodynamically preferred and thermally stable. The red ones are thermally unstable. As $\tilde{T}\rightarrow\tilde{T}_{\max}/\tilde{T}_{\min}$, the red/blue branches become electrically stable/unstable.} \label{fig:M \end{figure} The rich phase structure of the black hole comes from solving eqn. $\left( \ref{eq:Ttildal}\right) $, i.e., $\tilde{T}=\tilde{T}(\tilde{r}_{+},\tilde {Q},\tilde{a}_{i})$, for $\tilde{r}_{+}$. If $\tilde{T}(\tilde{r}_{+ ,\tilde{Q},\tilde{a}_{i})$ is a monotonic function with respect to $\tilde {r}_{+}$ for some values of $\tilde{Q}$ and $\tilde{a}_{i}$, there would be only one branch for the black hole. More often, with fix $\tilde{Q}$ and $\tilde{a}_{i}$, there exists a local minimum/maximum for $\tilde{T}(\tilde {r}_{+},\tilde{Q},\tilde{a}_{i})$ at $\tilde{r}_{+}=\tilde{r}_{+,\min /\tilde{r}_{+}=\tilde{r}_{+,\max}$. In this case, there are more than one branch for the black hole. In FIG. \ref{fig:M:a}, we plot two branches, namely small BH and large BH, around a local minimum of $\tilde{T}=\tilde{T}_{\min}$. The Gibbs energy of these two branches is displayed in the right panel of FIG. \ref{fig:M:a}. Since $\partial\tilde{F}(\tilde{T},\tilde{Q},\tilde{a _{i})/\partial\tilde{T}=-16\pi^{2}\tilde{r}_{+}^{2}$, the upper branch is small BH while lower one is large BH, which means that the large BH branch is thermodynamically preferred. Similarly, two branches around a local maximum of $\tilde{T}=\tilde{T}_{\max}$, small BH and large BH, are shown in FIG. \ref{fig:M:b}. The upper/lower branch in the right panel of FIG. \ref{fig:M:b} is large/small BH since it has more/less negative slope. So the small BH branch is thermodynamically preferred in this case. In general, one might need to figure out how the existence of local extremums depend on values of $\tilde{Q}$ and $\tilde{a}_{i}$ to study the phase structure of the black hole. After the black hole's branches are obtained, it is interesting to consider their thermodynamic stabilities against thermal and electrical fluctuations. In canonical ensemble, the first quantity we consider is the specific heat at constant electric charge and pressure \begin{equation} C_{Q,P}=T\left( \frac{\partial S}{\partial T}\right) _{Q,P}=32l^{2}\pi ^{2}\tilde{r}_{+}\tilde{T}\frac{\partial\tilde{r}_{+}(\tilde{T},\tilde {Q},\tilde{a}_{i})}{\partial\tilde{T}}. \label{eq:CQ \end{equation} Since the entropy is proportional to the size of the black hole, a positive specific heat means that the black hole radiate less when it is smaller. Thus, the thermal stability of the branch follows from $C_{Q,P}\geq0$. From eqn. $\left( \ref{eq:CQ}\right) $, it shows that the large/small BH branch in FIG. \ref{fig:M:a} and the small/large BH branch in FIG. \ref{fig:M:b} are both thermally stable/unstable. Note that $\partial^{2}\tilde{F}(\tilde {T},\tilde{Q},\tilde{a}_{i})/\partial^{2}\tilde{T}=-l^{-2}C_{Q,P}$, and hence the thermally stable/unstable branches are concave downward/upward in right panels of FIG. \ref{fig:M}. The second quantity is \begin{equation} \epsilon_{T}=\left( \frac{\partial Q}{\partial\Phi}\right) _{T}=l\left[ \frac{\partial\Phi(\tilde{r}_{+},\tilde{Q},\tilde{a}_{i})}{\partial\tilde{Q }-\frac{\partial\Phi(\tilde{r}_{+},\tilde{Q},\tilde{a}_{i})}{\partial\tilde {r}_{+}}\frac{\frac{\partial\tilde{T}(\tilde{r}_{+},\tilde{Q},\tilde{a}_{i )}{\partial Q}}{\frac{\partial\tilde{T}(\tilde{r}_{+},\tilde{Q},\tilde{a _{i})}{\partial\tilde{r}_{+}}}\right] ^{-1}, \label{eq:epsilon \end{equation} which describes how the black hole's electrostatic potential respond to its charge. Here, $\tilde{r}_{+}$ is understood as $\tilde{r}_{+}(\tilde{T ,\tilde{Q},\tilde{a}_{i})$. For a positive value of $\epsilon_{T}$, as more charges are placed on the black hole, its potential increases and hence make it harder to move the system from equilibrium. The electrical stability of the branch then follows from $\epsilon_{T}\geq0$. For the potential $\Phi$, it is natural to expect that $\partial\Phi(\tilde{r}_{+},\tilde{Q},\tilde{a _{i})/\partial\tilde{r}_{+}<0$. We also assume $Q>0$ and hence $\tilde{A _{t}^{\prime}\left( r_{+}\right) >0$, which give \begin{equation} \frac{\partial\tilde{T}(\tilde{r}_{+},\tilde{Q},\tilde{a}_{i})}{\partial Q}=-\frac{1}{8\pi\tilde{r}_{+}}\tilde{A}_{t}^{\prime}\left( r_{+}\right) <0. \end{equation} Eqn. $\left( \ref{eq:epsilon}\right) $ shows that in FIG. \ref{fig:M:a}, $\varepsilon_{T}^{-1}\rightarrow+\infty$ for the small BH branch and $\varepsilon_{T}^{-1}\rightarrow-\infty$ for the large BH branch as $\tilde {T}\rightarrow\tilde{T}_{\min}$. Similarly in FIG. \ref{fig:M:b}, $\varepsilon_{T}^{-1}\rightarrow-\infty$ for the small BH branch and $\varepsilon_{T}^{-1}\rightarrow+\infty$ for the large BH branch as $\tilde {T}\rightarrow\tilde{T}_{\max}$. Finally, we turn to the critical point, which is an inflection point and obtained b \begin{equation} \frac{\partial\tilde{T}(\tilde{r}_{+},\tilde{Q},\tilde{a}_{i})}{\partial \tilde{r}_{+}}=0\text{ and }\frac{\partial^{2}\tilde{T}(\tilde{r}_{+ ,\tilde{Q},\tilde{a}_{i})}{\partial\tilde{r}_{+}^{2}}=0. \end{equation} Solving the above equations give \begin{equation} \tilde{r}_{+,c}=\tilde{r}_{+,c}\left( \tilde{a}_{i}\right) \text{, \tilde{Q}_{c}=\tilde{Q}_{c}\left( \tilde{a}_{i}\right) \text{ and }\tilde {T}_{c}=\tilde{T}_{c}\left( \tilde{a}_{i}\right) . \end{equation} Defining the specific volume $v=\frac{r_{+}}{8\pi}$ \cite{IN-Gunasekaran:2012dq}, one finds tha \begin{equation} \rho_{c}=\frac{P_{c}v_{c}}{T_{c}}=\frac{3}{4\pi}\frac{\tilde{r}_{+,c}\left( \tilde{a}_{i}\right) }{\tilde{T}_{c}\left( \tilde{a}_{i}\right) }. \end{equation} Consider the case in which $\mathcal{L}\left( s,a_{i}\right) $ is a power series expansion of $s$ \begin{equation} \mathcal{L}\left( s,a_{i}\right) =s+\frac{a_{1}}{2}s^{2}+\frac{a_{2} {3}s^{3}+\cdots. \end{equation} For small values of $a_{i}$, we fin \begin{align} \tilde{Q}_{c} & =\frac{1}{3}+\frac{7}{18}\tilde{a}_{1}+\frac{11\left( \tilde{a}_{1}^{2}+16\tilde{a}_{2}\right) }{216}+\cdots,\nonumber\\ \tilde{T}_{c} & =\frac{1}{\pi}\sqrt{\frac{2}{3}}-\frac{\tilde{a}_{1} {3\sqrt{6}\pi}-\frac{9\tilde{a}_{1}^{2}+32\tilde{a}_{2}}{36\sqrt{6}\pi +\cdots,\nonumber\\ \tilde{r}_{+,c} & =\frac{1}{\sqrt{6}}-\frac{7\tilde{a}_{1}}{6\sqrt{6} +\frac{27\tilde{a}_{1}^{2}-352\tilde{a}_{2}}{72\sqrt{6}}+\cdots,\\ \rho_{c} & =\frac{P_{c}v_{c}}{T_{c}}=\frac{3\left( 1-\tilde{a}_{1}\right) }{8}+\frac{3\tilde{a}_{1}^{2}-40\tilde{a}_{2}}{24}+\cdots.\nonumber \end{align} wher \[ \tilde{Q}_{c}=Q_{c}\sqrt{P_{c}/6}\text{, }\tilde{T}_{c}=T_{c}\sqrt{6/P_{c }\text{, }\tilde{r}_{+,c}=r_{+,c}\sqrt{P_{c}/6}\text{ and }\tilde{a _{i}=\left( P_{c}/6\right) ^{i}a_{i}. \] The leading value of $\rho_{c}$ is $3/8$, which reproduces the critical value $\rho_{c}$ of RN-AdS black holes. \section{Born-Infeld AdS Black Hole} \label{Sec:BIABH} Born-Infeld electrodynamics is described by the Lagrangian densit \begin{equation} \mathcal{L}\left( s\right) =\frac{1}{a}\left( 1-\sqrt{1-2as}\right) \text{,} \label{eq:BI \end{equation} where the coupling parameter $a$ is related to the string tension $\alpha^{\prime}$ as $a=\left( 2\pi\alpha^{\prime}\right) ^{2}>0$. When $a=0$, we can recover the Maxwell Lagrangian. Solving eqn. $\left( \ref{eq:QAt}\right) $ for $A_{t}^{\prime}\left( r\right) $ gives \begin{equation} A_{t}^{\prime}\left( r\right) =\frac{Q}{\sqrt{r^{4}+aQ^{2}}}. \end{equation} It follows that the potential of the black hole i \begin{equation} \Phi=\frac{4\pi Q}{r_{+}}\text{ }_{2}F_{1}\left( \frac{1}{4},\frac{1 {2},\frac{5}{4};-\frac{aQ^{2}}{r_{+}^{4}}\right) , \end{equation} where $_{2}F_{1}\left( a,b,c;x\right) $ is the hypergeometric function. The equation of state $\left( \ref{eq:Ttildal}\right) $ becomes \begin{equation} \tilde{T}\left( \tilde{r}_{+}\right) \equiv\frac{h\left( \tilde{r _{+}\right) }{4\pi\tilde{r}_{+}}=\frac{1}{4\pi\tilde{r}_{+}}\left( 1+3\tilde{r}_{+}^{2}-\frac{1}{2}\frac{\tilde{Q}^{2}}{\tilde{r}_{+}^{2 +\sqrt{\tilde{r}_{+}^{4}+\tilde{a}\tilde{Q}^{2}}}\right) , \label{eq:BIT \end{equation} where $\tilde{a}=a/l^{2}$, and we define $h\left( \tilde{r}_{+}\right) $ for later use. Noting that $h\left( 0\right) =1-\frac{\tilde{Q}}{2\sqrt {\tilde{a}}}$, $h\left( \infty\right) \rightarrow+\infty$ and $h\left( \tilde{r}_{+}\right) $ is a strictly increasing function, one finds that \begin{align*} Q^{2} & \geq4a\text{: }\tilde{T}\left( \tilde{r}_{+}\right) =0\text{ has only one solution }\tilde{r}_{+}=\tilde{r}_{e}\geq0,\\ Q^{2} & <4a\text{: }\tilde{T}\left( \tilde{r}_{+}\right) >0\text{ for }\tilde{r}_{+}\geq0\text{, \end{align*} where $\tilde{r}_{e}$ corresponds to an extremal black hole. To study behavior of local extremums of $\tilde{T}\left( \tilde{r _{+}\right) $, we consider the equation $\tilde{T}^{\prime\prime}\left( \tilde{r}_{+}\right) =0$, which becomes \begin{equation} z\left( x\right) \equiv x^{3}-\frac{3\tilde{Q}^{2}}{2}x^{2}+\tilde{a \tilde{Q}^{4}=0, \label{eq:z(x) \end{equation} with $x=\sqrt{\tilde{a}\tilde{Q}^{2}+\tilde{r}_{+}^{4}}$. Since $\lim _{x\rightarrow\pm\infty}z\left( x\right) =\pm\infty$, $z^{\prime}\left( 0\right) =0$ and $z^{\prime}(\tilde{Q}^{2})=0$, $z\left( x\right) $ has a local maximum of $z\left( 0\right) =\tilde{a}\tilde{Q}^{4}>0$ at $x=0$ and a local minimum of $z(\tilde{Q}^{2})=(-\tilde{Q}^{2}/2+\tilde{a})\tilde{Q}^{4}$ at $x=\tilde{Q}^{2}$. If the local minimum is not greater than zero $\left( Q^{2}\geq2a\right) $, there are two positive real roots $x_{1}\geq\tilde {Q}^{2}\geq x_{2}>0$ to the equation $\left( \ref{eq:z(x)}\right) $. Otherwise $\left( Q^{2}<2a\right) $, this equation has no positive real roots. To make $\tilde{r}_{+}=(x^{2}-\tilde{a}\tilde{Q}^{2})^{1/4}$ real, we also require $x\geq\sqrt{\tilde{a}}\tilde{Q}$. For $x_{1}$, one always has that $x_{1}\geq\tilde{Q}^{2}>\sqrt{\tilde{a}}\tilde{Q}$ since $Q^{2}\geq2a$. To have $x_{2}\geq\sqrt{\tilde{a}}\tilde{Q}$, we need to have $z(\sqrt {\tilde{a}}\tilde{Q})\leq0\Rightarrow Q^{2}$ $\geq4a$. With solutions of $\tilde{T}^{\prime\prime}\left( \tilde{r}_{+}\right) =0$, it is easy to analyze the existence of the local extremums of $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) $, results of which are summarized in Table \ref{tab:1}. \begin{table}[tbh] \centerin \begin{tabular} [c]{|c|c|c|c|c|}\hline & {\footnotesize $\tilde{T}^{\prime}\left( 0\right) $} & {\footnotesize $\tilde{T}^{\prime}\left( +\infty\right) $} & {\footnotesize Solution of $\tilde{T}^{\prime\prime}\left( \tilde{r _{+}\right) =0$} & {\footnotesize Extremums of $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) $}\\\hline {\footnotesize $Q^{2}>4a$} & {\footnotesize $+\infty$} & {\footnotesize $3/4\pi$} & {\footnotesize $\tilde{r}_{1}>0$} & {\footnotesize Minimum at $\tilde{r}_{+}=\tilde{r}_{1}$}\\\hline {\footnotesize $Q^{2}=4a$} & {\footnotesize $>0$} & {\footnotesize $3/4\pi$} & {\footnotesize $\tilde{r}_{1}>0$, $0$} & {\footnotesize Minimum at $\tilde {r}_{+}=\tilde{r}_{1}$}\\\hline {\footnotesize $4a>Q^{2}>2a$} & {\footnotesize $-\infty$} & {\footnotesize $3/4\pi$} & {\footnotesize $\tilde{r}_{1}>\tilde{r}_{2}>0$} & {\footnotesize Minimum/Maximum at $\tilde{r}_{+}=\tilde{r}_{1}/\tilde{r}_{2} }\\\hline {\footnotesize $Q^{2}=2a$} & {\footnotesize $-\infty$} & {\footnotesize $3/4\pi$} & {\footnotesize $\tilde{r}_{1}>0$, $\tilde {T}^{\prime\prime}\left( \tilde{r}_{+}\right) \geq0$} & {\footnotesize None \\\hline {\footnotesize $Q^{2}<2a$} & {\footnotesize $-\infty$} & {\footnotesize $3/4\pi$} & {\footnotesize None, $\tilde{T}^{\prime\prime }\left( \tilde{r}_{+}\right) >0$} & {\footnotesize None}\\\hline \end{tabular} \caption{{\small Solution of $\tilde{T}^{\prime\prime}\left( \tilde{r _{+}\right) =0$ and the local extremums of $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) $ in various cases, where $\tilde{r}_{i}=\left( x_{i}^{2}-\tilde{a}\tilde{Q}^{2}\right) ^{1/4}$.} \label{tab:1 \end{table} When solving eqn. $\left( \ref{eq:BIT}\right) $ for $\tilde{r}_{+}$ in terms of $\tilde{T}$, the solution $\tilde{r}_{+}(\tilde{T})$ is often a multivalued function. The parameters $\tilde{a}$ and $\tilde{Q}$ determine the number of the branches of $\tilde{r}_{+}(\tilde{T})$ and the phase structure of the black hole. In what follows, we find six regions in the $\tilde{a}$-$\tilde {Q}$ plane, in each of which the black hole has the distinct behavior of the branches and the phase structure: \begin{figure}[tbh] \begin{center} \subfigure[{~\scriptsize Region I: $a/l^{2}=0.01$ and $Q/l=0.4$. There is no phase transition.}]{ \includegraphics[width=1.01\textwidth]{DBIR1.eps}\label{fig:DBIR12:a}} \subfigure[{~\scriptsize Region II: $a/l^{2}=0.01$ and $Q/l=0.25$. There is a first order phase transition between small BH and large BH.}]{ \includegraphics[width=1.01\textwidth]{DBIR2.eps}\label{fig:DBIR12:b}} \end{center} \caption{{\footnotesize Plot of $\tilde{r}_{+}$, $\tilde{F}$ and $\epsilon _{T}^{-1}l$ against $\tilde{T}$ for BI-AdS black holes in Regions I and II. Black holes in these regions are RN type since there exist extremal black hole solutions. Regions I and II can be considered as reminiscent of RN-AdS black holes. The blue and green branches are thermally stable.} \label{fig:DBIR12 \end{figure} \begin{figure}[ptb] \begin{center} \subfigure[{~\scriptsize Region III: $a/l^{2}=0.01$ and $Q/l=0.195$. There is a first order phase transition between small BH and large BH.}]{ \includegraphics[width=1\textwidth]{DBIR3.eps}\label{fig:DBIR36:a}} \subfigure[{~ \scriptsize Region IV: $a/l^{2}=0.01$ and $Q/l=0.188$. The arrows in the inset indicate increasing $\tilde{T}$. As $\tilde{T}$ increases, the black hole jumps from the large BH branch to the small BH one, corresponding to the zeroth order phase transition between small BH and large BH. Further increasing $\tilde{T}$, there would be a first order phase transition returning to large BH. Here we observe LBH/SBH/LBH reentrant phase transition.}]{ \includegraphics[width=1\textwidth]{DBIR4.eps}\label{fig:DBIR36:b}} \subfigure[{~ \scriptsize Region V: $a/l^{2}=0.01$ and $Q/l=0.185$. There is no phase transition.}]{ \includegraphics[width=1\textwidth]{DBIR5.eps}\label{fig:DBIR36:c}} \subfigure[{~ \scriptsize Region VI: $a/l^{2}=0.01$ and $Q/l=0.15$. There is no phase transition.}]{ \includegraphics[width=1\textwidth]{DBIR6.eps}\label{fig:DBIR36:d}} \end{center} \caption{{\footnotesize Plot of $\tilde{r}_{+}$, $\tilde{F}$ and $\epsilon _{T}^{-1}l$ against $\tilde{T}$ for BI-AdS black holes in Regions III, IV,V and VI. Black holes in these regions are Schwarzschild-like\ type\ since they only exist for large enough $\tilde{T}$. The blue and green branches are always thermally stable. Small BH is electrically unstable while large BH is almost electrically stable.} \end{figure} \begin{itemize} \item Region I: $Q^{2}\geq4a$ and $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) \geq0$. In this region, $\tilde{T}^{\prime}\left( \tilde{r _{+}\right) \geq\tilde{T}^{\prime}\left( \tilde{r}_{1}\right) \geq0$ and hence $\tilde{T}\left( \tilde{r}_{+}\right) $ is\ an increasing function. So there is only one branch for $\tilde{r}_{+}(\tilde{T})$, which is thermally stable. Since $\tilde{T}\left( \tilde{r}_{+}\right) =0$ has a solution in this region, this branch can extend to zero temperature. For a black hole with $\tilde{a}=0.01$ and $\tilde{Q}=0.4$ in this region, we plot the radius $\tilde{r}_{+}$, the Gibbs energy $\tilde{F}$ and the isothermal permittivity $\epsilon_{T}^{-1}l$ as functions of $\tilde{T}$ in FIG. \ref{fig:DBIR12:a}, which shows that this black hole is electrically stable for small enough and large enough $\tilde{T}$. However for large enough $\tilde{a}$, the black hole is always electrically stable. \item Region II: $Q^{2}\geq4a$ and $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) <0$. In this region, $\tilde{T}^{\prime}\left( \tilde{r _{+}\right) =0$ has two solutions $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$ and\ $\tilde{r}_{\text{min}}$ with $\tilde{r}_{\text{max}}<\tilde{r _{1}<\tilde{r}_{\text{min}}$. Since $\tilde{T}\left( +\infty\right) =+\infty$, $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}=\tilde{T}\left( \tilde{r}_{\text{max}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$ and a local minimum of $\tilde {T}_{\text{min}}=\tilde{T}\left( \tilde{r}_{\text{min}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min}}$. There are three branches for $\tilde{r}_{+}(\tilde{T})$: small BH for $0\leq\tilde{T}\leq\tilde {T}_{\text{max}}$, intermediate BH for $\tilde{T}_{\text{min}}\leq\tilde {T}\leq\tilde{T}_{\text{max}}$ and large BH for $\tilde{T}\geq$ $\tilde {T}_{\text{min}}$, which are displayed in the left panel of FIG. \ref{fig:DBIR12:b}. The Gibbs free energy of the three branches is plotted in the middle panel, which shows that there is a first order phase transition between small BH and large BH occurring at $\tilde{T}=\tilde{T}_{\text{first }$ with $\tilde{T}_{\text{min}}\leq\tilde{T}_{\text{first}}\leq\tilde {T}_{\text{max}}$. Both the small BH and large BH branches are thermally stable. As explained in section \ref{Sec:NBH}, $\epsilon_{T}^{-1}$ of small BH goes to $-\infty$ as $\tilde{T}\rightarrow\tilde{T}_{\text{max}}$ while that of large BH goes to $+\infty$ as $\tilde{T}\rightarrow\tilde{T}_{\text{min}}$. The right panel shows that small BH is electrically unstable while large BH is almost electrically stable. \item Region III: $4a>Q^{2}>2a$, $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) <0$, $\tilde{T}^{\prime}\left( \tilde{r}_{2}\right) >0$ and $\tilde{T}\left( \tilde{r}_{\text{min2}}\right) <\tilde{T}\left( \tilde {r}_{\text{min1}}\right) $. In this region, $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) =0$ has three solutions $\tilde{r}_{+}=$\ $\tilde {r}_{\text{max}}$, $\tilde{r}_{\text{min1}}$ and $\tilde{r}_{\text{min2}}$ with\ $\tilde{r}_{\text{min2}}<\tilde{r}_{2}<\tilde{r}_{\text{max}}<\tilde {r}_{1}<\tilde{r}_{\text{min1}}$. So $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}=\tilde{T}\left( \tilde {r}_{\text{max}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$, a local minimum of $\tilde{T}_{\text{min1}}=\tilde{T}\left( \tilde {r}_{\text{min1}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min1}}$ and a global minimum of $\tilde{T}_{\text{min2}}=\tilde{T}\left( \tilde {r}_{\text{min2}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min2}}$. There are four branches for $\tilde{r}_{+}(\tilde{T})$: intermediate$_{-}$ BH for $\tilde{T}\geq\tilde{T}_{\text{min2}}$, small BH for $\tilde {T}_{\text{min2}}\leq\tilde{T}\leq\tilde{T}_{\text{max}}$, intermediate$_{+}$ BH for $\tilde{T}_{\text{min1}}\leq\tilde{T}\leq\tilde{T}_{\text{max}}$ and large BH for $\tilde{T}\geq\tilde{T}_{\text{min1}}$, which are displayed in the left panel of FIG. \ref{fig:DBIR36:a}. Note that there is no black hole solution when $\tilde{T}<\tilde{T}_{\text{min2}}$. The Gibbs free energy of the four branches is plotted in the middle panel, which shows that there is a first order phase transition between small BH and large BH occurring at $\tilde{T}=\tilde{T}_{\text{first}}$ with $\tilde{T}_{\text{min2}}\leq \tilde{T}_{\text{first}}\leq\tilde{T}_{\text{max}}$. Both the small BH and large BH branches are thermally stable, while intermediate$_{\pm}$ BH branches are not. Similarly to Region II, the right panel shows that small BH is electrically unstable while large BH is almost electrically stable. \item Region IV: $4a>Q^{2}>2a$, $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) <0$, $\tilde{T}^{\prime}\left( \tilde{r}_{2}\right) >0$, $\tilde{T}_{\text{min2}}\geq\tilde{T}_{\text{min1}}$ and $\tilde{F}_{S (\tilde{T}_{\text{min2}})<\tilde{F}_{L}(\tilde{T}_{\text{min2}})$, where $\tilde{F}_{S/L}$ is the Gibbs free energy of the small/large BH branch. In this region, $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}=\tilde{T}\left( \tilde{r}_{\text{max}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$, a local minimum of $\tilde {T}_{\text{min2}}=\tilde{T}\left( \tilde{r}_{\text{min2}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min2}}$ and a global minimum of $\tilde {T}_{\text{min1}}=\tilde{T}\left( \tilde{r}_{\text{min1}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min1}}$. There are four branches for $\tilde{r}_{+}(\tilde{T})$: intermediate$_{-}$ BH for $\tilde{T}\geq\tilde {T}_{\text{min2}}$, small BH for $\tilde{T}_{\text{min2}}\leq\tilde{T \leq\tilde{T}_{\text{max}}$, intermediate$_{+}$ BH for $\tilde{T _{\text{min1}}\leq\tilde{T}\leq\tilde{T}_{\text{max}}$ and large BH for $\tilde{T}\geq\tilde{T}_{\text{min1}}$, which are displayed in the left panel of FIG. \ref{fig:DBIR36:b}. The Gibbs free energy of the four branches is plotted in the middle panel. As $\tilde{T}$ increases from $\tilde {T}_{\text{min1}}$, the black hole follows direction of arrows in the inset. It shows that there is a finite jump in Gibbs free energy leading to a zeroth order phase transition from large BH to small BH, followed by a first order phase transition returning to large BH. This LBH/SBH/LBH transition corresponds to a reentrant phase transition. \item Region V: $4a>Q^{2}>2a$, $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) <0$, $\tilde{T}^{\prime}\left( \tilde{r}_{2}\right) >0$, $\tilde{T}_{\text{min2}}>\tilde{T}_{\text{min1}}$ and $\tilde{F}_{S}(\tilde {T}_{\text{min2}})\geq\tilde{F}_{L}(\tilde{T}_{\text{min2}})$. As shown in the left panel of FIG. \ref{fig:DBIR36:c}, the four branches of $\tilde{r _{+}(\tilde{T})$ in this region are the same as in Region IV. However, the middle panel shows that the large BH branch is always thermodynamically preferred for $\tilde{T}\geq\tilde{T}_{\text{min1}}$, and hence there is no phase transition in this region. \item Region VI: $4a>Q^{2}>2a$ and $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) >0$ or $\tilde{T}^{\prime}\left( \tilde{r}_{2}\right) <0$; or $Q^{2}<2a$. It can show that $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) =0$ has only one solution $\tilde{r}_{+}=\tilde{r}_{\text{min}}$ in this region. Since $\tilde{T}\left( +\infty\right) =+\infty$, $\tilde{T}\left( \tilde{r}_{+}\right) $ has a global minimum of $\tilde{T}_{\text{min} =\tilde{T}\left( \tilde{r}_{\text{min}}\right) $ at $\tilde{r}_{+ =$\ $\tilde{r}_{\text{min}}$. As shown in the left panel of FIG. \ref{fig:DBIR36:d}, there are two branches for $\tilde{r}_{+}(\tilde{T})$: large BH and intermediate BH for $\tilde{T}\geq\tilde{T}_{\text{min}}$. The middle panel shows that the large BH branch is always thermodynamically preferred for $\tilde{T}\geq\tilde{T}_{\text{min}}$, and hence there is no phase transition in this region. This region is similar to the Schwarzschild-AdS case. The large BH branch is thermally stable and almost electrically stable. \end{itemize} \begin{figure}[tb] \begin{center} \subfigure[{~ \scriptsize The six regions in the $\tilde{a}$-$\tilde{Q}$ plane, each of which possesses the distinct behavior of the branches and the phase structure for BI-AdS black holes. The LBH/SBH/LBH reentrant phase transition occurs in Region IV. The LBH/SBH first order phase transition occurs in Regions II and III. No phase transitions occur in Regions I,V and VI.}]{ \includegraphics[width=0.48\textwidth]{DBIQa.eps}\label{fig:DBIQa:a}} \subfigure[{~ \scriptsize The critical line has two branches, and the physical/unphysical one is depicted by the blue/red line. $\tilde{Q}_{l}\left( \tilde{a}\right)$ is plotted for various values of $Q/\sqrt{a}$. There is no critical point for $Q/\sqrt{a}<\sqrt{2}$, while there exists one physical critical point for $Q/\sqrt{a}>\sqrt{2}$. The black hole also possesses an unphysical critical point for $\sqrt{2}<Q/\sqrt{a}<1.6948$.}]{ \includegraphics[width=0.4\textwidth]{DBIc.eps}\label{fig:DBIQa:b}} \end{center} \caption{{\footnotesize The six regions and the critical line in the $\tilde{a}$-$\tilde{Q}$ plane for BI-AdS black holes. The critical line consists of $\tilde{Q}_{12}\left( \tilde{a}\right) $ (the blue dashed line), $\tilde{Q}_{36}\left( \tilde{a}\right) $ (the blue solid line) and $\tilde{Q}_{56}\left( \tilde{a}\right) $ (the red line), where $\tilde {Q}_{ij}\left( \tilde{a}\right) $ is the boundary Region $i$ and Region $j$. With fixed $Q$ and $a$, the black hole moves along the curve $\tilde{Q _{l}\left( \tilde{a}\right) =\frac{Q}{\sqrt{a}}\sqrt{\tilde{a}}$ by varying $P$.} \label{fig:DBIQa \end{figure} In FIG. \ref{fig:DBIQa:a}, we plot these six regions in the $\tilde{a $-$\tilde{Q}$ plane. It is interesting to note that the boundary between the region in which $\tilde{T}\left( \tilde{r}_{+}\right) $ has $n$ extremums and that in which $\tilde{T}\left( \tilde{r}_{+}\right) $ has $n+2$ extremums is the critical line, determined b \begin{equation} \frac{\partial\tilde{T}(\tilde{r}_{+},\tilde{Q},\tilde{a})}{\partial\tilde {r}_{+}}=0\text{ and }\frac{\partial^{2}\tilde{T}(\tilde{r}_{+},\tilde {Q},\tilde{a})}{\partial\tilde{r}_{+}^{2}}=0. \label{eq:DBIcritical \end{equation} There are 3 such boundaries in FIG. \ref{fig:DBIQa:a}, i.e., $\tilde{Q _{12}\left( \tilde{a}\right) $, $\tilde{Q}_{36}\left( \tilde{a}\right) $, $\tilde{Q}_{56}\left( \tilde{a}\right) $, where $\tilde{Q}_{ij}\left( \tilde{a}\right) $ is the boundary Region $i$ and Region $j$. As shown in FIG. \ref{fig:DBIQa:a}, the critical line has two branches: $\tilde{Q _{c1}\left( \tilde{a}\right) =\left\{ \tilde{Q}_{12}\left( \tilde {a}\right) ,\tilde{Q}_{36}\left( \tilde{a}\right) \right\} $ and $\tilde{Q}_{c2}\left( \tilde{a}\right) =\tilde{Q}_{56}\left( \tilde {a}\right) $. We plot these two branches of the critical line in FIG. \ref{fig:DBIQa:b}, where $\tilde{Q}_{c1}\left( \tilde{a}\right) $ is the blue line, and $\tilde{Q}_{c2}\left( \tilde{a}\right) $ is the red line. Note that $\tilde{Q}_{c1}\left( \tilde{a}\right) $ and $\tilde{Q _{c2}\left( \tilde{a}\right) $ meet and terminate at $\left\{ \tilde{a _{c},\tilde{Q}_{c}\right\} \simeq\left\{ 0.069,0.37\right\} $, which is represented by the black point in FIG. \ref{fig:DBIQa}. However, the middle panel of FIG. \ref{fig:DBIR36:c} shows that the branch $\tilde{Q}_{c2}\left( \tilde{a}\right) $ is not physical since it does not globally minimize the Gibbs free energy. So the critical line has only one physical branch, $\tilde{Q}_{c1}\left( \tilde{a}\right) $, which is marked by the blue line. For $\tilde{a}\leq\tilde{a}_{1}\simeq0.030$, $\tilde{Q}_{c1}\left( \tilde {a}\right) $ is $\tilde{Q}_{12}\left( \tilde{a}\right) $ and depicted by the blue dashed line in FIG. \ref{fig:DBIQa:b}. This part of $\tilde{Q _{c1}\left( \tilde{a}\right) $ is reminiscent of RN-AdS black holes. \begin{figure}[tb] \begin{center} \includegraphics[width=0.48\textwidth]{DBIQaP.eps}\label{fig:DBIQaP:a} \includegraphics[width=0.4\textwidth]{DBIQaPs.eps}\label{fig:DBIQaP:b} \end{center} \caption{{\footnotesize In the case of varying $P$ with fixed $Q$ and $a$, the system moves along $\tilde{Q}_{l}\left( \tilde{a}\right) $, which is displayed for various values of $Q/\sqrt{a}$. For $Q/\sqrt{a}<\sqrt{2}$, there is no phase transition in the system. For $Q/\sqrt{a}>\sqrt{2}$, there is one critical point and the corresponding LBH/SBH first order phase transition. In addition, for $\sqrt{2}<Q/\sqrt{a}<2$,\ there is a LBH/SBH zeroth order phase transition occurring in Region IV, corresponding to the LBH/SBH/LBH reentrant phase transition.} \label{fig:DBIQaP \end{figure} We now discuss the critical behavior and phase structure of black holes in two cases. In the first case, $Q$ and $a$ are fixed parameters, and the AdS radius $l$ (the pressure $P$) varies. With fixed values of $Q$ and $a$, varying $l$ would generate a curve in the $\tilde{a}$-$\tilde{Q}$ plane, which is determined b \begin{equation} \tilde{Q}_{l}\left( \tilde{a}\right) =\frac{Q}{\sqrt{a}}\sqrt{\tilde{a}}. \end{equation} In FIG. \ref{fig:DBIQa:b}, we plot $\tilde{Q}_{l}\left( \tilde{a}\right) $ for various values of $Q/\sqrt{a}$. It shows that, for $Q/\sqrt{a}<\sqrt{2}$, there is no critical point for black holes. For $Q/\sqrt{a}>\sqrt{2}$, there exists one physical critical point. Moreover, the critical behavior is reminiscent of RN-AdS black holes for $Q/\sqrt{a}>2$. Note that $\tilde{Q _{l}\left( \tilde{a}\right) $ intersects the unphysical branch $\tilde {Q}_{c2}\left( \tilde{a}\right) $ for $1.6948>Q/\sqrt{a}>\sqrt{2}$. The phase structure of $\tilde{Q}_{l}\left( \tilde{a}\right) $ can be read from FIG. \ref{fig:DBIQaP}. It shows that for $Q/\sqrt{a}<2$, $\tilde{Q}_{l}\left( \tilde{a}\right) $ is always in Region VI, and hence there is no first order phase transition. For $Q/\sqrt{a}>2$, as one starts from $P=0$, $\tilde{Q _{l}\left( \tilde{a}\right) $ is in Region II, in which there is a first order phase transition between small BH and large BH. Further increasing $P$, $\tilde{Q}_{l}\left( \tilde{a}\right) $ goes through the critical line and enters the Region I, in which there is no phase transition. This behavior is reminiscent of that of the RN-AdS black hole. For $\sqrt{2}<Q/\sqrt{a}<2$, as $P$ increases from $P=0$, $\tilde{Q}_{l}\left( \tilde{a}\right) $ starts from Region VI, crosses the unphysical critical line and enters Region V, during which no phase transition occurs. Further increasing $P$, $\tilde {Q}_{l}\left( \tilde{a}\right) $ enters Region IV, in which there is a reentrant phase transition occurring for some range of $P$. As $P$ continuously increases, $\tilde{Q}_{l}\left( \tilde{a}\right) $ enters Region III, in which a first order phase transition occurs, crosses the critical line and returns to Region V. The critical behavior and phase structure in this case has been discussed in \cite{IN-Gunasekaran:2012dq $^{\left[ \ref{ft:1}\right] }$\footnotetext[1]{\label{ft:1} In \cite{IN-Gunasekaran:2012dq}, their $b$ is our $\frac{1}{4\sqrt{a}}$.}, which are correctly reproduced here. In the second case, $a$ and $P$ $\left( l\right) $ are fixed parameters, and one varies $Q$. FIGs. \ref{fig:DBIQa} show that for $a/l^{2}>\tilde{a}_{c}$, there is no critical point, and no phase transition occurs. For $a/l^{2 <\tilde{a}_{c}$, there is one critical point. As one increases $Q$ from $Q=0$, the black hole would experience different regions, in which there occur no phase transition $\rightarrow$ the LBH/SBH/LBH reentrant phase transition $\rightarrow$ the LBH/SBH first order phase transition $\rightarrow$ no phase transition. For $a/l^{2}<\tilde{a}_{1}$ and large enough values of $Q$, the black hole is in Regions I and II, in which the phase transition behavior is reminiscent of the RN-AdS black hole. The critical behavior and phase structure in this case has also been studied in \cite{IN-Dehyadegari:2017hvd}. \begin{figure}[tb] \begin{center} \includegraphics[width=0.38\textwidth]{DBIa001L.eps}\label{fig:DBIa001:a} \includegraphics[width=0.395\textwidth]{DBIa001C.eps}\label{fig:DBIa001:b} \end{center} \caption{{\footnotesize The phase diagram in the $\tilde{Q}$-$\tilde{T}$ plane for BI-AdS black holes with $a/l^{2}=0.01$. The first order phase transition line separating large BH and small BH is displayed by the brown line, and it terminates at the critical point, marked by the black dot. There is also a zeroth order phase transition line, depicted by the red line. All phases in the diagram are thermally stable. However, the phases in the yellow region are electrically unstable. Large BH above the first order phase transition line is always electrically stable except in the region around the critical point, which are highlighted in the right panel. It shows that the critical point is in the yellow region.} \label{fig:DBIa001 \end{figure} \begin{figure}[tb] \begin{center} \includegraphics[width=0.38\textwidth]{DBIa010.eps} \end{center} \caption{{\footnotesize The phase diagram in the $\tilde{Q}$-$\tilde{T}$ plane for BI-AdS black holes with $a/l^{2}=0.1$. There are no phase transitions. The black holes in the yellow region are electrically unstable..} \label{fig:DBIa010 \end{figure} The phase diagram of the BI-AdS black hole for $a/l^{2}=0.01$ is displayed in the $\tilde{Q}$-$\tilde{T}$ plane in FIG. \ref{fig:DBIa001}. There is a LBH/SBH first order transition for some range of $\tilde{Q}$ and a LBH/SBH zeroth order phase transition for some smaller range of $\tilde{Q}$. The zeroth and first order phase transitions are marked by the red and brown lines, respectively. The first order phase transition line terminates at the critical point, represented by the black point. No BH region means that no black hole solutions exist. As discussed before, the black hole solutions in the phase diagram are thermally stable. However, the solutions in the yellow region are unstable to electrical fluctuations. Small BH below the first order phase transition line is always electrically unstable while large BH above the line is almost electrically stable. The right panel of FIG. \ref{fig:DBIa001} shows that large BH is only electrically unstable in the region around the critical point. Note that the black hole solution at the critical point is electrically unstable. The phase diagram of the BI-AdS black hole for $a/l^{2}=0.1$ is displayed in the $\tilde{Q}$-$\tilde{T}$ plane in FIG. \ref{fig:DBIa010}, which is simpler than that for $a/l^{2}=0.01$. FIG. \ref{fig:DBIQa} shows that when $a/l^{2}>\tilde{a}_{c}\simeq0.069$ (the black dot), black holes are Regions I or VI, in which no phase transition occurs. At low temperatures, the black hole solution is electrically unstable for small enough values of $Q/l$. \section{iBorn-Infeld AdS Black Hole} \label{Sec:iBIABH} We now consider an iBorn-Infeld field with the Lagrangian densit \begin{equation} \mathcal{L}\left( s\right) =-\frac{1}{a}\left( 1-\sqrt{1+2as}\right) \text{, \end{equation} where $a>0$. For an iBorn-Infeld AdS (iBI-AdS) black hole solution, $f\left( r\right) $ in the black hole solution $\left( \ref{eq:ansatz}\right) $ is given b \begin{equation} f\left( r\right) =1-\frac{M}{8\pi r}+\frac{r^{2}}{l^{2}}-\frac{Q^{2} {6\sqrt{r^{4}-aQ^{2}}+6r^{2}}+\frac{Q^{2}}{3r^{2}}\text{ }_{2}F_{1}\left( \frac{1}{4},\frac{1}{2},\frac{5}{4};\frac{aQ^{2}}{r^{4}}\right) , \end{equation} where $M$ and $Q$ are the mass and the charge of the black hole, respectively. For $A_{t}^{\prime}\left( r\right) $, one has \begin{equation} A_{t}^{\prime}\left( r\right) =\frac{Q}{\sqrt{r^{4}-aQ^{2}}}, \end{equation} which gives the potential of the black hol \begin{equation} \Phi=\frac{4\pi Q}{r_{+}}\text{ }_{2}F_{1}\left( \frac{1}{4},\frac{1 {2},\frac{5}{4};\frac{aQ^{2}}{r_{+}^{4}}\right) . \end{equation} This iBI-AdS black hole solution has a singularity at $r=r_{s}$, where we defin \begin{equation} r_{s}\equiv a^{1/4}Q^{1/2}. \end{equation} To study the nature of this singularity, we compute the corresponding Ricci scalar \begin{equation} R=\frac{2}{a}-12+\frac{1}{ar^{2}}\frac{r_{s}^{4}-2r^{4}}{\sqrt{r^{4}-r_{s ^{4}}}, \end{equation} which becomes divergent at $r=r_{s}$. So the singularity at $r=r_{s}$ is a physical singularity, and one requires that $r>r_{s}$. The equation of state $\left( \ref{eq:Ttildal}\right) $ becomes \[ \tilde{T}\left( \tilde{r}_{+}\right) \equiv\frac{h\left( \tilde{r _{+}\right) }{4\pi\tilde{r}_{+}}=\frac{1}{4\pi\tilde{r}_{+}}\left( 1+3\tilde{r}_{+}^{2}-\frac{1}{2}\frac{\tilde{Q}^{2}}{\tilde{r}_{+}^{2 +\sqrt{\tilde{r}_{+}^{4}-\tilde{a}\tilde{Q}^{2}}}\right) , \] where $\tilde{r}_{+}>\tilde{r}_{s}\equiv\tilde{a}^{1/4}\tilde{Q}^{1/2}$, $\tilde{a}=a/l^{2}$ and $\tilde{Q}=Q/l$. It can show that $h\left( \tilde {r}_{+}\right) $ is a strictly increasing function and $h\left( \infty\right) \rightarrow+\infty$. At $\tilde{r}_{+}=\tilde{r}_{s}$, one ha \begin{equation} h\left( \tilde{r}_{s}\right) =1+3\tilde{a}^{1/2}\tilde{Q}-\frac{\tilde{Q }{2\tilde{a}^{1/2}}. \end{equation} For $h(\tilde{r}_{s})\leq0$, which reduces t \begin{equation} \tilde{a}<\frac{1}{6}\text{ and }\tilde{Q}\geq\frac{2\sqrt{\tilde{a} }{1-6\tilde{a}}, \end{equation} $\tilde{T}\left( \tilde{r}_{+}\right) =0$ has one solution $\tilde{r _{+}=\tilde{r}_{e}$, at which the black hole becomes extremal. In this case, the black hole is RN type. For $h\left( \tilde{r}_{s}\right) >0$, which reduces t \begin{equation} \tilde{a}<\frac{1}{6}\text{ and }\tilde{Q}<\frac{2\sqrt{\tilde{a}} {1-6\tilde{a}}\text{; or }\tilde{a}\geq\frac{1}{6}\text{, \end{equation} the temperature of the black hole has a positive minimum value, and the black hole is Schwarzschild-like type. The equation $\tilde{T}^{\prime\prime}\left( \tilde{r}_{+}\right) =0$ becomes \begin{equation} z\left( x\right) \equiv x^{3}-\frac{3\tilde{Q}^{2}}{2}x^{2}-\tilde{a \tilde{Q}^{4}=0, \end{equation} where $x=\sqrt{\tilde{r}_{+}^{4}-\tilde{a}\tilde{Q}^{2}}>0$. It can show that $z\left( x\right) $ has a local maximum of $z\left( 0\right) =-\tilde {a}\tilde{Q}^{4}<0$ at $x=0$ and a local minimum of $z(\tilde{Q}^{2 )=(-\tilde{Q}^{2}/2-\tilde{a})\tilde{Q}^{4}<0$ at $x=\tilde{Q}^{2}$. So $z\left( x\right) =0$ always admits one single positive real root $x=x_{1}>0$. Since $\lim_{\tilde{r}_{+}\rightarrow\tilde{r}_{s}}\tilde {T}^{\prime}\left( \tilde{r}_{+}\right) =+\infty$ and $\lim_{\tilde{r _{+}\rightarrow+\infty}\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) =3\sqrt{\tilde{a}}\tilde{Q}$, $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) $ always has a global minimum of $\tilde{T}_{\text{min}}^{\prime}\equiv \tilde{T}^{\prime}\left( \tilde{r}_{1}\right) $ at $\tilde{r}_{+}=\tilde {r}_{1}\equiv(x_{1}^{2}+\tilde{a}\tilde{Q}^{2})^{1/4}$. In what follows, we also find six regions in the $\tilde{a}$-$\tilde{Q}$ plane for iBI-AdS black holes, in each of which the black hole has the distinct behavior of the branches and the phase structure: \begin{figure}[tbh] \begin{center} \subfigure[{~\scriptsize Region I: $a/l^{2}=0.01$ and $Q/l=0.5$. There is no phase transition.}]{ \includegraphics[width=1.01\textwidth]{iDBIR1.eps}\label{fig:iDBIR12:a}} \subfigure[{~\scriptsize Region II: $a/l^{2}=0.01$ and $Q/l=0.22$. There is a first order phase transition between small BH and large BH.}]{ \includegraphics[width=1.01\textwidth]{iDBIR2.eps}\label{fig:iDBIR12:b}} \end{center} \caption{{\footnotesize Plot of $\tilde{r}_{+}$, $\tilde{F}$ and $\epsilon _{T}^{-1}l$ against $\tilde{T}$ for iBI-AdS black holes in Regions I and II, where Black holes in these regions are RN type. Regions I and II can be considered as reminiscent of RN-AdS black holes. The blue and green branches are thermally stable. It shows that for small enough $\tilde{a}$, e.g., $\tilde{a}=0.01$, the small BH branch is electrically stable for $\tilde {T}<\tilde{T}_{1}$ and unstable for $\tilde{T}>\tilde{T}_{1}$ with some $\tilde{T}_{1}>0$.} \label{fig:iDBIR12 \end{figure} \begin{figure}[ptb] \begin{center} \subfigure[{~\scriptsize Region III: $a/l^{2}=0.05$ and $Q/l=0.5$. There is no phase transition.}]{ \includegraphics[width=1\textwidth]{iDBIR3.eps}\label{fig:iDBIR36:a}} \subfigure[{~ \scriptsize Region IV: $a/l^{2}=0.05$ and $Q/l=0.23$. There is a first order phase transition between small BH and large BH.}]{ \includegraphics[width=1\textwidth]{iDBIR4.eps}\label{fig:iDBIR36:b}} \subfigure[{~ \scriptsize Region V: $a/l^{2}=0.05$ and $Q/l=0.184$. The arrows in the inset indicate increasing $\tilde{T}$. As $\tilde{T}$ increases, the black hole jumps from the large BH branch to the small BH one, corresponding to the zeroth order phase transition between small BH and large BH. Further increasing $\tilde{T}$, there would be a first order phase transition returning to large BH. Here we observe LBH/SBH/LBH reentrant phase transition. }]{ \includegraphics[width=1\textwidth]{iDBIR5.eps}\label{fig:iDBIR36:c}} \subfigure[{~ \scriptsize Region VI: $a/l^{2}=0.05$ and $Q/l=0.17$. There is no phase transition.}]{ \includegraphics[width=1\textwidth]{iDBIR6.eps}\label{fig:iDBIR36:d}} \end{center} \caption{{\footnotesize Plot of $\tilde{r}_{+}$, $\tilde{F}$ and $\epsilon _{T}^{-1}l$ against $\tilde{T}$ for iBI-AdS black holes in Regions III, IV,V and VI. The temperature of black holes in these regions has a minimum value greater than zero. The blue and green branches are always thermally stable. It shows that for large enough $\tilde{a}$, e.g., $\tilde{a}=0.05$, the small BH branch is always electrically unstable.} \label{fig:iDBIR36 \end{figure} \begin{itemize} \item Region I: $h\left( \tilde{r}_{s}\right) \leq0$ and $\tilde {T}_{\text{min}}^{\prime}\geq0$. Since $\tilde{T}^{\prime}\left( \tilde {r}_{+}\right) \geq\tilde{T}_{\text{min}}^{\prime}\geq0$, $\tilde{T}\left( \tilde{r}_{+}\right) $ is\ an increasing function in this region. So there is only one thermally stable branch for $\tilde{r}_{+}(\tilde{T})$. We plot the radius $\tilde{r}_{+}$, the Gibbs energy $\tilde{F}$ and the isothermal permittivity $\epsilon_{T}^{-1}l$ as functions of $\tilde{T}$ in FIG. \ref{fig:iDBIR12:a} for a black hole with $\tilde{a}=0.01$ and $\tilde{Q}=0.5$ in this region. Moreover, this black hole is electrically stable for small enough and large enough values of $\tilde{T}$. However for large enough $\tilde{a}$, the black hole is always electrically stable. \item Region II: $h\left( \tilde{r}_{s}\right) \leq0$ and $\tilde {T}_{\text{min}}^{\prime}<0$. In this region, $\tilde{T}^{\prime}\left( \tilde{r}_{+}\right) =0$ has two solutions $\tilde{r}_{+}=$\ $\tilde {r}_{\text{max}}$ and\ $\tilde{r}_{\text{min}}$ with $\tilde{r}_{\text{max }<\tilde{r}_{1}<\tilde{r}_{\text{min}}$. Since $\tilde{T}\left( +\infty\right) =+\infty$, $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}\equiv\tilde{T}\left( \tilde {r}_{\text{max}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$ and a local minimum of $\tilde{T}_{\text{min}}\equiv\tilde{T}\left( \tilde {r}_{\text{min}}\right) $ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min}}$. There are three branches for $\tilde{r}_{+}(\tilde{T})$: small BH for $0\leq\tilde{T}\leq\tilde{T}_{\text{max}}$, intermediate BH for $\tilde {T}_{\text{min}}\leq\tilde{T}\leq\tilde{T}_{\text{max}}$ and large BH for $\tilde{T}\geq\tilde{T}_{\text{min}}$, which are displayed in the left panel of FIG. \ref{fig:iDBIR12:b}. The middle panel shows that there is a first order phase transition between small BH and large BH occurring at $\tilde {T}_{\text{min}}\leq\tilde{T}\leq\tilde{T}_{\text{max}}$. Both the small BH and large BH branches are thermally stable. The right panel shows that large BH is almost electrically stable. However, the electrical stability of small BH depends on the values of $\tilde{a}$. For small enough $\tilde{a}$, e.g., $\tilde{a}=0.01$, small BH is electrically stable for small enough $\tilde{T $. For large enough $\tilde{a}$, small BH is always electrically unstable. \item Region III: $h\left( \tilde{r}_{s}\right) >0$ and $\tilde {T}_{\text{min}}^{\prime}\geq0$. As shown in FIG. \ref{fig:iDBIR36:a}, the black hole's temperature has a minimum of $\frac{h\left( \tilde{r _{s}\right) }{4\pi r_{s}}$ at $\tilde{r}_{+}=\tilde{r}_{s}$. There is only one branch for $\tilde{r}_{+}(\tilde{T})$ in this region, which is thermally stable. Similarly to Region I, the black hole is electrically unstable for some finite range of $\tilde{T}$ for small enough $\tilde{a}$. However for large enough $\tilde{a}$, the black hole is always electrically stable. \item Region IV: $h\left( \tilde{r}_{s}\right) >0$, $\tilde{T}_{\text{min }^{\prime}<0$ and $\tilde{T}_{\text{min}}>\tilde{T}\left( \tilde{r _{s}\right) $. In this region, $\tilde{T}^{\prime}\left( \tilde{r _{+}\right) =0$ has two solutions $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$ and\ $\tilde{r}_{+}=\tilde{r}_{\text{min}}$ with $\tilde{r}_{s}<\tilde {r}_{\text{max}}<\tilde{r}_{1}<\tilde{r}_{\text{min}}$. So $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}$ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$, a local minimum of $\tilde {T}_{\text{min}}$ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min}}$ and a global minimum of $\tilde{T}\left( \tilde{r}_{s}\right) $ at $\tilde{r}_{+ =$\ $\tilde{r}_{s}$. There are three branches for $\tilde{r}_{+}(\tilde{T})$: small BH for $\tilde{T}\left( \tilde{r}_{s}\right) \leq\tilde{T}\leq \tilde{T}_{\text{max}}$, intermediate BH for $\tilde{T}_{\text{min}}\leq \tilde{T}\leq\tilde{T}_{\text{max}}$ and large BH for $\tilde{T}\geq\tilde {T}_{\text{min}}$, which are displayed in the left panel of FIG. \ref{fig:iDBIR36:b}. There is a first order phase transition between small BH and large BH occurring at $\tilde{T}_{\text{min}}\leq\tilde{T}\leq\tilde {T}_{\text{max}}$. Both the small BH and large BH branches are thermally stable, while the intermediate BH branch is not. The electrical stability of black holes in this region is similar to that in Region II. \item Region V: $h\left( \tilde{r}_{s}\right) >0$, $\tilde{T}_{\text{min }^{\prime}<0$, $\tilde{T}_{\text{min}}\leq\tilde{T}\left( \tilde{r _{s}\right) $ and $\tilde{F}_{S}\left( \tilde{r}_{s}\right) <\tilde{F _{L}\left( \tilde{r}_{s}\right) $, where $\tilde{F}_{S/L}$ is the Gibbs free energy of the small/large BH branch. In this region, $\tilde{T}\left( \tilde{r}_{+}\right) $ has a local maximum of $\tilde{T}_{\text{max}}$ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{max}}$, a global minimum of $\tilde {T}_{\text{min}}$ at $\tilde{r}_{+}=$\ $\tilde{r}_{\text{min}}$ and a local minimum of $\tilde{T}\left( \tilde{r}_{s}\right) $ at $\tilde{r}_{+ =$\ $\tilde{r}_{s}$. FIG. \ref{fig:iDBIR36:c}\ shows that there are three branches of $\tilde{r}_{+}(\tilde{T})$ in this region.\ The Gibbs free energy of the three branches is plotted in\ the middle panel. As $\tilde{T}$ increases from $\tilde{T}_{\text{min}}$, the black hole follows direction of arrows in the inset. It shows that\ at $\tilde{T}=\tilde{T}\left( \tilde {r}_{s}\right) $, there is a finite jump in Gibbs free energy leading to a zeroth order phase transition from large BH to small BH. Further increasing $\tilde{T}$, a first order phase transition returning to large BH occurs at $\tilde{T}\left( \tilde{r}_{s}\right) \leq\tilde{T}\leq\tilde{T _{\text{max}}$. This LBH/SBH/LBH transition corresponds to a reentrant phase transition. \item Region VI: $h\left( \tilde{r}_{s}\right) >0$, $\tilde{T}_{\text{min }^{\prime}<0$, $\tilde{T}_{\text{min}}\leq\tilde{T}\left( \tilde{r _{s}\right) $ and $\tilde{F}_{S}\left( \tilde{r}_{s}\right) \geq\tilde {F}_{L}\left( \tilde{r}_{s}\right) $, As shown in the left panel of FIG. \ref{fig:iDBIR36:d}, there are three branches of $\tilde{r}_{+}(\tilde{T})$ in this region. The middle panel shows that the large BH branch is always thermodynamically preferred for $\tilde{T}\geq\tilde{T}_{\text{min}}$, and hence there is no phase transition in this region. \end{itemize} \begin{figure}[tb] \begin{center} \includegraphics[width=0.5\textwidth]{iDBIQa.eps} \end{center} \caption{{\footnotesize The six regions in the $\tilde{a}$-$\tilde{Q}$ plane, each of which possesses the distinct behavior of the branches and the phase structure for iBI-AdS black holes. The LBH/SBH/LBH reentrant phase transition occurs in Region V. The LBH/SBH first order phase transition occurs in Regions II and IV. No phase transitions occur in Regions I,III and VI.} \label{fig:iDBIQa \end{figure} \begin{figure}[tb] \begin{center} \subfigure[{~ \scriptsize There is always one physical critical point for the black holes on $\tilde{Q}_{l}\left( \tilde{a}\right) $. For $Q/\sqrt{a}>\tilde{Q}_{1}\simeq2.28$, the inset displays that the critical point occurs for the Schwarzschild-like type black hole.}]{ \includegraphics[width=0.38\textwidth]{iDBIc.eps}\label{fig:iDBIc:a}} \subfigure[{~ \scriptsize For $Q/\sqrt{a}<2$, $\tilde{Q}_{l}\left( \tilde{a}\right) $ always intersect with $\tilde{Q}_{45}\left( \tilde{a}\right) $. In this case, the black holes on $\tilde{Q}_{l}\left( \tilde{a}\right) $ could be in Region V for some range of $P$, where the reentrant phase transition occurs.}]{ \includegraphics[width=0.38\textwidth]{iDBIcr.eps}\label{fig:iDBIc:b}} \end{center} \caption{{\footnotesize The blue line is the critical line, which consists of the boundaries $\tilde{Q}_{12}\left( \tilde{a}\right) $ (the blue dashed line) and $\tilde{Q}_{34}\left( \tilde{a}\right) $ (the blue solid line). The black hole on $\tilde{Q}_{12}\left( \tilde{a}\right) $ is RN type. The red line is the boundary $\tilde{Q}_{45}\left( \tilde{a}\right) $. In the case of varying $P$ with fixed values of $Q$ and $a$, the system moves along $\tilde{Q}_{l}\left( \tilde{a}\right) $, which is plotted for various values of $Q/\sqrt{a}$. } \label{fig:iDBIc \end{figure} These six regions are plotted in the $\tilde{a}$-$\tilde{Q}$ plane in FIG. \ref{fig:iDBIQa}, from which the critical line can be read. In fact, the critical line is determined by $\tilde{T}^{\prime}\left( \tilde{r _{1}\right) =0$ and hence is composed of $\tilde{Q}_{12}\left( \tilde {a}\right) $ and $\tilde{Q}_{34}\left( \tilde{a}\right) $, where $\tilde {Q}_{ij}\left( \tilde{a}\right) $ is the boundary between Region $i$ and Region $j$. The critical line is plotted in FIG. \ref{fig:iDBIc:a}, and $\tilde{Q}_{12}\left( \tilde{a}\right) /\tilde{Q}_{34}\left( \tilde {a}\right) $ is depicted by the blue dashed/solid line. The inset in FIG. \ref{fig:iDBIc:a} demonstrates that for $\tilde{a}\leq\tilde{a}_{1}\simeq 0.02$, the critical line is $\tilde{Q}_{12}\left( \tilde{a}\right) $, on which black holes are RN type. Moreover, the critical line of iBI-AdS black holes in the $\tilde{a}$-$\tilde{Q}$ plane is semi-infinite while that of BI-AdS black holes is a finite line. According to FIGs. \ref{fig:iDBIR12:b} and \ref{fig:iDBIR36:b}, the critical line is physical since it globally minimizes the Gibbs free energy. In the case of varying $P$ with fixed values of $Q$ and $a$, the system moves along $\tilde{Q}_{l}\left( \tilde{a}\right) =\left( Q/\sqrt{a}\right) \sqrt{\tilde{a}}$ in the $\tilde{a}$-$\tilde{Q}$ plane, which are plotted for various values of $Q/\sqrt{a}$ in FIG. \ref{fig:iDBIc}. FIG. \ref{fig:iDBIc:a} shows that there always exists one physical critical point. For $Q/\sqrt {a}\leq\tilde{Q}_{1}\simeq2.28$, the inset in FIG. \ref{fig:iDBIc:a} shows that the critical point occurs for the RN type black hole. The boundary $\tilde{Q}_{45}\left( \tilde{a}\right) $ is displayed by the red line in FIG. \ref{fig:iDBIc}. If $\tilde{Q}_{l}\left( \tilde{a}\right) $ intersects with $\tilde{Q}_{45}\left( \tilde{a}\right) $, the black holes on $\tilde {Q}_{l}\left( \tilde{a}\right) $ could be in Region V for some range of $P$. The numerical result and FIG. \ref{fig:iDBIc:b} show that when $Q/\sqrt{a}<2$, $\tilde{Q}_{l}\left( \tilde{a}\right) $ always intersects with $\tilde {Q}_{45}\left( \tilde{a}\right) $, and there is a reentrant phase transition occurring for some range of $P$. Thus for $Q/\sqrt{a}<2$, as $P$ continuously increases from $P=0$, the black holes on $\tilde{Q}_{l}\left( \tilde {a}\right) $ experience the following regions: Region VI (no phase transitions) $\rightarrow$ Region V (the LBH/SBH/LBH reentrant phase transition) $\rightarrow$ Regions II or IV (the LBH/SBH first order phase transition) $\rightarrow$ Regions I or III (no phase transitions). For $Q/\sqrt{a}>2$, there is a critical point on $\tilde{Q}_{l}\left( \tilde {a}\right) $ occurring at $P=P_{c}$. For $P<P_{c}$, the black holes on $\tilde{Q}_{l}\left( \tilde{a}\right) $ with $Q/\sqrt{a}>2$ are in Regions II or IV, and there is a first order phase transition between small BH and large BH. For $P>P_{c}$, they are in Regions I or III, and no phase transition occurs. In the case of varying $Q$ with fixed values of $P$ and $a$, the system moves along a constant-$\tilde{a}$ line in the $\tilde{a}$-$\tilde{Q}$ plane. FIG. \ref{fig:iDBIc:a} shows that constant-$\tilde{a}$ lines always intersect the critical line and the boundary $\tilde{Q}_{45}\left( \tilde{a}\right) $. As one increases $Q$ from $Q=0$, the black holes on a constant-$\tilde{a}$ line experience the following regions: Region VI (no phase transitions) $\rightarrow$ Region V (the LBH/SBH/LBH reentrant phase transition) $\rightarrow$ Regions II or IV (the LBH/SBH first order phase transition) $\rightarrow$ Regions I or III (no phase transitions). For $\tilde{a}\geq1/6$, the black holes on a constant-$\tilde{a}$ line are always Schwarzschild-like type.\begin{figure}[tb] \begin{center} \subfigure[{~ \scriptsize The phase diagram for $a/l^{2}=0.01$.}]{ \includegraphics[width=0.37\textwidth]{iDBIa001L.eps}\label{fig:iDBIQT:a}} \subfigure[{~ \scriptsize Hightlighted region of the reentrant phase transition in the phase diagram for $a/l^{2}=0.01$.}]{ \includegraphics[width=0.385\textwidth]{iDBIa001S.eps}\label{fig:iDBIQT:b}} \subfigure[{~ \scriptsize Hightlighted region near the critical point in the phase diagram for $a/l^{2}=0.01$.}]{ \includegraphics[width=0.385\textwidth]{iDBIa001C.eps}\label{fig:iDBIQT:c}} \subfigure[{~ \scriptsize The phase diagram for $a/l^{2}=0.1$.}]{ \includegraphics[width=0.37\textwidth]{iDBIa010.eps}\label{fig:iDBIQT:d}} \end{center} \caption{{\footnotesize The phase diagrams in the $\tilde{Q}$-$\tilde{T}$ plane for iBI-AdS black holes with $a/l^{2}=0.01$ in $a/l^{2}=0.1$. The first order phase transition lines separating large BH and small BH are displayed by the brown lines, and they terminate at the critical points, marked by black dots. There are also zeroth order phase transition lines, depicted by the red lines. All phases in the diagram are thermally stable. However, the phases in the yellow region are electrically unstable.} \label{fig:iDBIQT \end{figure} The phase diagrams of iBI-AdS black holes for $a/l^{2}=0.01$ and $a/l^{2 =0.1$\ are displayed in the $\tilde{Q}$-$\tilde{T}$ plane in FIG. \ref{fig:iDBIQT}, where we have the LBH/SBH first order phase transition lines (the brown lines), the LBH/SBH zeroth order phase transition lines (the red lines) and the critical points (the black dots). For $a/l^{2}=0.01$, FIGs. \ref{fig:DBIa001} and \ref{fig:iDBIQT:a} shows that the phase diagram of iBI-AdS black holes is similar to that of BI-AdS black holes. Moreover, FIG. \ref{fig:iDBIQT:d} shows that the phase diagram of iBI-AdS black holes with $a/l^{2}=0.1$ is similar to that with $a/l^{2}=0.01$, in the way that they have the LBH/SBH first order and the zeroth order phase transitions. This is expected from FIG. \ref{fig:iDBIc:a}, which shows that the $a/l^{2}=0.1$ line intersects the critical line and the boundary $\tilde{Q}_{45}\left( \tilde {a}\right) $. However, as shown in FIG. \ref{fig:DBIa010}, there no phase transitions occurring in the phase diagram of BI-AdS black holes with $a/l^{2}=0.1$. All phases in FIG. \ref{fig:iDBIQT} are thermally stable. The black holes in the yellow region are electrically unstable. As with the critical points of BI-AdS black holes, the critical points of iBI-AdS black holes are also electrically unstable, which are highlighted in FIG. \ref{fig:iDBIQT:c}. For BI-AdS black holes, FIGs. \ref{fig:DBIa001} and \ref{fig:DBIa010} shows that the black holes very close to the boundaries of NO BH regions are always electrically unstable. However for iBI-AdS black holes, FIG. \ref{fig:iDBIQT} shows that the black holes very close to the boundaries of NO BH regions can be electrically stable for large enough values of $Q/l$. \section{Conclusion} \label{Sec:Con} We have investigated the thermodynamic behavior of NLED AdS black holes in an extended phase space, which includes the conjugate pressure/volume quantities, any dimensionful couplings $a_{i}$ in NLED and their associated conjugates $\mathcal{A}_{i}$. For a generic NLED black hole, we first computed its Euclidean action to obtain the Gibbs free energy. To obtain consistency of the Smarr relation, we found that it is necessary to include the conjugate pairs $\left( a_{i},\mathcal{A}_{i}\right) $. It showed that the black hole's temperature $T$, charge $Q$, horizon radius $r_{+}$ (thermodynamic volume $V$), the AdS radius $l$ (pressure $P$) and the dimensionful couplings $a_{i}$ could be connected by \begin{equation} Tl=\tilde{T}\left( r_{+}/l,Q/l,a_{i}l^{-c_{i}}\right) , \end{equation} where $c_{i}$ is the dimension of $a_{i}$. In the canonical ensemble with fixed $T$ and $Q$, we found that the critical behavior and phase structure of the black hole are determined by $\tilde{Q}\equiv Q/l$ and $\tilde{a _{i}\equiv a_{i}l^{-c_{i}}$. For BI-AdS black holes, we examined their critical behavior and phase structure, whose dependence on $\tilde{Q}$ and $\tilde{a}$ was plotted in FIG. \ref{fig:DBIQa}. There are six regions in FIG. \ref{fig:DBIQa}, and each region has a different phase behavior. Specially, the LBH/SBH/LBH reentrant phase transition occurs in Region IV. For iBI-AdS black holes, we displayed the dependence of their critical behavior and phase structure on $\tilde{Q}$ and $\tilde{a}$ in FIG. \ref{fig:iDBIQa}, where there are also six regions, and the LBH/SBH/LBH reentrant phase transition occurs in Region V. We summarize the results of the critical behavior and phase structure for BI-AdS and iBI-AdS black holes in Table \ref{tab:2}. \begin{table}[tbh] \centering \begin{tabular} [c]{|m{1.5in}<{\centering}|m{2.3in}<{\centering}|m{2.3in}<{\centering}|}\hline & {\footnotesize BI-AdS BH} & {\footnotesize iBI-AdS BH}\\\hline {\footnotesize Critical line} & {\footnotesize The critical line has a physical branch and an unphysical one, which have finite length and both terminate at $\left\{ \tilde{a}_{c},\tilde{Q}_{c}\right\} \simeq\left\{ 0.069,0.37\right\} $.} & {\footnotesize The critical line is a semi-infinite line and extends to the infinity $\tilde{Q}=+\infty$.}\\\hline {\footnotesize Reentrant phase transition region} & {\footnotesize This region has a finite area and terminates at $\left\{ \tilde{a}_{c},\tilde{Q _{c}\right\} $.} & {\footnotesize This region extends to the infinity $\tilde{Q}=+\infty$.}\\\hline {\footnotesize Varying $P$ with fixed $Q$ and $a$ case ($\tilde{Q}_{l}\left( \tilde{a}\right) $ line)} & {\footnotesize There exists one physical critical point for $Q/\sqrt{a}>\sqrt{2}$. The reentrant phase transition occurs for $\sqrt{2}<Q/\sqrt{a}<2$.} & {\footnotesize There always exists one physical critical point. The reentrant phase transition occurs for $Q/\sqrt{a}<2 .}\\\hline {\footnotesize Varying $Q$ with fixed $P$ and $a$ case (constant-$\tilde{a}$ line)} & {\footnotesize A physical critical point and reentrant phase transition occur for $\tilde{a}<\tilde{a}_{c}$.} & {\footnotesize A physical critical point and reentrant phase transition occur for all values of $l$ and $a$.}\\\hline \end{tabular} \ $\caption{{\small Critical behavior and phase structure for BI-AdS and iBI-AdS black holes.} \label{tab:2 \end{table} The thermodynamically preferred phases, along with the zeroth and first phase transitions and critical points, were displayed in FIGs. \ref{fig:DBIa001} and \ref{fig:DBIa010} for BI-AdS black holes and in FIG. \ref{fig:iDBIQT} for iBI-AdS black holes. We examined thermal and electrical stabilities of the black holes and found that all the thermodynamically preferred phases are thermal stable. However, the thermodynamically preferred phases in yellow regions in these figures were found to be electrical unstable. The possible equilibrium phases residing in the yellow regions were discussed in \cite{IN-Chamblin:1999hg}, which listed extremal black holes, anti--de Sitter space and black holes surrounded by a gas of particles as candidates. However, this question still remains open. In \cite{IN-Baggioli:2016oju,IN-Wang:2018hwg,Con-Cremonini:2017qwq}, the electrical transport behavior of the dual theory has been discussed for BI-AdS and iBI-AdS black holes in the context of gauge/gravity duality. It might be inspiring to explore the possible equilibrium phases residing in yellow regions from a holographic perspective. \begin{acknowledgments} We are grateful to Zheng Sun and Zhipeng Zhang for useful discussions and valuable comments. This work is supported in part by NSFC (Grant No. 11005016, 11175039 and 11375121). \end{acknowledgments}
\section{Introduction} \subsection{Anomaly Detection and Root Cause Analysis} In the likelihood-based approaches to anomaly detection, a generative probabilistic model for data is learned and used to evaluate new data records. Anomalies are defined as the records with unusually low likelihood. An example is the {Z-score} measure for 1-dimensional data, which fits the Gaussian distribution to the data (estimating the mean and variance) and scores observations in the decreasing order with respect to the likelihood; for its simplicity it is widely used in explanatory data analysis, quality controls and other industrial applications. The challenge with real data sets, however, is that they usually contains both continuous and categorical features, as well as inter dependencies (in particular anomaly scores cannot be applied independently). Interactions and dependencies can be effectively modeled by the modern framework of probabilistic graphical models~\cite{Koller:2009:PGM:1795555}. Further, simplicity can be traded for accuracy by using more sophisticated models as building blocks (for example more exotic base distributions or mixtures); only for multivariate counts several models have been proposed~\cite{Zhang2018}. This paper concerns the constrained scenario of Root Cause Analysis (RCA) where in addition to identifying anomalies, a readable explanation (in terms of other features) is required. Because the purpose of RCA is to support business decision making, complexity and fit accuracy are often traded for explanatory abilities. This makes some powerful models (such as neural set) not adequate for this task~\cite{DBLP:journals/corr/SoleMRE17}. In this paper we show how to build, out of simple building blocks, an anomaly detection system for error logs. While our model is a fairly simple variant of Bayes Network, the main added value is the proposed paradigm of \emph{determining anomaly contributions}, which is used to estimate how different features contribute to the likelihood of the anomaly data record. These scores can be used directly to perform efficient RCA which is illustrated by a case study on real data. \subsection{Contribution} \paragraph{Root-Cause Analysis for Separable Posteriors} For the task of anomaly detection the main quantity of interest is the likelihood of the new data record $x=(x_1,\ldots,x_d)$ given the training data $\mathcal{D}$, called \emph{the predictive posterior}. Assuming the generative process $p(\cdot |\theta)$ for the data, with some parameter $\theta$, the predictive posterior is given by \begin{align*} L(x) = p(x|\mathcal{D}) = \int p(x|\theta) p(\theta|\mathcal{D})\mbox{d}\theta. \end{align*} For the task of RCA it would be helpful to see how individual components $x_{i}$ impact the likelihood. This is not possible in general, because posteriors are often not analytically tractable and only approximated by sampling. However in certain cases the predictive posterior, after subtracting its mode, can be factorized into terms depending on individual terms $\theta_i$. More precisely, suppose that the predictive posterior log-likelihood can be written as \begin{align}\label{eq:separable_posterior} \log L(x) \approx \log L(x^{*}) + \sum_{i} I(x_i). \end{align} where $x^{*} = \mathrm{argmax}_x \log L(x)$ is the mode. When the posterior obeys \Cref{eq:separable_posterior} we say it is \emph{separable}. The term $I(x_i)$ can be then thought as \emph{influence} of the $i$-th coordinate of the data point $x$. Moreover, similarly to the notion of the averaged log-likelihood, these influences can be aggregated over several independent observations $x$ (e.g. at daily level). This formula has the following intuitive meaning: we decompose \emph{the deficiency w.r.t. the mode} per individual dimensions; the deficiency is understood as the difference in the log-likelihood with respect to the mode and can be seen as a natural anomaly measure (note that $\sum_{i} I(x_i) \leqslant 0$ by the definition of $x^{*}$). We stress that it is important to subtract the mode in \Cref{eq:separable_posterior}, otherwise we explain the likelihood of a whole point, rather than its abnormal part. It is worth mentioning that \Cref{eq:separable_posterior} can be characterized alternatively, by noticing that the hessian matrix $H$ satisfies \begin{align} \frac{\partial^2 H}{\partial x_i \partial x_j}(x^{*}) =[i=j]\cdot \frac{\partial I(x_i)}{\partial x_i}\cdot \frac{\partial I(x_j)}{\partial x_j} \end{align} hence is \emph{diagonal at the mode}. We will show theoretical results on separability for two popular building blocks: the posterior of Dirichlet-Multinomial distribution and the posterior of categorical variable given category-dependent multivariate Bernoulli or Multinomial observations (for example, naive bayes text classification on the bag-of-words representation). They will be presented in \Cref{sec:separable_posteriors}; now we sketch a simpler example for illustration. Consider the multinomial model with total counts of $k$ and probability $p=(p_1,\ldots,p_d)$. The probability of counts $x=(k_1,\ldots,k_d)$ equals \begin{align*} L(x) = \binom{k}{k_1,\ldots,k_d}\prod_{i=1}^{d}p_i^{k_i} \end{align*} Denote by $q_i = \frac{k_i}{k}$ the observed frequencies. The log-likelihood normalized by the number of observations can be approximated by Stirling formulas~\cite{DBLP:journals/corr/Shlens14c} establishing the connection to the \emph{Kullback-Leibler divergence of observed and real frequencies}, respectively $q=(q_1,\ldots,q_d)$ and $p=(p_1,\ldots,p_d)$. \begin{align*} \frac{1}{k}\log L(x) &\approx O(k^{-1}\log k) + D_{\mathrm{KL}}(q||p)\\ & = O(k^{-1}\log k) - \sum_{i=1}^{d}q_i\log \frac{q_i}{p_i} \end{align*} It is not hard to see that the logarithm of the mode for the multinomial distribution equals $O(\log k)$. Thus we obtain~\Cref{eq:separable_posterior} with $I(x_i)=q_i\log\frac{q_i}{p_i}$. \paragraph{Case Study on Real Data} We apply our framework to the real data set of error logs from company servers. Each record contains the number of errors for a given zone, project, procedure and the error message. The data was collected for more than 120 consecutive days. A sample of the data set is shown in \Cref{tab:data}. \begin{table} \captionsetup{font=scriptsize} \resizebox{\textwidth}{!}{ \begin{tabular}{|llllllr|} \toprule row\_id & date & region & project\_name & procedure\_name & error\_detail & err\_cnt \\ \midrule 15362 & 2018-04-01 & EMEA & GLOBAL\_ONLINE\_SERVICE & EXPLODE\_BUNDLE & Object reference not set to an instance of an ... & 3 \\ 29308 & 2018-04-01 & EMEA & YOJEG\_API & YOJEG.Controllers.Configurator.Global.Glo... & VerifyError:Invalid option selected & 1 \\ 29222 & 2018-04-01 & EMEA & GDAS Services: CustomerService & NaN & Operation: GetSalesPerson & 26 \\ 3157 & 2018-04-01 & EMEA & GDAS Services: CustomerService & NaN & Operation: GetCustomer Exception: GDAS.Ex... & 77 \\ 7801 & 2018-04-01 & EMEA & YOJEG\_API & YOJEG.Controllers.Configurator.Global.Glo... & BuildError:InvalidOrderCodeOrCustomerSet & 5 \\ \bottomrule \end{tabular} } \caption{Dataset for log errors.} \label{tab:data} \end{table} \\The results will be discussed in \Cref{sec:rca}. \subsection{Organization} In \Cref{sec:separable_posteriors} we derive theoretical results for some separable posteriors. In \Cref{sec:rca} we demonstrate our framework on the real-world data. The paper is concluded in \Cref{sec:conc}. \section{Separable Posteriors}\label{sec:separable_posteriors} \subsection{Dirichlet-Multinomial Model} The Dirichlet-Multinomial Model (DM) is popular for modeling multivariate counts. As opposed to the plain multinomial model, it models uncertainty in the probability parameter, which helps avoiding over-dispersion. \begin{align}\label{eq:DM_model} \begin{aligned} (p_1,\ldots,p_d) & \sim \mathsf{Dir}(\alpha_1,\ldots,\alpha_d) \\ (k_1,\ldots,k_d) &\sim \mathsf{Mult}(p_1,\ldots,p_d | k) \end{aligned} \end{align} This model is analytically tractable, we utilize formulas derived in~\cite{Tu2014}. \begin{align} P((k_i)_i|\mathcal{D}) = \frac{\Gamma(k+1)}{\prod_i \Gamma(k_i+1)}\cdot \frac{\Gamma(\alpha')}{\prod_i \Gamma(\alpha'_i)}\cdot \frac{\prod_i \Gamma(k_i+\alpha'_i)}{\Gamma(k+\alpha')} \end{align} Where $\alpha'_i = \alpha_i + \sum_{x\in \mathcal{D}}\sum x^{i}$ and $\alpha'=\sum_{i}\alpha'_i$ or the sake of concise notation. By using the Stirling approximation we obtain \begin{multline} \log L \approx \\ -k\sum_i\frac{k_i}{k}\log\frac{k_i}{k}-\alpha'\sum_i\frac{\alpha'_i}{\alpha'}\log\frac{\alpha'_i}{\alpha'} +(k+\alpha')\sum_{i}\frac{k_i+\alpha'_i}{k+\alpha'}\log \frac{k_i+\alpha'_i}{k+\alpha'} \end{multline} In order to see separability we will apply the well known trick called \emph{Laplace approximation}, which is merely a multivariate Gaussian approximation to the predictive posterior (see for example~\cite{2017arXiv171108911D} for theoretical justifications). Technically, we expand the log-likelihood in a Talyor series around its mode, so that linear term disappear (by the first-derivative test, as the mode maximizes the likelihood!) and quadratic terms correspond to the Gaussian terms. In our case, the second-order terms turn out to be diagonal hence we obtain separability. In order to find the mode we need to use the Lagrangian because of the implicit constraint $k=\sum_{i}k_i$. For some constant $C$, the mode satisfies\footnote{We extend the likelihood over non-integer frequencies as the gamma function is well-defined and the Stirling approximation works.} \begin{align}\label{eq:mode_first_order} -\log k^{\mathrm{MAP}}_i+\log (k^{\mathrm{MAP}}_i + \alpha'_i) + C = 0 \end{align} which implies \begin{align} k^{\mathrm{MAP}}_i = \frac{k}{\alpha'}\cdot \alpha'_i. \end{align} By the Taylor expansion around the mode we obtain (note that the linear part disappears and the coefficients of the quadratic part are determined from the first order conditions \Cref{eq:mode_first_order}) \begin{align} \log L((k_i)) & \approx \log L((k^{\mathrm{MAP}}_i)) - \frac{1}{2}\sum_i\frac{\alpha'_i}{(k^{\textrm{MAP}}_i+\alpha'_i)k^{\textrm{MAP}}_i} \left(k_i-\frac{k}{\alpha'}\cdot \alpha'_i\right)^2 \nonumber \\ & = \log L((k^{\mathrm{MAP}}_i)) - \frac{1}{2}\sum_i\frac{1}{1+\frac{k}{\alpha'}} \cdot \frac{\left(k_i-\frac{k}{\alpha'}\cdot \alpha'_i\right)^2}{\frac{k}{\alpha'}\cdot \alpha'_i} \end{align} in the alternative notation $q_i =\frac{k_i}{k}$ (observed frequency) and $p^{\alpha'} = \frac{\alpha_i}{\alpha}$ (mode frequency) we have \begin{lemma}[Predictive Posterior vs Mode for DM] \begin{align} \log L( q ) \approx \log L( p^{\mathrm{MAP}} ) - \frac{1}{2}\cdot \frac{\alpha'}{\alpha'+k}\cdot k\sum_i \frac{\left(q^{}_i-p^{\alpha'}_i \right)^2}{p^{\alpha'}_i} \end{align} \end{lemma} Since usually $k\ll \alpha'$ ($\alpha'$ collects all occurrences over the training data) we have $\frac{\alpha'}{k+\alpha'}\approx 1$ and we conclude \begin{corollary}[DM Posterior Predictive Impacts]\label{cor:dm_rca} For the DM-model the impact for the $i$-th component in \Cref{eq:separable_posterior} equals \begin{align} I(k_i) \approx \frac{1}{2}\cdot k\sum_i \frac{\left(q^{}_i-p^{\alpha'}_i \right)^2}{p^{\alpha'}_i} \end{align}. \end{corollary} \begin{remark}[Intuition] The major reason for impacts being large negative is a significant relative increase in frequencies (observed vs posterior), under large volume. Indeed, let $q^{}_i=(1+r_i)p^{\alpha'}_i$ then the $i$-th impact equals $I(k_i) =r_i^2 p^{\alpha'}_i$. \end{remark} \subsection{BNB Model} We prove separability only for Bernulli Naive Bayes (BNB) as we will be using this model in our case study. However, separability is not limited to the Bernoulli variant and can be also proved for Multionomial Naive Bayes. The BNB model is popular for classification of short text messages. Texts are represented as as the $|V|$-dimensional boolean vectors where $V$ is the vocabulary. Each entry is a boolean number indicating occurrence of the word $w$ in a given text $\mathbf{w}$; we will use the notation $I(w\in \textbf{w})$. The model with Beta prior (which smooths zero-frequencies assuming extra "pseudocounts" of one for each class-word) can be written as \begin{align*} \begin{aligned}[rl] \forall c\in\mathcal{C}\forall w\in V&\quad p_{w|c} \sim \mathsf{Beta}(1,1) \\ \forall c\in\mathcal{C}\forall w\in V &\quad I(w\in\textbf{w}|c) \sim \mathsf{Ber}(p_{w|c}) \end{aligned} \end{align*} where $\mathcal{C}$ is the set of classes (categories). Let $p_{w|c}$ and $p_c$ be posterior probabilities for word given class and class (estimated from the data). Then we have \begin{proposition}[Predicitve Posterior for BNB] Probability of the class $c$ given the vector of words $\textbf{w}\in\mathbb{R}^{V}$ is given by \begin{align}\label{eq:BNB} L(c|\textbf{w}) \propto p_c \cdot \prod_{w\in \textbf{w}} p_{w|c}^{I(w\in \textbf{w})}(1-p_{w|c})^{I(w\not\in V)} \end{align} where the proportionality constant is independent on $c$ (but depends on $\textbf{w}$). \end{proposition} By taking the logarithm of \Cref{eq:BNB} evaluated at $c$ and $c^{*}$ and subtracting (the unknown constant cancels) we obtain \begin{lemma}[Predictive Posterior vs Mode for BNB]\label{lemma:bnb_impact} For the Bernoulli Naive Bayes model, let $c^{*}$ be the most likely class given the sequence of words $\textbf{w}\subset V$. We have \begin{multline} \log L(c|\textbf{w})-\log L(c^{*}|\textbf{w}) =\\ \log \frac{p_c}{p_{c^{*}}\,} +\sum_{w\in \textbf{w}}\left[ I(w\in \textbf{w})\log\frac{p_{w|c}}{p_{w|c^{*}}}+I(w\not\in \textbf{w})\log\frac{1-p_{w|c}\,}{1-p_{w|c^{*}}}\right] \end{multline} \end{lemma} From \label{lemma:bnb_impact} we immediately obtain the word impact. \begin{corollary}[BNB Posterior Predictive Impact]\label{corr:word_daily_impact} For the BNB-model the impact for the $w$-th word in \Cref{eq:separable_posterior} equals \begin{align} I(w) =\sum_{w\in \textbf{w}}\left[ I(w\in \textbf{w})\log\frac{p_{w|c}}{p_{w|{c^{}}^{*}}}+I(w\not\in \textbf{w})\log\frac{1-p_{w|c}\,}{1-p_{w|{c}^{*}}}\right] \end{align} where $c$ is the actual class. \end{corollary} \begin{remark}[Intuition] The major reason for impacts $I(w)$ to be large negative is the presence of class-untypical words (so that $p_{w|c} \ll p_{w|c^*}$). The effect is stronger with large volume when evaluating averaged likelihoods. \end{remark} \section{Root Cause Analysis of Anomalies}\label{sec:rca} \subsection{Generative Model} Before we apply the results of the previous section, we need to construct the joint model for all features in our data set. We model the Data by a Bayes Net illustrated in \Cref{fig:model}. Every feature is dependent on zone (justification: different zones use servers in different location) and at most one other feature (in the natural hierarchical way). Thus, the model is actually a Tree-Augmented Network (TAN). These models generally allow for a feature-root relation and one more level of interaction. While TANs can capture non-trivial dependencies, they are computationally attractive since every node has at most two parents which reduces the size of internal conditional probability tables~\cite{Harini2015}. \begin{figure} \centering \begin{tikzpicture} \node (Zon) at (0,0) {Zone}; \node (Proj) at (-3,-3) {Project}; \node (Proc) at (0,-3) {Procedure}; \node (Err) at (3,-3) {Error}; \path [->] (Zon) edge node {} (Proj); \path [->] (Zon) edge node {} (Proc); \path [->] (Zon) edge node {} (Err); \path [->] (Proj) edge node {} (Proc); \path [->] (Proc) edge node {} (Err); \end{tikzpicture} \caption{TAN model for occurrences of a \emph{single error}.} \label{fig:model} \end{figure} More precisely, we assume \begin{align} \begin{aligned} \mathsf{Proj}|\mathsf{Zone} \sim \mathsf{Cat}(p=p(\mathsf{Zone})) \\ \mathsf{Proc}|\mathsf{Proj},\mathsf{Zone} \sim \mathsf{Cat}(p=p(\mathsf{Proj},\mathsf{Zone})) \\ \mathsf{Err} | \mathsf{Proc},\mathsf{Proj},\mathsf{Zone} \sim \mathsf{Ber}(p=p(\mathsf{Proc},\mathsf{Zone})) \end{aligned} \end{align} with empirical Dirichlet priors (estimated from data) for $\mathsf{Proj},\mathsf{Proc}$ and non-informative Beta prior for $\mathsf{Err}$). Bernoulli distributions are over the (binarized) bag-of-word text representation of $\mathsf{Err}$. Given the graph, the likelihood factorizes into likelihoods of individual features given parents; these models can be fit separately~\cite{Harini2015}. In our case \begin{align*} \Pr[\mathsf{Proj},\mathsf{Proc},\mathsf{Err}|\mathsf{Zone}] = \Pr[\mathsf{Err}|\mathsf{Proc},\mathsf{Zone}]\cdot\Pr[\mathsf{Proc}|\mathsf{Proj},\mathsf{Err},\mathsf{Zone}] \cdot \Pr[\mathsf{Proj}|\mathsf{Zone}] \end{align*} We also use this fact to structure our anomaly detection: we will analyze separately anomalies in $\mathsf{Proj},\mathsf{Zone}$ and separately in tuples $\mathsf{Err},\mathsf{Proc},\mathsf{Zone}$. Since we are interested in discovering and explaining anomalies on the daily bases, we perform the inference day by day, training the algorithm on the past data. The model was implemented under Python package PyMC3~\cite{10.7717/peerj-cs.55}. \subsection{RCA for Projects} The posterior for $\mathsf{Proj}$ given observed projects counts is Dirichlet-Multinomial. The daily-averaged likelihood is illustrated in \Cref{fig:project_like}. \begin{figure} \centering \begin{subfigure}{.45\textwidth} \includegraphics[width=0.95\linewidth]{DM_emea.png} \caption{Likelihood for $\mathsf{Proj}$, $\mathsf{Zone}=\mathrm{EMEA}$} \end{subfigure} \begin{subfigure}{.45\textwidth} \includegraphics[width=0.95\linewidth]{DM_apj.png} \caption{Likelihood for $\mathsf{Proj}$, $\mathsf{Zone}=\mathrm{APJ}$} \end{subfigure} \caption{Project likelihoods by zone.} \label{fig:project_like} \end{figure} \paragraph{Anomalies 2018/05/17 and 2018/06/11, EMEA} By applying \Cref{cor:dm_rca} we obtain most impacting projects. We see that the anomalies corresponds to peaks in project hits as illustrated in \Cref{fig:project_anom_emea}. \begin{figure} \centering \begin{subfigure}{.49\textwidth} \includegraphics[width=0.95\linewidth]{DM_emea_anom_0517.png} \end{subfigure} \begin{subfigure}{.49\textwidth} \includegraphics[width=0.95\linewidth]{DM_emea_anom_0611.png} \end{subfigure} \caption{Daily hits by project ($\mathsf{Zone}=\mathrm{EMEA}$).} \label{fig:project_anom_emea} \end{figure} \paragraph{Anomalies 2018/05/07 and 2018/07/28, APJ} By applying \Cref{cor:dm_rca} we obtain most impacting projects (we pick two). The anomalies again corresponds to peaks in project hits as illustrated in \Cref{fig:project_anom_apj}. \begin{figure} \centering \begin{subfigure}{.49\textwidth} \includegraphics[width=0.95\linewidth]{DM_apj_anom_0507.png} \end{subfigure} \begin{subfigure}{.49\textwidth} \includegraphics[width=0.95\linewidth]{DM_apj_anom_0728.png} \end{subfigure} \caption{Daily hits by project ($\mathsf{Zone}=\mathrm{APJ}$).} \label{fig:project_anom_apj} \end{figure} \subsection{RCA for Procedures and Error Messages} According to our model, the distribution of procedures given error descriptions follows the classification Bernoulli Naive Bayes (BNB) model (where $\mathsf{Proc}$ is the class and $\mathsf{Err}$ is text; class priors are determined by fitting $\mathsf{Proc}[\mathsf{Proc}|\mathsf{Proj},\mathsf{Zone}]$). To detect anomalies in errors, we evaluate \emph{how error messages impact procedures} rather than investigating $\label{eq:err_on_proc_zon}$ for individual errors. To detect anomalies on the daily level, we compute the daily-averaged likelihood and illustrate in \Cref{fig:bnb} \begin{figure} \centering \begin{subfigure}{.5\textwidth} \centering \includegraphics[width=1\linewidth]{BNB_emea.png} \caption{Likelihood of $\mathsf{Proc}$ in $\mathsf{Zone}=\text{EMEA}$} \label{fig:bnb_emea} \end{subfigure}% \begin{subfigure}{.5\textwidth} \centering \includegraphics[width=1\linewidth]{BNB_apj.png} \caption{Likelihood of $\mathsf{Proc}$ in $\mathsf{Zone}=\text{APJ}$} \label{fig:bnb_emea} \end{subfigure} \caption{Likelihood of $\mathsf{Proc}$ split by $\mathsf{Zone}$.} \label{fig:bnb} \end{figure} \paragraph{Anomaly 2018/05/17 in EMEA} By \Cref{corr:word_daily_impact} we identify the set $$S=\{\text{'object', 'set', 'reference', 'instance', 'connection'}\}$$ of 3 keywords with biggest negative influence on the likelihood. By inspecting hits on these keywords (by hit we understand every message matching at least one word in $S$) across the classes we notice a huge difference between the anomaly day and the reference data set (see~\Cref{fig:BNB_emea_anom_0517}). \begin{figure} \centering \includegraphics[width=0.6\linewidth]{BNB_emea_anom_0517.png} \caption{Average daily hits of the keywords $S$ split by class ($\mathsf{Proc}$), for EMEA zone.} \label{fig:BNB_emea_anom_0517} \end{figure} By inspecting message texts we also recognize the specific messages related to the keywords $S$. The result is summarized in \Cref{tab:BNB_anom1}. \begin{table} \captionsetup{font=scriptsize} \centering \begin{tabular}{|l|l|} \hline procedure & error message \\ \hline $Proc_{1}$ & Object reference not set to an instance of an object \\ \hline $Proc_{4}$ & Object reference not set to an instance of an object \\ \hline \end{tabular} \caption{RCA for anomaly 2018/05/17 EMEA.} \label{tab:BNB_anom1} \end{table} \paragraph{Anomaly 2018/06/11 in EMEA} By \Cref{corr:word_daily_impact} we identify the set $$S=\{\text{'channel', 'timed', 'remote', 'returned', 'request'}\}$$ of 5 keywords with biggest negative influence on the likelihood. By inspecting hits on these keywords across the classes we notice a significant shift between the anomaly day and the reference data set (see~\Cref{fig:BNB_emea_anom_0611}). \begin{figure} \centering \includegraphics[width=0.6\linewidth]{BNB_emea_anom_0611.png} \caption{Average daily hits of the keywords {'channel', 'timed', 'remote', 'returned', 'request'} split by class ($\mathsf{Proc}$) for EMEA zone.} \label{fig:BNB_emea_anom_0611} \end{figure} Having localized the keywords, we easily find procedures with biggest shifts and also the messages. The explanation is summarized in \Cref{tab:BNB_anom2}. \begin{table} \captionsetup{font=scriptsize} \centering \begin{tabular}{|l|l|} \hline procedure & error message \\ \hline $Proc_{8}$ & The operation has timed out \\ \hline $Proc_{25}$ & The request channel timed out \\ \hline $Proc_{20}$ & The request failed with HTTP status 404 \\ \hline \end{tabular} \caption{RCA for anomaly 2018/06/11 EMEA.} \label{tab:BNB_anom2} \end{table} \paragraph{Anomaly 2018/05/18 APJ} By \Cref{corr:word_daily_impact} we identify the set $$S=\{\text{'null', 'reference', 'set'}\}$$ of 3 keywords with biggest negative influence on the likelihood. By inspecting hits on these keywords across the classes we notice a significant shift between the anomaly day and the reference data set (see~\Cref{fig:BNB_apj_anom_0518}). \begin{figure} \centering \includegraphics[width=0.6\linewidth]{BNB_apj_anom_0518.png} \caption{Average daily hits of the keywords {'null', 'reference', 'set'} split by class ($\mathsf{Proc}$), for APJ zone.} \label{fig:BNB_apj_anom_0518} \end{figure} The explanation by procedures and error messages is shown in \Cref{tab:BNB_anom3} below. \begin{table} \captionsetup{font=scriptsize} \centering \begin{tabular}{|l|l|} \hline procedure & error message \\ \hline $Proc_{8}$ & argument is null \\ \hline \end{tabular} \caption{RCA for anomaly 2018/05/18 APJ.} \label{tab:BNB_anom3} \end{table} \paragraph{Anomaly 2018/06/11 APJ} By \Cref{corr:word_daily_impact} we identify the set $$S=\{\text{'contract', 'gdas', 'contracts','target','invocation'} \}$$ of 5 keywords with biggest negative influence on the likelihood. By inspecting hits on these keywords across the classes we notice a significant shift between the anomaly day and the reference data set (see~\Cref{fig:BNB_apj_anom_0611}). \begin{figure} \centering \includegraphics[width=0.6\linewidth]{BNB_apj_anom_0611.png} \caption{Average daily hits of the keywords 'contract', 'gdas', 'contracts','target','invocation' split by class ($\mathsf{Proc}$), for APJ zone.} \label{fig:BNB_apj_anom_0611} \end{figure} The explanation by procedures and error messages is shown in \Cref{tab:BNB_anom4} below. \begin{table} \captionsetup{font=scriptsize} \centering \begin{tabular}{|l|l|} \hline procedure & error message \\ \hline $Proc_{1}$ & Operation: GDAS.Exceptions.CustomerNotFoundException \\ \hline $Proc_{4}$ & Exception has been thrown by the target of an invocation \\ \hline \end{tabular} \caption{RCA for anomaly 2018/06/11 APJ.} \label{tab:BNB_anom4} \end{table} \section{Conclusion}\label{sec:conc} We proposed a framework for anomaly detection and root cause analysis based on \emph{separable posterior approximation}. This approximation has been proved for the case of Multionomial, Dirchlet-Multinomal and Naive Bayes Models. The validation on the real data set shows that the framework detects anomalies and offers reasonable and simple explanations. \bibliographystyle{amsalpha}
\section{Introduction}\label{sec:intro} Bacheiler \cite{normal} was the pioneer of the efficient market hypothesis (EMH) \cite{fama} established on an assumption that the price obeys the random walk \cite{levy} in a spectacular market \cite{manibrot}. In economics, the time series data is a record in an Euclidean plane where price and time are independent to each other. In the general relativity, we cannot separate price and time under the Euclidean space with the $T_{2}-$ Hausdorff separation \cite{haus}. It is still a hidden loop space in time series data where price and time cannot be separated in the analogy with the Minkowski spacetime. There exists an empirical analysis and it is found stabilized fact on volatility cluster inducing long memory process in the financial time series. B. Mandelbrot introduced a new model of GARCH, so-called fractional Brownian motion and gave a result in FGARCH. The main problem in FGARCH is an infinite variance and the stylized fact still happens in the form of the power law distribution. With the development of the quantum field theory \cite{atiya}, the Chern-Simons current induced from the interaction of the dark energy in a living organism \cite{current} , loop gravity \cite{loop1} and some new emerging disciplines such as econophysics \cite{econophysics}, complex system \cite{cohesive} and behavior economic theory \cite{cluster2}, economists and econophysicists gradually get deeper understanding on the market hidden geometry induced from the interaction of buying and selling orderbook submissions of traders and hidden behavior \cite{ssm} of traders in financial market \cite{anomaly} which we empirical observed from the financial time series data by using GARCH model \cite{garch2}. Some experts in the complex system and fractal geometry \cite{cluster} had been argued that EMH cannot be use to explain some weird phenomena of financial time series, e. g., volatility clustering phenomena. Scientists realized that the Euclidean plane is not enough to explain such a chaotic phenomenon without adding something more of the statistical theory of spinor field \cite{pauli} in Wilson loop phase transition \cite{phase2} to the plane. We can extended the Euclidean space to a non-Euclidean space under the superspace in the time series data with the supersymmetric property. In the Yang-Mills theory \cite{yang}, the superspace is composed of a quantum foam and of the lattice gauge field with some extra properties of the Khovanov cohomology \cite{khovanov} and the Chern-Simons theory \cite{chern}. The problem comes from the classical financial mathematics. We just want to perform fundamental investigations to find an adequate stochastic processes matching the real financial time series data \cite{cohomo} without considering the market microstructure with the underlying orderbook \cite{orderbook} of the financial market scaling \cite{memory} and the hidden structure of the financial market as a D-brane \cite{brane} with extradimensions \cite{pincak3}. The financial time series data in the moment of the financial market crashed \cite{crash} are typical experimental results which we have for the complex systems \cite{crash2}. In the analysis of an empirical work of the financial time series, nonlinearities and non-stationarities \cite{emd} are shown with the stylized fact of a volatility cluster phenomena in a long memory effect. Some statisticians and economists typically predicted macroeconomics of the time series and the financial time series by using statistical data analysis of, ARIMA, ARCH, GARCH and the Markov switching model using the assumption of the linearity and the stationary time series process which cannot be found in the most of the typical financial time series data. The main defect of the ordinary least square (OLS) \cite{kolmogorov} ARIMA and GARCH model is based on fitting the problem with the parameters of fitting or learning with a single stochastic process for infinite factors which is governed by an infinite stochastic process influence on the future expectation price. When we add one point of the future price and fit curve by using the data mining tool for the regression with GARCH(1,1), the coefficient of the equation which we used to describe the historical data will update and change the historical path so that it makes a non-realistic situation. In real life, we cannot change a historical event but we can influence an expected future event. We call this problem a prior effect in the scaling behavior of the time series data. There appears a prior effect on the wavelet transformation when we add a one more point and do a wavelet transform again, so the result is not the same as the previous result. In the case of Fourier transform or a Fourier series of an approximate function by using the periodic function, we called this the Joseph effect. In the Hilbert-Huang transform, we call this the end effect, in econometric we also can notice this by an ordinary least square (OLS) method so that beta was changed when you add more point. This problem will also happen in the hidden Markov model or the Bayesian network because of all the families of the tool are based on the simple statistic, not on the superstatistics or the hyperstatistical theory in which it is contained an infinite stochastic process for fitting. We call this effect in a general term as a prior effect or a prior problem, the problem that you lie people on by just changing your historical record in the event of what you did. In the present time, physicists \cite{pincak1} defined another type of the geometrical object on the financial market, which may live on the string \cite{pincak2} and the D2-brane world \cite{pincak5}. In order to build a new mathematical superstructure suitable for the financial market we need to take into account also a psychology factor of traders in the model of the equation. The spinor field in the model cannot be the price of the direct buy, it should be a covering space of the price arising from the interaction of the trader with the different expectations on the supply and the demand of the stock. It was found that the state space of the financial market is considered as a smooth manifold containing events as a fiber space endowed with the particular affine connection. Let the behavior of the trader be a sequence of the state spaces of the Riemannian manifold, so-called be behavior state space model, a cohomological sequence of agents and dual agents. The representation of the space trader is a so-called agent $A_{t}$ at time $t$ and the sequence of the expectation price of the trader is a so called dual agent $A^{\ast}_{t} $, the sequence is a homological algebra which induces a cohomological sequence as an evolution feedback of price evolution. Let us consider the path connected component of the quotient group between the circle and the boundary defined by the feedback evolution between the shape of the endpoint of time series of predictor and predictant after performing the transform into zeros band the transformation of the empirical mode decomposition. In this work, we use a new approach to solve this problem by using differential geometry. We build a new GARCH(1,1) model based on \cite{arch1}, \cite{risk} in Wilson loop \cite{wilson} of the connection for the description of the behavior of the interaction of the traders in the financial market. The gauge group action with the connection in the Chern-Simons current is a source of the spinor field appearing as a hidden risk fear field in the financial market. The paper is organized as follows: in section II, we review GARCH(1,1) invented by Bollerslev in another framework of differential geometry. The allowed volatility should be minus in order to interpret the result of the risk field. In order to open a new door to solve the stylized fact, we use a Minkowski space instead of the single Kolmogorov system for the volatility cluster. Volatility is used to express an emotional trade by defining a fear factor in the stock market or the stress factor. We discuss on stylized fact and give a new definition of the Grothendieck and the De Rham cohomology for the financial market with the Minkowski metric for GARCH(1,1). In section III, we provide a proof of volatility clustering phenomena in the hyperbolic space with the Yang-Mills equation for the financial market. In section IV, we summarize the results of work and discuss future work. \section{GARCH(1,1) and Stylized Facts} \newtheorem{Definition}{Definition} \newtheorem{Theorem}{Theorem} Let $\sigma_{t}(\mathbf{r}_{t})^{2} $ be a volatility of the stock return. Using this mathematical transformation, we induce a dark volatility equivalent to a dark matter in the theoretical physics discovered by Wolfgang Pauli. The experiment which took place more than 20 years after death of Pauli confirmed neutrino in the balance of energy and momentum equation in his quantum field equation. Let $F$ be a fiber bundle. Let $g_{ij}\in G$ be a cycle and $g^{ij}\in G^{\ast}$ be a cocycle, a group action acts on the fibre bundle of manifold. We have $g_{ij}=\sqrt{g_{ij}}\sqrt{g_{ij}}$. Let $x_{t}$ be a time series in the section of the Riemannian manifold, $x_{t}\in T_{x_{0}}X=p^{-1}(X).$ So, we have a differential 2-form of time series arising from the scalar production of the group transformation of the vector bundle, so-called principle bundle of time series, $\sigma_{t}^{2}=<x_{t},x_{t}>=g_{ij}||x_{t}||^{2} $ with $g_{ij}=1 $. The volume form is invariant with the respect to translation and rotation and the volatility in the normal form will preserve the transformation. In this paper, we are interested in the case of the dark volatility, $\sigma_{t}^{2}<0$, it happens when we change the Euclidean metric to the Minkowski metric $g_{ij}=-1$ that allows the volatility minus, $\sigma_{t}^{2}<0$, because \begin{equation}\sigma_{t}^{2}=<x_{t}.x_{t}>=g_{ij}||x_{t}||^{2}=-||x_{t}||^{2}. \end{equation} In this case, we have an assumption that every risk from the stock investment in the stock market induces a fear field or risk field, so called volatility network. We denote this field $C_{\ast}(\sigma_{t,i}^{2}),i=1,2,3,\cdots ,n$ for $n-$ stock in stock market. Let us denote a price in stock market as $p_{t}(s_{i})$, where $s_{i}$ is a code of stock $i.$ We have an assumption that may be a source of risk field coming from the trader willing to win a high profit from stock market without their excess demand, but on the other side, they use too much leverage. This situation will induce both covariance and contravariance tensor field of the volatility of the price. Let us consider the Jacobian flow of GARCH(1,1) equation. Recall equation $(2)$ of GARCH(1,1). Discrete time volatility models were developed before the high-frequency data became readily available, and are typically applied to the daily or the lower frequency returns. Most discrete time models for the daily financial return $r_{t}$ satisfy the canonical product structure \begin{equation} r_{t}=\sigma_{t}\epsilon_{t} \end{equation} returns with multiplicative shock, $\epsilon_{n}$. Here the observed financial return $r_n$ is modeled as the product of an iid innovation $\epsilon_t$ and a positive scale factor $\sigma_{t}>0$. One usually assumes that $\epsilon_t$ has a mean value zero and, for the standardization, a unit variance. Specific models differ in their specification of the scale factors; an example is the stationary GARCH(1,1) recursion \begin{equation} \sigma_{t}^{2}=\kappa+\alpha r_{t-1}^{2}+\beta\sigma^{2}_{t-1} \end{equation} where $\kappa,\beta,\alpha >0$ and $\alpha+\beta <1.$ The scale factors $\sigma_{t}$ (Jacobian in this model) are not observed (hidden), and one may use the daily close-to-close returns $r_n$ to estimate and evaluate the models for $\sigma_{t}$. Let us consider GARCH(1,1) for the series of returns $r'_{t}=log(r_{t})$ which can be written as an additive shock, \begin{equation} r'_{t}=\delta+\epsilon_{t} =\delta +\eta_{t}\sqrt{h_{t}},\nonumber \end{equation} and \begin{equation} h_{t}=\alpha_{0}+\alpha_{1}+\epsilon_{t-1}^{2}+\beta h_{t-1}. \end{equation} The main problem of GARCH(1,1) is that the return is not in the log scale but we have a constant Euclidean distance. In this work, we change the metric to the hyperbolic distance in order to solve the volatility cluster phenomena. We found a complete solution in the complex time scale with the conjugate solution in the minus time scale. We called the volatility in the inert hidden time scale a hidden fear field or dark volatility ${\sigma_{t}^{\ast}}^{2}(A_{\mu})$ with a hidden variable of a risk field $A_{\mu}$ as a connection in the gauge field theory. The difference between the volatility and the dark volatility are the classes of different topological spaces as their mathematical objects. The volatility $\sigma_{t}^{2}$ is based on the statistical theory under the normal distribution and the usual treat is a random variable satisfying the Kolmogorov axiom of probability under the Hausdorff space with an outer spinor field. We define the dark volatility to be the general form of the normal distribution over the spinor field in the quotient superspace in the time series data under the $T_{0}-$ separation axiom. The volatility ${\sigma^{\ast}_{t}}^{2}(A_{\mu})$ is a spinor field of the behavior of the traders with a group action by the market cocycle $g$. The example of the dark volatility is a left chiral projection into the Euclidean plane with the left translation of the mean value only. It is just a volatility in the normal distribution if we take a group action as a left translation in the mean value. In the equilibrium of the statistical system, we have a normal distribution with the identity of the left translation of the gauge group appearing as a Gaussian random variable $\sigma_{t}^{2}:=0$, the identity of the Lie algebras as a result of the left adjoint map as volatility in the Euclidean plane. If we extend the group action as a spinor field action to the time series in the form of a gauge potential field $x_{t}:=gA_{\mu}$ translation in the parallel direction of the left and the right translation with an extra property of the spinor invariant, we will get a new definition of the volatility as the Jacobian flow in both left and right direction simultaneously in the superspace of the time series data. In the Minkowski space of time series data, we get supply and demand as focus points with the reflection of price in the light cone as a mirror symmetry from the left to the right chiral state in the financial market with the supply and the demand side. Therefore, we define the volatility in GARCH(1,1) as a gauge group action in the Jacobian flow with $g:=g_{ij}=\sigma_{t}^{2}$ or $h_{t}$ term. We substitute $h_{t}$ with $g_{ij}(t)$, so we have a Jacobian flow equation of the parallel transport GARCH(1,1) model \begin{equation}g_{ij}(t)=\alpha_{0}+\alpha_{1}||\epsilon_{t}||^{2}+\beta g_{ij}(t-1), \end{equation} so we have an extension of the Euclidean plane to the non-Euclidean plane with the same as GARCH(1,1), so called Minkowski GARCH(1,1) in this context, \begin{equation}\alpha_{1}||\epsilon_{t}||^{2}= g_{ij}(t)-\alpha_{0}-\beta g_{ij}(t-1), \end{equation} where $g_{ik}$ is an inverse of $g^{kl}$ representation for the market risk cycle and risk cocycle. In economic, most people assume $||\epsilon_{t}||^{2}\sim N(\mu,\sigma^{2})$ to be a random variable with random walk. In this work, we assume that this term is an induced spinor field from the interaction of the behavior of the trader with a risk aversion with no concept of the normal distribution. We use the differential geometry and the gauge theory approach for the approximation of this term with the Laurent polynomial in the Chern-Simons theory in the Kolmogorov space in the time series data with $x\in X,y\in Y,x_{\ast}\in X^{\ast}, y^{\ast}\in Y^{\ast}$. We have \[||\epsilon_{t}(A_{\mu})||^{2}=<\frac{x\wedge x^{\ast}}{C},\frac{y\wedge y^{\ast}}{C}> , x^{\ast} (x\otimes y)=C\] where $C$ is a constant value representing a memory effect in the volatility clustering phenomena of the time series data and $A_{\mu}$ is a connection. Let $ p: \Omega^{\ast}(\wedge ^{2} T_{x_{0}}\mathbb{R}\otimes \mathbb{R})\rightarrow \mathbb{R}$ with section matrix be a half volatility model, i.e. the matrix of error of the time series prediction $\epsilon_{t}$ in the section of the supermanifold of the financial market, $p^{-1}(\mathbb{R})=[\epsilon_{t}]$. It is independent of the coordinate system, so we can use the Jacobian flow of the coordinate transform across a stack of time scale going in both directions of future and past, \begin{equation}d\epsilon_{t+1}=\sqrt{g_{ij}(t)} d\epsilon_{t},\hspace{1cm}d\epsilon_{t-1}^{\ast}=\sqrt{g^{ij}(t)} d\epsilon_{t}^{\ast} \end{equation} so we have a Jacobian flow as Minkowski GARCH(1,1) model, \begin{equation} || \epsilon_{t}||^{2} =a+b \frac{dg_{ij}(t)}{dt} \end{equation} where $a, b$ are constants and $g_{ij}(t)$ is a market cocycle. A parallel transport is a Wilson loop of connection $W_{\alpha,\beta}(A_{\mu})$ over a principle fibre of financial supermanifold as arbitrage opportunity in the financial market cocycle $(\alpha,\beta)$. It is obtained from the Jacobian flow of the market cocycle over the fibre space by \begin{equation} A_{\mu}=\Gamma_{ij}^{\mu}=\frac{1}{2}g^{\mu l}(\partial_{j}g_{il} +\partial_{i}g_{lj}-\partial_{l}g_{ji}). \end{equation} The intepretation of $A_{\mu}$ is an error of the expected price from the physiology of the time series data, while trading induced from the interaction of the risk aversion and the hidden risk fear field from the behavior of the fundamentalist $A_{\mu=1}=A_{1}$. It is a chartlist or noise trader $A_{\mu=2}$ and bias traders $A_{\mu=3}$ in the financial market in the positive and the negative forward looking to the future price of the market as a group operation of the gauge group of an expected market cocycle $g$ to the gauge field $A_{\mu}$. Here $A_{\mu}:=\Gamma_{ij}^{\mu}$ is a risk gauge potential induced form market cocycle $g=g_{ijk}=g_{ij}(k)$ as gauge group action \begin{equation} [g,A_{\mu}]=\sigma^{2}=A_{\mu}g-gA_{\mu}=Ad_{g}\{A_{\mu}\}. \end{equation} We have $gA=Ag+||\epsilon||^{2}$ with the gauge group action $A_{\mu}^{g}=g^{-1}A_{\mu}g +g^{-1}\partial_{i}g$. The Wilson loop of the behavior trader in the connection $A_{\mu}$ of fibre space is defined by \begin{equation} W_{\alpha,\beta}(A^{g})=W_{\alpha,\beta}(A)-\frac{1}{24\pi^{2}}\int d^{3}x \epsilon^{ijk} <g^{-1}\partial_{i}gg^{-1}\partial_{j}gg^{-1}\partial_{k}g>. \end{equation} From the typical classical differential geometry, the equation above allows us to work over the connection of the fibre space as an extradimension in the moduli space of Killing vector field approach. We just use the tool for the computation of the expected state in our new definition of the spinor field in the time series data. The spinor field induces coupling state between 4-types of tensor fields over Killing equation above. \begin{Definition} Let support spinor be an arbitrage opportunity ,$\Gamma_{ij}^{m}$ in the financial market over moduli state space model in the time series data as a connection preserving scalar product over the parallel translation along the fibre space of the physiology layer in the time series data. \end{Definition} We define a Chern-Simons current as an arbitrage opportunity density by, \begin{equation} J_{A}^{\mu}=\partial \mu F^{\mu\nu} +[A_{\mu},F^{\mu\nu}.] \end{equation} \begin{equation} \frac{1}{4}<\ast F^{\mu\nu} F_{\mu\nu}>=\partial K^{\mu} \end{equation} where \begin{equation} K^{\mu}=\epsilon^{\mu\alpha\beta\gamma} <\frac{1}{2} A_{\alpha} \partial_{\beta} A_{\gamma} +\frac{1}{3} A_{\alpha} A_{\beta} A_{\gamma}> \end{equation} where a connection $\Gamma_{\alpha\nu}^{\mu}=(A_{\alpha})_{\nu}^{\mu}$, where $A$ is a Chern-Simons current in the financial market. An arbitrage or arbitron is a Chern-Simons anomaly, $K^{\mu}$ or an anomaly current induced from the behavior of the trader as a twist ghost field between 2 sides of the market. This field of the financial market induces a Ricci curvature in the financial market as an arbitrage opportunity for each connection in the coupling ghost field of the behavior of the trader. This curvature blends the Euclidean plane of the space of the observation to twist with the mirror plane behind the Euclidean plane and wraps to each other as the D-brane and the anti-D-brane interaction of the superspace of the financial time series data. \begin{equation} F_{\mu\nu}=R^{\mu}_{\nu\alpha\beta}(\Gamma) = e_{\alpha}^{\mu} R_{b\alpha\beta}^{a} e_{\nu}^{b}. \end{equation} \begin{Definition} The Ricci tensor in the time series data is a contraction of the curvature tensor of the risk defined by $R_{ik}(\sigma_{t}^{2})=R_{ikl}^{j}(\sigma_{t}^{2})$ with the respect to the natural frame of the connection \begin{equation} F_{\mu\nu}:=R_{ik}(\sigma_{t}^{2})=\partial_{k}\Gamma_{ji}^{j}- \partial_{j}\Gamma_{ki}^{j}+\Gamma_{km}^{j}\Gamma_{ji}^{m}- \Gamma_{jm}^{j}\Gamma_{ki}^{m}, \end{equation} where $Ad_{g}\{A\}:=[g,A]:=g\times \Gamma_{ji}^{j}:=g\times A= \sigma_{t}^{2}.$ \end{Definition} The market equilibrium occurs when the Ricci curvature is zero, $R_{ik}=0$ (arbitrage opportunity disappears and the physiology of the time series data contains no curvature). The solution of the Patterson-Godazzi differential equation is a curvature of the superspace in the time series data. If $\partial \sigma_{t}^{2}=1$ or constant, we have an equal risk field in the market or the risk free market $\sigma_{t_2}^{2}-\sigma_{t_1}^{2}=1$, so we have the price persistence with the shock given by \begin{equation}\frac{\partial p_{t}}{\partial \sigma_{t}^{2}} =p_{t_2}-p_{t_1}>0,\end{equation} but in the case of the dark volatility (as a hidden fear field) that induces an inertia in the price in hidden direction (and also if $\partial \sigma_{t}^{2}=-1$), \begin{equation}\frac{\partial p_{t}}{\partial \sigma_{t}^{2}} =p_{t_2}-p_{t_1}<0.\end{equation} We conclude that $\sigma_{t}^{2}\in \mathbb{H}$ is called the dark volatility. We can monitor or measure on the border of the universe outside of our galaxy with the light speed only. Let us define an underlying coordinate of the Jacobian flow. If $g_{ij}=1$, we use a $S^{2}$ Riemann sphere as GARCH(1,1) coordinate. When $-1<g_{ij}<1$, we use a cone or hyperbolic coordinate and when $g_{ij}=-1$, we use the Minkowski space. \subsection{Dark Volatility} In this work, we assume that the financial market be is an asymmetric superspace $X_{t}/Y_{t}$ with the left and right supersymmetry in the Yang-Mills theory. The left chiral supersymmetry is a source of the demand $D\in X_{t}$ and the right chiral supersymmetry is a source of the supply in the hidden space $S\in Y.$ The duality in the general equilibrium with the invisible hand is a source of the hidden dual superspace with the hidden demand $D^{\ast}\in X^{\ast}$ and the hidden supply $S^{\ast}\in Y^{\ast}$. Most economists treat the price $p_{t}\in \mathbb{R}^{n}$ as the time series data embedded in the Euclidean plane with an outer extra property of the spinor field. We use an alternative approach of the differential geometry. Our price is defined by an extension of the Euclidean plane to a quaternionic projective space $\mathbb{H}P^{1}$, $p_{t}(S,S^{\ast},D,D^{\ast})$ is this space with an extraproperty of the spinor field from the interaction of the behavior of the trader from the supply and demand side as the connection $A_{\mu}$ in the fibre space with the Hopf fibration. In econophysics, market depth is defined by a Taylor expansion of the price over an excess demand $D$. We have an equivalent class of the supply and demand when the price is a nonequilibrium of the matching by \begin{equation} S^{\ast}\sim D\leftrightarrow S^{\ast}\alpha= D, S\sim D^{\ast}\leftrightarrow S\beta= D^{\ast}, \end{equation} where $(\alpha,\beta)$ is an equivalent class market cocycle of the price matching. We assume that the risk is composed of the observation risk and the hidden risk in the supersymmetric property of the left and the right chiral supersymmetry. The left chiral risk is the volatility in economics with the systematic risk $\sigma^{2}_{t}$ and the right chiral risk is the dark volatility, the market risk with the hidden risk fear field induced from the behavior of the trader $\sigma_{t}^{2}(A_{\mu=1,2,3})$. Let price be a transition state of the coupling hidden state between the supply pair, $(S,S^{\ast})$ and demand pair $(D,D^{\ast})$. Hence, we have 2 systems of a hyperbola with the focus point $D=\beta S^{\ast},D^{\ast}=\alpha S$ in the hidden supply and the hidden demand and the center in the demand and supply with pairs states twists space to each other with 2 Minkowski cones with the superdistribution $pp(k)$ of the price momentum $k$. If we rotate the hyperbola light cone with $\theta=\frac{\pi}{2}$, we get 2 systems of equations, \begin{equation} Cone(x,y,pp(k)) :=\{(x,y)| (x-D)^{2}-(y-S)^{2}=k\} \nonumber \end{equation} \begin{equation} Cone(x^{\ast},y^{\ast},pp(k^{\ast})) :\{ (x^{\ast},y^{\ast})|(x^{\ast}-D^{\ast})^{2}-(y^{\ast}-S^{\ast})^{2}=k^{\ast}\} \end{equation} A Wilson loop of the time series data, denoted as $W_{\alpha,\beta}(A_{\mu})$ is a twistor in acomplex projective space $\mathbb{H}P^{1}$. It turns one side of the Euclidean plane twist into another side of the plane with the help of modified Mobius map $z=\frac{1}{z}$. We have $W_{\alpha,\beta}(\frac{\lambda S}{\lambda D})=\frac{D}{S}$. The equivalent class of the supply and demand is induced from the queuing process of $0$ to $\infty$ by using modified Mobius map $z=\frac{1}{z}$. Each of the components is defined by gluing an equivalent class of the supply and demand $S\in [s],D\in [d]$ such that $[s] \sim [d]$ if and only if there exists $\lambda_{i}$ such that $x_{i}=\lambda_{i} y_{i},\lambda=(\alpha,\beta)$. The projective coordinate is a local coordinate on the Minkowski space, a Wilson loop of the unitary operator in the quantum mechanics. Let $g_{ij}$ be Jacobian matrix of the supply and demand, we have a shallow to the hidden state of the transformation by using the Wigner ray transform \begin{equation} g_{ij}\mapsto \lambda g_{ij},\lambda \in \mathbb{U}(1)\simeq Spin(2) \end{equation} where $\lambda =\sigma_{x},\sigma_{y}$ are pauli matrix in $Spin(2)$ group. \begin{Definition} Let $S$ be a supplied linear compact operator in Banach space and $D$ be demand operator. A Wilson loop in the time series data at a general equilibrium point in the financial time series data is a point of price $x_{t}(S,D)$ such that there exists a ray of the unitary operator $\lambda \in SU(2)\simeq Spin(3) $, \begin{equation} W_{\alpha,\beta}(<S,D>):= <\lambda S,\lambda D>=\lambda<S,D>=<S,D> \end{equation} \end{Definition} The determinant of the correlation matrix or a wedge product of the column of the correlation of all returns of stocks in the stock market can be minus one and induces a complex structure as a spin structure in the principle bundle of the time series data. We found that when $det(Corr(M))^{2}=1$, where $Corr(M),M\in SL(2,\mathbb{C})$ is a correlation matrix of the financial network $M$ with Mobius map. This space of the time series data is in an equilibrium with 2 equilibrium points. One is a real and explicit form, the other is hidden and in the complex structure like dark matter or invisible hand in the economics concept. If $det(Corr(M))=0$, the space of time series data is out of equilibrium and it can induce the market crash with a more herding behavior of the noise trader. This result is related to the definition of the log return of an arbitrage opportunity in econophysics. The section of the tangent of the manifold is a Killing vector field of the manifold of the financial market. We introduce 3 types of the Killing vector field for the market potential field of the behavior of the traders in the market. \begin{equation} A_{\pm,1}(f)=\frac{\partial}{\partial f}:SO(2)\rightarrow Spin(2):M\rightarrow T_{x}M \end{equation} \begin{equation} A_{\pm,2}(\sigma)=\frac{\partial}{\partial \sigma}:SO(2)\rightarrow Spin(2):M\rightarrow T_{x}M \end{equation} \begin{equation} A_{\pm,3}( \omega)=\frac{\partial}{\partial \omega}:SO(2)\rightarrow Spin(2):M\rightarrow T_{x}M \end{equation} where $+$ means optimistic behavior of the trader, $-$ means the pessimistic trader, $f$ is a fundamentalist trader, $\sigma$ is a noise trader and $\omega$ is a bias trader. $A_{1}$ is an agent field of the adult behavior trader as fundamentalist. $A_{2}$ is an agent field of teenager behavior trader as herding behavior or the noise trader. $A_{3}$ is an agent field of the child behavior of the trader or the bias trader. The behavior is spin up and down as the expected states in the market communication layer of the transactional analysis framework. The upstate is signified as the optimistic market expected state and pessimistic as the market crash state of an intuition state of the forward looking trader cut each other as in the transactional analysis framework of the market communication between the behavior of the expected state and the behavior of the market state. The strategy of the fundamentalist (we denoted shortly by $f$) is the expected price in a period, where the price is in the minimum point $s_{4}$ and maximum point $s_{2}$ (crash and bubble price). Then the optimistic fundamentalist, $f_{+}$ will buy at the minimum point $s_{4}$ of the price below the fundamental value and the pessimistic fundamentalist $f_{-}$ will sell the product or short position at the maximum point of the price if the maximum point is over a fundamental value. The strategy of chartist or noise trader, $\sigma_{\pm}$ is different from the fundamentalist. Let $\omega$ be a basic instinct bias behavior of trader. We can use the Pauli matrix $\sigma_{i}(t)$ to define a strategy of all agents in the stock market as the basis of the quaternionic field span by the noise trader and the fundamentalist. Let $+1$ stay for buy at once and $-1$ for be sell suddenly. Let $+i$ stay for being inert to buy and $-i$ for being inert to sell. The row of the Pauli matrix represents the position of the predictor and the position in the column represents the predicted state. \begin{Definition} For the noise trader, we use an finite state machine for the physiology of the time series to the accepted pattern defined by \begin{equation} A_{2}:=\sigma(t)= \sigma_{y} = \left[ \begin{array}{ccc} &s_{2}{\ast}(t) &s_{4}^{\ast}(t)\\ s_{2}(t)&0&-i\\ s_{4}(t)&i&0\\ \end{array}\right ]= \left[ \begin{array}{ccc} &s_{2}{\ast}(t) &s_{4}^{\ast}(t)\\ s_{2}(t)&0&\sigma_{+}\\ s_{4}(t)&\sigma_{-}&0\\ \end{array}\right ] \end{equation} where $\sigma_{y}$ is a Pauli spin matrix. \end{Definition} For the fundamentalist trader, we use an finite state machine for the physiology of the time series to the accepted pattern defined by \begin{equation} A_{1}:=f_{\pm}=-W(\sigma_{z}) = \left[ \begin{array}{ccc} &s_{2}^{\ast} &s_{4}^{\ast}\\ s_{2}(t)&0&-1\\ s_{4}(t)&1&0\\ \end{array}\right ]=\left[ \begin{array}{ccc} &s_{2}^{\ast} &s_{4}^{\ast}\\ s_{2}(t)&0&f_{-}\\ s_{4}(t)&f_{+}&0\\ \end{array}\right ] \end{equation} Let $\omega$ be a biased behavior $A_{3}$ of the market micropotential field. Since $[\sigma_{y},\sigma_{z}]=2i\sigma_{x}$, \begin{equation} [f,-W^{-1}(\sigma)]=2i \omega \end{equation} where $W$ is Wilson loop or knot state between the predictor and the predictant for the time series data and $W^{-1}$ is the inverse of the Wilson loop for the time series data (unknot state between the predictor and the predictant). We have an entanglement state inducing the strategy of the noise trader as herding behavior explained by \begin{equation} s_{2} \stackrel{-i}{\rightarrow } s_{4}^{\ast}\hspace{0.5cm}, s_{4} \stackrel{i}{\rightarrow } s_{2}^{\ast} \end{equation} with \begin{equation} W_{\alpha,\beta}( \left[ \begin{array}{c} s_{2} \\ s_{4}^{\ast} \\ \end{array}\right ] )= \left[ \begin{array}{c} s_{4}^{\ast} \\ s_{2} \\ \end{array}\right ] \end{equation} \begin{figure}[!t] \centering \epsfig{file=plane_new.eps,width=5cm} \epsfig{file=node.eps,width=5cm} \caption{ Picture shown on the right is a knot model of the time series data in the left and right link of the Wilson loop of the behavior of the trader in the supersymmetry with an extra dimension. The picture on the left is a model of a supersymmetry theory $E_{8}\times E_{8}$ for the financial time series data. \label{unify}} \end{figure} We use a Laurent series to decompose the risk field into the left excess demand, $D$ and the right excess demand $D^{\ast}$ in the hidden space knot the Laurent polynomial with the coefficient in the Wilson loop of the behavior of the trader over the knot of the market cocycle $(\alpha,\beta)$ ,$W_{\alpha,\beta}(A_{\mu})$ by \[\sigma_{t}^{2}=\oint_{H^{2}(\mathcal{O}^{p+q}_{X})} \frac{\Pi W_{\alpha,\beta} (A_{\mu})}{D-D_{0}} dD +\oint_{H^{2}(\mathcal{O}^{p+q}_{X^{\ast}})} \frac{\Pi W_{\alpha,\beta}(A_{\mu}) }{D^{\ast}-D_{0}^{\ast}} dD^{\ast}+ \oint_{H^{2}(\mathcal{O}^{p+q}_{Y})} \frac{\Pi W_{\alpha,\beta} (A_{\mu})}{S-S_{0}} dS +\oint_{H^{2}(\mathcal{O}^{p+q}_{Y^{\ast}})} \frac{\Pi W_{\alpha,\beta}(A_{\mu}) }{S^{\ast}-S_{0}^{\ast}} dS^{\ast}, \] where $(S,S^{\ast})$ is a pair of the supply and the hidden supply and $(D,D^{\ast})$ is a pair of the demand and a hidden demand field. The main problem of GARCH(1,1) is that return is not in a log scale but we have a constant Euclidean distance. In this work, we change the metric to the hyperbolic distance in order to solve a volatility of the cluster phenomena. We found a complete solution in the complex time scale with a conjugate solution in the minus time scale. We interpret the results with the index cohesive force. We called the volatility in the inert hidden time scale the hidden fear field or the dark volatility. We model the financial market in the unified theory of $E_{8}\times E_{8}^{\ast}$ (Figs. \ref{unify}) under the mathematical structure of the Kolmogorov space underlying the time series data. Let $M\in\mathbb{H}P^{1}/Spin(3)$ be a market with the supply and demand sides and $M^{\ast}:\rightarrow\mathbb{H}P^{1}/Spin(3)\rightarrow \mathbb{H}P^{1}$ be a dual market of the behavior of the noise trader, $\sigma$ and fundamentalist $f$. Then we prove an existence of the general equilibrium point in the market by using equivalent classes of the supply $[s]$ and the demand $[d]$ in the complex projective space $[s],[d]\in \mathbb{C}P^{1}$. The Kolmogorov space $S^{7}=\mathbb{H}P^{1}\simeq E_{8}$ can use explicit states of the financial market and its dual $\mathbb{H}P^{1\ast}/spin(3)\simeq E_{8}^{\ast}$ uses dark states in the financial market. It is a ground field of the first knot cohomology group tensor with the first de Rahm cohomology group $H_{1}(x_{t};[G,G^{\ast}];\mathbb{H}P^{1}/spin(3))\otimes H^{1}(M;\mathbb{H}P^{1\ast}/spin(3)).$ We induce free duality maps $\xi:H_{1}(x_{t};[G,G^{\ast}];\mathbb{H}P^{1}/Spin(3))\rightarrow H^{1}(M;\mathbb{H}P^{1\ast}/spin(3)) $ as the market states $E_{8}\times E_{8}^{\ast}$ in the grand unified theory model of the financial market. For the simplicity, we let a piece of the surface cut out from the Riemann sphere with a constant curvature $g_{ij}$ defined as a parameter of a D-brane field basis with the same orientation as a definition of the supply and demand in the complex plane (flat Riemann surface). Now we blend the complex plane to the hyperbolic coordinate in 8-hidden dimensions of $\Psi=(\Psi_{1},\cdots \Psi_{8}^{\ast})\in S^{7}$, 8 states in the explicit form. \subsection{Yang-Mills equation for Financial Market} In this section, we explain the source of de Rahm coholomogy of the financial market. The mathematical structure in this section is related to the Chern-Simons theory of so- called gravitational field in 3 forms of the connection $F^{\bigtriangledown}\in \Omega^{2}(T_{x}M\otimes T_{x}^{\ast}M)$ over 3 vector fields in the financial market: $\Psi_{i}\in M$ a market state field, $\mathcal{A}_{i}$ an agent behavior field and $[s_{i}]$ a field of physiology of financial time series data over Kolmogorov space. We simplify the Chern-Simons theory to a suitable form to easy understand this section and also can just simplify the prototype of the real and useful new cohomology theory for the financial market. Let $\mathcal{A}=(A_{1},A_{2},A_{3})$ be a market micro potential field of the agent or the behavior of the trader in the market. Let $\Psi_{i}^{(\mathcal{S},\mathcal{D})}([s_{i}],[s_{j}])$ be a field of the market $8-$ states of the equivalent class of the physiology of the time series $[s_{i}],[s_{j}]$. In the financial market microstructure, we define a new quantity in microeconomics induced from the interaction of the order submission from the supply and demand side of the orderbook, so-called market microvector potential field or the connection in the Chern-Simons theory for the financial time series $ \mathcal{A}(x,t;g_{ij},\Psi_{i}^{(\vec{\mathcal{S}},\vec{\mathcal{D}})},s_{i}(x_{t}))$, where $\Psi_{i}^{(\vec{\mathcal{S}},\vec{\mathcal{D}})}$ is a state function for the supply $\vec{\mathcal{S}}$ and the demand $\vec{\mathcal{D}}$ of the financial market. Let $ \Psi_{i}^{(\vec{\mathcal{S}},\vec{\mathcal{D}})}(F_{i})$ be a scalar field induce from news of market factor $F_{i},i=1,2,3,4$. Let $x_{t}(\mathcal{A},x^{\ast},t^{\ast})$ be a financial time series induce from field of market behavior of trader. Where $x^{\ast}$ and $t^{\ast}$ are hidden dimension of time series data in Kolmogorov space. In equilibrium state, the sequence is exact with $\partial^{2}=0.$ We have demand in equilibrium state $D=\partial^{2}A=0$ as property of short exact sequence in which can induce infinite cohomology sequence of sphere as sheave sequence of financial time series data. \begin{Definition} Let $S$ be a supply potential field be defined by rate of change of supply side of market potential fields of behavior trader in induced field of behavior of agent $\mathcal{A}$ in stock market. \begin{equation} \vec{\mathcal{S}}=-\frac{\partial \mathcal{A}}{\partial [s_{4}]} \end{equation} \begin{equation} \vec{\mathcal{NS}}=-i\frac{\partial \mathcal{A}}{\partial [s_{4}]} \end{equation} \begin{equation} \vec{\mathcal{D}}=\frac{\partial \mathcal{A}}{\partial [s_{2}]} \end{equation} \begin{equation} \vec{\mathcal{ND}}=+i\frac{\partial \mathcal{A}}{\partial [s_{2}]} \end{equation} with \begin{equation} \mathcal{A}=(A_{1}(f),A_{2}(\sigma),A_{3}(\omega)) \end{equation} \end{Definition} \begin{Definition} Let $\vec{\mathcal{D}}$ be a demand potential field (analogy to magentic field). It is defined by rate of change of market potential fields in induce field of $\vec{\mathcal{S}}$, \begin{equation} \vec{\mathcal{D}}=\bigtriangledown \times \vec{\mathcal{S}}. \end{equation} \end{Definition} \begin{Definition} Let $F_{\mu\nu}$ be a stress tensor for market microstructure with component $A_{\mu}$ of market potential field(analogy with connection one form in Chern-Simons theory) defined by the rank 2 antisymmetric tensor field, \begin{equation} F_{\mu\nu} =\partial_{\mu}A_{\nu}-\partial_{\nu}A_{\mu}, \end{equation} \begin{equation} \frac{d\mathcal{A}}{d[s_{2}]}=S_{\nu}=F_{\mu\nu}\Psi^{\nu}, \hspace{0.5cm} \frac{d\mathcal{A}}{d[s_{4}]}= D_{\mu}=\epsilon_{\mu\nu}^{\kappa\lambda}F_{\kappa\lambda}\Psi^{\nu}. \end{equation} \end{Definition} These 3 vector fields of behavior trader play role of 3 form in tangent of complex manifold. It is an element of section $\Gamma$ of manifold of market, $ \mathcal{A}\in \Gamma(\wedge^{3}T^{\ast}_{x}M\otimes \mathbb{H})= \Omega^{3}(M).$ Let consider 3-differential form of behavior of trader as market potential field $\mathcal{A}$, \begin{equation} d\mathcal{A}=\sum_{ijk=1,2,3}F_{ijk}dA_{i}\wedge dA_{j}\wedge dA_{k} \end{equation} \begin{equation} \begin{CD} \cdots @<<<\Omega^{3}(M) @<{\text{d}}<< \Omega^{2}(M) @<{\text{d}}<< \Omega^{1}(M)@<{\text{d}}<< \Omega^{0}(M)@<{\text{d}}<< 0 \\ @. @VVV @VVV @VVV @VVV @.\\ \cdots @<<<C_{3}(X_{t}) @>\partial>> C_{2}(X_{t}) @>\partial>> C_{1}(X_{t})@>\partial>> C_{0}(X_{t})@>\partial>> 0 \end{CD} \end{equation} with a market state $\Psi^{(S,D)}\in C^{1}(M).$ A de Rahm cohomology for financial market is defined by using equivalent class over these differential form. The first class so called market cocycle $Z^{n}(M)=\{f^{\ast}: C^{n}(M)\rightarrow C^{n+1}(M) \}$ with commutative diagram between covariant and contravariant functor, \begin{equation} \begin{CD} \cdots @<<<H^{3}(M) @<{\text{d}}<< H^{2}(M) @<{\text{d}}<< H^{1}(M) @<{\text{d}}<< H^{0}(M)@<{\text{d}}<<0\\ @. @VV\xi V @VV\xi V @VV\xi V @VV\xi V @VV\xi V\\ \cdots @<<<H_{3}(X_{t}) @>\partial>> H_{2}(X_{t}) @> \partial>> H_{1}(X_{t})@> \partial>> H_{0}(X_{t})@> \partial>> 0\\ @. @VV\nu V @VV\nu V @VV\nu V @VV\nu V @VV\nu V\\ \cdots @<<<H^{3}(x_{t}:[G,G^{\ast}]) @<{\text{d}}<< H^{2}(x_{t}:[G,G^{\ast}]) @<{\text{d}}<< H^{1}(x_{t}:[G,G^{\ast}]) @<{\text{d}}<< H^{0}(x_{t}:[G,G^{\ast}])@<{\text{d}}<<0\\ \end{CD} \end{equation} It is a kernel of co-differential map between supply and demand to market potential field. \begin{equation} Ker(d:\Omega^{2}(M)\rightarrow \Omega^{3}(M)), d:[s_{i}](S,D)\mapsto \mathcal{A}(A_{1},A_{2},A_{3}),d[s_{i}](S,D)=0=\mathcal{A} \end{equation} Where $[s_{i}](S,D)$ is an equivalent class of physiology of time series data. The boundary map of cochain of market $\Omega^{2}(M)$ is a second equivalent class used for modulo state, \begin{equation} Im(d:\Omega^{1}(M)\rightarrow \Omega^{2}(M), d:\Psi^{(S,D)}\mapsto [s_{i}](S,D). \end{equation} \begin{Definition} The de Rahm cohomology for financial time series is an equivalent class of second cochain of market \begin{equation} H_{DR}^{2}(M)=Ker(d:\Omega^{2}(M)\rightarrow \Omega^{3}(M))/Im(d:\Omega^{1}(M)\rightarrow \Omega^{2}(M)). \end{equation} \end{Definition} The meaning of new defined mathematical object is use for measure a market equilibrium in algebraic topology approach. The section of manifold induce a connection of differential form. The connection typically gravitational field in physics. In finance, connection use for measure arbitrage opportunity. The connection allow us to use the Peterson-Codazzi equations of Killing form of parallel transport of geodesic curve as hidden equilibrium equation for financial market over Riemannan surface of market, Let $A_{\nu}=F_{\nu}^{\bigtriangledown}\in \Omega^{2}(T_{x}M\otimes T_{x}^{\ast}M), \bigtriangledown:\Omega^{0}(M)\rightarrow \Omega^{1}(M)$.Let $\Psi_{i}\in M: \mathbb{H}P^{1}/Spin(3)\rightarrow S^{7},[s_{i}]\in Physio(x_{t}):=G:\mathbb{C}P^{1}=S^{3}/S^{1}\rightarrow S^{3}=\mathbb{H}.$ Where $G$ is a Lie algebras of predictor and $G^{\ast}$ is a predictant. $\Psi_{i}^{\ast} $ is dual basis of market state $\Psi_{i}$. We have the Peterson-Codazzi equations of arbitrage opportunity as Jacobian flow $g_{ij}$ by \begin{equation} g(\bigtriangledown_{\Psi}[s_{i}^{\ast}],[s_{i}])+g(\Psi,\bigtriangledown_{[s_{i}]}\Psi^{\ast})=0. \end{equation} where $\bigtriangledown$ is a connection of time series data over financial manifold. We get an equation of equilibrium point of traders hold when $\lambda$ is eigenvalue of arbitrage $g$. The covariant derivative allow us to measure the rate of change of 3 fields in financial market. The rate of change of arbitrage opportunity behavior field of trader $A_{i}$ with respect to rate of change of physiology of time series data $d[s_{i}]=[s_{i}^{\ast}]-[s_{i}]$, the error between predictor and predictant is given by $\bigtriangledown_{\Psi}[s^{\ast}]=0$. The meaning of term $\bigtriangledown_{\Psi}[s^{\ast}]$ in the Peterson-Codazzi equations of arbitrage opportunity is the change of market state with respect to expectation field of physiology $[s^{\ast}]$. \subsection{ Grothendieck Cohomology for Financial Time Series} Let Minkowski space of light cone in time series data be compose of 2 cones embedded into Euclidean plane in pointed space of time series as equilibrium node. The upper cone is for superspace of supply $X_{t}$ as Kolmogorov space in time series data. The down cone is superspace of demand side of market, $Y_{t}$. We assume that in unit cell of non-Euclidean plane of time series data composed of 2 sheet with left and right hand supersymmetry. It is superposition to each others in opposite direction with left hand and right supersymmetry of hidden direction of time $dt$ and reversed direction of time scale $dt^{\ast}$ in which observe cannot be notice from outside the system. The quantization of hidden state of behavior of trader in superspace of time series data is an unoriented supermanifold with ghost field and anti-ghost field in side of Dbrane and anti-Dbrane sheet of normal distribution in Minkowski space in time series data. We define a new lattice theory with ghost pairs state of 2 pairs of supply and demand ghost field $(\Psi_{L},\Psi_{R})$ \begin{Definition} Let $\Psi_{R}(D_{i}^{\ast})$ be a market right state of demand side over behavior of trader $[A_{\mu}]$. Let $\Psi_{L}(S_{i}^{\ast})$ be a market right state of supply side over behavior of trader $[A^{\mu}]=[A_{\mu}^{\ast}]$. Let $[A_{\mu}]\in \mathcal{A}^{G}$ be a space of gauge field of connection of behavior of traders in financial market. let $[A_{\mu}^{\ast}]\in \mathcal{A}^{\ast}_{G}$ be a dual space of gauge field of connection of a genetic code of host cell define by \begin{equation} \Phi(A_{\mu})^{+}_{\Psi_{R} }=\sum_{i=1}^{n}[g_{ji},A_{\mu}]|\Psi_{R}(D_{i}^{\ast})> =\sum_{i=1}^{n}{\sigma_{t}^{\ast}}^{2}|\Psi_{R}(x^{\ast})> \end{equation} and \begin{equation} \Phi(A_{\mu})^{-}_{\Psi_{L}}=\sum_{i=1}^{n}[g^{ji},A^{\mu}]|\Psi_{L}(S_{i}^{\ast})> =\sum_{i=1}^{n}{\sigma_{t}^{\ast}}^{2}|\Psi_{L}(y^{\ast})> \end{equation} if there exist a market transition state shift as dark volatility $\sigma _{t}^{\ast}$ with gauge group of evolution behavior of trader $G$ such that, \begin{equation} [ \Psi_{R}(x^{\ast})^{+}, \Psi_{L}(y^{\ast})^{-}]=\frac{\partial p_{t}(S^{\ast},D^{\ast}) }{\partial [s_{t}^{\ast}(t)]} \end{equation} with ${{\sigma}^{\ast}}^{2}_{t}\in \mathcal{A}^{G}\otimes \mathcal{A}^{\ast}_{G}$. \end{Definition} The coupling of interaction of supernormal distribution induced from behavior of trader as pairs of ghost field and anti-ghost field can be classified by using link operator in knot theory, with link state $<L>_{0},<L>_{+}$ and $<L_{-}>$. A unoriented superdistrubtion is in knot state with left and right link operator associate with left and right supersymmetry in chiral ghost field of supply and demand of market superstate. We work in level of Kolmogorov space. Let $X_{t}$ be Kolmogorov space of supply gauge field with $S_{t}\in X_{t}$ and $Y_{t}$ be Kolmogorov space of demand gauge field with $D_{t}\in Y_{t}$. Let a momentum space of orbital of quantum price structure in supermanifold be coordinated by $(k_{x},k_{y})\in X_{t}/Y_{t}|_{L}$,we can choose $X_{t}/Y_{t}:=\mathbb{H}P^{1}$, with twistor break a chiral supersymmetry from left to right in mirror space by \begin{equation} \mathcal{O}^{p,q}_{X_{t}/Y_{t}|_{L}} \stackrel{<L>_{+}}{\rightarrow} \mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}|_{R}} \end{equation} \begin{equation} \mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}|_{R}}\stackrel{<L>_{-}}{\rightarrow} \mathcal{O}^{p,q}_{ X_{t}/Y_{t}|_{L}} \end{equation} with skein relation over knot of Laurent polynomial $ q=e^{\frac{2\pi i}{n+k}}$, \begin{equation} -q^{\frac{n}{2}}<L>_{+} +(q^{\frac{1}{2}} - q^{-\frac{1}{2}} )<L>_{0}+q^{-\frac{n}{2}}<L>_{-}=0. \end{equation} The dual behavior trader pair is $(k_{x}^{\ast},k_{y}^{\ast})\in Y_{t}^{\ast}/X_{t}^{\ast}.$ We have a short exact sequence induced infinite sequence of Grothendieck cohomology for financial time series data \begin{equation} 0\rightarrow \mathcal{O}^{p,q}_{\mathbb{Z}/2} \rightarrow \mathcal{O}^{p,q}_{X_{t}} \rightarrow \mathcal{O}^{p,q}_{Y_{t}}\rightarrow \mathcal{O}^{p,q}_{X_{t}/Y_{t}}\rightarrow \mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}}\rightarrow \mathcal{O}^{p,q}_{Y_{t}^{\ast}} \rightarrow \mathcal{O}^{p,q}_{X_{t}^{\ast}}\rightarrow \cdots \nonumber \end{equation} \begin{equation} \rightarrow H^{1}(\mathcal{O}^{p,q}_{\mathbb{Z}/2 }) \rightarrow H^{1}(\mathcal{O}^{p,q}_{X_{t}}) \rightarrow H^{1}(\mathcal{O}^{p,q}_{Y_{t}})\rightarrow H^{1}(\mathcal{O}^{p,q}_{X_{t}/Y_{t}})\rightarrow H^{1}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}})\rightarrow H^{1}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}}) \rightarrow H^{1}(\mathcal{O}^{p,q}_{X_{t}^{\ast}})\rightarrow \nonumber \end{equation} \begin{equation} \rightarrow H^{2}(\mathcal{O}^{p,q}_{\mathbb{Z}/2 }) \rightarrow H^{2}(\mathcal{O}^{p,q}_{X_{t}}) \rightarrow H^{2}(\mathcal{O}^{p,q}_{Y_{t}})\rightarrow H^{2}(\mathcal{O}^{p,q}_{X_{t}/Y_{t}})\rightarrow H^{2}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}})\rightarrow H^{2}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}}) \rightarrow H^{2}(\mathcal{O}^{p,q}_{X_{t}^{\ast}})\rightarrow \cdots \nonumber \end{equation} \begin{equation} \rightarrow H^{n}(\mathcal{O}^{p,q}_{\mathbb{Z}/2 }) \rightarrow H^{n}(\mathcal{O}^{p,q}_{X_{t}}) \rightarrow H^{n}(\mathcal{O}^{p,q}_{Y_{t}})\rightarrow H^{n}(\mathcal{O}^{p,q}_{X_{t}/Y_{t}})\rightarrow H^{n}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}/X_{t}^{\ast}})\rightarrow H^{2}(\mathcal{O}^{p,q}_{Y_{t}^{\ast}}) \rightarrow H^{n}(\mathcal{O}^{p,q}_{X_{t}^{\ast}})\rightarrow \cdots \end{equation} Let a behavior of traders be a ghost pairs $\Phi^{\pm}:= (\Psi^{R},\Psi^{L})$ with left supersymmetry be \begin{equation} \Psi_{L}:= \Psi_{L}^{ 0\rightarrow g_{1}^{L}\stackrel{d_{1}}{\rightarrow} g_{2}^{L}\stackrel{d_{2}}{\rightarrow} g_{3}^{L}\rightarrow \cdots \stackrel{d_{n}}{\rightarrow}g_{n}^{L}\rightarrow 0} \end{equation} where $g_{i}^{L}$ is an adjoint map of market chain of cocycles. \begin{equation} g_{i}^{L}: \mathcal{O}^{p,q}\{0 \rightarrow \mathbb{Z}/2\rightarrow X_{t} \rightarrow Y_{t}\rightarrow X_{t}/Y_{t} \rightarrow \cdots\} \stackrel{<L>_{-}}{\rightarrow} \mathcal{O}^{p,q}\{0\rightarrow Y_{t}^{\ast}/X_{t}^{\ast}\rightarrow Y_{t}^{\ast} \rightarrow X_{t}^{\ast}\rightarrow \cdots \} \end{equation} Let a supply side of market as a right supersymmetry be \begin{equation} \Psi_{R}:= \Psi_{R}^{ {g_{1}^{\ast}}^{R}\leftarrow {g_{2}^{\ast}}^{R}\leftarrow {g_{3}^{\ast}}^{R}\leftarrow \cdots {g_{n}^{\ast}}^{R}} \end{equation} \begin{equation} {g_{i}^{\ast}}^{R}: \mathcal{O}^{p,q}\{\cdots\leftarrow X_{t} \leftarrow Y_{t}\leftarrow X_{t}/Y_{t} \leftarrow 0\} \stackrel{<L>_{+}}{\leftarrow} \mathcal{O}^{p,q}\{\cdots\leftarrow Y_{t}^{\ast}/X_{t}^{\ast}\leftarrow Y_{t}^{\ast} \leftarrow X_{t}^{\ast}\leftarrow \mathbb{Z}/2 \leftarrow 0 \} \end{equation} with \begin{equation} Ad_{\Psi^{L}}{\Psi^{\ast}}^{R}= \{\Psi^{L},{\Psi^{\ast}}^{R}\} =0 \end{equation} The inversion property of CPT produce parity inversion as ghost field and anti-ghost field pairs. Let ghost field pair be $\Phi^{+}_{\Psi^{\ast}_{R}}(A_{\mu})$ with arbitrage opportunity as a connection $A_{\mu}$ and anti-ghost field pair be $\Phi^{-}_{\Psi_{L}}(A_{\mu})$ with partition map \begin{equation} p(\Phi^{-}_{\Psi_{L}(x_{t}^{\ast})}(A_{\mu}))+ p(\Phi^{+}_{\Psi^{\ast}_{R}(y_{t})}(A_{\mu}))=-1 \end{equation} where the parity map separate hidden supersymmetry of left right in supply demand equilibrium node represent as market general equilibrium point between supply and demand gauge field in 2 cones of with price surfaces by $p: \{ \Phi^{-}_{\Psi_{L}}(A_{\mu}),\Phi^{+}_{\Psi_{R}}(A_{\mu})\}\rightarrow \mathbb{Z}_{2}=\{-1,1\}$ with $p( \Phi^{-}_{\Psi_{L}(x_{t}^{\ast})}(A_{\mu})))=1-\Phi^{+}_{\Psi_{L}(x_{t})}(A_{\mu}))$ and $p( \Phi^{-}_{\Psi_{R}(y_{t}^{\ast})}(A_{\mu})))=1-\Phi^{+}_{\Psi_{L}(y_{t})}(A_{\mu}))$ as time reversal partity operator in moduli state space model of financial market. Let define quantum price with for time reversal wave function by $\Psi(x^{\ast})= \Psi(x_{t})^{t}=e^{-ik_{x_{t}}x}$. We have \begin{figure}[!t] \centering \epsfig{file=ssm_beta4.eps,width=8cm} \caption{ Picture shown superspace in time series data with moduli stack $[s_{i}].$ The cone inside superspace is a Minkowski space with light cone for time series data. We have spinor field in time series data as support spinor machine in this model. \label{ssm}} \end{figure} The superspace in time series data use to measured (see fig. \ref{ssm} for detail) the dual coupling behavior field derived from Laurent series over 4 hidden momentum spaces, $X_{t},Y_{t},X_{t}^{\ast},Y_{t}^{\ast}$ with both positive and negative coefficient of knot polynomial represent optimistic and pessimistic fundamentalist and noise traders behavior field. The knot behavior of behavior induced an arbitrage opportunity as a connection over Wilson loop represent market phase transition with $(\alpha ,\beta )$ market cocycle in $W_{\beta,\alpha}(A_{\mu})$. Let a momentum coordinate of price quantum be in functional coordinate over path integral of Wilson loop along loop space of ghost field behavior pairs. We have \begin{equation} k_{x}=\frac{i}{x}\int_{0}^{\Psi_{R}}\frac{\Pi W_{\alpha,\beta}(A_{\mu})}{x^{\ast}-x^{\ast}_{0}}dx^{\ast}, \end{equation} \begin{equation} k_{y}=\frac{i}{y}\int_{0}^{\Psi_{L}}\frac{\Pi W_{\alpha,\beta}(A_{\mu})}{y^{\ast}-y^{\ast}_{0}}dy^{\ast} \end{equation} \begin{equation} k_{x^{\ast}}=\frac{i}{x^{\ast}}\int_{0}^{\Psi_{R}}\frac{\Pi W_{\alpha,\beta}(A_{\mu})}{x-x_{0}}dx, \end{equation} \begin{equation} k_{y^{\ast}}=\frac{i}{y^{\ast}}\int_{0}^{\Psi_{L}}\frac{\Pi W_{\alpha,\beta}(A_{\mu})}{y-y_{0}}dy \end{equation} A left pairs of behavior field represent supply side is \begin{equation} \Phi^{+}_{\Psi_{L} }=c_{k_{x}}e^{2\pi i k_{x}}-c_{k_{y}}e^{2\pi i k_{y}} \end{equation} and right pair represent demand side of financial market with \begin{equation} \Phi^{-}_{\Psi_{R} }=c_{k_{x^{\ast}}}e^{-2\pi i k_{x^{\ast}}}+c_{k_{y^{\ast}}}e^{-2\pi i k_{y^{\ast}}} \end{equation} The equilibrium node $\{(\ast_{x},\ast_{y})\}$in Minkowski market light cone $Cone(x^{\ast},y^{\ast};pp^{\ast}(k^{\ast})):=\{ {x^{\ast}}^{2}-{y^{\ast}}^{2}=||pp^{\ast}(k^{\ast})||^{2}=1\}$ is defined by cone \[\{(\ast_{x},\ast_{y})\} \in Cone(x,y;pp(k))\] and where $pp^{\ast}(k^{\ast})$ is a superdistribution of price quantization and $x^{\ast},y^{\ast}$ are a hidden demand and hidden supply $,D^{\ast},S^{\ast}$. We define Galois connection to map between 2 dual Minkowski cones as market equilibrium path by $ \{(\ast_{x^{\ast}},\ast_{y^{\ast}})\}\in Cone(x^{\ast},y^{\ast};pp^{\ast}(k^{\ast}))$ with \begin{equation} Cone(x,y;pp(k))\stackrel{f}{\rightarrow} Cone(x^{\ast},y^{\ast};pp^{\ast}(k^{\ast})),Cone(x^{\ast},y^{\ast};pp^{\ast}(k^{\ast}))\stackrel{g}{\rightarrow} Cone(x,y;pp(k)) \end{equation} \begin{equation} \{(\ast_{x},\ast_{y})\} =g(f( \{(\ast_{x},\ast_{y})\} ),\{(\ast_{x^{\ast}},\ast_{y^{\ast}})\} =f(g( \{(\ast_{x}^{\ast},\ast_{y}^{\ast})\} ) \end{equation} In supernormal distribution, we have take into account spin as coupling field of behavior of trader appear as Wilson loop of Pauli matrix $f_{+}:=A_{\mu=1}:=-W_{\alpha,\beta}(\sigma_{z})$ as behavior of fundamentalist. The behavior of chatlist is defined by Pauli matrix $\sigma_{+}:=A_{\mu=2}:=\sigma_{y}$. The behavior of bias traders is an adjoint representation of fundamentalist and inversed of Wilson loop of chatlist $A_{3}:=\frac{1}{2i}[f,-W^{-1}(\sigma)].$ The optimistic behavior is denoted by $A_{\mu}$ and pessimistic is denoted by $A^{\mu}=(A_{\mu})^{\ast}$. Hence \begin{equation} pp^{\ast}(k^{\ast}):=A_{\mu}\Phi^{+}_{{\Phi}_{R}}+A^{\mu}\Phi^{-}_{{\Phi}_{L}} \end{equation} with $||pp^{\ast}(k^{\ast})||^{2}=1$ and $||A_{\mu}\Phi^{+}_{{\Phi}_{R}}||^{2}=1, ||A^{\mu}\Phi^{-}_{{\Phi}_{L}}||^{2}=1.$ If $A_{\mu}$ is a Pauli matrix represented spinor field of behavior of trader. The spinor invariant property of price quantum $\varphi_{t}$ in these normalization formula is a source of stationary process in superspace of time series data extended volatility to dark volatility by $||\varphi_{i}||^{2}=1$ to $||\sigma_{i}\varphi_{i}||^{2}=1$. Let $S^{2}$ be financial market as a Riemann sphere of price momentum space of price quantum without singularity, glue up from dual side of supply and demand in market with 2 disjoint cones with 2 equilibrium nodes. The market equilibrium node is composed of pairs opposite spinor field of behavior traders, $(\ast_{x},\ast_{y})$ as a pointed space embedded inside Riemann sphere of energy surface $S^{2}$. \begin{equation} S^{2}=X_{t}\coprod X_{t}^{\ast}\coprod Y_{t}\coprod Y_{t}^{\ast}\coprod \ast_{x_{t}}\coprod \ast_{y_{t}} \end{equation} where $x_{t}\in X_{t},y_{t}\in Y_{t},x_{t}^{\ast}\in X_{t}^{\ast},y_{t}^{\ast}\in Y_{t}$ are Kolmogorov space for time series data. This is a new kind of super mathematics theory in probability theory with new integral sign over tangent of supermanifold under Berezin coordinate transformation. The structure of supergeometry of superpoint induce a superstatistic of hidden ghost field in financial market. We let $y_{t}$ be an observe variable in state space model and $x_{t}$ be hidden variable of state. We denote $\Phi_{i}(y_{t})\in \mathcal{A}$ be a ghost field and $\Phi_{i}^{+}(x_{t})$ be an anti-ghost field in finance with relation of its ghost number , \begin{equation} gh(\Phi_{i}(y_{t}))+gh(\Phi_{i}^{+}(x_{t})) =-1. \end{equation} We have a parity $p(\Phi_{i}(y_{t}))=1-p(\Phi_{i}^{+}(y_{t})) $ and $p(\Phi_{i}(x_{t}))=1-p(\Phi_{i}^{+}(x_{t})) $ for both state and space variable in ghost field and anti-ghost field. \subsection{ Volatility Clustering Phenomena and General Equilibrium in Financial Market} We separate the system of financial market into 2 parts, first is state part $X_{t}$ of hidden demand state and second is a space part $Y_{t}$ of observation of supply space of state space model. In this work, we use algebraic equation from algebraic topology and differential geometry as a main tool for define a new mathematical object for arbitrage opportunity in DSGE system of macroeconomics. \begin{Theorem} When market is in equilibrium , we have \begin{equation} s^{2}=0 \leftrightarrow H^{-14}(\mathcal{A},s)=0 \end{equation} \end{Theorem} {\em proof:} see \cite{anomaly} . We divide market into 2 separated sheet of Dbrane and anti-Dbrane of embedded indifference curve of supply curve and utility curve of demand. The interaction of 2 Dbrane induce from trade off between supply and demand as general equilibrium point. We define the Dbrane sheet of market is in real dimension and the anti self duality (AdS) of Dbrane to anti-Dbrane is induce from duality map from supply to demand. Let ordinary least square (OLS) in superspace in time series data be written by \begin{equation} y_{t} =\alpha_{t} +\beta_{t} x_{t} + \epsilon_{t} \end{equation} Take a ghost functor $\Phi_{i},\Phi_{i}^{+}: X\rightarrow (\mathcal{A},s)\simeq [X,S^{\pm k}]$ \begin{equation} \Phi_{i}( (y_{t} - \alpha_{t})- \beta_{t} x_{t} \simeq \epsilon_{t}) \end{equation} Let $\epsilon_{t}$ be real present shock from economics and $\epsilon_{t}^{\ast}$ be expected shock. in the futures. In equilibrium, we assume steady stead of macroeconomics with no shock i.e. $\epsilon_{t}^{2}=0$. Let 0 be space of equilibrium and equivalent with moduli state space model of supply space $Y_{t}$ and demand space $X_{t}$ of market with $\epsilon_{t}^{2}=<\epsilon_{t},\epsilon_{t}^{\ast}>\simeq Y_{t}/X_{t}$. Consider short exact sequence of macroeconomics in general equilibrium with market risk $\beta_{t}$ of sudden shock in demand side and transfer into supply side of economics and let systematics risk $\alpha_{t}$ be a shock in both side of with price sticky market. The moduli group $\mathbb{Z}_{2}$ define a state up and down of underlying financial time series data. When market is in equilibrium the short exact sequence will induce infinite exact sequence of market cocycle $\beta_{t}$ and $\alpha_{t}$, In order to proof the existence of dark volatility in financial market. We use tensor correlation field. Let $\tau$ be time lag of autocorrelation function of volatlity cluster, \begin{equation} C_{|\tau|} = Corr(|r_{t} |, |r_{t+\tau} |) =\frac{C}{\tau^{\beta}} \end{equation} with power law parameter $\beta\leq 0.5$. We define time lag of power law function by, $ x^{\ast}(\tau, \beta) := \tau^{\beta}$. Let $ds^{2} = x^{2} - {x^{\ast}}^{2}$ be a Minkowski metric for GARCH(1,1). Let $x$ be autocorrelation function $x =:C_{| r|}(\tau)$ of return with volatility cluster phenomena. Then then there exist a dark volatility ${\sigma^{\ast}}_{t}^{2} < 0$ with minus sign in complex hidden time scale as a homogeneous coordinate in quaternionic projective space $\mathbb{H}P^{1}$ according to equation of projective hyperplane in Minkowski space $x^{2} - {x^{\ast}}^{2} = 1$. Let $\kappa$ be excess kurtosis, with $\sigma^{4} = \frac{\mu^{4}}{\kappa}-3.$ It is clear that $ \sigma^{2}=\pm \sqrt{ \frac{\mu^{4} }{\kappa}-3}$. Let us consider $x := C_{|r|}(\tau) = Corr(|r_{t} |, |r_{t+\tau} |) = \frac{C}{\tau^{\beta}} =\frac{C}{x^{\ast}}$. So we have a rotated hyperbola graph, $x x^{\ast} = C$ in with we can transform by using rotational eigenvalue to normal hyperbola graph $x^2-{x^{\ast}}^2 = C$. If we normalize $C'$ to one. If we use Euclidean distance in superspace in time series data with curvature constant over Minkowski cone so we have no arbitrage opportunity with time series is in stationary state. Although, in parallel transport of the connection $A_{\mu}(t)$ is vary with time so we still have arbitrage opportunity in form of Wilson loop over market cocycle $(\alpha,\beta)$,$W_{\alpha,\beta}(A_{\mu})$. In superspace of time series data $X_{t}/Y_{t}$, where $x:= C_{|r_{t}|}(\tau)\in X_{t}$ and $y:= C_{|r_{t+\tau}|}(\tau)\in Y_{t}$.We have tensor correlation as network of behavior traders, $x\otimes x^{\ast}, y\otimes y^{\ast}, x\otimes y, x^{\ast}\otimes y^{\ast} $ by \begin{equation} x\otimes y= C_{|r_{t}|}(\tau)\otimes C_{|r_{t+\tau}|}(\tau)\simeq Corr(|r_{t} |, |r_{t+\tau} |) = \frac{C}{\tau^{\beta}} = \frac{C}{x^{\ast}}. \end{equation} We have a triplet of tensor correlation with memory in constant value $C$, \begin{equation} x^{\ast}(x\otimes y)=C. \end{equation} This triplet has properties analogous with the gravitational field in the triplet of the Lie algebras in the Nahm equation for the monopole or the instanton in the theoretical physics. We defined a new form of the Yang-Mills equation in the financial market as a Nahm equation in the financial market version as a main consequence of the proved of volatility clustering phenomena. Let as denote $x:=D$, a demand field, $y:=S$ a supply field. Let price be a moduli state space between the supply and demand $p_{t}=D_{t}/S_{t}.$ Let $[D_{t}]:=T_{1}^{\mathcal{O}_{X}},[S_{t}]:=T_{2}^{\mathcal{O}_{Y}},[p_{t}]:=T_{3}^{\mathcal{O}_{X/Y}}$. The Nahm equations for transition states in financial market are \begin{equation} \frac{dS_{t}}{d[s_{i}]}=[D_{t},p_{t}] \end{equation} \begin{equation} \frac{dD_{t}}{d[s_{i}]}=[p_{t},S_{t}] \end{equation} \begin{equation} \frac{dp_{t}}{d[s_{i}]}=[D_{t},S_{t}]. \end{equation} The three equations can be written together by \begin{equation} \frac{dT_{i}^{\mathcal{O}_{(X,Y,X/Y)}}}{d[s_{i}]}=\frac {1}{2}\sum_{j,k}\epsilon_{ijk}[T_{j}^{\mathcal{O}_{(X,Y,X/Y)}},T_{k}^{\mathcal{O}_{(X,Y,X/Y)}}]= \sum_{j,k}\epsilon_{ijk}T_{j}^{\mathcal{O}_{(X,Y,X/Y)}}T_{k}^{\mathcal{O}_{(X,Y,X/Y)}}. \end{equation} With the modified Nahm equation for the interaction of the behavior of the traders from the supply and the demand sides in the financial market, we let a pair of the co-states in the market from the pair of the supply and demand sides be modified Lax pair equations for the pairs of the market state in the financial market as the co-states between the fundamentalist and the chatlist with the optimistic and the pessimistic forward looking of the price under the risk fear field ${\sigma_{t}^{\ast}}^{2}$. It is trivial that the modified Nahm equations for biology can be written in the Lax pairs of the demand pairs, $D-$pairs wave function and the supply pairs, $S-$ pairs wave function as following. Let \begin{equation} \Psi^{D-pairs}=T_{1}^{\mathcal{O}_{Y}}+iT_{2}^{\mathcal{O}_{X}},\Psi^{(D,S)-pairs}=-2iT_{3}^{\mathcal{O}_{X/Y}}, \Psi^{S-pairs}=T_{1}^{\mathcal{O}_{Y}}-iT_{2}^{\mathcal{O}_{X}} \end{equation} and \begin{equation} \Psi_{k,\mathcal{O}_{X}}^{\sigma_{t}^{2},D}=\Psi^{D-pairs}+k\Psi^{(D,S)-pairs} +k^{2}\Psi^{S-pairs}, \end{equation} \begin{equation} \Psi_{k,\mathcal{O}_{Y}}^{{\sigma_{t}^{\ast}}^{2},S}=\frac{1}{2}\frac{d\Psi_{k,\mathcal{O}_{X}}^{\sigma_{t}^{2},D}}{d[s_{i}]}={\frac {1}{2}}\Psi^{(D,S)-pairs}+k \Psi^{S-pairs} \end{equation} where $k$ is a D-brane of the market coupling constant in the Chern-Simons current as a transition state in the quantum price orbital, $J^{\mu=k}$. Notice that dark volatility induces from the supply a short term ${\sigma_{t}^{\ast}}^{2}$ in market the transition state in the supply side of the financial market. The system of the Nahm equations is equivalent to the Lax pair equation for the financial market. The co-state $\Psi^{(D,S)-pairs}:=(\Psi_{k,\mathcal{O}_{X}}^{\sigma_{t}^{2},D}, \Psi_{k,\mathcal{O}_{Y}}^{{\sigma_{t}^{\ast}}^{2},S})$. is a transition between the co-state of the interaction of the behavior field of the trader from the supply and the demand side in the financial market by the supply-demand pairs in the general equilibrium of the market co-state with $(\sigma_{t}^{2},{\sigma_{t}^{\ast}}^{2}) $ in the financial market. These system equations have a property of the Chern-Simons current in the time series data as the eigenvalues of the Dirac operator, $D$ for the financial market, \begin{equation} D\Psi^{(D,S)-pairs}=J^{\mu}\Psi^{(D,S)-pairs} \end{equation} where the critical current with some threshold of the risk aversion for an arbitrage opportunity of the behavior of the trader is denoted by ${J^{\mu}}_{c}$. We have \begin{equation} \sin\Psi^{(D,S)-pairs}=\frac{J^{\mu}}{ {J^{\mu}}_{c}}=\Psi^{(D,S)-pairs}_{xx}-\Psi^{(D,S)-pairs}_{yy} = (\frac{\partial^{2} }{\partial x^{2}}- \frac{\partial^{2} }{\partial y^{2}})\Psi^{(D,S)-pairs}=D\Psi^{(D,S)-pairs}. \end{equation} We define a price as a transition state of an orbit state in the fibre space with the co-states of the transformation of the behavior field of the traders from the demand side of the market to the supply side by new coordinates $(p_{t}^{\mathcal{O}_D}, p_{t}^{\mathcal{O}_S}) \in (\mathcal{O}_{X},\mathcal{O}_{Y})$ with \begin{equation} p_{t}^{\mathcal{O}_D}=\frac{D_{t}+S_{t}}{2},\quad p^{\mathcal{O}_S}_{t}=\frac{D_{t}-S_{t}}{2}, {p_{t}^{\mathcal{O}_D}}^{\ast}=\frac{D_{t}^{\ast}+S_{t}^{\ast}}{2},\quad {p_{t}^{\mathcal{O}_S}}^{\ast}=\frac{D_{t}^{\ast}-S_{t}^{\ast}}{2}. \end{equation} The equation can be transformed to \begin{equation} \Psi_{p^{\mathcal{O}_D}p^{\mathcal{O}_S}}^{D-pairs}=\sin \Psi^{D-pairs} , {\Psi^{\ast}_{{p^{\mathcal{O}_D}}^\ast{p^{\mathcal{O}_S}}^{\ast}}}^{S-pairs}=\sin {\Psi^{\ast}}^{S-pairs}. \end{equation} The super stationary state of the demand pair solutions for the pairing of $(\mathcal{O}_D,\mathcal{O}_D^{\ast})$ and $(\mathcal{O}_S,\mathcal{O}_S^{\ast})$ states in $(\mathcal{O}_S^{\ast},\mathcal{O}_D^{\ast})$ pairs can be solved by using the Paterson-Godazzi equation for an arbitrage opportunity. One part of the Lax pair equation for an arbitrage is a Paterson Godazzi equation for the demand side which has the pairing of $(\mathcal{O}_D,\mathcal{O}_D^{\ast})$ solution by \begin{equation} \Psi^{D-pair}(D,S):=4\arctan e^{k\alpha (D-pS)+\sigma_{t} }, \Psi^{S-pair}(D^{\ast},S^{\ast}):=4\arctan e^{k\beta (D^{\ast}-p^{\ast}S^{\ast})+\sigma_{t}^{\ast} }, \end{equation} where $p_{t}=\frac{dD}{dt}/\frac{dS}{dt}=\frac{dD}{dS}$ is a parameter for the price as a transition market state by changing the coordinate of the $D$ coordination in the demand side of the superspace of the financial market and $S$ is the coordinate in the supply side. The new parameter ${\sigma_{t}^{\ast}}^{2}$ is a hidden risk fear field or the dark volatility in this work. It comes from an evolutional factor of an adaptive behavior of the traders of the risk aversion and want to pursue an arbitrage opportunity. We let the transition of the states between the active price and the passive price while price are matching in double auction market defined by the phase parameters of the market cocycle $(\alpha,\beta)$ $ \alpha^{2}=\frac{1}{1-p^{2}}, \beta^{2}=\frac{1}{1-{p^{\ast}}^{2}},$ where an extra parameter $k$ comes from the coupling constant of the behavior of the traders with the Chern-Simons current $J^{\mu}=J^{\mu}_{c}\sin\Psi $, The $(\mathcal{O}_D,\mathcal{O}_D^{\ast})$ pairs and $(\mathcal{O}_S,\mathcal{O}_S^{\ast})$-pairs of the solution have a positive root and a negative root for $ (\alpha,\beta)$ cocycle as a twist in the variable to produce an arbitrage opportunity from the general equilibrium in the mean reversion as the super stationary state with the Chern-Simons current for the financial market. The phase shift of the price quantum in the lax pairs $ (\Psi^{D-pair},\Psi^{S-pair})$ takes the solution $\Psi^{D-pair} =0=\Psi^{S-pair}$ to an adjacent with $ \Psi^{D-pair}=2\pi=\Psi^{S-pair}$ as a boundary condition for the price quantum with $ (\Psi^{D-pair},\Psi^{S-pair})=(0,0)(\textrm{mod}2\pi).$ \section{Result and Conclusion} In this work we introduced a new approach which was used to obtain the description of the dynamics of the market panic in the financial world by using the cohomology theory and the Yang-Mills theory over the traditional time series model, so-called GARCH(1,1). Because the financial events understudied by the social sciences evidence cannot be directly transported into the theory of Yang-Mills field for the financial market, we need to add some more assumptions also to soften some of the the assumptions of the Yang-Mills equations for the suitable use in the financial market with the equilibrium point in the Minkowski spacetime. We explained stylized facts in the financial time series data by using Yang-Mills equation for the financial market. We used Jacobian flow to construct the Minkowski metric with the hidden state in the time series data as the spinor field. We used ghost and anti-ghosts field in the Grothendieck cohomology to explain the interaction of the behavior of the traders from the supply and demand side of the market in an infinite cohomology sequence. We proved the power law in the volatility clustering phenomena by using the inversion invariant in the Yang-Mills theory. The result of this work is a new type of GARCH(1,1) model in the superspace of the time series data, so-called Minkowski GARCH(1,1). This theory is used to explain the spectrum of the nonstationary and nonlinear financial time series data as an analogy with the spectrum sequence of the behavior of the trader as pairs of the quantum field states in the underlying time series data in the spacetime geometry of the Kolmogorov space in time series data. We proved all the possibilities of the existence of the prior problem and all the possibilities of the theorem to solve with the precise proving procedure. A collection of the theories for solving this problem we called the evolution feedback path. The result of this solving can be used to predict the financial time series with a very high precision without end effect by using the mixture of filtering technique and tool of theoretical physics. In this paper, we discussed a stylized fact on the long memory process of the volatility cluster phenomena by using Minkowski metric for GARCH(1,1). Also we presented the result of the minus sign of the volatility in the reversed direction of the timescale. It is named as the dark volatility or the hidden risk fear field. These situations have been extensively studied and the correlations have been found to be a very powerful tool. Yet most natural processes in the financial market are the non-stationary. In particular, in times of the financial crisis, some accident events or economic shock news, stationarity is lost. \textbf{The precise definition of a nonstationary state of time series can help to analyze the non-equilibrium state in the financial market.} As an example, we may think about the financial market state from a mathematical point of view. There is no any classical stochastic process which will match with the real financial data, because there is not a single Kolmogorov space describing the whole financial market. \textbf{ Dynamics of the market panic (in the financial world) from the point of view of new financial model is presented. We hope that the precise definition of Kolmogorov topological space can hopefully introduce the better understanding of the macroeconomic models. The suitable algebraic reconstruction of space of time series could help with analysis of the prior effect and endeffect of time series models. Our presented approach together with the close connection with of empirical mode decomposition and intrinsic time scale decomposition of correlation matrix can serve as the main tools for a detection of market crash over time series data, as was introduced in \cite{cohomo}.} \section*{Acknowledgments} \noindent The work was partly supported by VEGA Grant No. 2/0009/16. R. Pincak would like to thank the TH division in CERN for hospitality. K. Kanjamapornkul thanks to 100th Anniversary Chulalongkorn University Fund for Doctoral Scholarship.
\section{Introduction} The determination of rigidity and flexibility of bar-joint frameworks consisting of rigid bars connected at their ends by idealised joints is a highly active research area in discrete geometry with a long and rich history dating back to considerations of linkages, trusses and polyhedral structures by Maxwell, Cauchy and Euler, among others. Since bar-joint frameworks are suitable models for a variety of both man-made and natural structures (buildings, linkages, molecules, crystals, etc.), rigidity theory has a broad range of modern practical applications in fields such as engineering, robotics, CAD and materials science. (See \cite{HoDCG, HoGCP, W1} e.g.). This transfer of knowledge between fundamental and applied researchers is one of the motivations for exploring constraint systems in new geometric contexts, such as the normed spaces considered in this article (see also \cite{dam-lib,FHJV} for related problems). Another strong motivation comes from the potential for developing combinatorial Laman-type characterisations (\cite{Lamanbib}) of rigid graphs in any dimension, due to the amenability of the matroidal sparsity counts arising in some of these contexts. In this article, we consider first-order rigidity for bar-joint frameworks with a finite abelian symmetry group, developing both a general linear theory as well as sharp combinatorial results in the case of half-turn rotational symmetry in the $\ell^1$ and $\ell^\infty$-plane. This complements and extends work of Schulze \cite{BS2}, Jord\'{a}n, Kaszanitzky and Tanigawa \cite{jkt}, Malestein and Theran \cite{MaTh}, and Schulze and Tanigawa \cite{schtan} on symmetric frameworks in Euclidean space, and work of Kitson and Power \cite{kit-pow} and Kitson and Schulze \cite{kit-sch,kit-sch2} on infinitesimal rigidity in normed spaces. In Sect.~\ref{Sect:SymmetricNormedSpaces}, we introduce the natural notion of a {\em framework complex} and develop several key tools for analysing frameworks with a finite abelian symmetry group acting freely on the vertex set. These include a decomposition theorem for the framework complex (which incorporates a block decomposition for the rigidity operator) and counting criteria for the accompanying group-labelled quotient graph (called a {\em gain graph}). For a large class of $d$-dimensional normed spaces, with $d\geq 2$, this leads to the identification of $(d,d,m)$-gain-tight gain graphs, with $m\in\{0,1,2,d-2\}$, as the underlying structure graphs for phase-symmetrically isostatic frameworks with rotational symmetry (see Corollary~\ref{cor:neccounts}). In contrast to Euclidean contexts, these classes of graphs are matroidal for all dimensions $d$, and are computationally accessible through associated pebble-game algorithms \cite{LS}. In Sect.~\ref{Sect:Inductive}, a new inductive construction is obtained for the class of $(2,2,0)$-gain-tight gain graphs (Theorem \ref{thm:recurse}). Previous recursive characterisations of $(2,2,m)$-gain-tight graphs, with $m\in\{1,2\}$, can be found in \cite{NS}. The construction presented here is necessarily more involved due to a step change in the possible minimum degree when $m=0$. Recursive constructions of classes of graphs are of fundamental importance in rigidity theory, occurring for example in Laman's landmark characterisation of rigidity in the Euclidean plane \cite{Lamanbib}. Of particular relevance are previous characterisations of classes of gain graphs \cite{jkt,NS} and characterisations where graph simplicity is required to be preserved \cite{NO14,NOP12}. In Sect.~\ref{Sect:Gridlike}, geometric and combinatorial characterisations are obtained for the rigidity of two-dimensional frameworks with half-turn rotational symmetry in the $\ell^1$ and $\ell^\infty$-plane. The geometric results (Theorem \ref{thm:C2gridgeom}) use an edge-colouring technique which expresses the gain graph of a phase-symmetrically isostatic framework as an edge-disjoint union of either two unbalanced spanning map graphs (defined in Sect.~\ref{Sect:FrameworkColours}), or two spanning trees. Combinatorial characterisations are then obtained for graphs which admit a placement as a phase-symmetrically isostatic framework with half-turn rotational symmetry (Theorems \ref{thm:geom} and \ref{thm:geom2}) by combining these geometric results with the construction scheme from Sect.~\ref{Sect:Inductive}. The analogous problem for frameworks with reflectional symmetry requires different methods and was settled in \cite{kit-sch2}. \section{Symmetric frameworks and gain sparsity} \label{Sect:SymmetricNormedSpaces} The aim of this section is to derive necessary gain-graph counting conditions for symmetrically isostatic bar-joint frameworks in normed spaces. Throughout this article, $X$ denotes a finite dimensional real vector space with a norm $\|\cdot\|$ and dimension $d\geq 2$. The group of linear isometries of $X$ is denoted $\operatorname{Isom}(X,\|\cdot\|)$, or simply $\operatorname{Isom} (X)$. The complexification ${\mathbb{C}} \otimes_{\mathbb{R}} X$ is denoted $X_{\mathbb{C}}$ and, for convenience, elementary tensor products of the form $\lambda\otimes x$ are denoted by $\lambda x$. Also, $\Gamma$ will denote a finite abelian group with identity element $1$ and $\hat{\Gamma}$ will denote the dual group of characters $\chi:\Gamma\to \{z\in{\mathbb{C}}:|z|=1\}$. \subsection{Bar-joint frameworks} Let $G=(V,E)$ be a finite simple undirected graph and let $p=(p_v)_{v\in V}\in X^{V}$. If the components of $p$ are distinct vectors in $X$ then the pair $(G,p)$ is called a {\em bar-joint framework} in $X$. If $H$ is a subgraph of $G$ and $p_H=(p_v)_{v\in V(H)}$ then the pair $(H,p_H)$ is called a {\em subframework} of $(G,p)$. Define, \[f_G:X^{V}\to {\mathbb{R}}^{E}, \,\,\,\,\,\,\,\,\, (x_v)_{v\in V}\mapsto (\|x_v-x_w\|)_{vw\in E}.\] If $f_G$ is differentiable at $p$ then the bar-joint framework $(G,p)$ is said to be {\em well-positioned} in $X$. \begin{lemma}{\cite[Proposition 6]{kit-sch}} \label{lem:differential} If $(G,p)$ is well-positioned in $X$ then the differential of $f_{G}$ at $p$ satisfies, \[df_{G}(p):X^V\to {\mathbb{R}}^E, \,\,\,\,\, (u_v)_{v\in V} \mapsto (\varphi_{v,w}(u_v-u_w))_{vw\in E},\] where, for each edge $vw\in E$, $\varphi_{v,w}:X\to {\mathbb{R}}$ is the linear functional, \[\varphi_{v,w}(x) = \|p_v-p_w\|\,\left(\lim_{t\to 0} \, \frac{1}{t}\left(\|p_v-p_w+tx\|-\|p_v-p_w\|\right)\right), \,\,\,\forall\,x\in X.\] \end{lemma} A {\em rigid motion} of $X$ is a family of continuous paths $\{\alpha_x:[-1,1]\to X\}_{x\in X}$ such that $\alpha_x(0)=x$ and $\|\alpha_x(t)-\alpha_y(t)\| =\|x-y\|$ for all pairs $x,y\in X$ and all $t\in [-1,1]$. An {\em infinitesimal rigid motion} of $X$ is a vector field $\eta:X\to X$ with the property that $\eta(x)=\alpha'_x(0)$ for all $x\in X$, for some rigid motion $\{\alpha_x\}_{x\in X}$. The collection of all infinitesimal rigid motions of $X$ is a vector subspace of $X^X$, denoted ${\mathcal{T}}(X)$. Let $(G,p)$ be a bar-joint framework in $X$ and define $\rho_{(G,p)}: {\mathcal{T}}(X)\to X^V$, $\eta\mapsto(\eta(p_v))_{v\in V}$. Note that if $(G,p)$ is well-positioned, then $df_G(p)\circ \rho_{(G,p)}=0$ (see \cite[Lemma 2.1]{kit-pow}). The {\em framework complex} for $(G,p)$, denoted $\operatorname{comp}(G,p)$, is the chain complex, \begin{eqnarray} \label{chaincomplex1} \begin{CD} 0 @>>> {\mathcal{T}}(X) @>\rho_{(G,p)}>> X^V @>df_G(p)>> {\mathbb{R}}^E @>>> 0. \\ \end{CD} \end{eqnarray} The kernel of $df_G(p)$, denoted ${\mathcal{F}}(G,p)$, is referred to as the space of {\em infinitesimal flexes} of $(G,p)$, while the image of $\rho_{(G,p)}$, denoted ${\mathcal{T}}(G,p)$, is referred to as the space of {\em trivial} infinitesimal flexes of $(G,p)$. \begin{definition} A well-positioned bar-joint framework $(G,p)$ in a normed space $X$ is, \begin{enumerate}[(a)] \item \emph{full} if the framework complex $\operatorname{comp}(G,p)$ is exact at ${\mathcal{T}}(X)$. \item \emph{infinitesimally rigid} if the framework complex $\operatorname{comp}(G,p)$ is exact at $X^V$. \item \emph{independent} if the framework complex $\operatorname{comp}(G,p)$ is exact at ${\mathbb{R}}^E$. \end{enumerate} \end{definition} A well-positioned bar-joint framework is {\em isostatic} if it is both infinitesimally rigid and independent. Note that $\operatorname{comp}(G,p)$ is a short exact sequence if and only if $(G,p)$ is both full and isostatic. \subsection{Symmetric graphs} A {\em $\Gamma$-symmetric graph} is a pair $(G,\theta)$ where $G$ is a finite simple undirected graph with automorphism group $\operatorname{Aut}(G)$ and $\theta:\Gamma\to\textrm{Aut}(G)$ is a group homomorphism. It is assumed throughout this article that $\theta$ acts freely on the vertex set of $G$. Thus $v\not=\theta(\gamma)v$ for all $v\in V$ and for all $\gamma\in \Gamma$ with $\gamma\not=1$. For convenience, we suppress $\theta$ and denote $\theta(\gamma)$ by $\gamma$ for each group element $\gamma\in\Gamma$. Also, for each edge $e=vw\in E$ we denote by $\gamma e$, or $\gamma(vw)$, the edge in $E$ which joins the vertices $\gamma v$ and $\gamma w$. \begin{proposition} \label{lem:decomp} Let $(G,\theta)$ be a $\Gamma$-symmetric graph and let $\tau:\Gamma\to\operatorname{Isom}(X)$ be a group representation. \begin{enumerate}[(i)] \item $(X_{\mathbb{C}})^{V}=\bigoplus_{\chi\in\hat{\Gamma}} X_{\chi}$ where, \[X_\chi = \{x=(x_v)_{v\in V}\in (X_{\mathbb{C}})^{V}: x_{\gamma v} = \chi(\gamma)\tau(\gamma)x_v,\,\,\forall\,\,\gamma\in\Gamma,\,\,\forall\,\,v\in V\}.\] \item ${\mathbb{C}}^{E}= \bigoplus_{\chi\in\hat{\Gamma}} Y_\chi$ where, \[Y_\chi = \{y=(y_e)_{e\in E}\in {\mathbb{C}}^{E}: y_{\gamma e}=\chi(\gamma)y_e,\,\,\forall\,\,\gamma\in\Gamma,\,\,\forall\,\,e\in E\}.\] \end{enumerate} \end{proposition} \proof Each $x=(x_v)_{v\in V}\in (X_{\mathbb{C}})^{V}$ may be expressed as a sum $x=\sum_{\chi\in\hat{\Gamma}} x_\chi$ where $x_\chi=(x_{\chi,v})_{v\in V}\in (X_{\mathbb{C}})^V$ has components, \[x_{\chi,v} = \frac{1}{|\Gamma|}\left(\sum_{\gamma\in\Gamma} \overline{\chi(\gamma)}\tau(\gamma^{-1})x_{\gamma v}\right).\] Similarly, each $y=(y_e)_{e\in E}\in {\mathbb{C}}^{E}$ may be expressed as a sum $\sum_{\chi\in\hat{\Gamma}} y_\chi$ where $y_\chi=(y_{\chi,e})_{e\in E}\in {\mathbb{C}}^{E}$ has components, \[y_{\chi,e} = \frac{1}{|\Gamma|}\left(\sum_{\gamma\in\Gamma} \overline{\chi(\gamma)}y_{\gamma e}\right).\] We use here the standard identity, \[\sum_{\chi\in\hat{\Gamma}} \chi(\gamma) = \left\{\begin{array}{ll} |\Gamma| & \mbox{ if } \gamma=1,\\ 0 & \mbox{ otherwise.} \end{array}\right.\] Note that $x_\chi\in X_\chi$ and $y_\chi\in Y_\chi$ for each $\chi\in\hat{\Gamma}$. Let $S\subseteq \hat{\Gamma}$ be a maximal subset which gives rise to a direct sum $\oplus_{\chi\in S} X_\chi$ and suppose there exists $\tilde{\chi}\in \hat{\Gamma}\backslash S$. If $x\in X_{\tilde{\chi}}\cap (\oplus_{\chi\in S} X_\chi)$ then $x_v=\overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})x_{\gamma v}$ for all $v\in V$ and all $\gamma\in \Gamma$. Moreover, $x=\sum_{\chi\in S} z_\chi$ for some unique $z_\chi\in X_\chi$. It follows that, for all $v\in V$ and all $\gamma\in \Gamma$, \begin{eqnarray*} x_v &=& \overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})\left(\sum_{\chi\in S} z_{\chi,\gamma v}\right)\\ &=&\overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})\left(\sum_{\chi\in S} \chi(\gamma)\tau(\gamma)z_{\chi,v}\right)\\ &=&\overline{\tilde{\chi}(\gamma)}\left(\sum_{\chi\in S} \chi(\gamma)z_{\chi,v}\right). \end{eqnarray*} Thus $x = \overline{\tilde{\chi}(\gamma)}(\sum_{\chi\in S} \chi(\gamma)z_{\chi})$ for all $\gamma\in \Gamma$. Since the sum $x=\sum_{\chi\in S} z_\chi$ is direct, if $x\not=0$ then $\tilde{\chi} = \chi$ for some $\chi\in S$. This is a contradiction and so $X_{\tilde{\chi}}\cap (\oplus_{\chi\in S} X_\chi)=\{0\}$. However, this contradicts the maximality of $S$ and so it follows that $S=\hat{\Gamma}$. This establishes the direct sum $\oplus_{\chi\in \hat{\Gamma}} X_\chi$ and a similar argument can be applied for $\oplus_{\chi\in \hat{\Gamma}} Y_\chi$. \endproof \subsection{Symmetric frameworks} A {\em $\Gamma$-symmetric bar-joint framework} is a tuple ${\mathcal{G}}=(G,p,\theta,\tau)$ where $(G,p)$ is a bar-joint framework, $(G,\theta)$ is a $\Gamma$-symmetric graph and $\tau:\Gamma\rightarrow \operatorname{Isom}(X)$ is a group representation which satisfies $\tau(\gamma) (p_v)=p_{\gamma v}$ for all $\gamma\in \Gamma$ and all $v\in V$. \begin{lemma} \label{lem:SupportFunctionals} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$ and let $vw\in E$. Then $\varphi_{\gamma v,\gamma w}=\varphi_{v,w}\circ \tau(\gamma^{-1})$ for all $\gamma\in \Gamma$. \end{lemma} \proof Let $p_0=p_v-p_w$. Then $\tau(\gamma)(p_0)=p_{\gamma v} - p_{\gamma w}$ and so for each $x\in X$, \begin{eqnarray*} \varphi_{\gamma v,\gamma w}(x) &=& \|\tau(\gamma)(p_0)\|\,\left(\lim_{t\to 0}\,\frac{1}{t}\left(\|\tau(\gamma)(p_0+t\,\tau(\gamma^{-1})x)\|-\|\tau(\gamma)p_0\|\right)\right) \\ &=& \|p_0\|\,\left(\lim_{t\to 0}\,\frac{1}{t}\left(\|p_0+t\,\tau(\gamma^{-1})x\|-\|p_0\|\right) \right)= \varphi_{v,w}(\tau(\gamma^{-1})x). \end{eqnarray*} \endproof In the following, the same symbol will be used to denote a real affine transformation $T:Y\to Z$ between two real linear spaces $Y$ and $Z$ and its complex extension $T:Y_{\mathbb{C}}\to Z_{\mathbb{C}}$. In particular, we consider the complex linear functionals $\varphi_{v,w}:X_{\mathbb{C}}\to{\mathbb{C}}$, the complex linear transformations $\tau(\gamma):X_{\mathbb{C}}\to X_{\mathbb{C}}$ and the complex differential $df_G(p):(X_{\mathbb{C}})^V \to {\mathbb{C}}^E$ associated to a bar-joint framework $(G,p)$ in $X$. \begin{proposition} \label{prop:block} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$. With respect to the direct sum decompositions obtained in Proposition \ref{lem:decomp}, \[(X_{\mathbb{C}})^{V}=\bigoplus_{\chi\in\hat{\Gamma}} X_{\chi} \,\,\,\, \mbox{ and } \,\,\,\,{\mathbb{C}}^{E}= \bigoplus_{\chi\in\hat{\Gamma}} Y_\chi,\] the (complex) differential $df_G(p)$ may be expressed as a direct sum of linear transformations, \[df_G(p)=\bigoplus_{\chi\in\hat{\Gamma}} R_\chi({\mathcal{G}}),\] where $R_\chi({\mathcal{G}}):X_{\chi}\to Y_{\chi}$ for each character $\chi\in\hat{\Gamma}$. \end{proposition} \proof Let $vw\in E$. If $(x_v)_{v\in V}\in X_\chi$ then, using Lemma \ref{lem:SupportFunctionals}, \[\varphi_{v,w}(x_v-x_w) = \varphi_{\gamma v,\gamma w}(\tau(\gamma)(x_v-x_w)) =\varphi_{\gamma v,\gamma w}(\overline{\chi(\gamma)}(x_{\gamma v}-x_{\gamma w})) =\overline{\chi(\gamma)}\varphi_{\gamma v,\gamma w}(x_{\gamma v}-x_{\gamma w}),\] for each $\chi\in\hat{\Gamma}$ and each $\gamma\in \Gamma$. Thus, by Lemma \ref{lem:differential}, $df_G(p)(X_\chi)\subseteq Y_\chi$ and the result follows. \endproof \subsection{Infinitesimal rigid motions} Denote by ${\mathcal{T}}(X;{\mathbb{C}})$ the complex vector space spanned by vector fields $\eta_{\mathbb{C}}:X\to X_{\mathbb{C}}$, $x\mapsto 1\otimes\eta(x)$ where $\eta\in{\mathcal{T}}(X)$. For convenience, $\eta_{\mathbb{C}}$ will simply be denoted $\eta$. \begin{proposition} \label{lem:decomp2} Let $\tau:\Gamma\to\operatorname{Isom}(X)$ be a group representation. Then, ${\mathcal{T}}(X;{\mathbb{C}})=\bigoplus_{\chi\in\hat{\Gamma}} {\mathcal{T}}_{\chi}(X)$ where, \[{\mathcal{T}}_\chi(X) = \{\eta\in {\mathcal{T}}(X;{\mathbb{C}}): \eta(\tau(\gamma)x) = \chi(\gamma)\tau(\gamma)\eta(x),\,\,\forall\,\,\gamma\in\Gamma,\,\,\forall\,\,x\in X\}.\] \end{proposition} \proof Applying an argument similar to Lemma \ref{lem:decomp}, each $\eta\in {\mathcal{T}}(X;{\mathbb{C}})$ may be expressed as a sum $\eta=\sum_{\chi\in\hat{\Gamma}} \eta_\chi$ where $\eta_\chi:X\to X_{\mathbb{C}}$ is the vector field, \[\eta_{\chi}(x) = \frac{1}{|\Gamma|}\left(\sum_{\gamma\in\Gamma} \overline{\chi(\gamma)}\tau(\gamma^{-1})\eta(\tau(\gamma)x)\right).\] Note that $\eta_\chi\in {\mathcal{T}}_{\chi}(X)$ for each $\chi\in\hat{\Gamma}$. Let $S\subseteq\hat{\Gamma}$ be a maximal subset which gives rise to a direct sum $\oplus_{\chi\in S} {\mathcal{T}}_{\chi}(X)$ and suppose there exists $\tilde{\chi}\in\hat{\Gamma}\backslash S$. If $\eta\in {\mathcal{T}}_{\tilde{\chi}}(X)\cap(\oplus_{\chi\in S} {\mathcal{T}}_{\chi}(X))$ then $\eta(x) = \overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})\eta(\tau(\gamma)x)$ for all $x\in X$ and all $\gamma\in\Gamma$. Moreover, $\eta = \sum_{\chi\in S} \delta_\chi$ for some unique $\delta_\chi\in{\mathcal{T}}_\chi(X)$. Thus, for all $x\in X$ and all $\gamma\in\Gamma$, \begin{eqnarray*} \eta(x) &=& \overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})\left(\sum_{\chi\in S}\delta_\chi(\tau(\gamma)x)\right) \\ &=& \overline{\tilde{\chi}(\gamma)}\tau(\gamma^{-1})\left(\sum_{\chi\in S}\chi(\gamma)\tau(\gamma)\delta_\chi(x)\right) \\ &=& \overline{\tilde{\chi}(\gamma)}\left(\sum_{\chi\in S}\chi(\gamma)\delta_\chi(x) \right). \end{eqnarray*} Thus $\eta = \overline{\tilde{\chi}(\gamma)}\left(\sum_{\chi\in S}\chi(\gamma)\delta_\chi \right)$ for all $\gamma\in\Gamma$. Since the sum $\eta = \sum_{\chi\in S} \delta_\chi$ is direct, if $\eta\not=0$ then it follows that $\tilde{\chi}=\chi$ for some $\chi\in S$. This is a contradiction and so ${\mathcal{T}}_{\tilde{\chi}}(X)\cap(\oplus_{\chi\in S} {\mathcal{T}}_{\chi}(X))=\{0\}$. However, this contradicts the maximality of $S$ and so $S=\hat{\Gamma}$. \endproof We now consider the complex restriction map $\rho_{(G,p)}: {\mathcal{T}}(X;{\mathbb{C}})\to (X_{\mathbb{C}})^V$, $\eta\mapsto (\eta(p_v))_{v\in V}$ for a given bar-joint framework $(G,p)$ in $X$. \begin{proposition} \label{prop:block2} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$. With respect to the direct sum decompositions obtained in Propositions \ref{lem:decomp2} and \ref{lem:decomp}, \[ {\mathcal{T}}(X;{\mathbb{C}})=\bigoplus_{\chi\in\hat{\Gamma}} {\mathcal{T}}_{\chi}(X), \,\,\,\, \mbox{ and, }\,\,\,\,(X_{\mathbb{C}})^{V}=\bigoplus_{\chi\in\hat{\Gamma}} X_{\chi},\] the (complex) restriction map $\rho_{(G,p)}$ may be expressed as a direct sum of linear transformations, \[\rho_{(G,p)}=\bigoplus_{\chi\in\hat{\Gamma}} \rho_\chi({\mathcal{G}}),\] where $\rho_\chi({\mathcal{G}}):{\mathcal{T}}_\chi(X)\to X_{\chi}$ for each character $\chi\in\hat{\Gamma}$. \end{proposition} \proof Let $\chi\in\hat{\Gamma}$. If $\eta\in {\mathcal{T}}_{\chi}(X)$ then, for each $\gamma\in \Gamma$ and all $v\in V$, \[\eta(p_{\gamma v}) = \eta(\tau(\gamma)p_v) =\chi(\gamma)\tau(\gamma)\eta(p_v).\] Thus, $\rho_{(G,p)}({\mathcal{T}}_{\chi}(X))\subseteq X_{\chi}$ and the result follows. \endproof \subsection{Decomposing the framework complex} Denote by $\operatorname{comp}_{\mathbb{C}}(G,p)$ the {\em complexified} framework complex for a bar-joint framework $(G,p)$, \begin{eqnarray} \label{chaincomplex2} \begin{CD} 0 @>>> {\mathcal{T}}(X;{\mathbb{C}}) @>\rho_{(G,p)}>> (X_{\mathbb{C}})^V @>df_G(p)>> {\mathbb{C}}^E @>>> 0. \\ \end{CD} \end{eqnarray} If ${\mathcal{G}}=(G,p,\theta,\tau)$ is a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$ then, recalling the decompositions $df_G(p)=\bigoplus_{\chi\in \hat{\Gamma}} R_\chi({\mathcal{G}})$ and $\rho_{(G,p)} = \bigoplus_{\chi\in \hat{\Gamma}} \rho_\chi({\mathcal{G}})$ from Propositions \ref{prop:block} and \ref{prop:block2}, we have $R_\chi({\mathcal{G}})\circ\rho_\chi({\mathcal{G}})=0$ for all $\chi\in \hat{\Gamma}$. The {\em $\chi$-symmetric framework complex} for ${\mathcal{G}}$, denoted $\operatorname{comp}_\chi({\mathcal{G}})$, is the chain complex, \begin{eqnarray} \label{chaincomplex3} \begin{CD} 0 @>>> {\mathcal{T}}_\chi(X) @>\rho_\chi({\mathcal{G}})>> X_\chi @>R_\chi({\mathcal{G}})>> Y_\chi @>>> 0. \\ \end{CD} \end{eqnarray} The kernel of $R_\chi({\mathcal{G}})$, denoted ${\mathcal{F}}_\chi({\mathcal{G}})$, is referred to as the space of {\em $\chi$-symmetric infinitesimal flexes} of ${\mathcal{G}}$. The image of $\rho_\chi$, denoted ${\mathcal{T}}_\chi({\mathcal{G}})$, is referred to as the space of {\em trivial} $\chi$-symmetric infinitesimal flexes of ${\mathcal{G}}$. \begin{theorem} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$. Then, \[\operatorname{comp}_{\mathbb{C}}(G,p) = \bigoplus_{\chi\in\hat{\Gamma}} \,\operatorname{comp}_\chi({\mathcal{G}}).\] \end{theorem} \proof The result follows from Propositions \ref{prop:block}, \ref{lem:decomp2} and \ref{prop:block2}. \endproof \begin{definition} A well-positioned and $\Gamma$-symmetric bar-joint framework ${\mathcal{G}}=(G,p,\theta,\tau)$ in a normed space $X$ is said to be, \begin{enumerate}[(a)] \item \emph{$\chi$-symmetrically full} if $\operatorname{comp}_\chi({\mathcal{G}})$ is exact at ${\mathcal{T}}_\chi(X)$. \item {\em $\chi$-symmetrically infinitesimally rigid} if $\operatorname{comp}_\chi({\mathcal{G}})$ is exact at $X_\chi$. \item \emph{$\chi$-symmetrically independent} if $\operatorname{comp}_\chi({\mathcal{G}})$ is exact at $Y_\chi$. \end{enumerate} \end{definition} A $\Gamma$-symmetric bar-joint framework is {\em $\chi$-symmetrically isostatic} if it is both $\chi$-symmetrically infinitesimally rigid and $\chi$-symmetrically independent. \begin{corollary} \label{lem:SymRigid} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$. The following statements are equivalent. \begin{enumerate}[(i)] \item $(G,p)$ is full (respectively, infinitesimally rigid, independent or isostatic). \item ${\mathcal{G}}$ is $\chi$-symmetrically full (respectively, $\chi$-symmetrically infinitesimally rigid, $\chi$-symmetrically independent or $\chi$-symmetrically isostatic) for each $\chi\in \hat{\Gamma}$. \end{enumerate} \end{corollary} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a $\Gamma$-symmetric bar-joint framework in $X$. A {\em $\Gamma$-symmetric subframework} of ${\mathcal{G}}$ is a $\Gamma$-symmetric framework $\H=(H,p_H,\theta_H,\tau_H)$ where $(H,p_H)$ is a subframework of $(G,p)$, $\theta_H:\Gamma\to \operatorname{Aut}(H)$ is the group homomorphism induced by $\theta$ and $\tau_H=\tau$. \begin{lemma} \label{lem:blocksurjSym} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$ and let $\chi\in\hat{\Gamma}$. If ${\mathcal{G}}$ is $\chi$-symmetrically independent then every $\Gamma$-symmetric subframework of ${\mathcal{G}}$ is $\chi$-symmetrically independent. \end{lemma} \proof Let $\H=(H,p_H,\theta_H,\tau_H)$ be a $\Gamma$-symmetric subframework of ${\mathcal{G}}$ and consider the direct sum decompositions, \[X_{\mathbb{C}}^{V(G)} = X_{\mathbb{C}}^{V(H)}\oplus X_{\mathbb{C}}^{V(G)\backslash V(H)}, \,\,\, \mbox{ and, }\,\,\, {\mathbb{C}}^{E(G)} = {\mathbb{C}}^{E(H)}\oplus {\mathbb{C}}^{E(G)\backslash E(H)}\] Note that $X_\chi = X_\chi^{\H}\oplus X_\chi^{{\mathcal{G}}\backslash \H}$ where $X_\chi^{\H} = X_{\mathbb{C}}^{V(H)}\cap X_\chi$ and $X_\chi^{{\mathcal{G}}\backslash\H} = X_{\mathbb{C}}^{V(G)\backslash V(H)}\cap X_\chi$. Similarly, $Y_\chi = Y_\chi^{\H}\oplus Y_\chi^{{\mathcal{G}}\backslash\H}$ where $Y_\chi^{\H} = {\mathbb{C}}^{E(H)}\cap Y_\chi$ and $Y_\chi^{{\mathcal{G}}\backslash\H} = {\mathbb{C}}^{E(G)\backslash E(H)}\cap Y_\chi$. With respect to these decompositions, $R_\chi({\mathcal{G}})$ admits a block decomposition of the form, \[R_\chi({\mathcal{G}}) = \left(\begin{array}{cc} R_\chi(\H) & 0 \\ C & D \end{array} \right).\] Thus, if $R_\chi({\mathcal{G}})$ is surjective then so too is $R_\chi(\H)$. \endproof \subsection{Quotient graphs} \label{subsec:quotientgraphs} Let $(G,\theta)$ be a $\Gamma$-symmetric graph and suppose $\theta$ acts freely on the vertices and edges of $G$. The orbit of a vertex $v\in V$ (respectively an edge $e\in E$) is denoted by $[v]$ (respectively $[e]$). Thus $[v]=\{\gamma v:\gamma\in \Gamma\}$ and $[e]=\{\gamma e:\gamma\in \Gamma\}$. The collection of all vertex orbits (respectively, edge orbits) is denoted $V_0$ (respectively, $E_0$). The {\em quotient graph} $G_0=G/\Gamma$ is a multigraph with vertex set $V_0$, edge set $E_0$ and incidence relation satisfying $[e] = [v][w]$ if some (equivalently, every) edge in $[e]$ is incident with a vertex in $[v]$ and a vertex in $[w]$. \begin{proposition} \label{prop:counts} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$. Let $\chi\in\hat{\Gamma}$ and suppose ${\mathcal{G}}$ is $\chi$-symmetrically full. \begin{enumerate}[(i)] \item If ${\mathcal{G}}$ is $\chi$-symmetrically infinitesimally rigid then, \[|E_0| \geq (\dim_{\mathbb{R}} X)|V_0| - \dim_{\mathbb{C}} {\mathcal{T}}_\chi(X).\] \item If ${\mathcal{G}}$ is $\chi$-symmetrically independent then, \[|E_0| \leq (\dim_{\mathbb{R}} X)|V_0| - \dim_{\mathbb{C}} {\mathcal{T}}_\chi(X).\] \item If ${\mathcal{G}}$ is $\chi$-symmetrically isostatic then, \[|E_0| = (\dim_{\mathbb{R}} X)|V_0| - \dim_{\mathbb{C}} {\mathcal{T}}_\chi(X).\] \end{enumerate} \end{proposition} \proof Applying Proposition \ref{prop:block}, $$ |E_0| = \dim_{\mathbb{C}} Y_\chi \geq \operatorname{rank} R_\chi = \dim_{\mathbb{C}} X_\chi - \dim_{\mathbb{C}} \ker R_\chi = (\dim_{\mathbb{C}} X_{\mathbb{C}})|V_0| - \dim_{\mathbb{C}} {\mathcal{F}}_\chi({\mathcal{G}}). $$ If $(i)$ holds then ${\mathcal{F}}_\chi({\mathcal{G}}) = {\mathcal{T}}_\chi({\mathcal{G}})$ and $\dim_{\mathbb{C}}{\mathcal{T}}_\chi({\mathcal{G}}) = \dim_{\mathbb{C}}{\mathcal{T}}_\chi(X)$. If $(ii)$ holds then $\dim_{\mathbb{C}} Y_\chi = \operatorname{rank} R_\chi$ and $\dim_{\mathbb{C}} {\mathcal{F}}_\chi({\mathcal{G}})\geq \dim_{\mathbb{C}} {\mathcal{T}}_\chi({\mathcal{G}})= \dim_{\mathbb{C}}{\mathcal{T}}_\chi(X)$. If $(iii)$ holds then the result follows from $(i)$ and $(ii)$. \endproof \subsection{Norms with a minimal space of infinitesimal rigid motions} The space ${\mathcal{T}}(X)$ of infinitesimal rigid motions of a normed space $X$ is {\em minimal} if given any $\eta\in{\mathcal{T}}(X)$ there exists $x_0\in X$ such that $\eta(x)=x_0$ for all $x\in X$. This class includes all $\ell^p$-spaces, with $p\not=2$, and all normed spaces with a polyhedral unit ball (see \cite[Lemma 2.5]{kit-pow}). If $\dim_{\mathbb{R}} X=2$, then this class includes all norms not derived from an inner product. In the following, the identity map on $X$ is denoted $I_X$, or simply $I$. \begin{lemma} \label{lem:dimension} Let $\tau:\Gamma\to\operatorname{Isom}(X)$ be a group representation and let $\chi\in\hat{\Gamma}$. If ${\mathcal{T}}(X)$ is minimal then, \[\dim_{\mathbb{C}} {\mathcal{T}}_\chi(X)=\dim_{\mathbb{C}} \left(\bigcap_{\gamma\in\Gamma} \ker(\tau(\gamma)-\overline{\chi(\gamma)}I)\right).\] \end{lemma} \proof Let $\eta\in {\mathcal{T}}(X)$. Since ${\mathcal{T}}(X)$ is minimal, there exists $x_0\in X$ such that $\eta(x)=x_0$ for all $x\in X$. Note in particular that $x_0 = \eta(\tau(\gamma)(x_0))$ for each $\gamma\in \Gamma$. Thus $\eta_{\mathbb{C}} \in {\mathcal{T}}_\chi(X)$ if and only if $x_0 = \chi(\gamma)\tau(\gamma)(x_0)$ for each $\gamma\in \Gamma$. The result now follows. \endproof Let $\omega = e^{2\pi i/n}$, where $n\in{\mathbb{N}}$ and $n\geq 2$, and consider the multiplicative cyclic group ${\mathbb{Z}}_n=\{\omega^k:k=0,1,\ldots,n-1\}$. Recall that the dual group for ${\mathbb{Z}}_n$ consists of characters $\chi_0,\chi_1,\ldots,\chi_{n-1}$ where $\chi_j(\omega)=\omega^{j}$ for each $j=0,1,\ldots,n-1$. \begin{lemma} \label{lem:dimensionCyclic} Let $\tau:{\mathbb{Z}}_n\to\operatorname{Isom}(X)$ be a group representation where $n\geq 2$. If ${\mathcal{T}}(X)$ is minimal then, for each $j=0,1,\ldots,n-1$, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_j}(X) = \dim_{\mathbb{C}} \ker(\tau(\omega)-\overline{\omega}^jI).\] \end{lemma} \proof Let $j\in\{0,1,\ldots,n-1\}$. Note that $\ker(\tau(\omega)-\overline{\omega}^j I)\subseteq \ker(\tau(\omega^k)-\overline{\omega}^{jk}I)$ for $k=0,1,\ldots,n-1$. Thus, by Lemma \ref{lem:dimension}, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_j}(X) = \dim_{\mathbb{C}} \left(\bigcap_{k=0}^{n-1} \ker(\tau(\omega^k)-\overline{\omega}^{jk} I)\right) = \dim_{\mathbb{C}} \ker(\tau(\omega)-\overline{\omega}^jI).\] \endproof In the following, an {\em $n$-fold rotation} ($n \geq 2$) of a two-dimensional real vector space $X$ is a linear operator $S:X\to X$ with matrix $\tiny{\left(\begin{array}{cc} \cos(2\pi /n) & -\sin(2\pi /n) \\ \sin(2\pi /n) & \cos(2\pi /n)\end{array}\right)}$ with respect to some basis for $X$. If $\dim X\geq 3$ then a linear operator $T:X\to X$ is an {\em $n$-fold rotation} if there exists a direct sum decomposition $X=Y\oplus Z$, where $Y$ is a two-dimensional subspace of $X$, with respect to which $T=S\oplus I_Z$, $S$ is an $n$-fold rotation of $Y$ and $I_Z$ is the identity operator on $Z$. \begin{lemma} \label{lem:dimensionCn} Let $\tau:{\mathbb{Z}}_n\to\operatorname{Isom}(X)$ be a group representation where $\tau(\omega)$ is an $n$-fold rotation of $X$ and $n\geq 2$. Suppose, in addition, that ${\mathcal{T}}(X)$ is minimal. \begin{enumerate}[(i)] \item If $n=2$ then, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_j}(X)= \left\{\begin{array}{ll} \dim_{\mathbb{R}} X-2 & \mbox{ if } j=0, \\ 2 & \mbox{ if } j=1. \end{array}\right.\] \item If $n\geq 3$ then, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_j}(X)= \left\{\begin{array}{ll} \dim_{\mathbb{R}} X-2 & \mbox{ if } j=0, \\ 1 & \mbox{ if } j\in\{1,n-1\}, \\ 0 & \mbox{ otherwise.} \end{array}\right.\] \end{enumerate} \end{lemma} \proof Write $X=Y\oplus Z$ and $\tau(\omega)=S\oplus I_Z$ where $\dim Y=2$ and $S$ is an $n$-fold rotation of $Y$. Then $X_{\mathbb{C}} = Y_{\mathbb{C}}\oplus Z_{\mathbb{C}}$. Note that $\tau(\omega)-\overline{\chi_0(\omega)}I = (S-I_Y)\oplus 0$. Also, $S-I_Y$ is invertible and so, by Lemma \ref{lem:dimensionCyclic}, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_0}(X)= \dim_{\mathbb{C}} \ker((S-I_Y)\oplus 0)=\dim_{\mathbb{R}} X-2.\] Now let $j\in\{1,\ldots,n-1\}$. If $n=2$, then $\omega =-1$ and $S=-I_Y$. Note that $\tau(\omega)-\overline{\omega} I =0\oplus 2I_Z$ and so, by Lemma \ref{lem:dimensionCyclic}, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_1}(X)= \dim_{\mathbb{C}} \ker(0\oplus 2I_Z) = \dim_{\mathbb{R}} Y = 2.\] If $n\geq 3$, then $S$ has eigenvalues of multiplicity $1$ at $\omega$ and $\overline{\omega}$. Note that $\tau(\omega)-\overline{\omega}^j I =(S-\overline{\omega}^jI_Y)\oplus (1-\overline{\omega}^j)I_Z$ and so, by Lemma \ref{lem:dimensionCyclic}, \[\dim_{\mathbb{C}} {\mathcal{T}}_{\chi_j}(X) = \dim_{\mathbb{C}} \ker(\tau(\omega)-\overline{\omega}^jI) = \dim_{\mathbb{C}} \ker(S-\overline{\omega}^jI_Y) =\left\{\begin{array}{ll} 1 & \mbox{ if } j\in\{1,n-1\}, \\ 0 & \mbox{ otherwise.} \end{array}\right.\] \endproof \subsection{Gain graphs} \label{subsec:gaingraphs} Let $(G,\theta)$ be a $\Gamma$-symmetric graph and fix an orientation on the edges of the quotient graph $G_0 = (V_0,E_0)$. For each vertex orbit $[v]\in V_0$, choose a representative vertex $\tilde{v}\in[v]$ and denote the set of all such representatives by $\tilde{V}_0$. For each directed edge $[e]=([v],[w])$ in the directed multigraph $G_0$ there exists a unique $\gamma\in\Gamma$, referred to as the {\em gain} on $[e]$, such that $\tilde{v}(\gamma\tilde{w})\in [e]$. This gain assignment $\psi:E_0\to \Gamma$, $[e]\mapsto \psi_{[e]}$, is well-defined and the pair $(G_0,\psi)$ is referred to as a {\em (quotient) gain graph} for $(G,\theta)$. The graph $G$ is also called the \emph{covering graph} of $(G_0,\psi)$. Note that a gain assignment $\psi$ is dependent on the choice of representative vertices $\tilde{V}_0$ and also on the choice of orientation for each edge of $G_0$. We may {\em switch} the gain assignment on the directed multigraph $G_0$ by choosing a different set of vertex orbit representatives. We regard two gain assignments on the directed multigraph $G_0$ as equivalent if one can be obtained from the other by such a switching operation. Note that if the orientation of an edge $[e]$ in $G_0$ is reversed then the induced gain $\psi_{[e]}$ is replaced with $\psi_{[e]}^{-1}$. In general, we refer to a group-labelled directed multigraph $(G_0,\psi)$ with $\psi:E_0\to \Gamma$ as a \emph{$\Gamma$-gain graph} if it is a quotient gain graph for a $\Gamma$-symmetric graph $(G,\theta)$. Note that, since $G$ is assumed to be simple, $(G_0,\psi)$ has no parallel edges with the same gain when oriented in the same direction and no loops with a trivial gain. We regard two $\Gamma$-gain graphs as equivalent if they are derived from the same $\Gamma$-symmetric graph $(G,\theta)$. For more on gain graphs we refer the reader to \cite{jkt,zas}. \begin{example} Figure \ref{fig:gain_cov_graphs} illustrates several examples of ${\mathbb{Z}}_2$-symmetric graphs together with accompanying quotient gain graphs. These gain graphs will form base graphs for the inductive construction presented in Section \ref{Sect:Inductive}. Note that in the case of ${\mathbb{Z}}_2$-symmetric graphs, gain assignments are independent of the chosen edge orientation. Thus edge orientations have been omitted from Figure \ref{fig:gain_cov_graphs}. In each gain graph, the indicated gains are determined by the set of representative vertices, labelled by $p$, in its covering graph. Note that each covering graph is presented as a two-dimensional bar-joint framework with half-turn rotational symmetry. Moreover, it can be shown that these bar-joint frameworks are $\chi_0$-symmetrically isostatic with respect to the $\ell^\infty$ norm. The reasons for this, and the significance of the edge colourings, are explained in Section \ref{Sect:FrameworkColours}. \end{example} \begin{figure}[htp] \begin{center} \begin{tikzpicture}[very thick,scale=0.6] \tikzstyle{every node}=[circle, draw=black, fill=black, inner sep=0pt, minimum width=5pt]; \node (p1) at (-1,0) {}; \node (p2) at (0,0) {}; \node [draw=white, fill=white] (a) at (-1.4,-0.4) {\tiny $[v]$}; \node [draw=white, fill=white] (a) at (0.4,-0.4) {\tiny $[w]$}; \node [draw=white, fill=white] (a) at (-0.5,0.5) {\tiny $1$}; \node [draw=white, fill=white] (a) at (-0.5,-0.5) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (-1.5,0.3) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (0.5,0.3) {\tiny $-1$}; \path(p1) edge [bend right=40] (p2); \path(p1) edge [bend left=40, lightgray] (p2); \path(p1) edge [loop left, >=stealth,shorten >=1pt,looseness=30] (p1); \path(p2) edge [lightgray,loop right, >=stealth,shorten >=1pt,looseness=30] (p2); \node [draw=white, fill=white] (a) at (-1.5,-1.9) { $p_{\tilde{v}}$}; \node [draw=white, fill=white] (a) at (0.5,-2.6) { $p_{\tilde{w}}$}; \node (p1) at (-1.5,-4.2) {}; \node (p2) at (0.5,-4.9) {}; \node (p3) at (0.5,-3.1) {}; \node (p4) at (-1.5,-2.4) {}; \draw[lightgray](p1)--(p2); \draw(p3)--(p2); \draw[lightgray](p3)--(p4); \draw(p1)--(p4); \draw(p4)--(p2); \draw[lightgray](p1)--(p3); \node [draw=white, fill=white] (a) at (-0.5,-7.3) {(a)}; \node (pa) at (4,0) {}; \node (pb) at (6,0) {}; \node (pc) at (5,1) {}; \node [draw=white, fill=white] (a) at (4,-0.6) {\tiny $[v]$}; \node [draw=white, fill=white] (a) at (6,-0.6) {\tiny $[w]$}; \node [draw=white, fill=white] (a) at (4.4,1) {\tiny $[z]$}; \node [draw=white, fill=white] (a) at (5,-0.3) {\tiny $1$}; \node [draw=white, fill=white] (a) at (4.2,0.5) {\tiny $1$}; \node [draw=white, fill=white] (a) at (5.8,0.5) {\tiny $1$}; \node [draw=white, fill=white] (a) at (6.7,-0.5) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (3.3,-0.5) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (5.5,1.5) {\tiny $-1$}; \path(pa) edge [lightgray,loop left, >=stealth,shorten >=1pt,looseness=30] (pa); \path(pb) edge [loop right, >=stealth,shorten >=1pt,looseness=30] (pb); \path(pc) edge [loop above, >=stealth,shorten >=1pt,looseness=30] (pc); \draw[lightgray](pa)--(pb); \draw[lightgray](pc)--(pb); \draw(pa)--(pc); \node [draw=white, fill=white, yshift=-3cm] (a) at (3.5,1.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,yshift=-3cm] (a) at (6.3,2.4) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,yshift=-3cm] (a) at (4.5,2.9) { $p_{\tilde{z}}$}; \node[yshift=-3cm] (pa) at (4,1.5) {}; \node[yshift=-3cm] (pb) at (6,1.9) {}; \node[yshift=-3cm] (pc) at (4.5,2.4) {}; \node[xshift=0.5cm,yshift=-3cm] (paa) at (6,0.2) {}; \node[xshift=0.5cm,yshift=-3cm] (pbb) at (4,-0.2) {}; \node[xshift=0.5cm,yshift=-3cm] (pcc) at (5.5,-0.7) {}; \draw[lightgray](pa)--(pb); \draw[lightgray](pb)--(pc); \draw(pc)--(pa); \draw[lightgray](paa)--(pbb); \draw[lightgray](pbb)--(pcc); \draw(paa)--(pcc); \draw[lightgray](pa)--(paa); \draw(pb)--(pbb); \draw(pc)--(pcc); \node [draw=white, fill=white] (a) at (5.5,-7.3) {(b)}; \node [draw=white, fill=white] (a) at (11.7,0.3) {\tiny $1$}; \node [draw=white, fill=white] (a) at (11.7,-0.3) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (10.5,0.5) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (11.2,0.5) {\tiny $1$}; \node [draw=white, fill=white] (a) at (12.5,0.5) {\tiny $1$}; \node [draw=white, fill=white] (a) at (9.5,0.3) {\tiny $-1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (4,-0.6) {\tiny $[v]$}; \node [draw=white, fill=white, xshift=4cm] (a) at (6,-0.6) {\tiny $[w]$}; \node [draw=white, fill=white, xshift=4cm] (a) at (5,1.5) {\tiny $[z]$}; \node[xshift=4cm] (qa) at (4,0) {}; \node[xshift=4cm] (qb) at (6,0) {}; \node[xshift=4cm] (qc) at (5,1) {}; \path(qa) edge [bend left=10, lightgray] (qb); \path(qa) edge [bend right=10] (qb); \draw[lightgray](qb)-- (qc); \path(qc) edge [bend left=20] (qa); \path(qc) edge [bend right=20] (qa); \path(qa) edge [lightgray,loop left, >=stealth,shorten >=1pt,looseness=30] (qa); \node [draw=white, fill=white,xshift=7cm,yshift=-2.4cm] (a) at (-1.6,0) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,xshift=7cm,yshift=-2.4cm] (a) at (1.6,1) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,xshift=7cm,yshift=-2.4cm] (a) at (-1.2,1.7) { $p_{\tilde{z}}$}; \node[xshift=7cm,yshift=-2.4cm] (qaa) at (-1,0) {}; \node[xshift=7cm,yshift=-2.4cm] (qbb) at (1,0) {}; \node[xshift=7cm,yshift=-2.4cm] (qcc) at (-0.6,1.8) {}; \node[xshift=7cm,yshift=-2.4cm] (qdd) at (1,1.1) {}; \node[xshift=7cm,yshift=-2.4cm] (qee) at (0.6,-1.8) {}; \node[xshift=7cm,yshift=-2.4cm] (qff) at (-1,-1.1) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \draw(qaa)--(qee); \draw[lightgray](qbb)--(qff); \draw[lightgray](qee)--(qff); \draw(qaa)--(qff); \draw(qbb)--(qee); \node [draw=white, fill=white] (a) at (11,-7.3) {(c)}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (0,-1) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (1,0) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (-1,0) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (0,1) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (-0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (1.2,1) {\tiny $-1$}; \node [draw=white, fill=white,xshift=10.5cm,yshift=0.5cm] (a) at (1.2,-1) {\tiny $-1$}; \node [draw=white, fill=white, xshift=10.5cm,yshift=0.5cm] (a) at (-0.7,-1.1) {\tiny $[v]$}; \node [draw=white, fill=white, xshift=10.5cm,yshift=0.5cm] (a) at (0.7,-1.1) {\tiny $[w]$}; \node [draw=white, fill=white, xshift=10.5cm,yshift=0.5cm] (a) at (0.7,1.1) {\tiny $[x]$}; \node [draw=white, fill=white, xshift=10.5cm,yshift=0.5cm] (a) at (-0.7,1.1) {\tiny $[z]$}; \node[xshift=10.5cm,yshift=0.5cm] (pp1) at (-0.7,-0.7) {}; \node[xshift=10.5cm,yshift=0.5cm] (pp2) at (0.7,-0.7) {}; \node[xshift=10.5cm,yshift=0.5cm] (pp3) at (0.7,0.7) {}; \node[xshift=10.5cm,yshift=0.5cm] (pp4) at (-0.7,0.7) {}; \draw[lightgray](pp1)--(pp2); \draw(pp3)--(pp2); \draw[lightgray](pp3)--(pp4); \draw(pp1)--(pp4); \draw(pp4)--(pp2); \draw[lightgray](pp1)--(pp3); \path(pp2) edge [lightgray,loop right, >=stealth,shorten >=1pt,looseness=30] (pp2); \path(pp3) edge [loop right, >=stealth,shorten >=1pt,looseness=30] (pp3); \node [draw=white, fill=white,xshift=10cm,yshift=-2.4cm] (a) at (-1,-0.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,xshift=10cm,yshift=-2.4cm] (a) at (1,-0.5) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,xshift=10cm,yshift=-2.4cm] (a) at (-0.6,2.2) { $p_{\tilde{z}}$}; \node [draw=white, fill=white,xshift=10cm,yshift=-2.4cm] (a) at (1,1.5) { $p_{\tilde{x}}$}; \node[xshift=10cm,yshift=-2.4cm] (qaa) at (-1,0) {}; \node[xshift=10cm,yshift=-2.4cm] (qbb) at (1,0) {}; \node[xshift=10cm,yshift=-2.4cm] (qcc) at (-0.6,1.8) {}; \node[xshift=10cm,yshift=-2.4cm] (qdd) at (1,1.1) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \node[xshift=10cm,yshift=-2.4cm] (qaaa) at (4,0) {}; \node[xshift=10cm,yshift=-2.4cm] (qbbb) at (2,0) {}; \node[xshift=10cm,yshift=-2.4cm] (qccc) at (3.6,-1.8) {}; \node[xshift=10cm,yshift=-2.4cm] (qddd) at (2,-1.1) {}; \draw[lightgray](qaaa)--(qbbb); \draw(qccc)--(qbbb); \draw[lightgray](qccc)--(qddd); \draw[lightgray](qaaa)--(qddd); \draw(qaaa)--(qccc); \draw(qbbb)--(qddd); \draw(qdd)--(qddd); \draw[lightgray](qbb)--(qbbb); \node [draw=white, fill=white] (a) at (17.5,-7.3) {(d)}; \end{tikzpicture} \vspace{1.5cm} \begin{tikzpicture}[very thick,scale=0.6] \tikzstyle{every node}=[circle, draw=black, fill=black, inner sep=0pt, minimum width=5pt]; \node [draw=white, fill=white] (a) at (0,-1) {\tiny $1$}; \node [draw=white, fill=white] (a) at (0.8,0) {\tiny $1$}; \node [draw=white, fill=white] (a) at (-1,0) {\tiny $1$}; \node [draw=white, fill=white] (a) at (0,1) {\tiny $1$}; \node [draw=white, fill=white] (a) at (0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white] (a) at (-0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white] (a) at (1.25,0) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (1.2,1) {\tiny $-1$}; \node [draw=white, fill=white] (a) at (-0.7,-1.1) {\tiny $[v]$}; \node [draw=white, fill=white] (a) at (0.7,-1.1) {\tiny $[w]$}; \node [draw=white, fill=white] (a) at (0.7,1.1) {\tiny $[x]$}; \node [draw=white, fill=white] (a) at (-0.7,1.1) {\tiny $[z]$}; \node (p1) at (-0.7,-0.7) {}; \node (p2) at (0.7,-0.7) {}; \node (p3) at (0.7,0.7) {}; \node (p4) at (-0.7,0.7) {}; \draw[lightgray](p1)--(p2); \draw(p3)--(p2); \draw[lightgray](p3)--(p4); \draw(p1)--(p4); \draw(p4)--(p2); \draw[lightgray](p1)--(p3); \path(p3) edge [loop right, >=stealth,shorten >=1pt,looseness=30] (p3); \path(p2) edge [bend right=30,lightgray] (p3); \node [draw=white, fill=white,yshift=-3cm] (a) at (-1,-0.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,yshift=-3cm] (a) at (1,-0.5) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,yshift=-3cm] (a) at (-0.6,2.2) { $p_{\tilde{z}}$}; \node [draw=white, fill=white,yshift=-3cm] (a) at (1,1.5) { $p_{\tilde{x}}$}; \node[yshift=-3cm] (qaa) at (-1,0) {}; \node[yshift=-3cm] (qbb) at (1,0) {}; \node[yshift=-3cm] (qcc) at (-0.6,1.8) {}; \node[yshift=-3cm] (qdd) at (1,1.1) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \node[yshift=-3cm] (qaaa) at (4,1) {}; \node[yshift=-3cm] (qbbb) at (2,1) {}; \node[yshift=-3cm] (qccc) at (3.6,-0.8) {}; \node[yshift=-3cm] (qddd) at (2,-0.1) {}; \draw[lightgray](qaaa)--(qbbb); \draw(qccc)--(qbbb); \draw[lightgray](qccc)--(qddd); \draw[lightgray](qaaa)--(qddd); \draw(qaaa)--(qccc); \draw(qbbb)--(qddd); \draw(qdd)--(qddd); \draw[lightgray](qbb)--(qddd); \draw[lightgray](qdd)--(qbbb); \node [draw=white, fill=white] (a) at (1,-9) {(e)}; \node [draw=white, fill=white, xshift=4cm] (a) at (0,-1) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (1,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (-0.8,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (0,1) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (-0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (-1.3,0) {\tiny $-1$}; \node [draw=white, fill=white, xshift=4cm] (a) at (1.2,1) {\tiny $-1$}; \node [draw=white, fill=white,xshift=4cm] (a) at (-0.7,-1.1) {\tiny $[v]$}; \node [draw=white, fill=white,xshift=4cm] (a) at (0.7,-1.1) {\tiny $[w]$}; \node [draw=white, fill=white,xshift=4cm] (a) at (0.7,1.1) {\tiny $[x]$}; \node [draw=white, fill=white,xshift=4cm] (a) at (-0.7,1.1) {\tiny $[z]$}; \node[xshift=4cm] (p1) at (-0.7,-0.7) {}; \node[xshift=4cm] (p2) at (0.7,-0.7) {}; \node[xshift=4cm] (p3) at (0.7,0.7) {}; \node[xshift=4cm] (p4) at (-0.7,0.7) {}; \draw[lightgray](p1)--(p2); \draw(p3)--(p2); \draw[lightgray](p3)--(p4); \draw(p1)--(p4); \draw(p4)--(p2); \draw[lightgray](p1)--(p3); \path(p3) edge [loop right, >=stealth,shorten >=1pt,looseness=30] (p3); \path(p1) edge [bend left=30,lightgray] (p4); \node [draw=white, fill=white,xshift=4cm,yshift=-3cm] (a) at (-1,-0.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,xshift=4cm,yshift=-3cm] (a) at (1,-0.75) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,xshift=4cm,yshift=-3cm] (a) at (-0.6,2.2) { $p_{\tilde{z}}$}; \node [draw=white, fill=white,xshift=4cm,yshift=-3cm] (a) at (1,1.75) { $p_{\tilde{x}}$}; \node[xshift=4cm,yshift=-3cm] (qaa) at (-1,0) {}; \node[xshift=4cm,yshift=-3cm] (qbb) at (1,0) {}; \node[xshift=4cm,yshift=-3cm] (qcc) at (-0.6,1.8) {}; \node[xshift=4cm,yshift=-3cm] (qdd) at (1,1.1) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \node[xshift=4cm,yshift=-3cm] (qaaa) at (4,1) {}; \node[xshift=4cm,yshift=-3cm] (qbbb) at (2,1) {}; \node[xshift=4cm,yshift=-3cm] (qccc) at (3.6,-0.8) {}; \node[xshift=4cm,yshift=-3cm] (qddd) at (2,-0.1) {}; \draw[lightgray](qaaa)--(qbbb); \draw(qccc)--(qbbb); \draw[lightgray](qccc)--(qddd); \draw[lightgray](qaaa)--(qddd); \draw(qaaa)--(qccc); \draw(qbbb)--(qddd); \draw(qdd)--(qddd); \draw[lightgray](qaa)--(qccc); \draw[lightgray](qcc)--(qaaa); \node [draw=white, fill=white] (a) at (7,-9) {(f)}; \node [draw=white, fill=white, xshift=8cm] (a) at (0,-0.5) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (0.8,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (-1,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (0,1) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (-0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (1.25,0) {\tiny $-1$}; \node [draw=white, fill=white, xshift=8cm] (a) at (0,-1.25) {\tiny $-1$}; \node [draw=white, fill=white,xshift=8cm] (a) at (-0.7,-1.1) {\tiny $[v]$}; \node [draw=white, fill=white,xshift=8cm] (a) at (0.7,-1.1) {\tiny $[w]$}; \node [draw=white, fill=white,xshift=8cm] (a) at (0.7,1.1) {\tiny $[x]$}; \node [draw=white, fill=white,xshift=8cm] (a) at (-0.7,1.1) {\tiny $[z]$}; \node[xshift=8cm] (p1) at (-0.7,-0.7) {}; \node[xshift=8cm] (p2) at (0.7,-0.7) {}; \node[xshift=8cm] (p3) at (0.7,0.7) {}; \node[xshift=8cm] (p4) at (-0.7,0.7) {}; \draw[lightgray](p1)--(p2); \draw(p3)--(p2); \draw[lightgray](p3)--(p4); \draw(p1)--(p4); \draw(p4)--(p2); \draw[lightgray](p1)--(p3); \path(p1) edge [bend right=30,lightgray] (p2); \path(p2) edge [bend right=30] (p3); \node [draw=white, fill=white,xshift=8cm,yshift=-3cm] (a) at (-1,-0.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,xshift=8cm,yshift=-3cm] (a) at (0.85,-0.5) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,xshift=8cm,yshift=-3cm] (a) at (-0.6,2.2) { $p_{\tilde{z}}$}; \node [draw=white, fill=white,xshift=8cm,yshift=-3cm] (a) at (1,1.5) { $p_{\tilde{x}}$}; \node[xshift=8cm,yshift=-3cm] (qaa) at (-1,0) {}; \node[xshift=8cm,yshift=-3cm] (qbb) at (1,0) {}; \node[xshift=8cm,yshift=-3cm] (qcc) at (-0.6,1.8) {}; \node[xshift=8cm,yshift=-3cm] (qdd) at (1,1.1) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \node[xshift=8cm,yshift=-3.9cm] (qaaa) at (4,1) {}; \node[xshift=8cm,yshift=-3.9cm] (qbbb) at (2,1) {}; \node[xshift=8cm,yshift=-3.9cm] (qccc) at (3.6,-0.8) {}; \node[xshift=8cm,yshift=-3.9cm] (qddd) at (2,-0.1) {}; \draw[lightgray](qaaa)--(qbbb); \draw(qccc)--(qbbb); \draw[lightgray](qccc)--(qddd); \draw[lightgray](qaaa)--(qddd); \draw(qaaa)--(qccc); \draw(qbbb)--(qddd); \draw(qdd)--(qbbb); \draw(qbb)--(qddd); \draw[lightgray](qaa)--(qddd); \draw[lightgray](qdd)--(qaaa); \node [draw=white, fill=white] (a) at (14,-9) {(g)}; \node [draw=white, fill=white, xshift=12cm] (a) at (0,-1) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (0.8,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (-0.8,0) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (0,1) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (-0.4,0.1) {\tiny $1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (-1.3,0) {\tiny $-1$}; \node [draw=white, fill=white, xshift=12cm] (a) at (1.3,0) {\tiny $-1$}; \node [draw=white, fill=white,xshift=12cm] (a) at (-0.7,-1.1) {\tiny $[v]$}; \node [draw=white, fill=white,xshift=12cm] (a) at (0.7,-1.1) {\tiny $[w]$}; \node [draw=white, fill=white,xshift=12cm] (a) at (0.7,1.1) {\tiny $[x]$}; \node [draw=white, fill=white,xshift=12cm] (a) at (-0.7,1.1) {\tiny $[z]$}; \node[xshift=12cm] (p1) at (-0.7,-0.7) {}; \node[xshift=12cm] (p2) at (0.7,-0.7) {}; \node[xshift=12cm] (p3) at (0.7,0.7) {}; \node[xshift=12cm] (p4) at (-0.7,0.7) {}; \draw[lightgray](p1)--(p2); \draw(p3)--(p2); \draw[lightgray](p3)--(p4); \draw(p1)--(p4); \draw(p4)--(p2); \draw[lightgray](p1)--(p3); \path(p1) edge [bend left=30,lightgray] (p4); \path(p2) edge [bend right=30] (p3); \node [draw=white, fill=white,xshift=12cm,yshift=-3cm] (a) at (-1,-0.5) { $p_{\tilde{v}}$}; \node [draw=white, fill=white,xshift=12cm,yshift=-3cm] (a) at (0.8,-0.5) { $p_{\tilde{w}}$}; \node [draw=white, fill=white,xshift=12cm,yshift=-3cm] (a) at (-0.6,2.2) { $p_{\tilde{z}}$}; \node [draw=white, fill=white,xshift=12cm,yshift=-3cm] (a) at (1,1.6) { $p_{\tilde{x}}$}; \node[xshift=12cm,yshift=-3cm] (qaa) at (-1,0) {}; \node[xshift=12cm,yshift=-3cm] (qbb) at (1,0) {}; \node[xshift=12cm,yshift=-3cm] (qcc) at (-0.6,1.8) {}; \node[xshift=12cm,yshift=-3cm] (qdd) at (1,1.2) {}; \draw[lightgray](qaa)--(qbb); \draw(qcc)--(qbb); \draw[lightgray](qcc)--(qdd); \draw[lightgray](qaa)--(qdd); \draw(qaa)--(qcc); \draw(qbb)--(qdd); \node[xshift=12cm,yshift=-4.2cm] (qaaa) at (4,1) {}; \node[xshift=12cm,yshift=-4.2cm] (qbbb) at (2,1) {}; \node[xshift=12cm,yshift=-4.2cm] (qccc) at (3.6,-0.8) {}; \node[xshift=12cm,yshift=-4.2cm] (qddd) at (2,-0.2) {}; \draw[lightgray](qaaa)--(qbbb); \draw(qccc)--(qbbb); \draw[lightgray](qccc)--(qddd); \draw[lightgray](qaaa)--(qddd); \draw(qaaa)--(qccc); \draw(qbbb)--(qddd); \draw(qbb)--(qddd); \draw(qdd)--(qbbb); \draw[lightgray](qaa)--(qccc); \draw[lightgray](qcc)--(qaaa); \node [draw=white, fill=white] (a) at (20,-9) {(h)}; \end{tikzpicture} \end{center} \vspace{-0.2cm} \caption{Examples of $\mathbb{Z}_2$-gain graphs and their covering graphs. These are precisely the base $\mathbb{Z}_2$-gain graphs for the $(2,2,0)$-gain-tight inductive construction described in Section~\ref{Sect:Inductive}. The bottom rows illustrate $\chi_0$-symmetrically isostatic realisations for the $\ell^\infty$-plane under half-turn rotational symmetry. The monochrome subgraphs induced by these realisations (described in Section~\ref{Sect:Gridlike}) are indicated in black and grey.} \label{fig:gain_cov_graphs} \end{figure} The {\em gain} of a path of directed edges $F=[v_1],[e_1],[v_2], \ldots, [e_k],[v_k]$ in a gain graph $(G_0,\psi)$ (where $[v_1]$ may be equal to $[v_k]$) is defined as the product $\psi(F) =\Pi_{i=1}^k \,\psi([e_i])^{\textrm{sign}([e_i])}$, where $\textrm{sign}([e_i])=1$ if $[e_i]$ is directed from $[v_i]$ to $[v_{i+1}]$ and $\textrm{sign}([e_i])=-1$ if $[e_i]$ is directed from $[v_{i+1}]$ to $[v_i]$. A set of edges $F$ is {\em balanced} if it does not contain a cycle of edges, or, has the property that every cycle of edges in $F$ has gain $1$. A subgraph of $G_0$ is {\em balanced} in $(G_0,\psi)$ if its edge set is balanced; otherwise, the subgraph is {\em unbalanced}. \begin{lemma}[\cite{jkt,zas}] \label{switch} Let $G_0$ be a quotient graph and fix an orientation on the edges of $G_0$. If a subgraph $H_0$ is balanced for some gain assignment on the directed quotient graph $G_0$ then, \begin{enumerate}[(i)] \item $H_0$ is balanced for every equivalent gain assignment on the directed quotient graph $G_0$. \item there exists an equivalent gain assignment $\psi$ on the directed quotient graph $G_0$ which satisfies $\psi([e])=1$ for all $[e]\in E(H_0)$. \end{enumerate} \end{lemma} \subsection{A special case} \label{s:specialcase} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and $\Gamma$-symmetric bar-joint framework in $X$ and suppose the $\Gamma$-symmetric graph $(G,\theta)$ has an associated gain graph which is balanced. By Lemma \ref{switch}, there exists a choice of vertex orbit representatives $\tilde{V}_0$ such that the induced gain assignment satisfies $\psi([e])=1$ for all $[e]\in E(G_0)$. It follows that $G_0$ is a simple graph. Consider the well-positioned bar-joint framework $(G_0,\tilde{p})$ in $X$ where $\tilde{p}_{[v]}=p_{\tilde{v}}$ for each vertex orbit $[v]\in V_0$ and vertex orbit representative $\tilde{v}\in \tilde{V}_0$ with $\tilde{v}\in[v]$. The following lemma shows the relationship between the differential $df_{G_0}(\tilde{p})$ and the components of the block decomposition of $df_G(p)$ described in Proposition \ref{prop:block}. \begin{lemma} \label{lem:commutativediagram} Let $\chi\in\hat{\Gamma}$ and define a pair of linear transformations, \[S_\chi({\mathcal{G}}):(X_{\mathbb{C}})^{V_0}\to X_\chi, \,\,\,\,\,\, (x_{[v]})_{[v]\in V_0}\mapsto ( \chi(\gamma) \tau(\gamma)x_{[v]})_{v\in V}\] where $v=\gamma \tilde{v}$ for some unique $\tilde{v}\in\tilde{V}_0$ and some unique $\gamma\in\Gamma$, and, \[T_\chi({\mathcal{G}}):{\mathbb{C}}^{E_0}\to Y_\chi, \,\,\,\,\,\, (x_{[e]})_{[e]\in E_0}\mapsto (\chi(\gamma) x_{[e]})_{e\in E}\] where $e=\gamma(\tilde{v}\tilde{w})$ for some unique $\tilde{v},\tilde{w}\in \tilde{V}_0$ and some unique $\gamma\in\Gamma$. Then the following diagram commutes. \[ \begin{tikzcd} (X_{\mathbb{C}})^{V_0} \arrow{r}{df_{G_0}(\tilde{p})} \arrow[swap]{d}{S_\chi({\mathcal{G}})} & {\mathbb{C}}^{E_0} \arrow{d}{T_\chi({\mathcal{G}})} \\ X_\chi \arrow{r}{R_\chi({\mathcal{G}})} & Y_\chi \end{tikzcd} \] In particular, $df_{G_0}(\tilde{p})$ and $R_\chi({\mathcal{G}})$ are similar linear transformations. \end{lemma} \proof Let $u=(u_{[v]})_{[v]\in V_0}\in (X_{\mathbb{C}})^{V_0}$ and let $e=vw\in E$. Then $v=\gamma\tilde{v}$ and $w=\gamma\tilde{w}$ for some unique vertex orbit representatives $\tilde{v},\tilde{w}\in \tilde{V}_0$ and some unique $\gamma\in\Gamma$. Recall from Proposition \ref{prop:block} that $R_\chi({\mathcal{G}})$ is the restriction of $df_G(p)$ to the subspace $X_\chi\subset (X_{\mathbb{C}})^V$. Thus, by Lemma \ref{lem:differential}, the $e$-component of $(R_\chi({\mathcal{G}})\circ S_\chi({\mathcal{G}}))(u)$ is given by $\varphi_{v,w}( \chi(\gamma) \tau(\gamma)(u_{[v]}-u_{[w]}))$. Also, by applying Lemma \ref{lem:differential} to the bar-joint framework $(G_0,\tilde{p})$, and using Lemma \ref{lem:SupportFunctionals}, we see that the $e$-component of $(T_\chi({\mathcal{G}}) \circ df_{G_0}(\tilde{p}))(u)$ is given by $\chi(\gamma)\varphi_{\tilde{v},\tilde{w}}(u_{[v]} - u_{[w]}) = \varphi_{v,w}(\chi(\gamma)\tau(\gamma)(u_{[v]} - u_{[w]}))$. \endproof \subsection{Gain-sparsity} Let $k\in{\mathbb{N}}$, let $l\in\{0,1,\ldots, 2k-1\}$ and let $m\in \{0,1,\ldots, l\}$. \begin{definition} A gain graph $(G_0,\psi)$ is \emph{$(k,l,m)$-gain-sparse} if \begin{enumerate}[(a)] \item $|F|\leq k|V(F)|-l$ for any nonempty balanced $F\subseteq E(G_0)$, and, \item $|F|\leq k|V(F)|-m$ for all $F\subseteq E(G_0)$. \end{enumerate} Moreover, $(G_0,\psi)$ is \emph{$(k,l,m)$-gain-tight} if $|E(G_0)|=k|V(G_0)|-m$ and $(G_0,\psi)$ is $(k,l,m)$-gain-sparse. \end{definition} Consider again the multiplicative cyclic group ${\mathbb{Z}}_n=\{\omega^k:k=0,1,\ldots,n-1\}$ with characters $\chi_j(\omega)=\omega^j$ for $j=0,1,\ldots, n-1$. A ${\mathbb{Z}}_n$-symmetric bar-joint framework ${\mathcal{G}}=(G,p,\theta,\tau)$ in $X$ is said to be {\em ${\mathcal{C}}_n$-symmetric} if $\tau(\omega)$ is an $n$-fold rotation of $X$. \begin{corollary} \label{cor:neccounts} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and ${\mathcal{C}}_n$-symmetric bar-joint framework in $X$, where $n\geq 2$, and let $d=\dim_{\mathbb{R}} X$. Suppose, in addition, that ${\mathcal{T}}(X)$ is minimal and ${\mathcal{G}}$ is $\chi_j$-symmetrically isostatic. \begin{enumerate}[(i)] \item Suppose $n=2$. \begin{enumerate}[(a)] \item If $j=0$ then $(G_0,\psi)$ is $(d,d,d-2)$-gain-tight. \item If $j=1$ then, $(G_0,\psi)$ is $(d,d,2)$-gain-tight. \end{enumerate} \item Suppose $n\geq 3$. \begin{enumerate}[(a)] \item If $j=0$ then $(G_0,\psi)$ is $(d,d,d-2)$-gain-tight. \item If $j\in \{1,n-1\}$ then, $(G_0,\psi)$ is $(d,d,1)$-gain-tight. \item If $j\notin \{0,1,n-1\}$ then, $(G_0,\psi)$ is $(d,d,0)$-gain-tight. \end{enumerate} \end{enumerate} \end{corollary} \proof Let $\chi=\chi_j$. Note that since ${\mathcal{T}}(X)$ is minimal, every bar-joint framework in $X$ is full. By Lemma \ref{lem:SymRigid}, ${\mathcal{G}}$, and every ${\mathcal{C}}_n$-symmetric subframework of ${\mathcal{G}}$, is $\chi$-symmetrically full. Also note that $\dim X_\chi = (\dim_{\mathbb{R}} X)|V_0|$ and $\dim Y_\chi = |E_0|$. Let $F\subseteq E(G_0)$, let $H_0$ be the subgraph of $G_0$ spanned by the edges in $F$ and let $H$ be the covering graph for $H_0$ in $G$. By Lemma \ref{lem:blocksurjSym}, the ${\mathcal{C}}_n$-symmetric subframework $\H=(H,p_H,\theta_H,\tau_H)$ is $\chi$-symmetrically independent. Thus, by Proposition \ref{prop:counts}$(ii)$, \[|E(H_0)|\leq (\dim_{\mathbb{R}} X)|V(H_0)| - \dim_{\mathbb{C}} {\mathcal{T}}_\chi(X).\] If $H_0$ is a balanced subgraph of $G_0$ then we may consider an associated bar-joint framework $(H_0,\tilde{p}_H)$, as described in Section \ref{s:specialcase}. By Lemma \ref{lem:commutativediagram}, $df_{H_0}(\tilde{p}_{H})$ and $R_\chi(\H)$ are similar linear transformations. It follows that $(H_0,\tilde{p}_{H})$ is an independent subframework of $(G,p)$ and so, \begin{eqnarray*} |E(H_0)|= \operatorname{rank} df_{H_0}(\tilde{p}_{H}) &=&(\dim_{\mathbb{R}} X)|V(H_0)| - \dim_{\mathbb{R}} {\mathcal{F}}(H_0,\tilde{p}_{H})\\ &\leq&(\dim_{\mathbb{R}} X)|V(H_0)| - \dim_{\mathbb{R}} {\mathcal{T}}(X). \end{eqnarray*} Since ${\mathcal{T}}(X)$ is minimal, $\dim_{\mathbb{R}} {\mathcal{T}}(X) = \dim_{\mathbb{R}} X$. Thus the results now follow from Lemma \ref{lem:dimensionCn} and Proposition \ref{prop:counts}$(iii)$. \endproof \begin{remark} Note that, by the above corollary, for two-dimensional $\chi_j$-symmetrically isostatic bar-joint frameworks with rotational symmetry, the associated gain graph must be either $(2,2,0)$-gain tight, $(2,2,1)$-gain-tight or $(2,2,2)$-gain-tight. Inductive constructions for $(2,2,1)$- and $(2,2,2)$-gain-tight gain graphs are presented in \cite{NS} (see also \cite{NOP12,NO14}). In the next section we present an inductive construction for $(2,2,0)$-gain-tight gain graphs. Also note that, in any dimension, the $(k,l,m)$-gain tight counts given by Corollary \ref{cor:neccounts} are the bases of a matroid as was observed in \cite{NS}. (Note however that this matroidal property does not hold for arbitrary triples $k,l,m\in \mathbb{N}$. Indeed it fails in some rigidity contexts \cite{iktan}.) \end{remark} \section{An inductive construction of $(2,2,0)$-gain tight $\mathbb{Z}_2$-gain graphs} \label{Sect:Inductive} Let $(G_0,\psi)$ be a $\mathbb{Z}_2$-gain graph with covering graph $G$. For simplicity, we will omit the square brackets in the notation of vertices and edges of $(G_0,\psi)$ in this section, and simply write $v$ for the vertex $[v]$, and $(uv,\alpha)$ for the edge $([u],[v])$ with gain $\alpha$. Note that the orientation of the edges of $(G_0,\psi)$ does not matter, since $(G_0,\psi)$ is a $\mathbb{Z}_2$-gain graph and $\mathbb{Z}_2$ is of order 2. For the remainder of this article we will only consider $\mathbb{Z}_2$-gain graphs and so from now on the term {\em gain graph} will be used to mean {\em $\mathbb{Z}_2$-gain graph}. \subsection{Base graphs} Let ${\mathcal{B}}$ denote the family of $(2,2,0)$-gain-tight \emph{base graphs} presented in Figure \ref{fig:gain_cov_graphs}. It will be convenient to assign names to elements of ${\mathcal{B}}$. Let $iK_j^\ell$ denote the complete graph on $j$ vertices, with $i$ copies of each edge and $\ell$ loops on each vertex. Then $2K_2^1$ and $K_3^1$ with a balanced $K_3$ are the gain graphs in Figures~\ref{fig:gain_cov_graphs}(a) and (b), respectively. The graph formed from $2K_3$ by adding a loop and deleting an edge not incident with the vertex with the loop will be denoted by $R$. (See Figure~\ref{fig:gain_cov_graphs}(c).) We denote by $K_4^+$ any $\mathbb{Z}_2$-gain graph formed from a balanced copy of $K_4$ by adding a single edge (subject to $(2,2,0)$-gain-sparsity). We shall also use $K_4^{++}$ to denote any one of the non-isomorphic $(2,2,0)$-gain-tight gain graphs formed from $K_4$ by adding two edges. (See Figures \ref{fig:gain_cov_graphs}(d)-(h).) \subsection{Preliminaries} We first record two preliminary lemmas about gain graphs which go back to Zaslavsky \cite{zas}. \begin{lemma}\label{lem:switchto-1} Let $G_0$ be a (simple) cycle. A $\mathbb{Z}_2$-gain graph $(G_0,\psi)$ is unbalanced if and only if the vertices in $V_0$ can be switched so that any one edge has non-identity gain and every other edge in the resulting $\mathbb{Z}_2$-gain graph $(G_0,\psi')$ has identity gain. \end{lemma} \begin{lemma}\label{lem:balancedunion} Let $(G_0,\psi)$ be a $\mathbb{Z}_2$-gain graph and let $A$ and $B$ be subgraphs of $(G_0,\psi)$. Suppose that $A\cap B$ is connected. If $A$ and $B$ are balanced then $A\cup B$ is also balanced. \end{lemma} We will also need some elementary results about sparse graphs which we record here for convenience. Let $f(G_0)=2|V_0|-|E_0|$. So, for example, any $(2,2,0)$-gain-tight gain graph $G_0$ satisfies $f(G_0)=0$ while any balanced subgraph $G_0'$ satisfies $f(G_0')\geq2$. \begin{lemma}\label{lem:4regno0} Let $G_0$ be connected and 4-regular. Then $f(G_0')\geq 1$ for any proper subgraph $G_0'\subset G_0$. \end{lemma} \begin{proof} Suppose $G_0$ contains a subgraph $G_0'$ with $f(G_0')=0$. Then $G_0'$ has average degree 4, so $G_0'$ must be 4-regular (by the 4-regularity of $G_0$). Since $G_0$ is connected it follows that $G_0'=G_0$. \end{proof} For two disjoint vertex sets $A,B\subset V(G_0)$, we denote by $d(A,B)$ the number of edges between $A$ and $B$. \begin{lemma} \label{l:claim} Let $H_0=(V_0',E_0')$ be a subgraph of $G_0$. If the degree of $v$ in $G_0$ is at least 4 for all $v\in V_0'$ then $d(V_0',V_0-V_0')\geq 2f(H_0)$. \end{lemma} \proof Since $|E_0'|=2|V_0'|-f(H_0)$ and every vertex in $V_0'$ has degree at least 4 in $G_0$ we have, \[4|V_0'|\leq \sum_{v\in V_0'} \deg_{G_0}(v) = 2|E_0'|+d(V_0',V_0-V_0') = 4|V_0'| - 2f(H_0) +d(V_0',V_0-V_0').\] \endproof \begin{lemma}\label{lem:23con} Let $(G_0,\psi)$ be $(2,2,0)$-gain-sparse, and let $G_0'$ be a balanced subgraph of $(G_0,\psi)$ with $f(G_0')\in \{2,3\}$. Then $G_0'$ is connected. \end{lemma} \begin{proof} Suppose $G_0'$ is disconnected. Let $A$ be a connected component of $G_0'$ and let $B=G_0'-A$. Since any subgraph of a balanced gain graph is also balanced, we have $f(A)\geq 2$ and $f(B)\geq 2$. Hence $f(G_0')=f(A)+f(B)\geq 4$, contradicting the hypothesis of the lemma. \end{proof} \begin{lemma}\label{lem:unionint} Let $(G_0,\psi)$ be $(2,2,0)$-gain-tight. Let $H_0'$ and $H_0''$ be balanced subgraphs of $(G_0,\psi)$ with $V(H_0')\cap V(H_0'')\neq \emptyset$ and $f(H_0')=2=f(H_0'')$. Then either \begin{enumerate}[(i)] \item $f(H_0'\cap H_0'')=4$ and $f(H_0'\cup H_0'')=0$, or, \item $f(H_0'\cup H_0'')=f(H_0'\cap H_0'')=2$. \end{enumerate} Moreover, $(ii)$ holds if and only if $H_0'\cup H_0''$ is balanced. \end{lemma} \begin{proof} As $H_0'\cap H_0'' \subset H_0'$ we have $f(H_0'\cap H_0'')\geq 2$. If $f(H_0'\cap H_0'')\geq 4$ then $$0\leq f(H_0'\cup H_0'')=f(H_0')+f(H_0'')-f(H_0'\cap H_0'')= 4-f(H_0'\cap H_0'')\leq 0$$ and so $(i)$ holds. If $f(H_0'\cap H_0'') \in \{2,3\}$ then $H_0'\cap H_0''$ is connected by Lemma \ref{lem:23con}. It follows that $H_0'\cup H_0''$ is balanced by Lemma \ref{lem:balancedunion} and hence $f(H_0'\cup H_0'')\geq 2$. Thus, $$2\leq f(H_0'\cup H_0'')=2+2-f(H_0'\cap H_0'')\leq 2$$ and so $(ii)$ holds. \end{proof} \subsection{Henneberg-type operations} Now we define operations on $\mathbb{Z}_2$-gain graphs. The H1 operation (or Henneberg 1 move, or 0-extension) adds a new vertex of 3 possible types. In type 1a the new vertex has degree 2 and two distinct neighbours; in type 1b the new vertex has degree 2 and one neighbour with two parallel edges; and in type 1c the new vertex has degree 3 with one neighbour and a loop. (See Figure \ref{fig:2}.) The gains on the new edges are arbitrary subject to the condition that the covering graph is simple, i.e. parallel edges have different gains and a loop has gain $-1$. \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.6] \draw (-6,0.1) circle (40pt); \filldraw (-6.8,.75) circle (3pt); \filldraw (-5.2,.75) circle (3pt); \filldraw (-6,2.5) circle (3pt); \draw[black] (-6.8,.75) -- (-6,2.5) -- (-5.2,.75); \draw (0,.1) circle (40pt); \filldraw (0,.75) circle (3pt); \filldraw (0,2.5) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(0,.75) (-.25,1.6) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,.75) (.25,1.6) (0,2.5)}; \filldraw (-.25,1.6) circle (0pt) node[anchor=east]{}; \filldraw (.25,1.6) circle (0pt) node[anchor=west]{}; \draw (6,.1) circle (40pt); \filldraw (6,.75) circle (3pt); \filldraw (6,2.5) circle (3pt); \draw[black] (6,.75) -- (6,2.5); \draw[thick] plot[smooth, tension=1] coordinates{(6,2.5) (5.7,3) (6.3,3) (6,2.5)}; \filldraw (6,3) circle (0pt) node[anchor=south]{}; \end{tikzpicture} \end{center} \caption{H1 a, b, c operations on gain graphs. Gain labels are omitted. } \label{fig:2} \end{figure} The H2 operation (or Henneberg 2 move, or 1-extension) deletes one edge $(xy,\alpha)$ and adds a new vertex $v$ adjacent to $x,y$ of five possible types. In type 2a, $v$ has degree 3 and 3 distinct neighbours with edges $(xv,\beta)$ and $(yv,\gamma)$ satisfying $\beta\gamma=\alpha$; in type 2b, $v$ has degree 3 and exactly 2 neighbours with edges $(xv,1), (xv,-1)$ and $(yv,\delta)$ with $\delta=\pm 1$; in type 2c, the deleted edge $xy$ is a loop $(xx,-1)$ and $v$ has degree 3 and exactly 2 neighbours with edges $(xv,1), (xv,-1)$ and $(yv,\delta)$ with $\delta=\pm 1$; in type 2d, $v$ has degree 4 and exactly 2 neighbours with edges $(xv,\beta), (yv,\gamma)$ and $(vv,-1)$ satisfying $\alpha=\beta\gamma$; finally, in type 2e, the deleted edge $xy$ is a loop $(xx,-1)$, $v$ has degree 4 and exactly 1 neighbour with edges $(xv,1), (xv,-1)$ and $(vv,-1)$. (See Figure~\ref{fig:3b}.) \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.6] \draw (-6,0) circle (40pt); \filldraw (-6.8,.75) circle (3pt); \filldraw (-5.2,.75) circle (3pt); \filldraw (-6,2.5) circle (3pt); \filldraw (-6,.1) circle (3pt); \draw[black] (-6.8,.75) -- (-6,2.5) -- (-5.2,.75); \draw[black] (-6,.1) -- (-6,2.5); \draw[dashed] (-6.8,.75) -- (-6,.1); \end{tikzpicture} \hspace{0.7cm} \begin{tikzpicture}[scale=0.6] \draw (0,0) circle (40pt); \filldraw (-.8,.75) circle (3pt); \filldraw (0,2.5) circle (3pt); \filldraw (0.8,.75) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.2,1.6) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.7,1.6) (0,2.5)}; \filldraw (-.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (-.4,1.6) circle (0pt) node[anchor=west]{}; \draw[black] (.8,.75) -- (0,2.5); \draw[dashed] (-.8,.75) -- (0.8,.75); \end{tikzpicture} \hspace{0.7cm} \begin{tikzpicture}[scale=0.6] \draw (6,0) circle (40pt); \filldraw (5.2,.75) circle (3pt); \filldraw (6,2.5) circle (3pt); \filldraw (6.8,.75) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(5.2,.75) (5.8,1.6) (6,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(5.2,.75) (5.3,1.6) (6,2.5)}; \filldraw (5.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (5.7,1.6) circle (0pt) node[anchor=west]{}; \draw[black] (6.8,.75) -- (6,2.5); \draw[dashed] plot[smooth, tension=1] coordinates{(5.2,.75) (4.9,.25) (5.5,.25) (5.2,.75)}; \end{tikzpicture} \hspace{0.7cm} \begin{tikzpicture}[scale=0.6] \draw (0,0) circle (40pt); \filldraw (-.8,.75) circle (3pt); \filldraw (0,2.5) circle (3pt); \filldraw (0.8,.75) circle (3pt); \filldraw (-.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (0,1.6) circle (0pt) node[anchor=west]{}; \draw[black] (.8,.75) -- (0,2.5) -- (-.8,.75); \draw[dashed] (-.8,.75) -- (0.8,.75); \draw[thick] plot[smooth, tension=1] coordinates{(0,2.5) (-.3,2.9) (.3,2.9) (0,2.5)}; \filldraw (0,2.8) circle (0pt) node[anchor=south]{}; \end{tikzpicture} \hspace{0.7cm} \begin{tikzpicture}[scale=0.6] \draw (6,0) circle (40pt); \filldraw (6,.75) circle (3pt); \filldraw (6,2.5) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(6,.75) (5.8,1.6) (6,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(6,.75) (6.2,1.6) (6,2.5)}; \filldraw (6,1.6) circle (0pt) node[anchor=east]{}; \filldraw (6,1.6) circle (0pt) node[anchor=west]{}; \filldraw (6,2.8) circle (0pt) node[anchor=south]{}; \draw[dashed] plot[smooth, tension=1] coordinates{(6,.75) (5.7,.25) (6.3,.25) (6,.75)}; \draw[thick] plot[smooth, tension=1] coordinates{(6,2.5) (5.7,2.9) (6.3,2.9) (6,2.5)}; \end{tikzpicture} \end{center} \caption{H2 a, b, c, d, e operations on gain graphs. Gain labels are omitted.} \label{fig:3b} \end{figure} The H3 operation (or X-replacement, or 2-extension) deletes two edges $(xy,\alpha),(zw,\beta)$ and adds a new degree 4 vertex $v$ adjacent to $x,y,z,w$ of five possible types. In type 3a, $v$ has 4 distinct neighbours and edges $(xv,\gamma),(yv,\delta),(zv,\epsilon),(wv,\zeta)$ where $\alpha=\gamma\delta$ and $\beta=\epsilon\zeta$; in type 3b, $v$ has 3 distinct neighbours, $y=z$ and there are two parallel edges between $v$ and $y$, with edges $(xv,\gamma),(yv,1),(yv,-1),(wv,\zeta)$ where $\alpha=\gamma$ and $\beta=-\zeta$; in type 3c, $v$ has 3 distinct neighbours, $x=y$ so $\alpha=-1$ and there are two parallel edges between $v$ and $x$ with edges $(xv,-1),(xv,1),(zv,\epsilon),(wv,\zeta)$ and $\beta=\epsilon\zeta$; in type 3d, $v$ has 2 distinct neighbours, $x=y$ and $z=w$ so $\alpha=\beta=-1$ and there are two parallel edges between $v$ and $x$ and between $v$ and $z$ with edges $(xv,1),(xv,-1),(zv,1),(zv,-1)$. (See Figure~\ref{fig:3d}.) \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.6] \draw (-6,0) circle (40pt); \filldraw (-6.9,.75) circle (3pt); \filldraw (-5.1,.75) circle (3pt); \filldraw (-6,2.5) circle (3pt); \filldraw (-6.3,.1) circle (3pt); \filldraw (-5.7,.1) circle (3pt); \draw[black] (-6.9,.75) -- (-6,2.5) -- (-5.1,.75); \draw[black] (-6.3,.1) -- (-6,2.5); \draw[black] (-5.7,.1) -- (-6,2.5); \draw[dashed] (-6.8,.75) -- (-6.3,.1); \draw[dashed] (-5.1,.75) -- (-5.7,.1); \end{tikzpicture} \hspace{0.9cm} \begin{tikzpicture}[scale=0.6] \draw (0,0) circle (40pt); \filldraw (-.8,.75) circle (3pt); \filldraw (0,2.5) circle (3pt); \filldraw (0.8,.75) circle (3pt); \filldraw (0,.1) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.2,1.6) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.7,1.6) (0,2.5)}; \filldraw (-.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (-.4,1.6) circle (0pt) node[anchor=west]{}; \draw[black] (.8,.75) -- (0,2.5); \draw[black] (0,.1) -- (0,2.5); \draw[dashed] (-.8,.75) -- (0.8,.75); \draw[dashed] (-.8,.75) -- (0,.1); \end{tikzpicture} \hspace{0.9cm} \begin{tikzpicture}[scale=0.6] \draw (6,0) circle (40pt); \filldraw (5.2,.75) circle (3pt); \filldraw (6,2.5) circle (3pt); \filldraw (6.8,.75) circle (3pt); \filldraw (6,.1) circle (3pt); \draw[thick] plot[smooth, tension=1] coordinates{(5.2,.75) (5.8,1.6) (6,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(5.2,.75) (5.3,1.6) (6,2.5)}; \filldraw (5.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (5.7,1.6) circle (0pt) node[anchor=west]{}; \draw[black] (6.8,.75) -- (6,2.5); \draw[black] (6,.1) -- (6,2.5); \draw[dashed] (6,.1) -- (6.8,.75); \draw[dashed] plot[smooth, tension=1] coordinates{(5.2,.75) (4.9,.25) (5.5,.25) (5.2,.75)}; \end{tikzpicture} \hspace{0.9cm} \begin{tikzpicture}[scale=0.6] \draw (0,0) circle (40pt); \filldraw (-.8,.75) circle (3pt); \filldraw (0,2.5) circle (3pt); \filldraw (0.8,.75) circle (3pt); \filldraw (-.5,1.6) circle (0pt) node[anchor=east]{}; \filldraw (-.4,1.6) circle (0pt) node[anchor=west]{}; \filldraw (.7,1.6) circle (0pt) node[anchor=east]{}; \filldraw (.7,1.6) circle (0pt) node[anchor=west]{}; \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.7,1.7) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(-.8,.75) (-.2,1.7) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(.8,.75) (.7,1.7) (0,2.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(.8,.75) (.2,1.7) (0,2.5)}; \draw[dashed] plot[smooth, tension=1] coordinates{(.8,.75) (1.1,.4) (.5,.4) (.8,.75)}; \draw[dashed] plot[smooth, tension=1] coordinates{(-.8,.75) (-1.1,.4) (-.5,.4) (-.8,.75)}; \end{tikzpicture} \end{center} \caption{H3 a, b, c, d operations on gain graphs. Gain labels are omitted.} \label{fig:3d} \end{figure} A \emph{vertex-to-$K_4$} operation removes a vertex $v$ (of arbitrary degree) and all the edges incident with $v$, and adds in a copy of $K_4$ with only trivial gains. Each removed edge $(xv,\gamma)$, where $x\not= v$, is replaced by an edge $(xy,\gamma)$ for some $y$ in the new $K_4$. If $x=v$ then the removed edge $(vv,-1)$ is replaced by an edge $(wz,-1)$ where $w,z$ are vertices of the new $K_4$. Note $w$ and $z$ need not be distinct. (See Figure \ref{fig:vk4}.) \begin{center} \begin{figure}[ht] \centering \begin{tikzpicture}[scale=0.9] \draw (0,0) circle (27pt); \draw (5,0) circle (27pt); \filldraw (0,1.5) circle (3pt); \filldraw (.2,0.5) circle (3pt); \filldraw (-.2,0.5) circle (3pt); \filldraw (0.6,0.35) circle (3pt); \filldraw (-0.6,0.35) circle (3pt); \filldraw (4.65,1.35) circle (3pt); \filldraw (5.35,1.35) circle (3pt); \filldraw (4.65,1.8) circle (3pt); \filldraw (5.35,1.8) circle (3pt); \filldraw (5.2,0.5) circle (3pt); \filldraw (4.8,0.5) circle (3pt); \filldraw (5.6,0.35) circle (3pt); \filldraw (4.4,0.35) circle (3pt); \draw[black] (-.6,0.35) -- (0,1.5) -- (-.2,.5) -- (0,1.5) -- (.2,.5); \draw[black] (.6,.35) -- (0,1.5); \draw[black] (2,0) -- (2.85,0); \draw[black] (2.85,0.15) -- (2.85,-.15) -- (3,0) -- (2.85,.15); \draw[black] (4.4,0.35) -- (4.65,1.35) -- (5.35,1.35) -- (4.65,1.8) -- (5.35,1.8) -- (5.35,1.35) -- (5.6,.35); \draw[black] (5.2,0.5) -- (4.65,1.8) -- (4.65,1.35) -- (4.8,.5); \draw[black] (4.65,1.35) -- (5.35,1.8); \end{tikzpicture} \hspace{1cm} \begin{tikzpicture}[scale=0.9] \draw (0,0) circle (27pt); \draw (5,0) circle (27pt); \filldraw (-.6,-.1) circle (3pt); \filldraw (.6,.1) circle (3pt); \draw[black] (-.8,-.1) -- (-.6,-.1) -- (.6,.1) -- (.8,.1); \draw[black] (-.6,-.3) -- (-.6,-.1) -- (-.6,.1); \draw[black] (.6,.3) -- (.6,.1) -- (.6,-.1); \filldraw (4.4,-.1) circle (3pt); \filldraw (5.6,-.2) circle (3pt); \filldraw (5.6,.4) circle (3pt); \draw[black] (4.2,-.1) -- (4.4,-.1) -- (5.6,-.2) -- (5.8,-.2); \draw[black] (4.4,-.3) -- (4.4,-.1) -- (4.4,.1); \draw[black] (4.4,-.1) -- (5.6,.4) -- (5.6,-.2) -- (5.6,-.4); \draw[black] (5.6,.4) -- (5.6,.6); \draw[black] (2,0) -- (2.85,0); \draw[black] (2.85,0.15) -- (2.85,-.15) -- (3,0) -- (2.85,.15); \end{tikzpicture} \caption{The vertex-to-$K_4$ operation and the vertex splitting operation. Gain labels are omitted.} \label{fig:vk4} \end{figure} \end{center} A \emph{vertex splitting} operation first chooses a vertex $v_1$, a neighbour $v_2$ of $v_1$, and a partition $N_1,N_2$ of the remaining neighbours of $v_1$; it then deletes the edges from $v_1$ to vertices in $N_1$, adds a new vertex $v_0$ joined to vertices in $N_1$ and finally adds two new edges $v_0v_1,v_0v_2$. If there is a loop at $v_1$ then it is either left unchanged or replaced by a loop at $v_0$. We specify that $v_0v_1$ is given gain 1 and $v_0v_2$ is given the same gain as $v_1v_2$. (See Figure \ref{fig:vk4}.) By construction we have the following. \begin{lemma}\label{lem:moves} Applying any of the above operations to a $(2,2,0)$-gain-tight gain graph results in a $(2,2,0)$-gain-tight gain graph. \end{lemma} \begin{proof} When the operation is a H1, H2 or H3 operation then we may employ similar arguments to those in \cite[Lemma 4.1 and 7.6]{jkt}. Suppose $(G,\psi)$ is obtained from $(H,\psi')$ by a vertex-to-$K_4$ operation at $v$. If $(G,\psi)$ is not $(2,2,0)$-gain-tight then there exists a vertex-induced subgraph $G_1$ of $(G,\psi)$ such that $f(G_1)<0$, or, $(G_1,\psi|_{G_1})$ is balanced and $f(G_1)\in \{0,1\}$. Consider the subgraph $H_1$ of $H$ corresponding to $G_1$ obtained on contracting $G$ to $H$. Note that in our definition of $H_1$, if there is a loop at $v$ in $H$ then $H_1$ will contain this loop if and only if $G_1$ contains the extra edge $(wz,-1)$ in the copy of $K_4^+$. Note that $(H_1,\psi'|_{H_1})$ is balanced if and only if $(G_1,\psi|_{G_1})$ is balanced. There are two possibilities: either $|V(K_4\cap G_1)|\in\{1,4\}$, or, $|V(K_4\cap G_1)|\in \{2,3\}$. In the first case, $f(H_1)=f(G_1)$ and in the second case $f(H_1)=f(G_1)-1$, contradicting $(2,2,0)$-gain-sparsity. Lastly, suppose $(G,\psi)$ is obtained from a $(2,2,0)$-gain-tight gain graph $(H,\psi')$ by a vertex splitting operation at the vertex $v_1$ which adjoins the new vertex $v_0$. Suppose that $(G,\psi)$ is not $(2,2,0)$-gain-tight. Since $f(G)=0$ it follows that there exists a vertex-induced subgraph $G_1$ of $(G,\psi)$ such that $f(G_1)<0$, or, $(G_1,\psi|_{G_1})$ is balanced and $f(G_1)\in \{0,1\}$. Consider the subgraph $H_1$ of $H$ corresponding to $G_1$ obtained on contracting $G$ to $H$. Note that if $G_1$ contains $v_0$ and $v_1$, then $f(H_1)=f(G_1)-1$. Otherwise, $f(H_1)=f(G_1)$. Hence $H_1$ violates $(2,2,0)$-gain-sparsity. \end{proof} \subsection{Reducing low-degree vertices via reverse Henneberg-type operations} Note that if a gain graph $G_0'$ is obtained from a $(2,2,0)$-gain-tight gain graph by reversing any of the above operations then $f(G_0')=0$. Thus $G_0'$ is $(2,2,0)$-gain-tight if and only if each subgraph of $G_0'$ satisfies the $(2,2,0)$-sparsity counts. A vertex $v$ in a $(2,2,0)$-gain-tight gain graph is \emph{admissible} if there is a reverse $H1$ operation, a reverse $H2$ operation or a reverse $H3$ operation removing $v$ which results in a $(2,2,0)$-gain-tight gain graph. Similarly a balanced subgraph isomorphic to $K_4$ or $K_3$ is \emph{admissible} if there is a $K_4$-contraction (i.e. a reverse vertex-to-$K_4$ operation) or edge contraction (i.e. a reverse vertex splitting operation) which results in a (2,2,0)-gain-tight gain graph. Our first lemma is trivial and deals with all H1 moves. \begin{lemma}\label{lem:deg2} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $v\in V_0$ has degree 2 or is incident to a loop and has degree 3. Then $v$ is admissible. \end{lemma} We now work through the H2 moves in turn. \begin{lemma}\label{lem:3threei} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $v\in V_0$ has degree 3 with exactly three neighbours $a,b,c$. Then $v$ is admissible if and only if it is not contained in a balanced subgraph isomorphic to $K_4$. \end{lemma} \begin{proof} Suppose $v$ is admissible. Then there exists a $(2,2,0)$-gain-tight gain graph $(G_0',\psi')$ which is the result of a reverse H2a operation at $v$. If $v$ is contained in a balanced $K_4$ subgraph then the deleted edge in $(G_0',\psi')$ must be one of two parallel edges with equal gain, contradicting the simplicity of the covering graph for $(G_0',\psi')$. For the converse, suppose $v$ is not contained in a balanced subgraph isomorphic to $K_4$. Then there exists a gain graph $(G_0',\psi')$ which is the result of a reverse H2a operation at $v$. Let $(av,\alpha)$, $(bv,\beta)$ and $(cv,\gamma)$ be in $E_0$. Suppose that there exists a subgraph $H_{ab}$ of $G_0-v$ which contains $a,b$ with $f(H_{ab})=0$. We claim that $v$ must be admissible. To see this first note that $c\notin V(H_{ab})$ since otherwise $f(H_{ab}\cup v)<0$, which contradicts $(2,0)$-sparsity. If the edges $(ac,\alpha\gamma),(bc,\beta\gamma)$ are in $G_0$ then the union of $H_{ab}$ with $v,c$ and the edges $ac,bc,va,vb,vc$ violates $(2,0)$-sparsity. If $(ac,\alpha\gamma)\notin E(G_0)$ then there exists a subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ such that $f(H_{ac})\leq 2$. In this case, $f(H_{ab}\cup H_{ac}\cup v)<0$, which is a contradiction. A similar argument holds for the pairs $a,c$ and $b,c$. Thus we may assume for each pair of vertices $s,t\in \{a,b,c\}$ that there is no subgraph $H_{st}$ of $G_0-v$ which contains $s,t$ and satisfies $f(H_{st})=0$. Now assume, without loss of generality, that $(ab,\alpha\beta) \notin E_0$. Suppose there does not exist a balanced subgraph $H_{ab}$ of $G_0-v$ which contains $a,b$ with $f(H_{ab})=2$ and all paths from $a$ to $b$ having gain $\alpha\beta$. Then $v$ is admissible since adding the edge $(ab,\alpha\beta)$ will not violate $(2,2,0)$-gain-sparsity. Suppose $G_0-v$ does contain a balanced subgraph $H_{ab}$ which contains $a,b$ with $f(H_{ab})=2$ and all paths from $a$ to $b$ having gain $\alpha\beta$. We may assume by gain switching (Lemma \ref{switch}) that all edges of $H_{ab}$ have gain 1. In this case, all paths from $a$ to $b$ have gain $1$. If $\alpha\not=\beta$ then we claim that $v$ is admissible. To see this note that if there exists a balanced subgraph $H_{ab}'$ which contains $a,b$ with $f(H_{ab}')=2$ and all paths from $a$ to $b$ having gain $-1$ then $H_{ab}\cap H_{ab}'$ is not connected. Thus, by Lemma \ref{lem:unionint}, $f(H_{ab}\cup H_{ab}')=0$, contradicting our assumption above. Thus $v$ is admissible since we may add the edge $(ab,-1)$. We may now assume $\alpha=\beta$. We may further assume, by gain switching at $v$, that $\alpha=\beta=1$. If $H_{ab}$ contained $c$ then $f(H_{ab}\cup v)=1$. If $vc$ has gain $1$ then we contradict $(2,2,0)$-gain-sparsity and so $\gamma=-1$. If $(ac,-1)$ and $(bc,-1)$ are both in $(G_0,\psi)$ then the induced subgraph on $V(H_{ab})\cup \{v\}$ violates $(2,0)$-sparsity. Without loss of generality, suppose $(ac,-1)$ is not in $(G_0,\psi)$. Then $v$ is admissible unless there exists a balanced subgraph $H_{ac}$ of $G_0-v$ which contains $a,c$ with $f(H_{ac})=2$ and all paths from $a$ to $c$ having gain $-1$. Suppose $G_0-v$ does contain a balanced subgraph $H_{ac}$ which contains $a,c$ with $f(H_{ac})=2$ and all paths from $a$ to $c$ having gain $-1$. Note that $f(H_{ab}\cup H_{ac})\geq 1$ (for otherwise adding $v$ and its three edges would contradict $(2,2,0)$-gain sparsity). Thus, by Lemma \ref{lem:unionint}, $H_{ab}\cup H_{ac}$ is balanced. By Lemma \ref{lem:23con}, $H_{ab}$ and $H_{ac}$ are connected and so it follows that $H_{ab}\cup H_{ac}$ contains an unbalanced cycle. This is a contradiction and so $v$ is admissible since adding the edge $(ac,-1)$ will not violate $(2,2,0)$-gain-sparsity. Now suppose $H_{ab}$ does not contain $c$. In this case, by gain switching at the vertex $c$ (Lemma \ref{switch}) we can assume $\gamma=1$. If $(ac,1)$ and $(bc,1)$ are both in $G_0$ then the union of $H_{ab}$ with vertices $v,c$ and the five edges $(ac,1),(bc,1),(va,1),(vb,1),(vc,1)$ is balanced and violates $(2,2)$-sparsity. This is a contradiction and so, without loss of generality, we may assume $(ac,1)\notin G_0$. Then $v$ is admissible unless there exists a balanced subgraph $H_{ac}$ of $G_0-v$ which contains $a,c$ with $f(H_{ac})=2$ and all paths from $a$ to $c$ having gain $1$. Suppose there exists a balanced subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$, with all paths in $H_{ac}$ from $a$ to $c$ having gain $1$. By the previous argument we may assume $b$ is not in $H_{ac}$ since otherwise $v$ is admissible. Since $f(H_{ab}\cup H_{ac})\geq 1$ (for otherwise adding $v$ and its three edges would contradict $(2,2,0)$-gain sparsity), Lemma \ref{lem:unionint} may be applied, that is $H_{ab}\cup H_{ac}$ is balanced. By gain switching, we may assume the edges of $H_{ab}\cup H_{ac}$ all have gain $1$. Let $\alpha',\beta',\gamma'$ be the resulting gains on the edges $va,vb,vc$ respectively. If $\alpha'\not=\beta'$ then, by the above argument, $v$ is admissible and we may add the edge $(ab,-1)$. Similarly, $v$ is admissible if $\alpha'\not=\gamma'$. So now suppose $\alpha'=\beta'=\gamma'$. Then $H_{ab}\cup H_{ac}\cup v$ is balanced with $f(H_{ab}\cup H_{ac}\cup v)=1$. This contradicts $(2,2,0)$-sparsity. \end{proof} \begin{lemma}\label{lem:3threeii} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $v\in V_0$ has degree 3 with exactly two neighbours $a,b$. Then $v$ is admissible if and only if it is not contained in a subgraph isomorphic to $R$ (recall Fig.~\ref{fig:gain_cov_graphs}(c)). \end{lemma} \begin{proof} If $v$ is contained in a subgraph isomorphic to $R$, then $v$ is clearly not admissible. For the converse, suppose that $v$ is not in a subgraph isomorphic to $R$. Then there exists a gain graph $(G_0',\psi')$ which is the result of either a reverse H2b operation at $v$ or a reverse H2c operation at $v$. Let $(av,1), (av,-1)$ and $(bv,\alpha)$ be in $E_0$. We first consider a reduction move at $v$ which adds an edge between $a$ and $b$. Observe that any subgraph $H$ of $G_0-v$ containing $a$ and $b$ has $f(H)>0$ (otherwise $f(H\cup v)<0$ would hold) so we need only consider balanced subgraphs. Suppose there is no edge $ab$. If there is no admissible reverse H2b move then there exist distinct balanced subgraphs $H_1, H_2$ of $G_0-v$ such that $a,b\in V(H_i)$, $f(H_i)=2$ for $i=1,2$ and all paths in $H_i$ from $a$ to $b$ have gain $(-1)^i$. Since $f(H_1\cap H_2)\geq 2$ either $H_1\cap H_2$ is not connected and Lemma \ref{lem:unionint} implies that $f(H_1\cap H_2)=0$ and adding $v$ violates $(2,0)$-sparsity or $H_1\cap H_2$ is connected. Then Lemma \ref{lem:unionint} implies that $H_1\cup H_2$ is balanced. Hence all paths from $a$ to $b$ in $H_1\cap H_2$ have two distinct gains, a contradiction. Thus $v$ is admissible. Secondly, suppose there is exactly one edge $(ab,\beta)$ in $E_0$. If there is no admissible reverse H2b move, then there exists a balanced subgraph $H_{ab}$ of $(G_0,\psi)$ containing $a,b$ but not $v$ with $f(H_{ab})=2$ such that all paths in $H_{ab}$ from $a$ to $b$ have gain $-\beta$. Note that $a$ does not have a loop (otherwise $(2,0)$-sparsity would be violated). Also, $a$ is not contained in a subgraph $H$ with $f(H)=0$ (otherwise adjoining the edge $(ab,\beta)$ to $H\cup H_{ab}$ will violate $(2,0)$-sparsity). Thus a reverse H2c move can be applied which preserves $(2,2,0)$-gain-sparsity. Thus $v$ is again admissible. Finally, if both $(ab,1)$ and $(ab,-1)$ are in $E_0$ then the reverse H2c move adding the loop $(aa,-1)$ is non-admissible if and only if there is a subgraph $H$ of $G-v$ containing $a$ which has $f(H)=0$. Note that $H$ does not contain $b$ and so $f(H\cup \{v,b\})=f(H)-1$, giving a contradiction. \end{proof} \begin{lemma}\label{lem:4one} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $v\in V_0$ has degree 4 with exactly one loop at $v$ and one neighbour $a$. Then $v$ is admissible if and only if $v$ is not contained in a subgraph isomorphic to $2K_2^1$. \end{lemma} \begin{proof} If $v$ is not contained in a subgraph isomorphic to $2K_2^1$ then it is easy to check that $v$ is admissible for a reverse H2e move adding a loop on $a$. Conversely, if $v$ is contained in a subgraph isomorphic to $2K_2^1$ then $G_0$ contains a loop at $a$ and so $v$ is clearly not admissible. \end{proof} We now move on to H3 moves. First consider the reverse H3d move. \begin{lemma}\label{lem:4twob} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph which is $4$-regular. Suppose $v\in V_0$ has no loop and exactly two neighbours $a,b$ with a double edge to each. Then $v$ is admissible if and only if $G_0$ does not contain a loop at $a$ and does not contain a loop at $b$. \end{lemma} \begin{proof} Clearly, if $G_0$ contains a loop at $a$ or $b$ then a reverse H3d move cannot be applied and so $v$ is not admissible. For the converse, suppose $G_0$ does not contain any loops at $a$ and $b$. If adding loops on $a$ and $b$ violates $(2,2,0)$-gain-sparsity then either there exists a subgraph $H_0$ of $G_0-v$ containing $a$ and $b$ with $f(H_0)= 1$, or there exists a subgraph $H_0$ of $G_0-v$ containing $a$ (or $b$) with $f(H_0)= 0$. In both cases we may use 4-regularity to get a contradiction. If $f(H_0)=0$ then $a$ must have degree 2 in $H_0$. Note that $H_0$ has average degree 4, giving a vertex $c\in H_0$ with degree greater than $4$ in $H_0$, and hence in $G_0$. This is a contradiction. If $H_0$ contains $a$ and $b$ and $f(H_0)= 1$, then $a$ and $b$ both have degree $2$ in $H_0$. All other vertices in $H_0$ have degree at most $4$. In this case, since $|E(H_0)|=2|V(H_0)|-1$, we obtain the contradiction, \[\sum_{v\in V(H_0)}\deg_{H_0}(v) \leq 4(|V(H_0)|-2)+2+2 < 4|V(H_0)|-2=2|E(H_0)|.\] \end{proof} \begin{lemma}\label{lem:4threei} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph which is connected and $4$-regular. Suppose $v\in V_0$ has exactly three neighbours $a,b,c$ and no loop. Suppose no neighbour of $v$ is admissible, then $v$ is admissible if and only if $v$ is not contained in a subgraph isomorphic to $K_4^+$. \end{lemma} \begin{proof} If $v$ is contained in a subgraph isomorphic to $K_4^+$, then $v$ is clearly not admissible. For the converse, suppose $v$ is not contained in a subgraph isomorphic to $K_4^+$. Let $(av,1)$, $(av,-1)$, $(bv,\beta)$, $(cv,\gamma)$ be the edges incident to $v$. By Lemma \ref{lem:4regno0}, $(G_0,\psi)$ does not contain any proper subgraph $H$ with $f(H)=0$. Note also that no subgraph $H$ of $G_0-v$ containing $N(v)=\{a,b,c\}$ can have $f(H)=1$. We may suppose there is no loop on $a$ (otherwise we can use Lemma \ref{lem:4one} to see that $a$ is admissible, which is a contradiction). Moreover, we may assume that one of the edges $(ac,1)$ and $(ac,-1)$ is not in $G_0$ (otherwise Lemma \ref{lem:4twob} would imply that $a$ is admissible). Similarly, we may assume that one of the edges $(ab,1)$ and $(ab,-1)$ is not in $G_0$. First observe that there are three possible reduction moves: a reverse H3c move which adds a loop at $a$ and the edge $(bc,\beta\gamma)$, a reverse H3b move which adds the edges $(ab,\beta),(ac,-\gamma)$ and a reverse H3b move which adds the edges $(ab,-\beta),(ac,\gamma)$. The reverse H3c move is admissible unless:\\ (a) the edge $(bc,\beta\gamma)$ already exists in $G_0$; or \\ (b) there is a balanced subgraph $H_{bc}$ of $G_0-v$ containing $b,c$ with $f(H_{bc})=2$ in which all paths from $b$ to $c$ have gain $\beta\gamma$. The reverse H3b move which adds the edges $(ab,\beta),(ac,-\gamma)$ is admissible unless: \\ (c) one of the edges $(ab,\beta),(ac,-\gamma)$ already exists in $G_0$; or\\ (d) there is a balanced subgraph $H_{ab}$ of $G_0-v$ containing $a,b$ with $f(H_{ab})=2$ in which all paths from $a$ to $b$ have gain $\beta$, or, there is a balanced subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$ in which all paths from $a$ to $c$ have gain $-\gamma$. The reverse H3b move which adds the edges $(ab,-\beta),(ac,\gamma)$ is admissible unless: \\ (e) one of the edges $(ab,-\beta),(ac,\gamma)$ already exists in $G_0$; or\\ (f) there is a balanced subgraph $H_{ab}$ of $G_0-v$ containing $a,b$ with $f(H_{ab})=2$ in which all paths from $a$ to $b$ have gain $-\beta$, or, there is a balanced subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$ in which all paths from $a$ to $c$ have gain $\gamma$. Suppose $(a)$ holds. Note that if $(ab,\beta)$ and $(ac,\gamma)$ both exist or $(ab,-\beta)$ and $(ac,-\gamma)$ both exist then there is a $K_4^+$ containing $v$, which is a contradiction. Thus we may suppose that either $(ab,\beta)$ and $(ac,-\gamma)$ do not exist, or, $(ab,-\beta)$ and $(ac,\gamma)$ do not exist. Without loss of generality, we suppose that $(ab,\beta)$ and $(ac,-\gamma)$ do not exist. If $v$ is not admissible then there exists either a balanced subgraph $H_{ab}$ of $G_0-v$ containing $a,b$ with $f(H_{ab})=2$ and all paths from $a$ to $b$ have gain $\beta$ or a balanced subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$ and all paths from $a$ to $c$ having gain $-\gamma$. If both exist then $H=H_{ab}\cup H_{ac}$ is a proper subgraph of $G_0$ and hence, by Lemma \ref{lem:4regno0}, $f(H)\geq 1$. Thus, by Lemma \ref{lem:unionint}, $H$ is balanced and $f(H)=2$. Note that $(bc,\beta\gamma)\in E(H)$ (otherwise adjoining this edge to $H\cup v$ violates $(2,0)$-sparsity). By switching, we may assume without loss of generality that all gains on $H$ are $1$. In this case note that $\beta=\gamma$. Adjoining $v$ and the edges $(va,\beta),(vb,\beta),(vc,\beta)$ to $H$ results in a balanced subgraph which violates $(2,2)$-sparsity. This is a contradiction and so either $H_{ab}$ or $H_{ac}$ does not exist. Without loss of generality we assume $H_{ab}$ does not exist. If $H_{ac}$ does not exist then $v$ is admissible. So suppose $H_{ac}$ does exist. Suppose $(ab,-\beta)\in E(G_0)$. Then $H_{ac}$ contains the vertex $b$. (If not, then the vertex $a$ would have degree at most 1 in $H_{ac}$, a contradiction.) By switching, we may assume all gains in $H_{ac}$ are $1$. Moreover, $(bc,\beta\gamma)\in E(H_{ac})$ for otherwise $(2,0)$-sparsity is violated. Thus $\beta=\gamma$. Now adjoining $v$ together with the edges $(va,\beta),(vb,\beta),(vc,\beta)$ to $H_{ac}$ results in a balanced subgraph which violates $(2,2)$-sparsity. We conclude that $(ab,-\beta)\notin E(G_0)$. If $(ac,\gamma)\in E(G_0)$ then $(ac,\gamma)\notin E(H_{ac})$, and hence $a$ has degree at most $1$ in $H_{ac}$, a contradiction. Thus $(ac,\gamma)\notin E(G_0)$. If $v$ is not admissible then there exists either a balanced subgraph $H_{ab}'$ of $G_0-v$ containing $a,b$ with $f(H_{ab}')=2$ and all paths from $a$ to $b$ have gain $-\beta$ or a balanced subgraph $H_{ac}'$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$ and all paths from $a$ to $c$ having gain $\gamma$. If $H_{ab}'$ exists then $H=H_{ab}'\cup H_{ac}$ is a proper subgraph of $G_0$ and hence, by Lemma \ref{lem:4regno0}, $f(H)\geq 1$. Thus, by Lemma \ref{lem:unionint}, $H$ is balanced and $f(H)=2$. Note that the edge $(bc,\beta\gamma)$ is not in $H$, for otherwise we may assume, by switching, that all gains in $H$ are $1$, and hence $\beta=\gamma$. As above, this contradicts $(2,2)$-sparsity of $G$. Now, adjoining the edge $(bc,\beta\gamma)$ to $H$ results in a subgraph of $G_0-v$ with $f(H)=1$ which contains $\{a,b,c\}$. This is a contradiction. If $H_{ac}'$ exists then $H=H_{ac}\cup H_{ac}'$ is balanced. However, $H$ contains an unbalanced cycle obtained by concatenating a path from $a$ to $c$ in $H_{ac}$ and a path from $a$ to $c$ in $H_{ac}'$. This is again a contradiction. We conclude that $v$ is admissible since we may apply a reverse H3b move. Now suppose $(a)$ does not hold. Consider a reduction at $v$ adding a loop at $a$ and the edge $(bc,\beta\gamma)$. If this move is not admissible then there is a balanced subgraph $H_{bc}$ of $G_0-v$ containing $b,c$ with $f(H_{bc})=2$ in which all paths from $b$ to $c$ have gain $\beta\gamma$. By switching, we may assume without loss of generality that all gains of $H_{bc}$ equal 1. In this case $\beta=\gamma$ since all paths in $H_{bc}$ from $b$ to $c$ have gain $1$. We may assume that $H_{bc}$ does not contain $a$ (otherwise adjoining $v$ to $H_{bc}$ results in a balanced subgraph of $(G_0,\psi)$ which violates $(2,2)$-sparsity). Suppose $ab,ac\in E(G_0)$ with arbitrary gains. The subgraph $H$ obtained from $H_{bc}$ by adjoining the vertices $a,v$ together with the edges $(av,1),(av,-1)$ and all edges between $\{a,v\}$ and $H_{bc}$ has $f(H)=0$. Hence $H=G_0$. If $ab$ and $ac$ have the same gain then note that $H'=H-(va,-\beta)$ is balanced and satisfies $f(H')=1$. This is a contradiction. If $ab$ and $ac$ have different gains then, without loss of generality, we can say $(ab,1)$ and $(ac,-1)$ are in $G_0$. Since $H=G_0$ and all gains on $H_{bc}$ are $1$, there is no path in $G_0-a$ between $b$ and $c$ with gain $-1$. It follows that there is an admissible reduction at $a$ adding a loop at $v$ and the edge $(bc,-1)$. This is a contradiction since no neighbour of $v$ is admissible. Without loss of generality, we may now assume there is no edge between $a$ and $b$ in $G_0$. Consider the reduction at $v$ adding $(ab,1)$ and $(ac,-1)$. Suppose there is a balanced subgraph $H_{ab}$ of $G_0-v$ containing $a,b$ with $f(H_{ab})=2$. Note that $c\notin V(H_{ab})$ since otherwise adjoining $v$ to $H_{ab}$ results in a balanced subgraph which violates $(2,2)$-sparsity. The subgraph $H$ obtained from the union of $H_{ab}$ with $H_{bc}$ and the edges $(va,\beta),(vb,\beta),(vc,\beta)$ is balanced and violates $(2,2)$-sparsity. This is a contradiction and so $H_{ab}$ does not exist. Similarly, there is no balanced subgraph $H_{ac}$ of $G_0-v$ containing $a,c$ with $f(H_{ac})=2$. Hence if the reduction at $v$ adding $(ab,1)$ and $(ac,-1)$ is not admissible then $(ac,-1)\in E(G_0)$. By a similar argument, if the reduction at $v$ adding $(ab,-1)$ and $(ac,1)$ is not admissible then $(ac,1)\in E(G_0)$. This is a contradiction since $G_0$ does not contain both $(ac,1)$ and $(ac,-1)$, for otherwise $a$ would be admissible. \end{proof} \begin{lemma}\label{lem:admblocks} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $v\in V_0$ has degree 4 with exactly four neighbours $a,b,c,d$. Let $(va,\alpha),(vb,\beta),(vc,\gamma)$ and $(vd,\delta)$ be the edges incident to $v$. Then a reduction at $v$ adding $(ab,\alpha\beta),(cd,\gamma\delta)$ is non-admissible if and only if one of the following conditions holds: \begin{enumerate}[(i)] \item there is a subgraph $H_{ab}$ of $G_0$ containing $a,b$ but not $v$ with $f(H_{ab})=0$ or there is a subgraph $H_{cd}$ of $G_0$ containing $c,d$ but not $v$ with $f(H_{cd})=0$; \item there is a balanced subgraph $H_{ab}$ of $(G_0,\psi)$ containing $a,b$ but not $v$ with $f(H_{ab})=2$ and every path from $a$ to $b$ in $H_{ab}$ has gain $\alpha\beta$ or there is a balanced subgraph $H_{cd}$ of $(G_0,\psi)$ containing $c,d$ but not $v$ with $f(H_{cd})=2$ and every path from $c$ to $d$ in $H_{cd}$ has gain $\gamma\delta$; \item there is a balanced subgraph $H$ of $(G_0,\psi)$ containing $N(v)$ but not $v$ with $f(H)=3$ where every path from $a$ to $b$ in $H$ has gain $\alpha\beta$ and every path from $c$ to $d$ in $H$ has gain $\gamma\delta$; \item one of the edges $(ab,\alpha\beta),(cd,\gamma\delta)$ already exists in $(G_0,\psi)$. \end{enumerate} \end{lemma} \begin{proof} If any one of these conditions holds then it is clear that $v$ is not admissible. Conversely, suppose that the result of a reduction at $v$ adding $(ab,\alpha\beta),(cd,\gamma\delta)$ is the gain graph $(G_0',\psi')$. If the reduction is non-admissible then $(G_0',\psi')$ is not $(2,2,0)$-gain-tight. It follows that either the covering graph of $(G_0',\psi')$ is not simple, there is a subgraph which violates $(2,0)$-sparsity or there is a subgraph which violates balanced $(2,2)$-sparsity. In the first case $(iv)$ holds. In the second case, suppose $H'$ is a subgraph of $(G_0',\psi')$ which violates $(2,0)$-sparsity. Either $H'$ received one edge in the reduction move and $(i)$ holds or $H'$ received two edges and there is a subgraph $H$ of $(G_0,\psi)$ containing $N(v)$ but not $v$ with $f(H)\leq 1$. However $f(H\cup v)<0$, contradicting $(2,2,0)$-gain-sparsity. Hence it remains to consider the last case. There is a subgraph $H'$ of $(G_0',\psi')$ which violates balanced $(2,2)$-sparsity. Therefore $H'$ contains $(ab,\alpha\beta)$ or $(cd,\gamma\delta)$ or both. By symmetry we may suppose $(ab,\alpha\beta)\in H'$. If $H'$ does not contain $(cd,\gamma\delta)$ then this implies that there is a balanced subgraph $H$ of $(G_0,\psi)$ containing $a,b$ but not $v$ with $f(H)=2$ and every path from $a$ to $b$ in $H$ has gain $\alpha\beta$, giving $(ii)$. Similarly if $H'$ contains $(ab,\alpha\beta)$ and $(cd,\gamma\delta)$ then there is a balanced subgraph $H$ of $(G_0,\psi)$ containing $N(v)$ but not $v$ with $f(H)=3$ where every path from $a$ to $b$ in $H$ has gain $\alpha\beta$ and every path from $c$ to $d$ in $H$ has gain $\gamma\delta$, giving $(iii)$. \end{proof} \begin{lemma}\label{lem:4threeii} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph which is connected and $4$-regular. Suppose $v\in V_0$ has exactly four neighbours $a,b,c,d$. Then $v$ is admissible if and only if the following conditions hold, \begin{enumerate}[(i)] \item $v$ is not contained in a balanced subgraph isomorphic to $K_4$, and, \item $v$ is not contained in a balanced subgraph isomorphic $K_{1,1,3}$ with the property that $v$ has degree $4$ in this subgraph. \end{enumerate} \end{lemma} \begin{proof} If (i) or (ii) hold then $v$ is clearly not admissible. For the converse, let $(va,\alpha),(vb,\beta),(vc,\gamma)$ and $(vd,\delta)$ be the edges incident to $v$. We first show that if condition (ii) holds in Lemma \ref{lem:admblocks}, then $c$ and $d$ are not in $H_{ab}$. Suppose $N(v)\subset V(H_{ab})$. Since $H_{ab}$ is balanced, we may assume, by switching, that all gains on $H_{ab}$ are $1$. Since all paths from $a$ to $b$ in $H_{ab}$ have gain $\alpha\beta$, it follows that $\alpha=\beta$. If at least 3 edges incident to $v$ all have gain 1 or all have gain $-1$, then we contradict $(2,2)$-sparsity. Thus, without loss of generality, we may assume that $(va,1),(vb,1),(vc,-1),(vd,-1) \in E(G_0)$. Since $G_0$ is 4-regular, Lemma \ref{lem:4regno0} implies that $H_{ab}$ together with the edges incident to $v$ is all of $G_0$. In particular $H_{ab}$ was an induced subgraph of $G_0$. Thus it is easy to see that the reduction move at $v$ adding $(ad,-1),(bc,-1)$ is admissible. So without loss of generality, we may suppose that $d\notin V(H_{ab})$. We claim that $c\notin V(H_{ab})$. Suppose to the contrary that $c\in V(H_{ab})$. By the same argument as above, we may assume that $(va,1),(vb,1),(vc,-1) \in E(G_0)$. Notice that if we add the edges $(va,1),(vb,1),(vc,-1)$ to $H_{ab}$, then we obtain a subgraph $H$ with $f(H)=1$. Thus, $H_{ab}$ is an induced subgraph of $G$, for otherwise the fact that $d\notin V(H_{ab})$ would give a contradiction, by Lemma \ref{lem:4regno0}. Consider the reduction move at $v$ adding $(bc,-1)$ and $(ad,\delta)$. If $v$ is not admissible then either the edge $(ad,\delta)$ is in $G_0$, or there is a balanced subgraph $H_{ad}$ of $G_0-v$ containing $a,d$ with $f(H_{ad})=2$ in which all paths from $a$ to $d$ have gain $\delta$. Note first that if there is such a graph $H_{ad}$ then $H=H_{ab}\cup H_{ad}$ is balanced with $f(H)=2$ and $N(v)\subset V(H)$. So we can repeat the argument used to show that $d\notin V(H_{ab})$ to obtain a contradiction. So suppose $(ad,\delta)$ is in $G_0$. By switching at the vertex $d$, we may assume that $\delta=1$. We claim that the reduction move at $v$ adding $(ac,-1),(bd,1)$ is now admissible. If $(bd,1)$ is present in $G_0$, then $H_{ab}$ together with the 5 edges $(va,1),(vb,1),(vd,1),(ad,1),(bd,1)$ violates $(2,2)$-sparsity. So suppose there is a balanced subgraph $H_{bd}$ of $G_0-v$ containing $b,d$ with $f(H_{bd})=2$ in which all paths from $b$ to $d$ have gain $1$. But then $H=H_{ab}\cup H_{bd}$ is balanced with $f(H)=2$ and $N(v)\subset V(H)$, and hence the same argument from above may be applied once again to obtain a contradiction. Thus, as claimed, $c\notin V(H_{ab})$. Now, suppose that conditions (i) and (ii) in the statement of this lemma do not hold. Then condition (iv) in Lemma \ref{lem:admblocks} cannot hold for all possible pairs of edges, so we may assume that the edges $(ab,\alpha\beta),(cd,\gamma\delta)$ do not exist in $(G_0,\psi)$. Since $G_0$ is $4$-regular, Lemma \ref{lem:4regno0} implies that condition (i) in Lemma \ref{lem:admblocks} does not hold. Suppose $H$ is a balanced subgraph of $(G_0,\psi)$ that satisfies condition (iii) in Lemma \ref{lem:admblocks}. By switching, we may assume that all gains on $H$ are $1$. By the assumptions in condition (iii) it follows that $\alpha\beta=\gamma\delta=1$, contradicting $(2,2)$-sparsity of $G_0$ if $\alpha=\beta=\gamma=\delta$. So suppose without loss of generality that $\alpha=\beta=1$ and $\gamma=\delta=-1$. Note that at most one of the edges $(ac,-1), (ad,-1), (bc,-1), (bd,-1)$ can be present in $G_0$, for otherwise the graph obtained from $H$ by adding two of those edges together with the four edges incident to $v$ violates $(2,0)$-sparsity. Hence $(ad,-1), (bc,-1)\notin E(G_0)$ or $(ac,-1), (bd,-1)\notin E(G_0)$. Without loss of generality we assume that $(ad,-1), (bc,-1)\notin E(G_0)$ and consider the reduction operation on $v$ that adds $(ad,-1)$ and $(bc,-1)$. Suppose there exists a balanced subgraph $H'$ of $(G_0,\psi)$ that satisfies condition (iii) in Lemma \ref{lem:admblocks} for the pair $(ad,-1)$, $(bc,-1)$, that is, all paths from $a$ to $d$ and all paths from $b$ to $c$ in $H'$ have gain $-1$. Then $H\cap H'$ is disconnected (since there cannot be any path from $a$ to $d$ or from $b$ to $c$ in $H\cap H'$). It follows that $f(H\cap H')\geq 2+2= 4$ and hence $f(H\cup H')\leq 3+3-4=2$. Thus, $f(H\cup H')= 2$, for otherwise the graph obtained from $H\cup H'$ by adding the four edges incident to $v$ would violate $(2,0)$-sparsity. This says that $H\cap H'$ has exactly two components $C_1$ and $C_2$, with either $a,b\in V(C_1)$ and $c,d\in V(C_2)$ or $a,c\in V(C_1)$ and $b,d\in V(C_2)$. Suppose first that $a,b\in V(C_1)$ and $c,d\in V(C_2)$. Then every path in $H'$ from $a$ to $b$ and from $c$ to $d$ has gain $1$. Since every path from $a$ to $d$ and from $b$ to $c$ has gain $-1$ in $H'$, and $H'$ is balanced, it follows that every path from $a$ to $c$ and from $b$ to $d$ must have gain $-1$. Therefore, $H'$ together with the four edges incident to $v$ is balanced and violates $(2,2)$-sparsity. Suppose next that $a,c\in V(C_1)$ and $b,d\in V(C_2)$. Then every path in $H'$ from $a$ to $c$ and from $b$ to $d$ has gain $1$. This implies that $(ac,-1)$ and $(bd,-1)$ cannot exist in $G_0$. (If one of those edges did exist in $G_0$, then it cannot be an edge of $H\cup H'$, and hence $H\cup H'$ together with this edge and the four edges incident to $v$ would violate $(2,0)$-sparsity.) We now consider the reduction operation on $v$ that adds $(ac,-1)$ and $(bd,-1)$. Suppose there exists a balanced subgraph $H''$ of $(G_0,\psi)$ that satisfies condition (iii) in Lemma \ref{lem:admblocks} for the pair $(ac,-1)$, $(bd,-1)$, that is, all paths from $a$ to $c$ and all paths from $b$ to $d$ in $H''$ have gain $-1$. Note that $(H\cup H')\cap H''$ is disconnected since there cannot be any path from $a$ to $c$ or from $b$ to $d$ in $(H\cup H')\cap H''$. Therefore, $f((H\cup H')\cap H'')\geq 2+2=4$ and hence $f((H\cup H')\cup H'')\leq 2+3-4=1$. So the subgraph obtained from $(H\cup H')\cup H''$ by adding the four edges incident to $v$ violates $(2,0)$-sparsity. So if the reduction operation on $v$ that adds $(ac,-1)$ and $(bd,-1)$ is not admissible, then condition (ii) in Lemma \ref{lem:admblocks} holds for $(ac,-1)$, $(bd,-1)$. As we have shown in the beginning of this proof, we may assume that there exists a balanced subgraph $H_{ac}$ of $(G_0,\psi)$ containing $a,c$ but not $b,d,v$ with $f(H_{ac})=2$ and every path from $a$ to $c$ in $H_{ac}$ has gain $-1$. Then $H\cap H_{ac}$ is disconnected (since there cannot be a path from $a$ to $c$ in $H\cap H_{ac}$) and hence $f(H\cup H_{ac})\leq 3+2-4=1$. It follows that $H\cup H_{ac}$ together with the four edges incident to $v$ violates the $(2,0)$-sparsity of $G_0$. Therefore, if $v$ is not admissible, then condition (ii) in Lemma \ref{lem:admblocks} holds for $(ad,-1)$, $(bc,-1)$. As we have shown in the beginning of this proof, we may assume that there exists a balanced subgraph $H_{bc}$ of $(G_0,\psi)$ containing $b,c$ but not $a,d,v$ with $f(H_{bc})=2$ and every path from $b$ to $c$ in $H_{bc}$ has gain $-1$. But then, by the same argument as in the paragraph above, we have $f(H\cap H_{bc})\leq 3+2-4=1$, which contradicts the $(2,0)$-sparsity of $G_0$. So if $v$ is not admissible, then condition (ii) in Lemma \ref{lem:admblocks} holds for $(ab,\alpha\beta),(cd,\gamma\delta)$. By using the argument in the beginning of this proof again, we may assume that there exists a balanced subgraph $H_{ab}$ of $(G_0,\psi)$ containing $a,b$ but not $c,d,v$ with $f(H_{ab})=2$ and every path from $a$ to $b$ in $H_{ab}$ has gain $\alpha\beta$. Consider the reduction operation on $v$ that adds $(ad,\alpha\delta)$ and $(bc,\beta\gamma)$. If this move is not admissible then one of the conditions (ii), (iii) or (iv) in Lemma \ref{lem:admblocks} holds for $(ad,\alpha\delta),(bc,\beta\gamma)$. Suppose first that (iv) fails, that is, $(ad,\alpha\delta)$ and $(bc,\beta\gamma)$ are not edges of $(G_0,\psi)$. Suppose there exists a balanced subgraph $H$ of $(G_0,\psi)$ that satisfies condition (iii) for the pair $(ad,\alpha\delta),(bc,\beta\gamma)$, that is, all paths from $a$ to $d$ in $H$ have gain $\alpha\delta$ and all paths from $b$ to $c$ in $H$ have gain $\beta\gamma$. If $H\cap H_{ab}$ is connected, then every path from $a$ to $b$ in $H$ has gain $\alpha\beta$. But since $H$ is balanced, this implies that the subgraph $H'$ of $G_0$ consisting of $H$ and the four edges incident to $v$ is balanced and satisfies $f(H')=1$, contradicting $(2,2)$-sparsity. Thus $H\cap H_{ab}$ is disconnected, and hence $f(H\cap H_{ab})\leq 3+2-4=1$. But since $H\cap H_{ab}$ contains all four neighbours of $v$, this contradicts $(2,0)$-sparsity. So we may assume that condition (ii) in Lemma \ref{lem:admblocks} holds for $(ab,\alpha\beta),(cd,\gamma\delta)$. Without loss of generality we may assume that there exists a balanced subgraph $H_{ad}$ of $(G_0,\psi)$ containing $a,d$ but not $b,c,v$ with $f(H_{ad})=2$ and every path from $a$ to $d$ in $H_{ad}$ has gain $\alpha\delta$. If $H_{ad}\cap H_{ab}$ is connected, then $H_{ad}\cup H_{ab}$ is balanced with $f(H_{ad}\cup H_{ab})=2$, and the subgraph $H'$ of $(G_0,\psi)$ consisting of $H_{ad}\cup H_{ab}$ and the three edges joining $v$ with $a,b$ and $d$ is also balanced with $f(H')=1$, contradicting $(2,2)$-sparsity. Thus $H_{ad}\cap H_{ab}$ is disconnected, and hence $f(H_{ad}\cup H_{ab})\leq 2+2-4=0$. But since $H_{ad}\cup H_{ab}$ contains three neighbours of $v$, this contradicts $(2,0)$-sparsity. So without loss of generality we may assume that $(bc,\beta\gamma)$ is an edge of $(G_0,\psi)$. Then the edge $(bd,\beta\delta)$ cannot exist in $G_0$ (for otherwise $b$ would have degree at most 1 in $H_{ab}$ by $4$-regularity of $G_0$, a contradiction). The edge $(ac,\alpha\gamma)$ can also not exist in $G_0$, for otherwise the graph consisting of $H_{ab}$ and the edges $(va,\alpha), (vb,\beta), (vc,\gamma), (ac,\alpha\gamma), (bc,\beta\gamma)$ would be balanced and would violate $(2,2)$-sparsity. So consider the reduction operation on $v$ that adds $(ac,\alpha\gamma)$ and $(bd,\beta\delta)$. If there exists a balanced subgraph $H$ of $(G_0,\psi)$ that satisfies condition (iii) for the pair $(ac,\alpha\gamma),(bd,\beta\delta)$, then, by the same argument as in the paragraph above, $H\cap H_{ab}$ is disconnected, and hence $f(H\cap H_{ab})\leq 3+2-4=1$. But since $H\cap H_{ab}$ contains all four neighbours of $v$, this contradicts $(2,0)$-sparsity. So we may assume that condition (ii) in Lemma \ref{lem:admblocks} holds for $(ac,\alpha\gamma),(bd,\beta\delta)$. Without loss of generality we may assume that there exists a balanced subgraph $H_{ac}$ of $(G_0,\psi)$ containing $a,c$ but not $b,d,v$ with $f(H_{ac})=2$ and every path from $a$ to $c$ in $H_{ac}$ has gain $\alpha\gamma$. As in the paragraph above, we see that $H_{ac}\cap H_{ab}$ is disconnected, and hence $f(H_{ac}\cup H_{ab})\leq 2+2-4=0$. But since $H_{ac}\cup H_{ab}$ contains three neighbours of $v$, this contradicts $(2,0)$-sparsity. \end{proof} \subsection{Graph contractions} We now consider the existence of suitable triangles or $K_4$'s in order to apply the reverse vertex splitting move or the reverse vertex-to-$K_4$ move. After giving conditions on when they can be applied we will also prove a couple of technical lemmas needed in the next section. \begin{lemma}\label{lem:k4contract} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $(G_0,\psi)$ contains a balanced subgraph $K$ isomorphic to $K_4$ which induces at most one additional edge. Then a reverse vertex-to-$K_4$ move at $K$ is admissible unless there is a vertex $x$ and edges $(xa,\alpha), (xb,\alpha)$ for some $a,b\in V(K)$. \end{lemma} \begin{proof} Let $K'$ denote the contraction of the graph $K^*$ induced by $K$. (So $K'$ is either a single vertex or a single vertex with a loop). Then $f(K^*)=f(K')$ and hence the lemma follows from a simple counting argument. \end{proof} \begin{lemma}\label{lem:k3contract} Let $(G_0,\psi)$ be a $(2,2,0)$-gain-tight gain graph. Suppose $(G_0,\psi)$ contains a subgraph $K$ isomorphic to $K_3$ with $V(K)=\{a,b,c\}$ and with all three edges of $K$ having gain $1$. Suppose the edge $(ab,-1)$ does not exist in $G_0$. Then a reverse vertex-splitting at $K$ contracting the edge $(ab,1)$ is non-admissible if and only if one of the following conditions holds: \begin{enumerate} \item[(i)] there is a subgraph $H_0$ of $G_0$ containing $a,b$ and the edge $(ab,1)$, but not $c$, with $f(H_0)=0$; \item[(ii)] there is a balanced copy of $K_3$ containing $a,b$ and some vertex $d\neq c$; \item[(iii)] there is a balanced subgraph $H_0$ of $G_0$ containing $a,b$ and the edge $(ab,1)$ with $f(H_0)=2$, and if $H_0$ contains $c$ then it does not contain the edges $(ca,1)$ and $(cb,1)$; \item[(iv)] there are loops incident to both $a$ and $b$, or both edges $(ac,-1)$ and $(bc,-1)$ exist. \end{enumerate} \end{lemma} \begin{proof} If any one of these conditions holds then it is clear that $v$ is not admissible. Conversely, suppose the reverse vertex-splitting at $K$ contracting the edge $(ab,1)$ is non-admissible. Let $(G_0',\psi')$ be the gain graph resulting from this reverse vertex-splitting move and let $\overline a$ be the vertex of $(G_0',\psi')$ corresponding to the vertex pair $a$ and $b$ in $(G_0,\psi)$. Then either the covering graph of $(G_0',\psi')$ is not simple, or there is a subgraph $H_0'$ of $(G_0',\psi')$ with $f(H_0')<0$, or there is a balanced subgraph of $(G_0',\psi')$ with $f(H_0')<2$. In the first case (ii) or (iv) holds. In the second case, $H_0'$ clearly contains $\overline{a}$, but it cannot contain $c$, for otherwise $f(H_0)=f(H_0')<0$ if $(c\overline{a},1)\in E(H_0')$ or $f(H_0\cup \{(ca,1)\})=f(H_0')<0$ if $(c\overline{a},1)\notin E(H_0')$, where $H_0$ is the subgraph of $(G_0,\psi)$ that is obtained from $H_0'$ by the vertex splitting move at $\overline{a}$. Thus, $H_0$ contains $a,b$ and the edge $(ab,1)$, but not $c$, and satisfies $f(H_0)=0$. In the third case, the balanced $H_0'$ again clearly contains $\overline{a}$. If it contains $c$ and $(c\overline{a},1)$ then $f(H_0)=f(H_0')<2$, a contradiction. So if $H_0'$ contains $c$ then it does not contain $(c\overline{a},1)$. Thus, $H_0$ contains $a,b$ and the edge $(ab,1)$, and if $H_0$ contains $c$ then it does not contain the edges $ca$ and $cb$. Moreover, $H_0$ is balanced with $f(H_0)=2$. \end{proof} We now follow the approach in \cite{NO14}. Define a \emph{triangle sequence} $T_1,T_2,\dots,T_n$ where $T_1$ is a triangle on vertices $a,b,c$ and $T_{i+1}$ is formed from $T_i$ by adding a vertex of degree 2 adjacent to two vertices $x,y$ of $T_i$ such that $xy\in E(T_i)$ and $x,y$ are in exactly one triangle in $T_i$. A triangle sequence is \emph{balanced} if each $T_i$ (or equivalently just $T_n$) is balanced. A \emph{maximal balanced triangle sequence} is a balanced triangle sequence that cannot be extended to a larger balanced triangle sequence. A \emph{chord} of $T_n$ is an edge in the subgraph $G_0[V(T_n)]$ of $G_0$ induced by $V(T_n)$ which is not in $T_n$. The following lemma is easy to deduce from the definitions. \begin{lemma}\label{lem:chord} Let $(G_0,\psi)$ be $(2,2,0)$-gain-tight gain graph and let $T_n$ be a balanced triangle sequence whose edges all have gain $1$. Then $f(T_n)=3$ and $T_n$ has at most 3 chords. Moreover, if three chords exist, at least two of them have gain $-1$. \end{lemma} In the next lemma we show that there exists an edge for which conditions (ii) and (iv) of Lemma \ref{lem:k3contract} do not hold, provided that the maximal balanced triangle sequence has enough vertices. \begin{lemma}\label{lem:bound} Let $(G_0,\psi)$ be $(2,2,0)$-gain-tight and let $T_n$ be a maximal balanced triangle sequence. Suppose $|V(T_n)|\geq 6$. Then there exists an edge of $T_n$ with the properties that it does not have a parallel edge, its end vertices are not both incident to a loop, and it is contained in exactly one balanced triangle in $(G_0,\psi)$. \end{lemma} \begin{proof} Since $T_n$ is balanced we may assume that the gain on every edge of $T_n$ is 1. Let $s_1,s_2,\dots, s_r$ be the edges of $T_n$ contained in exactly one triangle in $T_n$. We first show that the $s_i$ form a simple cycle spanning $V(T_n)$. This can be verified by induction. It clearly holds for $n=1$. Suppose it holds for all $m<n$ and consider $T_n$. Let $T_n$ be formed from $T_{n-1}$ by adding a triangle on $a,b,c$ such that $a,b\in V(T_{n-1})$ and $c\notin V(T_{n-1})$. Then by induction there is a simple spanning cycle $C$ in $T_{n-1}$ with $ab\in C$. We construct the simple spanning cycle for $T_n$ by removing the edge $ab$ from $C$ and adding the edges $ac,cb$ to $C$. By Lemma~\ref{lem:chord}, $T_n$ has at most $3$ chords, and at most one them has gain 1. Let $C$ be the simple cycle spanning $V(T_n)$ consisting of the edges $s_1,s_2,\ldots, s_r$. Since $V(C)$ has at least 6 vertices, $C$ has at least $6$ edges. We say that an edge of $C$ is \emph{blocked} if it has a parallel edge, or its endvertices are both incident to a loop, or it is contained in more than one balanced triangle in $(G_0,\psi)$. We claim that $C$ contains at least one edge that is not blocked. Note that a chord with gain $1$ can block at most three edges of $C$. A chord with gain $-1$ can block at most one edge of $C$, since it cannot create a balanced triangle on its own, but it could be parallel to an edge of $C$. Further, two non-loop chords with gain $-1$ only create a balanced triangle if they are of the form $(cd,-1)$ and $(ce,-1)$ for some $c,d,e\in V(T_n)$. In this case at most one edge of $C$ is contained in a triangle with these two chords. Thus, two non-loop chords with gain $-1$ can block at most two edges of $C$. Similarly, three non-loop chords with gain $-1$ can block at most three edges of $C$. Finally, two chords that are loops can block at most one edge of $C$, and three chords that are loops can block at most two edges of $C$. So if at least two of the three chords are loops, then there are at most 4 blocked edges in $C$. So suppose exactly one of the chords is a loop. Since at most one of the remaining two chords can have gain $1$, it follows that there are again at most 4 blocked edges in $C$. Finally, if none of the chords is a loop, then there are at most 5 blocked edges in $C$. Thus there exists an edge of $C$ that is not blocked, as claimed. \end{proof} \subsection{The inductive construction} We can now put together our results to prove the desired characterisation of $(2,2,0)$-gain-tight gain graphs. \begin{theorem}\label{thm:recurse} Let $(G_0,\psi)$ be a gain graph. Then $(G_0,\psi)$ is $(2,2,0)$-gain-tight if and only if $(G_0,\psi)$ can be generated from vertex disjoint copies of graphs in ${\mathcal{B}}$ by applying H1, H2, H3, vertex-to-$K_4$ and vertex splitting moves. \end{theorem} \begin{proof} The easy direction is given by Lemma \ref{lem:moves}. For the converse, observe first that if $(G_0,\psi)$ is disconnected then every connected component of $(G_0,\psi)$ is $(2,2,0)$-gain-tight. So we will prove that an arbitrary \emph{connected} $(2,2,0)$-gain-tight gain graph has an admissible reverse move which results in another (possibly disconnected) $(2,2,0)$-gain-tight gain graph with fewer vertices, or is one of the base graphs in ${\mathcal{B}}$. The theorem then follows by induction on $|V_0|$. So from now on we will assume that $(G_0,\psi)$ is connected. Observe that $(G_0,\psi)$ is either 4-regular or contains a vertex of degree $2$ or $3$. We consider the following cases.\\ \textbf{Case 1. $G_0$ contains a vertex with two incident edges or a degree 3 vertex with exactly two neighbours, which is not contained in a subgraph isomorphic to $R$.}\\ Lemmas \ref{lem:deg2} and \ref{lem:3threeii} show that there exists an admissible reverse move.\\ We can now assume that Case 1 does not hold. In the following, we let $\hat{K_4}$ be the $(2,2,0)$-gain-tight gain graph consisting of a balanced $K_4$ as well as one additional vertex $x$ and the four edges $(xa,1),(xa,-1), (xb,1), (xb,-1)$ where $a$ and $b$ are distinct vertices of the $K_4$.\\ \textbf{Case 2.a. $G_0$ contains a degree 3 vertex $v$ with exactly 3 neighbours and $v$ is not contained in a subgraph isomorphic to $K_4^+$ or $\hat{K_4}$.}\\ Lemma \ref{lem:3threei} implies $v$ is admissible or $v$ is contained in a balanced subgraph $K$ isomorphic to $K_4$. By Lemma \ref{switch} we may assume every edge of $K$ has gain $1$. Note that $K$ is an induced subgraph of $G_0$. If $K$ is not admissible to contract then Lemma \ref{lem:k4contract} implies there is a vertex $x$ and edges $(xa,\alpha), (xb,\alpha)$ for $a,b \in V(K)$. We may apply Lemma \ref{switch} again at $x$ to make $\alpha=1$. Now we have a balanced $K_3$ on $x,a,b$. We will denote a balanced $K_3$ on vertices $r,s,t$ by $K_3(r,s,t)$. Consider a maximal balanced triangle sequence $T_1=K_3(v,a,c), T_2=T_1\cup K_3(a,b,c), T_3=T_2\cup K_3(a,b,x), \dots, T_n$ (where $c$ is the final vertex of $K$). By Lemma \ref{switch} we may assume every edge of $T_n$ has gain $1$. By Lemma \ref{lem:k3contract} an edge $(rs,1)$ in a $K_3(r,s,t)$ in $T_n$, with $(rs,-1)$ not an edge of $G_0$, is non-admissible in $G_0$ for a reverse vertex-splitting move if and only if condition (i), (ii), (iii) or (iv) holds. We claim that there exists an edge in $T_n$ for which (ii) and (iv) does not hold. This follows from Lemma \ref{lem:bound} if $|V(T_n)|\geq 6$. If $|V(T_n)|=5$, then $T_n$ is uniquely determined, and since $K$ is an induced subgraph of $G_0$, and $v$ is not contained in a subgraph isomorphic to $\hat{K_4}$, the existence of such an edge in $T_n$ can easily be verified by inspection. So let $(rs,1)$ be an edge of $T_n$ for which (ii) and (iv) do not hold. Let $t$ be the third vertex of the unique balanced triangle containing $(rs,1)$. If there is a subgraph $H_0$ satisfying (i) then we contradict the $(2,0)$-sparsity of $G_0$ as follows. Since $t$ has two neighbours (namely $r$ and $s$) in $H_0$, clearly any other neighbour of $t$ in $T_n$ is not in $H_0$. Note that $T_n$ contains a balanced triangle of the form $K_3(r,t,w)$ or of the form $K_3(s,t,w')$ (or both). Suppose that $K_3(r,t,w)$ exists in $T_n$. Then we may repeat the above argument for $w$ and the subgraph $H_0'$ which is obtained from $H_0$ by adding $t$ and the edges $(tr,1)$ and $(ts,1)$ to see that any neighbour of $w$ in $T_n$ (other than $r$ and $t$) is not in $H_0$. By iterating this argument we conclude that none of the vertices of $V(T_n) \setminus \{r,s\}$ are in $H_0$. It now follows that $H_0\cup T_n \cup {(vb,1)}$ violates $(2,0)$-sparsity. Thus, (i) also does not hold for $(rs,1)$. Finally, we show that there is no balanced subgraph $H_0$ satisfying (iii) for the edge $(rs,1)$. Suppose to the contrary that there does exist such a subgraph $H_0$. If $t\notin V(H_0)$ then we may apply (a balanced version of) the argument above to show that none of the vertices of $V(T_n) \setminus \{r,s\}$ are in $H_0$. It now follows that $H_0\cup T_n \cup {(vb,1)}$ violates $(2,2)$-sparsity. So we may assume that $t\in V(H_0)$. Then, by condition (iii), the edges $(tr,1),(ts,1)$ are not in $H_0$. The maximal balanced triangle sequence $T_n$ contains a balanced triangle of the form $K_3(r,t,w)$ or of the form $K_3(s,t,w')$ (or both). As above, we assume that $K_3(r,t,w)$ exists. Suppose first that $w\in V(H_0)$. Then the edges $(wt,1)$ and $(wr,1)$ are also both in $H_0$. (If not, say $(wt,1)\notin E(H_0)$, then the graph obtained from $H_0$ by adding the edges $(tr,1), (ts,1), (wt,1)$ violates $(2,0)$-sparsity.) Since the edges $(wt,1)$ and $(wr,1)$ form a path of gain $1$ from $r$ to $t$ in $H_0$, and $H_0$ is balanced, every path from $r$ to $t$ in $H_0$ has gain $1$. Thus, if we add the edge $(tr,1)$ to $H_0$, then we obtain a balanced graph that violates the $(2,2)$-sparsity of $G_0$, a contradiction. So we may assume that $w\notin V(H_0)$. Let $H_0'$ be the graph obtained from $H_0$ by adding the edges $(tr,1)$ and $(ts,1)$. Then $f(H_0')=0$. Since $w$ has two neighbours (namely $r$ and $t$) in $H_0'$, clearly any other neighbour of $w$ in $T_n$ is not in $H_0'$. Using again the same iteration argument from above, we conclude that none of the vertices of $V(T_n) \setminus \{r,s,t\}$ are in $H_0'$. It now follows that $H_0'\cup T_n \cup {(vb,1)}$ violates $(2,0)$-sparsity. Thus, in Case 2a there exists an admissible reverse move.\\ \textbf{Case 2.b. $G_0$ contains a degree 3 vertex, and every degree 3 vertex in $G_0$ is contained in an induced subgraph isomorphic to $R$, $K_4^+$, $K_4^{++}$ or $\hat{K_4}$.}\\ Every vertex of degree 3 is contained in an induced subgraph $W_i$ isomorphic to $K_4^+$ or in an induced subgraph $Z_j$ isomorphic to either $R$, $\hat{K_4}$, or a graph $K_4^{++}$ from Figures~\ref{fig:gain_cov_graphs} (d)-(g). Since $f(K_4^+)=1$ and $f(R)=f(\hat{K_4})=f(K_4^{++})=0$ we say the former are type 1 and the latter are type 0. Let $W_1,\dots, W_{r'}$ be all such type 1 induced subgraphs and $Z_1,\dots,Z_{s'}$ be all such type 0 induced subgraphs. Note that for all $1\leq i \leq s'$, any proper non-empty subgraph $H$ of $Z_i$ has $f(H)\geq 1$. Now, for any pair of subgraphs $Z_i,Z_j$ we have that $Z_i$ and $Z_j$ are necessarily vertex disjoint. If not then $f(Z_i\cap Z_j)>0$ and hence $f(Z_i\cup Z_j)<0$, which would contradict the $(2,2,0)$-sparsity of $G_0$. Next, for all $1\leq j \leq r'$, any proper non-empty subgraph $Y$ of $W_j$ is either a loop or has $f(Y)\geq 2$. Thus, for any pair of subgraphs $Z_i,W_j$ we have that either the intersection is a loop, or $Z_i$ and $W_j$ are vertex disjoint. If not then $f(Z_i\cap W_j)\geq 2$ and hence $f(Z_i\cup W_j)=1-f(Z_i\cap W_j)<0$, contradicting $(2,2,0)$-sparsity. Lastly, for any pair of subgraphs $W_i,W_j$ with non-empty intersection, we must have $f(W_i\cap W_j)\in \{1,2\}$. This implies that $W_i\cap W_j$ is either empty, a loop, or has $f(W_i\cap W_j)=2$. Moreover in the case when $f(W_i\cap W_j)=2$, then $W_i\cap W_j$ is either a double edge or a copy of $K_1$ (since the case when $W_i\cap W_j$ is a copy of $K_4$ would mean either $i=j$ or would contradict the fact that $W_i$ and $W_j$ are induced subgraphs of $G_0$). \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.6] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (-2,4) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (0,4) -- (-2,4) -- (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2) -- (-2,4); \draw[black] (0,0) -- (2,2); \draw[dotted] plot[smooth, tension=1] coordinates{(-2,2)(-1.4,.8)(0,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,2) (.2,2.5)(.5,2.3) (0,2)}; \end{tikzpicture} \end{center} \caption{The graph consisting of some $k\geq 2$ copies of $K_4$ which all intersect in a single vertex and that vertex is incident with one loop. This family of graphs gives the only additional isomorphism classes that can occur in the modified list of $W_i$'s. Gain labels omitted.} \label{fig:new0} \end{figure} \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.5] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (-2,4) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (0,4) -- (-2,4) -- (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2) -- (-2,4); \draw[black] (0,0) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(0,4) (.3,3)(0,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(2,2) (2.3,1)(2,0)}; \filldraw (0,-6) circle (3pt); \filldraw (0,-4) circle (3pt); \filldraw (2,-6) circle (3pt); \filldraw (2,-4) circle (3pt); \filldraw (-2,-4) circle (3pt); \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \draw[black] (0,-2) -- (-2,-2) -- (-2,-4) -- (0,-4) -- (0,-2) -- (-2,-4); \draw[black] (2,-6) -- (0,-6) -- (0,-4) -- (2,-4) -- (2,-6) -- (0,-4) -- (-2,-2); \draw[black] (0,-6) -- (2,-4); \draw[thick] plot[smooth, tension=1] coordinates{(0,-2) (.1,-1.5)(.5,-1.7) (0,-2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,-6) (-.2,-5.5)(-.5,-5.7) (0,-6)}; \end{tikzpicture} \hspace{0.8cm} \begin{tikzpicture}[scale=0.5] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (-2,4) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (0,4) -- (-2,4) -- (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2) -- (-2,4); \draw[black] (0,0) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(-2,4) (-2.3,3)(-2,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(2,2) (2.3,1)(2,0)}; \filldraw (0,-6) circle (3pt); \filldraw (0,-4) circle (3pt); \filldraw (2,-6) circle (3pt); \filldraw (2,-4) circle (3pt); \filldraw (-2,-4) circle (3pt); \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \draw[black] (0,-2) -- (-2,-2) -- (-2,-4) -- (0,-4) -- (0,-2) -- (-2,-4); \draw[black] (2,-6) -- (0,-6) -- (0,-4) -- (2,-4) -- (2,-6) -- (0,-4) -- (-2,-2); \draw[black] (0,-6) -- (2,-4); \draw[thick] plot[smooth, tension=1] coordinates{(0,-2) (.3,-3)(0,-4)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,-6) (-.2,-5.5)(-.5,-5.7) (0,-6)}; \end{tikzpicture} \hspace{0.8cm} \begin{tikzpicture}[scale=0.5] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (-2,4) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (0,4) -- (-2,4) -- (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2) -- (-2,4); \draw[black] (0,0) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(0,4) (.3,3)(0,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,2) (1,2.3)(2,2)}; \filldraw (0,-6) circle (3pt); \filldraw (0,-4) circle (3pt); \filldraw (2,-6) circle (3pt); \filldraw (2,-4) circle (3pt); \filldraw (-2,-4) circle (3pt); \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \draw[black] (0,-2) -- (-2,-2) -- (-2,-4) -- (0,-4) -- (0,-2) -- (-2,-4); \draw[black] (2,-6) -- (0,-6) -- (0,-4) -- (2,-4) -- (2,-6) -- (0,-4) -- (-2,-2); \draw[black] (0,-6) -- (2,-4); \draw[thick] plot[smooth, tension=1] coordinates{(-2,-2) (-1,-1.7)(0,-2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,-6) (-.2,-5.5)(-.5,-5.7) (0,-6)}; \end{tikzpicture} \hspace{0.8cm} \begin{tikzpicture}[scale=0.5] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2); \draw[black] (0,0) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(0,2) (-.2,2.5)(-.5,2.3) (0,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,2) (-1,1.7) (-2,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,2) (.3,3) (0,4)}; \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \filldraw (-2,-4) circle (3pt); \filldraw (2,-6) circle (3pt); \filldraw (0,-6) circle (3pt); \filldraw (0,-4) circle (3pt); \filldraw (2,-4) circle (3pt); \draw[black] (-2,-2) -- (0,-2) -- (-2,-4) -- (-2,-2) -- (0,-4) -- (2,-4) -- (0,-6) -- (2,-6) -- (0,-4) -- (-2,-4); \draw[black] (0,-2) -- (0,-4) -- (0,-6); \draw[black] (2,-4) -- (2,-6); \draw[thick] plot[smooth, tension=1] coordinates{(2,-4) (2.3,-5) (2,-6)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,-4) (.2,-3.5)(.5,-3.7) (0,-4)}; \end{tikzpicture} \hspace{0.8cm} \begin{tikzpicture}[scale=0.5] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-2,2) circle (3pt); \filldraw (-2,4) circle (3pt); \filldraw (0,4) circle (3pt); \draw[black] (0,4) -- (-2,4) -- (-2,2) -- (0,2) -- (0,4) -- (-2,2); \draw[black] (2,0) -- (0,0) -- (0,2) -- (2,2) -- (2,0) -- (0,2) -- (-2,4); \draw[black] (0,0) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(0,4) (.3,3)(0,2)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,2)(-.2,1.5)(-.5,1.8)(0,2)}; \filldraw (0,-6) circle (3pt); \filldraw (0,-4) circle (3pt); \filldraw (2,-6) circle (3pt); \filldraw (2,-4) circle (3pt); \filldraw (-2,-4) circle (3pt); \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \draw[black] (0,-2) -- (-2,-2) -- (-2,-4) -- (0,-4) -- (0,-2) -- (-2,-4); \draw[black] (2,-6) -- (0,-6) -- (0,-4) -- (2,-4) -- (2,-6) -- (0,-4) -- (-2,-2); \draw[black] (0,-6) -- (2,-4); \draw[thick] plot[smooth, tension=1] coordinates{(0,-4) (.1,-3.5)(.5,-3.7) (0,-4)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,-6) (-.2,-5.5)(-.5,-5.7) (0,-6)}; \end{tikzpicture} \end{center} \caption{Additional isomorphism classes that can occur in the first step of the modified list of $Z_j$'s. Gain labels omitted.} \label{fig:new} \end{figure} \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.4] \filldraw (0,0) circle (3pt); \filldraw (3,0) circle (3pt); \filldraw (0,3) circle (3pt); \filldraw (3,3) circle (3pt); \filldraw (0,-3) circle (3pt); \filldraw (3,-3) circle (3pt); \filldraw (1.5,-3) circle (0pt)node[anchor=north]{\tiny $-1$}; \filldraw (1.5,0) circle (0pt)node[anchor=north]{\tiny $-1$}; \filldraw (.7,-1.2) circle (0pt)node[anchor=north]{\tiny $-1$}; \filldraw (2.3,-1.2) circle (0pt)node[anchor=north]{\tiny $-1$}; \draw[black] (3,-3) -- (0,0) -- (3,3); \draw[black] (0,-3) -- (3,0) -- (3,3) -- (0,3) -- (3,0) -- (3,-3) -- (0,-3) -- (0,0) -- (0,3); \draw[thick] plot[smooth, tension=1] coordinates{(0,0) (1.5,.3)(3,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,0) (1.5,-.3)(3,0)}; \draw[black] (5,-1) -- (7,-1); \draw[black] (6.6,-1.3) -- (7,-1) -- (6.6,-.7); \filldraw (11.5,0) circle (3pt); \filldraw (10,-3) circle (3pt); \filldraw (13,-3) circle (3pt); \draw[black] (10,-3) -- (13,-3); \draw[thick] plot[smooth, tension=1] coordinates{(10,-3) (10.8,-1)(11.5,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(10,-3) (10.8,-2)(11.5,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(13,-3) (12.2,-1)(11.5,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(13,-3) (12.2,-2)(11.5,0)}; \draw[thick] plot[smooth, tension=1] coordinates{(11.5,0)(11.2,.6)(11.8,.6)(11.5,0)}; \filldraw (11.5,0) circle (0pt)node[anchor=east]{\tiny $-1$}; \filldraw (11.5,-3) circle (0pt)node[anchor=north]{\tiny $-1$}; \filldraw (10.7,-1.3) circle (0pt)node[anchor=east]{\tiny $-1$}; \filldraw (12.3,-1.3) circle (0pt)node[anchor=west]{\tiny $-1$}; \end{tikzpicture} \end{center} \caption{An additional isomorphism class that can occur in the first step of the modified list of $Z_j$'s and the result, $R$, of a reverse vertex-to-$K_4$ move applied to this graph. Omitted gain labels are equal to $1$.} \label{fig:newextra} \end{figure} We next modify our lists $W_1,\dots, W_r$ and $Z_1,\dots,Z_s$ until any pair $W_i,W_j$ and any pair $Z_i,W_j$ are vertex disjoint. This means that whenever $W_i$ and $W_j$ intersect in a loop, then we discard them and add the union of $W_i$ and $W_j$ as a new $W_\ell$, and whenever $W_i$ and $W_j$ intersect in a double edge or a copy of $K_1$, then we also discard them and add the union of $W_i$ and $W_j$ as a new $Z_m$. Moreover, whenever $Z_i$ and $W_j$ intersect in a loop then we discard them and add the union of $Z_i$ and $W_j$ as a new $Z_k$. This process is then iterated until the final list of all $W_i$'s and $Z_i$'s has the property that any two elements in the list are vertex disjoint. (The additional $W_i$'s at any step of the process and the additional $Z_j$'s from step 1 of this process are as depicted in Figures \ref{fig:new0} and Figures \ref{fig:new} and \ref{fig:newextra}.) Let $U$ and $F$ be the sets of vertices and edges of $G_0$ which are in none of the $W_i$ and in none of the $Z_j$. Associate with $G_0$ an auxiliary (multi)graph $G_0^\ast$ which has a vertex for each $W_i$, a vertex for each $Z_i$ and a vertex for $U$ and has an edge corresponding to each edge of $G_0$ of the form $x_ix_j$, where $x_i,x_j$ are taken from distinct elements of $V(G_0^\ast)=\{W_1,\dots,W_r,Z_1,\dots, Z_s,U\}$. Also define $G_0^-$ to be the simple graph which is obtained from $G_0^\ast$ by removing any parallel edges. The connectivity of $G_0$ implies that $G_0^-$ is connected. Suppose $|V(G_0^-)|=1$. Then $G_0$ is a copy of some $Z_j$. If $G_0=\hat{K_4}$ then we may apply a reverse H3d move. If $G_0$ is a union of two $K_4^+$ graphs which intersect in a double edge then we may apply a reverse vertex-to-$K_4$ move (see Figure \ref{fig:newextra}). If $G_0$ is not a base graph then by the iteration process above, it follows in all remaining cases that $G_0$ contains a cut-vertex that separates an induced subgraph isomorphic to $K_4^+$ from the rest of the graph. It is now clear that we may use Lemma \ref{lem:k4contract} to apply a reverse vertex-to-$K_4$ move to a $K_4^+$ subgraph of $G_0$. Thus, we may suppose that $|V(G_0^-)|>1$. Suppose $r=0$. Let $G_0[U]$ denote the subgraph of $G_0$ induced by $U$. Note that since $f(Z_i)=0$ for each $i$, no two $Z_i$ can be adjacent (by the $(2,2,0)$-gain-sparsity of $G_0$). Since $G_0^-$ is connected, it follows that $G_0^-$ is the graph $K_{1,s}$ where $s\geq 1$. Moreover, we have \[f(G_0[U]) - d(U,V_0-U)=\sum_{i=1}^s f(Z_i) +f(G_0[U]) - d(U,V_0-U) = f(G_0) = 0.\] Since every vertex in $U$ has degree at least $4$ in $G_0$, by Lemma \ref{l:claim} we have, \[d(U,V_0-U)\geq 2f(G_0[U])=2d(U,V_0-U).\] Thus $d(U,V_0-U)=0$, a contradiction. Now suppose $r>0$. Recall that each $W_i$ is a $K_4^+$ or is of the form illustrated in Figure \ref{fig:new0}. Hence, if any $W_i$ is not incident to two parallel edges in $G_0^\ast$ then we may contract a copy of $K_4^+$ to a loop by Lemma \ref{lem:k4contract}. So we suppose that every $W_i$ is incident to two parallel edges in $G_0^\ast$. We calculate \begin{equation}\label{eqn:2ci} f(G_0)=\sum_{i=1}^rf(W_i) + \sum_{j=1}^sf(Z_j)+2|U|-|F|, \end{equation} which implies that $|F|=2|U|+r.$ Suppose first that every $W_i$ and every $Z_j$ is incident to at least two edges in $F$. Since each vertex in $U$ has degree at least $4$, there are at least $4|U|+2(r+s)$ edge/vertex incidences in $F$. This implies $|F|\geq 2|U|+r+s$, and hence $s=0$. By a similar counting argument, if some $W_i$ is incident to more than two edges in $F$ then there are at least $4|U|+2(r-1)+3$ edge/vertex incidences in $F$. This implies $|F|> 2|U|+r$, a contradiction. Thus each $W_i$ has degree exactly 2 in $G_0^\ast$. This implies that either $G_0$ is the disjoint union of $W_1$ and $W_2$ with two edges between them, or, $G_0^-$ is the graph $K_{1,r}$. In the former case, there is an admissible reverse vertex-to-$K_4$ move which contracts a copy of $K_4^+$ to a loop. So suppose $G_0^-$ is $K_{1,r}$. In this case, every $v\in U$ has degree exactly 4. We may assume that every $W_i$ is a copy of $K_4^+$ and that for every $W_i$ there exists a vertex in $U$ that is joined to two vertices in $W_i$ by edges with identical gains. (Otherwise, there is an admissible reverse vertex-to-$K_4$ move.) Let $v\in U$ be adjacent to two vertices in some $W_i$. Then there is balanced copy of $K_3$ containing $u$ and two vertices $a,b$ of $W_i$. We may assume the gains on this copy of $K_3$ are all 1. We now apply Lemma \ref{lem:k3contract} to show that there is an admissible reverse vertex-splitting move that contracts either $(va,1)$ or $(vb,1)$. Since $W_i$ is a copy of $K_4^+$ at most one of $a,b$ can have a loop. We suppose there is no loop on $a$ and consider the contraction of $(va,1)$. It follows from Lemma \ref{lem:k3contract} that if $(va,1)$ is non-admissible then there is either a subgraph $H_0$ containing $v,a$ and the edge $(va,1)$ but not $b$ with $f(H_0)=0$ or a balanced subgraph $H_0$ containing $v,a$ and the edge $(va,1)$ with $f(H_0)=2$ and if $H_0$ contains $b$ then it does not contain the edges $(ba,1)$ and $(vb,1)$. In both cases it is easy to deduce from the structure of $G_0$ that such an $H_0$ cannot exist. So we suppose that there is a $Z_j$ which is incident to only one edge in $F$. If a $W_i$ is joined to another $W_k$ by two edges, then we discard them and add the union of $W_i$ and $W_k$ together with the two extra edges as a new $Z_m$. Similarly, if a $W_i$ is joined to a $Z_k$ by one edge, then we discard them and add the union of $W_i$ and $Z_k$ together with the extra edge as a new $Z_\ell$. Then the graph $G_0^-$ corresponding to this new underlying structure of $G_0$ contains the graph $K_{1,t}$ as a spanning subgraph, where the vertices in the partite set of size $t=b+c$ correspond to the graphs $W_1,\dots, W_b$ and $Z_1,\dots,Z_c$, and the vertex in the other partite set corresponds to $U$. If $G_0^-$ is not equal to $K_{1,t}$, then the additional edges must join vertices corresponding to the $W_i$, and these edges represent single edges among pairs of $W_i$ in $G_0^\ast$. We call this set of edges $A$. Note that in $G_0^\ast$, for each $W_i$ there are two parallel edges joining $W_i$ to $U$, and for each $Z_j$ there is one edge joining $Z_j$ to $U$. There may be additional edges joining a $W_i$ with $U$ or a $Z_j$ with $U$, and we denote this set of additional edges by $B$. Hence we have $f(G_0[U])= b+c+d$, where $d=|A|+|B|$. Thus, by Lemma \ref{l:claim}, we have $d(U,V_0-U)\geq 2(b+c+d)$. This is a contradiction since there are only exactly $2b+c+d-|A|$ edges incident to $U$. Thus, in Case 2b there exists an admissible reverse move. Henceforth we may assume that $G_0$ is 4-regular. First let us deal with two special possible subgraphs of $G_0$.\\ \textbf{Case 3.a. There exists a balanced subgraph isomorphic to either a copy of $K_{1,1,3}$, or, to a copy of $K_4$ which neither induces additional edges nor is contained in a copy of $K_5-e$.}\\ Suppose that $G_0$ contains an induced balanced copy of $K_4$. By switching we may assume that all edges of the $K_4$ have gain $1$. By Lemma \ref{lem:k4contract} and the assumptions of this case, if a reverse vertex-to-$K_4$ move is not admissible then there is a vertex $s$ adjacent to exactly two of the $K_4$ vertices such that $K_4\cup s$ is balanced. Consider the vertex $s$ in $K_4\cup s$. Since $G_0$ is 4-regular and $K_4$ is not contained in $K_5-e$, $s$ has either a neighbour not in the $K_4$ with two parallel edges to $s$, or two neighbours not in the $K_4$, or a loop on $s$. (These three possibilities are illustrated in Figure \ref{fig:n3a}(a).) In the first case we can use Lemma~\ref{lem:4threei} to conclude that $s$ is admissible and in the second case we can use Lemma~\ref{lem:4threeii} to conclude that $s$ is admissible. In the third case we may use Lemma \ref{lem:k3contract}. Let $r,t$ be the neighbours of $s$ in $G_0$. By switching, we may assume that $(sr,1)$ and $(st,1)$ are edges in $G_0$. Consider the contraction of the edge $(sr,1)$. Since $G_0$ is 4-regular, conditions (ii) and (iv) of Lemma~\ref{lem:k3contract} evidently fail. Condition (i) fails by Lemma \ref{lem:4regno0}. Finally, since $G_0$ is $4$-regular and any balanced subgraph $H_0$ with $f(H_0)=2$ cannot have a vertex of degree $1$, condition (iii) also fails. \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.7] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (1,-1.5) circle (3pt) node[anchor=east]{$s$}; \filldraw (1,-3) circle (3pt); \draw[black] (0,2) -- (2,0) -- (1,-1.5) -- (0,0) -- (2,2) -- (2,0) -- (0,0) -- (0,2) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(1,-3) (.7,-2.25) (1,-1.5)}; \draw[thick] plot[smooth, tension=1] coordinates{(1,-3) (1.3,-2.25) (1,-1.5)}; \filldraw (1.5,-4.5) circle (0pt); \end{tikzpicture} \hspace{1.1cm} \begin{tikzpicture}[scale=0.7] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (1,-1.5) circle (3pt) node[anchor=east]{$s$}; \filldraw (0,-3) circle (3pt); \filldraw (2,-3) circle (3pt); \draw[black] (0,2) -- (2,0) -- (1,-1.5) -- (0,0) -- (2,2) -- (2,0) -- (0,0) -- (0,2) -- (2,2); \draw[black] (0,-3) -- (1,-1.5) -- (2,-3); \filldraw (1.5,-4) circle (0pt)node[anchor=east]{(a)}; \end{tikzpicture} \hspace{1.1cm} \begin{tikzpicture}[scale=0.7] \filldraw (0,0) circle (3pt); \filldraw (0,2) circle (3pt); \filldraw (2,0) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (1,-1) circle (3pt) node[anchor=east]{$s$}; \draw[black] (0,2) -- (2,0) -- (1,-1) -- (0,0) -- (2,2) -- (2,0) -- (0,0) -- (0,2) -- (2,2); \draw[thick] plot[smooth, tension=1] coordinates{(1,-1) (.8,-1.3)(1.2,-1.3) (1,-1)}; \filldraw (1.5,-4.5) circle (0pt); \end{tikzpicture} \hspace{1.1cm} \begin{tikzpicture}[scale=0.7] \filldraw (0,2) circle (3pt); \filldraw (2,2) circle (3pt); \filldraw (-1,0) circle (3pt); \filldraw (1,0) circle (3pt); \filldraw (3,0) circle (3pt); \filldraw (-2,-2) circle (3pt); \filldraw (0,-2) circle (3pt); \filldraw (2,-2) circle (3pt); \draw[black] (0,2) -- (3,0) -- (2,2) -- (1,0) -- (0,2) -- (2,2) -- (-1,0) -- (0,2); \draw[black] (0,-2) -- (1,0) -- (2,-2); \draw[thick] plot[smooth, tension=1] coordinates{(-1,0)(-1.8,-1)(-2,-2)}; \draw[thick] plot[smooth, tension=1] coordinates{(-1,0)(-1.2,-1)(-2,-2)}; \draw[thick] plot[smooth, tension=1] coordinates{(3,0)(2.8,-.3)(3.2,-.3)(3,0)}; \filldraw (1.5,-4) circle (0pt)node[anchor=east]{(b)}; \end{tikzpicture} \end{center} \caption{(a) The possibilities in Case 3.a when $G_0$ contains an induced balanced copy of $K_4$ and (b) the possibilities when $G_0$ contains an induced balanced copy of $K_{1,1,3}$.} \label{fig:n3a} \end{figure} Suppose then that $G_0$ contains a balanced copy of $K_{1,1,3}$ and does not contain an induced balanced copy of $K_4$. By switching, we may assume that all edges of $K_{1,1,3}$ have gain $1$. Then each degree 2 vertex in the $K_{1,1,3}$ is either incident to a double edge joining it to a third vertex, or to two single edges joining it to a third and fourth vertex, or to a loop. (These three possibilities are illustrated in Figure \ref{fig:n3a}(b).) If there is a vertex of the first or the second type, then we may apply Lemma~\ref{lem:4threei} or Lemma~\ref{lem:4threeii}, respectively, to show that there exists an admissible reverse move. So suppose each of the degree 2 vertices of $K_{1,1,3}$ is incident to a loop. Since $K_{1,1,3}$ with three loops is 4-regular, it must be equal to $G_0$. We show there is a contraction using Lemma \ref{lem:k3contract}. Let $r$ and $s$ be the vertices corresponding to the two partite sets of $K_{1,1,3}$ of size 1, and let $t$ be a vertex incident to a loop. We will contract the edge $(rt,1)$. Lemma \ref{lem:4regno0} implies that (i) fails and again (ii) and (iv) clearly fail. To see that (iii) fails note simply that every subgraph $H$ with no loops satisfies $f(H)\geq 3$.\\ \textbf{Case 3.b. There exists a vertex not contained in a balanced subgraph isomorphic to $K_4$ or to $K_{1,1,3}$.}\\ We consider each of the possibilities for the neighbourhood of a given vertex $v$ in $G_0$ satisfying the hypotheses of this case. Suppose first that $v$ has exactly one neighbour. Since $G_0\neq 2K_2^1$ and $G_0$ is connected, Lemma \ref{lem:4one} implies that $v$ is admissible. Suppose next that $v$ has either exactly three or exactly four neighbours. Then Lemmas \ref{lem:4threei} and \ref{lem:4threeii} imply that $v$ is admissible. So we suppose that $v$ has exactly two neighbours. Suppose first that there is no loop on $v$. Let $N(v)=\{x,y\}$. Lemma \ref{lem:4twob} implies that if $v$ is not admissible then there is a loop at $x$ or at $y$, say at $x$. Since $G_0$ is 4-regular we see that $x$ satisfies the condition of Lemma~\ref{lem:4one} and hence there is an admissible reverse move. So suppose that $v$ has exactly two neighbours $x,y$ and a loop on $v$. By switching, we may assume that $(vx,1)$ and $(vy,1)$ are the non-loop edges incident to $v$. We consider a possible H2d-reduction at $v$. If every vertex of $G_0$ is incident with a loop and has two neighbours then it is easy to see that $G_0$ is precisely a cycle with one loop on each vertex. If the cycle has length 3 then $G_0$ is a base graph. If the cycle has length at least 4 then it is easy to see that there is no balanced subgraph $H_0$ of $G_0-v$ containing $x,y$ with $f(H_0)=2$ such that all walks from $x$ to $y$ have gain $1$. Hence $v$ is admissible. So we may suppose there is some vertex in $G_0$ which is not incident to a loop. By 4-regularity of $G_0$ and by relabelling if necessary, we may suppose that $x$ is such a vertex. Since $x$ is adjacent to $v$ with exactly one edge and $x$ does not have a loop, $x$ may have either 3 or 4 neighbours. If $x$ has 3 neighbours then 4-regularity implies that $x$ is not contained in a $K_4$. Hence Lemma \ref{lem:4threei} implies that $x$, or one of its neighbours, is admissible. So we suppose that $x$ has 4 distinct neighbours. If the edge $(xy,1)$ exists, then we may contract the edge $vx$ using Lemma \ref{lem:k3contract}. (The structure of $G_0$ makes all four conditions in that lemma easy to rule out.) So suppose $(xy,1)$ does not exist. If $(xy,-1)$ exists then we claim that $x$ is admissible. If not, then it follows from Lemma~\ref{lem:4threeii} that $x$ must be in a balanced $K_4$. This $K_4$ must consist of the vertices $x,y,a,b$. By switching we may assume that the three edges joining $x$ with $a$, $b$ and $y$ all have gain $-1$ and that the remaining edges of the $K_4$ have gain $1$. Note that every path from $x$ to $y$ within the $K_4$ has gain $-1$. This implies that there is no balanced subgraph $H_{xy}$ of $G_0-v$ containing $x$ and $y$ with $f(H_{xy})=2$ such that each path from $x$ to $y$ in $H_{xy}$ has gain $1$. Since there is clearly also no subgraph $H_0$ of $G_0-v$ containing $x$ and $y$ with $f(H_0)=0$, this implies that there is a H2d-reduction at $v$, contradicting our assumption that $v$ is non-admissible. So we may suppose that $x$ is not adjacent to $y$. By Lemma~\ref{lem:4threeii} $x$ is either in a balanced $K_{1,1,3}$, which gives an immediate contradiction, or $x$ is in a balanced $K_4$. In the latter case, since we are not in Case 3.a, either the $K_4$ induces exactly one additional edge and we can apply a reverse vertex-to-$K_4$ move by Lemma \ref{lem:k4contract} (since the additional edge cannot be a loop, by $4$-regularity of $G_0$), or the $K_4$ is contained in a copy of $K_5-e$. \begin{figure}[ht] \begin{center} \begin{tikzpicture}[scale=0.8] \filldraw (0,6) circle (3pt)node[anchor=west]{$v$}; \filldraw (-1,5) circle (3pt)node[anchor=east]{$x$}; \filldraw (1,5) circle (3pt)node[anchor=west]{$y$}; \filldraw (-2,4) circle (3pt)node[anchor=east]{$a$}; \filldraw (-1,3) circle (3pt)node[anchor=north]{$b$}; \filldraw (0,4) circle (3pt)node[anchor=west]{$c$}; \draw[black] (1,5) -- (0,6) -- (-1,5) -- (-2,4) -- (-1,3) -- (-1,5) -- (0,4) -- (-1,3); \draw[black] (1,5) -- (-2,4) -- (0,4) -- (1,5); \draw[thick] plot[smooth, tension=1] coordinates{(-1,3)(.7,3.7)(1,5)}; \draw[thick] plot[smooth, tension=1] coordinates{(0,6)(-.2,6.3)(.2,6.3)(0,6)}; \filldraw (0,2) circle (0pt)node[anchor=north]{(a)}; \end{tikzpicture} \hspace{0.9cm} \begin{tikzpicture}[scale=0.8] \filldraw (0,6) circle (3pt)node[anchor=west]{$v$}; \filldraw (-1,5) circle (3pt)node[anchor=east]{$x$}; \filldraw (1,5) circle (3pt)node[anchor=west]{$y$}; \filldraw (-2,4) circle (3pt)node[anchor=east]{$a$}; \filldraw (-1,3) circle (3pt)node[anchor=north]{$b$}; \filldraw (0,4) circle (3pt)node[anchor=west]{$c$}; \filldraw (1,3) circle (3pt)node[anchor=north]{$z$}; \draw[black] (-1,3) -- (1,3) -- (1,5) -- (0,6) -- (-1,5) -- (-2,4) -- (-1,3) -- (-1,5) -- (0,4) -- (-1,3); \draw[black] (1,3) -- (-2,4) -- (0,4) -- (1,3); \draw[thick] plot[smooth, tension=1] coordinates{(0,6)(-.2,6.3)(.2,6.3)(0,6)}; \filldraw (0,2) circle (0pt)node[anchor=north]{(b)}; \end{tikzpicture} \hspace{0.9cm} \begin{tikzpicture}[scale=0.8] \filldraw (0,6) circle (3pt)node[anchor=west]{$v$}; \filldraw (-1,5) circle (3pt)node[anchor=east]{$x$}; \filldraw (1,5) circle (3pt)node[anchor=west]{$y$}; \filldraw (-2,4) circle (3pt)node[anchor=east]{$a$}; \filldraw (-1,3) circle (3pt)node[anchor=north]{$b$}; \filldraw (0,4) circle (3pt)node[anchor=west]{$c$}; \filldraw (1,3) circle (3pt)node[anchor=north]{$z$}; \filldraw (2,3) circle (3pt)node[anchor=west]{}; \draw[black] (1,5) -- (0,6) -- (-1,5) -- (-2,4) -- (-1,3) -- (-1,5) -- (0,4) -- (-1,3) -- (1,3); \draw[black] (1,3) -- (-2,4) -- (0,4) -- (1,3) -- (2,3); \draw[thick] plot[smooth, tension=1] coordinates{(0,6)(-.2,6.3)(.2,6.3)(0,6)}; \filldraw (0,2) circle (0pt)node[anchor=north]{(c)}; \end{tikzpicture} \end{center} \caption{Possible structures of $G$ when $v$ has two neighbours and a loop and one of its neighbours has 4 distinct neighbours.} \label{fig:new1} \end{figure} Let the vertices of the $K_4$ be $a,b,c,x$ and suppose all edges of the $K_4$ have gain $1$. If the final vertex of the $K_5-e$ is $y$ then $V(G_0)=\{v,x,y,a,b,c\}$ (see Figure \ref{fig:new1}(a)) and we claim that $y$ is admissible. To see this, note that exactly one or exactly two of the edges joining $y$ with $a,b,c$ have gain $-1$, for otherwise $K_4$ together with the three edges incident with $y$ would violate $(2,2)$-sparsity. Hence in both cases, $y$ is admissible by Lemma \ref{lem:4threeii}. So we may assume that the final vertex of the $K_5-e$ is $z\neq y$. Suppose first that $z$ is adjacent to $y$ (see Figure \ref{fig:new1}(b)). Then we claim that $y$ is still admissible. Clearly $y$ is adjacent to $v$ and $z$. If $y$ is also incident to a loop, then $V(G_0)=\{v,x,y,a,b,c,z\}$ and it is easy to see that a H2d-reduction is possible at $y$. If $y$ is incident to two parallel edges joining it with a vertex $u\neq v,z$ then $y$, or one of its neighbours, is admissible by Lemma~\ref{lem:4threei} and the $4$-regularity of $G_0$. If $y$ is incident to two single edges joining it with vertices $u$ and $w$ that are distinct from $v$ and $z$, then $y$ is admissible by Lemma~\ref{lem:4threeii} and the $4$-regularity of $G_0$. So we may suppose that $z$ is not adjacent to $y$ (see Figure \ref{fig:new1}(c)). Then $z$ is admissible by Lemma~\ref{lem:4threeii} and the 4-regularity of $G_0$.\\ \textbf{Case 3.c. Every vertex is contained in a balanced subgraph isomorphic to $K_4$ plus either one or two additional edges or $K_5-e$.}\\ If $G_0$ contains a $K_4^{++}$ as a subgraph then $G_0=K_4^{++}$, by $4$-regularity of $G_0$. In this case $G_0$ is the base graph depicted in Figure \ref{fig:gain_cov_graphs}(h). So we may assume that every vertex of $G_0$ is contained in a balanced subgraph isomorphic to $K_4^+$ (which cannot have a loop) or $K_5-e$. Since $G_0$ is 4-regular any pair of copies of $K_4^+$ or $K_5-e$ are vertex disjoint, and each copy has exactly two edges incident to it. If $G_0$ contains a copy of $K_4^+$ then we can apply a reverse vertex-to-$K_4$ move by Lemma \ref{lem:k4contract}. (Note that since every vertex is in a $K_4^+$ or a $K_5-e$, and $G_0$ is 4-regular, there cannot exist a vertex outside of the $K_4^+$ that is adjacent to two of the vertices of the $K_4^+$.) Hence we may suppose that $G_0$ contains no copies of $K_4^+$. Thus we may assume that we have a copy of $K_5-e$. Suppose $e=xy$ and note that if $x$ (resp. $y$) is not admissible, then by Lemma \ref{lem:4threeii} $x$ (resp. $y$) must be contained in a balanced $K_4$. However, if $x$ and $y$ are both contained in balanced $K_4$'s, then the $K_5-e$ is the union of two balanced subgraphs and is hence balanced by Lemma \ref{lem:balancedunion}, contradicting $(2,2)$-sparsity. \end{proof} \section{Application to ${\mathcal{C}}_2$-symmetric frameworks in the $\ell^1$ and $\ell^\infty$-plane} \label{Sect:Gridlike} Let $\|\cdot\|_\P$ be a norm on ${\mathbb{R}}^2$ with the property that the closed unit ball $\P=\{x\in {\mathbb{R}}^2: \|x\|_\P\leq 1\}$ is a quadrilateral (eg. the $\ell^1$ or $\ell^\infty$ norms). We refer to bar-joint frameworks in this context as {\em grid-like}. In this section, the results of the previous sections are combined to obtain geometric and combinatorial characterisations of $\chi$-symmetric isostaticity and infinitesimal rigidity for ${\mathcal{C}}_2$-symmetric grid-like frameworks. \subsection{Framework colourings} \label{Sect:FrameworkColours} Let $(G,p)$ be a well-positioned grid-like bar-joint framework and let $F\in\{\pm F_1,\pm F_2\}$ be one of the four facets of the quadrilateral $\P$. An edge $vw\in E$ is said to have {\em framework colour} $F$ (equivalently, $-F$) if either $p_v-p_w$ or $p_w-p_v$ lies in the cone $\{x\in{\mathbb{R}}^2:\frac{x}{\|x\|_\P}\in F\}$. Recall that, since $(G,p)$ is well-positioned, each edge of $G$ has exactly one framework colour (see \cite{kit-pow}). Denote by $G_{F}$ the {\em monochrome subgraph} of $G$ spanned by edges with framework colour $F$. For each facet $F$ there exists a unique extreme point $\hat{F}$ of the polar set $\P^{\triangle}=\{y\in{\mathbb{R}}^2:x\cdot y\leq 1,\,\,\,\forall\, x\in \P\}$ such that $F=\{x\in\P:x\cdot \hat{F}=1\}$. Define a linear functional $\varphi_F:{\mathbb{R}}^2\to{\mathbb{R}}$ by setting $\varphi(x)=x\cdot \hat{F}$, for all $x\in {\mathbb{R}}^2$. If $(G,p)$ is well-positioned and $vw\in G_F$ then it can be shown (see \cite{kit-pow}) that the linear functional $\varphi_{v,w}$ described in Lemma \ref{lem:differential} satisfies $\varphi_{v,w}= \varphi_F$. If ${\mathcal{G}}=(G,p,\theta,\tau)$ is a ${\mathcal{C}}_2$-symmetric grid-like bar-joint framework, then each edge $e\in E$ shares the same framework colour as its image $-e$. By assigning this common framework colour to the edge orbit $[e]=\{e,-e\}$ we induce a framework colouring on the edges of the quotient graph $G_0$. Denote by $G_{F,0}$ the {\em monochrome subgraph} of $G_0$ spanned by edges $[e]$ with framework colour $F$. \begin{example} Consider the $\ell^\infty$ plane. The unit ball $\P=\{x\in{\mathbb{R}}^2:\|x\|_\infty\leq 1\}$ has four facets: $F_1=\{(x_1,x_2)\in\P:x_1=1\}$, $F_2=\{(x_1,x_2)\in\P:x_2=1\}$ and their negatives. The polar set of $\P$ is the $\ell^1$ unit ball $\P^\triangle=\{x\in{\mathbb{R}}^2:\|x\|_1\leq 1\}$, and the extreme points of the polar set are $\hat{F}_1=(1,0)$, $\hat{F}_2=(0,1)$ and their negatives. Figure \ref{fig:gain_cov_graphs} illustrates several examples of framework colourings for ${\mathcal{C}}_2$-symmetric bar-joint frameworks in the $\ell^\infty$-plane together with the induced framework colourings on their ${\mathbb{Z}}_2$-gain graphs. \end{example} A {\em map graph} is a graph in which every connected component contains exactly one cycle. An \emph{unbalanced map graph} is a $\mathbb{Z}_2$-gain graph $(H,\psi)$ such that $H$ is a map graph, the covering graph is simple and every cycle is unbalanced. \begin{theorem} \label{thm:C2gridgeom} Let ${\mathcal{G}}=(G,p,\theta,\tau)$ be a well-positioned and ${\mathcal{C}}_2$-symmetric bar-joint framework in $({\mathbb{R}}^2,\|\cdot\|_\P)$. \begin{enumerate}[(A)] \item The following statements are equivalent. \begin{enumerate}[(i)] \item ${\mathcal{G}}$ is $\chi_0$-symmetrically isostatic. \item $G_{F_1,0}$ and $G_{F_2,0}$ are edge-disjoint spanning unbalanced map graphs in $G_0$. \end{enumerate} \item The following statements are equivalent. \begin{enumerate}[(i)] \item ${\mathcal{G}}$ is $\chi_1$-symmetrically isostatic. \item $G_{F_1,0}$ and $G_{F_2,0}$ are edge-disjoint spanning trees in $G_0$. \end{enumerate} \item The following statements are equivalent. \begin{enumerate}[(i)] \item ${\mathcal{G}}$ is infinitesimally rigid. \item $G_{F_1,0}$ and $G_{F_2,0}$ both contain connected spanning unbalanced map graphs. \end{enumerate} \end{enumerate} \end{theorem} \begin{proof} $(A)$ $(i)\Rightarrow (ii)$ Suppose there exists a vertex $[v_0]\in V_0\setminus V(G_{F_1,0})$. Let $\tilde{v}_0$ be the representative vertex for $[v_0]$ in $G$. Choose a non-zero vector $x\in \ker\varphi_{F_2}$ and for all $v\in V(G)$ define, \[u_{v} = \left\{ \begin{array}{ll} x & \mbox{ if } v=\tilde{v}_0, \\ -x & \mbox{ if } v=-\tilde{v}_0, \\ 0 & \mbox{ otherwise. } \\ \end{array}\right.\] Then $u$ is a non-trivial $\chi_0$-symmetric infinitesimal flex for $(G,p)$. This is a contradiction since $(G,p)$ is $\chi_0$-symmetrically isostatic. Thus every vertex of $G_0$ must be incident to an edge of $G_{F_1,0}$. By a similar argument every vertex of $G_0$ must be incident to an edge of $G_{F_2,0}$. Suppose $G_{F_1,0}$ has a connected component $H_0$ which is a balanced subgraph of $G_0$. Then, by Lemma \ref{switch}, we may assume that each edge of $H_0$ has gain $1$. Thus if $H$ is the covering graph for $H_0$, then there is no edge $vw\in E(H)$ with $v\in \tilde{V}_0$ and $w\notin \tilde{V}_0$. (Recall Section~\ref{subsec:gaingraphs} for the definition of $\tilde{V}_0$). Choose a non-zero vector $x\in \ker\varphi_{F_2}$ and for all $v\in V(G)$ define, \[u_{v} = \left\{ \begin{array}{ll} x & \mbox{ if } [v]\in V(H_0) \mbox{ and } v\in\tilde{V}_0, \\ -x & \mbox{ if } [v]\in V(H_0) \mbox{ and } v\notin\tilde{V}_0, \\ 0 & \mbox{ otherwise. } \end{array}\right. \] Then $u$ is a non-trivial $\chi_0$-symmetric infinitesimal flex for $(G,p)$. This is a contradiction and so every connected component of $G_{F_1,0}$ must be an unbalanced subgraph of $G_0$. Similarly, each connected component of $G_{F_2,0}$ is an unbalanced subgraph of $G_0$. By Corollary \ref{cor:neccounts}, we have $|E_0|=2|V_0|$. Note that each connected component of $G_{F_1,0}$ must contain a cycle (since it is unbalanced) and so if $G_{F_1,0}$ has $n$ connected components, $H_1,H_2,\ldots, H_n$ say, then $|E(H_j)|\geq|V(H_j)|$ for each $j$ and, \[|E(G_{F_1,0})|=\sum_{j=1}^n |E(H_j)|\geq\sum_{j=1}^n|V(H_j)|= |V_0|.\] Similarly, $|E(G_{F_2,0})|\geq |V_0|$. Now $|E(G_{F_1,0})|+|E(G_{F_2,0})|=|E_0|=2|V_0|$ and so $|E(G_{F_1,0})|= |V_0|=|E(G_{F_2,0})|$. It follows that $|E(H_j)|=|V(H_j)|$ for each $j$ and so the connected components of $G_{F_1,0}$ each contain exactly one cycle. By the same argument, the connected components of $G_{F_2,0}$ each contain exactly one cycle. Thus $G_{F_1,0}$ and $G_{F_2,0}$ are both unbalanced spanning mapping graphs in $G_0$. $(ii)\Rightarrow (i)$ Suppose $(ii)$ holds and let $u$ be a $\chi_0$-symmetric infinitesimal flex of $(G,p)$. Then $u_{-v}=-u_v$ for all $v\in V$. Let $v_0\in V$ and let $H_0^1$ and $H_0^2$ be the connected components of $G_{F_1,0}$ and $G_{F_2,0}$ respectively which contain $[v_0]\in V_0$. Since $H_0^i$ contains a unique unbalanced cycle, there exists a path in $G_{F_i}$ from $v_0$ to $-v_0$. It follows that $u_{v_0} - u_{-v_0}\in \cap_{i=1,2}\ker \varphi_{F_i}=\{0\}$ and so $u_{v_0} = u_{-v_0} = -u_{v_0}$. Thus $u_{v_0}=0$. Applying this argument to all $v\in V$, we have $u=0$ and so $(G,p,\theta,\tau)$ is $\chi_0$-symmetrically infinitesimally rigid. Note that $|E_0|=2|V_0|$ and so ${\mathcal{G}}$ is also $\chi_0$-symmetrically isostatic. $(B)$ $(i)\Rightarrow (ii)$ Suppose there exists a vertex $[v_0]\in V_0 \setminus V(G_{F_1,0})$. Choose a non-zero vector $x\in \ker\varphi_{F_2}$. For all $v\in V$ define, \[u_{v} = \left\{ \begin{array}{ll} x & \mbox{ if } [v]=[v_0],\\ 0 & \mbox{ otherwise. } \\ \end{array}\right. \] Then $u$ is a non-trivial $\chi_1$-symmetric infinitesimal flex for $(G,p)$. This is a contradiction and so $G_{F_1,0}$ is a spanning subgraph of $G_0$. Similarly, $G_{F_2,0}$ is a spanning subgraph of $G_0$. Suppose $G_{F_1,0}$ is not connected, and let $H_0$ be a connected component of $G_{F_1,0}$. Choose a non-zero vector $x\in \ker\varphi_{F_2}$ and for all $v\in V$ define, \[u_{v} = \left\{ \begin{array}{ll} x & \mbox{ if } [v]\in V(H_0) ,\\ 0 & \mbox{ otherwise. } \end{array}\right. \] Then $u$ is a non-trivial $\chi_1$-symmetric infinitesimal flex for $(G,p)$, which is a contradiction. Thus $G_{F_1,0}$ is a connected spanning subgraph of $G_0$. Similarly, $G_{F_2,0}$ is a connected spanning subgraph of $G_0$. By Corollary \ref{cor:neccounts}, we have $|E_0|=2|V_0|-2$. Note that $|E(G_{F_1,0})|\geq |V_0|-1$ and $|E(G_{F_2,0})|\geq |V_0|-1$ and so $G_{F_1,0}$ and $G_{F_2,0}$ are both spanning trees in $G_0$. $(ii)\Rightarrow (i)$ Suppose $(ii)$ holds and let $u$ be a $\chi_1$-symmetric infinitesimal flex for ${\mathcal{G}}$. Then $u_{-v}=u_v$ for all $v\in V$. Fix $v,w\in V$. Since $G_{F_1,0}$ is a spanning tree in $G_0$, there exists a path in $G_{F_1,0}$ from $[v]$ to $[w]$. Thus there either exists a path $P$ in $G_{F_1}$ from $v$ to $w$ or there exists a path $P$ in $G_{F_1}$ from $v$ to $-w$. In the former case it follows directly that $u_v-u_w\in \ker\varphi_{F_1}$ while in the latter case it follows that $u_v-u_w=u_v-u_{-w}\in\ker\varphi_{F_1}$. Similarly, $u_v-u_w\in \ker\varphi_{F_2}$ and so $u_v=u_w$ for all $v,w\in V$. Thus $u$ is a trivial infinitesimal flex and so ${\mathcal{G}}$ is $\chi_1$-symmetrically infinitesimally rigid. Since $|E_0|=2|V_0|-2$, ${\mathcal{G}}$ is also $\chi_1$-symmetrically isostatic. $(C)$ $(i)\Rightarrow (ii)$ If $(G,p)$ is infinitesimally rigid then it is both $\chi_0$ and $\chi_1$-symmetrically infinitesimally rigid. By removing edge orbits from $G$ we arrive at a spanning subgraph $A$ such that $(A,p)$ is $\chi_0$-symmetrically isostatic. By (A), $A_{F_1,0}$ and $A_{F_2,0}$ are unbalanced spanning map graphs in $G_0$ and so each contains an unbalanced cycle. Similarly, $(G,p)$ contains a spanning subgraph $B$ such that $(B,p)$ is $\chi_1$-symmetrically isostatic. By (B), $B_{F_1,0}$ and $B_{F_2,0}$ are spanning trees in $G_0$. Since $B_{F_i,0}$ is a spanning tree for $i=1,2$, there exists a set of edges in $B_{F_i,0}$ which, when added to $A_{F_i,0}$, form a connected unbalanced spanning map graph $H_{F_i,0}$. This gives the result. $(ii)\Rightarrow (i)$ Suppose $(ii)$ holds. Then $(G_0,\psi)$ contains a spanning subgraph $H_0$ such that the induced monochrome subgraphs $H_{F_1,0}$ and $H_{F_2,0}$ are edge-disjoint connected unbalanced spanning map graphs. Let $H$ be the covering graph for $H_0$. By (A), the ${\mathcal{C}}_2$-symmetric subframework $(H,p)$ is $\chi_0$-symmetrically infinitesimally rigid. Similarly, note that $H_{F_1,0}$ and $H_{F_2,0}$ both contain spanning trees in $H_0$ and so by (B), $(H,p)$ is $\chi_1$-symmetrically infinitesimally rigid. It follows that $(H,p)$, and hence also $(G,p)$, is infinitesimally rigid. \end{proof} \subsection{Existence of rigid grid-like placements with half-turn symmetry} \label{Sect:Existence} Recall from Corollary~\ref{cor:neccounts} that if ${\mathcal{G}}=(G,p,\theta,\tau)$ is a well-positioned, $\mathcal{C}_2$-symmetric and $\chi_0$-symmetrically isostatic bar-joint framework in $({\mathbb{R}}^2, \|\cdot \|_\P)$, where $\P$ is a quadrilateral, then the gain graph $(G_0,\psi)$ for $(G,\theta)$ is $(2,2,0)$-gain-tight. By Theorem~\ref{thm:recurse}, $(G_0,\psi)$ is $(2,2,0)$-gain-tight if it can be generated from vertex-disjoint copies of graphs in ${\mathcal{B}}$ by applying H1, H2, H3, vertex-to-$K_4$ and vertex splitting moves. We now show that if there exists such a recursive construction sequence, then there exists a half-turn symmetric realisation of $G$ that is well-positioned and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$. Overall, this yields the following main combinatorial result for $\chi_0$-symmetrically isostatic frameworks with half-turn symmetry in $({\mathbb{R}}^2, \|\cdot \|_\P)$. \begin{theorem} \label{thm:geom} Let $\|\cdot\|_\P$ be a norm on ${\mathbb{R}}^2$ for which $\P$ is a quadrilateral, and let $(G,\theta)$ be a $\mathbb{Z}_2$-symmetric graph. Further, let $(G_0,\psi)$ be the gain graph for $(G,\theta)$. The following are equivalent. \begin{enumerate} \item[(i)] There exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p$ such that ${\mathcal{G}}=(G,p,\theta,\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$; \item[(ii)] $(G_0,\psi)$ is $(2,2,0)$-gain tight; \item[(iii)] $(G_0,\psi)$ can be constructed from disjoint copies of base graphs in Figure~\ref{fig:gain_cov_graphs} by a sequence of H1a,b,c moves, H2a,b,c,d,e moves, H3a,b,c,d moves, vertex-to-$K_4$ moves, and vertex splitting moves. \end{enumerate} \end{theorem} To show that (iii) implies (i), we rely on Theorem~\ref{thm:C2gridgeom}$(A)$. We split the proof into a number of geometric lemmas. In these lemmas, we will use the notation of Section~\ref{subsec:gaingraphs} and write $[v]$ and $[e]$ for a vertex and an edge of the gain graph $(G_0,\psi)$ for a $\mathbb{Z}_2$-symmetric graph $(G,\theta)$, respectively. Moreover, we let $\tilde{V}_0=\{\tilde{v}_1,\ldots,\tilde{v}_n\}$ be a choice of representatives for the vertex orbits of $(G,\theta)$. \begin{lemma} \label{lemma:h1} Let $(G_0,\psi)$ and $(G'_0,\psi')$ be the gain graphs of the $\mathbb{Z}_2$-symmetric graphs $(G,\theta)$ and $(G',\theta')$, respectively and suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H1a, H1b or H1c move. If for $(G'_0,\psi')$ there exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p'$ such that ${\mathcal{G}}=(G',p',\theta',\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$, then the same is true for $(G_0,\psi)$. \end{lemma} \begin{proof} By Theorem~\ref{thm:C2gridgeom}$(A)$, there exists a well-positioned ${\mathcal{C}}_2$-symmetric realisation $p'$ of $(G',\theta')$ in $({\mathbb{R}}^2,\|\cdot\|_\P)$ so that the induced monochrome subgraphs $G'_{F_1,0}$ and $G'_{F_2,0}$ of $(G'_0,\psi')$ are both spanning unbalanced map graphs. By Theorem~\ref{thm:C2gridgeom}$(A)$, it now suffices to show that the vertex of $G_0\setminus G'_0$ can be placed in such a way that the corresponding framework $(G,p,\theta, \tau)$ is ${\mathcal{C}}_2$-symmetric and well-positioned, and the induced monochrome subgraphs $G_{F_1,0}$ and $G_{F_2,0}$ are both spanning unbalanced map graphs in $(G_0,\psi)$. We fix two points $x_1$ and $x_2$ in the relative interiors of $F_1$ and $F_2$ respectively. Suppose first that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H1a move, where $[v]\in G_0\setminus G'_0$ is adjacent to the vertices $[v_1]$ and $[v_2]$ of $G'_0$ with respective gains $\gamma_1$ and $\gamma_2$. Set $p_w=p_w'$ for all vertices $w$ of $G$ with $[w]\neq[v]$. Let $a\in \mathbb{R}^2$ be the point of intersection of the lines $L_1=\{\tau(\gamma_1)p_{\tilde{v}_1}+tx_1:t\in \mathbb{R}\}$ and $L_2=\{\tau(\gamma_2)p_{\tilde{v}_2}+tx_2:t\in \mathbb{R}\}$ and let $B(a,r)$ be an open ball with centre $a$ and radius $r>0$. Choose $p_{\tilde{v}}$ to be any point in $B(a,r)$ which is distinct from $\{p_w:w\in V(G')\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then $(G,p,\theta, \tau)$ is a ${\mathcal{C}}_2$-symmetric bar-joint framework and, by applying a small perturbation to $p_{\tilde{v}}$ if necessary, we may assume that $(G,p,\theta, \tau)$ is well-positioned. If $r$ is sufficiently small then the induced framework colours for $[v][v_1]$ and $[v][v_2]$ are $[F_1]$ and $[F_2]$ respectively. Thus, the induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=G'_{F_1,0}\cup \{[v][v_1]\}$ and $G_{F_2,0}=G'_{F_2,0}\cup \{[v][v_2]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. If $(G_0,\psi)$ is obtained from $(G'_0,\psi)$ by a H1b move, then the proof is completely analogous to the proof above. Suppose $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H1c move, where $[v]\in G_0\setminus G'_0$ is incident to the unbalanced loop $[e]$ and adjacent to the vertex $[z]$ of $(G'_0,\psi')$ with gain $\gamma$. Let $a\in \mathbb{R}^2$ be the point of intersection of the lines $L_1=\{\tau(\gamma)p_{\tilde{z}}+tx_2:t\in \mathbb{R}\}$ and $L_2=\{tx_1:t\in \mathbb{R}\}$ and let $B(a,r)$ be an open ball with centre $a$ and radius $r>0$. Choose $p_{\tilde{v}}$ to be any point in $B(a,r)$ which is distinct from $\{p_w:w\in V(G')\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then, by applying a small perturbation to $p_{\tilde{v}}$ if necessary, $(G,p,\theta, \tau)$ is well-positioned and ${\mathcal{C}}_2$-symmetric, and the induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=G'_{F_1,0}\cup \{[e]\}$ and $G_{F_2,0}=G'_{F_2,0}\cup \{[v][z]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are unbalanced spanning map graphs of $(G_0,\psi)$. \end{proof} \begin{lemma} \label{lemma:h2} Let $(G_0,\psi)$ and $(G'_0,\psi')$ be the gain graphs of the $\mathbb{Z}_2$-symmetric graphs $(G,\theta)$ and $(G',\theta')$, respectively and suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2a, H2b, H2c, H2d, or H2e move. If for $(G'_0,\psi')$ there exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p'$ such that ${\mathcal{G}}=(G',p',\theta',\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$, then the same is true for $(G_0,\psi)$. \end{lemma} \begin{proof} By Theorem~\ref{thm:C2gridgeom}$(A)$, there exists a well-positioned ${\mathcal{C}}_2$-symmetric realisation $p'$ of $(G',\theta')$ in $({\mathbb{R}}^2,\|\cdot\|_\P)$ so that the induced monochrome subgraphs $G'_{F_1,0}$ and $G'_{F_2,0}$ of $(G'_0,\psi')$ are both spanning unbalanced map graphs. By Theorem~\ref{thm:C2gridgeom}$(A)$, it now suffices to show that the vertex of $G_0\setminus G'_0$ can be placed in such a way that the corresponding framework $(G,p,\theta, \tau)$ is ${\mathcal{C}}_2$-symmetric and well-positioned, and the induced monochrome subgraphs $G_{F_1,0}$ and $G_{F_2,0}$ are both spanning unbalanced map graphs in $(G_0,\psi)$. We fix two points $x_1$ and $x_2$ in the relative interiors of $F_1$ and $F_2$ respectively. Suppose first that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2a move where $[v]\in G_0\setminus G'_0$ subdivides the edge $[e]=[v_1][v_2]$ into the edges $[e_1]=[v][v_1]$ and $[e_2]=[v][v_2]$ with respective gains $\gamma_1$ and $\gamma_2$, and $[v]$ is also incident to the edge $[e_3]$ with end-vertex $[z]$ and gain $\gamma_3$. Without loss of generality we may assume that $[e]\in G'_{F_1,0}$. Let $a\in {\mathbb{R}}^2$ be the point of intersection of the line $L_1$ which passes through the points $\tau(\gamma_1)p_{\tilde{v}_1}$ and $\tau(\gamma_2)p_{\tilde{v}_2}$, and the line $L_2=\{\tau(\gamma_3)p_{\tilde{z}}+tx_2:t\in{\mathbb{R}}\}$. Let $B(a,r)$ be the open ball with centre $a$ and radius $r>0$ and choose $p_{\tilde{v}}$ to be a point in $B(a,r)$ which is distinct from $\{p_w:w\in G'\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then $(G,p,\theta,\tau)$ is ${\mathcal{C}}_2$-symmetric and, by applying a small perturbation to $p_{\tilde{v}}$ if necessary, we may assume it is well-positioned. If $r$ is sufficiently small then $[e_1]$ and $[e_2]$ have induced framework colour $[F_1]$ and $[e_3]$ has framework colour $[F_2]$. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e]\})\cup \{[e_1],[e_2]\}$ and $G_{F_2,0}=G'_{F_2,0}\cup \{[e_3]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. The cases where $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2b or a H2c move may be proved completely analogously to the case above for the H2a move. Next, we suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2d move where $[v]\in G_0\setminus G'_0$ subdivides the edge $[e]=[v_1][v_2]$ into the edges $[e_1]=[v][v_1]$ and $[e_2]=[v][v_2]$ with respective gains $\gamma_1$ and $\gamma_2$, and $[v]$ is also incident to the unbalanced loop $[e_3]$. Without loss of generality we may assume that $[e]\in G'_{F_1,0}$. Let $a\in \mathbb{R}^2$ be the point of intersection of the line $L_1$ which passes through the points $\tau(\gamma_1)p_{\tilde{v}_1}$ and $\tau(\gamma_2)p_{\tilde{v}_2}$ and the line $L_2=\{tx_2:t\in \mathbb{R}\}$, and let $B(a,r)$ be an open ball with centre $a$ and radius $r>0$. (Note that $a$ could possibly be the centre of the rotation $\tau(-1)$, i.e. the origin.) Choose $p_{\tilde{v}}$ to be a point in $B(a,r)$ which is distinct from $\{p_w:w\in G'\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then $(G,p,\theta,\tau)$ is ${\mathcal{C}}_2$-symmetric and if $r$ is sufficiently small then $[e_1]$ and $[e_2]$ have induced framework colour $[F_1]$. Moreover, by applying a perturbation to $p_{\tilde{v}}$ within $B(a,r)$ if necessary, we may assume that $[e_3]$ has framework colour $[F_2]$ and that $(G,p,\theta,\tau)$ is well-positioned. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e]\})\cup \{[e_1],[e_2]\}$ and $G_{F_2,0}=G'_{F_2,0}\cup \{[e_3]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. The case where $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2e move may be proved completely analogously to the case above for the H2d move. Here $B(a,r)$ is in fact centred at the origin. \end{proof} \begin{lemma} \label{lemma:h3} Let $(G_0,\psi)$ and $(G'_0,\psi')$ be the gain graphs of the $\mathbb{Z}_2$-symmetric graphs $(G,\theta)$ and $(G',\theta')$, respectively and suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3a, H3b, H3c, or H3d move. If for $(G'_0,\psi')$ there exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p'$ such that ${\mathcal{G}}=(G',p',\theta',\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$, then the same is true for $(G_0,\psi)$. \end{lemma} \begin{proof} By Theorem~\ref{thm:C2gridgeom}$(A)$, there exists a well-positioned ${\mathcal{C}}_2$-symmetric realisation $p'$ of $(G',\theta')$ in $({\mathbb{R}}^2,\|\cdot\|_\P)$ so that the induced monochrome subgraphs $G'_{F_1,0}$ and $G'_{F_2,0}$ of $(G'_0,\psi')$ are both spanning unbalanced map graphs. By Theorem~\ref{thm:C2gridgeom}$(A)$, it now suffices to show that the vertex of $G_0\setminus G'_0$ can be placed in such a way that the corresponding framework $(G,p,\theta, \tau)$ is ${\mathcal{C}}_2$-symmetric and well-positioned, and the induced monochrome subgraphs $G_{F_1,0}$ and $G_{F_2,0}$ are both spanning unbalanced map graphs in $(G_0,\psi)$. First we suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3a move where $[v]\in G_0\setminus G'_0$ subdivides the edge $[e]=[v_1][v_2]$ into the edges $[e_1]=[v][v_1]$ and $[e_2]=[v][v_2]$, and the edge $[f]=[v_3][v_4]$ into the edges $[f_1]=[v][v_3]$ and $[f_2]=[v][v_4]$. By switching $[v_1]$ and $[v_3]$ if necessary, we may assume without loss of generality that $[e]$ and $[f]$ have both gain $1$. The edges $[e_1],[e_2],[f_1],[f_2]$ will then also be assigned gain $1$. (The proof for the case where they are all assigned gain $-1$ is analogous.) We distinguish two cases. Case A: $[e]$ and $[f]$ belong to different induced monochrome subgraphs of $G'_0$, say $[e]\in G'_{F_1,0}$ and $[f]\in G'_{F_2,0}$. Let $a\in \mathbb{R}^2$ be the point of intersection of the line $L_1$ which passes through the points $p_{\tilde{v}_1}$ and $p_{\tilde{v}_2}$, and the line $L_2$ which passes through the points $p_{\tilde{v}_3}$ and $p_{\tilde{v}_4}$. Let $B(a,r)$ be an open ball with centre $a$ and radius $r>0$, and choose $p_{\tilde{v}}$ to be a point in $B(a,r)$ which is distinct from $\{p_w:w\in G'\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then $(G,p,\theta,\tau)$ is ${\mathcal{C}}_2$-symmetric and, by applying a small perturbation to $p_{\tilde{v}}$ if necessary, we may assume it is well-positioned. If $r$ is sufficiently small then $[e_1]$ and $[e_2]$ have induced framework colour $[F_1]$, and $[f_1]$ and $[f_2]$ have framework colour $[F_2]$. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e]\})\cup \{[e_1],[e_2]\}$ and $G_{F_2,0}=(G'_{F_2,0}\backslash\{[f]\})\cup \{[f_1],[f_2]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. Case B: $[e]$ and $[f]$ belong to the same induced monochrome subgraph of $G'_0$, say $[e],[f]\in G'_{F_1,0}$. We need the following claim. \begin{claim}\label{claimh3a} Let $p_1,p_2,p_3,p_4$ be four distinct points in $\mathbb{R}^2$ such that the line segments $p_1p_2$ and $p_3p_4$ both have framework colour $[F_1]$. Let $i\in\{1,2,3,4\}$. Then there exists an open set $N$ in $\mathbb{R}^2$ such that for every point $p_v\in N$, the line segment $p_vp_i$ has framework colour $[F_2]$ and the three line segments $p_vp_j$ with $j\in\{1,2,3,4\}, j\neq i$, have framework colour $[F_1]$. \end{claim} \begin{proof} Without loss of generality we may assume that $p_1$ lies to the left of $p_2$, and $p_3$ lies to the left of $p_4$ (see Figure~\ref{fig:h3aclaim} for an illustration). Moreover we may assume that $i=4$. \begin{figure}[htp] \begin{center} \begin{tikzpicture}[very thick,scale=0.6] \tikzstyle{every node}=[circle, draw=black, fill=white, inner sep=0pt, minimum width=5pt]; \filldraw[rectangle, gray](1.5,1.5)--(2,1)--(3,2)--(2.5,2.5)--(1.5,1.5); \filldraw[rectangle, gray](0.5,-0.5)--(2,1)--(3.5,-0.5)--(2,-2)--(0.5,-0.5); \filldraw[rectangle, white!70!black](8,0.5)--(6,2.5)--(4,0.5)--(6,-1.5)--(8,0.5); \filldraw[rectangle, white!70!black](8,0.5)--(8.5,0)--(10,1.5)--(9.5,2)--(8,0.5); \filldraw[rectangle, white!70!black](10,1.5)--(11.5,3)--(14.5,0)--(13,-1.5)--(10,1.5); \node [draw=white, fill=white] (a) at (-0.6,0) {$p_3$}; \node [draw=white, fill=white] (a) at (2.6,1) {$p_4$}; \node [draw=white, fill=white] (a) at (8,1.1) {$p_1$}; \node [draw=white, fill=white] (a) at (10,2.1) {$p_2$}; \draw(0,0) circle(0.1cm); \draw(2,1) circle(0.1cm); \draw(8,0.5) circle(0.1cm); \draw(10,1.5) circle(0.1cm); \draw(-2,-2)--(2.5,2.5); \draw(2,-2)--(-2,2); \draw(2,1)--(0.5,-0.5); \draw(2,1)--(1.5,1.5); \draw(2,1)--(3,2); \draw(2,1)--(3.5,-0.5); \draw(8,0.5)--(6,2.5); \draw(10,1.5)--(11.5,3); \draw(8,0.5)--(8.5,0); \draw(8.5,0)--(10,-1.5); \draw(8.5,0)--(10,1.5); \draw(9.5,2)--(10,1.5); \draw(9.5,2)--(6,-1.5); \draw(8.5,0)--(7,-1.5); \draw(10,1.5)--(13,-1.5); \draw(9.5,2)--(8.5,3); \end{tikzpicture} \end{center} \vspace{-0.2cm} \caption{Illustration of the proof of Claim~\ref{claimh3a}.} \label{fig:h3aclaim} \end{figure} We need to find an open set $N$ which lies within the two shaded areas in Figure~\ref{fig:h3aclaim}. Note that the shaded area on the left hand side of Figure~\ref{fig:h3aclaim} is connected, and unbounded from below and above. The shaded area on the right hand side of Figure~\ref{fig:h3aclaim} is also connected, and unbounded from the left and right. Since $p_1,p_2,p_3,p_4$ are distinct points, the shaded areas will always have a nontrivial intersection, and we may choose $N$ within that intersection. \end{proof} Suppose first that $[e]$ and $[f]$ lie on a common (unbalanced) cycle in $G'_{F_1,0}$. Without loss of generality, we may assume that this cycle consists of a path $P_1$ from $[v_2]$ to $[v_3]$ with an odd number of edges with gain $-1$, and a path $P_2$ from $[v_1]$ to $[v_4]$ with an even number of edges with gain $-1$. Then we choose $p_{\tilde{v}}$ to be a point which is distinct from $\{p_w:w\in G'\}$, not fixed by $\tau(-1)$, and such that $(G,p,\theta,\tau)$ is well-positioned and in $(G_0,\psi)$ the edges $[e_1], [e_2], [f_1]$ have framework colour $[F_1]$, and $[f_2]$ has framework colour $[F_2]$. Such a position for $p_{\tilde{v}}$ exists by Claim~\ref{claimh3a}. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e],[f]\})\cup \{[e_1],[e_2],[f_1]\}$ and $G_{F_2,0}=(G'_{F_2,0})\cup \{[f_2]\}$. Clearly, $G_{F_2,0}$ is a spanning unbalanced map graph of $(G_0,\psi)$. As for $G_{F_1,0}$, note that the removal of $[e]$ and $[f]$ from $G'_{F_1,0}$ breaks the connected component of $G'_{F_1,0}$ containing $[e]$ and $[f]$ into the two disjoint trees. By adding the vertex $[v]$ and the edges $[e_1],[e_2],[f_1]$, these two trees are reconnected and a single unbalanced cycle (consisting of $P_1$, $[e_2]$ and $[f_1]$) is created in this connected component of $G_{F_1,0}$. If $[e]$ and $[f]$ do not lie on a common cycle in $G'_{F_1,0}$, but they are still in the same connected component $K'$ of $G'_{F_1,0}$, then we may proceed as above. However, if either $[e]$ or $[f]$, say $[e]$, lies on the unique cycle $C'$ in $K'$, and without loss of generality there exists a path in $K'$ from a vertex in $C'$ to $[v_4]$ that does not include $[v_3]$, then we need to choose $p_{\tilde{v}}$ so that $[e_1]$ and $[e_2]$ both have framework colour $[F_1]$, and $[f_1]$ and $[f_2]$ have respective framework colours $[F_1]$ and $[F_2]$. This guarantees that the unbalanced cycle $C=C'\backslash\{[e]\}\cup\{[e_1],[e_2]\}$ in the corresponding component of $G_{F_1,0}$ is unique. If $[e]$ and $[f]$ lie in different connected components $K'$ and $K''$ of $G'_{F_1,0}$, then we may again proceed as above. However, care needs to be taken in the case where either $[e]$ or $[f]$, say $[e]$, lies on the unique cycle $C'$ in $K'$, and $[f]$ does not lie on the cycle of $K''$. In this case we choose $p_{\tilde{v}}$ so that $[e_1]$ and $[e_2]$ have framework colours $[F_1]$ and $[F_2]$, and $[f_1]$ and $[f_2]$ both have framework colour $[F_1]$, so that $G_{F_1,0}$ will not have a connected component with two cycles. Similarly, if neither $[e]$ nor $[f]$ lie on the cycle in their respective connected components, then we need to choose $p_{\tilde{v}}$ so that the three new edges with framework colour $[F_1]$ do not give rise to a connected component of $G_{F_1,0}$ that has two cycles. Next, we suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3b move where $[v]\in G_0\setminus G'_0$, and the H3b move deletes the edges $[e]=[v_1][v_2]$ and $[f]=[v_1][v_3]$ and adds the edges $[e_1]=[v][v_1]$ and $[e_1']=[v][v_1]$, and the edges $[e_2]=[v][v_2]$ and $[e_3]=[v][v_3]$. By switching $[v_2]$ and $[v_3]$ if necessary, we may assume that $[e]$ and $[f]$ have gain $1$. The edges $[e_1]$ and $[e_1']$ are assigned the gains $1$ and $-1$, respectively, and the edges $[e_2],[e_3]$ are assigned the gains $1$ and $-1$, respectively. We distinguish two cases. Case A: $[e]$ and $[f]$ belong to different induced monochrome subgraphs of $G'_0$, say $[e]\in G'_{F_1,0}$ and $[f]\in G'_{F_2,0}$. Let $a\in {\mathbb{R}}^2$ be the point of intersection of the line $L_1$ which passes through the points $p_{\tilde{v}_1}$ and $p_{\tilde{v}_2}$, and the line $L_2$ which passes through the points $\tau(-1)p_{\tilde{v}_1}$ and $\tau(-1)p_{\tilde{v}_3}$. Let $B(a,r)$ be the open ball with centre $a$ and radius $r>0$ and choose $p_{\tilde{v}}$ to be a point in $B(a,r)$ which is distinct from $\{p_w:w\in G'\}$ and which is not fixed by $\tau(-1)$. Set $p_{-\tilde{v}}=\tau(-1)p_{\tilde{v}}$. Then $(G,p,\theta, \tau)$ is ${\mathcal{C}}_2$-symmetric and, by applying a small perturbation to $p_{\tilde{v}}$ if necessary, we may assume it is well-positioned. If $r$ is sufficiently small then $[e_1]$ and $[e_2]$ have induced framework colour $[F_1]$, and $[e_1']$ and $[e_3]$ have framework colour $[F_2]$. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e]\})\cup \{[e_1],[e_2]\}$ and $G_{F_2,0}=(G'_{F_2,0}\backslash\{[f]\})\cup \{[e_1'],[e_3]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. Case B: $[e]$ and $[f]$ belong to the same induced monochrome subgraph of $G'_0$, say $[e],[f]\in G'_{F_1,0}$. Suppose first that $[e]$ and $[f]$ lie on a common cycle in $G'_{F_1,0}$. Then we may apply Claim~\ref{claimh3a} to the points $p_{\tilde{v}_1}, \tau(-1)p_{\tilde{v}_1},p_{\tilde{v}_2},\tau(-1)p_{\tilde{v}_3}$ to find a position for $p_{\tilde{v}}$ so that it is distinct from $\{p_w:w\in G'\}$, not fixed by $\tau(-1)$, and such that $(G,p,\theta,\tau)$ is well-positioned and in $(G_0,\psi)$ the edges $[e_1],[e_1']$ and $[e_2]$ have framework colour $[F_1]$, and $[e_3]$ has framework colour $[F_2]$. The induced monochrome subgraphs of $(G_0,\psi)$ are $G_{F_1,0}=(G'_{F_1,0}\backslash\{[e],[f]\})\cup \{[e_1],[e_1'],[e_2]\}$ and $G_{F_2,0}=G'_{F_2,0}\cup \{[e_3]\}$. Clearly, $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. Suppose next that $[e]$ and $[f]$ do not lie on a common cycle in $G'_{F_1,0}$. If either $[e]$ or $[f]$, say $[e]$, lies on a cycle in $G'_{F_1,0}$, then we proceed as above, but we need to choose $p_{\tilde{v}}$ so that the edges $[e_1],[e_1']$ and $[e_3]$ have framework colour $[F_1]$, and $[e_2]$ has framework colour $[F_2]$ to guarantee that $G_{F_1,0}$ is a spanning unbalanced map graph of $(G_0,\psi)$. If neither $[e]$ nor $[f]$ lie on a cycle in $G'_{F_1,0}$, then we need to distinguish two cases. Let $C$ be the cycle in the connected component of $G'_{F_1,0}$ containing the edges $[e],[f]$. If there exists a path in $G'_{F_1,0}$ from a vertex in $C$ to $[v_2]$ or $[v_3]$ that does not include $[v_1]$, then we may again proceed as above. Otherwise we choose a position for $p_{\tilde{v}}$ so that it is distinct from $\{p_w:w\in G'\}$, not fixed by $\tau(-1)$, and such that $(G,p,\theta,\tau)$ is well-positioned and in $(G_0,\psi)$ the edges $[e_1]$ and $[e_1']$ have respective framework colours $[F_1]$ and $[F_2]$, and $[e_2]$ and $[e_3]$ both have framework colour $[F_1]$. Suppose next that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3c move where $[v]\in G_0\setminus G'_0$, and the H3c move deletes the unbalanced loop $[e]=[v_1][v_1]$ and the edge $[f]=[v_2][v_3]$ and adds the edges $[e_1]=[v][v_1]$ and $[e_1']=[v][v_1]$ with respective gains $\gamma_1=1\neq -1= \gamma_1'$, and the edges $[e_2]=[v][v_2]$ and $[e_3]=[v][v_3]$ with respective gains $\gamma_2$ and $\gamma_3$. This case is completely analogous to the H3a case. If $[e]$ and $[f]$ belong to different induced monochrome subgraphs of $G'_0$, say $[e]\in G'_{F_1,0}$ and $[f]\in G'_{F_2,0}$, then we may choose $p_{\tilde{v}}$ so that $[e_1]$ and $[e_1']$ have induced framework colour $[F_1]$, and $[e_2]$ and $[e_3]$ have induced framework colour $[F_2]$. If $[e]$ and $[f]$ belong to the same induced monochrome subgraph of $G'_0$, say $[e],[f]\in G'_{F_1,0}$, then Claim~\ref{claimh3a} applies, and we may choose $p_{\tilde{v}}$ so that $[e_1]$ and $[e_1']$ have induced framework colour $[F_1]$, and $[e_2]$ and $[e_3]$ have respective framework colours $[F_1]$ and $[F_2]$, so that $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. If $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3d move, then we may again proceed analogously to the H3a (or H3c) case. Note that if the loops $[e]$ and $[f]$ that are deleted in the H3d move are both in the same induced monochrome subgraph of $G'_0$, say $[e],[f]\in G'_{F_1,0}$, then they must lie in separate connected components of $G'_{F_1,0}$ (since they are both unbalanced cycles). So their removal results in two disjoint trees. With the addition of the vertex $[v]$ and the edges $[e_1],[e_1'],[e_2]$, these two trees are connected and a single (unbalanced) cycle is created in this connected component of $G_{F_1,0}$. \end{proof} \begin{lemma} \label{lemma:furthergeomoves} Let $(G_0,\psi)$ and $(G'_0,\psi')$ be the gain graphs of the $\mathbb{Z}_2$-symmetric graphs $(G,\theta)$ and $(G',\theta')$, respectively and suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a vertex-to-$K_4$ or vertex splitting move. If for $(G'_0,\psi')$ there exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p'$ such that ${\mathcal{G}}=(G',p',\theta',\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$, then the same is true for $(G_0,\psi)$. \end{lemma} \begin{proof} By Theorem~\ref{thm:C2gridgeom}$(A)$, there exists a well-positioned ${\mathcal{C}}_2$-symmetric realisation $p'$ of $(G',\theta')$ in $({\mathbb{R}}^2,\|\cdot\|_\P)$ so that the induced monochrome subgraphs $G'_{F_1,0}$ and $G'_{F_2,0}$ of $(G'_0,\psi')$ are both spanning unbalanced map graphs. By Theorem~\ref{thm:C2gridgeom}$(A)$, it now suffices to show that the vertex (or vertices) of $G_0\setminus G'_0$ can be placed in such a way that the corresponding framework $(G,p,\theta, \tau)$ is ${\mathcal{C}}_2$-symmetric and well-positioned, and the induced monochrome subgraphs $G_{F_1,0}$ and $G_{F_2,0}$ are both spanning unbalanced map graphs in $(G_0,\psi)$. We fix two points $x_1$ and $x_2$ in the relative interiors of $F_1$ and $F_2$ respectively. First we suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a vertex-to-$K_4$-move, where the vertex $[v]$ of $(G'_0,\psi')$ (which may be incident to an unbalanced loop $[e]$) is replaced by a copy of $K_4$ with a trivial gain labelling (and $[e]$ is replaced by the edge $[f]$ with gain $-1$). Suppose without loss of generality that the loop $[e]$ (if present) has framework colour $[F_2]$. As shown in Figure~\ref{fig:gain_cov_graphs}, $K_4$ has a well-positioned placement in $({\mathbb{R}}^2,\|\cdot\|_\P)$ where the two monochrome subgraphs are both trees. Moreover, we may scale this realisation so that all of the vertices of the $K_4$ lie in a ball of arbitrarily small radius. Let $B(p_{\tilde{v}},r)$ be the open ball with centre $p_{\tilde{v}}$ and radius $r>0$. Choose a placement of the representative vertices of the new $K_4$ to lie within $B(p_{\tilde{v}},r)$ such that the vertices are distinct from $\{p_w:w\in V(G')\backslash\{\tilde{v}\}\}$, none of the vertex placements are fixed by $\tau(-1)$ and the resulting placement of the new $K_4$ is such that the monochrome subgraphs are both trees. If $r$ is sufficiently small then the edge $[f]$ (if present) has the induced framework colour $[F_2]$. It can be assumed that the corresponding ${\mathcal{C}}_2$-symmetric placement of $G$ is well-positioned. Moreover, the induced monochrome subgraphs $G_{F_1,0}$ and $G_{F_2,0}$ of $G_0$ are clearly spanning unbalanced map graphs of $(G_0,\psi)$. Finally, we suppose that $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a vertex split, where the vertex $[v]$ of $(G'_0,\psi')$ (which is replaced by the vertices $[v_0]$ and $[v_1]$) is incident to the edge $[v][u]$ with trivial gain and the edges $[v][u_i]$, $i=1,\ldots, t$, in $G'_0$. Without loss of generality we may assume that $[v][u]\in G'_{F_1,0}$. If we choose $p_{\tilde{v}_0}=p_{\tilde{v}}$ and $p_{\tilde{v}_1}$ to be a point on the line $L=\{p_{\tilde{v}}+tx_2:t\in {\mathbb{R}}\}$ which is sufficiently close to $p_{\tilde{v}}$, then the induced framework colour for $[v_0][v_1]$ is $[F_2]$ and the induced framework colour for $[v_0][u]$ and $[v_1][u]$ is $[F_1]$. (Again we may assume the framework is well-positioned). Moreover, all other edges of $(G'_0,\psi')$ which have been replaced by new edges in $(G_0,\psi)$ clearly retain their induced framework colouring if $p_{\tilde{v}_1}$ is chosen sufficiently close to $p_{\tilde{v}}$. It is now easy to see that for such a placement of $\tilde{v}_0$ and $\tilde{v}_1$, both $G_{F_1,0}$ and $G_{F_2,0}$ are spanning unbalanced map graphs of $(G_0,\psi)$. \end{proof} We are now ready to prove Theorem~\ref{thm:geom}. \begin{proof} As mentioned earlier, (i) $\Rightarrow$ (ii) follows from Corollary~\ref{cor:neccounts}, and (ii) $\Rightarrow$ (iii) follows from Theorem~\ref{thm:recurse}. (iii) $\Rightarrow$ (i): We employ induction on the number of vertices of $G_0$. By Theorem~\ref{thm:C2gridgeom}$(A)$, for each of the base gain graphs there exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2,\|\cdot\|_\infty)$ and a realisation $p$ such that ${\mathcal{G}}=(G,p,\theta, \tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\infty)$, as indicated in Figure~\ref{fig:gain_cov_graphs}. (The two induced spanning map graphs $G_{F_1,0}$ and $G_{F_2,0}$ are shown in gray and black colour, respectively.) Since $({\mathbb{R}}^2,\|\cdot\|_\P)$ is isometrically isomorphic to $({\mathbb{R}}^2,\|\cdot\|_\infty)$, there also exists a well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic realisation for each of the base graphs in $({\mathbb{R}}^2,\|\cdot\|_\P)$. Let $n\geq 5$ and suppose (i) holds for all gain graphs satisfying (iii) with at most $n-1$ vertices. Let $(G_0,\psi)$ have $n$ vertices, and let $(G'_0,\psi')$ be the penultimate graph in the construction sequence of $(G_0,\psi)$. By the induction hypothesis, there exists a realisation $p'$ of the covering graph $G'$ of $(G'_0,\psi')$ in $({\mathbb{R}}^2,\|\cdot\|_\P)$ so that $(G',p',\theta',\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_0$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$. If $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H1a, H1b, or H1c move, then the result follows from Lemma~\ref{lemma:h1}. If $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H2a, H2b, H2c, H2d or H2e move, then the result follows from Lemma~\ref{lemma:h2}. If $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a H3a, H3b, H3c, or H3d move, then the result follows from Lemma~\ref{lemma:h3}. Finally, if $(G_0,\psi)$ is obtained from $(G'_0,\psi')$ by a vertex-to-$K_4$ or vertex splitting move, then the result follows from Lemma~\ref{lemma:furthergeomoves}. \end{proof} Next we establish the $\chi_1$-symmetric counterpart to Theorem~\ref{thm:geom}. The proof of this result is much simpler than the proof of Theorem~\ref{thm:geom} since the characterisation of $(2,2,2)$-gain-tight gain graphs in terms of a recursive construction sequence is significantly less complex than the one for $(2,2,0)$-gain-tight gain graphs. \begin{theorem} \label{thm:geom2} Let $\|\cdot\|_\P$ be a norm on ${\mathbb{R}}^2$ for which $\P$ is a quadrilateral, and let $(G,\theta)$ be a $\mathbb{Z}_2$-symmetric graph. Further, let $(G_0,\psi)$ be the gain graph for $(G,\theta)$. The following are equivalent. \begin{enumerate} \item[(i)] There exists a representation $\tau:\mathbb{Z}_2\to \operatorname{Isom}(\mathbb{R}^2)$ and a realisation $p$ such that ${\mathcal{G}}=(G,p,\theta,\tau)$ is well-positioned, ${\mathcal{C}}_2$-symmetric and $\chi_1$-symmetrically isostatic in $({\mathbb{R}}^2,\|\cdot\|_\P)$; \item[(ii)] $(G_0,\psi)$ is $(2,2,2)$-gain tight; \item[(iii)] $(G_0,\psi)$ can be constructed from $K_1$ by a sequence of H1a,b moves, H2a,b moves, vertex-to-$K_4$ moves, and vertex splitting moves. \end{enumerate} \end{theorem} \begin{proof} (i) $\Rightarrow$ (ii): This follows again from Corollary~\ref{cor:neccounts}. (ii) $\Rightarrow$ (iii): The proof proceeds by induction. Since $(G_0,\psi)$ is $(2,2,2)$-gain-tight, it has no loops. If $G_0$ has a vertex $[v]$ of degree $2$, then it is clearly admissible (via an inverse H1a or H1b move). So suppose $G_0$ has no degree 2 vertices. By $(2,2,2)$-gain-tightness, $G_0$ has a vertex $[v]$ of degree 3 with at least two neighbours. If $[v]$ has exactly two neighbours, then it is admissible (via an inverse H2b move, see also Lemma~\ref{lem:3threeii}). Thus we may assume that every degree 3 vertex $[v]$ of $G_0$ has exactly three neighbours. It is easy to see that $[v]$ is admissible (via an inverse H2a move) unless it is contained in a balanced copy of $K_4$. (See also Lemma~\ref{lem:3threei}). The vertices of this $K_4$ cannot induce any additional edges since $(G_0,\psi)$ is $(2,2,2)$-gain-tight. Denote this copy of $K_4$ as $K$. We may apply an inverse vertex-to-$K_4$ move unless there is a vertex $[x]\notin K$ and edges $[x][a]$ and $[x][b]$ with equal gains, where $[a],[b]\in K$. By switching, we may assume that both gains are $1$. We may now apply an inverse vertex splitting move, contracting either $[x][a]$ and $[x][b]$, unless there exist vertices $[y]$ and $[z]$ that are distinct from the vertices of $K$ and $[x]$ so that $[y][x]$ and $[y][a]$ are edges in $(G_0,\psi)$ with the same gain, and $[z][x]$ and $[z][b]$ are edges in $(G_0,\psi)$ with the same gain. By switching, we may again assume that the gains of these edges are all $1$. We continue in this fashion, thereby constructing an increasing chain of subgraphs of $(G_0,\psi)$ which are all $(2,2,2)$-gain tight and whose edges have all gain $1$. (Note that at each step a new vertex is introduced for otherwise $(2,2,2)$-gain-sparsity is violated.) This sequence terminates after finitely many steps at which point there will be an admissible inverse vertex splitting move. (iii) $\Rightarrow$ (i): Using Theorem~\ref{thm:C2gridgeom}$(B)$, this result may be proved completely analogously to Theorem~\ref{thm:geom} (iii) $\Rightarrow$ (i). \end{proof} \section{Concluding remarks} One may be tempted to try to combine Theorems \ref{thm:geom} and \ref{thm:geom2} to combinatorially characterise infinitesimal rigidity for half-turn symmetric frameworks. However this seems to be non-trivial. In particular, given a gain graph which contains a spanning $(2,2,2)$-gain-tight subgraph and a spanning $(2,2,0)$-gain-tight subgraph it is not clear that a placement exists that preserves both the colourings needed to apply Theorem~\ref{thm:C2gridgeom}$(C)$. It is also natural to try to extend Theorems~\ref{thm:geom} and \ref{thm:geom2} to higher-order groups, such as the cyclic group ${\mathcal{C}}_4$ generated by a 4-fold rotation in the $\ell^1$- or $\ell^\infty$-plane. In this case, Corollary~\ref{cor:neccounts} provides necessary gain-sparsity conditions for $\chi$-symmetric infinitesimal rigidity. However, we are currently lacking analogues of Theorems~\ref{thm:C2gridgeom}$(A)$ and \ref{thm:C2gridgeom}$(B)$ to prove the sufficiency of these counts. There is a second form of vertex splitting, known as the vertex-to-4-cycle move \cite{LMW,NOP14}, which one may use instead of vertex splitting to give analogous inductive constructions to Theorem \ref{thm:recurse} and Theorem \ref{thm:geom2} (ii) $\Leftrightarrow$ (iii). In fact, in the case of $(2,2,0)$-gain-tight gain graphs, this alternative gives a non-trivial simplification to the proof, replacing the maximal balanced triangle sequence considerations with a direct counting argument. However in both the symmetric and anti-symmetric contexts this construction operation does not seem to be amenable to finding appropriate rigid placements. In \cite{NS} symmetric rigidity is considered for frameworks in Euclidean space that are restricted to move on a fixed surface. In particular the matroidal classes of $(2,2,2), (2,2,1)$ and $(2,2,0)$-gain-tight gain graphs are the relevant sparsity types for frameworks restricted to an infinite circular cylinder. Hence our recursive construction of $(2,2,0)$-gain-tight gain graphs may be useful in establishing an analogue of Theorem \ref{thm:geom} for the appropriate symmetry group, that is for half-turn symmetric frameworks on the cylinder with rotation axis perpendicular to the axis of the cylinder.
\subsection{Software vulnerability \label{subsec:Query:-Software-vulnerability}} This application asks if a piece of source code is potentially vulnerable to security risks. In particular, we consider each Java class as a piece, which consists of attribute declarations and methods. A class is then represented as a graph, where nodes are methods and edges are function calls between methods (thus, there is only one relation type). Class-level declaration is used as query, and the answer is binary indicator of vulnerability. The dataset was collected from \cite{dam2017automatic}, which consists of 18 Java projects. The dataset is pre-processed by removing all replicated files of different versions in the same projects. This results in 2,836 classes of which 1,020 are potentially vulnerable. Embedding of graph nodes and query is pretrained as follows. Methods and attribute declarations of Java classes are treated as sequences of code tokens and their representation is learned through language modeling using LSTM, that is to predict the next token $w_{t}$ given previous tokens $\wb_{1:t-1}$ via $P\left(w_{t}\mid\wb_{1:t-1}\right)$. Rare tokens are collectively designated as \texttt{\textless UNK\textgreater}. The feature vector of each sequence is the mean of all hidden states outputted by the LSTM. After this step, each sequence is represented as a feature vector of 128 units. For comparison, we implemented three strong non-neural classifiers: Support Vector Machine (SVM), Random Forest (RF) and Gradient Boosting Machine (GBM) running on the averaged feature vector of all methods and attribute declarations. Fig.~\ref{fig:Performance-on-Code} reports the performance measured by AUC (Area under the ROC curve) and F1-score for $\Model$ and these three classifiers. $\Model$ is competitive, although the improvement over the best performing method (GBM) is not large (2 points on AUC and 1 point on F1-score). \begin{figure}[h] \centering{}\includegraphics[viewport=100bp 0bp 550bp 400bp,clip,width=0.7\textwidth]{code_classify_res}\caption{Performance on code vulnerability detection, measured in AUC and F1-score (\%). Best viewed in color.\label{fig:Performance-on-Code}} \end{figure} \subsection{Molecular bioactivities \label{subsec:Query:-Molecular-activities}} This application asks if a chemical compound is biologically active on a given disease. Here each compound molecule is represented as a graph, where nodes are atoms and edges are bond types between them. Activity and disease form a query (e.g., coded as an one-hot vector). The answer will be binary indicator of the activity with respect to the given disease. \paragraph{Datasets} We conducted experiments on nine NCI BioAssay activity tests collected from the PubChem website\footnote{https://pubchem.ncbi.nlm.nih.gov/}. Seven of them are activity tests of chemical compounds against different types of cancer: breast, colon, leukemia, lung, melanoma, central nerve system and renal. The others are AIDS antiviral assay and Yeast anticancer drug screen. Each BioAssay test contains records of activities for chemical compounds. We chose the two most common activities for classification: ``active'' and ``inactive''. The statistics of data is reported in Table~\ref{tab:data-statistics}. The datasets are listed by the ascending order of number of active compounds. ``\# Graph'' is the number of graphs and ``\# Active'' is the number of active graph against a BioAssay test These datasets are unbalanced, therefore ``inactive'' compounds are randomly removed so that the Yeast Anticancer dataset has 25,000 graphs and each of the other datasets has 10,000 graphs. \begin{table}[h] \centering{}\caption{Summary of 9 NCI BioAssay datasets.\label{tab:data-statistics}} \begin{tabular}{cccc} \hline No. & Dataset & \# Active & \# Graph\tabularnewline \hline 1 & AIDS Antiviral & 1513 & 41,595\tabularnewline 2 & Renal Cancer & 2,325 & 41,560\tabularnewline 3 & Central Nervous System & 2,430 & 42,473\tabularnewline 4 & Breast Cancer & 2,490 & 29,117\tabularnewline 5 & Melanoma & 2,767 & 39,737\tabularnewline 6 & Colon Cancer & 2,766 & 42,130\tabularnewline 7 & Lung Cancer & 3,026 & 38,588\tabularnewline 8 & Leukemia & 3,681 & 38,933\tabularnewline 9 & Yeast Anticancer & 10,090 & 86,130\tabularnewline \hline \end{tabular} \end{table} We used RDKit\footnote{http://www.rdkit.org/} to extract the structure of molecules, the atom and the bond features. An atom feature vector is the concatenation of the one-hot vector of the atom and other features such as atom degree and number of H atoms attached. We also make use of bond features such as bond type and a binary value indicating if a bond is in a ring. \subsubsection{Experiment settings} \paragraph{Baselines} For comparison, we use several baselines: \begin{itemize} \item \emph{Classic classifiers running on feature vectors extracted from molecular graphs}. Classifiers are Support Vector Machine (SVM), Random Forest (RF), Gradient Boosting Machine (GBM), and multi-task neural network (MT-NN) \cite{ramsundar2015massively}. For feature extraction, following the standard practice in the computational chemistry literature, we use the RDKit to extract molecular fingerprints -- the encoding of the graph structure of the molecules by a vector of binary digits, each presents the presence or absence of particular substructures in the molecules. There are different algorithms to achieve molecular fingerprints and the state of the art is the extended-connectivity circular fingerprint (ECFP) \cite{rogers2010extended}. The dimension of the fingerprint features is set by 1,024. SVM, RF and GBM predict one activity at a time, but MT-NN predict all activities at the same time. \item \emph{Neural graphs which learn to extract features}. In particular, we use Neural Fingerprint (NeuralFP) \cite{duvenaud2015convolutional}. This predicts one activity at a time. \end{itemize} \paragraph{Model setting} We set the number of hops to $T=10$ following recommendation in \cite{pham2016faster}. Other hyper-parameters are tuned on the validation dataset. \subsubsection{Results} \paragraph{The impact of joint training} We have options to train each task separately (query set to unity, one memory per task) or to train jointly (query is an one-hot vector, shared memory for all tasks). To investigate more on how multi-task learning impacts the performance of each task, we reports the F1-score of $\Model$ in both separate and joint training settings on each of the nine datasets (Fig.~\ref{fig:F1-score-each-dataset}). Joint training with $\Model$ model improves the performance of seven datasets on different types of cancers by 10\%-20\% on each task. However, it has little effect on AIDS antiviral and Yeast anticancer datasets. These could be explained by the fact that cancers share similar genomic footprints and thus each cancer can borrow the strength of statistics of the cancer family. This does not hold for the other conditions, which are very different from the rest. However, joint training is still desirable because we need to maintain just one model for all queries. \begin{figure}[h] \centering{}\includegraphics[viewport=40bp 0bp 655bp 470bp,clip,width=0.8\textwidth]{f1-score}\caption{The comparison in performance of $\protect\Model$ when training separately ($\protect\Model$-Sep) and jointly ($\protect\Model$-Joint) for all datasets. Best viewed in color.\label{fig:F1-score-each-dataset}} \end{figure} \paragraph{The impact of more tasks} We evaluate how the performance of $\Model$ on a particular dataset is affected by the number of tasks. We chose AIDS antiviral, Breast Cancer and Colon Cancer as the experimental datasets. For each experimental dataset, we start to train it and then repeatedly add a new task and retrain the model. The orders of the first three new tasks are: (AIDS, Breast, Colon) for AIDS antiviral dataset, (Breast, AIDS, Colon) for Breast Cancer dataset and (Colon, AIDS, Breast) for Colon Cancer dataset. The orders of the remaining tasks are the same for three datasets: (Leukemia, Lung, Melanoma, Nerve, Renal and Yeast). Fig.~\ref{fig:increasing_n_tasks} illustrates the performance of the three chosen datasets with different number of jointly training tasks. The performance of Breast and Colon Cancer datasets decreases when jointly trained with AIDS antiviral task, increases after adding more tasks, and then remains steady or slightly reduces after seven tasks. Joint training does not improve the performance on the AIDS antiviral dataset. \begin{figure}[h] \centering{}% \begin{tabular}{cc} \includegraphics[viewport=10bp 0bp 540bp 420bp,clip,width=0.48\textwidth]{AUC_change} & \includegraphics[viewport=10bp 0bp 540bp 420bp,clip,width=0.48\textwidth]{F1_change}\tabularnewline (a) & (b)\tabularnewline \end{tabular}\caption{The performance of three datasets when increasing the number of jointly training tasks, reported in (a) AUC and (b) F1-score.\label{fig:increasing_n_tasks}} \end{figure} \paragraph{Comparative results} Table~\ref{tab:Results-all} reports results, measured in Micro F1-score, Macro F1-score and the average AUC over all datasets. The best method for separated training on fingerprint features is SVM with 66.4\% of Micro F1-score and on graph structure is $\Model$ with the improvement of 2.7\% over the non-structured classifiers. The joint learning settings improve by 9.1\% of Micro F1-score and 10.7 \% of Macro F1-score gain on fingerprint features and 8.7\% of Micro F1-score and 11.6\% of Macro F1-score gain on graph structure. \begin{table} \centering{}\caption{Performance over all datasets, measured in Micro F1, Macro F1 and the average AUC. \label{tab:Results-all}} \begin{tabular}{cccc} \hline Model & MicroF1 & MacroF1 & Average AUC\tabularnewline \hline SVM & 66.4 & 67.9 & 85.1\tabularnewline RF & 65.6 & 66.4 & 84.7\tabularnewline GB & 65.8 & 66.9 & 83.7\tabularnewline \hline NeuralFP \cite{duvenaud2015convolutional} & 68.2 & 67.6 & 85.9\tabularnewline MT-NN \cite{ramsundar2015massively} & 75.5 & 78.6 & 90.4\tabularnewline $\Model$ & \textbf{77.8} & \textbf{80.3} & \textbf{92.1}\tabularnewline \hline \end{tabular} \end{table} \subsection{Chemical-chemical interaction (CCI) \label{subsec:Query:-Chemical-reaction}} For this application we asks if two or more molecules interacts. Here the queries can be about the strength of interaction given environmental conditions (e.g., solution, temperature, pressure, presence of catalysts). \paragraph{Datasets} We conducted experiments on chemical-chemical interaction data downloaded from the STITCH database \cite{kuhn2007stitch} (Search Tool for InTeractions of CHemicals), a network of nearly 1M chemical interactions for over 68K different chemicals. Each interaction between two chemicals has confidence score from 0 to 999. Following \cite{kwon2018end}, we extracted \emph{positive-900} (11,764 examples) and \emph{positive-800} (92,998) from interactions with confidence scores more than 900 and 800, respectively and extract \emph{negative-0} (425,482 samples) from interactions with confidence scores equal to zero. We then created the CCI900 dataset from all the positive samples in positive-900 and the same number of negative samples randomly drawn from negative-0. CCI800 was also created similarly. Therefore, two datasets used for the experiments - CCI900 and CCI800 have 23,528 and 185,990 samples, respectively. The molecules were downloaded from the PubChem database using CID (Compound ID) shown in STITCH. The tool RDKit\footnote{http://www.rdkit.org/} was used to extract graph structures, atom and bond features, fingerprints and SMILES of the molecules. \subsubsection{Experiment settings} We designed experiments on three different types of representations of molecules: (i) fingerprint features, (ii) SMILES (Simplified Molecular-Input Line-Entry System) - a string format to describe the structures of molecules, and (iii) the graph structure information of the molecules. \paragraph{Baselines} Fingerprint feature vectors are processed by Random Forests and Highway Networks \cite{srivastava2015training}, which are two strong classifiers in many applications \cite{pham2016faster}. Each data point consists of two fingerprint vectors representing two molecules. We average the two vectors as the input vector for the two baselines. SMILES strings are modeled by DeepCCI \cite{kwon2018end}, a recent deep neural network model for CCI. Each SMILES is represented by a matrix where each row is a one-hot vector of a character. The matrix is then passed through a convolution layer to learn the hidden representation for each SMILE string. The two hidden vectors are then summed and passed through a deep feedforward net to learn the final representation of the interaction between the two molecules. We tune the hyper-parameters for DeepCCI as suggested by the authors \cite{kwon2018end}. \paragraph{Model setting} We also conducted two other experiments to examine the effectiveness of \emph{using side information as the query}. The attention read, which is a weighted sum of all memory cells at the controller, might not properly capture the global information of the graph while fingerprint feature vectors or SMILES strings attain this information. Here, we set two types of vectors as the queries: (i) the mean of two fingerprint vectors and (ii) the hidden representation generated by DeepCCI. For the latter setting, DeepCCI parameters are randomly initialized and jointly learned with our model's parameters. \subsubsection{Results} \paragraph{The effect of multiple attentions} In CCI, substructures from different molecules interact, leading to multiple substructure interactions. In our model, we expect that each attention reading head is able to capture a specific interaction of substructures. Hence, an appropriate number of attention heads can capture all substructure interactions and provide more abundant information about the graph interaction, which may improve the prediction performance. Here, we evaluated the improvement in prediction brought by the number of attention heads $K$. Taking $\Model$ without the side information query, we varied $K$ by 1, 5, 10, 15, 20 and 30, and trained the resulting six models independently on the CCI900 dataset. Fig.~\ref{fig:DeepGI-multiAtt-results} reports the performance changes during training for different $K$. We can see that when $K>1$, increasing $K$ only slightly improves the performance while there is a bigger gap between the performance of $K=1$ and $K>1$. There is not much difference when $K$ is increased from 20 to 30. It is possible that when the number of attention heads is large, they collect similar information from the graphs, leading to saturation in performance. \begin{figure*} \begin{centering} \begin{tabular}{cc} \includegraphics[viewport=0bp 0bp 530bp 430bp,clip,width=0.48\textwidth]{AUC_multi_attentions} & \includegraphics[viewport=0bp 0bp 530bp 430bp,clip,width=0.48\textwidth]{F1_multi_attentions}\tabularnewline (a) & \tabularnewline \end{tabular} \par\end{centering} \caption{The performance of $\protect\Model$ with different number of reading heads $K$ during training, reported in (a) AUC and (b) F1-score. Best viewed in color. \label{fig:DeepGI-multiAtt-results}} \end{figure*} \paragraph{The effect of the side information as query} While the neighborhood aggregation operation in our model can effectively capture the substructure information, the weighted sum of all memory cells in the attention mechanism might not properly collect the global information of the whole graph. Hence, using the side information containing the global information such as Fingerprints or SMILES strings might help the training. We have shown in Table~\ref{tab:Chemical-reaction-results} that using fingerprint vectors or the hidden state generated by DeepCCI as the query for our model can improve the performance on the both datasets. We also found that even though using side information query increases the number of training parameters, it can prevent overfitting. Fig.~\ref{fig:DeepGI-side-info} shows the loss curves on the training and the validation set of $\Model$ with a single attention head when the query is set as constant and when the query is the hidden stated produced by DeepCCI model ($\Model$+SMILES). We can see from the figure that the validation loss of $\Model$ starts to rise quickly after 40 epochs while the validation loss of $\Model$+SMILES still remains after 100 epochs. \begin{figure*} \centering{}\includegraphics[viewport=10bp 20bp 650bp 415bp,clip,width=0.8\textwidth]{loss_comparison}\caption{Training and validation losses of $\protect\Model$ with and without side information during training. Best viewed in color. \label{fig:DeepGI-side-info}} \end{figure*} \paragraph{Comparative results} Table~\ref{tab:Chemical-reaction-results} reports the performance of the baselines and our proposed model in different settings on the two dataset CCI900 and CCI800 reported in AUC and F1-score. SMILES features with DeepCCI outperformed the fingerprint features with Highway Networks by 3.8\% F1-score on CCI900 and by 3.6\% F1-score on CCI800. Our model with a single attention head is slightly better than DeepCCI on both datasets. Interestingly, using multiple attention heads and side information (fingerprint and SMILES features) as the query both help to improve the performance. For CCI900, $\Model$ with SMILES query improves 1.7\% F1-score on single attention setting and 1.2\% on multiple attention settings. \begin{table}[h] \centering{}% \begin{tabular}{ccccc} \hline \multirow{2}{*}{} & \multicolumn{2}{c}{CCI900} & \multicolumn{2}{c}{CCI800}\tabularnewline \cline{2-5} & AUC & F1-score & AUC & F1-score\tabularnewline \hline Random Forests & 94.3 & 86.4 & 98.2 & 94.1\tabularnewline Highway Networks & 94.7 & 88.4 & 98.5 & 94.7\tabularnewline DeepCCI \cite{kwon2018end} & 96.5 & 92.2 & 99.1 & 97.3\tabularnewline \hline $\Model$ & 96.6 & 92.6 & 99.1 & 97.4\tabularnewline $\Model$+multiAtt & 97.3 & 93.4 & 99.1 & 97.8\tabularnewline \hline $\Model$+FP & 97.8 & 93.3 & 99.4 & 98.0\tabularnewline $\Model$+multiAtt+FP & 98.0 & 94.1 & 99.5 & 98.1\tabularnewline \hline $\Model$+SMILES & 98.1 & 94.3 & 99.7 & 97.8\tabularnewline $\Model$+multiAtt+SMILES & \textbf{98.1} & \textbf{94.6} & \textbf{99.8} & \textbf{98.3}\tabularnewline \hline \end{tabular}\caption{The performance on the CCI datasets reported in AUC and F1-score. \emph{FP} stands for fingerprint and \emph{multiAtt} stands for multiple attentions. \label{tab:Chemical-reaction-results}} \end{table} \subsection{Encoder} The encoder prepares data for the reasoning process, i.e., encoding queries into the controller and data into the memory. The query $q$ is first encoded into a vector as: \begin{equation} \qb=\text{q\_encode}\left(q\right)\label{eq:q_encode} \end{equation} Let $X_{c}$ be a graph-structured representation of object $c$, for $c=1,2,...,C$. The representation $X_{c}$ is loaded into a memory matrix $\Mb_{c}$: \begin{equation} \left(\Mb_{c},\Ab_{c}\right)=\text{m\_load}\left(X_{c},q\right)\label{eq:m_load} \end{equation} where $\Ab_{c}$ is relational structure between memory slots. The dependency on the query $q$ offers flexibility to define query-specific memory, which could be more economical in cases where the query provides constraints on the relevant parts of the object. Assume that the query and object $c$ together impose a set $\mathcal{R}_{c}$ of pairwise relations between memory cells. More precisely, any pair of cells will have zero or more relations draw from the relation set. For example, for $c$ is a molecule, then $\Mb_{c}[i]$ can be the (learnable) embedding of the atom at node $i$ of the molecular graph, and the relations can be bonding types (e.g., ion or valence bonds). The relations can be modeled as a collection of adjacency matrices, that is, $\Ab_{c}=\left\{ A_{c,r}\right\} _{r\in\mathcal{R}_{c}}$. Given $\qb$ and $\Mb=\left\{ \Mb_{1},\Mb_{2},...,\Mb_{C}\right\} $, the controller initiates a reasoning episode to compute the output probability $P_{\theta}\left(\yb\mid\Mb,\qb\right)$. In what follows, we briefly present how the computation occurs, leaving the detailed implementation in Section~\ref{sec:Implementation}. \subsection{Reasoning processes} The controller manages the reasoning process by updating its own state and the working memory. Let $\hb_{t}$ be the state of the controller at time $t$ $\left(t=0,...,T\right)$. At time $t=0$, the state is initialized as $\hb_{0}=\qb$. At $t=1,2,...,T$, the controller retrieves a content $\rb_{t}^{*}$ from the memory at time $t$ as follows: \begin{align} \rb_{c,t}^{k} & =\text{m\_read}_{k}\left(\Mb_{c,t-1},\hb_{t-1}\right)\label{eq:m_read}\\ \bar{\rb}_{t}^{k} & =\text{r\_aggregate}\left\{ \rb_{c,t}^{k}\right\} _{c=1}^{C}\label{eq:r_aggregate}\\ \rb_{t}^{*} & =\text{r\_combine}\left\{ \bar{\rb}_{t}^{k}\right\} _{k=1}^{K}\label{eq:r_combine} \end{align} where $k=1,2,...,K$ denotes the index of read head. The use of multiple read heads accounts for multiple pieces of information that may be relevant at any step $t$. The $\text{r\_aggregate\ensuremath{\left\{ \cdot\right\} } }$ function operates on the variable-size set of retrieved memory vectors and combines them into one vector. The $\text{r\_combine\ensuremath{\left\{ \cdot\right\} } }$function operates on the fixed-size set of vectors returned by the read-heads. Once the content $\rb_{t}^{*}$ has been read, the controller state is updated as: \begin{align} \hb_{t} & =\text{s\_update}\left(\hb_{t-1},\rb_{t}^{*}\right)\label{eq:s_update} \end{align} This initiates an update of the memory: \begin{align} \Mb_{c,t} & =\text{m\_update}\left(\Mb_{c,t-1},\hb_{t},\Ab_{c}\right)\label{eq:m_update} \end{align} for $c=1,2,...,C$. \subsection{Decoder} At the end of the reasoning process, the controller predicts an output, that is \begin{equation} \yb=\text{decode}\left(\hb_{T},\qb\right)\label{eq:decode} \end{equation} The decoder is a task-specific model, which could be a deep feedforward net for vector output, or a RNN for sequence output. \subsection{Operators} \begin{itemize} \item The \textbf{q\_encode()} operator in Eq.~(\ref{eq:q_encode}) translates the query $q$ into a vector $\qb$. This could be simply a look-up table when $q$ is discrete (e.g., task or word). For textual query, we can use an RNN to represent $q$, and $\qb$ is the last (or averaged) state of the RNN. \item The \textbf{m\_load()} operator in Eq.~(\ref{eq:m_load}), $\left(\Mb_{c},\Ab_{c}\right)=\text{m\_load}\left(X_{c},q\right)$, returns both the memory matrix $\Mb_{c}$ and the relational structure $\Ab_{c}$ given the query $q$. This is problem dependent. One example is when $X_{c}$ represents a molecule, and $q$ specifies a sub-structure of the molecule. Each atom $i$ in the substructure is embedded into a vector $\mb_{i}$, which is first assigned to the memory cell $\Mb_{c}[i]$. The relational structure $\Ab_{c}$ reflects the bonding between the atoms in the substructure. \item For the \textbf{m\_read()} operator in Eq.~(\ref{eq:m_read}), a content-based addressing scheme, also known as soft attention, is employed. At each time step $t$ $\left(t=1,2,...,T\right)$, the read vector $\rb_{c,t}^{k}$ returned by the reading head $k$ ($k=1,2,...,K)$ over memory component $c$ $\left(c=1,2,...,C\right)$ is a sum of all memory cells, weighted by the attention probability vector $\ab$: \begin{eqnarray*} \ab & = & \text{attention}_{k}\left(\Mb_{c,t-1},\hb_{t-1}\right)\\ \rb_{t} & = & \Mb_{c,t-1}\ab \end{eqnarray*} where $\text{attention}_{k}()$ is implemented as follows: \begin{eqnarray*} \ab[i] & = & \text{softmax}\left(\vb_{k}^{\top}\text{tanh}\left(W_{a,k}\Mb_{c,t-1}[i]+U_{a,k}\hb_{t-1}\right)\right). \end{eqnarray*} \item The controller is implemented as a recurrent net, where \textbf{s\_update()} operator in Eq.~(\ref{eq:s_update}) reads: \begin{align} \tilde{\hb}_{t} & =g\left(W_{h}\hb_{t-1}+U_{h}\rb_{t}\right)\nonumber \\ \hb_{t} & =\alphab_{h}*\hb_{t-1}+\left(1-\alphab_{h}\right)*\tilde{\hb}_{t} \end{align} where $(*)$ is element-wise multiplication; and $\alphab_{h}\in(\boldsymbol{0},\boldsymbol{1})$ is trainable forgetting gate that moderates the amount of information flowing from the previous step, e.g., $\alphab_{h}=\sigma\left(\text{nnet}\left[\hb_{t-1},\rb_{t}\right]\right)$ for sigmoid function $\sigma$. \item For the \textbf{m\_update()} operator in Eq.~(\ref{eq:m_update}), the memory is updated as follows: \begin{eqnarray} \tilde{\Mb}_{c,t} & = & g\left(U_{m}\hb_{t}\boldsymbol{1}^{\top}+W_{m}\Mb_{c,t-1}+\sum_{r}V_{c,r}\Mb_{c,t-1}\hat{\Ab}_{c,r}\right)\nonumber \\ \Mb_{c,t}\left[i\right] & = & \alphab_{c,i}*\Mb_{c,t-1}\left[i\right]+\left(1-\alphab_{c,i}\right)*\tilde{\Mb}_{c,t}\left[i\right] \end{eqnarray} for $c=1,2,...,C$; where $\hat{\Ab}_{c,r}$ is the normalized adjacency matrix, i.e., $\hat{\Ab}_{c,r}\left[i,j\right]=\frac{\Ab_{c,r}\left[i,j\right]}{\sum_{i}\Ab_{c,r}\left[i,j\right]}$; $(*)$ is element-wise multiplication; and $\alphab_{c,i}\in(\boldsymbol{0},\boldsymbol{1})$ is a trainable forgetting gate. \item The \textbf{r\_aggregate()} and the \textbf{r\_combine()} operators in Eqs.~(\ref{eq:r_aggregate},\ref{eq:r_combine}) are simply averaging, i.e., \begin{align*} \bar{\rb}_{t}^{k} & =\frac{1}{C}\sum_{c=1}^{C}\rb_{c,t}^{k};\quad\quad\rb_{t}^{*}=\frac{1}{K}\sum_{k=1}^{K}\bar{\rb}_{t}^{k}. \end{align*} \end{itemize} \subsection{$\protect\Model$ for multi-task learning} $\Model$ can be easily applied for multi-task learning. Suppose that the dataset contains $n$ tasks. We can use the query to indicate the task. If a graph is from task $k$, the query for the graph is an one-hot vector of size $n$: $\qb=[0,0,...,1,0,...]$, where $\qb^{k}=1$ and $\qb^{j}=0$ for $j=1,...,n,\text{ }j\neq k$. The task index now becomes the input signal for $\Model$. With the signal from the task-specific query, the attention can identify which substructure is important for a specific task to attend on. \subsection{Training} Given a training set, in which each data instance has the form \texttt{(query, \{graph$_{1}$, graph$_{2}$, ..., graph$_{C}$\}, answer)}, $\Model$ is trained in a supervised fashion from end-to-end, i.e., by minimizing a loss function. The typical loss is $-\log P\left(\yb\mid q,\left\{ X_{c}\right\} _{c=1}^{C}\right)$. As the entire system is differentiable, gradient-based techniques can be applied for parameter optimization\footnote{Discrete operators can also be implemented with help of policy gradient algorithms.}. \section{Introduction} \input{intro.tex} \section{Preliminaries \label{sec:Prelim}} \input{prelim.tex} \section{Relational dynamic memory \label{sec:Graph-memory-networks}} \input{graphmem.tex} \section{An implementation \label{sec:Implementation}} \input{implement.tex} \section{Experiments and results \label{sec:Experiments-and-results}} \input{exp.tex} \section{Related work \label{sec:Related-work}} \input{related.tex} \section{Conclusion \label{sec:Discussion}} \input{discuss.tex} \bibliographystyle{plain} \subsection{Memory-augmented neural nets \label{subsec:Memory-augmented-neural-nets}} A MANN consists of a neural controller augmented with an external memory. The controller can be a feedforward net (memoryless) or a recurrent net (which has its own short-term memory). The external memory is often modeled as a matrix. At each time step, the controller reads an input, updates the memory, and optionally emits an output. With stationary update rules, the memory can be rolled out over time into a recurrent matrix net \cite{do2018learning}. Let us denote the memory matrix as $\Mb\in\mathbb{R}^{d\times m}$ for $d$ dimensions and $m$ slots. Upon seeing a new evidence $\xb$ (which could be empty), the controller generates a write vector $\wb\in\mathbb{R}^{p}$ which causes a candidate memory update. As an example, the update may take the following form: \begin{equation} \tilde{\Mb}\leftarrow\phi\left(W\wb\mathbf{1}^{\top}+U\Mb R+B\right)\label{eq:matrix-rnn} \end{equation} where $W\in\mathbb{R}^{d\times p}$ is data encoding matrix, $U\in\mathbb{R}^{d\times d}$ is transition matrix , $R\in\mathbb{R}^{m\times m}$ is the graph of relation between memory slots, and $B\in\mathbb{R}^{d\times m}$ is bias. The memory is then updated as: $\Mb\leftarrow f\left(\Mb,\tilde{\Mb}\right)$ for some function $f$. For example, a simple but effective update is linear forgetting: $f\left(\Mb,\tilde{\Mb}\right)=\alphab*\Mb+(1-\alphab)*\tilde{\Mb}$, where $*$ is element-wise multiplication, and $\alphab\in(0,\boldsymbol{1})$ is learnable forget-gate. The controller then reads the memory to determine what to do next. For example, the End-to-End Memory Network \cite{sukhbaatar2015end} maintains a dynamic state of an answer $\ub$ by reading the memory as follows: \begin{align*} \ab & \leftarrow\text{softmax}\left(\Mb^{\top}A\ub\right)\\ \ub & \leftarrow U\ub+BM\ab \end{align*} where $A,U,B$ are trainable parameters. Here $\kb=A\ub$ plays the role of a key in the content-addressing scheme, and $\ab$ assigns an attention weight to each memory slot. \subsection{Graph neural networks \label{subsec:Graph-neural-networks}} A graph is a tuple $\text{\textbf{G}=\{\textbf{A}, \textbf{R}, \textbf{X}\}}$, where $\text{\textbf{A}}=\left\{ a^{1},...,a^{M}\right\} $ are $M$ nodes; $\text{\textbf{X}}=\left\{ \xb^{1},...,\xb^{M}\right\} $ is the set of node features; and $\text{\textbf{R}}$ is the set of relations in the graph. Each tuple $\left\{ a^{i},a^{j},r,\bb^{ij}\right\} \in\text{\textbf{R}}$ describes a relation of type $r$ ($r=1...R$) between two nodes $a^{i}$ and $a^{j}$. The relations can be unidirectional or bi-directional. The vector $\bb^{ij}$ represents the link features. Node $a^{j}$ is a neighbor of $a^{i}$ if there is a connection between the two nodes. Let $\mathcal{N}(i)$ be the set of all neighbors of $a^{i}$ and $\mathcal{N}_{r}(i)$ be the set of neighbors connected to $a^{i}$ through type $r$. This implies $\mathcal{N}(i)=\cup_{r}\mathcal{N}_{r}(i)$. Graph neural networks are a class of neural nets that model the graph structure directly. The most common type is message passing graph neural networks \cite{gilmer2017neural,pham2017column,scarselli2009graph}, which update note states using messages sent from the neighborhood. In the \textit{message aggregation} step, we combine multiple messages sent to node $i$ into a single message vector $\mb_{i}$: \begin{equation} \mb_{i}^{t}=g^{\text{a}}\left(\xb_{i}^{t-1},\left\{ \left(\xb_{j}^{t-1},\eb_{ij}\right)\right\} _{j\in\mathcal{N}(i)}\right)\label{eq:message_aggregation} \end{equation} where $g^{\text{a}}(\cdot)$ can be an attention \cite{bahdanau2014neural} or a pooling architecture. During the \textit{state update} step, the node state is updated as follows: \begin{equation} \xb_{i}^{t}\leftarrow g^{\text{u}}\left(\xb_{i}^{t-1},\mb_{i}^{t}\right)\label{eq:node_update} \end{equation} where $g^{\text{u}}(\cdot)$ can be any type of deep neural networks such as MLP \cite{kipf2016semi}, RNN \cite{scarselli2009graph}, GRU \cite{li2016gated} or Highway Net \cite{pham2017column}.
\section{Introduction} In the late 1940's, Kaplansky and Riordon~\cite{kaplansky1946problem} introduced rook polynomials as a vehicle for the systematic study of permutations avoiding certain forbidden positions. (For example, derangements avoid the positions $(i,i)$ when considered as rook placements.) As interesting objects of study in their own right, rook polynomials have since then received a great deal of attention (see,~\cite{barrese2014m,barrese2016bijections,briggs2006m,goldman1975rook}). Of particular relevance to our work is the paper of Foata and Sch\"{u}tzenberger~\cite{foata1970rook} where the notion of rook equivalence of integer partitions was introduced and completely characterized. Around the same time, a parallel story unfolded in connection with the study of permutations avoiding certain forbidden patterns. Although originally touched on by MacMahon~\cite{MacMahon:Combinat15} in 1915, this study was revived by Knuth in 1968 when he used permutations avoiding the pattern $231$ to characterize those permutations that are stack sortable~\cite{Knuth:The-art-68}. This development launched a systematic study of permutation pattern avoidance. (Two books on the topic are~\cite{Bona:Combinat12} and \cite{kitaev2011patterns}.) The idea of Wilf equivalent patterns, i.e., patterns that are equally difficult to avoid, has played a fundamental role throughout this study. In recent years, the idea of ``pattern" avoidance, as it pertains to combinatorial objects other than permutations, has received growing attention. Among some of the objects studied in this context have been words, set partitions, matchings, and Catalan objects (see~\cite{AlbertBouvel:A-genera2014, BloomElizalde:Pattern-2013, BloomSaracino:Pattern-2016, Burstein:Enumerat1998,KlazarOn-abab-1996}). In this paper we consider a new definition of pattern avoidance in the context of integer partitions and take up its systematic study. In particular, we establish a connection between rook theory and pattern avoiding integer partitions by proving that rook equivalence implies Wilf equivalence of integer partitions. We also establish a partial converse by considering natural refinements of the notions of Wilf and rook equivalence. It should be noted that Remmel's work unifying the theory of classical integer partition identities in~\cite{Remmel:Bijectiv1982} may also be viewed as a study of a different definition of integer partition avoidance. We will say more about this once exact definitions are established below. We begin by establishing some definitions and notation. We first define $\P$ to be the set of all integer partitions and refine this for any $n\geq 0$ by letting $\P_n$ be the set of all integer partitions $\mu$ whose \emph{weight} (i.e., the sum of the parts) is $n$. We denote the weight of a partition $\mu$ by $|\mu|$. It will be convenient in the sequel to adopt the convention that any integer partition $\mu$ consists of an infinite number of parts together with a part of size zero at infinity. In other words, the parts of $\mu$ are such that $\mu_i\geq \mu_{i+1}\geq 0$ for each $i\in [1,\infty)$, only a finite number of the $\mu_i$ are positive, and $\mu_\infty =0$. When writing partitions we only list the positive parts. So the partition $(3,3,2,1,1,0,0,\ldots, 0)$ is, as is customary, simply written as $(3,3,2,1,1)$. This definition allows for the partition $(0,0,\ldots, 0)$ which we call the \emph{empty} partition. For any partition $\mu$ we define its \emph{height} to be the number of positive parts $h_\mu$. Likewise, we define its \emph{width}, which we denote by $w_\mu$, to be the size of its first part $\mu_1$. The empty partition is the only partition with height or width equal to 0. Using these notions we refine our set $\P$ by defining, for any $h,k\geq 0$, the set $$\P(h,k) = \makeset{\mu\in \P}{h_\mu \leq h, w_\mu = k}.$$ Although partitions are defined as weakly decreasing sequences of nonnegative integers, it is also common to view an integer partition as a Ferrers board. For example, the partition $(3,3,2,1,1)$ can be drawn as the Ferrers board \ytableausetup{boxsize=1em} $$\ydiagram{3,3,2,1,1}$$ consisting of 5 rows and 3 columns. Viewed this way, the height and width of a partition become natural definitions. Going forward we implicitly identify a partition with its Ferrers board. As such any reference to a ``row" or ``column" of a partition should not cause confusion. Our next two definitions make immediate use of this identification. First, for any partition $\sigma$ we denote by $\sigma^*$ the partition obtained by interchanging the rows and columns of (the Ferrers board for) $\sigma$. We call $\sigma^*$ the \emph{conjugate} of $\sigma$. For example, the conjugate of the above partition $(3,3,2,1,1)$ is $$(5,3,2) = \ydiagram{5,3,2}\ .$$ In what follows we make use of the fact that $\sigma_i^*$ is the length of the $i$th column of $\sigma$. From this, it now follows easily that $$\sigma_i^* = |\makeset{j}{\sigma_j\geq i}|.$$ The second definition that follows naturally from this partition/Ferrers board identification is new and at the heart of this paper. We say a partition $\alpha$ \emph{contains} a partition $\mu$ provided that it is possible to delete rows and columns from $\alpha$ so that one obtains $\mu$. For example, the partition $$(5,5,2,2,2) = \ydiagram{5,5,2,2,2}*[*(red)]{1+1,5,1+1,2,2}*[*(red)]{3+2}$$ contains $(2,1) = \ydiagram{2,1}$, since deleting the colored rows and columns yields $(2,1)$. In fact, it is easily seen that the only partition that does not contain $(2,1)$ is one whose Ferrers board is a rectangle. For another example, if $\mu=(4,3,3, 2,2)$ then by deleting the indicated rows and columns we see that $\mu$ is contained in the partition $$\ydiagram{6,5,5,5,4,4,2,2}*[*(red)]{0,5,0,0,4,0,2}*[*(red)]{2+2,2+2,2+2,2+2,2+2,2+2}.$$ For any partition $\mu$ we define $\P(\mu)$ to be the set of all partitions that contain $\mu$ and we define $\P_n(\mu) = \P(\mu) \cap \P_n$. We say that $\mu,\tau\in \P$ are \emph{Wilf equivalent} provided that $$|\P_n(\mu)| = |\P_n(\tau)|$$ for all $n\geq 0$. Similarly, we say that $\mu$ and $\tau$ are \emph{width-Wilf equivalent} provided that there are the same number of partitions of each weight and width that contain $\mu$ as there are that contain $\tau$. In what follows a further refinement of $\P(\mu)$ and $\P_n(\mu)$ is needed. For any $k\geq 0$ we set $$ \P(\mu,k) =\makeset{\alpha \in \P(\mu)}{w_\alpha=k+w_\mu}\ \textrm{and}\ \P_n(\mu,k) = \makeset{\alpha \in \P_n(\mu)}{w_\alpha = k+w_\mu}.$$ Note that $\mu$ and $\tau$ are width-Wilf equivalent if and only if $w_\mu = w_\tau$ and $$|\P_n(\mu,k)| = |\P_n(\tau,k)|$$ for all $n,k\geq 0$. With our definition of integer partition containment established, we now compare it to Remmel's definition of partition containment as given in his landmark paper~\cite{Remmel:Bijectiv1982}. In this work, Remmel stipulated that a partition $\alpha$ contains another partition $\mu$ if one can obtain $\mu$ by deleting only rows from $\alpha$. Under this definition it is no longer the case that $(6,5,5,5,4,4,2,2)$ contains $(4,3,3,2,2)$, and it is easy to see that two partitions are Wilf equivalent if and only if they have the same weight. Remmel used his notion of containment in order to provide a unifying theory for the previously ad hoc study of partition identities. For example, it has been well known since the time of Euler that the set $\mathcal{D}_n$ of partitions of weight $n$ that have distinct parts is equinumerous to the set $\mathcal{O}_n$ of partitions of weight $n$ that have only odd parts. In terms of Remmel's language, the former set can be described as those partitions that do not contain any member of $$\{(1,1), (2,2),(3,3),\ldots \},$$ while the latter set can be described as those partitions that do not contain any member of $$\{(2),(4),(6),\ldots\}.$$ In this way, the classic result that $|\mathcal{D}_n| = |\mathcal{O}_n|$ may be viewed as a result about a notion of Wilf equivalence. Furthermore, one of the main results in~\cite{Remmel:Bijectiv1982} is a condition on subsets $S,T\subseteq \P$ that guarantees Wilf equivalence. The first goal of our paper is to provide a combinatorial description of the generating function $$F_{\mu,k}(q) = \sum_{n\geq 0} |\P_n(\mu,k)|q^n$$ for $\P(\mu,k)$ directly in terms of the multiset of integers $$\{\mu_1 + 1, \mu_2+2, \mu_3+3, \ldots\}$$ and the parameter $k$ without appealing to the set of all partitions that contain $\mu$. We prove this result in Section~\ref{sec:GF for P(mu,k)} modulo a few results whose proofs are deferred to Sections~\ref{sec:profiles} and~\ref{sec:staircases and augmented structures}. (These include Theorem~\ref{thm:Closures, Profiles, and Maxima}, which may be of interest in its own right.) In Section~\ref{sec:equivalence} we use this description of $F_{\mu,k}(q)$ to prove that rook equivalence implies Wilf equivalence (Theorem~\ref{thm:rook and Wilf}). We also prove in this section (Theorem~\ref{thm:width Wilf}) that two partitions $\mu$ and $\tau$ with the same width are width-Wilf equivalent if and only if they are rook equivalent. Lastly, we prove (also in Theorem~\ref{thm:width Wilf}) the curious fact that if $w_\mu=w_\tau$ and $$|\P_n(\mu,1)| = |\P_n(\tau,1)|$$ for all $n$, then $\mu$ and $\tau$ are actually width-Wilf equivalent. In \cite{Bloom:On-cr2017} we use Theorem~\ref{thm:rook and Wilf} to prove that Wilf equivalence implies rook equivalence, so these two notions coincide. \section{The generating function $F_{\mu,k}$}\label{sec:GF for P(mu,k)} The goal of this section is to prove Theorem~\ref{thm:GF of F_{mu,k}}, which gives a description of the generating function for $\P(\mu,k)$ directly in terms of the Ferrers board of $\mu$ and the parameter $k$ without appealing to all partitions that contain $\mu$. The argument needed to arrive at this final description requires several steps. The complete argument is presented here modulo a few requisite results whose proofs are postponed to Section~\ref{sec:profiles} and Section~\ref{sec:staircases and augmented structures}. For clarity, we indicate such results when we state them here by enclosing them in boxes. We begin with some basic definitions. \begin{definition} For any partitions $\mu$ and $\alpha$ we define their \emph{sum} to be the partition $$\mu+\alpha= (\mu_1+\alpha_1, \mu_2+\alpha_2,\ldots).$$ \end{definition} \ytableausetup{boxsize=.9em} For example, if $\mu = (2,2,2,1,1)$ and $\alpha = (3,2,2,1)$, then $\mu+\alpha= (5,4,4,2,1)$. Graphically, the sum of $\mu$ and $\alpha$ is the partition whose columns are those of $\mu$ together with those of $\alpha$. \begin{definition} For any partition $\beta$ we define $\mathcal{Q}(\beta)$ to be the set of all partitions obtained by adding to $\beta$ an arbitrary number of parts no larger than $w_\beta$. \end{definition} The generating function for $\mathcal{Q}(\beta)$ is easily seen to be $$\sum_{\sigma\in \mathcal{Q}(\beta)} q^{|\sigma|} =\frac{q^{|\beta|}}{(1-q)(1-q^2)\cdots (1-q^{w_{\beta}})}.$$ Our first lemma allows us to rewrite the set $\P(\mu,k)$ as a union of these $\mathcal{Q}$-sets. \begin{lemma}\label{lem:P(mu,k) is union} Fix $h,k > 0$ and a nonempty partition $\mu$ such that $h_\mu \leq h$. Then $$\P(\mu,k) = \bigcup_{\alpha\in \P( h,k)} \mathcal{Q}(\mu+\alpha).$$ \end{lemma} \begin{proof} Clearly the righthand side is a subset of the lefthand side. To see the reverse inclusion, fix a partition $\sigma\in \P(\mu,k)$ and identify a set $R$ of rows and a set $C$ of columns that may be deleted to obtain $\mu$. First, assume that the leftmost column is not in $C$ and the top row is not in $R$. As the leftmost column is not deleted, it follows that $R$ contains exactly $h_{\sigma}-h_{\mu}$ rows. Moreover, if we first delete these rows, then the fact that the top row remains means that we are left with a partition containing $\mu$ with height $h_\mu$ and width $w_\mu+k$. Such a partition is clearly an element of the righthand side, since $h\geq h_{\mu}$. It only remains to show that we can choose $R$ and $C$ that do not involve the top row or the leftmost column. To see that this is possible, start with any choice of $R$ and $C$. If $1\in C$, then let $i$ be the leftmost column not deleted. (Such an $i$ exists since $\mu\neq \emptyset$.) Observe that we can now recover $\mu$ by deleting the columns in $C'=(C\cup \{i\})\setminus \{1\}$ together with all the rows in $R'=R\cup \{\sigma^*_i+1,\sigma^*_i+2,\ldots, h_{\sigma}\}$. (The fact that $\sigma^*_1>0$ guarantees that $1\in R$ if and only if $1\in R'$.) An analogous argument (applied to $\sigma^*$) shows that we can also modify our sets so that $1\notin R'$. Note that the above parenthetical statement guarantees that applying the procedure twice does not unintentionally add the leftmost column back to $C'$. This completes our proof. \end{proof} It is important to note that the sets $\mathcal{Q}(\mu+\alpha)$ do not partition $\P(\mu,k)$. For example, if $\mu$ and $\alpha$ are as in the above example and we let $\beta= (3,2,1,1)$, then $$(5,4,4,3,2,1) \in \mathcal{Q}(\mu+\alpha)\cap \mathcal{Q}(\mu+\beta).$$ This occurs because one could either start with $\mu+\alpha= (5,4,4,2,1)$ and add a part of size 3 or one could start with $\mu +\beta= (5,4,3,2,1)$ and add a part of size 4. Consequently, we are forced to invoke the principle of Inclusion--Exclusion in order to use Lemma~\ref{lem:P(mu,k) is union} for enumerative purposes. For this to be an effective strategy, we need a concrete description of the sets \begin{equation}\label{eq:intersection of Q's} \bigcap_{\alpha \in P} \mathcal{Q}(\mu+\alpha), \end{equation} where $P \subseteq \P(h, k)$. This leads us to our next definition. \begin{definition} For any partitions $\alpha = (p^{m_p}, \ldots, 1^{m_1})$ and $\beta = (p^{n_p},\ldots, 1^{n_1})$, where $p$ is the largest integer that is a part of either $\alpha$ or $\beta$ and $m_i,n_i\geq 0$, we define $$\alpha \vee \beta = \left(p^{e_p}, \ldots, 1^{e_1}\right),$$ where $e_i=\max(m_i,n_i)$. For any nonempty finite set of partitions $P=\{\alpha^{(1)},\alpha^{(2)},\ldots, \alpha^{(s)}\}$ we define $$\vee_P(\mu):=\left(\mu + \alpha^{(1)}\right) \vee \cdots \vee \left(\mu + \alpha^{(s)}\right).$$ \end{definition} To see an example, take $P=\{\alpha,\beta\}$ where $\alpha$ and $\beta$ are as above. Then $$\vee_P(\mu)=(\mu+\alpha)\vee (\mu+\beta) = (5,4,4,2,1) \vee (5,4,3,2,1) = (5,4,4,3,2,1).$$ The proof of our next lemma is left to the reader. \begin{lemma}\label{lem:intersection is multiset union} Fix $h,k > 0$. For any nonempty $P\subseteq \P(h,k)$ we have $$\bigcap_{\alpha\in P} \mathcal{Q}(\mu+\alpha) = \mathcal{Q}\left(\vee_P(\mu)\right).$$ \end{lemma} Using Lemma~\ref{lem:P(mu,k) is union} and Lemma~\ref{lem:intersection is multiset union}, we can take the first step toward determining $F_{\mu,k}(q)$. We have, for any nonempty $\mu$ such that $h_{\mu}\leq h$, \begin{align}\label{eq:F1} F_{\mu,k}(q) &=\sum_{\sigma\in \P(\mu,k)} q^{|\sigma|}\nonumber\\ &=\sum_{\substack{P\subseteq \P(h,k)\\P\neq \emptyset}} (-1)^{|P|+1} \sum_{\sigma } q^{|\sigma|},\nonumber\\ \shortintertext{where the inner sum is over all $\displaystyle\sigma\in\bigcap_{\alpha\in P}\mathcal{Q}(\mu+\alpha)$, } &=\sum_{\substack{P\subseteq \P(h,k)\\P\neq \emptyset}} (-1)^{|P|+1} \sum_{\sigma\in \mathcal{Q}(\vee_P(\mu)) } q^{|\sigma|}\nonumber\\ &=\sum_{\substack{P\subseteq \P(h,k)\\P\neq \emptyset}} (-1)^{|P|+1} \frac{q^{|\vee_P(\mu)|}}{(1-q)\cdots (1-q^{k+w_\mu})}. \end{align} Each of the partitions $\vee_P(\mu)$ in this last sum is the value at $\mu$ of a function $\vee_P:\P\to\P$. To proceed with the determination of $F_{\mu,k}$ we will determine the conditions under which $\vee_{P} = \vee_{Q}$, for nonempty finite subsets $P,Q$ of $\P$. \begin{definitions} For any partition $\sigma$ and $p\geq 0$ we call the interval $\makeset{i\in [1,\infty]}{\sigma_i=p}$ the \emph{$p$-interval} for $\sigma$. Let $P$ be any nonempty finite subset of $\P$. For each $p\geq 0$, define $M_p$ to be the poset consisting of all nonempty $p$-intervals for all $\sigma\in P$, ordered by inclusion. We define the \emph{$p$-profile} of $P$ to be the set $$\pr_p(P)=\makeset{(p,I)}{I \in \mathcal{M}_p\text{ is maximal} }.$$ Lastly, we define the \emph{profile} of $P$ to be the set $$\pr(P):= \bigcup_{p\geq 0}\pr_p(P).$$ \end{definitions} We pause to highlight some nuances in these definitions. First, observe that a $p$-interval is infinite if and only if $p=0$. Also, a partition $\sigma$ has $p$-interval equal to $\emptyset$ if and only if $p$ is not a part in $\sigma$. Lastly, if $p$ is not a part in any of the partitions in $P$, then $\pr_p(P) = \emptyset$. \begin{example} If we take $$P = \{(4,2,2,2,1,1), (4,4,4,2,1,1,1), (4,4,2,2,2,2,1,1)\},$$ then \begin{align*} \pr_4(P) &= \{(4,[1,3])\}\\ \pr_3(P) &= \emptyset\\ \pr_2(P) &= \{(2,[2,4]), (2,[3,6])\}\\ \pr_1(P) &= \{(1,[5,7]), (1,[7,8])\}\\ \pr_0(P) &= \{(0,[7,\infty] \}. \end{align*} \end{example} \begin{definitions} We say nonempty finite sets $P,Q\subseteq\P$ are \emph{profile-equivalent} and write $P\sim_{pr} Q$ if $P$ and $Q$ have the same profile. In this way we obtain an equivalence relation on the set of nonempty finite subsets of $\P$. We denote the set of its equivalence classes by $\sP$. We call these classes \emph{profile classes}. In the same way, we define an equivalence relation on the set of nonempty subsets of $\P(h,k)$, and denote the set of its equivalence classes by $\sP(h,k)$. \end{definitions} Note that if $P\subseteq \P(h,k)$ then all elements of the profile class of $P$ are subsets of $\P(h,k)$, so the element of $\sP$ determined by $P$ coincides with the element of $\sP(h,k)$ determined by $P$. The significance of profiles comes from the fact that \begin{equation}\label{eq:same profile same join} \boxed{\quad P\sim_{pr} Q \Longleftrightarrow \vee_P = \vee_Q.\quad } \end{equation} This is established in the sequel by Theorem~\ref{thm:Closures, Profiles, and Maxima}. In light of this result and our definition of a profile class, it makes sense to introduce the following notation. \begin{notation} For any profile class $\mathcal{C}$, set $$\vee_{\mathcal{C}}:=\vee_P\quad \text{and}\quad \Pr(\mathcal{C}):= \Pr(P),$$ for any $P\in \mathcal{C}$. \end{notation} We are now in position to transform $F_{\mu,k}$ a bit further. Starting with Equation~\ref{eq:F1}, we now have, for any $h,k >0$ and nonempty partition $\mu$ with $h\geq h_\mu$, \begin{align}\label{eq:F2} F_{\mu,k}(q) &= \frac{1}{(1-q)\cdots (1-q^{k+w_\mu})}\sum_{\substack{P\subseteq \P(h,k)\\P\neq \emptyset}} (-1)^{|P|+1} q^{|\vee_P(\mu)|}\nonumber\\ &= \frac{1}{(1-q)\cdots (1-q^{k+w_\mu})}\sum_{\mathcal{C}\in \sP(h,k)}\left(\sum_{P\in \mathcal{C}} (-1)^{|P|+1} q^{|\vee_P(\mu)|}\right)\nonumber\\ &=\frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{\mathcal{C}\in \sP(h,k)} q^{|\vee_{\mathcal{C}}(\mu)|}\left(\sum_{P\in \mathcal{C}} (-1)^{|P|+1} \right) \end{align} where the last equality follows by the (yet unproven) fact given in (\ref{eq:same profile same join}). Computational evidence suggests that the inner sum in (\ref{eq:F2}) is either $\pm 1$ or 0. The profile classes for which the sum does not vanish can be nicely characterized as those having a ``staircase" shape. \begin{definitions} Let $h,k > 0$. A set of the form $$S=\{(p_1,[a_1,b_1]),(p_2,[a_2,b_2]),\ldots, (p_{s+1},[a_{s+1},b_{s+1}])\}$$ where \begin{enumerate}[label=(\roman*),font=\itshape] \item $k=p_1>p_2>\cdots > p_{s+1} = 0$, \item $a_1=1$, $a_2\neq 1$, $a_i\leq b_i$, and $b_{s+1} = \infty$, \item either $a_i = b_{i-1}$ or $a_i=b_{i-1}+1$ \end{enumerate} is called an $(\ell,k)$-\emph{staircase} where $\ell = b_s$ is the \emph{length} of $S$. The set of all such staircases with length at most $h$ is denoted by $\mathbb{S}(h,k)$. An element $(p_i, [a_i,b_i])$ of $S$ is called \emph{left-overlapping} if $a_i = b_{i-1}$. \end{definitions} \begin{example}\label{ex:staircases} Consider the set $$P =\{(6,6,6,5,5,3,3),(6,6,5,5,5,3,2,2), (6,6,6,5,4,3,3)\}.$$ It has a staircase profile since $$\pr(P)=\{(6,[1,3]), (5,[3,5]), (4,[5,5]), (3,[6,7]), (2,[7,8]), (0,[8,\infty])\}.$$ Representing this graphically immediately suggests why the term ``staircase" is used: \begin{center} \ytableausetup{boxsize=1.2em} \begin{ytableau} 6 & 6 & 6 \\ \none & \none & 5 & 5 & 5\\ \none & \none & \none & \none & 4 \\ \none & \none & \none & \none & \none & 3&3 \\ \none & \none &\none &\none &\none &\none &2&2\\ \none & \none &\none &\none &\none &\none &\none &0&0\\ \end{ytableau}\ \raisebox{-62pt}{$\ldots$\ .} \end{center} Before continuing we remark on our definition of length for a staircase. The length of the above staircase is 8 which is precisely the largest height among all the partitions in $P$. In fact, it is easily seen that this holds for any set of partitions with a staircase profile. \end{example} Our next lemma states that all staircases $S\in\mathbb{S}(h,k)$ are realized as profiles. Although we leave its proof to the reader, we note that our stipulation that the length of $S$ is no more than $h$ implies that the elements of a set of partitions realizing $S$ must have height at most $h$. Furthermore, the fact that $p_1=k$ and $a_2\neq 1$ means that the largest part in each partition in such a set is $k$. \begin{lemma}\label{lem:all stair realized} We have the following equality of sets: $$\mathbb{S}(h,k)=\makeset{\pr(\mathcal{C})}{\mathcal{C}\in \sP(h,k) \text{ has a staircase profile} }.$$ \end{lemma} In light of Lemma~\ref{lem:all stair realized} it becomes natural to introduce another bit of notation. \begin{notation} For any $S\in\mathbb{S}(h,k)$ we set $\vee_{S}:=\vee_{\mathcal{C}}$ where $\mathcal{C}$ is the unique profile class whose profile is $S$. \end{notation} \begin{definitions} For any $\mathcal{C}\in \sP$ that has a staircase profile we say a set $M\subseteq \pr(\mathcal{C})$ is an \emph{overlapping segment} provided the elements of $M$ can be ordered as $$(p_1, I_1), (p_2, I_2),(p_3, I_3),\ldots, (p_r, I_r),$$ where $p_i>p_{i+1}$ and $I_{i+1}$ left-overlaps $I_i$. We further define $\seg(\mathcal{C})$ to be the number of maximal overlapping segments in $\pr(\mathcal{C})$. \end{definitions} The maximal overlapping segments in the example above are $$M_1 =\{ (6, [1,3]), (5, [3,5]), (4, [5,5])\} \quad \text{and}\quad M_2 = \{(3, [6,7]), (2, [7,8]), (0, [8,\infty])\}.$$ As in this example, we note that the maximal overlapping segments partition any staircase. The relevance of staircases to the evolution of $F_{\mu,k}$ is given by Lemma~\ref{lem:only staircases survive} which establishes the following equality: \begin{equation}\label{eq:outline:only staircases survive} \boxed{ \quad\sum_{P\in \mathcal{C}}(-1)^{|P|} = \begin{cases} (-1)^{|\pr(\mathcal{C})|+\seg(\mathcal{C})+1} &\text{ if $\mathcal{C}$ has a staircase profile}\\ 0 &\text{ otherwise}. \end{cases}\quad} \end{equation} Applying (\ref{eq:outline:only staircases survive}) along with Lemma~\ref{lem:all stair realized} to our formulation of $F_{\mu,k}$ in Equation~\ref{eq:F2} we obtain, for any $h,k >0$ and nonempty partition $\mu$ with $h\geq h_\mu$, \begin{align}\label{eq:F3} F_{\mu,k}(q) &=\frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{\mathcal{C}\in \sP(h,k)} q^{|\vee_{\mathcal{C}}(\mu)|}\left(\sum_{P\in \mathcal{C}} (-1)^{|P|+1} \right)\nonumber \\ &=\frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{S\in \mathbb{S}(h,k)} (-1)^{|S| +\seg(S)}q^{|\vee_{S}(\mu)|}. \end{align} Our final step is to translate staircases into what we call \emph{augmented structures}. This final step allows us to describe $F_{\mu,k}$ directly in terms of the Ferrers board of $\mu$ and the parameter $k$ without appealing to the function $\vee_S$ and (implicitly) to partitions that contain $\mu$. \begin{definition} Fix $h,k > 0$ and a nonempty partition $\mu$. We define a \emph{$(\mu,h,k)$-augmented structure} to be a 3-tuple of the form $(\mu,\lambda,\off)$ where $\lambda, \off\in \P$, $$h_{\lambda} \leq h, \ \ h_{\off} \leq h + w_\lambda\ \ \textrm{and}\ \ w_{\lambda}+w_{\off}=k,$$ and each column of $\lambda$ has length at least 2. Let $\mathcal{A}(\mu,h,k)$ denote the set of $(\mu,h,k)$-augmented structures. We define the \emph{weight} of such a structure to be \begin{equation}\label{eq:weight of aux} |(\mu, \lambda,\off)| := |\mu|+|\lambda|+|\off|+ \frac{a(a-1)}{2}+\sum_{i=1}^{a} \mu_{\lambda^*_i}, \end{equation} where $a = w_\lambda$ and $\lambda^*_i$ denotes the length of the $i$th column of $\lambda$. In this setting, the partition $\lambda$ is called an $L$-\emph{partition} and $\off$ is called an \emph{offset partition}. \end{definition} Note that one of $\lambda, \off$ may be empty in an augmented structure. To shed light on our formula for weight and our choice of terminology, consider the following example where we take $h=7$: $$\mu = (4,3,3,2,2,1),\quad \lambda=(4,4,3,3,2,1,1),\quad\off = (4,2,2,1).$$ Draw the Ferrers boards for $\mu$, $\lambda$, and $\off$ so that the board for $\mu$ is right justified as shown: \ytableausetup{boxsize=1em} $$\overbrace{\ydiagram{4,1+3,1+3,2+2,2+2,3+1}}^{\mu}\, \overbrace{\ydiagram{4,4,3,3,2,1,1}}^{\lambda}\qquad \overbrace{\ydiagram{4,2,2,1}}^{\off}.$$ Now consider all (reversed) $L$'s formed by first choosing the boxes in some column of $\lambda$ and then choosing all boxes to the left of the bottom box of this column including those in $\mu$. For example, if we highlight the $L$'s anchored in the 1st and 3rd columns we have $$\ydiagram{4,1+3,1+3,2+2,2+2,3+1}*[*(red)]{0,0,0,2+2}\, \ydiagram{1+3,1+3,1+2,1+2,1+1}*[*(purple)]{0,0,0,1}*[*(red)]{2+1,2+1,2+1,1+2}*[*(blue)]{1,1,1,1,1,1,1}\qquad \ydiagram{4,2,2,1}.$$ The number of boxes in the red $L$ is $\lambda^*_3 + (3-1) + \mu_{\lambda^*_3} = 8$ and the number of boxes in the blue $L$ is $\lambda^*_1 + (1-1) + \mu_{\lambda^*_1} = 7$. In light of this, we interpret the second, fourth, and fifth terms in (\ref{eq:weight of aux}) as giving the total number of boxes involved in all possible such $L$'s. Our main result relating staircases with augmented structures (see Lemma~\ref{lem:bijection between stair and aux}) is the following statement. \medskip \begin{equation}\label{eq:staircases to aug} \boxed{ \begin{minipage}[c]{.9\textwidth} Fix $h,k > 0$ and a partition $\mu$ so that $h\geq h_\mu$. Then there exists a bijection between $\mathbb{S}(h,k)$ and $\mathcal{A}(\mu,h,k)$ so that if $S\in \mathbb{S}(h,k)$ maps to $(\mu,\lambda,\off)\in\mathcal{A}(\mu,h,k)$, then \begin{enumerate}[label=(\roman*),font=\itshape] \item $w_{\lambda} = |S|-\seg(S)$, and \item $|\vee_S (\mu)| = |(\mu,\lambda,\off)|$. \end{enumerate} \end{minipage}} \medskip \end{equation} We pause to point out a subtlety in the definition of augmented structures. In our definition we insist that every column of $\lambda$ has length at least 2. This is required in order for staircases to correspond with our augmented structures. In particular, the requirement that $a_2\neq 1$ in the definition of staircases translates into this condition on augmented structures. See Lemma~\ref{lem:bijection between stair and aux} for details. Using Lemma~\ref{lem:bijection between stair and aux} we arrive at our final description of $F_{\mu,k}$. \begin{theorem}\label{thm:GF of F_{mu,k}} Fix $h,k >0$ and a nonempty partition $\mu$ so that $h\geq h_\mu$. Then $$F_{\mu,k}(q)= \frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{(\mu,\lambda,\off)\in \mathcal{A}(\mu,h,k)} (-1)^{w_{\lambda}}q^{ |(\mu,\lambda,\off)|}.$$ \end{theorem} \begin{proof} Applying Lemma~\ref{lem:bijection between stair and aux} to Equation~\ref{eq:F3} and observing that $|S|-\seg(S)$ has the same parity as $|S|+\seg(S)$ we obtain \begin{align*} F_{\mu,k}(q)&=\frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{S\in \mathbb{S}(h,k)} (-1)^{|S| +\seg(S)}q^{|\vee_{S}(\mu)|}\\ &= \frac{1}{(1-q)\cdots (1-q^{k+w_\mu})} \sum_{(\mu,\lambda,\off)\in \mathcal{A}(\mu,h,k)} (-1)^{w_{\lambda}}q^{|(\mu, \lambda,\off)|}. \end{align*} This proves the theorem. \end{proof} \section{Rook equivalence and Wilf equivalence}\label{sec:equivalence} Using Theorem~\ref{thm:GF of F_{mu,k}} we can now establish connections between the concepts of rook equivalence and Wilf equivalence of integer partitions. We begin by establishing necessary and sufficient conditions for width-Wilf equivalence. It is clear that if two partitions are width-Wilf equivalent then they must have the same weight. \begin{theorem}\label{thm:width Wilf} For any nonempty partitions $\mu$ and $\tau$ that have the same weight and width, the following are equivalent: \begin{enumerate}[label=(\roman*)] \item $\mu$ and $\tau$ are width-Wilf equivalent \item $F_{\mu,1}=F_{\tau,1}$ \item $\mu$ and $\tau$ are rook equivalent. \end{enumerate} \end{theorem} \begin{proof} We show that $(i)\Rightarrow (ii)\Rightarrow (iii)\Rightarrow (i)$. If $\mu$ and $\tau$ are width-Wilf equivalent and $w_{\mu}=w_{\tau}=w$, then $\mu$ and $\tau$ have the same number of extensions of width $w+1$ and any specified weight, so $F_{\mu,1}=F_{\tau,1}$. This proves that $(i)\Rightarrow (ii)$. To prove that $(ii)\Rightarrow (iii)$, assume that $(ii)$ holds, and let $h=\max\{h_{\mu},h_{\tau}\}$. Then Theorem~\ref{thm:GF of F_{mu,k}} implies that $$\sum_{(\mu,\lambda,\off)\in \mathcal{A}(\mu,h,1)} (-1)^{w_{\lambda}}q^{ |(\mu,\lambda,\off)|}=\sum_{(\tau,\lambda,\off)\in \mathcal{A}(\tau,h,1)} (-1)^{w_{\lambda}}q^{ |(\tau,\lambda,\off)|}.$$ By abuse of notation, denote the augmented structures in $\mathcal{A}(\mu,h,1)$ by $\lambda_2,\ldots, \lambda_{h}$ and $\off_1,\ldots, \off_{h}$, where in $\lambda_i$ the offset partition is empty and the $L$-partition has a single column of weight $i$, and in $\off_j$ the $L$-partition is empty and the offset partition has a single column of weight $j$. If $\mu$ and $\tau$ have weight $n$, then $|\off_j|= n+j$ for each $j$, and $|\lambda_i|=n+\mu_i+i$. Therefore $$-\sum_{2\leq i\leq h}q^{n+\mu_i+i}+ \sum_{1\leq j\leq h} q^{n+j}= -\sum_{2\leq i\leq h}q^{n+\tau_i+i}+ \sum_{1\leq j\leq h}q^{n+j},$$ and it follows that the multisets $$\{\mu_2+2,\ldots, \mu_h+h\}\quad \text{and}\quad \{\tau_2+2,\ldots, \tau_h+h\}$$ are equal. Since $\mu_1=\tau_1$ by assumption, the multisets $$\{\mu_1+1,\ldots, \mu_h+h\} \quad \text{and}\quad \{\tau_1+1,\ldots, \tau_h+h\}$$ are equal, and this condition is equivalent to the rook equivalence of $\mu$ and $\tau$ (see~\cite{loehr2011bijective}, Theorem 12.10, which was proved in \cite{foata1970rook} in a slightly different form). This concludes the proof that $(ii)\Rightarrow (iii)$. To prove that $(iii)\Rightarrow (i)$, assume that $(iii)$ holds, and again let $h=\max\{h_{\mu},h_{\tau}\}$ and let $\mu$ and $\tau$ have weight $n$. It is clear that $\mu$ and $\tau$ have the same number of extensions of width $w$ and any specified weight, obtained by adding the same rows of length at most $w$ to $\mu$ and $\tau$. So to prove that $\mu$ and $\tau$ are width-Wilf equivalent it will suffice to show that $F_{\mu,k}=F_{\tau,k}$ for all $k\geq 1$. Since $\mu$ and $\tau$ have the same width, what we need to show is that $$\sum_{(\mu,\lambda,\off)\in \mathcal{A}(\mu,h,k)} (-1)^{w_{\lambda}}q^{ |(\mu,\lambda,\off)|}=\sum_{(\tau,\lambda,\off)\in \mathcal{A}(\tau,h,k)} (-1)^{w_{\lambda}}q^{ |(\tau,\lambda,\off)|}$$ for each $k\geq 1$. To show this it suffices to establish a bijection from $\mathcal{A}(\mu,h,k)$ onto $\mathcal{A}(\tau,h,k)$ that preserves the weight of each augmented structure and the width of its $L$-partition. Because $\mu$ and $\tau$ are rook equivalent and have the same width, the multisets $$\{\mu_2+2,\ldots, \mu_h+h\} \ \ \textrm{and}\ \ \{\tau_2+2,\ldots, \tau_h+h\}$$ are equal, by the result cited above. Therefore there exists a bijection $\varphi:[2,h]\rightarrow [2,h]$ such that $\mu_i+i=\tau_{\varphi(i)}+\varphi(i)$ for all $i\in [2,h]$. We obtain the desired bijection from $\mathcal{A}(\mu,h,k)$ onto $\mathcal{A}(\tau,h,k)$ by sending each $(\mu,\lambda,\off)$ to $(\tau,\lambda',\off)$, where the lengths of the columns of $\lambda'$ are obtained by applying $\varphi$ to the lengths of the columns of $\lambda$. \end{proof} If partitions $\mu$ and $\tau$ are rook equivalent but have different widths, then although $\mu$ and $\tau$ cannot be width-Wilf equivalent, they must be Wilf equivalent. To prove this, we will use a criterion for rook equivalence different from the multiset criterion employed above. Let $F$ be a Ferrers board, and let $(i,j)$ denote the square in the $i$th row from the top and the $j$th column from the left. If $(i,j)$ has the property that replacing the subboard $\makeset{(x,y)}{x\geq i, \ y\geq j}$ by its conjugate yields a Ferrers board, then, following Foata and Sch\"{u}tzenberger \cite{foata1970rook} we call this new board the \emph{(i,j)-transform} of $F$. We will denote it by $F_{i,j}$. Foata and Sch\"{u}tzenberger proved (\cite{foata1970rook}, Corollary 6, Lemma 9 and Theorem 11) that boards $F_1$ and $F_2$ are rook equivalent if and only if one can be obtained from the other by a series of these transformations. \begin{theorem}\label{thm:rook and Wilf} If partitions $\mu$ and $\tau$ are rook equivalent, then they are Wilf equivalent. \end{theorem} \begin{proof} We view $\mu$ and $\tau$ as Ferrers boards. If $\mu$ and $\tau$ are rook equivalent, then by the criterion of Foata and Sch\"{u}tzenberger we can obtain $\tau$ from $\mu$ by a series of $(i,j)$-transformations. It will suffice to show that, for each $(i,j)$-transformation, $F$ and $F_{i,j}$ are Wilf equivalent. \medskip Case 1: $i>1$. In this case, $F$ and $F_{i,j}$ are rook equivalent and have the same width, so by Theorem~\ref{thm:width Wilf} they are width-Wilf equivalent and therefore Wilf equivalent. \medskip Case 2: $(i,j)=(1,1)$. In this case every extension of $F$ corresponds (via a conjugation) to an extension of $F_{1,1}$ of the same weight. \medskip Case 3: $i=1$ and $j>1$. In this case $F_{i,j}$ can be obtained in three steps, by taking $F_{1,1}$, then taking the $(j,i)$-transform of the result, and then taking the $(1,1)$-transform again. Each step yields a result Wilf equivalent to $F$, as we see by arguing as in Case 2 for the first and last steps, and as in Case 1 for the middle step (using $j>1$). \end{proof} The converse of Theorem~\ref{thm:rook and Wilf} is also true. We prove it in \cite{Bloom:On-cr2017}, but we remark here that, for the proof, it suffices to show that two Wilf equivalent partitions with distinct parts must be identical. For if any partitions $\mu$ and $\tau$ are Wilf equivalent, then (\cite{foata1970rook}, Theorem 11) $\mu$ and $\tau$ are rook equivalent to partitions $\mu'$ and $\tau'$ with distinct parts. By Theorem~\ref{thm:rook and Wilf}, $\mu'$ and $\tau'$ are Wilf equivalent, so, assuming that this forces them to be equal, we see that $\mu$ and $\tau$ are rook equivalent. \section{Profiles}\label{sec:profiles} In this section we further explore the idea of profiles, first introduced in Section~\ref{sec:GF for P(mu,k)}. This section also contains the proofs of (\ref{eq:same profile same join}) and (\ref{eq:outline:only staircases survive}). In Section~\ref{sec:GF for P(mu,k)}, we claimed (without proof), that two nonempty finite sets of partitions $P,Q\subseteq \P$ have the same profile if and only if the mappings $\vee_P,\vee_Q:\P\to \P$ are equal. Proving this is our first order of business. We start with a couple of definitions. \begin{definitions} Suppose $\alpha, \beta \in \P$. Provided $\alpha_i > \beta_{i+1}$, we define $$\alpha\star_i \beta = (\alpha_1,\ldots, \alpha_i,\beta_{i+1},\ldots) \in \P.$$ We say that $\alpha\star_i \beta$ is obtained from $\alpha$ and $\beta$ by \emph{splicing}. For any set $P\subseteq \P$ we denote by $\cl(P)$ the closure of $P$ under splicing (using all $i>0$). \end{definitions} \begin{example}\label{ex:closure} Let $P = \{ (2,1,1), (2,2,1,1) \}$ and note that $$\cl(P) =\{(2,1,1), (2,2,1),(2,2,1,1)\}.$$ Comparing the profiles of $P$ and $\cl(P)$, we find that $$\pr(P) = \{(2,[1,2]),(1,[2,3]),(1,[3,4]), (0,[4,\infty])\}=\pr(\cl(P)).$$ This suggests that the profile of a finite set is invariant under splicing. The next two results prove this and much more. Before launching into these proofs, we remark on a subtle point in the definition of splicing. In the definition, $\alpha\star_i \beta$ is defined if and only if $\alpha_i>\beta_{i+1}$. Of course the operation, a priori, could have been defined with $>$ replaced by $\geq$. This would certainly yield a partition, but it would not preserve the profile of a set. For example, under this alternative definition the ``closure" of $P$ would be the set $$\{(2,1,1), (2,2,1),(2,2,1,1), (2,1,1,1)\},$$ whose profile is $\{(2,[1,2]),(1,[2,4]), (0,[4,\infty])\}$. \end{example} We now turn our attention to proving (\ref{eq:same profile same join}) by first proving a technical lemma that is of interest in its own right. \begin{lemma}\label{lem:adding a partition} If $P \subseteq \P$ is finite and nonempty and $\gamma\in \P$ then the following are equivalent: \begin{enumerate}[label=(\roman*)] \item $\gamma\in \cl(P)$ \item $\vee_P= \vee_{P\cup \{\gamma\}}$ \item $\pr(P)=\pr(P\cup \{\gamma\})$. \end{enumerate} \end{lemma} \begin{proof} We show that $(i)\Rightarrow (ii)\Rightarrow(iii)\Rightarrow (i)$. To begin, we first show that if $\mu, \alpha, \beta\in \P$, and $\gamma=\alpha \star_{\ell} \beta$, then $$(\mu+\alpha) \vee (\mu+\beta)= (\mu+\alpha) \vee (\mu+\beta) \vee (\mu+\gamma).$$ To see this, we first note that the first $\ell$ parts of $\mu+\gamma$ are parts of $\mu+\alpha$, and the remaining parts of $\mu+\gamma$ are parts of $\mu+\beta$, so $\mu+\gamma$ does not introduce new parts into $(\mu+\alpha)\vee (\mu+ \beta)$. Now suppose for a contradiction that $\mu+\gamma$ has some part $r$ that has a higher multiplicity in $\mu+\gamma$ than it does in either $\mu+\alpha$ or $\mu+\beta$. Then $\makeset{i}{(\mu+\gamma)_i=r}$ must include both $\ell$ and $\ell +1$, so $(\mu+\gamma)_{\ell}=(\mu+\gamma)_{\ell +1}$, a contradiction since $\alpha_{\ell}> \beta_{\ell+1}$. Now to prove that $(i)\Rightarrow (ii)$, suppose $\gamma\in\cl(P)$. Then there exists a sequence of partitions $\delta_1,\ldots,\delta_t$ such that each $\delta_j$ is obtained by applying the splicing operation to elements of $P$ and the previous $\delta_i$'s, and $\delta_t=\gamma$. Using the result of the preceding paragraph repeatedly, we have $$\vee_P(\mu)=\vee_{P\cup \{\delta_1\}} (\mu)=\cdots = \vee_{P\cup \{\delta_1,\ldots, \delta_{t}\}} (\mu),$$ so $\vee_P (\mu)=\vee_{P\cup \{\gamma\}} (\mu)$. (If $\vee_P(\mu)$ does not change when we add all of the $\delta_i$'s to $P$, then it does not change when we only add $\delta_t=\gamma$ to $P$.) To prove that $(ii)\Rightarrow (iii)$, assume $\vee_P (\mu)= \vee_{P\cup \{\gamma\}} (\mu)$ for every $\mu\in\P$. We show that every interval in $\pr(\{\gamma\})$ is contained in some interval in $\pr(P)$, so $\pr(P)=\pr(P\cup \{\gamma\})$. To see this, suppose $r$ is some part of $\gamma$ and let $I=[a,b]$ be its $r$-interval. So $$\gamma = (\gamma_1,\ldots, \gamma_{a-1}, \underbrace{r,r,\ldots, r}_{|I|}, \gamma_{b+1},\ldots).$$ Next set $\displaystyle k = \max_{\sigma\in P\cup\{\gamma\}} w_\sigma$ and define the partition $\mu$ to be $$\mu = (\underbrace{4k,4k,\ldots, 4k}_{a-1},\underbrace{2k,2k,\ldots 2k}_{|I|}).$$ Then $(\mu+\gamma)_i=2k+r$ for all $i\in I$. Because $\vee_P(\mu) = \vee_{P\cup \{\gamma\}} (\mu)$, there must exist some $\sigma\in P$ such that the multiplicity of $2k+r$ in $\mu+\sigma$ is at least $|I|$. Since $r\leq k$ and each part of $\sigma$ is at most $k$, $(\mu+\sigma)_i$ can be $2k+r$ only when $i\in I$, so $(\mu+\sigma)_i=2k+r$ for all $i\in I$. Thus $I\subseteq \makeset{i}{\sigma_i=r}$, and this implies that $I$ is contained in some interval in $\pr(P)$. To prove that $(iii)\Rightarrow (i)$, suppose $\pr(P)=\pr(P\cup \{\gamma\})$. Denote the elements of $\pr(\gamma)$ by $$(p_1,I_1),\ldots, (p_m, I_m)$$ so that $k=p_1>p_2>\cdots >p_m =0$. Let $b_i$ be the right endpoint of $I_i$. (Note that in this case $b_i+1$ is the left endpoint of $I_{i+1}$ for all $i<m$.) By our assumption that $\pr(P) = \pr(P\cup \{\gamma\})$, it follows that for each $1\leq i\leq m$ there exists some $\sigma^{(i)}\in P$ whose $p_i$-interval contains $I_i$. Now define $$\gamma' = \sigma^{(1)}\star_{b_1} \sigma^{(2)} \star_{b_2} \cdots \star_{b_{m-1}} \sigma^{(m)}$$ where we evaluate this expression from left to right. We have $\pr(\{\gamma'\}) = \pr(\{\gamma\})$, so $\gamma = \gamma'\in \cl(P)$. \end{proof} We are now ready to prove (\ref{eq:same profile same join}). \begin{theorem}\label{thm:Closures, Profiles, and Maxima} If $P,Q\subseteq \P$ are nonempty finite sets then the following are equivalent: \begin{enumerate}[label=(\roman*)] \item $\cl(P)=\cl(Q)$ \item $\pr(P)=\pr(Q)$ \item for every $\mu\in \P$, we have $\vee_{P}(\mu) = \vee_{Q}(\mu)$. \end{enumerate} \end{theorem} \begin{proof} We show that $(i)\Leftrightarrow (ii)$ and $(i)\Leftrightarrow (iii)$. To show that $(i)\Rightarrow (ii)$, let the elements of $\cl(P)$ be $\beta_1,\ldots,\beta_{\ell}$. Then by repeated use of the preceding lemma we have $$\pr(P)=\pr(P\cup\{\beta_1\})=\cdots =\pr(P\cup\{\beta_1,\ldots,\beta_{\ell}\})=\pr(\cl(P)),$$ and likewise $\pr(Q)=\pr(\cl(Q))$. Thus if $\cl(P)=\cl(Q)$ then $\pr(P)=\pr(Q)$. To show that $(ii)\Rightarrow (i)$, assume $\pr(P)=\pr(Q)$. Then $\pr(P\cup \{\gamma\})= \pr(Q\cup \{\gamma\})$ for every $\gamma\in \P$. Thus, using the preceding lemma, we have $$\gamma\in \cl(P)\Leftrightarrow \pr(P)=\pr(P\cup \{\gamma\})\Leftrightarrow \pr(Q)=\pr(Q\cup \{\gamma\})\Leftrightarrow \gamma\in \cl(Q).$$ So $\cl(P)=\cl(Q)$. A proof that $(i)\Leftrightarrow (iii)$ can be obtained from our proof that $(i)\Leftrightarrow (ii)$ by replacing $\pr(X)$ by $\vee_X (\mu)$ for all subsets $X$ of $\P$ involved. \end{proof} In light of this theorem it is natural to introduce the following notation. \begin{notation} Let $\mathcal{C}\in \sP$, so that for all $P,Q\in \mathcal{C}$ we have $\pr(P) = \pr(Q)$. Define $\cl(\mathcal{C}):= \cl(P)$ for any $P\in\mathcal{C}$. \end{notation} \begin{remark} For any $P\in \mathcal{C}$ we have $\cl(\cl(P))=\cl(P)$, so by our theorem, $\pr(\cl(P))=\pr(P)$ and thus $\cl(\mathcal{C})\in \mathcal{C}$. We also note that $$\cl(\mathcal{C}) \subseteq \bigcup_{P\in \mathcal{C}} P \subseteq \bigcup_{P\in \mathcal{C}} \cl(P) = \cl(\mathcal{C}),$$ where the first inclusion follows since $\cl(\mathcal{C})) \in \mathcal{C} $ and the equality on the right follows since $\cl(\mathcal{C})= \cl(P)$ for every $P\in \mathcal{C}$. This gives us another description of the set $\cl(\mathcal{C})$, as the union of all members of $\mathcal{C}$. \end{remark} Next, we turn our attention to the proof of (\ref{eq:outline:only staircases survive}), which appears in Lemma~\ref{lem:only staircases survive}. Some preliminary results are required before tackling that lemma. The next definition allows us to frame the proof of Lemma~\ref{lem:only staircases survive} in a convenient graph-theoretic context. \begin{definition} Given a profile class $\mathcal{C}$ let $G(\mathcal{C})$ be the bipartite graph whose partite sets are the set of partitions $\cl(\mathcal{C})$ and the profile $\pr(\mathcal{C})$, such that $\alpha\in\cl(\mathcal{C})$ is adjacent to $(p,I)\in\pr(\mathcal{C})$ if and only if $I$ is the $p$-interval in $\alpha$. In keeping with traditional graph theory notation, we denote the set of neighbors of a vertex $w$ in $G(\mathcal{C})$ by $N(w)$ and define $$N(W) = \bigcup_{w\in W} N(w)$$ for any collection of vertices $W$ in $G(\mathcal{C})$. \end{definition} \begin{example} In the case that our profile class is as in Example~\ref{ex:closure} the corresponding bipartite graph is: \begin{center} \begin{tikzpicture}[thick, every fit/.style={line width = 0.1mm, ellipse,draw,inner sep=4pt,text width=7cm}] \begin{scope}[start chain=going right,node distance=7mm] \node[on chain] (a) {$(2,[1,2])$}; \node[on chain] (b) {$(1,[2,3])$}; \node[on chain] (c) {$(1,[3,4])$}; \node[on chain] (d) {$(0,[4,\infty])$}; \end{scope} \begin{scope}[xshift=13mm,yshift=3cm,start chain=going right,node distance=7mm] \node[on chain] (1) {$(2,1,1)$}; \node[on chain] (2) {$(2,2,1)$}; \node[on chain] (3) {$(2,2,1,1)$}; \end{scope} \node [fit=(1) (3),label=left:$\cl(\mathcal{C}):$] {}; \node [fit=(a) (d),label=left:$\pr(\mathcal{C}):$] {}; \draw[line width = 0.1mm] (1) -- (b); \draw[line width = 0.1mm] (1) -- (d); \draw[line width = 0.1mm] (2) -- (a); \draw[line width = 0.1mm] (2) -- (d); \draw[line width = 0.1mm] (3) -- (a); \draw[line width = 0.1mm] (3) -- (c); \end{tikzpicture} \end{center} \end{example} In stating the next lemma, we adopt the convention that a sum over the empty set is $0$. \begin{lemma}\label{lem:bipartite graph1} Let $G$ be a finite bipartite graph with (nonempty) partite sets $A$ and $B$. Then we have $$\sum_{\substack{S\subseteq A\\ N(S) = B}} (-1)^{|S|} = \sum_{\substack{S\subseteq B\\ N(S) = A}} (-1)^{|S|}.$$ \end{lemma} \begin{proof} The proof of this follows by a straightforward application of the Inclusion--Exclusion principle and the fact that \begin{align}\label{eq:power set} \sum_{S\subseteq U} (-1)^{|S|} = \begin{cases} 1 &\text{ if } U = \emptyset\\ 0 &\text{ if } U \neq \emptyset \end{cases} \end{align} where $U$ is an arbitrary finite set. Using these two tools we obtain the calculation \allowdisplaybreaks \begin{align*} \sum_{\substack{S\subseteq A\\ N(S) = B}} (-1)^{|S|} &=\sum_{S\subseteq A} (-1)^{|S|} - \sum_{\substack{T\subseteq B\\T \neq \emptyset}}\sum_{\substack{S\subseteq A\\ N(S) \subseteq B\setminus T}} (-1)^{|S|+|T|+1}\\ &=-\sum_{\substack{T\subseteq B\\T \neq \emptyset}}\sum_{\substack{S\subseteq A\\ N(S) \subseteq B\setminus T}} (-1)^{|S|+|T|+1}\\ &=\sum_{\substack{T\subseteq B\\T \neq \emptyset}}\sum_{\substack{S\subseteq A\\ N(S) \subseteq B\setminus T}} (-1)^{|S|+|T|}\\ &=\sum_{\substack{T\subseteq B\\T \neq \emptyset}}\sum_{\substack{S\subseteq A \setminus N(T)}} (-1)^{|S|+|T|}\\ &=\sum_{\substack{T\subseteq B\\ N(T)=A}} (-1)^{|T|}, \end{align*} where the second equality follows since $A\neq \emptyset$. This concludes our proof. \end{proof} \begin{definition} Let $G$ be a finite bipartite graph with (nonempty) partite sets $A$ and $B$. Fix $X\subseteq A$. We say a set $Y\subseteq B$ is $X$-\emph{minimal} provided that $X \subseteq N(Y)$ yet the neighbors of any proper subset of $Y$ do not contain all of $X$. \end{definition} \begin{lemma}\label{lem:bipartite graph2} Let $G$ be a finite bipartite graph with (nonempty) partite sets $A$ and $B$. Assume there exist distinct vertices $u,v\in B$ such that $N(u)\cap N(v)=\emptyset$ and no $A$-minimal set contains both $u$ and $v$. Then $$\sum_{\substack{S\subseteq B\\ N(S) = A}} (-1)^{|S|} = 0.$$ \end{lemma} \begin{proof} Define $$\sB = \makeset{S\subseteq B}{N(S)=A}.$$ To prove the lemma, it suffices to define an involution $f$ on the collection $\sB$ with the property that $S$ and $f(S)$ have opposite parity. To help define our involution we say a set $S\in \sB$ is $u$-\emph{critical} provided that $N(S\setminus u) \neq A$. (Note that a $u$-critical set $S$ must contain $u$.) Now let $$f(S) = \begin{cases} S\cup \{u\} & \text{if } u\notin S\\ S\setminus \{u\} & \text{if } u\in S \text{ and $S$ is not $u$-critical}\\ S\cup \{v\} & \text{if } v\notin S \text{ and } $S$ \text{ is $u$-critical}\\ S\setminus \{v\} & \text{if } v\in S \text{ and } $S$ \text{ is $u$-critical}.\\ \end{cases}$$ We must check that $f$ is well defined and an involution. To begin, observe that if $S\in \sB$ falls in the first or third case, then clearly $f(S)\in \sB$. If $S$ falls in the second case, then $f(S)\in \sB$ since $S$ is assumed not to be $u$-critical. If $S$ falls in the fourth case, then $N(S\setminus \{v\})$ must equal $A$ for otherwise every suset $T\subseteq S$ such that $N(T)=A$ would have to contain $u$ and $v$, so we would have an $A$-minimal set that contains both $u$ and $v$. Hence $f(S)\in \sB$ in this case as well. The four cases in the definition are exhaustive and mutually exclusive, by the parenthetical note preceding the definition of $f$. We now turn our attention to showing that $f$ is indeed an involution. First observe that $f$ certainly alternates between sets $S$ that fall in the first case and those that fall in the second case. If $S$ falls in the fourth case, then removing $v$ from the $u$-critical set $S$ clearly results in another $u$-critical set $f(S)$ that does not contain $v$. On the other hand, if $S$ falls in the third case we must show that $f(S) = S\cup \{v\}$ is also $u$-critical. The only way this might not happen is if $N(u)\cap N(v) \neq \emptyset$. As this is not the case, we can conclude $f$ alternates between sets $S$ that fall in the third case and those that fall in the fourth case. \end{proof} \begin{lemma}\label{lem:vanishing profiles} Fix a profile class $\mathcal{C}$ and distinct profile elements $(p,I),(q,J)\in \pr(\mathcal{C})$, where $I=[a,b]$, $J=[c,d]$, $p\geq q$, and $c< b$. Then $$\sum_{P\in \mathcal{C}} (-1)^{|P|}=0.$$ \end{lemma} \begin{proof} First observe that $$\sum_{P\in \mathcal{C}} (-1)^{|P|} = \sum_{\substack{P\subseteq \cl(\mathcal{C})\\ N(P) = \pr(\mathcal{C})}} (-1)^{|P|}=\sum_{\substack{X\subseteq \pr(\mathcal{C})\\ N(X) = \cl(\mathcal{C})}} (-1)^{|X|},$$ where the second equality comes from Lemma~\ref{lem:bipartite graph1} and the first follows from the fact that for all $P\subseteq \cl(\mathcal{C})$, we have $N(P) = \pr(\mathcal{C})\Leftrightarrow \pr(P) = \pr(\mathcal{C}) \Leftrightarrow P\in \mathcal{C}$. The remainder of our proof is devoted to showing that the righthand side is $0$. We do this by showing that our graph $G(\mathcal{C})$ contains two vertices $u,v\in\pr(\mathcal{C})$ that satisfy the hypotheses of Lemma~\ref{lem:bipartite graph2}. To begin we choose $$u = (p,[a,b])\quad \text{and}\quad v = (q,[c,d]),$$ so that $p\geq q$ and $c<b$ and $u\neq v$. A straightforward check verifies that $N(u)\cap N(v) =\emptyset$. We leave the details to the reader. Next we show that no $\cl(\mathcal{C})$-minimal set contains both $u$ and $v$. For a contradiction, assume that $M\subseteq \pr(\mathcal{C})$ is a $\cl(\mathcal{C})$-minimal set that contains both $u$ and $v$. This means that $$ \underbrace{N(u) \setminus N(M-u)}_{X} \neq \emptyset \quad \text{and}\quad \underbrace{N(v) \setminus N(M-v)}_{Y}\neq \emptyset,$$ where $M-x := M \setminus \{x\}$. Now fix $\alpha\in X$ and $\beta \in Y$. Clearly, $\alpha\neq \beta$ as $N(u)$ and $N(v)$ are disjoint. We claim that there exists $\gamma\in \cl(\mathcal{C})$ such that $\gamma\notin N(u)\cup N(v)$. To see this we consider the following two cases. Only these two are necessary since when $p=q$, the fact that neither $I$ nor $J$ is a subset of the other implies that, by switching the roles of $I$ and $J$, if need be, we may take $d<b$. \medskip Case 1: $p>q$ and $d\geq b$ \medskip In this case, define $\gamma = \alpha \star_{b-1} \beta\in \cl(\mathcal{C})$ where splicing is permitted since $\beta_b = q$ and $\alpha_{b-1}\geq \alpha_b= p>q$. In this case, $\gamma_b=\beta_b=q\neq p$, so $\gamma \notin N(u)$. Similarly, $\gamma_c=\alpha_c\geq p> q$, so $\gamma\notin N(v)$. \medskip Case 2: $p\geq q$ and $d< b$ \medskip In this case, define $\gamma = \alpha \star_{d} \beta\in \cl(\mathcal{C})$ where splicing is permitted since $\beta_{d+1} < q\leq p \leq \alpha_d$ because $\alpha_b=p$ and $d<b$. In this case, $\gamma_b=\beta_b< q,$ so $\gamma_b< p$ and therefore $\gamma \notin N(u)$. Also, $\gamma_d=\alpha_d\geq p$ since $d< b$. If $p> q$ then $\gamma_d\neq q$ so $\gamma\notin N(v)$. If $p=q$ then $c< a$ by definition of a profile. Then $\gamma_c=\alpha_c> p=q$, so $\gamma\notin N(v)$. In either case we have $\gamma \in \cl(\mathcal{C}) = N(M)$ with $\gamma \notin N(u)\cup N(v)$. Since $M$ is $\cl(\mathcal{C})$-minimal we must then have some $w\in M\setminus \{u,v\}$ with $\gamma \in N(w)$. Taking either definition of $\gamma$, it follows that either $\alpha \in N(w)$ or $\beta\in N(w)$. But the first option contradicts the fact that $\alpha\in X$ and the second contradicts the fact that $\beta \in Y$. We conclude that no $\cl(\mathcal{C})$-minimal set can contain both $u$ and $v$. \end{proof} We turn our attention to staircases. The reader might find it helpful to revisit Example~\ref{ex:staircases} in Section~\ref{sec:GF for P(mu,k)} before continuing. Our first task is to introduce an important collection of partitions associated with staircases. An example of the construction described in this lemma is given immediately after its proof. \begin{lemma} Fix some $\mathcal{C}\in \sP$ whose profile is a staircase. Denote the maximal overlapping segments in this staircase as $M_1,\ldots, M_\ell$ and choose $(p_i,I_i)\in M_i$ for each $i\leq \ell$. Then there is a partition $\sigma(\mathcal{C}, p_1,\ldots, p_\ell)\in \cl(\mathcal{C})$ whose neighbors in $G(\mathcal{C})$ are precisely $$(p_1,I_1),\ldots, (p_\ell,I_\ell).$$ \end{lemma} \begin{proof} First, for any maximal overlapping segment $M$ with $(p,I)\in M$ we define $$\pi(M,p) = \bigcup_{\substack{(q,J)\in M\\ q>p\\|J|>1}} \{(q,J^-)\} \cup \{(p,I)\} \cup \bigcup_{\substack{(q,J)\in M\\ p>q\\ |J|>1}}\{(q,{^-J})\}$$ where for any interval $I$ we define $I^-$ (respectively, $^-I$) to be the interval obtained by deleting its right (respectively, left) endpoint. Observe that $\pi(M,p)\cap M = \{(p,I)\}$. Consider the set $$\pi(M_1,p_1)\cup \cdots \cup \pi(M_\ell,p_\ell).$$ Observe that this set is the profile of some (unique) partition $\sigma$. Furthermore, since $\pr(\cl(\mathcal{C})\cup \{\sigma\})=\pr(\cl(\mathcal{C}))$, it follows from Lemma~\ref{lem:adding a partition} that $\sigma\in \cl(\mathcal{C})$. Our first observation now implies that $$\pr(\sigma) \cap \pr(\mathcal{C}) = \{(p_1,I_1),\ldots, (p_\ell,I_\ell)\}.$$ In terms of the bipartite graph $G(\mathcal{C})$ this means that $N(\sigma)= \{(p_1,I_1),\ldots, (p_\ell,I_\ell)\}$. Lastly, we set $\sigma(\mathcal{C},p_1,\ldots,p_\ell) = \sigma$. \end{proof} Applying the construction in the proof of this lemma to Example~\ref{ex:staircases} yields $$\pi(M_1,5) = \{(6,[1,2]),(5,[3,5])\}\quad \text{and}\quad \pi(M_2,2) = \{(3,[6,6]), (2,[7,8]), (0,[9,\infty])\},$$ whose union is the profile of the partition $(6,6,5,5,5,3,2,2)$. \begin{lemma}\label{lem:segments are minimal} Let $\mathcal{C}\in \sP$ be such that $\pr(\mathcal{C})$ is a staircase whose maximal overlapping segments are $M_1,\ldots, M_\ell$. Then, the $\cl(\mathcal{C})$-minimal sets in $G(\mathcal{C})$ are precisely the $\ell$ sets $M_i\subseteq \pr(\mathcal{C})$. \end{lemma} \begin{proof} Fix some maximal overlapping segment $M$ of $\pr(\mathcal{C})$ and write its elements as $$(p_1, I_1), (p_2, I_2),\ldots, (p_s, I_s),$$ where $p_i>p_{i+1}$. Let $a$ and $b$ be such that $$\bigcup_{i=1}^s I_i = [a,b].$$ Further, set $\mathcal{I}=\makeset{i\in [1,s]}{ 1<|I_i|}$ and let $E$ be the set of endpoints among all the intervals in $M$ (including the symbol $\infty$ if required). Observe that $E\subseteq [a,b]$ and $|E|= |\mathcal{I}|+1$. We first demonstrate that $N(M) = \cl(\mathcal{C})$. For a contradiction, assume that there exists some $\mu \in \cl(\mathcal{C})$ so that $\mu\notin N(M)$. Denoting each $p_i$-interval for $\mu$ by $J_i$, this means that for each $(p_i,I_i)\in M$, we must have $J_i\subsetneq I_i$. This immediately says that the interval $J_i$ is such that $|J_i\cap E| \leq 1$ and that $J_i=\emptyset$ whenever $i\notin\mathcal{I}$. Consequently, \begin{equation}\label{eq:too short} |E\cap (J_1\cup \cdots \cup J_s)|\leq |\mathcal{I}|. \end{equation} On the other hand, we see that $$p_1\geq \mu_t\geq p_s\textrm{ if and only if } t\in [a,b].$$ The forward direction follows from the fact that $\pr(\mathcal{C})$ is a staircase and the reverse direction follows from our definition of a maximal overlapping segment and the meaning of profiles. So we have $$E\subseteq [a,b]=J_1\cup \cdots \cup J_s.$$ But this contradicts (\ref{eq:too short}) above since $|E| = |\mathcal{I}|+1$. We conclude that $\mu\in N(M)$ as needed. It remains to show that the sets $M_1,\ldots, M_\ell$ are $\cl(\mathcal{C})$-minimal and that they are the only $\cl(\mathcal{C})$-minimal sets. We can establish both simultaneously by showing that for any $P\subseteq \pr(\mathcal{C})$ with $N(P) = \cl(\mathcal{C})$, we have $M_j\subseteq P$ for some $j$. For a contradiction, assume we have such a $P$ for which $M_j\not\subseteq P$ for all $1\leq j\leq \ell$. This means that we can choose some $(q_j, K_j)\in M_j\setminus P$ for each $j$. But then the neighbors of the partition $\sigma(\mathcal{C},q_1,\ldots, q_\ell)\in \cl(\mathcal{C})$ are precisely $(q_1, K_1),\ldots, (q_{\ell}, K_\ell)$. This contradicts the fact that $N(P) = \cl(\mathcal{C})$ and completes our proof. \end{proof} We are at last in a position to prove our final lemma of this section. Doing so provides the justification for (\ref{eq:outline:only staircases survive}) in Section~\ref{sec:GF for P(mu,k)}. \begin{lemma}\label{lem:only staircases survive} Let $\mathcal{C}$ be a profile class. Then $$\sum_{P\in \mathcal{C}}(-1)^{|P|} = \begin{cases} (-1)^{|\pr(\mathcal{C})|+\seg(\mathcal{C})+1} &\text{ if } \pr(\mathcal{C}) \text{ is a staircase}\\ 0 &\text{ otherwise}. \end{cases}$$ \end{lemma} \begin{proof} We first prove that if $\pr(\mathcal{C})$ is not a staircase then our alternating sum is 0. If $\pr(\mathcal{C})$ is not a staircase, then there exist $$(p,[a,b]) \in \pr(\mathcal{C})\quad \text{and}\quad (q,[c,d])\in \pr(\mathcal{C})$$ such that either $p> q$ and $c<b$ or $p=q$ and $[a,b]\neq [c,d]$. In the second case, neither $[a,b]$ nor $[c,d]$ is a subset of the other, by definition of a profile, so we can assume (by switching the roles of $[a,b]$ and $[c,d]$ if necessary) that $c< b$. So in any case we have two elements of $\pr(\mathcal{C})$ such that $p\ge q$ and $c< b$. Lemma~\ref{lem:vanishing profiles} now guarantees that our alternating sum is zero. Now consider the case where $\pr(\mathcal{C})$ is a staircase with $m=\seg(\mathcal{C})$ maximal overlapping segments: $M_1,\ldots, M_m$. By Lemma~\ref{lem:segments are minimal} these $m$ sets are precisely the $\cl(\mathcal{C})$-minimal sets and they partition $\pr(\mathcal{C})$. This yields the calculation \begin{align*} \sum_{P\in \mathcal{C}} (-1)^{|P|} = \sum_{\substack{P\subseteq \cl(\mathcal{C})\\ N(P) = \pr(\mathcal{C})}} (-1)^{|P|}=\smashoperator{\sum_{\substack{X\subseteq \pr(\mathcal{C})\\ N(X) = \cl(\mathcal{C})}}} (-1)^{|X|} &=\sum_{\substack{T\subseteq [m]\\T\neq \emptyset}} (-1)^{|T|+1} \left(\sum_{ X\subseteq \pr(\mathcal{C})\setminus M_T} (-1)^{|X|+|M_T|}\right)\\ &=(-1)^{\seg(\mathcal{C})+|\pr(\mathcal{C})|+1}, \end{align*} where the first and second equalities come from Theorem~\ref{thm:Closures, Profiles, and Maxima} and Lemma~\ref{lem:bipartite graph1} respectively; the third follows from Lemma~\ref{lem:segments are minimal} and an application of Inclusion--Exclusion, where $$M_T := \bigcup_{i\in T} M_i;$$ and the last equality follows from (\ref{eq:power set}) and the fact that the $M_i$'s partition $\pr(\mathcal{C})$. \end{proof} \section{Staircases \& Augmented Structures}\label{sec:staircases and augmented structures} The purpose of this section is to fill in the details of the connection between staircases and augmented structures. In particular we give a proof of (\ref{eq:staircases to aug}) in Section~\ref{sec:GF for P(mu,k)}. We begin by giving an alternative description of the function $\vee_S$ where $S\in \mathbb{S}(h,k)$. This alternative description is directly motivated by the following example. \begin{example} Consider the partitions $$\alpha = (2,2,2) \quad \text{and}\quad \beta=(2,2,1,1)$$ and set $P=\{\alpha,\beta\}$. If we take $\mu = (4,3,3,1)$, then we see that $$\vee_P(\mu)=(6,5,5,1) \vee (6,5,4,2)=(6,5,5,4,2,1).$$ On the other hand, the profile for $P$ is the staircase $$S=\{(2, [1,3]), (1, [3,4]), (0, [4,\infty])\}.$$ Now observe that $\vee_P(\mu)$ can be calculated directly in terms of $S$ and $\mu$ by taking $$(\underbrace{\mu_1,\ \mu_2,\ \mu_3,\ }_{+2}\underbrace{\ \mu_3,\ \mu_4}_{+1}, \underbrace{\ \mu_4}_{+0})= (6,5,5,4,2,1),$$ where the underbraces indicate how much to add to each term. \end{example} This example suggests our next lemma. \begin{lemma}\label{lem: maxima from profiles} Let $P\subseteq \P$ have staircase profile $$S= \{(p_1, [a_1, b_1]),\ldots, (p_{s+1}, [a_{s+1}, \infty])\}$$ where $k=p_1>p_2>\cdots>p_{s+1}=0$. For any $\mu\in\P$ the partition $\vee_S(\mu)$ is the partition $$(\underbrace{\mu_{a_1},\ldots, \mu_{b_1}}_{+p_1}, \underbrace{\mu_{a_2},\ldots, \mu_{b_2}}_{+p_2},\ldots,\underbrace{\mu_{a_{s+1}}, \ldots }_{+p_{s+1}}).$$ The weight of this partition is $$\displaystyle \sum_{i=1}^{s+1}\sum_{j=a_i}^{b_i}(\mu_j+ p_i).$$ \end{lemma} \begin{proof} The second assertion follows immediately from the first. To prove the first assertion, we claim that for any $k\geq p_c> p_d\geq 0$ and any $\sigma, \tau \in P$ (equal or not), where $\sigma$ has a part of size $p_c$ and $\tau$ has a part of size $p_d$, $$\min \makeset{(\mu+\sigma)_i}{\sigma_i=p_c} > \max \makeset{(\mu+\tau)_{\ell}}{\tau_{\ell}=p_d}.$$ This is because if $\sigma_i=p_c$ and $\tau_{\ell}=p_d$ then by definition of the profile, $i\in [a_c, b_c]$ and $\ell\in [a_d, b_d]$. By definition of a staircase this implies that $b_c\leq b_d$ and hence $\mu_i\geq \mu_{\ell}$. Therefore $\mu_i+p_c> \mu_\ell+p_d$, which verifies our claim. From this claim we see that if $V_c$ is the set $$V_c=\makeset{(\mu+\pi)_i}{\pi\in P, \pi_i=p_c},$$ then $\min V_c> \max V_d$ when $p_c> p_d$. Since for each $\pi\in P$ we have $\makeset{i}{\pi_i=p_c}\subseteq [a_c, b_c]$, the multiplicity of any part in $\vee_P(\mu)$ that is also in $V_c$ is its multiplicity in any $\mu+\pi$ such that $\makeset{i}{\pi_i=p_c}=[a_c, b_c]$. This proves the lemma. \end{proof} To motivate our development of the connection between staircases and augmented structures, we start with an example. \begin{example} Consider the following staircase $$S = \{(6, [1,2]), (4,[2,4]), (3,[4,4]),(2,[5,6]), (0,[6,\infty])\}$$ and let $\mu=(4^3,3^2,2,1)$ . Then Lemma~\ref{lem: maxima from profiles} tells us that $|\vee_S(\mu)|$ is $$\begin{array}{lllll} (6+\mu_1) &+ (6+\mu_2) &&& \\ &+ (4+\mu_2) + (4+\mu_3) &+ (4+\mu_4) &&\\ && +(3+\mu_4) && \\ &&& +(2+\mu_5) &+ (2+\mu_6) \\ &&&&+(0+\mu_6) + (0+\mu_7). \end{array}$$ Observe that the left-overlapping elements in $S$ correspond to the parts of $\mu$ that are counted more than once. For the moment, let us ignore such terms. Doing so yields the sum $$\begin{array}{llll} (6+\mu_1) + (6+\mu_2) &&& \\ & + (4+\mu_3) + (4+\mu_4) &&\\ && +(2+\mu_5) + (2+\mu_6) &\\ &&& + (0+\mu_7). \end{array}$$ We encode this sum as the sum of the weights $|\mu|+|\sigma|$, where $\sigma= (6^2,4^2,2^2)$. Note that the multiplicity of each nonzero part of $\sigma$ is the number of times it appears in the non-overlapping sum. In order to deal with the overlapping terms in the first sum we introduce the concept of $L$'s. In particular, consider the $L$'s shaded as shown below where $\mu$ is drawn right-justified and to the immediate left of $\sigma$: \ytableausetup{boxsize=1em} $$ \overbrace{ \ydiagram{4,4,4,1+3,1+3,2+2,3+1}* [*(red)]{0,4}* [*(green)]{0,0,0,1+3}* [*(blue)]{0,0,0,0,0,2+2} }^{\mu}\, \overbrace{ \ydiagram{6,6,4,4,2,2}* [*(redblue)]{0,1}* [*(redgreen)]{0,3+1}* [*(red)]{4+1,1+2}* [*(red)]{0,4+1}* [*(greenblue)]{0,0,0,1}* [*(green)]{3+1,3+1,3+1,1+3}* [*(blue)]{1,1,1,1,1,1} }^{\sigma} $$ The columns containing the vertical legs of our $L$'s are chosen as follows. First take the parts 4, 3, and 0 as they correspond to the left-overlapping intervals in $S$. Then add one to each to obtain the set $A=\{5,4,1\}$ which will be the set of indices of the columns containing the vertical legs of our $L$'s. In this case, the vertical parts of the blue, green, and red $L$'s contain $\sigma^*_1$, $\sigma^*_4$, and $\sigma^*_5$ boxes, respectively. The key observation is that we can now write our first sum in terms of these $L$'s. Consider \begin{align*} |\vee_S(\mu)| &= |\mu| + |\sigma| + (4+\mu_2) + (3+\mu_4) + (0+\mu_6)\\ &= |\mu| + \underbrace{\sigma_2^*+\sigma_3^*+\sigma_6^*}_{\text{columns $\notin A$}} + \underbrace{\sigma^*_1 + \sigma^*_4 + \sigma^*_5}_{\text{vertical parts of $L$'s}} + \underbrace{ (4+\mu_{\sigma^*_5})+ (3+ \mu_{\sigma^*_4})+( 0 + \mu_{\sigma^*_1} )}_{\text{horizontal parts of $L$'s (excluding corners)}}. \end{align*} \end{example} In light of this example, we make the following definition. \begin{definition} We say an element $(\sigma,A)\in \P(h,k)\times 2^{[1,k]}$ is a \emph{marked partition} since we think of the set $A$ as indicating the marked columns of $\sigma$. We let $$\mathcal{M}(h,k)=\makeset{(\sigma,A)\in \P(h,k)\times 2^{[1,k]}}{\sigma^*_i>1\text{ for all } i\in A}.$$ \end{definition} \begin{lemma}\label{lem:bijection stair to marked columns} Fix $h,k > 0$. There exists a bijection $f:\mathbb{S}(h,k) \to \mathcal{M}(h,k)$ so that if $f(S)=(\sigma,A)$ and $\mu$ is any partition, then \begin{enumerate}[label=(\roman*)] \item $|A| = |S|-\seg(S)$, and \item $\displaystyle |\vee_S (\mu)| = |\mu| + |\sigma|+ \sum_{i\in A} ( \mu_{\sigma^*_i}+i-1)$. \end{enumerate} \end{lemma} \begin{proof} Fix $S\in \mathbb{S}(h,k)$ and denote its elements as $$S = \{(p_1,[a_1,b_1]), (p_2,[a_2,b_2]),\ldots, (p_s,[a_s,b_s]),(p_{s+1},[a_{s+1},b_{s+1}])\},$$ where $k=p_1>p_2>\cdots > p_s>p_{s+1}=0$ and $a_2\neq 1$. Define $I$ to be the set of indices that correspond to left-overlapping elements in $S$. Let $$A = \makeset{1+p_i}{i\in I}\quad \text{and}\quad \sigma = (p_1^{m_1},p_2^{m_2},\cdots, p_{s}^{m_{s}}),$$ where $$ m_i = \begin{cases} b_i - a_i +1&\text{ if } i\notin I\\ b_i - a_i&\text{ if } i\in I. \end{cases}$$ Set $f(S) = (\sigma, A)$. With these definitions we see that \begin{equation}\label{eq:a_i} a_i = \begin{cases} m_1+\cdots+m_{i-1}+1 & \text{ if } i\notin I\\ m_1+\cdots+m_{i-1} &\text{ if } i\in I \end{cases} \end{equation} for $1\leq i\leq s+1$. We also observe that any $i\in I$ must be at least 2. Consequently Property \emph{(ii)} in our definition of staircases implies that, for $i\in I$, \begin{equation}\label{eq:overlapping endpoint} 2\leq a_i = m_1+\cdots +m_{i-1} = \sigma^*_{1+p_i}. \end{equation} With our definitions and basic observations established our immediate task is to show that $f$ is well defined. To this end, we first show $\sigma\in \P(h,k)$. To verify this, observe that $m_1+\cdots + m_s$ is the length of $S$, so $h_\sigma< h$. Additionally, $w_\sigma = k$ as $p_1=k$ and $m_1\neq 0$. So $\sigma\in \P(h,k)$. It is immediate that $A\subseteq [1,k]$ since $1\notin I$. Lastly, (\ref{eq:overlapping endpoint}) guarantees that $(\sigma, A) \in \mathcal{M}(h,k)$. Our next task is to show $f$ is bijective. We first note that we can easily recover the parts $p_1,\ldots, p_s$ from the pair $(\sigma, A)$. In turn, knowing these parts and the set $A$ allows us to recover the index set $I$. Using $\sigma$, $I$, and (\ref{eq:a_i}) we can recover the left endpoints $a_i$ of our staircase. Finally, the left endpoints together with $I$ allow us to reconstruct the right endpoints $b_i$. This inverse construction proves that $f$ is 1-1. Furthermore, let us consider applying this inverse construction to any $(\tau,B)\in\mathcal{M}(h,k)$ to obtain $$T = \{(q_1,[c_1,d_1]), (q_2,[c_2,d_2]),\ldots, (q_t,[c_t,d_t]), (q_{t+1},[c_{t+1},\infty])\},$$ where $k=q_1>q_2>\cdots > q_t>q_{t+1}=0$. Provided that $c_2\geq 2$ it easily follows that $T\in\mathbb{S}(h,k)$. To address this proviso, we see from (\ref{eq:a_i}) that if $(q_2,[c_2,d_2])$ is not left-overlapping then $c_2\geq 2$. On the other hand, the only way this element can be left-overlapping is if $q_2+1\in B$, in which case our definition of $\mathcal{M}(h,k)$ tells us that $1<\tau_{q_2+1}^*$. This says that there are at least two parts in $\tau$ (counting multiplicities) that are greater than $q_2$. As the only part greater than $q_2$ is $q_1$ we conclude that $1<d_1\leq c_2$ as needed. We now shift our attention to Properties \emph{(i)} and \emph{(ii)}. It is clear from our definitions of $I$ and $A$ that Property \emph{(i)} holds. Property \emph{(ii)} is shown to hold via the following computation. By Lemma~\ref{lem: maxima from profiles}, we have \begin{align*} |\vee_S(\mu)| &=\sum_{i=1}^{s+1}\sum_{j= a_i}^{b_i}(\mu_j+ p_i)\\ &=\sum_{i\not\in I}\sum_{j=a_i}^{b_i}(\mu_j+ p_i) + \sum_{i\in I}\sum_{j=a_i+1}^{b_i}(\mu_j+ p_i)+ \sum_{i\in I}(\mu_{a_i}+ p_i)\\ &= |\mu| + |\sigma| + \sum_{i\in I}(\mu_{a_i}+ p_i), \shortintertext{which by (\ref{eq:overlapping endpoint}) and our definition of $A$,} &= |\mu| + |\sigma| + \sum_{i\in A} (\mu_{\sigma^*_i} + i-1). \end{align*} \end{proof} Lastly, we need to bijectively transform marked partitions into augmented structures. To do this we define, for any $\mu$, the mapping $$g:\mathcal{M}(h,k) \to \mathcal{A}(\mu,h,k)$$ by setting $g(\sigma, A) = (\mu,\lambda, \off)$ where the columns of $\lambda$ and $\off$ are given by the multisets $$\makeset{\sigma^*_i}{i\in A}\quad \text{and}\quad \makeset{|A_{>i}|+\sigma^*_i}{i\not\in A},$$ respectively. To explain this definition, let us return to the above example of a marked partition: $$ \overbrace{ \ydiagram{4,4,4,1+3,1+3,2+2,3+1}* [*(red)]{0,4}* [*(green)]{0,0,0,1+3}* [*(blue)]{0,0,0,0,0,2+2} }^{\mu}\, \overbrace{ \ydiagram{6,6,4,4,2,2}* [*(redblue)]{0,1}* [*(redgreen)]{0,3+1}* [*(red)]{4+1,1+2}* [*(red)]{0,4+1}* [*(greenblue)]{0,0,0,1}* [*(green)]{3+1,3+1,3+1,1+3}* [*(blue)]{1,1,1,1,1,1} }^{\sigma}.$$ If we ``push" all the unmarked columns past and to the right of the marked ones we obtain the configuration $$\overbrace{ \ydiagram{4,4,4,1+3,1+3,2+2,3+1}* [*(red)]{0,4}* [*(green)]{0,0,0,1+3}* [*(blue)]{0,0,0,0,0,2+2} }^{\mu}\,\overbrace{\ydiagram{3,3,2,2,1,1}* [*(redblue)]{0,1}* [*(redgreen)]{0,1+1}* [*(red)]{2+1,2+1}* [*(greenblue)]{0,0,0,1}* [*(green)]{1+1,1+1,1+1,1+1}* [*(blue)]{1,1,1,1,1,1}}^{\lambda}\quad \overbrace{\ydiagram{3,3,2,2,1,1}}^{\off'}.$$ Observe that this transformation shortened the horizontal legs of the green and red $L$'s by exactly the number of unmarked columns to their left. This discrepancy is accounted for by defining the columns of $\off$ to be $|A_{>i}|+\sigma^*_i$ for each $i\notin A$. To establish that this mapping is bijective we will prove that for any $C>0$ there is a unique $0\leq i\leq w_\lambda$ so that placing a column of length $C-i$ immediately to the left of the $i$ rightmost columns of $\lambda$ yields a partition. For example, if $C = 5$ and $\lambda$ is as above, then among the four possible configurations $$ \begin{tabular}{cccc} \ydiagram{3,3,2,2,1,1}*[*(lightgray)]{3+1,3+1,3+1,3+1,3+1}\hspace{5ex} & \ydiagram{2,2,2,2,1,1}*[*(lightgray)]{2+1,2+1,2+1,2+1}*[*(white)]{3+1,3+1}\hspace{5ex} & \ydiagram{1,1,1,1,1,1}*[*(lightgray)]{1+1,1+1,1+1}*[*(white)]{2+2,2+2,2+1,2+1}\hspace{5ex} & \ydiagram[*(lightgray)]{1,1,1}*[*(white)]{1+3,1+3,1+2,1+2,1+1,1+1}\hspace{5ex}\\ \end{tabular} $$ only the second, when $i=1$, yields a partition. The following lemma proves this always occurs. \begin{lemma} Fix any partition $\lambda$ and denote its column lengths (from right to left) by $c_1\leq c_2\leq c_3\leq \cdots \leq c_{w_{\lambda}}$. For any $C>0$ there is a unique $0\leq i\leq w_\lambda$ so that \begin{equation}\label{eq:unique insertion} c_{i+1}\geq C-i \geq c_{i}, \end{equation} where we set $c_{w_\lambda+1} =\infty$ and $c_0 = 0$. \end{lemma} \begin{proof} Define $i = \min\makeset{j\in[0,w_\lambda]}{c_{j+1} \geq C-j }$. (This set is not empty, and hence $i$ is well defined, since $c_{w_\lambda+1}=\infty$.) By definition of $i$ it follows that if $i> 0$ then $C-(i-1) > c_i$. Hence (\ref{eq:unique insertion}) holds in any case. Uniqueness follows since we cannot have indices $j>i$ such that $$c_{j+1}\geq C-j \geq c_{j}\geq c_{i+1} \geq C-i \geq c_{i},$$ as then $j\leq i$. \end{proof} Lastly, if $S\in \mathbb{S}(h,k)$ and $f(S)= (\sigma,A)$ and $g(\sigma, A) = (\mu,\lambda, \off)$, then we claim that, for all $\mu$, $$|\vee_S(\mu)|= |(\mu,\lambda,\off)|.$$ In fact this follows via the following computation: \begin{align*} |\vee_S(\mu)| &= |\mu| + |\sigma|+ \sum_{i\in A} (\mu_{\sigma^*_i}+i-1),\\ \intertext{which, by segregating the $i-1$ columns to the left of column $i$ into marked and unmarked ones,} &= |\mu| + \sum_{j\in B} \sigma^*_j + \sum_{i\in A} (\sigma^*_i+ \mu_{\sigma^*_i} + |A_{<i}| + |B_{<i}|), \intertext{where $B = [1,k]\setminus A$. By noting that the marked columns in $\sigma$ are precisely the columns of $\lambda$, this} &=|\mu| + \sum_{j\in B} \sigma_j^* +\frac{a(a-1)}{2}+ \sum_{\ell=1}^a \left( \lambda^*_\ell +\mu_{\lambda^*_\ell} \right) + \sum_{i\in A} |B_{<i}|,\\ \intertext{where $a =|A|$, which by the short argument below, } &=|\mu| + \sum_{j\in B} \left(\sigma_j^* + |A_{>j}|\right) + \frac{a(a-1)}{2}+\sum_{\ell=1}^a \mu_{\lambda^*_\ell} + \lambda^*_\ell\\ &= |\mu| + |\off| + |\lambda| + \frac{a(a-1)}{2} + \sum_{\ell=1}^a \mu_{\lambda^*_\ell}\\ &= |(\mu,\lambda,\off)|. \end{align*} The following calculation justifies the fourth equality above: $$ \sum_{i\in A} |B_{<i}| = \sum_{i\in A}\sum_{j\in B} 1_{\{j<i\}} = \sum_{j\in B}\sum_{i\in A} 1_{\{j<i\}} = \sum_{j\in B} |A_{>j}|, $$ where $1_{\{\cdot\}}$ is the usual indicator function. We summarize our findings from this section with a final lemma. \begin{lemma}\label{lem:bijection between stair and aux} For any $\mu$, the composition of maps $$g\circ f: \mathbb{S}(h,k)\to \mathcal{A}(\mu,h,k)$$ is a bijection such that if $S\mapsto (\mu,\lambda,\off)$, then \begin{enumerate}[label=(\roman*)] \item $w_{\lambda} = |S|-\seg(S)$, and \item $|\vee_S (\mu)| = |(\mu,\lambda,\off)|$. \end{enumerate} \end{lemma} \begin{ack} The first version of this work, written before we were aware of \cite{foata1970rook}, was formulated in terms of Wilf equivalence and a condition involving a simplified version of the $(i,j)$-transforms of Foata and Sch\"{u}tzenberger. We thank Bruce Sagan for pointing out to us the work of Foata and Sch\"{u}tzenberger in \cite{foata1970rook}, and the connection between our original condition and rook equivalence. \end{ack}
\section{Introduction} In this paper we consider stochastically perturbed versions of a class of reaction-diffusion equations that includes the FitzHugh-Nagumo equation \begin{equation} \label{eq:int:fzhnag:pde} \begin{array}{lcl} u_t & = & u_{xx} + f_{\mathrm{cub}}(u) - w \\[0.2cm] w_t & = & \varrho w_{xx} + \ensuremath{\varepsilon} [ u - \gamma w ] . \end{array} \end{equation} Here we take $\ensuremath{\varepsilon},\varrho,\gamma > 0$ and consider the standard bistable nonlinearity \begin{equation} f_{\mathrm{cub}}(u) = u ( 1 - u )( u -a ). \end{equation} It has been known for quite some time that this system admits spectrally (and nonlinearly) stable traveling pulse solutions when $(\varrho, \gamma, \ensuremath{\varepsilon})$ are all small \cite{alexander1990topological}. Recently, such results have also become available for the equal-diffusion setting $\varrho = 1$ by using variational techniques together with the Maslov index \cite{chen2015traveling,cornwell2017opening,cornwell2017existence}. Our goal here is to show that these spectrally stable wave solutions survive in a suitable sense upon adding a small pointwise multiplicative noise term to the underlying PDE. In particular, we generalize previous results in \cite{Hamster2017} where we were only able to consider the special case $\varrho = 1$. For example, we are now able to cover the Stochastic Partial Differential Equation (SPDE) \begin{align} \label{eq:int:SPDE:fhn}\begin{split} dU &= \big[ U_{xx} + f_{\mathrm{cub}}(U) -W ] dt + \sigma \chi(U) U ( 1 - U) d \beta_t\\ dW &= \big[ \varrho W_{xx} + \ensuremath{\varepsilon}(U-\gamma W)] dt\end{split} \end{align} for small $\abs{\sigma}$, in which $(\beta_t)$ is a Brownian motion and $\chi(U)$ is a cut-off function with $\chi(U) = 1$ for $\abs{U} \le 2$. The presence of this cut-off is required to enforce the global Lipschitz-smoothness of the noise term. In this regime, one can think of \sref{eq:int:SPDE:fhn} as a version of the FitzHugh-Nagumo PDE \sref{eq:int:fzhnag:pde} where the parameter $a$ is replaced by $a + \sigma \dot{\beta}_t$. Notice that the noise vanishes at the asymptotic state $U = 0$ of the pulse. \paragraph{Phase tracking} Although the ability to include noise in models is becoming an essential tool in many disciplines \cite{Bressloff,bressloff2015nonlinear, Zhang,NunnoAdvMathFinance2011,Climate}, our understanding of the impact that such distortions have on basic patterns such as stripes, spots and waves is still in a preliminary stage \cite{brassesco1995brownian,funaki1995scaling,Kuske2017,gowda2015early,vinals1991numerical,Lord2012,Shardlow,Bloemker}. As explained in detail in \cite[{\S}1]{Hamster2017}, several approaches are being developed \cite{Stannat,stannat2014stability,Lang,Inglis} to analyze stochastically forced waves that each require a different set of conditions on the noise and structure of the system. The first main issue that often limits the application range of the results is that the underlying linear flow is required to be immediately contractive, which is (probably) not true for multi-component systems such as \sref{eq:int:fzhnag:pde}. The second main issue is that an appropriate phase needs to be defined for the wave. Various ad-hoc choices have been made for this purpose, which typically rely on geometric intuition of some kind. Inspired by the agnostic viewpoint described in the expository paper \cite{Zumbrun2009}, we initiated a program in \cite{Hamster2017} that aims to define the phase, shape and speed of a stochastic wave purely by the technical considerations that arise when mimicking a deterministic nonlinear stability argument. In particular, the phase is constantly updated in such a way that the neutral part of the linearized flow is not felt by the nonlinear terms. Together with our novel semigroup approach, this allows us to significantly extend the class of systems for which it is possible to obtain stability results. Although defined a priori by technical considerations, we emphasize that in practice our stochastic phase tracking gives us high quality a posteriori information concerning the position of the stochastic wave; see Figure \ref{fig:UDifRef} in the next section. We remark that the formal approach recently developed in \cite{cartwright2019} also touches upon several of the ideas underlying our approach. \paragraph{Stochastic wave speed} In principle, once the notion of a stochastic phase has been defined, one can introduce the stochastic speed by taking a derivative in a suitable sense. In \S\ref{sec:mr:od} and \S\ref{sec:mr:ex} we discuss two key effects that influence the stochastic speed. On the one hand, we show how to construct a `frozen wave' $\Phi_\sigma$ that feels only instantaneous stochastic forcing and travels at an instantaneous speed $c_\sigma$. The interaction between the nonlinear terms and the stochastic forcing causes the shape of the wave profile to fluctuate around $\Phi_\sigma$, which introduces an extra net effect in the speed that we refer to as `orbital drift'. Our framework provides a mechanism by which both effects can be explicitly described in a perturbative fashion. Indeed, the example in \S\ref{sec:mr:ex} illustrates how this expansion can be performed up to order $\O(\ensuremath{\sigma}^2)$. Our computations show that the results are in good agreement with numerical simulations of the full SPDE. We emphasize here that our explicit expressions crucially and non-trivially involve the long-term behavior of the underlying semigroup, a clear indication of the benefits that can be gained by pursuing a semigroup-based approach. \paragraph{Obstructions} Applying the phase tracking procedure sketched above to the FitzHugh-Nagumo SPDE \sref{eq:int:SPDE:fhn}, one can show that the deviation $(\tilde{U}, \tilde{W})$ from the phase-shifted stochastic wave satisfies a SPDE of the general form \begin{equation} \label{eq:int:fhn:spde:deviation} \begin{array}{lcl} d \tilde{U} & = & \Big[ \big( 1 + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 \big) \tilde{U}_{xx} + \mathcal{R}_U(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \Big] dt + \mathcal{S}_U(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \, d \beta_t , \\[0.2cm] d \tilde{W} & = & \Big[ \big( \varrho + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 \big) \tilde{W}_{xx} + \mathcal{R}_W(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \Big] dt + \mathcal{S}_W(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \, d \beta_t \end{array} \end{equation} in which $b$ is a bounded scalar function. For $\sigma \neq 0$ this is a quasi-linear system, but the coefficients in front of the second-order derivatives are constant with respect to the spatial variable $x$. These extra second-order terms are a direct consequence of It\^o's formula, which shows that second derivatives need to be included when applying the chain rule in a stochastic setting. In particular, deterministic phase-shifts lead to extra convective terms, while stochastic phase-shifts lead to extra diffusive terms. These extra nonlinear diffusive terms cause short-term regularity issues that prevent a direct analysis of \sref{eq:int:fhn:spde:deviation} in a semigroup framework. However, in the special case $\varrho = 1$ they can be transformed away by introducing a new time variable $\tau$ that satisfies \begin{equation} \tau'(t) = 1 + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 . \end{equation} This approach was taken in \cite{Hamster2017}, where we studied reaction-diffusion systems with equal diffusion strengths. In this paper we concentrate on the case $\varrho \neq 1$ and develop a more subtle version of this argument. In fact, we use a similar procedure to scale out the first of the two nonlinear diffusion terms. The remaining nonlinear second-order term is only present in the equation for $\tilde{W}$, which allows us to measure its effect on $\tilde{U}$ via the off-diagonal elements of the associated semigroup. The key point is that these off-diagonal elements have better regularity properties than their on-diagonal counterparts, which allows us to side-step the regularity issues outlined above. Indeed, by commuting $\partial_x$ with the semigroup, one can obtain an integral expression for $\tilde{U}$ that only involves $(\tilde{U}, \tilde{W}, \partial_x \tilde{U}, \partial_x \tilde{W})$ and that converges in $L^2(\Real)$. A second time-transform can be used to obtain similar results for $\tilde{W}$. A second major complication in our stochastic setting is that $(\partial_x \tilde{U}, \partial_x \tilde{W})$ cannot be directly estimated in $L^2(\Real)$. Indeed, in order to handle the stochastic integrals we need tools such as the It\^o Isometry, which requires square integrability in time. However, squaring the natural $\O(t^{-1/2})$ short-term behavior of the semigroup as measured in $\mathcal{L}( L^2; H^1 )$ leads to integrals involving $t^{-1}$ which diverge. This difficulty was addressed in \cite{Hamster2017} by controlling temporal integrals of the $H^1$-norm. By performing a delicate integration-by-parts procedure one can explicitly isolate the troublesome terms and show that the divergence is in fact `integrated out'. A similar approach works for our setting here, but the interaction between the separate time-transforms used for $\tilde{U}$ and $\tilde{W}$ requires a careful analysis with some non-trivial modifications. \paragraph{Outlook} Although this paper relaxes the severe equal-diffusion requirement in \cite{Hamster2017}, we wish to emphasize that our technical phase-tracking approach is still in a proof-of-concept state. For example, we rely heavily on the diffusive smoothening of the deterministic flow to handle the extra diffusive effects introduced by the stochastic phase shifts. Taking $\varrho= 0$ removes the former but keeps the latter, which makes it unclear at present how to handle such a situation. This is particularly relevant for many neural field models where the diffusion is modeled by convolution kernels rather than the standard Laplacian. It is also unclear at present if our framework can be generalized to deal with branches of essential spectrum that touch the imaginary axis. This occurs when analyzing planar waves in two or more dimensions \cite{BHM, KAP1997, HJHSTB2D, HJHOBST2D} or when studying viscous shocks in the context of conservation laws \cite{beck2010nonlinear,MasciaZumbrun02,HJHNLS}. In the deterministic case these settings require the use of pointwise estimates on Green's functions, which give more refined control on the linear flow than standard semigroup bounds. We are more confident about the possibility of including more general types of noise in our framework. For instance, we believe that there is no fundamental obstruction including noise that is colored in space\footnote{During the review process, results in this direction were published in \cite{Hamster2020}.}, which arises frequently in many applications \cite{Lang,Garcia2001}. In addition, it should also be possible to remove our dependence on the variational framework developed by Liu and R\"ockner \cite{LiuRockner}. Indeed, our estimates on the mild solutions appear to be strong enough to allow short-term existence results to be obtained for the original SPDE in the vicinity of the wave. \paragraph{Organization} This paper is reasonably self-contained and the main narrative can be read independently of \cite{Hamster2017}. However, we do borrow some results from \cite{Hamster2017} that do not depend on the structure of the diffusion matrix. This allows us to focus our attention on the parts that are essentially different. We formulate our phase-tracking mechanism and state our main results in \S\ref{sec:mr}. In addition, we illustrate these results in the same section by numerically analyzing an example system of FitzHugh-Nagumo type. In \S\ref{sec:SplitSem} we decompose the semigroup associated to the linearization of the deterministic wave into its diagonal and off-diagonal parts. We focus specifically on the short-time behavior of the off-diagonal elements and show that the commutator of $\partial_x$ and the semigroup extends to a bounded operator on $L^2$. In \S\ref{sec:STT} we describe the stochastic phase-shifts and time-shifts that are required to eliminate the problematic terms from our equations. We apply the results from \S\ref{sec:SplitSem} to recast the resulting SPDE into a mild formulation and establish bounds for the final nonlinearities. This allows us to close a nonlinear stability argument in \S\ref{sec:nls} by carefully estimating each of the mild integrals. \paragraph{Acknowledgements.} Hupkes acknowledges support from the Netherlands Organization for Scientific Research (NWO) (grant 639.032.612). \section{Main results} \label{sec:mr} In this paper we are interested in the stability of traveling wave solutions to SPDEs of the form \begin{equation} \label{eq:mr:main:spde} dU = \big[ \rho \partial_{xx} U + f(U) \big] dt + \sigma g(U) d \beta_t. \end{equation} Here we take $U = U(x,t) \in \Real^n$ with $x \in \Real$ and $t \ge 0$. We start in \S\ref{sec:mr:fs} by formulating precise conditions on the system above and stating our main theorem. In \S\ref{sec:mr:od}, we subsequently discuss how our formalism gives us explicit expressions for the stochastic corrections to the deterministic wave speed. We actually compute these corrections up to $\O(\sigma^2)$ for the FitzHugh-Nagumo equation in \S\ref{sec:mr:ex} and show that the results are in good agreement with numerical simulations of the full SPDE. \subsection{Formal setup} \label{sec:mr:fs} We start by formulating two structural conditions on the deterministic and stochastic part of \sref{eq:mr:main:spde}. Together these imply that our system has a variational structure with a nonlinearity $f$ that grows at most cubically. In particular, it is covered by the variational framework developed in \cite{LiuRockner} with $\alpha = 2$. The crucial difference between assumption (HDt) below and assumption (HA) in \cite{Hamster2017} is that the diagonal elements of $\rho$ no longer have to be equal. \begin{itemize} \item[(HDt)]{ The matrix $\rho \in \Real^{n\times n}$ is a diagonal matrix with strictly positive diagonal elements $\{\rho_i\}_{i=1}^n$. In addition, we have $f \in C^3(\Real^n; \Real^n)$ and there exist $u_\pm \in \Real^n$ for which $f(u_-) = f(u_+) = 0 $. Finally, $D^3 f$ is bounded and there exists a constant $K_{\mathrm{var}} > 0$ so that the one-sided inequality \begin{equation} \langle f( u_A ) - f(u_B) , u_A - u_B \rangle_{\Real^n} \le K_{\mathrm{var}} \abs{ u_A - u_B}^2 \end{equation} holds for all pairs $(u_A,u_B) \in \Real^n \times \Real^n$. } \item[(HSt)]{ The function $g \in C^2(\Real^n; \Real^n)$ is globally Lipschitz with $g(u_-) = g(u_+) = 0$. In addition, $Dg$ is bounded and globally Lipschitz. Finally, the process $(\beta_t)_{t \ge 0}$ is a Brownian motion with respect to the complete filtered probability space \begin{equation} \Big(\Omega, \mathcal{F}, ( \mathcal{F}_t)_{t \ge 0} , \mathbb{P} \Big). \end{equation} } \end{itemize} We write $\rho_{\mathrm{min}}=\min\{\rho_i\}>0$, together with $\rho_{\mathrm{max}} = \max\{\rho_i\}$. In addition, we introduce the shorthands \begin{equation} L^2 = L^2(\Real;\Real^n), \qquad H^1 = H^1(\Real ;\Real^n), \qquad H^2 = H^2(\Real; \Real^n). \end{equation} Our final assumption states that the deterministic part of \sref{eq:mr:main:spde} has a spectrally stable traveling wave solution that connects the two equilibria $u_\pm$ (which are allowed to be equal). This traveling wave should approach these equilibria at an exponential rate. \begin{itemize} \item[(HTw)]{ There exists a wavespeed $c_0 \in \Real$ and a waveprofile $\Phi_0 \in C^2(\Real ; \Real^n)$ that satisfies the traveling wave ODE \begin{equation}\label{eq:MR:TWODE} \rho \Phi_0''+c_0 \Phi_0' + f(\Phi_0)=0 \end{equation} and approaches its limiting values $\Phi_0(\pm \infty) = u_\pm$ at an exponential rate. In addition, the associated linear operator $\mathcal{L}_{\mathrm{tw}}: H^2 \to L^2$ that acts as \begin{equation} \label{eq:mr:def:l:tw} [\mathcal{L}_{\mathrm{tw}} v](\xi) = \rho v''(\xi)+c_0 v'(\xi) + Df\big(\Phi_0(\xi) \big) v(\xi) \end{equation} has a simple eigenvalue at $\lambda = 0$ and has no other spectrum in the half-plane $\{\Re \lambda \ge -2\beta\} \subset \mathbb{C}$ for some $ \beta > 0$. } \end{itemize} The formal adjoint \begin{equation} \mathcal{L}_{\mathrm{tw}}^*: H^2 \to L^2 \end{equation} of the operator \sref{eq:mr:def:l:tw} acts as \begin{equation} [\mathcal{L}_{\mathrm{tw}}^* w](\xi) = \rho w''(\xi) -c_0 w'(\xi) + (Df\big(\Phi_0(\xi) \big))^* w(\xi) . \end{equation} Indeed, one easily verifies that \begin{equation} \langle \mathcal{L}_{\mathrm{tw}} v , w \rangle_{L^2} = \langle v, \mathcal{L}_{\mathrm{tw}}^* w \rangle_{L^2} \end{equation} whenever $(v,w) \in H^2 \times H^2$. Here $\langle \cdot, \cdot \rangle_{L^2}$ denotes the standard inner-product on $L^2$. The assumption that zero is a simple eigenvalue for $\mathcal{L}_{\mathrm{tw}}$ implies that $\mathcal{L}_{\mathrm{tw}}^* \psi_{\mathrm{tw}} = 0$ for some $\psi_{\mathrm{tw}} \in H^2$ that we normalize to get \begin{equation} \label{eq:mr:hs:norm:cnd:psitw} \langle \Phi_0' , \psi_{\mathrm{tw}} \rangle_{L^2} = 1. \end{equation} We remark here that it is advantageous to view SPDEs as evolutions on Hilbert spaces, since powerful tools are available in this setting. However, in the case where $u_- \neq u_+$, the waveprofile $\Phi_0$ does not lie in the natural statespace $L^2$. In order to circumvent this problem, we use $\Phi_0$ as a reference function that connects $u_-$ to $u_+$, allowing us to measure deviations from this function in the Hilbert spaces $H^1$ and $L^2$. In order to highlight this dual role and prevent any confusion, we introduce the duplicate notation \begin{equation} \Phi_{\mathrm{ref}} = \Phi_0. \end{equation} This allows us to introduce the sets \begin{equation} \mathcal{U}_{L^2} = \Phi_{\mathrm{ref}} + L^2, \qquad \mathcal{U}_{H^1} = \Phi_{\mathrm{ref}} + H^1, \qquad \mathcal{U}_{H^2} = \Phi_{\mathrm{ref}} + H^2, \end{equation} which we will use as the relevant state-spaces to capture the solutions $U$ to \sref{eq:mr:main:spde}. We now set out to couple an extra phase-tracking\footnote{See \cite[\S 2.4]{Hamster2017} for a more intuitive explanation of this phase.} SDE to our SPDE \sref{eq:mr:main:spde}. As a preparation, we pick a sufficiently large constant $K_{\mathrm{high}} > 0$ together with two $C^\infty$-smooth non-decreasing cut-off functions \begin{equation} \chi_{\mathrm{low}}: \Real \to [\frac{1}{4}, \infty), \qquad \chi_{\mathrm{high}}: \Real \to [- K_{\mathrm{high}} - 1, K_{\mathrm{high}} + 1] \end{equation} that satisfy the identities \begin{equation} \chi_{\mathrm{low}}(\vartheta) = \frac{1}{4} \hbox{ for } \vartheta \le \frac{1}{4}, \qquad \chi_{\mathrm{low}}(\vartheta) = \vartheta \hbox{ for } \vartheta \ge \frac{1}{2}, \end{equation} together with \begin{equation} \chi_{\mathrm{high}}(\vartheta) = \vartheta \hbox{ for } \abs{\vartheta} \le K_{\mathrm{high}}, \qquad \chi_{\mathrm{high}}(\vartheta) = \mathrm{sign}(\vartheta) \big[K_{\mathrm{high}} + 1] \hbox{ for } \abs{\vartheta} \ge K_{\mathrm{high}} + 1. \end{equation} For any $u \in \mathcal{U}_{H^1}$ and $\psi \in H^1$, this allows us to introduce the function \begin{equation} \label{eq:mr:def:b} \begin{array}{lcl} b(u, \psi) & = & - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u , \psi \rangle_{L^2} \big) \Big]^{-1} \chi_{\mathrm{high}}\big( \langle g(u) , \psi \rangle_{L^2} \big) , \\[0.2cm] \end{array} \end{equation} together with the diagonal $n\times n$-matrix \begin{equation} \label{eq:mr:def:kappa} \begin{array}{lcl} \kappa_{\sigma}(u, \psi) & = & \mathrm{diag} \{ \kappa_{\sigma;i}(u, \psi) \}_{i=1}^n := \mathrm{diag} \{ 1 + \frac{1}{2\rho_i} \sigma^2 b( u, \psi )^2 \}_{i=1}^n. \end{array} \end{equation} In addition, for any $u \in \mathcal{U}_{H^1}$, $c \in \Real$ and $\psi \in H^2$ we write \begin{equation} \begin{array}{lcl} \label{eq:mr:def:a} a_{\sigma}(u, c, \psi ) & = & - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi \rangle_{L^2} \big) \Big]^{-1} \langle \kappa_{\sigma}(u,\psi)u , \rho \partial_{\xi \xi} \psi \rangle_{L^2} \\[0.2cm] & & \qquad -\Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi \rangle_{L^2} \big) \Big]^{-1} \langle f(u ) +c \partial_\xi u + \sigma^2 b( u, \psi) \partial_\xi [g(u )] , \psi \rangle_{L^2} . \end{array} \end{equation} The essential difference with the definitions of $\kappa_\sigma$ and $a_{\sigma}$ in \cite{Hamster2017} is that $\kappa_{\sigma}$ is now a matrix instead of a constant. However, this does not affect the ideas and results in {\S}3,4 and {\S}7 of \cite{Hamster2017}, which can be transferred to the current setting almost verbatim. Indeed, one simply replaces $\rho$ by $\rho_\mathrm{min}$ or $\rho_\mathrm{max}$ as necessary. The traveling wave ODE \sref{eq:MR:TWODE} implies that $a_0(\Phi_0, c_0, \psi_{\mathrm{tw}}) = 0$. Following \cite[Prop. 2.2]{Hamster2017}, one can show that there exists a branch of profiles and speeds $(\Phi_\ensuremath{\sigma},c_\ensuremath{\sigma})$ in $\mathcal{U}_{H^2} \times \ensuremath{\mathbb{R}}$ that is $\mathcal{O}(\ensuremath{\sigma}^2)$ close to $(\Phi_0,c_0)$, for which \begin{equation} a_{\sigma}(\Phi_{\sigma}, c_{\sigma}, \psi_{\mathrm{tw}}) = 0. \end{equation} Upon introducing the right-shift operators \begin{equation} [T_{\gamma} u](\xi) = u(\xi - \gamma) \end{equation} we can now formally introduce the coupled SPDE \begin{equation} \label{eq:mr:formal:spde} \begin{array}{lcl} dU &= & \big[ \rho\ensuremath{\partial}_{xx} U + f(U) \big] dt + \sigma g(U) d \beta_t, \\[0.2cm] d\Gamma & = & \big[ c_{\sigma} + a_\sigma \big( U ,c_{\sigma}, T_{\Gamma} \psi_{\mathrm{tw}} \big) \big] dt + \sigma b\big(U , T_{\Gamma} \psi_{\mathrm{tw}} \big) \, d \beta_t , \end{array} \end{equation} which is the main focus in this paper. Following the procedure used to establish \cite[Prop. 2.1]{Hamster2017}, one can show that this SPDE coupled with an initial condition \begin{equation} \label{eq:mr:init:cond} (U, \Gamma)(0) = (u_0 , \gamma_0) \in \mathcal{U}_{H^1} \times \Real \end{equation} has solutions\footnote{We refer to \cite[Prop. 2.1]{Hamster2017} for the precise notion of a solution.} $\big(U(t), \Gamma(t) \big) \in \mathcal{U}_{H^1} \times \Real$ that can be defined for all $t \ge 0$ and are almost-surely continuous as maps into $\mathcal{U}_{L^2} \times \Real$. For any initial condition $u_0 \in \mathcal{U}_{H^1}$ that is sufficiently close to $\Phi_{\sigma}$, \cite[Prop. 2.3]{Hamster2017} shows that it is possible to pick $\gamma_0$ in such a way that \begin{equation} \langle T_{-\ensuremath{\gamma}_{0}}u(0)-\Phi_\ensuremath{\sigma}, \psi_{\mathrm{tw} } \rangle_{L^2} = 0. \end{equation} This allows us to define the process \begin{equation} \label{eq:MR:DefV} V_{u_0}(t) = T_{-\Gamma(t) } \big[ U(t)\big] - \Phi_{\sigma} , \end{equation} which can be thought of as the deviation of the solution $U(t)$ of \sref{eq:mr:formal:spde}-\sref{eq:mr:init:cond} from the stochastic wave $\Phi_{\sigma}$ shifted to the position $\Gamma(t)$. In order to measure the size of this deviation we pick $\ensuremath{\varepsilon} > 0$ and introduce the scalar function \begin{equation}\label{eq:DefNeps} N_{\ensuremath{\varepsilon};u_0} (t) = \norm{V_{u_0}(t)}_{L^2}^2 + \int_0^t e^{- \ensuremath{\varepsilon} (t - s) } \norm{ V_{u_0}(s)}_{H^1}^2 \, ds . \end{equation} For each $T > 0$ and $\eta > 0$ we now define the probability \begin{equation} p_{\ensuremath{\varepsilon}}(T, \eta, u_0) = P\Big( \sup_{0 \le t \le T} N_{\ensuremath{\varepsilon};u_0}(t) > \eta \Big) . \end{equation} Our main result shows that the probability that $N_{\ensuremath{\varepsilon};u_0}$ remains small on timescales of order $\ensuremath{\sigma}^{-2}$ can be pushed arbitrarily close to one by restricting the strength of the noise and the size of the initial perturbation. This extends \cite[Thm. 2.4]{Hamster2017} to the current setting where the diffusion matrix $\rho$ need not be proportional to the identity. \begin{thm}[{see \S\ref{sec:nls}}] \label{thm:mr:orbital:stb} Suppose that (HDt), (HSt) and (HTw) are all satisfied and pick sufficiently small constants $\ensuremath{\varepsilon} > 0$, $\delta_0>0$, $\delta_{\eta} > 0$ and $\delta_{\sigma} > 0$. Then there exists a constant $K > 0$ so that for every $0 \le \sigma \le \delta_{\sigma}T^{-1/2}$, any $u_0 \in \mathcal{U}_{H^1}$ that satisfies $\nrm{u_0-\Phi_\ensuremath{\sigma}}_{L^2}<\delta_0$, any $0 < \eta \le \delta_{\eta}$ and any $T > 0$, we have the inequality \begin{equation} \label{eq:mr:bnd:for:p:eps} p_{\ensuremath{\varepsilon}}(T, \eta, u_0) \le \eta^{-1} K \Big[ \norm{u_0 - \Phi_{\sigma}}_{H^1}^2 + \sigma^2T \Big]. \end{equation} \end{thm} \subsection{Orbital drift} \label{sec:mr:od} On account of the theory developed in \cite[{\S}12]{leadbetter2012extremes} to describe the suprema of finite-dimensional Gaussian processes, we suspect that the $\sigma^2 T$ term appearing in the bound \sref{eq:mr:bnd:for:p:eps} can be replaced by $\sigma^2 \ln T$. This would allow us to consider timescales of order $\mathrm{exp}[\delta_\sigma /\sigma^2 ]$, which are exponential in the noise-strength instead of merely polynomial. The key limitation is that the theory of stochastic convolutions in Hilbert spaces is still in the early stages of development. In order to track the evolution of the phase over such long timescales, we follow \cite{Hamster2017} and introduce the formal Ansatz \begin{equation} \Gamma(t) = c_{\sigma} t + \sigma \Gamma_{\sigma;1}(t) + \sigma^2 \Gamma_{\sigma;2}(t) + O (\ensuremath{\sigma}^3) . \end{equation} The first-order term is the scaled Brownian motion \begin{equation} \label{eq:gamma:sigma:1} \Gamma_{\sigma;1}(t) = b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \beta_t, \end{equation} which naturally has zero mean and hence does not contribute to any deviation of the average observed wavespeed. In order to understand the second-order term, we introduce the orbital drift coefficient \begin{equation} \label{eq:mr:def:c:orb:drift} \begin{array}{lcl} c^{\mathrm{od}}_{\sigma;2} & = & \frac{1}{2} \int_0^\infty D_1^2 a_{\sigma}\big(\Phi_{\sigma} , c_{\sigma} , \psi_{\mathrm{tw}} \big) \Big[S(s) \big( g(\Phi_{\sigma} ) + b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \Phi'_{\sigma} \big), S(s) \big( g(\Phi_{\sigma} ) + b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \Phi'_{\sigma} \big) \Big] \, d s , \end{array} \end{equation} in which $\{S(s)\}_{s \ge 0}$ denotes the semigroup generated by $\mathcal{L}_{\mathrm{tw}}$. In \cite[{\S}2.4]{Hamster2017} we gave an explicit expression for $\Gamma_{\sigma;2}$ and showed that \begin{equation} \lim_{t \to \infty} t^{-1} E \Gamma_{\sigma;2}(t) = c^{\mathrm{od}}_{\sigma;2} . \end{equation} Note that we are keeping the $\sigma$-dependence in these definitions for notational convenience, but in {\S}\ref{sec:mr:ex} we show how the leading order contribution can be determined. The discussion above suggests that it is natural to introduce the expression \begin{equation} \label{eq:mr:def:c:sigma:lim} c_{\sigma;\lim}^{(2)} = c_{\sigma} + \sigma^2 c^{\mathrm{od}}_{\sigma;2}, \end{equation} which satisfies $c_{\sigma;\lim}^{(2)} -c_0 = O(\sigma^2)$. Our conjecture is that the expected value of the wavespeed for large times behaves as $c_{\sigma;\lim}^{(2)} + O(\ensuremath{\sigma}^3)$. In order to interpret this, we note that the profile $\Phi_\ensuremath{\sigma}$ travels at an instantaneous velocity $c_{\sigma}$, but also experiences stochastic forcing. As a consequence of this forcing, which is mean reverting toward $\Phi_\ensuremath{\sigma}$, the profile fluctuates in the orbital vicinity of $\Phi_\sigma$. At leading order, the underlying mechanism behind this behavior resembles an Ornstein-Uhlenbeck process, which means that the amplitude of these fluctuations can be expected to stabilize for large times. This leads to an extra contribution to the observed wavespeed, which we refer to as an orbital drift. The second term in \sref{eq:mr:def:c:sigma:lim} describes the leading order contribution to this orbital drift. \subsection{Example} \label{sec:mr:ex} In order to illustrate our results, let us consider the FitzHugh-Nagumo system \begin{align} \label{eq:example:SPDE:fhn}\begin{split} dU &= \big[ U_{xx} + f_{\mathrm{cub}}(U) -W ] dt + \sigma g^{(u)}( U) d \beta_t, \\[0.2cm] dW &= \big[ \varrho V_{xx} + \ensuremath{\varepsilon}(U-\gamma W)] dt \end{split} \end{align} in a parameter regime where (HDt), (HSt) and (HTw) all hold. We write $\Phi_0=(\Phi^{(u)}_0,\Phi^{(w)}_0)$ for the deterministic wave defined in (HTw) and recall the associated linear operator $\mathcal{L}_{\mathrm{tw}}: H^2(\Real ;\Real^2) \to L^2(\Real; \Real^2)$ that acts as \begin{equation} \begin{array}{lcl} \mathcal{L}_{\mathrm{tw}} & = & \left( \begin{array}{cc} \partial_{\xi \xi} + c_0 \partial_\xi + f'_{\mathrm{cub}}(\Phi_0^{(u)}) & - 1 \\[0.2cm] \ensuremath{\varepsilon} & \varrho \partial_{\xi \xi} + c_0 \partial_\xi - \ensuremath{\varepsilon} \gamma \\[0.2cm] \end{array} \right) . \end{array} \end{equation} The adjoint operator acts as \begin{equation} \begin{array}{lcl} \mathcal{L}^*_{\mathrm{tw}} & = & \left( \begin{array}{cc} \partial_{\xi \xi} - c_0 \partial_\xi + f'_{\mathrm{cub}}(\Phi_0^{(u)}) & \ensuremath{\varepsilon} \\[0.2cm] -1 & \varrho \partial_{\xi \xi} - c_0 \partial_\xi - \ensuremath{\varepsilon} \gamma \\[0.2cm] \end{array} \right) \end{array} \end{equation} and admits the eigenfunction $\psi_{\mathrm{tw}}=(\psi^{(u)}_{\mathrm{tw}},\psi^{(w)}_{\mathrm{tw}})$ that can be normalized in such a way that \begin{equation} \label{eq:mr:ex:norm:adj} \langle \partial_\xi \Phi_0 , \psi_{\mathrm{tw}} \rangle_{L^2(\Real; \Real^2)} = 1. \end{equation} To summarize, we have \begin{equation} \mathcal{L}_{\mathrm{tw}} \partial_\xi ( \Phi^{(u)}_0, \Phi^{(w)}_0 )^T = 0, \qquad \qquad \mathcal{L}^*_{\mathrm{tw}} ( \psi^{(u)}_{\mathrm{tw}}, \psi^{(w)}_{\mathrm{tw}})^T = 0. \end{equation} \begin{figure} \centering \begin{subfigure}{0.5\textwidth} \def\columnwidth{\columnwidth} \input{csco.pdf_tex} \caption{} \end{subfigure}% \begin{subfigure}{0.5\textwidth} \def\columnwidth{\columnwidth} \input{Phi.pdf_tex} \caption{} \end{subfigure} \caption{Numerical results for the solution $(\Phi_\ensuremath{\sigma},c_\ensuremath{\sigma})$ to equation \sref{eq:example:TWode}. Figure (a) shows the numerical approximation of $c_\ensuremath{\sigma}-c_0$ and the first order approximation of this difference. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$. Using \sref{eq:mr:melnikov:cop:c:zero:2} we numerically computed $c_{0;2}=-3.66$. Figure (b) shows the two components of $\Phi_\ensuremath{\sigma}$ for $\ensuremath{\sigma}=0.15$ for the same parameter values. On the scale of this figure they are almost identical to $\Phi_0$. } \label{fig:cs} \end{figure} Upon writing $\Phi_\ensuremath{\sigma}=(\Phi^{(u)}_\ensuremath{\sigma},\Phi^{(w)}_\ensuremath{\sigma})$, the stochastic wave equation $a_{\sigma}(\Phi_\ensuremath{\sigma}, c_\ensuremath{\sigma}, \psi_{\mathrm{tw}} ) = 0$ can be written as \begin{equation} \begin{array}{lcl} \label{eq:example:TWode} - c_\ensuremath{\sigma} \ensuremath{\partial}_{x}\Phi^{(u)}_\ensuremath{\sigma} & = & \left(1+\frac{\ensuremath{\sigma}^2}{2}\tilde{b}(\Phi_\ensuremath{\sigma})^2\right)\ensuremath{\partial}_{xx}\Phi^{(u)}_\ensuremath{\sigma} + f_{\mathrm{cub}}(\Phi^{(u)}_\ensuremath{\sigma}) -\Phi^{(w)}_\ensuremath{\sigma} +\ensuremath{\sigma}^2\tilde{b}(\Phi_\ensuremath{\sigma})\ensuremath{\partial}_x[ g^{(u)}(\Phi^{(u)}_\ensuremath{\sigma})] , \\[0.2cm] - c_\ensuremath{\sigma} \ensuremath{\partial}_{x}\Phi^{(w)}_\ensuremath{\sigma} & = & \left(\varrho +\frac{\ensuremath{\sigma}^2}{2}\tilde{b}(\Phi_\ensuremath{\sigma})^2\right)\ensuremath{\partial}_{xx}\Phi^{(w)}_\ensuremath{\sigma} + \ensuremath{\varepsilon}(\Phi^{(u)}_\ensuremath{\sigma}-\gamma \Phi^{(w)}_\ensuremath{\sigma}) , \end{array} \end{equation} where $\tilde{b}$ is given by \begin{align} \tilde{b}(\Phi_\ensuremath{\sigma})=-\frac{\ip{ g^{(u)} (\Phi^{(u)}_\ensuremath{\sigma} ),\psi^{(u)}_{\mathrm{tw}}}_{L^2(\Real;\Real)}} {\ip{\ensuremath{\partial}_x\Phi_\ensuremath{\sigma},\psi_{\mathrm{tw}}}_{L^2(\Real;\Real^2)}}. \end{align} We now introduce the expansions \begin{equation} \Phi_\ensuremath{\sigma}=\Phi_0+\ensuremath{\sigma}^2\Phi_{0;2}+\O(\ensuremath{\sigma}^4), \qquad \qquad c_\ensuremath{\sigma} = c_0 + \ensuremath{\sigma}^2 c_{0;2} + \O(\ensuremath{\sigma}^4) \end{equation} with $\Phi_{0;2} = \big( \Phi^{(u)}_{0; 2} , \Phi^{(w)}_{0; 2} \big)$. Substituting these expressions into \sref{eq:example:TWode} and balancing the second order terms, we find \begin{equation} \begin{array}{lcl} - c_{0;2} \ensuremath{\partial}_{x}\Phi^{(u)}_0 - c_{0} \ensuremath{\partial}_{x}\Phi^{(u)}_{0;2}& = & \ensuremath{\partial}_{xx}\Phi^{(u)}_{0;2} + \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{xx} \Phi^{(u)}_0 + f'_{\mathrm{cub}}(\Phi^{(u)}_0) \Phi^{(u)}_{0;2} -\Phi^{(w)}_{0;2} \\[0.2cm] & & \qquad +\tilde{b}(\Phi_0)\ensuremath{\partial}_x g^{(u)}(\Phi^{(u)}_0 ) , \\[0.2cm] - c_{0;2} \ensuremath{\partial}_{x}\Phi^{(w)}_0 - c_{0} \ensuremath{\partial}_{x}\Phi^{(w)}_{0;2}& = & \varrho \ensuremath{\partial}_{xx} \Phi^{(w)}_{0;2} + \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{xx} \Phi^{(w)}_{0} + \ensuremath{\varepsilon}(\Phi^{(u)}_{0;2}-\gamma \Phi^{(w)}_{0;2}) , \end{array} \end{equation} which can be rephrased as \begin{equation} \begin{array}{lcl} \mathcal{L}_{\mathrm{tw}} \Phi_{0;2} & = & - c_{0;2} \ensuremath{\partial}_{x} \Phi_0 - \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{\xi \xi} \Phi_0 - \tilde{b} (\Phi_0) \big( \ensuremath{\partial}_x g^{(u)}( \Phi^{(u)}_0 ) , 0 \big)^T . \end{array} \end{equation} Using the normalization \sref{eq:mr:ex:norm:adj} together with the fact that $\langle \psi_{\mathrm{tw}}, \mathcal{L}_{\mathrm{tw}} \Phi_{0;2} \rangle_{L^2(\Real;\Real^2)} = 0$, we find the explicit expression \begin{equation} \label{eq:mr:melnikov:cop:c:zero:2} c_{0;2} = - \frac{1}{2} \tilde{b}(\Phi_0)^2 \langle \ensuremath{\partial}_{\xi \xi} \Phi_0 , \psi_{\mathrm{tw}} \rangle_{L^2(\Real ; \Real^2) } - \tilde{b}(\Phi_0) \langle \ensuremath{\partial}_x g^{(u)} ( \Phi^{(u)}_0 ) , \psi^{(u)}_{\mathrm{tw}} \rangle_{L^2(\Real ;\Real)} \end{equation} for the coefficient that governs the leading order behavior of $c_{\ensuremath{\sigma}} - c_0$. In Figure \ref{fig:cs} we show numerically that $c_{0;2} \ensuremath{\sigma}^2$ indeed corresponds well with $c_{\ensuremath{\sigma}} - c_0$ for small values of $\sigma^2$. In Figure \ref{fig:UDifRef} we illustrate the behavior of a representative sample solution to \sref{eq:example:SPDE:fhn} by plotting it in three different moving frames. Figure \ref{fig:UDifREfa} clearly shows that the deterministic speed $c_0$ overestimates the actual speed as the wave moves to the left. The situation is improved in Figure \ref{fig:UDifREfb}, where we use a frame that travels with the stochastic speed $c_{\sigma}$. However, the position of the wave now fluctuates around a position that still moves slowly to the left as a consequence of the orbital drift. This is remedied in Figure \ref{fig:UDifREfc} where we use the full stochastic phase $\Gamma(t)$. Indeed, the wave now appears to be at a fixed position, but naturally still experiences fluctuations in its shape. This shows that $\Gamma(t)$ is indeed a powerful tool to characterize the position of the wave. \begin{figure} \centering \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{Uc0.pdf_tex} \caption{$U(\cdot +c_0t,t)$} \label{fig:UDifREfa} \end{subfigure}% \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{Ucs.pdf_tex} \caption{$U(\cdot +c_\sigma t,t)$} \label{fig:UDifREfb} \end{subfigure}% \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{UGamma.pdf_tex} \caption{$U(\cdot +\Gamma(t),t)$} \label{fig:UDifREfc} \end{subfigure} \caption{A single realization of the $U$-component of \sref{eq:example:SPDE:fhn} with initial condition $\Phi_\ensuremath{\sigma}$ in 3 different reference frames. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\sigma=0.03$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$.} \label{fig:UDifRef} \end{figure} In order to study the orbital drift mentioned above, we split the semigroup $S(t)$ generated by $\mathcal{L}_{\mathrm{tw}}$ into its components \begin{equation} S(t) = \left( \begin{array}{cc} S^{(uu)}(t) & S^{(uw)}(t) \\[0.2cm] S^{(wu)}(t) & S^{(ww)}(t) \end{array} \right) \end{equation} and introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{I}(s) & = & S^{(uu)}(s) g^{(u)}(\Phi_0 ) + \tilde{b}(\Phi_{0}) S^{(uu)} \partial_\xi \Phi^{(u)}_{0} + \tilde{b}(\Phi_{0}) S^{(uw)} \partial_\xi \Phi^{(w)}_{0} , \end{array} \end{equation} together with \begin{equation} \label{eq:mr:c:zero:od} c^{\mathrm{od}}_{0;2} = -\frac{1}{2}\int_0^\infty \ip{f''_{\mathrm{cub}}(\Phi_0^{(u)}) \mathcal{I}(s)^2, \psi^{(u)}_{\mathrm{tw}}}_{L^2} \, ds. \end{equation} This last quantity is in fact the leading order term in the Taylor expansion of \sref{eq:mr:def:c:orb:drift}, which means that \begin{equation} \begin{array}{lcl} c^{\mathrm{od}}_{\sigma;2} = c^{\mathrm{od}}_{0;2} + O(\sigma^2) . \end{array} \end{equation} In particular, we see that \begin{equation} c^{(2)}_{\sigma;\lim} = c_0 + \sigma^2 \big[ c_{0;2} + c^{\mathrm{od}}_{0;2} \big] + O(\sigma^3) , \end{equation} which means that we have explicitly identified the leading order correction to the full limiting wavespeed. To validate our prediction for the size of the orbital drift, we first approximated $E[\Gamma(t)-c_\ensuremath{\sigma} t]$ numerically by performing an average over a set of numerical simulations. In fact, to speed up the convergence rate, we first subtracted the term $\Gamma_{\sigma;1}(t)$ defined in \sref{eq:gamma:sigma:1} from each simulation, using the same realization of the Brownian motion that was used to generate the path for $(U,W)$. The results can be found in Figure \ref{fig:Difta}. \begin{figure} \centering \begin{subfigure}{.5\textwidth} \centering \def\columnwidth{\columnwidth} \input{rico2.pdf_tex} \caption{} \label{fig:Difta} \end{subfigure}% \begin{subfigure}{.5\textwidth} \centering \def\columnwidth{\columnwidth} \input{AvRico2.pdf_tex} \caption{} \label{fig:Diftb} \end{subfigure} \caption{In (a) we computed the average $E[\Gamma(t)-c_\ensuremath{\sigma} t]$ over 1000 simulations of \sref{eq:example:SPDE:fhn}, using the procedure described in the main text for several values of $\ensuremath{\sigma}$. Notice that a clear trend is visible. In (b) we computed the corresponding orbital drift by evaluating the average \sref{eq:mr:def:c:od:obs} for the data in (a). Observe that there is a reasonable match with the predicted values $c_{0;2}^{\mathrm{od}} \sigma^2$. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$. We used the value $c^{\mathrm{od}}_{0;2}=-0.18$, which was found by evaluating \sref{eq:mr:c:zero:od} numerically. } \label{fig:Drift} \end{figure} In order to eliminate any transients from the data, we subsequently numerically computed the quantity \begin{align} \label{eq:mr:def:c:od:obs} c^{\mathrm{od}}_{\mathrm{obs}} =\frac{2}{T} \int_{\frac{T}{2}}^T \frac{1}{t}E[\Gamma(t)-c_\ensuremath{\sigma} t]dt . \end{align} This corresponds with the average slope of the data in Figure \ref{fig:Difta} on the interval $[T/2, T]$, which is a useful proxy for the observed orbital drift. Figure \ref{fig:Diftb} shows that these quantities are well-approximated by our leading order expression $\sigma^2 c_{0;2}^{\mathrm{od}}$. \section{Structure of the semigroup} \label{sec:SplitSem} In this section we analyze the analytic semigroup $S(t)$ generated by the linear operator $\mathcal{L}_\mathrm{tw}$, focusing specially on its off-diagonal elements. Assumption (HTw) implies that $\mathcal{L}_\mathrm{tw}$ has a spectral gap, which is essential for our computations. In order to exploit this, we introduce the maps $P: L^2 \to L^2$ and $Q: L^2 \to L^2$ that act as \begin{equation} P v = \langle v , \psi_{\mathrm{tw}} \rangle_{L^2} \Phi_0', \qquad \qquad Q v = v - P v . \end{equation} We also introduce the suggestive notation $P_\xi \in \mathcal{L}(L^2; L^2)$ to refer to the map \begin{equation} \label{eq:spl:def:p:x} P_\xi v = - \langle v , \partial_\xi \psi_{\mathrm{tw}} \rangle_{L^2} \Phi_0', \end{equation} noting that $P_\xi v = P \partial_\xi v $ whenever $v \in H^1$. These projections enable us to remove the simple eigenvalue at the origin and obtain the following bounds. \begin{lem}[see \cite{lorenzi2004analytic}] \label{lem:nls:sem:group:decay} Assume that (HDt) and (HTw) hold. Then $\mathcal{L}_{\mathrm{tw}}$ generates an analytic semigroup semigroup $S(t)$ and there exists a constant $M\geq 1$ for which we have the bounds \begin{equation} \begin{array}{lclcl} \nrm{S(t)Q}_{\L(L^2;L^2)}&\leq& M e^{-\b t}, && 0<t<\infty , \\[0.2cm] \nrm{S(t)Q}_{\L(L^2;H^1)}&\leq& M t^{-\frac{1}{2}} , && 0<t\leq 2 , \\[0.2cm] \nrm{S(t)P}_{\L(L^2;H^2)} + \nrm{S(t)P_\xi}_{\L(L^2;H^2)} + \nrm{S(t)\partial_\xi P }_{\mathcal{L}(L^2; H^2)} &\leq& M , & & 0<t\leq 2 , \\[0.2cm] \nrm{S(t)Q}_{\L(L^2;H^2)}&\leq& M e^{-\b t}, & & t\geq 1, \\[0.2cm] \norm{[\mathcal{L}_\mathrm{tw} - \rho \partial_{\xi\xi}] S(t)Q}_{\L(L^2;L^2) } & \le & M t^{-\frac{1}{2}}, & & 0 < t\leq 2, \\[0.2cm] \norm{[\mathcal{L}^*_\mathrm{tw} - \rho \partial_{\xi\xi}] S(t)Q }_{\L(L^2;L^2) } & \le & M t^{-\frac{1}{2}}, & & 0 < t\leq 2 . \end{array} \end{equation} \end{lem} \begin{proof} Since $\rho \partial_{\xi\xi}$ generates $n$ independent heat-semigroups, the analyticity of the semigroup $S(t)$ can be obtained from \cite[Prop 4.1.4]{lorenzi2004analytic}; see also \cite[Prop 6.3.vi]{Hamster2017}. The desired bounds follow from \cite[Prop 5.2.1]{lorenzi2004analytic} together with the fact that $\Phi_0' \in H^3$. \end{proof} In {\S}\ref{sec:STT} we will show that the function $V(t)$ defined in \sref{eq:MR:DefV} satisfies an SPDE that involves nonlinear terms containing second order derivatives. The short-term bounds above are too crude to handle such terms as they lead to divergences in the integrals governing short-time regularity. In addition, the variational framework in \cite{LiuRockner} only provides control on the $H^1$-norm of $V$. In order to circumvent the first issue, we introduce the representation \begin{equation} S(t) v = \left( \begin{array}{ccc} S_{11}(t) & \ldots & S_{1n}(t) \\ \vdots & \ddots & \vdots \\ S_{n1}(t) & \ldots & S_{nn}(t) \end{array} \right) \left( \begin{array}{c} v_1 \\ \vdots \\ v_n \end{array} \right) \end{equation} with operators $S_{ij}(t) \in \mathcal{L}\big( L^2(\Real ; \Real) ; L^2(\Real; \Real) \big)$. Upon writing \begin{equation} S_{\mathrm{d}}(t) = \mathrm{diag}\big( S_{11}(t) , \ldots, S_{nn}(t) \big) \end{equation} this allows us to make the splitting \begin{equation} S(t) = S_{\mathrm{d}}(t) + S_{\mathrm{od}}(t). \end{equation} Our main result below shows that the off-diagonal terms $S_{\mathrm{od}}(t)$ have better short-term bounds than the original semigroup. The second issue can be addressed by introducing the commutator \begin{equation} \Lambda(t) = [S(t) Q, \ensuremath{\partial}_{\xi}] = S(t) Q \ensuremath{\partial}_{\xi} - \ensuremath{\partial}_{\xi} S(t) Q \end{equation} that initially acts on $H^1$. In fact, we show that this commutator can be extended to $L^2$ in a natural fashion and that it has better short-time bounds than $S(t)$. Upon writing \begin{equation} \label{eq:spl:eqn:with:comm} S(t) \ensuremath{\partial}_{\xi} v = S(t) Q \ensuremath{\partial}_{\xi} v + S(t) P_\xi v = \ensuremath{\partial}_{\xi} S(t) Q v + \Lambda(t) v + S(t) P_\xi v, \end{equation} we hence see that the right-hand side of this identity is well-defined for $v \in L^2$. In {\S}\ref{sec:STT} this observation will allow us to give a mild interpretation of the SPDE satisfied by $V(t)$ posed on the space $H^1$. \begin{prop}\label{prp:MainPropSplit} Suppose that (HDt) and (HTw) are satisfied. Then the operator $\Lambda(t)$ can be extended to $L^2$ for each $t \ge 0$. In addition, there is a constant $M > 0$ so that the short-term bound \begin{equation} \label{eq:MainPropSpliti} \nrm{\Lambda(t)}_{L^2\to H^2} +\nrm{S_{\mathrm{od}}(t)}_{L^2\to H^2}\leq M \end{equation} holds for $0 < t \le 1$, while the long-term bound \begin{equation} \label{eq:MainPropSplitii} \nrm{\Lambda(t)}_{L^2\to H^2}\leq Me^{-\b t} \end{equation} holds for $t \ge 1$. \end{prop} \subsection{Functional calculus} For any linear operator $\mathcal{L}: H^2 \to L^2$ we introduce the notation \begin{equation} R(\mathcal{L},\lambda) = [\lambda - \mathcal{L} ]^{-1} \end{equation} for any $\lambda$ in the resolvent set of $\mathcal{L}$. On account of (HTw) and the sectoriality of $\mathcal{L}_{\mathrm{tw}}$, we can find $\eta_+ \in (\frac{\pi}{2} , \pi)$ and $M > 0$ so that the sector \begin{equation} \Omega_{\mathrm{tw}} = \{ \lambda \in \mathbb{C}\setminus \{ 0 \} : \abs{\mathrm{arg}(\lambda) } < \eta_+ \} \end{equation} lies entirely in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$, with \begin{equation} \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) }_{L^2 \to L^2} \le \frac{M}{\abs{\lambda} } \end{equation} for all $\lambda \in \Omega_{\mathrm{tw}}$. Since $\lambda = 0$ is a simple eigenvalue for $\mathcal{L}_{\mathrm{tw}}$, we have the limit \begin{equation} \label{eq:spl:simple:pole} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) \to P \end{equation} as $\lambda \to 0$. For any $r > 0$ and any $\eta \in (\frac{\pi}{2}, \eta_+)$, the curve given by \begin{align} \ensuremath{\gamma}_{r,\eta} = \{\l\in\ensuremath{\mathbb{C}}:|\mathrm{arg}\l| =\eta, |\l|>r\} \cup\{\l\in\ensuremath{\mathbb{C}}:|\mathrm{arg}\l|\leq \eta, |\l|=r\} \end{align} lies entirely in $\Omega_{\mathrm{tw}}$. This curve can be used \cite[(1.10)]{lorenzi2004analytic} to represent the semigroup $S$ in the integral form \begin{equation}\label{eq:IntDefS} S(t) = \frac{1}{2 \pi i}\int_{\gamma_{r, \eta}} e^{t \lambda} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \, d \lambda \end{equation} for any $ t > 0$, where $\gamma_{r, \eta}$ is traversed in the upward direction. We will analyze $\Lambda(t)$ and $S_{\mathrm{od}}(t)$ by manipulating this integral. As a preparation, we state two technical results concerning the convergence of contour integrals that are similar to \sref{eq:IntDefS}. We note that our computations here are based rather directly on \cite[{\S}1.3]{lorenzi2004analytic}. \begin{lem} \label{lem:spl:est:from:k} Suppose that (HDt) and (HTw) are satisfied and pick $r > 0$ together with $\eta \in (\frac{\pi}{2} , \eta_+)$. Suppose furthermore that $\lambda \mapsto K(\lambda) \in \mathbb{C}$ is an analytic function on the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ and that there exist constants $C > 0$ and $\vartheta \ge 1$ so that the estimate \begin{equation} \abs{K(\lambda) } \le \frac{C}{\abs{\lambda}^{\vartheta} } \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. Then there exists $C_1 > 0$ so that \begin{equation} \abs{\int_{\gamma_{r, \eta} } e^{\lambda t} K(\lambda) \, d \lambda } \le C_1 t^{ \vartheta -1 } \end{equation} for all $t > 0$. \end{lem} \begin{proof} Writing \begin{equation} \mathcal{I}(t) = \int_{\gamma_{r, \eta}} e^{\lambda t} K(\lambda) \, d \lambda \end{equation} and substituting $\lambda t = \xi$, the analyticity of $K$ on $\Omega_{\mathrm{tw}}$ implies \begin{equation} \mathcal{I}(t) = \int_{\gamma_{rt, \eta}} e^{\xi} K\left(\frac{\xi}{t}\right) \, \frac{1}{t} d \xi = \int_{\gamma_{r, \eta}} e^{\xi} K\left(\frac{\xi}{t}\right) \, \frac{1}{t} d \xi . \end{equation} Using the obvious parametrization for $\ensuremath{\gamma}_{r,\eta}$, we find \begin{equation} \label{eq:IntegrantDefT} \begin{array}{lcl} \mathcal{I}(t) &=& -\int_r^\infty e^{(\rho\cos(\eta)-i\rho\sin(\eta))} K\big(t^{-1} \rho e^{-i\eta} \big) e^{-i\eta} t^{-1} d\rho \\[0.2cm] & & \qquad +\int_\eta^\eta e^{(r\cos(\a)-ir\sin(\a))} K\big( t^{-1} re^{i\a}) \big) ire^{i\a} t^{-1} d\a \\[0.2cm] && \qquad + \int_r^\infty e^{(\rho\cos(\eta)-i\rho\sin(\eta))} K\big( t^{-1} \rho e^{i\eta}\big) e^{i\eta} t^{-1} d\rho . \end{array} \end{equation} We hence obtain the desired estimate \begin{equation} \label{eq:IntegrantDefTNorm} \begin{array}{lcl} \abs{\mathcal{I}(t)} &\leq& C t^{\vartheta - 1} \left(2\int_r^\infty e^{\rho\cos(\eta)} \rho^{-\vartheta} \, d\rho +\int_\eta^\eta e^{r\cos(\a)} r^{1 - \vartheta} d\a\right)\\[0.2cm] &:= & C_1 t^{\vartheta - 1} . \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:spl:exp:est:for:bnd:itg} Suppose that (HDt) and (HTw) are satisfied and pick $r > 0$ together with $\eta \in (\frac{\pi}{2} , \eta_+)$. Suppose furthermore that $\lambda \mapsto K(\lambda)$ is an analytic function on the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ and that there exists a constant $C > 0$ so that the estimate \begin{equation} \abs{K(\lambda) } \le C \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. Then there exists $C_2 > 0$ so that the bound \begin{equation} \abs{ \int_{\gamma_{r, \eta} } e^{\lambda t} K(\lambda) \, d \lambda } \le C_2 e^{ - \beta t } \end{equation} holds for all $ t \ge 1$. \end{lem} \begin{proof} Since $K$ remains bounded for $\lambda \to 0$, this function can be analytically extended to a neighborhood of $\lambda = 0$. We can hence replace the curve $\gamma_{r, \eta}$ by the two half-lines \begin{equation} \tilde{\gamma}_{\eta'} = - \beta + \{ \lambda \in \mathbb{C}: \abs{\mathrm{arg} \lambda } = \eta' \} \end{equation} for appropriate $\eta' \in (\frac{\pi}{2} , \eta_+)$. We can then compute \begin{equation} \begin{array}{lcl} \abs{ \int_{\tilde{\gamma}_{\eta'} } e^{\lambda t} K(\lambda) \, d \lambda} & \le & 2 C e^{- \beta t} \int_0^\infty e^{ \rho \cos(\eta') t } \, d \rho \\[0.2cm] & \le & 2 C e^{- \beta t} \int_0^\infty e^{ \rho \cos(\eta') } \, d \rho \\[0.2cm] & := & C_2 e^{- \beta t} . \end{array} \end{equation} \end{proof} \subsection{The commutator $\Lambda(t)$} In this section we analyze $\Lambda(t)$ and establish the statements in Proposition \ref{prp:MainPropSplit} that concern this commutator. Based on the identity \sref{eq:IntDefS}, we first set out to compute the commutator of $R(\mathcal{L}_{\mathrm{tw}}, \lambda)$ and $\ensuremath{\partial}_{\xi}$. As a preparation, we introduce the commutator \begin{equation} \label{eq:spl:def:B} B = [\L_{\mathrm{tw}} Q, \ensuremath{\partial}_{\xi}] = [\L_{\mathrm{tw}} , \ensuremath{\partial}_{\xi}] , \end{equation} which can easily be seen to act as \begin{equation} B v = - D^2 f(\Phi_0)\Phi_0' v \end{equation} for any $v \in H^3$. \begin{lem}\label{lem:split:res} Suppose that (HDt) and (HTw) are satisfied and pick any $\lambda$ in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$. Then for any $g \in H^1$ we have the identity \begin{equation} \label{eq:split:comm:resolv} \begin{array}{lcl} [R(\mathcal{L}_{\mathrm{tw}},\lambda) Q, \partial_\xi ] g & = & R(\mathcal{L}_{\mathrm{tw}},\lambda) Q \partial_\xi g - \partial_\xi R(\mathcal{L}_{\mathrm{tw}},\lambda)Q g \\[0.2cm] & = & R(\mathcal{L}_{\mathrm{tw}},\lambda) \Big[ B R(\mathcal{L}_{\mathrm{tw}},\lambda) Qg - [P, \partial_\xi] g \Big] . \end{array} \end{equation} \end{lem} \begin{proof} Let us first write \begin{equation} v = [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g. \end{equation} The definition \sref{eq:spl:def:B} implies that \begin{equation} \begin{array}{lcl} [\lambda - \mathcal{L}_{\mathrm{tw}} ] Q\partial_\xi v & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}} ] Q v - B v + \lambda [Q , \partial_\xi] v \\[0.2cm] & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}}] v - \partial_\xi \lambda (I -Q) v - B v + \lambda [Q, \partial_\xi] v \\[0.2cm] & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}} ] v - \lambda \partial_{\xi} P v - B v - \lambda [P, \partial_{\xi}] v \\[0.2cm] & = & \partial_{\xi} Q g - B v - \lambda P \partial_{\xi} v \\[0.2cm] & = & Q \partial_{\xi} g - [P , \partial_{\xi}] g - B v - \lambda P \partial_{\xi} v . \end{array} \end{equation} Using $(\lambda - \mathcal{L}_{\mathrm{tw}} )^{-1} P = \lambda^{-1} P$ we obtain \begin{equation} \begin{array}{lcl} [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q \partial_{\xi} g & = & Q \partial_{\xi} v + [\lambda - \mathcal{L}_{\mathrm{tw}}]^{-1} B v + P \partial_{\xi} v + [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} [P , \partial_{\xi}] g \\[0.2cm] & = & \partial_{\xi} [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g + [\lambda -\mathcal{L}_{\mathrm{tw}} ]^{-1} B [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g \\[0.2cm] & & \qquad + [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} [P , \partial_{\xi}] g , \end{array} \label{eq:ResIden} \end{equation} which can be reordered to yield \sref{eq:split:comm:resolv}. \end{proof} On account of \sref{eq:split:comm:resolv} we recall the definition \sref{eq:spl:def:p:x} and introduce the operator $T_A \in \mathcal{L}(L^2 ; L^2)$ that acts as \begin{equation} T_A = \partial_{\xi} P - P_\xi. \end{equation} In addition, we introduce the expression \begin{equation} T_B(\lambda) = B R(\L_{\mathrm{tw}},\l)Q, \end{equation} which is well-behaved in the following sense. \begin{lem} \label{eq:spl:est:on:TB} Suppose that (HDt) and (HTw) are satisfied. Then there exists a constant $C > 0$ so that for any $\lambda$ in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ the operator $T_B(\lambda)$ satisfies the bound \begin{equation} \norm{T_B(\lambda)}_{L^2 \to L^2} \le \frac{C}{1 + \abs{\lambda}}. \end{equation} In additions, the maps \begin{equation} \label{eq:spl:an:continuations:TAB} \lambda \mapsto T_B(\lambda) \in \mathcal{L}(L^2;L^2), \qquad \lambda \mapsto \lambda^{-1} P \big[T_A + T_B(\lambda) \big] \in \mathcal{L}(L^2;L^2) \end{equation} can be continued analytically into the origin $\lambda = 0$. \end{lem} \begin{proof} Since $\Phi_0$ and $\Phi_0'$ are bounded functions, we have \begin{align} \nrm{ BR(\L_{\mathrm{tw}},\l)}_{L^2\to L^2}&\leq \frac{M}{\abs{\l}}\nrm{D^2 f(\Phi_0)\Phi_0'}_{\infty}. \end{align} Using $P \mathcal{L}_{\mathrm{tw}} = 0$ and the resolvent identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) = - I + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda), \end{equation} we may compute \begin{equation} \begin{array}{lcl} P [T_A + T_B(\lambda) \big] & = & P_\xi P - P_\xi + P B R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & P_\xi P - P_\xi + P \mathcal{L}_{\mathrm{tw}} \partial_{\xi} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q - P \partial_{\xi} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & P_\xi P - P_\xi + P_\xi Q - P \partial_{\xi} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & - P \partial_{\xi} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda ) Q . \end{array} \end{equation} Since $\lambda \mapsto R(\mathcal{L}_{\mathrm{tw}} , \lambda ) Q $ can be analytically continued to $\lambda = 0$ on account of \sref{eq:spl:simple:pole}, the same hence holds for the functions \sref{eq:spl:an:continuations:TAB}. \end{proof} Upon fixing $r > 0$ and $\eta \in (\frac{\pi}{2}, \eta_+ )$, we now introduce the expressions \begin{equation} \label{eq:spl:defs:lambda:a:b} \begin{array}{lcl} \Lambda_{\mathrm{ex};A}(t) & = & \frac{1}{2 \pi i} \int_{\ensuremath{\gamma}_{r,\eta}} e^{\l t} R(\L_{\mathrm{tw}},\l) T_A \, d\l , \\[0.2cm] \Lambda_{\mathrm{ex};B}(t) & = & \frac{1}{2 \pi i} \int_{\ensuremath{\gamma}_{r,\eta}} e^{\l t} R(\L_{\mathrm{tw}},\l) T_B(\lambda) \, d\l \end{array} \end{equation} and write \begin{equation} \Lambda_{\mathrm{ex}}(t) = \Lambda_{\mathrm{ex};A}(t) + \Lambda_{\mathrm{ex};B}(t). \end{equation} We note that \begin{equation} \Lambda_{\mathrm{ex};A}(t) = S(t) T_A = S(t) \partial_{\xi} P - S(t) P_\xi, \end{equation} which for $0 < t \le 1$ is covered by the bounds in Lemma \ref{lem:nls:sem:group:decay}. The results below show that $\Lambda_{\mathrm{ex}}(t)$ is well-defined as an operator in $\mathcal{L}(L^2 ; H^2)$ and that it is indeed an extension of the commutator $\Lambda(t)$. \begin{lem}\label{lem:LexWellDef} Suppose that (HDt) and (HTw) are satisfied. Then $\Lambda_{\mathrm{ex} }(t)$ is a well-defined operator in $\mathcal{L}(L^2, H^2)$ for all $t > 0$ that does not depend on $r > 0$ and $\eta \in (\frac{\pi}{2} , \eta_+)$. In addition, there exists a constant $C > 0$ so that the bound \begin{equation} \nrm{ \Lambda_{\mathrm{ex}}(t) }_{L^2 \to H^2} \le C e^{-\beta t } \end{equation} holds for all $t > 0$. \end{lem} \begin{proof} Note first that there exists a constant $C'_1 > 0$ for which \begin{equation} \norm{v}_{H^2} \le C'_1 \big[ \norm{\mathcal{L}_{\mathrm{tw}} v}_{L^2} + \norm{v}_{L^2} \big] \end{equation} holds for all $v \in H^2$. On account of the identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] = - \big[ T_A + T_B(\lambda)\big] + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda) \big] \end{equation} and the analytic continuations \sref{eq:spl:an:continuations:TAB}, we see that there exist $C_2' > 0$ so that \begin{equation} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] }_{L^2 \to L^2} + \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] }_{L^2 \to L^2} \le C_2' \end{equation} for all $\lambda \in \Omega_{\mathrm{tw}}$. We can now apply Lemma \ref{lem:spl:exp:est:for:bnd:itg} to obtain the desired bound for $t \ge 1$. The bounds in Lemma \ref{eq:spl:est:on:TB} imply that there exists $C_3' > 0$ for which \begin{equation} \begin{array}{lcl} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_B(\lambda)\big] }_{L^2 \to L^2} & \le & \frac{C_3'}{1 + \abs{\lambda} } \\[0.2cm] \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_B(\lambda)\big] }_{L^2 \to L^2} & \le & \frac{C_3'}{\abs{\lambda} } \end{array} \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. We can hence use Lemma \ref{lem:spl:est:from:k} to find a constant $C_4' > 0$ for which we have the bound \begin{equation} \norm{\Lambda_{\mathrm{ex}; B}(t) }_{L^2 \to H^2} \le C_4' \end{equation} for all $0 < t \le 1$. A direct application of Lemma \ref{lem:nls:sem:group:decay} shows that also \begin{equation} \norm{\Lambda_{\mathrm{ex}; A}(t) }_{L^2 \to H^2} \le M \end{equation} for all $0 < t \le 1$, which completes the proof. \end{proof} \begin{cor}\label{cor:LambdaExt} Suppose that (HDt) and (HTw) are satisfied. Then for any $g \in H^1$ we have \begin{equation} \Lambda_{\mathrm{ex}}(t) g = \Lambda(t) g := [ S(t) Q , \partial_{\xi} ] g . \end{equation} \end{cor} \begin{proof} The result follows by integrating both sides of the identity \sref{eq:split:comm:resolv} over the contour $\ensuremath{\gamma}_{r,\eta}$ and using \sref{eq:IntDefS} together with \sref{eq:spl:defs:lambda:a:b}. \end{proof} \subsection{Semigroup block structure} \label{sec:SemGrBlock} For the nonlinear stability proof in \S\ref{sec:nls} we need to understand how the off-diagonal terms of $S(t)$ act on a second order nonlinearity. In order to do this, we first write $S_{\mathrm{d};I}(t)$ for the semigroup generated by \begin{equation} \mathcal{L}_{\mathrm{tw;d}} = \rho\ensuremath{\partial}_{\xi\xi}v + c_0 v_{\xi}, \end{equation} which contains only diagonal terms. We also write \begin{equation} S_{\mathrm{od};I}(t) = S(t) - S_{\mathrm{d};I}(t) \end{equation} for the rest of the semigroup. Note that $S_{\mathrm{od};I}(t)$ is not strictly off-diagonal, but it has the same off-diagonal elements as $S_{\mathrm{od}}(t)$. \begin{lem}\label{lem:DecayPropG} Suppose that (HDt) and (HTw) are satisfied. Then there exists a constant $C>0$ for which the short-term bound \begin{align} \begin{split} \nrm{S_{\mathrm{od;I}}(t)}_{L^2\to H^2}&\leq C \end{split} \end{align} holds for all $0 \le t \le 1$. \end{lem} \begin{proof} Possibly decreasing the size of $\eta_+$, we may assume that $\Omega_{\mathrm{tw}}$ is contained in the resolvent set of $\mathcal{L}_{\mathrm{tw};\mathrm{d}}$. We may also assume that the bound \begin{equation} \norm{R(\mathcal{L}_{\mathrm{tw};\mathrm{d}}, \lambda)}_{L^2 \to L^2} \le \frac{M}{\abs{\lambda}} \end{equation} holds for $\lambda \in \Omega_{\mathrm{tw}}$ by increasing the size of $M > 0$ if necessary. For any $r > 0$ and $\eta \in (\frac{\pi}{2} , \eta_+)$ we have \begin{align}\begin{split} S_{\mathrm{od;I}}(t)&= \frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}[R(\L_{\mathrm{tw}},\l)-R(\L_{\mathrm{tw;d}},\l)] \, d\l \\[0.2cm] &=\frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}R(\L_{\mathrm{tw}},\l) (\L_{\mathrm{tw}}-\L_{\mathrm{tw;d}}) R(\L_{\mathrm{tw;d}},\l) \,d\l \\[0.2cm] &= \frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}R(\L_{\mathrm{tw}},\l) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) \, d\l . \end{split} \end{align} On account of the identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) = - Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) \end{equation} we have the bounds \begin{equation} \begin{array}{lcl} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) }_{L^2 \to L^2} & \le & \norm{Df(\Phi_0)}_\infty \frac{M(M+1)}{\abs{\lambda}}, \\[0.2cm] \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) }_{L^2 \to L^2} & \le & \norm{Df(\Phi_0)}_\infty \frac{M^2}{\abs{\lambda}^2 }. \end{array} \end{equation} The desired estimate hence follows from Lemma \ref{lem:spl:est:from:k}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:MainPropSplit}] The statements concerning $\Lambda(t)$ follow directly from Lemma \ref{lem:LexWellDef} and Corollary \ref{cor:LambdaExt}. The bound for $S_{\mathrm{od}}(t)$ follows from Lemma \ref{lem:DecayPropG} since $S_{\mathrm{od;I}}(t)$ contains all the non-trivial elements of $S_{\mathrm{od}}(t)$. \end{proof} \section{Stochastic transformations} \label{sec:STT} In this section we set out to derive a mild formulation for the SPDE satisfied by the process \begin{equation} \label{eq:sps:def:V} V(t) = T_{-\Gamma(t)} [ U(t)] - \Phi_\ensuremath{\sigma} , \end{equation} which measures the deviation from the traveling wave $\Phi_\ensuremath{\sigma}$ in the coordinate $\xi=x-\ensuremath{\Gamma}(t)$. After recalling several results from \cite{Hamster2017} concerning the stochastic phaseshift, we focus on the new extra second-order nonlinearity that appears in our setting. We use the results from \S\ref{sec:SplitSem} to rewrite this term in such a way that an effective mild integral equation can be formulated that does not involve second derivatives. We obtain estimates on all the nonlinear terms in \S\ref{sec:BoundsNl} and rigorously verify that $V$ indeed satisfies this mild equation in \S\ref{sec:MildForm}. We start by introducing the nonlinearity \begin{equation}\label{eq:stt:DefR} \begin{array}{lcl} \mathcal{R}_\ensuremath{\sigma} (v) & = & \kappa_{\sigma}(\Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}} ) \rho \partial_{\xi\xi} [\Phi_\ensuremath{\sigma} + v] \\[0.2cm] & & \qquad + f(\Phi_\ensuremath{\sigma} + v) + \sigma^2 b(\Phi_\ensuremath{\sigma} + v, \psi_{\mathrm{tw}} ) \partial_\xi[ g(\Phi_\ensuremath{\sigma} + v) ] \\[0.2cm] & & \qquad + \Big[c_\ensuremath{\sigma} + a_{\sigma}\big(\Phi_\ensuremath{\sigma} + v , c_\ensuremath{\sigma} , \psi_{\mathrm{tw}} \big) \Big] [\Phi_\ensuremath{\sigma}' + v'] , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{S}_{\ensuremath{\sigma}}(v) & = & g( \Phi_\ensuremath{\sigma} + v ) + b( \Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}}) [\Phi_\ensuremath{\sigma}' + v']. \\[0.2cm] \end{array} \end{equation} In \cite[{\S}5]{Hamster2017} we established that the shifted process $V$ can be interpreted as a weak solution to the SPDE \begin{equation} \label{eq:WeakV} \begin{array}{lcl} d V & = & \mathcal{R}_\ensuremath{\sigma}(V) \, dt + \sigma \mathcal{S}_\ensuremath{\sigma}(V) d\b_t . \end{array} \end{equation} However, in our case here $\kappa_{\sigma}$ is a matrix rather than a scalar. This means that we cannot transform \sref{eq:WeakV} into a semilinear problem by a simple time transformation. But, we can improve individual components of the system by rescaling time with the diagonal elements $\k_{\ensuremath{\sigma};i}$. To this end, we follow \cite[Lem. 3.6]{Hamster2017} to find a constant $K_{\kappa} > 0$ for which \begin{equation} \label{eq:prlm:kappa:glb:ests} 1 \leq \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v, \psi_\mathrm{tw}) \le K_{\kappa} \end{equation} holds for every $\sigma \in (-\delta_{\sigma}, \delta_{\sigma})$, every $v \in H^1$ and every $1 \le i \le n$. Upon introducing the transformed time \begin{equation} \tau_{i}(t, \omega) = \int_0^t \kappa_{\sigma;i}\big( \Phi_\ensuremath{\sigma} + V(s, \omega) , \psi_{\mathrm{tw}} \big) \, d s , \end{equation} the bound \sref{eq:prlm:kappa:glb:ests} allows us to conclude that $t \mapsto \tau_i(t)$ is a continuous strictly increasing $(\mathcal{F}_t)$-adapted process that satisfies \begin{equation} \label{eq:mild:ineqs:tau:phi} t \le \tau_i(t) \le K_{\kappa} t \end{equation} for $0 \le t \le T$. In particular, we can define a map \begin{equation} \label{eq:mild:defn:t:phi:spaces} t_i: [0, T] \times \Omega \to [0, T] \end{equation} for which \begin{equation} \label{eq:mild:defn:t:phi} \tau_i(t_i(\tau, \omega), \omega) = \tau. \end{equation} This in turn allows us to introduce the time-transformed map \begin{equation} \ensuremath{\overline{V}}_i: [0,T] \times \Omega \to L^2 \end{equation} that acts as \begin{equation} \label{eq:mld:def:ovl:v} \begin{array}{lcl} \overline{V_i}(\tau, \omega) & = & V\big( t_i(\tau, \omega) , \omega \big) . \\[0.2cm] \end{array} \end{equation} Upon introducing \begin{equation} \label{eq:md:overline:r:sigma} \begin{array}{lcl} \overline{\mathcal{R}}_{\ensuremath{\sigma};i} (v) & = & \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}})^{-1} \mathcal{R}_{\ensuremath{\sigma}}(v) - \mathcal{L}_{\mathrm{tw}} v \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \label{eq:md:overline:s:sigma} \begin{array}{lcl} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) & = & \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v,\psi_{\mathrm{tw}})^{-1/2} \mathcal{S}_{\ensuremath{\sigma}}(v), \\[0.2cm] \end{array} \end{equation} it is possible to follow \cite[Prop. 6.3]{Hamster2017} to show that $\overline{V}_i$ is a weak solution of \begin{equation} \label{eq:mild:weak:formul} d \overline{V}_i = \big[\mathcal{L}_{\mathrm{tw}} \overline{V}_i + \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(\overline{V}_i) \big] \, d \tau + \sigma \overline{\mathcal{S}}_{\ensuremath{\sigma};i}( \overline{V}_i) d\overline{\b}_{\tau;i} \end{equation} for every $1 \le i \le n$, in which $(\overline{\b}_{\tau;i})_{\tau \ge 0}$ denotes the time-transformed Brownian motion that is now adapted to an appropriately transformed filtration $(\overline{\mathcal{F}}_{\tau;i})_{\tau \ge 0}$; see \cite[Lem. 6.2]{Hamster2017}. The nonlinearity $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$ is less well-behaved than its counterpart from \cite[Prop. 6.3]{Hamster2017} since it still contains second order derivatives. In order to isolate these terms, we pick any $v \in H^1$ and introduce the diagonal matrix \begin{equation}\label{eq:DefPhi} \phi_{\sigma;i}(v) = \big[\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+v,\psi_{\mathrm{tw}}) \big]^{-1} \k_{\sigma}(\Phi_\ensuremath{\sigma} + v, \psi_{\mathrm{tw}} ) - I \end{equation} together with the function \begin{align} \Upsilon_{\ensuremath{\sigma};i}(v)&=\rho\phi_i(v)\ensuremath{\partial}_{\xi} v . \label{eq:DefUpsilon} \end{align} We note that $\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}$ can be considered as the error caused by allowing unequal diffusion coefficients in our main structural assumption (HDt). Indeed, upon defining our final nonlinearity implicitly by imposing the splitting \begin{equation} \label{eq:transf:def:w} \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(v)= \mathcal{W}_{\ensuremath{\sigma};i}(v)+\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}(v), \end{equation} our first main result states that $\mathcal{W}_{\ensuremath{\sigma};i}$ is well-behaved in the sense that it admits bounds that are similar to those derived for the full nonlinearity $\overline{\mathcal{R}}$ in \cite{Hamster2017}. Indeed, it depends at most quadratically on $\norm{v}_{H^1}$ but not on $\nrm{v}_{H^2}$. Note furthermore that $\Phi_{\sigma}$ was constructed in such a way that $\overline{\mathcal{R}}(0) = 0$. \begin{prop} \label{prp:fnl:bnds} Assume that (HDt), (HSt) and (HTw) all hold and fix $1 \le i \le n$. Then there exist constants $K > 0$ and $\delta_v > 0$ so that for any $0 \le \sigma \le \delta_{\sigma}$ and any $v \in H^1$, the following properties hold true. \begin{itemize} \item[(i)]{ We have the bound \begin{equation} \label{eq:fnl:rs:glb} \begin{array}{lcl} \norm{ \mathcal{W}_{\ensuremath{\sigma};i}(v) }_{L^2} & \le & K \sigma^2 \norm{v}_{H^1} + K \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] , \end{array} \end{equation} together with \begin{equation} \label{eq:mld:bnd:upsilon} \norm{\Upsilon_{\ensuremath{\sigma};i}(v)}_{L^2} \leq K \ensuremath{\sigma}^2 \nrm{v}_{H^1}. \end{equation} } \item[(ii)]{ We have the estimate \begin{equation} \norm{ \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) }_{L^2} \le K\big[ 1 + \norm{v}_{H^1} \big]. \end{equation} } \item[(iii)]{ If $\norm{v}_{L^2} \le \delta_v$, then we have the identities \begin{equation}\label{eq:MildNonProjZero} \langle \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} = \langle \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} = 0. \end{equation} } \end{itemize} \end{prop} The second main result of this section formulates a mild representation for solutions to \sref{eq:mild:weak:formul}. Items (i)-(iv) are included for completeness and are analogous to the results in \cite[Prop. 6.3]{Hamster2017}. However, item (v) is specific to our situation because of the presence of the error term $\Upsilon_{\ensuremath{\sigma};i}$. Indeed, we shall need to exploit the techniques developed in {\S}\ref{sec:SplitSem} to transfer the troublesome $\partial_{\xi}$ present in \sref{eq:transf:def:w} from the $\Upsilon_{\ensuremath{\sigma};i}$ term to the semigroup. Nevertheless, the integral involving $\partial_{\xi} S$ is integrable in $H^{-1}$ but not necessarily in $L^2$. \begin{prop} \label{prp:MildTransSys} Assume that (HDt), (HSt), (HTw) are all satisfied. Then the map \begin{equation} \overline{V}_i: [0, T] \times \Omega \to L^2 \end{equation} defined by the transformations \sref{eq:sps:def:V} and \sref{eq:mld:def:ovl:v} satisfies the following properties. \begin{itemize} \item[(i)]{ For almost all $\omega \in \Omega$, the map $\tau \mapsto \overline{V_i}(\tau; \omega)$ is of class $C\big([0,T]; L^2 \big)$. } \item[(ii)]{ For all $\tau \in [0, T]$, the map $\omega \mapsto \overline{V_i}(\tau,\omega)$ is $(\overline{\mathcal{F}}_{\tau;i})$-measurable. } \item[(iii)]{ We have the inclusion \begin{equation} \begin{array}{lcl} \overline{V_i} \in \mathcal{N}^2\big([0,T]; (\overline{\mathcal{F}})_{\tau;i} ; H^1 \big) , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(\overline{V_i}) \in \mathcal{N}^2\big([0,T]; (\overline{\mathcal{F}})_{\tau;i} ; L^2 \big) . \end{array} \end{equation} } \item[(iv)]{For almost all $\omega \in \Omega$, we have the inclusion \begin{align}\label{eq:WIntoL2} \mathcal{W}_{\ensuremath{\sigma};i}\big( \ensuremath{\overline{V}}_i(\cdot, \omega) \big) &\in L^1([0,T]; L^2) \end{align} together with \begin{align} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\cdot, \omega)\big)&\in L^1([0,T]; L^2) . \end{align}} \item[(v)]{ For almost all $\omega \in \Omega$, the identity \begin{align}\begin{split}\label{eq:MildEqTimeTrans} \overline{V_i}(\tau)=&S(\tau)\overline{V_i}(0) +\int_0^\tau S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}\big(\overline{V}_i(\tau')\big) \,d\tau' +\sigma \int_0^{\tau} S(\tau-\tau')\overline{\mathcal{S}}_{\ensuremath{\sigma};i} \big(\overline{V}_i(\tau') \big)d\overline{\b}_{\tau';i}\\[0.2cm] &+\int_0^{\tau} \ensuremath{\partial}_{\xi} S(\tau-\tau') Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big) \, d\tau' +\int_0^{\tau} \Lambda(\tau-\tau')\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \, d\tau' \\[0.2cm] & +\int_0^{\tau} S(\tau-\tau') P_\xi \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big) \, d\tau' \end{split} \end{align} holds for all $ \tau \in [0, T]$. } \end{itemize} \end{prop} \subsection{Bounds on nonlinearities} \label{sec:BoundsNl} In this section we set out to prove Proposition \ref{prp:fnl:bnds}. In order to be able to write the nonlinearities in a compact fashion, we introduce the expression \begin{equation} \label{eq:mr:def:j} \begin{array}{lcl} \mathcal{J}_{\sigma}(u ) & = & \kappa_{\sigma}(u , \psi_{\mathrm{tw}})^{-1} \Big[ f(u ) +c_{\sigma} \partial_\xi u + \sigma^2 b( u, \psi_{\mathrm{tw}}) \partial_\xi [g(u )] \Big] \\[0.2cm] \end{array} \end{equation} for any $u \in \mathcal{U}_{H^1}$. This allows us to define \begin{equation} \mathcal{Q}_{\ensuremath{\sigma}} (v) = \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) - \mathcal{J}_{\sigma}( \Phi_{\sigma} ) + [ \rho \partial_{\xi \xi } - \mathcal{L}_{\mathrm{tw}} ]v \end{equation} for any $v \in H^1$, which is the residual upon linearizing $\mathcal{J}_{\sigma}(\Phi_\ensuremath{\sigma}+V)$ around $\Phi_{\sigma}$, up to $O(\sigma^2)$ corrections. Indeed, we can borrow the following bound from \cite{Hamster2017}. \begin{cor} \label{cor:swv:msigma:bnds} Consider the setting of Proposition \ref{prp:fnl:bnds}. There exists $K > 0$ so that for any $0 \le \sigma \le \delta_{\sigma}$ and any $v\in H^1 $ we have the estimate \begin{equation} \begin{array}{lcl} \norm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2} & \le & K\big[\sigma^2+\nrm{v}_{L^2}\big] \norm{v}_{H^1} \\[0.2cm] & & \qquad + K\big[1 +(1+\ensuremath{\sigma}^2)\norm{v}_{L^2}+ \ensuremath{\sigma}^2\norm{v}_{L^2}^2\big]\norm{v}_{H^1}^2 , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \abs{ \langle \mathcal{Q}_{\ensuremath{\sigma}}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} } & \le & K \big[ 1 + \norm{v}_{H^1} \big] \norm{v}_{L^2} \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \big[ \sigma^2 + \norm{v}_{L^2} \big] \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \sigma^2 \norm{v}_{H^1} \norm{v}_{L^2}^2 \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \sigma^2 \norm{v}_{L^2}^2 \norm{v}_{H^1}. \\[0.2cm] \end{array} \end{equation} \end{cor} \begin{proof} Recalling the function $\mathcal{M}$ that was defined in \cite[Eq. (7.2)]{Hamster2017}, we observe that \begin{equation} \mathcal{Q}_{\ensuremath{\sigma}}(v) = \mathcal{M}_{\ensuremath{\sigma};\Phi_{\ensuremath{\sigma}},c_{\sigma}} (v, 0) - \mathcal{M}_{\sigma;\Phi_{\sigma} , c_{\sigma}}(0, 0). \end{equation} In particular, the desired bounds follow directly from \cite[Cor. 7.5]{Hamster2017}. \end{proof} We now introduce the function \begin{align} \mathcal{W}_{\sigma;I,i}(v) =&\mathcal{Q}_{\ensuremath{\sigma}}(v) +\phi_{\sigma;i}(v)\Big[ \mathcal{J}_{\sigma}(\Phi_{\sigma} + v) - \mathcal{J}_{\sigma}(\Phi_{\sigma}) \Big] \label{eq:Rline:Def} \end{align} together with the notation \begin{equation} \begin{array}{lcl} \mathcal{I}_{\sigma;I,i}(v) & = & \Big[\chi_{\mathrm{low}}\big(\langle\partial_\xi[\Phi_{\sigma} + v ] , \psi_{\mathrm{tw}} \rangle_{L^2} \big)\Big]^{-1} \langle \mathcal{W}_{\sigma;I,i}(v), \psi_{\mathrm{tw}} \rangle_{L^2} \\[0.2cm] & & \qquad - \Big[\chi_{\mathrm{low}}\big(\langle\partial_\xi[\Phi_{\sigma} + v ] , \psi_{\mathrm{tw}} \rangle_{L^2} \big)\Big]^{-1} \langle \Upsilon_{\sigma;i}(v), \partial_\xi \psi_{\mathrm{tw}} \rangle_{L^2} . \end{array} \end{equation} The following result shows that these two expressions allow us to split off the $a_\ensuremath{\sigma}$-contribution to $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$ that is visible in \sref{eq:stt:DefR}. \begin{lem} Consider the setting of Proposition \ref{prp:fnl:bnds}. Then for any $0 \le \sigma \le \delta_{\sigma}$ and $v \in H^1$, we have the inclusion $\mathcal{W}_{\ensuremath{\sigma};i}(v)\in L^2$ together with the identity \begin{equation} \begin{array}{lcl} \label{eq:fnl:id:for:r:sigma} \mathcal{W}_{\ensuremath{\sigma};i}(v) = \mathcal{W}_{\sigma;I,i}(v) - \mathcal{I}_{\sigma;I,i}(v) [\Phi_{\sigma}' + v'] . \\[0.2cm] \end{array} \end{equation} \end{lem} \begin{proof} For any $u \in \mathcal{U}_{H^2}$, the definition \sref{eq:mr:def:a} implies that \begin{equation} a_{\sigma}(u , c_{\sigma} , \psi_{\mathrm{tw}}) = - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi_{\mathrm{tw}} \rangle_{L^2} \big) \Big]^{-1} \langle \kappa_{\sigma}(u, \psi_{\mathrm{tw}}) \big[ \rho \partial_{\xi \xi} u + \mathcal{J}_{\sigma}(u) \big] , \psi_{\mathrm{tw}} \rangle_{L^2}. \end{equation} The implicit definition $a_{\sigma}(\Phi_{\sigma}, c_{\sigma}, \psi_{\mathrm{tw}}) = 0$ hence yields \begin{equation} \mathcal{J}_{\sigma}(\Phi_{\ensuremath{\sigma}} ) = - \rho \Phi_{\ensuremath{\sigma}}''. \end{equation} For any $v \in H^2$, this allows us to compute \begin{equation} \begin{array}{lcl} \mathcal{Q}_{\ensuremath{\sigma}} (v) & = & \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) + \rho [ \Phi_{\sigma}'' + v''] - \mathcal{L}_{\mathrm{tw}} v , \end{array} \end{equation} which gives \begin{equation} \begin{array}{lcl} \mathcal{W}_{\sigma;I,i}(v) + \partial_{\xi} \Upsilon_{\sigma;i}(v) & = & [\kappa_{\sigma;i}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) ]^{-1} \kappa_{\sigma}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) \big[ \rho [\Phi_{\sigma}'' + v''] + \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) \big] \\[0.2cm] & & \qquad - \mathcal{L}_{\mathrm{tw}} v . \end{array} \end{equation} Using the fact that $\mathcal{L}^*_{\mathrm{tw}} \psi_{\mathrm{tw}} = 0$, we now readily verify that for $v \in H^2$ we have \begin{equation} \mathcal{I}_{\sigma;I,i}(v) = [\kappa_{\sigma;i}( \Phi_{\sigma} + v , \psi_{\mathrm{tw}} )]^{-1} a_{\sigma}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}}) . \end{equation} The result hence follows by rewriting the definition \sref{eq:stt:DefR} in the form \begin{equation} \begin{array}{lcl} \mathcal{R}_{\sigma}(v) & = & \kappa_{\sigma}( \Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) \Big[ \rho \partial_{\xi \xi} [ \Phi_{\sigma} + v] + \mathcal{J}_{\sigma}( \Phi_{\sigma} + v ) \Big] \\[0.2cm] & & \qquad + a_{\sigma}(\Phi_{\sigma} + v , c_{\sigma}, \psi_{\mathrm{tw}}) [ \Phi_{\sigma}' + v'] \end{array} \end{equation} and substituting this into the definition \sref{eq:md:overline:r:sigma} of $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$. \end{proof} In order to obtain the estimates in Proposition \ref{prp:fnl:bnds} it hence suffices to obtain bounds for $\phi_i$, $\mathcal{W}_{\ensuremath{\sigma};I,i}$ and $\mathcal{I}_{\ensuremath{\sigma};I,i}$. This can be done in a direct fashion. \begin{lem} \label{lem:phi:bound} Assume that (HDt) and (HSt) are satisfied. Then there exists a constant $K_{\phi} > 0$ so that \begin{align} |\phi_i(v)|\leq \ensuremath{\sigma}^2K_\phi \end{align} holds for any $v \in L^2$ and $0 \le \ensuremath{\sigma} \le \delta_{\ensuremath{\sigma}}$. \end{lem} \begin{proof} For any $x,y\geq 0$ we have the inequality \begin{align} \left|\frac{1+\frac{1}{2\rho_j}x}{1+\frac{1}{2\rho_i}x} -\frac{1+\frac{1}{2\rho_i}y}{1+\frac{1}{2\rho_i}y}\right|=\frac{1}{4\rho_i\rho_j}\frac{|x-y|}{(1+\frac{1}{2\rho_i}x)(1+\frac{1}{2\rho_i}y)} \leq \frac{1}{4\rho_i\rho_j}|x-y| . \end{align} Applying these bounds with $y=0$, we obtain \begin{align} |\phi^j_i(v)|\leq \frac{\ensuremath{\sigma}^2}{4\rho_i\rho_j}|b(\Phi_\ensuremath{\sigma}+v)|^2\leq \frac{\ensuremath{\sigma}^2}{4\rho_{\mathrm{min}}^2}K_b^2, \end{align} where the last bound on $b$ follows from Lemma 3.6 in \cite{Hamster2017}. The result now readily follows. \end{proof} \begin{lem} \label{lem:fnl:rsi} Consider the setting of Proposition \ref{prp:fnl:bnds}. Then there exists $K > 0$ so that for any $v \in H^1$ and $0 \le \sigma \le \delta_{\sigma}$ we have the bound \begin{equation} \label{eq:fnl:rsi:glb} \begin{array}{lcl} \norm{\mathcal{W}_{\ensuremath{\sigma};I,i}(v)}_{L^2} & \le & K \sigma^2 \norm{v}_{H^1} + K \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2} + \sigma^2 \norm{v}_{L^2}^2 \big] , \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \label{eq:fnl:rsi:glb:ip} \begin{array}{lcl} \abs{ \mathcal{I}_{\sigma;I,i}(v) } & \le & K \norm{v}_{L^2} \big[ \sigma^2 + \norm{v}_{L^2} \big] + K \norm{v}_{H^1} \big[ \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] . \end{array} \end{equation} \end{lem} \begin{proof} Note first that we can write $\mathcal{W}_{\sigma;I,i}(v)$ as \begin{align} \mathcal{W}_{\sigma;I,i}(v) =&\mathcal{Q}_{\ensuremath{\sigma}}(v) +\phi_{\sigma;i}(v)\Big[ \mathcal{Q}_{\ensuremath{\sigma}}(v)+(\mathcal{L}_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi}) v \Big] \end{align} and hence \begin{align} \nrm{\mathcal{W}_{\sigma;I,i}(v)}_{L^2} \leq &\nrm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2} +|\phi_{\sigma;i}(v)|\Big[ \nrm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2}+\nrm{(\mathcal{L}_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi})v}_{L^2} \Big] . \end{align} The definition of $\mathcal{L}_{\mathrm{tw}}$ implies that there exists $C_1 > 0$ for which \begin{equation} \norm{[\L_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi}]v}_{L^2}\leq C_1\nrm{v}_{H^1} \end{equation} holds. The desired bound hence follows from Corollary \ref{cor:swv:msigma:bnds} and Lemma \ref{lem:phi:bound}. Turning to the second estimate, we note that there is a positive constant $C_2$ for which we have \begin{align} \abs{ \mathcal{I}_{\sigma;I,i} (v) } \leq C_2\big[ \norm{\mathcal{W}_{\ensuremath{\sigma};I,i}(v)}_{L^2}+\norm{\Upsilon_{\ensuremath{\sigma};i}(v)}_{L^2}\big] . \end{align} We can hence again apply Corollary \ref{cor:swv:msigma:bnds} and Lemma \ref{lem:phi:bound}, which yields expressions that can all be absorbed into \sref{eq:fnl:rsi:glb:ip}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:fnl:bnds}] To obtain \sref{eq:fnl:rs:glb}, we use \sref{eq:fnl:id:for:r:sigma} together with Lemma \ref{lem:fnl:rsi} to compute \begin{equation} \begin{array}{lcl} \norm{\mathcal{W}_{\ensuremath{\sigma};i}(v)}_{L^2} & \le & \norm{\mathcal{W}_{\ensuremath{\sigma};i}}_{L^2} + C_1 \abs{\mathcal{I}_{\ensuremath{\sigma};I,i}(v)} \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] & \le & C_2 \sigma^2 \norm{v}_{H^1} + C_2 \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2} + \sigma^2 \norm{v}_{L^2}^2 \big] \\[0.2cm] & & \qquad +C_2 \norm{v}_{L^2} \big[ \sigma^2 + \norm{v}_{L^2} \big] \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] & & \qquad + C_2 \norm{v}_{H^1} \big[ \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] \end{array} \end{equation} for some constants $C_1 > 0$ and $C_2 > 0$. These terms can all be absorbed into \sref{eq:fnl:rs:glb}. The bound \sref{eq:mld:bnd:upsilon} follows from Lemma \ref{lem:phi:bound} and (HDt), while (ii) and (iii) follow directly from \cite[Prop 8.1]{Hamster2017}. \end{proof} \subsection{Mild formulation} \label{sec:MildForm} In this section we establish Proposition \ref{prp:MildTransSys}. We note that items (i)-(iv) follow directly from Propositions 5.1 and 6.3 in \cite{Hamster2017}, so we focus here on the integral identity \sref{eq:MildEqTimeTrans}. We first obtain this identity in a weak sense, bypassing the need to interpret the term involving $\Upsilon_{\sigma;i}$ in a special fashion. We note that $S^*(t)$ is the adjoint operator of $S(t)$, which coincides with the semigroup generated by $\L_{\mathrm{tw}}^*$. \begin{lem}\label{lem:MildForm1} Consider the setting of Proposition \ref{prp:MildTransSys} and pick any $\eta \in H^3$. Then for almost all $\omega \in \Omega$ the identity \begin{align}\begin{split} \ip{\ensuremath{\overline{V}}_i(\tau),\eta}_{L^2}=& \ip{S(\tau)\ensuremath{\overline{V}}_i(0) +\int_0^{\tau} S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big)\, d\tau' + \sigma \int_0^{\tau} S(\tau-\tau')\overline{\mathcal{S}}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big)d\overline{\b}_{\tau';i},\eta}_{L^2} \\[0.2cm] &+\int_0^{\tau} \ip{ \ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big), S^*(\tau-\tau' )\eta}_{H^{-1} ; H^1} \, d \tau' \end{split} \end{align} holds for any $\tau \in [0, T]$. \end{lem} \begin{proof} Pick any $\tau \in [0, T]$. Since $\overline{V_i}\in \mathcal{N}^2([0,T];(\overline{\mathcal{F}}_t);H^1)$ is a weak solution to \sref{eq:mild:weak:formul}, the identity \begin{equation} \begin{array}{lcl} \ensuremath{\overline{V}}_i(\tau) &=& \ensuremath{\overline{V}}_i(0) +\int_0^{\tau} \big[ \mathcal{L}_{\mathrm{tw}} \overline{V}_i(\tau') + \overline{\mathcal{R}}_{\sigma;i}\big( \overline{V}_i(\tau') \big) \big] \, d \tau' \\[0.2cm] & & \qquad + \sigma \int_0^\tau \overline{S}_{\sigma;i} \big( \ensuremath{\overline{V}}_i(\tau') \big) \, d\overline{\b}_{\tau';i} \end{array} \end{equation} holds in $H^{-1}$; see \cite[Prop. 6.3]{Hamster2017}. We note that these integrals are well defined by items (i)-(iv) of Proposition \ref{prp:MildTransSys}. Following the proof of \cite[Prop 2.10]{KatjaClaudia}, we pick $\eta \in H^3$ and define the function \begin{align} \zeta(\tau')=S^*(\tau-\tau' \eta \end{align} on the interval $[0,\tau]$. Noting that $\zeta\in C^1([0,\tau], H^1 )$, we may define the functional $\phi: [0, \tau] \times H^{-1} \to \Real$ that acts as \begin{equation} \phi(\tau' , v) = \langle v , \zeta(\tau') \rangle_{H^{-1} ; H^1}, \end{equation} which is $C^1$-smooth in the first variable and linear in the second variable. Applying a standard It\^o formula such as \cite[Thm. 1]{DaPratomild} (with $S = I$) yields \begin{equation} \begin{array}{lcl} \phi\big(\tau, \overline{V}_i(\tau) \big) & = & \phi\big(0, \overline{V}_i(0) \big) \\[0.2cm] & & \qquad + \int_0^{\tau} \langle \overline{V}_i(\tau'), \zeta'(\tau') \rangle_{H^{-1}; H^1} \, d \tau' + \int_0^\tau \langle \mathcal{L}_{\mathrm{tw}} \overline{V}_i(\tau') , \zeta(\tau') \rangle_{H^{-1} ; H^1}\,d \tau' \\[0.2cm] & & \qquad + \int_0^\tau \langle \overline{\mathcal{R}}_{\sigma;i} \big( \overline{V}_i(\tau')\big) , \zeta(\tau') \rangle_{H^{-1} ; H^1} \, d \tau' \\[0.2cm] & & \qquad + \sigma \int_0^\tau \langle \overline{\mathcal{S}}_{\sigma;i} \big( \overline{V}_i(\tau')\big) , \zeta(\tau') \rangle_{L^2} \, d \overline{\beta}_{\tau';i} . \end{array} \end{equation} Since $\zeta'(t) = - \mathcal{L}^*_{\mathrm{tw}} \zeta(t)$, the second line in the expression above disappears. Using the identities \begin{equation} \begin{array}{lcl} \phi\big(\tau, \overline{V}_i(\tau) \big) & = & \langle \ensuremath{\overline{V}}_i(\tau), \eta \rangle_{L^2} , \\[0.2cm] \phi\big(0, \overline{V}_i(0) \big) & = & \langle \overline{V}_i(0) , S^*(\tau) \eta \rangle_{L^2} \\[0.2cm] & = & \langle S(\tau) \overline{V}_i(0) , \eta \rangle_{L^2} \end{array} \end{equation} we hence obtain \begin{equation} \begin{array}{lcl} \langle \ensuremath{\overline{V}}_i(\tau), \eta \rangle_{L^2} & = & \ip{S(\tau)\ensuremath{\overline{V}}_i(0), \eta}_{L^2} \\[0.2cm] & & \qquad +\int_0^{\tau} \ip{ S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}(\ensuremath{\overline{V}}_i(\tau') \big) \, d \tau', \eta }_{L^2} \, d \tau' \\[0.2cm] & & \qquad +\int_0^{\tau} \ip{\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big), S^*(t-s) \eta}_{H^{-1}; H^1} \, d\tau' \\[0.2cm] & & \qquad +\sigma \int_0^{\tau} \ip{ S(\tau- \tau')\overline{S}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) , \eta}_{L^2} \, d \overline{\b}_{\tau';i} , \end{array} \end{equation} as desired. \end{proof} \begin{lem} \label{lem:mld:approxInH1} Pick $v \in L^2$ together with $\eta \in H^1$ and $t > 0$. Then we have the identity \begin{equation} \label{eq:mld:transfer:derivative} \langle \partial_{\xi} v , S^*(t) \eta \rangle_{H^{-1} ; H^1} = \langle \partial_{\xi} S(t) Q v + \Lambda(t) v + S(t) P_\xi v , \eta \rangle_{L^2} . \end{equation} \end{lem} \begin{proof} For $v \in H^1$, this identity follows directly from \sref{eq:spl:eqn:with:comm}. For fixed $\eta$ and $ t> 0$, both sides of \sref{eq:mld:transfer:derivative} can be interpreted as bounded linear functions on $L^2$ by Proposition \ref{prp:MainPropSplit}. In particular, the result can be obtained by approximating $v \in L^2$ by $H^1$-functions. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:MildTransSys}] As mentioned above, items (i)-(iv) follow directly from Propositions 5.1 and 6.3 in \cite{Hamster2017}. Item (v) follows from Lemmas \ref{lem:MildForm1} and \ref{lem:mld:approxInH1}, using the density of $H^3$ in $H^1$ and the fact that $H^{-1}$ is separable. \end{proof} \section{Nonlinear stability of mild solutions} \label{sec:nls} In this section we prove Theorem \ref{thm:mr:orbital:stb}, which provides an orbital stability result for the stochastic wave $(\Phi_{\sigma}, c_{\sigma})$. In particular, for any $\ensuremath{\varepsilon} > 0$, $T > 0$ and $\eta > 0$ we recall the notation \begin{equation} \begin{array}{lcl} N_{\ensuremath{\varepsilon}}(t)= \nrm{V(t)}_{L^2}^2 +\int_0^te^{-\ensuremath{\varepsilon}(t-s)}\nrm{V(s)}^2_{H^1}ds \end{array} \end{equation} and introduce the $(\mathcal{F}_t)$-stopping time \begin{equation} t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) = \inf\Big\{0 \leq t < T: N_{\ensuremath{\varepsilon}}(t) > \eta \Big\} , \end{equation} writing $t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) = T$ if the set is empty. We derive a number of technical regularity estimates in \S\ref{sec:nls:reg:ests} that allows us to exploit the integral identity \sref{eq:MildEqTimeTrans} to bound the expectation of $\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)$ in terms of itself, the noise-strength $\sigma$ and the size of the initial condition $V(0)$. This leads to the following bound for this expectation. \begin{prop} \label{prp:nls:general} Assume that (HDt), (HSt) and (HTw) are satisfied. Pick a constant $0 < \ensuremath{\varepsilon} < \beta$, together with two sufficiently small constants $\delta_{\eta} > 0$ and $\delta_{\sigma} > 0$. Then there exists a constant $K > 0$ so that for any $T > 0$, any $0 < \eta \le \delta_{\eta}$ and any $0 \le \sigma \le \delta_{\sigma}T^{-1/2}$ we have the bound \begin{equation} \label{eq:nls:prp:general:estimate} \begin{array}{lcl} E[\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)] &\leq & K \Big[ \nrm{V(0)}^2_{H^1}+ \sigma^2 T \Big] . \end{array} \end{equation} \end{prop} Exploiting the technique used in Stannat \cite{Stannat}, this bound can be turned into an estimate concerning the probability \begin{equation} p_{\ensuremath{\varepsilon}}(T,\eta) = P\Big( \sup_{0 \leq t \leq T} \big[N_{\ensuremath{\varepsilon}}(t)\big] > \eta \Big). \end{equation} This allows our main stability result to be established in a straightforward fashion. \begin{proof}[Proof of Theorem \ref{thm:mr:orbital:stb}] Upon computing \begin{equation} \begin{array}{lcl} \eta p_{\ensuremath{\varepsilon}}(T,\eta) & = & \eta P\big( t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) < T\big) \\[0.2cm] & = & E \Big[ \mathbf{1}_{t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) < T} N_{\ensuremath{\varepsilon}}\big(t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta)\big) \Big] \\[0.2cm] & \le & E [N_{\ensuremath{\varepsilon}}\big(t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) \big)]\\[0.2cm] & \leq & E [\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)], \end{array} \end{equation} the result follows from Proposition \ref{eq:nls:prp:general:estimate}. \end{proof} \subsection{Setup} \label{sec:nls:reg:ests} In this subsection we establish Proposition \ref{prp:nls:general} by estimating each of the terms featuring in \sref{eq:MildEqTimeTrans}. In contrast to the situation in \cite{Hamster2017} we cannot estimate $N_\ensuremath{\varepsilon}(t)$ directly because the integral involving $\partial_{\xi} S(t-s)$ applied to $\Upsilon_{\sigma;i}\big(\overline{V}_i(s) \big)$ presents short-time regularity issues. Instead, we will obtain separate estimates for each of the components $N_\ensuremath{\varepsilon}^{i}(t)$, which are given by \begin{equation} \begin{array}{lcl} N_\ensuremath{\varepsilon}^{i}(t) & = & \nrm{ V^i(t) }_{L^2}^2 +\int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V^i(s)}_{H^1}^2 \, ds . \end{array} \end{equation} Indeed, the definitions \sref{eq:DefPhi} and \sref{eq:DefUpsilon} imply that the $i$-th component of $\Upsilon_{\ensuremath{\sigma};i}$ vanishes, which allows us to replace the problematic $\partial_{\xi} S(t - s)$ term with its off-diagonal components $\partial_{\xi} S_{\mathrm{od}}(t - s)$. More precisely, for $\tau' \ge \tau - 1$ when computing short time bounds, we will use \begin{equation} \begin{array}{lcl} \Big[\ensuremath{\partial}_{\xi} S(\tau - \tau') Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i & = & \Big[\ensuremath{\partial}_{\xi} S(\tau - \tau') (I - P) \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i \\[0.2cm] & = & \Big[\ensuremath{\partial}_{\xi} S_{\mathrm{od}}(\tau - \tau') \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) - \ensuremath{\partial}_{\xi} S(\tau- \tau')P \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i . \end{array} \end{equation} This will allow us to bound $N_\ensuremath{\varepsilon}^{i}(t)$ in terms of $N_\ensuremath{\varepsilon}(t)$. In order to streamline our computations, we now introduce some notation that will help us to stay as close as possible to the framework developed in \cite{Hamster2017}. First of all, we impose the splittings \begin{equation} \label{eq:reg:defns:n:i:ii} \begin{array}{lcl} N_{\ensuremath{\varepsilon},I}(t) & = & \nrm{ V(t) }_{L^2}^2 , \\[0.2cm] N_{\ensuremath{\varepsilon},II}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V(s)}_{H^1}^2 \, ds, \end{array} \end{equation} together with \begin{equation} \label{eq:reg:defns:n:i:ii:comp} \begin{array}{lcl} N^i_{\ensuremath{\varepsilon};I}(t) & = & \nrm{ V^i(t) }_{L^2}^2 \\[0.2cm] & = & \nrm{ \ensuremath{\overline{V}}_i^i\big(\tau_{i}(t)\big) }_{L^2}^2 , \\[0.2cm] N^i_{\ensuremath{\varepsilon};II}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V^i(s)}_{H^1}^2 \, ds \\[0.2cm] & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{\ensuremath{\overline{V}}_i^i\big(\tau_{i}(s)\big)}_{H^1}^2 \, ds. \end{array} \end{equation} In addition, we split $\mathcal{W}_{\ensuremath{\sigma};i}$ into a linear and nonlinear part as \begin{align} \mathcal{W}_{\ensuremath{\sigma};i}(v)=\ensuremath{\sigma}^2F_{\mathrm{lin}}(v)+F_{\mathrm{nl}}(v) \end{align} and we isolate the constant term in $\overline{\mathcal{S}}_{\ensuremath{\sigma};i}$ by writing \begin{align} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v)=B_{\mathrm{cn}}+B_{\mathrm{lin}}(v) . \end{align} Proposition \ref{prp:fnl:bnds} implies that these functions satisfy the bounds \begin{align}\begin{split} \nrm{F_{\mathrm{lin}}(v)}_{L^2}&\leq K_{\mathrm{F;lin}}\nrm{v}_{H^1},\\ \nrm{F_{\mathrm{nl}}(v)}_{L^2}&\leq K_{\mathrm{F;nl}}\nrm{v}^2_{H^1}(1+\nrm{v}^3_{L^2}),\\ \nrm{B_{\mathrm{cn}}}_{L^2}&< \infty,\\ \nrm{B_{\mathrm{lin}}(v)}_{L^2}&\leq K_{\mathrm{B;lin}}\nrm{v}_{H^1}\end{split} \end{align} for appropriate constants $K_{\mathrm{F;lin}} > 0$, $K_{\mathrm{F;nl}} > 0$ and $K_{\mathrm{B;lin}} > 0$. In particular, they satisfy assumption (hFB) in \cite{Hamster2017}, which gives us the opportunity to apply some of the ideas in \cite[{\S}9]{Hamster2017}. For convenience we will write from now on $t_{\mathrm{st}}$ for $t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta)$. In order to understand $N^i_{\ensuremath{\varepsilon};I}$, we introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{E}_{0}(t) & = & S\big(\tau_{i}(t)\big) Q V(0), \\[0.2cm] \end{array} \end{equation} together with the long-term integrals \begin{equation} \label{eq:reg:LTI} \begin{array}{lcl} \mathcal{E}^{\mathrm{lt}}_{F;\mathrm{lin}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t)- \tau) Q F_{\mathrm{lin}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{F;\mathrm{nl}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) - \tau) Q F_{\mathrm{nl}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{B;\mathrm{lin}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) -\tau) Q B_{\mathrm{lin}}\big(\overline{V}_i(\tau) \big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau, \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{B;\mathrm{cn}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) -\tau)Q B_{\mathrm{cn}} \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau , \\[0.2cm] \mathcal{E}_{\mathrm{so}}^{\mathrm{lt}}(t) &= &\int_0^{\tau_{i}(t) - 1}\ensuremath{\partial}_{\xi}S(\tau_{i}(t)-\tau) Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) +\Lambd ({\tau_{i}(t)}-\tau)\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \end{array} \end{equation} the short-term integrals \begin{equation} \begin{array}{lcl} \mathcal{E}^{\mathrm{sh}}_{F;\mathrm{lin}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) - \tau) Q F_{\mathrm{lin}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{F;\mathrm{nl}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) - \tau) Q F_{\mathrm{nl}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{lin}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) -\tau) Q B_{\mathrm{lin}}\big(\overline{V}_i(\tau) \big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{cn}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) -\tau)Q B_{\mathrm{cn}} \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau , \\[0.2cm] \end{array} \end{equation} and finally the split second-order integrals \begin{equation} \begin{array}{lcl} \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};A}(t) & = &- \int_{\tau_i(t) - 1}^{\tau_{i}(t)} \ensuremath{\partial}_{\xi} S(\tau_{i}(t)-\tau) P \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};B}(t) & = &\int_{\tau_i(t) - 1}^{\tau_{i}(t)} \Lambd ({\tau_{i}(t)}-\tau)\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};C}(t) & = &\int_{\tau_i(t) - 1}^{\tau_{i}(t)}\ensuremath{\partial}_{\xi} S_{\mathrm{od}}(\tau_{i}(t)-\tau) \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \, \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d\tau. \end{array} \end{equation} Here we use the convention that integrands are set to zero for $\tau < 0$. Note that integration variables in the original time are represented by $s$, while integration variables in the rescaled time are denoted by $\tau$. For $\eta > 0$ sufficiently small, our stopping time ensures that the identities \sref{eq:MildNonProjZero} hold. This implies that we may assume \begin{equation} P_\xi \Upsilon_{\ensuremath{\sigma};i} \big(\ensuremath{\overline{V}}_i(\tau)\big) + P \mathcal{W}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) = 0. \end{equation} This explains why there is a $Q$ in the first two lines of \sref{eq:reg:LTI}, as their $P$-counterparts are canceled against the $S(\tau_i(t)-\tau)P_\xi$ term that is present in \sref{eq:MildEqTimeTrans} but absent from \sref{eq:reg:LTI}. For convenience, we also write \begin{equation} \mathcal{E}_{F;\#}(t) = \mathcal{E}^{\mathrm{lt}}_{F;\#}(t) + \mathcal{E}^{\mathrm{sh}}_{F;\#}(t) \end{equation} for $\# \in \{\mathrm{lin},\mathrm{nl}\}$, together with \begin{equation} \mathcal{E}_{B;\#}(t) = \mathcal{E}^{\mathrm{lt}}_{B;\#}(t) + \mathcal{E}^{\mathrm{sh}}_{B;\#}(t) \end{equation} for $\# \in \{\mathrm{lin},\mathrm{cn}\}$ and finally \begin{equation} \mathcal{E}^{\mathrm{sh}}_{\mathrm{so}}(t) = \mathcal{E}_{\mathrm{so};A}^{\mathrm{sh}}(t) + \mathcal{E}_{\mathrm{so};B}^{\mathrm{sh}}(t) + \mathcal{E}_{\mathrm{so};C}^{\mathrm{sh}}(t) \end{equation} for the short-term second-order terms. Turning to the terms that are relevant for evaluating $N^i_{\ensuremath{\varepsilon};II}$, we introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{I}_{\ensuremath{\varepsilon},\delta;0}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}_0(s) }_{H^1}^2 \, ds , \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{F;\mathrm{lin}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl} }(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{F;\mathrm{nl}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{B;\mathrm{lin}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{B;\mathrm{cn}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{\mathrm{so}}(s) }_{H^1}^2 \, ds \\[0.2cm] \end{array} \end{equation} for $\# \in \{\mathrm{lt}, \mathrm{sh}\}$. The extra $S(\delta)$ factor will be used to ensure that all the integrals we encounter are well-defined. We emphasize that all our estimates are uniform in $0 < \delta < 1$, allowing us to take $\delta \downarrow 0$. The estimates concerning $\mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}}$ and $\mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}$ in Lemmas \ref{lem:nls:f:nl:st} and \ref{lem:nls:b:lin:st} are particularly delicate in this respect, as a direct application of the bounds in Lemma \ref{lem:nls:sem:group:decay} would result in expressions that diverge as $\delta \downarrow 0$. The main difference between the approach here and the computations in \cite[{\S}9]{Hamster2017} is that we need to keep track of several time transforms simultaneously, which forces us to use the original time $t$ in the definitions \sref{eq:reg:defns:n:i:ii}-\sref{eq:reg:defns:n:i:ii:comp}. The following result plays a key role in this respect, as it shows that decay rates in the $\tau$-variable are stronger than decay rates in the original time. \begin{lem}\label{lem:TauEst} Assume that (HDt), (HSt) and (HTw) are satisfied and pick $0 \le \sigma \le \delta_{\sigma}$. Then for any pair $t>s \ge 0$ we have the inequality \begin{align} \label{eq:nls:TauEst:tau:est:i} \tau_i(t)-\tau_i(s)\geq t-s, \end{align} while for any $s \ge t_i(1)$ we have \begin{align} t_i(\tau_i(s)-1)\geq s-1 . \end{align} \end{lem} \begin{proof} The first inequality can be verified by using \sref{eq:prlm:kappa:glb:ests} to compute \begin{align} \begin{split} \tau_i(t)-\tau_i(s)&=\int_s^t\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+V(s'),\psi_{\mathrm{tw}})ds'\\ &\geq (t-s)\min_{s\leq s'\leq t}\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+V(s'),\psi_{\mathrm{tw}})\\ &\geq t-s . \end{split} \end{align} To obtain the second inequality, we write $\tilde{s} = t_i(1) \le 1$ and compute \begin{equation} \tau_i(s) -1 = \tau_i(s) - \tau_i(\tilde{s}) \ge s - \tilde{s} \ge s - 1. \end{equation} \end{proof} We now set out to bound all the terms appearing in $N_\ensuremath{\varepsilon}^{i}(t)$. Following \cite{Hamster2017}, we first study the deterministic integrals and afterwards use $H^\infty$-calculus to bound the stochastic integrals. \subsection{Deterministic Regularity Estimates} First, we collect some results from \cite[\S 9.2]{Hamster2017} that are easily adapted to the present situation. \begin{lem}\label{lem:ColPrevRes} Fix $T > 0$, assume that (HDt), (HSt) and (HTw) all hold and pick a constant $0 < \ensuremath{\varepsilon} < \beta$. Then for any $\eta>0$, any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bounds \begin{equation} \begin{array}{lcl} \norm{\mathcal{E}_0(t)}_{L^2}^2 & \le & M^2 e^{-2\b t} \norm{V(0)}^2_{L^2}, \\[0.2cm] \norm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K^2_\k K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \norm{\mathcal{E}_{F;\mathrm{nl}}(t)}_{L^2}^2 & \le & \eta K_\k^2K_{F;\mathrm{nl}}^2 M^2( 1 + \eta^3)^2 N_{\ensuremath{\varepsilon};II}(t), \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}_{\ensuremath{\varepsilon},\delta;0}(t) & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} e^{-\ensuremath{\varepsilon} t} \norm{V(0)}^2_{H^1}, \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & \le & K^2_\k K_{F;\mathrm{lin}}^2 \frac{M^2}{2(\beta - \ensuremath{\varepsilon}) \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & \le & 4 e^{\ensuremath{\varepsilon}} M^2 K_\k K_{F;\mathrm{lin}}^2 N_{\ensuremath{\varepsilon};II}(t) , \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}}(t) & \le & \eta K_\k^2K_{F;\mathrm{nl}}^2 ( 1 + \eta^3)^2 \frac{M^2}{ \beta - \ensuremath{\varepsilon} } N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} Observe first that \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{\tau_{i}(t)} e^{-\beta(\tau_{i}(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} \, d\tau \right)^2 . \end{array} \end{equation} Substituting $s = t_i(\tau)$ we find \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{t} e^{- (\beta - \frac{\ensuremath{\varepsilon}}{2} )(\tau_{i}(t) - \tau_{i}(s)) } e^{-\frac{\ensuremath{\varepsilon}}{2} ( \tau_{i}(t) - \tau_{i}(s)) } \norm{V(s)}_{H^1}\tau'_i(s) \, ds \right)^2 . \\[0.2cm] \end{array} \end{equation} Applying \sref{eq:nls:TauEst:tau:est:i} and using \sref{eq:prlm:kappa:glb:ests} to bound the extra integration factor $\tau_i'(s)$ by $K_{\kappa}$, we obtain \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_\k^2K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{t} e^{- (\beta - \frac{\ensuremath{\varepsilon}}{2} )(t-s) } e^{-\frac{\ensuremath{\varepsilon}}{2} ( t-s) } \norm{V(s)}_{H^1} \, ds \right)^2 . \\[0.2cm] \end{array} \end{equation} Cauchy-Schwartz now yields the desired bound \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_\k^2K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} \int_0^{t} e^{- \ensuremath{\varepsilon} ( t - s) } \norm{V(s)}_{H^1}^2 \, ds \\[0.2cm] & = & K_\k^2K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} The remaining estimates follow in an analogous fashion by making similar small adjustments to the proofs of Lemmas 9.9-9.11 in \cite{Hamster2017}. \end{proof} Our next result discusses the novel second-order terms. The crucial ingredient here is that we no longer have to consider the dangerous $\ensuremath{\partial}_{\xi} S(t_i(\tau) - \tau) Q \Upsilon_{\sigma;i}\big(\overline{V}(\tau) \big)$ term for $\tau \ge t_i(\tau) - 1$. Indeed, this term need not be integrable even in $L^2$ because of the divergent $(\tau_i(t) - \tau)^{-1/2}$ behavior of $\partial_{\xi} S$ and the fact that we only have square-integrable control of the $H^1$-norm of $\overline{V}_i(\tau)$. \begin{lem}\label{lem:nls:so:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0< \ensuremath{\varepsilon}<2\b$. Then for any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bounds \begin{equation} \begin{array}{lcl} \norm{ \mathcal{E}^{\mathrm{sh}}_{\mathrm{so}}(t)}_{L^2}^2 &\leq & 9 \ensuremath{\sigma}^4 e^{2 \beta} K^2 K_\k M^2 N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \norm{ \mathcal{E}^{\mathrm{lt}}_{\mathrm{so}}(t)}_{L^2}^2 &\leq & 4 \ensuremath{\sigma}^4 K^2 K_\k \frac{M^2}{2\beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) &\leq & 9 \ensuremath{\sigma}^4 e^{2 \beta} K^2K_\k M^2 N_{\ensuremath{\varepsilon};II}(t) \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) &\leq & 4 \ensuremath{\sigma}^4K^2K_\k \frac{M^2}{2(\beta - \ensuremath{\varepsilon}) \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} For $\tau \ge \tau_i(t) - 1$ we may use Lemma \ref{lem:nls:sem:group:decay} together with Proposition \ref{prp:fnl:bnds} to obtain the estimate \begin{equation} \begin{array}{lcl} \norm{\partial_{\xi} S(\tau_i(t) - \tau) P \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & \sigma^2 K M \norm{\overline{V}_i(\tau)}_{H^1} \\[0.2cm] & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1}. \end{array} \end{equation} In the same fashion we obtain \begin{equation} \begin{array}{lcl} \norm{\Lambda(\tau_i(t) - \tau) \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} , \\[0.2cm] \norm{\partial_{\xi} S_{\mathrm{od}}(\tau_i(t) - \tau) \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} . \end{array} \end{equation} In addition, for $\tau \le \tau_i(t) - 1$ we obtain \begin{equation} \nrm{ \big[ \ensuremath{\partial}_{\xi}S(\tau_{i}(t)-\tau)Q + \Lambd ({\tau_{i}(t)}-\tau) \big] \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_{i}(\tau)\big) }_{H^1} \le 2 K M \sigma^2 \norm{\overline{V}_i(\tau)}_{H^1} e^{-\beta(\tau_i(t) - \tau) } . \end{equation} The desired estimates can hence be obtained in the same fashion as the bounds for $\mathcal{E}_{F;\mathrm{lin}}(t)$ and $\mathcal{I}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}^{\mathrm{lt}}(t)$ in Lemma \ref{lem:ColPrevRes} . \end{proof} The following results at times do require the computations in \cite{Hamster2017} to be modified in a subtle non-trivial fashion. We therefore provide full proofs here, noting, however, that the main ideas remain unchanged. \begin{lem} \label{lem:nls:f:nl:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $\eta > 0$, any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bound \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F,\mathrm{nl}}(t) & \le & \eta M^2e^{3\ensuremath{\varepsilon}} K_\k^2K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 (1 + \rho_{\mathrm{min}}^{-1})(3K_\k+2) N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} We first introduce the inner product \begin{equation} \label{eq:nls:def:inn:prod:h:1:rho} \langle v , w \rangle_{H^1_{\rho} } = \langle v , w \rangle_{L^2} + \langle \sqrt{\rho} \partial_{\xi} v , \sqrt{\rho} \partial_{\xi} w \rangle_{L^2} \end{equation} and note that \begin{equation} \norm{v}_{H^1}^2 \leq \norm{v}_{L^2}^2 + \rho_{\mathrm{min}}^{-1} \norm{\sqrt\rho \ensuremath{\partial}_{\xi} v}_{L^2}^2 \le \big(1 + \rho_{\mathrm{min}}^{-1} \big) \langle v , v \rangle_{H^1_\rho} . \end{equation} For $\# \in \{L^2, H^1_{\rho} \}$ we introduce the expression \begin{equation}\label{eq:nls:DefE} \mathcal{E}_{\tau,\tau',\tau'';\#} = \Big\langle S(\tau+\d-\tau')QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big),S(\tau + \d-\tau'')QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau'')\big)\Big\rangle_{\#}, \end{equation} which allows us to obtain the estimate \begin{equation} \label{eq:nls:bnd:i:sh:extr:term} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F,\mathrm{nl}}(t) & \le & \big(1 + \rho_{\mathrm{min}}^{-1} \big) \int_0^te^{\ensuremath{\varepsilon}(t-s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \mathcal{E}_{\tau_i(s),\tau',\tau'';H^1_\rho} d\tau''d\tau'ds \\[0.2cm] & \le & \big(1 + \rho_{\mathrm{min}}^{-1} \big) \int_0^te^{\ensuremath{\varepsilon}(t-s)} \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \mathcal{E}_{\tau_i(s),\tau',\tau'';H^1_\rho} d\tau''d\tau'ds . \end{array} \end{equation} The extra term involving the function $t_i'$, which takes values in $[K_{\kappa}^{-1}, 1]$, was included for technical reasons that will become clear in wat follows. For any $v,w \in L^2$, $\vartheta > 0$, $\vartheta_A \ge 0$ and $\vartheta_B \ge 0$, we have \begin{equation} \label{eq:nls:deriv:semigroup} \begin{array}{lcl} \frac{d}{d \vartheta} \langle S(\vartheta + \vartheta_A) v, S(\vartheta + \vartheta_B) w \rangle_{L^2} & = & \langle \mathcal{L}_\mathrm{tw} S(\vartheta + \vartheta_A) v , S(\vartheta +\vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw}S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & = & \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw}^* S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw} S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & = & \langle S(\vartheta + \vartheta_A) v , \big[ \mathcal{L}_\mathrm{tw}^* - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \ \big[ \mathcal{L}_\mathrm{tw} - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad - 2 \langle \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_A) v, \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_B) w \rangle_{L^2} . \end{array} \end{equation} Upon taking $\delta>0$ for the moment and choosing $v=QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big)$, $w=QF_{\mathrm{nl}}(\ensuremath{\overline{V}}_{i}(\tau''))$, $\vartheta=\tau_i(s)+\delta$, $\vartheta_A=\tau'$ and $\vartheta_B=\tau''$, we may rearrange \sref{eq:nls:deriv:semigroup} to obtain the estimate \begin{equation}\label{eq:nls:BoundE} \begin{array}{lcl} \mathcal{E}_{\tau_i(s),\tau',\tau'';H_\rho^1} & \le & M^2 K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H_\rho^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \\[0.2cm] & & \qquad + M^2 K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau''} } \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \\[0.2cm] & & \qquad - \frac{1}{2} \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \end{array} \end{equation} for the values of $(s,\tau',\tau'')$ that are relevant. Upon introducing the integrals \begin{equation} \label{eq:nls:def:i:i:ii} \begin{array}{lcl} \mathcal{I}_{I} & = & \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\\[0.2cm] &&\qquad \qquad \big[ 1 + \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau''} } ] \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \, d\tau'' \, d\tau' \, ds , \\[0.2cm] \mathcal{I}_{II} & = & \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \, d\tau'' \, d\tau' \, ds , \\[0.2cm] \end{array} \end{equation} we hence readily obtain the estimate \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{nl}}(t) & \le & (1 + \rho_{\mathrm{min}}^{-1}) M^2 K^2_{F;\mathrm{nl}}(1 + \eta^3)^2 \mathcal{I}_{I} - \frac{1}{2} (1 + \rho_{\mathrm{min}}^{-1}) \mathcal{I}_{II}. \end{array} \end{equation} Using Lemma \ref{lem:TauEst} we see that \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} & \leq & K_\k^3 \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{s-1}^{s} \int_{s-1}^{s} \big[ 1 + \frac{1}{\sqrt{s + \delta - s''} } ] \norm{V(s')}_{H^1}^2 \norm{V(s'')}_{H^1}^2 \, ds'' \, ds' \, ds , \end{array} \end{equation} which allows us to repeat the computation \cite[(9.68)]{Hamster2017} and conclude \begin{align} \mathcal{I}_{I} \leq 3\eta e^{3\ensuremath{\varepsilon}} K_\k^3 N_{\ensuremath{\varepsilon};II}(t). \end{align} To understand $\mathcal{I}_{II}$ it is essential to change the order of integration and integrate with respect to $s$ before switching $\tau'$ and $\tau''$ back to the original time. Rearranging the integrals in \sref{eq:nls:def:i:i:ii}, we find \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & =& \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t), \tau'+1 \} } \Big[\int_{\max\{t_i(\tau'),t_i(\tau'')\}}^{\min\{ t,t_i(\tau'+1), t_i(\tau''+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big) } \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \, ds \Big] \, d \tau '' \, d \tau'. \end{array} \end{equation} Introducing the notation \begin{equation} \tau^+(\tau', \tau'') = \min\{ \tau_i(t), \tau' + 1 , \tau'' + 1 \}, \qquad \tau^-(\tau', \tau'') = \max\{ \tau', \tau'' \}, \end{equation} the substitution $\tau = \tau_i(s)$ yields \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & =& \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t) , \tau'+1 \} } \Big[\int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } e^{\ensuremath{\varepsilon} t_i(\tau)} \partial_1 \mathcal{E}_{\tau,\tau',\tau'';L^2} \, d \tau \Big] \, d\tau '' \, d\tau' . \\[0.2cm] \end{array} \end{equation} We emphasize here that the integration factor associated to this substitution cancels out against the additional term introduced in \sref{eq:nls:bnd:i:sh:extr:term}. Integrating by parts, we find \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} &=&\mathcal{I}_{II;A}+\mathcal{I}_{II;B}+\mathcal{I}_{II;C} \end{array} \end{equation} in which we have introduced \begin{equation} \begin{array}{lcl} \mathcal{I}_{II;A} & = & \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t), \tau'+1\} } e^{\ensuremath{\varepsilon} t_i(\tau)} \mathcal{E}_{\tau, \tau',\tau'';L^2}\big|_{\tau=\tau^+(\tau', \tau'')} \, d\tau'' \, d\tau' , \\[0.2cm] \mathcal{I}_{II;B} & = & -\int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0,\tau'-1\}}^{\min\{\tau_i(t), \tau'+1\} } e^{\ensuremath{\varepsilon} t_i(\tau) } \mathcal{E}_{\tau,\tau',\tau'';L^2}\big|_{\tau=\tau^-(\tau', \tau'')} d\tau'' \, d\tau' , \\[0.2cm] \mathcal{I}_{II;C} & = & - \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t) , \tau'+1 \} } \Big[\int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \left(\frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} \right) \mathcal{E}_{\tau,\tau',\tau'';L^2} \, d\tau \Big] \, d\tau '' \, d\tau' . \\[0.2cm] \end{array} \end{equation} Note here that $\mathcal{I}_{II;B}$ is well defined because $\delta>0$. Using the substitutions \begin{equation} s' = t_i(\tau'), \qquad s'' = t_i(\tau'') \end{equation} together with the bound \begin{equation} \begin{array}{lcl} t_i\big( \tau_-(\tau', \tau'') \big) & \le & t_i\big( \tau^+(\tau', \tau'') \big) \\[0.2cm] & \le & \min\{ t , t_i(\tau' + 1), t_i(\tau'' + 1) \} \\[0.2cm] & \le & \min \{ t , t_i(\tau') + 1 , t_i(\tau'') + 1 \}, \\[0.2cm] & \le & \min\{ s' , s''\} + 1 \\[0.2cm] & \le & s' + 1, \end{array} \end{equation} we find \begin{equation} \int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \abs{ \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} }d\tau = \int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)}d\tau = e^{\ensuremath{\varepsilon} t_i(\tau) } \big|_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'')} \le 2 e^{\ensuremath{\varepsilon}} e^{ \ensuremath{\varepsilon} s'} . \end{equation} Applying Cauchy-Schwartz to the inner product $\mathcal{E}$, we hence obtain \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 e^{\ensuremath{\varepsilon}}M^2K_\k^2K_{F;\mathrm{nl}}^2(1+\eta^3)^2 \int_0^{t} e^{-\ensuremath{\varepsilon} (t - s')} \nrm{V(s')}_{H^1}^2 \mathcal{J}(s') \, d s' , \\[0.2cm] \end{array} \end{equation} in which we have introduced the function \begin{equation} \mathcal{J}(s') = \int_{\max\{0,t_i(\tau_i(s')-1)\}}^{\min\{t, t_i(\tau_i(s')+1)\} } \nrm{V(s'')}_{H^1}^2 \, ds'' . \end{equation} Exploiting Lemma \ref{lem:TauEst} again, we can bound \begin{equation} \begin{array}{lcl} \mathcal{J}(s') & \le & \int_{\max\{0, s' - 1 \} }^{\min\{t, s' + 1 \}} \nrm{V(s'')}_{H^1}^2 \, ds'' \\[0.2cm] & \le & \int_{\max\{0, s' - 1 \} }^{\min\{t, s' + 1 \}} e^{2 \ensuremath{\varepsilon}} e^{ - \ensuremath{\varepsilon}( \min\{t , s'+ 1\} - s'' ) }\nrm{V(s'')}_{H^1}^2 \, ds'' \\[0.2cm] & \le & e^{2 \ensuremath{\varepsilon}} \eta, \end{array} \end{equation} which hence gives \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 \eta e^{3 \ensuremath{\varepsilon}}M^2K_\k^2K_{F;\mathrm{nl}}^2(1+\eta^3)^2 N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \end{array} \end{equation} as desired. It hence remains to consider the case $\delta = 0$. We may apply Fatou's lemma to conclude \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}} (t) & = & \int_0^{t} e^{\ensuremath{\varepsilon}(t-s)} (\lim_{\d\to0}\nrm{S(\d) \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{lin}}(s) }_{H^1})^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] &\leq & \liminf_{\d\to0} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}} (t). \\[0.2cm] \end{array} \end{equation} The result now follows from the fact that the bounds obtained above do not depend on $\delta$. \end{proof} \subsection{Stochastic Regularity Estimates} We are now ready to discuss the stochastic integrals. These require special care because they cannot be bounded in a pathwise fashion, unlike the deterministic integrals above. Expectations of suprema are particularly delicate in this respect. Indeed, the powerful Burkholder-Davis-Gundy inequalities cannot be directly applied to the stochastic convolutions that arise in our mild formulation. However, as was shown in Lemma 9.7 in \cite{Hamster2017}, we can obtain an $H^\infty$-calculus for our linear operator $\mathcal{L}_{\mathrm{tw}}$ which allows us to use the following mild version, which is the source of the extra $T$ factors that appear in our estimates. \begin{lem} \label{lem:nls:mild:regularity} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. There exists a constant $K_{\mathrm{cnv}} > 0$ so that for any $W \in \mathcal{N}^2([0,T];(\mathcal{F})_{t} ; L^2)$ we have \begin{equation} E \sup_{0 \le t \le T} \norm{ \int_0^t S( t - s) Q W(s) \, d \beta_s }_{L^2}^2 \le K_{\mathrm{cnv}} E \int_0^T \norm{W(s)}_{L^2}^2 \, d s.\\ \end{equation} \end{lem} \begin{proof} This is a direct result of the computations in \cite[{\S}9.1]{Hamster2017}, which are based on the main theorem of \cite{veraar2011note}. \end{proof} \begin{lem} \label{lem:nls:b:lin:sup:e} Fix $T > 0$ and assume that (HDt), (HSt), and (HTw) all hold. Then for any $\ensuremath{\varepsilon} > 0$ we have the bound \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_\mathrm{st}} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 & \le & (T + 1) K_{\mathrm{cnv}} K_{B;\mathrm{lin}}^2 e^{\ensuremath{\varepsilon}} E \sup_{0 \le t \le t_\mathrm{st}} N^i_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} Using Lemma \ref{lem:nls:mild:regularity} we compute \begin{equation} \label{eq:nls:bnd:on:e:b:lin:dir:from:mild:fmr} \begin{array}{lcl} E \sup_{0 \le t \le t_\mathrm{st}} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 & \le & E \sup_{0 \le t \le T} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 \\[0.2cm] & = & E \sup_{0 \le \tau \le \tau_i(T)} \norm{ \int_0^{\tau} S(\tau-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_i(\tau')\big) \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}})} \, d \beta_{\tau'} }_{L^2}^2 \\[0.2cm] & \le & K_{\mathrm{cnv}} E \int_{0}^{\tau_i(T)} \norm{ B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} }_{L^2}^2 \, d\tau \\[0.2cm] & \le & K_\k K_{\mathrm{cnv}} K_{B;\mathrm{lin}}^2 E \int_0^{t_{\mathrm{st}}} \norm{V(s)}_{H^1}^2 \, ds . \end{array} \end{equation} By dividing up the integral, we obtain \begin{equation} \begin{array}{lcl} \int_0^{t_{\mathrm{st}}} \norm{V(s)}_{H^1}^2 \, ds & \le & e^{\ensuremath{\varepsilon}} \int_0^{1 } e^{ -\ensuremath{\varepsilon}(1 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & & \qquad + e^{\ensuremath{\varepsilon}} \int_1^{2 } e^{ -\ensuremath{\varepsilon}(2 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & & \qquad + \ldots + e^{\ensuremath{\varepsilon}} \int_{\lfloor T \rfloor}^{\lfloor T \rfloor + 1} e^{ -\ensuremath{\varepsilon}(\lfloor T \rfloor +1 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & \le & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le T + 1} \int_0^t e^{-\ensuremath{\varepsilon}(t - s)} \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & \le & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le t_{\mathrm{st}}} \int_0^t e^{-\ensuremath{\varepsilon}(t - s)} \norm{V(s)}_{H^1}^2 \, ds \\[0.2cm] & = & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \end{array} \end{equation} which yields the desired bound upon taking expectations. \end{proof} \begin{lem} \label{lem:nls:b:cn:sup:e} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Then we have the bound \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \norm{\mathcal{E}_{B;\mathrm{cn}}(t )}_{L^2}^2 & \le & T K_{\mathrm{cnv}} K_{B;\mathrm{cn}}^2 . \end{array} \end{equation} \end{lem} \begin{proof} This bound follows directly from \sref{eq:nls:bnd:on:e:b:lin:dir:from:mild:fmr} by making the substitutions \begin{equation} K_{B;\mathrm{lin}} \mapsto K_{B;\mathrm{cn}}, \qquad \qquad \nrm{V(s)}_{H^1}^2 \mapsto 1 . \end{equation} \end{proof} We now set out to bound the expectation of the suprema of the remaining double integrals $\mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t)$ and $\mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t)$ with $\# \in \{ \mathrm{lt} , \mathrm{sh} \}$. This is performed in Lemma \ref{lem:nls:st:sup:on:b:lin:i}, but we first compute several time independent bounds for the expectation of the integrals themselves. \begin{lem} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $0 \le \delta < 1$ and $0 \le t \le T$, we have the identities \begin{equation} \label{eq:nls:ito:isometry:i:lt} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{0}^{\tau_{i}(s)-1} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds , \\[0.2cm] E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon} (t-s) } \int_{0}^{\tau_{i}(s)-1} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{cn}} }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds \end{array} \end{equation} and their short-time counterparts \begin{equation} \label{eq:nls: :isometry:i:sh} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds , \\[0.2cm] E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{cn}} }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds . \end{array} \end{equation} \end{lem} \begin{proof} This follows directly from the It\^o Isometry, see also Lemma 9.16 in \cite{Hamster2017}. \end{proof} \begin{lem} \label{lem:nls:b:lin} Fix $T > 0$, assume that (HDt), (HSt) and (HTw) all hold and pick a constant $0 < \ensuremath{\varepsilon} < 2 \beta$. Then for any $0 \leq \delta < 1$ and any $0 \le t \le T$, we have the bound \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_\mathrm{st}). \end{array} \end{equation} \end{lem} \begin{proof} Using \sref{eq:nls:ito:isometry:i:lt} and switching the integration order, we obtain \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) &\leq & M^2 K_{B;\mathrm{lin}}^2 E \int_0^{t} e^{ - \ensuremath{\varepsilon}(t - s) } \int_0^{\tau_{i}(s)\wedge\tau_i(t_{\mathrm{st}})} e^{-2 \beta(\tau_{i}(s)-\tau')}\norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \, d\tau' \, ds \\[0.2cm] &\leq & M^2 K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t} e^{ - \ensuremath{\varepsilon}(t - s) } \int_0^{s\wedge t_{\mathrm{st}}} e^{-2 \beta(s-s')}\norm{V(s')}_{H^1}^2 \, ds' \, ds \\[0.2cm] & = & M^2 K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} t} \Big[\int_{s'}^{t} e^{ -(2 \beta -\ensuremath{\varepsilon} )s } \, d s \Big] e^{2 \beta s'}\norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} t} e^{-(2 \beta - \ensuremath{\varepsilon})s'} e^{2 \beta s'}\norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & \leq & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon}(t\wedge t_{\mathrm{st}} - s' )} \norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & = & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:nls:b:lin:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw), all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $0 \leq \delta < 1$ , and any $0 \le t \le T$, we have the bound \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & \le & K_\k K_{B;\mathrm{lin}}^2 M^2 (1 + \rho_\mathrm{min}^{-1})e^\ensuremath{\varepsilon}( 3 K_\k + 2 ) E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{lem} \begin{proof} We only consider the case $\delta>0$ here, noting that the limit $\delta\downarrow0$ can be handled as in the proof of Lemma \ref{lem:nls:f:nl:st}. Applying the identity \sref{eq:nls:deriv:semigroup} with $w=v$ and $\vartheta_A = \vartheta_B$, we obtain \begin{equation} \label{eq:nls:deriv:semigroup2} \begin{array}{lcl} \frac{d}{d \vartheta} \nrm{ S(\vartheta + \vartheta_A) v}^2_{L^2} & = & \langle S(\vartheta + \vartheta_A) v , \big[ \mathcal{L}_\mathrm{tw}^* - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_A) v \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \ \big[ \mathcal{L}_\mathrm{tw} - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_A) v \rangle_{L^2} \\[0.2cm] & & \qquad - 2 \nrm{ \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_A) v}^2_{L^2} . \end{array} \end{equation} Recalling the inner product \sref{eq:nls:def:inn:prod:h:1:rho} and introducing the expression \begin{equation} \mathcal{E}_{\tau , \tau'; \#} = \norm{S(\tau+\delta -\tau')Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{\#}^2 \end{equation} for $\# \in \{ L^2, H^1_\rho \}$, we obtain the bound \begin{equation} \begin{array}{lcl} \mathcal{E}_{\tau, \tau'; H^1_\rho} & \le & M^2 K_{B;\mathrm{lin}}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 + M^2 K_{B;\mathrm{lin}}^2 \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau'} } \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \\[0.2cm] & & \qquad - \frac{1}{2} \partial_1 \mathcal{E}_{\tau, \tau'; L^2 } \end{array} \end{equation} for the values of $(s,\tau')$ that are relevant below. Upon writing \begin{align}\begin{split} \mathcal{I}_{I} & = E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \big[ 1 + \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau'} } ] \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \mathbf{1}_{\tau'<\tau_i(t_\mathrm{st})} \, d\tau' \, ds , \\[0.2cm] \mathcal{I}_{II} & = E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) }\big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \partial_1 \mathcal{E}_{\tau_i(s) , \tau' ; L^2} \mathbf{1}_{\tau'<\tau_i(t_\mathrm{st})} \, d\tau' \, ds , \end{split} \end{align} we obtain the estimate \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\nu,\delta;B;\mathrm{lin}}(t) & \le & (1 + \rho_\mathrm{min}^{-1}) M^2 K^2_{B;\mathrm{lin}} \mathcal{I}_{I} - \frac{1}{2}(1 + \rho_\mathrm{min}^{-1})\mathcal{I}_{II} . \end{array} \end{equation} Changing the integration order, we obtain \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} & =& E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t}\Big[ \int_{t_i(\tau')}^{\min\{t\wedge t_{\mathrm{st}},t_i(\tau'+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big)} \big[ 1 + \frac{1}{\sqrt{\tau_i(s)+\d-\tau'}} \big] \, ds \Big] \nrm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \, d\tau ' , \\[0.2cm] \mathcal{I}_{II} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{t_i(\tau')}^{\min\{ t\wedge t_{\mathrm{st}},t_i(\tau'+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big)} \partial_1 \mathcal{E}_{\tau_i(s), \tau' ; L^2} \, ds \, d\tau '. \end{array} \end{equation} The substitution $s' = t_i(\tau')$ together with Lemma \ref{lem:TauEst} now yields \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} &\leq& K_\k^2E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}})}\Big[ \int_{s'}^{\min\{t\wedge t_{\mathrm{st}},t_i(\tau_i(s')+1) \} } e^{\ensuremath{\varepsilon} s} \big[ 1 + \frac{1}{\sqrt{\tau_i(s)+\d-\tau(s')}} \big] \, ds \Big] \nrm{V(s')}_{H^1}^2 \, ds ' \\[0.2cm] & \leq & K_\k^2E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}})}\Big[ \int_{s'}^{\min\{t\wedge t_{\mathrm{st}},s' + 1 \} } e^{\ensuremath{\varepsilon} s} \big[ 1 + \frac{1}{\sqrt{s+\d-s'}} \big] \, ds \Big] \nrm{V(s')}_{H^1}^2 \, ds ' \\[0.2cm] & \le & 3 e^{\ensuremath{\varepsilon}} K^2_\k E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}}-s')} \nrm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & = & 3 e^{\ensuremath{\varepsilon}} K^2_\k E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \\[0.2cm] \end{array} \end{equation} For convenience, we introduce the notation \begin{equation} \tau^+(\tau') = \min\{ \tau_i(t\wedge t_{\mathrm{st}}),\tau'+1 \} . \end{equation} Substituting $\tau=\tau_i(s)$ and integrating by parts, we may compute \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{\tau'}^{ \tau^+(\tau')} e^{\ensuremath{\varepsilon} t_i(\tau)} \partial_1 \mathcal{E}_{\tau, \tau';L^2} \, d\tau \, d\tau ' \\[0.2cm] & = & \mathcal{I}_{II;A} + \mathcal{I}_{II;B} + \mathcal{I}_{II;C}, \end{array} \end{equation} in which we have introduced the expressions \begin{equation} \begin{array}{lcl} \mathcal{I}_{II;A} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} e^{\ensuremath{\varepsilon} t_i(\tau^+(\tau')) } \mathcal{E}_{\tau^+(\tau'), \tau' ; L^2} \, d\tau' , \\[0.2cm] \mathcal{I}_{II;B} & = & - E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} e^{\ensuremath{\varepsilon} t_i(\tau') } \mathcal{E}_{\tau', \tau' ; L^2} % \, d\tau' , \\[0.2cm] \mathcal{I}_{II;C} & = & - E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{\tau'}^{\tau^+(\tau') } \left(\frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)}\right) \mathcal{E}_{\tau, \tau';L^2} \, d\tau \, d\tau ' . \\[0.2cm] \end{array} \end{equation} Upon computing \begin{equation} \int_{\tau'}^{ \tau^+(\tau') } \abs{ \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} } \, d\tau = e^{\ensuremath{\varepsilon} t_i(\tau) } \big|_{\tau'}^{\tau^+(\tau')} \le 2 e^{\ensuremath{\varepsilon}} e^{ \ensuremath{\varepsilon} t_i(\tau')}, \end{equation} we can make the substitution $s' = t_i(\tau')$ and obtain the final estimate \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 e^\ensuremath{\varepsilon} K_\k M^2 K_{B;\mathrm{lin}}^2 E\int_0^{t\wedge t_{\mathrm{st}}} e^{- \ensuremath{\varepsilon}(t\wedge t_{\mathrm{st}}-s')} \nrm{V(s')}^2_{H^1}ds' \\[0.2cm] &\leq& 4 e^\ensuremath{\varepsilon} K_\k M^2 K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:nls:b:cn} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0 < \ensuremath{\varepsilon} < \beta$. Then for any $0 \leq \delta < 1$, any $(\mathcal{F}_t)$-stopping time $t_{\mathrm{st}}$ and any $0 \le t \le T$, we have the bounds \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & \le & \frac{M^2}{(2 \beta-\ensuremath{\varepsilon})\ensuremath{\varepsilon}} K_{B;\mathrm{cn}}^2 , \\[0.2cm] E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & \le & \frac{1}{\ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 M^2 (1 + \rho_\mathrm{min}^{-1})e^\ensuremath{\varepsilon}( 3 K_\k + 2 ). \end{array} \end{equation} \end{lem} \begin{proof} These results follows by repeating Lemmas \ref{lem:nls:b:lin} and \ref{lem:nls:b:lin:st}. Since \begin{equation} \int_0^{t} e^{- \ensuremath{\varepsilon}(t - s) } \,ds \le \frac{1}{\ensuremath{\varepsilon}}, \end{equation} we can obtain the bounds by making the substitution \begin{equation} K_{B;\mathrm{lin}} \mapsto K_{B;\mathrm{cn}}, \qquad \qquad E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}) \mapsto \frac{1}{\ensuremath{\varepsilon}}. \end{equation} \end{proof} \begin{lem} \label{lem:nls:st:sup:on:b:lin:i} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0< \ensuremath{\varepsilon} <2\beta$, then for any $0\leq \delta <1$ we have the bounds \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{lin}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \\[0.2cm] E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{lin}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) K_{B;\mathrm{lin}}^2 M^2 (1 + \rho^{-1}) e^{\ensuremath{\varepsilon}}( 3K_\k + 2 ) E \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \end{array} \end{equation} and \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{cn}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) \frac{M^2}{(2 \beta - \ensuremath{\varepsilon})\ensuremath{\varepsilon}} K_\k K_{B;\mathrm{cn}}^2 , \\[0.2cm] E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{cn}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) K_\k K_{B;\mathrm{cn}}^2 \frac{M^2}{\ensuremath{\varepsilon}} (1 + \rho^{-1}) e^{\ensuremath{\varepsilon}} ( 3K_\k + 2 ) . \end{array} \end{equation} \end{lem} \begin{proof} This follows directly from Lemmas 9.20 and 9.21 in \cite{Hamster2017}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:nls:general}] Pick $T >0$ and $0 < \eta < \eta_0$ and write $t_{\mathrm{st}} = t_{\mathrm{st}}(T,\ensuremath{\varepsilon}, \eta)$. Since the identities \sref{eq:MildNonProjZero} with $v = V(t\wedge t_{\mathrm{st}})$ hold for all $0 \le t \le T$, we may compute \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}}[N^i_{\ensuremath{\varepsilon};I}(t)] & \le & 7 E \sup_{0\leq t\leq t_{\mathrm{st}}} \Big[ \norm{\mathcal{E}_0(t)}_{L^2}^2 + \sigma^4 \norm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 + \norm{\mathcal{E}_{F;\mathrm{nl}}(t)}_{L^2}^2 \\[0.2cm] & & \qquad + \sigma^2 \norm{\mathcal{E}_{B;\mathrm{lin}}(t)}_{L^2}^2 + \sigma^2 \norm{\mathcal{E}_{B;\mathrm{cn}}(t)}_{L^2}^2 \\[0.2cm] & & \qquad + \norm{\mathcal{E}^{\mathrm{lt}}_{\mathrm{so}}(t)}_{L^2}^2 + \norm{\mathcal{E}^{\mathrm{st}}_{\mathrm{so}}(t)}_{L^2}^2 \Big] \end{array} \end{equation} by applying Young's inequality. The inequalities in Lemmas \ref{lem:ColPrevRes}-\ref{lem:nls:st:sup:on:b:lin:i} now imply that \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}}[N^i_{\ensuremath{\varepsilon};I}(t)] & \le & C_1 \big[ \norm{V(0)}_{H^1}^2 + (\eta+\sigma^2T + \sigma^4) \sup_{0\leq t\leq t_{\mathrm{st}}}N_{\ensuremath{\varepsilon};II}(t) \big]. \end{array} \end{equation} In addition, we note that \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}} N^i_{\ensuremath{\varepsilon},0;II}(t) & \le & 11 E \sup_{0\leq t\leq t_{\mathrm{st}}} \Big[ \mathcal{I}_{\ensuremath{\varepsilon},0;0}(t) + \sigma^4 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;F;\mathrm{lin}}(t) + \sigma^4 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{lin}}(t) \\[0.2cm] & & \qquad \qquad + \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}}(t) + \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}}(t) \\[0.2cm] & & \qquad \qquad + \sigma^2 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;B;\mathrm{lin}}(t) + \sigma^2 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;B;\mathrm{lin}}(t) \\[0.2cm] & & \qquad \qquad +\sigma^2 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;B;\mathrm{cn}}(t) + \sigma^2 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;B;\mathrm{cn}}(t) \\[0.2cm] & & \qquad \qquad + \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;\mathrm{so}}(t) + \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;\mathrm{so}}(t) \Big] . \end{array} \end{equation} The inequalities in Lemmas \ref{lem:ColPrevRes}-\ref{lem:nls:b:cn} now imply that \begin{equation} \begin{array}{lcl} E \sup_{0\leq t\leq t_{\mathrm{st}}}N^i_{\ensuremath{\varepsilon},0;II}(t) & \le & C_2 \big[ \norm{V(0)}_{H^1}^2 + \sigma^2 T + (\eta + \sigma^2 T + \sigma^4)\sup_{0\leq t\leq t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) \big]. \end{array} \end{equation} In particular, we see that \begin{equation} E \sup_{0\leq t\leq t_{\mathrm{st}}} N_\ensuremath{\varepsilon}^{i}(t) \le C_3 \big[ \norm{V(0)}_{H^1}^2 + \sigma^2T + (\eta + \sigma^2 T + \sigma^4) E\sup_{0\leq t\leq t_{\mathrm{st}}} N_{\ensuremath{\varepsilon}}(t) \big] . \end{equation} The desired bound hence follows by summing over $i$ and appropriately restricting the size of $\eta + \sigma^2T + \sigma^4$. \end{proof} \bibliographystyle{klunumHJ} \section{Introduction} In this paper we consider stochastically perturbed versions of a class of reaction-diffusion equations that includes the FitzHugh-Nagumo equation \begin{equation} \label{eq:int:fzhnag:pde} \begin{array}{lcl} u_t & = & u_{xx} + f_{\mathrm{cub}}(u) - w \\[0.2cm] w_t & = & \varrho w_{xx} + \ensuremath{\varepsilon} [ u - \gamma w ] . \end{array} \end{equation} Here we take $\ensuremath{\varepsilon},\varrho,\gamma > 0$ and consider the standard bistable nonlinearity \begin{equation} f_{\mathrm{cub}}(u) = u ( 1 - u )( u -a ). \end{equation} It has been known for quite some time that this system admits spectrally (and nonlinearly) stable traveling pulse solutions when $(\varrho, \gamma, \ensuremath{\varepsilon})$ are all small \cite{alexander1990topological}. Recently, such results have also become available for the equal-diffusion setting $\varrho = 1$ by using variational techniques together with the Maslov index \cite{chen2015traveling,cornwell2017opening,cornwell2017existence}. Our goal here is to show that these spectrally stable wave solutions survive in a suitable sense upon adding a small pointwise multiplicative noise term to the underlying PDE. In particular, we generalize previous results in \cite{Hamster2017} where we were only able to consider the special case $\varrho = 1$. For example, we are now able to cover the Stochastic Partial Differential Equation (SPDE) \begin{align} \label{eq:int:SPDE:fhn}\begin{split} dU &= \big[ U_{xx} + f_{\mathrm{cub}}(U) -W ] dt + \sigma \chi(U) U ( 1 - U) d \beta_t\\ dW &= \big[ \varrho W_{xx} + \ensuremath{\varepsilon}(U-\gamma W)] dt\end{split} \end{align} for small $\abs{\sigma}$, in which $(\beta_t)$ is a Brownian motion and $\chi(U)$ is a cut-off function with $\chi(U) = 1$ for $\abs{U} \le 2$. The presence of this cut-off is required to enforce the global Lipschitz-smoothness of the noise term. In this regime, one can think of \sref{eq:int:SPDE:fhn} as a version of the FitzHugh-Nagumo PDE \sref{eq:int:fzhnag:pde} where the parameter $a$ is replaced by $a + \sigma \dot{\beta}_t$. Notice that the noise vanishes at the asymptotic state $U = 0$ of the pulse. \paragraph{Phase tracking} Although the ability to include noise in models is becoming an essential tool in many disciplines \cite{Bressloff,bressloff2015nonlinear, Zhang,NunnoAdvMathFinance2011,Climate}, our understanding of the impact that such distortions have on basic patterns such as stripes, spots and waves is still in a preliminary stage \cite{brassesco1995brownian,funaki1995scaling,Kuske2017,gowda2015early,vinals1991numerical,Lord2012,Shardlow,Bloemker}. As explained in detail in \cite[{\S}1]{Hamster2017}, several approaches are being developed \cite{Stannat,stannat2014stability,Lang,Inglis} to analyze stochastically forced waves that each require a different set of conditions on the noise and structure of the system. The first main issue that often limits the application range of the results is that the underlying linear flow is required to be immediately contractive, which is (probably) not true for multi-component systems such as \sref{eq:int:fzhnag:pde}. The second main issue is that an appropriate phase needs to be defined for the wave. Various ad-hoc choices have been made for this purpose, which typically rely on geometric intuition of some kind. Inspired by the agnostic viewpoint described in the expository paper \cite{Zumbrun2009}, we initiated a program in \cite{Hamster2017} that aims to define the phase, shape and speed of a stochastic wave purely by the technical considerations that arise when mimicking a deterministic nonlinear stability argument. In particular, the phase is constantly updated in such a way that the neutral part of the linearized flow is not felt by the nonlinear terms. Together with our novel semigroup approach, this allows us to significantly extend the class of systems for which it is possible to obtain stability results. Although defined a priori by technical considerations, we emphasize that in practice our stochastic phase tracking gives us high quality a posteriori information concerning the position of the stochastic wave; see Figure \ref{fig:UDifRef} in the next section. We remark that the formal approach recently developed in \cite{cartwright2019} also touches upon several of the ideas underlying our approach. \paragraph{Stochastic wave speed} In principle, once the notion of a stochastic phase has been defined, one can introduce the stochastic speed by taking a derivative in a suitable sense. In \S\ref{sec:mr:od} and \S\ref{sec:mr:ex} we discuss two key effects that influence the stochastic speed. On the one hand, we show how to construct a `frozen wave' $\Phi_\sigma$ that feels only instantaneous stochastic forcing and travels at an instantaneous speed $c_\sigma$. The interaction between the nonlinear terms and the stochastic forcing causes the shape of the wave profile to fluctuate around $\Phi_\sigma$, which introduces an extra net effect in the speed that we refer to as `orbital drift'. Our framework provides a mechanism by which both effects can be explicitly described in a perturbative fashion. Indeed, the example in \S\ref{sec:mr:ex} illustrates how this expansion can be performed up to order $\O(\ensuremath{\sigma}^2)$. Our computations show that the results are in good agreement with numerical simulations of the full SPDE. We emphasize here that our explicit expressions crucially and non-trivially involve the long-term behavior of the underlying semigroup, a clear indication of the benefits that can be gained by pursuing a semigroup-based approach. \paragraph{Obstructions} Applying the phase tracking procedure sketched above to the FitzHugh-Nagumo SPDE \sref{eq:int:SPDE:fhn}, one can show that the deviation $(\tilde{U}, \tilde{W})$ from the phase-shifted stochastic wave satisfies a SPDE of the general form \begin{equation} \label{eq:int:fhn:spde:deviation} \begin{array}{lcl} d \tilde{U} & = & \Big[ \big( 1 + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 \big) \tilde{U}_{xx} + \mathcal{R}_U(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \Big] dt + \mathcal{S}_U(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \, d \beta_t , \\[0.2cm] d \tilde{W} & = & \Big[ \big( \varrho + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 \big) \tilde{W}_{xx} + \mathcal{R}_W(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \Big] dt + \mathcal{S}_W(\tilde{U}, \tilde{W}, \tilde{U}_x, \tilde{W}_x ) \, d \beta_t \end{array} \end{equation} in which $b$ is a bounded scalar function. For $\sigma \neq 0$ this is a quasi-linear system, but the coefficients in front of the second-order derivatives are constant with respect to the spatial variable $x$. These extra second-order terms are a direct consequence of It\^o's formula, which shows that second derivatives need to be included when applying the chain rule in a stochastic setting. In particular, deterministic phase-shifts lead to extra convective terms, while stochastic phase-shifts lead to extra diffusive terms. These extra nonlinear diffusive terms cause short-term regularity issues that prevent a direct analysis of \sref{eq:int:fhn:spde:deviation} in a semigroup framework. However, in the special case $\varrho = 1$ they can be transformed away by introducing a new time variable $\tau$ that satisfies \begin{equation} \tau'(t) = 1 + \frac{1}{2} \sigma^2 b( \tilde{U}, \tilde{W} )^2 . \end{equation} This approach was taken in \cite{Hamster2017}, where we studied reaction-diffusion systems with equal diffusion strengths. In this paper we concentrate on the case $\varrho \neq 1$ and develop a more subtle version of this argument. In fact, we use a similar procedure to scale out the first of the two nonlinear diffusion terms. The remaining nonlinear second-order term is only present in the equation for $\tilde{W}$, which allows us to measure its effect on $\tilde{U}$ via the off-diagonal elements of the associated semigroup. The key point is that these off-diagonal elements have better regularity properties than their on-diagonal counterparts, which allows us to side-step the regularity issues outlined above. Indeed, by commuting $\partial_x$ with the semigroup, one can obtain an integral expression for $\tilde{U}$ that only involves $(\tilde{U}, \tilde{W}, \partial_x \tilde{U}, \partial_x \tilde{W})$ and that converges in $L^2(\Real)$. A second time-transform can be used to obtain similar results for $\tilde{W}$. A second major complication in our stochastic setting is that $(\partial_x \tilde{U}, \partial_x \tilde{W})$ cannot be directly estimated in $L^2(\Real)$. Indeed, in order to handle the stochastic integrals we need tools such as the It\^o Isometry, which requires square integrability in time. However, squaring the natural $\O(t^{-1/2})$ short-term behavior of the semigroup as measured in $\mathcal{L}( L^2; H^1 )$ leads to integrals involving $t^{-1}$ which diverge. This difficulty was addressed in \cite{Hamster2017} by controlling temporal integrals of the $H^1$-norm. By performing a delicate integration-by-parts procedure one can explicitly isolate the troublesome terms and show that the divergence is in fact `integrated out'. A similar approach works for our setting here, but the interaction between the separate time-transforms used for $\tilde{U}$ and $\tilde{W}$ requires a careful analysis with some non-trivial modifications. \paragraph{Outlook} Although this paper relaxes the severe equal-diffusion requirement in \cite{Hamster2017}, we wish to emphasize that our technical phase-tracking approach is still in a proof-of-concept state. For example, we rely heavily on the diffusive smoothening of the deterministic flow to handle the extra diffusive effects introduced by the stochastic phase shifts. Taking $\varrho= 0$ removes the former but keeps the latter, which makes it unclear at present how to handle such a situation. This is particularly relevant for many neural field models where the diffusion is modeled by convolution kernels rather than the standard Laplacian. It is also unclear at present if our framework can be generalized to deal with branches of essential spectrum that touch the imaginary axis. This occurs when analyzing planar waves in two or more dimensions \cite{BHM, KAP1997, HJHSTB2D, HJHOBST2D} or when studying viscous shocks in the context of conservation laws \cite{beck2010nonlinear,MasciaZumbrun02,HJHNLS}. In the deterministic case these settings require the use of pointwise estimates on Green's functions, which give more refined control on the linear flow than standard semigroup bounds. We are more confident about the possibility of including more general types of noise in our framework. For instance, we believe that there is no fundamental obstruction including noise that is colored in space\footnote{During the review process, results in this direction were published in \cite{Hamster2020}.}, which arises frequently in many applications \cite{Lang,Garcia2001}. In addition, it should also be possible to remove our dependence on the variational framework developed by Liu and R\"ockner \cite{LiuRockner}. Indeed, our estimates on the mild solutions appear to be strong enough to allow short-term existence results to be obtained for the original SPDE in the vicinity of the wave. \paragraph{Organization} This paper is reasonably self-contained and the main narrative can be read independently of \cite{Hamster2017}. However, we do borrow some results from \cite{Hamster2017} that do not depend on the structure of the diffusion matrix. This allows us to focus our attention on the parts that are essentially different. We formulate our phase-tracking mechanism and state our main results in \S\ref{sec:mr}. In addition, we illustrate these results in the same section by numerically analyzing an example system of FitzHugh-Nagumo type. In \S\ref{sec:SplitSem} we decompose the semigroup associated to the linearization of the deterministic wave into its diagonal and off-diagonal parts. We focus specifically on the short-time behavior of the off-diagonal elements and show that the commutator of $\partial_x$ and the semigroup extends to a bounded operator on $L^2$. In \S\ref{sec:STT} we describe the stochastic phase-shifts and time-shifts that are required to eliminate the problematic terms from our equations. We apply the results from \S\ref{sec:SplitSem} to recast the resulting SPDE into a mild formulation and establish bounds for the final nonlinearities. This allows us to close a nonlinear stability argument in \S\ref{sec:nls} by carefully estimating each of the mild integrals. \paragraph{Acknowledgements.} Hupkes acknowledges support from the Netherlands Organization for Scientific Research (NWO) (grant 639.032.612). \section{Main results} \label{sec:mr} In this paper we are interested in the stability of traveling wave solutions to SPDEs of the form \begin{equation} \label{eq:mr:main:spde} dU = \big[ \rho \partial_{xx} U + f(U) \big] dt + \sigma g(U) d \beta_t. \end{equation} Here we take $U = U(x,t) \in \Real^n$ with $x \in \Real$ and $t \ge 0$. We start in \S\ref{sec:mr:fs} by formulating precise conditions on the system above and stating our main theorem. In \S\ref{sec:mr:od}, we subsequently discuss how our formalism gives us explicit expressions for the stochastic corrections to the deterministic wave speed. We actually compute these corrections up to $\O(\sigma^2)$ for the FitzHugh-Nagumo equation in \S\ref{sec:mr:ex} and show that the results are in good agreement with numerical simulations of the full SPDE. \subsection{Formal setup} \label{sec:mr:fs} We start by formulating two structural conditions on the deterministic and stochastic part of \sref{eq:mr:main:spde}. Together these imply that our system has a variational structure with a nonlinearity $f$ that grows at most cubically. In particular, it is covered by the variational framework developed in \cite{LiuRockner} with $\alpha = 2$. The crucial difference between assumption (HDt) below and assumption (HA) in \cite{Hamster2017} is that the diagonal elements of $\rho$ no longer have to be equal. \begin{itemize} \item[(HDt)]{ The matrix $\rho \in \Real^{n\times n}$ is a diagonal matrix with strictly positive diagonal elements $\{\rho_i\}_{i=1}^n$. In addition, we have $f \in C^3(\Real^n; \Real^n)$ and there exist $u_\pm \in \Real^n$ for which $f(u_-) = f(u_+) = 0 $. Finally, $D^3 f$ is bounded and there exists a constant $K_{\mathrm{var}} > 0$ so that the one-sided inequality \begin{equation} \langle f( u_A ) - f(u_B) , u_A - u_B \rangle_{\Real^n} \le K_{\mathrm{var}} \abs{ u_A - u_B}^2 \end{equation} holds for all pairs $(u_A,u_B) \in \Real^n \times \Real^n$. } \item[(HSt)]{ The function $g \in C^2(\Real^n; \Real^n)$ is globally Lipschitz with $g(u_-) = g(u_+) = 0$. In addition, $Dg$ is bounded and globally Lipschitz. Finally, the process $(\beta_t)_{t \ge 0}$ is a Brownian motion with respect to the complete filtered probability space \begin{equation} \Big(\Omega, \mathcal{F}, ( \mathcal{F}_t)_{t \ge 0} , \mathbb{P} \Big). \end{equation} } \end{itemize} We write $\rho_{\mathrm{min}}=\min\{\rho_i\}>0$, together with $\rho_{\mathrm{max}} = \max\{\rho_i\}$. In addition, we introduce the shorthands \begin{equation} L^2 = L^2(\Real;\Real^n), \qquad H^1 = H^1(\Real ;\Real^n), \qquad H^2 = H^2(\Real; \Real^n). \end{equation} Our final assumption states that the deterministic part of \sref{eq:mr:main:spde} has a spectrally stable traveling wave solution that connects the two equilibria $u_\pm$ (which are allowed to be equal). This traveling wave should approach these equilibria at an exponential rate. \begin{itemize} \item[(HTw)]{ There exists a wavespeed $c_0 \in \Real$ and a waveprofile $\Phi_0 \in C^2(\Real ; \Real^n)$ that satisfies the traveling wave ODE \begin{equation}\label{eq:MR:TWODE} \rho \Phi_0''+c_0 \Phi_0' + f(\Phi_0)=0 \end{equation} and approaches its limiting values $\Phi_0(\pm \infty) = u_\pm$ at an exponential rate. In addition, the associated linear operator $\mathcal{L}_{\mathrm{tw}}: H^2 \to L^2$ that acts as \begin{equation} \label{eq:mr:def:l:tw} [\mathcal{L}_{\mathrm{tw}} v](\xi) = \rho v''(\xi)+c_0 v'(\xi) + Df\big(\Phi_0(\xi) \big) v(\xi) \end{equation} has a simple eigenvalue at $\lambda = 0$ and has no other spectrum in the half-plane $\{\Re \lambda \ge -2\beta\} \subset \mathbb{C}$ for some $ \beta > 0$. } \end{itemize} The formal adjoint \begin{equation} \mathcal{L}_{\mathrm{tw}}^*: H^2 \to L^2 \end{equation} of the operator \sref{eq:mr:def:l:tw} acts as \begin{equation} [\mathcal{L}_{\mathrm{tw}}^* w](\xi) = \rho w''(\xi) -c_0 w'(\xi) + (Df\big(\Phi_0(\xi) \big))^* w(\xi) . \end{equation} Indeed, one easily verifies that \begin{equation} \langle \mathcal{L}_{\mathrm{tw}} v , w \rangle_{L^2} = \langle v, \mathcal{L}_{\mathrm{tw}}^* w \rangle_{L^2} \end{equation} whenever $(v,w) \in H^2 \times H^2$. Here $\langle \cdot, \cdot \rangle_{L^2}$ denotes the standard inner-product on $L^2$. The assumption that zero is a simple eigenvalue for $\mathcal{L}_{\mathrm{tw}}$ implies that $\mathcal{L}_{\mathrm{tw}}^* \psi_{\mathrm{tw}} = 0$ for some $\psi_{\mathrm{tw}} \in H^2$ that we normalize to get \begin{equation} \label{eq:mr:hs:norm:cnd:psitw} \langle \Phi_0' , \psi_{\mathrm{tw}} \rangle_{L^2} = 1. \end{equation} We remark here that it is advantageous to view SPDEs as evolutions on Hilbert spaces, since powerful tools are available in this setting. However, in the case where $u_- \neq u_+$, the waveprofile $\Phi_0$ does not lie in the natural statespace $L^2$. In order to circumvent this problem, we use $\Phi_0$ as a reference function that connects $u_-$ to $u_+$, allowing us to measure deviations from this function in the Hilbert spaces $H^1$ and $L^2$. In order to highlight this dual role and prevent any confusion, we introduce the duplicate notation \begin{equation} \Phi_{\mathrm{ref}} = \Phi_0. \end{equation} This allows us to introduce the sets \begin{equation} \mathcal{U}_{L^2} = \Phi_{\mathrm{ref}} + L^2, \qquad \mathcal{U}_{H^1} = \Phi_{\mathrm{ref}} + H^1, \qquad \mathcal{U}_{H^2} = \Phi_{\mathrm{ref}} + H^2, \end{equation} which we will use as the relevant state-spaces to capture the solutions $U$ to \sref{eq:mr:main:spde}. We now set out to couple an extra phase-tracking\footnote{See \cite[\S 2.4]{Hamster2017} for a more intuitive explanation of this phase.} SDE to our SPDE \sref{eq:mr:main:spde}. As a preparation, we pick a sufficiently large constant $K_{\mathrm{high}} > 0$ together with two $C^\infty$-smooth non-decreasing cut-off functions \begin{equation} \chi_{\mathrm{low}}: \Real \to [\frac{1}{4}, \infty), \qquad \chi_{\mathrm{high}}: \Real \to [- K_{\mathrm{high}} - 1, K_{\mathrm{high}} + 1] \end{equation} that satisfy the identities \begin{equation} \chi_{\mathrm{low}}(\vartheta) = \frac{1}{4} \hbox{ for } \vartheta \le \frac{1}{4}, \qquad \chi_{\mathrm{low}}(\vartheta) = \vartheta \hbox{ for } \vartheta \ge \frac{1}{2}, \end{equation} together with \begin{equation} \chi_{\mathrm{high}}(\vartheta) = \vartheta \hbox{ for } \abs{\vartheta} \le K_{\mathrm{high}}, \qquad \chi_{\mathrm{high}}(\vartheta) = \mathrm{sign}(\vartheta) \big[K_{\mathrm{high}} + 1] \hbox{ for } \abs{\vartheta} \ge K_{\mathrm{high}} + 1. \end{equation} For any $u \in \mathcal{U}_{H^1}$ and $\psi \in H^1$, this allows us to introduce the function \begin{equation} \label{eq:mr:def:b} \begin{array}{lcl} b(u, \psi) & = & - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u , \psi \rangle_{L^2} \big) \Big]^{-1} \chi_{\mathrm{high}}\big( \langle g(u) , \psi \rangle_{L^2} \big) , \\[0.2cm] \end{array} \end{equation} together with the diagonal $n\times n$-matrix \begin{equation} \label{eq:mr:def:kappa} \begin{array}{lcl} \kappa_{\sigma}(u, \psi) & = & \mathrm{diag} \{ \kappa_{\sigma;i}(u, \psi) \}_{i=1}^n := \mathrm{diag} \{ 1 + \frac{1}{2\rho_i} \sigma^2 b( u, \psi )^2 \}_{i=1}^n. \end{array} \end{equation} In addition, for any $u \in \mathcal{U}_{H^1}$, $c \in \Real$ and $\psi \in H^2$ we write \begin{equation} \begin{array}{lcl} \label{eq:mr:def:a} a_{\sigma}(u, c, \psi ) & = & - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi \rangle_{L^2} \big) \Big]^{-1} \langle \kappa_{\sigma}(u,\psi)u , \rho \partial_{\xi \xi} \psi \rangle_{L^2} \\[0.2cm] & & \qquad -\Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi \rangle_{L^2} \big) \Big]^{-1} \langle f(u ) +c \partial_\xi u + \sigma^2 b( u, \psi) \partial_\xi [g(u )] , \psi \rangle_{L^2} . \end{array} \end{equation} The essential difference with the definitions of $\kappa_\sigma$ and $a_{\sigma}$ in \cite{Hamster2017} is that $\kappa_{\sigma}$ is now a matrix instead of a constant. However, this does not affect the ideas and results in {\S}3,4 and {\S}7 of \cite{Hamster2017}, which can be transferred to the current setting almost verbatim. Indeed, one simply replaces $\rho$ by $\rho_\mathrm{min}$ or $\rho_\mathrm{max}$ as necessary. The traveling wave ODE \sref{eq:MR:TWODE} implies that $a_0(\Phi_0, c_0, \psi_{\mathrm{tw}}) = 0$. Following \cite[Prop. 2.2]{Hamster2017}, one can show that there exists a branch of profiles and speeds $(\Phi_\ensuremath{\sigma},c_\ensuremath{\sigma})$ in $\mathcal{U}_{H^2} \times \ensuremath{\mathbb{R}}$ that is $\mathcal{O}(\ensuremath{\sigma}^2)$ close to $(\Phi_0,c_0)$, for which \begin{equation} a_{\sigma}(\Phi_{\sigma}, c_{\sigma}, \psi_{\mathrm{tw}}) = 0. \end{equation} Upon introducing the right-shift operators \begin{equation} [T_{\gamma} u](\xi) = u(\xi - \gamma) \end{equation} we can now formally introduce the coupled SPDE \begin{equation} \label{eq:mr:formal:spde} \begin{array}{lcl} dU &= & \big[ \rho\ensuremath{\partial}_{xx} U + f(U) \big] dt + \sigma g(U) d \beta_t, \\[0.2cm] d\Gamma & = & \big[ c_{\sigma} + a_\sigma \big( U ,c_{\sigma}, T_{\Gamma} \psi_{\mathrm{tw}} \big) \big] dt + \sigma b\big(U , T_{\Gamma} \psi_{\mathrm{tw}} \big) \, d \beta_t , \end{array} \end{equation} which is the main focus in this paper. Following the procedure used to establish \cite[Prop. 2.1]{Hamster2017}, one can show that this SPDE coupled with an initial condition \begin{equation} \label{eq:mr:init:cond} (U, \Gamma)(0) = (u_0 , \gamma_0) \in \mathcal{U}_{H^1} \times \Real \end{equation} has solutions\footnote{We refer to \cite[Prop. 2.1]{Hamster2017} for the precise notion of a solution.} $\big(U(t), \Gamma(t) \big) \in \mathcal{U}_{H^1} \times \Real$ that can be defined for all $t \ge 0$ and are almost-surely continuous as maps into $\mathcal{U}_{L^2} \times \Real$. For any initial condition $u_0 \in \mathcal{U}_{H^1}$ that is sufficiently close to $\Phi_{\sigma}$, \cite[Prop. 2.3]{Hamster2017} shows that it is possible to pick $\gamma_0$ in such a way that \begin{equation} \langle T_{-\ensuremath{\gamma}_{0}}u(0)-\Phi_\ensuremath{\sigma}, \psi_{\mathrm{tw} } \rangle_{L^2} = 0. \end{equation} This allows us to define the process \begin{equation} \label{eq:MR:DefV} V_{u_0}(t) = T_{-\Gamma(t) } \big[ U(t)\big] - \Phi_{\sigma} , \end{equation} which can be thought of as the deviation of the solution $U(t)$ of \sref{eq:mr:formal:spde}-\sref{eq:mr:init:cond} from the stochastic wave $\Phi_{\sigma}$ shifted to the position $\Gamma(t)$. In order to measure the size of this deviation we pick $\ensuremath{\varepsilon} > 0$ and introduce the scalar function \begin{equation}\label{eq:DefNeps} N_{\ensuremath{\varepsilon};u_0} (t) = \norm{V_{u_0}(t)}_{L^2}^2 + \int_0^t e^{- \ensuremath{\varepsilon} (t - s) } \norm{ V_{u_0}(s)}_{H^1}^2 \, ds . \end{equation} For each $T > 0$ and $\eta > 0$ we now define the probability \begin{equation} p_{\ensuremath{\varepsilon}}(T, \eta, u_0) = P\Big( \sup_{0 \le t \le T} N_{\ensuremath{\varepsilon};u_0}(t) > \eta \Big) . \end{equation} Our main result shows that the probability that $N_{\ensuremath{\varepsilon};u_0}$ remains small on timescales of order $\ensuremath{\sigma}^{-2}$ can be pushed arbitrarily close to one by restricting the strength of the noise and the size of the initial perturbation. This extends \cite[Thm. 2.4]{Hamster2017} to the current setting where the diffusion matrix $\rho$ need not be proportional to the identity. \begin{thm}[{see \S\ref{sec:nls}}] \label{thm:mr:orbital:stb} Suppose that (HDt), (HSt) and (HTw) are all satisfied and pick sufficiently small constants $\ensuremath{\varepsilon} > 0$, $\delta_0>0$, $\delta_{\eta} > 0$ and $\delta_{\sigma} > 0$. Then there exists a constant $K > 0$ so that for every $0 \le \sigma \le \delta_{\sigma}T^{-1/2}$, any $u_0 \in \mathcal{U}_{H^1}$ that satisfies $\nrm{u_0-\Phi_\ensuremath{\sigma}}_{L^2}<\delta_0$, any $0 < \eta \le \delta_{\eta}$ and any $T > 0$, we have the inequality \begin{equation} \label{eq:mr:bnd:for:p:eps} p_{\ensuremath{\varepsilon}}(T, \eta, u_0) \le \eta^{-1} K \Big[ \norm{u_0 - \Phi_{\sigma}}_{H^1}^2 + \sigma^2T \Big]. \end{equation} \end{thm} \subsection{Orbital drift} \label{sec:mr:od} On account of the theory developed in \cite[{\S}12]{leadbetter2012extremes} to describe the suprema of finite-dimensional Gaussian processes, we suspect that the $\sigma^2 T$ term appearing in the bound \sref{eq:mr:bnd:for:p:eps} can be replaced by $\sigma^2 \ln T$. This would allow us to consider timescales of order $\mathrm{exp}[\delta_\sigma /\sigma^2 ]$, which are exponential in the noise-strength instead of merely polynomial. The key limitation is that the theory of stochastic convolutions in Hilbert spaces is still in the early stages of development. In order to track the evolution of the phase over such long timescales, we follow \cite{Hamster2017} and introduce the formal Ansatz \begin{equation} \Gamma(t) = c_{\sigma} t + \sigma \Gamma_{\sigma;1}(t) + \sigma^2 \Gamma_{\sigma;2}(t) + O (\ensuremath{\sigma}^3) . \end{equation} The first-order term is the scaled Brownian motion \begin{equation} \label{eq:gamma:sigma:1} \Gamma_{\sigma;1}(t) = b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \beta_t, \end{equation} which naturally has zero mean and hence does not contribute to any deviation of the average observed wavespeed. In order to understand the second-order term, we introduce the orbital drift coefficient \begin{equation} \label{eq:mr:def:c:orb:drift} \begin{array}{lcl} c^{\mathrm{od}}_{\sigma;2} & = & \frac{1}{2} \int_0^\infty D_1^2 a_{\sigma}\big(\Phi_{\sigma} , c_{\sigma} , \psi_{\mathrm{tw}} \big) \Big[S(s) \big( g(\Phi_{\sigma} ) + b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \Phi'_{\sigma} \big), S(s) \big( g(\Phi_{\sigma} ) + b(\Phi_{\sigma}, \psi_{\mathrm{tw}}) \Phi'_{\sigma} \big) \Big] \, d s , \end{array} \end{equation} in which $\{S(s)\}_{s \ge 0}$ denotes the semigroup generated by $\mathcal{L}_{\mathrm{tw}}$. In \cite[{\S}2.4]{Hamster2017} we gave an explicit expression for $\Gamma_{\sigma;2}$ and showed that \begin{equation} \lim_{t \to \infty} t^{-1} E \Gamma_{\sigma;2}(t) = c^{\mathrm{od}}_{\sigma;2} . \end{equation} Note that we are keeping the $\sigma$-dependence in these definitions for notational convenience, but in {\S}\ref{sec:mr:ex} we show how the leading order contribution can be determined. The discussion above suggests that it is natural to introduce the expression \begin{equation} \label{eq:mr:def:c:sigma:lim} c_{\sigma;\lim}^{(2)} = c_{\sigma} + \sigma^2 c^{\mathrm{od}}_{\sigma;2}, \end{equation} which satisfies $c_{\sigma;\lim}^{(2)} -c_0 = O(\sigma^2)$. Our conjecture is that the expected value of the wavespeed for large times behaves as $c_{\sigma;\lim}^{(2)} + O(\ensuremath{\sigma}^3)$. In order to interpret this, we note that the profile $\Phi_\ensuremath{\sigma}$ travels at an instantaneous velocity $c_{\sigma}$, but also experiences stochastic forcing. As a consequence of this forcing, which is mean reverting toward $\Phi_\ensuremath{\sigma}$, the profile fluctuates in the orbital vicinity of $\Phi_\sigma$. At leading order, the underlying mechanism behind this behavior resembles an Ornstein-Uhlenbeck process, which means that the amplitude of these fluctuations can be expected to stabilize for large times. This leads to an extra contribution to the observed wavespeed, which we refer to as an orbital drift. The second term in \sref{eq:mr:def:c:sigma:lim} describes the leading order contribution to this orbital drift. \subsection{Example} \label{sec:mr:ex} In order to illustrate our results, let us consider the FitzHugh-Nagumo system \begin{align} \label{eq:example:SPDE:fhn}\begin{split} dU &= \big[ U_{xx} + f_{\mathrm{cub}}(U) -W ] dt + \sigma g^{(u)}( U) d \beta_t, \\[0.2cm] dW &= \big[ \varrho V_{xx} + \ensuremath{\varepsilon}(U-\gamma W)] dt \end{split} \end{align} in a parameter regime where (HDt), (HSt) and (HTw) all hold. We write $\Phi_0=(\Phi^{(u)}_0,\Phi^{(w)}_0)$ for the deterministic wave defined in (HTw) and recall the associated linear operator $\mathcal{L}_{\mathrm{tw}}: H^2(\Real ;\Real^2) \to L^2(\Real; \Real^2)$ that acts as \begin{equation} \begin{array}{lcl} \mathcal{L}_{\mathrm{tw}} & = & \left( \begin{array}{cc} \partial_{\xi \xi} + c_0 \partial_\xi + f'_{\mathrm{cub}}(\Phi_0^{(u)}) & - 1 \\[0.2cm] \ensuremath{\varepsilon} & \varrho \partial_{\xi \xi} + c_0 \partial_\xi - \ensuremath{\varepsilon} \gamma \\[0.2cm] \end{array} \right) . \end{array} \end{equation} The adjoint operator acts as \begin{equation} \begin{array}{lcl} \mathcal{L}^*_{\mathrm{tw}} & = & \left( \begin{array}{cc} \partial_{\xi \xi} - c_0 \partial_\xi + f'_{\mathrm{cub}}(\Phi_0^{(u)}) & \ensuremath{\varepsilon} \\[0.2cm] -1 & \varrho \partial_{\xi \xi} - c_0 \partial_\xi - \ensuremath{\varepsilon} \gamma \\[0.2cm] \end{array} \right) \end{array} \end{equation} and admits the eigenfunction $\psi_{\mathrm{tw}}=(\psi^{(u)}_{\mathrm{tw}},\psi^{(w)}_{\mathrm{tw}})$ that can be normalized in such a way that \begin{equation} \label{eq:mr:ex:norm:adj} \langle \partial_\xi \Phi_0 , \psi_{\mathrm{tw}} \rangle_{L^2(\Real; \Real^2)} = 1. \end{equation} To summarize, we have \begin{equation} \mathcal{L}_{\mathrm{tw}} \partial_\xi ( \Phi^{(u)}_0, \Phi^{(w)}_0 )^T = 0, \qquad \qquad \mathcal{L}^*_{\mathrm{tw}} ( \psi^{(u)}_{\mathrm{tw}}, \psi^{(w)}_{\mathrm{tw}})^T = 0. \end{equation} \begin{figure} \centering \begin{subfigure}{0.5\textwidth} \def\columnwidth{\columnwidth} \input{csco.pdf_tex} \caption{} \end{subfigure}% \begin{subfigure}{0.5\textwidth} \def\columnwidth{\columnwidth} \input{Phi.pdf_tex} \caption{} \end{subfigure} \caption{Numerical results for the solution $(\Phi_\ensuremath{\sigma},c_\ensuremath{\sigma})$ to equation \sref{eq:example:TWode}. Figure (a) shows the numerical approximation of $c_\ensuremath{\sigma}-c_0$ and the first order approximation of this difference. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$. Using \sref{eq:mr:melnikov:cop:c:zero:2} we numerically computed $c_{0;2}=-3.66$. Figure (b) shows the two components of $\Phi_\ensuremath{\sigma}$ for $\ensuremath{\sigma}=0.15$ for the same parameter values. On the scale of this figure they are almost identical to $\Phi_0$. } \label{fig:cs} \end{figure} Upon writing $\Phi_\ensuremath{\sigma}=(\Phi^{(u)}_\ensuremath{\sigma},\Phi^{(w)}_\ensuremath{\sigma})$, the stochastic wave equation $a_{\sigma}(\Phi_\ensuremath{\sigma}, c_\ensuremath{\sigma}, \psi_{\mathrm{tw}} ) = 0$ can be written as \begin{equation} \begin{array}{lcl} \label{eq:example:TWode} - c_\ensuremath{\sigma} \ensuremath{\partial}_{x}\Phi^{(u)}_\ensuremath{\sigma} & = & \left(1+\frac{\ensuremath{\sigma}^2}{2}\tilde{b}(\Phi_\ensuremath{\sigma})^2\right)\ensuremath{\partial}_{xx}\Phi^{(u)}_\ensuremath{\sigma} + f_{\mathrm{cub}}(\Phi^{(u)}_\ensuremath{\sigma}) -\Phi^{(w)}_\ensuremath{\sigma} +\ensuremath{\sigma}^2\tilde{b}(\Phi_\ensuremath{\sigma})\ensuremath{\partial}_x[ g^{(u)}(\Phi^{(u)}_\ensuremath{\sigma})] , \\[0.2cm] - c_\ensuremath{\sigma} \ensuremath{\partial}_{x}\Phi^{(w)}_\ensuremath{\sigma} & = & \left(\varrho +\frac{\ensuremath{\sigma}^2}{2}\tilde{b}(\Phi_\ensuremath{\sigma})^2\right)\ensuremath{\partial}_{xx}\Phi^{(w)}_\ensuremath{\sigma} + \ensuremath{\varepsilon}(\Phi^{(u)}_\ensuremath{\sigma}-\gamma \Phi^{(w)}_\ensuremath{\sigma}) , \end{array} \end{equation} where $\tilde{b}$ is given by \begin{align} \tilde{b}(\Phi_\ensuremath{\sigma})=-\frac{\ip{ g^{(u)} (\Phi^{(u)}_\ensuremath{\sigma} ),\psi^{(u)}_{\mathrm{tw}}}_{L^2(\Real;\Real)}} {\ip{\ensuremath{\partial}_x\Phi_\ensuremath{\sigma},\psi_{\mathrm{tw}}}_{L^2(\Real;\Real^2)}}. \end{align} We now introduce the expansions \begin{equation} \Phi_\ensuremath{\sigma}=\Phi_0+\ensuremath{\sigma}^2\Phi_{0;2}+\O(\ensuremath{\sigma}^4), \qquad \qquad c_\ensuremath{\sigma} = c_0 + \ensuremath{\sigma}^2 c_{0;2} + \O(\ensuremath{\sigma}^4) \end{equation} with $\Phi_{0;2} = \big( \Phi^{(u)}_{0; 2} , \Phi^{(w)}_{0; 2} \big)$. Substituting these expressions into \sref{eq:example:TWode} and balancing the second order terms, we find \begin{equation} \begin{array}{lcl} - c_{0;2} \ensuremath{\partial}_{x}\Phi^{(u)}_0 - c_{0} \ensuremath{\partial}_{x}\Phi^{(u)}_{0;2}& = & \ensuremath{\partial}_{xx}\Phi^{(u)}_{0;2} + \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{xx} \Phi^{(u)}_0 + f'_{\mathrm{cub}}(\Phi^{(u)}_0) \Phi^{(u)}_{0;2} -\Phi^{(w)}_{0;2} \\[0.2cm] & & \qquad +\tilde{b}(\Phi_0)\ensuremath{\partial}_x g^{(u)}(\Phi^{(u)}_0 ) , \\[0.2cm] - c_{0;2} \ensuremath{\partial}_{x}\Phi^{(w)}_0 - c_{0} \ensuremath{\partial}_{x}\Phi^{(w)}_{0;2}& = & \varrho \ensuremath{\partial}_{xx} \Phi^{(w)}_{0;2} + \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{xx} \Phi^{(w)}_{0} + \ensuremath{\varepsilon}(\Phi^{(u)}_{0;2}-\gamma \Phi^{(w)}_{0;2}) , \end{array} \end{equation} which can be rephrased as \begin{equation} \begin{array}{lcl} \mathcal{L}_{\mathrm{tw}} \Phi_{0;2} & = & - c_{0;2} \ensuremath{\partial}_{x} \Phi_0 - \frac{1}{2} \tilde{b}(\Phi_0)^2 \ensuremath{\partial}_{\xi \xi} \Phi_0 - \tilde{b} (\Phi_0) \big( \ensuremath{\partial}_x g^{(u)}( \Phi^{(u)}_0 ) , 0 \big)^T . \end{array} \end{equation} Using the normalization \sref{eq:mr:ex:norm:adj} together with the fact that $\langle \psi_{\mathrm{tw}}, \mathcal{L}_{\mathrm{tw}} \Phi_{0;2} \rangle_{L^2(\Real;\Real^2)} = 0$, we find the explicit expression \begin{equation} \label{eq:mr:melnikov:cop:c:zero:2} c_{0;2} = - \frac{1}{2} \tilde{b}(\Phi_0)^2 \langle \ensuremath{\partial}_{\xi \xi} \Phi_0 , \psi_{\mathrm{tw}} \rangle_{L^2(\Real ; \Real^2) } - \tilde{b}(\Phi_0) \langle \ensuremath{\partial}_x g^{(u)} ( \Phi^{(u)}_0 ) , \psi^{(u)}_{\mathrm{tw}} \rangle_{L^2(\Real ;\Real)} \end{equation} for the coefficient that governs the leading order behavior of $c_{\ensuremath{\sigma}} - c_0$. In Figure \ref{fig:cs} we show numerically that $c_{0;2} \ensuremath{\sigma}^2$ indeed corresponds well with $c_{\ensuremath{\sigma}} - c_0$ for small values of $\sigma^2$. In Figure \ref{fig:UDifRef} we illustrate the behavior of a representative sample solution to \sref{eq:example:SPDE:fhn} by plotting it in three different moving frames. Figure \ref{fig:UDifREfa} clearly shows that the deterministic speed $c_0$ overestimates the actual speed as the wave moves to the left. The situation is improved in Figure \ref{fig:UDifREfb}, where we use a frame that travels with the stochastic speed $c_{\sigma}$. However, the position of the wave now fluctuates around a position that still moves slowly to the left as a consequence of the orbital drift. This is remedied in Figure \ref{fig:UDifREfc} where we use the full stochastic phase $\Gamma(t)$. Indeed, the wave now appears to be at a fixed position, but naturally still experiences fluctuations in its shape. This shows that $\Gamma(t)$ is indeed a powerful tool to characterize the position of the wave. \begin{figure} \centering \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{Uc0.pdf_tex} \caption{$U(\cdot +c_0t,t)$} \label{fig:UDifREfa} \end{subfigure}% \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{Ucs.pdf_tex} \caption{$U(\cdot +c_\sigma t,t)$} \label{fig:UDifREfb} \end{subfigure}% \begin{subfigure}{.33\textwidth} \centering \def\columnwidth{\columnwidth} \input{UGamma.pdf_tex} \caption{$U(\cdot +\Gamma(t),t)$} \label{fig:UDifREfc} \end{subfigure} \caption{A single realization of the $U$-component of \sref{eq:example:SPDE:fhn} with initial condition $\Phi_\ensuremath{\sigma}$ in 3 different reference frames. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\sigma=0.03$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$.} \label{fig:UDifRef} \end{figure} In order to study the orbital drift mentioned above, we split the semigroup $S(t)$ generated by $\mathcal{L}_{\mathrm{tw}}$ into its components \begin{equation} S(t) = \left( \begin{array}{cc} S^{(uu)}(t) & S^{(uw)}(t) \\[0.2cm] S^{(wu)}(t) & S^{(ww)}(t) \end{array} \right) \end{equation} and introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{I}(s) & = & S^{(uu)}(s) g^{(u)}(\Phi_0 ) + \tilde{b}(\Phi_{0}) S^{(uu)} \partial_\xi \Phi^{(u)}_{0} + \tilde{b}(\Phi_{0}) S^{(uw)} \partial_\xi \Phi^{(w)}_{0} , \end{array} \end{equation} together with \begin{equation} \label{eq:mr:c:zero:od} c^{\mathrm{od}}_{0;2} = -\frac{1}{2}\int_0^\infty \ip{f''_{\mathrm{cub}}(\Phi_0^{(u)}) \mathcal{I}(s)^2, \psi^{(u)}_{\mathrm{tw}}}_{L^2} \, ds. \end{equation} This last quantity is in fact the leading order term in the Taylor expansion of \sref{eq:mr:def:c:orb:drift}, which means that \begin{equation} \begin{array}{lcl} c^{\mathrm{od}}_{\sigma;2} = c^{\mathrm{od}}_{0;2} + O(\sigma^2) . \end{array} \end{equation} In particular, we see that \begin{equation} c^{(2)}_{\sigma;\lim} = c_0 + \sigma^2 \big[ c_{0;2} + c^{\mathrm{od}}_{0;2} \big] + O(\sigma^3) , \end{equation} which means that we have explicitly identified the leading order correction to the full limiting wavespeed. To validate our prediction for the size of the orbital drift, we first approximated $E[\Gamma(t)-c_\ensuremath{\sigma} t]$ numerically by performing an average over a set of numerical simulations. In fact, to speed up the convergence rate, we first subtracted the term $\Gamma_{\sigma;1}(t)$ defined in \sref{eq:gamma:sigma:1} from each simulation, using the same realization of the Brownian motion that was used to generate the path for $(U,W)$. The results can be found in Figure \ref{fig:Difta}. \begin{figure} \centering \begin{subfigure}{.5\textwidth} \centering \def\columnwidth{\columnwidth} \input{rico2.pdf_tex} \caption{} \label{fig:Difta} \end{subfigure}% \begin{subfigure}{.5\textwidth} \centering \def\columnwidth{\columnwidth} \input{AvRico2.pdf_tex} \caption{} \label{fig:Diftb} \end{subfigure} \caption{In (a) we computed the average $E[\Gamma(t)-c_\ensuremath{\sigma} t]$ over 1000 simulations of \sref{eq:example:SPDE:fhn}, using the procedure described in the main text for several values of $\ensuremath{\sigma}$. Notice that a clear trend is visible. In (b) we computed the corresponding orbital drift by evaluating the average \sref{eq:mr:def:c:od:obs} for the data in (a). Observe that there is a reasonable match with the predicted values $c_{0;2}^{\mathrm{od}} \sigma^2$. We chose $g^{(u)}(u)=u$ with parameters $a=0.1$, $\varrho=0.01$, $\ensuremath{\varepsilon}=0.01$, $\gamma=5$. We used the value $c^{\mathrm{od}}_{0;2}=-0.18$, which was found by evaluating \sref{eq:mr:c:zero:od} numerically. } \label{fig:Drift} \end{figure} In order to eliminate any transients from the data, we subsequently numerically computed the quantity \begin{align} \label{eq:mr:def:c:od:obs} c^{\mathrm{od}}_{\mathrm{obs}} =\frac{2}{T} \int_{\frac{T}{2}}^T \frac{1}{t}E[\Gamma(t)-c_\ensuremath{\sigma} t]dt . \end{align} This corresponds with the average slope of the data in Figure \ref{fig:Difta} on the interval $[T/2, T]$, which is a useful proxy for the observed orbital drift. Figure \ref{fig:Diftb} shows that these quantities are well-approximated by our leading order expression $\sigma^2 c_{0;2}^{\mathrm{od}}$. \section{Structure of the semigroup} \label{sec:SplitSem} In this section we analyze the analytic semigroup $S(t)$ generated by the linear operator $\mathcal{L}_\mathrm{tw}$, focusing specially on its off-diagonal elements. Assumption (HTw) implies that $\mathcal{L}_\mathrm{tw}$ has a spectral gap, which is essential for our computations. In order to exploit this, we introduce the maps $P: L^2 \to L^2$ and $Q: L^2 \to L^2$ that act as \begin{equation} P v = \langle v , \psi_{\mathrm{tw}} \rangle_{L^2} \Phi_0', \qquad \qquad Q v = v - P v . \end{equation} We also introduce the suggestive notation $P_\xi \in \mathcal{L}(L^2; L^2)$ to refer to the map \begin{equation} \label{eq:spl:def:p:x} P_\xi v = - \langle v , \partial_\xi \psi_{\mathrm{tw}} \rangle_{L^2} \Phi_0', \end{equation} noting that $P_\xi v = P \partial_\xi v $ whenever $v \in H^1$. These projections enable us to remove the simple eigenvalue at the origin and obtain the following bounds. \begin{lem}[see \cite{lorenzi2004analytic}] \label{lem:nls:sem:group:decay} Assume that (HDt) and (HTw) hold. Then $\mathcal{L}_{\mathrm{tw}}$ generates an analytic semigroup semigroup $S(t)$ and there exists a constant $M\geq 1$ for which we have the bounds \begin{equation} \begin{array}{lclcl} \nrm{S(t)Q}_{\L(L^2;L^2)}&\leq& M e^{-\b t}, && 0<t<\infty , \\[0.2cm] \nrm{S(t)Q}_{\L(L^2;H^1)}&\leq& M t^{-\frac{1}{2}} , && 0<t\leq 2 , \\[0.2cm] \nrm{S(t)P}_{\L(L^2;H^2)} + \nrm{S(t)P_\xi}_{\L(L^2;H^2)} + \nrm{S(t)\partial_\xi P }_{\mathcal{L}(L^2; H^2)} &\leq& M , & & 0<t\leq 2 , \\[0.2cm] \nrm{S(t)Q}_{\L(L^2;H^2)}&\leq& M e^{-\b t}, & & t\geq 1, \\[0.2cm] \norm{[\mathcal{L}_\mathrm{tw} - \rho \partial_{\xi\xi}] S(t)Q}_{\L(L^2;L^2) } & \le & M t^{-\frac{1}{2}}, & & 0 < t\leq 2, \\[0.2cm] \norm{[\mathcal{L}^*_\mathrm{tw} - \rho \partial_{\xi\xi}] S(t)Q }_{\L(L^2;L^2) } & \le & M t^{-\frac{1}{2}}, & & 0 < t\leq 2 . \end{array} \end{equation} \end{lem} \begin{proof} Since $\rho \partial_{\xi\xi}$ generates $n$ independent heat-semigroups, the analyticity of the semigroup $S(t)$ can be obtained from \cite[Prop 4.1.4]{lorenzi2004analytic}; see also \cite[Prop 6.3.vi]{Hamster2017}. The desired bounds follow from \cite[Prop 5.2.1]{lorenzi2004analytic} together with the fact that $\Phi_0' \in H^3$. \end{proof} In {\S}\ref{sec:STT} we will show that the function $V(t)$ defined in \sref{eq:MR:DefV} satisfies an SPDE that involves nonlinear terms containing second order derivatives. The short-term bounds above are too crude to handle such terms as they lead to divergences in the integrals governing short-time regularity. In addition, the variational framework in \cite{LiuRockner} only provides control on the $H^1$-norm of $V$. In order to circumvent the first issue, we introduce the representation \begin{equation} S(t) v = \left( \begin{array}{ccc} S_{11}(t) & \ldots & S_{1n}(t) \\ \vdots & \ddots & \vdots \\ S_{n1}(t) & \ldots & S_{nn}(t) \end{array} \right) \left( \begin{array}{c} v_1 \\ \vdots \\ v_n \end{array} \right) \end{equation} with operators $S_{ij}(t) \in \mathcal{L}\big( L^2(\Real ; \Real) ; L^2(\Real; \Real) \big)$. Upon writing \begin{equation} S_{\mathrm{d}}(t) = \mathrm{diag}\big( S_{11}(t) , \ldots, S_{nn}(t) \big) \end{equation} this allows us to make the splitting \begin{equation} S(t) = S_{\mathrm{d}}(t) + S_{\mathrm{od}}(t). \end{equation} Our main result below shows that the off-diagonal terms $S_{\mathrm{od}}(t)$ have better short-term bounds than the original semigroup. The second issue can be addressed by introducing the commutator \begin{equation} \Lambda(t) = [S(t) Q, \ensuremath{\partial}_{\xi}] = S(t) Q \ensuremath{\partial}_{\xi} - \ensuremath{\partial}_{\xi} S(t) Q \end{equation} that initially acts on $H^1$. In fact, we show that this commutator can be extended to $L^2$ in a natural fashion and that it has better short-time bounds than $S(t)$. Upon writing \begin{equation} \label{eq:spl:eqn:with:comm} S(t) \ensuremath{\partial}_{\xi} v = S(t) Q \ensuremath{\partial}_{\xi} v + S(t) P_\xi v = \ensuremath{\partial}_{\xi} S(t) Q v + \Lambda(t) v + S(t) P_\xi v, \end{equation} we hence see that the right-hand side of this identity is well-defined for $v \in L^2$. In {\S}\ref{sec:STT} this observation will allow us to give a mild interpretation of the SPDE satisfied by $V(t)$ posed on the space $H^1$. \begin{prop}\label{prp:MainPropSplit} Suppose that (HDt) and (HTw) are satisfied. Then the operator $\Lambda(t)$ can be extended to $L^2$ for each $t \ge 0$. In addition, there is a constant $M > 0$ so that the short-term bound \begin{equation} \label{eq:MainPropSpliti} \nrm{\Lambda(t)}_{L^2\to H^2} +\nrm{S_{\mathrm{od}}(t)}_{L^2\to H^2}\leq M \end{equation} holds for $0 < t \le 1$, while the long-term bound \begin{equation} \label{eq:MainPropSplitii} \nrm{\Lambda(t)}_{L^2\to H^2}\leq Me^{-\b t} \end{equation} holds for $t \ge 1$. \end{prop} \subsection{Functional calculus} For any linear operator $\mathcal{L}: H^2 \to L^2$ we introduce the notation \begin{equation} R(\mathcal{L},\lambda) = [\lambda - \mathcal{L} ]^{-1} \end{equation} for any $\lambda$ in the resolvent set of $\mathcal{L}$. On account of (HTw) and the sectoriality of $\mathcal{L}_{\mathrm{tw}}$, we can find $\eta_+ \in (\frac{\pi}{2} , \pi)$ and $M > 0$ so that the sector \begin{equation} \Omega_{\mathrm{tw}} = \{ \lambda \in \mathbb{C}\setminus \{ 0 \} : \abs{\mathrm{arg}(\lambda) } < \eta_+ \} \end{equation} lies entirely in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$, with \begin{equation} \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) }_{L^2 \to L^2} \le \frac{M}{\abs{\lambda} } \end{equation} for all $\lambda \in \Omega_{\mathrm{tw}}$. Since $\lambda = 0$ is a simple eigenvalue for $\mathcal{L}_{\mathrm{tw}}$, we have the limit \begin{equation} \label{eq:spl:simple:pole} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) \to P \end{equation} as $\lambda \to 0$. For any $r > 0$ and any $\eta \in (\frac{\pi}{2}, \eta_+)$, the curve given by \begin{align} \ensuremath{\gamma}_{r,\eta} = \{\l\in\ensuremath{\mathbb{C}}:|\mathrm{arg}\l| =\eta, |\l|>r\} \cup\{\l\in\ensuremath{\mathbb{C}}:|\mathrm{arg}\l|\leq \eta, |\l|=r\} \end{align} lies entirely in $\Omega_{\mathrm{tw}}$. This curve can be used \cite[(1.10)]{lorenzi2004analytic} to represent the semigroup $S$ in the integral form \begin{equation}\label{eq:IntDefS} S(t) = \frac{1}{2 \pi i}\int_{\gamma_{r, \eta}} e^{t \lambda} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \, d \lambda \end{equation} for any $ t > 0$, where $\gamma_{r, \eta}$ is traversed in the upward direction. We will analyze $\Lambda(t)$ and $S_{\mathrm{od}}(t)$ by manipulating this integral. As a preparation, we state two technical results concerning the convergence of contour integrals that are similar to \sref{eq:IntDefS}. We note that our computations here are based rather directly on \cite[{\S}1.3]{lorenzi2004analytic}. \begin{lem} \label{lem:spl:est:from:k} Suppose that (HDt) and (HTw) are satisfied and pick $r > 0$ together with $\eta \in (\frac{\pi}{2} , \eta_+)$. Suppose furthermore that $\lambda \mapsto K(\lambda) \in \mathbb{C}$ is an analytic function on the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ and that there exist constants $C > 0$ and $\vartheta \ge 1$ so that the estimate \begin{equation} \abs{K(\lambda) } \le \frac{C}{\abs{\lambda}^{\vartheta} } \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. Then there exists $C_1 > 0$ so that \begin{equation} \abs{\int_{\gamma_{r, \eta} } e^{\lambda t} K(\lambda) \, d \lambda } \le C_1 t^{ \vartheta -1 } \end{equation} for all $t > 0$. \end{lem} \begin{proof} Writing \begin{equation} \mathcal{I}(t) = \int_{\gamma_{r, \eta}} e^{\lambda t} K(\lambda) \, d \lambda \end{equation} and substituting $\lambda t = \xi$, the analyticity of $K$ on $\Omega_{\mathrm{tw}}$ implies \begin{equation} \mathcal{I}(t) = \int_{\gamma_{rt, \eta}} e^{\xi} K\left(\frac{\xi}{t}\right) \, \frac{1}{t} d \xi = \int_{\gamma_{r, \eta}} e^{\xi} K\left(\frac{\xi}{t}\right) \, \frac{1}{t} d \xi . \end{equation} Using the obvious parametrization for $\ensuremath{\gamma}_{r,\eta}$, we find \begin{equation} \label{eq:IntegrantDefT} \begin{array}{lcl} \mathcal{I}(t) &=& -\int_r^\infty e^{(\rho\cos(\eta)-i\rho\sin(\eta))} K\big(t^{-1} \rho e^{-i\eta} \big) e^{-i\eta} t^{-1} d\rho \\[0.2cm] & & \qquad +\int_\eta^\eta e^{(r\cos(\a)-ir\sin(\a))} K\big( t^{-1} re^{i\a}) \big) ire^{i\a} t^{-1} d\a \\[0.2cm] && \qquad + \int_r^\infty e^{(\rho\cos(\eta)-i\rho\sin(\eta))} K\big( t^{-1} \rho e^{i\eta}\big) e^{i\eta} t^{-1} d\rho . \end{array} \end{equation} We hence obtain the desired estimate \begin{equation} \label{eq:IntegrantDefTNorm} \begin{array}{lcl} \abs{\mathcal{I}(t)} &\leq& C t^{\vartheta - 1} \left(2\int_r^\infty e^{\rho\cos(\eta)} \rho^{-\vartheta} \, d\rho +\int_\eta^\eta e^{r\cos(\a)} r^{1 - \vartheta} d\a\right)\\[0.2cm] &:= & C_1 t^{\vartheta - 1} . \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:spl:exp:est:for:bnd:itg} Suppose that (HDt) and (HTw) are satisfied and pick $r > 0$ together with $\eta \in (\frac{\pi}{2} , \eta_+)$. Suppose furthermore that $\lambda \mapsto K(\lambda)$ is an analytic function on the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ and that there exists a constant $C > 0$ so that the estimate \begin{equation} \abs{K(\lambda) } \le C \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. Then there exists $C_2 > 0$ so that the bound \begin{equation} \abs{ \int_{\gamma_{r, \eta} } e^{\lambda t} K(\lambda) \, d \lambda } \le C_2 e^{ - \beta t } \end{equation} holds for all $ t \ge 1$. \end{lem} \begin{proof} Since $K$ remains bounded for $\lambda \to 0$, this function can be analytically extended to a neighborhood of $\lambda = 0$. We can hence replace the curve $\gamma_{r, \eta}$ by the two half-lines \begin{equation} \tilde{\gamma}_{\eta'} = - \beta + \{ \lambda \in \mathbb{C}: \abs{\mathrm{arg} \lambda } = \eta' \} \end{equation} for appropriate $\eta' \in (\frac{\pi}{2} , \eta_+)$. We can then compute \begin{equation} \begin{array}{lcl} \abs{ \int_{\tilde{\gamma}_{\eta'} } e^{\lambda t} K(\lambda) \, d \lambda} & \le & 2 C e^{- \beta t} \int_0^\infty e^{ \rho \cos(\eta') t } \, d \rho \\[0.2cm] & \le & 2 C e^{- \beta t} \int_0^\infty e^{ \rho \cos(\eta') } \, d \rho \\[0.2cm] & := & C_2 e^{- \beta t} . \end{array} \end{equation} \end{proof} \subsection{The commutator $\Lambda(t)$} In this section we analyze $\Lambda(t)$ and establish the statements in Proposition \ref{prp:MainPropSplit} that concern this commutator. Based on the identity \sref{eq:IntDefS}, we first set out to compute the commutator of $R(\mathcal{L}_{\mathrm{tw}}, \lambda)$ and $\ensuremath{\partial}_{\xi}$. As a preparation, we introduce the commutator \begin{equation} \label{eq:spl:def:B} B = [\L_{\mathrm{tw}} Q, \ensuremath{\partial}_{\xi}] = [\L_{\mathrm{tw}} , \ensuremath{\partial}_{\xi}] , \end{equation} which can easily be seen to act as \begin{equation} B v = - D^2 f(\Phi_0)\Phi_0' v \end{equation} for any $v \in H^3$. \begin{lem}\label{lem:split:res} Suppose that (HDt) and (HTw) are satisfied and pick any $\lambda$ in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$. Then for any $g \in H^1$ we have the identity \begin{equation} \label{eq:split:comm:resolv} \begin{array}{lcl} [R(\mathcal{L}_{\mathrm{tw}},\lambda) Q, \partial_\xi ] g & = & R(\mathcal{L}_{\mathrm{tw}},\lambda) Q \partial_\xi g - \partial_\xi R(\mathcal{L}_{\mathrm{tw}},\lambda)Q g \\[0.2cm] & = & R(\mathcal{L}_{\mathrm{tw}},\lambda) \Big[ B R(\mathcal{L}_{\mathrm{tw}},\lambda) Qg - [P, \partial_\xi] g \Big] . \end{array} \end{equation} \end{lem} \begin{proof} Let us first write \begin{equation} v = [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g. \end{equation} The definition \sref{eq:spl:def:B} implies that \begin{equation} \begin{array}{lcl} [\lambda - \mathcal{L}_{\mathrm{tw}} ] Q\partial_\xi v & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}} ] Q v - B v + \lambda [Q , \partial_\xi] v \\[0.2cm] & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}}] v - \partial_\xi \lambda (I -Q) v - B v + \lambda [Q, \partial_\xi] v \\[0.2cm] & = & \partial_\xi [\lambda - \mathcal{L}_{\mathrm{tw}} ] v - \lambda \partial_{\xi} P v - B v - \lambda [P, \partial_{\xi}] v \\[0.2cm] & = & \partial_{\xi} Q g - B v - \lambda P \partial_{\xi} v \\[0.2cm] & = & Q \partial_{\xi} g - [P , \partial_{\xi}] g - B v - \lambda P \partial_{\xi} v . \end{array} \end{equation} Using $(\lambda - \mathcal{L}_{\mathrm{tw}} )^{-1} P = \lambda^{-1} P$ we obtain \begin{equation} \begin{array}{lcl} [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q \partial_{\xi} g & = & Q \partial_{\xi} v + [\lambda - \mathcal{L}_{\mathrm{tw}}]^{-1} B v + P \partial_{\xi} v + [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} [P , \partial_{\xi}] g \\[0.2cm] & = & \partial_{\xi} [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g + [\lambda -\mathcal{L}_{\mathrm{tw}} ]^{-1} B [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} Q g \\[0.2cm] & & \qquad + [\lambda - \mathcal{L}_{\mathrm{tw}} ]^{-1} [P , \partial_{\xi}] g , \end{array} \label{eq:ResIden} \end{equation} which can be reordered to yield \sref{eq:split:comm:resolv}. \end{proof} On account of \sref{eq:split:comm:resolv} we recall the definition \sref{eq:spl:def:p:x} and introduce the operator $T_A \in \mathcal{L}(L^2 ; L^2)$ that acts as \begin{equation} T_A = \partial_{\xi} P - P_\xi. \end{equation} In addition, we introduce the expression \begin{equation} T_B(\lambda) = B R(\L_{\mathrm{tw}},\l)Q, \end{equation} which is well-behaved in the following sense. \begin{lem} \label{eq:spl:est:on:TB} Suppose that (HDt) and (HTw) are satisfied. Then there exists a constant $C > 0$ so that for any $\lambda$ in the resolvent set of $\mathcal{L}_{\mathrm{tw}}$ the operator $T_B(\lambda)$ satisfies the bound \begin{equation} \norm{T_B(\lambda)}_{L^2 \to L^2} \le \frac{C}{1 + \abs{\lambda}}. \end{equation} In additions, the maps \begin{equation} \label{eq:spl:an:continuations:TAB} \lambda \mapsto T_B(\lambda) \in \mathcal{L}(L^2;L^2), \qquad \lambda \mapsto \lambda^{-1} P \big[T_A + T_B(\lambda) \big] \in \mathcal{L}(L^2;L^2) \end{equation} can be continued analytically into the origin $\lambda = 0$. \end{lem} \begin{proof} Since $\Phi_0$ and $\Phi_0'$ are bounded functions, we have \begin{align} \nrm{ BR(\L_{\mathrm{tw}},\l)}_{L^2\to L^2}&\leq \frac{M}{\abs{\l}}\nrm{D^2 f(\Phi_0)\Phi_0'}_{\infty}. \end{align} Using $P \mathcal{L}_{\mathrm{tw}} = 0$ and the resolvent identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) = - I + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda), \end{equation} we may compute \begin{equation} \begin{array}{lcl} P [T_A + T_B(\lambda) \big] & = & P_\xi P - P_\xi + P B R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & P_\xi P - P_\xi + P \mathcal{L}_{\mathrm{tw}} \partial_{\xi} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q - P \partial_{\xi} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & P_\xi P - P_\xi + P_\xi Q - P \partial_{\xi} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) Q \\[0.2cm] & = & - P \partial_{\xi} \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda ) Q . \end{array} \end{equation} Since $\lambda \mapsto R(\mathcal{L}_{\mathrm{tw}} , \lambda ) Q $ can be analytically continued to $\lambda = 0$ on account of \sref{eq:spl:simple:pole}, the same hence holds for the functions \sref{eq:spl:an:continuations:TAB}. \end{proof} Upon fixing $r > 0$ and $\eta \in (\frac{\pi}{2}, \eta_+ )$, we now introduce the expressions \begin{equation} \label{eq:spl:defs:lambda:a:b} \begin{array}{lcl} \Lambda_{\mathrm{ex};A}(t) & = & \frac{1}{2 \pi i} \int_{\ensuremath{\gamma}_{r,\eta}} e^{\l t} R(\L_{\mathrm{tw}},\l) T_A \, d\l , \\[0.2cm] \Lambda_{\mathrm{ex};B}(t) & = & \frac{1}{2 \pi i} \int_{\ensuremath{\gamma}_{r,\eta}} e^{\l t} R(\L_{\mathrm{tw}},\l) T_B(\lambda) \, d\l \end{array} \end{equation} and write \begin{equation} \Lambda_{\mathrm{ex}}(t) = \Lambda_{\mathrm{ex};A}(t) + \Lambda_{\mathrm{ex};B}(t). \end{equation} We note that \begin{equation} \Lambda_{\mathrm{ex};A}(t) = S(t) T_A = S(t) \partial_{\xi} P - S(t) P_\xi, \end{equation} which for $0 < t \le 1$ is covered by the bounds in Lemma \ref{lem:nls:sem:group:decay}. The results below show that $\Lambda_{\mathrm{ex}}(t)$ is well-defined as an operator in $\mathcal{L}(L^2 ; H^2)$ and that it is indeed an extension of the commutator $\Lambda(t)$. \begin{lem}\label{lem:LexWellDef} Suppose that (HDt) and (HTw) are satisfied. Then $\Lambda_{\mathrm{ex} }(t)$ is a well-defined operator in $\mathcal{L}(L^2, H^2)$ for all $t > 0$ that does not depend on $r > 0$ and $\eta \in (\frac{\pi}{2} , \eta_+)$. In addition, there exists a constant $C > 0$ so that the bound \begin{equation} \nrm{ \Lambda_{\mathrm{ex}}(t) }_{L^2 \to H^2} \le C e^{-\beta t } \end{equation} holds for all $t > 0$. \end{lem} \begin{proof} Note first that there exists a constant $C'_1 > 0$ for which \begin{equation} \norm{v}_{H^2} \le C'_1 \big[ \norm{\mathcal{L}_{\mathrm{tw}} v}_{L^2} + \norm{v}_{L^2} \big] \end{equation} holds for all $v \in H^2$. On account of the identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] = - \big[ T_A + T_B(\lambda)\big] + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda) \big] \end{equation} and the analytic continuations \sref{eq:spl:an:continuations:TAB}, we see that there exist $C_2' > 0$ so that \begin{equation} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] }_{L^2 \to L^2} + \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_A + T_B(\lambda)\big] }_{L^2 \to L^2} \le C_2' \end{equation} for all $\lambda \in \Omega_{\mathrm{tw}}$. We can now apply Lemma \ref{lem:spl:exp:est:for:bnd:itg} to obtain the desired bound for $t \ge 1$. The bounds in Lemma \ref{eq:spl:est:on:TB} imply that there exists $C_3' > 0$ for which \begin{equation} \begin{array}{lcl} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_B(\lambda)\big] }_{L^2 \to L^2} & \le & \frac{C_3'}{1 + \abs{\lambda} } \\[0.2cm] \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) \big[ T_B(\lambda)\big] }_{L^2 \to L^2} & \le & \frac{C_3'}{\abs{\lambda} } \end{array} \end{equation} holds for all $\lambda \in \Omega_{\mathrm{tw}}$. We can hence use Lemma \ref{lem:spl:est:from:k} to find a constant $C_4' > 0$ for which we have the bound \begin{equation} \norm{\Lambda_{\mathrm{ex}; B}(t) }_{L^2 \to H^2} \le C_4' \end{equation} for all $0 < t \le 1$. A direct application of Lemma \ref{lem:nls:sem:group:decay} shows that also \begin{equation} \norm{\Lambda_{\mathrm{ex}; A}(t) }_{L^2 \to H^2} \le M \end{equation} for all $0 < t \le 1$, which completes the proof. \end{proof} \begin{cor}\label{cor:LambdaExt} Suppose that (HDt) and (HTw) are satisfied. Then for any $g \in H^1$ we have \begin{equation} \Lambda_{\mathrm{ex}}(t) g = \Lambda(t) g := [ S(t) Q , \partial_{\xi} ] g . \end{equation} \end{cor} \begin{proof} The result follows by integrating both sides of the identity \sref{eq:split:comm:resolv} over the contour $\ensuremath{\gamma}_{r,\eta}$ and using \sref{eq:IntDefS} together with \sref{eq:spl:defs:lambda:a:b}. \end{proof} \subsection{Semigroup block structure} \label{sec:SemGrBlock} For the nonlinear stability proof in \S\ref{sec:nls} we need to understand how the off-diagonal terms of $S(t)$ act on a second order nonlinearity. In order to do this, we first write $S_{\mathrm{d};I}(t)$ for the semigroup generated by \begin{equation} \mathcal{L}_{\mathrm{tw;d}} = \rho\ensuremath{\partial}_{\xi\xi}v + c_0 v_{\xi}, \end{equation} which contains only diagonal terms. We also write \begin{equation} S_{\mathrm{od};I}(t) = S(t) - S_{\mathrm{d};I}(t) \end{equation} for the rest of the semigroup. Note that $S_{\mathrm{od};I}(t)$ is not strictly off-diagonal, but it has the same off-diagonal elements as $S_{\mathrm{od}}(t)$. \begin{lem}\label{lem:DecayPropG} Suppose that (HDt) and (HTw) are satisfied. Then there exists a constant $C>0$ for which the short-term bound \begin{align} \begin{split} \nrm{S_{\mathrm{od;I}}(t)}_{L^2\to H^2}&\leq C \end{split} \end{align} holds for all $0 \le t \le 1$. \end{lem} \begin{proof} Possibly decreasing the size of $\eta_+$, we may assume that $\Omega_{\mathrm{tw}}$ is contained in the resolvent set of $\mathcal{L}_{\mathrm{tw};\mathrm{d}}$. We may also assume that the bound \begin{equation} \norm{R(\mathcal{L}_{\mathrm{tw};\mathrm{d}}, \lambda)}_{L^2 \to L^2} \le \frac{M}{\abs{\lambda}} \end{equation} holds for $\lambda \in \Omega_{\mathrm{tw}}$ by increasing the size of $M > 0$ if necessary. For any $r > 0$ and $\eta \in (\frac{\pi}{2} , \eta_+)$ we have \begin{align}\begin{split} S_{\mathrm{od;I}}(t)&= \frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}[R(\L_{\mathrm{tw}},\l)-R(\L_{\mathrm{tw;d}},\l)] \, d\l \\[0.2cm] &=\frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}R(\L_{\mathrm{tw}},\l) (\L_{\mathrm{tw}}-\L_{\mathrm{tw;d}}) R(\L_{\mathrm{tw;d}},\l) \,d\l \\[0.2cm] &= \frac{1}{2\pi i}\int_{\ensuremath{\gamma}_{r, \eta}} e^{\l t}R(\L_{\mathrm{tw}},\l) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) \, d\l . \end{split} \end{align} On account of the identity \begin{equation} \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) = - Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) + \lambda R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) \end{equation} we have the bounds \begin{equation} \begin{array}{lcl} \norm{ \mathcal{L}_{\mathrm{tw}} R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) }_{L^2 \to L^2} & \le & \norm{Df(\Phi_0)}_\infty \frac{M(M+1)}{\abs{\lambda}}, \\[0.2cm] \norm{ R(\mathcal{L}_{\mathrm{tw}} , \lambda) Df(\Phi_0) R(\L_{\mathrm{tw;d}},\l) }_{L^2 \to L^2} & \le & \norm{Df(\Phi_0)}_\infty \frac{M^2}{\abs{\lambda}^2 }. \end{array} \end{equation} The desired estimate hence follows from Lemma \ref{lem:spl:est:from:k}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:MainPropSplit}] The statements concerning $\Lambda(t)$ follow directly from Lemma \ref{lem:LexWellDef} and Corollary \ref{cor:LambdaExt}. The bound for $S_{\mathrm{od}}(t)$ follows from Lemma \ref{lem:DecayPropG} since $S_{\mathrm{od;I}}(t)$ contains all the non-trivial elements of $S_{\mathrm{od}}(t)$. \end{proof} \section{Stochastic transformations} \label{sec:STT} In this section we set out to derive a mild formulation for the SPDE satisfied by the process \begin{equation} \label{eq:sps:def:V} V(t) = T_{-\Gamma(t)} [ U(t)] - \Phi_\ensuremath{\sigma} , \end{equation} which measures the deviation from the traveling wave $\Phi_\ensuremath{\sigma}$ in the coordinate $\xi=x-\ensuremath{\Gamma}(t)$. After recalling several results from \cite{Hamster2017} concerning the stochastic phaseshift, we focus on the new extra second-order nonlinearity that appears in our setting. We use the results from \S\ref{sec:SplitSem} to rewrite this term in such a way that an effective mild integral equation can be formulated that does not involve second derivatives. We obtain estimates on all the nonlinear terms in \S\ref{sec:BoundsNl} and rigorously verify that $V$ indeed satisfies this mild equation in \S\ref{sec:MildForm}. We start by introducing the nonlinearity \begin{equation}\label{eq:stt:DefR} \begin{array}{lcl} \mathcal{R}_\ensuremath{\sigma} (v) & = & \kappa_{\sigma}(\Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}} ) \rho \partial_{\xi\xi} [\Phi_\ensuremath{\sigma} + v] \\[0.2cm] & & \qquad + f(\Phi_\ensuremath{\sigma} + v) + \sigma^2 b(\Phi_\ensuremath{\sigma} + v, \psi_{\mathrm{tw}} ) \partial_\xi[ g(\Phi_\ensuremath{\sigma} + v) ] \\[0.2cm] & & \qquad + \Big[c_\ensuremath{\sigma} + a_{\sigma}\big(\Phi_\ensuremath{\sigma} + v , c_\ensuremath{\sigma} , \psi_{\mathrm{tw}} \big) \Big] [\Phi_\ensuremath{\sigma}' + v'] , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{S}_{\ensuremath{\sigma}}(v) & = & g( \Phi_\ensuremath{\sigma} + v ) + b( \Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}}) [\Phi_\ensuremath{\sigma}' + v']. \\[0.2cm] \end{array} \end{equation} In \cite[{\S}5]{Hamster2017} we established that the shifted process $V$ can be interpreted as a weak solution to the SPDE \begin{equation} \label{eq:WeakV} \begin{array}{lcl} d V & = & \mathcal{R}_\ensuremath{\sigma}(V) \, dt + \sigma \mathcal{S}_\ensuremath{\sigma}(V) d\b_t . \end{array} \end{equation} However, in our case here $\kappa_{\sigma}$ is a matrix rather than a scalar. This means that we cannot transform \sref{eq:WeakV} into a semilinear problem by a simple time transformation. But, we can improve individual components of the system by rescaling time with the diagonal elements $\k_{\ensuremath{\sigma};i}$. To this end, we follow \cite[Lem. 3.6]{Hamster2017} to find a constant $K_{\kappa} > 0$ for which \begin{equation} \label{eq:prlm:kappa:glb:ests} 1 \leq \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v, \psi_\mathrm{tw}) \le K_{\kappa} \end{equation} holds for every $\sigma \in (-\delta_{\sigma}, \delta_{\sigma})$, every $v \in H^1$ and every $1 \le i \le n$. Upon introducing the transformed time \begin{equation} \tau_{i}(t, \omega) = \int_0^t \kappa_{\sigma;i}\big( \Phi_\ensuremath{\sigma} + V(s, \omega) , \psi_{\mathrm{tw}} \big) \, d s , \end{equation} the bound \sref{eq:prlm:kappa:glb:ests} allows us to conclude that $t \mapsto \tau_i(t)$ is a continuous strictly increasing $(\mathcal{F}_t)$-adapted process that satisfies \begin{equation} \label{eq:mild:ineqs:tau:phi} t \le \tau_i(t) \le K_{\kappa} t \end{equation} for $0 \le t \le T$. In particular, we can define a map \begin{equation} \label{eq:mild:defn:t:phi:spaces} t_i: [0, T] \times \Omega \to [0, T] \end{equation} for which \begin{equation} \label{eq:mild:defn:t:phi} \tau_i(t_i(\tau, \omega), \omega) = \tau. \end{equation} This in turn allows us to introduce the time-transformed map \begin{equation} \ensuremath{\overline{V}}_i: [0,T] \times \Omega \to L^2 \end{equation} that acts as \begin{equation} \label{eq:mld:def:ovl:v} \begin{array}{lcl} \overline{V_i}(\tau, \omega) & = & V\big( t_i(\tau, \omega) , \omega \big) . \\[0.2cm] \end{array} \end{equation} Upon introducing \begin{equation} \label{eq:md:overline:r:sigma} \begin{array}{lcl} \overline{\mathcal{R}}_{\ensuremath{\sigma};i} (v) & = & \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v , \psi_{\mathrm{tw}})^{-1} \mathcal{R}_{\ensuremath{\sigma}}(v) - \mathcal{L}_{\mathrm{tw}} v \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \label{eq:md:overline:s:sigma} \begin{array}{lcl} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) & = & \kappa_{\sigma;i}(\Phi_\ensuremath{\sigma} + v,\psi_{\mathrm{tw}})^{-1/2} \mathcal{S}_{\ensuremath{\sigma}}(v), \\[0.2cm] \end{array} \end{equation} it is possible to follow \cite[Prop. 6.3]{Hamster2017} to show that $\overline{V}_i$ is a weak solution of \begin{equation} \label{eq:mild:weak:formul} d \overline{V}_i = \big[\mathcal{L}_{\mathrm{tw}} \overline{V}_i + \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(\overline{V}_i) \big] \, d \tau + \sigma \overline{\mathcal{S}}_{\ensuremath{\sigma};i}( \overline{V}_i) d\overline{\b}_{\tau;i} \end{equation} for every $1 \le i \le n$, in which $(\overline{\b}_{\tau;i})_{\tau \ge 0}$ denotes the time-transformed Brownian motion that is now adapted to an appropriately transformed filtration $(\overline{\mathcal{F}}_{\tau;i})_{\tau \ge 0}$; see \cite[Lem. 6.2]{Hamster2017}. The nonlinearity $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$ is less well-behaved than its counterpart from \cite[Prop. 6.3]{Hamster2017} since it still contains second order derivatives. In order to isolate these terms, we pick any $v \in H^1$ and introduce the diagonal matrix \begin{equation}\label{eq:DefPhi} \phi_{\sigma;i}(v) = \big[\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+v,\psi_{\mathrm{tw}}) \big]^{-1} \k_{\sigma}(\Phi_\ensuremath{\sigma} + v, \psi_{\mathrm{tw}} ) - I \end{equation} together with the function \begin{align} \Upsilon_{\ensuremath{\sigma};i}(v)&=\rho\phi_i(v)\ensuremath{\partial}_{\xi} v . \label{eq:DefUpsilon} \end{align} We note that $\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}$ can be considered as the error caused by allowing unequal diffusion coefficients in our main structural assumption (HDt). Indeed, upon defining our final nonlinearity implicitly by imposing the splitting \begin{equation} \label{eq:transf:def:w} \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(v)= \mathcal{W}_{\ensuremath{\sigma};i}(v)+\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}(v), \end{equation} our first main result states that $\mathcal{W}_{\ensuremath{\sigma};i}$ is well-behaved in the sense that it admits bounds that are similar to those derived for the full nonlinearity $\overline{\mathcal{R}}$ in \cite{Hamster2017}. Indeed, it depends at most quadratically on $\norm{v}_{H^1}$ but not on $\nrm{v}_{H^2}$. Note furthermore that $\Phi_{\sigma}$ was constructed in such a way that $\overline{\mathcal{R}}(0) = 0$. \begin{prop} \label{prp:fnl:bnds} Assume that (HDt), (HSt) and (HTw) all hold and fix $1 \le i \le n$. Then there exist constants $K > 0$ and $\delta_v > 0$ so that for any $0 \le \sigma \le \delta_{\sigma}$ and any $v \in H^1$, the following properties hold true. \begin{itemize} \item[(i)]{ We have the bound \begin{equation} \label{eq:fnl:rs:glb} \begin{array}{lcl} \norm{ \mathcal{W}_{\ensuremath{\sigma};i}(v) }_{L^2} & \le & K \sigma^2 \norm{v}_{H^1} + K \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] , \end{array} \end{equation} together with \begin{equation} \label{eq:mld:bnd:upsilon} \norm{\Upsilon_{\ensuremath{\sigma};i}(v)}_{L^2} \leq K \ensuremath{\sigma}^2 \nrm{v}_{H^1}. \end{equation} } \item[(ii)]{ We have the estimate \begin{equation} \norm{ \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) }_{L^2} \le K\big[ 1 + \norm{v}_{H^1} \big]. \end{equation} } \item[(iii)]{ If $\norm{v}_{L^2} \le \delta_v$, then we have the identities \begin{equation}\label{eq:MildNonProjZero} \langle \overline{\mathcal{R}}_{\ensuremath{\sigma};i}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} = \langle \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} = 0. \end{equation} } \end{itemize} \end{prop} The second main result of this section formulates a mild representation for solutions to \sref{eq:mild:weak:formul}. Items (i)-(iv) are included for completeness and are analogous to the results in \cite[Prop. 6.3]{Hamster2017}. However, item (v) is specific to our situation because of the presence of the error term $\Upsilon_{\ensuremath{\sigma};i}$. Indeed, we shall need to exploit the techniques developed in {\S}\ref{sec:SplitSem} to transfer the troublesome $\partial_{\xi}$ present in \sref{eq:transf:def:w} from the $\Upsilon_{\ensuremath{\sigma};i}$ term to the semigroup. Nevertheless, the integral involving $\partial_{\xi} S$ is integrable in $H^{-1}$ but not necessarily in $L^2$. \begin{prop} \label{prp:MildTransSys} Assume that (HDt), (HSt), (HTw) are all satisfied. Then the map \begin{equation} \overline{V}_i: [0, T] \times \Omega \to L^2 \end{equation} defined by the transformations \sref{eq:sps:def:V} and \sref{eq:mld:def:ovl:v} satisfies the following properties. \begin{itemize} \item[(i)]{ For almost all $\omega \in \Omega$, the map $\tau \mapsto \overline{V_i}(\tau; \omega)$ is of class $C\big([0,T]; L^2 \big)$. } \item[(ii)]{ For all $\tau \in [0, T]$, the map $\omega \mapsto \overline{V_i}(\tau,\omega)$ is $(\overline{\mathcal{F}}_{\tau;i})$-measurable. } \item[(iii)]{ We have the inclusion \begin{equation} \begin{array}{lcl} \overline{V_i} \in \mathcal{N}^2\big([0,T]; (\overline{\mathcal{F}})_{\tau;i} ; H^1 \big) , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(\overline{V_i}) \in \mathcal{N}^2\big([0,T]; (\overline{\mathcal{F}})_{\tau;i} ; L^2 \big) . \end{array} \end{equation} } \item[(iv)]{For almost all $\omega \in \Omega$, we have the inclusion \begin{align}\label{eq:WIntoL2} \mathcal{W}_{\ensuremath{\sigma};i}\big( \ensuremath{\overline{V}}_i(\cdot, \omega) \big) &\in L^1([0,T]; L^2) \end{align} together with \begin{align} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\cdot, \omega)\big)&\in L^1([0,T]; L^2) . \end{align}} \item[(v)]{ For almost all $\omega \in \Omega$, the identity \begin{align}\begin{split}\label{eq:MildEqTimeTrans} \overline{V_i}(\tau)=&S(\tau)\overline{V_i}(0) +\int_0^\tau S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}\big(\overline{V}_i(\tau')\big) \,d\tau' +\sigma \int_0^{\tau} S(\tau-\tau')\overline{\mathcal{S}}_{\ensuremath{\sigma};i} \big(\overline{V}_i(\tau') \big)d\overline{\b}_{\tau';i}\\[0.2cm] &+\int_0^{\tau} \ensuremath{\partial}_{\xi} S(\tau-\tau') Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big) \, d\tau' +\int_0^{\tau} \Lambda(\tau-\tau')\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \, d\tau' \\[0.2cm] & +\int_0^{\tau} S(\tau-\tau') P_\xi \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big) \, d\tau' \end{split} \end{align} holds for all $ \tau \in [0, T]$. } \end{itemize} \end{prop} \subsection{Bounds on nonlinearities} \label{sec:BoundsNl} In this section we set out to prove Proposition \ref{prp:fnl:bnds}. In order to be able to write the nonlinearities in a compact fashion, we introduce the expression \begin{equation} \label{eq:mr:def:j} \begin{array}{lcl} \mathcal{J}_{\sigma}(u ) & = & \kappa_{\sigma}(u , \psi_{\mathrm{tw}})^{-1} \Big[ f(u ) +c_{\sigma} \partial_\xi u + \sigma^2 b( u, \psi_{\mathrm{tw}}) \partial_\xi [g(u )] \Big] \\[0.2cm] \end{array} \end{equation} for any $u \in \mathcal{U}_{H^1}$. This allows us to define \begin{equation} \mathcal{Q}_{\ensuremath{\sigma}} (v) = \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) - \mathcal{J}_{\sigma}( \Phi_{\sigma} ) + [ \rho \partial_{\xi \xi } - \mathcal{L}_{\mathrm{tw}} ]v \end{equation} for any $v \in H^1$, which is the residual upon linearizing $\mathcal{J}_{\sigma}(\Phi_\ensuremath{\sigma}+V)$ around $\Phi_{\sigma}$, up to $O(\sigma^2)$ corrections. Indeed, we can borrow the following bound from \cite{Hamster2017}. \begin{cor} \label{cor:swv:msigma:bnds} Consider the setting of Proposition \ref{prp:fnl:bnds}. There exists $K > 0$ so that for any $0 \le \sigma \le \delta_{\sigma}$ and any $v\in H^1 $ we have the estimate \begin{equation} \begin{array}{lcl} \norm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2} & \le & K\big[\sigma^2+\nrm{v}_{L^2}\big] \norm{v}_{H^1} \\[0.2cm] & & \qquad + K\big[1 +(1+\ensuremath{\sigma}^2)\norm{v}_{L^2}+ \ensuremath{\sigma}^2\norm{v}_{L^2}^2\big]\norm{v}_{H^1}^2 , \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \abs{ \langle \mathcal{Q}_{\ensuremath{\sigma}}(v) , \psi_{\mathrm{tw}} \rangle_{L^2} } & \le & K \big[ 1 + \norm{v}_{H^1} \big] \norm{v}_{L^2} \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \big[ \sigma^2 + \norm{v}_{L^2} \big] \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \sigma^2 \norm{v}_{H^1} \norm{v}_{L^2}^2 \norm{v}_{L^2} \\[0.2cm] & & \qquad + K \sigma^2 \norm{v}_{L^2}^2 \norm{v}_{H^1}. \\[0.2cm] \end{array} \end{equation} \end{cor} \begin{proof} Recalling the function $\mathcal{M}$ that was defined in \cite[Eq. (7.2)]{Hamster2017}, we observe that \begin{equation} \mathcal{Q}_{\ensuremath{\sigma}}(v) = \mathcal{M}_{\ensuremath{\sigma};\Phi_{\ensuremath{\sigma}},c_{\sigma}} (v, 0) - \mathcal{M}_{\sigma;\Phi_{\sigma} , c_{\sigma}}(0, 0). \end{equation} In particular, the desired bounds follow directly from \cite[Cor. 7.5]{Hamster2017}. \end{proof} We now introduce the function \begin{align} \mathcal{W}_{\sigma;I,i}(v) =&\mathcal{Q}_{\ensuremath{\sigma}}(v) +\phi_{\sigma;i}(v)\Big[ \mathcal{J}_{\sigma}(\Phi_{\sigma} + v) - \mathcal{J}_{\sigma}(\Phi_{\sigma}) \Big] \label{eq:Rline:Def} \end{align} together with the notation \begin{equation} \begin{array}{lcl} \mathcal{I}_{\sigma;I,i}(v) & = & \Big[\chi_{\mathrm{low}}\big(\langle\partial_\xi[\Phi_{\sigma} + v ] , \psi_{\mathrm{tw}} \rangle_{L^2} \big)\Big]^{-1} \langle \mathcal{W}_{\sigma;I,i}(v), \psi_{\mathrm{tw}} \rangle_{L^2} \\[0.2cm] & & \qquad - \Big[\chi_{\mathrm{low}}\big(\langle\partial_\xi[\Phi_{\sigma} + v ] , \psi_{\mathrm{tw}} \rangle_{L^2} \big)\Big]^{-1} \langle \Upsilon_{\sigma;i}(v), \partial_\xi \psi_{\mathrm{tw}} \rangle_{L^2} . \end{array} \end{equation} The following result shows that these two expressions allow us to split off the $a_\ensuremath{\sigma}$-contribution to $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$ that is visible in \sref{eq:stt:DefR}. \begin{lem} Consider the setting of Proposition \ref{prp:fnl:bnds}. Then for any $0 \le \sigma \le \delta_{\sigma}$ and $v \in H^1$, we have the inclusion $\mathcal{W}_{\ensuremath{\sigma};i}(v)\in L^2$ together with the identity \begin{equation} \begin{array}{lcl} \label{eq:fnl:id:for:r:sigma} \mathcal{W}_{\ensuremath{\sigma};i}(v) = \mathcal{W}_{\sigma;I,i}(v) - \mathcal{I}_{\sigma;I,i}(v) [\Phi_{\sigma}' + v'] . \\[0.2cm] \end{array} \end{equation} \end{lem} \begin{proof} For any $u \in \mathcal{U}_{H^2}$, the definition \sref{eq:mr:def:a} implies that \begin{equation} a_{\sigma}(u , c_{\sigma} , \psi_{\mathrm{tw}}) = - \Big[ \chi_{\mathrm{low}}\big( \langle \partial_\xi u, \psi_{\mathrm{tw}} \rangle_{L^2} \big) \Big]^{-1} \langle \kappa_{\sigma}(u, \psi_{\mathrm{tw}}) \big[ \rho \partial_{\xi \xi} u + \mathcal{J}_{\sigma}(u) \big] , \psi_{\mathrm{tw}} \rangle_{L^2}. \end{equation} The implicit definition $a_{\sigma}(\Phi_{\sigma}, c_{\sigma}, \psi_{\mathrm{tw}}) = 0$ hence yields \begin{equation} \mathcal{J}_{\sigma}(\Phi_{\ensuremath{\sigma}} ) = - \rho \Phi_{\ensuremath{\sigma}}''. \end{equation} For any $v \in H^2$, this allows us to compute \begin{equation} \begin{array}{lcl} \mathcal{Q}_{\ensuremath{\sigma}} (v) & = & \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) + \rho [ \Phi_{\sigma}'' + v''] - \mathcal{L}_{\mathrm{tw}} v , \end{array} \end{equation} which gives \begin{equation} \begin{array}{lcl} \mathcal{W}_{\sigma;I,i}(v) + \partial_{\xi} \Upsilon_{\sigma;i}(v) & = & [\kappa_{\sigma;i}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) ]^{-1} \kappa_{\sigma}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) \big[ \rho [\Phi_{\sigma}'' + v''] + \mathcal{J}_{\sigma} (\Phi_{\sigma} + v ) \big] \\[0.2cm] & & \qquad - \mathcal{L}_{\mathrm{tw}} v . \end{array} \end{equation} Using the fact that $\mathcal{L}^*_{\mathrm{tw}} \psi_{\mathrm{tw}} = 0$, we now readily verify that for $v \in H^2$ we have \begin{equation} \mathcal{I}_{\sigma;I,i}(v) = [\kappa_{\sigma;i}( \Phi_{\sigma} + v , \psi_{\mathrm{tw}} )]^{-1} a_{\sigma}(\Phi_{\sigma} + v , \psi_{\mathrm{tw}}) . \end{equation} The result hence follows by rewriting the definition \sref{eq:stt:DefR} in the form \begin{equation} \begin{array}{lcl} \mathcal{R}_{\sigma}(v) & = & \kappa_{\sigma}( \Phi_{\sigma} + v , \psi_{\mathrm{tw}} ) \Big[ \rho \partial_{\xi \xi} [ \Phi_{\sigma} + v] + \mathcal{J}_{\sigma}( \Phi_{\sigma} + v ) \Big] \\[0.2cm] & & \qquad + a_{\sigma}(\Phi_{\sigma} + v , c_{\sigma}, \psi_{\mathrm{tw}}) [ \Phi_{\sigma}' + v'] \end{array} \end{equation} and substituting this into the definition \sref{eq:md:overline:r:sigma} of $\overline{\mathcal{R}}_{\ensuremath{\sigma};i}$. \end{proof} In order to obtain the estimates in Proposition \ref{prp:fnl:bnds} it hence suffices to obtain bounds for $\phi_i$, $\mathcal{W}_{\ensuremath{\sigma};I,i}$ and $\mathcal{I}_{\ensuremath{\sigma};I,i}$. This can be done in a direct fashion. \begin{lem} \label{lem:phi:bound} Assume that (HDt) and (HSt) are satisfied. Then there exists a constant $K_{\phi} > 0$ so that \begin{align} |\phi_i(v)|\leq \ensuremath{\sigma}^2K_\phi \end{align} holds for any $v \in L^2$ and $0 \le \ensuremath{\sigma} \le \delta_{\ensuremath{\sigma}}$. \end{lem} \begin{proof} For any $x,y\geq 0$ we have the inequality \begin{align} \left|\frac{1+\frac{1}{2\rho_j}x}{1+\frac{1}{2\rho_i}x} -\frac{1+\frac{1}{2\rho_i}y}{1+\frac{1}{2\rho_i}y}\right|=\frac{1}{4\rho_i\rho_j}\frac{|x-y|}{(1+\frac{1}{2\rho_i}x)(1+\frac{1}{2\rho_i}y)} \leq \frac{1}{4\rho_i\rho_j}|x-y| . \end{align} Applying these bounds with $y=0$, we obtain \begin{align} |\phi^j_i(v)|\leq \frac{\ensuremath{\sigma}^2}{4\rho_i\rho_j}|b(\Phi_\ensuremath{\sigma}+v)|^2\leq \frac{\ensuremath{\sigma}^2}{4\rho_{\mathrm{min}}^2}K_b^2, \end{align} where the last bound on $b$ follows from Lemma 3.6 in \cite{Hamster2017}. The result now readily follows. \end{proof} \begin{lem} \label{lem:fnl:rsi} Consider the setting of Proposition \ref{prp:fnl:bnds}. Then there exists $K > 0$ so that for any $v \in H^1$ and $0 \le \sigma \le \delta_{\sigma}$ we have the bound \begin{equation} \label{eq:fnl:rsi:glb} \begin{array}{lcl} \norm{\mathcal{W}_{\ensuremath{\sigma};I,i}(v)}_{L^2} & \le & K \sigma^2 \norm{v}_{H^1} + K \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2} + \sigma^2 \norm{v}_{L^2}^2 \big] , \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \label{eq:fnl:rsi:glb:ip} \begin{array}{lcl} \abs{ \mathcal{I}_{\sigma;I,i}(v) } & \le & K \norm{v}_{L^2} \big[ \sigma^2 + \norm{v}_{L^2} \big] + K \norm{v}_{H^1} \big[ \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] . \end{array} \end{equation} \end{lem} \begin{proof} Note first that we can write $\mathcal{W}_{\sigma;I,i}(v)$ as \begin{align} \mathcal{W}_{\sigma;I,i}(v) =&\mathcal{Q}_{\ensuremath{\sigma}}(v) +\phi_{\sigma;i}(v)\Big[ \mathcal{Q}_{\ensuremath{\sigma}}(v)+(\mathcal{L}_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi}) v \Big] \end{align} and hence \begin{align} \nrm{\mathcal{W}_{\sigma;I,i}(v)}_{L^2} \leq &\nrm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2} +|\phi_{\sigma;i}(v)|\Big[ \nrm{\mathcal{Q}_{\ensuremath{\sigma}}(v)}_{L^2}+\nrm{(\mathcal{L}_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi})v}_{L^2} \Big] . \end{align} The definition of $\mathcal{L}_{\mathrm{tw}}$ implies that there exists $C_1 > 0$ for which \begin{equation} \norm{[\L_{\mathrm{tw}}-\rho\ensuremath{\partial}_{\xi\xi}]v}_{L^2}\leq C_1\nrm{v}_{H^1} \end{equation} holds. The desired bound hence follows from Corollary \ref{cor:swv:msigma:bnds} and Lemma \ref{lem:phi:bound}. Turning to the second estimate, we note that there is a positive constant $C_2$ for which we have \begin{align} \abs{ \mathcal{I}_{\sigma;I,i} (v) } \leq C_2\big[ \norm{\mathcal{W}_{\ensuremath{\sigma};I,i}(v)}_{L^2}+\norm{\Upsilon_{\ensuremath{\sigma};i}(v)}_{L^2}\big] . \end{align} We can hence again apply Corollary \ref{cor:swv:msigma:bnds} and Lemma \ref{lem:phi:bound}, which yields expressions that can all be absorbed into \sref{eq:fnl:rsi:glb:ip}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:fnl:bnds}] To obtain \sref{eq:fnl:rs:glb}, we use \sref{eq:fnl:id:for:r:sigma} together with Lemma \ref{lem:fnl:rsi} to compute \begin{equation} \begin{array}{lcl} \norm{\mathcal{W}_{\ensuremath{\sigma};i}(v)}_{L^2} & \le & \norm{\mathcal{W}_{\ensuremath{\sigma};i}}_{L^2} + C_1 \abs{\mathcal{I}_{\ensuremath{\sigma};I,i}(v)} \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] & \le & C_2 \sigma^2 \norm{v}_{H^1} + C_2 \norm{v}_{H^1}^2 \big[ 1 + \norm{v}_{L^2} + \sigma^2 \norm{v}_{L^2}^2 \big] \\[0.2cm] & & \qquad +C_2 \norm{v}_{L^2} \big[ \sigma^2 + \norm{v}_{L^2} \big] \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] & & \qquad + C_2 \norm{v}_{H^1} \big[ \norm{v}_{L^2}^2 + \sigma^2 \norm{v}_{L^2}^3 \big] \big[ 1 + \norm{v}_{H^1} \big] \\[0.2cm] \end{array} \end{equation} for some constants $C_1 > 0$ and $C_2 > 0$. These terms can all be absorbed into \sref{eq:fnl:rs:glb}. The bound \sref{eq:mld:bnd:upsilon} follows from Lemma \ref{lem:phi:bound} and (HDt), while (ii) and (iii) follow directly from \cite[Prop 8.1]{Hamster2017}. \end{proof} \subsection{Mild formulation} \label{sec:MildForm} In this section we establish Proposition \ref{prp:MildTransSys}. We note that items (i)-(iv) follow directly from Propositions 5.1 and 6.3 in \cite{Hamster2017}, so we focus here on the integral identity \sref{eq:MildEqTimeTrans}. We first obtain this identity in a weak sense, bypassing the need to interpret the term involving $\Upsilon_{\sigma;i}$ in a special fashion. We note that $S^*(t)$ is the adjoint operator of $S(t)$, which coincides with the semigroup generated by $\L_{\mathrm{tw}}^*$. \begin{lem}\label{lem:MildForm1} Consider the setting of Proposition \ref{prp:MildTransSys} and pick any $\eta \in H^3$. Then for almost all $\omega \in \Omega$ the identity \begin{align}\begin{split} \ip{\ensuremath{\overline{V}}_i(\tau),\eta}_{L^2}=& \ip{S(\tau)\ensuremath{\overline{V}}_i(0) +\int_0^{\tau} S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big)\, d\tau' + \sigma \int_0^{\tau} S(\tau-\tau')\overline{\mathcal{S}}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big)d\overline{\b}_{\tau';i},\eta}_{L^2} \\[0.2cm] &+\int_0^{\tau} \ip{ \ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau')\big), S^*(\tau-\tau' )\eta}_{H^{-1} ; H^1} \, d \tau' \end{split} \end{align} holds for any $\tau \in [0, T]$. \end{lem} \begin{proof} Pick any $\tau \in [0, T]$. Since $\overline{V_i}\in \mathcal{N}^2([0,T];(\overline{\mathcal{F}}_t);H^1)$ is a weak solution to \sref{eq:mild:weak:formul}, the identity \begin{equation} \begin{array}{lcl} \ensuremath{\overline{V}}_i(\tau) &=& \ensuremath{\overline{V}}_i(0) +\int_0^{\tau} \big[ \mathcal{L}_{\mathrm{tw}} \overline{V}_i(\tau') + \overline{\mathcal{R}}_{\sigma;i}\big( \overline{V}_i(\tau') \big) \big] \, d \tau' \\[0.2cm] & & \qquad + \sigma \int_0^\tau \overline{S}_{\sigma;i} \big( \ensuremath{\overline{V}}_i(\tau') \big) \, d\overline{\b}_{\tau';i} \end{array} \end{equation} holds in $H^{-1}$; see \cite[Prop. 6.3]{Hamster2017}. We note that these integrals are well defined by items (i)-(iv) of Proposition \ref{prp:MildTransSys}. Following the proof of \cite[Prop 2.10]{KatjaClaudia}, we pick $\eta \in H^3$ and define the function \begin{align} \zeta(\tau')=S^*(\tau-\tau' \eta \end{align} on the interval $[0,\tau]$. Noting that $\zeta\in C^1([0,\tau], H^1 )$, we may define the functional $\phi: [0, \tau] \times H^{-1} \to \Real$ that acts as \begin{equation} \phi(\tau' , v) = \langle v , \zeta(\tau') \rangle_{H^{-1} ; H^1}, \end{equation} which is $C^1$-smooth in the first variable and linear in the second variable. Applying a standard It\^o formula such as \cite[Thm. 1]{DaPratomild} (with $S = I$) yields \begin{equation} \begin{array}{lcl} \phi\big(\tau, \overline{V}_i(\tau) \big) & = & \phi\big(0, \overline{V}_i(0) \big) \\[0.2cm] & & \qquad + \int_0^{\tau} \langle \overline{V}_i(\tau'), \zeta'(\tau') \rangle_{H^{-1}; H^1} \, d \tau' + \int_0^\tau \langle \mathcal{L}_{\mathrm{tw}} \overline{V}_i(\tau') , \zeta(\tau') \rangle_{H^{-1} ; H^1}\,d \tau' \\[0.2cm] & & \qquad + \int_0^\tau \langle \overline{\mathcal{R}}_{\sigma;i} \big( \overline{V}_i(\tau')\big) , \zeta(\tau') \rangle_{H^{-1} ; H^1} \, d \tau' \\[0.2cm] & & \qquad + \sigma \int_0^\tau \langle \overline{\mathcal{S}}_{\sigma;i} \big( \overline{V}_i(\tau')\big) , \zeta(\tau') \rangle_{L^2} \, d \overline{\beta}_{\tau';i} . \end{array} \end{equation} Since $\zeta'(t) = - \mathcal{L}^*_{\mathrm{tw}} \zeta(t)$, the second line in the expression above disappears. Using the identities \begin{equation} \begin{array}{lcl} \phi\big(\tau, \overline{V}_i(\tau) \big) & = & \langle \ensuremath{\overline{V}}_i(\tau), \eta \rangle_{L^2} , \\[0.2cm] \phi\big(0, \overline{V}_i(0) \big) & = & \langle \overline{V}_i(0) , S^*(\tau) \eta \rangle_{L^2} \\[0.2cm] & = & \langle S(\tau) \overline{V}_i(0) , \eta \rangle_{L^2} \end{array} \end{equation} we hence obtain \begin{equation} \begin{array}{lcl} \langle \ensuremath{\overline{V}}_i(\tau), \eta \rangle_{L^2} & = & \ip{S(\tau)\ensuremath{\overline{V}}_i(0), \eta}_{L^2} \\[0.2cm] & & \qquad +\int_0^{\tau} \ip{ S(\tau-\tau')\mathcal{W}_{\ensuremath{\sigma};i}(\ensuremath{\overline{V}}_i(\tau') \big) \, d \tau', \eta }_{L^2} \, d \tau' \\[0.2cm] & & \qquad +\int_0^{\tau} \ip{\ensuremath{\partial}_{\xi} \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big), S^*(t-s) \eta}_{H^{-1}; H^1} \, d\tau' \\[0.2cm] & & \qquad +\sigma \int_0^{\tau} \ip{ S(\tau- \tau')\overline{S}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) , \eta}_{L^2} \, d \overline{\b}_{\tau';i} , \end{array} \end{equation} as desired. \end{proof} \begin{lem} \label{lem:mld:approxInH1} Pick $v \in L^2$ together with $\eta \in H^1$ and $t > 0$. Then we have the identity \begin{equation} \label{eq:mld:transfer:derivative} \langle \partial_{\xi} v , S^*(t) \eta \rangle_{H^{-1} ; H^1} = \langle \partial_{\xi} S(t) Q v + \Lambda(t) v + S(t) P_\xi v , \eta \rangle_{L^2} . \end{equation} \end{lem} \begin{proof} For $v \in H^1$, this identity follows directly from \sref{eq:spl:eqn:with:comm}. For fixed $\eta$ and $ t> 0$, both sides of \sref{eq:mld:transfer:derivative} can be interpreted as bounded linear functions on $L^2$ by Proposition \ref{prp:MainPropSplit}. In particular, the result can be obtained by approximating $v \in L^2$ by $H^1$-functions. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:MildTransSys}] As mentioned above, items (i)-(iv) follow directly from Propositions 5.1 and 6.3 in \cite{Hamster2017}. Item (v) follows from Lemmas \ref{lem:MildForm1} and \ref{lem:mld:approxInH1}, using the density of $H^3$ in $H^1$ and the fact that $H^{-1}$ is separable. \end{proof} \section{Nonlinear stability of mild solutions} \label{sec:nls} In this section we prove Theorem \ref{thm:mr:orbital:stb}, which provides an orbital stability result for the stochastic wave $(\Phi_{\sigma}, c_{\sigma})$. In particular, for any $\ensuremath{\varepsilon} > 0$, $T > 0$ and $\eta > 0$ we recall the notation \begin{equation} \begin{array}{lcl} N_{\ensuremath{\varepsilon}}(t)= \nrm{V(t)}_{L^2}^2 +\int_0^te^{-\ensuremath{\varepsilon}(t-s)}\nrm{V(s)}^2_{H^1}ds \end{array} \end{equation} and introduce the $(\mathcal{F}_t)$-stopping time \begin{equation} t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) = \inf\Big\{0 \leq t < T: N_{\ensuremath{\varepsilon}}(t) > \eta \Big\} , \end{equation} writing $t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) = T$ if the set is empty. We derive a number of technical regularity estimates in \S\ref{sec:nls:reg:ests} that allows us to exploit the integral identity \sref{eq:MildEqTimeTrans} to bound the expectation of $\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)$ in terms of itself, the noise-strength $\sigma$ and the size of the initial condition $V(0)$. This leads to the following bound for this expectation. \begin{prop} \label{prp:nls:general} Assume that (HDt), (HSt) and (HTw) are satisfied. Pick a constant $0 < \ensuremath{\varepsilon} < \beta$, together with two sufficiently small constants $\delta_{\eta} > 0$ and $\delta_{\sigma} > 0$. Then there exists a constant $K > 0$ so that for any $T > 0$, any $0 < \eta \le \delta_{\eta}$ and any $0 \le \sigma \le \delta_{\sigma}T^{-1/2}$ we have the bound \begin{equation} \label{eq:nls:prp:general:estimate} \begin{array}{lcl} E[\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)] &\leq & K \Big[ \nrm{V(0)}^2_{H^1}+ \sigma^2 T \Big] . \end{array} \end{equation} \end{prop} Exploiting the technique used in Stannat \cite{Stannat}, this bound can be turned into an estimate concerning the probability \begin{equation} p_{\ensuremath{\varepsilon}}(T,\eta) = P\Big( \sup_{0 \leq t \leq T} \big[N_{\ensuremath{\varepsilon}}(t)\big] > \eta \Big). \end{equation} This allows our main stability result to be established in a straightforward fashion. \begin{proof}[Proof of Theorem \ref{thm:mr:orbital:stb}] Upon computing \begin{equation} \begin{array}{lcl} \eta p_{\ensuremath{\varepsilon}}(T,\eta) & = & \eta P\big( t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) < T\big) \\[0.2cm] & = & E \Big[ \mathbf{1}_{t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) < T} N_{\ensuremath{\varepsilon}}\big(t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta)\big) \Big] \\[0.2cm] & \le & E [N_{\ensuremath{\varepsilon}}\big(t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) \big)]\\[0.2cm] & \leq & E [\sup_{0\leq t\leq t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta) }N_{\ensuremath{\varepsilon}}(t)], \end{array} \end{equation} the result follows from Proposition \ref{eq:nls:prp:general:estimate}. \end{proof} \subsection{Setup} \label{sec:nls:reg:ests} In this subsection we establish Proposition \ref{prp:nls:general} by estimating each of the terms featuring in \sref{eq:MildEqTimeTrans}. In contrast to the situation in \cite{Hamster2017} we cannot estimate $N_\ensuremath{\varepsilon}(t)$ directly because the integral involving $\partial_{\xi} S(t-s)$ applied to $\Upsilon_{\sigma;i}\big(\overline{V}_i(s) \big)$ presents short-time regularity issues. Instead, we will obtain separate estimates for each of the components $N_\ensuremath{\varepsilon}^{i}(t)$, which are given by \begin{equation} \begin{array}{lcl} N_\ensuremath{\varepsilon}^{i}(t) & = & \nrm{ V^i(t) }_{L^2}^2 +\int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V^i(s)}_{H^1}^2 \, ds . \end{array} \end{equation} Indeed, the definitions \sref{eq:DefPhi} and \sref{eq:DefUpsilon} imply that the $i$-th component of $\Upsilon_{\ensuremath{\sigma};i}$ vanishes, which allows us to replace the problematic $\partial_{\xi} S(t - s)$ term with its off-diagonal components $\partial_{\xi} S_{\mathrm{od}}(t - s)$. More precisely, for $\tau' \ge \tau - 1$ when computing short time bounds, we will use \begin{equation} \begin{array}{lcl} \Big[\ensuremath{\partial}_{\xi} S(\tau - \tau') Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i & = & \Big[\ensuremath{\partial}_{\xi} S(\tau - \tau') (I - P) \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i \\[0.2cm] & = & \Big[\ensuremath{\partial}_{\xi} S_{\mathrm{od}}(\tau - \tau') \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) - \ensuremath{\partial}_{\xi} S(\tau- \tau')P \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau') \big) \Big]^i . \end{array} \end{equation} This will allow us to bound $N_\ensuremath{\varepsilon}^{i}(t)$ in terms of $N_\ensuremath{\varepsilon}(t)$. In order to streamline our computations, we now introduce some notation that will help us to stay as close as possible to the framework developed in \cite{Hamster2017}. First of all, we impose the splittings \begin{equation} \label{eq:reg:defns:n:i:ii} \begin{array}{lcl} N_{\ensuremath{\varepsilon},I}(t) & = & \nrm{ V(t) }_{L^2}^2 , \\[0.2cm] N_{\ensuremath{\varepsilon},II}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V(s)}_{H^1}^2 \, ds, \end{array} \end{equation} together with \begin{equation} \label{eq:reg:defns:n:i:ii:comp} \begin{array}{lcl} N^i_{\ensuremath{\varepsilon};I}(t) & = & \nrm{ V^i(t) }_{L^2}^2 \\[0.2cm] & = & \nrm{ \ensuremath{\overline{V}}_i^i\big(\tau_{i}(t)\big) }_{L^2}^2 , \\[0.2cm] N^i_{\ensuremath{\varepsilon};II}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{V^i(s)}_{H^1}^2 \, ds \\[0.2cm] & = & \int_0^t e^{-\ensuremath{\varepsilon}(t-s)} \nrm{\ensuremath{\overline{V}}_i^i\big(\tau_{i}(s)\big)}_{H^1}^2 \, ds. \end{array} \end{equation} In addition, we split $\mathcal{W}_{\ensuremath{\sigma};i}$ into a linear and nonlinear part as \begin{align} \mathcal{W}_{\ensuremath{\sigma};i}(v)=\ensuremath{\sigma}^2F_{\mathrm{lin}}(v)+F_{\mathrm{nl}}(v) \end{align} and we isolate the constant term in $\overline{\mathcal{S}}_{\ensuremath{\sigma};i}$ by writing \begin{align} \overline{\mathcal{S}}_{\ensuremath{\sigma};i}(v)=B_{\mathrm{cn}}+B_{\mathrm{lin}}(v) . \end{align} Proposition \ref{prp:fnl:bnds} implies that these functions satisfy the bounds \begin{align}\begin{split} \nrm{F_{\mathrm{lin}}(v)}_{L^2}&\leq K_{\mathrm{F;lin}}\nrm{v}_{H^1},\\ \nrm{F_{\mathrm{nl}}(v)}_{L^2}&\leq K_{\mathrm{F;nl}}\nrm{v}^2_{H^1}(1+\nrm{v}^3_{L^2}),\\ \nrm{B_{\mathrm{cn}}}_{L^2}&< \infty,\\ \nrm{B_{\mathrm{lin}}(v)}_{L^2}&\leq K_{\mathrm{B;lin}}\nrm{v}_{H^1}\end{split} \end{align} for appropriate constants $K_{\mathrm{F;lin}} > 0$, $K_{\mathrm{F;nl}} > 0$ and $K_{\mathrm{B;lin}} > 0$. In particular, they satisfy assumption (hFB) in \cite{Hamster2017}, which gives us the opportunity to apply some of the ideas in \cite[{\S}9]{Hamster2017}. For convenience we will write from now on $t_{\mathrm{st}}$ for $t_{\mathrm{st}}(T,\ensuremath{\varepsilon},\eta)$. In order to understand $N^i_{\ensuremath{\varepsilon};I}$, we introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{E}_{0}(t) & = & S\big(\tau_{i}(t)\big) Q V(0), \\[0.2cm] \end{array} \end{equation} together with the long-term integrals \begin{equation} \label{eq:reg:LTI} \begin{array}{lcl} \mathcal{E}^{\mathrm{lt}}_{F;\mathrm{lin}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t)- \tau) Q F_{\mathrm{lin}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{F;\mathrm{nl}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) - \tau) Q F_{\mathrm{nl}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{B;\mathrm{lin}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) -\tau) Q B_{\mathrm{lin}}\big(\overline{V}_i(\tau) \big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau, \\[0.2cm] \mathcal{E}^{\mathrm{lt}}_{B;\mathrm{cn}}(t) & = & \int_0^{\tau_{i}(t)-1} S(\tau_{i}(t) -\tau)Q B_{\mathrm{cn}} \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau , \\[0.2cm] \mathcal{E}_{\mathrm{so}}^{\mathrm{lt}}(t) &= &\int_0^{\tau_{i}(t) - 1}\ensuremath{\partial}_{\xi}S(\tau_{i}(t)-\tau) Q \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) +\Lambd ({\tau_{i}(t)}-\tau)\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \end{array} \end{equation} the short-term integrals \begin{equation} \begin{array}{lcl} \mathcal{E}^{\mathrm{sh}}_{F;\mathrm{lin}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) - \tau) Q F_{\mathrm{lin}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{F;\mathrm{nl}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) - \tau) Q F_{\mathrm{nl}}\big(\overline{V}_i(\tau)\big)\mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau , \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{lin}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) -\tau) Q B_{\mathrm{lin}}\big(\overline{V}_i(\tau) \big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{cn}}(t) & = & \int_{\tau_{i}(t)-1}^{\tau_{i}(t)} S(\tau_{i}(t) -\tau)Q B_{\mathrm{cn}} \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d \beta_\tau , \\[0.2cm] \end{array} \end{equation} and finally the split second-order integrals \begin{equation} \begin{array}{lcl} \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};A}(t) & = &- \int_{\tau_i(t) - 1}^{\tau_{i}(t)} \ensuremath{\partial}_{\xi} S(\tau_{i}(t)-\tau) P \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};B}(t) & = &\int_{\tau_i(t) - 1}^{\tau_{i}(t)} \Lambd ({\tau_{i}(t)}-\tau)\Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})}d\tau, \\[0.2cm] \mathcal{E}^{\mathrm{sh}}_{\mathrm{so};C}(t) & = &\int_{\tau_i(t) - 1}^{\tau_{i}(t)}\ensuremath{\partial}_{\xi} S_{\mathrm{od}}(\tau_{i}(t)-\tau) \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) \, \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} d\tau. \end{array} \end{equation} Here we use the convention that integrands are set to zero for $\tau < 0$. Note that integration variables in the original time are represented by $s$, while integration variables in the rescaled time are denoted by $\tau$. For $\eta > 0$ sufficiently small, our stopping time ensures that the identities \sref{eq:MildNonProjZero} hold. This implies that we may assume \begin{equation} P_\xi \Upsilon_{\ensuremath{\sigma};i} \big(\ensuremath{\overline{V}}_i(\tau)\big) + P \mathcal{W}_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_i(\tau)\big) = 0. \end{equation} This explains why there is a $Q$ in the first two lines of \sref{eq:reg:LTI}, as their $P$-counterparts are canceled against the $S(\tau_i(t)-\tau)P_\xi$ term that is present in \sref{eq:MildEqTimeTrans} but absent from \sref{eq:reg:LTI}. For convenience, we also write \begin{equation} \mathcal{E}_{F;\#}(t) = \mathcal{E}^{\mathrm{lt}}_{F;\#}(t) + \mathcal{E}^{\mathrm{sh}}_{F;\#}(t) \end{equation} for $\# \in \{\mathrm{lin},\mathrm{nl}\}$, together with \begin{equation} \mathcal{E}_{B;\#}(t) = \mathcal{E}^{\mathrm{lt}}_{B;\#}(t) + \mathcal{E}^{\mathrm{sh}}_{B;\#}(t) \end{equation} for $\# \in \{\mathrm{lin},\mathrm{cn}\}$ and finally \begin{equation} \mathcal{E}^{\mathrm{sh}}_{\mathrm{so}}(t) = \mathcal{E}_{\mathrm{so};A}^{\mathrm{sh}}(t) + \mathcal{E}_{\mathrm{so};B}^{\mathrm{sh}}(t) + \mathcal{E}_{\mathrm{so};C}^{\mathrm{sh}}(t) \end{equation} for the short-term second-order terms. Turning to the terms that are relevant for evaluating $N^i_{\ensuremath{\varepsilon};II}$, we introduce the expression \begin{equation} \begin{array}{lcl} \mathcal{I}_{\ensuremath{\varepsilon},\delta;0}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}_0(s) }_{H^1}^2 \, ds , \\[0.2cm] \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{F;\mathrm{lin}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl} }(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{F;\mathrm{nl}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{B;\mathrm{lin}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{B;\mathrm{cn}}(s) }_{H^1}^2 \, ds , \\[0.2cm] \mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) & = & \int_0^t e^{-\ensuremath{\varepsilon} ( t- s) } \norm{ S(\delta) \mathcal{E}^{\#}_{\mathrm{so}}(s) }_{H^1}^2 \, ds \\[0.2cm] \end{array} \end{equation} for $\# \in \{\mathrm{lt}, \mathrm{sh}\}$. The extra $S(\delta)$ factor will be used to ensure that all the integrals we encounter are well-defined. We emphasize that all our estimates are uniform in $0 < \delta < 1$, allowing us to take $\delta \downarrow 0$. The estimates concerning $\mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}}$ and $\mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}$ in Lemmas \ref{lem:nls:f:nl:st} and \ref{lem:nls:b:lin:st} are particularly delicate in this respect, as a direct application of the bounds in Lemma \ref{lem:nls:sem:group:decay} would result in expressions that diverge as $\delta \downarrow 0$. The main difference between the approach here and the computations in \cite[{\S}9]{Hamster2017} is that we need to keep track of several time transforms simultaneously, which forces us to use the original time $t$ in the definitions \sref{eq:reg:defns:n:i:ii}-\sref{eq:reg:defns:n:i:ii:comp}. The following result plays a key role in this respect, as it shows that decay rates in the $\tau$-variable are stronger than decay rates in the original time. \begin{lem}\label{lem:TauEst} Assume that (HDt), (HSt) and (HTw) are satisfied and pick $0 \le \sigma \le \delta_{\sigma}$. Then for any pair $t>s \ge 0$ we have the inequality \begin{align} \label{eq:nls:TauEst:tau:est:i} \tau_i(t)-\tau_i(s)\geq t-s, \end{align} while for any $s \ge t_i(1)$ we have \begin{align} t_i(\tau_i(s)-1)\geq s-1 . \end{align} \end{lem} \begin{proof} The first inequality can be verified by using \sref{eq:prlm:kappa:glb:ests} to compute \begin{align} \begin{split} \tau_i(t)-\tau_i(s)&=\int_s^t\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+V(s'),\psi_{\mathrm{tw}})ds'\\ &\geq (t-s)\min_{s\leq s'\leq t}\k_{\ensuremath{\sigma};i}(\Phi_\ensuremath{\sigma}+V(s'),\psi_{\mathrm{tw}})\\ &\geq t-s . \end{split} \end{align} To obtain the second inequality, we write $\tilde{s} = t_i(1) \le 1$ and compute \begin{equation} \tau_i(s) -1 = \tau_i(s) - \tau_i(\tilde{s}) \ge s - \tilde{s} \ge s - 1. \end{equation} \end{proof} We now set out to bound all the terms appearing in $N_\ensuremath{\varepsilon}^{i}(t)$. Following \cite{Hamster2017}, we first study the deterministic integrals and afterwards use $H^\infty$-calculus to bound the stochastic integrals. \subsection{Deterministic Regularity Estimates} First, we collect some results from \cite[\S 9.2]{Hamster2017} that are easily adapted to the present situation. \begin{lem}\label{lem:ColPrevRes} Fix $T > 0$, assume that (HDt), (HSt) and (HTw) all hold and pick a constant $0 < \ensuremath{\varepsilon} < \beta$. Then for any $\eta>0$, any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bounds \begin{equation} \begin{array}{lcl} \norm{\mathcal{E}_0(t)}_{L^2}^2 & \le & M^2 e^{-2\b t} \norm{V(0)}^2_{L^2}, \\[0.2cm] \norm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K^2_\k K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \norm{\mathcal{E}_{F;\mathrm{nl}}(t)}_{L^2}^2 & \le & \eta K_\k^2K_{F;\mathrm{nl}}^2 M^2( 1 + \eta^3)^2 N_{\ensuremath{\varepsilon};II}(t), \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}_{\ensuremath{\varepsilon},\delta;0}(t) & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} e^{-\ensuremath{\varepsilon} t} \norm{V(0)}^2_{H^1}, \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & \le & K^2_\k K_{F;\mathrm{lin}}^2 \frac{M^2}{2(\beta - \ensuremath{\varepsilon}) \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}(t) & \le & 4 e^{\ensuremath{\varepsilon}} M^2 K_\k K_{F;\mathrm{lin}}^2 N_{\ensuremath{\varepsilon};II}(t) , \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}}(t) & \le & \eta K_\k^2K_{F;\mathrm{nl}}^2 ( 1 + \eta^3)^2 \frac{M^2}{ \beta - \ensuremath{\varepsilon} } N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} Observe first that \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{\tau_{i}(t)} e^{-\beta(\tau_{i}(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} \, d\tau \right)^2 . \end{array} \end{equation} Substituting $s = t_i(\tau)$ we find \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{t} e^{- (\beta - \frac{\ensuremath{\varepsilon}}{2} )(\tau_{i}(t) - \tau_{i}(s)) } e^{-\frac{\ensuremath{\varepsilon}}{2} ( \tau_{i}(t) - \tau_{i}(s)) } \norm{V(s)}_{H^1}\tau'_i(s) \, ds \right)^2 . \\[0.2cm] \end{array} \end{equation} Applying \sref{eq:nls:TauEst:tau:est:i} and using \sref{eq:prlm:kappa:glb:ests} to bound the extra integration factor $\tau_i'(s)$ by $K_{\kappa}$, we obtain \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_\k^2K_{F;\mathrm{lin}}^2 M^2 \left( \int_0^{t} e^{- (\beta - \frac{\ensuremath{\varepsilon}}{2} )(t-s) } e^{-\frac{\ensuremath{\varepsilon}}{2} ( t-s) } \norm{V(s)}_{H^1} \, ds \right)^2 . \\[0.2cm] \end{array} \end{equation} Cauchy-Schwartz now yields the desired bound \begin{equation} \begin{array}{lcl} \nrm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 & \le & K_\k^2K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} \int_0^{t} e^{- \ensuremath{\varepsilon} ( t - s) } \norm{V(s)}_{H^1}^2 \, ds \\[0.2cm] & = & K_\k^2K_{F;\mathrm{lin}}^2 \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} The remaining estimates follow in an analogous fashion by making similar small adjustments to the proofs of Lemmas 9.9-9.11 in \cite{Hamster2017}. \end{proof} Our next result discusses the novel second-order terms. The crucial ingredient here is that we no longer have to consider the dangerous $\ensuremath{\partial}_{\xi} S(t_i(\tau) - \tau) Q \Upsilon_{\sigma;i}\big(\overline{V}(\tau) \big)$ term for $\tau \ge t_i(\tau) - 1$. Indeed, this term need not be integrable even in $L^2$ because of the divergent $(\tau_i(t) - \tau)^{-1/2}$ behavior of $\partial_{\xi} S$ and the fact that we only have square-integrable control of the $H^1$-norm of $\overline{V}_i(\tau)$. \begin{lem}\label{lem:nls:so:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0< \ensuremath{\varepsilon}<2\b$. Then for any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bounds \begin{equation} \begin{array}{lcl} \norm{ \mathcal{E}^{\mathrm{sh}}_{\mathrm{so}}(t)}_{L^2}^2 &\leq & 9 \ensuremath{\sigma}^4 e^{2 \beta} K^2 K_\k M^2 N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \norm{ \mathcal{E}^{\mathrm{lt}}_{\mathrm{so}}(t)}_{L^2}^2 &\leq & 4 \ensuremath{\sigma}^4 K^2 K_\k \frac{M^2}{2\beta - \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t), \end{array} \end{equation} together with \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) &\leq & 9 \ensuremath{\sigma}^4 e^{2 \beta} K^2K_\k M^2 N_{\ensuremath{\varepsilon};II}(t) \\[0.2cm] \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;\mathrm{so}}(t) &\leq & 4 \ensuremath{\sigma}^4K^2K_\k \frac{M^2}{2(\beta - \ensuremath{\varepsilon}) \ensuremath{\varepsilon}} N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} For $\tau \ge \tau_i(t) - 1$ we may use Lemma \ref{lem:nls:sem:group:decay} together with Proposition \ref{prp:fnl:bnds} to obtain the estimate \begin{equation} \begin{array}{lcl} \norm{\partial_{\xi} S(\tau_i(t) - \tau) P \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & \sigma^2 K M \norm{\overline{V}_i(\tau)}_{H^1} \\[0.2cm] & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1}. \end{array} \end{equation} In the same fashion we obtain \begin{equation} \begin{array}{lcl} \norm{\Lambda(\tau_i(t) - \tau) \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} , \\[0.2cm] \norm{\partial_{\xi} S_{\mathrm{od}}(\tau_i(t) - \tau) \Upsilon_{\sigma;i}\big( \overline{V}_i(\tau) \big) }_{H^1} & \le & e^{\beta} \sigma^2 K M e^{-\beta(\tau_i(t) - \tau) } \norm{\overline{V}_i(\tau)}_{H^1} . \end{array} \end{equation} In addition, for $\tau \le \tau_i(t) - 1$ we obtain \begin{equation} \nrm{ \big[ \ensuremath{\partial}_{\xi}S(\tau_{i}(t)-\tau)Q + \Lambd ({\tau_{i}(t)}-\tau) \big] \Upsilon_{\ensuremath{\sigma};i}\big(\ensuremath{\overline{V}}_{i}(\tau)\big) }_{H^1} \le 2 K M \sigma^2 \norm{\overline{V}_i(\tau)}_{H^1} e^{-\beta(\tau_i(t) - \tau) } . \end{equation} The desired estimates can hence be obtained in the same fashion as the bounds for $\mathcal{E}_{F;\mathrm{lin}}(t)$ and $\mathcal{I}_{\ensuremath{\varepsilon},\delta;F;\mathrm{lin}}^{\mathrm{lt}}(t)$ in Lemma \ref{lem:ColPrevRes} . \end{proof} The following results at times do require the computations in \cite{Hamster2017} to be modified in a subtle non-trivial fashion. We therefore provide full proofs here, noting, however, that the main ideas remain unchanged. \begin{lem} \label{lem:nls:f:nl:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $\eta > 0$, any $0 \leq \delta < 1$ and any $0 \le t \le t_{\mathrm{st}}$, we have the bound \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F,\mathrm{nl}}(t) & \le & \eta M^2e^{3\ensuremath{\varepsilon}} K_\k^2K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 (1 + \rho_{\mathrm{min}}^{-1})(3K_\k+2) N_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} We first introduce the inner product \begin{equation} \label{eq:nls:def:inn:prod:h:1:rho} \langle v , w \rangle_{H^1_{\rho} } = \langle v , w \rangle_{L^2} + \langle \sqrt{\rho} \partial_{\xi} v , \sqrt{\rho} \partial_{\xi} w \rangle_{L^2} \end{equation} and note that \begin{equation} \norm{v}_{H^1}^2 \leq \norm{v}_{L^2}^2 + \rho_{\mathrm{min}}^{-1} \norm{\sqrt\rho \ensuremath{\partial}_{\xi} v}_{L^2}^2 \le \big(1 + \rho_{\mathrm{min}}^{-1} \big) \langle v , v \rangle_{H^1_\rho} . \end{equation} For $\# \in \{L^2, H^1_{\rho} \}$ we introduce the expression \begin{equation}\label{eq:nls:DefE} \mathcal{E}_{\tau,\tau',\tau'';\#} = \Big\langle S(\tau+\d-\tau')QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big),S(\tau + \d-\tau'')QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau'')\big)\Big\rangle_{\#}, \end{equation} which allows us to obtain the estimate \begin{equation} \label{eq:nls:bnd:i:sh:extr:term} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F,\mathrm{nl}}(t) & \le & \big(1 + \rho_{\mathrm{min}}^{-1} \big) \int_0^te^{\ensuremath{\varepsilon}(t-s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \mathcal{E}_{\tau_i(s),\tau',\tau'';H^1_\rho} d\tau''d\tau'ds \\[0.2cm] & \le & \big(1 + \rho_{\mathrm{min}}^{-1} \big) \int_0^te^{\ensuremath{\varepsilon}(t-s)} \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \mathcal{E}_{\tau_i(s),\tau',\tau'';H^1_\rho} d\tau''d\tau'ds . \end{array} \end{equation} The extra term involving the function $t_i'$, which takes values in $[K_{\kappa}^{-1}, 1]$, was included for technical reasons that will become clear in wat follows. For any $v,w \in L^2$, $\vartheta > 0$, $\vartheta_A \ge 0$ and $\vartheta_B \ge 0$, we have \begin{equation} \label{eq:nls:deriv:semigroup} \begin{array}{lcl} \frac{d}{d \vartheta} \langle S(\vartheta + \vartheta_A) v, S(\vartheta + \vartheta_B) w \rangle_{L^2} & = & \langle \mathcal{L}_\mathrm{tw} S(\vartheta + \vartheta_A) v , S(\vartheta +\vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw}S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & = & \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw}^* S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \mathcal{L}_\mathrm{tw} S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & = & \langle S(\vartheta + \vartheta_A) v , \big[ \mathcal{L}_\mathrm{tw}^* - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \ \big[ \mathcal{L}_\mathrm{tw} - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_B) w \rangle_{L^2} \\[0.2cm] & & \qquad - 2 \langle \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_A) v, \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_B) w \rangle_{L^2} . \end{array} \end{equation} Upon taking $\delta>0$ for the moment and choosing $v=QF_{\mathrm{nl}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big)$, $w=QF_{\mathrm{nl}}(\ensuremath{\overline{V}}_{i}(\tau''))$, $\vartheta=\tau_i(s)+\delta$, $\vartheta_A=\tau'$ and $\vartheta_B=\tau''$, we may rearrange \sref{eq:nls:deriv:semigroup} to obtain the estimate \begin{equation}\label{eq:nls:BoundE} \begin{array}{lcl} \mathcal{E}_{\tau_i(s),\tau',\tau'';H_\rho^1} & \le & M^2 K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H_\rho^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \\[0.2cm] & & \qquad + M^2 K_{F;\mathrm{nl}}^2 (1 + \eta^3)^2 \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau''} } \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \\[0.2cm] & & \qquad - \frac{1}{2} \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \end{array} \end{equation} for the values of $(s,\tau',\tau'')$ that are relevant. Upon introducing the integrals \begin{equation} \label{eq:nls:def:i:i:ii} \begin{array}{lcl} \mathcal{I}_{I} & = & \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)}\\[0.2cm] &&\qquad \qquad \big[ 1 + \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau''} } ] \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau'')}_{H^1}^2 \, d\tau'' \, d\tau' \, ds , \\[0.2cm] \mathcal{I}_{II} & = & \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \, d\tau'' \, d\tau' \, ds , \\[0.2cm] \end{array} \end{equation} we hence readily obtain the estimate \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{nl}}(t) & \le & (1 + \rho_{\mathrm{min}}^{-1}) M^2 K^2_{F;\mathrm{nl}}(1 + \eta^3)^2 \mathcal{I}_{I} - \frac{1}{2} (1 + \rho_{\mathrm{min}}^{-1}) \mathcal{I}_{II}. \end{array} \end{equation} Using Lemma \ref{lem:TauEst} we see that \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} & \leq & K_\k^3 \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{s-1}^{s} \int_{s-1}^{s} \big[ 1 + \frac{1}{\sqrt{s + \delta - s''} } ] \norm{V(s')}_{H^1}^2 \norm{V(s'')}_{H^1}^2 \, ds'' \, ds' \, ds , \end{array} \end{equation} which allows us to repeat the computation \cite[(9.68)]{Hamster2017} and conclude \begin{align} \mathcal{I}_{I} \leq 3\eta e^{3\ensuremath{\varepsilon}} K_\k^3 N_{\ensuremath{\varepsilon};II}(t). \end{align} To understand $\mathcal{I}_{II}$ it is essential to change the order of integration and integrate with respect to $s$ before switching $\tau'$ and $\tau''$ back to the original time. Rearranging the integrals in \sref{eq:nls:def:i:i:ii}, we find \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & =& \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t), \tau'+1 \} } \Big[\int_{\max\{t_i(\tau'),t_i(\tau'')\}}^{\min\{ t,t_i(\tau'+1), t_i(\tau''+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big) } \partial_1 \mathcal{E}_{\tau_i(s),\tau',\tau'';L^2} \, ds \Big] \, d \tau '' \, d \tau'. \end{array} \end{equation} Introducing the notation \begin{equation} \tau^+(\tau', \tau'') = \min\{ \tau_i(t), \tau' + 1 , \tau'' + 1 \}, \qquad \tau^-(\tau', \tau'') = \max\{ \tau', \tau'' \}, \end{equation} the substitution $\tau = \tau_i(s)$ yields \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & =& \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t) , \tau'+1 \} } \Big[\int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } e^{\ensuremath{\varepsilon} t_i(\tau)} \partial_1 \mathcal{E}_{\tau,\tau',\tau'';L^2} \, d \tau \Big] \, d\tau '' \, d\tau' . \\[0.2cm] \end{array} \end{equation} We emphasize here that the integration factor associated to this substitution cancels out against the additional term introduced in \sref{eq:nls:bnd:i:sh:extr:term}. Integrating by parts, we find \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} &=&\mathcal{I}_{II;A}+\mathcal{I}_{II;B}+\mathcal{I}_{II;C} \end{array} \end{equation} in which we have introduced \begin{equation} \begin{array}{lcl} \mathcal{I}_{II;A} & = & \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t), \tau'+1\} } e^{\ensuremath{\varepsilon} t_i(\tau)} \mathcal{E}_{\tau, \tau',\tau'';L^2}\big|_{\tau=\tau^+(\tau', \tau'')} \, d\tau'' \, d\tau' , \\[0.2cm] \mathcal{I}_{II;B} & = & -\int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0,\tau'-1\}}^{\min\{\tau_i(t), \tau'+1\} } e^{\ensuremath{\varepsilon} t_i(\tau) } \mathcal{E}_{\tau,\tau',\tau'';L^2}\big|_{\tau=\tau^-(\tau', \tau'')} d\tau'' \, d\tau' , \\[0.2cm] \mathcal{I}_{II;C} & = & - \int_0^{\tau_i(t)} e^{-\ensuremath{\varepsilon} t} \int_{\max\{0, \tau'-1\}}^{\min\{\tau_i(t) , \tau'+1 \} } \Big[\int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \left(\frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} \right) \mathcal{E}_{\tau,\tau',\tau'';L^2} \, d\tau \Big] \, d\tau '' \, d\tau' . \\[0.2cm] \end{array} \end{equation} Note here that $\mathcal{I}_{II;B}$ is well defined because $\delta>0$. Using the substitutions \begin{equation} s' = t_i(\tau'), \qquad s'' = t_i(\tau'') \end{equation} together with the bound \begin{equation} \begin{array}{lcl} t_i\big( \tau_-(\tau', \tau'') \big) & \le & t_i\big( \tau^+(\tau', \tau'') \big) \\[0.2cm] & \le & \min\{ t , t_i(\tau' + 1), t_i(\tau'' + 1) \} \\[0.2cm] & \le & \min \{ t , t_i(\tau') + 1 , t_i(\tau'') + 1 \}, \\[0.2cm] & \le & \min\{ s' , s''\} + 1 \\[0.2cm] & \le & s' + 1, \end{array} \end{equation} we find \begin{equation} \int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \abs{ \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} }d\tau = \int_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'') } \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)}d\tau = e^{\ensuremath{\varepsilon} t_i(\tau) } \big|_{\tau^-(\tau', \tau'')}^{\tau^+(\tau', \tau'')} \le 2 e^{\ensuremath{\varepsilon}} e^{ \ensuremath{\varepsilon} s'} . \end{equation} Applying Cauchy-Schwartz to the inner product $\mathcal{E}$, we hence obtain \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 e^{\ensuremath{\varepsilon}}M^2K_\k^2K_{F;\mathrm{nl}}^2(1+\eta^3)^2 \int_0^{t} e^{-\ensuremath{\varepsilon} (t - s')} \nrm{V(s')}_{H^1}^2 \mathcal{J}(s') \, d s' , \\[0.2cm] \end{array} \end{equation} in which we have introduced the function \begin{equation} \mathcal{J}(s') = \int_{\max\{0,t_i(\tau_i(s')-1)\}}^{\min\{t, t_i(\tau_i(s')+1)\} } \nrm{V(s'')}_{H^1}^2 \, ds'' . \end{equation} Exploiting Lemma \ref{lem:TauEst} again, we can bound \begin{equation} \begin{array}{lcl} \mathcal{J}(s') & \le & \int_{\max\{0, s' - 1 \} }^{\min\{t, s' + 1 \}} \nrm{V(s'')}_{H^1}^2 \, ds'' \\[0.2cm] & \le & \int_{\max\{0, s' - 1 \} }^{\min\{t, s' + 1 \}} e^{2 \ensuremath{\varepsilon}} e^{ - \ensuremath{\varepsilon}( \min\{t , s'+ 1\} - s'' ) }\nrm{V(s'')}_{H^1}^2 \, ds'' \\[0.2cm] & \le & e^{2 \ensuremath{\varepsilon}} \eta, \end{array} \end{equation} which hence gives \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 \eta e^{3 \ensuremath{\varepsilon}}M^2K_\k^2K_{F;\mathrm{nl}}^2(1+\eta^3)^2 N_{\ensuremath{\varepsilon};II}(t), \\[0.2cm] \end{array} \end{equation} as desired. It hence remains to consider the case $\delta = 0$. We may apply Fatou's lemma to conclude \begin{equation} \begin{array}{lcl} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}} (t) & = & \int_0^{t} e^{\ensuremath{\varepsilon}(t-s)} (\lim_{\d\to0}\nrm{S(\d) \mathcal{E}^{\mathrm{sh}}_{B;\mathrm{lin}}(s) }_{H^1})^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] &\leq & \liminf_{\d\to0} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;F;\mathrm{nl}} (t). \\[0.2cm] \end{array} \end{equation} The result now follows from the fact that the bounds obtained above do not depend on $\delta$. \end{proof} \subsection{Stochastic Regularity Estimates} We are now ready to discuss the stochastic integrals. These require special care because they cannot be bounded in a pathwise fashion, unlike the deterministic integrals above. Expectations of suprema are particularly delicate in this respect. Indeed, the powerful Burkholder-Davis-Gundy inequalities cannot be directly applied to the stochastic convolutions that arise in our mild formulation. However, as was shown in Lemma 9.7 in \cite{Hamster2017}, we can obtain an $H^\infty$-calculus for our linear operator $\mathcal{L}_{\mathrm{tw}}$ which allows us to use the following mild version, which is the source of the extra $T$ factors that appear in our estimates. \begin{lem} \label{lem:nls:mild:regularity} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. There exists a constant $K_{\mathrm{cnv}} > 0$ so that for any $W \in \mathcal{N}^2([0,T];(\mathcal{F})_{t} ; L^2)$ we have \begin{equation} E \sup_{0 \le t \le T} \norm{ \int_0^t S( t - s) Q W(s) \, d \beta_s }_{L^2}^2 \le K_{\mathrm{cnv}} E \int_0^T \norm{W(s)}_{L^2}^2 \, d s.\\ \end{equation} \end{lem} \begin{proof} This is a direct result of the computations in \cite[{\S}9.1]{Hamster2017}, which are based on the main theorem of \cite{veraar2011note}. \end{proof} \begin{lem} \label{lem:nls:b:lin:sup:e} Fix $T > 0$ and assume that (HDt), (HSt), and (HTw) all hold. Then for any $\ensuremath{\varepsilon} > 0$ we have the bound \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_\mathrm{st}} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 & \le & (T + 1) K_{\mathrm{cnv}} K_{B;\mathrm{lin}}^2 e^{\ensuremath{\varepsilon}} E \sup_{0 \le t \le t_\mathrm{st}} N^i_{\ensuremath{\varepsilon};II}(t) . \end{array} \end{equation} \end{lem} \begin{proof} Using Lemma \ref{lem:nls:mild:regularity} we compute \begin{equation} \label{eq:nls:bnd:on:e:b:lin:dir:from:mild:fmr} \begin{array}{lcl} E \sup_{0 \le t \le t_\mathrm{st}} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 & \le & E \sup_{0 \le t \le T} \norm{\mathcal{E}_{B;\mathrm{lin}}(t )}_{L^2}^2 \\[0.2cm] & = & E \sup_{0 \le \tau \le \tau_i(T)} \norm{ \int_0^{\tau} S(\tau-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_i(\tau')\big) \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}})} \, d \beta_{\tau'} }_{L^2}^2 \\[0.2cm] & \le & K_{\mathrm{cnv}} E \int_{0}^{\tau_i(T)} \norm{ B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_i(\tau)\big) \mathbf{1}_{\tau < \tau_i(t_{\mathrm{st}})} }_{L^2}^2 \, d\tau \\[0.2cm] & \le & K_\k K_{\mathrm{cnv}} K_{B;\mathrm{lin}}^2 E \int_0^{t_{\mathrm{st}}} \norm{V(s)}_{H^1}^2 \, ds . \end{array} \end{equation} By dividing up the integral, we obtain \begin{equation} \begin{array}{lcl} \int_0^{t_{\mathrm{st}}} \norm{V(s)}_{H^1}^2 \, ds & \le & e^{\ensuremath{\varepsilon}} \int_0^{1 } e^{ -\ensuremath{\varepsilon}(1 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & & \qquad + e^{\ensuremath{\varepsilon}} \int_1^{2 } e^{ -\ensuremath{\varepsilon}(2 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & & \qquad + \ldots + e^{\ensuremath{\varepsilon}} \int_{\lfloor T \rfloor}^{\lfloor T \rfloor + 1} e^{ -\ensuremath{\varepsilon}(\lfloor T \rfloor +1 - s) } \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & \le & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le T + 1} \int_0^t e^{-\ensuremath{\varepsilon}(t - s)} \norm{V(s)}_{H^1}^2 \mathbf{1}_{s < t_{\mathrm{st}}} \, ds \\[0.2cm] & \le & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le t_{\mathrm{st}}} \int_0^t e^{-\ensuremath{\varepsilon}(t - s)} \norm{V(s)}_{H^1}^2 \, ds \\[0.2cm] & = & (T + 1) e^{\ensuremath{\varepsilon}} \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \end{array} \end{equation} which yields the desired bound upon taking expectations. \end{proof} \begin{lem} \label{lem:nls:b:cn:sup:e} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Then we have the bound \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \norm{\mathcal{E}_{B;\mathrm{cn}}(t )}_{L^2}^2 & \le & T K_{\mathrm{cnv}} K_{B;\mathrm{cn}}^2 . \end{array} \end{equation} \end{lem} \begin{proof} This bound follows directly from \sref{eq:nls:bnd:on:e:b:lin:dir:from:mild:fmr} by making the substitutions \begin{equation} K_{B;\mathrm{lin}} \mapsto K_{B;\mathrm{cn}}, \qquad \qquad \nrm{V(s)}_{H^1}^2 \mapsto 1 . \end{equation} \end{proof} We now set out to bound the expectation of the suprema of the remaining double integrals $\mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t)$ and $\mathcal{I}^{\#}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t)$ with $\# \in \{ \mathrm{lt} , \mathrm{sh} \}$. This is performed in Lemma \ref{lem:nls:st:sup:on:b:lin:i}, but we first compute several time independent bounds for the expectation of the integrals themselves. \begin{lem} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $0 \le \delta < 1$ and $0 \le t \le T$, we have the identities \begin{equation} \label{eq:nls:ito:isometry:i:lt} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{0}^{\tau_{i}(s)-1} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds , \\[0.2cm] E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon} (t-s) } \int_{0}^{\tau_{i}(s)-1} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{cn}} }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds \end{array} \end{equation} and their short-time counterparts \begin{equation} \label{eq:nls: :isometry:i:sh} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds , \\[0.2cm] E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & = & E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \norm{ S(\tau_{i}(s)+\delta-\tau') Q B_{\mathrm{cn}} }_{L^2}^2 \mathbf{1}_{\tau' < \tau_i(t_{\mathrm{st}}) } d\tau' \, ds . \end{array} \end{equation} \end{lem} \begin{proof} This follows directly from the It\^o Isometry, see also Lemma 9.16 in \cite{Hamster2017}. \end{proof} \begin{lem} \label{lem:nls:b:lin} Fix $T > 0$, assume that (HDt), (HSt) and (HTw) all hold and pick a constant $0 < \ensuremath{\varepsilon} < 2 \beta$. Then for any $0 \leq \delta < 1$ and any $0 \le t \le T$, we have the bound \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_\mathrm{st}). \end{array} \end{equation} \end{lem} \begin{proof} Using \sref{eq:nls:ito:isometry:i:lt} and switching the integration order, we obtain \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) &\leq & M^2 K_{B;\mathrm{lin}}^2 E \int_0^{t} e^{ - \ensuremath{\varepsilon}(t - s) } \int_0^{\tau_{i}(s)\wedge\tau_i(t_{\mathrm{st}})} e^{-2 \beta(\tau_{i}(s)-\tau')}\norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \, d\tau' \, ds \\[0.2cm] &\leq & M^2 K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t} e^{ - \ensuremath{\varepsilon}(t - s) } \int_0^{s\wedge t_{\mathrm{st}}} e^{-2 \beta(s-s')}\norm{V(s')}_{H^1}^2 \, ds' \, ds \\[0.2cm] & = & M^2 K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} t} \Big[\int_{s'}^{t} e^{ -(2 \beta -\ensuremath{\varepsilon} )s } \, d s \Big] e^{2 \beta s'}\norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & \le & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} t} e^{-(2 \beta - \ensuremath{\varepsilon})s'} e^{2 \beta s'}\norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & \leq & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon}(t\wedge t_{\mathrm{st}} - s' )} \norm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & = & \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:nls:b:lin:st} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw), all hold. Pick a constant $\ensuremath{\varepsilon} > 0$. Then for any $0 \leq \delta < 1$ , and any $0 \le t \le T$, we have the bound \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{lin}}(t) & \le & K_\k K_{B;\mathrm{lin}}^2 M^2 (1 + \rho_\mathrm{min}^{-1})e^\ensuremath{\varepsilon}( 3 K_\k + 2 ) E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{lem} \begin{proof} We only consider the case $\delta>0$ here, noting that the limit $\delta\downarrow0$ can be handled as in the proof of Lemma \ref{lem:nls:f:nl:st}. Applying the identity \sref{eq:nls:deriv:semigroup} with $w=v$ and $\vartheta_A = \vartheta_B$, we obtain \begin{equation} \label{eq:nls:deriv:semigroup2} \begin{array}{lcl} \frac{d}{d \vartheta} \nrm{ S(\vartheta + \vartheta_A) v}^2_{L^2} & = & \langle S(\vartheta + \vartheta_A) v , \big[ \mathcal{L}_\mathrm{tw}^* - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_A) v \rangle_{L^2} \\[0.2cm] & & \qquad + \langle S(\vartheta + \vartheta_A) v , \ \big[ \mathcal{L}_\mathrm{tw} - \rho\ensuremath{\partial}_{\xi\xi}\big] S(\vartheta + \vartheta_A) v \rangle_{L^2} \\[0.2cm] & & \qquad - 2 \nrm{ \sqrt\rho\ensuremath{\partial}_{\xi} S(\vartheta + \vartheta_A) v}^2_{L^2} . \end{array} \end{equation} Recalling the inner product \sref{eq:nls:def:inn:prod:h:1:rho} and introducing the expression \begin{equation} \mathcal{E}_{\tau , \tau'; \#} = \norm{S(\tau+\delta -\tau')Q B_{\mathrm{lin}}\big(\ensuremath{\overline{V}}_{i}(\tau')\big) }_{\#}^2 \end{equation} for $\# \in \{ L^2, H^1_\rho \}$, we obtain the bound \begin{equation} \begin{array}{lcl} \mathcal{E}_{\tau, \tau'; H^1_\rho} & \le & M^2 K_{B;\mathrm{lin}}^2 \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 + M^2 K_{B;\mathrm{lin}}^2 \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau'} } \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \\[0.2cm] & & \qquad - \frac{1}{2} \partial_1 \mathcal{E}_{\tau, \tau'; L^2 } \end{array} \end{equation} for the values of $(s,\tau')$ that are relevant below. Upon writing \begin{align}\begin{split} \mathcal{I}_{I} & = E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) } \big[ t_i'\big(\tau_i(s) \big) \big]^{-1}\int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \big[ 1 + \frac{1}{\sqrt{\tau_{i}(s) + \delta - \tau'} } ] \norm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \mathbf{1}_{\tau'<\tau_i(t_\mathrm{st})} \, d\tau' \, ds , \\[0.2cm] \mathcal{I}_{II} & = E \int_0^{t} e^{-\ensuremath{\varepsilon}(t-s) }\big[ t_i'\big(\tau_i(s) \big) \big]^{-1} \int_{\tau_{i}(s)-1}^{\tau_{i}(s)} \partial_1 \mathcal{E}_{\tau_i(s) , \tau' ; L^2} \mathbf{1}_{\tau'<\tau_i(t_\mathrm{st})} \, d\tau' \, ds , \end{split} \end{align} we obtain the estimate \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{sh}}_{\nu,\delta;B;\mathrm{lin}}(t) & \le & (1 + \rho_\mathrm{min}^{-1}) M^2 K^2_{B;\mathrm{lin}} \mathcal{I}_{I} - \frac{1}{2}(1 + \rho_\mathrm{min}^{-1})\mathcal{I}_{II} . \end{array} \end{equation} Changing the integration order, we obtain \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} & =& E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t}\Big[ \int_{t_i(\tau')}^{\min\{t\wedge t_{\mathrm{st}},t_i(\tau'+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big)} \big[ 1 + \frac{1}{\sqrt{\tau_i(s)+\d-\tau'}} \big] \, ds \Big] \nrm{\ensuremath{\overline{V}}_{i}(\tau')}_{H^1}^2 \, d\tau ' , \\[0.2cm] \mathcal{I}_{II} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{t_i(\tau')}^{\min\{ t\wedge t_{\mathrm{st}},t_i(\tau'+1) \} } \frac{e^{\ensuremath{\varepsilon} s}}{t_i'\big(\tau_i(s) \big)} \partial_1 \mathcal{E}_{\tau_i(s), \tau' ; L^2} \, ds \, d\tau '. \end{array} \end{equation} The substitution $s' = t_i(\tau')$ together with Lemma \ref{lem:TauEst} now yields \begin{equation} \begin{array}{lcl} \mathcal{I}_{I} &\leq& K_\k^2E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}})}\Big[ \int_{s'}^{\min\{t\wedge t_{\mathrm{st}},t_i(\tau_i(s')+1) \} } e^{\ensuremath{\varepsilon} s} \big[ 1 + \frac{1}{\sqrt{\tau_i(s)+\d-\tau(s')}} \big] \, ds \Big] \nrm{V(s')}_{H^1}^2 \, ds ' \\[0.2cm] & \leq & K_\k^2E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}})}\Big[ \int_{s'}^{\min\{t\wedge t_{\mathrm{st}},s' + 1 \} } e^{\ensuremath{\varepsilon} s} \big[ 1 + \frac{1}{\sqrt{s+\d-s'}} \big] \, ds \Big] \nrm{V(s')}_{H^1}^2 \, ds ' \\[0.2cm] & \le & 3 e^{\ensuremath{\varepsilon}} K^2_\k E \int_0^{t\wedge t_{\mathrm{st}}} e^{-\ensuremath{\varepsilon} (t\wedge t_{\mathrm{st}}-s')} \nrm{V(s')}_{H^1}^2 \, ds' \\[0.2cm] & = & 3 e^{\ensuremath{\varepsilon}} K^2_\k E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \\[0.2cm] \end{array} \end{equation} For convenience, we introduce the notation \begin{equation} \tau^+(\tau') = \min\{ \tau_i(t\wedge t_{\mathrm{st}}),\tau'+1 \} . \end{equation} Substituting $\tau=\tau_i(s)$ and integrating by parts, we may compute \begin{equation} \begin{array}{lcl} \mathcal{I}_{II} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{\tau'}^{ \tau^+(\tau')} e^{\ensuremath{\varepsilon} t_i(\tau)} \partial_1 \mathcal{E}_{\tau, \tau';L^2} \, d\tau \, d\tau ' \\[0.2cm] & = & \mathcal{I}_{II;A} + \mathcal{I}_{II;B} + \mathcal{I}_{II;C}, \end{array} \end{equation} in which we have introduced the expressions \begin{equation} \begin{array}{lcl} \mathcal{I}_{II;A} & = & E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} e^{\ensuremath{\varepsilon} t_i(\tau^+(\tau')) } \mathcal{E}_{\tau^+(\tau'), \tau' ; L^2} \, d\tau' , \\[0.2cm] \mathcal{I}_{II;B} & = & - E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} e^{\ensuremath{\varepsilon} t_i(\tau') } \mathcal{E}_{\tau', \tau' ; L^2} % \, d\tau' , \\[0.2cm] \mathcal{I}_{II;C} & = & - E \int_0^{\tau_i(t\wedge t_{\mathrm{st}})} e^{-\ensuremath{\varepsilon} t} \int_{\tau'}^{\tau^+(\tau') } \left(\frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)}\right) \mathcal{E}_{\tau, \tau';L^2} \, d\tau \, d\tau ' . \\[0.2cm] \end{array} \end{equation} Upon computing \begin{equation} \int_{\tau'}^{ \tau^+(\tau') } \abs{ \frac{d}{d\tau} e^{\ensuremath{\varepsilon} t_i(\tau)} } \, d\tau = e^{\ensuremath{\varepsilon} t_i(\tau) } \big|_{\tau'}^{\tau^+(\tau')} \le 2 e^{\ensuremath{\varepsilon}} e^{ \ensuremath{\varepsilon} t_i(\tau')}, \end{equation} we can make the substitution $s' = t_i(\tau')$ and obtain the final estimate \begin{equation} \begin{array}{lcl} \abs{\mathcal{I}_{II} } & \leq & 4 e^\ensuremath{\varepsilon} K_\k M^2 K_{B;\mathrm{lin}}^2 E\int_0^{t\wedge t_{\mathrm{st}}} e^{- \ensuremath{\varepsilon}(t\wedge t_{\mathrm{st}}-s')} \nrm{V(s')}^2_{H^1}ds' \\[0.2cm] &\leq& 4 e^\ensuremath{\varepsilon} K_\k M^2 K_{B;\mathrm{lin}}^2 E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}). \end{array} \end{equation} \end{proof} \begin{lem} \label{lem:nls:b:cn} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0 < \ensuremath{\varepsilon} < \beta$. Then for any $0 \leq \delta < 1$, any $(\mathcal{F}_t)$-stopping time $t_{\mathrm{st}}$ and any $0 \le t \le T$, we have the bounds \begin{equation} \begin{array}{lcl} E \, \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & \le & \frac{M^2}{(2 \beta-\ensuremath{\varepsilon})\ensuremath{\varepsilon}} K_{B;\mathrm{cn}}^2 , \\[0.2cm] E \, \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B;\mathrm{cn}}(t) & \le & \frac{1}{\ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 M^2 (1 + \rho_\mathrm{min}^{-1})e^\ensuremath{\varepsilon}( 3 K_\k + 2 ). \end{array} \end{equation} \end{lem} \begin{proof} These results follows by repeating Lemmas \ref{lem:nls:b:lin} and \ref{lem:nls:b:lin:st}. Since \begin{equation} \int_0^{t} e^{- \ensuremath{\varepsilon}(t - s) } \,ds \le \frac{1}{\ensuremath{\varepsilon}}, \end{equation} we can obtain the bounds by making the substitution \begin{equation} K_{B;\mathrm{lin}} \mapsto K_{B;\mathrm{cn}}, \qquad \qquad E N_{\ensuremath{\varepsilon};II}(t\wedge t_{\mathrm{st}}) \mapsto \frac{1}{\ensuremath{\varepsilon}}. \end{equation} \end{proof} \begin{lem} \label{lem:nls:st:sup:on:b:lin:i} Fix $T > 0$ and assume that (HDt), (HSt) and (HTw) all hold. Pick a constant $0< \ensuremath{\varepsilon} <2\beta$, then for any $0\leq \delta <1$ we have the bounds \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{lin}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) \frac{M^2}{2 \beta - \ensuremath{\varepsilon}} K_\k K_{B;\mathrm{lin}}^2 E \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \\[0.2cm] E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{lin}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) K_{B;\mathrm{lin}}^2 M^2 (1 + \rho^{-1}) e^{\ensuremath{\varepsilon}}( 3K_\k + 2 ) E \sup_{0 \le t \le t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) , \end{array} \end{equation} and \begin{equation} \begin{array}{lcl} E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{cn}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) \frac{M^2}{(2 \beta - \ensuremath{\varepsilon})\ensuremath{\varepsilon}} K_\k K_{B;\mathrm{cn}}^2 , \\[0.2cm] E \sup_{0 \le t \le t_{\mathrm{st}}} \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},\delta;B; \mathrm{cn}}(t) & \le & e^{\ensuremath{\varepsilon}} (T + 1) K_\k K_{B;\mathrm{cn}}^2 \frac{M^2}{\ensuremath{\varepsilon}} (1 + \rho^{-1}) e^{\ensuremath{\varepsilon}} ( 3K_\k + 2 ) . \end{array} \end{equation} \end{lem} \begin{proof} This follows directly from Lemmas 9.20 and 9.21 in \cite{Hamster2017}. \end{proof} \begin{proof}[Proof of Proposition \ref{prp:nls:general}] Pick $T >0$ and $0 < \eta < \eta_0$ and write $t_{\mathrm{st}} = t_{\mathrm{st}}(T,\ensuremath{\varepsilon}, \eta)$. Since the identities \sref{eq:MildNonProjZero} with $v = V(t\wedge t_{\mathrm{st}})$ hold for all $0 \le t \le T$, we may compute \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}}[N^i_{\ensuremath{\varepsilon};I}(t)] & \le & 7 E \sup_{0\leq t\leq t_{\mathrm{st}}} \Big[ \norm{\mathcal{E}_0(t)}_{L^2}^2 + \sigma^4 \norm{\mathcal{E}_{F;\mathrm{lin}}(t)}_{L^2}^2 + \norm{\mathcal{E}_{F;\mathrm{nl}}(t)}_{L^2}^2 \\[0.2cm] & & \qquad + \sigma^2 \norm{\mathcal{E}_{B;\mathrm{lin}}(t)}_{L^2}^2 + \sigma^2 \norm{\mathcal{E}_{B;\mathrm{cn}}(t)}_{L^2}^2 \\[0.2cm] & & \qquad + \norm{\mathcal{E}^{\mathrm{lt}}_{\mathrm{so}}(t)}_{L^2}^2 + \norm{\mathcal{E}^{\mathrm{st}}_{\mathrm{so}}(t)}_{L^2}^2 \Big] \end{array} \end{equation} by applying Young's inequality. The inequalities in Lemmas \ref{lem:ColPrevRes}-\ref{lem:nls:st:sup:on:b:lin:i} now imply that \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}}[N^i_{\ensuremath{\varepsilon};I}(t)] & \le & C_1 \big[ \norm{V(0)}_{H^1}^2 + (\eta+\sigma^2T + \sigma^4) \sup_{0\leq t\leq t_{\mathrm{st}}}N_{\ensuremath{\varepsilon};II}(t) \big]. \end{array} \end{equation} In addition, we note that \begin{equation} \begin{array}{lcl} E\sup_{0\leq t\leq t_{\mathrm{st}}} N^i_{\ensuremath{\varepsilon},0;II}(t) & \le & 11 E \sup_{0\leq t\leq t_{\mathrm{st}}} \Big[ \mathcal{I}_{\ensuremath{\varepsilon},0;0}(t) + \sigma^4 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;F;\mathrm{lin}}(t) + \sigma^4 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{lin}}(t) \\[0.2cm] & & \qquad \qquad + \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}}(t) + \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;F;\mathrm{nl}}(t) \\[0.2cm] & & \qquad \qquad + \sigma^2 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;B;\mathrm{lin}}(t) + \sigma^2 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;B;\mathrm{lin}}(t) \\[0.2cm] & & \qquad \qquad +\sigma^2 \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;B;\mathrm{cn}}(t) + \sigma^2 \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;B;\mathrm{cn}}(t) \\[0.2cm] & & \qquad \qquad + \mathcal{I}^{\mathrm{lt}}_{\ensuremath{\varepsilon},0;\mathrm{so}}(t) + \mathcal{I}^{\mathrm{sh}}_{\ensuremath{\varepsilon},0;\mathrm{so}}(t) \Big] . \end{array} \end{equation} The inequalities in Lemmas \ref{lem:ColPrevRes}-\ref{lem:nls:b:cn} now imply that \begin{equation} \begin{array}{lcl} E \sup_{0\leq t\leq t_{\mathrm{st}}}N^i_{\ensuremath{\varepsilon},0;II}(t) & \le & C_2 \big[ \norm{V(0)}_{H^1}^2 + \sigma^2 T + (\eta + \sigma^2 T + \sigma^4)\sup_{0\leq t\leq t_{\mathrm{st}}} N_{\ensuremath{\varepsilon};II}(t) \big]. \end{array} \end{equation} In particular, we see that \begin{equation} E \sup_{0\leq t\leq t_{\mathrm{st}}} N_\ensuremath{\varepsilon}^{i}(t) \le C_3 \big[ \norm{V(0)}_{H^1}^2 + \sigma^2T + (\eta + \sigma^2 T + \sigma^4) E\sup_{0\leq t\leq t_{\mathrm{st}}} N_{\ensuremath{\varepsilon}}(t) \big] . \end{equation} The desired bound hence follows by summing over $i$ and appropriately restricting the size of $\eta + \sigma^2T + \sigma^4$. \end{proof} \bibliographystyle{klunumHJ}
\section{Introduction} \label{sect-intro} We are carrying out a line of research in which issues relating to a wide variety of subjects from computer science are rigorously investigated thinking in terms of instruction sequences (see e.g.~\cite{SiteIS}). The groundwork for this line of research is the combination of an algebraic theory of single-pass instruction sequences, called program algebra, and an algebraic theory of mathematical objects that represent the behaviours produced by instruction sequences under execution, called basic thread algebra, extended to deal with the interaction between instruction sequences under execution and components of their execution environment (see~e.g.~\cite{BM12b}). This groundwork is parameterized by a set of basic instructions and a set of objects that represent the behaviours exhibited by the components of the execution environment. In various papers that have resulted from this line of research, use is made of an instantiation of this theory in which certain instructions to read out and alter the content of Boolean registers are taken as basic instructions and Boolean registers are taken as the components of the execution environment \mbox{(see \cite{BM13b,BM13a,BM14a,BM14e,BM13c,BM18a})}. In the current paper, we give a simplified presentation of the instantiation in which all possible instructions to read out and alter the content of Boolean registers are taken as basic instructions. In the papers referred to above, the rationale for taking certain instructions to read out and alter the content of Boolean registers as basic instructions is that the instructions concerned are sufficient to compute each function on bit strings of any fixed length by a finite instruction sequence. However, shorter instruction sequences may be possible if certain additional instructions to read out and alter the content of Boolean registers are taken as basic instructions (see~\cite{BM15a}). That is why we opted for the most general instantiation. Both program algebra and basic thread algebra were first presented in~\cite{BL02a} \footnote {In that paper and the first subsequent papers, basic thread algebra was introduced under the name basic polarized process algebra.} An extension of basic thread algebra to deal with the interaction between instruction sequences under execution and components of their execution environment, called services, was presented for the first time in~\cite{BP02a}. A substantial re-design of this extension was first presented in~\cite{BM09k}. The presentation of both extensions is rather involved because they are parameterized and owing to this cover a generic set of basic instructions and a generic set of services. In the current paper, a much less involved presentation is obtained by covering only the case where the basic instructions are instructions to read out and alter the content of Boolean registers and the services are Boolean registers. This paper is organized as follows. First, we introduce program algebra (Section~\ref{sect-PGA}) and basic thread algebra (Section~\ref{sect-BTA}) and extend their combination to make precise which behaviours are produced by instruction sequences under execution (Section~\ref{sect-TE-BC}). Next, we present the instantiation of the resulting theory in which all possible instructions to read out and alter Boolean registers are taken as basic instructions (Section~\ref{sect-PGAbr}), introduce an algebraic theory of Boolean register families (Section~\ref{sect-BRFA}), and extend the combination of the theories presented in the two preceding sections to deal with the interaction between instruction sequences under execution and Boolean registers (Section~\ref{sect-TSI}). Then, we formalize in the setting of the resulting theory what it means that a given instruction sequence computes a given partial function from $\Bool^n$ to $\Bool^m$ ($n,m \in \Nat$) (Section~\ref{sect-comput-bool-fnc}) and give a survey of uses for the resulting theory (Section~\ref{sect-work-done}). Finally, we make some concluding remarks (Section~\ref{sect-concl}). The following should be mentioned in advance. The set $\Bool$ is a set with two elements whose intended interpretations are the truth values \emph{false} and \emph{true}. As is common practice, we represent the elements of $\Bool$ by the bits $0$ and $1$. In line with generally accepted conventions, we use terminology based on identification of the elements of $\Bool$ with their representation where appropriate. For example, the elements of $\Bool^n$ are loosely called bit strings of length $n$. In this paper, some familiarity with algebraic specification is assumed. The relevant notions are explained in handbook chapters and books on algebraic specification, e.g.~\cite{EM85a,ST99a,ST12a,Wir90a}. This paper is to a large extent a compilation of material from several earlier publications. Various examples, various explanatory remarks, and the axioms from Section~\ref{sect-TSI} do not occur in earlier publications. \section{Program Algebra} \label{sect-PGA} In this section, we present \PGA\ (ProGram Algebra). The starting-point of \PGA\ is the perception of a program as a single-pass instruction sequence, i.e.\ a possibly infinite sequence of instructions of which each instruction is executed at most once and can be dropped after it has been executed or jumped over. The concepts underlying the primitives of program algebra are common in programming, but the particular form of the primitives is not common. The predominant concern in the design of \PGA\ has been to achieve simple syntax and semantics, while maintaining the expressive power of arbitrary finite control. It is assumed that a fixed but arbitrary set $\BInstr$ of \emph{basic instructions} has been given. $\BInstr$ is the basis for the set of instructions that may occur in the instruction sequences considered in \PGA. The intuition is that the execution of a basic instruction may modify a state and must produce the Boolean value $\False$ or $\True$ as reply at its completion. The actual reply may be state-dependent. In applications of \PGA, the instructions taken as basic instructions vary, in effect, from instructions relating to unbounded counters, unbounded stacks or Turing tapes through instructions relating to Boolean registers or natural number registers to machine language instructions of actual computers. The set of instructions of which the instruction sequences considered in \PGA\ are composed is the set that consists of the following elements: \begin{itemize} \item for each $a \in \BInstr$, a \emph{plain basic instruction} $a$; \item for each $a \in \BInstr$, a \emph{positive test instruction} $\ptst{a}$; \item for each $a \in \BInstr$, a \emph{negative test instruction} $\ntst{a}$; \item for each $l \in \Nat$, a \emph{forward jump instruction} $\fjmp{l}$; \item a \emph{termination instruction} $\halt$. \end{itemize} We write $\PInstr$ for this set. The elements from this set are called \emph{primitive instructions}. Primitive instructions are the elements of the instruction sequences considered in \PGA. On execution of such an instruction sequence, these primitive instructions have the following effects: \begin{itemize} \item the effect of a positive test instruction $\ptst{a}$ is that basic instruction $a$ is executed and execution proceeds with the next primitive instruction if $\True$ is produced and otherwise the next primitive instruction is skipped and execution proceeds with the primitive instruction following the skipped one --- if there is no primitive instruction to proceed with, inaction occurs; \item the effect of a negative test instruction $\ntst{a}$ is the same as the effect of $\ptst{a}$, but with the role of the value produced reversed; \item the effect of a plain basic instruction $a$ is the same as the effect of $\ptst{a}$, but execution always proceeds as if $\True$ is produced; \item the effect of a forward jump instruction $\fjmp{l}$ is that execution proceeds with the $l$th next primitive instruction --- if $l$ equals $0$ or there is no primitive instruction to proceed with, inaction occurs; \item the effect of the termination instruction $\halt$ is that execution terminates. \end{itemize} Inaction occurs if no more basic instructions are executed, but execution does not terminate. A plain basic instruction $a$ is generally used in the case of a basic instruction $a$ that modifies a state and a positive test instruction $\ptst{a}$ or a negative test instruction $\ntst{a}$ is generally used in the case of a basic instruction $a$ that does not modify a state. However, there are no rules prescribing such use. \PGA\ has one sort: the sort $\InSeq$ of \emph{instruction sequences}. We make this sort explicit to anticipate the need for many-sortedness later on. To build terms of sort $\InSeq$, \PGA\ has the following constants and operators: \begin{itemize} \item for each $u \in \PInstr$, the \emph{instruction} constant $\const{u}{\InSeq}$\,; \item the binary \emph{concatenation} operator $\funct{\ph \conc \ph}{\InSeq \x \InSeq}{\InSeq}$\,; \item the unary \emph{repetition} operator $\funct{\ph\rep}{\InSeq}{\InSeq}$\,. \end{itemize} Terms of sort $\InSeq$ are built as usual in the one-sorted case. We assume that there are infinitely many variables of sort $\InSeq$, including $X,Y,Z$. We use infix notation for concatenation and postfix notation for repetition. Taking these notational conventions into account, the syntax of closed \PGA\ terms (of sort $\InSeq$) can be defined in Backus-Naur style as follows: \begin{ldispl} \nm{CT}_\InSeq \Sis a \Sor \ptst{a} \Sor \ntst{a} \Sor \fjmp{l} \Sor \halt \Sor (\nm{CT}_\InSeq \conc \nm{CT}_\InSeq) \Sor ({\nm{CT}_\InSeq} \rep)\;, \end{ldispl where $a \in \BInstr$ and $l \in \Nat$ \footnote {We use $\nm{CT}_\mathbf{S}$, where $\mathbf{S}$ is a sort, as nonterminal standing for closed terms of sort~$\mathbf{S}$.} Throughout the paper, we generally omit grouping parentheses if they can be unambiguously added or they are unnecessary because it is axiomatized that the operator concerned stands for an associative operation. A \PGA\ term in which the repetition operator does not occur is called a \emph{repetition-free} \PGA\ term. A \PGA\ term that is not repetition-free is said to be a \PGA\ term that \emph{has a repeating part}. One way of thinking about closed \PGA\ terms is that they represent non-empty, possibly infinite sequences of primitive instructions with finitely many distinct suffixes. The instruction sequence represented by a closed term of the form $t \conc t'$ is the instruction sequence represented by $t$ concatenated with the instruction sequence represented by $t'$ \footnote {The concatenation of an infinite sequence with a finite or infinite sequence yields the former sequence.} The instruction sequence represented by a closed term of the form $t\rep$ is the instruction sequence represented by $t$ concatenated infinitely many times with itself. A closed \PGA\ term represents a finite instruction sequence if and only if it is a closed repetition-free \PGA\ term. A simple example of a closed \PGA\ term is \begin{ldispl} (\ntst{a} \conc (\fjmp{3} \conc (b \conc \halt)))\rep\;. \end{ldispl On execution of the infinite instruction sequence denoted by this term, first the basic instruction $a$ is executed repeatedly until its execution produces the reply $\True$, next the basic instruction $b$ is executed, and after that execution terminates. Because $(X \conc Y) \conc Z = X \conc (Y \conc Z)$ is an axiom of \PGA\ (see below), we could have written $(\ntst{a} \conc \fjmp{3} \conc b \conc \halt) \rep$ instead of $(\ntst{a} \conc (\fjmp{3} \conc (b \conc \halt)))\rep$ above. The axioms of \PGA\ are given in Table~\ref{axioms-PGA} \begin{table}[!t] \caption{Axioms of \PGA} \label{axioms-PGA} \begin{eqntbl} \begin{axcol} (X \conc Y) \conc Z = X \conc (Y \conc Z) & \axiom{PGA1} \\ (X^n)\rep = X\rep & \axiom{PGA2} \\ X\rep \conc Y = X\rep & \axiom{PGA3} \\ (X \conc Y)\rep = X \conc (Y \conc X)\rep & \axiom{PGA4} \eqnsep \fjmp{k{+}1} \conc u_1 \conc \ldots \conc u_k \conc \fjmp{0} = \fjmp{0} \conc u_1 \conc \ldots \conc u_k \conc \fjmp{0} & \axiom{PGA5} \\ \fjmp{k{+}1} \conc u_1 \conc \ldots \conc u_k \conc \fjmp{l} = \fjmp{l{+}k{+}1} \conc u_1 \conc \ldots \conc u_k \conc \fjmp{l} & \axiom{PGA6} \\ (\fjmp{l{+}k{+}1} \conc u_1 \conc \ldots \conc u_k)\rep = (\fjmp{l} \conc u_1 \conc \ldots \conc u_k)\rep & \axiom{PGA7} \\ \fjmp{l{+}k{+}k'{+}2} \conc u_1 \conc \ldots \conc u_k \conc (v_1 \conc \ldots \conc v_{k'{+}1})\rep = {} \\ \phantom{{}{+}k'} \fjmp{l{+}k{+}1} \conc u_1 \conc \ldots \conc u_k \conc (v_1 \conc \ldots \conc v_{k'{+}1})\rep & \axiom{PGA8} \end{axcol} \end{eqntbl} \end{table} In this table, $u$, $u_1,\ldots,u_k$ and $v_1,\ldots,v_{k'+1}$ stand for arbitrary primitive instructions from $\PInstr$, $k$, $k'$, and $l$ stand for arbitrary natural numbers from $\Nat$, and $n$ stands for an arbitrary natural number from $\Natpos$ \footnote {We write $\Natpos$ for the set $\set{n \in \Nat \where n \geq 1}$ of positive natural numbers.} For each $n \in \Natpos$, the term $t^n$, where $t$ is a \PGA\ term, is defined by induction on $n$ as follows: $t^1 = t$, and $t^{n+1} = t \conc t^n$. Some simple examples of equations derivable from the axioms of \PGA\ are \begin{ldispl} (a \conc b)\rep \conc c = a \conc (b \conc a)\rep\;, \\ \ptst{a} \conc (b \conc (\ntst{c} \conc \fjmp{2} \conc \halt)\rep)\rep = \ptst{a} \conc b \conc (\ntst{c} \conc \fjmp{2} \conc \halt)\rep\;. \end{ldispl Closed \PGA\ terms $t$ and $t'$ represent the same instruction sequence iff $t = t'$ is derivable from PGA1--PGA4. In this case, we say that the represented instruction sequences are \emph{instruction sequence congruent}. We write \PGAisc\ for the algebraic theory whose sorts, constants and operators are those of \PGA, but whose axioms are PGA1--PGA4. The informal explanation of closed \PGA\ terms as sequences of primitive instructions given above can be looked upon as a sketch of the intended model of the axioms of \PGAisc. This model, which is described in detail in, for example, \cite{BM12b}, is an initial model of the axioms of \PGAisc. The \emph{unfolding equation} $X\rep = X \conc X\rep$ is derivable from the axioms of \PGAisc\ by first taking the instance of PGA2 in which $n = 2$, then applying PGA4, and finally applying the instance of PGA2 in which $n = 2$ again. A closed \PGA\ term is in \emph{first canonical form} if it is of the form $t$ or $t \conc {t'}\rep$, where $t$ and $t'$ are closed repetition-free \PGA\ terms. The following proposition, proved in~\cite{BM12b}, relates \PGAisc\ and first canonical forms. \begin{proposition} \label{prop-1CF} For all closed \PGA\ terms $t$, there exists a closed \PGA\ term $t'$ that is in first canonical form such that $t = t'$ is derivable from the axioms of \PGAisc. \end{proposition} The examples given above of equations derivable from the axioms of \PGA\ are derivable from the axioms of \PGAisc\ only. Their left-hand sides are not in first canonical form and their right-hand sides are in first canonical form. Simple examples of equations derivable from the axioms of \PGA\ and not derivable from the axioms of \PGAisc\ are \begin{ldispl} \ntst{a} \conc \fjmp{2} \conc (\ptst{b} \conc \fjmp{2})\rep = \ntst{a} \conc \fjmp{0} \conc (\ptst{b} \conc \fjmp{0})\rep\;, \\ \ptst{a} \conc \fjmp{6} \conc b \conc (\ntst{c} \conc \fjmp{9})\rep = \ptst{a} \conc \fjmp{2} \conc b \conc (\ntst{c} \conc \fjmp{1})\rep\;. \end{ldispl Closed \PGA\ terms $t$ and $t'$ represent the same instruction sequence after changing all chained jumps into single jumps and making all jumps as short as possible iff $t = t'$ is derivable from PGA1--PGA8. In this case, we say that the represented instruction sequences are \emph{structurally congruent}. A closed \PGA\ term $t$ \emph{has chained jumps} if there exists a closed \PGA\ term $t'$ such that $t = t'$ is derivable from the axioms of \PGAisc\ and $t'$ contains a subterm of the form $\fjmp{n{+}1} \conc u_1 \conc \ldots \conc u_n \conc \fjmp{l}$. A closed \PGA\ term $t$ of the form $u_1 \conc \ldots \conc u_m \conc (v_1 \conc \ldots \conc v_k)\rep$ \emph{has shortest possible jumps} if: (i)~for each $i \in [1,m]$ for which $u_i$ is of the form $\fjmp{l}$, $l \leq k + m - i$; (ii)~for each $j \in [1,k]$ for which $v_j$ is of the form $\fjmp{l}$, $l \leq k - 1$. A closed \PGA\ term is in \emph{second canonical form} if it is in first canonical form, does not have chained jumps, and has shortest possible jumps if it has a repeating part. The following proposition, proved in~\cite{BM12b}, relates \PGA\ and second canonical forms. \begin{proposition} \label{prop-2CF} For all closed \PGA\ terms $t$, there exists a closed \PGA\ term $t'$ that is in second canonical form such that $t = t'$ is derivable from the axioms of \PGA. \end{proposition} The examples given above of equations derivable from the axioms of \PGA\ and not derivable from the axioms of \PGAisc\ have left-hand sides that are not in second canonical form and right-hand sides that are in second canonical form. Henceforth, the instruction sequences of the kind considered in \PGA\ are called \PGA\ instruction sequences. In Section~\ref{sect-TSI}, we will use the notation $\Conc{i = 1}{n} t_i$. For each $i \in \Natpos$, let $t_i$ be \PGA\ terms. Then, for each $n \in \Natpos$, the term $\Conc{i = 1}{n} t_i$ is defined by induction on $n$ as follows: $\Conc{i = 1}{1} t_i = t_1$ and $\Conc{i = 1}{n+1} t_i = \Conc{i = 1}{n} t_i \conc t_{n+1}$. \section{Basic Thread Algebra for Finite and Infinite Threads} \label{sect-BTA} In this section, we present \BTA\ (Basic Thread Algebra) and an extension of \BTA\ that reflects the idea that infinite threads are identical if their approximations up to any finite depth are identical. \BTA\ is concerned with mathematical objects that model in a direct way the behaviours produced by \PGA\ instruction sequences under execution. The objects in question are called threads. A thread models a behaviour that consists of performing basic actions in a sequential fashion. Upon performing a basic action, a reply from an execution environment determines how the behaviour proceeds subsequently. The possible replies are the Boolean values $\False$ and $\True$. The basic instructions from $\BInstr$ are taken as basic actions. Besides, $\Tau$ is taken as a special basic action. It is assumed that $\Tau \notin \BAct$. We write $\BActTau$ for $\BAct \union \set{\Tau}$. \BTA\ has one sort: the sort $\Thr$ of \emph{threads}. We make this sort explicit to anticipate the need for many-sortedness later on. To build terms of sort $\Thr$, \BTA\ has the following constants and operators: \begin{itemize} \item the \emph{inaction} constant $\const{\DeadEnd}{\Thr}$; \item the \emph{termination} constant $\const{\Stop}{\Thr}$; \item for each $\alpha \in \BActTau$, the binary \emph{postconditional composition} operator $\funct{\pcc{\ph}{\alpha}{\ph}}{\Thr \x \Thr}{\Thr}$. \end{itemize} Terms of sort $\Thr$ are built as usual in the one-sorted case. We assume that there are infinitely many variables of sort $\Thr$, including $x,y,z$. We use infix notation for postconditional composition. Taking this notational convention into account, the syntax of closed \BTA\ terms (of sort $\Thr$) can be defined in Backus-Naur style as follows: \begin{ldispl} \nm{CT}_\Thr \Sis \DeadEnd \Sor \Stop \Sor (\pcc{\nm{CT}_\Thr}{\alpha}{\nm{CT}_\Thr})\;, \end{ldispl where $\alpha \in \BActTau$. We introduce \emph{basic action prefixing} as an abbreviation: $\alpha \bapf t$, where $\alpha \in \BActTau$ and $t$ is a \BTA\ term, abbreviates $\pcc{t}{\alpha}{t}$. We treat an expression of the form $\alpha \bapf t$ and the \BTA\ term that it abbreviates as syntactically the same. Closed \BTA\ terms are considered to represent threads. The thread represented by a closed term of the form $\pcc{t}{\alpha}{t'}$ models the behaviour that first performs $\alpha$, and then proceeds as the behaviour modeled by the thread represented by $t$ if the reply from the execution environment is $\True$ and proceeds as the behaviour modeled by the thread represented by $t'$ if the reply from the execution environment is $\False$. Performing $\Tau$, which is considered performing an internal action, always leads to the reply $\True$. The thread represented by $\Stop$ models the behaviour that does nothing else but terminate and the thread represented by $\DeadEnd$ models the behaviour that is inactive, i.e.\ it performs no more basic actions and it does not terminate. A simple example of a closed \BTA\ term is \begin{ldispl} \pcc{(b \bapf \Stop)}{a}{\DeadEnd}\;. \end{ldispl This term denotes the thread that first performs basic action $a$, if the reply from the execution environment on performing $a$ is $\True$, it next performs the basic action $b$ and then terminates, and if the reply from the execution environment on performing $a$ is $\False$, it next becomes inactive. \BTA\ has only one axiom. This axiom is given in Table~\ref{axioms-BTA}. \begin{table}[!t] \caption{Axioms of \BTA} \label{axioms-BTA} \begin{eqntbl} \begin{axcol} \pcc{x}{\Tau}{y} = \pcc{x}{\Tau}{x} & \axiom{T1} \end{axcol} \end{eqntbl} \end{table} Using the abbreviation introduced above, it can also be written as follows: $\pcc{x}{\Tau}{y} = \Tau \bapf x$. Each closed \BTA\ term represents a finite thread, i.e.\ a thread with a finite upper bound to the number of basic actions that it can perform. Infinite threads, i.e.\ threads without a finite upper bound to the number of basic actions that it can perform, can be defined by means of a set of recursion equations (see e.g.~\cite{BM09k}). A simple example of a set of recursion equations that consists of a single equation is \begin{ldispl} x = \pcc{(b \bapf \Stop)}{a}{x}\;. \end{ldispl Its solution is the thread that first repeatedly performs basic action $a$ until the reply from the execution environment on performing $a$ is $\True$, next performs the basic action $b$ and then terminates. A regular thread is a finite or infinite thread that can be defined by means of a finite set of recursion equations. The behaviours produced by \PGA\ instruction sequences under execution are exactly the behaviours modeled by regular threads. Two infinite threads are considered identical if their approximations up to any finite depth are identical. The approximation up to depth $n$ of a thread models the behaviour that differs from the behaviour modeled by the thread in that it will become inactive after it has performed $n$ actions unless it would terminate at this point. AIP (Approximation Induction Principle) is a conditional equation that formalizes the above-mentioned view on infinite threads. In AIP, the approximation up to depth $n$ is phrased in terms of the unary \emph{projection} operator $\funct{\proj{n}}{\Thr}{\Thr}$. The axioms for the projection operators and AIP are given in Table~\ref{axioms-BTAinf}. \begin{table}[!b] \caption{Axioms for the projection operators and AIP} \label{axioms-BTAinf} \begin{eqntbl} \begin{axcol} \proj{0}(x) = \DeadEnd & \axiom{PR1} \\ \proj{n+1}(\DeadEnd) = \DeadEnd & \axiom{PR2} \\ \proj{n+1}(\Stop) = \Stop & \axiom{PR3} \\ \proj{n+1}(\pcc{x}{\alpha}{y}) = \pcc{\proj{n}(x)}{\alpha}{\proj{n}(y)} & \axiom{PR4} \eqnsep \LAND{n \geq 0} \proj{n}(x) = \proj{n}(y) \Limpl x = y & \axiom{AIP} \end{axcol} \end{eqntbl} \end{table} In this table, $\alpha$ stands for an arbitrary basic action from $\BActTau$ and $n$ stands for an arbitrary natural number from $\Nat$. We write \BTAinf\ for \BTA\ extended with the projection operators, the axioms for the projection operators, and AIP. By AIP, we have to deal in \BTAinf\ with conditional equational formulas with a countably infinite number of premises. Therefore, infinitary conditional equational logic is used in deriving equations from the axioms of \BTAinf. A complete inference system for infinitary conditional equational logic can be found in, for example, \cite{GV93}. For a simple example of the use of the axioms for the projection operators and AIP, we consider the (recursion) equations $x = a \bapf x$ and $y = a \bapf a \bapf y$. With these equations as hypotheses, the following equations are derivable from the axioms for the projection operators: \begin{ldispl} \begin{array}[t]{@{}l@{\qquad}l} \proj{0}(x) = \DeadEnd\;, & \proj{0}(y) = \DeadEnd\;, \\ \proj{1}(x) = a \bapf \DeadEnd\;, & \proj{1}(y) = a \bapf \DeadEnd\;, \\ \proj{2}(x) = a \bapf a \bapf \DeadEnd\;, & \proj{2}(y) = a \bapf a \bapf \DeadEnd\;, \\ \proj{3}(x) = a \bapf a \bapf a \bapf \DeadEnd\;, & \proj{3}(y) = a \bapf a \bapf a \bapf \DeadEnd\;, \\ \phantom{\proj{3}(y) = a \bapf a \bapf a \bapf \DeadEnd\;,} \quad \vdots \end{array} \end{ldispl Hence, the conditional equation $x = a \bapf x \Land y = a \bapf a \bapf y \Limpl x = y$ is derivable from the axioms for the projection operators and AIP. This conditional equation tells us that the recursion equations $x = a \bapf x$ and $y = a \bapf a \bapf y$ have the same solution. \section{Thread Extraction and Behavioural Congruence} \label{sect-TE-BC} In this section, we make precise in the setting of \BTAinf\ which behaviours are produced by \PGA\ instruction sequences under execution and introduce the notion of behavioural congruence on \PGA\ instruction sequences. To make precise which behaviours are produced by \PGA\ instruction sequences under execution, we introduce an operator $\extr{\ph}$ meant for extracting from each \PGA\ instruction sequence the thread that models the behaviour produced by it under execution. For each closed \PGA\ term $t$, $\extr{t}$ represents the thread that models the behaviour produced by the instruction sequence represented by $t$ under execution. Formally, we combine \PGA\ with \BTAinf\ and extend the combination with the \emph{thread extraction} operator $\funct{\extr{\ph}}{\InSeq}{\Thr}$ and the axioms given in Table~\ref{axioms-thread-extr} \begin{table}[!t] \caption{Axioms for the thread extraction operator} \label{axioms-thread-extr} \begin{eqntbl} \begin{axcol} \extr{a} = a \bapf \DeadEnd & \axiom{TE1} \\ \extr{a \conc X} = a \bapf \extr{X} & \axiom{TE2} \\ \extr{\ptst{a}} = a \bapf \DeadEnd & \axiom{TE3} \\ \extr{\ptst{a} \conc X} = \pcc{\extr{X}}{a}{\extr{\fjmp{2} \conc X}} & \axiom{TE4} \\ \extr{\ntst{a}} = a \bapf \DeadEnd & \axiom{TE5} \\ \extr{\ntst{a} \conc X} = \pcc{\extr{\fjmp{2} \conc X}}{a}{\extr{X}} & \axiom{TE6} \end{axcol} \qquad \begin{axcol} \extr{\fjmp{l}} = \DeadEnd & \axiom{TE7} \\ \extr{\fjmp{0} \conc X} = \DeadEnd & \axiom{TE8} \\ \extr{\fjmp{1} \conc X} = \extr{X} & \axiom{TE9} \\ \extr{\fjmp{l+2} \conc u} = \DeadEnd & \axiom{TE10} \\ \extr{\fjmp{l+2} \conc u \conc X} = \extr{\fjmp{l+1} \conc X} & \axiom{TE11} \\ \extr{\halt} = \Stop & \axiom{TE12} \\ \extr{\halt \conc X} = \Stop & \axiom{TE13} \end{axcol} \end{eqntbl} \end{table} In this table, $a$ stands for an arbitrary basic instruction from $\BInstr$, $u$ stands for an arbitrary primitive instruction from $\PInstr$, and $l$ stands for an arbitrary natural number from $\Nat$. We write \PGABTA\ for the combination of \PGA\ and \BTAinf\ extended with the thread extraction operator and the axioms for the thread extraction operator. The syntax of closed \PGABTA\ terms of sort $\Thr$ can be defined in Backus-Naur style as follows: \begin{ldispl} \nm{CT}'_\Thr \Sis \DeadEnd \Sor \Stop \Sor (\pcc{\nm{CT}'_\Thr}{\alpha}{\nm{CT}'_\Thr}) \Sor \extr{\nm{CT}_\InSeq}\;, \end{ldispl where $\alpha \in \BActTau$. $\nm{CT}_\InSeq$ is defined in Section~\ref{sect-PGA}. A simple example of thread extraction is \begin{ldispl} \extr{\ptst{a} \conc \fjmp{2} \conc \fjmp{3} \conc b \conc \halt} = \pcc{(b \bapf \Stop)}{a}{\DeadEnd}\;. \end{ldispl In the case of infinite instruction sequences, thread extraction yields threads definable by means of a set of recursion equations. For example, \begin{ldispl} \extr{(\ptst{a} \conc \fjmp{2} \conc \fjmp{3} \conc b \conc \halt)\rep} \end{ldispl is the solution of the set of recursion equations that consists of the single equation \begin{ldispl} x = \pcc{(b \bapf \Stop)}{a}{x}\;. \end{ldispl If a closed \PGA\ term $t$ represents an instruction sequence that starts with an infinite chain of forward jumps, then TE9 and TE11 can be applied to $\extr{t}$ infinitely often without ever showing that a basic action is performed. In this case, we have to do with inaction and, being consistent with that, $\extr{t} = \DeadEnd$ is derivable from the axioms of \PGA\ and TE1--TE13. By contrast, $\extr{t} = \DeadEnd$ is not derivable from the axioms of \PGAisc\ and TE1--TE13. However, if closed \PGA\ terms $t$ and $t'$ represent instruction sequences in which no infinite chains of forward jumps occur, then $t = t'$ is derivable from the axioms of \PGA\ only if $\extr{t} = \extr{t'}$ is derivable from the axioms of \PGAisc\ and TE1--TE13. If a closed \PGA\ term $t$ represents an infinite instruction sequence, then we can extract the approximations of the thread modeling the behaviour produced by that instruction sequence under execution up to every finite depth: for each $n \in \Nat$, there exists a closed \BTA\ term $t''$ such that $\proj{n}(\extr{t}) = t''$ is derivable from the axioms of \PGA, TE1--TE13, the axioms of \BTA, and PR1--PR4. If closed \PGA\ terms $t$ and $t'$ represent infinite instruction sequences that produce the same behaviour under execution, then this can be proved using the following instance of AIP: $\LAND{n \geq 0} \proj{n}(\extr{t}) = \proj{n}(\extr{t'}) \Limpl \extr{t} = \extr{t'}$. \PGA\ instruction sequences are behaviourally equivalent if they produce the same behaviour under execution. Behavioural equivalence is not a congruence. Instruction sequences are behaviourally congruent if they produce the same behaviour irrespective of the way they are entered and the way they are left. Let $t$ and $t'$ be closed \PGA\ terms. Then: \begin{itemize} \item $t$ and $t'$ are \emph{behaviourally equivalent}, written $t \beqv t'$, if $\extr{t} = \extr{t'}$ is derivable from the axioms of \PGABTA. \item $t$ and $t'$ are \emph{behaviourally congruent}, written $t \bcong t'$, if, for each $l,n \in \Nat$, $\fjmp{l} \conc t \conc \halt^n \beqv \fjmp{l} \conc t' \conc \halt^n$ \footnote {We use the convention that $t \conc {t'}^0$ stands for $t$.} \end{itemize} Some simple examples of behavioural equivalence are \begin{ldispl} a \conc \fjmp{2} \conc \ptst{b} \conc \halt \beqv a \conc \fjmp{2} \conc \ptst{c} \conc \halt\;, \\ (\ptst{a} \conc \fjmp{2} \conc \fjmp{3} \conc b \conc \halt)\rep \beqv (\ntst{a} \conc \fjmp{3} \conc b \conc \halt)\rep\;. \end{ldispl We cannot lift these examples to behavioural congruence, i.e. \begin{ldispl} a \conc \fjmp{2} \conc \ptst{b} \conc \halt \not\bcong a \conc \fjmp{2} \conc \ptst{c} \conc \halt\;, \\ (\ptst{a} \conc \fjmp{2} \conc \fjmp{3} \conc b \conc \halt)\rep \not\bcong (\ntst{a} \conc \fjmp{3} \conc b \conc \halt)\rep\;. \end{ldispl A simple example of behavioural congruence is \begin{ldispl} (\ptst{a} \conc \fjmp{3} \conc \fjmp{2} \conc b)\rep \bcong (\ntst{a} \conc \fjmp{3} \conc \fjmp{2} \conc b)\rep\;. \end{ldispl It is proved in~\cite{BM12b} that each closed \PGA\ term is behaviourally equivalent to a term of the form $t\rep$, where $t$ is a closed repetition-free \PGA\ term. \begin{proposition} \label{prop-ICF} For all closed \PGA\ terms $t$, there exists a closed repetition-free \PGA\ term $t'$ such that $t \beqv {t'}\rep$. \end{proposition} Behavioural congruence is the largest congruence contained in behavioural equivalence. Moreover, structural congruence implies behavioural congruence. \begin{proposition} \label{prop-scongr-bequiv} For all closed \PGA\ terms $t$ and $t'$, $t = t'$ is derivable from the axioms of \PGA\ only if $t \bcong t'$. \end{proposition} \begin{proof} The proof is basically the proof of Proposition~2.2 from~\cite{BM12b}. In that proof use is made of the uniqueness of solutions of sets of recursion equations where each right-hand side is a \BTA\ term of the form $\DeadEnd$, $\Stop$ or $\pcc{s}{\alpha}{s'}$ with \BTA\ terms $s$ and $s'$ that contain only variables occurring as one of the right-hand sides. This uniqueness follows from AIP (see also Corollary~2.1 from~\cite{BM12b}). \qed \end{proof} Conversely, behavioural congruence does not imply structural congruence. For example, $\ptst{a} \conc \halt \conc \halt \bcong \ntst{a} \conc \halt \conc \halt$, but $\ptst{a} \conc \halt \conc \halt = \ntst{a} \conc \halt \conc \halt$ is not derivable from the axioms of \PGA. In~\cite{BM17a}, we present an equational axiom system for behavioural congruence that is sound for closed \PGA\ terms and complete for closed repetition-free \PGA\ terms. The following proposition, proved in~\cite{BM12b}, puts the expressiveness of \PGA\ in terms of producible behaviours. \begin{proposition} \label{prop-expr} Let $\mathcal{M}$ be a model of \PGABTA. Then, for each element $p$ from the domain associated with the sort $\Thr$ in $\mathcal{M}$, there exists a closed \PGA\ term $t$ such that $p$ is the interpretation of $\extr{t}$ in $\mathcal{M}$ iff $p$ is a component of the solution of a finite set of recursion equations $\set{V = t_V \where V \in \mathcal{V}}$, where $\mathcal{V}$ is a set of variables of sort $\Thr$ and each $t_V$ is a \BTA\ term that is not a variable and contains only variables from~$\mathcal{V}$. \end{proposition} More results on the expressiveness of \PGA\ can be found in~\cite{BM12b}. \section{The Case of Instructions for Boolean Registers} \label{sect-PGAbr} In this section, we present the instantiation of \PGA\ in which all possible instructions to read out and alter Boolean registers are taken as basic instructions. In this instantiation, it is assumed that a fixed but arbitrary set $\Foci$ of \emph{foci} has been given. Foci serve as names of Boolean registers. The set of basic instructions used in this instantiation consists of the following: \begin{itemize} \item for each $f \in \Foci$ and $\funct{p,q}{\Bool}{\Bool}$, a \emph{basic Boolean register instruction} $f.\mbr{p}{q}$. \end{itemize} We write $\BInstrbr$ for this set. Each basic Boolean register instruction consists of two parts separated by a dot. The part on the left-hand side of the dot plays the role of the name of a Boolean register and the part on the right-hand side of the dot plays the role of an operation to be carried out on the named Boolean register when the instruction is executed. The intuition is basically that carrying out the operation concerned modifies the content of the named Boolean register and produces as a reply a Boolean value that depends on the content of the named Boolean register. More precisely, the execution of a basic Boolean register instruction $f.\mbr{p}{q}$ has the following effects: \begin{itemize} \item if the content of the Boolean register named $f$ is $b$ when the execution of $f.\mbr{p}{q}$ starts, then its content is $q(b)$ when the execution of $f.\mbr{p}{q}$ terminates; \item if the content of the Boolean register named $f$ is $b$ when the execution of $f.\mbr{p}{q}$ starts, then the reply produced on termination of the execution of $f.\mbr{p}{q}$ is $p(b)$. \end{itemize} The execution of $f.\mbr{p}{q}$ has no effect on the content of Boolean registers other than the one named $f$. $\Bool \to \Bool$, the set of all unary Boolean functions, consists of the following four functions: \begin{itemize} \item the function $\FFunc$, satisfying $\FFunc(\False) = \False$ and $\FFunc(\True) = \False$; \item the function $\TFunc$, satisfying $\TFunc(\False) = \True$ and $\TFunc(\True) = \True$; \item the function $\IFunc$, satisfying $\IFunc(\False) = \False$ and $\IFunc(\True) = \True$; \item the function $\CFunc$, satisfying $\CFunc(\False) = \True$ and $\CFunc(\True) = \False$. \end{itemize} In~\cite{BM13b,BM13a,BM14a,BM13c,BM18a}, we actually used the operations $\mbr{\FFunc}{\FFunc}$, $\mbr{\TFunc}{\TFunc}$, and $\mbr{\IFunc}{\IFunc}$, but denoted them by $\setbr{0}$, $\setbr{1}$ and $\getbr$, respectively. In~\cite{BM14e}, we actually used, in addition to these operations, the operation $\mbr{\CFunc}{\CFunc}$, but denoted it by $\negbr$. Two examples of peculiar operations are $\mbr{\FFunc}{\IFunc}$ and $\mbr{\TFunc}{\IFunc}$. Carrying out one of these operations on a Boolean register does not modify the content of the Boolean register and produces as a reply, irrespective of the content of the Boolean register, always the same Boolean value. We write $\PGABTAbr$ for \PGABTA\ with $\BInstr$ instantiated by $\BInstrbr$. Notice that $\PGABTAbr$ is itself parameterized by a set of foci. In the papers just mentioned, $\Foci$ is instantiated by \begin{ldispl} \set{\inbr{i} \where i \in \Natpos} \union \set{\outbri{i} \where i \in \Natpos} \union \set{\auxbr{i} \where i \in \Natpos} \end{ldispl if the computation of functions from $\Bool^n$ to $\Bool^m$ with $m > 1$ is in order and \begin{ldispl} \set{\inbr{i} \where i \in \Natpos} \union \set{\outbr} \union \set{\auxbr{i} \where i \in \Natpos} \end{ldispl if only the computation of functions from $\Bool^n$ to $\Bool$ is in order. These foci are employed as follows: \begin{itemize} \item the foci of the form $\inbr{i}$ serve as names of Boolean registers that are used as input registers in instruction sequences; \item the foci of the form $\outbri{i}$ and $\outbr$ serve as names of Boolean registers that are used as output registers in instruction sequences; \item the foci of the form $\auxbr{i}$ serve as names of Boolean registers that are used as auxiliary registers in instruction sequences. \end{itemize} The above sets of foci are just examples of sets by which $\Foci$ may be instantiated. In the algebraic theories presented in Sections~\ref{sect-BRFA} and~\ref{sect-TSI}, $\Foci$ is not instantiated. \section{Boolean Register Families} \label{sect-BRFA} \PGA\ instruction sequences under execution may interact with the named Bool\-ean registers from a family of Boolean registers provided by their execution environment. In this section, we introduce an algebraic theory of Boolean register families called \BRFA\ (Boolean Register Family Algebra). Boolean register families are reminiscent of the Boolean register files found in the central processing unit of a computer (see e.g.~\cite{SGA89a}). In \BRFA, as in $\PGABTAbr$, it is assumed that a fixed but arbitrary set $\Foci$ of foci has been given. \BRFA\ has one sort: the sort $\BRegFam$ of \emph{Boolean register families}. To build terms of sort $\BRegFam$, \BRFA\ has the following constants and operators: \begin{itemize} \item the \emph{empty Boolean register family} constant $\const{\emptysf}{\BRegFam}$; \item for each $f \in \Foci$ and $b \in \Bool \union \set{\Div}$, the \emph{singleton Boolean register family} constant $\const{f.\br{b}}{\BRegFam}$; \item the binary \emph{Boolean register family composition} operator $\funct{\ph \sfcomp \ph}{\BRegFam \x \BRegFam}{\BRegFam}$; \item for each $F \subseteq \Foci$, the unary \emph{encapsulation} operator $\funct{\encap{F}}{\BRegFam}{\BRegFam}$. \end{itemize} We assume that there are infinitely many variables of sort $\BRegFam$, including $u,v,w$. We use infix notation for the Boolean register family composition operator. Taking this notational convention into account, the syntax of closed \BRFA\ terms (of sort $\BRegFam$) can be defined in Backus-Naur style as follows: \begin{ldispl} \nm{CT}_\BRegFam \Sis \emptysf \Sor f.\br{b} \Sor (\nm{CT}_\BRegFam \sfcomp \nm{CT}_\BRegFam) \Sor \encap{F}(\nm{CT}_\BRegFam)\;, \end{ldispl where $f \in \Foci$, $b \in \Bool \union \set{\Div}$, and $F \subseteq \Foci$. The Boolean register family denoted by $\emptysf$ is the empty Boolean register family. The Boolean register family denoted by a closed term of the form $f.\br{b}$, where $b \in \Bool$, consists of one named Boolean register only, the Boolean register concerned is an operative Boolean register named $f$ whose content is $b$. The Boolean register family denoted by a closed term of the form $f.\br{\Div}$ consists of one named Boolean register only, the Boolean register concerned is an inoperative Boolean register named $f$. The Boolean register family denoted by a closed term of the form $t \sfcomp t'$ consists of all named Boolean registers that belong to either the Boolean register family denoted by $t$ or the Boolean register family denoted by $t'$. In the case where a named Boolean register from the Boolean register family denoted by $t$ and a named Boolean register from the Boolean register family denoted by $t'$ have the same name, they collapse to an inoperative Boolean register with the name concerned. The Boolean register family denoted by a closed term of the form $\encap{F}(t)$ consists of all named Boolean registers with a name not in $F$ that belong to the Boolean register family denoted by $t$. A simple example of a Boolean register family is \begin{ldispl} \auxbr{8}.\br{1} \sfcomp \auxbr{7}.\br{1} \sfcomp \auxbr{6}.\br{0} \sfcomp \auxbr{5}.\br{0} \\ \quad {} \sfcomp \auxbr{4}.\br{1} \sfcomp \auxbr{3}.\br{1} \sfcomp \auxbr{2}.\br{1} \sfcomp \auxbr{1}.\br{0}\;. \end{ldispl This Boolean register family can be seen as a storage cell whose content is the bit string $01110011$. Taking the content of such storage cells for binary representations of natural numbers, the functions on bit strings of length $8$ that model addition, subtraction, and multiplication modulo $2^8$ of natural numbers less than~$2^8$ can be computed using the instructions for Boolean registers introduced in Section~\ref{sect-PGAbr}. An inoperative Boolean register can be viewed as a Boolean register whose content is unavailable. Carrying out an operation on an inoperative Boolean register is impossible. The axioms of \BRFA\ are given in Table~\ref{axioms-BRFA} \begin{table}[!b] \caption{Axioms of \BRFA} \label{axioms-BRFA} { \begin{eqntbl} \begin{axcol} u \sfcomp \emptysf = u & \axiom{BRFC1} \\ u \sfcomp v = v \sfcomp u & \axiom{BRFC2} \\ (u \sfcomp v) \sfcomp w = u \sfcomp (v \sfcomp w) & \axiom{BRFC3} \\ f.\br{b} \sfcomp f.\br{b'} = f.\br{\Div} & \axiom{BRFC4} \end{axcol} \quad \begin{saxcol} \encap{F}(\emptysf) = \emptysf & & \axiom{BRFE1} \\ \encap{F}(f.\br{b}) = \emptysf & \mif f \in F & \axiom{BRFE2} \\ \encap{F}(f.\br{b}) = f.\br{b} & \mif f \notin F & \axiom{BRFE3} \\ \multicolumn{2}{@{}l@{\quad}} {\encap{F}(u \sfcomp v) = \encap{F}(u) \sfcomp \encap{F}(v)} & \axiom{BRFE4} \end{saxcol} \end{eqntbl} } \end{table} In this table, $f$ stands for an arbitrary focus from $\Foci$, $F$ stands for an arbitrary subset of $\Foci$, and $b$ and $b'$ stand for arbitrary values from $\Bool \union \set{\Div}$. These axioms simply formalize the informal explanation given above. The following two propositions, proved in~\cite{BM12b}, concern an elimination result and a representation result for closed \BRFA\ terms. \begin{proposition} \label{prop-elim-encap} For all closed \BRFA\ terms $t$, there exists a closed \BRFA\ term $t'$ in which encapsulation operators do not occur such that $t = t'$ is derivable from the axioms of \BRFA. \end{proposition} \begin{proposition} \label{prop-represent} For all closed \BRFA\ terms $t$, for all $f \in \Foci$, either $t = \encap{\set{f}}(t)$ is derivable from the axioms of \BRFA\ or there exists a $b \in \Bool \union \set{\Div}$ such that $t = f.\br{b} \sfcomp \encap{\set{f}}(t)$ is derivable fron the axioms of \BRFA. \end{proposition} In Section~\ref{sect-comput-bool-fnc}, we will use the notation $\Sfcomp{i = 1}{n} t_i$. For each $i \in \Natpos$, let $t_i$ be a terms of sort $\BRegFam$. Then, for each $n \in \Natpos$, the term $\Sfcomp{i = 1}{n} t_i$ is defined by induction on $n$ as follows: $\Sfcomp{i = 1}{1} t_i = t_1$ and $\Sfcomp{i = 1}{n+1} t_i = \Sfcomp{i = 1}{n} t_i \sfcomp t_{n+1}$. \section{Interaction of Threads with Boolean Registers} \label{sect-TSI} A \PGA\ instruction sequence under execution may interact with the named Bool\-ean registers from the family of Boolean registers provided by its execution environment. In line with this kind of interaction, a thread may perform a basic action basically for the purpose of modifying the content of a named Boolean register or receiving a reply value that depends on the content of a named Boolean register. In this section, we introduce related operators. We combine $\PGABTA(\BInstrbr)$ with \BRFA\ and extend the combination with the following operators for interaction of threads with Boolean registers: \begin{itemize} \item the binary \emph{use} operator $\funct{\ph \sfuse \ph}{\Thr \x \BRegFam}{\Thr}$; \item the binary \emph{apply} operator $\funct{\ph \sfapply \ph}{\Thr \x \BRegFam}{\BRegFam}$; \item the unary \emph{abstraction} operator $\funct{\abstr{\Tau}}{\Thr}{\Thr}$; \end{itemize} and the axioms given in Tables~\ref{axioms-use-apply} \footnote {We write $t[t'/x]$ for the result of substituting term $t'$ for variable $x$ in term $t$.} \begin{table}[!t] \caption{Axioms for the use, apply and abstraction operator} \label{axioms-use-apply} \begin{eqntbl} \begin{saxcol} \Stop \sfuse u = \Stop & \axiom{U1} \\ \DeadEnd \sfuse u = \DeadEnd & \axiom{U2} \\ (\Tau \bapf x) \sfuse u = \Tau \bapf (x \sfuse u) & \axiom{U3} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfuse \encap{\set{f}}(u) = \pcc{(x \sfuse \encap{\set{f}}(u))} {f.\mbr{p}{q}}{(y \sfuse \encap{\set{f}}(u))} & \axiom{U4} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfuse (f.\br{b} \sfcomp \encap{\set{f}}(u)) = \Tau \bapf (x \sfuse (f.\br{q(b)} \sfcomp \encap{\set{f}}(u))) & \mif p(b) = \True & \axiom{U5} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfuse (f.\br{b} \sfcomp \encap{\set{f}}(u)) = \Tau \bapf (y \sfuse (f.\br{q(b)} \sfcomp \encap{\set{f}}(u))) & \mif p(b) = \False & \axiom{U6} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfuse (f.\br{\Div} \sfcomp \encap{\set{f}}(u)) = \DeadEnd & \axiom{U7} \\ \proj{n}(x \sfuse u) = \proj{n}(x) \sfuse u & \axiom{U8} \eqnsep \Stop \sfapply u = u & \axiom{A1} \\ \DeadEnd \sfapply u = \emptysf & \axiom{A2} \\ (\Tau \bapf x) \sfapply u = \Tau \bapf (x \sfapply u) & \axiom{A3} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfapply \encap{\set{f}}(u) = \emptysf & \axiom{A4} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfapply (f.\br{b} \sfcomp \encap{\set{f}}(u)) = x \sfapply (f.\br{q(b)} \sfcomp \encap{\set{f}}(u)) & \mif p(b) = \True & \axiom{A5} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfapply (f.\br{b} \sfcomp \encap{\set{f}}(u)) = y \sfapply (f.\br{q(b)} \sfcomp \encap{\set{f}}(u)) & \mif p(b) = \False & \axiom{A6} \\ (\pcc{x}{f.\mbr{p}{q}}{y}) \sfapply (f.\br{\Div} \sfcomp \encap{\set{f}}(u)) = \emptysf & \axiom{A7} \\ \LAND{k \geq n} t[\proj{k}(x)/z] = s[\proj{k}(y)/z] \Limpl t[x/z] = s[y/z] & \axiom{A8} \eqnsep \abstr{\Tau}(\Stop) = \Stop & \axiom{C1} \\ \abstr{\Tau}(\DeadEnd) = \DeadEnd & \axiom{C2} \\ \abstr{\Tau}(\Tau \bapf x) = \abstr{\Tau}(x) & \axiom{C3} \\ \abstr{\Tau}(\pcc{x}{f.\mbr{p}{q}}{y}) = \pcc{\abstr{\Tau}(x)}{f.\mbr{p}{q}}{\abstr{\Tau}(y)} & \axiom{C4} \\ \LAND{n \geq 0}{} \abstr{\Tau}(\proj{n}(x)) = \abstr{\Tau}(\proj{n}(y)) \Limpl \abstr{\Tau}(x) = \abstr{\Tau}(y) & \axiom{C5} \end{saxcol} \end{eqntbl} \end{table} In these tables, $f$ stands for an arbitrary focus from $\Foci$, $p$ and $q$ stand for arbitrary Boolean functions from $\Bool \to \Bool$, $b$ stands for an arbitrary Boolean value from $\Bool$, $n$ stands for an arbitrary natural number from $\Nat$, and $t$ and $s$ stand for arbitrary terms of sort $\BRegFam$. We use infix notation for the use and apply operators. We write \PGABTABRI\ for the combination of \PGABTAbr\ and \BRFA\ extended with the use operator, the apply operator, the abstraction operator, and the axioms for these operators. The syntax of closed \PGABTABRI\ terms of sort $\Thr$ and $\BRegFam$ can be defined in Backus-Naur style as follows: \begin{ldispl} \nm{CT}''_\Thr \Sis \DeadEnd \Sor \Stop \Sor (\pcc{\nm{CT}''_\Thr}{\alpha}{\nm{CT}''_\Thr}) \Sor \extr{\nm{CT}_\InSeq} \\ \phantom{\nm{CT}''_\Thr}\quad {} \Sor (\nm{CT}''_\Thr \sfuse \nm{CT}'_\BRegFam) \Sor \abstr{\Tau}(\nm{CT}''_\Thr) \;, \eqnsep \nm{CT}'_\BRegFam \Sis \emptysf \Sor f.\br{b} \Sor (\nm{CT}'_\BRegFam \sfcomp \nm{CT}'_\BRegFam) \Sor \encap{F}(\nm{CT}'_\BRegFam) \\ \phantom{\nm{CT}''_\BRegFam}\quad {} \Sor (\nm{CT}''_\Thr \sfapply \nm{CT}'_\BRegFam)\;, \end{ldispl where $\alpha \in \BInstrbr \union \set{\Tau}$, $f \in \Foci$, $b \in \Bool \union \set{\Div}$, $F \subseteq \Foci$. $\nm{CT}_\InSeq$ is defined in Section~\ref{sect-PGA}. Axioms U1--U7 and A1--A7 formalize the informal explanation of the use operator and the apply operator given below and in addition stipulate what is the result of apply if an unavailable focus is involved~(A4) and what is the result of use and apply if an inoperative Boolean register is involved (U7 and A7). Axioms U8 and A8 allow of reasoning about infinite threads, and therefore about the behaviour produced by infinite instruction sequences under execution, in the context of use and apply, respectively. On interaction between a thread and a Boolean register, the thread affects the Boolean register and the Boolean register affects the thread. The use operator concerns the effects of Boolean registers on threads and the apply operator concerns the effects of threads on Boolean registers. The thread denoted by a closed term of the form $t \sfuse t'$ and the Boolean register family denoted by a closed term of the form $t \sfapply t'$ are the thread and Boolean register family, respectively, that result from carrying out the operation that is part of each basic action performed by the thread denoted by $t$ on the Boolean register in the Boolean register family denoted by $t'$ with the focus that is part of the basic action as its name. When the operation that is part of a basic action performed by a thread is carried out on a Boolean register, the content of the Boolean register is modified according to the operation concerned and the thread is affected as follows: the basic action turns into the internal action $\Tau$ and the two ways to proceed reduce to one on the basis of the reply value produced according to the operation concerned. With the use operator the internal action $\Tau$ is left as a trace of each basic action that has led to carrying out an operation on a Boolean register. The abstraction operator serves to abstract fully from such internal activity by concealing $\Tau$. Axioms C1--C4 formalizes the concealment of $\Tau$. Axiom C5 allows of reasoning about infinite threads in the context of abstraction. A simple example of use and apply is \begin{ldispl} \extr {\Conc{i = 1}{4} (\ntst{\auxbr{i}.\mbr{\IFunc}{\IFunc}} \conc \fjmp{3} \conc \auxbr{i}.\mbr{\FFunc}{\FFunc} \conc \halt \conc \auxbr{i}.\mbr{\TFunc}{\TFunc})} \\ \quad {} \sfuse \auxbr{4}.\br{1} \sfcomp \auxbr{3}.\br{1} \sfcomp \auxbr{2}.\br{1} \sfcomp \auxbr{1}.\br{0} \\ {} = \Tau \bapf \Tau \bapf \Tau \bapf \Tau \bapf \Stop\;, \eqnsep \extr {\Conc{i = 1}{4} (\ntst{\auxbr{i}.\mbr{\IFunc}{\IFunc}} \conc \fjmp{3} \conc \auxbr{i}.\mbr{\FFunc}{\FFunc} \conc \halt \conc \auxbr{i}.\mbr{\TFunc}{\TFunc})} \\ \quad {} \sfapply \auxbr{4}.\br{1} \sfcomp \auxbr{3}.\br{1} \sfcomp \auxbr{2}.\br{1} \sfcomp \auxbr{1}.\br{0} \\ {} = \auxbr{4}.\br{1} \sfcomp \auxbr{3}.\br{1} \sfcomp \auxbr{2}.\br{0} \sfcomp \auxbr{1}.\br{1}\;. \end{ldispl In this example, the behaviour of the instructions sequence under execution affects the Boolean registers from the Boolean register family such that it corresponds to decrement by one on the natural number represented by the combined content of the Boolean registers. The equations show that, if the combined content of the Boolean registers represents $14$, (a)~the Boolean registers reduces the behaviour of the instruction sequence under execution to termination after four internal actions and (b)~the behaviour of the instruction sequence under execution modifies the combined content of the Boolean registers to the binary representation of $13$. The following two propositions are about elimination results for closed \PGABTABRI\ terms. \sloppy \begin{proposition} \label{prop-elim-use} For all closed \PGABTABRI\ terms $t$ of sort $\Thr$ in which all subterms of sort $\InSeq$ are repetition-free, there exists a closed \PGABTAbr\ term $t'$ of sort $\Thr$ such that $t = t'$ is derivable from the axioms of \PGABTABRI. \end{proposition} \begin{proof} It is easy to prove by structural induction that, for all closed rep\-etition-free \PGABTAbr\ terms $s$ of sort $\InSeq$, there exists a closed \PGABTAbr\ term $s'$ of sort $\Thr$ such that $\extr{s} = s'$ is derivable from the axioms of \PGABTAbr. Therefore, it is sufficient to prove the proposition for all closed \PGABTABRI\ terms $t$ of sort $\Thr$ in which no subterms of sort $\InSeq$ occur. This is proved similarly to part~(1) of Theorem~3.1 from~\cite{BM12b}. \qed \end{proof} \begin{proposition} \label{prop-elim-apply} For all closed \PGABTABRI\ terms $t$ of sort $\BRegFam$ in which all subterms of sort $\InSeq$ are repetition-free, there exists a closed \PGABTAbr\ term $t'$ of sort $\BRegFam$ such that $t = t'$ is derivable from the axioms of \PGABTABRI. \end{proposition} \begin{proof} As in the proof of Proposition~\ref{prop-elim-use}, it is sufficient to prove the proposition for all closed \PGABTABRI\ terms $t$ of sort $\BRegFam$ in which no subterms of sort $\InSeq$ occur. This is proved similarly to part~(2) of Theorem~3.1 from~\cite{BM12b}. \qed \end{proof} \section{Computing Partial Functions from $\Bool^n$ to $\Bool^m$} \label{sect-comput-bool-fnc} In this section, we make precise in the setting of the algebraic theory \PGABTABRI\ what it means that a given instruction sequence computes a given partial function from $\Bool^n$ to $\Bool^m$ ($n,m \in \Nat$). For each $n,m \in \Nat$, we define the following set: \begin{ldispl} \Focibr{n}{m} = \set{\inbr{i} \where 1 \leq i \leq n} \union \set{\auxbr{i} \where i \geq 1} \union \set{\outbri{i} \where 1 \leq i \leq m}\;. \; \end{ldispl We use the instantiation of \PGABTABRI\ in which the set of foci is $\UNION{n,m \in \Nat} \Focibr{n}{m}$. We write $\Focibrall$ for this set and we write \PGABTABRIiao\ for \PGABTABRI\ with $\Foci$ instantiated by $\Focibrall$. Let $n,m \in \Nat$, let $\pfunct{F}{\Bool^n}{\Bool^m}$ \footnote {We write $\pfunct{f}{\Bool^n}{\Bool^m}$ to indicate that $f$ is partial function from $\Bool^n$ to $\Bool^m$.} and let $t$ be a closed repetition-free \PGABTABRIiao\ term of sort $\InSeq$ in which only foci from $\Focibr{n}{m}$ occur. Then $t$ \emph{computes} $F$ if there exists a $k \in \Nat$ such that: \begin{itemize} \item for all $b_1,\ldots,b_n,b'_1,\ldots,b'_m \in \Bool$ with $F(b_1,\ldots,b_n) = b'_1,\ldots,b'_m$: \begin{ldispl} (\extr{t} \sfuse ((\Sfcomp{i=1}{n} \inbr{i}.\br{b_i}) \sfcomp (\Sfcomp{i=1}{k} \auxbr{i}.\br{\False}))) \sfapply (\Sfcomp{i=1}{m} \outbri{i}.\br{\False}) \\ \quad {} = \Sfcomp{i=1}{m} \outbri{i}.\br{b'_i}\;; \end{ldispl \item for all $b_1,\ldots,b_n \in \Bool$ with $f(b_1,\ldots,b_n)$ undefined: \begin{ldispl} (\extr{t} \sfuse ((\Sfcomp{i=1}{n} \inbr{i}.\br{b_i}) \sfcomp (\Sfcomp{i=1}{k} \auxbr{i}.\br{\False}))) \sfapply (\Sfcomp{i=1}{m} \outbri{i}.\br{\False}) \\ \quad {} = \emptysf\;. \end{ldispl \end{itemize} With this definition, we can establish whether an instruction sequence of the kind considered in \PGABTABRIiao\ computes a given partial function from $\Bool^n$ to $\Bool^m$ ($n,m \in \Nat$) by equational reasoning using the axioms of \PGABTABRIiao. The following proposition tells us that, for each partial function from $\Bool^n$ to $\Bool^m$, there exists an instruction sequence of the kind considered here that computes it. \begin{proposition} \label{prop-comput-bool-fnc} For all $n,m \in \Nat$, for all $\pfunct{F}{\Bool^n}{\Bool^m}$, there exists a closed repetition-free \PGABTABRIiao\ term $t$ in which only basic instructions of the forms $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$, and $f.\mbr{\IFunc}{\IFunc}$ with $f \in \Focibr{n}{m}$ occur such that $t$ computes $F$. \end{proposition} \begin{proof} As an immediate corollary of the proof of Theorem~5.6 in~\cite{BM12b} we have the following: for all $n,m \in \Nat$, for all $\funct{F}{\Bool^n}{\Bool^m}$, there exists a closed repetition-free \PGABTABRIiao\ term $t$ in which only basic instructions of the forms $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$, and $f.\mbr{\IFunc}{\IFunc}$ with $f \in \Focibr{n}{m}$ occur such that $t$ computes $F$. It is easy to see from the same proof that this corollary generalizes from total functions to partial functions. \qed \end{proof} The following proposition tells us that an instruction sequence in which not only basic instructions of the forms $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$, and $f.\mbr{\IFunc}{\IFunc}$ occur can be transformed primitive instruction by primitive instruction to an at most linearly longer instruction sequence computing the same function in which only basic instructions of the forms $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$, and $f.\mbr{\IFunc}{\IFunc}$ occur. The \emph{functional equivalence} relation $\feqv$ on the set of all closed repetition-free \PGABTABRIiao\ terms of sort $\InSeq$ is defined by $t \feqv t'$ iff there exist $n,m \in \Nat$ such that: \begin{itemize} \item $t$ and $t'$ are terms in which only foci from $\Focibr{n}{m}$ occur; \item there exists a $\pfunct{F}{\Bool^n}{\Bool^m}$ such that $t$ computes $F$ and $t'$ com\-putes $F$. \end{itemize} \begin{proposition} \label{prop-restr-instr-set} There exists a unary function $\phi$ on the set of all closed repetition-free \PGABTABRIiao\ terms of sort $\InSeq$ such that: \begin{itemize} \item $\phi$ is the homomorphic extension of a function $\phi'$ from the set of all \PGABTABRIiao\ constants of sort $\InSeq$ to the set of all closed repetition-free \PGABTABRIiao\ terms of sort $\InSeq$; \item for all closed repetition-free \PGABTABRIiao\ terms $t$ of sort $\InSeq$: \begin{itemize} \item $t \feqv \phi(t)$; \item $\phi(t)$ is a term in which only basic instructions of the forms $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$, and $f.\mbr{\IFunc}{\IFunc}$ occur; \item $\phi(t)$ is at most $3 \cdot p$ primitive instructions longer than $t$, where $p$ the number of occurrences of basic instructions in $t$ that are not of the form $f.\mbr{\FFunc}{\FFunc}$, $f.\mbr{\TFunc}{\TFunc}$ or $f.\mbr{\IFunc}{\IFunc}$. \end{itemize} \end{itemize} \end{proposition} \begin{proof} It follows immediately from part~(3) of Proposition~3.1 in~\cite{BM12b} that the definition of $\feqv$ given above is a reformulation of the instance of the definition of $\feqv$ given in~\cite{BM15a} where the set $\Foci$ of foci is instantiated by $\Focibrall$. This makes the current proposition a corollary of Proposition~2 and Theorem~3 in~\cite{BM15a}. \qed \end{proof} The view put forward in this section on what it means in the setting of \PGABTABRI\ that a given instruction sequence computes a given partial function from $\Bool^n$ to $\Bool^m$ ($n,m \in \Nat$) is the view taken in the work on complexity of computational problems, efficiency of algorithms, and algorithmic equivalence of programs presented in~\cite{BM13b,BM13a,BM14a,BM14e,BM13c,BM18a}. We remark that Boolean registers cannot only be used to compute partial functions from $\Bool^n$ to $\Bool^m$. For example, it is shown in~\cite{BM08h} that jump instruction are not necessary if use can be made of Boolean registers. \section{Uses for the Theory} \label{sect-work-done} In this section, we give a survey of uses for \PGABTABRI. It is often said that a program is an instruction sequence and, if this characterization has any value, it must be the case that it is somehow easier to understand the concept of an instruction sequence than to understand the concept of a program. The first objective of the work on instruction sequences that started with~\cite{BL02a}, and of which an enumeration is available at~\cite{SiteIS}, is to understand the concept of a program. The basis of all this work is the parameterized algebraic theory \PGABTA\ extended to deal with the interaction between instruction sequences under execution and components of their execution environment. The body of theory developed through this work is such that its use as a conceptual preparation for programming is practically feasible. The notion of an instruction sequence appears in the work in question as a mathematical abstraction for which the rationale is based on the objective mentioned above. In this capacity, instruction sequences constitute a primary field of investigation in programming comparable to propositions in logic and rational numbers in arithmetic. The structure of the mathematical abstraction at issue has been determined in advance with the hope of applying it in diverse circumstances where in each case the fit may be less than perfect. Until now, the work in question has, among other things, yielded an approach to computational complexity where program size is used as complexity measure, a contribution to the conceptual analysis of the notion of an algorithm, and new insights into such diverse issues as the halting problem, program parallelization for the purpose of explicit multi-threading and virus detection. The work done in the setting of \PGABTABRI, which is just an instantiation of the above-mentioned basis, includes: \begin{itemize} \item Work yielding an approach to computational complexity in which algorithmic problems are viewed as families of functions that consist of a function from $\Bool^n$ to $\Bool$ for each natural number n and the complexity of such problems is assessed in terms of the length of instruction sequences that compute the members of these families. Several kinds of non-uniform complexity classes have been introduced. One kind includes a counterpart of the well-known complexity class P/poly and another kind includes a counterpart of the well-known complexity class NP/poly (see~\cite{BM13a}). \item Work contributing to the conceptual analysis of the notion of an algorithm. Two equivalence relations on instruction sequences have been defined, an algorithmic equivalence relation and a computational equivalence relation. The algorithmic equivalence relation captures to a reasonable degree the intuitive notion that two instruction sequences express the same algorithm. Any equivalence relation that captures the notion that two instruction sequences express the same algorithm to a higher degree must be finer than the computational equivalence relation (see~\cite{BM14a}). \item Work showing that, in the case of computing the parity function on bit strings of length $n$, for each natural number $n$, shorter instruction sequences are possible with the use of an auxiliary Boolean register than without the use of auxiliary Boolean registers. This result supports, in a setting where programs are instruction sequences acting on Boolean registers, a basic intuition behind the storage of auxiliary data, namely the intuition that this makes possible a reduction of the size of a program (see~\cite{BM14e}). \item Work providing mathematically precise alternatives to the natural language and pseudo code descriptions of the long multiplication algorithm and the Karatsuba multiplication algorithm. One established result is that the instruction sequence expressing the latter algorithm is shorter than the instruction sequence expressing the former algorithm only if the length of the bit strings involved is greater than 256. Another result is that in a setting with backward jump instructions the long multiplication algorithm can be expressed by an instruction sequence that is shorter than both these instruction sequences if the length of the bit strings involved is greater than 2 (see~\cite{BM13c}). \item Work showing that the problem of deciding whether an instruction sequence computes the function modeling the non-zeroness test on natural numbers less than $2^n$ with respect to their binary representation by bit strings of length $n$, for natural number $n$, can only be efficiently solved under the restriction that the length of the instruction sequence is close to the length of the shortest possible instruction sequences that compute this function (see~\cite{BM18a}). \end{itemize} \section{Concluding Remarks} \label{sect-concl} We have presented the theory underlying a considerable part of the work done so far in a line of research in which issues relating to a wide variety of subjects from computer science are rigorously investigated thinking in terms of instruction sequences. The distinguishing feature of this presentation is that it is less involved than previous presentations. Sections~\ref{sect-PGA}, \ref{sect-BTA}, and~\ref{sect-TE-BC} concern the part of the presented theory that is relevant to all the work done so far in the line of research referred~to. The restriction to instructions that operate on Boolean registers is a classical restrictions in computer science. Other such classical restrictions are the restriction to instructions that operate on natural number registers in register machines and the restriction to instructions that operate on Turing tapes in Turing machines (see e.g.~\cite{HMU07a}). Adaptation of Sections~\ref{sect-PGAbr}, \ref{sect-BRFA}, and~\ref{sect-TSI} to these restrictions is rather straightforward (cf.~\cite{BM09k}). Notice that we have fixed in Section~\ref{sect-comput-bool-fnc}, for each use of a Boolean register that must be distinguished to make precise what it means that a given instruction sequence computes a given partial function from $\Bool^n$ to $\Bool^m$ ($n,m \in \Nat$), the focus by which the Boolean register for that use is named. Because of this and the required generality, the possibility that the same Boolean register is used as both input register and output register is excluded. Exclusion of possibilities like this can be circumvented by abandoning the fixed assignment of foci to register uses and defining ``$t$ computes $f$'' relative to an assignment of foci to register uses. This approach complicates matters, but seems indispensable to find conclusive answers to open questions like ``what are the shortest instruction sequences that compute the function on bit strings of length $n$ that models addition modulo $2^n$ on natural numbers less than $2^n$, for $n \in \Natpos$?''. The instruction sequences with instructions for Boolean registers considered in this paper constitute essentially a programming language in which all variables are Boolean variables. Such programming languages are actually used in toolkits for software model checking that make use of the abstract interpretation technique known as predicate abstraction (see e.g.~\cite{BR00b,BR01a}). \subsection*{Acknowledgements} We thank an anonymous referee for carefully reading a preliminary version of this paper, for pointing out some slips made in it, and for posing questions that have led to improvements of the presentation. \bibliographystyle{splncs03}
\section{Introduction} Regression, which estimates the value of a dependent variable (output) from one or more independent variables (predictors, features, inputs), is a common problem in machine learning. To build an accurate regression model, one needs to have some labeled training samples, i.e., samples whose dependent and independent variable values are both known. Generally the more the labeled training samples are, the better the regression performance is. However, in real-world many times it is relatively easy to obtain the values of the inputs, but time-consuming or expensive to label them. For example, in speech emotion estimation \cite{drwuICME2010,drwuInterSpeech2010} in the 3-dimensional space of valance, arousal and dominance \cite{Mehrabian1980}, it is easy to record a large number of voice pieces, but time-consuming to evaluate their emotions \cite{Grimm2008,Bradley2007}. Another example is driver drowsiness estimation from physiological signals such as the electroencephalogram (EEG) \cite{drwuTFS2017,drwuEBMAL2016,drwuSMLR2016}. It is relatively easy to collect a large number of EEG trials, but not easy to obtain their groundtruth drowsiness. There are at least three different directions for performing regression based on a small number of labeled training samples: \begin{enumerate} \item \emph{Regularization} \cite{Zou2005,Hastie2009}, which introduces additional information to improve the generalization performance. For example, ridge regression (RR) \cite{Hoerl1970} and LASSO \cite{Tibshirani1996} penalize large regression coefficients. \item \emph{Transfer learning} \cite{Pan2010}, which uses data or information from related domains/tasks to improve the regression performance. For example, labeled EEG data from other subjects could be used to improve the drowsiness estimation performance for a new subject \cite{drwuTFS2017,drwuaBCI2015}. \item \emph{Active learning} \cite{Settles2009}, which selects the most beneficial unlabeled samples to label, instead of random selection. For example, batch-mode active learning has been employed for EEG-based driver drowsiness estimation \cite{drwuEBMAL2016}. \end{enumerate} This paper focuses on the third direction, i.e., active learning for regression (ALR). Particularly, we consider sequential pool-based ALR \cite{Sugiyama2009}, in which a pool of unlabeled samples is given, and the goal is to sequentially choose some to label, so that a regression model trained from them can give the most accurate estimates for the remaining unlabeled samples. Compared with the large literature on active learning for classification, there are only a few approaches for sequential pool-based ALR \cite{Burbidge2007,Cai2013,Yu2010}. This paper proposes two new ALR approaches, inspired by the greedy sampling (GS) approach in \cite{Yu2010}. Extensive experiments on 12 UCI and CMU StatLib datasets from various domains, and on 15 subjects on EEG-based driver drowsiness estimation, verified their effectiveness and robustness. The remainder of this paper is organized as follows: Section~\ref{sect:GSALR} introduces the original GS ALR approach, and proposes two new ALR algorithms. Section~\ref{sect:UCI} describes the 12 UCI and CMU StatLib datasets for evaluating the effectiveness of different ALR approaches, and the corresponding experimental results. Section~\ref{sect:Driving} describes the offline EEG-based driver drowsiness estimation experiment for evaluating the effectiveness of different ALR approaches, and the corresponding experimental results. Finally, Section~\ref{sect:conclusions} draws conclusions and points out some future research directions. \section{Greedy Sampling ALR Approaches} \label{sect:GSALR} In this section we introduce an existing GS ALR approach in the literature, and propose two new ALR approaches. \subsection{Greedy Sampling on the Inputs (GSx)} \label{sect:GS} Yu and Kim \cite{Yu2010} proposed four passive sampling approaches for regression. Different from most ALR approaches, which generally require updating the regression model in each iteration and computing the predictions for the unlabeled samples, passive sampling selects the sample based entirely on its location in the feature space. Thus, it is independent of the regression model, and has low computational cost. Among the several passive sampling approaches in \cite{Yu2010}, GS achieved the best overall performance. However, the original GS approach did not explain how the first sample was selected. This subsection introduces GSx, which is essentially the same as GS, except that it also includes a strategy to select the first sample for labeling. Assume the pool consists of $N$ samples $\{\mathbf{x}_n\}_{n=1}^N$, initially none of which is labeled. Our goal is to select $K$ of them to label, and then construct an accurate regression model from them to estimate the outputs for the remaining $N-K$ samples. GSx selects the first sample as the one closest to the centroid of all $N$ samples (i.e., the one with the shortest distance to the remaining $N-1$ samples), and the remaining $K-1$ samples incrementally. The idea is to make the first selection most representative. Without loss of generality, assume the first $k$ samples have already been selected. For each of the remaining $N-k$ unlabeled samples $\{\mathbf{x}_n\}_{n=k+1}^N$, GSx computes first its distance to each of the $k$ labeled samples: \begin{align} d_{nm}^{\mathbf{x}}=||\mathbf{x}_n-\mathbf{x}_m||,\quad m=1,...,k; n=k+1,...,N \label{eq:dnmx} \end{align} then $d_n^{\mathbf{x}}$, the shortest distance from $\mathbf{x}_n$ to all $k$ labeled samples: \begin{align} d_n^{\mathbf{x}}=\min_m d_{nm}^{\mathbf{x}},\quad n=k+1,...,N \label{eq:dnx} \end{align} and finally selects the sample with the maximum $d_n^{\mathbf{x}}$ to label. In summary, GSx selects the first sample as the one closest to the centroid of the pool, and in each subsequent iteration a new sample located furthest away from all previously selected samples in the input space to achieve the diversity among the selected samples. Its pseudo-code is given in Algorithm~\ref{alg:GSx}. \begin{algorithm}[!h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{The regression model $f(\mathbf{x})$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K-1$ more samples incrementally} \For{$k=1,...,K-1$}{ \For{$n=k+1,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label all $K$ samples in $S$\; Construct the regression model $f(\mathbf{x})$ from $S$. \caption{The GSx ALR approach, slightly modified from GS in \cite{Yu2010} on the initialization.} \label{alg:GSx} \end{algorithm} \subsection{Greedy Sampling on the Output (GSy)} \label{sect:GSy} GSx achieves diversity in the input space. Our proposed GSy aims to achieve diversity in the output space. Like GSx, in GSy initially the pool consists of $N$ unlabeled samples and zero labeled sample. To evaluate the diversity in the output space, we need to know the outputs (labels) of all samples, either true or estimated. In other words, GSy cannot be applied before $K_0$ labeled samples are obtained, where $K_0$ is the minimum number of labeled samples required to build a regression model. In this paper we set $K_0$ as the number of features in the input space, and use GSx to select the first $K_0$ samples to label. Assume the first $k$ ($k\ge K_0$) samples have already been labeled with outputs $\{y_m\}_{m=1}^k$, and a regression model $f(\mathbf{x})$ has been constructed. For each of the remaining $N-k$ unlabeled sample $\{\mathbf{x}_n\}_{n=k+1}^N$, GSy computes first its distance to each of the $k$ outputs: \begin{align} d_{nm}^y=||f(\mathbf{x}_n)-y_m||,\quad m=1,...,k; n=k+1,...,N \label{eq:dnmy} \end{align} and $d_n^y$, the shortest distance from $f(\mathbf{x}_n)$ to $\{y_m\}_{m=1}^k$: \begin{align} d_n^y=\min_m d_{nm}^y,\quad n=k+1,...,N \label{eq:dny} \end{align} and then selects the sample with the maximum $d_n^y$ to label. In summary, GSy selects the first a few samples using GSx to build an initial regression model, and then in each subsequent iteration a new sample located furthest away from all previously selected samples in the output space to achieve diversity among the selected samples. Its pseudo-code is given in Algorithm~\ref{alg:GSy}. Note that GSy is no longer a passive sampling approach, because it needs to update $f(\mathbf{x})$ in each iteration. \begin{algorithm}[!h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{The regression model $f(\mathbf{x})$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GSx} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}}$ in (\ref{eq:dnx})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$\; Construct the regression model $f(\mathbf{x})$ from $S$\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^y$ in (\ref{eq:dny})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^y$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the regression model $f(\mathbf{x})$ using $S$.} \caption{The GSy ALR approach.} \label{alg:GSy} \end{algorithm} \renewcommand{\baselinestretch}{1.5} The rationale for GSy can be illustrated by the following simple example shown in Figure~\ref{fig:GSy}. Assume the input space has only two dimensions, and we have only four samples: \begin{align} \mathbf{x}_1&=(x_{11},x_{12})^T\\ \mathbf{x}_2&=(x_{21},x_{22})^T\\ \mathbf{x}_3&=(x_{31},x_{32})^T=(x_{11}+\delta,x_{12})^T\\ \mathbf{x}_4&=(x_{41},x_{42})^T=(x_{11},x_{12}+\delta)^T \end{align} where the first two have labels $y_1$ and $y_2$, respectively, the last two are unlabeled, and $\delta$ is a small number. A regression function $f(\mathbf{x})$ is built from $(\mathbf{x}_1,y_1)$ and $(\mathbf{x}_2,y_2)$. We want to select $\mathbf{x}_3$ or $\mathbf{x}_4$ to label so that the estimation error of $f(\mathbf{x})$ on the four samples can be maximally reduced. \begin{figure}[!h]\centering \includegraphics[width=.8\linewidth,clip]{GSy.eps} \caption{Illustration of GSy. GSy will select $\mathbf{x}_3$ to label if the 1st predictor is more sensitive (important) than the 2nd, and $\mathbf{x}_4$ otherwise.} \label{fig:GSy} \end{figure} For simplicity, assume both $f(\mathbf{x}_3)$ and $f(\mathbf{x}_4)$ are closer to $y_1$ than to $y_2$, so we only need to consider their distances to $y_1$ in GSy. The sensitivity of $f(\mathbf{x})$ to the first predictor, evaluated around $\mathbf{x}_1$, can be approximated as \begin{align} s_1=\frac{|f(\mathbf{x}_3)-y_1|}{|x_{31}-x_{11}|}=\frac{|f(\mathbf{x}_3)-y_1|}{|\delta|} \end{align} Similarly, the sensitivity of $f(\mathbf{x})$ to the second predictor, evaluated also around $\mathbf{x}_1$, can be approximated as \begin{align} s_2=\frac{|f(\mathbf{x}_4)-y_1|}{|x_{42}-x_{12}|}=\frac{|f(\mathbf{x}_4)-y_1|}{|\delta|} \end{align} When $|s_1|>|s_2|$, which means $f(\mathbf{x})$ is more sensitive to the first predictor than to the second, we should select a sample that can help refine the first regression coefficient for labeling. Generally the more diverse the values of the first predictor are, the more accurate its regression coefficient can be determined. So, in this case we should select $\mathbf{x}_3$ for labeling. Note that $|s_1|>|s_2|$ implies $|f(\mathbf{x}_3)-y_1|>|f(\mathbf{x}_4)-y_1|$. According to the procedure of GSy, indeed $\mathbf{x}_3$ will be selected. Similarly, when $|s_1|<|s_2|$, GSy will correctly select $\mathbf{x}_4$ for labeling. \subsection{Improved Greedy Sampling (iGS) on both Inputs and Output} \label{sect:iGS} GSx considers only the diversity in the input (feature) space, by computing the minimum distance between an unlabeled sample and all existing labeled samples, using all features. However, maybe not all features are useful; even if all features are useful, they may have different importance. GSx does not take feature selection/weighting into consideration. GSy considers only the diversity in the output (label) space, by computing the minimum distance between the estimated output for a sample and all existing outputs. Our example in the previous subsection shows that GSy tries to select a new sample that can significantly increase the diversity of the most sensitive predictor. Thus, it implicitly considers feature selection/weighting. However, the predictor sensitivities are evaluated using $f(\mathbf{x})$ constructed from a very small number of labeled samples, so they may not be very accurate. In other words, feature selection/weighting in GSy may not be reliable. In this subsection we propose an improved greedy sampling (iGS) approach, which combines GSx and GSy, to ensure that we take feature selection/weighting into consideration, but can also avoid catastrophic failure if feature selection/weighting is misleading. Like GSx and GSy, initially the pool consists of $N$ unlabeled samples and zero labeled sample. In iGS we again set $K_0$ to be the number of features in the input space, and use GSx to select the first $K_0$ samples to label. Assume the first $k$ samples have already been labeled with labels $\{y_n\}_{n=1}^k$. For each of the remaining $N-k$ unlabeled sample $\{\mathbf{x}_n\}_{n=k+1}^N$, iGS computes first $d_{nm}^{\mathbf{x}}$ in (\ref{eq:dnmx}) and $d_{nm}^y$ in (\ref{eq:dnmy}), and $d_n^{\mathbf{x}y}$: \begin{align} d_n^{\mathbf{x}y}=\min_m d_{nm}^{\mathbf{x}}d_{nm}^y,\quad n=k+1,...,N \label{eq:dnxy} \end{align} and then selects the sample with the maximum $d_n^{\mathbf{x}y}$ to label. In summary, iGS selects the first a few samples using GSx to build an initial regression model, and then in each subsequent iteration a new sample located furthest away from all previously selected samples in both input and output spaces to achieve balanced diversity among the selected samples. Its pseudo-code is given in Algorithm~\ref{alg:iGS}. Note that iGS is no longer a passive sampling approach, because it needs to update $f(\mathbf{x})$ in each iteration. \begin{algorithm}[!h] \KwIn{$N$ unlabeled samples, $\{\mathbf{x}_n\}_{n=1}^N$\; \hspace*{10mm} $K$, the maximum number of labels to query.} \KwOut{The regression model $f(\mathbf{x})$.} \tcp{Initialize the first selection} Set $Z=\{\mathbf{x}_n\}_{n=1}^N$, and $S=\emptyset$\; Identify $\mathbf{x}'$, the sample closest to the centroid of $Z$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the sample in $S$ as $\mathbf{x}_1$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=2}^N$\; \tcp{Select $K_0-1$ more samples incrementally using GSx} Identify $K_0$, the minimum number of labeled samples required to construct $f(\mathbf{x})$\; \For{$k=1,...,K_0-1$}{ \For{$n=k,...,N$}{ Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}}$\;} Move $\mathbf{x}'$ from $Z$ to $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\;} Query to label the $K_0$ samples in $S$\; Construct the regression model $f(\mathbf{x})$ from $S$\; \tcp{Select $K-K_0$ more samples incrementally} \For{$k=K_0,...,K-1$}{ \For{$n=k,...,N$}{ Compute $d_n^{\mathbf{x}y}$ in (\ref{eq:dnxy})\;} Identify the $\mathbf{x}'$ that has the largest $d_n^{\mathbf{x}y}$\; Move $\mathbf{x}'$ from $Z$ to $S$\; Query to label $\mathbf{x}'$ in $S$\; Re-index the samples in $S$ as $\{\mathbf{x}_m\}_{m=1}^{k+1}$, and the samples in $Z$ as $\{\mathbf{x}_n\}_{n=k+2}^N$\; Update the regression model $f(\mathbf{x})$ using $S$.} \caption{The iGS ALR approach.} \label{alg:iGS} \end{algorithm} \renewcommand{\baselinestretch}{1.5} \section{Experiments on UCI and CMU StatLib Datasets} \label{sect:UCI} Extensive experiments on 12 UCI and CMU StatLib datasets are performed in this section to demonstrate the performances of GSy and iGS. \subsection{Datasets} We used 12 datasets from the UCI Machine Learning Repository\footnote{\url{http://archive.ics.uci.edu/ml/index.php}} and the CMU StatLib Datasets Archive\footnote{\url{http://lib.stat.cmu.edu/datasets/}} that have been used in previous ALR experiments \cite{Cai2013,Cai2017,Yu2010,drwuSAL2018}. Their summary is given in Table~\ref{tab:datasets}. We used one-hot coding to convert categorical features into numerical features. Then, we normalized each dimension of the feature space to have mean zero and standard deviation one. \begin{table}[!h] \caption{Summary of the 12 UCI and CMU StatLib datasets.} \label{tab:datasets} \centering \setlength{\tabcolsep}{1mm} \begin{threeparttable} \begin{tabular}{l|cccccc} \hline & & No. of & No. of & No. of & No. of & No. of \\ Dataset & Source& samples & raw & numerical & categorical & total \\ & & & features & features & features & features \\ \hline Concrete-CS\tnote{1} & UCI & 103 & 7 &7 &0 & 7 \\ Concrete-Flow\tnote{1} & UCI & 103 & 7 &7 &0 & 7 \\ Concrete-Slump\tnote{1}\hspace*{1mm} & UCI & 103 & 7 &7 &0 & 7 \\ Yacht\tnote{2} & UCI & 308 & 6&6 & 0& 6\\ autoMPG\tnote{3} & UCI & 392 & 7 & 6 & 1 & 9 \\ NO2\tnote{4} & StatLib & 500 & 7 & 7 & 0 & 7 \\ PM10\tnote{4} & StatLib & 500 & 7 & 7 & 0 & 7 \\ Housing\tnote{5} & UCI & 506 & 13 & 13 & 0 & 13 \\ CPS\tnote{6} & StatLib & 534 & 11 & 8 &3 & 19 \\ Concrete\tnote{7}& UCI & 1030 & 8 & 8 & 0 & 8 \\ Wine-red\tnote{8} & UCI & 1599 & 11 & 11 & 0 & 11 \\ Wine-white\tnote{8} & UCI & 4898 & 11 & 11 & 0 & 11 \\ \hline \end{tabular} \begin{tablenotes} \small \item[1] \url{https://archive.ics.uci.edu/ml/datasets/Concrete+Slump+Test} \item[2] \url{https://archive.ics.uci.edu/ml/datasets/Yacht+Hydrodynamics} \item[3] \url{https://archive.ics.uci.edu/ml/datasets/auto+mpg} \item[4] \url{http://lib.stat.cmu.edu/datasets/} \item[5] \url{https://archive.ics.uci.edu/ml/machine-learning-databases/housing/} \item[6] \url{http://lib.stat.cmu.edu/datasets/CPS_85_Wages} \item[7] \url{https://archive.ics.uci.edu/ml/datasets/Concrete+Compressive+Strength} \item[8] \url{https://archive.ics.uci.edu/ml/datasets/Wine+Quality} \end{tablenotes} \end{threeparttable} \end{table} \renewcommand{\baselinestretch}{1.5} \subsection{Algorithms} \label{sect:algs} We compared the performances of six different sample selection algorithms: \begin{enumerate} \item Baseline (\texttt{BL}), which randomly selects all $K$ samples. \item Query-by-Committee (\texttt{QBC}) \cite{RayChaudhuri1995}. It first bootstraps the $k$ labeled samples into $P$ copies, each containing $k$ samples but with duplicates, and builds a regression model from each copy, i.e., the committee consists of $P$ regression models. Then, for each of the $N-k$ unlabeled samples, it computes the variance of the $P$ individual predictions, and selects the one with the maximum variance to label. \item Expected model change maximization (\texttt{EMCM}) \cite{Cai2013}. It first uses all $k$ labeled samples to build a linear regression model. Then, it also uses bootstrap to construct $P$ linear regression models. For each of the $N-k$ unlabeled samples, it computes the expected model change when that sample is labeled and added to the training dataset. EMCM selects the sample with the maximum expected model change to label. \item \texttt{GSx}, which has been introduced in Section~\ref{sect:GS}. \item \texttt{GSy}, which has been introduced in Section~\ref{sect:GSy}. \item \texttt{iGS}, which has been introduced in Section~\ref{sect:iGS}. \end{enumerate} All six algorithms built an RR model from the labeled samples, which minimizes the following regularized loss function: \begin{align} l(\lambda,\boldsymbol{\beta})=\sum_{m=1}^K (y_m-\boldsymbol{\beta}^T\mathbf{x}_m)^2+\lambda|\boldsymbol{\beta}|^2 \label{eq:RR} \end{align} where $\boldsymbol{\beta}$ contains the regression coefficients, and $\lambda=0.01$ was used in our study. We used RR instead of ordinary least squares linear regression because the number of labeled samples is very small, so RR, with regularization on the regression coefficients, generally results in better generalization performance than the ordinary linear regression. \subsection{Evaluation Process} \label{sect:process} The evaluation process was similar to those used in our previous research on pool-based ALR \cite{drwuEBMAL2016,drwuSAL2018}. For each dataset, we first randomly selected 80\% of the total samples as the pool\footnote{For a fixed pool, \texttt{GSx} gives a deterministic selection sequence because it does not involve randomness. So, we need to vary the pool in order to study its statistical property.}, initialized the first $K_0$ labeled samples ($K_0$ is the dimensionality of the input space) either randomly (for \texttt{BL}, \texttt{QBC} and \texttt{EMCM}) or by \texttt{GSx} (for \texttt{GSx}, \texttt{GSy} and \texttt{iGS}), identified one sample to label in each iteration by different algorithms, and built an RR model. The maximum number of samples to be labeled, $K$, was 20\% of the dataset size. For datasets too small or too large, we constrained $K\in[20,60]$. To obtain statistically meaningful results, we ran this evaluation process 100 times for each dataset and each algorithm, each time with a randomly chosen 80\% population pool. \subsection{Performance Measures} \label{sect:pm} After each iteration of each algorithm, we computed the root mean squared error (RMSE) and correlation coefficient (CC) as the performance measures. Because different algorithms selected different samples to label, the remaining unlabeled samples in the pool were different for each algorithm, so we cannot compare their performances based on the remaining unlabeled samples. Because in pool-based ALR the goal is to build a regression model to label all samples in the pool as accurately as possible, we computed the RMSE and CC using all samples in the pool, where the labels for the $K$ selected samples were their true labels, and the labels for the remaining $N-K$ unlabeled samples were the estimates from the regression model. Note that although both RMSE and CC were used as our performance measures, we should consider the RMSE as the \emph{primary} one, because it was directly optimized in the objective function of the regression model [see (\ref{eq:RR})]. Generally as the RMSE decreases, the CC should increase, but not always. In other words, we expect that an ALR approach that gives a small RMSE should also have a large CC, but this is not always true. So, the CC can only be viewed as a \emph{secondary} performance measure. \subsection{Experimental Results} The RMSEs and CCs for the six algorithms on the 12 datasets, averaged over 100 runs, are shown in Figure~\ref{fig:results12}. Generally as $K$ increased, all six algorithms achieved better performance (smaller RMSE and larger CC), which is intuitive, because more labeled training samples generally result in a more reliable RR model. \texttt{iGS} achieved the smallest RMSE and largest CC on most datasets. \begin{figure*}[!h]\centering \subfigure[]{\label{fig:ConcreteCS} \includegraphics[width=.32\linewidth,clip]{Concrete-CS.eps}} \subfigure[]{\label{fig:ConcreteFlow} \includegraphics[width=.32\linewidth,clip]{Concrete-Flow.eps}} \subfigure[]{\label{fig:ConcreteSlump} \includegraphics[width=.32\linewidth,clip]{Concrete-Slump.eps}} \subfigure[]{\label{fig:Yacht} \includegraphics[width=.32\linewidth,clip]{Yacht.eps}} \subfigure[]{\label{fig:autoMPG} \includegraphics[width=.32\linewidth,clip]{autoMPG.eps}} \subfigure[]{\label{fig:NO2} \includegraphics[width=.32\linewidth,clip]{NO2.eps}} \subfigure[]{\label{fig:PM10} \includegraphics[width=.32\linewidth,clip]{PM10.eps}} \subfigure[]{\label{fig:Housing} \includegraphics[width=.32\linewidth,clip]{Housing.eps}} \subfigure[]{\label{fig:CPS} \includegraphics[width=.32\linewidth,clip]{CPS.eps}} \subfigure[]{\label{fig:Concrete} \includegraphics[width=.32\linewidth,clip]{Concrete.eps}} \subfigure[]{\label{fig:Wine-red} \includegraphics[width=.32\linewidth,clip]{Wine-red.eps}} \subfigure[]{\label{fig:Wine-white} \includegraphics[width=.32\linewidth,clip]{Wine-white.eps}} \caption{Performances of the six algorithms on the 12 datasets, averaged over 100 runs. (a) Concrete-CS; (b) Concrete-Flow; (c) Concrete-Slump; (d) Yacht; (e) autoMPG; (f) NO2; (g) PM10; (h) Housing; (i) CPS; (j) Concrete; (k) Wine-red; (l) Wine-white.} \label{fig:results12} \end{figure*} To see the forest for the trees, we also define an aggregated performance measure called the area under the curve (AUC) for the average RMSE and the average CC on each of the 12 datasets in Figure~\ref{fig:results12}. The AUCs for the RMSEs are shown in Figure~\ref{fig:AUC-RMSE-UCI}, where for each dataset, we used the AUC of BL to normalize the AUCs of the other five algorithms, so the AUC of \texttt{BL} was always 1. For the RMSE, a smaller AUC indicates a better performance. Similarly, we also show the normalized AUCs of the CCs in Figure~\ref{fig:AUC-CC-UCI}, where a larger AUC indicates a better performance. Figure~\ref{fig:AUC} shows that: \begin{enumerate} \item Each of \texttt{QBC}, \texttt{EMCM}, \texttt{GSx}, \texttt{GSy} and \texttt{iGS} achieved smaller RMSEs than \texttt{BL} on all 12 datasets, and larger CCs than \texttt{BL} on at least 10 of the 12 datasets, suggesting that these five ALR approaches were all effective. \item On average the performances of the six algorithms, from the best to the worst, was \texttt{iGS} $>$ \texttt{GSy} $>$ \texttt{GSx} $>$ \texttt{EMCM} $\approx$ \texttt{QBC} $>$ \texttt{BL}. \texttt{iGS} combines the advantages of \texttt{GSx} and \texttt{GSy}, and outperformed both of them. \end{enumerate} These observations were also confirmed by Table~\ref{tab:ranksUCI}, which shows the detailed ranks of the six approaches on the 12 datasets, according to the AUCs. \begin{figure}[!h]\centering \subfigure[]{\label{fig:AUC-RMSE-UCI} \includegraphics[width=\linewidth,clip]{AUC-RMSE-UCI.eps}} \subfigure[]{\label{fig:AUC-CC-UCI} \includegraphics[width=\linewidth,clip]{AUC-CC-UCI.eps}} \caption{Normalized AUCs of the six algorithms on the 12 datasets. (a) RMSE; (b) CC.} \label{fig:AUC} \end{figure} \begin{table}[!h] \centering \setlength{\tabcolsep}{1.5mm} \caption{Ranks of the six approaches on the 12 datasets.} \label{tab:ranksUCI} \begin{tabular}{c|l|cccccc} \hline &Dataset & \texttt{BL} & \texttt{QBC} & \texttt{EMCM} & \texttt{GSx} & \texttt{GSy} & \texttt{iGS} \\ \hline &Concrete-CS &6&5&4&1&3&2 \\ &Concrete-Flow &6&5&4&3&2&1 \\ &Concrete-Slump &6&5&4&3&2&1 \\ &Yacht &6&4&3&5&2&1 \\ &autoMPG &6&4&5&1&3&2 \\ &NO2 &6&4&5&2&3&1 \\ RMSE&PM10 &6&4&3&5&2&1 \\ &Housing &6&4&3&5&1&2 \\ &CPS &6&5&4&3&2&1 \\ &Concrete &6&5&4&3&2&1 \\ &Wine-red &6&4&5&3&2&1 \\ &Wine-white &6&4&5&3&1&2 \\ &\textbf{Average} &\textbf{6}&\textbf{5}&\textbf{4}&\textbf{3}&\textbf{2}&\textbf{1}\\ \hline &Concrete-CS &6&5&3&1&4&2\\ &Concrete-Flow &6&4&5&1&3&2\\ &Concrete-Slump &6&4&5&3&2&1\\ &Yacht &6&5&4&3&2&1\\ &autoMPG &6&4&5&2&3&1\\ &NO2 &6&2&3&1&5&4\\ CC &PM10 &6&4&5&2&3&1\\ &Housing &6&4&5&3&2&1\\ &CPS &6&5&4&3&2&1\\ &Concrete &6&5&4&3&2&1\\ &Wine-red &1&4&6&5&3&2\\ &Wine-white &4&3&5&6&1&2 \\ &\textbf{Average} &\textbf{6}&\textbf{4}&\textbf{5}&\textbf{3}&\textbf{2}&\textbf{1}\\ \hline \end{tabular} \end{table} \renewcommand{\baselinestretch}{1.5} \subsection{Statistical Analysis} \label{sect:SA} To determine if the differences between different pairs of algorithms were statistically significant, we also performed non-parametric multiple comparison tests on the AUCs using Dunn's procedure \cite{Dunn1961,Dunn1964}, with a $p$-value correction using the False Discovery Rate method \cite{Benjamini1995}. The $p$-values for the AUCs of RMSEs and CCs are shown in Table~\ref{tab:DunnUCI}, where the statistically significant ones are marked in bold. Table~\ref{tab:DunnUCI} shows that: \begin{enumerate} \item All five ALR approaches had statistically significantly better RMSEs and CCs than \texttt{BL}, suggesting again that they were effective. \item Among the three existing ALR approaches, \texttt{GSx} had statistically significantly better RMSE and CC than both \texttt{QBC} and \texttt{EMCM}. \item \texttt{GSy} had statistically significantly better RMSE and CC than both \texttt{QBC} and \texttt{EMCM}, and also statistically significantly better RMSE than \texttt{GSx}. \item \texttt{iGS} had statistically significantly better RMSE than all other approaches except \texttt{GSy}, and also statistically significantly better CC than all other approaches except \texttt{GSx}. \end{enumerate} These observations verified the effectiveness of the two proposed approaches, particularly \texttt{iGS}. \begin{table}[!h] \centering \setlength{\tabcolsep}{2mm} \caption{$p$-values of non-parametric multiple comparisons on the AUCs of RMSEs and CCs on the 12 UCI and CMU StatLib datasets.} \label{tab:DunnUCI} \begin{tabular}{c|l|ccccc} \hline & & \texttt{BL} & \texttt{QBC} & \texttt{EMCM} & \texttt{GSx} & \texttt{GSy} \\ \hline &\texttt{QBC} & \textbf{.0000} & & & &\\ &\texttt{EMCM} & \textbf{.0000} & .1096 & & & \\ RMSE&\texttt{GSx} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000}& \\ &\texttt{GSy} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} &\textbf{.0000} & \\ &\texttt{iGS} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} & \textbf{.0002} &.0715 \\ \hline &\texttt{QBC} & \textbf{.0000} & & & &\\ &\texttt{EMCM} & \textbf{.0000} & .0805 & & & \\ CC&\texttt{GSx} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000}& \\ &\texttt{GSy} & \textbf{.0000} & \textbf{.0015} & \textbf{.0000} &.1504 & \\ &\texttt{iGS} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} & .0290 &\textbf{.0017} \\ \hline \end{tabular} \end{table} \section{Experiments on EEG-Based Driver Drowsiness Estimation} \label{sect:Driving} Experiments on offline EEG-based driver drowsiness estimation are performed in this section to further demonstrate the performances of \texttt{GSy} and \texttt{iGS}. \subsection{Experiment Setup} The experiment and data used in \cite{drwuEBMAL2016} was again used in this paper. Sixteen healthy subjects with normal/corrected-to-normal vision participated in a sustained-attention driving experiment \cite{Chuang2012,Chuang2014}, consisting of a real vehicle mounted on a motion platform with 6 degrees of freedom immersed in a 360$^\circ$ virtual-reality scene, simulating monotonous driving at 100 km/h on a straight and empty highway. Each experiment was conducted for about 60-90 minutes in the afternoon when the circadian rhythm of sleepiness reached its peak. Random lane-departure disturbances were applied every 5-10 seconds, and participants needed to steer the vehicle to compensate for them as quickly as possible. The response time was recorded and later converted to a drowsiness index. Participants' scalp EEG signals were also recorded using a 500Hz 32-channel Neuroscan system (30-channel EEGs plus 2-channel earlobes). The Institutional Review Board of the Taipei Veterans General Hospital approved the experimental protocol. \subsection{Preprocessing and Feature Extraction} The preprocessing and feature extraction procedures were almost identical to those in our recent research \cite{drwuEBMAL2016}. The 16 subjects had different lengths of experiment, because the disturbances were presented randomly every 5-10 seconds. To ensure fair comparison, we used only the first 3,600 seconds data for each subject. Data from one subject was not recorded correctly, so we used only 15 subjects. We defined a function \cite{drwuaBCI2015} to map the response time $\tau$ to a drowsiness index $y\in[0, 1]$: \begin{align} y=\max\left\{0,\,\frac{1-e^{-(\tau-\tau_0)}}{1+e^{-(\tau-\tau_0)}}\right\} \label{eq:y} \end{align} $\tau_0=1$ was used in this paper. The drowsiness indices were then smoothed using a 90-second square moving-average window to reduce variations. EEGLAB \cite{Delorme2004} was used for EEG signal preprocessing. After 1-50 Hz band-pass filtering, the EEG data were downsampled from 500 Hz to 250 Hz and re-referenced to averaged earlobes. Our goal was to predict the drowsiness index for each subject every 10 seconds (called a sample point in this paper). All 30 EEG channels were used in feature extraction. We epoched 30-second EEG signals right before each sample point, and computed the average power spectral density (PSD) in the theta band (4-7.5 Hz) for each channel using Welch's method \cite{Welch1967}. Next, we converted the 30 theta band powers to dBs. To remove noises or bad channel readings, we removed channels whose maximum dBs were larger than 20. We then normalized the dBs of each remaining channel to mean zero and standard deviation one, and extracted 10 leading principal components. The projections of the dBs onto these principal components were then normalized to $[0, 1]$ and used as our features. \subsection{Experimental Results} The six algorithms introduced in Section~\ref{sect:algs} were again compared in this experiment. The evaluation process was the same as that in Section~\ref{sect:process}. The RMSEs and CCs for the six algorithms on the 15 subjects, averaged over 100 runs, are shown in Figure~\ref{fig:results15}. The average performances over the 15 subjects are shown in Figure~\ref{fig:avg}. Generally as $K$ increased, all six algorithms achieved better performance (smaller RMSE and larger CC), which is intuitive, because more labeled training samples generally result in a more reliable RR model. \texttt{iGS} achieved the smallest RMSE and largest CC for most subjects. \begin{figure*}[!h]\centering \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S1.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S2.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S3.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S4.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S5.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S6.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S7.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S8.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S9.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S10.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S11.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S12.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S13.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S14.eps}} \subfigure[]{ \includegraphics[width=.32\linewidth,clip]{S15.eps}} \caption{Performances of the six algorithms on the 15 subjects, averaged over 100 runs.} \label{fig:results15} \end{figure*} \begin{figure}[!h]\centering \includegraphics[width=.8\linewidth,clip]{avg-Driving.eps} \caption{Average performances of the six algorithms over the 15 subjects.} \label{fig:avg} \end{figure} The AUCs for the RMSEs are shown in Figure~\ref{fig:AUC-RMSE}. Again, for each subject, we used the AUC of \texttt{BL} to normalize the AUCs of the other five algorithms, so the AUC of \texttt{BL} was always 1. As before, a smaller AUC for RMSE indicates a better performance, and a larger AUC for CC indicates a better performance. Figure~\ref{fig:AUC-Driving} shows that: \begin{enumerate} \item Each of the five ALR approaches achieved smaller RMSEs than \texttt{BL} on all 15 subjects, and larger CCs than \texttt{BL} on at least 14 subjects, suggesting that they were all effective. \item On average the performances of the six algorithms, from the best to the worst, was \texttt{iGS} $>$ \texttt{GSy} $\approx$ \texttt{GSx} $>$ \texttt{EMCM} $>$ \texttt{QBC} $>$ \texttt{BL}. \texttt{iGS} combines the advantages of \texttt{GSx} and \texttt{GSy}, and outperformed both of them. \end{enumerate} These observations were also confirmed by Table~\ref{tab:ranksDriving}, which shows the detailed ranks of the six approaches on the 15 subjects, according to the AUCs. \begin{figure}[!h]\centering \subfigure[]{\label{fig:AUC-RMSE} \includegraphics[width=.96\linewidth,clip]{AUC-RMSE-Driving.eps}} \subfigure[]{\label{fig:AUC-CC} \includegraphics[width=.96\linewidth,clip]{AUC-CC-Driving.eps}} \caption{Normalized AUCs of the six algorithms on the 15 subjects. (a) RMSE; (b) CC.} \label{fig:AUC-Driving} \end{figure} \begin{table}[!h] \centering \setlength{\tabcolsep}{1.5mm} \caption{Ranks of the six approaches on the 15 subjects.} \label{tab:ranksDriving} \begin{tabular}{c|c|cccccc} \hline &Subject & \texttt{BL} & \texttt{QBC} & \texttt{EMCM} & \texttt{GSx} & \texttt{GSy} & \texttt{iGS} \\ \hline &1 &6&5&4&1&3&2 \\ &2 &6&5&4&2&3&1 \\ &3 &6&5&4&3&2&1 \\ &4 &6&5&4&3&2&1 \\ &5 &6&5&4&1&3&2 \\ &6 &6&5&4&1&3&2 \\ &7 &6&4&2&5&3&1 \\ RMSE&8 &6&5&4&3&2&1 \\ &9 &6&5&4&2&3&1 \\ &10 &6&3&4&5&1&2 \\ &11 &6&5&4&2&3&1 \\ &12 &6&5&4&3&2&1 \\ &13 &6&5&4&3&2&1 \\ &14 &6&5&4&1&3&2 \\ &15 &6&5&4&3&2&1 \\ &\textbf{Average} &\textbf{6}&\textbf{5}&\textbf{4}&\textbf{3}&\textbf{2}&\textbf{1}\\ \hline &1 &6&4&2&1&5&3 \\ &2 &6&5&4&2&3&1 \\ &3 &6&5&4&3&2&1 \\ &4 &6&4&3&1&5&2 \\ &5 &6&4&3&1&5&2 \\ &6 &6&4&3&1&5&2 \\ &7 &6&3&4&5&2&1 \\ CC &8 &6&5&4&1&3&2 \\ &9 &6&5&4&2&3&1 \\ &10 &5&1&3&6&2&4 \\ &11 &6&5&4&1&3&2 \\ &12 &6&4&5&3&2&1 \\ &13 &6&4&5&3&2&1 \\ &14 &4&3&5&1&6&2 \\ &15 &6&5&4&2&3&1 \\ &\textbf{Average} &\textbf{6}&\textbf{5}&\textbf{4}&\textbf{2}&\textbf{3}&\textbf{1}\\ \hline \end{tabular} \end{table} \renewcommand{\baselinestretch}{1.5} \subsection{Statistical Analysis} To determine if the differences between different pairs of algorithms were statistically significant, we also performed non-parametric multiple comparison tests on the AUCs using the procedure in Section~\ref{sect:SA}. The $p$-values for the AUCs of RMSEs and CCs are shown in Table~\ref{tab:DunnDriving}, where the statistically significant ones are marked in bold. Table~\ref{tab:DunnDriving} shows that: \begin{enumerate} \item All five ALR approaches had statistically significantly better RMSEs and CCs than \texttt{BL}, suggesting that they were effective. \item Among the three existing ALR approaches, \texttt{GSx} had statistically significantly better RMSEs and CCs than \texttt{QBC} and \texttt{EMCM}. \item \texttt{GSy} had statistically significantly better RMSE than \texttt{QBC} and \texttt{EMCM}, and statistically significantly better RMSE than \texttt{QBC} and \texttt{GSx}. \item \texttt{iGS} had statistically significantly better RMSE than all other approaches, and also statistically significantly better CC than all other approaches except \texttt{GSx}. \end{enumerate} All these observations were generally consistent with our observations on the 12 UCI and CMU StatLib datasets, demonstrating the effectiveness and robustness of our proposed approaches. Particularly, on average \texttt{iGS} achieved the best performance among the six. \begin{table}[!h] \centering \setlength{\tabcolsep}{2mm} \caption{$p$-values of non-parametric multiple comparisons on the AUCs of RMSEs and CCs on EEG-based driver drowsiness estimation.} \label{tab:DunnDriving} \begin{tabular}{c|l|ccccc} \hline & & \texttt{BL} & \texttt{QBC} & \texttt{EMCM} & \texttt{GSx} & \texttt{GSy} \\ \hline &\texttt{QBC} & \textbf{.0000} & & & &\\ &\texttt{EMCM} & \textbf{.0000} & \textbf{.0000} & & & \\ RMSE&\texttt{GSx} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000}& \\ &\texttt{GSy} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} &.0955 & \\ &\texttt{iGS} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} & \textbf{.0002} &\textbf{.0001} \\ \hline &\texttt{QBC} & \textbf{.0000} & & & &\\ &\texttt{EMCM} & \textbf{.0000} & .2491 & & & \\ CC&\texttt{GSx} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000}& \\ &\texttt{GSy} & \textbf{.0000} & \textbf{.0080} & .0376 &\textbf{.0065} & \\ &\texttt{iGS} & \textbf{.0000} & \textbf{.0000} & \textbf{.0000} & .0394 &\textbf{.0000} \\ \hline \end{tabular} \end{table} \section{Conclusions and Future Research} \label{sect:conclusions} Usually a substantial amount of labeled training samples are needed to build an accurate regression model with good generalization ability. However, many times in real-world applications we can collect a large number of unlabeled samples, but labeling them is time-consuming or expensive. ALR is a methodology to select the most beneficial unlabeled samples to label, so that a better regression model can be built from a small number of labeled samples. This paper has proposed two new ALR approaches, inspired by a GS approach in the literature. Extensive experiments on 12 UCI and CMU StatLib datasets, and on 15 subjects on EEG-based driver drowsiness estimation, verified their effectiveness and robustness. Particularly, our proposed \texttt{iGS}, which considers diversity in both input and output spaces, outperformed several existing ALR approaches. Our future research will extend \texttt{GSx}, \texttt{GSy} and \texttt{iGS} from regression to classification. Additionally, as described in the Introduction, regularization, transfer learning, and active learning can all be used to handle regression problems that do not have enough labeled training data. In this paper we have used regularization and active learning together. In the future we will also study how to integrate transfer learning and active learning for regression problems. Our previous research has integrated transfer learning and active learning for classification problems and achieved promising performance \cite{drwuTNSRE2016,drwuPLOS2013,drwuSMC2017}. \section*{References}
\section{Introduction} Although terrestrial planets orbiting solar-type main-sequence stars seem to be relatively common in the Galaxy \citep[e.g.][]{Fressin_etal_2013,Petigura_etal_2013}, it is at the moment completely unclear whether the phenomenon of life is widespread in the universe or unique to our home planet. Therefore, considerable effort has been undertaken to identify suitable signatures of bioactivity (biosignatures) on exoplanets, in parallel to the search for extraterrestrial life within the Solar System (e.g.\ on Mars or Europa). A promising approach to identify a biosphere is to use the influence of life on the composition of the atmosphere \citep[e.g.][]{Kaltenegger_etal_2010,Seager_Deming_2010,Rugheimer_etal_2013,Seager_2014}. For example, the detection of species out of chemical equilibrium has been argued to be indicative of a biosphere. This idea was first discussed by \citet{Lederberg_1965}, \citet{Lovelock_1965,Lovelock_1975} and \citet{Hitchcock_Lovelock_1967}. These authors argued that states out of thermodynamic equilibrium can be seen as a generalised signature of life. For instance, in Earth's atmosphere, oxygen and methane are severely out of redox equilibrium because of biological forcing \citep[e.g.][]{Sagan_etal_1993}. Without life, methane would indeed rapidly be removed from the atmosphere by reacting with oxygen. The atmospheric properties of exoplanets as small as Earth have already been constrained \citep{deWit_etal_2016,Southworth_etal_2017}. However, measurements of the atmospheric composition or mass are not yet feasible. In the future, investigating the atmospheres of Earth analogues will become possible by using telescope concepts similar to \textit{Darwin} or the \textit{Terrestrial Planet Finder Interferometer} (TPF-I). These instruments are designed to directly image Earth-sized exoplanets in the habitable zone. Besides the spectroscopic characterisation of the atmosphere, they can also be used to study the surface reflectance \citep[e.g.][]{Hegde_Kaltenegger_2013}, including surface reflectance biosignatures \citep[e.g.][]{DesMarais_etal_2002}, for example from vegetation and also microbial mats \citep[e.g.][]{Seager_etal_2005,Hegde_etal_2015,Schwieterman_etal_2015}. In general, the best strategy to avoid biosignature false positives \citep[e.g.][]{Rein_etal_2014} is to characterise the potentially inhabited exoplanetary system (including the host star) as accurately as possible. Only when seen in context can the significance of a biosignature detection be assessed. The study of methods yielding information in addition to atmospheric mass and composition, or general bulk properties (exoplanet radius, bulk density, orbital period), is clearly warranted. In particular, ways to probe the geology of exoplanets or detect non-atmospheric biosignatures would be valuable complements. In this work, we investigate the idea of characterising an exoplanet by observing dust generated during an impact event. The composition of the dust holds information on the geology of the impacted planet and might contain biosignatures if the planet is inhabited. Depending on the impact parameters, the escaping debris can have a much larger surface area than the planet itself. Impact ejecta most easily escape from low gravity bodies. Thus, the largest amounts of dust are expected for small planets (or moons), the atmospheres of which are the most difficult to study. Several studies have considered dust generated from collisions or impacts, covering different regimes in terms of sizes of both the impactor and the target. Giant collisions involving two bodies of planetary size are expected to occur frequently during the final stage of terrestrial planet formation lasting for approximately 100\,Myr \citep[e.g.][]{Kenyon_Bromley_2006,Kokubo_Genda_2010}. For example, \citet{Jackson_Wyatt_2012} modelled the evolution and detectability of dust originating from the Moon-forming collision. \citet{Genda_etal_2015} estimated the total amount of dust produced from giant impacts and compared to observations of warm debris disks (i.e.\ dust in the terrestrial region). \citet{Jackson_etal_2014} modelled observational signatures of giant impacts occurring at large orbital radii. \citet{Morlok_etal_2014} linked infrared observations of dust from collisions to laboratory spectra of terrestrial and martian rocks. Dust can also be produced from mutual collisions of smaller bodies. This is commonly observed in the form of dusty debris disks, objects akin to the asteroid belt or the Kuiper belt in the solar system \citep[e.g.][]{Wyatt_2008}. In general, debris disk dust is believed to originate from a so-called collisional cascade: asteroidal or cometary bodies\footnote{These objects can be seen as leftover planetesimals that were not incorporated into planets.} collide and produce smaller bodies, which further collide to produce even smaller fragments, resulting in copious amounts of micron-sized dust grains. Analysing the dust properties allows for characterisation of the parent bodies at the top of the collisional cascade \citep[e.g.][]{deVries_etal_2012}. Collisions among asteroids or comets in debris disks can also be responsible for observed dust clumps \citep{Wyatt_Dent_2002,Kenyon_etal_2014}. In this work, we are concerned with yet another impact regime: we consider impacts of asteroidal or cometary bodies, typically tens of kilometres in size, with planetary bodies. An example for such an event on Earth is the famous Chicxulub impact that caused the Cretaceous-Paleogene (K-Pg) extinction about 65\,Myr ago. In contrast to mutual collisions of asteroids or comets, such events generate dust originating from our objects of interest, namely exoplanets. In addition, such impacts are expected to occur over the entire lifetime of an exoplanetary system and are not restricted to the first 100\,Myr. In particular, they may occur once a planet has been extensively modified by geological activities or the presence of life, the signatures of which could be imprinted in the ejected dust. We emphasise that the present work does not attempt to develop a detailed model covering all the subtleties of the impact process and the dust evolution. Rather, the intent of the paper is to present the idea and make some quantitative estimates. We employ a simplified approach to get a general idea of the ejected dust masses, the timescales on which the dust evolves and what instruments would be needed to observe impact-generated dust. Our paper is organised as follows: section \ref{Sec:interesting_substances} is a general discussion of potentially interesting substances escaping during an impact event. Section \ref{Sec:Modelling} presents the modelling of the impact and the subsequent collisional evolution. In section \ref{Sec:Discussion} we discuss our results and estimate instrument capabilities needed to detect minerals or biological matter. Section \ref{Sec:Conclusions} gives a summary and the conclusions. \section{Substances of interest escaping during an impact event}\label{Sec:interesting_substances} \subsection{Minerals and rocks} An obvious component of the escaping ejecta will be minerals and rocks from the planetary surface. While a large fraction of the escaping rocky material will be vaporised or molten and subsequently recondense, some percentage can actually remain in the solid state when transported from the planetary surface into orbit (section \ref{subsec:nondamaged}). Minerals and rocks can inform us about the geology of the exoplanet, but they can also carry information about a biosphere (if present), since organisms can interact with minerals in various ways \citep[e.g.][]{Banfield_etal_2001}. With more than 4000 known minerals, the mineralogical diversity of Earth is large compared to Venus or Mars \citep{Hazen_etal_2008}. The latter are expected to have at most a few hundred minerals, although they accreted from the same material as Earth during the planet formation process. In addition, Earth and Venus are almost identical in size. The difference in mineralogical diversity is thought to be due, directly or indirectly, to the presence of life on Earth \citep{Hazen_etal_2008}. Minerals that owe their existence to biology can therefore be considered a candidate biosignature. Obviously, a thorough understanding of the different (potentially abiotic) production pathways of a mineral is necessary to avoid false positives. Life influenced Earth's mineralogy in different ways, e.g.\ by changing the chemistry of the oceans and the atmosphere, which allowed new mineral species to arise. \citet{Hazen_etal_2008} argued that most of the biologically mediated diversification of Earth's mineralogy took part from 2.5\,Gyr ago until today. For example, the rise in atmospheric oxygen due to photosynthesis between $\sim$2.2 to 2.0\,Gyr ago ("Great Oxygenation Event") resulted in a large number of new minerals produced by weathering of other minerals in an oxygen-rich environment \citep{Hazen_etal_2008}. Skeletal biomineralization became important in the Phanerozoic Eon 0.542\,Gyr ago and continues today. It is an example of direct production of minerals by living organisms. Major skeletal minerals are calcite, aragonite, magnesian calcite, apatite and opal. In terms of volume, the most important biominerals are calcium carbonates such as calcite. Their values as biosignature is limited by the fact that abiotic production pathways exist. However, carbonates are in general the result of aqueous processes. Their presence on a planet can therefore hold important clues about past or present habitability. For example, the detection of calcite on Mars has been interpreted as evidence for the presence of liquid water in the past \citep{Boynton_etal_2009}. \citet{Rosing_etal_2006} suggested that granitic continents are signatures for (oxygenic or anoxygenic) photosynthetic life. Granitoid rocks\footnote{Granitoid rocks are predominantly composed of feldspar and quartz. Granite sensu stricto ("true granite") is one example of a granitoid rock. Other examples include tonalities, monzonites or quartz diorites.} (also called granites sensu lato; simply granite hereafter) are formed from the subduction and dehydration of altered basalts and sediments, and thus rely on weathering processes. Microbes can increase the rate of silicate weathering significantly. Using thermodynamic arguments, \citet{Rosing_etal_2006} concluded that only photosynthetic life is able to increase weathering rates sufficiently, thus stimulating the production of granitoids which led to the stabilisation of the continents in the early Archean. This might explain the temporal correlation between the possible emergence of photosynthesis and the stabilisation of the continents. It would also explain why granite is ubiquitous on the surface of life-bearing Earth while apparently absent on other planets, although tentative evidence exists for granitic terrains on Venus \citep{Hashimoto_etal_2008}. \citet{Bonin_2012} argued that granite should occur on any silicate planetary body, the question being only whether enough granite is build up to constitute stable continents. An interesting variation of the above discussion concerns the role of minerals in the origin of life. Some scenarios of the origin of life rely explicitly on the presence of certain minerals, for example clays or transition metal sulfides, some of which are rather exotic \citep[e.g.][and references therein]{Hazen_etal_2008}. The detection of such minerals would then suggest that the mineralogy of the impacted planet has evolved sufficiently to support an origin of life \citep{Hazen_etal_2008}. \subsection{Water} Liquid water is essential to all life forms on Earth and is thought to be a prerequisite for life as we know it. Detecting exoplanets hosting liquid water (be it on the surface or e.g.\ beneath an icy crust) is therefore considered an essential step in the quest for extraterrestrial life. If an impactor hits an ocean or an ice crust, some water could escape the exoplanet and potentially be detectable in the form of water gas or water ice spectral features \citep[e.g.][]{Lisse_etal_2012}. More than 70\% of Earth's surface is covered by water so that oceanic impacts are actually more probable than land impacts. Some exoplanets might even be completely covered by oceans \citep[so-called waterworlds, e.g.][]{Berta_etal_2012}. However, it should be noted that the impactor itself might contain substantial amounts of water and could consequently pollute the ejecta. Also, the lifetime of water in the terrestrial region of a Sun-like star is very short, making a detection extremely improbable (section \ref{subsec:oceanic_impacts}). \subsection{Direct detection of biological matter} Direct evidence for a biosphere would come from the detection of e.g.\ microorganisms escaping during the impact. Microbes make up most of the biomass on Earth \citep{Madigan_2012}. Also, microbes have been present over a large fraction of Earth's history, in contrast to multicellular organisms. In addition, microbes are expected to dominate Earth's future biosphere when the Sun enters the late stages of its main-sequence evolution \citep{OMalley-James_etal_2013,OMalley-James_etal_2014}. Therefore, we argue that microbes are an attractive option if biological matter is to be detect directly. Various authors have discussed the possibility of transferring microbes between planetary bodies with the help of rocks ejected during impact events \citep[e.g.][]{Melosh_1988,Mileikowsky_etal_2000,Worth_etal_2013}, an idea commonly known as lithopanspermia. We can use the knowledge acquired in these studies to investigate the possibility of a direct detection of microbial life ejected during an impact. For remote detection, a number of authors have considered spectral signatures of microorganisms. \citet{Dalton_etal_2003} presented near-infrared laboratory spectra of three different microbial species and compared them to observations of Europa's surface from the \textit{Galileo} spacecraft. The most prominent spectral features are asymmetric absorption features due to water of hydration. The work by \citet{Dalton_etal_2003} was substantially extended by \citet{Hegde_etal_2015}. They measured the spectral characteristics of 137 different microorganisms over the visible and near-infrared wavelength range. \citet{Schwieterman_etal_2015} measured the spectral properties of microorganisms with non-photosynthetic pigments. \citet{Knacke_2003} discussed the prospects for detecting algae on the surface of exoplanets. We discuss the possibility to detect spectral features of microorganism ejected during an impact in section \ref{subsubsec:microorganism_detection}. All known life on Earth exhibits an interesting property known as \emph{homochirality}: only left-handed L-amino acids are found in proteins, and only right-handed D-sugars are found in nucleic acids. As a result, optical activity can be induced by the interaction of light with the chiral biomolecules. This can lead a signal in the form of circular polarisation. A particularly strong interaction occurs for photosynthetic organisms. A series of papers investigated the potential of chiral signatures as biosignatures. General considerations were presented by \citet{Gledhill_etal_2007}. Laboratory measurements of circular polarisation signals from biological samples were published by \citet{Sparks_etal_2009} and \citet{Martin_etal_2010}. The idea was set into practice in a search of Mars' surface for circular polarisation signatures \citep{Sparks_etal_2005,Sparks_etal_2012}. In a recent paper, \citet{Berdyugina_etal_2016} argued that linear, instead of circular, polarisation would be a more sensitive biosignature. The linear polarisation signatures are associated with absorption of light by various biopigments that are used by plants and bacteria for photosynthesis or protection. \citet{Berdyugina_etal_2016} presented laboratory measurements of reflectance and linear polarisation spectra for a number of plants, complemented with non-biological samples. These data were then used to calculate the linearly polarised spectra of Earth-like planets. The results of all these different studies are indeed primarily directed towards modelling of disk-integrated spectra of exoplanets that may become available from future instruments capable to directly image Earth analogues. How does the situation change if we consider microorganisms ejected by an impact? First, interference from the atmosphere or clouds \citep[e.g.][]{Schwieterman_etal_2015,Berdyugina_etal_2016} is no longer an issue. Second, the ejected debris can represent a significantly larger surface area than the planet itself (see figure \ref{fig:frac_lum}). On the other hand, because of high temperature and pressure, a large fraction of any microorganisms would be destroyed during the impact event. Also, the density of microbes in debris originating from relatively deep below the planetary surface might be low, especially if photosynthetic organisms are considered. This essentially depends on how the depth of the biosphere compares to the depth of origin of the escaping ejecta (see section \ref{sec:excavation_depth}). In addition, the question about the stability of the molecules giving rise to spectral features under space conditions (vacuum, intensive radiation environment) arises. \citet{Dalton_etal_2003} gave some estimates based on the strength of molecular bonds. Experimental studies of the survival of microbes under space conditions \citep[e.g.][]{Mastascusa_etal_2014} can also give some useful hints. There exist also experiments investigating the integrity of biomolecules under space conditions directly \citep[e.g.][]{Lyon_etal_2010}. For chiral signatures, the racemisation timescale is an important additional quantity to consider. \section{Modelling of the impact event and the collisional evolution of the ejecta}\label{Sec:Modelling} When assessing the ejection of exoplanetary material into a circumstellar orbit by an impact event, different issues have to be considered. The amount of ejected material depends on the impactor's size, its speed, but also on the planet's mass. Certain substances may be damaged or completely destroyed by high pressure, melting or evaporation. It is also important to estimate the depth from which the ejected debris originate. In addition, once in orbit, the debris can collide and produce new, smaller debris. It is this collisional evolution that will determine the overall lifetime of the debris cloud and its luminosity. We neglect the effect of the impacted body's atmosphere on both the impactor and the escaping material. Concerning the impactor, we may use the criterion developed by \citet{Shuvalov_etal_2014} to assess whether a given impactor is actually crater-forming, i.e.\ does not experience fragmentation and deceleration during the traversal of the atmosphere. \citet{Shuvalov_etal_2014} propose that a crater-forming impactor satisfies the following condition: \begin{equation}\label{eq:impactor_atmosphere_criterion} \frac{B_\mathrm{fr}a}{H}\sqrt{\frac{\rho_\mathrm{i}}{\rho_\mathrm{atm}}}>1 \end{equation} with $B_\mathrm{fr}$ a constant equal to 3.5, $a$ the radius of the impactor, $H$ the scale height of the atmosphere, $\rho_\mathrm{i}$ the impactor's density and $\rho_\mathrm{atm}$ the atmospheric density at the surface of the exoplanet. Equation \ref{eq:impactor_atmosphere_criterion} implies that for a Venus-like atmosphere, a 1\,km-diameter asteroid or a 2\,km-diameter comet are crater-forming. For the atmosphere studied by \citet{Shuvalov_etal_2014} (a 200\,bar atmosphere with a scale height of 40\,km), a 8\,km-diameter asteroid or a 14\,km-diameter comet are crater-forming. In the following sections, we will consider impactors with a diameter of 20\,km that should thus be crater-forming even for thick atmospheres. An atmosphere may also decelerate ejected material and thus hamper the escape of planetary surface material. However, a large impact can essentially remove the atmosphere from the impact site (N.\ Artemieva 2015, private communication) and allow fragments of any size to escape the planet if they are launched with a speed higher than the escape speed. This is in sharp contrast to small-scale impacts, where atmospheric drag can prevent small fragments from escaping \citep{Artemieva_Ivanov_2004}. We use the study by \citet{Shuvalov_2009} to estimate under which conditions atmospheric effects can be neglected. \citet{Shuvalov_2009} defines an dimension-less impact strength given by\footnote{Note that there is a typo in equation 2 (the definition of $\xi$) in \citet{Shuvalov_2009}, that was corrected in equation 2 of \citet{Shuvalov_etal_2014}.} \begin{equation} \xi = \frac{8a^3\rho_\mathrm{i}}{H^3\rho_\mathrm{atm}} \frac{v_\mathrm{i}^2-v_\mathrm{esc}^2}{v_\mathrm{esc}^2} \frac{\rho_\mathrm{t}}{\rho_\mathrm{t}+\rho_\mathrm{i}} \end{equation} where $v_\mathrm{i}$ is the speed of the impactor, $v_\mathrm{esc}$ the escape speed and $\rho_\mathrm{t}$ the density of the target rock. From equation 7 in \citet{Shuvalov_2009}, we find that for $\xi>1000$, effects of the atmosphere on the escaping target material can be neglected\footnote{There are two typos in equation 7 of \citet{Shuvalov_2009}. It should read $\log\chi_\mathrm{t}=\min(\log(0.02),-4+0.767\log\xi)$ (Shuvalov 2016, private communication).}. Using the impactor speeds of the impact scenarios considered in section \ref{subsec:results}, we find that for an Earth-sized exoplanet with an Earth-like atmosphere, a 3--4\,km-diameter impactor is enough to neglect atmospheric effects. On the other hand, for a Venus-sized exoplanet with a Venus-like atmosphere, a $\sim$24\,km-diameter impactor is required. For smaller exoplanets, a thicker atmosphere is tolerable because the escape velocity decreases. We conclude that for the scenarios considered in this study (20\,km-diameter impactor), our approach to neglect the atmospheric effect on the escaping fragments is valid approximately up to atmospheres as thick as that of Venus. \subsection{Amount of ejected material}\label{subsec:ejected_material} We distinguish here between two estimates: the total amount of ejecta that can escape the target, and the amount of ejecta that can escape without being ``damaged'' by high shock pressure, that is, that can retain some detectable signature of ``pristine'' exoplanetary material (possibly biosignature). \subsubsection{Total ejected mass}\label{subsec:totalejected} To estimate the \emph{total} amount of escaping ejecta, we use an ejecta model calibrated by laboratory measurements \citep{Housen_Holsapple_2011}. For a rock to escape the planet's gravitation field, the ejection velocity $v_\mathrm{e}$ needs to be larger than $v_\mathrm{esc}=\sqrt{2GM/R}$ with $M$ and $R$ the planetary mass and radius and $G$ the gravitational constant. The mass ejected with a velocity larger than $v_\mathrm{e}$ can be estimated by \begin{equation}\label{eq:total_ejecta} M_\mathrm{e}(>v_\mathrm{e})=\frac{3k}{4\pi}\frac{\rho_\mathrm{t}}{\rho_\mathrm{i}}\left[\left(\frac{x(v_\mathrm{e})}{a} \right)^3-n_1^3\right] m \end{equation} Here $m$ is the mass of the impactor and $k=0.3$ and $n_1=1.2$ are constants \citep[table 3, rock target, in][]{Housen_Holsapple_2011}. For the target rock density $\rho_\mathrm{t}$, we assume 3000\,kg\,m$^{-3}$. The distance to the impact centre $x(v_\mathrm{e})$ can be computed numerically for a given ejection velocity $v_\mathrm{e}$ by using \begin{equation} v_\mathrm{e}=C_1\left[\frac{x}{a} \left(\frac{\rho_\mathrm{t}}{\rho_\mathrm{i}}\right)^\nu \right]^{-1/\mu}\left(1-\frac{x}{n_2R} \right)^p v_\mathrm{i} \end{equation} with $C_1=1.5$, $\nu=0.4$, $\mu=0.55$, $n_2=1.5$ and $p=0.5$ constants. Finally, the transient crater radius $R$ (in the gravity regime) is given by \begin{equation}\label{eq:crater_radius} R=H_1\left( \frac{m}{\rho_\mathrm{t}}\right)^{1/3}\left(\frac{\rho_\mathrm{t}}{\rho_\mathrm{i}} \right)^{(2+\mu-6\nu)/[3(2+\mu)]}\left(\frac{ga}{v_\mathrm{i}^2} \right)^{-\mu/(2+\mu)} \end{equation} where $g$ is the surface gravity of the target body and $H_1$ is a constant. Table \ref{tab:impact_results} lists transient crater radii for the impact scenarios considered in this work. Unfortunately, \citet{Housen_Holsapple_2011} do not give an estimate for $H_1$ in the case of a rocky target. We adopt $H_1=0.6$ based on values for other target materials, but note that our results only weakly depend on the exact value of $H_1$. \subsubsection{Ejected mass of ``intact'' material}\label{subsec:nondamaged} We now estimate the amount of material escaping an exoplanet without being affected by high pressure induced shock damage, melting or evaporation. This material will be most representative of the exoplanet because it was least modified by the impact. A lot of parallels can be drawn to the study of lithopanspermia, i.e.\ the study of possible interplanetary life transfer by means of ejected rocks. To avoid sterilisation of the rock during ejection, the temperature of the rock must not rise above $T_\mathrm{max}\sim370$\,K. In our case, the maximum tolerable temperature depends on the nature of the substance of interest. For minerals, $T_\mathrm{max}$ could be significantly higher and for example given by the temperature for melting. Interestingly, impact models predict that, while most ejecta reaching escape velocity melt or evaporate, a small fraction is in fact subject to low pressure and consequently low temperature. This is possible because the interference of the stress and rarefaction waves creates a region of low pressure, but with high pressure gradient that can accelerate fragments to escape velocity \citep{Melosh_1985}. The mass of these spalled ejecta can be estimated by using a formula originally derived by \citet{Melosh_1985}, with a mathematical error corrected by \citet{Armstrong_etal_2002}: \begin{equation}\label{eq:spallation} M_\mathrm{e}(>v_\mathrm{e},<P_\mathrm{max})=\frac{3P_\mathrm{max}}{4\rho_\mathrm{t}c_\mathrm{L}v_\mathrm{i}}\left[\left(\frac{v_\mathrm{i}}{2v_\mathrm{e}} \right)^{5/3}-1 \right]m \end{equation} where $M_\mathrm{e}(>v_\mathrm{e},<P_\mathrm{max})$ is the mass of ejecta leaving the surface with a velocity larger than $v_\mathrm{e}$ and shocked to a pressure equal or below $P_\mathrm{max}$ and $c_\mathrm{L}$ is the sound speed in the target rock ($\sim$6\,km\,s$^{-1}$). We see from equation \ref{eq:spallation} that the impactor's speed $v_\mathrm{i}$ needs to be larger than 2$v_\mathrm{esc}$ for any spalled rocks to leave the planet. On the other hand, there is also a maximum velocity a spalled fragment can be ejected with: $v_\mathrm{e,max}=v_\mathrm{i}/2$. Obviously equation \ref{eq:spallation} is only valid up to a certain value of $P_\mathrm{max}$ \citep[see][footnote 4, for the constraint on $P_\mathrm{max}$ to be fulfilled for applicability of the equation]{Melosh_1985}. We note that the spallation theory leading to equation \ref{eq:spallation} is in principle only valid for ejection velocities up to 1\,km/s \citep{Melosh_1984}, but has been used for larger ejection velocities by various authors \citep[e.g.][]{Mileikowsky_etal_2000,Armstrong_etal_2002}, including \citet{Melosh_1985} himself. We show in section \ref{subsec:compatibility} that it provides reasonable estimates of the spalled mass when compared to numerical simulations. Depending on the nature of the substance under consideration, $P_\mathrm{max}$ takes different values. In the case of microorganisms, \citet{Mileikowsky_etal_2000} adopted a maximum acceptable temperature of 370\,K, corresponding to $P_\mathrm{max}=1$\,GPa as the limiting pressure for survival. However, \citet{Artemieva_Ivanov_2004} argued that launch of Martian meteorites is not possible without substantial ($>10$\,GPa) compression, but that the temperature increase may still be well below 100\,K. For our study, the survival of the ejected microbes is not important. Rather, they should remain intact to a degree so to retain their spectral characteristics making them detectable. Therefore, we adopt $P_\mathrm{max}=10$\,GPa for microbes. For minerals on the other hand, we set $P_\mathrm{max}$ equal to 50\,GPa. This can be considered a typical, though conservative\footnote{Conservative in the sense that we are not likely overestimating the fraction of undamaged material.} pressure where rocks or minerals start to melt. For example, according to \citet{Pierazzo_Melosh_1999}, the pressure for incipient melting is 46\,GPa for granite and 135\,GPa for dunite. \citet{Melosh_1989} lists pressures of incipient melting for limestone (66\,GPa, but calcite decarbonation starts already at 45\,GPa) and granite (78\,GPa, i.e.\ different from the \citet{Pierazzo_Melosh_1999} value). For granite and dunite, the pressure for complete melting is only slightly above the one for incipient melting \citep{Pierazzo_Melosh_1999}. $P_\mathrm{max}=50$\,GPa is used to determine the fraction of the ejecta escaping without melting or evaporation. Fragments produced from melt or vapour have a different size distribution which affects their collisional evolution (sections \ref{size_dist} and \ref{coll_evolution}). \subsubsection{Compatibility of the two prescriptions}\label{subsec:compatibility} Our choice of using two different equations for the spalled ejecta that are subject to a maximum pressure constraint and the total ejecta is in principle not self-consistent. However, we can check that they do not give incompatible results for the range of parameters considered here. One good test is to check if equation \ref{eq:spallation} tends towards equation \ref{eq:total_ejecta} when $P_\mathrm{max}$ is set to the maximum value it can reach anywhere within the target. We follow \citet{Melosh_1985} who found that this maximum pressure should be of the order of a few hundred GPa for a violent impact event, and consider $P_\mathrm{max}=400$\,GPa. Putting this value in equation \ref{eq:spallation} (although the equation might not be applicable anymore for such a high value of $P_\mathrm{max}$), we find a mass of spalled ejecta that agrees within a factor $\sim$3 with the total ejecta given by equation \ref{eq:total_ejecta}. Another check is to compare predictions of equations \ref{eq:spallation} and \ref{eq:total_ejecta} to estimates obtained from detailed numerical simulations of impact events. Taking as a first reference the results of \citet{Artemieva_Morgan_2009}, who simulated the Chicxulub impact and calculated both the amount of solid escaping ejecta and total escaping ejecta, we find an order of magnitude agreement with both our spalled ejecta estimate (equation \ref{eq:spallation}) with $P_\mathrm{max}=46$\,GPa (no melting) and the total ejecta estimate from equation \ref{eq:total_ejecta}. As a second test, we take the results of \citet{Artemieva_Ivanov_2004}, who numerically studied the ejection of Martian meteorites, defined as ejecta with $P_\mathrm{max}<50$\,GPa. The corresponding prediction of equation \ref{eq:spallation} agrees with the simulation results within a factor of $\sim$2. We then consider the results of \citet{Artemieva_Shuvalov_2008}, who simulated impact ejecta escaping the Moon for both asteroidal and cometary impactors and kept track of the maximum pressure experienced by the ejecta. Comparing with predictions from equations \ref{eq:spallation} and \ref{eq:total_ejecta}, we again find agreement within a factor of $\sim$3 for the spalled ejecta and a factor better than 2 for the total ejecta. Finally, we compare our calculations to simulations of impacts on Titan by \citet{Artemieva_Lunine_2005} and \citet{Korycansky_Zahnle_2011} with predictions from equation \ref{eq:total_ejecta} and again find agreement within a factor of $\sim$3. In summary, we conclude that the usage of equations \ref{eq:spallation} and \ref{eq:total_ejecta} is justified for our order-of-magnitude study. \subsubsection{Results}\label{subsec:results} Table \ref{tab:impact_results} shows the total escaping mass (both in absolute units and relative to the impactor mass) as well as the fraction subject to peak pressures below $P_\mathrm{max}$ for the different impact scenarios considered in this study. The impactor's diameter is fixed to 20\,km (for comparison, the diameter of the K-T impactor is estimated to $\sim$10\,km). Note that the ejecta \emph{fraction} subject to a certain pressure constraint is independent of the impactor's mass (equation \ref{eq:spallation}). We consider impacts on Earth, Mars and the Moon as proxies to represent exoplanets of different sizes. The size distribution of exoplanets smaller than Earth is poorly constrained at the moment, but current data are consistent with a distribution that continues to rise towards smaller radii \citep[e.g.][and references therein]{Morton_Swift_2014,Bovaird_etal_2015}. Exoplanets down to the size of Mercury and smaller have already been detected \citep{Barclay_etal_2013,Campante_etal_2015}. We consider two kinds of impactors: asteroids and comets (i.e.\ impactors of different densities and impact velocities). We take the distribution of asteroid and comet impact velocities upon Earth \citep{Steel_1998,Jeffers_etal_2001} as a basis for the considered impact events, acknowledging that an exoplanetary system might have a different architecture resulting in different dynamics and a different impact velocity distribution. For asteroids, we assume an impact velocity upon Earth of $v_\mathrm{i,E}=33$\,km\,s$^{-1}$. Only a relatively small fraction ($\lesssim$10\%) of impacting asteroids have $v_\mathrm{i,E}>33$\,km\,s$^{-1}$ \citep{Jeffers_etal_2001}. However, no escaping spalled material would be generated for the Earth-sized planet if the mean asteroid impact velocity was taken (mean impact velocity for asteroids is 21.7\,km\,s$^{-1}$ while the escape velocity of the Earth is 11.2\,km\,s$^{-1}$, i.e.\ $v_\mathrm{i}\ngtr2v_\mathrm{esc}$). Comets, on the other hand, have much higher impact velocities. We assume an impact velocity upon Earth of $v_\mathrm{i,E}=65$\,km\,s$^{-1}$. From this, we assign impact velocities upon the Mars- and Moon-like bodies by taking into account their lower masses and invoking energy conservation, i.e.\ $v_\mathrm{i,M}^2=v_\mathrm{i,E}^2-v_\mathrm{esc,E}^2+v_\mathrm{esc,M}^2$ (where the subscript M stands for Mars or Moon). For the density of the impactor, we assume 3000\,kg\,m$^{-3}$ for asteroids and $1000$\,kg\,m$^{-3}$ (water ice) for comets. Note that comets would lead to a dust signature from the target that is less "polluted" by impactor material, due to the comets higher volatile content compared to asteroids \citep{Morlok_etal_2014}. \begin{table*}[p] \caption{Impact velocities, total escaping masses and percentages subject to pressures lower than $P_\mathrm{max}=50$\,GPa respectively 10\,GPa for targets analogue to Earth, Mars and the Moon. The impactor's diameter is 20\,km (corresponding to $m=1.3\times10^{16}$\,kg for the asteroid and $m=4.2\times10^{15}$\,kg for the comet). Cometary impactors have higher impact velocity, but lower density compared to asteroids. The table also shows values for the transient crater diameter $R$, the excavation depth $H_\mathrm{exc}$ and the spall thickness $z_\mathrm{spa}$.} \label{tab:impact_results} \centering \begin{tabular}{c c | c c c c c c} \hline\hline parameter & & \multicolumn{3}{c}{asteroid} & \multicolumn{3}{c}{comet} \\ & & Earth & Mars & Moon & Earth & Mars & Moon\\ \hline $v_\mathrm{i}$ & km\,s$^{-1}$ & 33.0 & 31.5 & 31.1 & 65.0 & 64.2 & 64.1 \\ $M(>v_\mathrm{esc})$ & $10^{15}$\,kg & 7.2& 27.2 & 89.8 & 5.6 & 23.5 & 79.1 \\ $M(>v_\mathrm{esc})/m$& & 0.6 & 2.2 & 7.1 & 1.3 & 5.6 & 18.9\\ $<10$\,GPa & \% & 2.0 & 3.5 & 4.1 & 2.3 & 2.4 & 2.6\\ $<50$\,GPa (non-molten) & \%& 10.1 & 17.4 & 20.5 & 11.7 & 12.1 & 13.0\\ molten or vapourised & \%& 89.9 & 82.6 & 79.5 & 88.3 & 87.9 & 87.0\\ $R$ & km & 72.1 & 87.0 & 103.6 & 68.4 & 83.9 & 100.2 \\ $H_\mathrm{exc}$ & km & 14.4 & 17.4 & 20.7 & 13.7 & 16.8 & 20.0 \\ $z_\mathrm{spa}$ & m& $8.4$ & $15.5$ & $30.4$ & $7.0$ & $14.4$ & $29.6$ \\ \hline \end{tabular} \end{table*} \subsection{From what depth are escaping fragments originating?}\label{sec:excavation_depth} In this section we estimate the depth below the exoplanetary surface from which escaping material can originate. This estimate needs to be related to e.g.\ the depth of the subsurface biosphere or the geological depth profile. A first important parameter is the excavation depth, which is the maximum depth from which material is launched upwards above the target's surface after the impact, and thus represents an upper limit on the depth of origin of any ejecta. It does \emph{not} correspond to the full depth of the crater, because material below the maximum depth of excavation is displaced downwards instead \citep[see e.g.\ figures 5.13 and 5.14 in][]{Melosh_1989}. \citet{Melosh_1989} provided an estimate of the excavation depth $H_\mathrm{exc}$ from the transient crater radius $R$: \begin{equation} H_\mathrm{exc}\approx\frac{R}{5} \end{equation} The radius of the transient crater can be calculated from equation \ref{eq:crater_radius}. Thus, we can conservatively say that the depth of origin of the escaping ejecta is $z< H_\mathrm{exc}$. Table \ref{tab:impact_results} lists $H_\mathrm{exc}$ for the impact scenarios considered in this work. We find the excavation depth to be comparable to the impactor diameter. However, in the main excavation flow the material ejected at high velocity near the impact point generally comes from shallower levels in the target. Given typical Maxwell z-model particle trajectories \citep[e.g.][]{Maxwell_1977,Wada_etal_2004}, one can estimate that the ejecta launched with escape velocity originate from a depth that is at least a factor of a few smaller than the excavation depth \citep[see e.g.\ figure 3 of][for $x/R\sim0.3$, estimated from the model in section \ref{subsec:totalejected}]{Wada_etal_2004}. Given the values for $H_\mathrm{exc}$ listed in table \ref{tab:impact_results}, this means that escaping ejecta do not originate deeper than a few kilometres below the surface, i.e. comparable to the limits of the deep biosphere on Earth \citep[e.g.][]{Cockell_Barlow_2002}. Additionally, the \emph{low-pressure} (spalled) ejecta launched with high velocity are thought to originate from a zone even closer to the surface, characterised by the spall thickness $H_\mathrm{spa}$ \citep[denoted $z_\mathrm{S}$ by][]{Melosh_1985}. It can be estimated from the equation given by \citet{Melosh_1985}. As can be seen in Table \ref{tab:impact_results}, the spall thickness is of the order of only 10--30 metres. \subsection{Size distribution of the escaping fragments}\label{size_dist} The size distribution of the fragments is a fundamental property, as it will determine their subsequent collisional evolution (see section \ref{coll_evolution}). We need here to clearly distinguish between the two populations of post-impact solid fragments: 1) The ``spalled population'', i.e., fragments that escape in the solid state (spalled ejecta, typically a few percent up to 20\%, see table \ref{tab:impact_results}), and 2) the ``recondensed population'', corresponding to escaping fragments produced from the recondensation of melt or vapour. \subsubsection{Size distribution profile}\label{size_distprof} The size distribution of the produced fragments in the aftermath of violent impacts depends on several geometrical, dynamical and physical parameters and is difficult to constrain with precision, as revealed by several laboratory and numerical studies over the past three or four decades \citep[e.g.][]{Capaccioni_etal_1986,Housen_Holsapple_2011,Durda_etal_2015}. In most cases, however, this distribution can be approximated by a single power law of the form \citep[e.g.][]{Buhl_etal_2014} \begin{equation}\label{PSD_powerlaw} N(>D)\propto D^{-A} \end{equation} where $N(>D)$ is the number of particles with a diameter larger than $D$ and $A$ is the power law exponent. \citet{Buhl_etal_2014} compiled measurements of the exponent $A$ from impact experiments for different target materials. Most measurements yield $A\approx 2.5$ independent of target material. Interestingly, the same $A=2.5$ power law exponent is also theoretically expected for the size distribution arising from a collisional cascade in a steady state \citep{Dohnanyi_1969}. This significantly simplifies the modelling of the collisional evolution for both the spalled and recondensed material (see section \ref{coll_evolution}). For the spalled population, we can assume that the form of the size distribution remains constant, regardless of whether debris have been collisionally reprocessed or not\footnote{Poynting-Robertson drag, on the other hand, can change the shape of the size distribution.}. It also allows us to assume that particles recondensed from melt or vapour follow the size distribution of equation \ref{PSD_powerlaw} after a build-up phase where the initially monosized population is transformed into a steady-state collisional cascade. Note that equation \ref{PSD_powerlaw} applies in principle to \emph{all} produced fragments and does not necessarily apply to \emph{escaping} fragments. It might overestimate the number of large escaping fragments, because large fragments tend to have lower velocities and have smaller chances to reach escape velocity \citep[as predicted by the Grady-Kipp distribution, see][]{Artemieva_Ivanov_2004}. However, given that the size-dependent velocity distribution is in itself poorly constrained and that the size distribution might also change due to unknown local conditions such as surface properties, water content of the target rock etc.\ we chose to keep equation \ref{PSD_powerlaw} as a reasonable first-order approximation of the \emph{initial} size distribution of the spalled population. The situation is radically different for the recondensed population. It is indeed expected that melt or vapour recondense into particles of a relatively narrow size range \citep{Johnson_Melosh_2012,Johnson_Melosh_2014}. As a consequence, we will here assume that all recondensed material has \emph{initially} a monosized distribution. \subsubsection{Size range}\label{size_distrange} To complete the description of escaping fragment sizes, the upper and lower cut-off of the size distribution need to be estimated. Regarding the lower end of the fragments size distribution, we can assume that it stretches all the way down to the stellar blowout size $D_\mathrm{bl}$, below which grains are expelled from the system by the radiation force of the host star. If we assume blackbody grains, this force is given by \begin{equation}\label{eq:radiation_force} F_\mathrm{rad}(D)=\frac{L_*D^2}{16cr^2} \end{equation} where $L_*$ is the stellar luminosity and $r$ is the distance between the grain and the star. Then, the ratio between radiation force and stellar gravity is then given by \begin{equation}\label{eq:beta} \beta(D)=\frac{F_\mathrm{rad}}{F_\mathrm{grav}}=\frac{3L_*}{8\pi cGM_*D\rho} \end{equation} with $M_*$ the stellar mass and $\rho$ the grain's density. If we consider that small grains are produced from parent bodies on circular Keplerian orbits, then the blowout size $D_\mathrm{bl}$ is obtained by setting $\beta=1/2$. For a solar type star, this is typically of the order of a micrometer. Concerning the size of the largest fragment, we note that the two fragment populations do here strongly differ from one another, the spalled population extending up to fragments much larger than those of the recondensed population. The aforementioned studies by \citet{Johnson_Melosh_2012,Johnson_Melosh_2014} that investigated the recondensation of vapour into spherules as well as molten material into melt droplets and accretionary impact lapilii, have found that such particles have a narrow range of sizes typically peaking between 100\,$\mu$m to 1\,mm. We shall assume that all recondensed particles initially have a size equal to the expected value of the melt droplet size, which we calculated from equation (7) in \citet{Johnson_Melosh_2014} and the probability density distribution of the ejection velocity described in section \ref{coll_evolution_anal}. This initial particle size is obviously also the largest particle size within the recondensed population during its collisional evolution (collisions act exclusively destructively) and is listed as $D_\mathrm{max}$ in table \ref{tab:recondensed}. In fact, there will be a dispersion of particle sizes, but an initially monosized population is the simplest assumption and is closer to reality than a power law distribution extending down to the blowout size. Taking the melt droplet size as representative even for spherules produced from \emph{vapour} is justified since \citet{Johnson_Melosh_2014} found that the vapour plume is not dominating the high velocity ejecta. Also, melt droplet sizes are of the same order of magnitude as the spherule sizes computed by \citet{Johnson_Melosh_2012}. As for the spalled population that was neither vaporised nor molten, we estimate the size of the largest fragment from \citep{Grady_Kipp_1980,Melosh_1985,Melosh_1992}\footnote{Note that there seems to be a typo in \citet{Artemieva_Ivanov_2004} for the expression of $D_\mathrm{max}$; their first term of the equation reads $(m_\mathrm{w}+3)/2$.}: \begin{equation}\label{eq:Dmax} D_\mathrm{max}=\frac{m_\mathrm{w}+2}{3}\frac{T}{\rho_\mathrm{t}v_\mathrm{e}^{2/3}v_\mathrm{i}^{4/3}}2a \end{equation} where $m_\mathrm{W}$ is a Weibull constant with the value 9.5 for basalt and $T$ is the tension at fracture (typically 0.1\,GPa for basalt and other igneous rocks). This equation is in principle derived for a fragment size distribution (the Grady-Kipp distribution) that is different from the $A=2.5$ power law distribution, but we still use it as an order of magnitude estimate of the upper cut-off. We find that $D_\mathrm{max}$ is typically a few metres, depending on the impact and ejection velocities assumed (see table \ref{tab:spalled}). \subsection{Collisional evolution of the fragment cloud}\label{coll_evolution} Once in a circumstellar orbit, the ejected debris start to collide and produce new, smaller fragments. The detailed quantitative investigation of the fragment cloud's collisional evolution would be a long-term undertaking, requiring the use of advanced numerical tools \citep[like the new-generation LIDT-DD code by][]{Kral_etal_2013,Kral_etal_2015} which greatly exceeds the scope of the present study. We follow here instead a simplified analytical approach in the spirit of \citet{Wyatt_etal_2007} or \citet{Jackson_etal_2014} and determine the typical collisional timescales within the fragment population. We also assume for simplicity that the fragments are distributed within an axisymmetric circumstellar belt. This assumption is clearly erroneous in the first stages after the impact since the debris originate from a specific point in space. However, because of Keplerian shear, they will relatively quickly spread in longitude, forming a ring-like structure. This ring will be asymmetric at first, with all ejecta orbits passing through the initial impact location, but it will progressively become axisymmetric due to the target planet's perturbations \citep[see e.g.][]{Jackson_Wyatt_2012} and also mutual collisions amongst the debris \citep{Kral_etal_2015}. We make an additional assumption, similar to that of \citet{Jackson_Wyatt_2012} for the post-Lunar-forming impact, and consider that the recondensed and spalled populations do not interact with each other and have separate collisional evolutions. We check the validity of this assumption with test runs using the statistical collisional code of \citet{Thebault_Augereau_2007}, showing that (for the reference asteroid-on-Earth impact case) the evolution of the spalled plus recondensed run is very close to the sum of the spalled-only and recondensed-only runs. The difference in terms of the total fractional luminosity is always less than 10\%. \subsubsection{Analytical prescription}\label{coll_evolution_anal} Following \citet{Wyatt_Dent_2002} and \citet{Wyatt_etal_2007}, the collisional lifetime of a particle of diameter $D$ within a belt at distance $r$ from the host star and width $\Delta r$ can be expressed as \footnote{As underlined in the previous paragraph, the formalism of equation \ref{eq:t_coll} ignores the initial asymmetries in the ejecta's spatial distribution, but it is a reasonable order-of-magnitude approximation of collision lifetimes once the Keplerian shear and planet perturbations have morphed the fragment cloud into a ring-like structure. Note that the advanced simulations of \citet{Kral_etal_2015} have also confirmed that equation \ref{eq:t_coll} \citep[or its equivalent version found in][]{Loehne_etal_2008} is a satisfying first-order estimate of collision rates amongst post-impact debris} \begin{equation}\label{eq:t_coll} t_\mathrm{coll}(D) = \frac{2It_\mathrm{per}r\Delta r}{\sigma_\mathrm{c}(D)f(e,I)} \end{equation} where $I$ is the mean orbital inclination, $t_\mathrm{per}$ is the orbital period at $r$, $\sigma_\mathrm{c}(D)$ is the catastrophic cross-section (defined below) seen by a particle of diameter $D$ and $f(e,I)$ is the ratio between the relative velocity between the fragments $v_\mathrm{rel}$ and the Keplerian velocity $v_\mathrm{Kep}$ at $r$. The value of $f(e,I)$ depends on the inclination and the orbital eccentricity $e$. We can estimate the mean eccentricity by setting $\mean{e}=\mean{v_\infty}/v_\mathrm{Kep}$, where $\mean{v_\infty}$ is the mean speed of the escaping fragments once they have left the gravitational field of the planet (i.e.\ at ``infinite distance'' from the planet). We estimate $\mean{v_\infty}$ by first using equations \ref{eq:total_ejecta} and \ref{eq:spallation} to derive probability density distributions $p(v_\mathrm{e})$ of the ejection velocities\footnote{For simplicity, we use equation \ref{eq:total_ejecta} to compute the probability distribution of the recondensed population, although this equation describes the total ejecta. This is an acceptable simplification since recondensed material always makes up more than 80\% of the total escaping mass (see Table 1).}, i.e.\ $p(v_\mathrm{e})\mathrm{d}v_\mathrm{e}$ is the probability of an \emph{escaping} fragment to be ejected with $v_\mathrm{e}\pm\mathrm{d}v_\mathrm{e}$. This is achieved by taking the derivative of equations \ref{eq:total_ejecta} and \ref{eq:spallation} with respect to $v_\mathrm{e}$ and then normalising such that the integral from $v_\mathrm{esc}$ to the maximum ejection velocity is unity. By using equations \ref{eq:total_ejecta} and \ref{eq:spallation} to derive $p(v_\mathrm{e})$, we have assumed that the size distribution of a group of fragments with ejection velocity $v_\mathrm{e}$ does not depend on the value of $v_\mathrm{e}$. We transform $p(v_\mathrm{e})$ to a distribution $p(v_\infty)$ by using the relation $v_\mathrm{e}^2=v_\mathrm{esc}^2+v_\infty^2$. From $p(v_\infty)$, we calculate the expected value $\mean{v_\infty}$. The width of the ring can also be estimated from the mean eccentricity: $\Delta r\approx\mean{e}\cdot r$. In addition, we set $I=e/2$ by assuming equipartition between in-plane and out-of-plane velocities. The computed mean eccentricities $\mean{e}$ are given in tables \ref{tab:spalled} and \ref{tab:recondensed}. These results might appear counter-intuitive as, for the same impactor, we obtain higher $\mean{e}$ (and therefore higher $\mean{v_\infty}$) for the larger targets, for which the escaping fragments have to overcome a higher gravitational potential. This is due to the shape of the $M(v_\mathrm{e})\mathrm{d}v_\mathrm{e}$ curves of equations \ref{eq:total_ejecta} and \ref{eq:spallation}, which decrease steeply with $v_\mathrm{e}$ for low $v_\mathrm{e}$ values while having a flatter shape for higher ejecta velocities (see Figure \ref{fig:Me_ve}). Basically, the higher escape velocity of the Earth-like target truncates the distribution at a relatively high launch velocity, allowing only the tail to escape. Since the tail is relatively flat, the resulting $p(v_\infty)$ is rather flat as well, resulting in a higher $\mean{v_\infty}$. On the other hand, the total mass escaping from a Moon-like target is more dominated by fragments with $v_\mathrm{e}$ just above the escape velocity, resulting in low $\mean{v_\infty}$ and consequently low $\mean{e}$ (Figure \ref{fig:Me_ve}). This is also clearly seen in Figure \ref{fig:p_vinfty}, which shows the corresponding probability density distributions for $v_\infty$. \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig1} \caption{Total escaping mass (in differential form, i.e.\ mass per ejection velocity bin $\mathrm{d}v_\mathrm{e}$) as a function of ejection velocity $v_\mathrm{e}$, for an asteroid impact, derived from equation \ref{eq:total_ejecta}. It can be seen that for a Moon-like target, the ejected mass is more dominated by fragments launched with a velocity just above the escape velocity (note that the y-axis is logarithmic). For the Earth-like target, the overall distribution is flatter, resulting in higher mean orbital velocity and consequently higher mean eccentricity.} \label{fig:Me_ve} \end{figure} \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig2} \caption{Probability density distribution of $v_\infty=\sqrt{v_\mathrm{e}^2-v_\mathrm{esc}^2}$ for an asteroid impact onto an Earth- and Moon-like target, derived from equation \ref{eq:total_ejecta}. The vertical dashed lines indicate the expected values of the distributions.} \label{fig:p_vinfty} \end{figure} The catastrophic cross-section $\sigma_\mathrm{c}(D)$ depends on the minimum size $D_\mathrm{c}(D)$ a particle needs to have in order to collisionally destroy a particle of diameter $D$. It is given by $D_\mathrm{c}(D)=(2Q_D^*/v_\mathrm{rel}^2)^{1/3}D$, where $Q_D^*$ is the specific energy needed to break up the target. We describe the dependence of $Q_D^*$ on the target size $D$ with a broken power law with parameters determined by \citet{Benz_Asphaug_1999}, although the mean relative velocities we encounter in the case of Earth- or Mars-like targets are higher than what was considered by these authors. The catastrophic cross-section $\sigma_\mathrm{c}(D)$ seen by a fragment of diameter $D$ is then given by \begin{equation} \sigma_{c}(D)=\int_{D_\mathrm{x}(D)}^{D_\mathrm{max}}\frac{(D+D^\prime)^2}{4}\pi N(D^\prime)\mathrm{d}D^\prime \end{equation} with $N(D^\prime)$ the size distribution in differential form\footnote{This means that $N(D)\mathrm{d}D$ is the number of particles within an infinitesimal diameter bin $\mathrm{d}D$.} and $D_\mathrm{x}(D)=D_\mathrm{c}(D)$ if $D_\mathrm{c}(D)>D_\mathrm{min}$ and $D_\mathrm{x}(D)=D_\mathrm{min}$ otherwise ($D_\mathrm{min}$ is the minimum size present in the collisional cascade). \subsubsection{Collisional vs. Poynting-Robertson timescales}\label{coll_evolution_cpr} Figure \ref{fig:timescales} shows $t_\mathrm{coll}(D)$ for the fully populated collisional cascade of the spalled and the recondensed populations. We see that the collisional timescale decreases with decreasing fragment diameter $D$ until a minimum is reached for a size $D^*$ that is greater than the blowout size $D_\mathrm{bl}$. For fragments with $D_\mathrm{bl}<D<D^*$, the collisional timescale increases again because of the absence of $D<D_\mathrm{bl}$ grains, which would have been potentially destructive collisional partners. However, in the small-size domain, the survival time of grains might be imposed not by $t_\mathrm{coll}$, but by another crucial mechanism: Poynting-Robertson drag (PR-drag), which is also caused by the radiation of the star and makes particles to spiral into the star\footnote{We shall ignore stellar wind drag, an effect similar to PR-drag caused by particles ejected from the star, since its importance depends e.g.\ on the stellar activity.}. The typical timescale for the inward drift is given by \citep[e.g.][]{Burns_etal_1979} \begin{equation}\label{eq:t_PR} t_\mathrm{PR}(D)=\frac{cr^2}{4GM_*\beta(D)} \end{equation} We estimate $t_\mathrm{PR}(D)$ for the present set-up and plot it as a dashed green line on Figure \ref{fig:timescales}. As can be seen, this line intersects the $t_\mathrm{coll}(D)$ line at a size $D_\mathrm{PR}\geq D_\mathrm{bl}$. Particles with sizes below $D_\mathrm{PR}$ will thus be removed from the disk before they have had the time to significantly collisionally interact with their environment. As a consequence, we can expect the size distribution to be strongly depleted in the $D_\mathrm{bl}<D<D_\mathrm{PR}$ domain. Another important timescale is $t_\mathrm{max}=t_\mathrm{coll}(D_\mathrm{max})$ that sets the timescale for the evolution of the system's total mass, since, as a consequence of the $A=2.5$ power law size distribution, the mass is essentially contained in the largest bodies of the collisional cascade (while most of the cross-section is contained in the smallest bodies). This timescale will thus give the typical survival time of the post-ejection cloud. The system's total mass evolution can be described by \citep[e.g.][]{Wyatt_etal_2007} \begin{equation}\label{Mtot_vs_t} M_\mathrm{tot}(t)=\frac{M_\mathrm{tot}(0)}{1+t/t_\mathrm{max}(0)} \end{equation} where $M_\mathrm{tot}(0)=M_\mathrm{e}(>v_\mathrm{esc})$ and $t_\mathrm{max}(0)$ is the collisional timescale of the largest fragment at $t=0$. Finally, for the recondensed population, an important timescale is $t_\mathrm{coll,ini}$, the collisional timescale of the initially monosized population. This timescales sets the duration of the initial phase that transforms the monosized population into a fully populated collisional cascade following the power law of equation \ref{PSD_powerlaw}. Tables \ref{tab:spalled} and \ref{tab:recondensed} list all these important timescales, computed for the different impact scenarios considered. We assumed $r=1$\,AU and a central star with solar parameters. \begin{table*}[!hp] \caption{Parameters characterising the collisional evolution of the spalled population.} \label{tab:spalled} \centering \begin{tabular}{c c | c c c c c c} \hline\hline parameter & & \multicolumn{3}{c}{asteroid} & \multicolumn{3}{c}{comet} \\ & & Earth & Mars & Moon & Earth & Mars & Moon\\ \hline $\mean{e}$ & - & 0.23 & 0.18 & 0.12 & 0.40 & 0.24 & 0.13\\ $D_\mathrm{max}$& m & 3.6 & 5.7 & 8.6 & 1.5 & 2.2 & 3.3\\ $D_\mathrm{PR}(t=0)$& mm & 10.7 & 1.4 & 0.4 & 4.7 & 1.3 & 0.4\\ $t_\mathrm{max}$ & Myr & 40.2 & 9.6 & 4.4 & 16.9 & 7.0 & 3.7\\ $f_\mathrm{max}$& - & $8.0\times10^{-10}$ & $4.2\times10^{-9}$ & $1.3\times10^{-8}$ & $1.1\times10^{-9}$ & $4.0\times10^{-9}$ & $1.2\times10^{-8}$\\ \hline \end{tabular} \end{table*} \begin{table*}[!hp] \caption{Parameters characterising the collisional evolution of the recondensed population. $D_\mathrm{PR}$ is not listed since it varies considerably during the collisional evolution.} \label{tab:recondensed} \centering \begin{tabular}{c c | c c c c c c} \hline\hline parameter & & \multicolumn{3}{c}{asteroid} & \multicolumn{3}{c}{comet} \\ & & Earth & Mars & Moon & Earth & Mars & Moon\\ \hline $\mean{e}$ & - & 0.42 & 0.26 & 0.15 & 0.39 & 0.25 & 0.14\\ $D_\mathrm{max}$& $\mu$m & 152.4 & 302.7 & 602.6 & 152.9 & 298.2 & 591.0\\ $t_\mathrm{coll,ini}$ & yr & $9.0\times10^4$ & $3.2\times10^4$ & $1.1\times10^4$ & $1.1\times10^5$ & $3.3\times10^4$ & $1.1\times10^4$\\ $t_\mathrm{max}$ & yr & $2.1\times10^3$ & $1.3\times10^3$ & $9.3\times10^2$ & $2.9\times10^3$ & $1.5\times10^3$ & $9.5\times10^2$\\ $f_\mathrm{max}$& - & $1.1\times10^{-6}$ & $2.7\times10^{-6}$ & $6.1\times10^{-6}$ & $8.4\times10^{-7}$ & $2.5\times10^{-6}$ & $5.9\times10^{-6}$\\ \hline \end{tabular} \end{table*} \subsubsection{Results: Luminosity evolution}\label{coll_evolution_res} Having identified these important timescales, we can schematically compute the collisional evolution of the debris. For simplicity, we assume that no dust other than the newly generated exoplanetary dust is present in the system. Since the competitive effect of collisions and PR-drag will strongly depend on stellar type, we present, for the sake of generality, two limiting scenarios. In the first scenario, the collisional cascade is always fully populated down to the blowout size and the mass decays according to equation \ref{Mtot_vs_t}. In the second scenario, we take PR-drag into account with the following scheme: as for the previous scenario, we assume the mass evolves according to equation \ref{Mtot_vs_t}, but, in addition, we compute at each time step the size $D_\mathrm{PR}$ below which PR-drag significantly suppresses collisions. Grains with a diameter $D<D_\mathrm{PR}$ are then exponentially removed on a timescale $t_\mathrm{PR}(D)$ during the rest of the calculation (i.e.\ smaller grains are removed faster). In other words, we assume that the mass $M_\mathrm{D}$ of grains with $D<D_\mathrm{PR}$ evolves as $\mathrm{d}M_\mathrm{D}/\mathrm{d}t=-M_\mathrm{D}/t_\mathrm{PR}(D).$ Figure \ref{fig:sigma_dist_t} illustrates how the size distribution changes under the influence of collisions and PR-drag. We assume that the spalled population evolves as just described from $t=0$ on. However, for the recondensed population, we include an initial build-up phase lasting from $t=0$ to $t=t_\mathrm{coll,ini}$. During this phase, the initially monosized population (all particles have size $D_\mathrm{max}$) is transformed into a fully populated cascade following the power law of equation \ref{PSD_powerlaw} extending down to the blowout size. We shall assume that during this phase, the total cross-section increases linearly\footnote{For a constant total mass, the cross-section increases as the size of the fragments decreases.} and that the mass stays constant. The latter assumption is justified by the fact that the PR-drag timescale of the initial monosized population is longer than $t_\mathrm{coll,ini}$ for all the scenarios we have considered. We can now estimate how the system's luminosity (in thermal emission) will evolve with time. The thermal emission of the dust can be characterised by the fractional luminosity, defined as the ratio of the infrared (IR) luminosity of the dust and the stellar luminosity: \begin{equation} f=\frac{L_\mathrm{IR}}{L_*} \end{equation} For blackbody grains (absorption efficiency $Q_\mathrm{abs}=1$), $f=\sigma_\mathrm{tot}/(4\pi r^2)$ with $\sigma_\mathrm{tot}$ the total cross-section of the fragments. Since $\sigma_\mathrm{tot}$ is known at any time, the calculation outlined above directly translates into a curve of fractional luminosity versus time. Figure \ref{fig:frac_lum} illustrates the temporal evolution of the fractional luminosity for two different impact scenarios: asteroidal body on a Moon-like target, and cometary body on an Earth-like target. We choose this two scenarios since they correspond to the maximum and minimum escaping mass respectively. Several important results and trends can be seen in figure \ref{fig:frac_lum}. The first one is that the spalled and recondensed populations have significantly different evolutions. The evolution of the recondensed debris can be divided into two phases: 1) an initial luminosity increase phase, as the collisional cascade progressively develops from the initially monosized grains. The increase in $f$ reflects the fact that the total geometrical cross section is increasing as more and more small grains are produced (since, for a $A=2.5$ size distribution, the cross section is dominated by the smaller particles). This first phase stops once collisional steady state is reached, and the start of the steady-state phase corresponds to the peak luminosity reached by this population. After that, the profile of the size distribution no longer evolves (if PR-drag is ignored) and one enters phase 2), where the luminosity progressively decreases as the total mass of the population gradually decreases. The duration of phase 1) is $10^5$ years for the Earth/comet case and $10^4$ years for the Moon/asteroid case. The typical timescale for phase 2) (i.e.\ the timescale for a 50\% luminosity decrease) strongly depends on the importance of PR drag: it can be as long as $\sim$$10^3$ years without it, but the luminosity decay can be significantly faster with efficient PR drag. We note that this luminosity evolution in two phases bears some similarities to the scenario proposed by \citet{Meng_etal_2014,Meng_etal_2015} to explain the very high and short-lived $f$ values of some ``extreme'' debris disks, which could be due to the vapourisation, mono-size recondensation and subsequent collisional evolution of the debris produced in the aftermath of a very violent collision. The difference is in the scale of the phenomenon, the fractional luminosity of these extreme debris disks reaching values above $10^{-2}$, instead of just $10^{-5}$ here (see below). For the spalled population, there is no initial luminosity increase, as we have assumed that a size distribution in $N(>D)\propto D^{-2.5}$ holds right from the start. What we observe here is only a progressive luminosity decrease as this population's total mass decreases (note that the log-log scale partially hides the fact that this decrease starts right from $t=0$ and has a rate that actually slows down with time). Here again, PR drag can have a very strong effect, shortening the typical luminosity decrease timescale from a few $10^7$ down to a few times $10^3$ years for both the Earth and Lunar cases. A crucial result is that the system's total luminosity is dominated, during a long period, by the recondensed population. This is due to two cumulative causes: 1) for all the scenarios considered, there is initially at least four times more mass in the recondensed dust than in the spalled fragments, and 2) the recondensed population is made of much smaller grains, which further increases its cross section and thus its luminosity. The duration of the recondensed-matter-dominated period is of the order of $10^6$ years in the absence of PR drag, and is shortened to a few times $10^5$ years when it is present. This period eventually ends because the collisional removal timescale is shorter for the recondensed population (because of the smaller size of the largest fragments). On long timescales, the luminosity gets dominated by the spalled debris. For most of its evolution the debris cloud's total fractional luminosity is at a level below $10^{-7}$. The only exception is the initial $\sim$$10^5$ years phase corresponding to the luminosity increase period due to the recondensed population, and the peak value it reaches just when collisional steady-state is reached. This peak value is $\sim$$10^{-6}$ for the Earth/comet case, and $10^{-5}$ for the Moon/asteroid one, but this initial phase is short lived. After that, the luminosity continuously decreases. After $1-2\times10^5$ years, it drops below $5\times10^{-8}$, which is approximately the luminosity of the solar system's zodiacal dust (see the green dotted line in figure \ref{fig:frac_lum}). And, for the Earth/comet case, it even eventually drops below the value for the Earth itself (for a more detailed discussion on the luminosity and observability of the debris cloud, see sections \ref{dust_thermal_emission} and \ref{dust_scattered_light}). \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig3a} \includegraphics[width=1\linewidth]{CataldiFig3b} \caption{Collisional timescales in the case of an Earth-like target impacted by a comet (top) and a Moon-like target impacted by an asteroid (bottom). The intersection of the collisional timescales and the timescale for PR-drag provides an estimate for the size $D_\mathrm{PR}$ below which there is a dearth of grains due to PR-drag. The collisional timescale of the largest fragments $t_\mathrm{max}$ sets the typical survival time of the post-ejection cloud.} \label{fig:timescales} \end{figure} \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig4a} \includegraphics[width=1\linewidth]{CataldiFig4b} \caption{Cross section per logarithmic size bin at different epochs if PR drag is taken into account. The chosen units have the advantage of immediately showing what grain sizes contain most of the cross section. We show the spalled population (top) and the recondensed population (bottom, after the initial build-up phase, i.e.\ $t>t_\mathrm{coll,ini}$) in the case of a Moon-like target impacted by an asteroid. For this impact scenario, PR-drag is completely dominating the removal of recondensed grains after $\sim$1\,Myr. For the calculations where PR-drag is ignored, the size distribution always follows a power law down to the blowout size, but is continuously shifted downwards because of the removal of mass by radiation pressure.} \label{fig:sigma_dist_t} \end{figure} \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig5a} \includegraphics[width=1\linewidth]{CataldiFig5b} \caption{Fractional luminosity (left axis), total cross-section and peak spectral flux density from thermal emission (right axis) as a function of time after the impact event for an Earth-like target impacted by a comet (top) and a Moon-like target impacted by an asteroid (bottom). For the peak spectral flux density, we assumed a distance of 10\,pc and that the grains act as black bodies with a temperature of 279\,K (the equilibrium temperature at 1\,AU from a Sun-like star). Solid lines correspond to the calculations where PR-drag is ignored and the cascade is always fully populated down to the blowout size. The dashed lines were computed taking PR-drag into account following the scheme described in the text. The fractional luminosities of the impacted planet and the zodiacal dust are also shown for comparison.} \label{fig:frac_lum} \end{figure} \subsection{Oceanic impacts and impacts into ice}\label{subsec:oceanic_impacts} We shall briefly describe what to expect if the impactor strikes an ocean or an ice crust rather than rock. First of all, we note that Earth's oceans can be considered thin for impactors of the size we study here. For example, using the criterion derived by \citet{Zahnle_1990}, the minimum impactor diameter to reach the floor of a 4\,km deep ocean (typical ocean depth on Earth) is $\sim$3.5\,km for an asteroid (assuming a density of 3000\,kg/m$^3$) and $\sim$6\,km for a comet (1000\,kg/m$^3$). Thus, even in the case of an oceanic impact, one can still expect rocky material to be ejected if the ocean is not too deep. In addition, the water itself can be accelerated to escape velocity, ending up as water gas or water ice in a circumstellar orbit. In order to calculate the maximal amount of escaping water (i.e. assuming a very deep ocean), we adjust the target density $\rho_\mathrm{t}$ and the constants of the \citet{Housen_Holsapple_2011} model used in section \ref{subsec:totalejected}, leaving the other parameters unchanged. This results in escaping water masses comparable to the rock masses in table \ref{tab:impact_results} (typically within $\sim$15\%). If the impactor strikes an icy surface, we only change $\rho_\mathrm{t}$, but leave the \citet{Housen_Holsapple_2011} constants at their value for rock for a first order estimation. In this case, the escaping masses are within $\sim$50\% of the masses in table \ref{tab:impact_results}. Most of the ice will be melted or vaporised. For example, \citet{Pierazzo_Melosh_1999} assumed a pressure of incipient vaporisation of 4.5\,GPa and a pressure of complete vaporisation of 43\,GPa. In summary, the water mass escaping from an oceanic impact or an impact into ice is comparable to the escaping rock mass from a land impact. However, water gas is expected to be quickly photodissociated. For example, the typical lifetime of a water molecule at a distance of 1\,AU from the Sun is less than a day \citep{Crovisier_1989}, making the probability to detect water gas ejected from an exoplanet vanishingly small. Water gas could still be present if it is continuously produced by sublimation from water ice \citep{Lisse_etal_2012}. But water ice also quickly sublimates unless the ice is very pure \citep{Lisse_etal_2012}. Overall, the prospects to detect water ejected from an exoplanet in the terrestrial zone are not promising given its short lifetime. \section{Discussion}\label{Sec:Discussion} \subsection{Uncertainties} We will now discuss various uncertainties in our modelling and their influence on the derived results, primarily the fractional luminosity. \subsubsection{Size of the largest fragment} A crucial parameter for the cloud's evolution is the size of the largest fragments, both for the spalled and the recondensed population, and this for two reasons: 1) because, for the same total mass, changing this maximum size will necessarily change the debris' total luminosity (debris clouds with smaller largest sizes will be more luminous because of their higher geometrical cross section), and 2) because this size will also control the global lifetime of the collisional cascade and thus the long-term evolution of its luminosity. We first note that the size of the largest fragment in the spalled population is subject to considerable uncertainty. For example, the study of secondary craters on icy satellites showed that the Grady-Kipp distribution (equation \ref{eq:Dmax}) can underestimate the size of the fragments that create the secondary craters by orders of magnitude \citep{Singer_etal_2013}. On the other hand, fragments launched with escape velocity (i.e.\ those ejected with higher velocity than the secondary-crater-forming fragments) are expected to break up in flight, meaning that the Grady-Kipp distribution can still be a reasonable approximation for our purposes. For a $A=2.5$ size distribution, the cloud's maximum luminosity scales as $D_\mathrm{max}^{-0.5}$, while the collisional timescale for its long-term evolution scales approximately as $D_\mathrm{max}^{0.5}$. To get an idea of the effect the uncertainty on the size of the largest fragment has on our results, we performed additional calculations assuming that the largest fragment is 10 times larger than predicted by equation \ref{eq:Dmax}. This results in fractional luminosities that are lower by not more than a factor of $\sim$3 compared to the values presented in table \ref{tab:spalled}. The collisional timescale of the largest fragment is increased by a factor of 5--6. There also is evidence that the exponent that describes the dependance of $D_\mathrm{max}$ on the launch velocity $v_\mathrm{e}$ is not constant, but depends on the impactor's size \citep[][and unpublished data]{Singer_etal_2013}. For simplicity, we ignored such a dependence. The size of the largest fragment in the recondensed population is also uncertain. The equations of \citet{Johnson_Melosh_2014} provide order of magnitude estimates of the mean particle size, while the size dispersion remains unknown. As for the spalled population, changing the size of the largest fragment will both affect the instant luminosity of the fragments and the timescale for their collisional evolution. We find that increasing the size of the largest fragment of the recondensed population by a factor of 10 results in a similar decrease of fractional luminosity and increase of the collisional timescale as for the spalled population. \subsubsection{Size distribution} Another uncertainty in our modelling comes from the profile of the fragment size distribution. The profile is of importance because, for a given total mass of debris, it will determine how the geometrical cross section is distributed as a function of particle sizes and what the total value of the geometrical cross section is. For both the spalled and the recondensed population we assumed a power law index of $A=2.5$ for the cumulative size distribution (equation \ref{PSD_powerlaw}), motivated by the work of \citet{Buhl_etal_2014} and the fact that this corresponds to a collisional cascade in steady-state. However, according to \citet[][p.\ 91]{Melosh_1989}, the exponent commonly ranges between 2.4 and 2.7, but may be as small as 1.2 or larger than 3. To explore the influence of power law index, we consider two limiting values: $A=2$, a shallower distribution for which the \emph{geometrical cross section} is evenly distributed with particle sizes, and $A=3$, a steeper value for which the \emph{mass} is evenly distributed with sizes. For $A = 2$, we find that the fractional luminosity is reduced by a factor $\sim$200 for the spalled population and by a factor 2--4 for the recondensed one. This difference is simply due to the fact that the size range of the distribution is much wider for the spalled population, so that changing $A$ will have a much stronger impact. Conversely, for $A=3$, we find an increase of the fractional luminosity, which reaches $\sim$200 for the spalled population and 3--4 for the recondensed one. \subsubsection{Radiation forces on small grains} We assume that grains of any size act as black bodies when calculating the radiation force and the PR-drag timescale (equations \ref{eq:radiation_force}, \ref{eq:beta} and \ref{eq:t_PR}). This is in fact only valid for grains larger than 20\,$\mu$m in the solar system \citep{Gustafson_1994}. However, the general trend that $\beta(D)$ increases as $D$ becomes smaller holds down to micron sized particles. Thus the error introduced by assuming black body grains is probably small compared to the other uncertainties in the model. \subsubsection{Re-accretion of particles by the impacted exoplanet} \citet{Jackson_Wyatt_2012} showed that re-accretion of debris onto the impacted planet (or other planets in the system) can be an important removal mechanism. In their simulation, after 10\,Myr, 20\% of the debris created during the Moon-forming impact are re-accreted by Earth, 17\% by Venus and 8\% are ejected from the solar system through scattering by Jupiter. The amount of re-accreted material actually changes with the number of planets in the system. For example, additional planets can reduce the re-accretion rate by stirring the debris. Using the analytical expressions given in \citet{Genda_etal_2015} and \citet{Jackson_Wyatt_2012} with our parameters, the depletion timescale of fragments by accretion is tens (Earth-sized target) to hundreds (for Moon-sized target) of millions of years, suggesting re-accretion is a minor issue, especially for small exoplanets. However, these analytical estimates do not account for the initial asymmetry of the debris disk which can enhance the accretion rate significantly \citep{Jackson_Wyatt_2012}. \subsubsection{Mixing of target and projectile material} We are primarily interested in the dust originating from the impacted exoplanet, but the ejecta contain material from the impactor as well, potentially resulting in a pollution of the signal \citep{Morlok_etal_2014}. The problem might be more pronounced for impacts onto large planets where the escaping mass can be comparable to the impactor mass (see table \ref{tab:impact_results}). Escaping ejecta from the Chicxulub impact can be dominated by impactor material depending on the impact parameters \citep{Artemieva_Morgan_2009}. On the other hand, escaping ejecta from the Moon \citep{Artemieva_Shuvalov_2008} or Titan \citep{Korycansky_Zahnle_2011} were estimated to often (but not always) be dominated by target material. Judging from values for the mean pressure experienced by most parts of the impactor \citep{Melosh_1989}, we note that the escaping impactor material is melted or vaporised to a large degree and does not contribute to the spalled population significantly. Thus, at least for the spalled population, pollution by impactor material should not be a problem. \subsection{Spectral type of the host star} Throughout our modelling in section \ref{Sec:Modelling}, we assumed a Sun-like host star. However, statistical analysis of exoplanetary transit data suggests that M-dwarfs should commonly have planets in their habitable zone \citep[e.g.][and references therein]{Dressing_Charbonneau_2015}. We note that several aspects of our modelling would need to be revised when considering such systems. Because of the increased orbital velocity of exoplanets in the habitable zone of M-dwarfs, the impact event would be more violent and damaging to the ejecta, but also result in larger escaping masses. The collisional evolution of the debris would proceed significantly faster (see equation \ref{eq:t_coll}). Also, radiation pressure from M-dwarfs is usually too weak to remove any grains \citep[e.g.][]{Matthews_etal_2007}. Instead, stellar wind forces can become important around this type of stars \citep[e.g.][]{Plavchan_etal_2005}. \subsection{Is the presence of impact generated dust detectable?} We will now discuss whether the presence of dust generated by an impact event of the type considered in section \ref{Sec:Modelling} can be detected by present or future instrumentation. We consider both thermal emission and scattered light. In section \ref{subsec:dust_composition}, we will explore the possibility to study the dust composition. \subsubsection{Detection of the dust thermal emission}\label{dust_thermal_emission} The thermal emission of a dust grain with diameter $D$ at a distance $r$ from the star depends on the grain's temperature $T$, which can be determined (numerically) from the equation balancing absorption and emission: \begin{multline} \int\frac{L_\nu}{4\pi r^2}\left(\frac{D}{2}\right)^2\pi Q_\mathrm{\nu,abs}(D)\mathrm{d}\nu\\ = \int\pi B_\nu(T)4\pi\left(\frac{D}{2}\right)^2Q_\mathrm{\nu,em}(D)\mathrm{d}\nu \end{multline} where $\nu$ is the frequency, $B_\nu(T)$ the Planck function and $L_\nu$ is the specific luminosity (i.e.\ the luminosity per frequency interval) of the star. If the star is modelled as a black body of effective temperature $T_*$, then $L_\nu=4\pi R_*^2\pi B_\nu(T_*)$ with $R_*$ the stellar radius. $Q_\mathrm{\nu,abs}$ is the absorption efficiency defined as the ratio between absorption cross-section and geometrical cross-section and depends on grain size, material and shape. $Q_\mathrm{\nu,em}$ is the emission efficiency, the ratio between the surface area a blackbody would need to emit the same flux divided by the actual surface area of the grain. Because of Kirchhoff's law, $Q_\mathrm{\nu,abs}=Q_\mathrm{\nu,em}$. Thus, once the temperature of the grain is known, the emitted spectral flux density observed at a distance $d$ is written \begin{equation} F_\nu=\pi B_\nu(T)\cdot4\pi\left(\frac{D}{2}\right)^2Q_\mathrm{\nu,abs}(D)\cdot\frac{1}{4\pi d^2} \end{equation} where $d$ is the distance of the observer. The position and strength of spectral features is thus encoded in $Q_\mathrm{\nu,abs}$, which can be calculated by using data obtained from laboratory experiments. The presence of circumstellar dust can for example be inferred by an infrared (IR) excess above the stellar photosphere, i.e.\ IR photometry yields a higher flux than what would be expected from the star alone due to the additional thermal emission from the dust grains. The sensitivity of a certain instrument can then be characterised by the smallest fractional luminosity $f_\mathrm{min}$ it is able to detect. Actually, $f_\mathrm{min}$ depends on the spectral type of the star, the wavelength of observation and the temperature of the dust (or equivalently its radial distance from the star). For dust in the terrestrial region around a solar-type star, the \textit{Spitzer Space Telescope} was sensitive to fractional luminosities of the order of a few times $10^{-5}$ to $10^{-4}$ \citep{Wyatt_2008,Roberge_etal_2012}. Our calculations show that the fractional luminosity from dust originating in an impact event only comes somewhat close to this value for the recondensed population in the case of a Moon-sized target. Fractional luminosities from the spalled population are at least three orders of magnitude smaller. Unless impacts occur at high frequency such that dust can accumulate (e.g.\ in a Late Heavy Bombardment scenario), a \textit{Spitzer}-like telescope is certainly unable to detect dust from the spalled population, and probably even form the recondensed population. Nulling interferometers can achieve better sensitivities. These instruments combine beams from different telescopes such that light from the star interferes destructively, effectively blocking ("nulling") the star and leaving only light from its surrounding, e.g.\ from circumstellar dust or exoplanets. The ground-based Large Binocular Telescope Interferometer (LBTI) has recently started operating and is expected to have a sensitivity equivalent to a few times the level of the zodiacal dust \citep{Roberge_etal_2012,Weinberger_etal_2015}. The zodiacal dust's fractional luminosity is estimated to be $f_\mathrm{zodi}=10^{-8}-10^{-7}$ \citep{Dermott_etal_2002,Nesvorny_etal_2010}, which is in-between the fractional luminosities achieved by the recondensed and the spalled population respectively (figure \ref{fig:frac_lum}). Thus, LBTI has good prospects to detect dust generated in impact events as discussed in the present work. For the direct detection of Earth-analogs, nulling interferometers operating in space such as \textit{Darwin} or TPF-I have been proposed \citep[e.g.][]{Cockell_etal_2009}. Such instruments would have point source sensitivities on the order of a microjansky or smaller. Assuming the dust grains radiate as black bodies and a distance to the target of 10\,pc, we find the maximum dust thermal emission of the spalled population to be larger than 0.5\,$\mu$Jy for all the impact scenarios considered in this work. We conclude that future space nulling interferometers are able to detect and image dust from impacts, even when considering the fact that the dust is not a point source \citep{Rottgering_etal_2003}. How long after the impact the signal remains detectable depends on the total amount of dust and how strongly PR-drag is influencing the dust dynamics. Considering figure \ref{fig:frac_lum} and taking $\sim$1\,$\mu$Jy as a limit for detectability, for an Earth-sized planet, the spalled population becomes undetectable very quickly (within $\sim$$10^3$ years) under the influence of PR-drag, while the recondensed population remains detectable for $\sim$$10^5$ years. If PR-drag is ignored, the recondensed population remains detectable for nearly $10^7$ years, and the spalled population even longer. In the more favourable case of a smaller, Moon-sized planet, PR-drag has made the spalled population undetectable after $\sim$$10^5$ years, the recondensed population remaining detectable only slightly longer. If PR-drag is ignored, the spalled population remains detectable for longer time ($\sim$$10^8$ years) than the recondensed population ($\sim$$10^7$ years). \subsubsection{Detection of scattered light}\label{dust_scattered_light} Apart from absorbing and re-emitting in the thermal infrared, dust grains can also scatter light coming from the host star. The star is in general outshining the scattered light from the dust disk by many orders of magnitude. This difficulty can be overcome by using a coronagraph, a device that blocks direct light from the star. Such an instrument can be characterised by the achievable contrast, i.e.\ the minimum brightness of an object in order to be detectable divided by the stellar brightness, and the inner working angle, i.e.\ the smallest distance from the star at which an object is detectable. The spectral flux density scattered into a solid angle $\mathrm{d}\Omega$ about the direction $\Omega$ by a particle of diameter $D$ located at distance $r$ from the star can be written \begin{multline} \mathrm{d}F_\mathrm{\nu,sca}=\\ \frac{1}{4\pi d^2}\cdot\left(\frac{R_*}{r}\right)^2 F_{\nu,*} \cdot\left(\frac{D}{2}\right)^2\pi Q_\mathrm{\nu,sca}(D)\cdot\varphi_\nu(\Omega)\mathrm{d}\Omega \end{multline} where $F_{\nu,*}$ is the spectral flux density at the stellar surface, $R_*$ is the stellar radius, $Q_\mathrm{\nu,sca}(D)$ is the scattering efficiency (i.e.\ the scattering cross-section divided by the geometric cross-section) and $\varphi_\nu(\Omega)$ is the phase function describing the directional dependance of the scattering process. To estimate the amount of scattered light from the ejected dust, we assume isotropic scattering (i.e.\ $\varphi_\nu(\Omega)=\mathrm{const.}=1/4\pi$) and model the stellar emission as a black body: $F_{\nu,*}=\pi B_\nu(T_*)$ with $T_*$ the effective temperature of the Sun. We also assume $Q_\mathrm{\nu,sca}(D)=1$, which is appropriate for black body grains large compared to the light's wavelength\footnote{This follows from the fact that $Q_\mathrm{abs}+Q_\mathrm{sca}=2$ for large grains \citep[e.g.][]{Bohren_Huffman_1998}.}, which is a good approximation since the star's emission peaks in the visible wavelength region. With this assumptions, the contrast is actually the same as the fractional luminosity we calculated earlier. We now consider whether space-based coronagraphs that might become available in the future can detect the scattered light from the dust disk. Such instruments include the \textit{Terrestrial Planet Finder Coronagraph} \citep[TPF-C,][]{Levine_etal_2006} or the more recently studied \textit{Exo-C} \citep{Stapelfeldt_etal_2015} and \textit{Exo-S} \citep{Seager_etal_2015}. The latter would involve a "starshade" tens of metres in size flying ten-thousands of kilometres from the telescope, instead of an internal coronagraph. Since the primary purpose of such instruments would be imaging of Earth-twins (i.e.\ Earth-like planets in the habitable zone of a Sun-like star), their sensitivity is specified in terms of the contrast an exoplanet (point source) needs in order to be detectable. A typical value is $10^{-10}$, the contrast of Earth. However, we are interested in detecting an extended object. Thus, we calculate the contrast of the dust belt \emph{per resolution element} (assuming a resolution of $1.22\lambda/D$ with $D$ the telescope diameter), assuming the belt has the previously calculated width $\Delta r$ and is observed from a distance of 10\,pc. We also take into account that those parts of the belt at an angular separation from the star smaller than $4\lambda/D$ are blocked by the coronagraphic mask \citep {Levine_etal_2006}. The contrast per resolution element can be compared to the aforementioned minimum point-source contrast detectable by the instrument. For TPF-C with an 8\,m mirror, the dust belt emission typically covers 2 (for an edge-on belt mostly blocked by the coronagraph) up to $\sim$20 (for a face-on belt) resolution elements. To be detectable by TPF-C, its total contrast (or fractional luminosity) should therefore be around $10^{-9}$. Comparing with figure \ref{fig:frac_lum}, such a contrast is achieved by the recondensed population for more than $10^5$\,yr even under the influence of PR-drag. The spalled population can also be detected in scattered light in the case of smaller exoplanets. For example, in the Moon/asteroid case, such a contrast is achieved for a few times $\sim$$10^4$\,yr (PR-drag) up to $\sim$$10^8$\,yr (no PR-drag). We note that a face-on disk would probably be more difficult to detect, because specialised data reduction processes can make use of the asymmetry of the target (exoplanet or edge-on disk) to optimise sensitivity; this is not possible for a symmetric face-on disk. \subsection{Is it possible to constrain the dust composition?}\label{subsec:dust_composition} We have demonstrated that the presence of impact-generated dust can be detected by future, and possibly even current instruments. We go now one step further and ask whether the dust \emph{composition} can be constrained. \subsubsection{Parametrising the detectability of a generic signal} To address the possibility of constraining the dust composition, we set up a simple model to explore the detectability of a generic (spectral) signal that is mixed with some background. We assume that the data consist of a total signal $F$ that is the sum of a background component $B$ and the signature of interest $S$: \begin{equation}\label{fitting model} F(\lambda)=p_1B(\lambda) + p_2S(\lambda) \end{equation} Here $B$ and $S$ are \emph{models} of the background and the signal of interest respectively and are both assumed to be a function of the wavelength $\lambda$, while $p_1$ and $p_2$ are scaling factors. The background component could for example be the component of the impact-generated dust we are not interested in, or it could be exo-zodiacal dust present in the system. We assume that the measurement process adds Gaussian noise with standard deviation $\sigma_\mathrm{i}$ to each measurement point $F_\mathrm{i}$. To what precision can $p_1$ and $p_2$ be determined if one considers them as free parameters and fits them to the noisy data? This question can readily be answered by calculating and inverting the Fisher matrix \citep[e.g.][]{Andrae_2010} of the model described by equation \ref{fitting model}. We assume the instrument measures at $N$ distinct wavelengths $\lambda_\mathrm{i}$ and define a vector $\vec{s}$ by $s_\mathrm{i}=S_\mathrm{i}/\sigma_\mathrm{i}$. This leads to the following expression for the uncertainty on the fitted parameter $p_2$: \begin{equation}\label{absolute p2 uncertainty} \sigma_\mathrm{p_2} = \frac{1}{\|\vec{s}\|\: |\sin \phi|} \end{equation} where $\|\vec{s}\|$ denotes the Euclidian norm of $\vec{s}$ and $\phi$ is the angle between $\vec{b}$ and $\vec{s}$ defined from the usual scalar product: $\vec{b}\cdot\vec{s}=\|\vec{b}\|\:\|\vec{s}\|\cos\phi$ (with $\vec{b}$ defined analogue to $\vec{s}$). Equation \ref{absolute p2 uncertainty} can be rewritten as a ``signal-to-noise ratio'' (SNR) for the signature we are interested in: \begin{equation}\label{SNR_general} \mathrm{SNR}=\frac{p_2}{\sigma_\mathrm{p_2}}=\|\vec{s}_\mathrm{t}\| \:|\sin\phi| \end{equation} where the elements of $\vec{s}_\mathrm{t}=p_2\vec{s}$ correspond to the true signature divided by the measurement uncertainty. If the measurement error does not vary with wavelength ($\sigma_\mathrm{i}=\sigma$, $\forall \mathrm{i}$), the expression can be written \begin{equation}\label{SNR_const_sigma} \mathrm{SNR}=\frac{\|\vec{S}_\mathrm{t}\|}{\sigma} \:|\sin\phi| \end{equation} Also, in this case, $\phi$ can be computed directly from $\vec{B}$ and $\vec{S}$. Thus, assuming a signal strength $\vec{S_\mathrm{t}}$ for a particular impact scenario, and given the angle $\phi$ characterising the the relation between signature and background, equation \ref{SNR_const_sigma} allows for computation of the measurement error $\sigma$, and in turn the instrument sensitivity needed to detect the signature with a given SNR. We note the following points: \begin{itemize} \item The term $|\sin\phi|$ describes the effect of the background. It would disappear if one considers a single parameter model without background. \item As expected, the signature is easiest to detect when $\vec{b}$ and $\vec{s}$ are orthogonal. Conversely, if $\phi=0$, the model is completely degenerate since background and biosignature are proportional to each other. \item Both $\|\vec{S}_\mathrm{t}\|$ and $\phi$ depend on the number of data points $N$. However, with denser and denser sampling, $\phi$ tends towards an asymptotic value. \end{itemize} In general, the model described in this section is useful to parametrise the detectability of a given signature in a simple way. However, we note it is also an optimistic model since we assume that the components that make up the total signal are exactly known a priori (equation \ref{fitting model}), with only their scalinkg unknown. This is most often not true in practice. For example, the emission spectrum of minerals depends on various parameters such as grain size distribution, grain shape, crystalline form etc. \subsubsection{Conversion of instrument sensitivities to measurement errors} The sensitivity specified for a given instrument often applies to the background-limited case\footnote{This means that the noise is dominated by background emission such a zodiacal light. The background emission should not be confused with the background signal discussed in the previous section. The latter is a part of the data where the background emission has been subtracted.}. In the following sections, we will consider observations in the infrared where the dominant contribution to the diffuse infrared night sky brightness, and thus to the photon noise, is the zodiacal light \citep{Leinert_etal_1998}. Thus, we convert instrument sensitivities from the literature into measurement errors ($\sigma$ in equation \ref{SNR_const_sigma}) in the following way. First, we calculate the flux from the zodiacal dust picked up by the telescope beam, using the surface brightness of the zodiacal dust given by \citet{Leinert_etal_1998}. We also compute the "target flux", consisting of flux from the impact generated dust cloud, and the stellar photosphere (unless the telescope can resolve the dust belt such that the star is not contributing)\footnote{We shall ignore additional contribution to the target flux (and thus the photon noise) from possibly present exozodiacal dust in the system, as we find it to be negligible as long as the star contributes (i.e.\ the belt is not resolved). If the belt can be resolved (e.g.\ by TPF-I), the contribution would depend on the amount of exo-zodiacal dust as well as its location in the system (i.e.\ whether it can be spatially separated from the impact-generated dust).}. The measurement error $\sigma$ is then calculated assuming photon-noise (i.e.\ Poisson statistics) in the following way: \begin{equation} \sigma=\xi\sqrt{\frac{F_\mathrm{tg}+F_\mathrm{zodi}}{F_\mathrm{zodi}}} \end{equation} with $\xi$ the instrument sensitivity from the literature, $F_\mathrm{tg}$ the target flux and $F_\mathrm{zodi}$ the flux from zodiacal dust. This means that we always use a sensitivity value that is increased compared to the literature value. We shall also assume that $\sigma\propto t_\mathrm{exp}^{-1/2}(\Delta\lambda)^{-1/2}$ where $t_\mathrm{exp}$ is the exposure time and $\Delta\lambda$ the spectral resolution. \subsubsection{Example: thermal emission from calcite}\label{calcite_astrosili} Calcite is the stable mineral form of calcium carbonate CaCO$_3$. On Earth, calcite is commonly found in sedimentary rocks, particularly in limestone, which is largely formed from marine skeletal fragments and shells. Calcite can also form abiotically through chemical precipitation. It is interesting that the internal crystal structures of biogenic and abiotic calcite differ from each other. The biogenic crystal lattice has anisotropic lattice distortions with possible substitution of COO$^-$ for some of the carbonate groups \citep{Pokroy_etal_2006}. \citet{Berg_etal_2014} found that the presence of organic matter makes biogenic calcite spectroscopically distinguishable from abiotic calcite. In an astronomical context, calcite has been detected around both evolved stars \citep{Kemper_etal_2002} and protostars \citep{Ceccarelli_etal_2002,Chiavassa_etal_2005}. The calcite detected around stellar environments has been suggested to form under dry conditions (without the presence of water) through reactions of amorphous silicates and CO$_2$ \citep{Gillot_etal_2009}. The significance of calcite as a biosignature is therefore limited, however, its detection from an impact on an exoplanet would still be interesting. It would provide useful information on the geology of the planetary body. For example, the production of calcite on Earth is dependent on aqueous solution and even if dry calcite formation is possible, wet calcite formation is thermodynamically and kinetically much more favourable. Therefore, the detection of calcite would likely indicate the presence of liquid water at some point in the history of the planet. The presence of calcite reveals the thermal and alkalinity thresholds of the planet (temperature and pH) as well, which are important factors that affect its habitability \citep{Rodriguez-Navarro_etal_2009}. Also, calcite present on an exoplanet may provide a stable, long-term carbon source for microorganisms \citep{Jacobson_Wu_2009}. A potential problem arises from space weathering, i.e.\ damage induced by, for example, cosmic rays or the solar wind. These effects might change the spectral properties of ejected calcite or even destroy it over extended periods of time. The lack of detailed studies makes it difficult to judge whether this is an important process, and if so, on which timescales it occurs. However, the detection of calcite in young and old circumstellar environments \citep{Kemper_etal_2002,Ceccarelli_etal_2002, Chiavassa_etal_2005} or in meteorites \citep[e.g.][and references therein]{Lee_etal_2014} suggests that calcite can survive in space at least for some time. In addition, we note that if space weathering is primarily affecting the \emph{surface} of the fragments, the problem might be mitigated by the fact that the fragments continuously collide, which regularly exposes fresh surfaces. We consider the possibility to detect calcite ejected as part of the spalled population (i.e.\ $P_\mathrm{max}<50$\,GPa). The amount of ejected calcite will strongly depend on the geology of the impact site. For the sake of argument, we consider two cases: an upper limit case where 100\% of the spalled ejecta consist of calcite, and a case with a calcite fraction of 2\%, which is the an average volume percentage of limestone in Earth's crust \citep{Marshall_Fairbridge_1999}. Calcite has its strongest emission features in the far-IR. We investigate whether proposed future far-IR telescopes would be able to detect calcite signatures. The \textit{Space Infrared Telescope for Cosmology and Astrophysics} (SPICA) is a proposed joint Japanese-European mission \citep[e.g.][]{Nakagawa_etal_2014} with a far-IR instrument called SAFARI \citep[e.g.][]{Roelfsema_etal_2014}. We also consider the more ambitious \textit{Single Aperture Far-Infrared Observatory} \citep[SAFIR,][]{Benford_etal_2004,Lester_etal_2004}. To calculate the calcite emission spectrum, we compute absorption efficiencies using Mie theory (i.e.\ assuming compact, spherical grains). We use the \texttt{BHMIE} code \citep{Bohren_Huffman_1998_AppendixA} in combination with \texttt{f2py} \citep{Peterson_2009}. The optical constants are taken from \citet[][Jena Database of Optical Constants for Cosmic Dust]{Posch_etal_2007} and extrapolated into the visible wavelength range with a power law. The calculated absorption efficiencies allow us to determine the temperature of the grains and subsequently the thermal emission spectra assuming a distance of 1\,AU from the host star (section \ref{dust_thermal_emission}). For simplicity, we model the stellar spectrum as a blackbody with a temperature equal to the effective temperature of the Sun. Using the calculated emission spectrum, we determine the SNR using equation \ref{SNR_const_sigma}, assuming a specific background, namely astrosilicates \citep{Draine_Lee_1984}, which have been used to model emission from dust in a variety of astronomical objects, in particular debris disk spectra as well as the zodiacal dust. We use the method described above to compute astrosilicate emission spectra, making use of optical constants from \citet{Draine_Lee_1984}. We then consider two limiting scenarios (Moon-like target, asteroidal impactor): a conservative case where we determine the flux from the PR-affected spalled population after $t=10^5$\,yr, with a calcite fraction of 2\%, and an `upper limit' case with a fully populated cascade at $t=0$ and a calcite fraction of 100\%. Figure \ref{fig:SNR_calcite} shows what measurement error and spectral resolution would be necessary to detect calcite. We also plot the error-resolution lines for 1-hour exposures with SAFARI (B.\ Sibthorpe 2015, private communication) and SAFIR \citep{Lester_etal_2005}. The figure shows that SAFARI would not be able to detect calcite even in the optimistic scenario. This is not surprising given that we find a peak calcite flux of only $\sim$0.3\,$\mu$Jy in the `upper limit' scenario, roughly two orders of magnitude smaller than the typical SAFARI sensitivity. On the other hand, a SAFIR-like telescope might be able to detect calcite under favourable circumstances and with long exposure times. \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig6a} \includegraphics[width=1\linewidth]{CataldiFig6b} \caption{The SNR when observing calcite (ejected by an asteroidal impact onto a Moon-like planet) in the mid/far-IR (34 to 150\,$\mu$m) with an astrosilicate background at a distance of 10\,pc. The SNR is calculated from equation \ref{SNR_const_sigma}, for the `upper limit' and the conservative scenario described in the text. The error--resolution lines for two far-IR instruments are also shown, assuming an exposure time of one hour.} \label{fig:SNR_calcite} \end{figure} \subsubsection{Example: thermal emission from glassy silica}\label{sec:silica_emission} The detection of a substantial amount of glassy silica (SiO$_2$) in the debris belt would suggest that the observed dust originates indeed from a violent event that transformed silicates to silica \citep[e.g.][]{Lisse_etal_2012}. This would be in contrast to e.g.\ dust from comet sublimation, since comets show, if at all, only small amounts of silica. Production of glassy silica is expected when silicaceous material is heated to high temperature and then quickly quenched, preventing the formation of a crystalline structure and thus resulting in amorphous material. This can for example occur during an impact event or in a giant collision between planetesimals. A few debris disks, for example those around HD172555 \citep{Lisse_etal_2009} or HD15407\,A \citep{Fujiwara_etal_2012}, show unusually silica-rich dust. As a dust origin, a giant hypervelocity ($>$10\,km\,s$^{-1}$) impact between large rocky planetesimals has been suggested. The events creating the silica-rich dust may have been similar to the Moon-forming event in the solar system. The disk around $\eta$~Corvi also contains abundant amounts of silica, although silicates such as olivine and pyroxene are also present, arguing for a less violent impact event (5-10\,km\,s$^{-1}$) with incomplete silicate-to-silica transformation \citep{Lisse_etal_2012}. To calculate a silica emission spectrum, we follow the same approach as for calcite (section \ref{calcite_astrosili}): we use Mie theory with optical constants (with a constant extrapolation into visible wavelengths) for amorphous silica from \citet[][Jena Database of Optical Constants for Cosmic Dust]{Henning_Mutschke_1997}. Emission features are seen at 9, 12 and 20 \,$\mu$m. As a background spectrum, we again consider astrosilicates. Since the aforementioned debris disks contain substantial amounts of silica, we assume, for the sake of argument, that 10\% of the \emph{recondensed} dust consists of silica. Thermal emission features of silica exist in the mid-IR, so we check whether an instrument such as the \textit{James Webb Space Telescope} \citep[JWST,][]{Gardner_etal_2006} with its Mid~Infrared~Instrument\footnote{Sensitivities are taken from the MIRI Pocket Guide v2.2, \url{http://www.stsci.edu/jwst/instruments/miri/docarchive/miri-pocket-guide.pdf}} (MIRI) or TPF-I could detect silica. Figure \ref{fig:SNR_silica} shows the SNR calculated with equation \ref{SNR_const_sigma} for the intermediate case of a cometary body impacting a Mars-like planet. Figure \ref{fig:silica_peak_t} shows how the peak silica flux and the SNR for the aforementioned instruments changes with time after the impact for the extreme case of Earth- and Moon-like targets. These figures suggest that the detection of silica is possible for all the impact scenarios considered in this work when using TPF-I, and potentially even with JWST when considering impacts onto smaller exoplanets and longer exposure times. This is not surprising given that the silica peak flux is of the order of hundreds of microjanskys, while the (background-limited) sensitivity of e.g.\ JWTS~MIRI (at low spectral resolution) is tens of microjansky, and TPF-I would be even more sensitive. \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig7} \caption{The SNR when observing silica (ejected by a cometary impactor onto an Mars-like planet) in the mid-IR (5 to 25\,$\mu$m) with an astrosilicate background at a distance of 10\,pc when the recondensed population is at its peak luminosity. The SNR is calculated from equation \ref{SNR_const_sigma}. Error-resolution lines for two mid-IR instruments are also shown, assuming an exposure time of one hour.} \label{fig:SNR_silica} \end{figure} \begin{figure} \includegraphics[width=1\linewidth]{CataldiFig8a} \includegraphics[width=1\linewidth]{CataldiFig8b} \caption{The top figure shows the peak flux from silica for two impact scenarios as a function of time after the impact. Dashed lines take dust removal by PR-drag into account, while for the full lines the cascade is always fully populated down to the blowout size. The right axis show the SNR (from equation \ref{SNR_const_sigma}, assuming an exposure time of one hour) for JWST/MIRI, assuming a spectral resolving power $R\sim100$. This is only an approximations (there is no linear correspondence between the peak flux and the SNR), but accurate within a factor of 2. The bottom figure show the corresponding SNR for TPF-I.} \label{fig:silica_peak_t} \end{figure} \subsubsection{Example: reflected light from microorganisms}\label{subsubsec:microorganism_detection} The detection of biological matter in the escaping impact ejecta would be the most direct evidence that the impacted planet hosts a biosphere. Here we consider whether ejected microorganisms could be detected in reflected star light. From laboratory work, we know that reflectance spectra of microorganisms show near-IR absorption features due to water of hydration and amide bonds within proteins \citep{Dalton_etal_2003,Hegde_etal_2015}. An advantage of detecting this features in the debris belt rather than on the planet itself is that the observed spectrum is not affected by the planet's atmosphere \citep{Schwieterman_etal_2015}. Reflectance spectra of the debris belt could be obtained with instruments such as TPF-C, constructed to directly image Earth-like exoplanets by efficiently blocking direct star light. To estimate the telescope exposure time needed to detect a microbial absorption feature, we use a simple approach \citep{Arnold_etal_2009} and assume that the required SNR\footnote{Note that this is the SNR for the complete signal; it is not the same SNR as in the previous sections.} of the observation (per spectral resolution element) to detect a given absorption feature is \begin{equation}\label{required_SNR} \mathrm{SNR}_\mathrm{req}=\frac{1}{\delta\cdot \varsigma}\cdot \chi \end{equation} where $\delta$ is the relative depth of the absorption feature, $\varsigma$ is the fraction of the total reflected light that was reflected by microbes and $\chi$ is the desired significance level (put equal to 5 for this calculation). We now assume that the SNR scales (for a fixed observer distance of 10\,pc) as follows: \begin{equation}\label{SNR_scaling} \mathrm{SNR}\propto\frac{F\sqrt{t_\mathrm{exp}}}{N_\mathrm{res}\sqrt{R}} \end{equation} where $t_\mathrm{exp}$ is the exposure time, $F$ the total flux from the target (in our case the light reflected by both the spalled and the recondensed population), $R$ the resolving power and $N_\mathrm{res}$ the number of spatial resolution elements\footnote{This parameter is used to transform the SNR for observations of exoplanets, where $N_\mathrm{res}=1$, to observations of dust belts with $N_\mathrm{res}>1$.} occupied by the debris belt. We take into account that structures closer to the star than 4$\lambda$/D (with $D$ the diameter of the telescope) are blocked by the coronagraph. As reference values, we follow \citet{Arnold_etal_2009} and use the exposure time estimates by \citet{Guyon_etal_2006} to directly image an Earth-twin with $\mathrm{SNR}=7$ using a coronagraph and a 100\,nm wide band centred at 550\,nm. We now compute the exposure time (using equations \ref{required_SNR} and \ref{SNR_scaling}) necessary to detect the water of hydration feature at 1.5\,$\mu$m \citep{Dalton_etal_2003,Hegde_etal_2015}, a wavelength that might be in reach of a future TPF-C-like telescope. The flux $F$ is scaled by both the different cross-section of the debris belt compared to the Earth-twin and the reduced stellar emission (for an identical bandwidth) at 1.5\,$\mu$m compared to visible wavelengths. The resolving power $R$ is chosen such that the absorption feature is resolved. Note that at $1.5$\,$\mu$m, at least $\sim$50\% of the belt is not observable because of masking by the coronagraph. We measure a typical depth of the 1.5\,$\mu$m absorption feature of 0.52 from a mean reflectance spectrum computed from the microbial reflectance spectra library by \citet{Hegde_etal_2015}. We also need to put a number on the fraction of microbes in the total (spalled and recondensed) ejecta. First, we assume that only ejecta experiencing shock pressure below 10\,GPa can contain detectable microorganisms, and we only include grains larger than 10\,$\mu$m (i.e.\ significantly larger than a single microbial cell). We then need to estimate the fraction (by volume) of microbes among these spalled, low-pressure ejecta. Again, Earth is our only viable example. For the sake of argument, let us take as a reference value the density of prokaryotic cells in unconsolidated subsurface sediments in the upper 10\,m, which was determined by \citet{Whitman_etal_1998} to be $2.2\times10^8$\,cells/cm$^3$. This corresponds to a microbe fraction (by volume) of $\sim$$2\times10^{-4}$. Putting all these numbers into equations \ref{required_SNR} and \ref{SNR_scaling}, we conclude that the detection of the 1.5\,$\mu$m water of hydration absorption feature is impossible to achieve within reasonable exposure time, even when considering a 12\,m telescope that could detect an Earth-twin in just two minutes. The major factor leading to the huge exposure times is the relative rareness of microbes among the ejecta (the required SNR is inversely proportional to the volume fraction of microbes). Since we do not know whether Earth is a representative example of a life-harbouring planet, we can imagine worlds that offer more favourable conditions to life than Earth does. However, it has been argue that such ``superhabitable'' worlds would preferentially be more massive than Earth \citep{Heller_Armstrong_2014}, resulting in less escaping material during an impact event. Moreover, calculated exposure times remain long (a month or longer) even when making the extreme assumption that 50\% of the low-pressure ejecta ($<$10\,GPa) are microbial and that in addition the spatial resolution elements are added up (i.e. $N_\mathrm{res}$ is replaced by $\sqrt{N_\mathrm{res}}$ in equation \ref{SNR_scaling}), and otherwise favourable conditions (Moon-sized exoplanet, ignoring PR-drag), regardless at which time after the impact the dust is observed \footnote{The required SNR decreases as the spalled population becomes more dominant, but so does the total flux.}. Note also that our assumption about the SRN scaling linearly with $F$ is optimistic. Because the contrast of the dust is in general higher than the reference contrast of the Earth-twin, the linear dependence increases the SNR more than if $SNR\propto\sqrt{F}$, which would be the case if the shot noise of $F$ contributes significantly to the total noise. Besides unreasonably long exposure times, additional difficulties exist. For example, the water of hydration can be removed by the effect of space vacuum \citep{Dose_2003}. \subsubsection{Confusion of exoplanetary dust with exozodiacal dust} Impact events imply a reservoir of impactors that generate dust themselves. In the solar system, this is manifested by the presence of the zodiacal dust in the terrestrial region, which is thought to originate primarily from comets with a smaller contribution from mutually colliding asteroids and interstellar dust \citep{Nesvorny_etal_2010,Rowan-Robinson_May_2013}. Therefore, there is a risk that the signal from an impact event is obscured by exozodiacal dust. It could be imagined that an LHB-like event would accumulate large quantities of impact-generated dust. However, in the solar system, the amount of zodiacal dust was significantly higher as well during the LHB due to the increased influx of cometary bodies \citep{Nesvorny_etal_2010}. We note that exozodiacal dust can also be delivered to the terrestrial region from cool Kuiper belt analogues by PR-drag \citep{Kennedy_Piette_2015}. Exozodiacal dust is a considerable source of noise for observations aimed at direct imaging and spectroscopy of Earth-like exoplanets in the habitable zone. Therefore, the characterisation of the exozodiacal dust luminosity function is of prime interest for the preparation of future missions targeted to the direct detection of Earth twins. Such efforts will be carried out over the next few years and give a much more detailed picture of the prevalence and luminosity distribution of exozodiacal dust. For example, \citet{Weinberger_etal_2015} describe a future survey of $\sim$50 stars with the LBTI searching for exozodiacal dust \citep[see also][]{Kennedy_etal_2015}. Is there a possibility to distinguish between exozodiacal dust\footnote{We refer to exozodiacal dust as "classical" dust produced from asteroids or comets, but it could be argued that dust from impacts is just another form of exozodiacal dust.} from asteroids or comets and dust from planetary impacts? Certainly, a difference would be expected in dust composition, which can be studied by infrared spectroscopy \citep[e.g.][]{deVries_etal_2012} or reflection spectroscopy \citep[e.g.][]{Debes_etal_2008,Kohler_etal_2008}. Exozodiacal dust is expected to have a cometary or asteroidal composition, while dust from a planetary surface might resemble terrestrial crust (or mantle) material and contain impact-generated silica, which, as seen in section \ref{sec:silica_emission}, have good prospects to be detectable with future instruments. Studies trying to link dust composition to its origin have already been carried out \citep[e.g.][]{Lisse_etal_2012}. \citet{Morlok_etal_2014} presented absorption spectra of materials representative of the Earth crust (e.g.\ granite, basalt) and mantle (e.g.\ dunite) as well as martian meteorites and compared these laboratory data to infrared spectra of debris disks. So, by looking at the dust composition, one should in principle be able to distinguish between asteroidal/cometary dust and exoplanetary dust. It might also be possible to distinguish between exozodiacal dust and impact generated dust by considering their spatial distribution, but this is beyond the scope of this paper. We nevertheless note that models of the dust density distribution in the zodiacal cloud are quite complex, consisting of several distinct components \citep[e.g.][]{Kelsall_etal_1998,Krick_etal_2012,Rowan-Robinson_May_2013}. The spatial distribution of debris created in a giant impact was studied by \citet{Jackson_Wyatt_2012}. \subsection{Rate of large-scale impact events} The rate of impacts violent enough to accelerate target material to escape velocity is an important parameter to discuss. As a first step, consider the impact rate on Earth today. Events similar or larger than the K-T impact (impactor diameter $\sim$10\,km) are expected to occur, on average, every $\sim$100\,Myr \citep[e.g.][]{Harris_2008}. Several tens of such events should therefore have occurred over the lifetime of Earth. Estimates for impactors with a diameter $\geq$20\,km (as considered in section \ref{subsec:ejected_material}) indicate impact intervals of $\sim$500\,Myr \citep{Harris_2008}. This can be compared to the typical lifetime of the post-ejection debris, characterised (if PR-drag is ignored) by $t_\mathrm{max}$ in tables \ref{tab:spalled} and \ref{tab:recondensed}. Assuming that similar impact rates apply to exoplanetary systems, these numbers suggest that only about one in a million systems\footnote{Strictly speaking, these estimates apply only to exoplanetary systems with a solar type host star and a rocky planet at 1\,AU distance, since e.g.\ the collisional evolution depends on the mass and luminosity of the central star.} should show dust from a recondensed population at its maximum fractional luminosity. On the other hand, a few percent of the systems could show dust from a spalled population at its maximum fractional luminosity. How has the impact rate varied during Earth's history? It is thought that the impact rate was constant from approximately 3.5\,Gyr ago until today \citep[][figure 3]{Valley_etal_2002}. However, in the first billion years after Earth's formation, the impact rate was significantly higher, although different models exist for its exact evolution \citep{Valley_etal_2002}. One possible scenario is a Late Heavy Bombardment (LHB), a spike in the impact rate in the inner solar system 3.8\,Gyr ago, evidence for which is found from e.g.\ Apollo lunar samples. Such a late period of intense bombardment after a relatively quiet phase can be explained by the destabilisation of the orbits of a large number of planetesimals in the outer solar system, caused by the migration of the gas giants \citep{Gomes_etal_2005}. An intense bombardment could increase the chances of detecting debris ejected from a planetary surface, although the level of exozodiacal dust is also expected to be significantly higher during such an event \citep{Nesvorny_etal_2010}. However, was life already present at these early stages? Although the end of the LHB on Earth roughly coincides with the earliest evidence for life, it is indeed possible that life already emerged before the LHB, in the Hadean, and was present throughout the whole period of intense bombardment \citep{Abramov_Mojzsis_2009}. In addition, LHB-like events might occur up to several Gyr after the formation of the planetary system, i.e.\ once life is already well-established on the host planet. This is because the onset of the instability causing the bombardment depends on the initial separation between the outer migrating planet and the planetesimal belt, where larger separation leads to a later LHB \citep{Gomes_etal_2005}. As an example, it has been suggested that dust seen around the 1\,Gyr old main-sequence star $\eta$~Corvi originates from an LHB-like event \citep{Wyatt_etal_2007,Lisse_etal_2012}. However, a caveat to a pre-LHB origin of life is the idea that a high impact rate might be a prerequisite for life to arise in the first place by delivering water and organics \citep[e.g.][]{Pierazzo_Chyba_1999,Court_Sephton_2009} or by inducing hydrothermal vents \citep[e.g.][]{Abramov_Kring_2007}. The latter have been proposed as potential sites for the origin of life \citep[e.g.][]{Baross_Hoffman_1985}. As to the occurrence of LHB-like events in exoplanetary systems, \citet{Booth_etal_2009} estimated from observations that less than 12\% of the Sun-like stars undergo an LHB, i.e.\ extrasolar LHB events are rare. From ages of impact craters on Earth, there exists evidence that impacts occur in ``bombardment episodes'', possibly due to the breakup of giant comets and subsequent impact of the debris \citep{Napier_2015}. If this is indeed the case, a similar mechanism in an exoplanetary system could help to detect dust from impact events by accumulating the dust of a bombardment episode. \section{Summary and conclusions}\label{Sec:Conclusions} We have calculated the mass escaping from an exoplanet during an impact event for a limited number of impact scenarios (exoplanet sizes, impactor types) using a simple model. We have also determined the fraction of escaping ejecta that is not considerably shock damaged and remains in the solid state. We then computed the collisional evolution of the debris with a simplified analytical model based on timescales of collisions (production of new, smaller grains) and removal by PR-drag and radiation pressure. For the relatively small dust masses considered here, PR-drag is an important removal process, in contrast to most known debris disks. We consider two dust populations that we assume to evolve independently of each other: the spalled population that consists of ejecta that remained in the solid state during the impact event, and the recondensed population that formed from melt droplets or vapour. The recondensed population is initially much brighter since it has a larger mass and smaller grain sizes than the spalled population. However, it is also removed faster, such that the spalled population becomes dominant typically after a million years. The fractional luminosity of the impact generated dust is roughly comparable to the fractional luminosity of the zodiacal dust. Such a fractional luminosity is potentially in the reach of the presently available LBTI. Future instruments such as TPF-like telescopes will be able to detect the presence of dust both in thermal emission and scattered light. By studying the composition of the dust, one would gain information on the impacted exoplanet, its geology or the presence of a biosphere. The escaping masses we derive can be used to assess the detectability of (bio)signatures present in the subsurface of an exoplanet. As examples, we considered three different substances. Calcite would likely indicate the presence of liquid water at some point in the history of the exoplanet, provided the dust indeed originated from a planetary body. Our estimates show that a detection of calcite would require advanced far-IR instruments not yet available. Glassy silica on the other hand would potentially be detectable with JWST, and should be within the reach of a TPF-like telescope. Since glassy silica is linked to violent impacts or collisions, the detection of substantial amounts would suggest that the observed dust indeed originated from an impact event involving a planetary body or large planetesimals. Finally, we considered the direct detection of ejected biological matter (microorganisms) in reflected light. While microorganisms have absorption features due to water of hydration, their detection within the ejected debris seems unfeasible. Indeed, a large fraction of any microorganisms would be destroyed during the impact. In addition, taking Earth as a reference, the density of microorganisms is too low to allow detection. Our calculations show that ejected dust masses are relatively small. We note however that the dust cross-section is in general larger than the planetary cross-section. Also, studying ejected dust could be an interesting complement to atmospheric studies. Looking at dust from impact events seems to be the only possibility to study the subsurface composition of exoplanets directly, apart from exoplanets evaporating very close to their host star \citep[e.g.][]{vanLieshou_etal_2014}. Dust from impact events is a valuable piece of information with which to achieve a complete characterisation of an exoplanet (including its geology), which is important when assessing its habitability or potential signatures of a biosphere. However, the detailed study of dust from impact events on terrestrial planets has to wait for future instruments with high sensitivity and the ability to observe material in the terrestrial region of a star. \section*{Acknowledgements} The authors would like to thank Natalia Artemieva, Axel Brandenburg, Gerda Horneck, Markus Janson and Andreas Morlok for valuable discussions. This research has made use of NASA's Astrophysics Data System. Figures were made using the \texttt{Matplotlib} library \citep{Hunter_2007}. \section*{Author Disclosure Statement} No competing financial interests exist. \def\small{\small}
\section{Magnetar Spin-Down by GW and EM Radiations} The energy reservoir of a newly-born magnetar is its total rotation energy, which reads as \begin{eqnarray} E_{\rm rot} = \frac{1}{2} I \Omega^{2} \simeq 2 \times 10^{52}~{\rm erg}~ M_{1.4} R_6^2 P_{-3}^{-2}, \label{Erot} \end{eqnarray} where $I$ is the moment of inertia, $\Omega$, $P$, $R$, and $M$ are the angular frequency, rotating period, radius, and mass of the neutron star. The convention $Q = 10^x Q_x$ is adopted in cgs units. It may spin down by losing its rotational energy through two channels, magnetic dipole torques ($L_{\rm EM}$) and gravitational wave radiation ($L_{\rm GW}$) (e.g., Shapiro \& Teukolsky 1983; Zhang \& M{\'e}sz{\'a}ros 2001; Fan et al. 2013; Lasky \& Glampedakis 2016), i.e., \begin{eqnarray} -\frac{dE_{\rm rot}}{dt} = -I\Omega \dot{\Omega} &=& L_{\rm EM} + L_{\rm GW} \nonumber \\ &=& \frac{B^2_{\rm p}R^{6}\Omega^{4}}{6c^{3}}+\frac{32GI^{2}\epsilon^{2}\Omega^{6}}{5c^{5}}, \label{Spindown} \end{eqnarray} where $\dot{\Omega}$ is time derivative of angular frequency, $B_p$ is the surface magnetic field at the pole, and $\epsilon=2(I_{\rm xx}-I_{\rm yy})/(I_{\rm xx}+I_{\rm yy})$ is the ellipticity in terms of the principal moments of inertia. One can find that for a magnetar with given $R$ and $I$, its $L_{\rm EM}$ depends on $B$ and $\Omega$, and $L_{\rm GW}$ depends on $\epsilon$ and $\Omega$. We derive the evolution of $L_{\rm EM}$ in the phases of that $L_{\rm EM}$ and $L_{\rm GW}$ dominates the rational energy lost in the following. (I) $L_{\rm EM}$ dominated scenario: In this scenario, one has \begin{eqnarray} L_{\rm EM}\simeq -I\Omega \dot{\Omega}=\frac{B^2_{\rm p}R^{6}\Omega^{4}}{6c^{3}}. \label{EM_dominated} \end{eqnarray} The full solution of $\Omega(t)$ in Eq.(\ref{EM_dominated}) can be written as \begin{eqnarray} \Omega(t) &=& \Omega_{0}(1+\frac{t}{\tau_{\rm em}})^{-1/2} \nonumber \\ &\simeq&\cases{ \Omega_0, & t $\ll \tau_{\rm c,em}$ \cr \Omega_{0}(\frac{t}{\tau_{\rm c,em}})^{-1/2}, & t $\gg \tau_{\rm c,em}$ \cr } \label{Omega_EM} \end{eqnarray} where $\Omega_{0}$ is initial angular frequency at $t=0$, and $\tau_{\rm c,em}$ is a characteristic spin-down time scale in this scenario. $\tau_{\rm em}$ can be given by \begin{eqnarray} \tau_{\rm c,em}&=&\frac{3c^{3}I}{B_{p}^{2}R^{6}\Omega_{0}^{2}} \nonumber \\ &\simeq&2.05 \times 10^3~{\rm s}~ (I_{45} B_{p,15}^{-2} P_{0,-3}^2 R_6^{-6}), \label{spintau_em} \end{eqnarray} where $P_0$ is the initial period of the magnetar (e.g., $P_0=2\pi/\Omega_0$). The evolution of $L_{\rm EM}$ with time can be expressed as \begin{eqnarray} L_{\rm EM}(t) &=& L_{\rm em,0}(1+\frac{t}{\tau_{\rm c,em}})^{-2} \nonumber \\ &\simeq&\cases{L_{\rm em,0}, & t $\ll \tau_{\rm c,em}$ \cr L_{\rm em,0}(\frac{t}{\tau_{\rm c,em}})^{-2}, & t $\gg \tau_{\rm c,em}$ \cr } \label{Luminosity_EM} \end{eqnarray} where $L_{\rm em,0}$ is the initial kinetic luminosity of electromagnetic dipole emission at $t_0$, given by \begin{eqnarray} L_{\rm em,0}&=&\frac{B^2_{p}R^6\Omega^{4}_{0}}{6c^3} \nonumber \\ &\simeq&1.0 \times 10^{49}~{\rm erg~s^{-1}} (B_{p,15}^2 P_{0,-3}^{-4} R_6^6), \label{spinlu_em} \end{eqnarray} (II) $L_{\rm GW}$ dominated scenario: In this scenario, one has \begin{eqnarray} L_{\rm GW}\simeq -I\Omega \dot{\Omega}=\frac{32GI^{2}\epsilon^{2}\Omega^{6}}{5c^{5}}. \label{GW_dominated} \end{eqnarray} The full solution of $\Omega(t)$ in Eq.(\ref{GW_dominated}) can be written as \begin{eqnarray} \Omega(t) &=& \Omega_{0}(1+\frac{t}{\tau_{\rm c,gw}})^{-1/4} \nonumber \\ &\simeq&\cases{ \Omega_0, & t $\ll \tau_{\rm c,gw}$ \cr \Omega_{0}(\frac{t}{\tau_{\rm c,gw}})^{-1/4}, & t $\gg \tau_{\rm c,gw}$ \cr } \label{Omega_GW} \end{eqnarray} where $\tau_{\rm c,gw}$ is a characteristic spin-down time scale in this scenario, which reads as \begin{eqnarray} \tau_{\rm c,gw}&=&\frac{5c^{5}}{128GI\epsilon^2\Omega^4_0} \nonumber \\ &\simeq&9.1 \times 10^3~{\rm s}~ (I^{-1}_{45}\epsilon_{-3}^{-2} P_{0,-3}^4 ). \label{spintau_gw} \end{eqnarray} The evolution of $L_{\rm GW}$ with time thus can be expressed as \begin{eqnarray} L_{\rm GW}(t) &=& L_{\rm gw,0}(1+\frac{t}{\tau_{\rm c,gw}})^{-3/2} \nonumber \\ &\simeq&\cases{L_{\rm gw,0}, & t $\ll \tau_{\rm c,gw}$ \cr L_{\rm gw,0}(\frac{t}{\tau_{\rm c,gw}})^{-3/2}, & t $\gg \tau_{\rm c,gw}$ \cr } \label{Luminosity_GW} \end{eqnarray} where $L_{\rm GW,0}$ is the luminosity of gravitational-wave quadrupole emission at $t=0$, given by \begin{eqnarray} L_{\rm gw,0}&=& \frac{32GI^{2}\epsilon^{2}\Omega_0^{6}}{5c^{5}} \nonumber \\ &\simeq&1.08 \times 10^{48}~{\rm erg~s^{-1}}(I_{45}^2 \epsilon_{-3}^{2} P_{0,-3}^{-6}). \label{spinlu_gw} \end{eqnarray} Within this scenario, the evolution of $\Omega(t)$ is different from the $L_{\rm EM}$ dominated scenario, and the evolution of $L_{\rm EM}$ is replaced by \begin{eqnarray} L_{\rm EM}(t) &=& L_{\rm em,0}(1+\frac{t}{\tau_{\rm c,gw}})^{-1} \nonumber \\ &\simeq&\cases{L_{\rm em,0}, & t $\ll \tau_{\rm c,gw}$ \cr L_{\rm em,0}(\frac{t}{\tau_{\rm c,gw}})^{-1}, & t $\gg \tau_{\rm c,gw}$ \cr } \label{Luminosity_GWEM} \end{eqnarray} Based on Eq.(\ref{Luminosity_EM}) and Eq.(\ref{Luminosity_GWEM}), and following the method of Lasky \& Glampedakis (2016), one can obtain the transition time ($\tau_{\ast}$) which point is from gravitational-wave quadrupole dominated to electromagnetic dipole dominated emission (Zhang \& M{\'e}sz{\'a}ros 2001; Lasky \& Glampedakis 2016), \begin{eqnarray} \tau_{\ast}=\frac{\tau_{\rm c,em}}{\tau_{\rm c,gw}}(\tau_{\rm c,em}-2\tau_{\rm c,gw}) \label{transition_time} \end{eqnarray} One can observe $\tau_{\ast}<0$ if $\tau_{\rm c,em}<2\tau_{\rm c,gw}$, indicating that no time is found for making $L_{\rm EM}(t)=L_{\rm GW}(t)$ and the rotational energy lost is always dominated by electromagnetic dipole emission, and the $L_{EM}$ evolves with time as Eq. (\ref{Luminosity_EM}). If $\tau_{\rm c,em}>2\tau_{\rm c,gw}$, one has $\tau_{\ast}>0$, suggesting that the spin-down is dominated by gravitational-wave quadrupole early and electromagnetic dipole emission later. In this case, the luminosity evolves with time as \begin{eqnarray} L(t)&\propto&\cases{(1+\frac{t}{\tau_{\rm c,gw}})^{-1}, & t $\leq\tau_{\ast}$ (GW dominated) \cr t^{-2}, &t $>\tau_{\ast}$ (EM dominated). \cr } \label{L_EMGW} \end{eqnarray} Moreover, Usov (1992) proposed that the spin-down of the neutron star is dominated by gravitational-wave quadrupole radiation when the angular velocity $\Omega$ of magnetar is larger than the critical value $\Omega_{cr}$ (also see Blackman \& Yi 1998; Zhang \& M{\'e}sz{\'a}ros 2001). Here, the $\Omega_{cr}$ ranges in $(0.4\sim 1.2)\times 10^{4}\rm~s^{-1}$ that depended on the equation of state of neutron star. \section{A New Paradigm for Physical Origin of the X-ray Afterglows} Based on our derivations above, a light curve of magnetic dipole emission of a newly-born magnetar may be characterized with some segments, as illustrate in Fig.\ref{fig:cartoon}. It starts with a segment of $F\propto t^{0}$ for both the magnetic dipole emission and GW emission dominated scenarios. It transits to $L\propto t^{-2}$ at $t_{\rm c,em}$ if the magnetar still stable and its spin-down is always dominated by the magnetic dipole radiation, as that shown in Fig.\ref{fig:cartoon} (a). If the spin-down of the magnetar is initially dominated by the GW emission, the $L_{\rm em}$ light curve should transits $L\propto t^{-1}$ at $t_{\rm c,gw}$, and decays as $L\propto t^{-2}$ since $t=\tau_{\ast}$, at then the magnetic dipole radiation begins dominating the rotation energy lost, as shown in Fig.\ref{fig:cartoon} (b). Occasionally, the magnetar may be collapsed to a black hole before $t_{\rm c,gw}$ and $t_{\rm c,em}$, the magnetic dipole radiation is shut down suddenly, the light curve shows up as an internal plateau followed by a sharp drop, as shown in Fig.\ref{fig:cartoon} (c). Note that the discussion above is in the two extremely cases, i.e., the magnetic dipole radiation and GW emission dominated cases. In a generic case, the magnetar coherently spins down by both the GW emission and magnetic dipole radiation, the $L_{\rm em}$ light curve may be featured as a shallow-to-normal decay segment with a decay slope changing from 0 to $-1\sim -2$. This resembles the canonical XRT light curve of {\em Swift} GRBs presented by Zhang et al. (2006). The combination of the magnetic dipole radiation and GRB fireball afterglow emission may make the diversity of the observed light curves in long GRBs. We also illustrate the afterglow light curve in the thin shell case and the total light curve of both the magnetic dipole radiation and GRB afterglows in Fig.\ref{fig:cartoon}. Zou et al. (2018) present a systematical analysis for the XRT light curves of {\em Swift} GRBs in the past 13 years and got a sample of 111 long GRBs that their early XRT light curves show a shallow-decay segment. As shown in their Figure 3, the XRT light curves of a large fraction of long GRBs (94/111) have a shallow-to-normal-decaying segment. The slope of the normal-decaying segment varies from $\sim -1$ to $\sim -2$, which extends up to hours even days (seel also Liang et al. 2007), being consistent with the generic scenario of our paradigm. We try to find out evidences of magnetar spin-down via gravitational wave quadrupole emission and magnetic dipole radiation from observations, and derive the parameters of magnetar. Some XRT lightcurves of interest long GRBs are presented in the following: \begin{itemize} \item GRBs 070306. As shown in Fig.\ref{fig:BATXRTLC}(a), its XRT lightcurve is a prototype lightcurve of the scenario that the magnetar is stable and the magnetic dipole emission may dominate the rotation energy lost. Its flux decay slope changes from $(-0.04\pm 0.04)$ to $(-1.94\pm 0.05)$ at $(3.06\pm 0.22)\times 10^{4}$ seconds. This is consistent with prediction of magnetar spin-down with magnetic dipole emission dominated. The redshift of GRB 070307 is 1.496, the plateau luminosity and break time are rough equal to $L_{em,0}$ and $\tau_{c,em}$ in the rest frame, respectively. Based on the Eq.\ref{spintau_em} and Eq.\ref{spinlu_em}, one can constrain the $B_{\rm p}\sim(3.18\pm0.37)\times 10^{15}$ G, $P_0\sim (4.29\pm0.34)$ ms. \item GRB 060807. As shown in Fig.\ref{fig:BATXRTLC}(b), a transition from the GW emission dominated epoch to the magnetic dipole radiation dominated epoch is detected in this GRB. Its XRT lightcurve is a prototype lightcurve of the scenario that the magnetar is stable and its rotation energy lost initially is dominated by the GW emission. Excluding the very early steep decay segment that may be attributed to the tail emission of the prompt gamma-rays (Liang et al. 2007), its XRT lightcurve can fit with a triple power-law function with reduced $\chi^2=1.18$. The slope changes from $\alpha_0=(-0.07\pm 0.09)$ to $\alpha_1=(1.18\pm 0.13)$ at $t_1=(4.80\pm1.10)\times 10^{3}$ s, and finally $\alpha_2=(2.08\pm 0.13)$ at $t_2=(2.86\pm0.78)\times 10^4$ s\footnote{One broken power-law model is also invoked to fit the same data, one has the slopes with -0.06 and -1.76 before and after break time, respectively. However, the reduced $\chi^2$ is as large as 1.55. This is too large to be accepted from the statistical point of view.}, as shown in Fig.\ref{fig:BATXRTLC}. Moreover, the Swift XRT team's analysis also finds that two breaks are statistically necessary with an f-test revealing a $5\times 10^{4}\%$ probability of chance improvement (Evans et al 2007, 2009). The characteristic of this light curve is consistent with a stable magnetar spinning down via gravitational wave quadrupole emission early (before $t_2$) and magnetic dipole radiation later (after $t_2$). Also, those two break times may be the spin-down characteristic $\tau_c$ of the magnetar and the transition time $\tau_{\ast}$ from the GW emission dominated epoch to the magnetic dipole radiation dominated epoch, respectively. Based on the derivations in section 2, together with $\tau_{\rm c, gw}\sim t_1$ and $\tau_{\ast}\sim t_2$, one has $\tau_{\rm c, em}=(1.75\pm 0.46)\times10^4$ s. By assuming redshift $z=0.5$ of this case, one can constrain the physical parameters of magnetar with equation of state GM1, e.g., $B_{\rm p}\sim(7.53\pm3.43)\times 10^{14}$ G, $P_0\sim (1.16\pm0.56)$ ms ($\Omega_0\sim 5400\rm~s^{-1}$), and $\epsilon \sim (1.02\pm0.35)\times10^{-3}$. It is consistent with the required of GW losses significantly with a new born neutron star\footnote{Here, we assume that the properties of neutron star is similar with that magnetar. So that, one can use similar method in Lasky \& Glampedakis 2016 to estimate the ellipticity of magnetar.}. \item GRB 101225A is of interest with detection of a possible signal that the magnetar is collapsed to a black hole before transition from the GW emission dominated epoch to the magnetic dipole radiation dominated epoch. As shown in Fig.\ref{fig:BATXRTLC}(c), it XRT lightcurve is roughly depicted with a triple power-law function without considering the significant flickering. The decaying slope is initially $\alpha_0=(-0.05\pm 0.11)$, then transits to $\alpha_1=(-1.11\pm 0.03)$ at $t_1=(1.42\pm 0.15)\times 10^3$ s, and finally becomes $\alpha_2=(-5.93\pm 0.31)$ at $t_2=(2.12\pm0.9)\times 10^4$ s. The sharp break at $t_2$ may be due to the collapse of the magnetar. Based on the derivations of section 2 and light curves fits above, one has $\tau_{\rm c, GW}\simeq t_1=(1.42\pm 0.15)\times 10^3$ s and $\tau_{\ast}> t_2=(2.12\pm0.9)\times 10^4$ s. Together with Eq.(\ref{transition_time}), one can estimate $\tau_{\rm em}>7077$ s. On the other hand, $L_{\rm em,0}\simeq 4\pi D_L^2 F_b=(6.15\pm0.54)\times 10^{48}~{\rm erg~s^{-1}}$ ($F_b$ is flux at $t_1$ in X-ray light curve) at redshift $z=0.847$, one can estimate the $B_{\rm p}<5.8\times 10^{15}$ G, $P_0<1.35$ ms, and $\epsilon>1.7\times10^{-3}$ with equation of state GM1 (Lasky et al. 2014; Ravi \& Lasky 2014; L\"{u} et al. 2015). \item GRB 070110. As shown in Fig.\ref{fig:BATXRTLC}(d), its XRT lightcurve is a plateau followed by a sharp drop (Troja et al. 2007). This may be a signature of collapse of a magnetar before the characteristic spin-down timescale. The collapse of the magnetar makes the magnetic dipole radiation disappears suddenly and the GRB afterglows emerge, as that observed since $t>6\times 10^{4}$ seconds. Similar feature is also observed in GRBs 060602, 070616, 060607A, and 170714 (Zou et al. 2018). . \end{itemize} \section{Conclusions and Discussion} We have presented the temporal evolution feature of the EM emission during the spin-down of a newly-born magnetar (the remnant of massive star collapse) in the scenarios that the GW quadrupole and magnetic dipole emission dominate the rotational energy lost, respectively. We show that the EM emission light curve of the magnetic dipole radiation is described as $F\propto (1+t/\tau_c)^{\alpha}$, where $\tau_c$ is the characteristic spin-down timescales, and $\alpha=-1$ in the GW emission dominated scenario and $\alpha=-2$ in the magnetic dipole radiation dominated scenario. Transition from a GW emission dominated epoch to a magnetic dipole radiation dominated epoch may show up as a smooth break with a decaying slope from $-1$ to $-2$. In case of that the magnetar collapses to a black hole before $\tau_c$, the light curve of EM emission should be a plateau followed by a sharp drop being due to the immediate shut down of the magnetic dipole radiation. In a generic scenario, the magnetar coherently spins down by both the GW emission and magnetic dipole radiation, the EM emission lightcurve may be a shallow-to-normal decay segment with a slope changing from 0 to $-1\sim -2$. Our result presents a new paradigm for physical origin to explain the X-ray data of long GRBs observed with XRT. The expected generic light curve in this framework resembles the canonical XRT light curve of {\em Swift} GRBs presented by Zhang et al. (2006). Analysis of XRT data for a large sample of long GRBs and cases study are also consistent with our paradigm (e.g., Zou et al. 2018). We propose that the early shallow-decaying X-ray afterglows in long GRBs may be dominated by the magnetic dipole emission but not external shock mission of GRB fireballs. The combination of the magnetic dipole radiation and GRB fireball afterglows may make the diversity of the observed X-ray light curves. As shown in Liang et al. (2010, 2013) and Li et al. (2012), a clear onset bump, which may be a signature of the deceleration of GRB fireballs, is observed in the optical afterglows of some GRBs. Their XRT light curves in the according time interval are usually a shallow-decay segment. It is possible that the X-ray emission is dominated by the magnetic dipole radiation and the optical emission is dominated by the GRB afterglows. This may interpret the observed chromatic behaviors of the X-ray and optical afterglow light curves and the extremely low detection rate of a jet-like break in the X-ray light curves (Uhm \& Beloborodov 2007; Genet et al. 2007; Liang et al. 2008). Moreover, we present four long GRBs (070306, 060807, 070110, and 101225A) which X-ray light curves are likely contributed from magnetar spin-down via gravitational wave quadrupole emission and magnetic dipole radiation. Such as GRB 070306, the X-ray emission is likely originated from magnetar spin-down with magnetic dipole emission dominated; or magnetar spin-down via gravitational wave quadrupole emission and magnetic dipole radiation (e.g., GRB 060807); or magnetar collapse into black hole before its spin down (GRB 070110); or collapse of a supra magnetar during its spinning down period via gravitational wave quadrupole emission (GRB 101225A). Within this scenario, the physical parameters of magnetar can also be constrained via the observed properties of X-ray emission, e.g., $B_p$, $P_0$ and $\epsilon$. Especially, the derived value of $\epsilon$ for long GRBs 060807 and 101225A are consistent with the constraints of Lasky \& Glampedakis 2016 by adopting short GRBs. On the other hand, the origin of some peculiar (e.g., soft-long lasting $\gamma$-ray emission) Ultra-long GRBs may be consistent with our scenario. For example, the possible origin of GRB 101225A may be consistent with the hypothesis magnetar spin-down with GW emission dominated and collapses to a black hole at later time, e.g., long-soft $\gamma$-ray emission may be of energy injection from magnetar wind within off-axis observations, the early segment of normal decay in XRT light curve is consistent with spin-down magnetar wind with gravitational-wave quadrupole radiation dominated, and the later phase of steeper decay in XRT light curve is the signature of magnetar collapse into black hole. However, due to lack of smoking gun evidence, catching this possible interpretation is expected by observing more events of GW and EM associated with LIGO and high energy instruments in the future. \section{Acknowledgements} We acknowledge the use of the public data from the {\em Swift} data archive and the UK {\em Swift} Science Data Center, and thank the anonymous referee for helpful comments. This work is supported by the National Basic Research Program (973 Programme) of China 2014CB845800, the National Natural Science Foundation of China (Grant No.11603006, 11851304, 11533003 and U1731239), Guangxi Science Foundation (grant No. 2017GXNSFFA198008, 2016GXNSFCB380005 and AD17129006), the One-Hundred-Talents Program of Guangxi colleges, the high level innovation team and outstanding scholar program in Guangxi colleges, Scientific Research Foundation of Guangxi University (grant no XGZ150299), and special funding for Guangxi distinguished professors (Bagui Yingcai \& Bagui Xuezhe).
\section{Introduction} \label{sec:intro} The interplay between charged particles and stochastic magnetic fields generated by plasma turbulence is crucial to understanding how cosmic rays propagate through space \citep{Strong2007,Zweibel2013,Schlickeiser2015}. A key parameter for determining the underlying nature of charged-particle diffusion is the ratio of the particle gyroradius $r_g$ to the correlation length $\ell_B$ of the magnetic turbulence. For the vast majority of cosmic rays detected at the Earth, this ratio is small. These are particles that are well confined by the Galactic magnetic field. But for cosmic rays more energetic than about 10 EeV, the ratio is larger than unity. These ultra-high-energy cosmic rays (UHECRs) are not confined to the Milky Way and are presumed to be extragalactic in origin. Identifying their sources requires understanding how they are deflected by the intergalactic magnetic field, which appears to be stochastic and spatially intermittent. Recent data from the Parker Solar Probe mission have also indicated the presence of non-Gaussian magnetic fields near the Sun \citep{Bandyopadhyay2019arXiv}. To study the propagation of cosmic rays, a theoretical framework has been developed based on direct numerical simulations of particle trajectories (e.g., \citet{Sigl2003,Sigl2004}) and statistical techniques (see \citet{ShalchiBook2009} for a review). In particular, it has been shown \citep{Jokipii1966} that random, small-amplitude fluctuations of the magnetic field superimposed on a mean background field lead to diffusive particle propagation. As a result, standard (Markovian) diffusion is widely used in modeling cosmic-ray transport (e.g., \citet{Kotera2008, Globus2008, Globus2017, Globus2019}), although anomalous diffusion has been shown to occur in special cases \citep{Jokipii1969, Reville2008, Lazarian2014}, including resonant scattering of charged particles in spatially intermittent magnetic fields \citep{Shukurov}. Past laboratory experiments have studied particle transport in diffuse plasmas with strong mean magnetic fields \citep{Gustafson2012,Anderson2013,Furno2015,Bovet2015}, but the regime that is relevant to UHECR transport in the intergalactic medium (IGM), i.e., a stochastic, spatially intermittent magnetic field with zero mean ($\langle \bm{B} \rangle = 0$), and under conditions of weak magnetization ($r_g \gg \ell_B$), has not been studied theoretically, numerically, or experimentally. \section{Laser-driven experiments} \label{sec:experiments} Here we report the results of laboratory experiments that focus on this regime. We carried out these experiments at the Omega Laser Facility at the Laboratory for Laser Energetics at the University of Rochester \citep{Boehly1997}. A high-velocity, magnetized, turbulent plasma was generated (Figure~\ref{fig:beam_outline}), employing the same platform as previously used to demonstrate dynamo amplification of magnetic fields \citep{Tzeferacos2017pop,Tzeferacos2017}. Three-dimensional simulations with the radiation-magnetohydrodynamics code FLASH \citep{fryxell2000,dubey2009,Tzeferacos2015} guided and informed the experimental design, including target specifications and the timing of diagnostics \citep{Tzeferacos2017pop}. \begin{figure} \begin{center} \includegraphics[width=\linewidth]{Figure1b.png} \caption{\textbf{Experimental setup}. \textbf{a)} Schematic of the experimental platform, showing the target components and the configuration of the proton radiography experimental diagnostic. \textbf{b)} X-ray self-emission from the interaction region at $t = 38\,\rm{ns}$ after the start of the laser drive. \textbf{c)} Power spectrum of the density fluctuations recovered from the fluctuations of X-ray self-emission. The resolution of the diagnostic (the size of the pinhole employed on the X-ray framing camera) is 50 $\mu$m, which is below the driving scale, but above the plasma's dissipative scales.} \label{fig:beam_outline} \end{center} \end{figure} The platform consists of two 50 $\mu$m-thick polystyrene (CH) foils attached to a pair of 230 $\mu$m-thick CH washers, with 400 $\mu$m-diameter machined ``wells'' that act as collimators, placed 8 mm apart. Between the two targets we position a pair of grids, comprised of periodic 300 $\mu$m holes and 100 $\mu$m wires, placed 4 mm apart. The grid patterns are shifted to break the mirror symmetry of the system. Each foil is irradiated with 5 kJ of energy during a 10 ns pulse (10 frequency-tripled laser beams on each foil staggered in time). The drive produces two counter-propagating plasma flows, which pass through the pair of grids, meet, shear each other, and become turbulent in the central region between the two grids (the interaction region). For a detailed description of the experimental platform and the nature of the turbulence it generates, see \cite{Tzeferacos2017}. \begin{figure} \centering \includegraphics[width=\linewidth]{Figure2new.png} \caption{\textbf{Magnetic field reconstruction.} \textbf{a)} 15 MeV proton radiography image of the entire interaction region at 38 ns, without pinhole shield present in the path. For clarity, the image length scales are shown without the $\times$28 magnification factor; with this factor, the image has dimensions of 10 cm $\times$ 10 cm. \textbf{b)} Magnitude of the two components of path-integrated magnetic field that are perpendicular to the proton beam path, reconstructed~\citep{Bott2017} from the 15 MeV proton image in {a)}. \textbf{c)} PDF of the magnitude of the path-integrated magnetic field $B_{\rm path}$ at 38 ns. The PDF (red) is calculated using the mean of the PDFs for the two rectangular regions depicted in {b)}; the uncertainty is derived from the standard error. The PDF of the path-integrated field arising in the FLASH simulations is also plotted (green), as is a Gaussian reference (blue) with the same RMS field strength. \textbf{d)} The fraction of area of the path-integrated magnetic field in which the field's magnitude $B_{\rm path}$ satisfies $B_{\rm path} \geq \nu B_{\rm path,rms}$, where $B_{\rm path,rms}$ is the RMS path-integrated field. This quantity is again calculated from the rectangular regions demarcated in {b)}.} \label{fig:fullproton} \end{figure} The electron density and temperature of the turbulent plasma are measured using collective Thomson scattering \citep{Katz2012} and found to be $n_e \simeq 9 \times 10^{19}$ cm$^{-3}$ and $T_e \simeq 400$ eV immediately after the formation of the turbulent region ($t \simeq 27$ ns after the start of the drive). The mean velocity ($u_{\rm{flow}}$) and the turbulent velocity ($u_{\rm{turb}}$) of the flow are also obtained by this diagnostic. Prior to collision, the counter-propagating flows reach velocities of $u_{\rm{flow}} \simeq 2 \times 10^7\,\rm{cm}\,\rm{s}^{-1}$, whereas in the turbulent region at late times we measure $u_{\rm{flow}} \simeq 5\times10^6 \,\rm{cm}\,\rm{s}^{-1}$ and $u_{\rm{turb}} \simeq 10^7\,\rm{cm}\,\rm{s}^{-1}$ at the driving scale of the turbulence ($L \simeq 400$ $\mu$m, set by the grid spacing). The plasma interaction region's evolution is determined using self-emitted soft X-rays (Figure~\ref{fig:beam_outline}b shows the plasma emission at 38 ns after the start of the laser drive). As discussed in \citet{Tzeferacos2017}, fluctuations in the emissivity of such a plasma can be related to fluctuations of density \citep{Churazov2012}; the latter exhibit a Kolmogorov power-law spectrum, with driving scale $L$ consistent with the grid spacing detailed above (Figure~\ref{fig:beam_outline}c). The spatial extent of the interaction region over time can also be measured using the X-ray diagnostic. Further details concerning the plasma state are given in Appendix \ref{sec:a.plasma}. The stochastic magnetic fields amplified in the turbulent plasma \citep{Tzeferacos2017pop, Tzeferacos2017} are measured using proton radiography (Figure~\ref{fig:fullproton}). A 420 $\mu$m-diameter SiO$_2$ capsule, with a 2-$\mu$m-thick shell, is filled with 18 atm D$^3$He gas (6 atm $^2$D and 12 atm $^3$He) and is placed 10 mm away from the interaction region. The capsule is imploded using 17 beams (frequency-tripled to 351 nm, providing 270 J/beam for a 1 ns pulse) to produce 3.3 and 15 MeV fusion protons \citep{Li2006, Kugland2012, Manuel2012}. The protons are recorded on the opposite side of the capsule with a nuclear track detector (CR-39) film pack, 27 cm from the plasma interaction region, achieving a magnification of $\times$28. Figure~\ref{fig:fullproton}a shows a proton radiograph of the plasma corresponding to the same time as the X-ray image in Figure~\ref{fig:beam_outline}b. The presence of strong inhomogeneities in the proton flux and the stochastic, non-regular morphology of the structures is due to protons being deflected by strong, tangled magnetic fields. From the flux inhomogeneities observed in the proton image, the experimental radiographs can be inverted \citep{Graziani2017,Bott2017} to recover two components of the path-integrated magnetic field (Figure~\ref{fig:fullproton}b). Using the measured spatial extent of the interaction region, it can be shown that the measured path-integrated magnetic field corresponds to a root mean square (RMS) value $B_{rms}\simeq 65$-$80$ kG, with a typical correlation length $\ell_B \approx 90 \, \mu \mathrm{m}$. These experimental values are consistent with the results of the FLASH simulations that give $B_{rms}\simeq 80-100$ kG and $\ell_B \simeq 50 \, \mu \mathrm{m}$, when the effects of diffusion of the imaging beam caused by small-scale magnetic fields and the underestimation of the magnetic energy by the reconstruction algorithm in the presence of small-scale caustics are taken into account \citep{Tzeferacos2017}. The statistics of the path-integrated magnetic field are expected to deviate from Gaussian as a result of the spatial intermittency. To quantify this, we show the probability density function (PDF) of the magnitude of the path-integrated field in Figure~\ref{fig:fullproton}c and the field's filling factor in Figure~\ref{fig:fullproton}d. Both exhibit extended tails. Since the path-integrated magnetic field is spatially intermittent, it follows that the field itself must also be spatially intermittent. Indeed, the PDF of the magnetic field strength in the FLASH simulations exhibits an exponential tail. The simulations also demonstrate that the deviation from Gaussian statistics is more pronounced in the three-dimensional true fields than the two-dimensional path-integrated field (see also Appendix \ref{sec:a.plasma}). Such non-Gaussian, spatially-intermittent magnetic fields are expected to arise when the fluctuation dynamo is operating~\citep{Schekochihin2004simulations}. \section{Transport characterization}\label{sec:char} To characterize the transport of particles through the turbulent plasma, we modified our experimental platform to introduce a collimated proton beam. The collimation was achieved by placing a 200-$\mu$m-thick aluminum shield between the D$^3$He capsule and the interaction region, with a 300-$\mu$m-diameter pinhole (shown in Figure~\ref{fig:beam_outline}a). The pinhole imprint is then recorded on the detector plane, as shown in Figure~\ref{fig:proton_images}. The proton-beam imprints appear deformed and broadened due to the interaction of the protons with the turbulent magnetized plasma. The proton-beam imprint contours are shown in Figs.~\ref{fig:lineouts}a and \ref{fig:lineouts}b. The corresponding deflection velocities, $\Delta v_\perp$, as interpreted from the scattering angle $|\Delta v_\perp|/V$, where $V$ is the proton-beam speed, are shown in Figure~\ref{fig:lineouts}c. Using the synthetic proton radiography diagnostic of the FLASH code \citep{Tzeferacos2017pop} we also post-processed the FLASH simulation results to recover proton trajectories and the resultant transverse deflections. These are in good agreement with the experimental measurements (Figure~\ref{fig:lineouts}c). \begin{figure} \centering\includegraphics[width=\linewidth]{Figure3.png} \caption{\textbf{Proton pinhole images.} Radiographs obtained on the CR-39 film pack with proton energies of \textbf{a)} 15 MeV, with no plasma in the interaction region, and \textbf{b)} 15 MeV, with a turbulent plasma in the interaction region. \textbf{c)} Same as \textbf{a)} but for the 3.3 MeV protons. \textbf{d)} Same as \textbf{b)} but for the 3.3 MeV protons. The pinhole shield is clearly seen to block most of the incoming proton flux from the capsule and, in the case where no plasma was present (\textbf{a)} and \textbf{c)}), it produces a fixed 300 $\mu$m diameter beam of 3.3 and 15 MeV protons that passes through to the detector. For the case when a plasma is present in the interaction region (\textbf{b)} and \textbf{d)}), the beam is deformed and broadened before reaching the detector.} \label{fig:proton_images} \end{figure} The velocity deflection $\Delta v_\perp$ due to magnetic fields scales independently of velocity, whereas the velocity deflection due to electric fields scales as $\propto 1/V$ (shown in Appendix \ref{sec:a.deflections}). The near-equality of the deflection velocities of the two proton species, evident in Figure~\ref{fig:lineouts}c, suggests that scattering is predominantly due to magnetic fields. While there are many other possible processes that could lead to scattering of a charged-particle beam passing through a turbulent plasma, for our experiment we argue that these other processes are negligible, on account of the low density of the plasma and the large speed of the protons compared to driving-scale plasma motions. Detailed calculations and descriptions of possible electric field effects are given in Appendix \ref{a.smearing}. \begin{figure} \centering\includegraphics[width=\linewidth]{Figure4_June2019.png} \caption{\textbf{Diffusive scattering of the proton beam.} Contours of the beam imprint on the CR-39 plate for \textbf{a)} 15 MeV protons and \textbf{b)} 3.3 MeV protons, taken with different delay times after the start of the drive beams. \textbf{c)} The RMS transverse deflection velocity acquired by the proton beam, calculated using the contour analysis of the pinhole image (for both proton species), and evaluated for the FLASH simulations. \textbf{d)} Measured spatial diffusion coefficient as a function of the plasma interaction length, as determined from the X-ray self-emission images and the 15 MeV pinhole synthetic radiographs from the FLASH simulations.} \label{fig:lineouts} \end{figure} From our experimental measurement of $\Delta v_\perp$, we can calculate the associated scattering frequency in velocity-space, $\nu \sim(\Delta v_\perp/V)^2 / \tau $, where $\tau = \ell_i/V$ is the transit time of the particles through the plasma and $\ell_i$ is the scale of the interaction region as inferred from the X-ray images. For a plasma with dimensions much bigger than the proton mean free path $\lambda \equiv V/\nu$, our results imply an isotropic spatial diffusion coefficient $\kappa\sim V^2/\nu = \ell_i V^3/(\Delta v_\perp)^2$. Since $\kappa/V^3$ is constant in our experiment (Figure~\ref{fig:lineouts}d), this implies $(\Delta v_\perp)^2\propto\ell_i \propto \tau$. This is consistent with a normal (Markov) spatial diffusion \citep{Tsytovich1977,ShalchiBook2009,Subedi2017}. \section{Discussion}\label{sec:discussion} Since the charged particle transport is consistent with normal spatial diffusion through a stochastic field, we can compare the experimental results to theoretical predictions from a random walk process. Using characteristic values for the plasma properties corresponding to $t = 38$ ns after the start of the drive, we take the size of the interaction region to be {\color{black}{$\ell_i \simeq 0.08 \, \mathrm{cm}$}}, the typical magnetic field strength {\color{black}{$B_{\rm{rms}} \simeq 100 \, \mathrm{kG}$}}, and the correlation length {\color{black}{$\ell_B \simeq 50 \, \mu \mathrm{m}$}}. For the case of normal diffusion, a random-walk argument gives {$\Delta v_\perp \approx q_e B_{\rm{rms}} \sqrt{\ell_i \ell_B}/m_p \simeq 1.9 \times 10^7 \, {\rm cm}\,{\rm s}^{-1}$} (see Appendix \ref{sec:a.deflections}) where $m_p$ is the mass of a proton. This value is consistent with the measured RMS deflection velocity (Figure~\ref{fig:lineouts}c). Further, since the values of $V$, $B_{\rm{rms}}$, and the power spectrum of the magnetic energy (and therefore the value of $\ell_{B}$) do not change in the experiment after the magnetic-field amplification saturates (see \citet{Tzeferacos2017pop,Tzeferacos2017} and Appendix \ref{sec:a.flash}), the random walk model also predicts a constant {$\kappa/V^3 \sim m_p^2/(q_e B_{\rm{rms}})^2 \ell_B \simeq 1.9\times10^{-16}\,\rm{s}^{2}\,\rm{cm}^{-1}$}, in quantitative agreement with the experimental results (Figure~\ref{fig:lineouts}d). For isotropic statistics and $r_g / \ell_B \gg 1$, the proton mean free path is $\lambda \simeq 10^4\,\rm{cm}$. In this regime, theory~\citep{Dolginov1967} and simulations~\citep{Subedi2017} predict that $\lambda/\ell_B \propto (r_g/\ell_B)^2$. \color{black}{The simulations of \citet{Subedi2017} predict a scaling coefficient of $1.5$ and extend to $r_g/\ell_B \simeq 40$. Extrapolating the results of \citet{Subedi2017} by a factor of $13$ and $28$ to the values $r_g/\ell_B \simeq 520$ for the 3.3 MeV protons and $\simeq 1,100$ for the 15 MeV protons gives $\lambda/\ell_B\simeq 0.6 \times 10^6$ and $\simeq 2\times 10^6$. These values agree within a factor of order unity with the experimental value of $\lambda/\ell_B\simeq 2\times10^6$ that we obtain for the two proton energies. More importantly, our results demonstrate that, for the conditions present in the experiment (i.e., a beam with a diameter $D > \ell_B$ of charged particles in the $r_g \gg \ell_B$ regime that traverses a stochastic and spatially-intermittent magnetic field with a path length $\ell_i > \ell_B$) the diffusion is not affected by the spatial intermittency of the stochastic magnetic fields. This is also demonstrated by the FLASH simulations of the experiment and numerical simulations presented in Appendix \ref{sec:a.intermittency}. The results of our experiments validate the use of standard diffusion theory in modeling the transport of UHECRs in the IGM, e.g., \citet{Kotera2008, Globus2008, Globus2017, Globus2019}, since all three of the above conditions are satisfied. This is useful in view of the increased interest in such modeling motivated by the recent detection by the Pierre Auger Observatory of a significant anisotropy in the arrival directions of cosmic rays of energy above 8 EeV \citep{Aab2017a}. \acknowledgments The research leading to these results has received funding from the European Research Council under the European Community's Seventh Framework Programme (FP7/2007-2013) / ERC grant agreements no. 256973 and 247039, the U.S. Department of Energy under Contract No. B591485 to Lawrence Livermore National Laboratory, Field Work Proposal No. 57789 to Argonne National Laboratory, and grants no. DE-NA0002724, DE-NA0003605, and DE-SC0016566 to the University of Chicago. We acknowledge support from the National Science Foundation under grants PHY-1619573 and AST-1616037 and from Department of Energy Cooperative Agreement No. DE-NA0001944 to the University of Rochester. Awards of computer time were provided by the U.S. Department of Energy ASCR Leadership Computing Challenge (ALCC) program. This research used resources of the Argonne Leadership Computing Facility at Argonne National Laboratory, which is supported by the Office of Science of the U.S. Department of Energy under contract DE-AC02-06CH11357. Support from AWE plc., the Engineering and Physical Sciences Research Council (grant numbers EP/M022331/1, EP/N014472/1 and EP/P010059/1) and the Science and Technology Facilities Council of the United Kingdom is also acknowledged, as well as funding from grants 2016R1A5A1013277 and 2017R1A2A1A05071429 of the National Research Foundation of Korea. J. Matthews, A. Bell and G. Gregori would like to thank Prof. Katherine Blundell (University of Oxford) for stimulating discussions on cosmic-ray measurements.
\section{Introduction} Although the process of galaxy assembly through star formation is believed to have reached a peak rate at redshifts of $z=2$--3 (i.e., $\sim$10--11 billion years ago), the fundamental driver of this evolution is still uncertain \citep{MadauDickinson}. In order to understand the physical origin of the cosmic star formation history (i.e., the rate of star formation taking place per unit comoving volume), we need to quantify the mass of cold, dense gas in galaxies as a function of cosmic time, because this gas phase controls star formation \citep{KennicuttEvans}. In particular, the evolution of the cold gas mass distribution can provide strong constraints on models of galaxy formation by simultaneously measuring the gas availability and, through a comparison to the star formation distribution function, the global efficiency of the star formation process (see \citealt{CarilliWalter} for a review). In this work, we carry out the first fully ``blind" deep-field spectral line search for CO(1--0) line emission, arguably the best tracer of the total molecular gas mass at the peak epoch of cosmic star formation, by taking advantage of the greatly improved capabilities of NSF's Karl G. Jansky Very Large Array (VLA). To date, observations of the immediate fuel for star formation, i.e., the cold molecular gas, have mostly been limited to follow-up studies of galaxies that were pre-selected from optical/near-infrared (NIR) deep surveys (and hence based on stellar light) or selected in the sub-millimeter based on dust-obscured star formation as sub-millimeter galaxies (SMGs; for reviews see, e.g., \citealt{Blain2002,Casey14}). In particular, optical/NIR color-selection techniques (e.g., ``BzK", ``BM/BX"; \citealt{Daddi04,Steidel04}) have explored significant samples of massive, star forming galaxies at $z\sim$1.5 to 2.5 \citep{Daddi08,Daddi10a,Tacconi10,Tacconi13} and the sub-mm selection has been particularly effective in identifying the most highly star-forming galaxies at this epoch for CO follow-up (e.g., \citealt{Bothwell13}). Although such targeted CO studies are fundamental to explore the properties of known galaxy populations, they need to be complemented by blind CO surveys that do not pre-select their targets, which may potentially reveal gas-dominated and/or systems with uncharacteristically low star formation rate missed by other selection techniques. Targeted CO studies have found more massive gas reservoirs at $z\sim2$ compared to local galaxies. Cold molecular gas is therefore believed to be the main driver for the high star formation rates of normal galaxies at these redshifts (e.g., \citealt{Greve2005,Daddi08, Daddi10a,Daddi10b,Tacconi10,Genzel10, Bothwell13}). Recent studies have claimed tentative evidence for an elevated star formation efficiency, i.e., star formation rate generated per unit mass of molecular gas, at $z\sim2$ compared to local galaxies \citep[e.g.,][]{Genzel15, Scoville16, Schinnerer16, Scoville17, Tacconi17}. Such an elevated star formation efficiency could be related to massive, gravitationally unstable gas reservoirs. The interstellar gas content of galaxies therefore appears to be the main driver of the star formation history of the Universe, during the epoch when galaxies formed at least half of their stellar mass content (e.g., \citealt{MadauDickinson}). Although targeted molecular gas studies currently allow to observe larger galaxy samples more efficiently than blind searches, their pre-selection could potentially introduce an unknown systematic bias. Critically, such studies may not uniformly sample the galaxy cold molecular gas mass function. The best way to address such potential biases, and thus, to complement targeted studies, is through deep field blind surveys, in which galaxies are directly selected based on their cold gas content. Although some targeted CO(1--0) deep studies have previously been attempted (most notably \citealt{Aravena12} and \citealt{Rudnick17}), these studies have typically targeted overdense (proto-)cluster environments. Hence, a blind search approach, to sample a representative cosmic volume is needed, in order to assess the statistical significance of such previous studies. CO(1--0) line emission is one of the most direct tracers of the cold, molecular inter-stellar medium (ISM) in galaxies\footnote{In this work, CO always refers to the most abundant isotopologue $^{12}$CO}. Its line luminosity can be used to estimate the cold molecular gas mass by means of a conversion factor ($\alpha_{\rm CO}$; see \citealt{Bolatto_review} for a review). Although other tracers of the cold ISM have been utilized to date, including mid-{\it J} CO lines and the dust continuum emission, these are less direct tracers because they require additional, uncertain conversion factors (e.g., CO excitation corrections and dust-to-gas ratios). Specifically, while the ground state CO(1--0) transition traces the bulk gas reservoir, mid-{\it J} CO lines such as CO(3--2) and higher-{\it J} lines are likely to preferentially trace the fraction of actively star-forming gas. Hence, their brightness requires additional assumptions about line excitation, in order to provide a measurement of the total gas mass. Furthermore, different populations of galaxies may be characterized by significantly different CO excitation conditions (e.g., BzK, SMGs and quasar hosts; \citealt{Daddi10b,Riechers06,Riechers11a,Riechers11b,Ivison_GN19,Bothwell13,CarilliWalter,Narayanan14}), which also show considerable individual scatter (e.g., \citealt{Sharon16}). Long-wavelength dust continuum emission has been suggested to be a measure of the total gas mass, and is utilized to great extent in recent surveys with ALMA to investigate large samples of far-infrared (FIR)-selected galaxies \citep{Eales12,Bourne13,Groves15,Scoville16, Scoville17,ASPECS2}. Nonetheless, there remain substantial uncertainties in the accuracy of the calibration for this method at high redshift especially below the most luminous, most massive sources.\footnote{The dust continuum method to determine gas masses may be affected by the metallicity dependence of the dust-to-gas ratio \citep{Sandstrom13,Berta16}, by trends in dust temperature with redshift (e.g., \citealt{Magdis12}), or with galaxy population (e.g., \citealt{Faisst17}).} Another caveat to using FIR continuum emission instead of CO comes from the finding that the dust emission measured by ALMA may not always trace the bulk of the gas distribution. This is made clear by the small sizes of the dust-emitting regions compared to the star forming regions and the gas as traced by CO emission (e.g., \citealt{Riechers_GN19,Riechers14,Ivison_GN19,Simpson15,Hodge16,Miettinen17,Chen2017}). Disentangling the causes for the observed increased star formation activity at $z\sim2$ is not straightforward, since an increased availability of cold gas may be difficult to distinguish from increased star formation efficiency due to the uncertainty in deriving gas masses, for representative samples of galaxies. Now, thanks to the unprecedented sensitivity and bandwidth of the VLA and the Atacama Large (sub-)Millimeter Array (ALMA), CO deep field studies can be carried out efficiently, and these are ideal to address such potential selection effects. Previous deep field studies, with the Plateau de Bure Interferometer (PdBI; now the NOrthern Extended Millimeter Array, NOEMA) in the HDF-N \citep{Decarli14, Walter14} and ALMA in the HUDF (ALMA SPECtroscopic Survey in the Hubble Ultra-Deep Field Pilot or ASPECS-Pilot, \citealt{ASPECS1, ASPECS2}), have provided the first CO blind searches covering mid-{\it J} transitions such as CO(3--2)\footnote{The ASPECS-Pilot survey simultaneously covered the CO(2--1) line in the redshift range $z\sim$1.0--1.7, the CO(3--2) line at $z\sim$2.0--3.1, and higher-{\it J} CO transitions at higher redshift.}, which are accessible at millimeter wavelengths. These studies have yielded crucial constraints on the molecular gas mass function at $z\sim1$--3, subject to assumptions on the excitation of the CO line ladder to infer the corresponding molecular gas content.\footnote{A key challenge in these studies is the uncertainty in assigning candidate emission lines to the correct CO transition, in cases where the redshift of the observed line candidates is not independently known.} They have found broad agreement with models of the CO luminosity evolution with redshift by finding an elevated molecular gas cosmic density at $z>1$ in comparison to $z\sim0$, but they may suggest a tension with luminosity function models at $z\gtrsim$1 by finding a larger number of CO line candidates than expected \citep{ASPECS2}. In order to more statistically characterize the molecular gas mass function in galaxies at $z=2$--3 and 5--7 than previously possible, while avoiding some of the previous selection biases, we have carried out the COLDz survey\footnote{The COLDz survey data, together with complete candidate lists, and analysis routines may be found online at coldz.astro.cornell.edu.} a blind search for CO(1--0) and CO(2--1) line emission using the fully upgraded VLA\footnote{The recently expanded VLA, with its new Ka-band detectors, the new 3-bit samplers, the simultaneous 8 GHz bandwidth, and its improved sensitivity, for the first time, enables carrying out this survey study.}. The main objective of this survey is to constrain the CO(1--0) luminosity function at $z=2$--3, which provides the most direct census of the cold molecular gas at the peak epoch of cosmic star formation free from excitation bias, and based on a direct selection of the cold gas mass in galaxies. As such, the COLDz survey is highly complementary to millimeter-wave surveys like ASPECS and targeted studies. The CO(1--0) intensity mapping technique explored by \cite{Keating15,Keating16} is complementary to our approach. Intensity mapping offers sensitivity to the aggregate line emission signal from galaxies, but only measures the second raw moment of the luminosity function (therefore not distinguishing between the characteristic luminosity and volume density). While the intensity mapping technique allows to cover significantly larger areas of the sky, it does not directly measure gas properties of individual galaxies, and is therefore complementary to direct searches such as COLDz. In a previous paper (\citealt{Lentati15}; Paper~0) we have described a first, interesting example of the galaxies identified in this survey. In this work (Paper~\rom{1}), we describe the survey, present the blind search line catalog, analyze the results of line stacking, and outline the statistical methods employed to characterize our sample. In Paper~\rom{2}, we present the analysis of the CO luminosity functions and our constraints on the cold gas density of the Universe at $z=2$--7, (Riechers et al., submitted). In Section 2 of this work, we describe the VLA COLDz observations, the calibration procedure and the methods to mosaic and produce the signal-to-noise cubes. In Section 3, we describe our blind line search through Matched Filtering in 3D. In Section 4, we present our ``secure" and ``candidate" CO line detections in both the deeper (in COSMOS) and wider (in GOODS-N) fields. In Section 5, we utilize stacking of galaxies with previously known spectroscopic redshifts, to provide strong constraints on their CO luminosity. In Section 6, we derive constraints to the total CO line brightness at $\sim$34 GHz. In Section 7, we discuss the implications of our results in the context of previous surveys. We conclude with the implications for future surveys with current and planned instrumentation. A more detailed analysis of the line search methods, the statistical characterization of the candidate sample properties, and upper limits found for additional galaxy samples are presented in the Appendix. In this work we adopt a flat, $\Lambda$CDM cosmology with $H_0=70\,$km s$^{-1}$ Mpc$^{-1}$ and $\Omega_{\rm M}=0.3$ and a Chabrier IMF \begin{table*} \caption{COLDz Observations Summary.} \centering \begin{tabular}{ c c c c c c } \hline Field & Pointing&D & D$\rightarrow$DnC &DnC & DnC$\rightarrow$C \\ & &configuration &configuration & configuration& configuration\\ \hline Baseline range (m) &&40--1000&40-2100&40--2100&40--3400\\ \hline COSMOS&1--7&82 hr&{\textemdash}&11 hr&{\textemdash}\\ GOODS-N&1--7&13 hr&{\textemdash}&{\textemdash}&{\textemdash}\\ GOODS-N&6&{\textemdash}&{\textemdash}&3 hr&{\textemdash}\\ GOODS-N&8--14&15 hr&{\textemdash}&{\textemdash}&{\textemdash}\\ GOODS-N&15--21&15 hr&{\textemdash}&{\textemdash}&{\textemdash}\\ GOODS-N&22--28&14 hr&1.4 hr&{\textemdash}&{\textemdash}\\ GOODS-N&29--35&{\textemdash}&3 hr&12 hr&{\textemdash}\\ GOODS-N&36--42&{\textemdash}&{\textemdash}&11 hr&3 hr\\ GOODS-N&43--49&14 hr&{\textemdash}&1.3 hr&{\textemdash}\\ GOODS-N&50--56&10.5 hr&{\textemdash}&3.5 hr&{\textemdash}\\ GOODS-N&57&2 hr&{\textemdash}&{\textemdash}&{\textemdash}\\ \hline \end{tabular} \tablecomments{We list the total, on-source time in different array configurations, for all pointings in each group combined.} \label{obs_table} \end{table*} \section{Observations} In order to constrain both the characteristic luminosity, $L^*_{\rm CO}$, or ``knee" of the CO(1--0) luminosity function and the bright end, we have optimized our observing strategy following the ``wedding cake" design, to cover a smaller deep area and a shallower, wide area. We have used the wide-band capabilities of the upgraded VLA to obtain a continuous coverage of 8 GHz in the Ka band (PI: Riechers, IDs 13A-398; 14A-214) in a region of the COSMOS field (centered on the dusty starburst AzTEC-3 at $z=5.3$ as a line reference source, \citealt{Capak11,Riechers14}) and in the GOODS-N/CANDELS-Deep field, in order to take advantage of the availability of excellent multi-wavelength data \citep{Grogin,Koekemoer,Giavalisco2004}. The COSMOS data form a 7-pointing mosaic (center: R.A.=10h 0m 20.7s, Dec.=2$^{\circ}$35'17'') with continuous frequency coverage between 30.969 GHz and 39.033 GHz. The GOODS-N data form a 57-pointing mosaic (center: R.A.=12h 36m 59s, Dec.=62$^{\circ}$13'43.5'') with continuous coverage between 29.981 GHz and 38.001 GHz (Figs.~\ref{fig:coverage},\ref{fig:pointings}). The total on-source time was approximately 93 hrs in the COSMOS field and 122 hrs in the GOODS-N field. The frequency range targeted in this project covers CO(1--0) at $z=1.95$--2.85 and CO(2--1) at $z=4.91$--6.70, such that the space density of CO(2--1) line emitters is expected to be smaller than for CO(1--0) (Fig.~\ref{fig:coverage}; e.g., \citealt{Popping14,Popping16}). Both the large redshift spacing and the expected redshift evolution of the space density of CO emitters lessens the severity of the redshift ambiguity in our survey compared to previous studies. At 34 GHz the VLA primary beam can be described as a circular Gaussian with FWHM$\sim$80$^{\prime\prime}$, so our pointing centers were optimized to achieve a sensitivity that is approximately uniform in the central regions of the mosaics by choosing a spacing of 55$^{\prime\prime}$ ($<80^{\prime\prime}/\sqrt{2}$) in a standard hexagonally packed mosaic \citep{Condon98}. During each observation, we targeted a set of 7 pointings in succession, alternating through phase calibration. We performed pointing scans at the beginning of each observation, with additional pointing observations throughout for observations longer than 2 hours. Most of the COSMOS and GOODS-N data were taken in the D configuration of the VLA. Some of the observations, especially for the GOODS-N pointings, were fully or partially carried out in DnC configuration, in re-configuration from D to DnC (D$\rightarrow$DnC) and in re-configuration from DnC to C (DnC$\rightarrow$C). Pointings are named sequentially from GN1 to GN57 (groups of GN1--7, GN8--14 etc. were observed together; Table~\ref{obs_table}). The total area imaged, down to a sensitivity of $\sim30\%$ of the peak, in COSMOS is 8.9 arcmin$^2$ at 31 GHz and 7.0 arcmin$^2$ at 39 GHz. In GOODS-N the total area is 50.9 arcmin$^2$ at 30 GHz and 46.4 arcmin$^2$ at 38 GHz. The correlator was set-up in 3-bit mode, at 2 MHz spectral resolution (corresponding to $\sim18\,$km s$^{-1}$ at 34 GHz), to simultaneously cover the full 8 GHz bandwidth for each polarization (Fig.~\ref{fig:coverage}). Tuning frequency shifts between tracks, and sometimes in the same track, were used to mitigate the edge channels noise increase in order to achieve a uniform depth across the frequency range (Table~2). \subsection{COSMOS observations} The dataset in the COSMOS field consists of 46 dynamically scheduled observations between 2013 January 26 and 2013 May 14, each about 3 hours in duration. Flux calibration was performed with reference to 3C286, and J1041+0610 was observed for phase and amplitude calibration. Three frequency tunings offset in steps of 12 MHz were adopted to cover the gaps between spectral windows and to obtain uninterrupted bandwidth. \subsection{GOODS-N observations} The GOODS-N dataset consists of 90 observations between 2013 January 27 and 2014 September 27, each about 2 hours in duration. Pointing 6, which covers the 3 mm PdBI pointing of the CO deep field in \cite{Decarli14} in the HDF-N, was observed both as part of the 1--7 pointing set, and in two additional, targeted observations to achieve better sensitivity. Pointing GN57 was observed for 3 hours (127 min on source) in D-array configuration on 18 December 2015, in order to follow up the most significant negative line feature in GN1--56 (see Appendix D for details). J1302+5748 was used for phase calibration, and the flux was calibrated by observing either 3C286 (in 7 observations) or in reference to the phase calibrator (in the remaining observations). An average phase calibrator flux at 34 GHz of {\it S=}0.343 Jy and spectral index of $-0.2$ was assumed in the observations in 2013 and {\it S=}0.21 Jy and spectral index of $-0.6$ was assumed in 2014, as regularly measured in the tracks where a primary flux calibrator was observed. Based on track-to-track variations of the calibrator flux, we estimate a $\sim$20\% total flux calibration uncertainty. The spectral setup employed uses two dithered sets of spectral windows, with a relative shift of 16 MHz, in order to fully cover the 8 GHz bandwidth available without gaps. \begin{figure}[tbh] \includegraphics[width=.5\textwidth]{Fig1.pdf} \caption{Frequency coverage of the VLA COLDz survey, in the Ka band. The frequency range covers CO(1--0) at $z=1.95$--2.85, and CO(2--1) at z=4.91--6.70.} \label{fig:coverage} \end{figure} \begin{figure*}[tbh] \centering{ \includegraphics[width=\textwidth]{regions_together.png} } \caption{CO deep field regions covered by COLDz in the COSMOS (left) and GOODS-N/CANDELS fields (right). The mosaics are composed of 7 and 57 pointings, respectively (as shown by the red circles). The grayscale corresponds to the frequency-averaged signal data cube. The positions of our line candidates from Tables~\ref{tab_lines} and \ref{tab_lines_appendix} are marked by yellow squares and circles, respectively. Green markers indicate the position of the most significant $\sim34$ GHz continuum sources. The field covered by the blind search from \cite{Decarli14} is shown by a blue circle. We covered the majority of the CANDELS-Deep footprint in GOODS-N, shown as the background grayscale the {\em HST}/WFC3 F160W exposure map \citep{Grogin} for comparison.} \label{fig:pointings} \end{figure*} \begin{figure*}[tbh] \centering{ \includegraphics[width=.8\textwidth]{noise_plot_combined.pdf} } \caption{Measured {\it rms} noise, per pointing, in 4 MHz channels as a function of frequency, at the native spatial resolution (top), and after smoothing to a common beam size (bottom). The bands are for groups of pointings that were observed in similar conditions and thus have similar noise characteristics. The GOODS-N pointings GN29--GN42, which were observed at higher resolution (predominantly in DnC configuration), suffer a significant noise increase in the bottom panel due to spatial smoothing. The frequencies of our line candidates (blue in COSMOS, red in GOODS-N) from Tables~\ref{tab_lines} and \ref{tab_lines_appendix} are marked by squares and circles, respectively in the top panel.} \label{fig:Noise} \end{figure*} \begin{figure}[tbh] \centering{ \includegraphics[width=.48\textwidth]{sensitivity_plot.pdf} } \caption{Line detection sensitivity limit reached by our observations (GOODS-N in blue, COSMOS in red). We assume a line FWHM of 200 km s$^{-1}$, and a 5$\sigma$ limit on the average pre-smoothing noise limit for direct comparison to \cite{ASPECS2}. For comparison, we overplot all $z>1$ CO detections to date from the compilation by \cite{CarilliWalter}, as updated by \cite{Sharon16}. Colors mark different source types (quasars, submillimeter galaxies, 24$\,\mu$m-selected galaxies, Lyman-break galaxies, color-selected galaxies, radio galaxies). At the sensitivity in the COSMOS field, we would be able to detect all previously detected CO emitters at high redshift in this compilation.} \label{fig:sensitivity} \end{figure} \begin{table} \caption{Lines, Redshift Ranges and Volumes Covered by COLDz.} \centering \begin{tabular}{ c c c c c c } \hline Transition & $\nu_0$ & $z_{min}$ & $z_{max}$ & $\langle z \rangle$ & Volume \\ & [GHz] & & & & [$\rm{Mpc}^3$] \\ \hline \multicolumn{6}{c}{COSMOS}\\ CO(1--0) & 115.271 & 1.953&2.723& 2.354&20,189\\ CO(2--1) & 230.538 & 4.906& 6.445 &5.684 &30,398\\ \hline \multicolumn{6}{c}{GOODS-N}\\ CO(1--0) & 115.271 & 2.032&2.847&2.443&131,042\\ CO(2--1) &230.538 & 5.064&6.695 &5.861&193,286\\ \hline \end{tabular} \tablecomments{The comoving volume is calculated to the edges of the mosaic, and does not account for varying sensitivity across the mosaic, which is accounted for by the subsequent completeness correction. The average redshift is cosmic volume weighted.} \end{table} \subsection{Data Processing} Data calibration was performed in {\sc {\sc casa}} version 4.1, using the VLA data reduction pipeline (v.1.2.0). {\sc casa} version 4.5 was used to re-calculate visibility weights using the improved version of \texttt{statwt} that excludes flagged channels when calculating weights, and for imaging and mosaicking \citep{CASA}. The pipeline radio-frequency interference (RFI) flagging, which uses {\sc casa} \texttt{rflag} to identify transient lines, was switched off, as recommended by the developers, since it can potentially remove narrow spectral lines and because there is little RFI in the Ka-band (with the exception of the 31.487--31.489 GHz range, which we flag prior to running the {\sc casa} pipeline). The pipeline was further modified to only flag the first and last channel of each spectral window (instead of 3 channels), regardless of proximity to baseband edges, to minimize the gap between sub-bands. We find that the bandpass is sufficiently flat that this choice gives the best trade-off between sensitivity in the end channels and additional noise, although some noise increase at the band edges is visible in Figure~\ref{fig:Noise}. After executing the pipeline, we visually inspected the visibilities in the calibrator fields to identify any necessary additional flagging. We then re-executed the pipeline to obtain a final calibration. In addition, for most GOODS-N observations we modify the pipeline to flux-calibrate in reference to the gain calibrator (whenever a primary flux calibrator was not observed). We identified a small number of noisy spectral channels in our observations that are not removed by the calibration pipeline. The noisy channels were initially discovered as narrow spikes of a small number of channels in amplitude vs. frequency plots of visibilities from the science target fields, and they are mostly associated with single antennas. Being very narrow in frequency (one or two 2-MHz channels), the noise spikes are not significantly reduced by the statistical weights obtained from \texttt{statwt}, which minimizes the effects of all other noise features, since the weights are computed per spectral window. Including one of these noisy channels for the affected antenna during the imaging of a single pointing of the mosaic from a single observation track increases the rms noise by $\sim20\%$ in that frequency channel. Selecting channels whose standard deviation exceeds the mean standard deviation in that spectral window for that antenna by $3\sigma$ is a sufficient criterion to exclude most of the problematic noise spikes (these are only of order $\sim0.2\%$ of all channel-antenna combinations). This method is partially redundant to the algorithms in \texttt{rflag} (which we did not execute as part of the pipeline), but it reduces the risk of removing real spectral lines since the noisy channels are selected for individual antennas. We also found that many noisy channels in the same antenna repeat over time during an observation, and would therefore be more problematic if left in the data cube. We find a concentration of noise spikes in roughly four peaks over the frequency range, which correlate with peaks in the weighted calibrated amplitudes as a function of frequency. We consider this to be indicative of random electronic problems that manifest as increased noise and thus are more prevalent in certain hardware components of the correlator than others. The presence of four peaks is likely associated with the underlying basebands, since there appears to be one peak in each baseband, but no precise correlation of the noise peak frequencies to the baseband edges could be identified. The feature is stochastic and does not appear to preferentially affect any particular subset of antennae. These noise spikes are at least twice as narrow as the narrowest blindly selected line candidates (which are rare among all candidates) and therefore residual anomalous noise spikes are believed not to measurably affect our line search. Calibrated data from each pointing were imaged separately without any \texttt{CLEAN} cycles, because the fields do not contain strong continuum or line sources (see Section 4). We imaged the total intensity (sum of the two polarizations) using natural weighting and choosing a pixel size of 0.5$^{\prime\prime}$ consistently in the two fields. The smallest adopted channel width is 4 MHz, equivalent to 35 km s$^{-1}$ mid-band, which is less than the typical line width from galaxies. With this choice, our data cubes have $\sim$2000 channels after averaging polarizations. A crucial aspect of the imaging procedure, necessary for blind line searches, is to avoid any frequency regridding by interpolation, therefore we image using the nearest channel, rather than interpolating. Interpolation would introduce correlations between the noise of adjacent channels, undermining the statistical basis of the search for spectral lines, and producing a significant number of spurious noise lines. Disabling frequency interpolation when imaging visibilities may introduce a very small, less than half a channel, frequency error that we consider negligible because 4 MHz channels (35 km s$^{-1}$) are smaller than the typical linewidth. The geometric average synthesized beam size for COSMOS ranges between 2.2$^{\prime\prime}$ and 2.8$^{\prime\prime}$ as a function of frequency and the beam axes ratio is in the range of 0.8--1, while for GOODS-N the synthesized beam size differs more significantly from pointing to pointing. In particular, the main difference is between the subset of ``high resolution pointings" (GN20--GN42) and the rest (GN1--GN19 and GN43--GN57). The geometric average beam size ranges between approximately 1.3$^{\prime\prime}$ to 2.0$^{\prime\prime}$ for the high resolution pointings, and between 2.1$^{\prime\prime}$ and 3.1$^{\prime\prime}$ for the rest. The beam axes ratio is in the range of 0.6--0.9. The individual pointing cubes are subsequently smoothed to a common beam size of 3.38$^{\prime\prime}\times$ 2.91$^{\prime\prime}$ for COSMOS and 4.1$^{\prime\prime}\times$ 3.2$^{\prime\prime}$ for GOODS-N, using the {\sc casa} task \texttt{imsmooth}. This compromise in resolution and signal-to-noise is necessary in order to mosaic all pointings together, and to search for line emission in a uniform manner. This is called the Smoothed-mosaic. Separately, we have also mosaicked the pointings with their native resolution (after removing the beam information from the headers), and this Natural-mosaic (where the resolution is set by natural weighting) was used to exclusively search for spatially un-resolved sources, for which the spatial size information is not important. Fig.~\ref{fig:pointings} shows the spatial coverage provided by the individual pointings in our two mosaicked fields. The {\sc casa} function \texttt{linearmosaic} was used to mosaic the images of our COSMOS data together. We wrote a custom script to optimally mosaic the images of the GOODS-N data, using Equation.~\ref{mosaic_formula}, which takes into account the different noise levels in different pointings, per channel, in order to compute optimal weights for mosaicking: \begin{equation} I=\frac{\sum_p I_p A({\bf x}-{\bf x_p})/\sigma_p^2}{\sum_p A({\bf x}-{\bf x_p})^2/\sigma_p^2}, \label{mosaic_formula} \end{equation} where $A$ is the primary beam function, ${\bf x_p}$ are the pointing center positions, $I_p$ represents the specific intensity data from pointing p and $\sigma_p$ is the noise level in pointing p (computed on a per channel basis). All COSMOS pointings were always observed in every execution, and for comparable amounts of time. The GOODS-N pointings were observed in blocks of 7, over the course of several months due to scheduling constraints. Therefore, they have slightly different noise levels, partly due to the upgraded 3-bit samplers in the later (2014) observations. Furthermore, some GOODS-N data were not taken in the D configuration but rather in a combination of the DnC configuration, in transition between the D and the DnC and in transition between the DnC and the C configuration. Therefore, when smoothed to a common beam, these pointings have higher noise, because the information on the the longest baselines is effectively discarded. For these reasons, the noise is significantly spatially varying in the smoothed version of the GOODS-N mosaic, which we take into account when analyzing the data (Fig.~\ref{fig:Noise} shows the noise before and after smoothing). All pointings suffer a noise increase due to smoothing, because the targeted beam for the smoothing process has to be larger than every beam in any pointing, at any frequency, and also includes those beams that have different position angles. In the case of the COSMOS mosaic, the {\sc casa} function \texttt{linearmosaic} produces the mosaic edge at the 30\% of peak level sensitivity (per-channel). For consistency, we therefore apply the same criterion in our GOODS-N mosaics. In order to do this, we define a mask which produces the mosaic edge at 30\% of peak sensitivity in the Natural-mosaic, and utilize the same mask for the Smoothed-mosaic for consistency. \subsection{Constructing the Signal-to-Noise cubes} In order to search for emission lines in our data, we produce a signal-to-noise ratio (SNR) cube by calculating a noise value for each pixel and in each frequency channel of the mosaics. Spatial variations in the noise are introduced by mosaicking pointings with different noise levels and primary beam corrections. The noise in the resulting mosaic can be calculated assuming statistical independence of the noise in different pointings, and can therefore be calculated by summing their standard deviations in quadrature, with weights given by Eqn.~\ref{mosaic_formula}: \begin{equation} \sigma(x)=\frac{1}{\sqrt{\sum_p A({\bf x}-{\bf x_p})^2/\sigma_p^2}}, \label{mosaic_noise} \end{equation} \noindent where $\sigma_p$ is the measured noise in the individual pointing images, $A$ is the primary beam function and ${\bf x_p}$ are the pointing center positions. In the special case of pointings with approximately equal noise (as in our COSMOS data) we can use a simplified expression, where the denominator is simply the square root of the sensitivity map, output from {\sc casa}'s \texttt{linearmosaic} function: \begin{equation} \sigma(x)=\frac{\sigma}{\sqrt{\sum_p A({\bf x}-{\bf x_p})^2}}. \end{equation} The frequency variation of the noise is accounted for by measuring the noise in each frequency channel, in the individual pointings. In COSMOS, where the noise variations from pointing to pointing can be neglected, we calculate the signal-to-noise ratio by multiplying the signal cube by the square root of the sensitivity map (which gives spatially uniform noise), and then dividing each channel map by its standard deviation to normalize the pixel value distribution. In GOODS-N, we measure the noise in each pointing and apply Eqn.~\ref{mosaic_noise} to compute noise and signal-to-noise ratio cubes. \section{Line search methods} The main objective of this survey is to carry out a blind search for CO(1--0) and CO(2--1) emission lines in the COLDz dataset. No other bright lines are expected to contaminate the 30--39 GHz frequency range (Fig.~\ref{fig:coverage}). The line brightness sensitivity is approximately equal for the low and high redshift bins (corresponding to CO(1--0) and CO(2--1), respectively; Figure~\ref{fig:sensitivity}). We therefore expect a higher source density in the low redshift bin due to the expected evolution of the cosmic gas density \citep{Popping14,Popping16}. Hence, we will assume that all detected features correspond to CO(1--0) unless data at other wavelengths suggest that they belong to the higher redshift bin. In order to detect emission lines in our data cubes, we have implemented a previously published method ({\sc spread}, \citealt{Decarli14}), and developed three new methods to explore the differences between different detection algorithms (see Appendix A for details). The objective of a line search algorithm is to systematically assess the significance (expressed as Signal-to-Noise ratio, SNR) of candidate emission lines in the data. The relevant information available to us is the strength of the signal, the number of independent samples that make up the line, and the spatial and frequency structure (for which we have priors based on previous samples of CO detections at high redshift). In particular, we expect most CO sources to be either unresolved or resolved over a few beams at most at the $\sim3^{\prime\prime}$ resolution of our mosaics (which corresponds to $\sim$25 kpc at $z\sim2.5$ and $\sim17$ kpc at $z\sim6$), and we expect the line FWHM to be in the range of 50 to 1000 km s$^{-1}$ \citep{CarilliWalter}. Our line search method of choice, Matched Filtering in 3D (MF3D), expands on the commonly used spectral Matched Filtering (MF1D; e.g, {\sc aips} \texttt{serch}). Matched Filtering corresponds to convolving the data with a filter, or template, which is ``matched" to the sources of interest in order to attenuate the noise and concentrate the full signal-to-noise of the source in the peak pixel. A detailed description of the MF3D method is presented in Appendix A. We also implement and test some of the previously used methods on our data, in particular {\sc spread} and Matched Filtering in the spectral domain, i.e., in 1D. The main limitation of {\sc spread} is that it does not employ the full spatial information available, but only utilizes signal strength. While Matched Filtering in 1D is arguably the optimal search method for completely unresolved sources (for which the spectrum at the peak spatial pixel contains the full information), it still requires a prescription for identifying pixels belonging to the same source, and it needs to be generalized to account for the possibility that some sources may be slightly extended. Besides accounting for extended sources, the 3D Matched Filtering also captures the spreading of the signal-to-noise over different spatial positions in different frequency channels, which is at least in part a consequence of moderate SNR. For this reason, it is natural to use the spatial information by using templates that include a spatial profile. Therefore we extended the method to Matched Filtering with 3D templates. A description of the detailed implementation of all line search methods and a more detailed comparison is presented in Appendix A. \section{Results of The Line Search} The 3D Matched-Filtering procedure provides an output including the maximal SNR for each line candidate, the position in the cube where that maximal SNR is achieved, the number of templates for which the candidate has $>4 \sigma$ significance, and the template size (spatial and frequency width) where the highest SNR is achieved. We run the line search down to a low SNR threshold of $4\sigma$. The number of identified features is very large, due to the large number of statistical elements in our data cubes. Specifically, we estimate approximately $2.8\times 10^6$ and $1.7\times 10^7$ independent elements for the COSMOS and GOODS-N fields, respectively, by dividing the mosaic area by the beam area and dividing by a line FWHM of 200 km s$^{-1}$. However, we caution that naively estimating the extent of the noise tails from these numbers does not provide a good estimate, as previously described by \cite{Vio16,Vio17} (also see Appendix F.2 for more details). We mask radio continuum sources in our fields, which contaminate the line candidates: one in the COSMOS field at 10:00:20.67 +02:36:01.5 with a flux of 0.024 mJy beam$^{-1}$, and three in the GOODS-N field at 12:36:44.42 +62:11:33.5 with a flux of 0.3 mJy beam$^{-1}$, 12:36:52.92 +62:14:44.5 with a flux of 0.17 mJy beam$^{-1}$ and 12:36:46.34 +62:14:04.46 with a flux of 0.07 mJy beam$^{-1}$ (Hodge et al., in prep.). Even though the continuum fluxes of these sources only have low significance in the individual channels ($<0.3\sigma$ and $<2\sigma$ per 4 MHz channel for the brightest source in COSMOS and GOODS-N, respectively), we remove any candidate within 2.5$^{\prime\prime}$ of the spatial positions of these sources, because they are likely spurious and caused by noise superposed to the continuum signal. Specifically, once we remove the continuum flux from their spectra, the significance of those line candidates becomes lower than $\sim4.5\sigma$, indicating that they likely correspond to noise peaks. In Table~\ref{tab_lines}, we present the list of the secure line emitters in COSMOS and in GOODS-N which were independently, spectroscopically confirmed. While we are confident that our highest SNR ($>6.4\sigma$) candidates correspond to real CO emission lines because they all have identified multi-wavelength counterparts, we also define a longer lists of line candidates which have significantly lower purity ($\sim$5\%-40\%) as a statistical sample in Table~\ref{tab_lines_appendix} in Appendix E, as described below. Although only a fraction of those tabulated sources are real emission lines, they provide statistical information once we account for their fractional purity, and therefore they may be used to constrain the CO luminosity function. While a fraction of these lower significance candidates may be expected to correspond to real CO emission, we advise caution in interpreting these lower significance candidates on a per-source basis until they are independently confirmed. In order to determine the reliability of the line candidates presented in Table~\ref{tab_lines_appendix}, we compare the SNR distribution to that for ``negative" line candidates, following the standard practice (e.g., \citealt{Decarli14, ASPECS1}) which relies on the symmetry of interferometric noise. We provide a detailed description of our candidate purity estimation in Appendix F, but we point out that an excess of positive candidates over the negatives, for signal-to-noise ratios above a threshold is an indication that at least a fraction of those positive candidates may correspond to real sources, rather than due to noise. By adopting this criterion, we determined the SNR thresholds for our candidate lists consistently for both fields by cutting at the SNR level that includes as many negative line candidates as unconfirmed positive candidates. Thus, we exclude from the count the high signal-to-noise, confirmed sources (4 in COSMOS and 2 in GOODS-N, Table~\ref{tab_lines}), and we require that the number of unconfirmed sources is greater than the number of negative lines down to the same SNR threshold, thereby constituting an excess. This procedure determines SNR thresholds on the candidates catalog of 5.25$\sigma$ for the smaller COSMOS field and 5.5$\sigma$ for the wider GOODS-N field (Table~\ref{tab_lines_appendix}). The threshold is chosen to be higher in the wide, GOODS-N mosaic because the larger number of statistical elements produces more pronounced noise tails. \begin{table*} \tiny \caption{{\rm Catalog of the secure line candidates identified in our analysis, which have been independently confirmed (see Table~\ref{tab_lines_appendix} for the remainder of the full statistical sample). Columns are: (1) Line ID. (2-3) Right ascension and Declination (J2000). (4) Central line frequency and uncertainty, based on Gaussian fitting. (5) CO(1--0) redshift and uncertainity, unless otherwise noted. (6) Velocity integrated line flux and uncertainty. (7) Line Full Width at Half Maximum (FWHM), as derived from a Gaussian fit. (8) SNR measured by MF3D. (9) Presence of a spatially coincident optical/NIR counterpart (10) Comments.}} \label{tab_lines} \begin{center} \input{candidate_table_newGN_secure.tex} \tablecomments{$^a$ CO(2--1) redshift. $^b$ Source is below the formal catalog threshold adopted here, and therefore, not part of the statistical sample.} \end{center} \end{table*} \subsection{Measuring line candidate properties} After selecting the blind search line candidates, we separately measure their line properties using a standard method described in the following. The statistical corrections were computed adopting identical methods in the artificial source analysis (Appendix F.3). In order to extract the spectrum of the line candidates, we fit a 2D-Gaussian to the velocity-integrated line maps and extract the flux in elliptical apertures with sizes equal to the FWHM of the fitted Gaussians. For the integrated line maps, we use a velocity range equal to the FWHM of the template that maximizes the SNR. This procedure is expected to provide the highest SNR of the extracted flux. In the infinite SNR case, this aperture choice includes half of the total flux, and we therefore correct the extracted flux scale of the spectrum by a factor of two. We then fit a Gaussian line profile to the aperture spectrum and measure its peak flux and velocity width, from which we derive the integrated fluxes reported in Tables~\ref{tab_lines} and \ref{tab_lines_appendix}. We also measure peak fluxes for the candidates, which are expected to best represent the correct flux for unresolved sources. For the peak fluxes, we extract the spectrum at the highest pixel in the integrated line map. We find that the peak fluxes are compatible with aperture fluxes for point-like sources, and so we choose to adopt the aperture fluxes because they measure the full flux of extended sources at the expense of slightly larger uncertainties. We calculate the positional and size uncertainty of the 2D Gaussian fitting using the {\sc casa} task \texttt{imfit}, applied to the same integrated line maps described above. The positional uncertainty is relevant when establishing counterpart associations (as detailed in Appendix E for the full candidate list). It is dominated by the detection SNR and the spatial size of the synthesized beam or extended emission. In the COSMOS field, we can measure aperture fluxes in the Natural-mosaic, to make full use of the highest SNR (the fluxes are typically within 20\% of the values measured in the Smoothed-mosaic). Specifically, the 7 pointings of the mosaic have an approximately equal beam size. This allows us to calculate an average beam size for each channel and hence, to correctly measure aperture fluxes. These are the fluxes we report in Tables~\ref{tab_lines} and \ref{tab_lines_appendix} for the most significant candidates, which we also use for the luminosity function. In the GOODS-N field, on the other hand, we are limited to measuring aperture fluxes for resolved objects in the Smoothed-mosaic, because of the strong beam size variations across the mosaic which make it impossible to precisely define a beam in the Natural-mosaic. Nonetheless, since most of the candidates are unresolved in the original data (show highest SNR in the Natural-mosaic), in those cases we report the peak fluxes, measured in the Natural-mosaic, without concern for missing any flux, and without being affected by the beam size variations. In the GOODS-N field, there is another beam size effect that needs to be taken into account even in the Smoothed-mosaic. The measured beam size is actually larger than the formal $4.1^{\prime\prime} \times 3.2^{\prime\prime}$ size which was targeted with the {\sc casa} task \texttt{imsmooth}, and is slightly pointing-dependent, as explained in Appendix C. The measured beam area is $\sim1.4$ times larger in the D-array only pointings, and $\sim1.7$ times larger in the higher resolution pointings than the target size for the smoothing procedure, because of the precise $uv$-plane coverage and the effect of tapering. Therefore, we measure the correct beam size after smoothing, by Gaussian-fitting to the smoothed dirty beam, in each pointing, for each channel. We correct the aperture flux for each candidate line detection in the Smoothed-mosaic by calculating an effective beam area given by a weighted average of the beams of the overlapping pointings, weighted by the square of the primary beams (the same weighted average that determines the flux in the mosaic). We calculate aperture fluxes in this way in the Smoothed-mosaic, and confirmed that the peak pixel flux in unresolved sources matches this corrected aperture flux, within the uncertainties. The measured CO line fluxes are affected by the effect of a warmer cosmic microwave background (CMB) at the redshift of our sources, which is a uniform background (hence invisible to an interferometer) at the small scales of galaxy sizes \citep{daCunha13}. While we do not expect corrections for our $z=2$--3 sources to be significant ($\sim20-25$\%) a larger correction (up to a factor $\sim2$) may be required if the gas kinetic temperature were lower than expected. On the other hand, the CO(2--1) line luminosity from the $z>5$ sources may be underestimated by up to a factor of $\sim2-5$ \citep{daCunha13}. We do not apply any of these corrections to the measured line flux values reported here. These effects will be further discussed in Paper~\rom{2}, in the context of the CO luminosity function. \subsection{Individual candidates} We have identified 26 line candidates in the COSMOS field down to a SNR threshold of 5.25, and 31 candidates in the GOODS-N field down to a SNR threshold of 5.5 (Tables~\ref{tab_lines} and \ref{tab_lines_appendix}). The top four sources in COSMOS and two among the highest SNR sources in GOODS-N have been independently confirmed through additional CO transitions (\citealt{Daddi09,Riechers10a,Riechers_GN19}; and in prep.; \citealt{Ivison_GN19}; Pavesi et al., in prep.). Furthermore, we include COLDz.GN.31 in this set of independently confirmed sources (Table~\ref{tab_lines}), although it is slightly below the formal 5.5$\sigma$ cutoff, because it corresponds to CO(2--1) line emission from HDF850.1 \citep{Walter12}. This line source does not contribute to our evaluation of the CO(2--1) luminosity function because it does not satisfy the significance threshold to be included in the statistical sample (Paper~\rom{2}). For reference, we here briefly describe these individual secure candidates and we show their CO line maps and spectra in Figs.~\ref{fig:spectra_COS1} and \ref{fig:spectra_GN_main}. Line maps and spectra of the complete statistical sample are presented in Appendix E for reference. We detect four previously known dust-obscured massive starbursting galaxies, and three secure sources in the COSMOS field that lie within the scatter of the high-mass end of the Main Sequence at $z\sim2$ (\citealt{Lentati15}; Pavesi et al., in prep.) These galaxies may be representative of a galaxy population that has not been well studied to date, due to our novel selection technique. \textbf{COLDz.COS.0}: We identify the brightest candidate in the COSMOS field with CO(2--1) from the z=5.3 sub-millimeter galaxy AzTEC-3, detected at a SNR of 15, and which was chosen to be near the center of our survey region. This galaxy is known to reside in a massive proto-cluster \citep{Riechers10a,Riechers14, Capak11}. The line flux is compatible with the previously measured value of $0.23\pm0.03$ Jy km s$^{-1}$ \citep{Riechers10a} within the relative flux calibration uncertainty. This source is also detected at 3 GHz, with a flux of $20\pm3\,\mu$Jy \citep{Smolcic17}, and by SCUBA-2 at $850\mu$m as part of the S2COSMOS survey with a significance of $9.3\sigma$ and a flux of $8.1^{+1.1}_{-1.3}$ mJy (J.M. Simpson, et al. in prep). \textbf{COLDz.COS.1}: This high signal-to-noise detection is matched in position (offset $0.3^{\prime\prime}\pm0.3^{\prime\prime}$) and CO(1--0) redshift to a source with photometric redshift ($z_{phot}$=2.6--2.9) in the COSMOS2015 catalog \citep{Laigle16}. We have confirmed its redshift with ALMA through a detection of the CO(3--2) line (Pavesi et al., in prep.). This source is also detected at 3 GHz, with a flux of $15\pm2\,\mu$Jy \citep{Smolcic17}, and at $850\mu$m with a significance of $6.0\sigma$ and a flux of $4.9_{-1.2}^{+1.1}$ mJy (J.M. Simpson, et al. in prep). \textbf{COLDz.COS.2}: This high signal-to-noise detection is matched in position (offset $0.3^{\prime\prime}\pm0.3^{\prime\prime}$) to a source in the COSMOS2015 catalog \citep{Laigle16}. We have confirmed its redshift with ALMA through a detection of the CO(3--2) line (Pavesi et al., in prep.), and some of its properties were previously presented in \citep{Lentati15}. The photometric redshift in the COSMOS2015 catalog is highly uncertain, and not compatible with the CO redshift of 2.477 within $1\sigma$ ($z_{phot}$=2.9--4.4). This source is also detected at 3 GHz, with a flux of $19\pm3\,\mu$Jy \citep{Smolcic17}, and at $850\mu$m with a significance of $5.9\sigma$ and a flux of $4.0_{-1.0}^{+0.9}$ mJy (J.M. Simpson, et al. in prep). \textbf{COLDz.COS.3}: This high signal-to-noise detection, is a significantly spatially extended CO source with a deconvolved size of $(4.0^{\prime\prime}\pm1.1^{\prime\prime})\times(1.8^{\prime\prime}\pm1.2^{\prime\prime})$. It is matched in position to two galaxies in the COSMOS2015 catalog (\citealt{Laigle16}; offsets of $0.14^{\prime\prime}\pm0.3^{\prime\prime}$ and $1.8^{\prime\prime}\pm0.3^{\prime\prime}$). We have confirmed its CO(1--0) redshift with ALMA through a detection of the CO(4--3) line (Pavesi et al., in prep.). The cataloged photo-$z$ for both galaxies ($z_{phot}$=1.8--1.9) is not compatible with the CO redshift of 1.97 within $1\sigma$. This source is also detected at 3 GHz, with a flux of $27\pm3\,\mu$Jy \citep{Smolcic17}. The S2COSMOS survey shows a weak signal at $850\mu$m with a significance of $3.7\sigma$. The formal $4\sigma$ limit on the deboosted flux is $<4.0$ mJy, and the tentative detection suggests a potential source at a flux level of $\sim2-3$ mJy (J.M. Simpson, et al. in prep). \textbf{COLDz.GN.0}: We identify the brightest candidate in the GOODS-N field with CO(2--1) line emission from GN10, a massive, bright dust-obscured starbursting galaxy \citep{Pope06, Dannerbauer08, Daddi09}. We find a CO redshift of $z=$5.3, showing that the previous redshift determination ($z$=4.04) was incorrect. Its properties are described in Riechers et al., in prep. This source is also detected at 1.4 GHz with a flux of $36\pm4\,\mu$Jy \citep{Morrison10}, and by SCUBA-2 at $850\mu$m in the SCUBA-2 Cosmology Legacy Survey (S2CLS) with a significance of $9.2\sigma$ and a flux of $7.5\pm1.5$ mJy \citep{Geach17}. \textbf{COLDz.GN.3}: We identify this source with CO(1--0) line emission from GN19, a merger of two massive, bright dust-obscured starbursting galaxies at $z$=2.49 found by \cite{Pope06} and characterized in detail by \cite{Tacconi06,Tacconi08}, \cite{Riechers_GN19}, and \cite{Ivison_GN19}. It is detected by the 5.5 GHz eMERGE survey, with a flux of $9.6\pm1.7\,\mu$Jy \citep{eMerge}. Its line flux is compatible with the previously measured total flux of $0.33\pm0.04$ Jy km s$^{-1}$ from \cite{Riechers_GN19}. This source is also detected at 1.4 GHz, with a flux of $28\pm4\,\mu$Jy and $33\pm4\,\mu$Jy for the W and E components, respectively \citep{Morrison10}, and at $850\mu$m with a significance of $7.9\sigma$ and a flux of $6.5\pm1.1$ mJy \citep{Geach17}. \textbf{COLDz.GN.31}: We also detect CO(2--1) line emission from the bright, dust-obscured starbursting galaxy HDF850.1 ($z$=5.183), with a moderate significance of SNR=5.3. We include this line detection here given the known match, but we do not include it in the statistical analysis because it does not reach the significance threshold for detection by the blind line search. The measured flux is compatible with the previously reported flux of $0.17\pm0.04$ Jy km s$^{-1}$ \citep{Walter12}. It is detected by the 5.5 GHz eMERGE survey, with a flux of $14\pm3\,\mu$Jy \citep{eMerge}, but is not detected at 1.4 GHz \citep{Morrison10}. This source is also detected at $850\mu$m with a significance of $7.1\sigma$ and a flux of $5.9\pm1.3$ mJy \citep{Geach17}. The other line candidates identified by our blind line search with moderate significance are to date not independently confirmed (Table~\ref{tab_lines_appendix}). Thus, we only use their properties in a statistical sense in the following, to place more detailed constraints on the CO luminosity function. We point out that three out of the seven secure, confirmed sources in our blind search belong to the high redshift bin, and therefore suggest caution in interpreting the indicated CO(1--0) redshift, especially for those line candidates without strong counterparts. We describe the complete candidate sample in Appendix E, where we also discuss potential counterpart associations. In Appendix F, we develop novel statistical techniques to evaluate the purity and completeness of this statistical sample, which yield the best constraints to the CO(1--0) luminosity function at $z\sim$2--3 to date (Paper~\rom{2}). \begin{figure*}[tbh] \includegraphics[scale=1.7]{COSMOS1_fig.png} \caption{Independently confirmed candidates from our blind line search in the COSMOS field. CLEANed integrated line emission (contours) is shown overlaid on {\em HST} I-band (left) and IRAC $3.6\,\mu$m images (middle) from SPLASH (grayscale; \citealt{Steinhardt14}). Contours are shown in steps of $1\sigma$, starting at $\pm2\sigma$. COS.0 corresponds to CO(2--1) emission from AzTEC-3. Right: Extracted line candidate aperture spectra (``histograms") and Gaussian fits (red curves) to the line features. The observer-frame frequency resolution of 4 MHz corresponds to $\sim35$ km s$^{-1}$ mid-band. The velocity range that was used for the overlays is indicated by the dashed blue lines.} \label{fig:spectra_COS1} \end{figure*} \begin{figure*}[tbh] \includegraphics[scale=1.7]{GN1_fig_mod.png} \caption{Independently confirmed candidates from our blind line search in the GOODS-N field. Integrated line emission (contours) is shown overlaid on {\em HST} H-band (left) and IRAC $3.6\,\mu$m images (middle; grayscale). The {\em HST} and {\em Spitzer} images were obtained from the CANDELS database. The contours are shown in steps of $1\sigma$, starting at $\pm2\sigma$. COLDz.GN.0 (GN10), and COLDz.GN.3 (GN19) were separately CLEANed because the high SNR allows to meaningfully deconvolve the emission. GN.31 corresponds to CO(2--1) emission from HDF850.1. Right: Extracted line candidate single-pixel/aperture spectra (``histograms"; for unresolved/resolved emission) and Gaussian fits to the line features (red curves). The observer-frame frequency resolution of 4 MHz corresponds to $\sim35$ km s$^{-1}$ mid-band. The velocity range used for the overlays is indicated by the dashed blue lines.} \label{fig:spectra_GN_main} \end{figure*} \subsection{Statistical counterpart matching} All SNR$>$6.4 candidates in COSMOS and GOODS-N have optical, NIR and/or radio/(sub)-mm counterparts (in addition to GN19 and HDF850.1). At lower SNR, it becomes more difficult to establish definitive counterparts due to the modest precision of photometric redshifts and potential (apparent or real) spatial offsets of the emission. Our purity analysis (Appendix F) suggests that the contamination from noise is considerable. As an example, for the candidates shown below SNR=6, we may expect only 1 or 2 out of 10 to be real CO line emitters due to the large sizes of the data cubes. Therefore, we consider the lack of counterparts as a possible indication that a line candidate may be due to noise. On the other hand, the very objective of a blind search for CO emitting galaxies is to address a potential bias against optical/NIR-faint galaxies. Possible explanations for the lack of counterparts are: 1) the stellar light could be too dust-obscured to be visible in the rest-frame optical/NIR; 2) the CO line may correspond to the {\it J}=2--1 transition; placing the galaxy at $z>5$, such that counterparts may only exist below the detection limit; 3) a CO-bright emitter may be gas-rich but have low star formation rate and/or stellar mass, which would make it optically ``dark". \subsubsection{Optical-NIR counterparts} We here consider the uncertain line candidates near and below the SNR threshold only. If we match all $5<SNR<6$ candidates in COSMOS (60 in total) to the COSMOS2015 photometric catalog \citep{Laigle16}, by requiring a spatial separation of $<2^{\prime \prime}$ and a $z_{\rm CO10}$ or $z_{\rm CO21}$ within the 68th percentile range of the photometric redshifts, we find 10 matches. This is $\sim2.7\sigma$ higher than the number of matches found for random displacements of the positions of our candidates (randomly expecting $\sim4.7\pm2.0$ associations). We therefore conclude that some ($\sim3-7$) of the 10 associations (out of these top 60 candidates) are likely to be real physical counterparts to real CO line emitters, in agreement with our typical purity estimate of order $\sim10\%$ for the statistical sample in this SNR interval (Appendix F). Consistently, we also find a $1.8\sigma$ excess of positional matches within $<2^{\prime \prime}$ for this extended candidates sample, 20 matches with a $13.8\pm 3.4$ false positive rate, by spatially associating to the {\it Spitzer}/IRAC-based catalog by the deep SEDS survey \citep{Ashby2013}. This confirms that at least a fraction of our line candidates in the COSMOS field at these lower SNR levels may have real counterpart associations, to be confirmed by future spectroscopic observations. We repeat the same procedure in GOODS-N, for the candidates with SNR$>$5.4, excluding the independently confirmed ones (51 in total). We employ the best redshifts available from \cite{Skelton14} and \cite{Momcheva16}, using the same selection criteria with a separation requirement of $<2^{\prime \prime}$. The grism spectroscopy does not significantly impact our matched counts, as almost all of the potential counterparts are too faint and only have photometric redshifts. We only find a slight excess relative to chance associations ($\sim1.1\sigma$), by finding 9 associations at an expected chance rate of $6.3\pm2.5$. The latest ``super-deblended" GOODS-N catalog from \cite{superdeblended} does not yield any additional associations besides the secure sources corresponding to GN10 and GN19. In addition, we search for positional matches within $<2^{\prime \prime}$ for this extended candidate sample by searching for spatial associations in the \cite{Ashby2013} {\it Spitzer}/IRAC-based catalog from the deep SEDS survey. We do not find any excess of matches over the expected false positive rate . The counterpart association signal in GOODS-N does not constitute a significant excess, perhaps due to contamination by chance associations with low redshift galaxies. However, at least approximately $\sim6-10$ line candidates out of the top $\sim200$ have a very close {\it Spitzer}/IRAC counterpart ($<1^{\prime\prime}$) and a photometric redshift estimate which is compatible with the CO(1--0) line candidate, as would be expected for real counterpart matches. In the following, we evaluate the implications of a lack of $3.6\,\mu$m counterparts for some of our lower SNR CO line candidates. The deep {\em Spitzer}/IRAC images in Fig.~\ref{fig:spectra_COS1} and Appendix E are derived from the {\sc splash} observations \citep{Steinhardt14}, while the {\em Spitzer}/IRAC images in GOODS-N were obtained as part of the legacy GOODS program \citep{Giavalisco2004}. Due to the moderate resolution of {\em Spitzer} observations, these images are sometimes contaminated by lower redshift galaxies or stars, reducing our ability to detect counterparts at higher redshift and hence, in those cases the following limits may not apply. In order to asses the implications of a counterpart non-detection in the IRAC $3.6\mu$m images, we use template spectral energy distributions (SEDs) for star forming galaxies from \cite{BruzualCharlot}, redshift them to $z\sim2.3$ and convolve them with the IRAC $3.6\mu$m filter curve, using {\sc magphys} to estimate the stellar mass limits placed by a lack of detection in COSMOS or GOODS-N \citep{magphys08,magphys15}. The expected mass-to-light ratio at this wavelength depends on the stellar population ages and star formation histories, as well as on the degree of dust extinction. The following estimates are thus only indicative. We estimate that the lack of IRAC $3.6\,\mu$m counterparts at the $\sim 0.2\,\mu$Jy and $\sim 0.06\,\mu$Jy limits ($\sim 3\sigma$; \citealt{Ashby2013}) of the COSMOS and GOODS-N data correspond to approximate stellar mass upper limits of $\sim6\times 10^{9}$ and $\sim2\times 10^{9}\,{\rm M}_\odot$ respectively at $z\sim2.3$ for a representative $A_V\sim2.5$\footnote{For reference, the limits would be $\sim1.6\times 10^9$ and $5\times 10^8\,{\rm M}_\odot$ for $A_V<0.5$, and $\sim 2\times10^{10}$ and $7\times10^{9}\,{\rm M}_\odot$ at $A_V\sim5$}. These limits suggest that a lack of infrared counterparts implies either a very low stellar mass, or a high degree of dust obscuration. The stellar mass limits would be significantly higher for a line candidate associated with CO(2--1) emission at $z>5$. Indeed, repeating the same calculations for $z\sim5.8$ we obtain significantly less constraining stellar mass limits of $\sim1.3\times 10^{11}$ and $\sim4\times 10^{10}\,{\rm M}_\odot$ for a representative $A_V\sim2.5$, in COSMOS and GOODS-N, respectively. \begin{figure*}[tbh] \centering{ \includegraphics[width=\textwidth]{radio_spec_together.pdf} } \caption{Candidates with radio continuum counterpart, and with optical spectroscopic redshift below the catalog threshold (i.e., not part of our statistical sample). Left: Line map overlays (red contours) over {\em HST} H-band (left) and IRAC $3.6\,\mu$m images (middle; grayscale). Red line contours show the CO line in steps of $1\sigma$, starting at $\pm2\sigma$. Yellow contours show the radio continuum emission in steps of $2\sigma$, starting at $\pm3\sigma$ \citep{ Morrison10}. Right: Extracted line candidate aperture spectra (``histograms") and Gaussian fits (red curves) to the line features. The frequency resolution is the same as in Fig.~\ref{fig:spectra_COS1}. The velocity range used for the overlays is indicated by the dashed blue lines. The solid black line shows the CO(1--0) frequency corresponding to the optical spectroscopic redshift of $z_{\rm spec}=2.320$.} \label{fig:radio_cand_figs} \end{figure*} \subsubsection{Radio counterparts} We also searched for counterpart matches in the deep COSMOS 3 GHz continuum catalog \citep{Smolcic17}, only finding associations for COLDz.COS0, COS1, COS2 and COS3 by using a 3$^{\prime\prime}$ search radius. Of the 18 sources from the \cite{Smolcic17} catalog located within the boundaries of our mosaic, our secure sources represent the only ones with a redshift estimate (photometric or spectroscopic when available) falling within our survey volume. All the remaining sources from the \cite{Smolcic17} catalog within our survey area lie in the range $z=$0.1--1.6. We performed an equivalent search in the catalog from the eMERGE 5.5 GHz survey of the GOODS-N field \citep{eMerge}, finding a single association for GN19 by using a 3$^{\prime\prime}$ search radius. We also searched the VLA 1.4 GHz catalog of the GOODS-N field from \cite{Morrison10} with the same criteria, finding two matches for GN19 and a radio counterpart for GN10. We also used these radio catalogs to search for counterpart associations with CO candidates to a lower significance of $5\sigma$. We found one candidate at a SNR=5.13 which satisfies the requirement of close association with a radio source (within $3^{\prime\prime}$), and with a CO redshift which is compatible with the $1\sigma$ interval for the photometric redshift listed by the optical-NIR photometric catalogs. This candidate, named COLDz.GN.R1 in the following, is at J2000 12:37:02.53 +62:13:02.1, and has an offset of $1^{\prime\prime}.7\pm0^{\prime\prime}.6$ from the radio source. We show this candidate in Fig.~\ref{fig:radio_cand_figs}. The photometric redshift estimate is 4.73--5.30, which is compatible with the CO(2--1) redshift of $z_{\rm 21}=5.277\pm0.001$ implied by the COLDz data. We measure a CO(2--1) line luminosity of $(8\pm3)\times10^{10}\,$K km s$^{-1}$pc$^2$, which implies a gas mass of $(2.9\pm1.1)\times10^{11}\,{\rm M}_\odot$ for a standard $\alpha_{\rm CO}$=3.6 M$_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$ and $r_{\rm 21}=1$. The \cite{Skelton14} catalog reports a stellar mass of $2.8\times10^{11}\,$M$_\odot$, which suggests a molecular gas mass fraction of $\sim1$. The radio continuum fluxes are S$_{\rm 1.4\,GHz}=(26\pm4)\,\mu$Jy and S$_{\rm 5.5\,GHz}=(20 \pm4)\,\mu$Jy (\citealt{Morrison10,eMerge}, respectively). This suggests a star formation rate of $\sim200-400\,$M$_\odot$ yr$^{-1}$ when applying the radio-FIR correlation \citep{Delhaize17}. Although this line candidate has a higher probability of corresponding to real emission than implied by its SNR, we do not include it in the statistical analysis to preserve the un-biased (i.e., CO SNR-limited) nature of our selection. The deep radio catalogs by \cite{Smolcic17} in COSMOS and by \cite{Morrison10} in GOODS-N have a $5\sigma$ sensitivity limit of $\sim11\,\mu$Jy at 3 GHz and 20 $\mu$Jy at 1.4 GHz, respectively which can be converted to upper limits on the $L_{\rm FIR}$ for radio counterparts to our line candidates through the radio-IR correlation. By adopting the relationship from \cite{Delhaize17}, we deduce a detection limit of $L_{\rm FIR}<4-7\times10^{11}\,L_{\odot}$ in the $z=1.953$--2.847 redshift range. On the other hand, recent results have suggested that the radio-FIR correlation in disk-dominated star-forming galaxies may not show a redshift evolution as used by \cite{Delhaize17} \citep{Molnar}. If true, this would suggest less constraining limits of $L_{\rm FIR}<1-3\times10^{12}\,L_{\odot}$. The $5\sigma$ sensitivity limit of the eMERGE catalog at 5.5 GHz is approximately 15 $\mu$Jy, and corresponds to limits of $L_{\rm FIR}<8-14\times10^{11}\,L_{\odot}$ according to \cite{Delhaize17}, and to $L_{\rm FIR}<2.5-6\times10^{12}\,L_{\odot}$ according to \cite{Molnar}. These limits may be constraining, because our measured $L'_{\rm CO}$ would imply median $L_{\rm FIR}\sim10^{12}\,L_{\odot}$ and $\sim4\times10^{12}\,L_{\odot}$ based on the star-formation law \citep{Daddi10b, Genzel10} for our unconfirmed line candidates in the COSMOS and GOODS-N fields, respectively. Possible reasons for the lack of radio counterparts may be due to fainter radio fluxes in our sample than expected from the radio-IR correlation, lower star formation rates than expected based on the gas masses, or that candidates may correspond to CO(2--1) emission at $z>5$. Alternatively, line candidates may not be real and be due to noise. The possibility of gas-rich, low star-formation rate galaxies would be particularly interesting, because surveys like the one reported here may be the only way to uncover such a hidden population. \begin{comment} \begin{table*}[thb] \caption{Line candidate below the statistical sample catalog threshold with radio counterpart and matching redshift estimates.} \tiny \hspace{-10pt} \begin{tabular}{cccccccccccc} \hline Radio Coordinates&Offset & $z_{\rm CO}$&Catalog &SNR & $I_{\rm CO}$ & $L'_{\rm CO}$& $M_{gas}$&$M_{*}$&$SFR_{\rm SED}$ & $S_\nu$& Radio $L_{\rm FIR}$ \\ & &&z-range & & Jy km s$^{-1}$ &$10^{10}\,$K km s$^{-1}$pc$^2$ &$10^{10}\,M_\odot$&$10^{10}\,M_\odot$&M$_\odot$ yr$^{-1}$ &$\mu$Jy&$10^{11}\,L_{\odot}$\\ \hline GOODS-N &&&&&&&&&& \\ 12:37:2.53 +62:13:2.1 &$1^{\prime\prime}.7\pm0^{\prime\prime}.6$&5.277&4.73--5.30&5.13&$0.33\pm0.13$&$8\pm3$&$29\pm11$&28&-& S$_{\rm 1.4\,GHz}=26\pm4$ &$23\pm4$ \\ &&&&&&&&&&S$_{\rm 5.5\,GHz}=20 \pm4$&$46\pm9$\\ \hline \end{tabular} \label{radio_counterpart} \begin{tablenotes} \item \small \textbf{Note} The catalog redshift range specifies the $1\sigma$ interval. We choose $\alpha_{\rm CO}$=3.6 M$_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$ to obtain molecular gas mass estimates. The radio sources are derived from the \cite{eMerge} catalog (5.5 GHz) and \cite{Morrison10} catalog (1.4 GHz), respectively. We convert the radio fluxes to FIR luminosity by adopting the CO redshift and the radio-FIR correlation measured by \cite{Delhaize17}. \end{tablenotes} \end{table*} \end{comment} \section{Identification and stacking of galaxies with previous spectroscopic redshifts} \begin{table*}[htb] \caption{Low-{\it J} CO Counterpart Search for HDF-N PdBI Blind Mid-{\it J} CO Candidates.} \tiny \hspace{-10pt} \centering \begin{tabular}{ccccccc} \hline ID &Preferred Redshift&PdBI preferred &PdBI covered & This survey & Low-{\it J} Flux & $L'_{\rm CO}$ constraint \\ &&Mid-{\it J} line&Mid-{\it J} line & Low-{\it J} line & or 3$\sigma$ limit & \\ & & & & &(Jy km s$^{-1}$) & \\ \hline ID.01&1.88&2--1&5--4&2--1&$<$0.05 &r$_{52}>$1.6\\ ID.02&1.81&2--1&5--4&2--1&$<$0.02 &r$_{52}>$2.6\\ ID.03& 1.78 (secure)&2--1&5--4&2--1 & $<$0.05 &r$_{52}>$1.8\\ ID.04&1.71&2--1&5--4&2--1&$<$0.03 &r$_{52}>$0.9\\ ID.05&2.85&3--2&5--4&2--1&$<$0.06 &r$_{52}>$1.2\\ ID.08 (HDF850.1)&5.19 (secure)&5--4&5--4*&2--1&$0.17\pm0.06$ &r$_{52}=0.40\pm0.16$\\ ID.10 &2.33& 3--2&3--2*/6--5&1--0/2--1 &$<$0.03 & r$_{31}\&r_{62}>$0.7\\ ID.11&2.19& 3--2& 3--2*/6--5&1--0/2--1& $<$0.04& r$_{31}\&r_{62}>$0.9\\ & & 3--2&7--6&2--1& $<$0.03 &r$_{72}>$1.0\\ ID.12&2.19& 3--2&3--2*/6--5&1--0/2--1& $<$0.05 & r$_{31}\&r_{62}>$0.6\\ && 3--2&7--6&2--1 & $<$0.03 & r$_{72}>$0.7\\ ID.13&2.18& 3--2&3--2*/6--5&1--0/2--1& $<$0.04 & r$_{31}\&r_{62}>$0.6\\ && 3--2&7--6&2--1 & $<$0.03 & r$_{72}>$0.7\\ ID.14 &2.15& 3--2&3--2*/6--5&1--0/2--1&$<$0.04 &r$_{31}$or r$_{62}>$0.8\\ && 3--2&7--6&2--1 &$<$0.03 & r$_{72}>$0.7\\ ID.15&2.15& 3--2& 3--2*/6--5&1--0/2--1& $<$0.04 & r$_{31}\&r_{62}>$1.2\\ & & 3--2&7--6&2--1 &$<$0.03 & r$_{72}>$1.2\\ ID.17 (HDF850.1)&5.19 (secure)& 6--5&6--5*&2--1&$0.17\pm0.06$&r$_{62}=0.24\pm0.10$\\ ID.18&2.07& 3--2&3--2*/6--5&1--0/2--1& $<$0.05 & r$_{31}\& r_{62}>$1.3\\ && 3--2&7--6&2--1 &$<$0.04 & r$_{72}>$1.3\\ ID.19&2.05 (secure)& 3--2& 3--2*/6--5& 1--0/2--1& $<$0.07 &r$_{31}$ \& r$_{62}>$0.7\\ && 3--2&7--6&2--1 &$<$0.04 & r$_{72}>$0.9\\ ID.20&2.05& 3--2& 3--2*/6--5&1--0/2--1& $<$0.05 & r$_{31}\& r_{62}>$0.8\\ & & 3--2 &7--6&2--1 &$<$0.03 & r$_{72}>$1.1\\ ID.21&3.04&4--3&7--6&2--1 &$<$0.04& r$_{72}>$0.8\\ \hline \end{tabular} \label{Decarli_counterpart} \begin{tablenotes} \small \item \textbf{Note} Preferred redshifts are quoted from \cite{Decarli14}. Although we systematically constrain every possible J line assignment that would place a CO line in our data, the asterisk marks those cases where the assignment is preferred by \cite{Decarli14}. ID.03 has a secure redshift identification which places it outside our redshift coverage. ID.19 has a secure redshift which places it within our coverage. \end{tablenotes} \end{table*} \subsection{Identification and stacking of previous mid-{\it J} blind CO surveys} We searched the GOODS-N dataset for low-{\it J} CO counterparts to the candidate mid-{\it J} CO detections from our previous CO blind survey in the HDF-N with the PdBI \citep{Decarli14}. We find a single match in our candidate list, which corresponds to CO(2--1) line emission from HDF850.1. We systematically searched for every possible mid-{\it J}/low-{\it J} CO line combination that would place a low-{\it J} CO line in our surveyed volume (Table~\ref{Decarli_counterpart}). Several of these possible mid-{\it J}/low-{\it J} CO line combinations are not the preferred line identifications by \cite{Decarli14}. Therefore, our non-detections are consistent with their preferred redshift in those cases constraining or ruling out several alternative redshift solutions allowed by the PdBI data alone. In order to search for lower significance candidate lines, we extract spectra at the mid-{\it J} candidate positions, and evaluate the significance of any features or place $3\sigma$ upper limits to the line fluxes. By assuming the same line FWHM as the candidate mid-{\it J} CO lines, we then derive limits on the line brightness temperature ratios (Table~\ref{Decarli_counterpart}). We evaluate the signal-to-noise by spectral (1D) match-filtering of individual spectra, extracted in the central pixel and within 5 frequency channels around the expected position of the lines. We do not find any significant detections above a $3\sigma$ threshold. Some of our upper limits imply super-unity line brightness temperature ratios for the mid-{\it J} CO candidates. While a lower-{\it J} level can be less populated than a higher-{\it J} level, or low optical depths can cause such high line ratios, the physical conditions that give rise to such ratios are rare. In cases where super-unity line ratios are found for redshifts (i.e., mid-{\it J}/low-{\it J} CO line combinations) disfavored by \cite{Decarli14}, our data provide supporting evidence for the preferred redshifts identified by \cite{Decarli14}, under the assumption that those line candidates are real. As an example, in the case of ID.03, multiple line detections have determined a secure redshift. Since this redshift does not lie within our surveyed volume, our non-detection is consistent with the redshift identification by \cite{Decarli14}. On the other hand, candidate ID.19 was confirmed to lie at $z=$2.0474 based on optical grism spectroscopy \citep{Decarli14}. Therefore, the candidates lies in our survey volume and our line ratio limit ($r_{31}>0.7$) is significant. This suggests moderately elevated CO excitation compared to the average ratio found for a sample of Main Sequence galaxies at $z=$1.5 ($r_{31}=0.42$, \citealt{Daddi15}), and even compared to the average ratio ($r_{31}=0.52\pm0.09$) found for a sample of sub-millimeter galaxies \citep{Bothwell13}. For the mid-{\it J} line candidates ID.15 and ID.18, our constraints on the line ratios are higher than unity. This suggests that an alternative lower redshift mid-{\it J} line assignment of CO(2--1) in the PdBI data may be more likely (since it would imply a redshift outside our survey volume), if the line candidate were confirmed to correspond to real emission. We also stack the extracted spectra to obtain more sensitive limits. In particular, we select random subsets of candidates for stacking, to take into account a possible mis-identification of the correct {\it J} value for some CO lines. To search for lines in the stacked spectra, we match-filter using the same set of spectral templates as the main line search (Table~\ref{template_sizes}). We find no line signal in the stacks above $3\sigma$ significance. Assuming an average line FWHM of 300 km s$^{-1}$, we therefore obtain a sensitive $3\sigma$ upper limit of $0.014\pm0.002$ Jy km s$^{-1}$ to the line fluxes, where the quoted uncertainties on the limit depend on the number of stacked spectra. From the same sample, we also separately stack the nine candidates for which the lines were identified as likely CO(3--2) emission by \cite{Decarli14}, and whose redshift would place their CO(1--0) line in our data cube. We obtain a $3\sigma$ limit of $\sim0.019$ Jy km s$^{-1}$, which implies a constraining limit of $r_{31}>2.0$ when using the mean CO(3--2) flux in the limit (0.34 Jy km s$^{-1}$, using the same weights as in our stack). We estimate how many of these stacked spectra need to be removed in order for the line luminosity ratio to become smaller than unity. We find that at least six of them may not correspond to real emission, subject to the stated assumptions. In summary, we find some tentative evidence suggesting that mid-{\it J} blind CO searches may preferentially select galaxies with relatively high CO excitation. An alternative interpretation may be that some of the candidate mid-{\it J} CO emitters considered here, may be spurious and do not correspond to real CO emission. In order to more strongly differentiate between these possibilities, more sensitive 3 mm observations need to be carried out. \begin{comment} \begin{table*}[thb] \caption{Matched CO line candidates (below the statistical sample threshold) from spectroscopic catalogs in GOODS-N.} \tiny \hspace{-10pt} \begin{tabular}{ccccccccc} \hline Skelton ID & Coordinates&Redshift&SNR & CO Line Flux & $L'_{\rm CO}$& $M_{gas}$&$M_{*}$&$SFR_{SED}$ \\ & & & & Jy km s$^{-1}$ &$10^{10}$ K km s$^{-1}$ pc$^2$ &$10^{10}\,M_\odot$&$10^{10}\,M_\odot$&M$_\odot$ yr$^{-1}$ \\ \hline spec-z $^{12}$CO(1--0) \\ 32033&12:36:49.10 +62:18:14.0 &2.320&4.6& $0.08\pm0.03$&$2.0\pm0.8$&$7\pm3$&11&160$^b$\\ 20366&12:37:08.76 +62:14:31.4 & 2.045 &4.4&$0.17\pm0.08$ &$3.5\pm1.6$ &$13\pm6 $&0.17 & 3.5\\ 29743&12:36:53.64 +62:17:24.3 & 2.187 &4.4& $0.14\pm 0.05$ &$3.2\pm1.2$&$12\pm4$&3.0&49$^b$\\ 29211&12:36:50.83 +62:17:12.5 &2.133 & 4.1& $0.14\pm 0.07$ & $3.1\pm1.5$& $11\pm5$ &1.1&36$^b$\\ 11429 & 12:36:54.50 +62:11:56.0 & 2.261& 4.1& $0.14\pm 0.06$ & $3.4\pm1.5$& $12\pm5$ &0.19&2.8\\ 10835&12:37:13.22 +62:11:45.5& 2.414 &4.1&$0.06\pm0.03$&$1.6\pm0.8$&$6\pm3$&0.85&180$^b$\\ 21534&12:36:44.03 +62:14:50.6 & 2.095 & 3.1&$0.11\pm0.05$&$2.4\pm1.0$&$9\pm4$&6.0&130$^b$\\ 26486&12:36:43.88 +62:16:20.9&2.320&3.0&$0.05\pm0.03$&$1.3\pm0.8$&$5\pm3$&0.84&28$^b$\\ \hline grism-z $^{12}$CO(1--0) \\ 3824&12:36:57.76 +62:09:16.2&2.6111&4.8&$0.06\pm 0.03$&$1.9\pm0.9$&$7\pm3$&0.15& 0.6\\ 5855$^a$&12:37:07.07 +62:10:08.5 &2.519&4.3 &$0.05\pm 0.03$&$1.5\pm0.9$&$5\pm3$&0.23&2.4\\ 10219&12:36:56.93 +62:11:34.1&2.057&4.0&$0.08\pm 0.03$&$1.7\pm0.6$&$6\pm2$&0.3& 3\\ 10268&12:37:08.50 +62:11:34.0&2.577&4.0&$0.06\pm 0.03$&$1.8\pm0.9$&$6\pm3$&5.6&74$^b$\\ 11031&12:36:56.20 +62:11:49.1&2.796&4.1&$0.05\pm 0.03$&$1.8\pm1.1$&$6\pm4$&0.16& 0.4\\ 11897 &12:37:07.28 +62:12:03.4 &2.302&4.2&$0.06\pm 0.02$ &$1.5\pm0.5$&$5\pm2$&1.2& 37$^b$\\ 12542&12:36:59.58 +62:12:14.6 &2.233&4.1&$0.06\pm 0.03$&$1.4\pm0.7$&$5\pm3$&0.3& 4\\ 13125&12:37:14.54 +62:12:25.5 &2.377&4.1&$0.14\pm 0.07$&$3.7\pm1.9$&$13\pm7$&0.12& 1.2\\ 14283 &12:37:02.60 +62:12:44.0 &2.433&4.0&$0.06\pm 0.03$&$1.7\pm0.8$&$6\pm3$&8& 52$^b$\\ 19808&12:36:36.15 +62:14:22.6 &2.107&4.4&$0.18\pm 0.07$&$3.9\pm1.5$&$14\pm5$&NA& NA\\ 25468&12:36:37.37 +62:15:59.9&2.809&4.0&$0.09\pm 0.03$&$3.2\pm1.1$&$11\pm4$&0.56&35\\ 26837&12:37:02.25 +62:16:23.8 &2.216&4.2&$0.06\pm 0.03$&$1.4\pm0.7$&$5\pm3$&0.14& 1.3\\ 31386&12:37:03.52 +62:17:54.0&2.399 &4.0&$0.43\pm 0.17$&$12\pm5$&$43\pm18$&0.07&0.6\\ 32330$^a$&12:36:49.18 +62:18:16.0 &2.315&4.8&$0.43\pm 0.16$&$11\pm4$&$40\pm14$&0.3& 2\\ 33474 &12:36:51.71 +62:18:44.6 &2.475&4.4&$0.06\pm 0.03$&$1.7\pm0.9$&$6\pm3$&0.13& 2\\ 34957&12:36:47.67 +62:19:26.1 &2.269&4.0&$0.19\pm 0.08$&$5\pm2$&$18\pm7$&NA& NA\\ \hline HDF850.1 overdensity CO(2--1) \\ 21759&12:36:37.05 +62:14:58.8&5.141&3.3& $0.042\pm0.018$ &$1.0\pm0.4$&$3.6\pm1.4$&NA&NA \\ 11203&12:36:44.68 +62:11:50.3&5.300&3.5& $0.12\pm0.07$ & $2.9\pm1.7$&$10\pm6$&NA&NA\\ 23244&12:37:18.77 +62:15:22.8&5.566&4.1& $0.02\pm0.01$ & $0.5\pm0.3$&$1.8\pm1.1$&NA&NA\\ \hline \end{tabular} \label{GN_specz_counterparts} \begin{tablenotes} \item \small \textbf{Note} $\alpha_{CO}$=3.6 M$_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$ is adopted to obtain molecular gas mass estimates. $^a$: Sources with grism-z uncertainties of $<$700 km s$^{-1}$. $^b$: The SFR for these galaxies was derived from the IR-based catalog and may, therefore, be more reliable \citep{superdeblended}. \end{tablenotes} \end{table*} \end{comment} \begin{figure*}[htb] \centering{ \includegraphics[width=\textwidth]{stacking_spectra_main.pdf} } \caption{Spectral stacks of sets of galaxies with spectroscopic redshifts. Stack of galaxies with spectroscopic redshifts in COSMOS (left, 7 galaxies) and GOODS-N (right). The GOODS-N spec-z stack including the full stellar mass range (78 galaxies) displays a tentative $3.4\sigma$ detection while the stack of massive galaxies (M$_*>10^{10}\,$M$_\odot$, 34 galaxies) shows a 3.5$\sigma$ detection. The best-fitting Gaussian line profiles are shown in red. The spectral resolution is the same as in Fig.~\ref{fig:spectra_COS1}.} \label{fig:stacked_spectra} \end{figure*} \subsection{Identification and stacking of galaxies with optical redshifts} In order to obtain additional constraints on the CO luminosity of galaxies that remain individually undetected in the volume covered by our survey, we utilize the available optical/NIR spectroscopic redshift information for galaxies in our well studied target fields for stacking. We extract single pixel spectra of the sources described in the following, and we stack them with a weighted average. As weights, we used the inverse of the variance of the local noise following \cite{ASPECS2}. We present additional, less constraining, stacks of galaxies in Appendix G, where we consider galaxies with grism redshifts and galaxies at higher redshifts, for which CO(2--1) may lie within our data. \subsubsection{Spectroscopic redshifts in the COSMOS field} Only seven galaxies have known ground-based optical spectroscopic redshifts that place them within our COSMOS data cube, all of which were obtained as part of the zCOSMOS-deep survey (Lilly et al., in prep.). These galaxies have relatively low stellar masses ($\lesssim10^{10}\,M_\odot$). Therefore, we do not expect to detect their CO emission individually. We also do not detect their averaged CO line emission down to a deep $3\sigma$ limit of $<$0.008 Jy km s$^{-1}$ (assuming a line FWHM of 300 km s$^{-1}$), after stacking spectra extracted at their positions (stacked spectrum shown in Fig.~\ref{fig:stacked_spectra}). This limit implies $L^\prime_{\rm CO}<1.7-2.7\times 10^{9}\,$K km s$^{-1}$ pc$^2$ for different redshifts within our surveyed range. In order to determine the implications of this limit, we perform SED fitting of the same galaxies with {\sc magphys} \citep{magphys08,magphys15} to estimate their stellar masses, finding that they are compatible with the tabulated values in COSMOS2015 whenever the photo-$z$ is similar to the spectroscopic redshift (only 3/7 cases). These stellar masses are in the range $10^9\,{\rm M}_\odot-10^{10}\,{\rm M}_\odot$. Assuming that these galaxies lie on the Main Sequence, we use the fitting functions from \cite{Speagle} to determine star formation rates (SFR) $\sim2-25\,{\rm M}_\odot \, {\rm yr}^{-1}$. These values are consistent with the lack of detections by the 3 GHz survey by \cite{Smolcic17}, which implies SFR$<40-70\,{\rm M}_\odot \, {\rm yr}^{-1}$ based on the radio-FIR correlation\footnote{Recent work by \cite{Molnar} suggests that radio-FIR correlation for disk-dominated galaxies may not show redshift evolution, and would imply a less constraing limit of SFR$<100-300\,{\rm M}_\odot \, {\rm yr}^{-1}$} estimated by \cite{Delhaize17}. The SFRs estimated by {\sc magphys} for these galaxies (with great uncertainty due to the lack of FIR detections) span the 6--150$\,{\rm M}_\odot \, {\rm yr}^{-1}$ range, with a mean of 55$\,{\rm M}_\odot \, {\rm yr}^{-1}$. Assuming the star formation law found for Main Sequence galaxies at high redshift\footnote{These star formation law estimates were mostly based on CO(3--2) observations, therefore variations in the r$_{31}$ line ratio may contribute additional uncertainty.} \citep{Daddi10b,Genzel10}, we can use the star-formation rate estimates to infer an expected $L^\prime_{\rm CO}$ $\sim8\times 10^9 \,$K km s$^{-1}$ pc$^2$, which is higher than our measured limit, and therefore not fully consistent. The adopted chain of scaling relations, including SED fitting and the star formation law have large scatter, and therefore introduce large uncertainties in the $L^\prime_{\rm CO}$ estimate. The apparent tension with our upper limit would disappear if the average SFR were $\sim10-15\,{\rm M}_\odot \, {\rm yr}^{-1}$. The non-detection of the stacked CO(1--0) emission therefore provides a valuable constraint on the CO luminosity of faint, modestly massive $z=2$--3 galaxies, as our best estimates for their SFR appear to be in tension with the expectated $L^\prime_{\rm CO}$ based on the star formation law by \cite{Daddi10b,Genzel10}. \subsubsection{Spectroscopic redshifts in the GOODS-N field} The 3D-{\em HST} catalog \citep{Skelton14, Momcheva16} provides 67 galaxies in the region in GOODS-N covered in our survey area with ground-based optical spectroscopic redshift, whose CO(1--0) line is covered by our data. We also include 13 more galaxies with more recent spectroscopic redshifts from the catalog by \cite{superdeblended} in our analysis. One of the galaxies in this combined sample corresponds to GN19 and is individually detected. Therefore, we exclude it from further investigation here. One more galaxy with a spectroscopic redshift of $z_{\rm spec}=2.320$ is perfectly matched, in position and redshift with a SNR=4.6 CO line candidate at coordinates J2000 12:36:49.10 +62:18:14.0 and $z_{\rm 10}=2.3192\pm0.0003$, which we name COLDz.GN.S1 (Figure~\ref{fig:radio_cand_figs}). This CO line candidate is significantly extended (FWHM of $\sim9.0^{\prime\prime}\pm0.5^{\prime\prime}\sim74\pm4$ kpc) and appears to be associated with two, potentially interacting, galaxies with a projected separation of $\sim20$ kpc. The galaxy to the south is associated with the spectroscopic redshift measurement, while the galaxy to the North has a compatible photometric redshift estimate. The total aperture CO flux of GN.S1 is $(0.22\pm0.11)$ Jy km s$^{-1}$, corresponding to $L'_{\rm CO}=(5\pm3)\times10^{10}\,$ K km s$^{-1}$ pc$^2$. We find a molecular gas mass of $(2.0\pm1.1)\times10^{11}\,$M$_\odot$ when assuming $\alpha_{\rm CO}=3.6\,{\rm M}_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$. The stellar mass of the southern (brightest) component is $\sim1.2\times10^{11}\,$M$_\odot$, and that of the northern component $\sim3\times10^{9}\,$M$_\odot$, suggesting a high gas mass fraction $\sim1.7$. This gas fraction may be elevated due to the galaxy interaction, although the star formation rate reported by \cite{superdeblended} of $\sim160$ M$_\odot$ yr$^{-1}$ is approximately $\sim2-3\times$ lower than what may be expected from the total CO luminosity based on the star formation law \citep{Daddi10b,Genzel10}. Therefore, we may be witnessing a gas-rich early phase of the merger, which may precede a starburst. This source is also tentatively detected in the S2CLS map, with a significance of $\sim3.3\sigma$ and a $850\,\mu$m flux of $3.2\pm1.0$ mJy \citep{Geach17}, which is compatible with the moderate star formation rate estimate. Allowing for an offset of $<2^{\prime\prime}$ and $<500\,$km s$^{-1}$ results in four more potential candidate association, but they are not likely to be real due to apparent offsets in the emission and because they are not associated with the most massive, or most star-forming galaxies in the sample. In the set of galaxies with spectroscopic redshifts covered by our data, nine galaxies have stellar mass estimates of $>5\times10^{10}\,{\rm M}_\odot$, corresponding to a gas fraction ${\rm M}_{\rm gas}/{\rm M}_*\sim1$ at our approximate $3\sigma$ sensitivity limit of $L'_{\rm CO}\sim1.5\times10^{10}\,$ K km s$^{-1}$ pc$^2$. These galaxies may therefore be expected to be individually detectable. Excluding GN19 and GN.S1, the remaining seven galaxies remain undetected, implying M$_{\rm gas}/{\rm M}_*<1$. Previous samples of Main Sequence galaxies at $z=2-3$ have shown typical molecular gas mass fractions of order M$_{\rm gas}/{\rm M}_*\sim1-1.5$ in this stellar mass range \citep{Genzel15,Scoville17}, i.e., higher than those limits. We note that adopting the same CO conversion factor as utilized by \cite{Genzel15}, including the correction for a stellar-mass dependent metallicity, would result in approximately 50\% higher molecular gas mass estimates. Overall, the observed limits may be consistent with previous observations of the molecular gas fractions in Main Sequence galaxies, although they appear to be at the low end of the expected scatter of the relation. Stacking all 78 spectra, i.e, excluding GN19 and COLDz.GN.S1, yields a tentative ($\sim3.4\sigma$) CO line detection in the deep stack ($6\pm3\times 10^{-3}$ Jy km s$^{-1}$; Fig.~\ref{fig:stacked_spectra}). The noise in this stacked spectrum is $\sim23\,\mu$Jy beam$^{-1}$ in 35 km s$^{-1}$-wide channels. The stacked galaxies in this sample have a wide range of stellar masses, and are therefore expected to show a range of CO luminosities. While constraining the average CO luminosity for this sample, we note that such an average does not represent common properties of the stacked galaxies. The measured flux in the stacked spectrum corresponds to an average CO luminosity for this galaxy sample of $L'_{\rm CO}=(1.5\pm0.8)\times10^9$ K km s$^{-1}$ pc$^2$ at an average $z\sim2.4$. These 78 galaxies have a mean stellar mass of $2.1\times10^{10}\,M_\odot$ and an average star formation rate of $\sim45\,{\rm M}_\odot$ yr$^{-1}$ (with quartiles of 3.6, 22 and 66 M$_\odot$ yr$^{-1}$, respectively), according to \cite{superdeblended} when available, and to \cite{Skelton14} otherwise. We also stack the subset of 34 spectra corresponding to the most massive galaxies with M$_*>10^{10}\,$M$_\odot$, expecting them to contribute the strongest CO signal. We detect emission in this sub-stack with a significance of 3.5$\sigma$, corresponding to a line flux of $1.2\pm0.7\times 10^{-2}$ Jy km s$^{-1}$ and a line FWHM of $200\pm80$ km s$^{-1}$ (Fig.~\ref{fig:stacked_spectra}). The line flux in the stacked spectrum corresponds to $L'_{\rm CO}=(3.2\pm1.8)\times10^9$ K km s$^{-1}$ pc$^2$ at an average $z\sim2.4$, which corresponds to a molecular gas mass of M$_{\rm gas}=(1.2\pm0.6)\times 10^{10}\,$M$_\odot$ according to our earlier choice of $\alpha_{\rm CO}$. This gas mass should be compared to the mean stellar mass $\sim3.6\times10^{10}\,$M$_\odot$ of this sub-sample (with a median of $\sim2.8\times10^{10}\,$M$_\odot$) and the average star formation rate of $\sim66\,{\rm M}_\odot$ yr$^{-1}$ (median of $\sim52\,{\rm M}_\odot$ yr$^{-1}$) \citep{superdeblended}. To further investigate these star formation rate estimates, we also stack SCUBA-2 S2CLS 850 $\mu$m images and derive a 3$\sigma$ upper limit of $<0.7$ mJy at the positions of the sample galaxies \citep{Geach17}. Utilizing the average FIR SED from the ALESS sample, at approximately the same redshift as these galaxies, the sub-mm flux upper limit implies a star formation rate constraint of $\lesssim60-100$ M$_\odot$ yr$^{-1}$ \citep{ALESS_daCunha}. A modified black body model with a dust temperature of $T_d=35$K also implies comparable limits. We find that the star formation rate of this set of galaxies is compatible with random scatter around the star-forming Main Sequence reported by \cite{Speagle}. The average expected CO luminosity based on the star formation law \citep{Daddi10b,Genzel10} may be higher than our measurement by about a factor of 3 ($L'_{\rm CO}\sim9.6\times10^9$ K km s$^{-1}$ pc$^2$). \begin{figure*}[bht] \centering{ \includegraphics[width=\textwidth]{gas_frac_fig.pdf} } \caption{Molecular gas mass fraction constraints for galaxies with known spectroscopic redshifts for which the CO(1--0) emission can be constrained by the COLDz data. The points in color assume $\alpha_{\rm CO}$=3.6 M$_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$, while the gray points correspond to adopting the metallicity-dependent $\alpha_{\rm CO}$ from \cite{Genzel15}. All upper limits correspond to $3\sigma$ limits, and assume a line FWHM of 300 km s$^{-1}$. The sets of individual galaxies, the origin of their stellar masses and the constraints from stacking are described in Section~6. The grey and red shaded regions correspond to the reported average expected gas mass fraction in the range $z\sim2.0-2.8$ for Main Sequence galaxies according to \cite{Genzel15} and \cite{Scoville17}, respectively. These regions do not show the expected scatter, but rather represent the evolution within the covered redshift range. The shown scaling relations were measured over the stellar mass range ${\rm M}_*\gtrsim10^{10}{\rm M}_\odot$.} \label{fig:gas_frac} \end{figure*} \subsubsection{Implications} Figure~\ref{fig:gas_frac} summarizes our constraints on the molecular gas mass fraction in the analyzed samples of galaxies. In order to convert CO luminosity to molecular gas mass, we consider two different assumptions for $\alpha_{\rm CO}$. First, we assume a constant value of $\alpha_{\rm CO}=3.6\,{\rm M}_\odot$ (K km s$^{-1}$ pc$^2$)$^{-1}$ adopted by some previous studies (e.g., \citealt{Daddi10b, Decarli14, ASPECS1}). We then also consider a metallicity-dependent conversion factor, evaluated by assuming a redshift and stellar mass-metallicity relation \citep{Genzel15}. Previous studies investigating optically and FIR-selected galaxy samples have estimated the relationship between gas mass fraction, stellar mass, redshift and SFR-offset from the Main Sequence (e.g., \citealt{Genzel15,Scoville17}). While the PHIBSS project estimated molecular gas masses by measuring the CO(3--2) line emission \citep{Tacconi13,Genzel15}, \cite{Scoville16,Scoville17} have used the flux on the Rayleigh-Jeans tail of the dust continuum emission to estimate the total gas masses. We here assume that the samples of galaxies plotted, although not complete to any degree due to their pre-selection for having a spectroscopic redshift, may be somewhat representative of the star-forming Main Sequence (Figure~\ref{fig:gas_frac}). Their star formation rates are consistent with scatter around the Main Sequence and appear to include as many galaxies above and below the Main Sequence estimated by \cite{Speagle}. Although our CO detections (both blind and with previous spectroscopic redshifts) are indicative of gas fractions compatible with or above (GN19) expectations for Main Sequence galaxies, the individual CO non-detections and the stacked signal appear to be systematically lower than the predicted averages, suggesting lower gas mass fractions than might be expected (Figure~\ref{fig:gas_frac}). We can quantify the apparent deficit in stacked signal relative to expectations for the ${\rm M}_*\gtrsim10^{10}\,{\rm M}_\odot$ sample, by calculating expected gas masses for the individual stacked galaxies, predicted as a function of their redshift, stellar masses and star formation rates. The expected sample average molecular gas mass is $5.8\times10^{10}\,{\rm M}_\odot$ adopting the best fit relation by \cite{Genzel15} and $7.5\times10^{10}\,{\rm M}_\odot$ according to the relation by \cite{Scoville17}. The constant CO luminosity conversion factor above would imply a ratio between expected and observed stacked CO luminosity of $4.8\pm2.4$ and $6.3\pm3.1$ according to the relations by \cite{Genzel15} and by \cite{Scoville17}, respectively. Applying instead the metallicity dependent CO conversion factor suggested by \cite{Genzel15} to individual galaxies would somewhat reduce the tension, implying ratios of $3.0\pm1.7$ and $3.8\pm2.1$ according to the relations by \cite{Genzel15} and by \cite{Scoville17}, respectively. While the constraints for low stellar mass galaxies may be compatible with an evolving CO conversion factor due to low metallicity, this is unlikely to resolve the apparent conflict at the high mass end, and may point to lower than expected gas masses. \section{Total CO line brightness at 34 GHz} One additional key measurement that becomes possible with the COLDz survey is to determine the total CO line brightness at 30--39 GHz in the survey volume. We follow the simple procedure outlined by \cite{Carilli16}, and as a first conservative estimate, include only the independently confirmed line candidates, for each field in order to derive secure lower bounds. We derive lower brightness temperature limits (since we only include the securely detected sources, without any completeness correction) at the average frequency of 34 GHz of $T_B\gtrsim0.4\pm0.2\,\mu$K for the COSMOS field and $T_B\gtrsim0.05\pm0.04\,\mu$K for the GOODS-N field, respectively. The uncertainties are dominated by Poisson relative uncertainties, due to the limited number of sources considered. Sources near the knee of the CO luminosity function (Paper~\rom{2}) dominate the total surface brightness, as expected. Since the two measurements are sensitive to different parts of the CO luminosity function, we add the two values to obtain our best estimate for a lower limit on the average surface brightness of $T_B\sim0.45\pm0.2\,\mu$K. Next, we attempt to include a longer list of candidates, down-weighted by their purities (evaluated in Appendix F), to estimate a plausible uncertainty range. In the COSMOS field, also including all moderate SNR candidates presented in Table~\ref{tab_lines_appendix}, we obtain $T_B\sim0.48\,\mu$K and $T_B\sim0.57\,\mu$K without and with the completeness corrections evaluated in Appendix F, respectively. In the GOODS-N field, also including all candidates in Table~\ref{tab_lines_appendix}, we obtain $T_B\sim0.18\,\mu$K and $T_B\sim0.3\,\mu$K without and with the completeness corrections, respectively. Because the complete candidate list in GOODS-N overlaps in flux ranges with the candidates in COSMOS, it is not clear that the best estimate for this case may simply be derived by adding the two contributions; the plausible range of values from our data should therefore be considered to be the full range $T_B\sim0.2-0.6\,\mu$K, with a likely lower limit of $T_B\sim0.45\pm0.2\,\mu$K. These measurements are consistent with that of $T_B\sim0.94\pm0.09\,\mu$K at 99 GHz by \cite{Carilli16} within the expectation that the total (all CO lines) average surface brightness may slightly increase between 34 GHz and 99 GHz due to adding more CO transitions together (e.g., \citealt{Righi08}). Our measurement of the average surface brightness is in agreement with theoretical predictions (e.g, \citealt{Righi08,Pullen13}) which suggest a range of $T_B=0.3-1\,\mu$K. Our constraints on the total CO brightness at 34 GHz suggest that the CO signal will be an important contribution to CMB spectral distortion at these frequencies, which is relevant for upcoming experimental efforts. In particular, as shown in Figure~2 by \cite{Carilli16}, our constraints at 34 GHz are already higher than the PIXIE sensitivity limit \citep{Kogut11,Kogut14} and, while lower than the low-redshift Compton distortion component, it is higher than the relativistic correction to the low-redshift signal, the primordial Silk damping distortion, and the imprint of primordial hydrogen and helium recombination radiation contributions. A measurement of these important cosmological probes will therefore necessarily require a subtraction scheme that will remove the CO line signal (also see \citealt{Carilli16}). \section{Discussion and Conclusions} In this work, we have carried out the first blind search deep field targeting CO(1--0) line emission at the peak epoch of cosmic star formation at $z=2$--3. This allowed us to provide the least biased measurement of the molecular gas content in a representative sample of galaxies at this epoch. One of our main findings is the absence of a population of massive, gas-rich galaxies with suppressed star formation in our high signal-to-noise sample, which would have been missed by previous selection techniques. The lower signal-to-noise, and hence lower purity, CO line candidate sample includes several candidates without clear multi-wavelength counterparts, which are therefore possible candidates for such a population of ``dark", gas-rich galaxies. Nonetheless, the low purity of such candidate lines requires further, independent confirmation as the absence of a counterpart is more likely to indicate that the line feature may be spurious. Interestingly, the CO line sources detected with confidence in this study include a mix of different galaxy populations. In particular, our sub-sample of independently confirmed CO emitters contains previously known starbursts like AzTEC-3 (by design), GN10, GN19, and HDF850.1 but also COLDz.COS.1, 2 and 3 and COLDz.GN.S1 which belong to the massive end of the Main Sequence at $z\sim2$ (Pavesi et al., in prep.). This highlights the CO(1--0)-based selection, which does not preferentially select outliers in star formation such as starbursts as preferentially selected by sub-millimeter continuum selected samples. Also, the total gas mass is accurately traced by these measurements, without the extinction biases that affect optical/NIR selected samples. Most studies of molecular gas in galaxies at high redshift to-date have targeted mid-{\it J} CO lines. Although these lines have higher fluxes than the ground state, {\it J}=1--0 transition, and therefore are typically easier to detect, their higher critical densities and level energies imply that they do not always faithfully trace the bulk of the gas mass, but that they can be biased towards the dense and warm fraction of the gas reservoir. Therefore, in order to derive gas masses from those mid-{\it J} CO lines, an excitation correction needs to be assumed (i.e. a ratio of those lines to the CO(1--0) line brightness), which introduces a source of uncertainty. Previous blind CO searches have targeted mid-{\it J} CO lines \citep{Decarli14,ASPECS1}, and therefore relied on similar excitation correction assumptions in order to derive constraints to the total molecular gas mass. In this study, we have shown that blind CO(1--0) searches, selecting galaxies uniquely through their total gas masses, find a varied sample of galaxies belonging to a mix of different populations, which may be characterized by significant differences in CO excitation (e.g., starbursting and Main Sequence galaxies; \citealt{Daddi10b, CarilliWalter,Riechers06,Riechers11a,Riechers11b,Ivison_GN19,Bothwell13}). We also find significant excitation differences among the individual sources (to be described in detail by Pavesi et al., in prep.). Furthermore, our limits on the CO(1--0) line luminosities in the candidates previously selected by \cite{Decarli14} indicate that the corresponding galaxies either have substantially elevated CO excitation, or that a large fraction of them may not correspond to real line emission. The so called ``wedding cake" design of the COLDz survey, targeting a shallow wide field and a deep narrower field, allows us to provide valuable, independent constraints to different parts of the CO luminosity function (Paper~\rom{2}) which would not have been possible with a single field due to the limited accessible volume and depth. While the sensitivity of our deeper field (in COSMOS) is within a factor of two of the sensitivity that was previously achieved by ASPECS through ALMA in a comparable redshift bin (after correcting for CO excitation), the volume that we could sample in that field is six times larger. Furthermore, the volume covered in both fields combined is $>$50 times as large as that covered by ASPECS-Pilot and $>60$ times as large as that carried out in the HDF-N with the PdBI, given the $>60$ times larger survey area ($\sim$60 vs $\sim$1 arcmin$^2$). In this study, we have also significantly further developed the methods utilized to carry out blind searches for emission lines in interferometric datasets. In particular, we have generalized the Matched Filtering technique that is commonly used in the spectral dimension to identify spectral lines, to the regime of interferometric data cubes where sources may be spatially extended. By taking advantage of this new source selection method, we have blindly detected significantly extended CO(1--0) line sources like COLDz.COS.3, which hosts a very large cold gas reservoir ($\sim30-40$ kpc). Furthermore, one of our highest SNR line emitters in the GOODS-N field (GN19) and a galaxy with optical spectroscopic redshift (COLDz.GN.S1), also appear extended ($\sim40-70$ kpc) in CO observations due to a major gas-rich merger in this galaxy (see also \citealt{Riechers_GN19,Ivison_GN19}). The high incidence, two out of the eight most significant CO(1--0) sources, suggests that extended CO(1--0) sources may in fact be prevalent, in agreement with previous findings \citep{Riechers_GN19,Ivison_GN19}. Indeed, through the blind search we have selected other CO candidates which may be significantly extended, some of which might have been missed by previous blind line search techniques searching only for unresolved sources \citep{Decarli14,ASPECS1,ASPECS2}. The candidate CO lines span a large range in line FWHM, from $\sim60$ km s$^{-1}$ to $\sim800$ km s$^{-1}$, although the narrowest ones have not yet been independently confirmed. This demonstrates the need for the inclusion of a broad range in line width templates in order not to miss a significant fraction of the signal. The spread and distribution in the line FWHM we find is comparable to those previously measured (e.g., \citealt{Tacconi13}), although the occurrence of a particularly broad line (in COLDz.COS.2) in our limited, highest quality sample, suggest that there may be a larger incidence of broad lines in blindly selected CO sources, compared to optical/NIR selections. Nonetheless, due to the limited number of sources, this finding requires further, independent study. Although the molecular gas fraction estimates for the CO detections are comparable to expectations, the lack of CO detections for a number of massive galaxies with good quality spectroscopic redshifts and the detection of their stacked CO signal suggests that molecular gas mass fractions for typical Main Sequence galaxies may be somewhat lower than expected (Figure~\ref{fig:gas_frac}; \citealt{Genzel15,Scoville17}). A possible caveat to this interpretations may come from higher systematic uncertainty than expected of the optical spectroscopic redshifts used in the stacking, which may lead to missing a fraction of the CO flux in the stack. While this analysis could only be carried out on samples of galaxies with previous spectroscopic redshift measurements, its conclusion is in agreement with the finding from the blind search. In particular, if the gas mass fraction and hence the CO luminosity of the known galaxies (in addition to all other galaxies in the observed cosmic volume without spectroscopic redshifts) were closer to expectations, the number of blind CO detections would have been higher. Empirical predictions based on SED fitting and scaling relations suggest an expected number of CO emitters in the range 10--20 for our field in COSMOS and 5--15 for our field in GOODS-N \citep{daCunha_predict}. In addition, the high mass end of the galaxy distribution in our cosmic volume provides the strongest result for lower than expected gas masses, but also the full sample over the shown stellar mass range provides important constraints, compatible with a metallicity evolution in the CO conversion factor (Figure~\ref{fig:gas_frac}). The significant detection of CO emission from galaxies in the stack suggests that our dataset is rich in additional signal, that is too faint to be reliably blindly identified at the current depth, but which can be mined through spectroscopic observations at other wavelengths. We have therefore demonstrated the power of stacking the CO signal from galaxies with spectroscopic redshifts, in order to fully take advantage of the information in CO deep field data. We have also developed statistical methods (presented in Appendix F) to evaluate the purity, completeness and recovered candidate properties with higher accuracy than previous techniques. This enables us to infer the best constraints to date on the CO(1--0) luminosity function at $z\sim$2--3 (Paper~\rom{2}). With this CO deep field study, we also further demonstrate that blind CO searches are sensitive to ``optically dark", dust-obscured galaxies at very high redshift, such as GN10 and HDF850.1. In particular, the massive molecular gas reservoirs of these galaxies are among the largest in our field (Riechers et al., in prep.). Our sample of new, high-SNR CO(1--0) spectra for COLDz.COS1, 2 and 3 and for GN.S1 provides a significant contribution to the state of current CO(1--0) measurements of Main Sequence galaxies at $z>2$\footnote{The number of high SNR CO(1--0) detections in non-quasar hosts or sub-millimeter selected galaxies is very limited to-date \citep{Riechers10b, Aravena10, Aravena12, Aravena14, Bolatto15, Spilker16}.} (see Pavesi et al., in prep., for details). Finally, the Next Generation VLA (ngVLA) is necessary to significantly improve the constraints presented here (e.g., \citealt{Casey_ngVLA,Carilli_ngVLA, ngVLA_McKinnon, ngVLA_memo}). In particular, an equivalent survey in the 30--38 GHz range with five to ten-fold sensitivity improvement for point-source detection as provided by the ngVLA will allow reaching the depth of these observations in a small fraction of the time ($\sim1/50$), therefore routinely reaching depths of $\log(L'_{\rm CO}/L_\odot)\sim9.5$ in one to two hours of observation. The high survey speed of the ngVLA will uniquely enable the deep, wide area surveys which are necessary to build large statistical samples, currently inaccessible to the VLA. These future surveys will constrain the luminosity function to well below the knee, with percent precision, for a comparable observing effort as the present survey. A significant benefit of the ngVLA will also come from the planned smaller antennas, which increase the field of view for a fixed total collecting area, therefore enhancing the survey speed. In addition, the vast bandwidth of the ngVLA will allow us to simultaneously cover CO(1--0) emission over a large fraction of the age of the Universe, and will therefore allow us to probe CO(1--0) over the almost complete redshift range up to $z\sim$10. \smallskip \acknowledgments The National Radio Astronomy Observatory is a facility of the National Science Foundation operated under cooperative agreement by Associated Universities, Inc. DR and RP acknowledge support from the National Science Foundation under grant number AST-1614213 to Cornell University. RP acknowledges support through award SOSPA3-008 from the NRAO. We thank Tom Loredo for helpful discussion. IRS acknowledges support from the ERC Advanced Grant DUSTYGAL (321334), STFC (ST/P000541/1) and a Royal Society/Wolfson Merit Award. VS acknowledges support from the European Union's Seventh Frame-work program under grant agreement 337595 (ERC Starting Grant, CoSMass) RJI acknowledges ERC funding through Advanced Grant 321302 COSMICISM. This research has made use of the NASA/ IPAC Infrared Science Archive, which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration. This work is based on observations taken by the CANDELS Multi-Cycle and 3D-{\em HST} Treasury Program (GO 12177 and 12328) with the NASA/ESA {\em HST}, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS5-26555. We acknowledge funding towards the 3-bit samplers used in this work from ERC Advanced Grant 321302, COSMICISM. JAH acknowledges support of the VIDI research program with project number 639.042.611, which is (partly) financed by the Netherlands Organisation for Scientific Research (NWO). MTS acknowledges support from the Science and Technology Facilities Council (grant number ST/P000252/1). \bibliographystyle{aasjournal}
\section{Introduction} \begin{quote} ``If there be time to expose through discussion the falsehood and fallacies, to avert the evil by the processes of education, the remedy to be applied is more speech, not enforced silence.'' -- Louis Brandeis \end{quote} The advent of social media has brought several changes to our society. It allowed people to share their knowledge and opinions to a huge mass in a very short amount of time. While the social media sites have been very helpful, they have some unintended negative consequences as well. One such major issue is the proliferation of hate speech~\cite{massaro1990equality}. To tackle this problem, several countries have created laws against hate speech\footnote{Hate speech Laws: \url{https://goo.gl/tALXsH}}. Organizations such as Facebook, Twitter, and YouTube have come together and agreed to fight hate speech as well\footnote{\url{https://goo.gl/sH87W2}}. \subsection{Current protocols to combat hate speech and their limitations} One of the main tools that these organizations use to combat online hate speech is blocking or suspending the message or the user account itself. Although, several social media sites have taken strict actions to prohibit hate speech on websites they own and operate, they have not been very effective in this enterprise\footnote{\url{https://goo.gl/G7hNtS}, \url{https://goo.gl/zEu4aX}, \url{https://goo.gl/CFmsqM}}. At the same time, some have argued that one should not block/suspend free speech because selective free speech is a dangerous precedent. While blocking of hateful speech may reduce its impact on the society, one always has the risk of violation of free speech. Therefore, the preferred remedy to hate speech would be to add more speech ~\cite{richards2000counterspeech}. \subsection{Can countering hate speech be an effective solution?} This requirement led countries and organizations to consider countering of hate speech as an alternative to blocking~\cite{gagliardone2015countering}. The idea that `more speech' is a remedy for harmful speech has been familiar in liberal democratic thought at least since the U.S. Supreme Court Justice Louis Brandeis declared it in 1927. There are several initiatives with the aim of using counterspeech to tackle hate speech. For example, the Council of Europe supports an initiative called `No hate speech movement'\footnote{\label{nohate speechmovement}No hate speech Movement Campaign: \url{http://www.nohate speechmovement.org/}} with the aim to reduce the levels of acceptance of hate speech and develop online youth participation and citizenship, including in Internet governance processes. UNESCO released a study~\cite{gagliardone2015countering} titled `Countering Online Hate Speech', to help countries deal with this problem. Social platforms like Facebook have started counterspeech programs to tackle hate speech\footnote{\label{counterfb} Counterspeech Campaign by Facebook: \url{https://counterspeech.fb.com/en/}}. Facebook has even publicly stated that it believes counterspeech is not only potentially more effective, but also more likely to succeed in the long run ~\cite{bartlett2015counter}. Combating hate speech in this way has some advantages: it is faster, more flexible and responsive, capable of dealing with extremism from anywhere and in any language and it does not form a barrier against the principle of free and open public space for debate. \subsection{Working definition of counterspeech} In this paper, we define counterspeech as a direct response/comment (not reply to a comment) that \textit{counters} the hateful or harmful speech. Taking the YouTube videos that contain hateful content toward three target communities: {\sl Jews}, {\sl African-American} (\textit{Blacks}) and {\sl LGBT}, we collect user comments to create a dataset which contains counterspeech. To annotate this dataset, we use the different classes of counterspeech described in \citeauthor{susan2016counterspeech}~\shortcite{susan2016counterspeech} with a slight modification to the `Tone' category. While the paper includes all kinds of tones in this category, we split this class further into two categories: `Positive tone' and `Hostile language'. Note that when we say that a comment is a counterspeech to a video, we are focusing on the person about whom the video is about. The video may contain other people as well (such as an interviewer). \subsection{Our contributions and observations} We annotate and release the first ever dataset\footnote{\label{dataset_link} \textbf{The dataset and models are available here:} \url{https://github.com/binny-mathew/Countering_Hate_Speech_ICWSM2019}} on counterspeech. The dataset is based on counterspeech targeted to three different communities: {\sl Jews}, {\sl Blacks}, and {\sl LGBT}. It consists of 6,898 comments annotated as counterspeech and an additional 7,026 comments tagged as non-counterspeech. The counterspeech comments are further labeled into one or more of the categories listed in Table~\ref{tab:dataset_statistics}. While developing the dataset, we had several interesting observations. We find that overall counterspeech comments receive much more likes than non-counterspeech comments. Psycholinguistic analysis reveals striking differences between the language used by the users posting counter and non-counterspeech. We also observe that the different communities attract different proportions of counterspeech. `Humor' as a counterspeech seems to be more prevalent when {\sl LGBT} is the target community, while in case of the {\sl Jews} community, `Positive tone' of speech seems to be more widely used. As an additional contribution, we define three classification tasks for the dataset and develop machine learning models: (a) counterspeech vs non-counterspeech classification, in which XGBoost performs the best with an F1-score of 0.71, (b) multi-label classification of the types of counterspeech present in a given counterspeech text, in which XGBoost performs the best, (c) cross-community classification with an F1-score in the range 0.62 - 0.65. With these tasks and analysis, we hope that our research can help in reducing the spread of hate speech online. \section{Related work} In this section, we review some of the related literature. ``Counter-speech is a common, crowd-sourced response to extremism or hateful content. Extreme posts are often met with disagreement/conflicts, derision, counter campaigns''~\cite{bartlett2015counter,Maity:2018}. \citeauthor{citron2011intermediaries}~\shortcite{citron2011intermediaries} categorizes four ways in which one can respond to hateful messages -- (i) \textbf{Inaction:} By not responding to the hate speech, we might be actually causing more harm. It sends a message that people do not care about the target community. (ii) \textbf{Deletion/Suspension:} The removal of hate speech is the most powerful option available in response to hate speech. Removal of the hateful content is sometimes accompanied by the removal or suspension of the user account as well. This strategy is used by most of the social networks such as Facebook, Twitter, Quora, etc. (iii) \textbf{Education:} Institutions can help in educating the public about hate speech and its implications, consequences and how to respond. Programmes such as `NO HATE SPEECH' movement\footref{nohate speechmovement} and Facebooks Counterspeech program\footref{counterfb} help in raising awareness, providing support and seeking creative solutions. (iv) \textbf{Counterspeech:} Counterspeech is considered as the preferred remedy to hate speech as it does not violate the normative of free speech. While government or organizations rarely take part in counterspeech, a large proportion of the counterspeech is actually generated by the online users. Silence in response to digital hate carries significant expressive costs as well. When powerful intermediaries rebut demeaning stereotypes (like the Michelle Obama image) and invidious falsehoods (such as holocaust denial), they send a powerful message to readers. Because intermediaries often enjoy respect and a sense of legitimacy, using counterspeech, they can demonstrate what it means to treat others with respect and dignity~\cite{citron2011intermediaries}. While blocking might work as a counter at the individual scale, it might actually be detrimental for the community as a whole. Deletion of comments that seem hateful might affect a person's freedom of speech. Also, with blocking, it is not possible to recover from the damage that the message has already caused. Counterspeech can therefore be regarded as the most important remedy which is constitutionally preferred~\cite{benesch2014countering}. Counterspeech has been studied on social media sites like Twitter~\cite{wright2017vectors,susan2016counterspeech}, YouTube~\cite{ernst2017hate} and Facebook~\cite{schieb2016governing}. \citeauthor{wright2017vectors} ~\shortcite{wright2017vectors} study the conversations on Twitter, and find that some arguments between strangers lead to favorable change in discourse and even in attitudes. \citeauthor{ernst2017hate}~\shortcite{ernst2017hate} study the comments in YouTube counterspeech videos related to Islam and find that they are dominated by messages that deal with devaluating prejudices and stereotypes corresponding to Muslims and/or Islam. \citeauthor{schieb2016governing}~\shortcite{schieb2016governing} study counterspeech on Facebook and through simulation, find that the defining factors for the success of counterspeech are the proportion of the hate speech and the type of influence the counter speakers can exert on the undecided. \citeauthor{Stroud2018feminist}~\shortcite{Stroud2018feminist} perform case studies on feminist counterspeech. Another line of research considers ascertaining the success of the counterspeech. \citeauthor{susan2016successfullcounter}~\shortcite{susan2016successfullcounter} describes strategies that have favorable impact or are counterproductive on users who tweet hateful or inflammatory content. \citeauthor{munger2017tweetment}~\shortcite{munger2017tweetment} conducted an experiment to examine the impact of group norm promotion and social sanctioning on racist online harassment and found that subjects who were sanctioned by a high-follower in-group male significantly reduced their use of a racist slur. Our work is different from the existing literature in several ways. As noted in ~\cite{susan2016counterspeech}, the literature for counterspeech is pretty less. The existing literature on counterspeech have been qualitative and anecdotal in nature, while ours is the first work which tries to study counterspeech empirically. ~\cite{wright2017vectors} noted that ``Computational approaches are required in order to study and engage counterspeech efforts at scale and there is no work which perform automatic detection of counterspeech". In this work we attempt for the first time various learning algorithms to detect counterspeech. Further, one of our main contributions is that we release the first ever dataset for counterspeech identification. Our paper not only does the classification for the counterspeech task; we take it a step forward and do multi-label classification for various types of counterspeech. \section{Dataset} YouTube is one of the key online platforms on the Internet with 1.5 billion logged-in users visiting the site every month\footnote{\url{http://goo.gl/eEqWAt}}. Many of these videos contain hate speech targeted toward various communities. In this paper, we focus on such hateful videos and scrape their comment section. \subsection{Data collection from YouTube} In order to gather a diverse dataset, we focus on three target communities: {\sl Jews}, {\sl Blacks}, and {\sl LGBT}. The first step in our work involved finding videos that contained hateful content. In order to find such videos, we searched YouTube for phrases such as `I hate Jews', `I hate blacks' etc. We then manually select videos\footref{dataset_link} that contain some act of hate against one of these communities. Next, we use the YouTube comment scraper\footnote{YouTube Comment Scrapper: \url{http://ytcomments.klostermann.ca/}} to collect all the comments from the selected videos. Each comment had fields such as the comment text, username, date, number of likes, etc. \subsection{Dataset annotation} Annotations were performed by a group of two PhD students working in the area of social computing and three undergraduate students in computer science with ages ranging between 21-30. There are different types of counterspeech that have different effects on the user. In order to understand the differences between them, we annotate the dataset at two levels. \noindent\textbf{First level annotation:} In the first level, we select comments from the hate speech video and ask the annotators to annotate each of these comments as a counter/non-counter to the hate message/action in the video. We define a comment as counterspeech if it opposes the hatred expressed in the video. We only consider those comments which are direct response to the video and ignore all the replies to these comments as we observe that they usually tend to drift off-topic and the discussion becomes more personal and noisy. Each comment has been annotated by two users and the conflicting cases have been resolved by a third annotator. We achieve 90.23\% agreement between the two annotators with a Cohen's $\kappa$ of 0.804. As a result of this step, we arrive at 6,898 counterspeech comments and 7,026 non-counterspeech comments. To our surprise, we find that 49.5\% of the direct responses to the selected hate videos are counterspeech. \noindent\textbf{Second level annotation:} In order to obtain a deeper understanding of the types of counterspeech, we perform a second level annotation. We give the annotators a counterspeech text and ask them to label all the types of counterspeech that are present in it. We use the taxonomy of counterspeech described in \citeauthor{susan2016counterspeech}~\shortcite{susan2016counterspeech} for this purpose. For ease of readability we describe these categories in the subsequent section. Two independent annotators tagged each comment annotated as counterspeech in the first level into appropriate types. We obtain a loose $\kappa$ score of 0.868 and a strict $\kappa$ score of 0.743 for this task~\cite{ravenscroft2016multi}. We employ a third annotator for deciding on the conflicting cases. The final distribution of the different types of counterspeech is noted in Table~\ref{tab:dataset_statistics}. \begin{table}[htb] \centering \resizebox{0.95\columnwidth}{!}{\begin{tabular}{|l|c|c|c|c|c|} \hline &\multicolumn{3}{|c|}{Target community}& Total\\ \hline Type of counterspeech & {\sl Jews} & {\sl Blacks} & {\sl LGBT} & \\ \hline Presenting facts & 308 & 85 & 359 & 752 \\ Pointing out hypocrisy or contradictions & 282 & 230 & 526 & 1038 \\ Warning of offline or online consequences & 112 & 417 & 199 & 728 \\ Affiliation & 206 & 159 & 200 & 565 \\ Denouncing hateful or dangerous speech & 376 & 482 & 473 & 1331 \\ Humor & 227 & 255 & 618 & 1100 \\ Positive tone & 359 & 237 & 268 & 864 \\ Hostile & 712 & 946 & 1083 & 2741 \\ \hline Total & 2582 & 2811 & 3726 & 9119 \\ \hline \end{tabular}} \caption{Statistics of the counterspeech dataset. Numbers corresponding to each of the target community, grouped as per the type of counterspeech are shown. Note that if a comment utilizes multiple strategies, we would include that particular comment in all the corresponding counterspeech types. Thus, we have a total of 9,119 counterspeech from 6,898 comments.} ~\label{tab:dataset_statistics} \end{table} \subsection{Types of counterspeech} There are numerous strategies that could be used to counter the hateful messages in the online social media. \citeauthor{susan2016counterspeech}~\shortcite{susan2016counterspeech} distinguishes eight such strategies that are used by counterspeakers. We decided on using these eight types of counterspeech with a slight modification to the category `Tone'. The authors have considered the whole spectrum of Tone as a single category. While one end of the spectrum (`Hostile') can cause the original speaker to delete his post/account and thus is unlikely to de-escalate the conversation, the other end of the spectrum (`Positive tone') could help in generating a positive attitude and thus de-escalate the conversation. So, we decided to divide the `Tone' category into `Positive tone' and `Hostile language' categories for our work. Note that a single comment can consist of multiple types of counterspeech as shown in Figure~\ref{fig:counter_multi_response}. Also, the types of countespeech strategies discussed here are not comprehensive; there could be other types as well. In this paper, we focus on just these eight types of counterspeech. Below, we discuss these various categories. \begin{figure}[h!] \centering \includegraphics[width=.95\columnwidth]{Figures/Multiple_Response} \caption{An example comment containing two types of counterspeech: \textit{affiliation} and \textit{empathy}. This comment was in response to a interview video in which the interviewee (Kirk) says that homosexuality is unnatural, detrimental and destructive to the society.} \label{fig:counter_multi_response} \end{figure} \noindent\textbf{Presenting facts to correct misstatements or mis-perceptions:} In this strategy, the counterspeaker tries to persuade by correcting misstatements. An example of this type of counterspeech toward the {\sl LGBT} community from our dataset is as follows:~\textquotedblleft \textit{Actually homosexuality is natural. Nearly all known species of animal have their gay communities. Whether it be a lion or a whale, they have or had (if they are endangered) a gay community. Also marriage is an unnatural act. Although there are some species that do have longer relationships with a partner most known do not}\textquotedblright. This comment was in response to a interview video in which the interviewee says that homosexuality is unnatural, detrimental and destructive to the society. \noindent\textbf{Pointing out hypocrisy or contradictions:} In this strategy, the counterspeaker points out the hypocrisy or contradiction in the user's (hate) statements. In order to discredit the accusation, the individual may explain and rationalize their previous behavior, or if they are persuadable, resolve to avoid the dissonant behavior in the future~\cite{beauvois1993cognitive}. An example of this type of counterspeech toward {\sl LGBT} community from our dataset is as follows: \textquotedblleft \textit{The `US Pastor' can't accept gays because the Bible says not to be gay. But...he ignores:The thing about eating shrimp or pork, The thing about touching the skin of a dead pig (Football), The thing about mixing fabrics, The thing about torn clothes, The thing about tattoos, The thing about planting two crops in one field, The thing about working on the Holy Day (Saturday or Sunday depending)...for any and all of those sins one should burn for an eternity, yet is ignored. But when it comes to loving the wrong person (gays) this will not do! Christians only follow the parts of the bible that supports their bigotry. YOUR A HYPOCRITE.} \textquotedblright. This comment was in response to a interview video in which the interviewee encourages hate against homosexual people. \noindent\textbf{Warning of offline or online consequences:} In this strategy, counterspeaker warns the user of possible consequences of his/her actions. This can sometimes cause the original speaker of the hate speech to retract from his/her original opinion. An example of this type of counterspeech toward the {\sl LGBT} community from our dataset is as follows: \textquotedblleft \textit{I'm not gay but nevertheless, whether You are beating up someone gay or straight, it is still an assault and by all means, this preacher should be arrested for sexual harassment and instigating!!!} \textquotedblright. This comment was in response to a video in which a preacher advised people to beat the kids if they are gay. \noindent\textbf{Affiliation:} Affiliation is \textquotedblleft...establishing, maintaining, or restoring a positive affective relationship with another person or group of persons\textquotedblright ~\cite{byrne1961anxiety}. People are more likely to credit the counterspeech of those with whom they affiliate, since they tend to ``evaluate ingroup members as more trustworthy, honest, loyal, cooperative, and valuable to the group than outgroup members'' ~\cite{kane2005knowledge}. In our dataset, couterspeakers who use {\sl Affiliation} receive the highest number of likes for their comments among all the counterspeech types. An example of this type of counterspeech toward the {\sl LGBT} community from our dataset is as follows:~\textquotedblleft \textit{Hey I'm Christian and I'm gay and this guy is so wrong. Stop the justification and start the accepting. I know who my heart and soul belong to and that's with God: creator of heaven and earth. We all live in his plane of consciousness so it's time we started accepting one another. That's all} \textquotedblright. This comment was in response to a interview video in which the interviewee encourages hate against homosexual people. \noindent\textbf{Denouncing hateful or dangerous speech:} In this strategy, the counterspeakers denounce the message as being hateful. This strategy can help the counterspeakers in reducing the impact of the hate message. An example of this type of counterspeech toward {\sl Jews} community from our dataset is as follows: \textquotedblleft \textit{please take this down YouTube. this is hate speech.} \textquotedblright. This comment was in response to a video in which a preacher is advocating hatred and killing of Jewish people. \begin{figure*}[!ht] \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/Blacks_Counter_Number_of_Likes_Mean} \caption{{\sl Blacks} community likes} \label{fig:sfig2} \end{subfigure}% \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/Jews_Counter_Number_of_Likes_Mean} \caption{{\sl Jews} community likes} \label{fig:sfig3} \end{subfigure}% \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/LGBT_Counter_Number_of_Likes_Mean} \caption{{\sl LGBT} community likes} \label{fig:sfig4} \end{subfigure}% \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/Blacks_Counter_Number_of_Replies_Mean} \caption{{\sl Blacks} community replies} \label{fig:sfig6} \end{subfigure}% \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/Jews_Counter_Number_of_Replies_Mean} \caption{{\sl Jews} community replies} \label{fig:sfig7} \end{subfigure}% \begin{subfigure}{.7\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/LGBT_Counter_Number_of_Replies_Mean} \caption{{\sl LGBT} community replies} \label{fig:sfig8} \end{subfigure}% \caption{Plots showing average number of likes and replies received by different types of counterspeech in the three communities. The whiskers represent 95\% confidence interval.} \label{fig:avg_likes_comments} \end{figure*} \noindent\textbf{Humor and sarcasm:} Humor is one of the most powerful tools used by the counterspeakers to combat hate speech. It can de-escalate conflicts and can be used to garner more attention toward the topic. Humor in online settings also eases hostility, offers support to other online speakers, and encourages social cohesion~\cite{marone2015online}. Often, the humor is sarcastic, like the following counterspeech comment subscribing the {\sl LGBT} community from our dataset:~\textquotedblleft \textit{HAHAHAHAHAHAHAH...oh you were serious. That's even funnier :)}\textquotedblright. This comment was in response to a video in which a preacher advocates hate and killing of homosexual people. \noindent\textbf{Positive tone:} The counterspeaker uses a wide variety of tones to respond to hate speech. In this strategy, we consider different forms of speech such as empathic, kind, polite, or civil. Increasing empathy with members of opposite groups counteracts incitement~\cite{benesch2014countering}. We would like to point out that the original authors actually defined Tone to contain hostile counterspeech as well. Instead, we decide to make `Hostile language' as a separate type of counterspeech. An example of this type of counterspeech toward {\sl Jews} community from our dataset is as follows:~\textquotedblleft \textit{I am a Christian, and I believe we're to love everyone!! No matter age, race, religion, sex, size, disorder...whatever!! I LOVE PEOPLE!! We are not going to go anywhere as a country if we don't put God first in our lives, and treat EVERYONE with respect}\textquotedblright. This comment was in response to a video in which a preacher is advocating hatred and killing of Jewish people. \noindent\textbf{Hostile language:} In this strategy, the counterspeaker uses abusive, hostile, or obscene comments in response to the original hate message. Such a response can persuade an original speaker to delete his message or even a whole account, but is unlikely to either de-escalate the conversation or persuade the original speaker to recant or apologize. An example of this type of counterspeech toward {\sl African-American} from our dataset is as follows:~\textquotedblleft \textit{This is ridiculous!!!!!! I hate racist people!!!! Those police are a**holes!!!}\textquotedblright. This comment was in response to a video in which the police are performing a hate crime against. \section{Detailed analysis} In this section, we perform a detailed analysis over the dataset. We observe that 71.24\% of the counterspeech comments belong to exactly one counterspeech category. Thus, majority of the counterspeakers rely on a single strategy for counterspeech. As noted in Table~\ref{tab:dataset_statistics}, different communities attract different types of counterspeech. We observe that `Hostile language' is the major category among all the classes and is present in around 39.74\% of the counterspeech. Other than that, the counterspeakers for the {\sl Jews} community seem to be using `Positive tone' strategy in their counterspeech more often, while the counterspeakers of the {\sl LGBT} community more often use `Humor' and `Pointing out hypocrisy or contradiction' to tackle the hate speech. \begin{figure*}[!ht] \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_1.png} \caption{Presenting facts} \label{fig:wordcloud_category1_black} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_2.png} \caption{Pointing out hypocrisy} \label{fig:wordcloud_category2_black} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_3.png} \caption{Warning of consequences} \label{fig:wordcloud_category3_black} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_4.png} \caption{Affiliation} \label{fig:wordcloud_category4_black} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_5.png} \caption{Denouncing speech} \label{fig:wordcloud_category5_black} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_7.png} \caption{Humor and sarcasm} \label{fig:wordcloud_category6_black} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_8.png} \caption{Positive tone} \label{fig:wordcloud_category7_black} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/black_9.png} \caption{Hostile language} \label{fig:wordcloud_category8_black} \end{subfigure}% \caption{Word clouds for the different types of counterspeech used by the counterspeaker for hate speech against \textbf{Blacks}.} \label{fig:wordcloud_counterspeech_type_black} \end{figure*} \subsection{Likes and comments} We first analyze the comments as per the likes and comments received. We consider two groups - counterspeech comments and non-counterspeech comments. For our analysis, we also perform Mann–Whitney U test~\cite{mann1947test} to compare the two distributions. On average, we find counterspeech comments in our data receiving 3.0 likes, in contrast to non-counterspeech comments receiving 1.73 likes, which is very less as compared to the counterspeech ($p\sim0.0$). Similarly, we investigate into the number of replies received and find that counterspeech comments receive more replies (average: $1.94$) than non-counterspeech comments (average: $1.50$). However, the differences were not as significant ($p>0.1$). We would also like to point out that the average likes and replies in YouTube videos are generally less. In ~\cite{thelwall2012commenting}, the authors analyze large samples of text comments in YouTube videos. They found that 23.4\% of YouTube comments in complete comment sets are replies (called reply-density). The authors also analyzed the types of videos receiving the least and the most replies and found that videos pertaining to news, politics, and religion are at the top. This point is exemplified by our dataset where we found the reply density to be 45.17\%, which is almost double of a normal YouTube video. If we consider just the counterspeech comments, the reply density is even higher at 72.07\%. Due to the controversial nature of the content, it is expected to generate such discussion. We can thus state that our dataset is representative enough. In another work by ~\cite{siersdorfer2014analyzing}, the authors analyzed over 6 million comments from 67,290 videos and found the average rating to be 0.61. This is much less than the average 3.0 likes for our counterspeech comments. We view the likes received by the counterspeech comments as an endorsement by the community. In this sense, we can observe from Figure~\ref{fig:avg_likes_comments} that different communities seem to like different types of counterspeech. In case of the \textit{African-American} community, the average likes received by the counterspeech category which `Warn of offline/online consequences' and `Denouncing of hateful/dangerous speech' seem to be more as compared to the other types. In these counterspeech comments, the counterspeakers call out for racism and talk about how the person in focus could be sued for his actions. In case of the \textit{Jews} community, `Affiliation' seems to be the most endorsed form of counterspeech. In the comments, we observe that the people affiliate with both the target and the source community (`Muslims', `Christians') to counter the hate message. In some of the comments, the counterspeakers identify themselves as belonging to the same community as that of the hate speaker and claim that the hate message is unacceptable. Previous works have shown that these kinds of counterspeech are successful in changing the attitude of the hate speaker~\cite{berger2013matters,munger2017tweetment}. In case of the \textit{LGBT} community, we can observe that the community endorses several types of counterspeech with the `Humor' and `Pointing out hypocrisy or contradiction' receiving more average likes than others. In these comments, the counterspeakers make use of sarcasm and provide several points which contradict the statements expressed by the hate speaker. \subsection{Lexical analysis} To understand the language used in each type of counterspeech, we look into the words that are employed by the counterspeakers. We observe that some of the words such as \textit{Islam, Jew, People, Muslim, Black} were present in all the categories with high frequency. In order to filter out such words that are common in all categories, we use the tf-idf method. First, we generate a tf-idf matrix using the whole corpus. Then, for each type of counterspeech, we use the matrix to rank the words according to their tf-idf values. We display the top 200 words present in each type of counterspeech. The size of a word is proportional to its tf-idf value. We observe from the figures (summarized below) that the words present are representative of the categories that they belong to. In Figure~\ref{fig:wordcloud_counterspeech_type_black}, we plot the word cloud for the different types of counterspeech employed for the African-American community. Observe the presence of words such as `Illogical' in Figure~\ref{fig:wordcloud_category2_black}, `Sue', `Lawyer' in Figure~\ref{fig:wordcloud_category3_black}, `Im', `Friend' in Figure~\ref{fig:wordcloud_category4_black}, `Race', `Racist' in Figure~\ref{fig:wordcloud_category5_black}, `Oh', `Funny' in Figure~\ref{fig:wordcloud_category6_black}, `Sorry', `Feel', `Heart' in Figure~\ref{fig:wordcloud_category7_black}. In Figure~\ref{fig:wordcloud_counterspeech_type_lgbtq}, we plot the word cloud for the different types of counterspeech employed for the LGBT community. Observe the presence of words such as `Hypocrite' in Figure~\ref{fig:wordcloud_category2_lgbtq}, `Arrest', `Die', `Meet' in Figure~\ref{fig:wordcloud_category3_lgbtq}, `Im', `Christian', `Support' in Figure~\ref{fig:wordcloud_category4_lgbtq}, `Hatred', `Bigot' in Figure~\ref{fig:wordcloud_category5_lgbtq}, `Lmao', `Funny' in Figure~\ref{fig:wordcloud_category6_lgbtq}, `Happiness', `Love' in Figure~\ref{fig:wordcloud_category7_lgbtq}. In Figure~\ref{fig:wordcloud_counterspeech_type_jew}, we plot the word cloud for the different types of counterspeech employed for the Jews community. Observe the presence of words such as `Paradoxical' in Figure~\ref{fig:wordcloud_category2_jew}, `Deporting', `Enforcement', `Jail', and `Fbi' in Figure~\ref{fig:wordcloud_category3_jew}, `Im', `Ur', `Love' in Figure~\ref{fig:wordcloud_category4_jew}, `Hatred', `Racist' in Figure~\ref{fig:wordcloud_category5_jew}, `Lol', `Funny' in Figure~\ref{fig:wordcloud_category6_jew}, `Bless', `Love' in Figure~\ref{fig:wordcloud_category7_jew}. \begin{figure*}[!ht] \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_1.png} \caption{Presenting facts} \label{fig:wordcloud_category1_lgbtq} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_2.png} \caption{Pointing out hypocrisy} \label{fig:wordcloud_category2_lgbtq} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_3.png} \caption{Warning of consequences} \label{fig:wordcloud_category3_lgbtq} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_4.png} \caption{Affiliation} \label{fig:wordcloud_category4_lgbtq} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_5.png} \caption{Denouncing speech} \label{fig:wordcloud_category5_lgbtq} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_7.png} \caption{Humor and sarcasm} \label{fig:wordcloud_category6_lgbtq} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_8.png} \caption{Positive tone} \label{fig:wordcloud_category7_lgbtq} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/lgbt_9.png} \caption{Hostile language} \label{fig:wordcloud_category8_lgbtq} \end{subfigure}% \caption{Word clouds for the different types of counterspeech used by the counterspeaker for hate speech against \textbf{LGBT}.} \label{fig:wordcloud_counterspeech_type_lgbtq} \end{figure*} \begin{figure*}[!ht] \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_1.png} \caption{Presenting facts} \label{fig:wordcloud_category1_jew} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_2.png} \caption{Pointing out hypocrisy} \label{fig:wordcloud_category2_jew} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_3.png} \caption{Warning of consequences} \label{fig:wordcloud_category3_jew} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_4.png} \caption{Affiliation} \label{fig:wordcloud_category4_jew} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_5.png} \caption{Denouncing speech} \label{fig:wordcloud_category5_jew} \end{subfigure} \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_7.png} \caption{Humor and sarcasm} \label{fig:wordcloud_category6_jew} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_8.png} \caption{Positive tone} \label{fig:wordcloud_category7_jew} \end{subfigure}% \begin{subfigure}{.5\columnwidth} \centering \includegraphics[width=\columnwidth]{Figures/jew_9.png} \caption{Hostile language} \label{fig:wordcloud_category8_jew} \end{subfigure}% \caption{Word clouds for the different types of counterspeech used by the counterspeaker for hate speech against \textbf{Jews}.} \label{fig:wordcloud_counterspeech_type_jew} \end{figure*} \subsection{Psycholinguistic analysis} The language that online users choose, provides important psychological cues to their thought processes, emotional states, intentions, and motivations~\cite{tausczik2010psychological}. The LIWC tool\footnote{LIWC : \url{http://liwc.wpengine.com/}} helps in understanding several psycholinguistic properties used in the text. In order to understand the psycholinguistic differences, we apply LIWC (i.e., the fraction of words in different linguistic and cognitive dimensions identified by the LIWC tool) on both counter and non-counter comments. Finally, we look for statistically significant differences between these two groups with respect to the above analysis. We run Mann–Whitney U test~\cite{mann1947test} and report the significantly different categories in Table~\ref{tab:liwc_analysis}. We observe several LIWC categories that show significant differences between counter and non-counter comments. The `spoken' category of LIWC (`assent' and `non-fluencies') is more pronounced in non-counterspeech, whereas `affective processes' (`anxiety', `anger', `sadness', `negative emotion' and `affect') are more strong in counterspeech. `Personal concern' (`religion', `achievement', `work', `leisure', and `money') is more pronounced in non-counter comments. The `biological processes' (`body', `health', `sexual'), on the other hand, seems to be more dominant in the language of the counterspeakers. \begin{table}[!b] \centering \resizebox{\linewidth}{!}{\begin{tabular}{| p{3cm} |p{2.2cm} | p{2cm} |p{2.2cm}|p{1.5cm}|} \hline Dimension &Category & Counter (mean) & Non-counter (mean) & Significance Level\\ \hline \multirow{ 6}{*}{Personal concerns}&Achiev & \cellcolor{red!20}0.334 & \cellcolor{green}\textbf{0.383}&* \\ &Work & \cellcolor{red!20}0.316 & \cellcolor{green}\textbf{0.397}&**\\ &Leisure & \cellcolor{red!20}0.179 & \cellcolor{green}\textbf{0.251}&*\\ &Home & \cellcolor{green}\textbf{0.057} & \cellcolor{red!20}0.046&***\\ &Money & \cellcolor{red!20}0.123 & \cellcolor{green}\textbf{0.152}&**\\ &Relig & \cellcolor{red!20}1.148 & \cellcolor{green}\textbf{1.362}&***\\ \hline \multirow{ 3}{*}{Spoken categories}&Assent & \cellcolor{red!20}0.080 & \cellcolor{green}\textbf{0.095}&** \\ &Nonflu & \cellcolor{red!20}0.021 & \cellcolor{green}\textbf{0.031}&*** \\ &Filler & \cellcolor{green}\textbf{0.162} & \cellcolor{red!20}0.136&*** \\ \hline \multirow{ 3}{*}{Biological processes}&Body& \cellcolor{green}\textbf{0.263} & \cellcolor{red!20}0.175&*** \\ &Health& \cellcolor{green}\textbf{0.131} & \cellcolor{red!20}0.108&*** \\ &Sexual & \cellcolor{green}\textbf{0.461} & \cellcolor{red!20}0.357&*** \\ \hline \multirow{ 1}{*}{Perceptual processes}&See& \cellcolor{red!20}0.382 & \cellcolor{green}\textbf{0.391}&* \\ &Hear& \cellcolor{red!20}0.259 & \cellcolor{green}\textbf{0.306}&*** \\ &Feel& \cellcolor{green}\textbf{0.084} & \cellcolor{red!20}0.078&*** \\ \hline \multirow{ 3}{*}{Cognitive processes}&Insight & \cellcolor{green}\textbf{0.660} & \cellcolor{red!20}0.586&*** \\ &Discrep & \cellcolor{green}\textbf{0.626} & \cellcolor{red!20}0.586&*** \\ &Certain& \cellcolor{red!20}0.551 & \cellcolor{green}\textbf{0.655}&*** \\ &Incl& \cellcolor{red!20}1.400 & \cellcolor{green}\textbf{1.417}&* \\ &Excl& \cellcolor{red!20}0.976 & \cellcolor{green}\textbf{1.067}&** \\ \hline \multirow{ 6}{*}{Affective processes}&Anx & \cellcolor{green}\textbf{0.121} & \cellcolor{red!20}0.086 &***\\ &Negemo & \cellcolor{green}\textbf{1.429} & \cellcolor{red!20}1.089 &***\\ &Posemo & \cellcolor{red!20}1.066 & \cellcolor{green}\textbf{1.149}&*** \\ &Affect& \cellcolor{green}\textbf{2.488} & \cellcolor{red!20}2.217 &***\\ &Anger & \cellcolor{green}\textbf{0.937} & \cellcolor{red!20}0.654 &***\\ &Sad & \cellcolor{green}\textbf{0.093} & \cellcolor{red!20}0.079 &**\\ \hline \multirow{ 1}{*}{Social processes}&Humans& \cellcolor{green}\textbf{0.759} & \cellcolor{red!20}0.621 &***\\ &Family & \cellcolor{green}\textbf{0.113} & \cellcolor{red!20}0.105 &***\\ &Friends & \cellcolor{green}\textbf{0.042} & \cellcolor{red!20}0.033 &***\\ \hline \multirow{13}{*}{Linguistic processes}&Funct& \cellcolor{red!20}17.013 & \cellcolor{green}\textbf{17.811} &***\\ &Swear & \cellcolor{green}\textbf{0.353} & \cellcolor{red!20}0.164 &***\\ &I& \cellcolor{green}\textbf{0.658} & \cellcolor{red!20}0.543 &***\\ &Ipron & \cellcolor{green}\textbf{2.006} & \cellcolor{red!20}1.951 &***\\ &Negate & \cellcolor{red!20}0.779 & \cellcolor{green}\textbf{0.859} &***\\ &Past & \cellcolor{red!20}0.746 & \cellcolor{green}\textbf{0.941} &***\\ &Present & \cellcolor{green}\textbf{3.389} & \cellcolor{red!20}3.301&*** \\ &Pronoun& \cellcolor{green}4.281 & \cellcolor{red!20}\textbf{4.161}&*** \\ &They & \cellcolor{red!20}0.441 & \cellcolor{green}\textbf{0.566} &***\\ &Verbs & \cellcolor{red!20}4.888 & \cellcolor{green}\textbf{4.957} &***\\ &You & \cellcolor{red!20}0.517 & \cellcolor{green}\textbf{0.541}&* \\ &SheHe & \cellcolor{green}\textbf{0.683} & \cellcolor{red!20}0.578&*** \\ \hline \end{tabular}} \caption{LIWC analysis of the counter and non-counter comments. Only those LIWC categories are shown which are statistically significant: $p < 0.05$ (*), $p < 0.01$ (**), $p < 0.001$ (***). Note that each LIWC category is either dense in green cells (red cells) for the counter (non-counter) comments or for the non-counter (counter) comments.} ~\label{tab:liwc_analysis} \end{table} \section{Classification model} We consider three classification tasks that naturally manifest in this problem context. The first task is a binary classification problem in which we present the system with a comment and the task is to predict whether the comment is a counterspeech or non-counterspeech. The second one is a multi-label classification task in which we present the system with a known counterspeech comment and the task is to predict all the types of counterspeech present in the comment. The third task is similar to first, except that it is cross-community, i.e., while the training data is drawn from two of the three communities, the test data is drawn from the remaining community. \noindent\textbf{Preprocessing:} Before the classification, we preprocess all the data by eliminating URLs, numerals, stopwords and punctuations\footnote{We did not observe any significant change in the scores by including the stopwords and punctuations.}. The text is then lower cased, tokenized and used as input for the classification pipeline. \noindent\textbf{Features:} For the task of classification we use \textit{tf-idf} vectors (TF-IDF), \textit{bag of words} vectors (BoWV) and \textit{sentence} vectors (SV). The BoWV approach uses the average of the GloVe~\cite{pennington2014glove} word embeddings to represent a sentence. We set the size of the vector embeddings to 300. The sentence vector is generated using a Universal Sentence Encoder~\cite{cer2018universal} which outputs a 512 dimensional vector representation of the text. Recent works~\cite{conneau2017supervised} have shown better performance using pre-trained sentence level embeddings as compared to word level embeddings. \noindent\textbf{Choice of classifiers:} We experiment with multiple classifiers such as Gaussian Naive Bayes (GNB), Random Forest (RF), Logistic Regression (LR), SVMs, XGBoost (XGB), CatBoost (CB)~\cite{dorogush2017catboost}, Decision Tree (DT), and neural models such as Multi-layer Perceptron (MLP), LSTM. \subsection{Counterspeech classification} In this task, a binary classifier is built to predict if the given input text is a counterspeech or non-counterspeech. We perform stratified 10-fold cross validation on the dataset. The whole training set is partitioned into 10 folds, one is set apart for testing, and the remaining nine are used to train the model and evaluate it on the test fold. The process is repeated 10 times until each fold is used for testing exactly once. We use a held-out validation set to fine tune the parameters of the classifier. The results are computed from the 10 tests and the means and standard deviations of different evaluation measures are reported in Table~\ref{tab:prediction_task1_results}. We use accuracy along with weighted precision, recall, and F1-score as the evaluation measure. Among the different features, we observe that sentence vectors seem to be performing much better than BoWV and TF-IDF in most of the cases. We got the best performance using XGBoost along with SV+TF-IDF+BoWV as features. Classifiers such as MLP and CatBoost also performed comparably well. Our best performing model achieves an accuracy of 71.6\%. In the table we show some of the best results obtained using different classifier choices. The results from all the different classifiers and the different feature types are available\footref{dataset_link}. \begin{table}[!h] \centering \resizebox{\linewidth}{!}{\begin{tabular}{| l | l | l |l| l|} \hline Method & Precision & Recall & F1-Score & Accuracy \\ \hline \hline \rowcolor{green} XGB+SV+TF-IDF+BOWV & 0.716(+/-0.038) & 0.715(+/-0.039) & 0.715(+/-0.04) & 0.716(+/-0.038) \\ \rowcolor{green!30} MLP+SV+TF-IDF & 0.714(+/-0.031) & 0.713(+/-0.033) & 0.713(+/-0.033) & 0.714(+/-0.032) \\ \rowcolor{green!10} CB+SV+TF-IDF+BOWV & 0.708(+/-0.04) & 0.706(+/-0.043) & 0.705(+/-0.043) & 0.707(+/-0.042) \\ RF+SV+TF-IDF+BOWV & 0.697(+/-0.043) & 0.693(+/-0.045) & 0.692(+/-0.046) & 0.695(+/-0.044)\\ SVC+SV+TF-IDF+BOWV & 0.693(+/-0.029) & 0.691(+/-0.03) & 0.691(+/-0.03) & 0.692(+/-0.029) \\ \hline \end{tabular}} \caption{Classification scores for the task of predicting if the given comment is counterspeech or non-counterspeech. The values reported are the means and standard deviations over 10-folds for each of the evaluation metric.} ~\label{tab:prediction_task1_results} \end{table} \subsection{Counterspeech type classification} Here, we build models for a multi-label classification task in which the input to the classifier is a counter comment and the output are the types of counterspeech present in the comment. As a baseline, we use $General_B$~\cite{metz2012estimation} which predicts the top most frequent labels of the dataset based on the cardinality\footnote{Cardinality represents the average size of the multi-labels in the dataset, which is 1.32 in our case. We follow the same procedure as the authors and take the closest integer value of the cardinality as the cardinality of the dataset (which will be 1).} of the dataset. For our dataset, only the most frequent label `Hostile language' was predicted to be relevant. The performance of a multi-label classifier should be always assessed by means of several evaluation metrics~\cite{madjarov2012extensive}. In this paper, the multi-label classifiers are evaluated using five measures: accuracy, precision, recall, F1-score and hamming loss~\cite{godbole2004discriminative,schapire2000boostexter}. Accuracy is defined as the proportion of predicted \textit{correct} labels to the \textit{total} number of labels, averaged over all instances. \begin{equation} Accuracy = \frac{1}{\mid D \mid} \displaystyle\sum\limits_{i=1}^{\mid D \mid} \frac{\mid Y_i \cap Z_i \mid }{\mid Y_i \cup Z_i \mid } \label{Precision1} \end{equation} Precision is defined as the proportion of predicted \textit{correct} labels to the total number of \textit{actual} labels, averaged over all instances \begin{equation} Precision = \frac{1}{\mid D \mid} \displaystyle\sum\limits_{i=1}^{\mid D \mid} \frac{\mid Y_i \cap Z_i \mid }{\mid Z_i \mid } \label{Precision2} \end{equation} Recall is defined as the proportion of predicted \textit{correct} labels to the total number of \textit{predicted} labels, averaged over all instances \begin{equation} Recall = \frac{1}{\mid D \mid } \displaystyle\sum\limits_{i=1}^{\mid D \mid } \frac{\mid Y_i \cap Z_i \mid}{\mid Y_i \mid} \label{Recall} \end{equation} F1-score is defined simply as the harmonic mean of precision and recall. \begin{equation} \textit{F1-score} = 2 * \frac{Precision * Recall}{Precision + Recall} \label{F1} \end{equation} Hamming loss is equal to 1 over $|D|$ (number of multi-label samples), multiplied by the sum of the symmetric differences between the predictions ($Z_i$) and the true labels ($Y_i$), divided by the number of labels (L), giving \begin{equation}\small Hamming\textrm{ }Loss = \frac{1}{|D|} \displaystyle\sum\limits_{i=1}^{|D|} \frac{|Y_i \Delta Z_i|}{|L|} . \label{HL} \end{equation} All these performance measures have values in the interval $[0 ... 1]$. For Hamming loss, the smaller the value, the better the multi-label classifier performance is, while for the other measures, the greater values indicate better performance. For the multi-label classification, we perform multi-label stratified\footnote{\url{https://github.com/trent-b/iterative-stratification}} 10-fold cross validation ~\cite{sechidis2011stratification} on the dataset. The whole training set is partitioned into 10 folds, one is set apart for testing, and the remaining nine are used to train the model and evaluate it on the test fold. The process is repeated 10 times until each fold is used for testing exactly once. We use a held-out validation set to fine tune the parameters of the classifier. The results are computed from the 10 tests and the means and standard deviations of different evaluation measures are reported in Table~\ref{tab:prediction_task2_results}. We obtain the best performance on using XGBoost with SV+TF-IDF+BoWV as the feature set.The results from all the different classifiers and the different feature types are available\footref{dataset_link}. \begin{table}[!htbp] \resizebox{\linewidth}{!}{\begin{tabular}{| p{2.0cm} | l|l|l|l|p{2.3cm}|} \hline Method & Accuracy & Precision & Recall & F1-Score & Hamming Loss \\ \hline $General_B$ & 0.322 & 0.397 & 0.322 & 0.356 & \cellcolor{green!30}0.191 \\ XGB+SV+TF-IDF+BOWV & \cellcolor{green}0.472(+/-0.012) & \cellcolor{green}0.509(+/-0.012) & \cellcolor{green!30}0.733(+/-0.011) & \cellcolor{green}0.601(+/-0.011) & 0.212(+/-0.015) \\ MLP+SV+TF-IDF & \cellcolor{green!10}0.44(+/-0.014) & \cellcolor{green!30}0.504(+/-0.013) & 0.527(+/-0.021) & \cellcolor{green!10}0.515(+/-0.015) & 0.295(+/-0.018) \\ LR+SV+TF-IDF & \cellcolor{green!30}0.469(+/-0.014) & \cellcolor{green!10}0.5(+/-0.014) & \cellcolor{green}0.734(+/-0.02) & \cellcolor{green!30}0.595(+/-0.015) & 0.212(+/-0.015) \\ GNB+SV & 0.339(+/-0.014) & 0.357(+/-0.016) & \cellcolor{green!10}0.71(+/-0.02) & 0.475(+/-0.018) & \cellcolor{green}0.072(+/-0.012) \\ DT+SV+TF-IDF & 0.301(+/-0.015) & 0.356(+/-0.02) & 0.361(+/-0.02) & 0.358(+/-0.019) & \cellcolor{green!10}0.193(+/-0.012) \\ \hline \end{tabular}} \caption{Classification scores for the task of multi-label classification of the types of counterspeech. The values reported are the means and standard deviations over 10-folds for each of the evaluation metric.} ~\label{tab:prediction_task2_results} \end{table} To get a better understanding of how the classifier is performing for each counterspeech type, we look into the label-wise performance as illustrated in Table~\ref{tab:label_wise_performance}. These label-wise results are obtained using the best-classifier (XGBoost with SV+TF-IDF+BoWV) we obtained in the previous step. We observe that the classifier is able to perform good for certain classes such as `Hostile' and `Affiliation', while it performs poorly for other types such as `Warning of offline/online consequences' and `Pointing out Hypocrisy/contradiction'. \begin{table}[!htbp] \centering \resizebox{0.95\columnwidth}{!}{\begin{tabular}{|l|l|l|l|} \hline Counterspeech Type & Precision & Recall & F1-Score \\ \hline Presenting facts & 0.443(+/-0.036) & 0.648(+/-0.049) & 0.526(+/-0.040) \\ Pointing out hypocrisy & 0.353(+/-0.026) & 0.630(+/-0.043) & 0.452(+/-0.031) \\ Warning of consequences & 0.434(+/-0.057) & 0.470(+/-0.087) & 0.450(+/-0.066) \\ Affiliation & 0.567(+/-0.052) & 0.605(+/-0.084) & 0.582(+/-0.052) \\ Denouncing hateful speech & 0.413(+/-0.023) & 0.694(+/-0.041) & 0.518(+/-0.025) \\ Humor & 0.462(+/-0.036) & 0.661(+/-0.042) & 0.543(+/-0.036) \\ Positive tone & 0.430(+/-0.050) & 0.598(+/-0.046) & 0.500(+/-0.047) \\ Hostile & 0.547(+/-0.016) & 0.919(+/-0.017) & 0.686(+/-0.015) \\ \hline \end{tabular}} \caption{The performance scores of each type of counterspeech as given on using the XGB+SV+TF-IDF+BoWV. The values reported are the means and standard deviations over 10-folds for each of the evaluation metric.} ~\label{tab:label_wise_performance} \end{table} \subsection{Cross-community classification} In this section, we build models that draw the training data points from two communities to predict the labels for the test data drawn from the third community. In this task, a binary classifier is built to predict if the given input text is a counterspeech or non-counterspeech. Since this task is the same as first task (counterspeech classification), we use the best model (XGBoost+SV+TF-IDF+BoWV) that we obtained from the first task. The training consists of data points from two communities and the test set will be the third community. The process is repeated until each community is used for testing exactly once. Note that this application is motivated by the fact that in the context of the current problem there might exist communities for which in-community training instances are scarce and therefore the only way to perform the classification is to resort to the training instances available for other communities (see~\cite{Rudra:2015} for a similar approach). For evaluation, we report accuracy, weighted precision, recall and F1-score. Table~\ref{tab:prediction_task3_results} shows the results of this task. The models are able to produce comparable results even while they are trained using instances from a different community. This is an extremely desirable feature to avoid requirement of fresh annotations every time the model is used for a new (and so far unseen) community. \begin{table}[!htbp] \centering \resizebox{0.95\columnwidth}{!}{\begin{tabular}{| l| l| l| l| l | l |l| l|} \hline Train & Test & Precision & Recall & F1-Score & Accuracy\\ \hline Blacks+Jews & LGBT & 0.652 & 0.655 & 0.653 & 0.644 \\ Jews+LGBT & Blacks & 0.617 & 0.616 & 0.617 & 0.616 \\ LGBT+Blacks & Jews & 0.621 & 0.628 & 0.624 & 0.620 \\ \hline \end{tabular}} \caption{Classification scores for the task of predicting if the given comment is counterspeech or non-counterspeech in one community using the training instances from the other two communities.} ~\label{tab:prediction_task3_results} \end{table} \begin{table}[!tbp] \centering \resizebox{0.95\columnwidth}{!}{\begin{tabular}{| l| l| l| l| l| l| l| } \hline &\multicolumn{2}{|c|}{Jews} & \multicolumn{2}{|c|}{LGBT} & \multicolumn{2}{|c|}{Blacks} \\ \hline Type of Counterspeech & \#R & \%A & \#R & \%A & \#R & \%A \\ \hline Presenting facts & 112 & 28.57 & 49 & 46.94 & 22 & 36.36 \\ Pointing out hypocrisy or contradictions & 114 & 42.98 & 68 & 41.18 & 33 & 39.39 \\ Warning of offline or online consequences & 45 & 71.11 & 30 & 26.67 & 55 & 34.54 \\ Affiliation & 121 & 51.24 & 76 & 40.79 & 86 & 1.16 \\ Denouncing hateful or dangerous speech & 124 & 44.35 &85 & 43.53 & 120 & 19.17 \\ Humor & 62 & 46.77 & 101 & 65.35 & 49 & 28.57 \\ Positive tone & 156 & 42.31 & 54 & 38.89 & 165 & 6.06 \\ Hostile & 87 & 35.63 & 105 & 42.86 & 66 & 48.48 \\ \hline \end{tabular}}% \caption{Percentage of replies that agree with the opinion of the counter speaker.`\#R' represents the number of replies that were tagged and `\%A' represents the percentage of replies that agree with the counterspeakers comment.} ~\label{tab:counterspeech_agreement} \end{table} \section{Discussion} We observe that non-counterspeech consists mainly of comments that agree with the main content in the video or hate speech toward the target community itself. These vary depending on the community involved. In case of {\sl Jews}, we find that majority of the comments claimed that the Jews are controlling the economy and are responsible for the destruction of their society. Many of the non-counterspeech also included holocaust denial~\cite{gerstenfeld2003hate}. In case of {\sl Blacks}, we find that the majority of non-counterspeech were hate speech in the form of racist remarks such as ni**ers, slavery etc. In case of {\sl LGBT}, we observe that the majority of non-counterspeech are linked to religious groups claiming that it is unnatural and forbidden in their religion. Not all types of counterspeech are equally effective~\cite{susan2016successfullcounter}. To understand the nature of replies received by each type of counterspeech comments, we investigated into the people's reaction to the counterspeech. This would tell us how the community views these statements provided by the counterspeakers. For each target community and for each type of counterspeech, we randomly select 10 counterspeech comments that have at least two replies. Next, we ask the annotators to check if the response to the counterspeech comment is in agreement with the counterspeaker's opinion or against it. We report the results in Table~\ref{tab:counterspeech_agreement}. As observed from the table, the community acceptance (as observed by \% agreement) of the type of counterspeech varies. In Jew community, counterspeech strategies involving `Warning offline or online consequences' and `Affiliation' seem to be more favoured by the community. In case of the LGBT community, `Humor' seems to be the most acceptable form of counterspeech by the community while `Warning offline or online consequences' seems to be the least favored tactics. In case of the Blacks community, we observe that counterspeech strategies such as `Affiliation' and `Positive Tone' receives very less community acceptance. We found several cases, in which the replies to such counterspeech were stating that such `Positive Tone' and `Affiliation' will not change the stance of the hate speakers. Although, using `Hostile language' seems to be very prevalent (see Table~\ref{tab:dataset_statistics}), we found that this strategy is not welcomed by even the target community in whose favor these are posted. In many instances, the target community users tend to oppose this form of counterspeech and request the counterspeakers to refrain from using such language of hate. The counterspeech classifiers can be used in several scenarios. One such promising area, is studying the effectiveness of the types of counterspeech on a larger scale. One could also use such classifiers to generate datasets that could potentially be used to build systems that automatically counter hate messages in online social media. Such a system would be very effective as they could characterize the hate speaker and provide an effective counterspeech based on his/her profile. \section{Conclusion and future works} The proliferation of hateful content in online social media is a growing concern. Currently used methods such as blocking or suspension of messages/accounts cause problems to the freedom of speech. Counterspeech is emerging as a very promising option backed by several organizations and NGOs. With no dataset and model available for counterspeech detection, no large scale study can be conducted. In this paper, we took the first step toward creating a dataset of counterspeech against hateful videos in YouTube. We found that counter comments receive more likes than non-counter comments. Further, the psycholinguistic analysis of the comments reveal striking differences between the language choice of counter and non-counter speakers. We found that different communities seem to have different preferences for the selection of counterspeech type. Our models and dataset are placed in the public domain. There are several directions, which can be taken up as future research. One immediate step is to develop automatic counterspeech detection models for other social media sites like Facebook and Twitter. Another direction could be to study the effectiveness of different types of counterspeech for different communities. A connected research objective could be to investigate how effective the counterspeakers are in changing the mindset of the hate users.
\section{Introduction} \label{01Intro} Image embeddings are commonly optimized to map semantically similar inputs to nearby locations in feature space. Thereafter, tasks such as classification and image retrieval can be recast as simple operations, such as neighborhood lookups, in the learned feature space. This approach has been applied across many problems. Deep learning approaches to embedding are trained with data from many classes and optimize loss functions based on pairs of images from the same or different classes~\cite{chopra2005learning,hadsell2006dimensionality}, triplets of images where inputs from the same class are forced to be closer than inputs from different classes~\cite{schroff2015facenet}, or functions of large collections of images~\cite{law2013quadruplet,chen2017beyond,ustinova2016learning,HermansBeyer2017Arxiv}. For many of these optimization functions, embedding the input images into a high dimensional space leads to poor performance due to over-fitting. Some recent work~\cite{BIER} suggests an approach to high-dimensional embedding with an ensemble approach, learning to map images to a collection of independent output spaces, using boosting to re-weight input examples to make each output space independent. \begin{figure}[t] \centering \includegraphics[height=3.5in]{figs/ECCV_figure1.png} \caption{Standard deep embedding approaches (left) train a network to map all images from a class to nearby locations in an output space. Our approach (right) learns an ensemble of mappings. Each model of the ensemble learns a mapping that groups small subsets of classes. Images are mapped by each model in the ensemble, and the output coordinates are concatenated.} \label{fig:teaser} \end{figure} We propose a different approach to learning a robust, high-dimensional embedding space. Instead of re-weighting input examples to create independent output embeddings, we propose to group class labels. Figure~\ref{fig:teaser} illustrates the idea. We learn a collection of embeddings all trained with the same input data, but differing in the label assigned to the data points. We group classes into meta-classes (each containing a few classes), and learn embeddings with inputs labelled by their meta-class. We show a visual example of the meta-classes in Figure~\ref{metaClassFigure} based on data from the CARS196 dataset. The first meta-class groups together images from particular models of Porches and Audi, so the first embedding will seek to map all these images to the same location. For each grouping of classes into meta-classes, an embedding is learned that embeds all elements of the same meta-class similarly. We train many such embeddings, with different random groupings of classes into meta-classes. The final embedding is the concatenation of the coordinates of each low-dimensional embedding. This approach fits to many choices of embedding architectures. We show experimental results using the ResNet-18~\cite{resnet} and Inception V1~\cite{Szegedy_2016_CVPR} architectures, and demonstrate that our ensemble method improves upon the state of the art across a number of problem domains. Our contributions are as follows. \begin{itemize} \item We introduce the idea of randomly grouping labels as an approach to making a large family of related embedding models that can be used as an ensemble. \item We illustrate the effect of different parameter choices relating to the embedding size and number of embeddings within the ensemble. \item We demonstrate improvement over the state of the art for retrieval tasks for the CUB-200-2011~\cite{CUB200}, Cars-196~\cite{CAR196}, In-Shop Clothes Retrieval~\cite{ICR} and VehicleID~\cite{VID} datasets. \end{itemize} \section{Related Work} \label{02Related} \subsection{Image Embeddings} Image embedding falls under the umbrella of distance metric learning. There has been quite a bit of work in this area from both the machine learning and computer vision perspectives. Here, we focus on recent methods which employ convolutional neural networks for image embedding. There are many ways to learn embedding functions. Triplet loss (e.g.~\cite{schroff2015facenet}) defines a loss function based on triplets of images (two from the same class, and one from a different class), and penalizes the network if it does not map the same class inputs to be closer than the different classes. Because training is often performed in batches, it is natural to consider loss functions that optimize the embedded location of all images in the batch, either by considering all triplets (defined by the batch) simultaneously or by penalizing the histograms of distance between same-class and different class images~\cite{HermansBeyer2017Arxiv,lifted,ustinova2016learning}. No Fuss Embeddings~\cite{Proxy} shows that using the output layer of classification networks provide very useful embedding functions for one-shot learning and image retrieval tasks. This has the advantage of faster convergence (because each input image has a specific label, and the loss function does not depend on where other inputs are mapped), which removes some challenges in hard-example mining that plague some triplet-loss approaches. While triplet-loss approaches can be designed to mitigate these challenges~\cite{HermansBeyer2017Arxiv}, we choose to use~\cite{Proxy} as our embedding approach in our experiments primarily for its speed. \subsection{Ensemble CNNs} Ensemble algorithms have been more widely used for classification problems. One example applies a variation of the boosting model that adds extra network layers trained on examples for which a smaller network fails~\cite{DBLP:journals/corr/YuanYZ16}. Other approaches to create diversity in the ensemble is to train a collection of networks of different architectures to solve the same problem and combine the results~\cite{guo2015deep}. To the best of our knowledge, the only work that creates an ensemble for embedding is BIER~\cite{BIER}. This follows a boosting model to incrementally create an ensemble embedding by re-weighting examples so that subsequent embeddings are driven to correct errors in earlier embeddings. Compared to this approach, our method is not sequential, and therefore trivially parallelized. Additionally, as we demonstrate in Section~\ref{Experiment}, our method outperforms BIER on many benchmark datasets. \begin{figure}[t] \vskip 0.2in \begin{center} {\includegraphics[width=\columnwidth]{metaclass.jpg}} \caption{Meta-classes for the CAR196 dataset. It may be counter-intuitive that it is helpful to group specific models of Porches and Audis into one class and learn embeddings where those classes are mapped to the same location, but this approach makes it easy to define many different but related embedding problems that become an effective ensemble.} \label{metaClassFigure} \end{center} \vskip -0.2in \end{figure} \section{Training Randomized Ensemble Embedding} Our training approach is to create a collection of related models and learn an embedding for each one. To create one member of our ensemble, model $i$, we partition the set of class labels from the training set $Y$ into a set of meta-classes $M_i$, where the number of meta-classes is a parameter $D$, and each meta-class is roughly the same size. All model in the ensemble are computed the same way, with the only difference being that the mapping, $\phi_i$, based on meta-classes, $M_i$, come from a different random partitions of $Y$. We define the number of embeddings as $L$. To compute the final embedding for a new input $x$, we concatenate the output of each embedding to get a final output vector, $\Phi = \langle \phi_1(x), \phi_2(x), \ldots \phi_L(x)\rangle$. For one-shot learning or image retrieval tasks, this function $\Phi$ takes the place of standard embedding functions. Overall this approach has a collection of parameters and choices, with the two most prominent being: \begin{enumerate} \item $D$, the number of meta-classes into which the class label set $Y$ is partitioned, and \item $L$, the number of embeddings functions included in the ensemble. \end{enumerate} There are a collection of choices that relate to learning $\phi_i$ based on the embedding problem defined by the class partition $M_i$. If $\phi_i$ is represented as a deep neural network, we consider the following questions: \begin{enumerate} \item What is output embedding dimension of $\phi_i$? \item What is the network architecture that represents the function $\phi_i$? \item What is the loss function used to train $\phi_i$? \end{enumerate} We chose to experiment with ResNet-18 and Inception V1 architectures and follow the no-fuss-embedding approach~\cite{Proxy} with an output dimension equal to the number of meta-classes, $D$ (except where noted). Given these choices, Section~\ref{Experiment} characterizes performance as a function of the number of meta-classes (and therefore the size of each meta-class) and the size of the ensemble used. All tests are run on the PyTorch platform~\cite{pytorch}. For our experiments, we use the ResNet18 and Inception V1 implementations, which are pretrained on ILSVRC 2012-CLS data~\cite{ILSVRC15}. The input images are re-sized to 256 by 256 pixels. We adopt a standard data augmentation scheme (random horizontal flip and random crops padded by 10 pixels on each side). For pre-processing, we normalize the images using the channel means and standard deviations. All networks are trained using stochastic gradient descent (SGD). On all datasets we train using a batch size of 128 for 12 epochs. The initial learning rate is set to 0.01 and divided by 10 every 4 epochs. \section{Experimental Evaluation} \label{Experiment} We compare our method, Deep Randomized Ensembles for Metric Learning (DREML) with 7 state-of-art methods (using published results where available): Triplet Learning with semi-hard negative mining~\cite{triplet}, N-Pairs deep metric loss~\cite{Npair}, Proxy-based method~\cite{Proxy}, Hard-Aware Deeply Cascaded Embedding (HDC)~\cite{HDC}, Boosting Independent Embeddings Robustly (BIER)~\cite{BIER}, the FashionNet benchmark~\cite{ICR} and Group Sensitive Triplet Sampling (GS-TRS)~\cite{DBLP:journals/corr/BaiGLWHD17}. \subsection{Parameter Selection} \label{Effect} Figure~\ref{D_Figure} shows the performance tradeoffs for different choices of the number of embeddings to include in the ensemble (our parameter $L$), and the number of meta-classes (our parameter $D$), for the CAR196 dataset. The left graph shows a dramatic improvement as the ensemble size grows while it is small, and a clear asymptotic behavior beyond which adding new embeddings does not help. The right graph shows that the performance also depends on the size of the meta-class. When D is small, the number of classes per meta-class is large making a harder embedding problem; when D is large, the number of classes per meta-class is small leading to less diversity in the ensemble. Figure~\ref{L_Figure} explores the effect of increasing ensemble size for a fixed meta-class size. We see that the distribution of dot-products between embeddings of objects in the same class (solid) and different classes (dashed) becomes more separated for the CAR196 dataset, for both the training and validation datasets. Additionally, the number of pairs from different classes that have a large dot-product (for example, greater than 0.75) decreases. This is consistent with the observed improvement in the recall performance. For the remaining experiments, we employ multiple DREML models, denoted as DREML (\{I,R\}, D, L) where the tuple indicates the architecture (I)nceptionV1 or (R)esNet18 and values for $D$ and $L$. \begin{figure} \begin{center} {\includegraphics[width=0.48\columnwidth]{rebuttal_figs/dim.jpg}} {\includegraphics[width=0.48\columnwidth]{rebuttal_figs/dim2.jpg}} \caption{Left: Recall@1 accuracy on the CAR196 dataset with various $D$ (different lines) and $L$ (on the x-axis). Right: Recall@1 accuracy of the largest ensemble models with various $D$. Extreme cases have poorer performance because the individual models must deal with either many meta-classes per class (small $D$) or a lack of diversity (large $D$).} \label{D_Figure} \end{center} \end{figure} \begin{figure} \begin{center} {\includegraphics[width=0.32\columnwidth]{rebuttal_figs/D24L01.jpg}} {\includegraphics[width=0.32\columnwidth]{rebuttal_figs/D24L04.jpg}} {\includegraphics[width=0.32\columnwidth]{rebuttal_figs/D24L24.jpg}} \caption{Pair-wise dot product distribution of image feature vectors in the same classes (solid) and in different classes (dashes), for images from the training classes (red) and validation classes (blue). Shown are the distributions for 1, 4, 24 network ensembles, all with an output dimension of 24. As the number of networks grow, the distributions for same and different categories separate.} \label{L_Figure} \end{center} \end{figure} \begin{table} \caption{Retrieval and Clustering Performance on the CUB200 and CAR196 dataset.} \begin{center} \begin{tabular}{|l|ccccc|ccccc|} \hline & \multicolumn{5}{|c|}{CUB200} & \multicolumn{5}{|c|}{CAR196}\\ \hline Method & R@1 & R@2 & R@4 & R@8 &NMI & R@1 & R@2 & R@4 & R@8 &NMI\\ \hline TRIPLET & 42.6 & 55.0 & 66.4 & 77.2 & 55.4 & 51.5 & 63.8 & 73.5 & 81.4 & 53.4\\ N-PAIRS & 51.0 & 63.3 & 74.3 & 83.2 & 60.4 & 71.1 & 79.7 & 86.5 & 91.6 & 64.0\\ PROXY & 49.2 & 61.9 & 67.9 & 72.4 & 59.5 & 73.2 & 82.4 & 86.4 & 88.7 & 64.9\\ HDC & 53.6 & 65.7 & 77.0 & 85.6 & $-$ & 73.7 & 83.2 & 89.5 & 93.8 & $-$ \\ BIER & 55.3 & 67.2 & 76.9 & 85.1 & $-$ & 78.0 & 85.8 & 91.1 & 95.1 & $-$ \\ \hline DREML (I,12,48) & 58.9 & 69.6 & 78.4 & 85.6 & 62.1 & 84.2 & 89.4 & 93.2 & 95.5 & 71.0\\ DREML (R,12,48) & {\bf63.9} & {\bf75.0} & {\bf83.1} & {\bf89.7} & {\bf67.8} & {\bf86.0} & {\bf91.7} & {\bf95.0} & {\bf97.2} & {\bf76.4}\\ \hline \end{tabular} \end{center} \label{CUB200CAR196} \end{table} \subsection{Retrieval performance} We follow the evaluation protocol described in~\cite{lifted} to evaluate the Recall@K and Normalized Mutual Information (NMI) values on two datasets, CUB200 and CAR196. For the In-Shop Clothes Retrieval and PKU VehicleID datasets, we follow the evaluation protocol described in~\cite{ICR} and~\cite{VID} and evaluate Recall@K. Table~\ref{CUB200CAR196} shows retrieval performance results on the CUB200 and CAR196 datasets. The {\bf CUB200} dataset~\cite{CUB200} contains 200 classes of birds with 11,788 images. We split the first 100 classes for training (5,864 images) and the rest of the classes for testing (5,924 images). The {\bf CAR196} dataset~\cite{CAR196} contains 196 classes of cars with 16,185 images. We use the standard split with the first 98 classes for training (8,054 images) and the rest of the classes for testing (8,131 images). For each dataset, Table~\ref{CUB200CAR196} shows the Recall@K for $K=1,2,4,8$. Additionally, the normalized mutual information (NMI) score is included as a measure of clustering performance, as suggested in~\cite{lifted}. The results show dramatic improvement in both retrieval accuracy and clustering performance across both datasets. Boths datasets contain substantial intra-class variability; in CUB200, birds are shown in different poses in front of very different backgrounds. Figure~\ref{exampleImages} (top left) highlights this variability and shows example retrieval results from our method for CUB200 (top left) and CAR196 (top right). The {\bf In-Shop Clothes Retrieval} (ICR) dataset~\cite{ICR} contains 11,735 classes of clothing items with 54,642 images. Following the settings in~\cite{ICR}, only 7,982 classes of clothing items with 52,712 images are used for training and testing. 3,997 classes are for training (25,882 images) and 3,985 classes are for testing (28,760 images). The test set are partitioned to query set and gallery set, where query set contains 14,218 images of 3,985 classes and gallery set contains 12,612 images of 3,985 classes. Then, given a target image in test set, we retrieve the most similar image in the gallery set. Table~\ref{ISCresult} shows retrieval and clustering results showing a slight improvement over the BIER results. In absolute terms, DREML underperforms on the In Shop Clothes dataset compared to other datasets; this dataset has more classes, fewer examples per class, and substantial intra-class variation. Example results showing this variation are shown in Figure~\ref{exampleImages} (bottom left). \begin{table} \caption{Retrieval Performance on the In-Shop Clothes dataset.} \begin{center} \begin{tabular}{|l|cccc|} \hline Method & R@1 & R@10 & R@20 & R@30\\ \hline FashionNet & 53.0 & 73.0 & 76.0 & 77.0 \\ HDC & 62.1 & 84.9 & 89.0 & 91.2 \\ BIER & 76.9 & 92.8 & 95.2 & 96.2 \\ DREML (R,192,48) & {\bf78.4} & {\bf93.7} & {\bf95.8} & {\bf96.7}\\ \hline \end{tabular} \end{center} \label{ISCresult} \end{table} The {\bf PKU VehicleID} (VID)~\cite{VID} dataset contains 221,763 images of 26,267 vehicles captured by surveillance cameras. The training set contains 110,178 images of 13,134 vehicles and the testing set contains 111,585 images of 13,133 vehicles. We follow the standard experimental protocol~\cite{VID} to test on the small, medium and large test set which contains 7,332 images of 800 vehicles, 12,995 images of 1,600 vehicles and 20,038 images of 2,400 vehicles respectively. Table~\ref{VIDresult} shows retrieval and clustering results for the PKU Vehicle-ID dataset. This dataset has substantially less intra-class variability, but some nearby classes are quite similar. Example retrieval results and images are shown in Figure~\ref{exampleImages} (bottom right). \begin{table} \caption{Retrieval Performance on the VID dataset.} \begin{center} \begin{tabular}{|l|cc|cc|cc|} \hline Data Size & \multicolumn{2}{|c|}{small} & \multicolumn{2}{|c|}{medium} & \multicolumn{2}{|c|}{large}\\ \hline Method & R@1 & R@5 & R@1 & R@5 & R@1 & R@5\\ \hline GS-TRS & 75.0 & 83.0 & 74.1 & 82.6 & 73.2 & 81.9 \\ BIER & 82.6 & 90.6 & 79.3 & 88.3 & 76.0 & 86.4 \\ DREML (R,192,12) & {\bf88.5} & {\bf94.8} & {\bf87.2} & {\bf94.2} & {\bf83.1} & {\bf92.4} \\% \hline \end{tabular} \end{center} \label{VIDresult} \end{table} \begin{figure} \begin{center} {\includegraphics[width=0.6\columnwidth]{diffuse.png}} \caption{Dot product for each testing image to the closest training image on CAR196 dataset.} \label{diffusefigure} \end{center} \end{figure} \subsection{Embedding Unseen Classes} Our approach performs well to embed unseen classes, scattering new examples more effectively across the feature space. We believe that this property helps explain the improved performance of our method on retrieval tasks. We use the No Fuss Embedding approach with 96 training classes to define a 96 dimensional embedding. We then map inputs from the 98 standard testing classes onto this embedding. Because the No Fuss Embedding forces points to lie on a hypersphere we use the dot-product as a measure of similarity, and compute the similarity of each point in an unseen class to the most sim ilar point from any of the training classes. Figure~\ref{diffusefigure} shows this distribution. The blue line is the distribution for a single network, with most unseen examples having a maximum similarity score to a training class of greater than 0.9. This shows that when mapping new classes into the embedding space, they are often mapped very close to existing classes, and this crowding within the embedding space may limit recall performance. We repeat this experiment with 3 other networks. For the same 96 training categories, we group them into 24 meta-classes, each of size 4 and perform the same experiment (shown in the orange curved, shifted second farthest to the right). This is not an ensemble embedding, but we hypothesize that the meta-classes comprised of dis-similar input encourages an embedding that pushes novel images farther away from existing images. The final two curves show the results of the ensemble embedding, using 4 (green) and 24 (red) total embedding functions respectively. In these embeddings, new images are mapped to locations where they tend to be much farther from the training images, and because they are more spread out the embedding may be more effective at representing unseen categories. \begin{figure} \begin{center} {\includegraphics[width=\columnwidth]{data_show.jpg}} \caption{Retrieval results on the CUB200, CAR196, In-Shop Clothes Retrieval and PKU VehicleID dataset. We retrieve the 4 most similar images to the query image. Correct results are highlighted green and incorrect results are highlighted in red.} \label{exampleImages} \end{center} \end{figure} \section{Discussion} \label{Conclusion} Deep Randomized Ensembles for Metric Learning (DREML) is a simple approach to creating an ensemble of diverse embedding functions. We think this is a handy tool that may have broad applicability and have demonstrated results on four datasets spanning problem domains from a medium number of categories in CUB200 and CAR196, to the In-Shop Clothes and Vehicle ID datasets with tens of thousands of categories. Ensemble based approaches, both ours and BIER paper outperform the non-ensemble approaches by a dramatic margin on all four datasets. The CARS196 and CUB200 datasets have a moderate amount of training data, and we believe that our approach of building meta-classes creates a version of "label augmentation" that effectively allows our ensemble to have more independent embeddings. For larger datasets, our approach is similar in performance to BIER for the In-Shop Clothes Retrieval dataset, which has substantial in-class variation due to color and pose changes, and is overall less balanced with many classes that have few examples per class. We outperform BIER for the PKU Vehicle ID dataset for all dataset sizes, perhaps because our ensemble approach is more robust that BIER to the relatively smaller intra-class variation. The downside to our approach is that we train a large number of networks, in the cases where we outperform BIER, we showed results with an ensemble of 12 networks (for In-Shop Clothes dataset) and 48 networks (for the CUB, CAR, and VID dataset), something which affects both the training phase and the test time computational requirements. It is interesting to explore if the benefits of this ensemble approach can be replicated within a single network.
\section{Introduction}\label{sec:intro} Quantum walks (QWs), which are quantum analog of classical random walks \cite{ABNVW01, FH10Book, Gudder88Book, Meyer96JSP}, are now attracting much interest because of its connection to various regimes in mathematics, physics and applications such as quantum algorithms \cite{AKR05Proc, Childs09PRL, Portugal13Book} and topological insulators \cite{AO13PRB, CGSVWW16JPA, EKOS17JPA, GNVW12CMP, Kitaev06AP, Kitagawa12QIP, KRBD10PRA}. Nonlinear quantum walks (NLQWs), which are nonlinear versions of QWs, have been recently proposed by several authors \cite{GTB16PRA, LKN15PRA, NPR07PRA} and in particular related to some nonlinear differential equations such as nonlinear Dirac equations \cite{LKN15PRA}. For experimental realization of QWs by Bose-Einstein condensation, which can realize the nonlinearity in principle, see \cite{AW17PRA,DGGWS18PRL}. In \cite{MSSSS18DCDS}, we have initiated an analytical study of NLQWs using the methods developed for the study of nonlinear dispersive equations. More precisely, it was shown in \cite{MSSSS18DCDS} that the scattering phenomena for NLQWs in a weak nonlinear regime, that is, the behavior of solutions of NLQWs can be approximated by that of corresponding to linear quantum walks. We further proved a weak limit theorem, which is one of the main theme of the study of QWs since the celebrated result by Konno \cite{Konno02QIP}, for NLQWs in \cite{MSSSS18QIP}. Since the previous papers \cite{MSSSS18DCDS, MSSSS18QIP} discussed the similarity between QWs and NLQWs, in this paper we discuss a characteristic of the nonlinear dynamics, which is a soliton solution. The soliton solutions, which are localized traveling waves emerging from the balance of linear dispersion and nonlinearity, are one of the most interesting topics in the study of nonlinear differential (and difference) equations. In particular, we would like to point out that all the papers proposing NLQWs \cite{GTB16PRA, LKN15PRA, NPR07PRA} are discussing the soliton solutions. In this paper, we choose a particular nonlinearity (rotation type nonlinearity, see \eqref{s-eq1} below) which supports a soliton solution of simple form and present some theoretical and numerical results of the soliton solution. We remark that our nonlinearity, although it looks quite natural, is not motivated by physical phenomena. However, we think the understanding of soliton solutions with a particular nonlinearity will be the first step for the understanding of soliton solutions of more general NLQWs including the models appearing in \cite{GTB16PRA, LKN15PRA, NPR07PRA}. We now introduce the NLQWs we study in this paper. Let $C:\R \times \R\to U(2)$, where $U(2)$ is the set of $2\times 2$ unitary matrices. For a matrix $A \in U(2)$ and a vector $u \in \C^2$, $A^T$ and $u^T$ denote the transpose of $A$ and the transpose of $u$, respectively. We define the (nonlinear) quantum coin $\hat C: l^2 (\mathbb{Z}; \mathbb{C}^2) \to l^2 (\mathbb{Z}; \mathbb{C}^2)$ by \begin{equation} \label{defC} (\hat Cu)(x)=C(|u_1(x)|^2,|u_2(x)|^2) u(x), \end{equation} where $u (\cdot) = (u_1 (\cdot) ,u_2 (\cdot) )^T \in l^2 (\mathbb{Z}; \mathbb{C}^2)$. For $(T_\pm u)(x)=u(x\mp 1)$, we set \[ S=\begin{pmatrix} T_- & 0 \\ 0 & T_+ \end{pmatrix}, \] that is, \[ (Su)(x)=\begin{bmatrix} \langle e_1, (T_-u)(x) \rangle \\ \langle e_2, (T_+u)(x) \rangle \end{bmatrix} = \begin{bmatrix} u_1(x+1) \\ u_2(x-1) \end{bmatrix}. \] Here, $e_j \ (j = 1, 2)$ denote $e_1=(1, 0)^T$ and $e_2= (0, 1)^T$. Let the one-step nonlinear time evolution operator $U$ depending on a given state $u\in l^2(\mathbb{Z},\mathbb{C}^2)$ be \begin{align} U:=U(u):=S\hat C \label{m-eq2} \end{align} which is a map from $ l^2 (\mathbb{Z}; \mathbb{C}^2)$ to itself. Then, the state $u^t$ of the walker at time $t$ is defined by the recursion relation \begin{align}\label{3} u^t = U(u^{t-1}) \cdot u^{t-1}, \quad t=1,2,\cdots, \end{align} with some initial state $u^0\in l^2(\mathbb Z; \mathbb C^2)$ with $\|u_0\|_{l^2}=1$. Notice that $l^2$ norm will be conserved, i.e. $\|u^t\|_{l^2}=1$ for all $t\in \N$. We define the nonlinear evolution operator $U(t)$ as \begin{align} U(t)u^0 = u^t. \label{eq-su1} \end{align} Throughout this paper, we shall consider the following concrete quantum coin: \begin{align} \hat{C} (s_1, s_2) = R\left(\dfrac{\pi}{4}\right)R\left(g(s_1 + s_2)^p \right), \label{s-eq1} \end{align} where $g \in \mathbb{R}$, $p\geq 1$ and $R(\theta)$ is the $\theta$-rotation matrix, that is, \[R(\theta)=\begin{pmatrix} \cos\theta & -\sin\theta \\ \sin \theta & \cos \theta \end{pmatrix}. \] Thus for given $u$, $\hat{C}$ acts as \[ (\hat{C} u)(x) = R\left(\dfrac{\pi}{4}+g||u(x)||^{2p}_{\mathbb C^2}\right)u(x), \] where $\|(u_1,u_2)^T\|_{\mathbb C^2}^2=|u_1|^2+|u_2|^2$. The value of $|g|$ is a strength of the nonlinearity. Thus in the case where $|g|$ is not small, it is expected that a nonlinear effect arises. Indeed, in \cite{MSSSS18DCDS}, it has been shown that $u^t$ scatters for $p \ge 2$ and $|g|\ll1 $. To this end, let us prepare the following remark. In order to make the dependence on $g$ explicit, we write $U_g (t)$ for $U(t)$ defined by \eqref{eq-su1} with the coin \eqref{s-eq1}. We observe that, for $v^{0} = |g|^{p/2} u^{0}$ with $\|u^{0}\|_{l^2}=1$, \[ U_g (t) u^{0} = \frac{1}{\sqrt{|g|}} U_{g=1}(t) v^{0} \] since $g||u^{0}(x)||^{2p}_{\mathbb C^2} + \pi/4=||v^{0}(x)||^{2p}_{\mathbb C^2} + \pi/4$. Hence, we can fix $|g|=1$ and vary the norm value of $\|u_0\|_{l^2}$. Here, a small $\|u_0\|_{l^2}$ corresponds to the case where $|g|$ is small which means a small non-linear strength and vice versa. Therefore, we study the cases $g = \pm 1$ for \eqref{s-eq1} and see the dependence on the initial states. The organization of this paper is the following. In Section \ref{sec:solitonic}, we give some explicit examples of soliton solutions of NLQWs and discuss their stability/instability. In Section \ref{sec:linfty}, we numerically study the behavior of $l^\infty$ norm ($\|u\|_{\l^\infty}=\sup_{x\in\Z}\|u(x)\|_{\C^2}$) and observe three types of behavior, which are linear decay, soliton and oscillation. The oscillation solution is a new type of solution and we will give some theoretical explanation in Subsection \ref{subsec:osci}. In Section \ref{sec:coll}, we systematically study the collision of solitons by numerical simulations. In Section \ref{sec:disc}, we summarize our results. \section{Decision of the solitonic behavior in a dynamical system}\label{sec:solitonic} \begin{figure}[t] \begin{center} \includegraphics[width=12.0cm]{fig_solitonset.eps} \caption{The set of intial data giving the solitonic behavior $B$: The curve depicts $y=f(x)$ and the diagonal line depicts $y=x$.} \label{fig_solitonset} \end{center} \end{figure} In this section, we discuss the existence and stability of soliton solutions of NLQWs. First, we give an example of explicit non-scattering solutions. More precisely, we let $j = 1, 2$ and define $\delta_{j,x}\in l^2 (\Z;\C^2)$ as $\delta_{j,x}(y)= e_j$ if $y=x$ and $\delta_{j,x}(y)=0$ if $y\neq x$. Then, setting \begin{align} \varphi^t =a \delta_{1,-t}, \label{eq:soliton} \end{align} where $a$ is a root of $\pi / 4 + g a^{2p}=0$, $\varphi^t$ becomes a solution of NLQWs. It is observed that this solution is localized, travels by constant speed and does not decay. Thus, we call this solution a soliton solution. Further, observe that if we take initial data having several solitons, that is taking $u^0=\sum_{j=1}^N a \delta_{1,x_j}$ with $x_j\neq x_k$ for $j\neq k$ and $a$ as above, we see that each soliton does not interact with each other and we will have a multi-soliton solution: \begin{align} \varphi^t =\sum_{j=1}^Na \delta_{1,x_j-t}. \label{eq:multisoliton} \end{align} We remark that although we have a family of multi-soliton solutions as the usual KdV or cubic Schr\"odinger equation, the situation is a little different because the only explicit solitons which we can construct are with constant velocity $\pm1$ or the one appearing in Remark \ref{rem1} below with velocity essentially $0$. In spite of these differences, we will observe typical phenomena for soliton solutions, which behave like KdV solitons in Section \ref{sec:coll}. That is, when two solitons collide, they pass though each other without changing their shapes but only changing their positions and phases. \begin{remark}\label{rem1} It is also possible to have an extreme opposite behavior to the solitonic behavior as a nonlinear effect adjusting a parameter: if $\pi / 4 + g a^{2p}=\pi/2$, then there is a periodic solution localized in a finite region with period $4$, which evolves a zig-zag walking; $a \delta_{1,0}\to a \delta_{2,1}\to -a \delta_{1,0}\to -a \delta_{2,1} \to a \delta_{1,0}\to \cdots$. \end{remark} It can be shown that for the existence of such non-scattering solutions, it suffices to have $\pi /4 + g a^{2p}\in \pi n \ (n \in \mathbb{N})$ so even for $g>0$. Then, there exist solutions with solitonic behavior. Moreover we can show that $\varphi^t$ defined by \eqref{eq:soliton} is unstable. Indeed, for $ 0 < \varepsilon < 1$, we let $\varphi_\varepsilon (t)$ be a solution of NLQW with its initial state $\varphi_{\varepsilon}(0):=a(1-\varepsilon)\delta_{1,0}$. Then, it is clear that $\varphi_\varepsilon (0) \to \varphi^0$ as $\varepsilon\downarrow 0$. We see that $\|\varphi_\varepsilon^t (-t)\|_{\C^2}\to 0$ as $t \to \infty$ and obtain $\|\varphi^t - \varphi_\varepsilon^t\|_{l^2}\to \|\varphi^t\|_{l^2}+\|\varphi_\varepsilon^t\|_{l^2}\sim 1$ as $t \to \infty$. On the other hand, if a solution of NLQW $\psi_\varepsilon^t$ starts from the following state \begin{align*} \psi_\varepsilon^0 (x)=\begin{cases} 0 & x<0\\ (1+\varepsilon)\begin{pmatrix} a \\ 0 \end{pmatrix} & x=0\\ \text{whatever} & x>0, \end{cases} \end{align*} then we see that $\psi_\varepsilon^t (-t)\to (a, 0)^T$ as $t \to \infty$. Thus, there is a large set of initial data which persists soliton-like behavior with speed $1$ in the left edge. We will explain this picture for the soliton using a dynamical system as follows. \begin{figure}[t] \begin{tabular}{cc} \begin{minipage}{0.45\hsize} (a) \vspace{-0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_fixpoint_0.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b) \vspace{-0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_fixpoint_positive.eps} \end{center} \end{minipage} \end{tabular} \caption{The dependence on the initial data: Figure (a) depicts the fixed point is $0$ since the initial data $u_0\notin B$. On the other hand, in (b), we see that the fixed point is a strictly positive value belonging to $P$. } \label{fig_fixpoint} \end{figure} Our interest is now the left most amplitude at each time step, that is, $u^{t}(-t)$. Then we regard the initial state as $u^{0}(x)=\delta_0(x)e_1$. We put $r_t:=||u^{t}(-t)||^2_{l^2}$ and $\theta_t:=\pi/4+gr_t^p$. Here $g\in \{\pm 1\}$. Since $u^{t}(-t)=\cos \theta_{t-1}\cdot u^{t-1}(-t+1)$, we have \begin{equation}\label{eq:dynamical} r_{t+1}=r_t \cos^2[\pi/4 + gr_t^p]. \end{equation} Then the problem is simply reduced to the dependence on the initial data $r_0$ with respect to the convergence destination in the above dynamical system (\ref{eq:dynamical}). Now to obtain the fixed point of this discrete-time dynamical system, let us consider the following function. \begin{equation} f(x)=x\cos^2 (\pi/4+gx^p),\;\;(x\geq 0). \end{equation} We pick up important properties of $f(x)$ as follows. \begin{enumerate} \renewcommand{\labelenumi}{(\roman{enumi})} \item $f(x)=x$ if and only if $x=0$ or $gx^p\in (4\mathbb{Z}+3)\pi/4$; \item $f(x)$ takes a local maximum if and only if $\cot[\pi/4+gx^p]=2pgx^p$; \item $f(x)$ takes a local minimum\footnote{Every local minimum value is $0$.} if and only if $gx^p\in (4\mathbb{Z}+1)\pi/4$; \item $f(x)\leq x$ ($x\geq 0$). \end{enumerate} Remark that the points which accomplish (i), (ii), (iii), respectively, appear periodically as follows: ${\rm (i)} \to {\rm (ii)} \to {\rm (iii)} \to {\rm (i)} \to {\rm (ii)} \to {\rm (iii)} \to {\rm (i)} \to\cdots$ which is independent of $g$ and $p$. We set $P:=\{x\geq 0 \;|\; gx^p\in (4\mathbb{Z}+3)\pi/4\}$, which is the set of all the points satisfying (i) except $0$. Let $x^{(m)}$ be the $m$-th smallest element of $P$. Let $y^{(m)}>x^{(m)}$ be the smallest value of the solution of $x^{(m)}=f(x)$. We define $P^{(m)}:=\{x\in \mathbb{R}_{+}\setminus\{y_m\} \;|\; x^{(m)}=f(x)\}$, and $Q^{(m)}:=\{x\in \mathbb{R}_{+} \;|\; y^{(m)}=f(x)\}$. We put $P^{(m)}=\{x_1^{(m)},x_2^{(m)},\dots\}$ and $Q^{(m)}=\{y_1^{(m)},y_2^{(m)},\dots\}$ with $x_n^{(m)}<x_{n+1}^{(m)}$, $y_n^{(m)}<y_{n+1}^{(m)}$, see Fig.~\ref{fig_solitonset}. Then from a simple observation to this iterative dynamical system (see Figs.\ref{fig_fixpoint}), we can completely determine the set in $\mathbb{R}_+$ for the initial value $r_0$ providing a solitonic behavior whose fixed point is $x^{(m)}$: \[ B^{(m)}:= [x^{(m)},y^{(m)}]\cup [x^{(m)}_1,y^{(m)}_1] \cup [y^{(m)}_2,x^{(m)}_2]\cup[x^{(m)}_3,y^{(m)}_3] \cup [y^{(m)}_4,x^{(m)}_4]\cdots . \] Then we have \begin{equation} \lim_{n\to\infty}r_n>0 \Leftrightarrow r_0\in \bigcup_{m\geq 0}B^{(m)}=:B. \end{equation} Therefore for small value $\epsilon>0$, if $r_0=x^{(m)}-\epsilon$, then the fixed point of the dynamical system is $0$, while if $r_0=x^{(m)}+\epsilon$, then the fixed point is $x^{(m)}(>0)$. \begin{remark} We do not exclude the possibility that $\varphi_\varepsilon$ converges (in some sense) to another unknown traveling wave type solution. \end{remark} \section{Behavior of $l^\infty$ norm}\label{sec:linfty} \begin{figure}[tbhp] \begin{tabular}{cc} \begin{minipage}{0.45\hsize} (a) \begin{center} \includegraphics[width=6.0cm]{fig_u0-1-Linfty_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b) \begin{center} \includegraphics[width=6.0cm]{fig_u0-1-Linfty-.eps} \end{center} \end{minipage} \end{tabular} \caption{Behaviors of $\|u^t \|_{l^\infty}$ to the model \eqref{s-eq1}. Figure (a) is obtained by coin $C_+$, and Figure (b) is obtained by coin $C_-$. In both figures, each curve starts $u^0 = \delta_{1, 0}\ (\times)$, $u^0 = 0.8 \delta_{1, 0}\ (\ast)$, $u^0 = 0.6\delta_{1, 0} \ (\circ)$, $u^0 = 0.4\delta_{1, 0} \ (\triangle)$, $u^0 = 0.2\delta_{1, 0}\ (\diamond)$. In (b), we see oscillations of $\|u^t \|_{l^\infty}$ for the cases $u^0 = 0.8\delta_{1, 0}$ and $u^0 = 0.6 \delta_{1, 0}$, which do not appear in (a). } \label{sup-norm-u} \end{figure} In this section, we study the behavior of $l^\infty$ norm of the solutions. We set $C_\pm$ the coin \eqref{s-eq1} with $g = \pm1$ and $p = 1$. First, we discuss the behavior of $\|u^t\|_{l^\infty}$ with small initial state, which implies that the nonlinear effect is week. From Theorem 2.1 of \cite{MSSSS18DCDS}, the behavior of $\|u^t \|_{l^\infty}$ of the linear model (the case $g = 0$ in \eqref{s-eq1}) is approximated by $t^{-1/3}$ as $t \to +\infty$. It can be verified that $\|u^t \|_{l^\infty}$ to the nonlinear model \eqref{s-eq1} with small initial state behaves like a linear. Indeed, Figure \ref{log-log} shows that the behavior with $u^0 = 0.2\delta_{1, 0}$ is approximated by a linear model. We remark that the case $p=1$ was not proved to scatter in \cite{MSSSS18DCDS}. \begin{figure}[tbhp] \begin{tabular}{cc} \begin{minipage}{0.45\hsize} (a) \begin{center} \includegraphics[width=6.0cm]{fig_log_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b) \begin{center} \includegraphics[width=6.0cm]{fig_log_-.eps} \end{center} \end{minipage} \end{tabular} \caption{Log-log plot of the behavior of $\|u^t \|_{l^\infty}$ with $u^0 = 0.2 \delta_{1, 0}$ to the model \eqref{s-eq1}, where (a) is for the coin $C_+$, and (b) is for $C_-$. The broken lines are given by $-t/3.0 - 0.40$ in (a) and $-t/3.0 -0.45$ in (b), which are good approximations. } \label{log-log} \end{figure} On the other hand, if $u^0 = \delta_{1, 0}$ for both coins $C_\pm$, then $\|u^t\|_{l^\infty}$ does not decay and becomes almost constant (see Figure \ref{sup-norm-u}). Thus, it is expected that the solitonic behavior which has been discussed in Section 2 appears. For this case, we can find the explicit value of $a = \|u^t\|_{l^\infty}$ by solving the equation $\pi/4 + a^2 = \pi/2$ for $C_+$ and $\pi/4 -a^2 = 0$ for $C_-$. In Table 1, we put the value of $\|u^t \|_{l^\infty}$ obtained by the numerical calculations starting from $u^0 = \delta_{1, 0}$, which can be compared with $a = \left(\pi/4\right)^{1/2} \approx 0.886227$. \begin{table}[h!]\label{table1} \begin{center} \begin{tabular}{|c|c|c|c|} \hline & Numerical value of $\|u^t\|_{l^\infty}$ with $u^0 = \delta_{1, 0}$ \\ \hline $C_+$ & 0.886256\\ \hline $C_-$ & 0.886299\\ \hline \hline \end{tabular} \caption{Numerical results are obtained at $t = 10000$. } \end{center} \end{table} It is clear that a solution corresponding to the equation \begin{align} \dfrac{\pi}{4} - a^2 = 0 \label{eq-Tsoliton-} \end{align} is soliton solution which has been discussed in Section 2. Hence, it is expressed by $u^t = a \delta_{1, -t}$ when $u^0 = a\delta_{1, 0}$, which keeps its shape and moves to left on the $x$-axis with its speed $1$ (see Figure \ref{fig:soliton}). As it has been already mentioned in Remark \ref{rem1}, solving the equation \begin{align} \dfrac{\pi}{4} + a^2 = \dfrac{\pi}{2}, \label{eq-Psoliton+} \end{align} we get a periodic solution, which behaves $a\delta_{1, y} \to a \delta_{2, y+1} \to -a \delta_{1, y} \to -a \delta_{2, y+1} \to a \delta_{1, y} \to \cdots$. \begin{figure}[tbhp] \begin{center} \includegraphics[width=6.5cm]{fig_2solitons_location.eps} \caption{Location of the peak of the soliton with $u^0 = 0.886227\delta_{1, 0}$. The lines with $'\times'$ and with $'\circ'$ correspond to the case $\pi/4 + a^2 = \pi/2$ and $\pi/4 -a^2 = 0$, respectively. } \label{fig:soliton} \end{center} \end{figure} \subsection{Oscillations}\label{subsec:osci} A striking feature of the coin $C_-$ is an oscillating behavior of $\|u^t\|_{l^\infty}$. In Figure \ref{sup-norm-u} (b), we can see oscillations when $u^0 = 0.8\delta_{1, 0}$ and $u^0 = 0.6\delta_{1, 0}$. These are different from solitons. We would like to consider the reason why such behavior appears. Let $\alpha > 0$ and $u^0 = \alpha \delta_{1, 0}$. Then, it is clear that we have that \begin{align*} u^1 &= \alpha \cos{\left(\dfrac{\pi}{4}-\alpha^2\right)}\delta_{1, -1} + \alpha \sin{\left(\dfrac{\pi }{4}-\alpha^2\right)}\delta_{2, 1}, \\ u^2 & = \alpha \cos{\left(\dfrac{\pi}{4}-\alpha^2\right)}\cos{\left(\dfrac{\pi}{4}-\alpha^2 \cos^2{\left(\dfrac{\pi}{4}-\alpha^2\right)}\right)}\delta_{1, -2} + \alpha \cos{\left(\dfrac{\pi}{4}-\alpha^2 \right)} \sin{\left(\dfrac{\pi}{4}-\alpha^2 \cos^2{\left(\dfrac{\pi}{4}-\alpha^2 \right)}\right) }\delta_{2, 0} \\ &\quad - \alpha \sin{\left(\dfrac{\pi}{4}-\alpha^2\right)}\sin{\left(\dfrac{\pi}{4}-\alpha^2 \sin^2{\left(\dfrac{\pi}{4}-\alpha^2\right)}\right)}\delta_{1, 0} + \alpha \sin{\left(\dfrac{\pi}{4}-\alpha^2 \right)} \cos{\left(\dfrac{\pi}{4}-\alpha^2 \sin^2{\left(\dfrac{\pi}{4}-\alpha^2 \right)}\right) }\delta_{2, 2}, \\ & \cdots \end{align*} The left and right end parts of $u^t$ are on the function \begin{align} h^- (x) = x \cos{\left(\dfrac{\pi}{4} -x^2 \right)}. \label{0320-eq1} \end{align} Since $h^- (0) = 0$ and a graph of $y = h^- (x)$ touches a graph of $y = x$ at $x = \sqrt{\pi}/2$ which is the value in Table 1, a sequence $\left\{x_n \cos{\left(\dfrac{\pi}{4}-x_n^2 \right)}\right\}_{n=2}^\infty$ converges to $0$ if the initial condition is smaller than $\sqrt{\pi}/2 \approx 0.886227$. Thus, oscillation behavior comes from an inner part of $u^t$. Actually, a speed of the main part of $u^t$ is less than $1$ (see Figure \ref{fig_oscillating} (c)). \begin{figure}[tbhp] \begin{tabular}{lll} (a) & (b) & (c) \\ \includegraphics[width=4.3cm]{fig_1-.eps} & \includegraphics[width=4.3cm]{fig_g.eps} & \includegraphics[width=4.3cm]{fig_1peak_u0.6_sup.eps} \end{tabular} \caption{(a) A graph of $y = h^- (x)$ with line and a dashed line is $y = x$. (b) A graph of $y = h^+ (x)$ with line and a dashed line is $y=x$. (c) For $u^t$ with $u^0 = 0.6\delta_{1, 600}$ in the case $C_-$, the location of points with $u_1 \ge 0.3$ or $u_2 \ge 0.3$ are plotted.} \label{fig_oscillating} \end{figure} The reason why such oscillating solution appears only in the case $C_-$ may be related to the graphs of \eqref{0320-eq1} and \eqref{eq1-0727}. Let the initial state $u^0 = 0.6\delta_{1, 0}$. In the case of $C_+$, it is easily seen that the left and right end parts of $u^t$ are on the function \begin{align} h^+ (x) = x \cos{\left(\dfrac{\pi}{4} + x^2\right)}, \label{eq1-0727} \end{align} of which graph is in Figure \ref{fig_oscillating} (b). From Figure \ref{fig_oscillating} (b), the decay of $\|u^t\|_{l^\infty}$ is quick and it can be less than $0.3$ after the first step. This decay is also observed in Figure \ref{sup-norm-u} (a). On the other hand, we see from Figure \ref{fig_oscillating} (a) that the left and the right end parts of $u^t$ decay slowly. This implies that the inner part of $u^t$, which denotes the area between the left and the right end parts, can have strong influence coming from the end parts for long time steps. Then, the dynamics becomes complicated. \section{Collision between two solitons}\label{sec:coll} \begin{figure}[tbhp] \begin{tabular}{cc} \begin{minipage}{0.45\hsize} (a) \begin{center} \includegraphics[width=6.0cm]{fig_2solitons_Linfty_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b) \begin{center} \includegraphics[width=6.0cm]{fig_2solitons_Linfty-trace_p.eps} \end{center} \end{minipage} \end{tabular} \caption{Solitons for the coin $C_+$ with $u^0 = 1.534990\delta_{2,0}$ ($\times$) and with $u^0 = 2.344736\delta_{1, 0}$ ($\circ$). (a) is the behavior of $\|u^t\|_{l^\infty}$ from $t = 0$ to $10000$. (b) shows the location of each soliton starting from the origin. The soliton with $u^0 = 1.534990\delta_{2, 0}$ moves to the right and the one with $u^0 = 2.344736\delta_{1, 0}$ moves to the left on the $x$-axis.} \label{soliton+RT} \end{figure} If we take $\|u^0\|_{l^2} > 1$, which implies a nonlinear effect becomes stronger, then several kinds of non-scattering solutions appear. Among such solutions, we focus on solitons. Considering a nonlinear system, we are interested in not only the existence of solitons but also an interaction between solitons. We would like to consider a collision between two solitons and observe the behavior of solitons after collision. We see that soliton solutions from Section 2 are divided into two types. Indeed, for the case with coin $C_+$, solve a equation \begin{align} \dfrac{\pi}{4} + a^2 = (2n-1)\pi \qquad (n = 1, 2, \ldots)\label{collision-eq1} \end{align} and let $u^0 = a \delta_{1, 0}$. Then, we obtain that a soliton $u^t = (-1)^{t} a\delta_{1, -t}$ for $t = 0, 1, 2, \ldots$, which moves to the left on the $x$-axis with speed $1$. It is easily seen from the definition of the map $S$ that the soliton moves to the right on the $x$-axis if $u^0 = a\delta_{2, 0}$. We call such soliton rotating soliton. On the other hand, a solution with $u^0 = a\delta_{1, 0}$ where $a$ is determined by solving \begin{align} \dfrac{\pi}{4} + a^2 = 2n\pi \quad (n = 1, 2, \ldots) \label{collision-eq2} \end{align} becomes $u^t = a\delta_{1, -t}$, which keeps its shape and moves to the left on the $x$-axis with speed $1$. It moves to the right on the $x$-axis if $u^0 = \delta_{2, 0}$. We call this soliton traveling soliton. Furthermore, we regard the periodic solution corresponding to the equation \eqref{eq-Psoliton+} as a soliton since it is localized and its sup-norm does not decay for $t > 0$. We call such solution periodic soliton. For the case with coin $C_-$, we have obtained the traveling soliton from \eqref{eq-Tsoliton-}. Other types of solitons are obtained by solving the following equations: \begin{align} &\dfrac{\pi}{4} -a^2 = -\dfrac{\pi}{2} - 2n\pi \qquad (n = 0, 1, 2, \ldots)&& \text{{\rm (periodic soliton)}}, \label{eq-Psoliton-} \\ &\dfrac{\pi}{4} -a^2 = -(2n+1)\pi \qquad (n = 0, 1, 2, \ldots)&& \text{{\rm (rotating soliton)}}. \label{eq-Rsoliton-} \end{align} Table 2 summarizes the values of $a$ obtained by \eqref{collision-eq1} and \eqref{collision-eq2} with $n = 1$ and by \eqref{eq-Psoliton-} and \eqref{eq-Rsoliton-} with $n = 0$ together with the cases \eqref{eq-Psoliton+} and \eqref{eq-Tsoliton-}. Figure \ref{soliton+RT} shows the behavior of rotating and traveling solitons for the case $C_+$. \begin{table}[h!]\label{table2} \begin{center} \begin{tabular}{|c|c|c|c|} \hline & rotating soliton & traveling soliton & periodic soliton\\ \hline $C_+$ & $a \approx 1.534990$ & $a \approx 2.344736$ & $a \approx 0.886227$\\ \hline $C_-$ & $a \approx 1.981664$ & $a \approx 0.886227$ & $a \approx 1.534990$\\ \hline \end{tabular} \caption{The values of $\|u^t\|_{l^\infty}$ of solitons, which are used in numerical studies in Section 4. } \end{center} \end{table} Treating these kinds of solitons, we would like to consider the following four types of collision: \begin{enumerate} \item[(I)] collision between the same solitons; \item[(II)] collision between the rotating soliton and the traveling soliton; \item[(III)] collision between the periodic soliton and the rotating soliton; \item[(IV)] collision between the periodic soliton and the traveling soliton. \end{enumerate} It will turn out that Case I exhibits a simple dynamics which we can calculate explicitly, while the behavior of solutions after collision in Cases II--IV becomes complicated. \subsection{Collision: case I} \begin{figure}[tbhp] \begin{center} \begin{tabular}{lll} (a)\ Collision between rotating solitons \qquad \qquad & (b)\ Collision between traveling solitons \vspace{0.8cm}\\ \includegraphics[width=6.0cm]{fig_collision_2rotating_sup_p.eps} & \includegraphics[width=6.0cm]{fig_collision_2traveling_sup_p.eps} \end{tabular} \end{center} \caption{Location of the solitons $u^t$ with $C_+$. For each $t$, the points on $x$-axis with $u_1 \ge 0.3$ or $u_2 \ge 0.3$ are chosen, where $u^t = (u_1, u_2)^T$. Figure (a) shows a collision between rotating solitons. One moving to the right on the $x$-axis has its initial state $u^0 = 1.534990\delta_{2, 450}$ and another one moving to the left has its initial state $u^0 = 1.534990\delta_{1, 750}$. Figure (b) shows a collision between traveling solitons. One moving to the right on the $x$-axis has $u^0 = 2.344736\delta_{2, 450}$ and another one moving to the left has $u^0 = 2.344736\delta_{1, 750}$. } \label{collision_2same_solitons} \end{figure} We consider two cases, one is the collision between rotating soliton and itself and another is the one between traveling soliton and itself. Since the case with $C_-$ exhibits exactly the same behavior, we discuss the case $C_+$ only. Figure \ref{collision_2same_solitons} shows the location of solitons in the case $C_+$, where (a) is a collision between two rotating solitons and (b) is the one between two traveling solitons. It follows from these figures that location and speed of solitons do not change after collision. However, there is certainly interaction, which can be observed in Figure \ref{collision_2same_solitons_2}. Actually, we can explicitly calculate the behavior of $u^t$ at the collision time. Let $\alpha$ be the positive root of the equation \eqref{collision-eq2} with $n = 1$ and consider the collision between two traveling solitons. We demonstrate what happens in the behavior of $u^t$ with $u^0 = \alpha \delta _{1, 750} + \alpha \delta_{2, 450}$. Since the soliton with $u^0 = \alpha \delta _{1, 750}$ moves to the left and the one with $u^0 = \alpha \delta _{2, 450}$ moves to the right on the $x$-axis with their speeds $1$, they have no interaction for $0 \le t \le 149$, and we obtain \[ u^{150} = \alpha \delta_{1, 600} + \alpha \delta_{2, 600}. \] Therefore, for $t = 151$, we see that \begin{align*} u^{151} &= U u^{150}\\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \begin{array}{cc} \cos{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} & -\sin{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} \vspace{0.3cm}\\ \sin{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} & \cos{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} \end{array} \right) \left( \alpha \delta_{1, 600} + \alpha \delta_{2, 600} \right). \end{align*} Noting that $\pi/4 + \alpha^2 = 2\pi$ and $\alpha^2 = 2\pi -\pi/4$, we have \begin{align*} u^{151} &= \left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \sqrt{2}\alpha \delta_{1, 600} = \sqrt{2}\alpha \delta_{1, 599}. \end{align*} We can continue the similar calculations for $t = 152$ to obtain that \begin{align*} u^{152} &= U u^{151}\\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \begin{array}{cc} \cos{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} & -\sin{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} \vspace{0.3cm}\\ \sin{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} & \cos{\left(\dfrac{\pi}{4} + 2\alpha^2\right)} \end{array} \right) \sqrt{2}\alpha \delta_{1, 599}\\ &= \left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \alpha \delta_{1, 599} -\alpha \delta_{2, 599} \right) \\ &= \alpha\delta_{1, 598} -\alpha\delta_{2, 600}. \end{align*} It is easily seen that there is no interaction for $t > 152$. Figure \ref{collision_2same_solitons_2} shows the behavior of $u^t$ which has been just proved. We note that the above behavior is very similar to the phenomena of collision for KdV solitons. That is, if the two solitons did not interact with each other, then we should have $\tilde u^{152}=\alpha \delta_{1,598}+\alpha \delta_{2,602}$. So, comparing with $u^{152}$, we see that only the position and phase ($\alpha$ became $-\alpha$) have changed. If we consider two traveling solitons but different values, namely, $u^t$ with \[ u^0 = \beta \delta_{1, 750} + \gamma \delta_{2, 450}, \] where $\pi/4 + \beta^2 = 2n\pi$ and $\pi /4 + \gamma^2 = 2m\pi$\ $(n \neq m)$. Then, $u^t$ has the same behavior as the case $n = m= 1$ for $0 \le t \le 150$ and it becomes \[ u^{150} = \beta \delta_{1, 600} + \gamma \delta_{2, 600}. \] However, for $t = 151$, we see that \begin{align*} u^{151} &= U u^{150}\\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \begin{array}{cc} \cos{\left(\dfrac{\pi}{4} + \beta^2 + \gamma^2\right)} & -\sin{\left(\dfrac{\pi}{4} + \beta^2 + \gamma^2 \right)} \vspace{0.3cm}\\ \sin{\left(\dfrac{\pi}{4} + \beta^2 + \gamma^2\right)} & \cos{\left(\dfrac{\pi}{4} + \beta^2 + \gamma^2\right)} \end{array} \right) \left( \beta \delta_{1, 600} + \gamma \delta_{2, 600} \right) \\ &= \left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \dfrac{1}{\sqrt{2}}(\beta+\gamma) \delta_{1, 600} + \dfrac{1}{\sqrt{2}}(\beta -\gamma) \delta_{2, 600} \right) \\ &= \dfrac{\beta+\gamma}{\sqrt{2}}\delta_{1, 599} + \dfrac{\beta-\gamma}{\sqrt{2}}\delta_{2, 601}. \end{align*} Since we cannot obtain the explicit values for $t > 151$, the behavior of $u^t$ becomes complicated. Consequently, using exactly the same solitons is an important to obtain the simple dynamics of collision. Similar behavior is observed if we consider the collision between rotating solitons for $C_+$, and the same cases for $C_-$. \begin{figure}[thbp] \begin{tabular}{ccccccc} & & \includegraphics[width=2.5cm]{collision_2traveling_0.eps} & \includegraphics[width=2.5cm]{collision_2traveling_150.eps} & \includegraphics[width=2.5cm]{collision_2traveling_151.eps} & \includegraphics[width=2.5cm]{collision_2traveling_152.eps} & \includegraphics[width=2.5cm]{collision_2traveling_500.eps} \\ & & ${\footnotesize t = 0}$ & ${\footnotesize t = 150}$ & ${\footnotesize t = 151}$ & ${\footnotesize t = 152}$ & ${\footnotesize t = 500}$ \end{tabular} \caption{Collision between traveling solitons. For each time step, the upper part shows the state of $u_1$ and the lower part is the state of $u_2$, where $u^t = (u_1, u_2)^T$. At $t = 0$, the initial state is given by $u^0 = 2.344736\delta_{1, 750}$ and $u^0 = 2.344736\delta_{2, 450}$. Since the traveling soliton has speed $1$, two solitons collide at $t = 150$. } \label{collision_2same_solitons_2} \end{figure} Comparing with the collision in Case I, the dynamics after collision in Cases II--IV is complicated. \subsection{Collision: case II} \begin{figure}[tbhp] \begin{tabular}{cc} \begin{minipage}{0.45\hsize} (a)\ $C_+$ \begin{center} \includegraphics[width=6.0cm]{fig_collision_rotatingXtraveling_sup_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b)\ $C_-$ \begin{center} \includegraphics[width=6.0cm]{fig_collision_rotatingXtraveling_sup-.eps} \end{center} \end{minipage} \end{tabular} \caption{Collision between a rotating soliton and a traveling soliton. For each $t$, the points with $u_1 \ge 0.3$ or $u_2 \ge 0.3$ are chosen, where $u^t = (u_1, u_2)^T$. In both figures, the location of the peaks of a rotating soliton starting from $\delta_{1, 750}$ and of a traveling soliton starting from $\delta_{2, 450}$ are plotted.} \label{collision_rotatingXtraveling} \end{figure} Figure \ref{collision_rotatingXtraveling} shows a collision between a rotating soliton and a traveling soliton for the case $C_+$ in (a) and for $C_-$ in (b). Although Figure \ref{collision_rotatingXtraveling} (b) looks similar to Case I discussed in the previous subsection, it is not so simple and there should be interaction between two solitons. Indeed, we notice that the speed of soliton moving to the right on $x$-axis slightly changes after collision. We make an approximate calculation to understand the dynamics which observed in Figure \ref{collision_rotatingXtraveling} (b). Let consider the behavior of $u^t$ for $C_-$ with its initial state $u^0 = \beta \delta_{1, 750} + \gamma \delta_{2, 450}$, where $\beta$ and $\gamma$ are positive roots of the equations \eqref{eq-Rsoliton-} and \eqref{eq-Tsoliton-}, respectively. Here, the part with $\beta \delta_{1, 750}$ corresponds to a rotating soliton and the one with $\gamma \delta_{2, 450}$ corresponds to a traveling soliton. Since the rotating and traveling solitons move with speed $1$, they collide at $t = 150$ to have \[ u^{150} = \beta \delta_{1, 600} + \gamma \delta_{2, 600}. \] Then, for $t = 151$, we see that \begin{align*} u^{151} &= Uu^{150} \\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( \begin{array}{cc} \cos{\left(\dfrac{\pi}{4}-\beta^2 - \gamma^2\right)} & -\sin{\left(\dfrac{\pi}{4}-\beta^2 - \gamma^2\right)} \vspace{0.3cm}\\ \sin{\left(\dfrac{\pi}{4}-\beta^2 - \gamma^2\right)} & \cos{\left(\dfrac{\pi}{4}-\beta^2 - \gamma^2\right)} \end{array} \right) \left( \beta \delta_{1, 600} + \gamma \delta_{2, 600} \right). \end{align*} Noting that $\beta^2 = \pi /4 + \pi$ and $\gamma^2 = \pi /4$, we obtain that \begin{align*} u^{151} &= \left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( -\dfrac{\beta + \gamma}{\sqrt{2}} \delta_{1, 600} + \dfrac{\beta - \gamma}{\sqrt{2}} \delta_{2, 600} \right) = -\dfrac{\beta + \gamma}{\sqrt{2}} \delta_{1, 599} + \dfrac{\beta - \gamma}{\sqrt{2}} \delta_{2, 601}. \end{align*} It follows that each peak at $x = 600$ moves one distance to the left or to the right, respectively. We should notice that each soliton loses its property since the value of the peak has been changed. For $t \ge 152$, the dynamics can be complicated because of the value of peaks. We obtain, for the peak on $x = 599$ at $t = 151$, that \begin{align} u^{152} &= U u^{151} \nonumber \\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( -\dfrac{\beta + \gamma}{\sqrt{2}}\cos{\left(\dfrac{\pi}{4}-\dfrac{(\beta + \gamma)^2}{2}\right)} \delta_{1, 599} -\dfrac{\beta + \gamma}{\sqrt{2}}\sin{\left(\dfrac{\pi}{4}-\dfrac{(\beta + \gamma)^2}{2}\right)} \delta_{2, 599} \right) \nonumber \\ &= -\dfrac{\beta + \gamma}{\sqrt{2}}\cos{\left(\dfrac{\pi}{4}-\dfrac{(\beta + \gamma)^2}{2}\right)}\delta_{1, 598} -\dfrac{\beta + \gamma}{\sqrt{2}}\sin{\left(\dfrac{\pi}{4}-\dfrac{(\beta + \gamma)^2}{2}\right)} \delta_{2, 600}. \label{eq0306-1} \end{align} For the peak on $x = 601$ at $t = 151$, similar calculations lead to \begin{align} u^{152} &= U u^{151}\nonumber \\ &=\left( \begin{array}{cc} T_- & 0 \\ 0 & T_+ \end{array} \right) \left( -\dfrac{\beta - \gamma}{\sqrt{2}}\sin{\left(\dfrac{\pi}{4}-\dfrac{(\beta - \gamma)^2}{2}\right)}\delta_{1, 601} + \dfrac{\beta - \gamma}{\sqrt{2}}\cos{\left(\dfrac{\pi}{4}-\dfrac{(\beta - \gamma)^2}{2}\right)} \delta_{2, 601} \right) \nonumber \\ &= -\dfrac{\beta - \gamma}{\sqrt{2}}\sin{\left(\dfrac{\pi}{4}-\dfrac{(\beta - \gamma)^2}{2}\right)}\delta_{1, 600} + \dfrac{\beta - \gamma}{\sqrt{2}}\cos{\left(\dfrac{\pi}{4}-\dfrac{(\beta - \gamma)^2}{2}\right)} \delta_{2, 602}. \label{eq0306-2} \end{align} Since $\beta = \sqrt{5\pi}/2$ and $\gamma = \sqrt{\pi}/2$, we have $\beta \gamma = \sqrt{5}\pi/4$, where \[ \dfrac{\sqrt{5}}{4} \pi = \dfrac{1}{2}\pi + \theta \qquad \left(\theta = \dfrac{\sqrt{5}-2}{4}\pi \approx 0.059017 \pi \right). \] Noting that \[ \dfrac{\pi}{4}-\dfrac{(\beta + \gamma)^2}{2} = -(\pi + \theta), \qquad \dfrac{\pi}{4}-\dfrac{(\beta -\gamma)^2}{2}=\theta, \] we see that the main part of \eqref{eq0306-1} is the first term on the right-hand side and the one of \eqref{eq0306-2} is the second term on the right-hand side. Therefore, it follows from \[ \sin{\theta} \approx 0.184347, \qquad \cos{\theta} \approx 0.982861 \] that $u^{152}$ looks like \begin{align} u^{152} \approx -\dfrac{\beta + \gamma}{\sqrt{2}}\delta_{1, 598} + \dfrac{\beta -\gamma}{\sqrt{2}}\delta_{2, 602}. \label{eq0306-3} \end{align} We note that \[ \dfrac{\beta + \gamma}{\sqrt{2}} \approx 2.279049, \qquad \dfrac{\beta -\gamma}{\sqrt{2}} \approx 0.774591. \] Hence, the left end part of $u^t$ on the $x$-axis behaves like a rotating soliton and converges to the one. On the other hand, traveling soliton was changed to an oscillating solution which was considered in Section 2.3. Then, the right end part of $u^t$ tends to $0$ and the part which is larger than $0.3$ emerges from interior part of $u^t$ (compare with Figure \ref{fig_oscillating} (c)). This shows the reason why the speed of the main part moving to the right has been changed in Figure \ref{collision_rotatingXtraveling} (b). \subsection{Collision: cases III and IV} \begin{figure}[tbhp] \begin{tabular}{ll} \begin{minipage}{0.45\hsize} (a)\ $C_+$: periodic and a rotating solitons \vspace{0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_collision_periodicXrotating_sup_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (b)\ $C_-$: periodic and a rotating solitons \vspace{0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_collision_periodicXrotating_sup-.eps} \end{center} \end{minipage} \vspace{0.3cm}\\ \begin{minipage}{0.45\hsize} (c)\ $C_+$: periodic and a traveling solitons \vspace{0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_collision_periodicXtraveling_sup_p.eps} \end{center} \end{minipage} \hspace{6mm} \begin{minipage}{0.45\hsize} (d)\ $C_-$: periodic and a traveling solitons \vspace{0.5cm} \begin{center} \includegraphics[width=6.0cm]{fig_collision_periodicXtraveling_sup-.eps} \end{center} \end{minipage} \end{tabular} \caption{Collision between a periodic soliton and a rotating soliton ((a) for $C_+$ and (b) for $C_-$) and between a periodic soliton and a traveling soliton ((c) for $C_+$ and (d) for $C_-$). For each $t$, the points with $u_1 \ge 0.3$ or $u_2 \ge 0.3$ are chosen, where $u^t = (u_1, u_2)^T$. In each figure, the periodic soliton has an initial state $u^0 = a\delta_{1, 600}$, where $a = 0.886227$ for $C_+$ and $a = 1.534990$ for $C_-$. The rotating and traveling solitons start from $\delta_{2, 450}$.} \label{collision_periodicX} \end{figure} Finally, we discuss the Cases III and IV. They exhibit similar dynamics after collision. Figure \ref{collision_periodicX} shows the complicated behavior of $u^t$. For the case $C_+$, a collision tends to lead a coalescence of soliton. On the other hand, several solitons appear after collision for the case $C_-$. \section{Conclusion}\label{sec:disc} In this paper, we have studied the dynamics of solutions of NLQWs in a strong nonlinear regime. If $u^t$ is localized, travels by a constant speed and $\|u^t\|_{l^\infty}$ does not decay for all $t > 0$, then we call such a solution a soliton solution. The existence of soliton solutions moving to the right or to the left with speed $1$ has been shown in Section 2, which consists of traveling and rotating solitons. In addition, there is a periodic soliton which evolves in a finite region with period $4$. Further, it is clear that one can construct a multi-soliton solution with all solitons moving to the right (or left) with constant speed $1$. We have systematically investigated a collision between two solitons choosing from a traveling soliton, a rotating soliton and a periodic soliton. Although it is expected that the dynamics becomes too complicated to analyze it, we could calculate the explicit process of collision between the same solitons (Subsection 4.1). Such behavior of solitons is very similar to the phenomena of collision for KdV solitons. On the other hand, we have also observed inelastic collision of solitons (Fig.\ 10 (a) and Fig.\ 11), which is a typical phenomenon of non-integrable PDEs such as a generalized KdV \cite{MM11AM}. By this reason, we do not think the NLQWs which were considered in this paper are integrable. However, this does not mean that all NLQWs are not integrable and we think it will be important to look for integrable NLQWs for deeper understanding of the dynamics of general NLQWs. It would be interesting to study a large time behavior of oscillating solutions which has been obtained in Section 3. We would like to know whether the oscillating solution decays for large $t$ or converges to some periodic solution. This is our future work. \section*{Acknowledgments} M.M. was supported by the JSPS KAKENHI Grant Numbers JP15K17568, JP17H02851 and JP17H02853. H.S. was supported by JSPS KAKENHI Grant Number JP17K05311. E.S. acknowledges financial support from the Grant-in-Aid for Young Scientists (B) and of Scientific Research (B) Japan Society for the Promotion of Science (Grant No.~16K17637, No.~16K03939). A. S. was supported by JSPS KAKENHI Grant Number JP26800054 and JP18K03327. K.S acknowledges JSPS the Grant-in-Aid for Scientific Research (C) 26400156 and 18K03354.
\section{Introduction} \iffalse \section{Word Embeddings}\label{sec:we} Before discussing meta-relational word embeddings we briefly describe a current set of well established predict-based word embedding approaches, which we subsequently use as input for our method. \subsection{Positive Pointwise Mutual Information} Positive Pointwise Mutual Information (PPMI) is used for defining the joint probability over a term-context matrixwhere $PPMI(w_i,c_j) = PMI_{max}(w_i,c_j)$ for any non-negative $w$ and $c$ for mutual-information weighted co-occurrence matrix, negative values are set to 0. PPMI can be biased towards less frequent occurrences, so in practice rare words are usually given probability $p^{(3/4)}$ to account for this. Alternatively, Laplacian smoothing can be used to simply add 1 to all co-occurrences. These vectors are usually long (\~>10000) and sparse as most values are 0. This is an obvious drawback, however has been used in conjunction with SVD to obtain lower ranked dense representations. In fact, it has been shown in the past the PPMI is closely related to $\mathtt{skipgram}$ ~\cite{levy2015improving}, which we elaborate upon that section. \paragraph{GloVe} Pennington et al. ~\cite{pennington2014glove} described word representations that are made using weighted least squares (WLS) objective function from the ratios between word co-occurrence probability matrices in a log-bilinear regression model (motivated by the fact vector spaces are inherently linear) that combines matrix factorization and local context windows (see Equation \ref{eq:wls}). This results in a model that represents embeddings as vector offsets. The objective function in Equation \ref{eq:wls} shows $f\Big(X_{ij}\Big)$, the weighting function and $\frac{x}{x_{max}}^{0.75}$ is the modified unigram sampling distribution chosen based on an empirical evaluation of performance. This means rare words are given a higher weight value in comparison to a linear power. \begin{equation}\label{eq:wls} J = \sum_{i, j =1}^{V} f\Big(X_{ij}\Big)\Big( w^{T}_i \tilde{w}_j + b_i + \tilde{b}_j - \log X_{ij} \Big)^{2} \end{equation} We will see in the subsequent sections that a scaling factor $\alpha$ is not necessary to mitigate the complexities of morphologically rich rarewords, instead we take a more linguistically driven intuition by splitting words into morphemes. A least squares objective can be used to optimize $J$ as, Equation \ref{eq:glove_cost} shows the cost function where $\hat{Q}_{ij} = \exp(w^{T}_{i}) \tilde{w}_{j}/\sum_{k=1}^{V} \exp(w_{i}^{T} \tilde{w}_{k})$ \begin{equation}\label{eq:glove_cost} \hat{J} = \sum_{i,j} X_i (\hat{P}_{ij} - \hat{Q}_{ij})^2 \end{equation} GloVe is widely used for word embeddings and is considered SoTA on a large range of NLP tasks, along with neural network based approaches. Similar to their approach, we too operate only on non-zero elements in the context of graph neighborhoods and unlike their approach we use a directed graph to preserve word ordering. Now we take a look at two approaches that use simple 1-hidden layer neural network architectures with some tricks that help reduce a large amount of exponential computations. \subsection{Continuous Bag of Words} Continuous Bag of Words ($\mathtt{cbow}$) is an algorithm for predicting a context $c$ ($w_{s-t}..,w_{s-1},w_{s+1},w_{s+t}$) given a target word $w_s$, $p(c|w_s;\theta)$. The words are represented as one hot encoded vectors so the dimension of a vector is linear in the number of vocabulary words $|V|$. A one-hot encoded vector $w$ has a corresponding set of weights a lookup through a projection layer which differs from a normal neural network hidden layer, $h$. In a standard neural network $h$ contains a set of nonlinear hidden activations (e.g tanh, sigmoid, relu etc.), however $\texttt{cbow}$ uses a projection that allows the same set of weights to be applied to a word appearing in various contexts, therefore each context for a word contributing to the weights for that word. Each column in the projection layer corresponds to a weight vector for a given word. From this, it is common for a softmax to compute the probabilities at the output layer, however this is computationally expensive for large vocabularies. Therefore, a hierarchical softmax is used which is a Huffman binary tree that assigns binary codes to frequent words, reducing the number of output units. A tree is constructed whereby frequent words are closer to the root node and rare words are closer to leafs, so to compute the probability $p(w|c)$ we only require to traverse the probabilities in the tree which are represented as sigmoid after the projection output. The way this tree should partitioned for the optimal reduction in computation has been well studied. A baseline approach would be to generate a tree randomly (performs worse than the original softmax layer), or binary trees constructed from hypernym-hyponym relationships in WordNet ~\cite{morin2005hierarchical}, or fully-automated constructions using hierarchical clustering of random trees as a strategy for recursive partitioning ~\cite{mnih2009scalable}. Since the network does not require one or more nonlinear hidden layers like a standard ANN, the complexity can be mostly attributed to the reduction in computation provided by this hierarchical softmax. This is a universal challenge for distributed word representations, computing the conditional probabilities in the presence of very large vocabularies. We will see in subsequent sections that our approach involved sub-graph identification in a weighted directed graph to construct this reduction in computation. Mikolov also show that these models can account for different syntactical and semantic similarities \cite{mikolov2013linguistic} and also that offsets can correspond to similar analogies e.g v('Waiter') - v('Man') + v('Woman) = v('Waitress'). Unlike a language model that can only base its predictions on past words, as it is assessed based on its ability to predict each next word in the corpus, a model that only aims to produce accurate word embeddings is not subject to such restriction. Therefore use both the nn words before and after the target word wtwt to predict it as shown in Figure 4. This is known as a continuous bag of words (CBOW), owing to the fact that it uses continuous representations whose order is of no importance. The loss function is maximized according to equation \ref{eq:nll} where $j$ is the index of the output word. \begin{equation}\label{eq:nll} E = -v_{w_o}^{T}\dot{h} - \log\sum_{j'=1}^{V}\exp^{v_{w_j'}^{T}\dot{h}} \end{equation} \subsection{Skipgram} Levy and Goldberg ~\cite{levy2014neural} showed that $\mathtt{skipgram}$ converges to the optimum when the matrix is a shifted version of PMI: $WW'^{T} = M^{PMI} - \log k$ where $W$ is the one linearly weights assigned to one-hot input vectors and $W'$ are weights assigned from the projection layer output to output layer. Therefore skip-gram implicitly factors a shifted PMI into two embedding matrices. ~\cite{levy2015improving} also argue that many of the performance gains in neural network based distributed semantic models (DSMs) can be attributed to the hyper-parameter tuning and not the algorithm itself. To show this skip-gram with negative sampling (SGNS) is compared to the count-based Singular Value Decomposition (SVD), Positive Pointwise Mutual Information (PPMI) and Global Word Vectors (GloVe). This is has been a criticism of neural networks for decades, although as we will see, dropout has been a crucial generalization strategy that shows when we choose varying hyperparameter settings this claim is not does not hold. The aforementioned previous work has focused on comparing count-based methods against predict methods, and neural network DSM's versus other algorithms. The clear distinction that can be made in this work is that we are combining the benefits of both. We initialize an adjacency matrix based based on graphical properties, similar to count-based methods that usually use $tf$. From this step, we then use a neural network approach, which usually begins with one-hot encoded vectors instead. To this end, we begin with a detailed description of the methodology. \subsection{LexVec} LexVec ~\cite{salle2016matrix} creates word embeddings from a PPMI-matrix factorization with window and negative sampling that is optimized with SGD where weights $\lambda$ are lower for highly frequent terms and is also adapted for negative-co-occurrence. The loss function is a combination SGNS and $L(W) = \sum_{(w, c)} \frac{1}{2} (W_{w}W_{c}^{T} - PPMI*_{wc})^{2} + \frac{1}{2}\sum_{i=1}^{k}\mathtt{E}_{w_{i} \sim P_{n}(w)} (W_{w}\bar{W}^{T}_{w_i} - PPMI*_{ww_{i}})^{2}$ \fi Meta-embeddings are a quick and useful prior step for improving word representations in natural language learning tasks. This involves combining several learned embeddings in a way that improve the overall input representation. This approach is a less computationally expensive compared to if a practitioner were to train a set of word embeddings from scratch, particularly when considering non-sliding window methods. The most straightforward approaches to meta-embeddings are: concatenation (CONC) and averaging (AV). The former is limited since the dimensionality grows large for multiple embeddings as more vectors are concatenated and the latter, while fast, does not preserve most of the information encoded in each embedding when taking the arithmetic mean. Although, it would seem surprising concatenating vectors from different embedding spaces is valid, it has been shown that ~\cite{coates2018frustratingly} AV approximates CONC even though the embedding spaces are different. Although, to address the loss of information when using AV, Singular Value Decomposition has been used as a dimensionality reduction technique to factorize the embeddings into a lower-rank approximation of the concatenated meta-embedding set. Linear methods include the use of a projection layer for meta-embedding (known as 1TON) ~\newcite{yin2015learning}, which is simply trained using an $\ell_2$-based loss. Similarly, Bollegala et al. ~\cite{bollegala2017learning} has focused on finding a linear transformation between count-based and prediction-based embeddings, showing that linearly transformed count-based embeddings can be used for predictions in the localized neighborhoods in the target space. Most recent work ~\cite{bao2018meta} has focused on the use of an autoencoder (AE) to encode a set of $N$ pretrained embeddings using 3 different variants: (1) Decoupled Autoencoded Meta Embeddings (DAEME) that keep activations separated for each respective embedding input during encoding and uses a reconstruction loss for both predicted embeddings while minimizing the loss for each respective decoded output, (2) Coupled Autoencoded Meta Embeddings (CAEME) which instead learn to predict from a shared encoding and (3) Averaged Autoencoded Meta-Embedding (AAME) is simply an averaging of the embedding set as input instead of using a concatenation. This is the most relevant work to our paper, hence, we include these 3 autoencoding schemes along with aforementioned methods for experiments, described in Section \ref{sec:experiments}. We also include two subtle variations of the aforementioned AEs. The first predicts a target embedding from an embedding set using the remaining embedding set, post-learning the single hidden layer is used as the word meta-embedding. The second method is similar except an AE is used for each input embedding to predict the designated target embedding, followed by an averaging over the resulting hidden layers. This alternative is described in more detail in Section \ref{sec:method}. \iffalse Coates and Bollegala ~\newcite{coates2018frustratingly} describe an argument to why the arithmetic mean of word embedding pairs created from separate vector spaces could be considered as a valid meta-embedding approach. They show that averaging and concatenation approximate the same relational information if word vectors are approximately orthogonal, hence the inclusion of averaged embeddings in our comparison. SVD computes dimensionality reduction over the concatenated embeddings so that for a vocabulary $V$ we have concatenated vectors $W_{c} \in \mathbb{R}^{|V| \times d}$ and $\tilde{W_c} = U \sum V^{T}$ where $\tilde{W_c}$ is a lower dimensional ($<d$) meta-embedding and word relatendess is computed with a dot product. The 1\texttt{TO}N method uses a projection layer with a MSE loss to learn a 1 lower-dimensional embedding of $N$ known embeddings and 1\texttt{TO}N$^{+}$ extends this to deal with out-of-vocabulary (OOV) terms. The is common to first perform a column-wise $\ell_2$-normalization on the vocabulary so that when similarity is computed via a dot product the dimension are of the same range. \fi The aforementioned previously proposed unsupervised learning have a common limitation, that is minimising the Euclidean ($\ell_2$) distance between source word embeddings and their meta-embedding. \newcite{Arora:TACL:2016} have shown that the $\ell_2$ norm of a word embedding vector is proportional to the frequency of the corresponding word in the corpus used to learn the word embeddings. Considering that in meta-embedding learning we use source embeddings trained on different resources, we argue that it is more important to preserve the semantic orientation of words, which is captured by the angle between two word embeddings, not their length. Indeed, cosine similarity, a popularly used measure for computing the semantic relatedness among words, ignores the length related information. Additionally, we note the relationship between KL-divergence and cosine similarity in the sense both methods perform a normalization that is proportional to the semantic information. Hence, we compare several popular measures such as MSE and MAE that use $\ell_2$ and $\ell_1$ respectively, against KL-divergence and cosine similarity for the purpose of learning meta-embeddings and show that the loss which accounts for this orientation consistently outperforms the former objectives that only consider length. We demonstrated this across multiple benchmark datasets. \iffalse We now briefly describe past work that has considered angular-based optimization in neural networks. In the computer vision domain, Liu et al. ~\cite{liu2017sphereface} have used an angular softmax loss with CNNs for face recognition, where the entities that are being detected are assumed to lie on a manifold. \fi \iffalse ~\cite{bollegala2017think} Distributed word embeddings have shown superior performances in numerous Natural Language Processing (NLP) tasks. However, their performances vary significantly across different tasks, implying that the word embeddings learnt by those methods capture complementary aspects of lexical semantics. Therefore, we believe that it is important to combine the existing word embeddings to produce more accurate and complete \emph{meta-embeddings} of words. For this purpose, we propose an unsupervised locally linear meta-embedding learning method that takes pre-trained word embeddings as the input, and produces more accurate meta embeddings. Unlike previously proposed meta-embedding learning methods that learn a global projection over all words in a vocabulary, our proposed method is sensitive to the differences in local neighbourhoods of the individual source word embeddings. Moreover, we show that vector concatenation, a previously proposed highly competitive baseline approach for integrating word embeddings, can be derived as a special case of the proposed method. Experimental results on semantic similarity, word analogy, relation classification, and short-text classification tasks show that our meta-embeddings to significantly outperform prior methods in several benchmark datasets, establishing a new state of the art for meta-embeddings. \fi \iffalse Gaussian meta-embeddings for efficient scoring of a heavy-tailed PLDA model Brummer et al ~\cite{brummer2018gaussian} proposed Gaussian meta-embeddings to account for uncertainty by maximizing \textbf{relevant information throughput} and score heavy-tailed probabilistic LDA models As a proof of concept in speaker recognition, we derive an extractor from the familiar generative Gaussian PLDA model (GPLDA). We show that GPLDA likelihood ratio scores are given by Hilbert space inner products between Gaussian likelihood functions, which we term Gaussian meta-embeddings (GMEs). Meta-embedding extractors can be generatively or discriminatively trained. GMEs extracted by GPLDA have fixed precisions and do not propagate uncertainty. We show that a generalization to heavy-tailed PLDA gives GMEs with variable precisions, which do propagate uncertainty. Experiments on NIST SRE 2010 and 2016 show that the proposed method applied to i-vectors without length normalization is up to 2 applied to length-normalized i-vectors. \fi \iffalse \paragraph{Ensembles with Semantic Network Knowledge} Speer et al. ~\cite{speer2016ensemble} have used an ensemble of GloVe and Word2Vec with structured knowledge from two semantic networks, ConceptNet and PPDB, achieving SoTA results on word similarity datasets, most notably on RareWord where the Spearman correlation $\rho_{s}=0.596$. Speer et al. ~\cite{speer2017conceptnet} have represented a knowledge graph called ConceptNet (contains asymmetric and symmetric relations between words and phrases with labeled edges and also contains knowledge from WordNet) as a symmetric term-term matrix that is converted into a PMI matrix, subsequently decomposed into a set of word vectors using Singular Value Decomposition. Another variant combines a $\mathtt{skipgram}$ model with ConceptNet knowledge using retrofitting whereby the loss is given as $\phi(Q) = \sum_{i=1}^{N}\big[\alpha_{i}||q_{i} - \hat{q}_{i}||^{2} + \sum_{(i, j)\in E} \beta_{ij}||q_{i} - q_{j}||^{2}\big]$ where $q_i$ is the new vector, $\hat{q}_{i}$ is the original vector ($\mathtt{skipgram}$ in their case) and $E$ represents the edges to neighboring words in the graph. This is considered a type of meta-embedding approach that mixes external knowledge with predict-based word embeddings. This work not only bares relevance to the meta-embeddings approach but also our proposed squared-cosine loss that can be used as an objective function for reconstruction in the general case. \fi \iffalse Advances in Pre-Training Distributed Word Representations ~\cite{mikolov2018advances} \fi \iffalse \begin{equation} \resizebox{1\hsize}{!}{% $ L(\theta) = \sum_{i=1}^{N} - \log \big(\frac{e^{||x_{i}|| \cos(m\theta_{y_1}, i)}}{e^{||x_{i}||\cos(m\theta_{y_i, i})} + \sum_{j \neq y_{i}} e^{||x_{i}||\cos(\theta_{j},i)}} \big)$% } \end{equation} To our knowledge, there is surprisingly no prior work in natural language for explicitly accounting for angles in the objective function, as it would seem a natural fit particularly since cosine similarity is the predominant measure of word-pair similarity. \fi \iffalse Despite the growing interest in prediction-based word embedding learning methods, it remains unclear as to how the vector spaces learnt by the prediction-based methods differ from that of the counting-based methods, or whether one can be transformed into the other. To study the relationship between counting-based and prediction-based embeddings, we propose a method for learning a linear transformation between two given sets of word embeddings. Our proposal contributes to the word embedding learning research in three ways: (a) we propose an efficient method to learn a linear transformation between two sets of word embeddings, (b) using the transformation learnt in (a), we empirically show that it is possible to predict distributed word embeddings for novel unseen words, and (c) empirically it is possible to linearly transform counting-based embeddings to prediction-based embeddings, for frequent words, different POS categories, and varying degrees of ambiguities. \fi \iffalse \DB{Did not understand this fully. For a given word $w$ do you use several of its source embeddings, say $s_1(w)$ and $s_2(w)$ and predict a target embedding $t(w)$? Perhaps it would be best to write down the loss the autoencoder is minimising explicitly. I also did not understand the row vs. column concatenation descrbed towards the end of the paragraph. The more critical question would be why the intermediate/hidden representation learnt by the autoecoder trained between two word embeddings could act as a meta embedding?} \AN{ \begin{enumerate} \item Yes, that is the idea. I will write down the loss and other missing details to make it clearer. \item The concatenation sounds ambiguous, I meant to say that the hidden representations of the source to target vectors are average along with the hidden representation of the autoencoded target vector. Although, there is no autoencoding performed on the target vector if the source hidden vectors are of the same size as the original target vector. \item Well this is the fundamental question which I don't have a good answer for yet. I will have to think more why it is better to average relational representations between different vector spaces. But, it is probably better to get the results and spend time trying to justify it if there is an actual improvement made. \end{enumerate} } \fi \section{Methodology}\label{sec:method} Before describing the loss functions used, we explain the aforementioned variation on the autoencoding method and how it slightly differs from 1TON/1TON$^{+}$ ~\cite{yin2015learning} and standard AEs ~\cite{bao2018meta} presented in previous work. Target Autoencoders (TAE) are defined as learning an ensemble of nonlinear transformations between sets of bases $X_{s}$ in sets of vector spaces $\mathcal{X}_{S} = \{\mathcal{X}_{1},..,\mathcal{X}_{s},..,\mathcal{X}_{N}\} \quad s.t \quad \mathcal{X}_{s}\in\mathbb{R}^{|v_{s}|\times d_{s}} $ to a target space $\mathcal{X}_{t} \in \mathcal{R}^{|v_{t}|\times d_{t}}$, where $\mathtt{f}_{w}^{(i)}: \mathcal{X}_{S}^{(i)}$ $\to$ $\mathcal{X}_{t} \quad \forall i $ is the nonlinear transformation function used to make the mapping. Once a set of $M$ number of parameteric models $\mathtt{f}_{w} = \{\mathtt{f}_{w}^{(1)}, \mathtt{f}_{w}^{(i)}, ..,\mathtt{f}_{w}^{(M)}\}$ are trained with various objective functions to learn the mappings between the word vectors we obtain a set of lower-dimensional target latent representation that represents different combinations of mappings from one vector space to another. After training, all $H$ set of latent variables $Z_{s}=\{z_{1},..,z_{H}\}$ are concatenated with an autoencoded target vector. This means thats all vector spaces have been mapped to a target space and there hidden meta-word representations have been averaged, as illustrated in Figure \ref{fig:mre}. Figure \ref{fig:meta_methods} shows a comparison of the previous autoencoder approaches ~\cite{bao2018meta} (left) and the alternative AE (right), where dashed lines indicate connections during training and bold lines indicate prediction. The Concat-AutoEncoder (CAEME) simply concatenates the embedding set into a single vector and trains the autoencoder so to produce a lower-dimensional representation (shown in red), while the decoupled autoencoder (DAEME) keeps the embedding vectors separate in the encoding. In contrast the target encoder (TAE) is similar to that of CAEME only the label is a single embedding from the embedding set and the input are remaining embeddings from the set. After training, TAE then concatenates the hidden layer encoding with the original target vector. The Mean Target AutoEncoder (MTE) instead performs an averaging over separate autoencoded representation. \begin{figure}[ht] \begin{center} \includegraphics[scale=0.75]{images/relational_meta_embedding.pdf} \caption{TAE Embedding}\label{fig:mre} \end{center} \end{figure} \begin{figure}[!bp] \begin{center} \includegraphics[scale=0.45]{images/meta_embedding_methods.png} \caption{AE Meta-Embedding Methods}\label{fig:meta_methods} \end{center} \end{figure} \iffalse This meta-model also approximates model uncertainty as the number of models in the ensemble represent various instantiations of different models. Furthermore, a single model with various model hyperparameter settings is too considered to approximate model uncertainty. However, in this work we do not exhaustively test a large set of hyperparameter settings using a grid search on such large pretrained vectors, nor is it the primary aim. \iffalse only to state that this too approximates model uncertainty and not just the algorithm used.\fi \fi \paragraph{AutoEncoder Settings} The standard Autoencoder (AE) is a 1-hidden layer AE of hidden layer dimension $h_{d}=200$. Weights are initialized with a normal distribution, mean $\mu=0$ and standard deviation $\sigma= 1$. Dropout is used with a dropout rate $p=0.2$ for all datasets. The model takes all unique vocabulary terms pertaining to all tested word association and word similarity datasets ($n = 4819$) and performs Stochastic Gradient Descent (SGD) with batch size $\tilde{x} = 32$ trained between 50 epochs for each dataset $\forall d \in \mathcal{D}$. This results in a set of vectors $X_{j} \in \mathbb{R}^{|v_{j}| \times 200} \; \forall j$ that are then used for finding the similarity between word pairs. The above parameters were chosen ($h_d$, $\tilde{x}$ and number of epochs) over a small grid search. As stated, we compare against previous methods ~\cite{yin2015learning,bao2018meta} that use $\ell_2$ distance, as shown in Equation \ref{eq:mse_loss}). \begin{equation}\label{eq:mse_loss} \mathcal{L}_{\theta}(\hat{y},y) = \frac{1}{N}\sum_{i=1}^{N} (y^{(i)} - \hat{y}^{(i)})^{2} \end{equation} Similarly, the Mean Absolute Error ($\ell_1$ norm of difference) loss $\frac{1}{N}\sum_{i=1}^{N}|y - \hat{y}|$ is tested. We also compare against a KL divergence objective, as shown in Equation \ref{eq:kl_divergence}, \iffalse $|h|$ is the size of the layer,\fi $\hat{y}$ is the last activation output from the log-softmax that represents $q(x)$ and the KL-divergence is given as \iffalse $KL(y||\hat{y}) = \sum_{i=1}^{|h|} y\log\frac{y}{\hat{y}} + (1- y)\frac{1 - y}{1 - \hat{y}^{i}}$\fi $KL(p|q) = \sum_{i=1}^{N}p(x_i)\log \big( q(x_i)/p(x_i)\big)$. \begin{equation}\label{eq:kl_divergence} \mathcal{L}_{\theta}(\hat{y},y) = \frac{1}{N}\sum_{i=1}^{N} y^{(i)} \cdot \left( \log \big(y^{(i)}\big) - \hat{y}^{(i)} \right) \end{equation} \iffalse \begin{equation} \mathcal{L}(x, y) = \sum_{i=1}^{N}(y_{i}(\log(y_i) - a_2) \end{equation} \begin{equation}\label{eq:kl_divergence} \mathcal{L}_{sparse}(\theta) = \mathcal{L}(\theta) + \beta \sum_{j=1}^{|h|} KL(y||a_{2}) \end{equation} \fi Since $\tanh$ functions are used and input vectors are $\ell_2$ normalized we propose a Squared Cosine Proximity (SCP) loss, shown in Equation \ref{eq:cosine_loss} where $m$ is the output dimensionality. This forces the optimization to tune weights such that the rotational difference between the embedding spaces is minimized, thus preserving semantic information in the reconstruction. In the context of its utility for the TAE, we too want to minimize the angular difference between corresponding vectors in different vector spaces. It is also a suitable fit since it is a proper distance measure (i.e symmetric), unlike KL-divergence. \begin{equation}\label{eq:cosine_loss} \mathcal{L}_{\theta}(\hat{y},y) = \frac{1}{N}\sum_{i=1}^{N}\Bigg(1 - \frac{\sum_{j=1}^{m}\hat{y}_{ij} * y_{ij}}{\sqrt{\sum_{ij}^{m} \hat{y}_{ij}^{2}}\sqrt{\sum_{ij}^{m}y_{ij}^{2}}}\Bigg)^{2} \end{equation} \iffalse Equation \ref{eq:cosine_loss} shows the cosine loss derivative. \begin{equation}\label{eq:cosine_loss} \frac{\partial C(y, \hat{y})}{\partial z} = \frac{y}{|y|\cdot|\hat{y}|} - C(y, \hat{y}) \cdot \frac{y}{|\hat{y}|^{2}} \end{equation} \fi The model is kept relatively simple so that the comparisons against previous methods are directly comparable and that the performance comparison between the proposed SCP loss and KL divergence loss against MSE and MAE is controlled. Additionally, all comparison are that of models which are only trained from co-occurrence statistics that are not leveraging any external knowledge (e.g AutoExtend ~\cite{rothe2015autoextend}). \section{Experiments}\label{sec:experiments} The following word association and word similarity datasets are used throughout experimentation: Simlex ~\cite{hill2015simlex}, WordSim-353 \cite{finkelstein2001placing}, RG ~\cite{rubenstein1965contextual}, MTurk (MechanicalTurk-771)~\cite{halawi2012large}, RareWord (RW) ~\cite{luong2014addressing} and MEN ~\cite{bruni2012distributional}. The word vectors considered in the embeddings set are $\mathtt{skipgram}$ and $\mathtt{cbow}$ ~\cite{mikolov2013efficient}, FastText ~\cite{bojanowski2016enriching}, LexVec ~\cite{salle2016matrix}, Hellinger PCA (HPCA)~\cite{lebret2013word} and Hierarchical Document Context (HDC) ~\cite{sun2015learning}. We now report results on the performance of meta-embedding autoencodings with various loss functions, while also presenting target autoencoders for combinations of word embeddings and compare against existing current SoTA meta-embeddings. Table \ref{tab:meta_results} shows the scaled Spearman correlation test scores, where (1) shows the original single embeddings, (2) results for standard meta-embedding approaches that either apply a single mathematical operation or employ a linear projection as an encoding, (3) presents the results using autoencoder schemes by ~\cite{bao2018meta} that we have used to test the various losses, (4) introduces TAE without concatenating the target $Y$ embedding post-training with MSE loss and (5) shows the results of concatenating $Y$ with the lower-dimensional (200-dimensions) vector that encodes all embeddings apart from the target vector. Therefore reported results from (4) are of a 200d vector, while (5) concatenates the vector leading to a vector between 300-500 dimensions dependent on the target vector. All trained encodings from sections 3-5 are 200-dimensional vectors. Results in red shading indicate the best performing meta-embedding for all presented approaches, while black shading indicates the best performing meta-embedding for the respective section. Best performing word meta-embeddings are held between concatenated autoencoders that use the proposed Cosine-Embedding loss, while a KL-divergence also performs well on Simlex and RareWord. Interestingly, both of these dataset are distinct in that Simlex is the only dataset providing scores on \textit{true similarity} instead of free association, which has shown to be more difficult for word embeddings to account for ~\cite{hill2016simlex}, while Rareword provides morphologically complex words to find similarity between. Concretely, it would seem KL-divergence is well suited for encoding when the word relations exhibits of a more complex or rare nature. Similarly, we find SCP loss to achieve best results on RG and MEN, both the smallest and largest datasets of the set. Furthermore, the TAE variant has lead to competitive performance overall against other meta-embedding approaches and even produces best results on WS353. Lastly, we find that HPCA embeddings are relatively weak for word similarity. \begin{table}[ht] \centering \captionsetup{justification=centering, margin=0cm} \resizebox{0.95\linewidth}{!}{% \begin{tabular}{c|ccccccc} \toprule \multicolumn{1}{l}{1. Embeddings} & Simlex & WS353 & RG & MTurk & RW & MEN \\ \midrule Skipgram & \cellcolor{black!20}44.19 & \cellcolor{black!20}77.17 & 76.08 & 68.15 & \cellcolor{black!20}49.70 & 75.85\\ FastText & 38.03 & 75.33 & 79.98 & 67.93 & 47.90 & 76.36 \\ GloVe & 37.05 & 66.24 & 76.95 & 63.32 & 36.69 & 73.75 \\ LexVec & 41.93 & 64.79 & 76.45 & \cellcolor{black!20}71.15 & 48.94 & \cellcolor{black!20}80.92\\ HPCA & 16.60 & 57.11 & 41.72 & 37.45 & 13.36 & 34.90 \\ HDC & 40.68 & 76.81 & \cellcolor{black!20}80.58 & 65.76 & 46.34 & 76.03\\ \midrule \multicolumn{1}{l}{2. Standard Meta} & & & & & & & \\ \midrule CONC & \cellcolor{black!20}42.57 & \cellcolor{black!20}72.13 & \cellcolor{black!20}81.36 & \cellcolor{black!20}71.88 & 49.91 & 80.33 \\ SVD & 41.10 & 72.06 & 81.18 & 71.50 & 49.13 & 79.85 \\ AV & 40.63 & 70.5 & 80.05 & 70.51 & 49.28 & 78.31 \\ 1TON & 41.30 & 70.19 & 80.20 & 71.52 & 50.80 & \cellcolor{black!20}80.39 \\ 1TON* & 41.49 & 70.60 & 78.40 & 71.44 & \cellcolor{black!20}50.86 & 80.18\\ \midrule \multicolumn{1}{l}{3. $\ell_2$-AE} & & & & & & & \\ \midrule Decoupled & 42.56 & 70.62 & 82.81 & 71.16 & 50.79 & 80.33 \\ Concatenated & \cellcolor{black!20}43.10 & \cellcolor{black!20}71.69 & 84.52 & \cellcolor{red!20}71.88 & \cellcolor{black!20}50.78 & 81.18 \\ \midrule \multicolumn{1}{l}{$\ell_1$-AE} & & & & & & & \\ \midrule Decoupled & 43.52 & 70.30 & \cellcolor{black!20}82.91 & \cellcolor{black!20}71.43 & 51.48 & \cellcolor{black!20}81.16 \\ Concatenated & \cellcolor{black!20}44.41 & \cellcolor{black!20}70.96 & 81.16 & 69.63 & \cellcolor{black!20}51.89 & 80.92 \\ \midrule \multicolumn{1}{l}{Cosine-AE} & & & & & & & \\ \midrule Decoupled & 43.13 & 71.96 & 84.23 & 70.88 & 50.20 & 81.02 \\ Concatenated & \cellcolor{black!20}44.85 & \cellcolor{black!20}72.44 & \cellcolor{red!20}85.41 & 70.63 & \cellcolor{black!20}50.74 & \cellcolor{red!20}81.94 \\ \midrule \multicolumn{1}{l}{KL-AE} & & & & & & & \\ \midrule Decoupled & 44.13 & 71.96 & 84.23 & \cellcolor{black!20}70.88 & 50.20 & 81.02 \\ Concatenated & \cellcolor{red!20}45.10 & \cellcolor{black!20}74.02 & \cellcolor{black!20}85.34 & 67.75 & \cellcolor{red!20}53.02 & \cellcolor{black!20}81.14 \\ \iffalse DAEME & - & \cellcolor{black!20}77.3 & 83.00 & - & - & 83.00 \\ CAEME & - & 76.40 & \cellcolor{red!20}84.70 & - & - & \cellcolor{red!20}82.30 \\ AAEME & - & 76.10 & 82.70 & - & - & 83.20 \\ \fi \midrule \multicolumn{1}{l}{4. TAE} & & & & & & & \\ \midrule $\to$Skipram & 37.80 & 67.33 & 76.50 & 63.41 & 37.52 & 74.86 \\ $\to$ FastText & 38.17 & 66.62 & 77.184 & 64.73 & 37.84 & 74.77 \\ $\to$Glove & 39.95 & \cellcolor{red!20}77.14 & \cellcolor{black!20}81.58 & \cellcolor{black!20}68.82 & \cellcolor{black!20}47.94 & \cellcolor{black!20} 76.67 \\ $\to$ LexVec & 37.48 & 67.19 & 75.98 & 63.96 & 37.70 & 74.75 \\ $\to$HPCA & \cellcolor{black!20}40.78 & 65.79 & 38.64 & 59.49 & 38.65 & 74.50 \\ $\to$HDC & 38.15 & 66.96 & 76.62 & 63.08 & 37.53 & 76.62 \\ \midrule \multicolumn{1}{l}{5. TAE +$Y$} & & & & & & & \\ \midrule $\to$ Skipram & 42.43 & 75.33 & 80.11 & 66.51 & 44.77 & 78.98 \\ $\to$ FastText & 41.69 & 72.65 & 80.51 & 67.64 & 47.41 & 77.48 \\ $\to$ Glove & 41.75 & \cellcolor{black!20}76.65 & \cellcolor{black!20}82.40 & 68.92 & \cellcolor{black!20}48.83 & 78.27 \\ $\to$ LexVec & \cellcolor{black!20}42.85 & 73.33 & 80.97 & \cellcolor{black!20}69.17 & 46.71 & \cellcolor{black!20}79.63 \\ $\to$ HPCA & 40.03 & 69.65 & 70.43 & 61.31 & 36.38 & 73.10 \\ $\to$ HDC & 42.43 & 74.08 & 80.11 & 66.51 & 44.76 & 77.93 \\ \iffalse \midrule \multicolumn{1}{l}{6. CosRel-AE +$Y$} & & & & & & & \\ \midrule $\to$ Skipram & 42.43 & 75.33 & 80.11 & 66.51 & 44.77 & 78.98 \\ $\to$ FastText & 41.69 & 72.65 & 80.51 & 67.64 & 47.41 & 77.48 \\ $\to$ Glove & 41.75 & \cellcolor{black!20}76.65 & \cellcolor{black!20}82.40 & 68.92 & \cellcolor{black!20}48.83 & 78.27 \\ $\to$ LexVec & \cellcolor{black!20}42.85 & 73.33 & 80.97 & \cellcolor{black!20}69.17 & 46.71 & \cellcolor{black!20}79.63 \\ $\to$ HPCA & 40.03 & 69.65 & 70.43 & 61.31 & 36.38 & 73.10 \\ $\to$ HDC & 42.43 & 74.08 & 80.11 & 66.51 & 44.76 & 77.93 \\ \fi \bottomrule \end{tabular}% } \vspace{1em} \caption{Meta-Embedding Results} \label{tab:meta_results} \end{table} \iffalse \paragraph{Embedding Visualizations} To analyze the effect of changing the loss function we attempt to compare the learned encoded meta-embeddings from the CAEME for both MSE and Squared Cosine, corresponding to (3) in Table \ref{tab:meta_results}. Both plots show a t-SNE plot in 3-dimensions converged after 250 epochs. The embedding space contains all unique words for all word similarity datasets used. We focus on the word \say{cereal} and see that its neighborhood of various food items are shown produce better separation in this case, in comparison to the more densely clustered neighborhood seen when training the autoencoder using MSE Loss. \begin{figure}[ht] \begin{center} \includegraphics[scale=0.5]{images/meta_embedding.png} \caption{t-SNE Visualization of AE Meta-Embedding MSE (left) and Cosine (right) Losses} \end{center} \end{figure} \fi \section{Conclusion} We find the meta-embeddings trained using Autoencoders with a Squared Cosine loss and a KL-divergence loss improves performance in the majority of cases, reinforcing the argument that accounting for angles explicitly through normalization (log-softmax for KL) is an important criterion for encoding. It is particularly useful for distributed word representations, since embeddings are learned from large documents of varying length and semantics. Lastly, we have shown its use in the context of improving meta-embeddings, although this suggests cosine loss is also suitable for minimizing angular differences for word embeddings, not only for meta-embeddings. Concretely, this paper has carried out a comprehensive study of methods to embed a lower-dimensional representation from embedding sets, while proposing losses that explicitly keep angular information intact for meta-embeddings.
\section{Introduction and Statement of Results} K3 surfaces are complex surfaces characterized by their particularly simple Hodge structures and trivial holomorphic tangent bundles. These manifolds are of particular interest to physicists and mathematicians. For physicists, they serve as useful examples of Calabi-Yau manifolds, which are a class of spaces central in string theory, and for mathematicians, they serve as an interesting yet sufficiently simple example in 4-manifold theory and complex differential geometry. These two roles came together in an unexpected way when in \cite{YZ} Yau and Zaslow conjectured (and later Beauville proved in \cite{Arn}) that the count of $n$-nodal curves on a K3 surface is equal to the Euler characteristic $\chi(\text{Hilb}^n(S))$ of Hilbert schemes of $n$ points on a K3 surface $S$. Yau and Zaslow's conjecture made use of a previous theorem of G\"ottsche (see \cite[p.~37]{GotBook}) that provides an infinite product encoding the Euler characteristics $\chi(\mathrm{Hilb}^n(S))$ for Hilbert schemes of a K3 surface $S$. These Euler characteristics can be assembled in the form of the generating function \beq X_S(\tau) := \sum_{n =0}^\infty \chi(\mathrm{Hilb}^n(S)) q^n= \frac{q}{\Delta(\tau)} =\prod_{n=1}^\infty\frac{1}{(1-q^n)^{24}},\label{eq:Delta} \eeq where $\Delta(\tau)$ is the modular discriminant and $q:=e^{2\pi i\tau}.$ G\"ottsche stated a more refined infinite product formula concerning Hodge numbers, which are cohomological invariants that can be assembled into Betti numbers and the Euler characteristic. Recently, Manschot and Zapata Rolon \cite{Manschot} studied the asymptotic distribution of linear combinations of these Hodge numbers, which are realized as coefficients of Laurent polynomials called the $\chi_y$ genera for K3 surfaces (see (\ref{eq:chiy}) for a definition of $\chi_y$). The $\chi_y$ genera can also be assembled using the generating function \beq Y_S(y; \tau) := \sum_{m,n} b_S(m;n) y^m q^n := \sum_{n \geq 0} \chi_y(\mathrm{Hilb}^n(S)) q^n \label{eq:Y-series}. \eeq Akin to (\ref{eq:Delta}), G\"ottsche also provides an infinite product for $Y_S(y;\tau)$ (see Lemma \ref{lem:gottsche_prod}). Manschot and Zapata Rolon \cite{Manschot} found for K3 surfaces $S$ that if $m$ is fixed, then as $n\rightarrow\infty$ we have $$b_S(m;n) \sim \dfrac{\pi}{3 \sqrt{2}} n^{-\frac{29}{4}} \cdot \exp(4 \pi \sqrt{n}).$$ Moreover, since the asymptotics for $b_S(m;n)$ do not depend on $m,$ if we define $$b^*_S(r; n) := \sum_{m \equiv r \Mod{2}} b_S(m;n), $ it follows that $b^*_S(0;n)\sim b^*_S(1;n)$ as $n \to \infty.$ From a geometric perspective, $n$ corresponds to the length of the Hilbert scheme, and $m$ corresponds to a particular monomial in the $\chi_y$-genus of $\text{Hilb}^n(S)$. Grouping the contributions by the coefficients of these monomials in residue classes mod $2$, we obtain an equidistribution in the limit as $n$ goes to infinity. G\"ottsche's formula for Hodge numbers $h^{s,t}(\text{Hilb}^n(S))$ of Hilbert schemes of $n$ points for K3 surfaces is a special case of his more general formula, which states that for any smooth projective complex surface $S$, we have \beq \label{eq:zetadef} Z_S(x,y;\tau) := \sum_{n\geq0}\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))q^n =\prod_{n =1}^\infty \frac{\prod_{s +t \mathrm{\ odd}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}{\prod_{s +t \mathrm{\ even}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}. \eeq For later use, we define $c_S(s,t;n)$ to be the coefficient of $x^sy^tq^n$ in the power series expansion of $Z_S(x,y;\tau) $. \skipaline \noindent \tbf{Remark:} The \emph{Hodge polynomial} $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))$ is a Laurent polynomial in $\bZ[x,y,x^{-1}, y^{-1}],$ and we will sometimes write it as $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$ to make explicit the Hodge polynomial's dependence on $x$ and $y.$ If we specialize $x$ and $y$ to $\pm1$, then $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$ evaluates to different linear combinations of important topological invariants. See Section \ref{sec:gen_functions} for a more detailed discussion of $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$. \skipaline We seek exact formulas for sequences assembled from the coefficients of (\ref{eq:zetadef}) for a more general class of smooth projective complex surfaces. We consider the distribution of the coefficients $c_S(s,t;n)$ over residue classes mod 2; namely, if we let \beq \label{eq:c-special} c^*_{S}(r_1, r_2;n):= \sum_{\substack{{t \equiv r_1} \Mod{2}\\ {s \equiv r_2} \Mod{2} }} c_S(s,t;n),\eeq we seek to determine the asymptotic properties of the sequences $b^*_S(r;n)$ and $c^*_{S}(r_1, r_2;n)$. To this end, we consider the asymptotics of the $q$-series \beq \label{eq:bigC} C_S(r_1,r_2;\tau) := \sum_{n \geq 0} c^*_{S}(r_1, r_2;n)q^n.\eeq Our main result is the following. See Section \ref{sec:gen_functions} for a more detailed discussion of the cohomological invariants for which we state exact formulas and asymptotics below. \begin{theorem}\label{thm:main_result} Let $S$ be a smooth projective surface. Then we have the following exact formulas: \ben \item If $0 \leq \chi(S) < 24n$, then we have \label{eq:Euler_char_exact_formula} \begin{align*} \chi(\mathrm{Hilb}^n(S))=&2\pi \sum_{j<{\frac{\chi(S)}{24}}} \sum_{{k=1}}^\infty k^{\chi(S)/2}A_{k}(-\chi(S),0,j;n) \chi(\mathrm{Hilb}^j(S)) L^*(0,j,k;n). \end{align*} \item If $\sigma(S) \leq \chi(S)< 24n$, then we have \begin{align*} \sigma(\mathrm{Hilb}^n(S))= & \hspace{5mm} 2\pi \sum_{j<{\frac{\chi(S)}{24}}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^\infty \frac{A_{k}(\sigma(S),\Lambda(S),j;n) \sigma(\mathrm{Hilb}^j(S)) }{k^{\Lambda'(S)/2}}L^*(0,j,k;n)\\ \nonumber &+ 2\pi\sum_{j<\frac{3\sigma(S) -\chi(S)}{48}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^\infty \frac{(-1)^nB_{k}(\sigma(S),\Lambda(S),j;n)a(\Lambda(S),\sigma(S);j)}{ 2^{\Lambda(S)/2}k^{\Lambda'(S)/2}}L^*(1,j,k;n) . \end{align*} where $\Lambda(S):=-(\sigma(S) + \chi(S))/2$ and $\Lambda'(S):=(\sigma(S) - \chi(S))/2$. \een Here $a(\alpha,\beta,j)$, $A_{k}(\alpha,\beta,j;n)$, $B_{k}(\alpha,\beta,j;n)$, $L^*(0,j,k;n)$, and $L^*(1,j,k;n)$ are defined in Section \ref{sec:Circle_method_outline}, (\ref{eq:Kloosterman_def1}), (\ref{eq:Kloosterman_def2}), (\ref{eq:L0Bessel}), and (\ref{eq:L1Bessel}), respectively. \end{theorem} { \noindent \tbf{Remark:} In Theorem \ref{thm:main_result}, $A_k(\alpha,\beta,j;n)$ and $B_{k}(\alpha,\beta,j;n)$ are known as Kloosterman sums, and $L^*(0,j,k;n)$ and $L^*(1,j,k;n)$ are, up to simple multiplicative factors, modified Bessel functions of the first kind. \medskip } Theorem \ref{thm:main_result} offers exact formulas as convergent infinite series. These formulas imply the following asymptotics. \begin{corollary}\label{cor:asymptotics} Let $S$ be a smooth projective surface. Then the following are true: \begin{enumerate} \item Suppose $\chi(S) \geq \sigma(S)$. \bena \item If $\sigma(S) < 0,$ then as $n \to \infty,$ we have \bal \sigma(\mathrm{Hilb^n}(S)) \sim & (-1)^n 2^{\frac{7\sigma(S)-3\chi(S)-14}{8}}3^{\frac{\sigma(S)-\chi(S)-2}{8}} (\chi(S)-3\sigma(S))^{\frac{\chi(S)-\sigma(S)+2}{8}} n^{\frac{\sigma(S)-\chi(S)-6}{8}} \\ & \cdot \exp\left(\pi\sqrt{\frac{\chi(S)-3\sigma(S)}{6}n}\right). \eal \item If $\sigma(S) >0$, then as $n \to \infty,$ we have $$\sigma(\mathrm{Hilb^n}(S)) \sim 2^{\frac{3\sigma(S) -3\chi(S)-14}{8}} 3^{\frac{\sigma(S)-\chi(S)-2}{8}} \chi(S)^{\frac{ \chi(S) -\sigma(S)+2}{8}} n^{\frac{\sigma(S)-\chi(S)-6}{8}} \exp\left(\pi\sqrt{\frac{\chi(S)}{6}n}\right).$$ \item If $\sigma(S)=0$ and $\chi(S) \neq 0$, then as $n\to\infty$, we have $$\sigma(\mathrm{Hilb^{2n}}(S)) \sim 2^{\frac{-\chi(S) -3}{2}} 3^{\frac{-\chi(S)-2}{8}} \chi(S)^{\frac{2+\chi(S)}{8}} n^{\frac{-\chi(S)-6}{8}} \exp\left(\pi\sqrt{\frac{\chi(S)}{3}n}\right). $$ Moreover, for all $n$ we have $$\sigma(\mathrm{Hilb^{2n+1}}(S)) = 0.$$ \item If $\sigma(S) =\chi(S) =0$, we have for all $n$, $$\sigma(\mathrm{Hilb^{n}}(S)) = 0.$$ \een \item \bena \item If $\chi(S) > 0,$ then, as $n \to \infty,$ we have $$\chi(\mathrm{Hilb}^n(S)) \sim 2^{\frac{-3\chi(S)-5}{4}}3^{\frac{-\chi(S)-1}{4}}\chi(S)^{\frac{\chi(S)+1}{4}}n^{\frac{- \chi(S)-3}{4}}\exp\left(\pi\sqrt{\frac{2\chi(S)}{3}n}\right).$$ \item If $\chi(S) =0$, then for all $n$ we have $$\chi(\mathrm{Hilb}^n(S)) =0.$$ \een \end{enumerate} \end{corollary} The asymptotics in Corollary 1.2 imply the following asymptotic properties of $b^*_S(r;n)$ and $c_S^*(r_1,r_2;n)$. \begin{corollary}\label{cor:equidistribution} Let $S$ be a smooth projective surface. Then the following are true: \begin{enumerate} \item Suppose that $\chi(S) \geq \sigma(S)$. If $\chi(S)+\sigma(S)>0$, then as $n \to \infty $ we have $$b^*_S(0;n) \sim b^*_S(1;n). $$ If $\chi(S)+\sigma(S) =0$, then as $n \to \infty $ we have $$ b^*_S(1;n) =0. $$ If $\chi(S)+\sigma(S) <0$, then as $n \to \infty $ we have $$b^*_S(0;n) \sim - b^*_S(1;n). $$ \item Suppose that $\chi(S) \geq \sigma(S)$. If $h^{1,0}=0$, then as $n \to \infty $ we have $$c_S^*(0,0;n) \sim c_S^*(1,1;n) \ \ \text{and} \ \ c_S^*(0,1;n)=c_S^*(0,1;n) =0.$$ If $h^{1,0}>0$, then as $n \to \infty $ we have $$c^*_{S}(0,0;n) \sim c^*_{S}(1,1;n) \sim -c^*_{S}(0,1;n) = -c^*_{S}(1,0;n).$$ \end{enumerate} \end{corollary} Note that when $S$ is a K3 surface, Corollary \ref{cor:equidistribution} (1) recovers the equidistribution of the $b_S^*(r; n)$ that follows from the work of Manschot and Zapata Rolon in \cite{Manschot}. \medskip \noindent \tbf{Remark:} The Enriques-Kodaira Classification Theorem \cite[p.~244]{CCS} mostly describes the possible Hodge structures of smooth complex surfaces. This theorem lists minimal models for many birational equivalence classes of surfaces, which determine $h^{0,0}$, $h^{1,0}$, $h^{2,0}$, and $\min\{h^{1,1}\}$ for that class. By the blowup construction, every smooth complex projective surface $S$ is birationally equivalent to a smooth complex projective surface $S'$ with $h^{1,1}(S')=h^{1,1}(S)+1$ and $h^{s,t}(S') = h^{s,t}(S)$ for $(s,t) \neq (1,1)$. A minimal model of a birational equivalence class is a surface that is not a blowup of any other smooth surface. Since $\chi(S)$ and $\chi(S)-\sigma(S)$ increase linearly with $h^{1,1}(S)$, Theorem \ref{thm:main_result}, Corollary \ref{cor:asymptotics}, and Corollary \ref{cor:equidistribution} apply to all surfaces in each birational equivalence class except those whose Hodge structures fall in a certain finite set. In particular, if the minimal model satisfies the hypotheses of these statements, then all surfaces in that class satisfy them. Excluding surfaces of general type, the only classes of projective surfaces whose minimal models do not satisfy these hypotheses are ruled surfaces of genus $g \geq 2$ (see \cite{CCS} and \cite{Schutt}). \skipaline In Section \ref{sec:gen_functions}, we will define all of the terms above and describe their topological and geometric significance. We will also state important properties of the generating functions of these sequences, which will be crucial in our deduction of the above formulas. In Section \ref{sec:Circle_method_outline} we will outline { our use of the circle method to prove} Theorem \ref{thm:exactFormulasFor_H}, a general result from which Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} are derived. { Sections \ref{sec:even_case} and} \ref{sec:odd_case} include arguments necessary for this proof. In Section \ref{sec:proofs}, these arguments are assembled, and Theorem \ref{thm:exactFormulasFor_H}, Theorem \ref{thm:main_result}, and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} are proven. In Section \ref{sec:numerics} we illustrate our results with numerics. \section{{ Preliminaries}} \label{sec:gen_functions} { In this section, we present G\"ottsche's result and specialize it in terms of weakly holomorphic modular forms. We then provide bounds on certain exponential sums known as Kloosterman sums and bounds on $I$-Bessel functions. Both Kloosterman sums and Bessel functions will appear in our application of the circle method in Sections \ref{sec:even_case} and \ref{sec:odd_case}.} A compact complex manifold $M$ has cohomological invariants called the Hodge numbers $h^{s,t}:=h^{s,t}(M),$ which are defined as the complex dimensions of the $(s,t)$-Dolbeault cohomology space $H^{s,t}(M)$ (see \cite{Wells}). When the context is clear, we will not explicitly indicate dependence of the Hodge numbers $h^{s,t}$ on the manifold $M$. If $M$ is a K\"ahler manifold, the Hodge numbers are related to the Betti numbers $b_n(M)$ by the formula \beq b_n(M)= \sum_{s+t=n}h^{s,t}(M) \label{eq:Betti_Hodge} \eeq (see \cite[p.~198]{Wells}). Moreover, for any manifold $M$ one can construct a manifold $\text{Hilb}^n(M)$ which can be thought of as a smoothed version of the $n^{th}$ symmetric product of $M$ (see \cite{Hart}). For any smooth projective complex surface $S,$ G\"ottsche's formula allows one to compute the Hodge numbers of $\text{Hilb}^n(S)$ for all $n$ from the Hodge numbers of $S$. In order to state G\"ottsche's result, we first define the Hodge polynomial, which serves as a generating function for the Hodge numbers of $M$: \beq \begin{aligned} \label{eq:chihodge} \chi_{\mathrm{Hodge}}(M)(x,y) := & x^{-d/2}y^{-d/2}\sum_{s,t}h^{s,t}(M)(-x)^s(-y)^t, \end{aligned} \eeq where $d$ is the complex dimension of $M$. We will generally supress the $(x,y)$ for notational convenience. On page 37 of \cite{GotBook}, G\"ottsche proved the remarkable fact that one can assemble the Hodge polynomial for $\mathrm{Hilb}^n(S)$ using the Hodge numbers $h^{s,t}(S)$. \bthm[G\"ottsche]\label{thm:gottsche} If $S$ is a smooth projective complex surface, then we have that $$Z_S(x,y;\tau):=\sum_{n\geq0}\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))q^n =\prod_{n =1}^\infty \frac{\prod_{s +t \mathrm{\ odd}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}{\prod_{s +t \mathrm{\ even}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}. $$ \ethm \noindent \tbf{Remark:} Note that for each $n$, $|s|,|t|\leq n$ in the definition of $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))$.\medskip \noindent By \cite[p.~43]{Ball}, every such smooth projective complex surface $S$ is K\"ahler, so by Serre duality and Hodge symmetry, the Hodge numbers satisfy the following relations: $$ h^{0,0}=h^{2,2} \qquad \qquad h^{1,0}=h^{0,1}= h^{1,2}=h^{2,1} \qquad \qquad h^{2,0}=h^{0,2}. $$ By the additivity of the Hodge numbers, we need only consider the case where $M$ is connected, i.e. $h^{0,0}=1$. In this case, we obtain: \beq \label{eq2} Z_S(x,y;\tau)=\prod_{n =1}^\infty \frac{\big((1- x^{-1}q^n)(1- xq^n)(1- y^{-1}q^n)(1-yq^n)\big)^{h^{1,0}}}{(1- x^{-1}y^{-1}q^n)(1- xyq^n)\big((1- x^{-1}yq^n)(1- xy^{-1}q^n)\big)^{h^{2,0}}(1-q^n)^{h^{1,1}}}. \eeq This polynomial gives rise to other topological invariants upon substituting $\pm 1$ for $x$ and $y.$ For example, the Hirzebruch $\chi_y$-genus of $M$ is the polynomial \beq \label{eq:chiy} \chi_y(M):=\sum_{s,t} (-1)^t h^{s,t}(M) y^s. \eeq We can express this in terms of the Hodge polynomial: $$ \chi_{\text{Hodge}}(\text{Hilb}^n(S))(y,1)= y^{-n} \sum_{s,t} (-1)^t h^{s,t}(\text{Hilb}^n(S))(-y)^s = \chi_{-y}(\text{Hilb}^n(S))y^{-n}. $$ In terms of the Betti numbers, the Euler characteristic $\chi(M)$ is defined as \beq \label{euchar} \chi(M):= \sum_n (-1)^n b_n(M). \eeq Setting $x = 1$ and $y = 1$ in the Hodge polynomial, we see in reference to (\ref{eq:Betti_Hodge}) and (\ref{euchar}) that \beq \label{eq:euch} \chi_{\text{Hodge}}(\text{Hilb}^n(M))(1,1) = \chi_{-1}(\text{Hilb}^n(M))= \chi(\text{Hilb}^n(M)). \eeq On the other hand, setting $x = -1$ and $y = 1$ in the Hodge polynomial gives \beq \label{eq:sig} \chi_{\text{Hodge}}(\text{Hilb}^n(M))(-1,1) = (-1)^n \chi_{1}(\text{Hilb}^n(M))=(-1)^n \sigma(\text{Hilb}^n(S)),\eeq where the signature $\sigma(M)$ of a $d$-dimensional complex manifold $M$ is the signature of the intersection pairing on $H^d(M)$ (see \cite{May}). In terms of Hodge numbers of K\"ahler surfaces $S$, the signature is given by $$\sigma(S)= 2h^{2,0}+2-h^{1,1}.$$ The discussion above indicates the importance of G\"ottsche's infinite product formulas (Theorem \ref{thm:gottsche}) as a vehicle for studying invariants of complex projective surfaces. This is further illuminated by the following specializations of Theorem \ref{thm:gottsche} in terms of these invariants. \begin{lemma}\label{lem:gottsche_prod} If $S$ is a smooth projective complex surface, then the following are true: \begin{align} \sum_{n =0}^\infty \chi_{-y}(\mathrm{Hilb}^n(S))y^{-n}q^n= & \prod_{n =1}^\infty \frac{((1- y^{-1}q^n)(1-yq^n))^{h^{1,0}-h^{2,0}-1}}{(1-q^n)^{h^{1,1}-2h^{1,0}}}, \label{sp1} \\ \sum_{n=0}^\infty \chi(\mathrm{Hilb}^n(S))q^n= & \prod_{n=1}^\infty (1-q^n)^{-\chi(S)}, \label{sp2} \\ \sum_{n=0}^\infty (-1)^n \sigma(\mathrm{Hilb}^n(S))q^n= & \prod_{n=1}^\infty \frac{(1-q^n)^{\sigma(S)}}{(1-q^{2n})^{(\sigma(S) + \chi(S))/2}}. \label{sp3} \end{align} \end{lemma} \noindent \tbf{Remark:} We note that (\ref{sp2}) and (\ref{sp3}) are alternate expressions for $Z(1,1;\tau)$ and $Z(1,-1;\tau)=Z(-1,1;\tau)$, respectively. We can apply the same process to $Z(-1,-1;\tau)$ to obtain \beq \label{eq:minus_expression} Z(-1,-1;\tau)= \prod_{n=1}^\infty \frac{(1-q^n)^{4h^{1,0}}}{(1-q^{2n})^{\chi(S)+8h^{1,0}}}. \eeq We now show that these functions can be assembled in linear combinations to give alternate formulas for $B_S(r;\tau)$ and $C_S(r_1,r_2;\tau)$. \blem\label{lem:roots_of_unity} Let $S$ be a smooth projective complex surface. We have \beq \label{eq:B_sum} B_S(r, \ell;n) = \frac{1}{2}\left( Z_S(1,1;\tau) + (-1)^r Z_S(1,-1;\tau)\right) \eeq and \beq \label{eq:now} C_S(r_1, r_2;\tau) = \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau), \eeq where $C_S(r_1, r_2;\tau)$ is defined by (\ref{eq:bigC}). \elem \bpf We prove only (\ref{eq:now}), since (\ref{eq:B_sum}) { follows from even simpler manipulations.} We have \bal \sum_{n \geq 0} c^*_S(r_1, r_2;n) q^n = & \frac{1}{4} \sum_{s, t ,n } c_S(s,t;n)\sum_{\substack{ j_1 \Mod{2} \\ j_2 \Mod{2}}} (-1)^{j_2(s+r_2)} (-1)^{j_1(t+r_1)}q^n \\ = & \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}}(-1)^{j_2r_2} (-1)^{j_1r_1} \sum_{s, t , n} c_S(s, t; n) (-1)^{j_2s} (-1)^{j_1t}q^n \\ = & \frac{1}{4} \sum_{\substack{ j_1\Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau). \eal \epf \subsection{Modularity Properties of Specializations of G\"ottsche's Identity \label{sec:trans_law}} The infinite products (\ref{sp2}), (\ref{sp3}), and (\ref{eq:minus_expression}) can be written in terms of the Dedekind eta function, the weight 1/2 modular form { on $SL_2(\bZ)$ (with multiplier)} that is defined by \begin{equation}\label{eq:eta} \eta(\tau) := q^{1/24} \prod_{n=1}^\infty (1-q^n). \end{equation} This is done explicitly in the following lemma. \begin{lemma}\label{lem:z_to_h} Let $S$ be a smooth projective complex surface. We have that \begin{align} \label{sp5} Z_S(1,1;\tau) = & q^{{\chi(S)}/{24}} \frac{1}{{\eta(\tau)}^{\chi(S)}}, \\ \label{sp6} Z_S(-1,1;\tau) = Z_S(1,-1;\tau) = & q^{{\chi(S)}/{24}}\frac{\eta(\tau)^{\sigma(S)}}{\eta(2 \tau)^{(\sigma(S) +\chi(S))/{2}}}, \\ \label{sp7} Z_S(-1,-1;\tau) = & q^{\chi(S)/24}\frac{\eta(2 \tau)^{4h^{1,0}}}{\eta(\tau)^{\chi(S)+8h^{1,0}}}. \end{align} \end{lemma} { Having expressed $Z_S( \pm 1, \pm1; \tau)$ as an eta quotient (up to a fractional power of $q$)}, we define \begin{equation}\label{eq:hab_def} H_{\alpha, \beta}({ q}) := q^{\chi(S)/24} \eta(\tau)^\alpha \eta(2 \tau)^\beta =: Z_S( x,y; \tau), \end{equation} where $x,y = \pm 1$ and $\alpha$ and $\beta$ are determined by $x, $ $y$, and the Hodge numbers of $S$. { Thus, (up to a fractional power of $q$)}, $H_{\alpha, \beta}$ is a modular form on $\Gamma_0(2)$. { In our application of the circle method} to prove our main results, we use the modularity of $H_{\alpha,\beta}$ to determine the behavior of this function when $\tau$ is near the rational number $h/k$. The modular transformation equations for $H_{\alpha, \beta}$ are given in the following lemma. { The $q$-expansion of $H_{\alpha,\beta}$ gives the behavior of $H_{\alpha,\beta}$ for $\tau$ near $i \infty$, and this lemma relates the behavior of $H_{\alpha,\beta}$ near $i\infty$ to its behavior near $h/k.$ We present two transformation equations, corresponding to the two different cusps of $\Gamma_0(2)$. These cusps partition the rationals $h/k$ into two parts, based on the parity of $k$. The two cusps will make distinct contributions to our final formula. } \blem\label{lem:trans_law} Let $k$ be a positive integer, let $h$ satisfy the condition $(h,k) =1$, and let $h'$ satisfy $hh' \equiv -1 \mod k$. Further suppose $\mathrm{Re}(z) >0$. Define $$\omega_{\alpha, \beta}(h,k) :=\exp\left(- \pi i( \alpha s(h,k)+\beta s(2h,k))\right),$$ where $s(h,k)$ is the Dedekind sum \bal s(h,k) := &\sum_{r=1}^{k-1} \bigg(\bigg(\frac{r}{k}\bigg)\bigg)\bigg(\bigg( \frac{hr}{k}\bigg)\bigg), \eal and $((x))$ is the sawtooth function \bal ((x)) := & \bcas 0 & x \in \bZ \\ x-\lfloor x\rfloor - \frac{1}{2} & x \notin \bZ. \ecas \eal \begin{enumerate} \item If $2 \mid k$, we have \begin{align*} H_{\alpha,\beta} &\left( \exp \left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right) \right) \\ &= z^{-\frac{\alpha + \beta}{2}}\omega_{\alpha, \beta}(h,k) \cdot \exp \left( (\alpha + 2 \beta)\dfrac{\pi}{12 k} \left( z -\dfrac{1}{z} \right) \right) \cdot H_{\alpha, \beta} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right). \end{align*} \item If $2 \nmid k$, we have \begin{align*} H_{\alpha, \beta} & \left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ \hspace{5mm} \qquad & = \frac{z^{-\frac{\alpha + \beta}{2}}\omega_{\alpha, \beta}(h,k)}{2^{\beta/2}} \cdot \exp \left( \frac{\pi}{24k}\left( {2(\alpha + 2 \beta)}z -\frac{2\alpha + \beta}{z}\right) \right) \cdot H_{\beta,\alpha}\left(\exp\left(\frac{\pi ih'}{k} - \frac{\pi}{zk} \right)\right). \end{align*} \end{enumerate} \elem \bpf From \cite[p.~96]{Apostol}, we know {\begin{align*} H_{-1,0}&\left(\exp\left(\dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k}\right)\right)\\ &= z^{\frac{1}{2}} \exp(\pi i s(h,k)) \exp\left(\dfrac{\pi}{12k} \left(\dfrac{1}{z} - z\right)\right) H_{-1,0}\left(\exp\left(\dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{k z}\right)\right), \end{align*} where $(h,k) =1$, ${\tau= (iz + h)/k}$, $hh' \equiv -1 \mod k$, and $s(h,k)$ is the Dedekind sum defined above. Similarly, \cite{Hagis3} shows that if $2 \mid k$, then \begin{align*} H_{-1,1}&\left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ &= \exp ( \pi i (\sigma(h,k) ) \exp \left( \dfrac{\pi}{12 k} \left(z - \dfrac{1}{z} \right) \right) H_{-1,1} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right), \end{align*} where $\sigma(h,k) := s(h,k)-s(2h,k)$, and if $2 \nmid k$ \begin{align*} H_{-1,1}&\left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ &= 2^{-\frac{1}{2}}\exp(\pi i \sigma(h,k))\exp\left(\frac{\pi}{24k}\left(\frac{1}{z} + 2z\right)\right)H_{-1,1}\left(\exp\left(\frac{ \pi ih'}{k} - \frac{\pi}{zk} \right)\right)\inv \end{align*}} \noindent To prove the lemma, { we} { note} that $H_{\alpha, \beta}({ q}) = H_{-1,0}({ q}) ^ {-(\alpha + \beta)} \cdot H_{-1,1}({ q}) ^ \beta$ and $H_{\alpha,0} ({ q^2}) = H_{0,\alpha}({ q})$. \epf { \noindent \tbf{Remark:} When we apply the circle method to find the coefficients of the $q$-expansion of $H_{\alpha, \beta}$ in Sections \ref{sec:Circle_method_outline}, \ref{sec:even_case}, and \ref{sec:odd_case}, we consider $\tau \in \bH$ on the horizontal line segment $$L = \{\tau \ | \ \tau = u + N^{-2} i, \ 0 \leq u \leq 1 \}.$$ As $N \to \infty$, $L$ approaches the positive real axis directly from above. As discussed in Section \ref{sec:Circle_method_outline}, for the purpose of estimates we partition $L$ into line segments that have midpoints at $h/k + i N^{-2}$ for cusp representatives $0 \leq h / k \leq 1$ and $k \leq N.$ When we reparameterize these line segments in terms of the variable $z$ introduced in the statement of Lemma \ref{lem:trans_law}, they become small vertical line segments just to the right of the origin in the $z$-plane. Lemma \ref{lem:trans_law} allows us to estimate the value of $H_{\alpha, \beta}$ for $z$ on these small vertical line segments. } { \subsection{Bounds on certain Kloosterman sums\label{sec:Kloosterman}} In order to bound the error terms that will result from estimating the contour integral \eqref{eq:countour_integral}, we need bounds on Kloosterman sums of the form \begin{align} \label{eq:Kloosterman_def1} A_k(\alpha,\beta,j;n):= & \sum_{\substack{0\leq h<k\\(h,k)=1}}\omega_{\alpha, \beta}(h,k)\exp\left(-\frac{2\pi inh}{k}+\frac{2\pi ih'j}{k}\right) \\ =: & \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \end{align} and \begin{align} \label{eq:Kloosterman_def2} B_k(\alpha,\beta,j;n):= & \sum_{\substack{0\leq h<k\\(h,k)=1}}\omega_{\alpha, \beta}(h,k)\exp\left(-\frac{2\pi inh}{k}+\frac{\pi ih'j}{k}\right) \\ =: & \sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n). \end{align} These sums admit the trivial estimate $O(k)$. However, in the case $\alpha + \beta = 0$, we will need a sharper estimate. In addition, we will occasionally restrict the values of $k_i$ to an interval $N-k < k_i \leq \sigma < N$, which will in turn restrict $h'$ to one or two intervals modulo $k$. For bounding purposes, it suffices to consider sums of the form $$ \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \qand \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n)$$ where the $'$ indicates that $h'$ is restricted to an interval $0 \leq \sigma_1 \leq h' < \sigma_2 \leq k$. Thus we will need the following lemma. \blem For $\alpha$ and $\beta$ fixed, $\alpha + \beta =0$, the sums $$ \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \qand \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n)$$ are subject to the estimate $$O(n^{1/3}k^{2/3 + \ep}) $$ uniformly in $\sigma_1$, $\sigma_2$, and $j$. \label{lem:Kloosterman} \elem \bpf The proof is a simple adaptation of those of Theorems 2 and 3 of \cite{Hagis3}, which follow the proof of Theorem 2 in \cite{Lehner}. Equations (3.5) and (4.11) in \cite{Hagis3} together state that if $2 \mid k$, we have $$\exp({ \pi i (s(h,k)-s(2h,k)})) = \exp\left(2 \pi i \left( \frac{4\phi(uh + vh')}{(k/2,2)Gk}+r(h,k)\right)\right) $$ where $r(h,k)$ is a rational number that depends on $k$ and $h $ mod 4, $\phi$, $G$, and $v$ are integers that depend only on $k$, and $u$ is a polynomial in $k$. (5.7) states that if $2 \nmid k$, then $$\exp({ \pi i (s(h,k)-s(2h,k)})) = \exp\left(2 \pi i \left( \frac{\Phi(uh + vh')}{gk}+r(h,k)\right)\right) $$ with $r$, $v$ and $u$ as before, and $\Phi$ and $g$ integers dependent on $k$. The proof of Lemma \ref{lem:Kloosterman} proceeds as in \cite{Hagis3}, with $u$, $v$, and $r$ replaced with $\beta u$, $\beta v$ and $\beta r$, respectively. \epf } { \subsection{Bounds on $I$-Bessel functions} As noted in the introduction, an important ingredient in our exact formulas is the modified Bessel function of the first kind, which is also known as the $I$-Bessel function. Here we recall a number of facts from \cite{NIST} about $I$-Bessel functions that will be useful throughout our arguments. We define the $I$-Bessel function of order $v$ as \begin{equation*} I_v(z) := \bigg( \dfrac{z}{2} \bigg)^v \sum_{k = 0}^\infty \dfrac{\big( \frac{1}{4} z^2 \big)^k}{k! \Gamma(v + k + 1)}. \end{equation*} From this definition it follows that for $0 < x < 1,$ we have \begin{equation}\label{eq:geom_bes_bound} |I_v(x)| < \frac{4}{3} \cdot \Big( \frac{x}{2} \Big)^v. \end{equation} We also recall an integral representation of the $I$-Bessel function which we will use in Sections \ref{sec:even_case} and \ref{sec:odd_case}: for $v \geq 0,$ we have \begin{equation}\label{eq:bes_int} I_v(z)=\frac{\left(\frac{1}{2}z\right)^{-v}}{2\pi i}\int_Rt^{v-1}\exp\left[t+\frac{z^2}{4t}\right]dt, \end{equation} where $R$ is any simple closed contour surrounding the origin. } \section{Outline of the circle method \label{sec:Circle_method_outline}} In this section, we outline our use of the circle method to find exact formulas for coefficients $a(\alpha, \beta;n)$ of $H_{\alpha, \beta}$ where $\alpha+\beta\leq 0$. This corresponds to those cases where $H_{\alpha,\beta}$ is essentially a modular form of non-positive weight. { These cases are special because non-constant holomorphic modular forms do not exist in non-positive weight.} We make use of the method of Rademacher, introduced in \cite{Rademacher_partitions}, which improved upon the earlier work of G. H. Hardy and Srinivasa Ramanujan on the partition function. We adapt the implementation of this method along the lines of earlier works by Hagis (see \cite{Hagis3}, \cite{Hagis4}, and \cite{Hagis5}). The basic ingredient of the circle method is Cauchy's integral formula, which we use to obtain \begin{equation}\label{eq:countour_integral} a(\alpha,\beta;n)=\frac{1}{2\pi i}\int_C \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq. \end{equation} { We let $C$ be the circle of radius $e^{-2\pi N^{-2}}$ centered at the origin, where $N$ is an upper bound on the denominator of the cusp representatives under consideration. We emphasize that we choose $C$ to be a circle with this particular radius; there are many paths that could be chosen in applying Cauchy's integral formula, but the one we choose here is a particular choice following the implementation of the circle method in \cite{Hagis3}, \cite{Hagis4}, and \cite{Hagis5}.} The exponent $n$ will be fixed, and $N$ will later be allowed to approach infinity. As $N \to \infty$, the main contribution to this integral comes from a dense set of poles on the boundary of the unit circle, where each pole is located at a root of unity $e^{2 \pi i h/k}$. { The locations of these poles follow from the definition of $H_{\alpha, \beta}$ in \eqref{eq:hab_def} and the location of the zeros of $\eta(\tau)$ afforded by the product representation \eqref{eq:eta}.} The generating function $H_{\alpha, \beta}$ is, up to a fractional power of $q$, a modular form with non-positive weight on $\Gamma_0(2)$ in the cases we consider. As shown in Lemma \ref{lem:trans_law}, we have that $H_{\alpha, \beta}$ has a pole of order $-(\alpha + 2\beta)/24$ at the cusp of $\Gamma_0(2)$ whose representatives have all even denominators and a pole of order $-(2\alpha + \beta)/48$ at the cusp whose representatives have all odd denominators. Since we have descriptions of $H_{\alpha,\beta}$ near all roots of unity, we divide $C$ into \emph{Farey arcs} $\xi_{h,k}$ for $(h,k)=1$, which decrease in length and approach the point $e^{2 \pi i h/k}$ as $N$ increases. Figure \ref{fig:Farey} shows the Farey arc $\xi_{1,3}$ for $N=10$, $20$, and $30$. By estimating $H_{\alpha,\beta}$ along these Farey arcs, we obtain a convergent series for the coefficients $a(\alpha; \beta, n)$ as $N \to \infty.$ These series are exact formulas which yield Theorem \ref{thm:exactFormulasFor_H}. \begin{figure}[h] \centering \includegraphics[scale=.5]{Farey2.png} \caption{Farey arcs $\xi_{1,3}$} \label{fig:Farey} \end{figure} We will need explicit descriptions of these Farey arcs. First, we can rewrite \[\frac{1}{2\pi i}\int_C \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq=\sum_{\substack{0\leq h<k\leq N\\(h,k)=1}}\frac{1}{2\pi i}\int_{\xi_{h,k}} \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq.\] In the Farey series of order $N$, we consider the fraction $h/k$ and its two neighbors, \beq \frac{h_1}{k_1}<\frac{h}{k}<\frac{h_2}{k_2}, \label{eq:neighbors} \eeq discussed in \cite{Rademacher}. Each of $h_i$ and $k_i$ depend on $h$, $k$ and $N$ as described in \cite{Rademacher}. Note that $N-k < k_i \leq N$. { On the arc $\xi_{h,k}$, we can introduce the variable $\theta$ via the transformation \[q=\exp\left[-2\pi N^{-2}+2\pi i\left(\frac{h}{k}+\theta\right)\right]=\exp\left[\frac{2\pi ih}{k}-\frac{2\pi z}{k}\right],\]} where \[-\vartheta_{h,k}':=-\frac{1}{k(k_1+k)} \leq \theta \leq \frac{1}{k(k_2+k)}=: \vartheta_{h,k}''.\] Setting $z=k(N^{-2}-i\theta)$ on each arc $\xi_{h,k}$, we obtain \begin{equation*} a(\alpha,\beta;n) =\sum_{\substack{0\leq h<k\leq N\\(h,k)=1}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{equation*} Guided by Lemma \ref{lem:trans_law}, we break up the sum into even and odd $k$, writing \begin{equation} a(\alpha,\beta;n)=S(0,N;n)+S(1,N;n),\label{eq:a_parity_strat_S's} \end{equation} where $$S(r,N;n) := \sum_{\substack{0\leq h<k\leq N\\(h,k)=1\\ k \equiv r \Mod{2}}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. $$ We henceforth omit dependence on $\alpha$ and $\beta$ from the names of most variables. Section \ref{sec:Kloosterman} gives estimates on sums of roots of unity known as Kloosterman sums that are needed to bound the error terms. Section \ref{sec:even_case} extracts behavior from $S(0,N;n)$ that will contribute to the exact formula and bounds the error terms. Throughout the following three sections, $n$, $\alpha$, and $\beta$ are fixed. \section{The even case}\label{sec:even_case} \subsection{Decomposing $S(0,N;n)$} \label{sec:decomp_S2} Here we will extract main term and error term behavior from \begin{align*} S(0,N;n)&:=\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{align*} Towards this goal, we apply the transformation law (1) in Lemma \ref{lem:trans_law} for $H_{\alpha,\beta}$ and even $k$. In the process, we replace the resulting term \[H_{\alpha, \beta} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right)=\sum_{j=0}^\infty a(\alpha,\beta;j) \exp \left( \dfrac{2 \pi i h'j}{k} - \dfrac{2 \pi j}{z k} \right)\] with its series expansion and re-express $z=kw$, yielding \begin{align*} S(0,N;n) =&\sum_{j=0}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)k^{-\frac{\alpha+\beta}{2}}\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}w^{-\frac{\alpha + \beta}{2}}\exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]d\theta. \end{align*} The coefficient of $1/w$ inside the above exponential is positive if and only if $j<-(\alpha+2\beta)/24$. Accordingly, we let \begin{equation} S(0,N;n) =Q(0,N;n)+R(0,N;n)\label{eq:S(0)_split} \end{equation} where $Q(0,N;n)$ is the sum over those $j<-(\alpha+2\beta)/24$, and $R(0,N;n)$ consists of the remaining terms in $S(0,N;n)$. We will show later that $Q(0,N;n)$ yields mostly main term behavior, whereas $R(0,N;n)$ yields error term behavior. On this note, we observe that if $\alpha+2\beta\geq 0$, then $Q(0,N;n)$ is in fact an empty sum, which corresponds to the weak growth near $e^{2 \pi i h/k}$ for $k$ even discussed at the end of Section \ref{sec:trans_law}. Thus in our analysis of $Q(0,N;n)$ we may assume $\alpha+2\beta<0$. Additionally, we will assume $n>-(\alpha+2\beta)/24$, which guarantees that the coefficient on $w$ inside the exponential is positive. \subsection{Decomposing $Q(0,N;n)$}\label{sec:decomposing_Q(1)} We now break up $Q(0,N;n)$ into three parts: one which will be extended to a Bessel function in the following subsection, as well as two error terms. Towards this goal, we divide the intervals of integration into three parts according to $$-\vartheta_{h,k}' = - \frac{1}{k(k+k_1)} \leq - \frac{1}{k(N+k)} < \frac{1}{k(N+k)} \leq \frac{1}{k(k+k_2)} = \vartheta_{h,k}''. $$ Omitting the integrands, the split becomes \begin{align} Q(0,N;n) &=\sum_{j< -\frac{\alpha+2\beta}{24}}\sum_{\substack{k=2\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)\nonumber\left[\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}\, + \int_{-\frac{1}{k(k_1+k)}}^{-\frac{1}{k(N+k)}}\, + \int_{\frac{1}{k(N+k)}}^{\frac{1}{k(k_2+k)}}\,\right]\nonumber\\ &=:Q_{0}(0,N;n)+Q_{1}(0,N;n)+Q_{2}(0,N;n)\label{eq:Q(0)_split_into_3}. \end{align} \subsection{Extending $Q_0(0,N;n)$\label{sec:Extend_Q_0}} Here we will extend the path of integration of $Q_0(0,N;n)$ to obtain a modified Bessel function. Implementing the variable transformation $w=N^{-2}-i\theta,$ we have \begin{align*} Q_0(0,N;n)= & \sum_{j< -\frac{\alpha+2\beta}{24}}\sum_{\substack{k=2\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{ik^{\frac{\alpha + \beta}{2}}} \cdot \int_{N^{-2}-\frac{i}{k(N+k)}}^{N^{-2}+\frac{i}{k(N+k)}} w^{-\frac{\alpha + \beta}{2}} \\ & \cdot \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]dw. \end{align*} We will now extend the path of integration to the rectangle $R$ with vertices \[\pm N^{-2}\pm \frac{i}{k(N+k)}.\] Omitting the integrands, we write \begin{align} Q_0(0,N;n) = 2 \pi \sum_{j< -\frac{\alpha+2\beta}{24}} &\sum_{\substack{k=2\\k\text{ even}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}\label{eq:Q0(0)_decomp}\\ &\cdot\left\{\frac{1}{2\pi i}\int_R-\frac{1}{2\pi i}\left[\int_{+,+}^{-,+}+\int_{-,+}^{-,-}+\int_{-,-}^{+,-}\right]\right\}\nonumber. \end{align} We name $L^*(0,j,k;n):=1/2\pi i\int_R$, and we name the three remaining integrals $J_1(0,j,k,N;n),$ $J_2(0,j,k,N;n),$ and $J_3(0,j,k,N;n),$ respectively. We will give an exact description of $L^*(0,j,k;n)$ as a Bessel function, and bound each $J_i(0,j,k,N;n)$. \subsection{Expressing $L^*(0,j,k;n)$ as a Bessel function}\label{sec:even_bessel} In this subsection, we express $L^*(0,j,k;n)$ { in terms of} a modified Bessel function of the first kind. In the remaining subsections, we will bound each of the error terms that we have encountered, demonstrating that the only significant contribution from $S(0,N;n)$ comes from $L^*(0,j,k;n)$. To $L^*(0,j,k;n)$ we apply the variable transformation \[u=w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right),\] which gives \begin{align*} L^*(0,j,k;n)=&\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{\frac{\alpha+\beta}{2}-1} \frac{1}{2\pi i}\int_{R'}u^{-\left(\frac{\alpha+\beta}{2}\right)} \\ &\qquad \cdot \exp\left[u+\frac{1}{u}\left\{\left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]\right\}\right]du. \end{align*} It follows { from the integral representation of the $I$-Bessel function \eqref{eq:bes_int}} that \begin{equation}\label{eq:L0Bessel} L^*(0,j,k;n)= \left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]^{\frac{1}{2}-\frac{\alpha+\beta}{4}} \left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{-\frac{1}{2}+\frac{\alpha+\beta}{4}} I_{v}(s_0(j,k)) \end{equation} where \begin{align*} v:=1-\frac{\alpha+\beta}{2},\qquad s_0(j,k):=2\sqrt{\left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]}. \end{align*} \subsection{Bounding $R(0,N;n)$\label{sec:bounding_R}} In this section we will bound $R(0,N;n)$, which we recall is given by \begin{align*} R(0,N;n) =&\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}(kw)^{-\frac{\alpha + \beta}{2}}\exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]d\theta. \end{align*} We will show that $ R(0,N;n)= O(N^{-\delta}) $ for some $\delta >0.$ Setting $$E := E(w,\alpha, \beta,n,k,j) := \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]$$ and splitting the integral into three parts as in (\ref{eq:Q(0)_split_into_3}), we obtain \begin{align} \nonumber R(0,N;n) = & \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j) \\ \nonumber & \cdot\bigg[ \int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta + \sum_{\ell=k_1+k}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta + \sum_{\ell=k_2+k}^{N+k-1} \int_{\frac{1}{k\ell}}^{\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \bigg] \\ \label{eq:line_1} = & \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \\ \label{eq:line_2} & +\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j)\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \sum_{\ell=k_1+k}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \\ \label{eq:line_3} & +\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\sum_{\ell=k_2+k}^{N+k-1} \int_{\frac{1}{k\ell}}^{\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta. \end{align} Our goal is to bound the expressions (\ref{eq:line_1}), (\ref{eq:line_2}), and (\ref{eq:line_3}). We begin by bounding $|E|$. As a reminder, we have $w= N^{-2} - i \theta$ and $|\theta| \leq1/Nk$, so that $\mathrm{Re}(1/w) \geq k^2/2$ and $ \mathrm{Re}(w) = N^{-2}.$ Therefore for $j \geq -(\alpha + 2\beta)/24$, $$ |E| \leq \exp\left[N^{-2}\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)-(\alpha+2\beta)\frac{\pi}{24}-\pi j\right].$$ Thus for $N>0$, we have \beq \label{eq:exp_bound} \exp\left[N^{-2}\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)-(\alpha+2\beta)\frac{\pi}{24}\right] = O(1 ).\eeq Noting that the series $\sum_{j=0}^\infty a(\alpha, \beta;j)e^{-\pi j}$ defining $H_{\alpha, \beta}(i/2)$ converges absolutely, we have that for fixed $n$, (\ref{eq:line_1}) admits the estimate $$ O\left( \sum_{\substack{k=1\\k\text{ even}}}^N\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} d \theta \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) = O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right).$$ If $\alpha + \beta < 0$, we can use the trivial Kloosterman sum bound $O(k)$ to show that \beq O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) = O\left(N^{\frac{\alpha + \beta}{2}}\right). \label{eq:neg_weight} \eeq If $\alpha +\beta = 0$, we can make use of Lemma \ref{lem:Kloosterman} to show that for fixed $n$, \beq O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) =O\left(\sum_{\substack{k=1\\k\text{ even}}}^N\frac{k^{-1/3 + \ep}}{N}\right) = O(N^{-1/3+ \ep}). \label{eq:zero_weight} \eeq The summands (\ref{eq:line_2}) and (\ref{eq:line_3}) are handled in a similar way. The only important difference is that we must first switch the order of summation as in \cite[p.~507]{Rademacher} to obtain \beq \label{eq:R_final} \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j)\sum_{\substack{k=1\\k\text{ even}}}^N \sum_{\ell=N+1}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E \sum_{\substack{0\leq h<k\\(h,k)=1\\N-k<k_2\leq l-k}} A_{h,k}(\alpha,\beta,j;n) d \theta. \eeq The desired bound is now obtained via the same methods used to bound (\ref{eq:line_1}). As described in Section \ref{sec:Kloosterman}, Lemma \ref{lem:Kloosterman} is equipped to handle the incomplete Kloosterman sum in (\ref{eq:R_final}). By (\ref{eq:neg_weight}), (\ref{eq:zero_weight}), and corresponding statements for (\ref{eq:line_2}) and (\ref{eq:line_3}), we obtain in all cases \beq \label{eq:R0_bound} R(0,N;n) = O(N^{-\delta}) \eeq for some $\delta >0$. \subsection{Bounding $Q_1(0,N;n)$ and $Q_2(0,N;n)$}\label{sec:boundingQ_2(0)} In this subsection, we will bound those segments of the Farey arcs that do not contribute to the Bessel integral. We will explicitly bound just $Q_2(0,N;n)$ because similar arithmetic yields the same bound for $Q_1(0,N;n)$. First, as in (\ref{eq:line_2}) and (\ref{eq:line_3}) we split our path of integration into many smaller intervals, obtaining \begin{align*} Q_2(0,N;n) =&\sum_{j< -\frac{\alpha+2\beta}{24}}^\infty \sum_{\substack{k=1\\k\text{ even}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) a(\alpha,\beta;j)k^{-\frac{\alpha + \beta}{2}} \sum_{l=k_2+k}^{N+k-1} \int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} w^{-\frac{\alpha + \beta}{2}} E d\theta. \end{align*} Now, as in \ref{eq:R_final}, we switch the order of summation, which yields \begin{align*} Q_2(0,N;n) =&\sum_{j< -\frac{\alpha+2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N k^{-\frac{\alpha + \beta}{2}} \sum_{l=N+1}^{N+k-1} \int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} w^{-\frac{\alpha + \beta}{2}} Ed\theta \sum_{\substack{0\leq h<k\\(h,k)=1\\N-k<k_2\leq l-k}} A_{h,k}(\alpha,\beta,j;n). \end{align*} We have, similarly to (\ref{eq:exp_bound}), that $E=O(1)$. Since $ |w| \leq ({2}/{(N^2k^2)})^{1/2}$, we have \begin{align*} \sum_{l=N+1}^{N+k-1}\int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} &w^{-\frac{\alpha + \beta}{2}} Ed\theta = O\left(\left(Nk\right)^{\frac{\alpha+\beta}{2}-1}\right).\\ \end{align*} Here and throughout, the constant implied by the big Oh notation depends at most on $\alpha,\beta,n$. The following steps are analogous to the final steps of Section \ref{sec:bounding_R}, where the cases $\alpha + \beta <0$ and $\alpha + \beta =0$ are considered separately. We conclude that \begin{equation} Q_1(0,N;n), \ Q_2(0,N;n)=O(N^{-\delta})\label{eq:Q_2(0)_bound} \end{equation} for some $\delta>0$. \subsection{Bounding $J_1(0,j,k,N;n),J_2(0,j,k,N;n),J_3(0,j,k,N;n)$\label{sec:boundingJs}} As a reminder, we have \[J_1(0,j,k,N;n):=\int_{N^{-2}+\frac{i}{k(N+k)}}^{-N^{-2}+\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw, \qquad J_3(0,j,k,N;n):=\int_{-N^{-2}-\frac{i}{k(N+k)}}^{+N^{-2}-\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw,\] and \[J_2(0,j,k,N;n):=\int_{-N^{-2}+\frac{i}{k(N+k)}}^{-N^{-2}-\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw.\] We first consider $J_1$ and $J_3$. Here one easily finds $\mathrm{Re}(w) \leq N^{-2}$ and $ \mathrm{Re}(1/w) \leq 4k^2$, and from this obtains $E= O(1)$. Since the interval length is $2N^{-2}$ and $|w| \leq {\sqrt{2}}/{kN}$, we have that $J_1$ and $J_3$ are $O\left( (kN)^{(\alpha + \beta)/2-1})\right).$ For $J_2$, we need only note that $\mathrm{Re}(w)$ and $ \mathrm{Re}(1/w) $ are negative to show that $E= O(1)$. Since the length of the interval is $2/N(k+N)$, we see that $J_2$ is $O\left( (kN)^{(\alpha + \beta)/2-1})\right).$ We proceed as in Sections \ref{sec:bounding_R} and \ref{sec:boundingQ_2(0)} to show that \beq \label{eq:J_bound} \sum_{\substack{k=2 \\ k \ \text{even}}}^NA_k(\alpha,\beta,j; n)\left\{J_1+J_2+J_3\right\} = O(N^{-\delta}) \eeq for some $\delta>0$, as desired. Recalling our decomposition of $Q_0(0,N;n)$ in (\ref{eq:Q0(0)_decomp}) and the bound given by (\ref{eq:J_bound}) above, we can now estimate \begin{align} Q_0(0,N;n)= 2\pi\sum_{j< -\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\text{ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)+O(N^{-\delta}).\label{eq:Q0(0)_estimated} \end{align} \section{The odd case} \label{sec:odd_case} The odd case follows a manner very similar to the even case, and the discrepancies are all consequences of the differences between the transformation formulas (1) and (2) in Lemma \ref{lem:trans_law} for even and odd $k$. \subsection{Decomposing $S(1,N;n)$} Here we will extract main term and error term behavior from \begin{align*} S(1,N;n)&=\sum_{\substack{0\leq h<k\leq N\\(h,k)=1\\k\text{ odd}}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{align*} We apply the transformation law (2) in Lemma \ref{lem:trans_law} for $H_{\alpha,\beta}$ and odd $k$, obtaining \begin{align*} S(1,N;n)=& \sum_{j=0}^\infty \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}w^{-\frac{\alpha + \beta}{2}} \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right) +\frac{1}{w}\left(-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right)\right]d\theta \end{align*} as in Section \ref{sec:decomp_S2}. In this case the coefficient on $1/w$ inside the above exponential is positive if and only if $j<-(2\alpha+\beta)/24.$ Thus we stratify $ S(1,N;n)$ via \begin{equation} S(1,N;n) =Q(1,N;n)+R(1,N;n),\label{eq:S(1)_split} \end{equation} where $Q(1,N;n)$ is the sum over those $j<-(2\alpha+\beta)/24$. As in the even case, $Q(0,N;n)$ will yield mostly main term behavior, whereas $R(0,N;n)$ will yield error term behavior. We continue to assume that $n>-(\alpha+2\beta)/24$. \subsection{Decomposing $Q(1,N;n)$} We will now break up $Q(1,N;n)$ into three parts, which play the same roles as in Section \ref{sec:decomposing_Q(1)}. Omitting the integrands, we have \begin{align} Q(1,N;n)&= \sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\nonumber\cdot\left[\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}\, + \int_{-\frac{1}{k(k_1+k)}}^{-\frac{1}{k(N+k)}}\, + \int_{\frac{1}{k(N+k)}}^{\frac{1}{k(k_2+k)}}\,\right]\\ &=:Q_{0}(1,N;n)+Q_{1}(1,N;n)+Q_{2}(1,N;n).\label{eq:Q(1)_split_into_3} \end{align} \subsection{Extending $Q_0(1,N;n)$} In this subsection, we will extend the path of integration of $Q_0(1,N;n)$ to obtain a modified Bessel function. Via the variable transformation $w=N^{-2}-i\theta$, we can write \begin{align*} Q_0(1,N;n)=& \sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{i2^{\beta/2}k^{\frac{\alpha+\beta}{2}}} \\ &\cdot \int_{N^{-2}-\frac{i}{k(N+k)}}^{N^{-2}+\frac{i}{k(N+k)}} w^{-\frac{\alpha + \beta}{2}} \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right) +\frac{1}{w}\left(-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right)\right]dw. \end{align*} Considering the rectangle $R$ described in Section \ref{sec:Extend_Q_0}, we write \begin{align} Q_0(1,N;n)=& 2 \pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\label{eq:Q0(1)_decomp}\cdot \left\{\frac{1}{2\pi i}\int_R-\frac{1}{i}\left[\int_{+,+}^{-,+}+\int_{-,+}^{-,-}+\int_{-,-}^{+,-}\right]\right\}. \end{align} Omitting the integrands, we write $L^*(1,j,k;n):=1/2\pi i\int_R$, and we name the three remaining integrals $J_1(1,j,k,N;n),$ $J_2(1,j,k,N;n),$ and $J_3(1,j,k,N;n),$ respectively. \subsection{Expressing $L^*(1,j,k;n)$ as a Bessel function} Now, we will express $L^*(1,j,k;n)$ exactly as a modified Bessel function of the first kind. To $L^*(1,j,k;n)$ we apply the same variable transformation as in Section \ref{sec:even_bessel}, which gives \begin{equation}\label{eq:L1Bessel} L^*(1,j,k;n) = \left[-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right]^{\frac{1}{2}-\frac{\alpha+\beta}{4}}\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{-\frac{1}{2}+\frac{\alpha+\beta}{4}}I_v(s_1(j,k)), \end{equation} where \[s_1(j,k):=2\sqrt{\left[-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]}\] and $v$ is the same as in Section \ref{sec:even_bessel}. \subsection{Bounding the odd case error terms} $R(1,N;n)$, $Q_\mu(1,N;n)$, and $J_\nu(1,j,k,N;n)$ for $\mu=1,2$ and $\nu=1,2,3$ are bounded in a manner which is nearly identical to the corresponding arguments in the even case. The main differences between these expressions and their even case counterparts are the coefficient $a(\beta,\alpha;j)$ from the expansion of $H_{\beta,\alpha}$ and the coefficient $$-(2\alpha +\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}$$ of $1/w$ in the exponential. Note that in Sections \ref{sec:bounding_R}, \ref{sec:boundingQ_2(0)}, and \ref{sec:boundingJs}, the terms $-(\alpha + 2\beta)/12$ in the coefficient of $1/w$, which correspond to $-(2\alpha +\beta)/24$ in the odd case, may as well have been arbitrary negative real numbers that are fixed in this discussion. The same holds for $-2 \pi$ as the coefficient of $j$, except when we used the absolute convergence of the series defining $H_{\alpha,\beta}(i/2)$ in Section \ref{sec:bounding_R}. In the odd case, we need to use the absolute convergence of the series defining $H_{\beta,\alpha}(i/4)$ to obtain the same result. Running the same arguments with these minor adjustments, we obtain \begin{align} R(1,N;n) & = O(N^{-\delta}), \label{eq:R(1)_bound} \\ Q_\mu(1,N;n) & = O(N^{-\delta}), \label{eq:Q_2(1)_bound} \end{align} and \begin{align} \sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n) \left( \sum_\nu J_\nu(1,j,k,N;n)\right) & = O(N^{-\delta}) \label{eq:J(1)_bound} \end{align} for some $\delta>0$, where $ \mu=1,2$ and $\nu=1,2,3$. Recalling our decomposition of $Q_0(1,N;n)$ in (\ref{eq:Q0(1)_decomp}) and the bounds given by (\ref{eq:J(1)_bound}) above, we conclude that \begin{align} Q_0(1,N;n)= 2\pi\sum_{j< -\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha,j)}{2^{\beta/2}k^{\frac{\alpha + \beta}{2}}}L^*(1,j,k;n)+O(N^{-\delta}).\label{eq:Q0(1)_estimated} \end{align} \section{Proof of Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution}} \label{sec:proofs} We now apply our work from Sections \ref{sec:Circle_method_outline}, \ref{sec:Kloosterman}, and \ref{sec:even_case} to obtain exact formulas for $a(\alpha,\beta;n)$, and afterwards we will extract asymptotic behavior from those formulas. Finally, we will express these exact and asymptotic formulas in terms of our topological invariants to prove Theorem \ref{thm:main_result} and Corollary \ref{cor:asymptotics}. \begin{theorem}\label{thm:exactFormulasFor_H} Let $\alpha+\beta\leq 0$, and assume $n>-(\alpha+2\beta)/24$. Then \begin{align} \label{eq:exactFormulasFor_H} a(\alpha,\beta;n)=\ \ \ &2\pi \sum_{j<-\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^\infty \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)\\ \qquad+\,&2\pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^\infty \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}L^*(1,j,k;n). \end{align} \end{theorem} \begin{proof} Making use of the decompositions (\ref{eq:S(0)_split}) and (\ref{eq:Q(0)_split_into_3}), as well as the estimates (\ref{eq:R0_bound}), (\ref{eq:Q_2(0)_bound}), and (\ref{eq:Q0(0)_estimated}), we have \begin{align*} S(0,N;n)=2\pi\sum_{j< -\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\text{ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)+O(N^{-\delta}). \end{align*} Similarly, by the decompositions (\ref{eq:S(1)_split}) and (\ref{eq:Q(1)_split_into_3}), as well as the estimates (\ref{eq:R(1)_bound}), (\ref{eq:Q_2(1)_bound}), and (\ref{eq:Q0(1)_estimated}), we have \begin{align*} S(1,N;n)= 2\pi\sum_{j< -\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha,j)}{2^{\beta/2}k^{\frac{\alpha + \beta}{2}}}L^*(1,j,k;n)+O(N^{-\delta})\label{eq:Q0(1)_estimated}. \end{align*} But by the parity split in (\ref{eq:a_parity_strat_S's}), these estimates imply that \begin{align*} a(\alpha,\beta;n)=\ \ \ &2\pi \sum_{j<-\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)\\ \qquad+\,&2\pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}L^*(1,j,k;n)\\ \qquad+\,&O(N^{-\delta}) \end{align*} for some $\delta>0$. Keeping $n$ fixed and letting $N\to\infty$, we obtain (\ref{eq:exactFormulasFor_H}). \end{proof} { \noindent \tbf{Remark:} In \cite{BringOno}, Bringmann and Ono obtained exact formulas for the coefficients of harmonic Maass forms of non-positive weight using the theory of Maass-Poincar\'e series. Our results can therefore also be obtained using their work. \medskip } In the following corollary, we make use of Theorem \ref{thm:exactFormulasFor_H} to obtain approximations for $a(\alpha,\beta;n)$ for large $n$. We will see that the main contribution for large $n$ comes from one of the first two summands in $k$. \begin{corollary}\label{cor:asym_for_h} Suppose that $\alpha + \beta \leq 0$. \begin{enumerate} \item If $\alpha = 0$ and $\beta \neq 0$, then as $n \to \infty$ we have $$ a(0, \beta;2n) \sim 2^{\frac{3\beta-5}{4}}3^{\frac{\beta-1}{4}}(-\beta)^{\frac{1-\beta}{4}}n^{\frac{\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-2\beta}{3}n}\right).$$ \item If $\alpha<0$, then as $n \to \infty$ we have $$ a(\alpha,\beta;n) \sim 2^{\frac{2\alpha+\beta-3}{2}}3^{\frac{\alpha+\beta-1}{4}}(-(2\alpha+\beta))^{\frac{-\alpha-\beta+1}{4}}n^{\frac{\alpha+\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-(2\alpha+\beta)}{3}n}\right).$$ \item If $\alpha>0$, then as $n \to \infty$ we have $$ a(\alpha, \beta;n) \sim (-1)^{n} 2^{\frac{3\alpha+3\beta-7}{4}}3^{\frac{\alpha+\beta-1}{4}}(-(\alpha+2\beta))^{\frac{1-\alpha-\beta}{4}}n^{\frac{\alpha+\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-(\alpha+2\beta)}{6}n}\right) .$$ \end{enumerate} \end{corollary} \begin{proof} Consider the case $\alpha < 0.$ Let \begin{equation*} a(\alpha, \beta; n) =: 2 \pi \bigg( M^-(\alpha, \beta; n) + E^-(\alpha, \beta; n) \bigg), \end{equation*} where we let \begin{equation*} M^-(\alpha, \beta; n) := \dfrac{B_1(\alpha, \beta, 0; n) a(\beta, \alpha; 0)}{2^{\frac{\beta}{2}}} L^*(1, 0, 1; n) \end{equation*} and \begin{align}\label{eq:weak_bess} E^-(\alpha, \beta; n) := 2 \pi \left(\sum_{j = 0}^{\mathlarger{\lfloor} \frac{\alpha+2\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=2\\k \equiv 0 \Mod{2}}}^\infty f_A(\alpha, \beta, j, k; n) + \sum_{j = 0} ^{\mathlarger{\lfloor} \frac{2\alpha+\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=3\\k \equiv 1 \Mod{2}}}^\infty f_B(\alpha, \beta, j, k; n) \right), \end{align} where \begin{equation*} f_A(\alpha, \beta, j, k; n) := \dfrac{A_k(\alpha, \beta, j; n) a(\alpha, \beta, j)}{k^{\frac{\alpha + \beta}{2}}} L^*(0, j, k; n) \end{equation*} and \begin{equation*} f_B(\alpha, \beta, j, k; n) := \dfrac{B_k(\alpha, \beta, j; n) a(\beta, \alpha, j)}{2^\beta k^{\frac{\alpha + \beta}{2}}} L^*(1, j, k; n). \end{equation*} To prove Corollary \ref{cor:asym_for_h} for $\alpha < 0,$ it suffices to show that $E^-(\alpha, \beta; n) = o(L^*(1,0,1;n))$ and then to carry out the necessary simplification of $2 \pi M^-(\alpha, \beta; n).$ { Using the bound \eqref{eq:geom_bes_bound}}, the monotonicity of the $I$-Bessel functions, and the trivial bound on the Kloosterman sums, it follows from \eqref{eq:weak_bess} that \begin{align*} E^-(\alpha, \beta; n) &\leq \bigg( \dfrac{-(\alpha+2\beta)}{\alpha+2\beta+24 n} \bigg)^{\frac{v}{2}} \sum_{j = 0}^{\mathlarger{\lfloor} -\frac{\alpha + 2 \beta}{24} \mathlarger{\rfloor}} |a(\alpha,\beta,j)| \bigg( K_A(\alpha, \beta, j; n) + \lceil s_0(j, 1) \rceil I_{v}(s_0(0,2) ) \bigg) \\ & + \bigg( \dfrac{-(2\alpha+\beta)}{\alpha+2\beta + 48 \pi n} \bigg)^{\frac{v}{2}} \sum_{j = 0}^{\mathlarger{\lfloor} -\frac{2 \alpha + \beta}{24} \mathlarger{\rfloor}} \frac{ |a(\beta,\alpha;j)| }{2^{\beta/2}} \bigg( K_B(\alpha, \beta, j; n) + \lceil s_1(j,1) \rceil I_{v}( s_1(0,3)) \bigg), \end{align*} where \begin{equation*} K_A(\alpha, \beta, j; n) := \dfrac{4}{3} \sum_{\substack{k > \lceil s_0(j, 1) \rceil \\ k \equiv 0 \Mod{2}}}\frac{A_{k}(\alpha,\beta,j;n)}{k^{v + 1}} \bigg( \dfrac{s_0(0,1)}{2} \bigg)^{v}, \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) := \dfrac{4}{3} \sum_{\substack{k > \lceil s_1(j,1) \rceil \\ k \equiv 1 \Mod{2}}} \frac{B_{k}(\alpha,\beta,j;n)}{k^{v + 1}} \bigg( \dfrac{s_1(0,1)}{2} \bigg)^{v}. \end{equation*} If $\alpha + \beta <0$, we use the trivial bound on the Kloosterman sums to obtain \begin{equation*} K_A(\alpha, \beta, j; n) \leq \dfrac{4}{3} \bigg( \dfrac{s_0(0,1)}{2} \bigg)^{v} \dfrac{s_0(j,1)^{1 - v}}{1 - v} \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) \leq \dfrac{4}{3} \bigg( \dfrac{s_1(0,1)}{2} \bigg)^{v} \dfrac{s_0(j,1)^{1 - v}}{1 - v}, \end{equation*} and if $\alpha + \beta = 0,$ we use Lemma \ref{lem:Kloosterman} to obtain \begin{equation*} K_A(\alpha, \beta, j; n) = O(n^{\frac{1}{3}} s_0(j, 1)^{-\frac{1}{3} + \epsilon}) \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) = O(n^{\frac{1}{3}} s_1(j, 1)^{-\frac{1}{3} + \epsilon}). \end{equation*} Therefore, since $E^-(\alpha, \beta; n)$ is bounded by a finite sum of rational functions and $I$-Bessel functions, it follows from \begin{equation*} I_v(x)\sim \frac{e^x}{\sqrt{ 2\pi x}} \end{equation*} that $E^-(\alpha, \beta; n) = o(L^*(1,0,1;n)),$ and that the statement of Corollary \ref{cor:asym_for_h} follows from a simplification of $2 \pi M(\alpha, \beta; n).$ If $\alpha > 0,$ the proof of Corollary \ref{cor:asym_for_h} follows \emph{mutatis mutandis} if we let \begin{equation*} a(\alpha, \beta; n) := 2 \pi \bigg( M^+(\alpha, \beta; n) + E^+(\alpha, \beta; n) \bigg), \end{equation*} where we let \begin{equation*} M^+(\alpha, \beta; n) := \dfrac{A_2(\alpha, \beta, 0; n) a(\beta, \alpha; 0)}{2^{\frac{\alpha + \beta}{2}}} L^*(0, 0, 2; n) \end{equation*} and \begin{align*} E^+(\alpha, \beta; n) := 2 \pi \left(\sum_{j = 0}^{\mathlarger{\lfloor} \frac{\alpha+2\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=4\\k \equiv 0 \Mod{2}}}^\infty f_A(\alpha, \beta, j, k; n) + \sum_{j = 0} ^{\mathlarger{\lfloor} \frac{2\alpha+\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=1\\k \equiv 1 \Mod{2}}}^\infty f_B(\alpha, \beta, j, k; n) \right). \end{align*} Finally, we observe that $a(0, \beta; 2 n) = a(\beta, 0, n),$ and so making the necessary substitutions for the case $\alpha < 0$ yields the case $\alpha = 0.$ \end{proof} We are now in a position to prove Theorem \ref{thm:main_result}, our exact formulas for $\chi(\mathrm{Hilb}^n(S))$ and $\sigma(\mathrm{Hilb}^n(S))$, and Corollary \ref{cor:asymptotics}, our asymptotic formulas for $\chi(\mathrm{Hilb}^n(S))$, $\sigma(\mathrm{Hilb}^n(S))$, $b^*(r,2;n)$ and $c^*(r_1,r_2;n)$. At this point, the work is a simple application of Theorem \ref{thm:exactFormulasFor_H} and Corollary \ref{cor:asym_for_h}. \begin{proof}[Proof of Theorem \ref{thm:main_result}] The proof follows from Lemma \ref{lem:gottsche_prod} and Theorem \ref{thm:exactFormulasFor_H}. We note only that in the derivation of (\ref{eq:Euler_char_exact_formula}) the sum over odd $k$ is actually a sum over even $j$, since $a(0,-\chi(S);j) =0$ for odd $j$. Noting this and replacing $j$ with $2j$, we obtain (\ref{eq:Euler_char_exact_formula}). \end{proof} \begin{proof}[Proof of Corollary \ref{cor:asymptotics}] This follows from Corollary \ref{cor:asym_for_h} and (\ref{sp2}) and (\ref{sp3}) in Lemma \ref{lem:gottsche_prod}. \end{proof} \begin{proof}[Proof of Corollary \ref{cor:equidistribution}] The coefficients of our functions $Z_S(x, y;\tau)$, where $x,y = \pm1$, are of the form $a(\alpha,\beta;n)$ for some $\alpha$ and $\beta$ determined by (\ref{eq:minus_expression}) and Lemma \ref{lem:gottsche_prod}. For convenience we define $$a_S(x, y;n):= a(\alpha,\beta;n).$$ By Corollary \ref{cor:asym_for_h}, each of these coefficient sequences is asymptotic to a function of the form $c_1n^{c_2}\exp(\sqrt{Gn})$, where $c_1$, $c_2$, and $G$ only depend $x$, $y$, and $S$. We will let $G_S(x ,y)$ denote this value $G$. Note that $G_S(x,y)$ essentially determines the growth of the sequence $a_S(x,y;n)$ in the sense that if $G_S(x_1,y_1)<G_S(x_2,y_2)$, then $a_S(x_1, y_1;n) = o(a_S(x_2,y_2;n))$. The proof of (1) now follows easily from Corollary \ref{cor:asym_for_h}, (\ref{sp2}), (\ref{sp3}), and (\ref{eq:minus_expression}). As a reminder, (\ref{eq:B_sum}) tells us $$ B_S(r,2;\tau)= \frac{1}{2}\left( Z(1,1;\tau) + (-1)^r Z(1,-1;\tau)\right) . $$ One makes use of Corollary \ref{cor:asym_for_h} to check that $G_S,(1,1)>G_S(1,-1)$ if and only if $\sigma(S) + \chi(S)>0$ and $G_S,(1,1)<G_S(1,-1)$ if and only if $\sigma(S) + \chi(S)<0$. Note that $G_S(1,1)=G_S(1,-1)$ whenever $\chi(S) = - \sigma(S)$, and in this case $Z_S(1,1;\tau)=Z_S(1,-1;\tau)$, so that $b^*_S(1;n)=0$ for all $n$. Also, if $\chi(S) \leq 0$, $(\chi(S) ,\sigma(S)) \neq (0,0)$, we have from Theorem 15.1 in \cite{HMF} that $a_S(1,1;n) = o(a_S(1,-1;n))$. Since this requires $\sigma(S) + \chi(S)\leq 0$, we can remove the hypothesis that $\chi(S)> 0$. To prove (2), we first recall that (\ref{eq:now}) gives $$C_S(r_1, r_2;\tau) = \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau).$$ We note that by (\ref{eq:minus_expression}), the hypotheses of Corollary \ref{cor:asym_for_h} are always satisfied for $Z(-1,-1;\tau)$, since $$4h^{1,0} - (\chi(S) -8h^{1,0})= -(2h^{0,0} + 2h^{2,0} + h^{1,0})\leq0$$ for all $S$. Note also that for $\chi(S) \geq 0$, we have $$G_S(-1,-1) - G_S(1,1) = \frac{2\chi(S) + 12h^{1,0}}{3} - \frac{2\chi(S)}{3} = 4h^{1,0} \geq 0.$$ If $h^{1,0}=0$, we have $Z_S(1,1;\tau)=Z_S(-1,-1;\tau)$. If $\chi(S) \leq 0$, we have $a_S(1,1;n) = o(a_S(-1,-1;n))$ by Theorem 15.1 in \cite{HMF}. Since $\chi(S)\leq 0$ requires $h^{1,0}>0$, we have $$a_S(1,1;n) + (-1)^{r_1+r_2}a_S(-1,-1;n) \sim K a_S(-1,-1;n), $$ where $$ K : = \bcas \hspace{2.9mm} 2 & h^{1,0} = 0 \text{ and } r_1 + r_2 \equiv 0 \mod 2 \\ \hspace{2.9mm} 0 & h^{1,0}=0 \text{ and } r_1 + r_2 \equiv 1 \mod 2 \\ \hspace{3.1mm} 1 & h^{1,0} > 0 \text{ and } r_1 + r_2 \equiv 0 \mod 2 \\ -1 & h^{1,0} > 0 \text{ and } r_1 + r_2 \equiv 1 \mod 2. \\ \ecas $$ We now see that if $G_S(-1,-1)> G_S(1,-1) $, then $c^*_S(r_1,r_2;n) \sim (K/4)a_S(-1,-1;n)$, which gives the desired result. To conclude the proof, one simply checks that this inequality holds for both $\sigma(S) \geq 0$ and $\sigma(S)<0$. \end{proof} \section{Examples}\label{sec:numerics} Here we illustrate Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} with examples of numerical computations. \begin{example} \emph{ To demonstrate Theorem \ref{thm:main_result}, we focus on $S$, a 2-dimensional torus blown up at one point, a Hirzebruch surface $\Sigma_0 \cong \mathbb{P}^1 \x \mathbb{P}^1$, $\mathbb{P}^2$. We have $\chi(S) =1,$ $\chi(\mathbb{P}^2) = 3,$ $\sigma(\mathbb{P}^2)=1, $ $\chi(\Sigma_0)= 4,$ and $\sigma(\Sigma_0) =0,$ so that we can consider the functions} \begin{align*} \sum_{n=0}^\infty \chi(\mathrm{Hilb}^n(S))q^n = & H_{-1, 0}(q) = 1 + q + 2q^2 + 3q^3 + 5q^4 + 7q^5 + 11q^6 + \cdots \\\sum_{n=0}^\infty(-1)^n\sigma(\mathrm{Hilb}^n(\Sigma_0))q^n = & H_{0,-2}(q) = 1 + 0q+ 2q^2 +0q^3+ 5q^4 + 0q^5+ 10q^6 + \cdots \\ \sum_{n=0}^\infty(-1)^n\sigma(\mathrm{Hilb}^n(\mathbb{P}^2))q^n = & H_{1,-2}(q) = 1 - q + q^2 - 2q^3 + 3q^4 - 4q^5 + 5q^6 + \cdots . \end{align*} \emph{ Table \ref{table_0} lists $a_2(-1, 0;n) $, $a_2(0,-2;n) $, and $a_2(1,-2;n) $ for small values of $n$, where $a_N(\alpha,\beta;n)$ is the approximation obtained from Theorem \ref{thm:main_result} by summing over $1 \leq k \leq N$. The rows correspond to the series above in order.} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline $n$ & $1$ &$2$ & $3$ & $4$ & $5$ &$6$ \\\hline $a_2({-1, 0};n)$ & $1.0029...$ & $2.0808...$ & $2.9340...$ & $5.0296...$ & $7.0278...$ & $10.9325...$ \\\hline $a_2({0,-2};n)$ & $0 $ & $2.1281...$ & $0$ & $4.8883...$ & $0$ & $10.1650...$ \\\hline $a_2({1,-2};n)$ & $-0.8747...$ & $1.3314...$ & $-1.9544...$ & $2.7902...$ & $-3.8958...$ & $5.3410...$ \\\hline \end{tabular} \end{center} \caption{Approximate values in Theorem \ref{thm:main_result}, $N=2$} \label{table_0} \end{table} \emph{As Corollary \ref{cor:asymptotics} indicates, the quality of these approximations improves as $n\rightarrow \infty$. Moreover, choosing larger values of $N$ gives better approximations. The table below gives approximations when $N=75$. } \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline $n$ & $1$ &$2$ & $3$ & $4$ & $5$ &$6$ \\\hline $a_{75}({-1, 0};n)$ & $0.9999..$ & $2.0005...$ & $2.9999...$ & $4.9999...$ & $6.9999...$ & $10.9999...$ \\\hline $a_{75}({0,-2};n)$ & $0.0001... $ & $1.9999...$ & $-0.0002...$ & $5.0001...$ & $-0.0000...$ & $9.9999...$ \\\hline $a_{75}({1,-2};n)$ & $-1.0004...$ & $1.0003...$ & $-2.0000...$ & $3.0005...$ & $-3.9994...$ & $5.0003...$ \\\hline \end{tabular} \end{center} \caption{Approximate values in Theorem \ref{thm:main_result}, $N=75$} \label{table_1} \end{table} \end{example} \begin{example} \emph{For an illustration of Corollary \ref{cor:equidistribution}, let $S'$ be $C_2 \x \bP^1$ blown up at two points, where $C_2$ is a curve of genus $2$. In Tables \ref{table_4}, and \ref{table_5} we take } $$\Theta^r_S(n): = \frac{b^*(r,2;n)}{\sum_{r \Mod{2}} |b^*(r,2;n)|} \qquad \text{\emph{and}} \qquad \Theta^{r_1,r_2}_S(n): = \frac{c^*(r_1,r_2;n)}{\sum_{\substack{ r_1 \Mod{2} \\ r_2 \Mod{2}}} |c^*(r_1,r_2;n)|}. $$ \emph{Corollary \ref{cor:equidistribution} (1) states that $\Theta^0_{S'}(n) \to 1/2$ and $\Theta^0_{S'}(n) \to 1/2$ as $n \to \infty$, which is illustrated by Table \ref{table_4}. Corollary \ref{cor:equidistribution} (2) states that $\Theta^{0,0}_{S'}(n),\Theta^{1,1}_{S'}(n) \to 1/4$ and $\Theta^{0,1}_{S'}(n),\Theta^{1,0}_{S'}(n) \to -1/4$, which is illustrated by Table \ref{table_5}.} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|}\hline $n$&$5$ & $10$ &$15$ & $20$ &$25$ \\\hline $\Theta^0_{S'}(n)$ & $ 0.5714...$ & $ 0.5054... $ & $ 0.4977... $ & $ 0.4993... $ & $ 0.5000... $\\\hline $\Theta^1_{S'}(n)$& $ -0.4285... $ & $ -0.4946... $ & $ -0.5023... $ & $ -0.5006... $ & $ -0.5000... $ \\\hline \end{tabular} \end{center} \caption{Comparative asymptotic properties of $b^*_{S'}(r,2;n)$ } \label{table_4} \end{table} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|}\hline $n$&$5$ & $10$ &$15$ & $20$ &$25$ \\\hline $\Theta^{0,0}_{S'}(n)$ & $ 0.2505... $ & $0.2500... $ & $0.2500... $ & $0.2500... $ &$0.2500... $ \\\hline $\Theta^{0,1}_{S'}(n)$& $-0.2499... $ & $ -0.2499... $ & $ -0.2500... $ & $ -0.2500... $ & $ -0.2500... $ \\\hline $\Theta^{1,0}_{S'}(n)$& $-0.2499... $ & $ -0.2499... $ & $ -0.2500... $ & $ -0.2500... $ & $ -0.2500... $ \\\hline $\Theta^{1,1}_{S'}(n)$& $0.2495... $ & $ 0.2499... $ & $ 0.2499... $ & $ 0.2499... $ & $ 0.2499... $ \\\hline \end{tabular} \end{center} \caption{Comparative asymptotic properties of $c^*_{S'}(r_1,r_2;n)$ } \label{table_5} \end{table} \end{example} \section*{Acknowledgements} The authors wish to thank Ken Ono, John Duncan, and Larry Rolen for their magnificent support and guidance. They would also like to thank Gabor Szekelyhidi for helpful communication on the topic of complex surfaces. They also thank Emory University, Wesleyan University's Marc N. Casper fund, the University of Notre Dame, the Asa Griggs Candler Fund, and NSF grant DMS-1557960. \bibliographystyle{acm} \section{Introduction and Statement of Results} K3 surfaces are complex surfaces characterized by their particularly simple Hodge structures and trivial holomorphic tangent bundles. These manifolds are of particular interest to physicists and mathematicians. For physicists, they serve as useful examples of Calabi-Yau manifolds, which are a class of spaces central in string theory, and for mathematicians, they serve as an interesting yet sufficiently simple example in 4-manifold theory and complex differential geometry. These two roles came together in an unexpected way when in \cite{YZ} Yau and Zaslow conjectured (and later Beauville proved in \cite{Arn}) that the count of $n$-nodal curves on a K3 surface is equal to the Euler characteristic $\chi(\text{Hilb}^n(S))$ of Hilbert schemes of $n$ points on a K3 surface $S$. Yau and Zaslow's conjecture made use of a previous theorem of G\"ottsche (see \cite[p.~37]{GotBook}) that provides an infinite product encoding the Euler characteristics $\chi(\mathrm{Hilb}^n(S))$ for Hilbert schemes of a K3 surface $S$. These Euler characteristics can be assembled in the form of the generating function \beq X_S(\tau) := \sum_{n =0}^\infty \chi(\mathrm{Hilb}^n(S)) q^n= \frac{q}{\Delta(\tau)} =\prod_{n=1}^\infty\frac{1}{(1-q^n)^{24}},\label{eq:Delta} \eeq where $\Delta(\tau)$ is the modular discriminant and $q:=e^{2\pi i\tau}.$ G\"ottsche stated a more refined infinite product formula concerning Hodge numbers, which are cohomological invariants that can be assembled into Betti numbers and the Euler characteristic. Recently, Manschot and Zapata Rolon \cite{Manschot} studied the asymptotic distribution of linear combinations of these Hodge numbers, which are realized as coefficients of Laurent polynomials called the $\chi_y$ genera for K3 surfaces (see (\ref{eq:chiy}) for a definition of $\chi_y$). The $\chi_y$ genera can also be assembled using the generating function \beq Y_S(y; \tau) := \sum_{m,n} b_S(m;n) y^m q^n := \sum_{n \geq 0} \chi_y(\mathrm{Hilb}^n(S)) q^n \label{eq:Y-series}. \eeq Akin to (\ref{eq:Delta}), G\"ottsche also provides an infinite product for $Y_S(y;\tau)$ (see Lemma \ref{lem:gottsche_prod}). Manschot and Zapata Rolon \cite{Manschot} found for K3 surfaces $S$ that if $m$ is fixed, then as $n\rightarrow\infty$ we have $$b_S(m;n) \sim \dfrac{\pi}{3 \sqrt{2}} n^{-\frac{29}{4}} \cdot \exp(4 \pi \sqrt{n}).$$ Moreover, since the asymptotics for $b_S(m;n)$ do not depend on $m,$ if we define $$b^*_S(r; n) := \sum_{m \equiv r \Mod{2}} b_S(m;n), $ it follows that $b^*_S(0;n)\sim b^*_S(1;n)$ as $n \to \infty.$ From a geometric perspective, $n$ corresponds to the length of the Hilbert scheme, and $m$ corresponds to a particular monomial in the $\chi_y$-genus of $\text{Hilb}^n(S)$. Grouping the contributions by the coefficients of these monomials in residue classes mod $2$, we obtain an equidistribution in the limit as $n$ goes to infinity. G\"ottsche's formula for Hodge numbers $h^{s,t}(\text{Hilb}^n(S))$ of Hilbert schemes of $n$ points for K3 surfaces is a special case of his more general formula, which states that for any smooth projective complex surface $S$, we have \beq \label{eq:zetadef} Z_S(x,y;\tau) := \sum_{n\geq0}\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))q^n =\prod_{n =1}^\infty \frac{\prod_{s +t \mathrm{\ odd}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}{\prod_{s +t \mathrm{\ even}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}. \eeq For later use, we define $c_S(s,t;n)$ to be the coefficient of $x^sy^tq^n$ in the power series expansion of $Z_S(x,y;\tau) $. \skipaline \noindent \tbf{Remark:} The \emph{Hodge polynomial} $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))$ is a Laurent polynomial in $\bZ[x,y,x^{-1}, y^{-1}],$ and we will sometimes write it as $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$ to make explicit the Hodge polynomial's dependence on $x$ and $y.$ If we specialize $x$ and $y$ to $\pm1$, then $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$ evaluates to different linear combinations of important topological invariants. See Section \ref{sec:gen_functions} for a more detailed discussion of $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))(x,y)$. \skipaline We seek exact formulas for sequences assembled from the coefficients of (\ref{eq:zetadef}) for a more general class of smooth projective complex surfaces. We consider the distribution of the coefficients $c_S(s,t;n)$ over residue classes mod 2; namely, if we let \beq \label{eq:c-special} c^*_{S}(r_1, r_2;n):= \sum_{\substack{{t \equiv r_1} \Mod{2}\\ {s \equiv r_2} \Mod{2} }} c_S(s,t;n),\eeq we seek to determine the asymptotic properties of the sequences $b^*_S(r;n)$ and $c^*_{S}(r_1, r_2;n)$. To this end, we consider the asymptotics of the $q$-series \beq \label{eq:bigC} C_S(r_1,r_2;\tau) := \sum_{n \geq 0} c^*_{S}(r_1, r_2;n)q^n.\eeq Our main result is the following. See Section \ref{sec:gen_functions} for a more detailed discussion of the cohomological invariants for which we state exact formulas and asymptotics below. \begin{theorem}\label{thm:main_result} Let $S$ be a smooth projective surface. Then we have the following exact formulas: \ben \item If $0 \leq \chi(S) < 24n$, then we have \label{eq:Euler_char_exact_formula} \begin{align*} \chi(\mathrm{Hilb}^n(S))=&2\pi \sum_{j<{\frac{\chi(S)}{24}}} \sum_{{k=1}}^\infty k^{\chi(S)/2}A_{k}(-\chi(S),0,j;n) \chi(\mathrm{Hilb}^j(S)) L^*(0,j,k;n). \end{align*} \item If $\sigma(S) \leq \chi(S)< 24n$, then we have \begin{align*} \sigma(\mathrm{Hilb}^n(S))= & \hspace{5mm} 2\pi \sum_{j<{\frac{\chi(S)}{24}}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^\infty \frac{A_{k}(\sigma(S),\Lambda(S),j;n) \sigma(\mathrm{Hilb}^j(S)) }{k^{\Lambda'(S)/2}}L^*(0,j,k;n)\\ \nonumber &+ 2\pi\sum_{j<\frac{3\sigma(S) -\chi(S)}{48}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^\infty \frac{(-1)^nB_{k}(\sigma(S),\Lambda(S),j;n)a(\Lambda(S),\sigma(S);j)}{ 2^{\Lambda(S)/2}k^{\Lambda'(S)/2}}L^*(1,j,k;n) . \end{align*} where $\Lambda(S):=-(\sigma(S) + \chi(S))/2$ and $\Lambda'(S):=(\sigma(S) - \chi(S))/2$. \een Here $a(\alpha,\beta,j)$, $A_{k}(\alpha,\beta,j;n)$, $B_{k}(\alpha,\beta,j;n)$, $L^*(0,j,k;n)$, and $L^*(1,j,k;n)$ are defined in Section \ref{sec:Circle_method_outline}, (\ref{eq:Kloosterman_def1}), (\ref{eq:Kloosterman_def2}), (\ref{eq:L0Bessel}), and (\ref{eq:L1Bessel}), respectively. \end{theorem} { \noindent \tbf{Remark:} In Theorem \ref{thm:main_result}, $A_k(\alpha,\beta,j;n)$ and $B_{k}(\alpha,\beta,j;n)$ are known as Kloosterman sums, and $L^*(0,j,k;n)$ and $L^*(1,j,k;n)$ are, up to simple multiplicative factors, modified Bessel functions of the first kind. \medskip } Theorem \ref{thm:main_result} offers exact formulas as convergent infinite series. These formulas imply the following asymptotics. \begin{corollary}\label{cor:asymptotics} Let $S$ be a smooth projective surface. Then the following are true: \begin{enumerate} \item Suppose $\chi(S) \geq \sigma(S)$. \bena \item If $\sigma(S) < 0,$ then as $n \to \infty,$ we have \bal \sigma(\mathrm{Hilb^n}(S)) \sim & (-1)^n 2^{\frac{7\sigma(S)-3\chi(S)-14}{8}}3^{\frac{\sigma(S)-\chi(S)-2}{8}} (\chi(S)-3\sigma(S))^{\frac{\chi(S)-\sigma(S)+2}{8}} n^{\frac{\sigma(S)-\chi(S)-6}{8}} \\ & \cdot \exp\left(\pi\sqrt{\frac{\chi(S)-3\sigma(S)}{6}n}\right). \eal \item If $\sigma(S) >0$, then as $n \to \infty,$ we have $$\sigma(\mathrm{Hilb^n}(S)) \sim 2^{\frac{3\sigma(S) -3\chi(S)-14}{8}} 3^{\frac{\sigma(S)-\chi(S)-2}{8}} \chi(S)^{\frac{ \chi(S) -\sigma(S)+2}{8}} n^{\frac{\sigma(S)-\chi(S)-6}{8}} \exp\left(\pi\sqrt{\frac{\chi(S)}{6}n}\right).$$ \item If $\sigma(S)=0$ and $\chi(S) \neq 0$, then as $n\to\infty$, we have $$\sigma(\mathrm{Hilb^{2n}}(S)) \sim 2^{\frac{-\chi(S) -3}{2}} 3^{\frac{-\chi(S)-2}{8}} \chi(S)^{\frac{2+\chi(S)}{8}} n^{\frac{-\chi(S)-6}{8}} \exp\left(\pi\sqrt{\frac{\chi(S)}{3}n}\right). $$ Moreover, for all $n$ we have $$\sigma(\mathrm{Hilb^{2n+1}}(S)) = 0.$$ \item If $\sigma(S) =\chi(S) =0$, we have for all $n$, $$\sigma(\mathrm{Hilb^{n}}(S)) = 0.$$ \een \item \bena \item If $\chi(S) > 0,$ then, as $n \to \infty,$ we have $$\chi(\mathrm{Hilb}^n(S)) \sim 2^{\frac{-3\chi(S)-5}{4}}3^{\frac{-\chi(S)-1}{4}}\chi(S)^{\frac{\chi(S)+1}{4}}n^{\frac{- \chi(S)-3}{4}}\exp\left(\pi\sqrt{\frac{2\chi(S)}{3}n}\right).$$ \item If $\chi(S) =0$, then for all $n$ we have $$\chi(\mathrm{Hilb}^n(S)) =0.$$ \een \end{enumerate} \end{corollary} The asymptotics in Corollary 1.2 imply the following asymptotic properties of $b^*_S(r;n)$ and $c_S^*(r_1,r_2;n)$. \begin{corollary}\label{cor:equidistribution} Let $S$ be a smooth projective surface. Then the following are true: \begin{enumerate} \item Suppose that $\chi(S) \geq \sigma(S)$. If $\chi(S)+\sigma(S)>0$, then as $n \to \infty $ we have $$b^*_S(0;n) \sim b^*_S(1;n). $$ If $\chi(S)+\sigma(S) =0$, then as $n \to \infty $ we have $$ b^*_S(1;n) =0. $$ If $\chi(S)+\sigma(S) <0$, then as $n \to \infty $ we have $$b^*_S(0;n) \sim - b^*_S(1;n). $$ \item Suppose that $\chi(S) \geq \sigma(S)$. If $h^{1,0}=0$, then as $n \to \infty $ we have $$c_S^*(0,0;n) \sim c_S^*(1,1;n) \ \ \text{and} \ \ c_S^*(0,1;n)=c_S^*(0,1;n) =0.$$ If $h^{1,0}>0$, then as $n \to \infty $ we have $$c^*_{S}(0,0;n) \sim c^*_{S}(1,1;n) \sim -c^*_{S}(0,1;n) = -c^*_{S}(1,0;n).$$ \end{enumerate} \end{corollary} Note that when $S$ is a K3 surface, Corollary \ref{cor:equidistribution} (1) recovers the equidistribution of the $b_S^*(r; n)$ that follows from the work of Manschot and Zapata Rolon in \cite{Manschot}. \medskip \noindent \tbf{Remark:} The Enriques-Kodaira Classification Theorem \cite[p.~244]{CCS} mostly describes the possible Hodge structures of smooth complex surfaces. This theorem lists minimal models for many birational equivalence classes of surfaces, which determine $h^{0,0}$, $h^{1,0}$, $h^{2,0}$, and $\min\{h^{1,1}\}$ for that class. By the blowup construction, every smooth complex projective surface $S$ is birationally equivalent to a smooth complex projective surface $S'$ with $h^{1,1}(S')=h^{1,1}(S)+1$ and $h^{s,t}(S') = h^{s,t}(S)$ for $(s,t) \neq (1,1)$. A minimal model of a birational equivalence class is a surface that is not a blowup of any other smooth surface. Since $\chi(S)$ and $\chi(S)-\sigma(S)$ increase linearly with $h^{1,1}(S)$, Theorem \ref{thm:main_result}, Corollary \ref{cor:asymptotics}, and Corollary \ref{cor:equidistribution} apply to all surfaces in each birational equivalence class except those whose Hodge structures fall in a certain finite set. In particular, if the minimal model satisfies the hypotheses of these statements, then all surfaces in that class satisfy them. Excluding surfaces of general type, the only classes of projective surfaces whose minimal models do not satisfy these hypotheses are ruled surfaces of genus $g \geq 2$ (see \cite{CCS} and \cite{Schutt}). \skipaline In Section \ref{sec:gen_functions}, we will define all of the terms above and describe their topological and geometric significance. We will also state important properties of the generating functions of these sequences, which will be crucial in our deduction of the above formulas. In Section \ref{sec:Circle_method_outline} we will outline { our use of the circle method to prove} Theorem \ref{thm:exactFormulasFor_H}, a general result from which Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} are derived. { Sections \ref{sec:even_case} and} \ref{sec:odd_case} include arguments necessary for this proof. In Section \ref{sec:proofs}, these arguments are assembled, and Theorem \ref{thm:exactFormulasFor_H}, Theorem \ref{thm:main_result}, and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} are proven. In Section \ref{sec:numerics} we illustrate our results with numerics. \section{{ Preliminaries}} \label{sec:gen_functions} { In this section, we present G\"ottsche's result and specialize it in terms of weakly holomorphic modular forms. We then provide bounds on certain exponential sums known as Kloosterman sums and bounds on $I$-Bessel functions. Both Kloosterman sums and Bessel functions will appear in our application of the circle method in Sections \ref{sec:even_case} and \ref{sec:odd_case}.} A compact complex manifold $M$ has cohomological invariants called the Hodge numbers $h^{s,t}:=h^{s,t}(M),$ which are defined as the complex dimensions of the $(s,t)$-Dolbeault cohomology space $H^{s,t}(M)$ (see \cite{Wells}). When the context is clear, we will not explicitly indicate dependence of the Hodge numbers $h^{s,t}$ on the manifold $M$. If $M$ is a K\"ahler manifold, the Hodge numbers are related to the Betti numbers $b_n(M)$ by the formula \beq b_n(M)= \sum_{s+t=n}h^{s,t}(M) \label{eq:Betti_Hodge} \eeq (see \cite[p.~198]{Wells}). Moreover, for any manifold $M$ one can construct a manifold $\text{Hilb}^n(M)$ which can be thought of as a smoothed version of the $n^{th}$ symmetric product of $M$ (see \cite{Hart}). For any smooth projective complex surface $S,$ G\"ottsche's formula allows one to compute the Hodge numbers of $\text{Hilb}^n(S)$ for all $n$ from the Hodge numbers of $S$. In order to state G\"ottsche's result, we first define the Hodge polynomial, which serves as a generating function for the Hodge numbers of $M$: \beq \begin{aligned} \label{eq:chihodge} \chi_{\mathrm{Hodge}}(M)(x,y) := & x^{-d/2}y^{-d/2}\sum_{s,t}h^{s,t}(M)(-x)^s(-y)^t, \end{aligned} \eeq where $d$ is the complex dimension of $M$. We will generally supress the $(x,y)$ for notational convenience. On page 37 of \cite{GotBook}, G\"ottsche proved the remarkable fact that one can assemble the Hodge polynomial for $\mathrm{Hilb}^n(S)$ using the Hodge numbers $h^{s,t}(S)$. \bthm[G\"ottsche]\label{thm:gottsche} If $S$ is a smooth projective complex surface, then we have that $$Z_S(x,y;\tau):=\sum_{n\geq0}\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))q^n =\prod_{n =1}^\infty \frac{\prod_{s +t \mathrm{\ odd}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}{\prod_{s +t \mathrm{\ even}} (1- x^{s-1}y^{t-1}q^n)^{h^{s,t}}}. $$ \ethm \noindent \tbf{Remark:} Note that for each $n$, $|s|,|t|\leq n$ in the definition of $\chi_{\mathrm{Hodge}}(\mathrm{Hilb}^n(S))$.\medskip \noindent By \cite[p.~43]{Ball}, every such smooth projective complex surface $S$ is K\"ahler, so by Serre duality and Hodge symmetry, the Hodge numbers satisfy the following relations: $$ h^{0,0}=h^{2,2} \qquad \qquad h^{1,0}=h^{0,1}= h^{1,2}=h^{2,1} \qquad \qquad h^{2,0}=h^{0,2}. $$ By the additivity of the Hodge numbers, we need only consider the case where $M$ is connected, i.e. $h^{0,0}=1$. In this case, we obtain: \beq \label{eq2} Z_S(x,y;\tau)=\prod_{n =1}^\infty \frac{\big((1- x^{-1}q^n)(1- xq^n)(1- y^{-1}q^n)(1-yq^n)\big)^{h^{1,0}}}{(1- x^{-1}y^{-1}q^n)(1- xyq^n)\big((1- x^{-1}yq^n)(1- xy^{-1}q^n)\big)^{h^{2,0}}(1-q^n)^{h^{1,1}}}. \eeq This polynomial gives rise to other topological invariants upon substituting $\pm 1$ for $x$ and $y.$ For example, the Hirzebruch $\chi_y$-genus of $M$ is the polynomial \beq \label{eq:chiy} \chi_y(M):=\sum_{s,t} (-1)^t h^{s,t}(M) y^s. \eeq We can express this in terms of the Hodge polynomial: $$ \chi_{\text{Hodge}}(\text{Hilb}^n(S))(y,1)= y^{-n} \sum_{s,t} (-1)^t h^{s,t}(\text{Hilb}^n(S))(-y)^s = \chi_{-y}(\text{Hilb}^n(S))y^{-n}. $$ In terms of the Betti numbers, the Euler characteristic $\chi(M)$ is defined as \beq \label{euchar} \chi(M):= \sum_n (-1)^n b_n(M). \eeq Setting $x = 1$ and $y = 1$ in the Hodge polynomial, we see in reference to (\ref{eq:Betti_Hodge}) and (\ref{euchar}) that \beq \label{eq:euch} \chi_{\text{Hodge}}(\text{Hilb}^n(M))(1,1) = \chi_{-1}(\text{Hilb}^n(M))= \chi(\text{Hilb}^n(M)). \eeq On the other hand, setting $x = -1$ and $y = 1$ in the Hodge polynomial gives \beq \label{eq:sig} \chi_{\text{Hodge}}(\text{Hilb}^n(M))(-1,1) = (-1)^n \chi_{1}(\text{Hilb}^n(M))=(-1)^n \sigma(\text{Hilb}^n(S)),\eeq where the signature $\sigma(M)$ of a $d$-dimensional complex manifold $M$ is the signature of the intersection pairing on $H^d(M)$ (see \cite{May}). In terms of Hodge numbers of K\"ahler surfaces $S$, the signature is given by $$\sigma(S)= 2h^{2,0}+2-h^{1,1}.$$ The discussion above indicates the importance of G\"ottsche's infinite product formulas (Theorem \ref{thm:gottsche}) as a vehicle for studying invariants of complex projective surfaces. This is further illuminated by the following specializations of Theorem \ref{thm:gottsche} in terms of these invariants. \begin{lemma}\label{lem:gottsche_prod} If $S$ is a smooth projective complex surface, then the following are true: \begin{align} \sum_{n =0}^\infty \chi_{-y}(\mathrm{Hilb}^n(S))y^{-n}q^n= & \prod_{n =1}^\infty \frac{((1- y^{-1}q^n)(1-yq^n))^{h^{1,0}-h^{2,0}-1}}{(1-q^n)^{h^{1,1}-2h^{1,0}}}, \label{sp1} \\ \sum_{n=0}^\infty \chi(\mathrm{Hilb}^n(S))q^n= & \prod_{n=1}^\infty (1-q^n)^{-\chi(S)}, \label{sp2} \\ \sum_{n=0}^\infty (-1)^n \sigma(\mathrm{Hilb}^n(S))q^n= & \prod_{n=1}^\infty \frac{(1-q^n)^{\sigma(S)}}{(1-q^{2n})^{(\sigma(S) + \chi(S))/2}}. \label{sp3} \end{align} \end{lemma} \noindent \tbf{Remark:} We note that (\ref{sp2}) and (\ref{sp3}) are alternate expressions for $Z(1,1;\tau)$ and $Z(1,-1;\tau)=Z(-1,1;\tau)$, respectively. We can apply the same process to $Z(-1,-1;\tau)$ to obtain \beq \label{eq:minus_expression} Z(-1,-1;\tau)= \prod_{n=1}^\infty \frac{(1-q^n)^{4h^{1,0}}}{(1-q^{2n})^{\chi(S)+8h^{1,0}}}. \eeq We now show that these functions can be assembled in linear combinations to give alternate formulas for $B_S(r;\tau)$ and $C_S(r_1,r_2;\tau)$. \blem\label{lem:roots_of_unity} Let $S$ be a smooth projective complex surface. We have \beq \label{eq:B_sum} B_S(r, \ell;n) = \frac{1}{2}\left( Z_S(1,1;\tau) + (-1)^r Z_S(1,-1;\tau)\right) \eeq and \beq \label{eq:now} C_S(r_1, r_2;\tau) = \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau), \eeq where $C_S(r_1, r_2;\tau)$ is defined by (\ref{eq:bigC}). \elem \bpf We prove only (\ref{eq:now}), since (\ref{eq:B_sum}) { follows from even simpler manipulations.} We have \bal \sum_{n \geq 0} c^*_S(r_1, r_2;n) q^n = & \frac{1}{4} \sum_{s, t ,n } c_S(s,t;n)\sum_{\substack{ j_1 \Mod{2} \\ j_2 \Mod{2}}} (-1)^{j_2(s+r_2)} (-1)^{j_1(t+r_1)}q^n \\ = & \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}}(-1)^{j_2r_2} (-1)^{j_1r_1} \sum_{s, t , n} c_S(s, t; n) (-1)^{j_2s} (-1)^{j_1t}q^n \\ = & \frac{1}{4} \sum_{\substack{ j_1\Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau). \eal \epf \subsection{Modularity Properties of Specializations of G\"ottsche's Identity \label{sec:trans_law}} The infinite products (\ref{sp2}), (\ref{sp3}), and (\ref{eq:minus_expression}) can be written in terms of the Dedekind eta function, the weight 1/2 modular form { on $SL_2(\bZ)$ (with multiplier)} that is defined by \begin{equation}\label{eq:eta} \eta(\tau) := q^{1/24} \prod_{n=1}^\infty (1-q^n). \end{equation} This is done explicitly in the following lemma. \begin{lemma}\label{lem:z_to_h} Let $S$ be a smooth projective complex surface. We have that \begin{align} \label{sp5} Z_S(1,1;\tau) = & q^{{\chi(S)}/{24}} \frac{1}{{\eta(\tau)}^{\chi(S)}}, \\ \label{sp6} Z_S(-1,1;\tau) = Z_S(1,-1;\tau) = & q^{{\chi(S)}/{24}}\frac{\eta(\tau)^{\sigma(S)}}{\eta(2 \tau)^{(\sigma(S) +\chi(S))/{2}}}, \\ \label{sp7} Z_S(-1,-1;\tau) = & q^{\chi(S)/24}\frac{\eta(2 \tau)^{4h^{1,0}}}{\eta(\tau)^{\chi(S)+8h^{1,0}}}. \end{align} \end{lemma} { Having expressed $Z_S( \pm 1, \pm1; \tau)$ as an eta quotient (up to a fractional power of $q$)}, we define \begin{equation}\label{eq:hab_def} H_{\alpha, \beta}({ q}) := q^{\chi(S)/24} \eta(\tau)^\alpha \eta(2 \tau)^\beta =: Z_S( x,y; \tau), \end{equation} where $x,y = \pm 1$ and $\alpha$ and $\beta$ are determined by $x, $ $y$, and the Hodge numbers of $S$. { Thus, (up to a fractional power of $q$)}, $H_{\alpha, \beta}$ is a modular form on $\Gamma_0(2)$. { In our application of the circle method} to prove our main results, we use the modularity of $H_{\alpha,\beta}$ to determine the behavior of this function when $\tau$ is near the rational number $h/k$. The modular transformation equations for $H_{\alpha, \beta}$ are given in the following lemma. { The $q$-expansion of $H_{\alpha,\beta}$ gives the behavior of $H_{\alpha,\beta}$ for $\tau$ near $i \infty$, and this lemma relates the behavior of $H_{\alpha,\beta}$ near $i\infty$ to its behavior near $h/k.$ We present two transformation equations, corresponding to the two different cusps of $\Gamma_0(2)$. These cusps partition the rationals $h/k$ into two parts, based on the parity of $k$. The two cusps will make distinct contributions to our final formula. } \blem\label{lem:trans_law} Let $k$ be a positive integer, let $h$ satisfy the condition $(h,k) =1$, and let $h'$ satisfy $hh' \equiv -1 \mod k$. Further suppose $\mathrm{Re}(z) >0$. Define $$\omega_{\alpha, \beta}(h,k) :=\exp\left(- \pi i( \alpha s(h,k)+\beta s(2h,k))\right),$$ where $s(h,k)$ is the Dedekind sum \bal s(h,k) := &\sum_{r=1}^{k-1} \bigg(\bigg(\frac{r}{k}\bigg)\bigg)\bigg(\bigg( \frac{hr}{k}\bigg)\bigg), \eal and $((x))$ is the sawtooth function \bal ((x)) := & \bcas 0 & x \in \bZ \\ x-\lfloor x\rfloor - \frac{1}{2} & x \notin \bZ. \ecas \eal \begin{enumerate} \item If $2 \mid k$, we have \begin{align*} H_{\alpha,\beta} &\left( \exp \left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right) \right) \\ &= z^{-\frac{\alpha + \beta}{2}}\omega_{\alpha, \beta}(h,k) \cdot \exp \left( (\alpha + 2 \beta)\dfrac{\pi}{12 k} \left( z -\dfrac{1}{z} \right) \right) \cdot H_{\alpha, \beta} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right). \end{align*} \item If $2 \nmid k$, we have \begin{align*} H_{\alpha, \beta} & \left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ \hspace{5mm} \qquad & = \frac{z^{-\frac{\alpha + \beta}{2}}\omega_{\alpha, \beta}(h,k)}{2^{\beta/2}} \cdot \exp \left( \frac{\pi}{24k}\left( {2(\alpha + 2 \beta)}z -\frac{2\alpha + \beta}{z}\right) \right) \cdot H_{\beta,\alpha}\left(\exp\left(\frac{\pi ih'}{k} - \frac{\pi}{zk} \right)\right). \end{align*} \end{enumerate} \elem \bpf From \cite[p.~96]{Apostol}, we know {\begin{align*} H_{-1,0}&\left(\exp\left(\dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k}\right)\right)\\ &= z^{\frac{1}{2}} \exp(\pi i s(h,k)) \exp\left(\dfrac{\pi}{12k} \left(\dfrac{1}{z} - z\right)\right) H_{-1,0}\left(\exp\left(\dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{k z}\right)\right), \end{align*} where $(h,k) =1$, ${\tau= (iz + h)/k}$, $hh' \equiv -1 \mod k$, and $s(h,k)$ is the Dedekind sum defined above. Similarly, \cite{Hagis3} shows that if $2 \mid k$, then \begin{align*} H_{-1,1}&\left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ &= \exp ( \pi i (\sigma(h,k) ) \exp \left( \dfrac{\pi}{12 k} \left(z - \dfrac{1}{z} \right) \right) H_{-1,1} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right), \end{align*} where $\sigma(h,k) := s(h,k)-s(2h,k)$, and if $2 \nmid k$ \begin{align*} H_{-1,1}&\left(\exp\left( \dfrac{2 \pi i h}{k} - \dfrac{2 \pi z}{k} \right)\right)\\ &= 2^{-\frac{1}{2}}\exp(\pi i \sigma(h,k))\exp\left(\frac{\pi}{24k}\left(\frac{1}{z} + 2z\right)\right)H_{-1,1}\left(\exp\left(\frac{ \pi ih'}{k} - \frac{\pi}{zk} \right)\right)\inv \end{align*}} \noindent To prove the lemma, { we} { note} that $H_{\alpha, \beta}({ q}) = H_{-1,0}({ q}) ^ {-(\alpha + \beta)} \cdot H_{-1,1}({ q}) ^ \beta$ and $H_{\alpha,0} ({ q^2}) = H_{0,\alpha}({ q})$. \epf { \noindent \tbf{Remark:} When we apply the circle method to find the coefficients of the $q$-expansion of $H_{\alpha, \beta}$ in Sections \ref{sec:Circle_method_outline}, \ref{sec:even_case}, and \ref{sec:odd_case}, we consider $\tau \in \bH$ on the horizontal line segment $$L = \{\tau \ | \ \tau = u + N^{-2} i, \ 0 \leq u \leq 1 \}.$$ As $N \to \infty$, $L$ approaches the positive real axis directly from above. As discussed in Section \ref{sec:Circle_method_outline}, for the purpose of estimates we partition $L$ into line segments that have midpoints at $h/k + i N^{-2}$ for cusp representatives $0 \leq h / k \leq 1$ and $k \leq N.$ When we reparameterize these line segments in terms of the variable $z$ introduced in the statement of Lemma \ref{lem:trans_law}, they become small vertical line segments just to the right of the origin in the $z$-plane. Lemma \ref{lem:trans_law} allows us to estimate the value of $H_{\alpha, \beta}$ for $z$ on these small vertical line segments. } { \subsection{Bounds on certain Kloosterman sums\label{sec:Kloosterman}} In order to bound the error terms that will result from estimating the contour integral \eqref{eq:countour_integral}, we need bounds on Kloosterman sums of the form \begin{align} \label{eq:Kloosterman_def1} A_k(\alpha,\beta,j;n):= & \sum_{\substack{0\leq h<k\\(h,k)=1}}\omega_{\alpha, \beta}(h,k)\exp\left(-\frac{2\pi inh}{k}+\frac{2\pi ih'j}{k}\right) \\ =: & \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \end{align} and \begin{align} \label{eq:Kloosterman_def2} B_k(\alpha,\beta,j;n):= & \sum_{\substack{0\leq h<k\\(h,k)=1}}\omega_{\alpha, \beta}(h,k)\exp\left(-\frac{2\pi inh}{k}+\frac{\pi ih'j}{k}\right) \\ =: & \sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n). \end{align} These sums admit the trivial estimate $O(k)$. However, in the case $\alpha + \beta = 0$, we will need a sharper estimate. In addition, we will occasionally restrict the values of $k_i$ to an interval $N-k < k_i \leq \sigma < N$, which will in turn restrict $h'$ to one or two intervals modulo $k$. For bounding purposes, it suffices to consider sums of the form $$ \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \qand \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n)$$ where the $'$ indicates that $h'$ is restricted to an interval $0 \leq \sigma_1 \leq h' < \sigma_2 \leq k$. Thus we will need the following lemma. \blem For $\alpha$ and $\beta$ fixed, $\alpha + \beta =0$, the sums $$ \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \qand \sideset{}{'}\sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n)$$ are subject to the estimate $$O(n^{1/3}k^{2/3 + \ep}) $$ uniformly in $\sigma_1$, $\sigma_2$, and $j$. \label{lem:Kloosterman} \elem \bpf The proof is a simple adaptation of those of Theorems 2 and 3 of \cite{Hagis3}, which follow the proof of Theorem 2 in \cite{Lehner}. Equations (3.5) and (4.11) in \cite{Hagis3} together state that if $2 \mid k$, we have $$\exp({ \pi i (s(h,k)-s(2h,k)})) = \exp\left(2 \pi i \left( \frac{4\phi(uh + vh')}{(k/2,2)Gk}+r(h,k)\right)\right) $$ where $r(h,k)$ is a rational number that depends on $k$ and $h $ mod 4, $\phi$, $G$, and $v$ are integers that depend only on $k$, and $u$ is a polynomial in $k$. (5.7) states that if $2 \nmid k$, then $$\exp({ \pi i (s(h,k)-s(2h,k)})) = \exp\left(2 \pi i \left( \frac{\Phi(uh + vh')}{gk}+r(h,k)\right)\right) $$ with $r$, $v$ and $u$ as before, and $\Phi$ and $g$ integers dependent on $k$. The proof of Lemma \ref{lem:Kloosterman} proceeds as in \cite{Hagis3}, with $u$, $v$, and $r$ replaced with $\beta u$, $\beta v$ and $\beta r$, respectively. \epf } { \subsection{Bounds on $I$-Bessel functions} As noted in the introduction, an important ingredient in our exact formulas is the modified Bessel function of the first kind, which is also known as the $I$-Bessel function. Here we recall a number of facts from \cite{NIST} about $I$-Bessel functions that will be useful throughout our arguments. We define the $I$-Bessel function of order $v$ as \begin{equation*} I_v(z) := \bigg( \dfrac{z}{2} \bigg)^v \sum_{k = 0}^\infty \dfrac{\big( \frac{1}{4} z^2 \big)^k}{k! \Gamma(v + k + 1)}. \end{equation*} From this definition it follows that for $0 < x < 1,$ we have \begin{equation}\label{eq:geom_bes_bound} |I_v(x)| < \frac{4}{3} \cdot \Big( \frac{x}{2} \Big)^v. \end{equation} We also recall an integral representation of the $I$-Bessel function which we will use in Sections \ref{sec:even_case} and \ref{sec:odd_case}: for $v \geq 0,$ we have \begin{equation}\label{eq:bes_int} I_v(z)=\frac{\left(\frac{1}{2}z\right)^{-v}}{2\pi i}\int_Rt^{v-1}\exp\left[t+\frac{z^2}{4t}\right]dt, \end{equation} where $R$ is any simple closed contour surrounding the origin. } \section{Outline of the circle method \label{sec:Circle_method_outline}} In this section, we outline our use of the circle method to find exact formulas for coefficients $a(\alpha, \beta;n)$ of $H_{\alpha, \beta}$ where $\alpha+\beta\leq 0$. This corresponds to those cases where $H_{\alpha,\beta}$ is essentially a modular form of non-positive weight. { These cases are special because non-constant holomorphic modular forms do not exist in non-positive weight.} We make use of the method of Rademacher, introduced in \cite{Rademacher_partitions}, which improved upon the earlier work of G. H. Hardy and Srinivasa Ramanujan on the partition function. We adapt the implementation of this method along the lines of earlier works by Hagis (see \cite{Hagis3}, \cite{Hagis4}, and \cite{Hagis5}). The basic ingredient of the circle method is Cauchy's integral formula, which we use to obtain \begin{equation}\label{eq:countour_integral} a(\alpha,\beta;n)=\frac{1}{2\pi i}\int_C \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq. \end{equation} { We let $C$ be the circle of radius $e^{-2\pi N^{-2}}$ centered at the origin, where $N$ is an upper bound on the denominator of the cusp representatives under consideration. We emphasize that we choose $C$ to be a circle with this particular radius; there are many paths that could be chosen in applying Cauchy's integral formula, but the one we choose here is a particular choice following the implementation of the circle method in \cite{Hagis3}, \cite{Hagis4}, and \cite{Hagis5}.} The exponent $n$ will be fixed, and $N$ will later be allowed to approach infinity. As $N \to \infty$, the main contribution to this integral comes from a dense set of poles on the boundary of the unit circle, where each pole is located at a root of unity $e^{2 \pi i h/k}$. { The locations of these poles follow from the definition of $H_{\alpha, \beta}$ in \eqref{eq:hab_def} and the location of the zeros of $\eta(\tau)$ afforded by the product representation \eqref{eq:eta}.} The generating function $H_{\alpha, \beta}$ is, up to a fractional power of $q$, a modular form with non-positive weight on $\Gamma_0(2)$ in the cases we consider. As shown in Lemma \ref{lem:trans_law}, we have that $H_{\alpha, \beta}$ has a pole of order $-(\alpha + 2\beta)/24$ at the cusp of $\Gamma_0(2)$ whose representatives have all even denominators and a pole of order $-(2\alpha + \beta)/48$ at the cusp whose representatives have all odd denominators. Since we have descriptions of $H_{\alpha,\beta}$ near all roots of unity, we divide $C$ into \emph{Farey arcs} $\xi_{h,k}$ for $(h,k)=1$, which decrease in length and approach the point $e^{2 \pi i h/k}$ as $N$ increases. Figure \ref{fig:Farey} shows the Farey arc $\xi_{1,3}$ for $N=10$, $20$, and $30$. By estimating $H_{\alpha,\beta}$ along these Farey arcs, we obtain a convergent series for the coefficients $a(\alpha; \beta, n)$ as $N \to \infty.$ These series are exact formulas which yield Theorem \ref{thm:exactFormulasFor_H}. \begin{figure}[h] \centering \includegraphics[scale=.5]{Farey2.png} \caption{Farey arcs $\xi_{1,3}$} \label{fig:Farey} \end{figure} We will need explicit descriptions of these Farey arcs. First, we can rewrite \[\frac{1}{2\pi i}\int_C \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq=\sum_{\substack{0\leq h<k\leq N\\(h,k)=1}}\frac{1}{2\pi i}\int_{\xi_{h,k}} \frac{H_{\alpha, \beta}(q)}{q^{n+1}}dq.\] In the Farey series of order $N$, we consider the fraction $h/k$ and its two neighbors, \beq \frac{h_1}{k_1}<\frac{h}{k}<\frac{h_2}{k_2}, \label{eq:neighbors} \eeq discussed in \cite{Rademacher}. Each of $h_i$ and $k_i$ depend on $h$, $k$ and $N$ as described in \cite{Rademacher}. Note that $N-k < k_i \leq N$. { On the arc $\xi_{h,k}$, we can introduce the variable $\theta$ via the transformation \[q=\exp\left[-2\pi N^{-2}+2\pi i\left(\frac{h}{k}+\theta\right)\right]=\exp\left[\frac{2\pi ih}{k}-\frac{2\pi z}{k}\right],\]} where \[-\vartheta_{h,k}':=-\frac{1}{k(k_1+k)} \leq \theta \leq \frac{1}{k(k_2+k)}=: \vartheta_{h,k}''.\] Setting $z=k(N^{-2}-i\theta)$ on each arc $\xi_{h,k}$, we obtain \begin{equation*} a(\alpha,\beta;n) =\sum_{\substack{0\leq h<k\leq N\\(h,k)=1}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{equation*} Guided by Lemma \ref{lem:trans_law}, we break up the sum into even and odd $k$, writing \begin{equation} a(\alpha,\beta;n)=S(0,N;n)+S(1,N;n),\label{eq:a_parity_strat_S's} \end{equation} where $$S(r,N;n) := \sum_{\substack{0\leq h<k\leq N\\(h,k)=1\\ k \equiv r \Mod{2}}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. $$ We henceforth omit dependence on $\alpha$ and $\beta$ from the names of most variables. Section \ref{sec:Kloosterman} gives estimates on sums of roots of unity known as Kloosterman sums that are needed to bound the error terms. Section \ref{sec:even_case} extracts behavior from $S(0,N;n)$ that will contribute to the exact formula and bounds the error terms. Throughout the following three sections, $n$, $\alpha$, and $\beta$ are fixed. \section{The even case}\label{sec:even_case} \subsection{Decomposing $S(0,N;n)$} \label{sec:decomp_S2} Here we will extract main term and error term behavior from \begin{align*} S(0,N;n)&:=\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{align*} Towards this goal, we apply the transformation law (1) in Lemma \ref{lem:trans_law} for $H_{\alpha,\beta}$ and even $k$. In the process, we replace the resulting term \[H_{\alpha, \beta} \left( \exp \left( \dfrac{2 \pi i h'}{k} - \dfrac{2 \pi}{z k} \right) \right)=\sum_{j=0}^\infty a(\alpha,\beta;j) \exp \left( \dfrac{2 \pi i h'j}{k} - \dfrac{2 \pi j}{z k} \right)\] with its series expansion and re-express $z=kw$, yielding \begin{align*} S(0,N;n) =&\sum_{j=0}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)k^{-\frac{\alpha+\beta}{2}}\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}w^{-\frac{\alpha + \beta}{2}}\exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]d\theta. \end{align*} The coefficient of $1/w$ inside the above exponential is positive if and only if $j<-(\alpha+2\beta)/24$. Accordingly, we let \begin{equation} S(0,N;n) =Q(0,N;n)+R(0,N;n)\label{eq:S(0)_split} \end{equation} where $Q(0,N;n)$ is the sum over those $j<-(\alpha+2\beta)/24$, and $R(0,N;n)$ consists of the remaining terms in $S(0,N;n)$. We will show later that $Q(0,N;n)$ yields mostly main term behavior, whereas $R(0,N;n)$ yields error term behavior. On this note, we observe that if $\alpha+2\beta\geq 0$, then $Q(0,N;n)$ is in fact an empty sum, which corresponds to the weak growth near $e^{2 \pi i h/k}$ for $k$ even discussed at the end of Section \ref{sec:trans_law}. Thus in our analysis of $Q(0,N;n)$ we may assume $\alpha+2\beta<0$. Additionally, we will assume $n>-(\alpha+2\beta)/24$, which guarantees that the coefficient on $w$ inside the exponential is positive. \subsection{Decomposing $Q(0,N;n)$}\label{sec:decomposing_Q(1)} We now break up $Q(0,N;n)$ into three parts: one which will be extended to a Bessel function in the following subsection, as well as two error terms. Towards this goal, we divide the intervals of integration into three parts according to $$-\vartheta_{h,k}' = - \frac{1}{k(k+k_1)} \leq - \frac{1}{k(N+k)} < \frac{1}{k(N+k)} \leq \frac{1}{k(k+k_2)} = \vartheta_{h,k}''. $$ Omitting the integrands, the split becomes \begin{align} Q(0,N;n) &=\sum_{j< -\frac{\alpha+2\beta}{24}}\sum_{\substack{k=2\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)\nonumber\left[\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}\, + \int_{-\frac{1}{k(k_1+k)}}^{-\frac{1}{k(N+k)}}\, + \int_{\frac{1}{k(N+k)}}^{\frac{1}{k(k_2+k)}}\,\right]\nonumber\\ &=:Q_{0}(0,N;n)+Q_{1}(0,N;n)+Q_{2}(0,N;n)\label{eq:Q(0)_split_into_3}. \end{align} \subsection{Extending $Q_0(0,N;n)$\label{sec:Extend_Q_0}} Here we will extend the path of integration of $Q_0(0,N;n)$ to obtain a modified Bessel function. Implementing the variable transformation $w=N^{-2}-i\theta,$ we have \begin{align*} Q_0(0,N;n)= & \sum_{j< -\frac{\alpha+2\beta}{24}}\sum_{\substack{k=2\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{ik^{\frac{\alpha + \beta}{2}}} \cdot \int_{N^{-2}-\frac{i}{k(N+k)}}^{N^{-2}+\frac{i}{k(N+k)}} w^{-\frac{\alpha + \beta}{2}} \\ & \cdot \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]dw. \end{align*} We will now extend the path of integration to the rectangle $R$ with vertices \[\pm N^{-2}\pm \frac{i}{k(N+k)}.\] Omitting the integrands, we write \begin{align} Q_0(0,N;n) = 2 \pi \sum_{j< -\frac{\alpha+2\beta}{24}} &\sum_{\substack{k=2\\k\text{ even}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}\label{eq:Q0(0)_decomp}\\ &\cdot\left\{\frac{1}{2\pi i}\int_R-\frac{1}{2\pi i}\left[\int_{+,+}^{-,+}+\int_{-,+}^{-,-}+\int_{-,-}^{+,-}\right]\right\}\nonumber. \end{align} We name $L^*(0,j,k;n):=1/2\pi i\int_R$, and we name the three remaining integrals $J_1(0,j,k,N;n),$ $J_2(0,j,k,N;n),$ and $J_3(0,j,k,N;n),$ respectively. We will give an exact description of $L^*(0,j,k;n)$ as a Bessel function, and bound each $J_i(0,j,k,N;n)$. \subsection{Expressing $L^*(0,j,k;n)$ as a Bessel function}\label{sec:even_bessel} In this subsection, we express $L^*(0,j,k;n)$ { in terms of} a modified Bessel function of the first kind. In the remaining subsections, we will bound each of the error terms that we have encountered, demonstrating that the only significant contribution from $S(0,N;n)$ comes from $L^*(0,j,k;n)$. To $L^*(0,j,k;n)$ we apply the variable transformation \[u=w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right),\] which gives \begin{align*} L^*(0,j,k;n)=&\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{\frac{\alpha+\beta}{2}-1} \frac{1}{2\pi i}\int_{R'}u^{-\left(\frac{\alpha+\beta}{2}\right)} \\ &\qquad \cdot \exp\left[u+\frac{1}{u}\left\{\left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]\right\}\right]du. \end{align*} It follows { from the integral representation of the $I$-Bessel function \eqref{eq:bes_int}} that \begin{equation}\label{eq:L0Bessel} L^*(0,j,k;n)= \left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]^{\frac{1}{2}-\frac{\alpha+\beta}{4}} \left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{-\frac{1}{2}+\frac{\alpha+\beta}{4}} I_{v}(s_0(j,k)) \end{equation} where \begin{align*} v:=1-\frac{\alpha+\beta}{2},\qquad s_0(j,k):=2\sqrt{\left[-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]}. \end{align*} \subsection{Bounding $R(0,N;n)$\label{sec:bounding_R}} In this section we will bound $R(0,N;n)$, which we recall is given by \begin{align*} R(0,N;n) =&\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j)\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}(kw)^{-\frac{\alpha + \beta}{2}}\exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]d\theta. \end{align*} We will show that $ R(0,N;n)= O(N^{-\delta}) $ for some $\delta >0.$ Setting $$E := E(w,\alpha, \beta,n,k,j) := \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)+\frac{1}{w}\left(-(\alpha+2\beta)\frac{\pi}{12k^2}-\frac{2\pi j}{k^2}\right)\right]$$ and splitting the integral into three parts as in (\ref{eq:Q(0)_split_into_3}), we obtain \begin{align} \nonumber R(0,N;n) = & \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)a(\alpha,\beta;j) \\ \nonumber & \cdot\bigg[ \int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta + \sum_{\ell=k_1+k}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta + \sum_{\ell=k_2+k}^{N+k-1} \int_{\frac{1}{k\ell}}^{\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \bigg] \\ \label{eq:line_1} = & \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \\ \label{eq:line_2} & +\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j)\sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) \sum_{\ell=k_1+k}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta \\ \label{eq:line_3} & +\sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N\sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\sum_{\ell=k_2+k}^{N+k-1} \int_{\frac{1}{k\ell}}^{\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E d \theta. \end{align} Our goal is to bound the expressions (\ref{eq:line_1}), (\ref{eq:line_2}), and (\ref{eq:line_3}). We begin by bounding $|E|$. As a reminder, we have $w= N^{-2} - i \theta$ and $|\theta| \leq1/Nk$, so that $\mathrm{Re}(1/w) \geq k^2/2$ and $ \mathrm{Re}(w) = N^{-2}.$ Therefore for $j \geq -(\alpha + 2\beta)/24$, $$ |E| \leq \exp\left[N^{-2}\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)-(\alpha+2\beta)\frac{\pi}{24}-\pi j\right].$$ Thus for $N>0$, we have \beq \label{eq:exp_bound} \exp\left[N^{-2}\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right)-(\alpha+2\beta)\frac{\pi}{24}\right] = O(1 ).\eeq Noting that the series $\sum_{j=0}^\infty a(\alpha, \beta;j)e^{-\pi j}$ defining $H_{\alpha, \beta}(i/2)$ converges absolutely, we have that for fixed $n$, (\ref{eq:line_1}) admits the estimate $$ O\left( \sum_{\substack{k=1\\k\text{ even}}}^N\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}(kw)^{-\frac{\alpha + \beta}{2}} d \theta \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) = O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right).$$ If $\alpha + \beta < 0$, we can use the trivial Kloosterman sum bound $O(k)$ to show that \beq O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) = O\left(N^{\frac{\alpha + \beta}{2}}\right). \label{eq:neg_weight} \eeq If $\alpha +\beta = 0$, we can make use of Lemma \ref{lem:Kloosterman} to show that for fixed $n$, \beq O\left(\sum_{\substack{k=1\\k\text{ even}}}^N \frac{N^{\frac{\alpha + \beta}{2} -1}}{k} \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n)\right) =O\left(\sum_{\substack{k=1\\k\text{ even}}}^N\frac{k^{-1/3 + \ep}}{N}\right) = O(N^{-1/3+ \ep}). \label{eq:zero_weight} \eeq The summands (\ref{eq:line_2}) and (\ref{eq:line_3}) are handled in a similar way. The only important difference is that we must first switch the order of summation as in \cite[p.~507]{Rademacher} to obtain \beq \label{eq:R_final} \sum_{j \geq - \frac{\alpha + 2\beta}{24}}^\infty a(\alpha,\beta;j)\sum_{\substack{k=1\\k\text{ even}}}^N \sum_{\ell=N+1}^{N+k-1} \int_{-\frac{1}{k\ell}}^{-\frac{1}{k(\ell+1)}}(kw)^{-\frac{\alpha + \beta}{2}} E \sum_{\substack{0\leq h<k\\(h,k)=1\\N-k<k_2\leq l-k}} A_{h,k}(\alpha,\beta,j;n) d \theta. \eeq The desired bound is now obtained via the same methods used to bound (\ref{eq:line_1}). As described in Section \ref{sec:Kloosterman}, Lemma \ref{lem:Kloosterman} is equipped to handle the incomplete Kloosterman sum in (\ref{eq:R_final}). By (\ref{eq:neg_weight}), (\ref{eq:zero_weight}), and corresponding statements for (\ref{eq:line_2}) and (\ref{eq:line_3}), we obtain in all cases \beq \label{eq:R0_bound} R(0,N;n) = O(N^{-\delta}) \eeq for some $\delta >0$. \subsection{Bounding $Q_1(0,N;n)$ and $Q_2(0,N;n)$}\label{sec:boundingQ_2(0)} In this subsection, we will bound those segments of the Farey arcs that do not contribute to the Bessel integral. We will explicitly bound just $Q_2(0,N;n)$ because similar arithmetic yields the same bound for $Q_1(0,N;n)$. First, as in (\ref{eq:line_2}) and (\ref{eq:line_3}) we split our path of integration into many smaller intervals, obtaining \begin{align*} Q_2(0,N;n) =&\sum_{j< -\frac{\alpha+2\beta}{24}}^\infty \sum_{\substack{k=1\\k\text{ even}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} A_{h,k}(\alpha,\beta,j;n) a(\alpha,\beta;j)k^{-\frac{\alpha + \beta}{2}} \sum_{l=k_2+k}^{N+k-1} \int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} w^{-\frac{\alpha + \beta}{2}} E d\theta. \end{align*} Now, as in \ref{eq:R_final}, we switch the order of summation, which yields \begin{align*} Q_2(0,N;n) =&\sum_{j< -\frac{\alpha+2\beta}{24}}^\infty a(\alpha,\beta;j) \sum_{\substack{k=1\\k\text{ even}}}^N k^{-\frac{\alpha + \beta}{2}} \sum_{l=N+1}^{N+k-1} \int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} w^{-\frac{\alpha + \beta}{2}} Ed\theta \sum_{\substack{0\leq h<k\\(h,k)=1\\N-k<k_2\leq l-k}} A_{h,k}(\alpha,\beta,j;n). \end{align*} We have, similarly to (\ref{eq:exp_bound}), that $E=O(1)$. Since $ |w| \leq ({2}/{(N^2k^2)})^{1/2}$, we have \begin{align*} \sum_{l=N+1}^{N+k-1}\int_{\frac{1}{k(l+1)}}^{\frac{1}{kl}} &w^{-\frac{\alpha + \beta}{2}} Ed\theta = O\left(\left(Nk\right)^{\frac{\alpha+\beta}{2}-1}\right).\\ \end{align*} Here and throughout, the constant implied by the big Oh notation depends at most on $\alpha,\beta,n$. The following steps are analogous to the final steps of Section \ref{sec:bounding_R}, where the cases $\alpha + \beta <0$ and $\alpha + \beta =0$ are considered separately. We conclude that \begin{equation} Q_1(0,N;n), \ Q_2(0,N;n)=O(N^{-\delta})\label{eq:Q_2(0)_bound} \end{equation} for some $\delta>0$. \subsection{Bounding $J_1(0,j,k,N;n),J_2(0,j,k,N;n),J_3(0,j,k,N;n)$\label{sec:boundingJs}} As a reminder, we have \[J_1(0,j,k,N;n):=\int_{N^{-2}+\frac{i}{k(N+k)}}^{-N^{-2}+\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw, \qquad J_3(0,j,k,N;n):=\int_{-N^{-2}-\frac{i}{k(N+k)}}^{+N^{-2}-\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw,\] and \[J_2(0,j,k,N;n):=\int_{-N^{-2}+\frac{i}{k(N+k)}}^{-N^{-2}-\frac{i}{k(N+k)}}w^{-\frac{\alpha + \beta}{2}} Edw.\] We first consider $J_1$ and $J_3$. Here one easily finds $\mathrm{Re}(w) \leq N^{-2}$ and $ \mathrm{Re}(1/w) \leq 4k^2$, and from this obtains $E= O(1)$. Since the interval length is $2N^{-2}$ and $|w| \leq {\sqrt{2}}/{kN}$, we have that $J_1$ and $J_3$ are $O\left( (kN)^{(\alpha + \beta)/2-1})\right).$ For $J_2$, we need only note that $\mathrm{Re}(w)$ and $ \mathrm{Re}(1/w) $ are negative to show that $E= O(1)$. Since the length of the interval is $2/N(k+N)$, we see that $J_2$ is $O\left( (kN)^{(\alpha + \beta)/2-1})\right).$ We proceed as in Sections \ref{sec:bounding_R} and \ref{sec:boundingQ_2(0)} to show that \beq \label{eq:J_bound} \sum_{\substack{k=2 \\ k \ \text{even}}}^NA_k(\alpha,\beta,j; n)\left\{J_1+J_2+J_3\right\} = O(N^{-\delta}) \eeq for some $\delta>0$, as desired. Recalling our decomposition of $Q_0(0,N;n)$ in (\ref{eq:Q0(0)_decomp}) and the bound given by (\ref{eq:J_bound}) above, we can now estimate \begin{align} Q_0(0,N;n)= 2\pi\sum_{j< -\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\text{ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)+O(N^{-\delta}).\label{eq:Q0(0)_estimated} \end{align} \section{The odd case} \label{sec:odd_case} The odd case follows a manner very similar to the even case, and the discrepancies are all consequences of the differences between the transformation formulas (1) and (2) in Lemma \ref{lem:trans_law} for even and odd $k$. \subsection{Decomposing $S(1,N;n)$} Here we will extract main term and error term behavior from \begin{align*} S(1,N;n)&=\sum_{\substack{0\leq h<k\leq N\\(h,k)=1\\k\text{ odd}}}e^{-\frac{2\pi inh}{k}}\int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}H_{\alpha,\beta}\left(e^{\frac{2\pi ih}{k}-\frac{2\pi z}{k}}\right)e^{\frac{2\pi nz}{k}}d\theta. \end{align*} We apply the transformation law (2) in Lemma \ref{lem:trans_law} for $H_{\alpha,\beta}$ and odd $k$, obtaining \begin{align*} S(1,N;n)=& \sum_{j=0}^\infty \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\\ &\cdot \int_{-\vartheta_{h,k}'}^{\vartheta_{h,k}''}w^{-\frac{\alpha + \beta}{2}} \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right) +\frac{1}{w}\left(-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right)\right]d\theta \end{align*} as in Section \ref{sec:decomp_S2}. In this case the coefficient on $1/w$ inside the above exponential is positive if and only if $j<-(2\alpha+\beta)/24.$ Thus we stratify $ S(1,N;n)$ via \begin{equation} S(1,N;n) =Q(1,N;n)+R(1,N;n),\label{eq:S(1)_split} \end{equation} where $Q(1,N;n)$ is the sum over those $j<-(2\alpha+\beta)/24$. As in the even case, $Q(0,N;n)$ will yield mostly main term behavior, whereas $R(0,N;n)$ will yield error term behavior. We continue to assume that $n>-(\alpha+2\beta)/24$. \subsection{Decomposing $Q(1,N;n)$} We will now break up $Q(1,N;n)$ into three parts, which play the same roles as in Section \ref{sec:decomposing_Q(1)}. Omitting the integrands, we have \begin{align} Q(1,N;n)&= \sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\nonumber\cdot\left[\int_{-\frac{1}{k(N+k)}}^{\frac{1}{k(N+k)}}\, + \int_{-\frac{1}{k(k_1+k)}}^{-\frac{1}{k(N+k)}}\, + \int_{\frac{1}{k(N+k)}}^{\frac{1}{k(k_2+k)}}\,\right]\\ &=:Q_{0}(1,N;n)+Q_{1}(1,N;n)+Q_{2}(1,N;n).\label{eq:Q(1)_split_into_3} \end{align} \subsection{Extending $Q_0(1,N;n)$} In this subsection, we will extend the path of integration of $Q_0(1,N;n)$ to obtain a modified Bessel function. Via the variable transformation $w=N^{-2}-i\theta$, we can write \begin{align*} Q_0(1,N;n)=& \sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{i2^{\beta/2}k^{\frac{\alpha+\beta}{2}}} \\ &\cdot \int_{N^{-2}-\frac{i}{k(N+k)}}^{N^{-2}+\frac{i}{k(N+k)}} w^{-\frac{\alpha + \beta}{2}} \exp\left[w\left((\alpha+2\beta)\frac{\pi}{12}+2\pi n\right) +\frac{1}{w}\left(-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right)\right]dw. \end{align*} Considering the rectangle $R$ described in Section \ref{sec:Extend_Q_0}, we write \begin{align} Q_0(1,N;n)=& 2 \pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \sum_{\substack{0\leq h<k\\(h,k)=1}} \frac{B_{h,k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}\label{eq:Q0(1)_decomp}\cdot \left\{\frac{1}{2\pi i}\int_R-\frac{1}{i}\left[\int_{+,+}^{-,+}+\int_{-,+}^{-,-}+\int_{-,-}^{+,-}\right]\right\}. \end{align} Omitting the integrands, we write $L^*(1,j,k;n):=1/2\pi i\int_R$, and we name the three remaining integrals $J_1(1,j,k,N;n),$ $J_2(1,j,k,N;n),$ and $J_3(1,j,k,N;n),$ respectively. \subsection{Expressing $L^*(1,j,k;n)$ as a Bessel function} Now, we will express $L^*(1,j,k;n)$ exactly as a modified Bessel function of the first kind. To $L^*(1,j,k;n)$ we apply the same variable transformation as in Section \ref{sec:even_bessel}, which gives \begin{equation}\label{eq:L1Bessel} L^*(1,j,k;n) = \left[-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right]^{\frac{1}{2}-\frac{\alpha+\beta}{4}}\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]^{-\frac{1}{2}+\frac{\alpha+\beta}{4}}I_v(s_1(j,k)), \end{equation} where \[s_1(j,k):=2\sqrt{\left[-(2\alpha+\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}\right]\left[(\alpha+2\beta)\frac{\pi}{12}+2\pi n\right]}\] and $v$ is the same as in Section \ref{sec:even_bessel}. \subsection{Bounding the odd case error terms} $R(1,N;n)$, $Q_\mu(1,N;n)$, and $J_\nu(1,j,k,N;n)$ for $\mu=1,2$ and $\nu=1,2,3$ are bounded in a manner which is nearly identical to the corresponding arguments in the even case. The main differences between these expressions and their even case counterparts are the coefficient $a(\beta,\alpha;j)$ from the expansion of $H_{\beta,\alpha}$ and the coefficient $$-(2\alpha +\beta)\frac{\pi}{24k^2}-\frac{\pi j}{k^2}$$ of $1/w$ in the exponential. Note that in Sections \ref{sec:bounding_R}, \ref{sec:boundingQ_2(0)}, and \ref{sec:boundingJs}, the terms $-(\alpha + 2\beta)/12$ in the coefficient of $1/w$, which correspond to $-(2\alpha +\beta)/24$ in the odd case, may as well have been arbitrary negative real numbers that are fixed in this discussion. The same holds for $-2 \pi$ as the coefficient of $j$, except when we used the absolute convergence of the series defining $H_{\alpha,\beta}(i/2)$ in Section \ref{sec:bounding_R}. In the odd case, we need to use the absolute convergence of the series defining $H_{\beta,\alpha}(i/4)$ to obtain the same result. Running the same arguments with these minor adjustments, we obtain \begin{align} R(1,N;n) & = O(N^{-\delta}), \label{eq:R(1)_bound} \\ Q_\mu(1,N;n) & = O(N^{-\delta}), \label{eq:Q_2(1)_bound} \end{align} and \begin{align} \sum_{\substack{0\leq h<k\\(h,k)=1}} B_{h,k}(\alpha,\beta,j;n) \left( \sum_\nu J_\nu(1,j,k,N;n)\right) & = O(N^{-\delta}) \label{eq:J(1)_bound} \end{align} for some $\delta>0$, where $ \mu=1,2$ and $\nu=1,2,3$. Recalling our decomposition of $Q_0(1,N;n)$ in (\ref{eq:Q0(1)_decomp}) and the bounds given by (\ref{eq:J(1)_bound}) above, we conclude that \begin{align} Q_0(1,N;n)= 2\pi\sum_{j< -\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha,j)}{2^{\beta/2}k^{\frac{\alpha + \beta}{2}}}L^*(1,j,k;n)+O(N^{-\delta}).\label{eq:Q0(1)_estimated} \end{align} \section{Proof of Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution}} \label{sec:proofs} We now apply our work from Sections \ref{sec:Circle_method_outline}, \ref{sec:Kloosterman}, and \ref{sec:even_case} to obtain exact formulas for $a(\alpha,\beta;n)$, and afterwards we will extract asymptotic behavior from those formulas. Finally, we will express these exact and asymptotic formulas in terms of our topological invariants to prove Theorem \ref{thm:main_result} and Corollary \ref{cor:asymptotics}. \begin{theorem}\label{thm:exactFormulasFor_H} Let $\alpha+\beta\leq 0$, and assume $n>-(\alpha+2\beta)/24$. Then \begin{align} \label{eq:exactFormulasFor_H} a(\alpha,\beta;n)=\ \ \ &2\pi \sum_{j<-\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^\infty \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)\\ \qquad+\,&2\pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^\infty \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}L^*(1,j,k;n). \end{align} \end{theorem} \begin{proof} Making use of the decompositions (\ref{eq:S(0)_split}) and (\ref{eq:Q(0)_split_into_3}), as well as the estimates (\ref{eq:R0_bound}), (\ref{eq:Q_2(0)_bound}), and (\ref{eq:Q0(0)_estimated}), we have \begin{align*} S(0,N;n)=2\pi\sum_{j< -\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\text{ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)+O(N^{-\delta}). \end{align*} Similarly, by the decompositions (\ref{eq:S(1)_split}) and (\ref{eq:Q(1)_split_into_3}), as well as the estimates (\ref{eq:R(1)_bound}), (\ref{eq:Q_2(1)_bound}), and (\ref{eq:Q0(1)_estimated}), we have \begin{align*} S(1,N;n)= 2\pi\sum_{j< -\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k\text{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha,j)}{2^{\beta/2}k^{\frac{\alpha + \beta}{2}}}L^*(1,j,k;n)+O(N^{-\delta})\label{eq:Q0(1)_estimated}. \end{align*} But by the parity split in (\ref{eq:a_parity_strat_S's}), these estimates imply that \begin{align*} a(\alpha,\beta;n)=\ \ \ &2\pi \sum_{j<-\frac{\alpha+2\beta}{24}} \sum_{\substack{k=2\\k\mathrm{\ even}}}^N \frac{A_{k}(\alpha,\beta,j;n)a(\alpha,\beta,j)}{k^{\frac{\alpha + \beta}{2}}}L^*(0,j,k;n)\\ \qquad+\,&2\pi\sum_{j<-\frac{2\alpha+\beta}{24}} \sum_{\substack{k=1\\k \ \mathrm{ odd}}}^N \frac{B_{k}(\alpha,\beta,j;n)a(\beta,\alpha;j)}{2^{\beta/2}k^{\frac{\alpha+\beta}{2}}}L^*(1,j,k;n)\\ \qquad+\,&O(N^{-\delta}) \end{align*} for some $\delta>0$. Keeping $n$ fixed and letting $N\to\infty$, we obtain (\ref{eq:exactFormulasFor_H}). \end{proof} { \noindent \tbf{Remark:} In \cite{BringOno}, Bringmann and Ono obtained exact formulas for the coefficients of harmonic Maass forms of non-positive weight using the theory of Maass-Poincar\'e series. Our results can therefore also be obtained using their work. \medskip } In the following corollary, we make use of Theorem \ref{thm:exactFormulasFor_H} to obtain approximations for $a(\alpha,\beta;n)$ for large $n$. We will see that the main contribution for large $n$ comes from one of the first two summands in $k$. \begin{corollary}\label{cor:asym_for_h} Suppose that $\alpha + \beta \leq 0$. \begin{enumerate} \item If $\alpha = 0$ and $\beta \neq 0$, then as $n \to \infty$ we have $$ a(0, \beta;2n) \sim 2^{\frac{3\beta-5}{4}}3^{\frac{\beta-1}{4}}(-\beta)^{\frac{1-\beta}{4}}n^{\frac{\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-2\beta}{3}n}\right).$$ \item If $\alpha<0$, then as $n \to \infty$ we have $$ a(\alpha,\beta;n) \sim 2^{\frac{2\alpha+\beta-3}{2}}3^{\frac{\alpha+\beta-1}{4}}(-(2\alpha+\beta))^{\frac{-\alpha-\beta+1}{4}}n^{\frac{\alpha+\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-(2\alpha+\beta)}{3}n}\right).$$ \item If $\alpha>0$, then as $n \to \infty$ we have $$ a(\alpha, \beta;n) \sim (-1)^{n} 2^{\frac{3\alpha+3\beta-7}{4}}3^{\frac{\alpha+\beta-1}{4}}(-(\alpha+2\beta))^{\frac{1-\alpha-\beta}{4}}n^{\frac{\alpha+\beta-3}{4}}\exp\left(\pi\sqrt{\frac{-(\alpha+2\beta)}{6}n}\right) .$$ \end{enumerate} \end{corollary} \begin{proof} Consider the case $\alpha < 0.$ Let \begin{equation*} a(\alpha, \beta; n) =: 2 \pi \bigg( M^-(\alpha, \beta; n) + E^-(\alpha, \beta; n) \bigg), \end{equation*} where we let \begin{equation*} M^-(\alpha, \beta; n) := \dfrac{B_1(\alpha, \beta, 0; n) a(\beta, \alpha; 0)}{2^{\frac{\beta}{2}}} L^*(1, 0, 1; n) \end{equation*} and \begin{align}\label{eq:weak_bess} E^-(\alpha, \beta; n) := 2 \pi \left(\sum_{j = 0}^{\mathlarger{\lfloor} \frac{\alpha+2\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=2\\k \equiv 0 \Mod{2}}}^\infty f_A(\alpha, \beta, j, k; n) + \sum_{j = 0} ^{\mathlarger{\lfloor} \frac{2\alpha+\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=3\\k \equiv 1 \Mod{2}}}^\infty f_B(\alpha, \beta, j, k; n) \right), \end{align} where \begin{equation*} f_A(\alpha, \beta, j, k; n) := \dfrac{A_k(\alpha, \beta, j; n) a(\alpha, \beta, j)}{k^{\frac{\alpha + \beta}{2}}} L^*(0, j, k; n) \end{equation*} and \begin{equation*} f_B(\alpha, \beta, j, k; n) := \dfrac{B_k(\alpha, \beta, j; n) a(\beta, \alpha, j)}{2^\beta k^{\frac{\alpha + \beta}{2}}} L^*(1, j, k; n). \end{equation*} To prove Corollary \ref{cor:asym_for_h} for $\alpha < 0,$ it suffices to show that $E^-(\alpha, \beta; n) = o(L^*(1,0,1;n))$ and then to carry out the necessary simplification of $2 \pi M^-(\alpha, \beta; n).$ { Using the bound \eqref{eq:geom_bes_bound}}, the monotonicity of the $I$-Bessel functions, and the trivial bound on the Kloosterman sums, it follows from \eqref{eq:weak_bess} that \begin{align*} E^-(\alpha, \beta; n) &\leq \bigg( \dfrac{-(\alpha+2\beta)}{\alpha+2\beta+24 n} \bigg)^{\frac{v}{2}} \sum_{j = 0}^{\mathlarger{\lfloor} -\frac{\alpha + 2 \beta}{24} \mathlarger{\rfloor}} |a(\alpha,\beta,j)| \bigg( K_A(\alpha, \beta, j; n) + \lceil s_0(j, 1) \rceil I_{v}(s_0(0,2) ) \bigg) \\ & + \bigg( \dfrac{-(2\alpha+\beta)}{\alpha+2\beta + 48 \pi n} \bigg)^{\frac{v}{2}} \sum_{j = 0}^{\mathlarger{\lfloor} -\frac{2 \alpha + \beta}{24} \mathlarger{\rfloor}} \frac{ |a(\beta,\alpha;j)| }{2^{\beta/2}} \bigg( K_B(\alpha, \beta, j; n) + \lceil s_1(j,1) \rceil I_{v}( s_1(0,3)) \bigg), \end{align*} where \begin{equation*} K_A(\alpha, \beta, j; n) := \dfrac{4}{3} \sum_{\substack{k > \lceil s_0(j, 1) \rceil \\ k \equiv 0 \Mod{2}}}\frac{A_{k}(\alpha,\beta,j;n)}{k^{v + 1}} \bigg( \dfrac{s_0(0,1)}{2} \bigg)^{v}, \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) := \dfrac{4}{3} \sum_{\substack{k > \lceil s_1(j,1) \rceil \\ k \equiv 1 \Mod{2}}} \frac{B_{k}(\alpha,\beta,j;n)}{k^{v + 1}} \bigg( \dfrac{s_1(0,1)}{2} \bigg)^{v}. \end{equation*} If $\alpha + \beta <0$, we use the trivial bound on the Kloosterman sums to obtain \begin{equation*} K_A(\alpha, \beta, j; n) \leq \dfrac{4}{3} \bigg( \dfrac{s_0(0,1)}{2} \bigg)^{v} \dfrac{s_0(j,1)^{1 - v}}{1 - v} \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) \leq \dfrac{4}{3} \bigg( \dfrac{s_1(0,1)}{2} \bigg)^{v} \dfrac{s_0(j,1)^{1 - v}}{1 - v}, \end{equation*} and if $\alpha + \beta = 0,$ we use Lemma \ref{lem:Kloosterman} to obtain \begin{equation*} K_A(\alpha, \beta, j; n) = O(n^{\frac{1}{3}} s_0(j, 1)^{-\frac{1}{3} + \epsilon}) \end{equation*} and \begin{equation*} K_B(\alpha, \beta, j; n) = O(n^{\frac{1}{3}} s_1(j, 1)^{-\frac{1}{3} + \epsilon}). \end{equation*} Therefore, since $E^-(\alpha, \beta; n)$ is bounded by a finite sum of rational functions and $I$-Bessel functions, it follows from \begin{equation*} I_v(x)\sim \frac{e^x}{\sqrt{ 2\pi x}} \end{equation*} that $E^-(\alpha, \beta; n) = o(L^*(1,0,1;n)),$ and that the statement of Corollary \ref{cor:asym_for_h} follows from a simplification of $2 \pi M(\alpha, \beta; n).$ If $\alpha > 0,$ the proof of Corollary \ref{cor:asym_for_h} follows \emph{mutatis mutandis} if we let \begin{equation*} a(\alpha, \beta; n) := 2 \pi \bigg( M^+(\alpha, \beta; n) + E^+(\alpha, \beta; n) \bigg), \end{equation*} where we let \begin{equation*} M^+(\alpha, \beta; n) := \dfrac{A_2(\alpha, \beta, 0; n) a(\beta, \alpha; 0)}{2^{\frac{\alpha + \beta}{2}}} L^*(0, 0, 2; n) \end{equation*} and \begin{align*} E^+(\alpha, \beta; n) := 2 \pi \left(\sum_{j = 0}^{\mathlarger{\lfloor} \frac{\alpha+2\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=4\\k \equiv 0 \Mod{2}}}^\infty f_A(\alpha, \beta, j, k; n) + \sum_{j = 0} ^{\mathlarger{\lfloor} \frac{2\alpha+\beta}{24} \mathlarger{\rfloor}} \sum_{\substack{k=1\\k \equiv 1 \Mod{2}}}^\infty f_B(\alpha, \beta, j, k; n) \right). \end{align*} Finally, we observe that $a(0, \beta; 2 n) = a(\beta, 0, n),$ and so making the necessary substitutions for the case $\alpha < 0$ yields the case $\alpha = 0.$ \end{proof} We are now in a position to prove Theorem \ref{thm:main_result}, our exact formulas for $\chi(\mathrm{Hilb}^n(S))$ and $\sigma(\mathrm{Hilb}^n(S))$, and Corollary \ref{cor:asymptotics}, our asymptotic formulas for $\chi(\mathrm{Hilb}^n(S))$, $\sigma(\mathrm{Hilb}^n(S))$, $b^*(r,2;n)$ and $c^*(r_1,r_2;n)$. At this point, the work is a simple application of Theorem \ref{thm:exactFormulasFor_H} and Corollary \ref{cor:asym_for_h}. \begin{proof}[Proof of Theorem \ref{thm:main_result}] The proof follows from Lemma \ref{lem:gottsche_prod} and Theorem \ref{thm:exactFormulasFor_H}. We note only that in the derivation of (\ref{eq:Euler_char_exact_formula}) the sum over odd $k$ is actually a sum over even $j$, since $a(0,-\chi(S);j) =0$ for odd $j$. Noting this and replacing $j$ with $2j$, we obtain (\ref{eq:Euler_char_exact_formula}). \end{proof} \begin{proof}[Proof of Corollary \ref{cor:asymptotics}] This follows from Corollary \ref{cor:asym_for_h} and (\ref{sp2}) and (\ref{sp3}) in Lemma \ref{lem:gottsche_prod}. \end{proof} \begin{proof}[Proof of Corollary \ref{cor:equidistribution}] The coefficients of our functions $Z_S(x, y;\tau)$, where $x,y = \pm1$, are of the form $a(\alpha,\beta;n)$ for some $\alpha$ and $\beta$ determined by (\ref{eq:minus_expression}) and Lemma \ref{lem:gottsche_prod}. For convenience we define $$a_S(x, y;n):= a(\alpha,\beta;n).$$ By Corollary \ref{cor:asym_for_h}, each of these coefficient sequences is asymptotic to a function of the form $c_1n^{c_2}\exp(\sqrt{Gn})$, where $c_1$, $c_2$, and $G$ only depend $x$, $y$, and $S$. We will let $G_S(x ,y)$ denote this value $G$. Note that $G_S(x,y)$ essentially determines the growth of the sequence $a_S(x,y;n)$ in the sense that if $G_S(x_1,y_1)<G_S(x_2,y_2)$, then $a_S(x_1, y_1;n) = o(a_S(x_2,y_2;n))$. The proof of (1) now follows easily from Corollary \ref{cor:asym_for_h}, (\ref{sp2}), (\ref{sp3}), and (\ref{eq:minus_expression}). As a reminder, (\ref{eq:B_sum}) tells us $$ B_S(r,2;\tau)= \frac{1}{2}\left( Z(1,1;\tau) + (-1)^r Z(1,-1;\tau)\right) . $$ One makes use of Corollary \ref{cor:asym_for_h} to check that $G_S,(1,1)>G_S(1,-1)$ if and only if $\sigma(S) + \chi(S)>0$ and $G_S,(1,1)<G_S(1,-1)$ if and only if $\sigma(S) + \chi(S)<0$. Note that $G_S(1,1)=G_S(1,-1)$ whenever $\chi(S) = - \sigma(S)$, and in this case $Z_S(1,1;\tau)=Z_S(1,-1;\tau)$, so that $b^*_S(1;n)=0$ for all $n$. Also, if $\chi(S) \leq 0$, $(\chi(S) ,\sigma(S)) \neq (0,0)$, we have from Theorem 15.1 in \cite{HMF} that $a_S(1,1;n) = o(a_S(1,-1;n))$. Since this requires $\sigma(S) + \chi(S)\leq 0$, we can remove the hypothesis that $\chi(S)> 0$. To prove (2), we first recall that (\ref{eq:now}) gives $$C_S(r_1, r_2;\tau) = \frac{1}{4} \sum_{\substack{ j_1 \Mod{2} \\ j_2\Mod{2}}} (-1)^{j_2r_2} (-1)^{j_1r_1} Z_S((-1)^{j_2}, (-1)^{j_1};\tau).$$ We note that by (\ref{eq:minus_expression}), the hypotheses of Corollary \ref{cor:asym_for_h} are always satisfied for $Z(-1,-1;\tau)$, since $$4h^{1,0} - (\chi(S) -8h^{1,0})= -(2h^{0,0} + 2h^{2,0} + h^{1,0})\leq0$$ for all $S$. Note also that for $\chi(S) \geq 0$, we have $$G_S(-1,-1) - G_S(1,1) = \frac{2\chi(S) + 12h^{1,0}}{3} - \frac{2\chi(S)}{3} = 4h^{1,0} \geq 0.$$ If $h^{1,0}=0$, we have $Z_S(1,1;\tau)=Z_S(-1,-1;\tau)$. If $\chi(S) \leq 0$, we have $a_S(1,1;n) = o(a_S(-1,-1;n))$ by Theorem 15.1 in \cite{HMF}. Since $\chi(S)\leq 0$ requires $h^{1,0}>0$, we have $$a_S(1,1;n) + (-1)^{r_1+r_2}a_S(-1,-1;n) \sim K a_S(-1,-1;n), $$ where $$ K : = \bcas \hspace{2.9mm} 2 & h^{1,0} = 0 \text{ and } r_1 + r_2 \equiv 0 \mod 2 \\ \hspace{2.9mm} 0 & h^{1,0}=0 \text{ and } r_1 + r_2 \equiv 1 \mod 2 \\ \hspace{3.1mm} 1 & h^{1,0} > 0 \text{ and } r_1 + r_2 \equiv 0 \mod 2 \\ -1 & h^{1,0} > 0 \text{ and } r_1 + r_2 \equiv 1 \mod 2. \\ \ecas $$ We now see that if $G_S(-1,-1)> G_S(1,-1) $, then $c^*_S(r_1,r_2;n) \sim (K/4)a_S(-1,-1;n)$, which gives the desired result. To conclude the proof, one simply checks that this inequality holds for both $\sigma(S) \geq 0$ and $\sigma(S)<0$. \end{proof} \section{Examples}\label{sec:numerics} Here we illustrate Theorem \ref{thm:main_result} and Corollaries \ref{cor:asymptotics} and \ref{cor:equidistribution} with examples of numerical computations. \begin{example} \emph{ To demonstrate Theorem \ref{thm:main_result}, we focus on $S$, a 2-dimensional torus blown up at one point, a Hirzebruch surface $\Sigma_0 \cong \mathbb{P}^1 \x \mathbb{P}^1$, $\mathbb{P}^2$. We have $\chi(S) =1,$ $\chi(\mathbb{P}^2) = 3,$ $\sigma(\mathbb{P}^2)=1, $ $\chi(\Sigma_0)= 4,$ and $\sigma(\Sigma_0) =0,$ so that we can consider the functions} \begin{align*} \sum_{n=0}^\infty \chi(\mathrm{Hilb}^n(S))q^n = & H_{-1, 0}(q) = 1 + q + 2q^2 + 3q^3 + 5q^4 + 7q^5 + 11q^6 + \cdots \\\sum_{n=0}^\infty(-1)^n\sigma(\mathrm{Hilb}^n(\Sigma_0))q^n = & H_{0,-2}(q) = 1 + 0q+ 2q^2 +0q^3+ 5q^4 + 0q^5+ 10q^6 + \cdots \\ \sum_{n=0}^\infty(-1)^n\sigma(\mathrm{Hilb}^n(\mathbb{P}^2))q^n = & H_{1,-2}(q) = 1 - q + q^2 - 2q^3 + 3q^4 - 4q^5 + 5q^6 + \cdots . \end{align*} \emph{ Table \ref{table_0} lists $a_2(-1, 0;n) $, $a_2(0,-2;n) $, and $a_2(1,-2;n) $ for small values of $n$, where $a_N(\alpha,\beta;n)$ is the approximation obtained from Theorem \ref{thm:main_result} by summing over $1 \leq k \leq N$. The rows correspond to the series above in order.} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline $n$ & $1$ &$2$ & $3$ & $4$ & $5$ &$6$ \\\hline $a_2({-1, 0};n)$ & $1.0029...$ & $2.0808...$ & $2.9340...$ & $5.0296...$ & $7.0278...$ & $10.9325...$ \\\hline $a_2({0,-2};n)$ & $0 $ & $2.1281...$ & $0$ & $4.8883...$ & $0$ & $10.1650...$ \\\hline $a_2({1,-2};n)$ & $-0.8747...$ & $1.3314...$ & $-1.9544...$ & $2.7902...$ & $-3.8958...$ & $5.3410...$ \\\hline \end{tabular} \end{center} \caption{Approximate values in Theorem \ref{thm:main_result}, $N=2$} \label{table_0} \end{table} \emph{As Corollary \ref{cor:asymptotics} indicates, the quality of these approximations improves as $n\rightarrow \infty$. Moreover, choosing larger values of $N$ gives better approximations. The table below gives approximations when $N=75$. } \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline $n$ & $1$ &$2$ & $3$ & $4$ & $5$ &$6$ \\\hline $a_{75}({-1, 0};n)$ & $0.9999..$ & $2.0005...$ & $2.9999...$ & $4.9999...$ & $6.9999...$ & $10.9999...$ \\\hline $a_{75}({0,-2};n)$ & $0.0001... $ & $1.9999...$ & $-0.0002...$ & $5.0001...$ & $-0.0000...$ & $9.9999...$ \\\hline $a_{75}({1,-2};n)$ & $-1.0004...$ & $1.0003...$ & $-2.0000...$ & $3.0005...$ & $-3.9994...$ & $5.0003...$ \\\hline \end{tabular} \end{center} \caption{Approximate values in Theorem \ref{thm:main_result}, $N=75$} \label{table_1} \end{table} \end{example} \begin{example} \emph{For an illustration of Corollary \ref{cor:equidistribution}, let $S'$ be $C_2 \x \bP^1$ blown up at two points, where $C_2$ is a curve of genus $2$. In Tables \ref{table_4}, and \ref{table_5} we take } $$\Theta^r_S(n): = \frac{b^*(r,2;n)}{\sum_{r \Mod{2}} |b^*(r,2;n)|} \qquad \text{\emph{and}} \qquad \Theta^{r_1,r_2}_S(n): = \frac{c^*(r_1,r_2;n)}{\sum_{\substack{ r_1 \Mod{2} \\ r_2 \Mod{2}}} |c^*(r_1,r_2;n)|}. $$ \emph{Corollary \ref{cor:equidistribution} (1) states that $\Theta^0_{S'}(n) \to 1/2$ and $\Theta^0_{S'}(n) \to 1/2$ as $n \to \infty$, which is illustrated by Table \ref{table_4}. Corollary \ref{cor:equidistribution} (2) states that $\Theta^{0,0}_{S'}(n),\Theta^{1,1}_{S'}(n) \to 1/4$ and $\Theta^{0,1}_{S'}(n),\Theta^{1,0}_{S'}(n) \to -1/4$, which is illustrated by Table \ref{table_5}.} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|}\hline $n$&$5$ & $10$ &$15$ & $20$ &$25$ \\\hline $\Theta^0_{S'}(n)$ & $ 0.5714...$ & $ 0.5054... $ & $ 0.4977... $ & $ 0.4993... $ & $ 0.5000... $\\\hline $\Theta^1_{S'}(n)$& $ -0.4285... $ & $ -0.4946... $ & $ -0.5023... $ & $ -0.5006... $ & $ -0.5000... $ \\\hline \end{tabular} \end{center} \caption{Comparative asymptotic properties of $b^*_{S'}(r,2;n)$ } \label{table_4} \end{table} \begin{table}[h] \begin{center} \begin{tabular}{|c|c|c|c|c|c|}\hline $n$&$5$ & $10$ &$15$ & $20$ &$25$ \\\hline $\Theta^{0,0}_{S'}(n)$ & $ 0.2505... $ & $0.2500... $ & $0.2500... $ & $0.2500... $ &$0.2500... $ \\\hline $\Theta^{0,1}_{S'}(n)$& $-0.2499... $ & $ -0.2499... $ & $ -0.2500... $ & $ -0.2500... $ & $ -0.2500... $ \\\hline $\Theta^{1,0}_{S'}(n)$& $-0.2499... $ & $ -0.2499... $ & $ -0.2500... $ & $ -0.2500... $ & $ -0.2500... $ \\\hline $\Theta^{1,1}_{S'}(n)$& $0.2495... $ & $ 0.2499... $ & $ 0.2499... $ & $ 0.2499... $ & $ 0.2499... $ \\\hline \end{tabular} \end{center} \caption{Comparative asymptotic properties of $c^*_{S'}(r_1,r_2;n)$ } \label{table_5} \end{table} \end{example} \section*{Acknowledgements} The authors wish to thank Ken Ono, John Duncan, and Larry Rolen for their magnificent support and guidance. They would also like to thank Gabor Szekelyhidi for helpful communication on the topic of complex surfaces. They also thank Emory University, Wesleyan University's Marc N. Casper fund, the University of Notre Dame, the Asa Griggs Candler Fund, and NSF grant DMS-1557960. \bibliographystyle{acm}
\section{Introduction} The transport equations for dissipative relativistic mixtures are not completely understood. In particular, the precise form of the relations between thermodynamic forces and fluxes has been a subject of debate for decades. Purely relativistic features of high temperature fluids in non-equilibrium states were first identified in the pioneering work by C. Eckart \cite{eckart1940thermodynamics} and later discussed in the classical textbook written by L. Landau and E.M. Lifshitz \cite{Landau}. Moreover, relativistic kinetic theory have provided insight to the microscopic foundations of the transport equations, allowing to the identification of open problems \cite{Israel,struchtrup,cercignani2002relativistic,garcia2012microscopic}. Once the generic instabilities of relativistic simple fluids were phenomenologically identified by Hiscock and Lindlom back in 1985 \cite{Hiscock}, the corresponding analysis of the physics behind them became a subject of study by several authors \cite{cercignani2002relativistic, PeterVan, Koide, Smerlak, SandovalVillalbazoPhisicaA}. The stability properties of relativistic fluids are also a subject of debate. Although first order in the gradients theories have been improved through the use of kinetic theory \cite{SandovalVillalbazoPhisicaA} other issues regarding stability and causality had motivated the use of second order theories and generalized formalisms in order to establish proper sets of transport equations \cite{muller, israelextended,stewart,Tsumura}. In this context, the use of the Chapman-Enskog treatment of the relativistic Boltzmann equation became a particularly useful tool in order to examine the effect of the constitutive equations on the stability of linear fluctuations in Eckart's frame \cite{GARCIAPInest}. The establishment of the stress tensor in non-relativistic kinetic theory involves the decomposition of the velocity field of single particles in terms of the hydrodynamic velocity and a ``peculiar" or ``chaotic" velocity measured in a system comoving with the center mass of the fluid. This type of decomposition is also valid for the case of multicomponent systems, and eventually leads to the expressions for diffusive fluxes, heat flows and viscous dissipation. One possible approach for the analysis of relativistic multicomponent systems is based on the use of a similar decomposition that is equivalent to the Lorentz transformation The purpose of this paper is to show that the structure of the energy-momentum tensor for a multicomponent relativistic fluid, as established from kinetic theory, critically depends on the operational definition of the center of mass velocity of the system. The usual expression of the energy-momentum tensor in Eckart's frame, which includes the heat flux, is obtained by means of a ``non-thermal" definition of the center of mass velocity. In contrast, in the Landau-Lifshitz approach the heat flux is not contained in the energy-momentum tensor and new dissipative effects appear in the diffusive fluxes established through the corresponding center of mass velocity definition, which now includes thermal energy. This paper is divided as follows: in section two we review the non-relativistic establishment of the stress tensor for a multicomponent fluid emphasizing how the definition of the center of mass velocity is motivated by the requirement that the cross-terms present in the stress tensor vanish. In section three it is shown that the presence of the cross-terms in Eckart's frame is directly related to the heat flux, while in Landau's frame the heat flux will not be present in the energy-momentum tensor if the center of mass velocity is suitable defined. Final remarks concerning the analysis of the physical features of both approaches, and its relation with the generic instabilities of multicomponent relativistic fluids are included in the last section of this work. \section{The stress tensor in the non-relativistic regime} The non-relativistic Boltzmann equation for multicomponent systems in the absence of external forces is given by \begin{equation} \color{black} \frac{\partial f_{(i)}}{\partial t}+\vec{v}_{(i)}\cdot\frac{\partial f_{(i)}}{\partial\vec{r}_{(i)}}= \sum_{j=1}^{{k}} \mathsf{J}(f_{(i)}f_{(j)}) ,\quad i=1,2,\ldots,k. \label{eq:4-Bolt2} \end{equation} where $\vec{v}_{(i)}$ is the velocity vector, $\vec{r}_{(i)}$ the position of the particle, $f_{(i)}$ is the distribution function for the $i-th$ species and $\mathsf{J}(f_{(j)}f_{(i)})$ is the collision kernel \cite{Chapman1970}. The balance equations for particles and linear momentum are obtained multiplying Eq. (\ref{eq:4-Bolt2}) by the collision invariants $\psi_{(i)}= [m_{(i)},m_{(i)} \vec{v}_{(i)}]$ respectively, and integrating with respect to the velocity fields. For the particle balance we use the collision invariant $m_{(i)}$ to get, \begin{equation} \frac{\partial}{\partial t}\left(m_{(i)} \int f_{(i)}d\vec{v}_{(i)}\right)+\nabla\cdot\left(m_{(i)} \int \vec{v}_{(i)}f_{(i)}d\vec{v}_{(i)}\right)=0. \label{eq:4-balanceparticulas} \end{equation} At this point, we introduce the definition of statistical average of a dynamical variable $\psi_{(i)}$. In the non-relativistic case, this quantity is simply given by \begin{equation} \left\langle \psi_{\left(i\right)}\right\rangle =\frac{1}{n_{(i)}}\int\psi_{\left(i\right)}f_{\left(i\right)}d\vec{v}_{\left(i\right)}, \label{eq:4-promnr} \end{equation} In the absence of dissipation (Euler regime), the Maxwellian distribution function is used for the calculation of the statistical averages, namely \begin{equation} f_{(i)}=f_{(i)}^{(0)}=n_{(i)} \left(\frac{m_{(i)}}{2\pi k_B T}\right)^{3/2} \exp\left[{-\frac{m_{(i)}\left(\vec{v}_{(i)}-\vec{u}\right)^2}{2k_B T}}\right]. \label{eq:Maxwell} \end{equation} where $k_B$ is the Boltzmann constant and $T$ is the local temperature. Notice that $n_{(i)}$ is the particle number density of the $i-th$ species and that it is given by \begin{equation} n_{(i)}=\int f^{(0)}_{(i)} d\vec{v}_{(i)}. \end{equation} The relation between the molecular velocity $\vec{v}_{(i)}$, the chaotic velocity $\vec{C}_{(i)}$ of a single particle and the center of mass velocity $\vec{u}$ for the mixture is given by the Galilean transformation \begin{equation} \vec{v}_{\left(i\right)}=\vec{C}_{\left(i\right)}+\vec{u}. \label{eq:4-vel} \end{equation} Eq. (\ref{eq:4-vel}) is expressed in terms of the chaotic velocity of the $i-th$ species and the center of mass velocity $\vec{u}$ of the fluid, \textit{which has not been defined yet}. Here, the hydrodynamic velocity for each species is given by: \begin{equation} \vec{u}_{(i)}=\langle\vec{v}_{(i)}\rangle=\frac{1}{n_{(i)}}\int \vec{v}_{(i)} f_{(i)}d\vec{v}_{(i)}, \label{eq:4-vel2} \end{equation} Following the standard procedure, we use Eqs. (\ref{eq:4-vel}) and (\ref{eq:4-vel2}) so that the particle balance equation (\ref{eq:4-balanceparticulas}) can be rewritten as: \begin{equation} \frac{\partial}{\partial t}\left( m_{(i)}n_{(i)}\right)+\nabla\cdot\left( m_{(i)} n_{(i)} \left\langle\vec{C}_{\left(i\right)} \right\rangle +m_{(i)} n_{(i)} \vec{u} \right)=0, \label{eq:4cont} \end{equation} From Eq. (\ref{eq:4cont}) it is direct to identify the diffusive flux for species $i$ as: \begin{equation}\vec{\mathcal{J}}_{(i)}= m_{(i)} n_{(i)} \left\langle\vec{C}_{\left(i\right)} \right\rangle, \label{eq:difusivo} \end{equation} so that the continuity equation can also be expressed as: \begin{equation} \frac{\partial}{\partial t}\left( m_{(i)}n_{(i)}\right)+\nabla\cdot\left( m_{(i)} n_{(i)} \vec{u} \right)=-\nabla \cdot\vec{\mathcal{J}}_{(i)} \label{eq:4bcont} \end{equation} In order to obtain the particle balance equation for the whole mixture, we perform a summation of Eq. (\ref{eq:4bcont}) over all species obtaining: \begin{equation}\frac{\partial}{\partial t}\left(\sum_{i=1}^k n_{(i)}m_{(i)}\right)+\nabla\cdot\left[\sum_{i=1}^k\left(n_{(i)}m_{(i)}\right)\vec{u}\right]=- \sum_{i=1}^k \nabla\cdot\vec{\mathcal{J}}_{(i)}, \label{eq:dif2} \end{equation} The procedure mentioned above, applied to the collision invariant $m_{(i)} \vec{v}_{(i)}$ leads to the equation of motion: \begin{equation} \frac{\partial}{\partial t}\left(m_{(i)} \int \vec{v}_{\left(i\right)}f_{\left(i\right)}d\vec{v}_{\left(i\right)}\right)+\nabla\cdot\left(m_{\left(i\right)} \int \vec{v}_{\left(i\right)}\vec{v}_{\left(i\right)}f_{\left(i\right)}d\vec{v}_{\left(i\right)}\right)=0.\label{eq:4-cons} \end{equation} Using the average notation (\ref{eq:4-promnr}) and summing over all species we can rewrite Eq. (\ref{eq:4-cons}) as: \begin{equation} \frac{\partial}{\partial t}\left[\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{v}_{\left(i\right)}\right\rangle \right]+\nabla\cdot\left[\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{v}_{\left(i\right)}\vec{v}_{\left(i\right)}\right\rangle \right]=0 \label{eq:4-grad} \end{equation} This equation can be expressed in terms of the chaotic velocities $\vec{C}_{\left(i\right)}$ leading to \begin{align} \frac{\partial}{\partial t}\left[\vec{u}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\right)+\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{C}_{\left(i\right)}\right\rangle \right] +\nabla\cdot\left[ \sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{C}_{\left(i\right)}\vec{C}_{\left(i\right)}\right\rangle \right. \nonumber\\ \left.+2\vec{u}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{C}_{\left(i\right)}\right\rangle \right)+ \vec{u}\vec{u}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\right) \right]& =0. \label{eq:4-gradd} \end{align} The terms of the type $\vec{C}_{\left(i\right)}\vec{u}$ present in Eq. (\ref{eq:4-gradd}) only vanish with a suitable definition of the center of mass velocity $\vec{u}$. Indeed, the requirement \begin{equation} \sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{C}_{\left(i\right)}\right\rangle=0, \label{eq:4-sumac} \end{equation} can be expressed, using Eq. (\ref{eq:4-vel}) as \begin{equation} \sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\vec{u}_{\left(i\right)}-\vec{u}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\right)=0. \label{eq:4-sumau} \end{equation} Solving Eq. (\ref{eq:4-sumau}) for $\vec{u}$, the center of mass velocity is easily identified as: \begin{equation} \vec{u}_{cm}=\frac{\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\vec{u}_{\left(i\right)}}{\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}}. \label{eq:4-barinorel} \end{equation} The definition (\ref{eq:4-barinorel}) simplifies both the balance equations (\ref{eq:dif2}) and (\ref{eq:4-gradd}). Indeed, the right hand side of the mass balance equation (\ref{eq:dif2}) vanishes and defining $\rho=\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}$, Eqs. (\ref{eq:4bcont}) and (\ref{eq:4-gradd}) reduce to \begin{equation} \frac{\partial}{\partial t}\rho+\nabla\cdot\left(\rho\vec{u}\right)=-\sum_{i=1}^{k}\nabla\cdot\vec{\mathcal{J}_{\left(i\right)}}, \end{equation} \begin{equation} \frac{\partial}{\partial t}\left(\rho\vec{u}\right)+\nabla\cdot\left(\overleftrightarrow{T}+\rho\vec{u}\vec{u}\right)=0, \label{eq:4barinore} \end{equation} where $\overleftrightarrow{T}=\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \vec{C}_{\left(i\right)}\vec{C}_{\left(i\right)}\right\rangle $ is the usual stress tensor. In the next section a similar procedure is applied to the special relativistic case. The reader can notice that Eq. (\ref{eq:dif2}) also implies electric charge conservation since \begin{equation} \frac{\partial }{\partial t}\left(\sum_{i=1}^{k}n_{(i)}e_{(i)}\right)+\nabla\cdot\left[\sum_{i=1}^{k}\left(n_{(i)}e_{(i)}\vec{u}\right)\right] =0.\label{eq:char} \end{equation}In Eq. (\ref{eq:char}) $e_{(i)}$ represents the charge corresponding to species $i$, which is also a collision invariant.Two possible generalizations of Eq. (\ref{eq:4-barinorel}) will arise, one will correspond to the particle (Eckart) frame and the other one to the energy (Landau-Lifshitz) frame. \section{The energy-momentum tensor for the relativistic binary mixture} \noindent The Boltzmann equation for a mixture in the relativistic case reads \cite{cercignani2002relativistic, jap, early} which reads: \begin{equation} V_{\left(i\right)}^{\mu}f_{\left(i\right),\mu}=\sum_{j}^ {k} \mathsf{J}\left(f_{\left(j\right)}f_{\left(i\right)}\right),\quad i=1,2,\ldots,k. \label{eq:4-Bolt2-1} \end{equation} where $f_{\left(i\right)}$ is the distribution function for species $i$, $V_{\left(i\right)}^{\mu} $ is the single particle four-velocity given by $V_{(i)}^\mu=\left[\gamma_{(v,i)} v_{(i)}^\ell, c\gamma_{(v,i)}\right]$ and $\mathsf{J}\left(f_{\left(j\right)}f_{\left(i\right)}\right)$ is the collision kernel. The Lorentz factor corresponds to $\gamma_{(v,i)}=1/\sqrt{1-\frac{v_{(i)}^2}{c^2}}$; in this definition $v_{(i)}^\ell $ is the particle three velocity. Greek indices will run form one to four, while latin indices will run from one to three. Eq. (\ref{eq:4-Bolt2-1}) can be generalized in order to include reactions which are relevant in high energy scenarios \cite{early}. Nevertheless, for the purpose of the present work we shall restrict to collisional interactions assuming the absence of particle creation/annihilation processes. \\ In local equilibrium, the relativistic counterpart of Eq. (\ref{eq:Maxwell}) for species $i$ is the well-known J\"uttner function \cite{cercignani2002relativistic}: \begin{equation} f^{(0)}_{[J] (i)}=\frac{n_{(i)}}{4 \pi c^3 z_{(i)} \mathcal{K}_{2}\left(\frac{1}{z_{(i)}}\right)}\exp\left(-\frac{\gamma_{(v,i)}}{z_{(i)}}\right) \label{eq:Juttner} \end{equation} where \begin{equation} n_{(i)}=\int\gamma_{(v,i)}f^{(0)}_{[J](i)}d^{*}V, \label{eq:n} \end{equation} is the particle number density of species $i$, $c$ is the speed of light, $z_{(i)}=\frac{k_{B} T}{m_{(i)} c^2}$ corresponds to the relativistic parameter measuring the ratio between thermal energy and rest mass energy for each species, and $\mathcal{K}_{2}\left(\frac{1}{z_{(i)}}\right)$ is the modified Bessel function of the second kind.\\ The invariant measure $d^{*}V_{\left(i\right)}$ that appears in Eq. (\ref{eq:n}) corresponds to $\gamma_{\left(v,i\right)}^{5}\frac{dv_{\left(i\right)}^{3}}{v_{\left(i\right)}^{\left(4\right)}}$. It is shown in Appendix B of Ref. \cite{garcia2011heat} that $d^{*}V_{\left(i\right)}=4\pi c^{3}\sqrt{\gamma_{\left(v,i\right)}^{2}-1}d\gamma_{\left(v,i\right)}$. This particular form of the invariant measure has been applied in the framework of relativistic thermodynamics by several authors.\\ In order to establish the balance equations, we multiply Eq. (\ref{eq:4-Bolt2-1}) by the collision invariants $\left[m_{(i)},m_{(i)} V_{(i)}^\nu,e_{(i)}\right]$, obtaining upon integration the particle flux: \begin{equation} J_{\left(i\right)}^{\mu }=m_{(i)}\int V_{\left(i\right)}^{\mu} f_{\left(i\right)}d^{*}V_{\left(i\right)}, \label{eq:4b} \end{equation} the energy-momentum tensor: \begin{equation} T_{\left(i\right)}^{\mu\nu}=m_{(i)}\int V_{\left(i\right)}^{\mu}V_{\left(i\right)}^{\nu}f_{\left(i\right)}d^{*}V_{\left(i\right)}, \label{eq:4-tensorere} \end{equation} and the electric current density: \begin{equation} N_{(i)}^\mu=e_{(i)}\int V^\mu_{(i)} f_{(i)}d^*V_{(i)}. \end{equation} The invariant velocity element included in Eqs.(\ref{eq:4b}) and (\ref{eq:4-tensorere}) has been discussed by many authors since the original works by J\"uttner, and a brief calculation leading to its explicit form is included in the appendix of reference \cite{garcia2012microscopic}. The total balance equations are obtained summing over all species, leading to the expressions: \begin{equation} J^{\mu}_{,\mu}=0,\quad T^{\mu\nu}_{,\nu}=0. \label{eq:4-bal} \end{equation} Ordinary derivatives are used in Eqs. (\ref{eq:4-bal}) since no space-time curvature effects are relevant in this case. We now introduce the special relativistic generalization of the Galilean transformation of velocities (\ref{eq:4-vel}): \begin{equation} V_{\left(i\right)}^{\mu}=\mathcal{L}_{\alpha}^{\mu}K_{\left(i\right)}^{\alpha}=\gamma_{(K,i)}U^{\mu}+R_{\alpha}^{\mu}K_{\left(i\right)}^{\alpha} \label{eq:veleck} \end{equation} where $\mathcal{L}_{\alpha}^{\nu}$ is the Lorentz transformation, $K_{\left(i\right)}^{\alpha} $ the chaotic four-velocity of an individual particle in the mixture, $\gamma_{(K,i)}$ is the Lorentz factor associated to the chaotic velocity of an individual particle of a given species, and $R_{\alpha}^{\mu}$ is the product of the Lorentz boost and the spatial projector $h_{\alpha}^{\beta}=\delta_{\alpha}^{\beta}+\frac{1}{c^2} U_{\alpha} U^{\beta}$. Equation (\ref{eq:veleck}) can be established using the fact that $V^\mu$ can be decomposed in terms of a parallel component to the hydrodynamic velocity and another one orthogonal to it. Thus $V^\mu_{(i)}=\gamma_{(v,i)} U^\mu+h^\mu_\nu V^\alpha_{(i)}$. Now introducing the chaotic velocity $K^\alpha_{(i)}$ in the right hand side of this equation one can easily obtain $V^\mu=\gamma_{(v,i)}U^\mu+h^\mu_\lambda L^\lambda_\alpha K^\alpha_{(i)}$, so that $R^\mu_\alpha=h^\mu_\lambda L^\lambda_\alpha$ \cite{garcia2012microscopic}. As it will be seen in the next subsections, the use of Eq. (\ref{eq:veleck}) leads to the special relativistic generalizations of equations (\ref{eq:4cont}) and (\ref{eq:4-gradd}).\\ The velocity included in Eq. (\ref{eq:veleck}) must refer to a flow velocity rather than to a reference system velocity. This concept is rather subtle and has been thoroughly discussed in references \cite{Grmale,V_n_2017}. In our case this quantity will refer to the hydrodynamic flows in the so-called particle and energy frames, which will be discussed for multicomponent mixtures in the following subsections.\\ Notice that the total charge flux for the case of a plasma consisting of particles and antiparticles vanish since \\ \begin{equation} N^{\mu}=\left(\sum_{i=1}^{k}e_{\left(i\right)}n_{\left(i\right)}\right)U^{\mu} +R_{\lambda}^{\mu}\sum_{i=1}^{k}e_{\left(i\right)}\int K_{\left(i\right)}^{\lambda}f_{\left(i\right)}d^{*}K_{\left(i\right)}. \label{eq:27i} \end{equation} The first term corresponds to the local charge density which would vanish due to the presence of particle-antiparticle pairs. The second term would also vanish since each particle-antiparticle terms posses identical statistical properties and equal charges with opposite signs. \subsection{Energy-momentum tensor and center of mass velocity in the Eckart frame} The particle balance equation for multicomponent mixtures is given by \begin{equation} J_{,\mu}^{\mu}=\sum_{i=1}^{k}m_{\left(i\right)}J_{\left(i\right),\mu}^{\mu}=0, \end{equation} where \begin{equation} \sum_{i=1}^{k}m_{\left(i\right)}J_{\left(i\right),\mu}^{\mu}=\sum_{i=1}^{k}m_{\left(i\right)}\int f_{\left(i\right)}V_{\left(i\right)}^{\mu}d^{*}V_{\left(i\right)}. \label{eq:4part} \end{equation} Introducing Eq. (\ref{eq:veleck}) into Eq. (\ref{eq:4part}), and taking into account only the spatial components of the balance equation we immediately obtain \begin{equation} J^{\ell}=\sum_{i=1}^{k}m_{\left(i\right)}\int f_{\left(i\right)}\left(\gamma_{\left(K,i\right)}U^{\ell}+R_{\alpha}^{\ell}K_{\left(i\right)}^{\alpha}\right)d^{*}K_{\left(i\right)}. \label{eq:4npart} \end{equation} We now define the statistical average in Eckart's frame as: \begin{equation} \left\langle \psi_{(i)} \right\rangle_{Eck}=\frac{1}{n_{(i)}}\int \psi_{(i)} f_{(i)} d^* V_{(i)}. \end{equation} The hydrodynamic velocity for species $i$ is given by \begin{equation} U^\ell_{(i)}=\left\langle V^\ell_{(i)}\right\rangle_{Eck}. \end{equation} Eq. (\ref{eq:4npart}) in this notation can be rewritten as: \begin{equation} J^{\ell}=U^{\ell}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\right)+R_{\alpha}^{\ell}\left[\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\alpha}\right\rangle _{Eck}\right]. \label{eq:DifEck} \end{equation} The last term in the right hand side of Eq. (\ref{eq:DifEck}) is the relativistic counterpart of the diffusion fluxes contained in Eq. (\ref{eq:dif2}). In Eckart's frame, these contributions are required to vanish, so that: \begin{equation} \sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\alpha}\right\rangle _{Eck}=0. \label{eq:mk} \end{equation} \noindent Eq. (\ref{eq:mk}), can be rewritten using Eq. (\ref{eq:veleck}), thus obtaining: \begin{equation} -U^{\ell}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \gamma_{\left(v,i\right)}\right\rangle _{Eck}\right)+R_{\mu}^{\ell}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle V_{\left(i\right)}^{\mu}\right\rangle _{Eck}\right)=0, \label{eq:Lan} \end{equation} and the center of mass velocity in the Eckart frame then reads: \begin{equation} U_{\left[Eck\right]}^{\ell}=\frac{R_{\mu}^{\ell}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}U_{\left(i\right)}^{\mu}\right)}{\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle \gamma_{\left(v,i\right)}\right\rangle _{Eck}}=\frac{R_{\mu}^{\ell}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}U_{\left(i\right)}^{\mu}\right)}{\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}} \label{eq:bariRelEck} \end{equation} Eq. (\ref{eq:bariRelEck}) is one possible relativistic analog of Eq. (\ref{eq:4-barinorel}). With this description the particle balance equations posses the same structure as in the non-relativistic formalism; nevertheless, relativistic effects from the heat flux arise in the spatial components of the linear momentum balance equations. The spatial components of the energy-momentum tensor read: \begin{equation} T^{ab}=\sum_{i=1}^{k}m_{\left(i\right)}\int V_{\left(i\right)}^{a}V_{\left(i\right)}^{b}f_{\left(i\right)}d^{*}V_{\left(i\right)} \label{eq:4T} \end{equation} Substituting Eq. (\ref{eq:veleck}) in Eq. (\ref{eq:4T}) the energy-momentum tensor can be re-expressed as: \begin{align} T^{ab} & =U^{a}U^{b}\left(\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}^{2}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right)+R_{\alpha}^{a}R_{\beta}^{b}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\alpha}K_{\left(i\right)}^{\beta}\right\rangle \right)\nonumber \\ & +\frac{U^{a}R_{\beta}^{b}}{c^{2}}\left(c^{2}\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}K_{\left(i\right)}^{\beta}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right)+\frac{U^{b}R_{\alpha}^{a}}{c^{2}}\left(c^{2}\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}K_{\left(i\right)}^{\alpha}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right) \label{eq:4Tensorcomp} \end{align} The use of expression (\ref{eq:mk}) leads, after straightforward algebraic manipulations to the Eckart's form of the spatial components of the energy momentum tensor: \begin{equation} T^{a b}=\tilde{\rho}U^a U^b +\tau^{ab}+\frac{1}{c^2}U^a q^b+\frac{1}{c^2}U^b q^a, \end{equation} where: \begin{equation} \tilde{\rho}=\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}^{2}f^{(0)}_{[J]\left(i\right)}d^{*}K_{\left(i\right)} \end{equation} is the mass-energy density which is defined in the local equilibrium state, \begin{equation} \tau^{ab}=R_{\alpha}^{a}R_{\beta}^{b}\left(\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\alpha}K_{\left(i\right)}^{\beta}\right\rangle \right) \end{equation} is the stress tensor, and \begin{equation} q^{a}=R_{\alpha}^{a}\left(c^{2}\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}K_{\left(i\right)}^{\alpha}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right) \end{equation} is the heat flux. The inertial properties of heat, implied by this last expression have been thoroughly discussed in Ref. \cite{Smerlak}. In order to address the main non-equilibrium properties of the mixture we shall establish the corresponding expression for the entropy production of the system. For the sake of simplicity we will use the model equation first proposed by Marle, using a single collision time, for the treatment in Eckart's frame \cite{cercignani2002relativistic,Marle} and the Anderson and Witting approach to the BGK formalism for the Landau-Lifshitz case \cite{struchtrup,Anderson}.\\ The entropy balance equation for the mixture in Eckart's case is obtained upon multiplication of both sides of Eq. (\ref{eq:4-Bolt2-1}) by $k_B \ln \left(f_{\left(i\right)}\right)$ and integration with respect to the invariant measure $d^* V_{(i)}$. The corresponding result reads \cite{domi2017}: \begin{equation} \frac{\partial S^\nu}{\partial x^\nu}=\sigma \label{eq:46} \end{equation} where $S^\nu$ is the entropy four-flux and $\sigma$ is the entropy production. These quantities are given by \begin{equation} S^\mu=-k_B \sum_{i=1}^{k}\int V_{(i)}^\mu f_{(i)}\ln\left( f_{(i)}\right)d^{*}V_{(i)} \label{eq:entropp} \end{equation} and \begin{equation} \sigma=\frac{k_B}{\tau} \sum_{i=1}^{k}\int \left(f_{(i)}-f^{(0)}_{[J](i)}\right)\ln \left(f_{(i)}\right) d^{*}V_{(i)} \label{eq:entropp1} \end{equation} where $\sum_{j=1}^{k}\mathsf{J}(f_{(i)}f_{(j)})$ is identified with $-\frac{f_{(i)}-f^{(0)}_{[J](i)}}{\tau}$ in Marle's model. The next step in order to obtain the entropy production is to introduce the Chapman-Enskog's hypothesis for the distribution function, that is \begin{equation} f_{(i)}=f_{[J](i)}^{(0)}\left(1+\varphi_{(i)}+\ldots\right) \label{eq:49} \end{equation} where $f^{(0)}_{[J](i)}\varphi_{(i)}$ is a first order in the gradients correction to the local equilibrium distribution function $f_{[J](i)}^{(0)}$. A direct calculation in the Navier-Stokes regime and using the fact that $\ln(1+\varphi_{(i)})\sim \varphi_{(i)}$ yields: \begin{equation} \sigma=\frac{k_B}{\tau}\sum_{i=1}^{k}\int f_{[J](i)}^{(0)}\varphi^2_{(i)}d^{*}V_{(i)}, \label{eq:entroleads} \end{equation} so that $\sigma$ is a positive semidefinite quantity. The explicit form of the entropy production in terms of the thermodynamic forces is obtained through the expression \begin{equation} \sigma^{(1)}\simeq-k_B\sum_{i=1}^{k}\int V^\alpha_{(i)}f^{(0)}_{(i),\alpha}\varphi_{(i)}d^{*}V_{(i)} \end{equation} where \begin{eqnarray} V^\alpha_{(i)}f^{(0)}_{[J](i),\alpha}=&f^{(0)}_{[J](i)}\gamma_{(K,i)}h^\mu_\nu k^\nu_{(i)}\left\{\left(1-\frac{\gamma_{(K,i)}}{\mathcal{G}\left(\frac{1}{z_{(i)}}\right)}\right)\frac{n_{(i),\mu}}{n_{(i)}}+ \left(1-\frac{\gamma_{(K,i)}}{z_{(i)}}-\frac{\gamma_{(K,i)}}{\mathcal{G}\left(\frac{1}{z_{(i)}}\right)}-\frac{\mathcal{G}\left(\frac{1}{z_{(i)}}\right)}{z_{(i)}}\right)\frac{T_{,\mu}}{T}\right\} \label{eq:50}\\ &\left. +\frac{1}{z_{(i)}c^{2}}\left[\gamma_{\left(K,i\right)}R_{\beta}^{\alpha}K_{\alpha\left(i\right)}\frac{h^{\beta\lambda}p_{,\lambda}}{\tilde{\rho}}+R_{\lambda}^{\alpha}R_{\beta}^{\mu}K_{\mu\left(i\right)}K_{\left(i\right)}^{\lambda}U_{\left(i\right),\alpha}^{\beta}\right] \right.\nonumber \end{eqnarray} In Eq. (\ref{eq:50}), $\mathcal{G}\left(\frac{1}{z_{(i)}}\right)$ is the ratio of $\mathcal{K}_{2}\left(\frac{1}{z_{(i)}}\right)$ and $\mathcal{K}_{3}\left(\frac{1}{z_{(i)}}\right)$, where $\mathcal{K}_{n}\left(\frac{1}{z_{(i)}}\right)$ corresponds to the modified Bessel function of the $n$-th kind. The establishment of fluxes requires a careful election of the representation of the thermodynamic forces in order to satisfy Onsager's reciprocity relations. The corresponding analysis for Eckart's frame is discussed elsewhere \cite{jap,moratto} and is beyond the scope of the present work. This subject will be part of a thorough analysis in the near future. \subsection{Energy-momentum tensor and center of mass velocity in the Landau and Lifshitz frame} In order to grasp the role of the heat flux in the Landau-Lifshitz's frame, we start considering Eq. (\ref{eq:Lan}), introducing a slightly different definition of statistical average, namely \begin{equation} \left\langle \psi_{\left(i\right)}^{a}\right\rangle _{\left[\mathcal{LL}\right]}=\frac{1}{n_{(i)}}\int\gamma_{\left(K,i\right)}\psi_{\left(i\right)}^{a}f_{(i)}d^{*}V_{\left(i\right)}, \label{eq:averLL} \end{equation} The introduction of the new notation and using Eq. (\ref{eq:veleck}) in order to rewrite Eq. (\ref{eq:4T}) leads to \begin{align} T^{k\ell} & =U^{k}U^{\ell}\left({\sum_{i=1}^{k}m_{\left(i\right)}\int\gamma_{\left(K,i\right)}^{2}f_{\left(i\right)}d^{*}K_{\left(i\right)}}\right)+R_{\alpha}^{k}R_{\beta}^{\ell}\left({\sum_{i=1}^{k}m_{\left(i\right)}\int K_{\left(i\right)}^{\alpha}K_{\left(i\right)}^{\beta}f_{\left(i\right)}d^{*}K_{\left(i\right)}}\right)\nonumber \\ & +U^{k}R_{\beta}^{\ell}\left({\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\beta}\right\rangle }\right)+U^{\ell}R_{\alpha}^{k}\left({\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\alpha}\right\rangle }\right). \end{align} We now proceed in a similar fashion as in the establishment of Eq. (\ref{eq:4-barinorel}) form Eq. (\ref{eq:4-gradd}). The condition necessary for the cross-terms in the momentum balance to vanish now read: \begin{equation} {\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}\left\langle K_{\left(i\right)}^{\ell}\right\rangle _{\left[\mathcal{LL}\right]}=0.} \label{eq:4-sumchaorel} \end{equation} so that the center of mass velocity in the Landau-Lifshitz frame takes the form \begin{equation} U_{\left[\mathcal{LL}\right]}^{\ell}=\frac{R_{\alpha}^{\ell}\left({\sum_{i=1}^{k}m_{\left(i\right)}n_{\left(i\right)}U_{\left(i\right)}^{\alpha}}\right)}{{\sum_{i=1}^{k}\left(m_{\left(i\right)}\int\gamma_{\left(K,i\right)}^{2}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right)}}. \end{equation} The type of integral present in the denominator of Eq. (\ref{eq:internal}) is well-known and corresponds to the internal energy density of each species \cite{cercignani2002relativistic,garcia2012microscopic}, namely \begin{equation} \varepsilon_{(i)}=m_{(i)}c^2\int \gamma^2_{(K,i)}f^{(0)}_{[J](i)}d^{*}K_{(i)}=n_{(i)} m_{(i)} c^2\left(3z_{(i)}+\frac{\mathcal{K}_{1}\left(\frac{1}{z_{(i)}}\right)}{\mathcal{K}_{2}\left(\frac{1}{z_{(i)}}\right)}\right). \label{eq:internal} \end{equation} On the other hand, new fluxes are present in the particle balance equation, which now reads: \begin{equation} {J^{a}=U_{\left[\mathcal{LL}\right]}^{a}\sum_{i=1}^{k}n_{\left(i\right)}m_{\left(i\right)}+\sum_{i=1}^{k}\mathcal{J}_{\left(i\right)}^{a}}, \end{equation} The sum of the diffusion fluxes \begin{equation} {\mathcal{J}_{\left(i\right)}^{a}}=R_{\alpha}^{a}{\sum_{i=1}^{k}\left(m_{\left(i\right)}\int K_{\left(i\right)}^{\alpha}f_{\left(i\right)}d^{*}K_{\left(i\right)}\right)}. \label{eq:fluxdi} \end{equation} Out of equilibrium, the sum of the diffusion fluxes \textit{does not vanish} in contrast with the non-relativistic case. The specific form of this strictly relativistic effects depends on the non-equilibrium distribution function derivable from approximate solutions of the Boltzmann equation (\ref{eq:4-Bolt2-1}). The reader must notice that Eq. (\ref{eq:fluxdi}) is not in conflict with charge conservation in the case of a system consisting in particle-antiparticle pairs. This can be seen from Eq. (\ref{eq:27i}) which admits opposite signs that lead to the cancellation of the total flux in the presence of symmetry. This is not the case for the mass flux (\ref{eq:fluxdi}) since all masses are non-negative.\\ The entropy production of the multicomponent system in the Landau-Lifshitz frame can be established following the same procedure presented in the previous section. In this case, the Boltzmann equation in the BGK approximation takes the form \cite{struchtrup,Anderson}: \begin{equation} V_{\left(i\right)}^{\mu}f_{\left(i\right),\mu}=-\gamma_{(K,i)}\frac{f_{(i)}-f^{(0)}_{(i)}}{\tau} \label{eq:4-Bolt2-3} \end{equation} Eqs. (\ref{eq:46}), (\ref{eq:entropp}) and (\ref{eq:49}) remain invariant in both frames, but in the Landau-Lifshitz case Eqs. (\ref{eq:entropp1}) and (\ref{eq:entroleads}) become: \begin{equation} \sigma_{[\mathcal{LL}]}=\frac{k_B}{\tau}\sum_{i=1}^{k}\int \gamma_{(K,i)}\left(f_{(i)}-f_{[J](i)}^{(0)}\right)\ln \left(f_{(i)}\right)d^{*}V_{(i)} \end{equation} so that \begin{equation} \sigma_{[\mathcal{LL}]}=\frac{k_B}{\tau}\sum_{i=1}^{k}\int \gamma_{(K,i)} f^{(0)}_{[J](i)}\varphi^2_{(i)}d^{*}V_{(i)} \label{eq:ent} \end{equation} The entropy production given in Eq. (\ref{eq:ent}) is positive semidefinite and can be expressed in terms of the first order in the gradients thermodynamic forces as: \begin{equation} \sigma_{[\mathcal{LL}]}^{(1)}\simeq-k_B\sum_{i=1}^{k}\int \gamma_{(K,i)}V_{(i)}^\alpha f^{(0)}_{(i),\alpha}\varphi_{(i)}d^{*}V_{(i)} \label{eq:62} \end{equation} where $V_{(i)}^\alpha f^{(0)}_{[J](i),\alpha}$ is still given by Eq. (\ref{eq:4-Bolt2-3}). It is important to emphasize that the $\gamma_{(K,i)}$ factor in the integral at the right hand side of Eq. (\ref{eq:62}) leads in the Landau-Lifshitz case to non-vanishing contributions to the entropy production corresponding to the scalar product of the particle flux and its corresponding thermodynamic forces. This feature is not present in Eckart's frame (see Eq. (35) in Appendix B of Ref. \cite{domi2017}). In Table \ref{table:1} we compare both descriptions of relativistic kinetic theory in terms of the aforementioned operational definitions of the center of mass velocity of the relativistic mixture. \section{Final Remarks} The first formulations of relativistic irreversible thermodynamics were firstly proposed by purely phenomenological arguments \cite{eckart1940thermodynamics, Landau}. Pathological features of the early formalism were later identified suggesting the need of extended theories \cite{Jou1996}. On the other hand, a thorough revision of the microscopic foundations of the transport theory of dissipative relativistic fluid has led to stable sets of equations within the Chapman-Enskog method and the use of linear constitutive equations \cite{GARCIAPInest}. It has been shown that the structure of the energy-momentum tensor in the relativistic kinetic theory of multicomponent mixtures depends on the operational definition of the center of mass velocity of the system. We believe that this physical insight of Eckart's and Landau-Lifshitz's frames will be useful for explicit calculations regarding transport properties of relativistic multicomponent systems. Immediate work using the present approach include new studies regarding the relativistic Onsager's reciprocity relations \cite{moratto}, and the analysis of the entropy production for a relativistic multicomponent mixture to first order in the gradients in the Landau-Lifshitz frame. Other interesting future work corresponds to the study of relativistic multicomponent systems in the realm of Kaluza's magnetohydrodynamics \cite{sagaceta2016statistical}, and a thorough revision of the generic instabilities of linear perturbations in the case of relativistic multicomponent systems \cite{cercignani2002relativistic}. On a future paper we will discuss the time-like components of the balance equations in order to establish a complete description of the system. We naturally expect that the methods used in Ref. \cite{SandovalVillalbazoPhisicaA} applied to the corresponding linearized system will show stability properties for the multicomponent system in the energy frame. \begin{table} \begin{tabular}{|c|c|c|} \hline & Eckart & Landau\tabularnewline \hline \hline Statistical Average & $\left\langle \psi_{\left(i\right)}^{a}\right\rangle _{\left[Eck\right]}=\frac{1}{n_{\left(i\right)}}\int\psi_{\left(i\right)}^{a}f_{\left(i\right)}d^{*}K_{\left(i\right)}$ & $\left\langle \psi_{\left(i\right)}^{a}\right\rangle _{\left[\mathcal{LL}\right]}=\frac{1}{n_{\left(i\right)}}\int\gamma_{\left(K,i\right)}\psi_{\left(i\right)}^{a}f_{\left(i\right)}d^{*}K_{\left(i\right)}$\tabularnewline \hline Center of mass velocity & $U^{\ell}=\frac{\mathcal{R}_{\mu}^{\ell}\left({\sum_{i=1}^{k}n_{(i)}m_{(i)}U_{(i)}^{\mu}}\right)}{{\sum_{i=1}^{k}n_{(i)}m_{(i)}}}$ & $U_{[\mathcal{LL}]}^{\ell}=\frac{\mathcal{R}_{\mu}^{\ell}\left({\sum_{i=1}^{k}n_{(i)}m_{(i)}U_{(i)}^{\mu}}\right)}{\frac{1}{c^{2}}\left({\sum_{i=1}^{k}n_{(i)}\varepsilon_{(i)}}\right)}$\tabularnewline \hline Energy-momentum tensor & $T^{ab}=\tilde{\rho}U^{a}U^{b}+\tau^{ab}+\frac{1}{c^{2}}U^{a}q^{b}+\frac{1}{c^{2}}U^{b}q^{a}$ & $T^{ab}=\tilde{\rho}U_{[\mathcal{LL}]}^{a}U_{[\mathcal{LL}]}^{b}+\tau^{ab}$\tabularnewline \hline Particle flux & $ J^{a}=\left({\sum_{i=1}^{k}n_{(i)}m_{(i)}}\right)U^{a} $ & $J^{a}=\left({\sum_{i=1}^{k}n_{(i)}m_{(i)}}\right)U_{[\mathcal{LL}]}^{a}+{\sum_{i=1}^{k}\mathcal{J}_{\left(i\right)}^{a}}$\tabularnewline \hline \end{tabular} \caption{Comparative table for the relativistic kinetic theory of multicomponent mixtures in Eckart's and Landau-Lifshitz's frames.} \label{table:1} \end{table}
\section{Introduction} The term `walking' refers to RG flows described by the beta-function \beq \beta(\lambda)=-y-\lambda^2 \label{eq:RGwalk} \end{equation} with $y>0$ a small fixed parameter. The flow happens from $\lambda\sim -1$ to $\lambda\sim +1$ and slows down a lot when $\lambda\sim 0$, giving rise to an exponentially large hierarchy between the UV and IR scales, of the order $\exp(\pi/\sqrt{y})$. In a recent paper \cite{part1} we reviewed this mechanism of generating hierarchies, and pointed out several examples of physical systems which realize it. One example are 4d and 3d gauge theories, where the walking mechanism is realized, conjecturally, below the lower end of the conformal window. Another example is the $Q$-state Potts model which has a conformal phase at $Q\leqslant Q_c(d)$, and the walking mechanism governs the physics of a weakly first-order transition just above $Q_c$. Abundant evidence, especially in $d=2$ where $Q_c=4$, allows to firmly establish walking in the Potts model. Another goal of \cite{part1} was to highlight the concept of `complex CFTs', an unusual class of conformal field theories which describe fixed points of RG flow \reef{eq:RGwalk} occurring at complex coupling $\lambda=\pm i\sqrt{y}$. These complex CFTs control walking RG flow passing near them, in a way similar to how a UV fixed-point CFT controls the beginning of the RG trajectory arising from it via a relevant perturbation. This second paper of the series will develop further the connection between walking and complex CFTs, by studying in depth the 2d Potts model at $Q>4$. While CFTs describing the conformal phase of the 2d Potts model at $Q\leqslant 4$ have been studied intensely \cite{Nienhuis1987,diFrancesco:1987qf,Jacobsen2012}, as far as we know, our work is the first one discussing the complex CFTs at $Q>4$. We start in section \ref{sec:Q<4} reviewing 2d Potts model results relevant for our purposes. We discuss the spin and cluster formulations of the model, transition to the height representation, and the Coulomb gas construction for the conformal phase at $Q\leqslant 4$. We present the partition function of the model on the torus, and obtain from it the spectrum of low-lying operators. We also speculate about possible implementations of the permutation symmetry with non-integer number of elements. In section \ref{sec:Q>4} we analytically continue the conformal Potts theory in $Q$ to real $Q>4$, which leads to complex conformal theories. In section \ref{PottsCPT} we reconstruct the real $Q>4$ theory at the first-order phase transition by means of conformal perturbation theory around the complex CFT. We present several one- and two-loop consistency checks, and in particular compute drifting scaling dimensions -- a characteristic feature of two-point functions in theories exhibiting walking RG behavior. Several technical points are relegated to the appendices. Appendix \ref{sec:Kondev} presents our version of the argument which relates the Coulomb gas coupling constant to $Q$. Appendix \ref{app:mult} reviews some representation theory of the permutation group and discusses a few operators transforming in its higher representations. Appendix \ref{app:orbifold} reviews some basic results in the orbifold construction of the $Q=4$ theory. \section{2d Potts model for $Q\leqslant 4$} \label{sec:Q<4} In this paper we deal with the 2d Potts model with $Q$ states. An elementary introduction to this model was already given in \cite{part1}. Here we will repeat definitions for completeness and provide a few further details. Almost everything we say in this section will be well known to the experts on the 2d Potts model and the related loop models. Still, by our own experience it's not always easy to parse the results scattered throughout the literature, so we will provide a self-contained exposition of the needed facts. One place where our point of view differs from the existing literature is concerning Kondev's argument, see footnote \ref{note:Kondev} and appendix \ref{sec:Kondev}. Consider first the lattice formulation, working on a square lattice for definiteness. For integer $Q$ we have a model of spins $s_i$ living on the lattice sites, which can be in $Q$ states labeled $1,\ldots,Q$, and which have ferromagnetic nearest-neighbor interaction $-\beta \delta_{s_i,s_j}$, preserving $S_Q$ global symmetry. This model can be rewritten in terms of probability distribution of random graphs $X$ living on the same lattice (called the Fortuin-Kasteleyn, or cluster representation). The graphs $X$ include all lattice sites and some of the bonds, and the weight of a given graph is given by $v^{b(X)} Q^{c(X)}$ where $b(X)$ is the number of bonds and $c(X)$ is the number of connected components (clusters). The two definitions give an identical partition function for integer $Q$ if $v=e^\beta-1$. Notably, the second definition also makes sense for non-integer $Q$ and allows to analytically continue the model in $Q$. Here we will consider real $Q>0$. The model has an order-disorder phase transition located at $v=\sqrt{Q}$, which is continuous for $Q\leqslant Q_c=4$. The CFT describing this transition is called the critical Potts model. One can also define the dilute Potts model where certain sites of the lattice are kept vacant. Varying both the fugacity of the vacancies and the temperature, the dilute model has a tricritical point for $Q\leqslant 4$. (It also has a critical point which is the same as for the original Potts model.) The CFTs describing the tricritical and critical Potts model are different for $Q<4$ and coincide for $Q=4$. For integer $Q=2,3,4$ the CFTs describing the tricritical and critical Potts model are unitary and exactly solvable (for $Q=2,3$ these are unitary minimal models, while for $Q=4$ it's an orbifold of compactified free boson, see appendix \ref{app:orbifold}). For non-integer $0<Q<4$ as well as $Q=1$ these CFTs are real (in the sense that all the observables are real, see section 6 of \cite{part1}) but non-unitary. As we will see below, the spectrum of local operators of the tricritical and critical Potts models is exactly known for all $0<Q\le4$. However, not all the OPE coefficients among these operators are exactly known for $Q$ different from 2,3,4. So these CFTs have not been exactly solved.\footnote{See \cite{Picco:2016ilr} and \cite{Jacobsen:2018pti} for recent progress on the $Q=1$ case (percolation) using a numerical conformal bootstrap approach.} \subsection{Lattice transfer matrix and local operators} \label{sec:lat} The cluster definition of the Potts model for non-integer $Q$ being nonlocal, it may seem puzzling how a local CFT may describe its phase transition. This section will clarify the physical meaning of CFT operators in the cluster definition. This discussion is a bit technical, and the reader interested merely in the applications of the Potts model to the subject of complex CFTs, rather than in the physics of the Potts model itself, can skip to Eq.~\reef{eq:Zc} where we begin to present the results for the torus partition function. Recall that in the familiar integer $Q$ case, when we can describe the Potts model in terms of spins, local lattice operators are obtained by fixing the values of a certain number of spin variables at nearby points. A general lattice operator will have the form \beq \delta(s(x_1)=a_1)\cdots \delta(s(x_n)=a_n) \end{equation} where $s(x_1),\ldots,s(x_n)$ are spin variables at nearby lattice points and $a_1,\ldots,a_n$ are fixed values. These operators can be further grouped into irreducible representations (irreps) of $S_Q$ symmetry (see e.g.~\cite{Couvreur:2017inl}). In this case, the correspondence between lattice operators and local CFT operators is as follows. At the critical point we have local CFT operators with well-defined scaling dimension and spin, transforming in an irrep of $S_Q$. Each lattice operator can be expanded into CFT operators. Going in the opposite direction, for each local CFT operator we can find a local lattice operator so that their correlation functions agree at distances large compared to the lattice spacing. Another way to make contact between the lattice and the CFT is to consider the model on the cylinder $S^1\times \bR$, i.e.~with one dimension compactified on a circle of length $L$, and the other thought of as (Euclidean) time. States propagating along the cylinder have energies $(2\pi/L)\Delta_i$, where $\Delta_i$ are scaling dimensions of the CFT operators (up to a constant shift $-c/12$ due to the conformal anomaly). These energies can be measured on the lattice by constructing the transfer matrix and measuring its eigenvalues (see below). Going next to the cluster description applicable also for non-integer $Q$, the simplest nontrivial observable is the probability that two distant points $x$ and $y$ are in the same cluster. This probability is the cluster analogue of the spin-spin correlation function. One can also consider more complicated events, e.g.~probability that two groups of $n$ nearby points $x_1,\ldots, x_n$ and $y_1,\ldots, y_n$ belong pairwise to $n$ different clusters. Such probabilities are cluster analogues of two-point (2pt) functions of operators made of several spins for integer $Q$ (see e.g.~\cite{Delfino:2011sc}). So, roughly, a local operator creates a localized disturbance in the cluster distribution. One type of disturbance is to emit a certain number of clusters. For integer $Q$, these operators correspond in the spin description to operators transforming nontrivially under $S_Q$. On the other hand, disturbances which don't emit clusters correspond to operators which are singlets under $S_Q$. {In local spin models, in particular in the Potts model for integer $Q$, it is standard to extract scaling dimensions of local operators by analyzing eigenvalues of the transfer matrix $T_{\rm spin}$ on a cylinder (i.e.~on a lattice with periodic boundary conditions in one direction). Analogously, dimensions of scaling operators for non-integer $Q$ can be extracted from a transfer matrix $T_{\rm cluster}$ in the cluster representation.\footnote{This formalism goes back to \cite{BLOTE}. Our discussion is based on \cite{Salas2001,Richard2006,Jacobsen:2007vv}. We are grateful to Jesper Jacobsen for explanations.} This $T_{\rm cluster}$ differs from $T_{\rm spin}$ in a few aspects, in particular they act on rather different spaces of states. The familiar $T_{\rm spin}$ acts in the space of spin states in a given time slice $\tau$. On the other hand, $T_{\rm cluster}$ acts in a vector space spanned by \emph{connectivity states}, which refer to two time slices, the initial 0 and the final $\tau$, and are defined as follows. Suppose we already built the partition function on the cylinder from time $0$ up to $\tau$ and we want to add another layer to the lattice $\tau\to\tau+1$. To do this we only need to know how the $2L$ lattice sites $\{1,2,\ldots,L\}$ at time 0 and $\{1',2',\ldots,L'\}$ at time $\tau$ are connected among each other by clusters. A connectivity state is a partition $P$ of these $2L$ sites into groups connected by clusters. For example the situation in Fig.~\ref{fig:state} corresponds to $P=\{\{2\},\{1,1',3\}, \{2',3'\}\}$. The transfer matrix $T_{\rm cluster}$ maps state $P_\tau$ to a linear combination of states $P_{\tau+1}$, and can be constructed using two basic operations: join and detach. The join operation $J_{xy}$ joins two clusters to which $x,y$ belong, while the detach operation $D_x$ detaches point $x$ from its cluster (this process has weight $Q$ if $x$ was already by itself). \begin{figure}[htbp] \centering \includegraphics[width=2.5cm]{state.pdf} \caption{This graph corresponds to the connectivity state described by a partition $P=\{\{2\},\{1,1',3\}, \{2',3'\}\}$.} \label{fig:state} \end{figure} {An important characteristic of a state $P$ is the number of bridges $b$, defined as clusters which connect time $0$ and time $\tau$ ($b=1$ in Fig.~\ref{fig:state}). Clearly, the number of bridges can either remain constant or decrease under the action of $T_{\rm cluster}$, giving this transfer matrix an upper-block-triangular structure \cite{Richard2006}. We are interested in the eigenvalues of $T_{\rm cluster}$, which correspond, in the large $L$ limit, to the dimensions of local operators. To each eigenvalue $\lambda$ we can associate the maximal number of bridges present in the eigenvector, $b_\lambda$. To compute the eigenvalues, we can first diagonalize the blocks $T_b$ of the transfer matrix which leave the number of bridges constant and equal to $b$. The full transfer matrix will then have the same eigenvalues, the part of the eigenvectors with $b'<b$ uniquely reconstructable from the part with $b$ bridges using the block-triangular structure.\footnote{Here we are assuming that eigenvalues are non-degenerate among different blocks $T_b$. Otherwise the full transfer matrix may not be diagonalizable, rather reducible to a Jordan normal form. This more complicated situation corresponds in the continuum limit to logarithmic CFTs. It is realized in the limit $Q\to 1$ describing percolation \cite{Vasseur2012}.} } In this language, the eigenvalues with $b_\lambda=0$ correspond to the `singlet' sector of the theory. For integer $Q$, these eigenvalues correspond to states which are singlets under $S_Q$. From the leading eigenvalue we extract the ground state energy (the central charge), from the subleading ones the dimensions of operators $\varepsilon$ and $\varepsilon'$ which will appear below, etc. On the other hand, the eigenvalues with $b_\lambda>0$ correspond to operators `transforming nontrivially under the symmetry' (borrowing classification from integer $Q$). For example, the spin operator will correspond to the first eigenvalue in the sector with $b_\lambda=1$. Let us discuss briefly how the transfer matrix is used to compute the Potts partition function on a torus, i.e.~with periodic boundary conditions in both directions. At integer $Q$, the partition function is given by \beq Z={\rm Tr}\,(T_{\rm spin})^N\,, \label{eq:Ztr} \end{equation} where $N$ is the time-direction extent of the torus. In terms of transfer matrix eigenvalues $\lambda$ this can be written as \beq Z=\sum_\lambda M_\lambda\, \lambda^N\,, \label{eq:Ztr1} \end{equation} where $M_\lambda$ are integer eigenvalue multiplicities. At integer $Q$ we have $S_Q$ symmetry, and $M_\lambda$'s are dimensions of (possibly reducible) representations of $S_Q$. The analogue of \reef{eq:Ztr} for non-integer $Q$ looks more complicated: \beq Z={\rm Tr}\,[G(T_{\rm cluster})^N]\,, \label{Znonint} \end{equation} where $G$ is a gluing operator which makes the torus out of the cylinder and takes into account that clusters can be reconnected nontrivially during this operation. Thus we can still write \reef{eq:Ztr1}, but now $M_\lambda$'s are products of eigenvalue multiplicities times matrix elements of the gluing operator. In particular, $M_\lambda$ will not in general be an integer nor even positive. The coefficients $M_\lambda$ can be evaluated combinatorially \cite{Richard2007} and are polynomials in $Q$. We will have more to say about them below when we will discuss the partition function in the continuum limit using the Coulomb gas method. Notice that by construction Eq.~\eqref{Znonint} should agree with Eq.~\eqref{eq:Ztr} for integer $Q$, although this is not manifest because the cluster transfer matrix is not obviously related to the spin transfer matrix. In fact for large integer $Q$, Eq.~\eqref{Znonint} provides a more efficient way to evaluate the partition function of the Potts model than Eq.~\eqref{eq:Ztr}, because the Hilbert space dimension is much smaller. Finally, we note that while the above discussion focused on the Potts model, it can be adapted to the diluted Potts model by allowing for vacancies. In particular, it is possible to study operator dimensions of the tricritical Potts model by means of a cluster transfer matrix \cite{FK_vacancies}.} \subsection{Symmetry} \label{sec:sym} What is the symmetry of the Potts model? For integer $Q$, it's $S_Q$, while for non-integer $Q$ it should be some sort of analytic continuation of $S_Q$. As mentioned in \cite{part1}, section 3.3, precise mathematical meaning of this symmetry can likely be given using the language of Deligne's tensor category ${\rm Rep}(S_t)$ \cite{Deligne}. Transfer matrix of the Potts model will be a morphism in this category. Here as in \cite{part1} we will take an intuitive approach to symmetry for non-integer $Q$ -- as something which exists and which will be clarified in future work. For example, we will try to expand partition function multiplicities into dimensions of representations of $S_Q$ analytically continued to non-integer $Q$, although clearly there is no such thing as a vector space of non-integer dimension. Another consequence of the symmetry is that $Q$ doesn't renormalize, even if non-integer. So $Q$ is viewed as a fixed parameter characterizing the theory, not as a coupling constant. This will be important when we study RG flows in perturbed Potts models. Readers bewildered by non-integer $Q$ may adopt the point of view that only integer $Q$ is `physical', while the intermediate $Q$ is just a trick to do the analytic continuation. We don't endorse such a restricted point of view, but it can be a helpful crutch. \subsection{Height representation} \label{sec:height} The cluster representation was applicable to the Potts model in any number of dimensions. Here we will describe the loop and the height representations, which are specific for 2d. These representations are the key to the torus partition function calculation explained in the next section. The loop representation is obtained by drawing loops surrounding clusters on the `medial lattice' whose sites are midpoints of the bonds on the original lattice. Each loop is given weight $\sqrt{Q}$, and at the critical temperature the partition functions of the Potts model and of the loop model coincide (see e.g.~\cite{diFrancesco:1987qf}, Eq.~(4.5)), if one works on a finite lattice with free boundary conditions as in Fig.~\ref{fig:loops}. \begin{figure}[htbp] \centering \includegraphics[width=5cm]{loops.pdf} \caption{Passing from a cluster configuration to an oriented loop configuration (figure from \cite{diFrancesco:1987qf}).} \label{fig:loops} \end{figure} One then further passes from the loop model to a height model (also called solid-on-solid model). This is accomplished by splitting the loop weight into two terms corresponding to two possible loop orientations. Each loop orientation gets a complex weight $e^{\pm 4i u}$ obtained by multiplying factors $e^{\pm i u}$ for each left/right term (the total number of turns counted with sign being 4), and $u$ is chosen so that \beq \sqrt{Q}=2\cos(4u)\,, \label{eq:Qu} \end{equation} summing over the two orientations. One then defines the height function $\phi$ starting from zero boundary condition and changing it by $\pm \phi_0$, where $\phi_0 = \pi/2$ by convention, when crossing any loop, so that larger height is always on the left of the arrow. The resulting height model, for $Q\leqslant 4$, is known to renormalize at long distances to the gaussian fixed point \beq \frac{g}{4\pi} \int d^2x\, (\nabla\phi)^2\,, \label{eq:gauss} \end{equation} where the coupling $g$ is related to $Q$ by \begin{equation} Q=2+2 \cos\frac{\pi g}{2}, \label{eq:Q} \end{equation} the branch $2< g\leqslant 4$ chosen for the considered critical Potts model. This nontrivial result (see \cite{Nienhuis1987} for a review, as well as \cite{diFrancesco:1987qf}, Eq.~(2.19)) is the foundation on which the rest of the construction is built. For the tricritical Potts model the height representation is harder to build and we will not discuss it \cite{Nienhuis-dilute-height}. Once the dust settles, it turns out that the tricritical Potts model also renormalizes to the gaussian fixed point, the only difference being that one has to choose another solution branch of \reef{eq:Q}, namely $4\leqslant g < 6$. In summary, we have \begin{equation} g(Q)=4+\frac{2}{\pi}\cos^{-1}\left(\frac{Q-2}{2}\right)\,. \label{eq:gQ} \end{equation} with $\cos^{-1}$ in the interval $[-\pi,0]$ on the critical and $[0,\pi]$ on the tricritical branches at $Q\leqslant 4$, see Fig.~\ref{fig:coupling}. \begin{figure}[!ht] \centering \includegraphics[width=0.4\textwidth]{coupling.pdf} \caption{Coupling constant as a function of $Q\leqslant 4$ for the critical (lower branch, orange) and tricritical (upper branch, blue) Potts model.} \label{fig:coupling} \end{figure} \begin{figure}[htbp] \centering \includegraphics[width=7cm]{6v-vertices.pdf} \caption{Vertices of the 6-vertex model.} \label{fig:6vertF} \end{figure} It might be surprising that the oriented loop model with complex weights led to the gaussian model \reef{eq:gauss} with real weights. One explanation is that we can map the oriented loop model on the $F$-model, which is a 6-vertex model with positive weights. The mapping consists in putting vertices on the medial lattice, with two arrows pointing inwards and two pointing outwards. The $F$-model vertices are shown in Fig.~\ref{fig:6vertF}, with weights \beq w_1=w_2=w_3=w_4=1,\qquad w_5=w_6=e^{2iu}+e^{-2iu}\,. \end{equation} These assignments are in accord with the fact that vertices 1 to 4 can be uniquely decomposed into two loop strands (and $1=e^{iu}e^{-iu}$), while for vertices 5 and 6 there are two possible decompositions, see Fig.~\ref{fig:6vert}. The height function for the $F$-model is the same as for the oriented loop model, and in the continuum limit the $F$-model renormalizes onto the free scalar boson \reef{eq:gauss}. \begin{figure}[htbp] \centering \includegraphics[height=1cm]{pass1.pdf} \\[5pt] \includegraphics[height=1cm]{pass2.pdf} \caption{Passing from the oriented loop model to the $F$-model.} \label{fig:6vert} \end{figure} In the above discussion we were a bit cavalier about the boundaries. Suppose we are working on a simply connected domain like a rectangle. Along the boundary, we have to use boundary vertices shown in Fig.~\ref{fig:6vertbound}, and decide which weight to assign to them. In the $F$-model, it is natural to give weight 1 to the boundary vertices, which is called free boundary conditions for the 6-vertex model, and corresponds to using the Dirichlet boundary conditions for the corresponding height field. With this assignment, the $F$-model renormalizes onto the free scalar boson \reef{eq:gauss} with the Dirichlet boundary conditions. On the other hand, to reproduce correctly the weight of the oriented loops, boundary vertices in the Potts model should be given weights $e^{\pm i u}$.\footnote{We thank Hubert Saleur for explaining this point to us.} The product of these weights equals \beq e^{i u(C_+-C_-)} \label{eq:boundary} \end{equation} where $C_\pm$ are parts of the perimeter occupied by left/right going loops. To illustrate the importance of this factor, consider the partition function. The $F$-model partition function will reduce in the continuum limit to the partition function of the free scalar boson \reef{eq:gauss} with Dirichlet boundary conditions. The Potts model partition function will be much more nontrivial, since we have to include factor \reef{eq:boundary} into the path integral. \begin{figure}[htbp] \centering \includegraphics[width=3cm]{bdry-vertex.pdf} \caption{Boundary vertices, assigned weight 1 in the $F$-model, and weights $e^{\pm i u}$ in the Potts model.} \label{fig:6vertbound} \end{figure} \subsection{Long cylinder partition function and the Coulomb gas} \label{sec:coulomb} In the next section we will consider the torus partition function, where we won't have to deal with the above complications due to the boundary terms, but there will be other complications due to loops going around the torus. Here we would like to discuss partition function on the cylinder of circumference $L$ and length $T$. Were we to keep the rule that each oriented loop gets a weight obtained by multiplying $e^{\pm i u}$ for every left/right turn, we would get weight 1 instead of $e^{\pm 4iu}$ to loops circling around the cylinder, so that the unoriented loops get weight 2 instead of $\sqrt{Q}$. This discrepancy should be corrected as follows. Let us impose for definiteness the zero boundary condition on $\phi$ at the time 0 boundary of the cylinder. Then, on the lattice, at time $T$, $\phi$ will take a constant value given by $n(\pi/2)$ where $n$ is the number of oriented loops circling around the cylinder (counted with opposite sign for two opposite orientations). Changing the weight of such loops from 1 to $e^{\pm 4iu}$ can thus be accomplished multiplying the partition function with an extra factor \beq e^{ie_0 \phi(T)}\,, \label{eq:e0phi} \end{equation} where $e_0=4u/(\pi/2)$, which gives \beq e_0=2-g/2. \label{e0g} \end{equation} This is usually described as `placing charges $\pm e_0$ at two opposite ends of the cylinder'. The whole construction is known as `Coulomb gas'.\footnote{The resulting formalism is similar to the Dotsenko-Fateev Coulomb gas construction \cite{Dotsenko:1984nm}, although the logic is different, Here the extra charges are forced on us by the physics, while in \cite{Dotsenko:1984nm} one adds extra charges at infinity by hand and studies the structure of the resulting theory.} To evaluate the Potts model partition function on the cylinder, we thus have to combine three ingredients: the $F$-model in the bulk which renormalizes to the free scalar boson, and the factors \reef{eq:boundary} and \reef{eq:e0phi}. For a finite aspect ratio $T/L$ this is a nontrivial task which was accomplished in \cite{Saleur:1988zx,Cardy:2006fg}.\footnote{On the contrary the partition function of the $F$-model on the cylinder is trivial to evaluate: one computes the gaussian path integral as a function of the height difference $\phi(T)$, and sums over $\phi(T)=n(\pi/2)$ \cite{Saleur:1988zx}. Notice that it is legitimate to use the gaussian action \reef{eq:gauss} to compare relative weights of sectors not only for $\phi(T)\gg 1$ but also for $\phi(T)=O(1)$.} However the computation can be performed rather easily in the long cylinder limit $T\gg L$, which is enough to extract the central charge and operator dimensions. In this limit the two boundaries of the cylinder don't talk to each other and so the factor \reef{eq:boundary} just gives some overall rescaling of the partition function. In addition we expect that the typical value of $\phi(T)$ will be large, and so we can treat the boundary condition $\phi(T)$ as a continuous variable rather than quantized. So we are led to evaluating the path integral \beq \int [D\phi]\, e^{-S+ie_0 \phi(T)} \label{eq:cylpathint} \end{equation} with boundary conditions $\phi(0)=0$, $\phi(T)=h=const$ and $S$ as in \reef{eq:gauss}. We split $\phi$ into the classical component $\phi_{\rm cl}$ and the fluctuation $\delta\phi$ satisfying the Dirichlet boundary conditions. We first integrate over $\delta\phi$, and then over $h$, the latter integral being \beq \int dh\, e^{-S_{\rm cl}(h)+ie_0 h},\qquad S_{\rm cl}(h)=\frac{g}{4\pi} (h/T)^2 LT\,. \end{equation} This gives an extra factor $e^{-(\pi e_0^2/g)(T/L)}$ in the partition function, which is interpreted as the reduction of the central charge $c$ from the free scalar boson value $c=1$ to \begin{subequations} \begin{align} c_{\rm Potts}&=1-\frac{6e_0^2}{g}\\ &=1-6\frac{(2-g/2)^2}{g}=13-6\left(\frac{g}{4}+\frac{4}{g}\right)\,. \end{align} \label{cPotts} \end{subequations} Recall that the partition function should scale as $Z\sim e^{(\pi c/6)(T/L)}$ for $T\gg L$. Let us proceed to discuss the operator spectrum. One interesting class of operators are the electric vertex operators $\calV_{\text{e}}=e^{i {\text{e}} \phi}$. The set of allowed electric charges can be determined by the following argument. In the oriented loop model description, if we change orientation of a loop, the height inside will change by $2\phi_0=\pi$. On the other hand in terms of clusters the loop orientation has no observable meaning. This means that any vertex operator playing a role in the Potts model should be invariant under such a change, i.e.~${\text{e}}\in 2\bZ$.\footnote{Another argument which gives the same prediction is as follows. In the large volume limit, the distribution of $\phi$ at any point $x$ will become periodic with period $2\phi_0$ because of succession of many loops surrounding $x$ which can take any orientation. Correlation functions of vertex operators which are not invariant under $\phi\to \phi+2\phi_0$ will thus vanish in the infinite volume limit.} Scaling dimensions of these vertex operators can be predicted by a path integral argument based on \reef{eq:cylpathint}. Namely, we insert an extra factor $e^{i{\text{e}}\phi(T)}$ and compute the partition function on a long cylinder. The change in the free energy compared to ${\text{e}}=0$ gives the scaling dimension: \beq \Delta(\calV_{\text{e}})= \frac{1}{2g}((e_0+{\text{e}})^2-e_0^2)\,. \label{eq:DeltaCoul} \end{equation} \begin{table} \centering \begin{tabular}{lll} \toprule Parameter & Meaning & Relation \\ \midrule $u$ & parameter of the oriented loop model & $\sqrt{Q}=2\cos(4u)$ \\[4pt] $g$ & coupling of the gaussian height model & $Q=2+2 \cos\frac{\pi g}{2}$ \\ & (critical $2< g\leqslant 4$, tricritical $4\leqslant g < 6$) & \\[4pt] $e_0$ & Coulomb gas charge & $e_0=2-g/2$ \\[4pt] $c_{\rm Potts}$ & CFT central charge & Eq.~\reef{cPotts} \\[4pt] $t$ & parameter in Eq.~\reef{eq:Kacdeg} for& $t=\max (g/4,4/g)\geqslant 1$ \\ & Kac-degenerate dimensions & \\[4pt] $m$ & index of the minimal model $\calM_{m}$ & $t=(m+1)/m$ \\ & with the same central charge &\\ \bottomrule \end{tabular} \caption{Main relations between parameters characterizing the $Q$-state Potts model. See section \ref{sec:height} for $u,g$, section \ref{sec:coulomb} for $e_0,c_{\rm Potts}$, and section \ref{sec:ZQ} for $t,m$.}\label{main-rels} \end{table} While Eqs.~(\ref{cPotts}a) and \reef{eq:DeltaCoul} are standard for free scalar boson CFTs with background charge (see e.g.~\cite{DiFrancesco:1997nk}, section 9), we chose for completeness to include their direct derivation starting from \reef{eq:cylpathint} in the above review. It's also very important to emphasize that only some aspects of the Potts model can be understood from the Coulomb gas descriptions. Main relations between parameters characterizing the $Q$-state Potts model are summarized in Table \ref{main-rels}. \subsection{Torus partition function} \label{sec:ZQ} The full partition function ${\mathbf Z}_Q$ of the $Q$-state Potts model on the torus was found in the classic paper \cite{diFrancesco:1987qf}. Let us describe the result and how it was obtained. The basic building block is the partition function of the free boson \reef{eq:gauss} with frustrated boundary conditions around the two cycles of the torus: \beq Z_{m,m'}(g)=\int_{\delta_1\phi=2\pi m,\delta_2\phi =2\pi m'} [D\phi]e^{-S}\,. \end{equation} Summing these over frustration multiples of $f$, one defines the partition function of the compactified boson with compactification radius $f$: \beq Z_c[g,f]=f\sum_{m,m'\in f\bZ} Z_{m,m'}(g)\,. \label{eq:Zc} \end{equation} This quantity has expansion in terms of the usual torus modulus $q=e^{2\pi i\tau}$ and $\bar{q}$: \begin{equation} Z_c[g,f]=\frac{1}{\eta(q) \eta(\bar q)} \sum_{\substack{e\in \bZ/f \\ m\in \bZ f}}q^{x_{em}}\bar{q}^{\bar{x}_{em}}, \label{eq:Zcexp} \end{equation} where $ \eta(q)=q^{\frac{1}{24}}\calP(q)$ is the Dedekind eta function, $\calP(q)=\prod_{N=1}^\infty(1-q^N)$. The weights $x_{em}$, $\bar{x}_{em}$ are labeled by electric and magnetic charges $e$ and $m$: \beq x_{em},\bar{x}_{em}=\frac 14 (e/\sqrt{g}\pm m\sqrt{g})^2, \end{equation} so that the scaling dimension and spin of the corresponding operators are given by: \beq x_{em}+\bar{x}_{em}=\frac{e^2}{2 g}+\frac{g}{2}m^2, \quad x_{em}-\bar{x}_{em}= em\,. \label{eq:dimCG} \end{equation} We also need a modification of the compactified partition function \reef{eq:Zc} given by the following equation: \beq \hat{Z}[g,e_0] = \sum_{M',M\in \bZ} Z_{M'/2,M/2}(g)\cos(\pi e_0 M'\wedge M)\,, \label{eq:hatZ} \end{equation} where $a\wedge b={\rm gcd}(a,b)$ is the greatest common divisor, with $a\wedge 0 = a$ by convention, introduced for the following reason. As for the cylinder case above, the $F$-model (which renormalizes to the free scalar boson) does not correctly reproduce the weights of noncontractible loop. The factor $\cos(\pi e_0 M'\wedge M)$ corrects for this mismatch, analogously to inserting the charges $\pm e_0$ at the ends of the cylinder in section \ref{sec:coulomb}. The so defined $\hat{Z}[g,e_0]$ can be expanded in series in $q$ and $\bar q$ \cite{diFrancesco:1987qf}: \begin{equation} \hat{Z}[g,e_0]=\frac{1}{\eta(q)\eta(\bar q)}\left [\sum_{P\in\bZ}(q\bar{q})^{x_{e_0+2P,0}}+\sum_{\substack{M,N=1\\N\text{ divides }M}}^\infty \Lambda(M,N) \sum_{\substack{P \in \bZ \\ P\wedge N=1}}q^{x_{2P/N,M/2}}\bar{q}^{\bar{x}_{2P/N,M/2}}\right]. \label{eq:zhat} \end{equation} Coefficients $\Lambda(M,N)$ are given by Eq.~(3.24) of \cite{diFrancesco:1987qf}. In general they depend on the factorization of $M$ and $N$ into prime integers. Below we will only need the following two partial cases for $M=1$ or $M>1$ prime: \begin{align} \Lambda(M,1)&=2\left( \frac{\cos(\pi e_0 M)-\cos (\pi e_0)}{M}+\cos\pi e_0\right),\\ \Lambda(M,M)&=2\left( \frac{\cos(\pi e_0 M)-\cos (\pi e_0)}{M}\right) \qquad (M\neq 1) \;. \label{Lambda} \end{align} $\Lambda(M,N)$ are polynomials in $Q$ with rational coefficients, which implies that multiplicities $M_{h,\bar h}$ will also be polynomial in $Q$. In terms of the defined objects, the torus partition function of the Potts model takes the form:\footnote{Notice that one should not confuse electric and magnetic charges $e,m$ of the states in this expression with the Coulomb gas charge of operator $\calV_{\text{e}}$ in \eqref{eq:DeltaCoul}. In particular the constraint $\text{e}\in 2\bZ$, does not apply to $e$.} \begin{equation} {\mathbf Z}_Q=\hat{Z}[g,e_0]+\frac{1}{2}(Q-1)\left( Z_c[g,1]-Z_c[g,1/2]\right). \label{ZQ} \end{equation} Basically, $\hat{Z}[g,e_0]$ provides most of the answer, while the second term corrects a mismatch between the Potts model and the loop model for clusters having the cross topology, see \cite{diFrancesco:1987qf} for details. We recall that $g$ is related to $Q$ by \reef{eq:Q}, choosing $2< g\leqslant 4$ ($4\leqslant g < 6$) for the critical (tricritical) case, and $e_0$ is given by \reef{e0g}. As mentioned, the $Q=2,3$ critical and tricritical Potts theories are unitary minimal models, while $Q=4$ can be described as an orbifold theory, as we review briefly in appendix \ref{app:orbifold}. In all these cases partition function can be computed independently and the result agrees with \reef{ZQ} \cite{diFrancesco:1987qf}. \subsection{Spectrum of primaries for $Q\leqslant 4$} \label{sec:spec} We will now use the torus partition function to discuss the spectrum of primaries of the critical and tricritical Potts model. Recall that the torus partition function of any CFT can be written as \begin{equation} Z=(q \bar q)^{-\frac{c}{24}}\text{Tr}\,q^{L_0}\bar{q}^{\bar{L}_0}, \label{Ztorus} \end{equation} with Hamiltonian $H=L_0+\bar{L}_0-c/12$ and momentum $P=L_0-\bar{L}_0$. Expanding $Z$ in $q$, $\bar q$ one can read off the spectrum of all states present in the theory and their multiplicities: \begin{equation} Z=(q \bar q)^{-\frac{c}{24}}\sum_{h,\bar h\in \text{all}}M_{h\bar h}\,q^h \bar{q}^{\bar h}\,. \label{Ztorus1} \end{equation} Furthermore, the partition function is also expandable into Virasoro characters $\chi_h$ of primaries: \begin{equation} Z(q,\bar q)=(q \bar q)^{-\frac{c}{24}} \sum_{h,\bar h \in \text{primaries}}N_{h\bar h}\,\chi_h(q)\chi_{\bar h}(\bar q)\,, \label{eq:expvir} \end{equation} the sum being over the weights $h$, $\bar h$ of the primaries, with $N_{h,\bar h}$ their multiplicities. On the other hand the sum in \eqref{Ztorus1} is over both primaries and descendants, so that sum contains many more terms, and with different multiplicities. Below we will encounter two types of Virasoro characters. First, for generic $h$ (non-degenerate primary), the character is given by\footnote{We don't include the factor $q^{-c/24}$ into the character.} \begin{equation} \chi_h(q) = q^{h}/\calP(q)\,. \label{eq:chargeneric} \end{equation} Second, there will be cases when $h$ is a Kac degenerate representation $h=h_{r,s}$. For the central charge as in \reef{cPotts} these are given by (see \cite{DiFrancesco:1997nk}, Eq.~(7.31)) \beq h_{r,s}= \frac t4 (r^2-1)+\frac{1}{4t}(s^2-1) +\frac{1-rs}{2}\,,\qquad t=\max(g/4,4/g)\,, \label{eq:Kacdeg} \end{equation} with $r,s$ positive integers.\footnote{The two branches $t=g/4$ and $t=4/g$ are related by interchanging $r$ and $s$. By choosing always $t>1$ we ensure that for $t=(m+1)/m$ the weight numbering will agree with the form \beq h_{r,s}=\frac{[(m+1)r-ms]^2-1}{4m(m+1)}, \label{eq:hrs} \end{equation} conventional in the unitary minimal models. This will be convenient in section \ref{PottsCPT}.}${}^{,}${}\footnote{Notice that not all operators appearing in partition function are Kac-degenerate. In some literature on the Potts model weights of non-degenerate operators are also represented as $h_{r,s}$ with $r,s$ non-integer. This will not be done in our work, where notation $h_{r,s}$ will be used only with $r,s$ integer.} The representation is then degenerate at level $rs$, the null descendant having weight $h_{r,-s}$. Below we will mostly focus on the generic $Q$ case, when this descendant itself is not degenerate.\footnote{On the other hand, in minimal models $\calM_{p,p'}$ we have $h_{r,-s}=h_{p'+r,p-s}$ and so it may be degenerate. The character then takes a more complicated form than \reef{eq:degchar}.} In this case the character of the $h_{r,s}$ primary is given by: \begin{equation} \chi_{h_{r,s}}(q) = (q^{h_{r,s}}-q^{h_{r,-s}})/\calP(q)\,. \label{eq:degchar} \end{equation} A particular case of \reef{eq:degchar} occurs for the unit operator: $h=0=h_{1,1}$, when \begin{equation} \chi_{0}(q) = (1-q)/\calP(q)\,. \label{eq:degchar0} \end{equation} From \reef{ZQ}, \reef{eq:Zcexp}, \reef{eq:zhat} we get expansion \reef{Ztorus1} of the Potts model partition function. Notice, however, that `multiplicities' $M_{h,\bar h}$ are given by polynomials in $Q$, so they are in general not integer, unless $Q$ is integer.\footnote{These multiplicities have also been studied in \cite{Read:2001pz}.} This may sound puzzling since normally multiplicities are integer. To understand the origin of this subtlety, let us go back to the lattice partition function from section \ref{sec:lat}. In the continuum limit, the factors $q^{h}{\bar q}^{\bar h}$ in \reef{Ztorus1} originate from the eigenvalue factors $\lambda^N$ on the lattice in \reef{eq:Ztr1}, while the multiplicities $M_{h,\bar h}$ are the weights $M_\lambda$ in \reef{eq:Ztr1}. As discussed in section \ref{sec:lat} these weights for non-integer $Q$ do not just count the eigenvalues, but involve a matrix element of a gluing operator, which explains why they don't have to be integers nor even positive.\footnote{Note that negativity of some weights is not a direct consequence of the model being non-unitary. For example, while the Lee-Yang model is non-unitary, its torus partition function decomposes into characters with positive integer weights.} Up to the prefactor $1/[\eta(q)\eta(\bar q)]$, the obtained expansion of ${\bf Z}_Q$ consists of terms of the form $q^{x_{em}}{\bar q}^{{\bar x}_{em}}$, times multiplicities. We will introduce notation $\calO_{e,m}$ for the state corresponding to such a term. Its conformal weight is given by \begin{equation} h=x_{em}+\frac{c-1}{24},\qquad \bar h=\bar x_{em}+\frac{c-1}{24}\,. \end{equation} First, we have states with $e=e_0+2 P$ ($P \in \mathbb{Z}$) and $m=0$, coming from the first term in $\hat{Z}[g,e_0]$. Notice that $\calO_{e_0+2P,0}=\calV_{2P}$, the vertex operator of the same dimension introduced in the Coulomb gas description. This identification is not accidental, the Coulomb gas scaling dimension \reef{eq:DeltaCoul} and the term $\propto(q\bar q)^{x_{e_0+2P,0}}$ in ${\bf Z}_Q$ having essentially the same path-integral origin. Second, we have states with $e$ and $m$ both rational numbers, coming from $Z_c[g,f]$ and from the second term in $\hat{Z}[g,e_0]$. We should identify $\calO_{e,m}\equiv \calO_{-e,-m}$ since they have the same conformal weights. These states do not have an obvious Coulomb gas interpretation. In this notation, ${\bf Z}_Q$ takes the form of the sum of nondegenerate characters \reef{eq:chargeneric} of states $\calO_{e,m}$. Does this mean they are all primaries? Not so fast. We have to watch out that some $\calO_{e,m}$ are Kac-degenerate. More work is then needed to reorganize the decomposition in terms of Virasoro characters, during which process some states may drop out from the list of primaries. We also need to check for more banal \emph{spectrum coincidences}, which may lead to total cancellation of multiplicities. To study these degeneracies we write $h$, $\bar h$ as $r_1 g^{-1}+ r_2 g+r_3$ with $r_i$ rational: \beq \label{eq:ration} \begin{gathered \calV_{2P}\equiv\calO_{e_0+2P,0}:\quad h=\bar h = P(P+2)g^{-1}-P/2\,,\\ \calO_{e,m}:\quad h,\bar h=\left(\frac{e^2}4-1\right)g^{-1}+\left (\frac {m^2}4-\frac 1{16}\right)g+\frac 12\pm em/2\,. \end{gathered \end{equation} Apart from $\calO_{e,m}\equiv \calO_{-e,-m}$ mentioned above, there is only one spectrum coincidence which holds for any $Q$: it is between $\calV_{-2}$ and the operators $\calO_{0,\pm 1/2}$. The total multiplicity comes out $-(Q-1)+2\cos\pi e_0+1=0$, so these states do not actually exist.\footnote{We exclude as contrived the possibility that a state exists but does not contribute to the partition function for any $Q$.} The first Kac degeneracy occurs for the operator $\calV_0$. It has dimension 0 and is identified with the unit operator; clearly it is Kac-degenerate. The full unit operator character is (see Eq.~\reef{eq:degchar0}) \beq \chi_0(q)\chi_0(\bar q)=(1-q)(1-\bar q)/[\calP(q)\calP(\bar q)]\,. \end{equation} We have to see how this character emerges from combining various nondegenerate characters. Expanding the numerator, the first term $1/[\calP(q)\calP(\bar q)]$ is precisely the contribution of $\calV_0$. One missing term, $q\bar q/[\calP(q)\calP(\bar q)]$, comes from $\calV_{-4}$, of scaling dimension 2, which as a consequence does not exist as a primary operator.\footnote{\label{note:Kondev}In fact, even more is true. Were we to expand the partition function in powers of $q$, $\bar q$ (including the Dedekind factors), we would see that the theory does not contain \emph{any} scalar of dimension 2, primary or descendant. This is in contradiction with the discussion of Kondev \cite{Kondev:1997dy}, who argued that operator $\calV_{-4}=e^{-i4h}$ must be `exactly marginal', and used this to determine the relation between $Q$ and $g$, instead of borrowing the $F$-model result \reef{eq:Q}. While the calculation behind Kondev's argument is correct, physical interpretation should be changed because as we showed the operator he calls `exactly marginal' does not even exist. We propose a different interpretation in appendix \ref{sec:Kondev}.} The other missing term in the unit operator character is the cross term $(-q-\bar q)/[\calP(q)\calP(\bar q)]$. This comes from the operators $\calO_{e,m}$ with $e=\pm 2$, $m=\pm 1/2$ which have spin 1 and dimension 1 for any $g$. These operators appear in the second term in \reef{eq:zhat} ($M=N=P=1$) as well as in $Z_c[g,1/2]$. Their total coefficient is $2\cos (\pi e_0)-(Q-1)=-1$ as needed. The conclusion is that we reproduce correctly the character of the unit operator, while operators $\calV_{-4}$ and $\calO_{\pm 2,\pm1/2}$ drop out from the spectrum of primaries. We will now carry out similar analysis for a few more prominent low-lying primary operators. We will see more examples of Kac-degenerate states, and degenerate characters arising as sums of non-degenerate ones. We will not, however, attempt to rewrite the full partition function in terms of Virasoro characters. {\bf Singlets} \nopagebreak The operators $\calV_{2P}$ occur in the first term of $\hat Z[g,e_0]$ with multiplicity 1 for any $Q$, and therefore we will refer to them as `singlets'. As discussed above the case $P=0$ corresponds to the unit operator, and $P=-1,-2$ do not exist. The lightest non-unit operators are for $P=1,2$, which we call the energy operator $\varepsilon$ and the subleading energy operator $\varepsilon'$. On the tricritical branch both $\varepsilon$ and $\varepsilon'$ are relevant, while on the critical branch only $\varepsilon$ is relevant. When the two branches meet we have $\Delta_{\varepsilon'}=2$. Comparing \reef{eq:ration} with \reef{eq:Kacdeg}, we see that all $\calV_{2P}$, $P\geqslant 0$, are Kac-degenerate. In fact $h=h_{1,P+1}$ on the tricritical or $h=h_{P+1,1}$ on the critical branch. One can show that just like for the unit operator the terms in ${\mathbf Z}_Q$ recombine nicely to give the degenerate characters $\chi_{h_{r,s}}(q) \chi_{h_{r,s}}(\bar q)$. The scalar term $\propto q^{h_{r,-s}}{\bar q}^{h_{r,-s}}$ comes from $\calV_{2P'}$ with $P'=-P-2$, whose multiplicity is also 1. The spin-1 terms $-q^{h_{r,s}}{\bar q}^{h_{r,-s}}-q^{h_{r,-s}}{\bar q}^{h_{r,s}}$ come from $\calO_{e,m}$ with $e=\pm 2(P+1)$ and $\pm m=1/2$, with precisely the right coefficient. The ability to rewrite the partition function in this form means that the operators $\calV_{2P'}$ and $\calO_{\pm 2(P+1),\pm 1/2}$ do not appear in the spectrum of primaries.\footnote{One might contemplate the possibility that primaries of such dimension actually secretly exist, but their contribution to the torus partition function, as well as to the annulus partition function \cite{Cardy:2006fg}, is exactly zero for all $Q$. Perhaps these may be null descendants of Kac-degenerate primaries, not necessarily identically vanishing in non-unitary theories. We discard such a possibility as unduly contrived.} As mentioned the operators $\calV_{2P}\equiv \calO_{e_0+2P,0}$ should be identified with electric vertex operators $e^{i e \phi}$ with $e=2P$ whose dimension was computed using Coulomb gas method in \reef{eq:DeltaCoul}. The above discussion establishes that for $P\geqslant 0$ these vertex operators are primaries. As far as $\calV_{2P'}$ with negative charge $P'\leqslant -1$, the above discussion is summarized as follows. For $P'=-1$ this operator simply does not exist since multiplicity is exactly zero. For $P'\leqslant -3$ a scalar operator of such dimension exists, but is interpreted as not a primary but as a descendant of the positive charge primary $\calV_{2P}$, $P=-P'-2$, at level $(P+1,P+1)$. The latter reasoning formally applies also for $P'=-2$, but since the unit operator has no descendants at the level $(1,1)$, this means that $\calV_{-4}$ does not exist. This may be a surprise from the point of view of the Coulomb gas construction, but that's what the torus partition function tells us.\footnote{Additional evidence for the absence of these operators can be obtained from the cylinder partition function \cite{Cardy:2006fg}, Eq.~(2). Organizing it in characters, one sees that negative electric charge operators are absent from the list of primaries.} {\bf Vectors} \nopagebreak We will call `vectors' operators of multiplicity $Q-1$, the dimension of the lowest nontrivial representation of $S_Q$. The lowest such operators are $\calO_{e,0}$ with $e=\pm 1,\pm 3$, which come from $Z_c[g,1]$. These are the spin and the subleading spin operators $\sigma$ and $\sigma'$. For generic $Q$ these operators are non-degenerate primaries. {\bf Higher representations} \nopagebreak An interesting light operator is $\calO_{0,1}$, from the $P=0$, $M=2$, $N=1$ term in the second sum of $\hat{Z}[g,e_0]$. Using (\ref{Lambda}), its multiplicity is \begin{equation} \cos \pi e_0+\cos2 \pi e_0=\frac{Q(Q-3)}{2}. \label{mult} \end{equation} This matches the dimension of an $S_Q$ representation given by the Young tableau with two rows with $Q-2$ and 2 boxes in them, which for integer $Q$ exists only for $Q\geq4$. Notice that this multiplicity becomes negative for $Q<3$. Again, for generic $Q$ this operator is a non-degenerate primary. See appendix \ref{app:mult} for operators corresponding to even larger Young tableaux. For any Young tableau $Y$, the corresponding representation exists for all sufficiently large $Q$ and has dimension $D_Y(Q)$ which is a polynomial in $Q$. One can take this polynomial and analytically continue it to $Q\leqslant 4$. In all cases that we checked, multiplicities of operators predicted by \reef{ZQ} are decomposable into sums of $D_Y(Q)$ with coefficients which are positive $Q$-independent integers (appendix \ref{app:mult}).\footnote{Ref.~\cite{diFrancesco:1987qf} contains a tangential remark to the contrary for the analogous case of the $O(n)$ model, which appears to be an error. In any case, this minor discrepancy does not affect any of their other conclusions. We thank Hubert Saleur for a discussion.} It is not fully obvious why this should be the case. Of course for integer $Q$ we have true $S_Q$ symmetry and so the decomposition of multiplicities in dimensions of irreps of $S_Q$ should be possible for each individual $Q$. The nontrivial part is that such a decomposition extends to non-integer $Q$ with $Q$-independent coefficients. This may be related to the fact that the Deligne category mentioned in section \ref{sec:sym} is a semisimple tensor category.\footnote{We are grateful to Damon Binder for very useful discussions concerning this point, which will be elaborated elsewhere.} In the above discussion we focused on generic $Q$. For $Q=2,3,4$ the discussion needs to be modified. First of all the theory has a local spin description, so all multiplicities must be positive integers. In addition, for $Q=2,3$, the theories are minimal models and contain a finite number of primary fields. (On the contrary, for generic $Q$ we have infinitely many primaries.) Various terms in the partition function must then recombine, to either cancel or form characters of degenerate primaries in the minimal models, which are more complicated than \reef{eq:degchar}. Similar complicated cancellations have to happen for an infinite set of $Q$'s which give a rational central charge $c=c_m=1-6/[(m+1)m]$ corresponding to the unitary minimal models, even though the spectrum of the Potts model will have only partial overlap with the corresponding minimal model unless $Q=2,3$ (see section \ref{PottsCPT}). A very simple example of such a cancellations happens for the operator with multiplicity \reef{mult}. For $Q=3$ this operator simply disappears. For $Q=2$, its multiplicity is negative. However, for $Q=2$ this operator is degenerate with the vector operator $\calO_{\pm 3,0}$ along the critical branch and with $\calO_{\pm 5,0}$ for the tricritical branch. The total multiplicity is zero: this operator does not exist for $Q=2$. The spectrum of several light scalar operators and their multiplicities are summarized on Fig.~\ref{fig:dimRe}. \begin{figure}[!ht] \centering \includegraphics[width=0.8\textwidth]{dimre2.pdf} \caption{Dimensions of light scalar operators as functions of $Q$. The $Q\leqslant 4$ region corresponds to the critical (solid) and tricritical (dashed) Potts models. Singlet operators are in green, other multiplicities are marked. $\Delta=2$ is the marginality line. The $(r,s)$ positions in the Kac table are shown for $\varepsilon$, $\varepsilon'$, as well as for $\sigma$ which is degenerate for $Q=2,3$. Notice that $\varepsilon$ and $\varepsilon'$ remain Kac-degenerate with the same integer $(r,s)$ also for non-integer $Q$, while this is not true for the other shown operators. For $Q>4$ we show the real parts of the analytically continued dimensions, see section \ref{sec:Q>4}.} \label{fig:dimRe} \end{figure} \section{Analytic continuation to $Q> 4$} \label{sec:Q>4} The 2d Potts model at criticality is normally discussed only for $Q\leq4$. For $Q>4$, the phase transition is first-order, and one does not expect to find any fixed points. As far as real fixed points are concerned this expectation is correct.\footnote{In \cite{Delfino:2017biz}, some $S_Q$ invariant CFTs with $4<Q\lesssim 5.56$ were predicted to exist using the massless scattering theory method. Their theories are real and presumably can be realized as continuous phase transitions in the antiferromagnetic Potts model. There is no relation to the theories considered here. We thank Gesualdo Delfino for discussions. } However, instead there exists a pair of complex fixed points. In the previous section we saw that critical and tricritical Potts models become identical at $Q=4$. Following the discussion in \cite{part1} it is convenient to visualize these fixed points as CFTs moving in the theory space as the parameter $Q$ is varied, see Fig.~\ref{fig:Annihilation}. The fixed points have the same symmetries and annihilate at $Q=4$. Ref.~\cite{part1} reviewed the abundant evidence from prior work \cite{NienhuisPRL,NauenbergPRL,CNS,Buffenoir} that in the vicinity of this point, the beta-function controlling the RG flow is of the form \eqref{eq:RGwalk} with $y\sim Q-4$, suggesting the existence of two fixed points at couplings $\lambda\sim \pm i\sqrt{Q-4}$. \begin{figure}[!ht] \centering \includegraphics[width=0.5\textwidth]{QPotts.pdf} \caption{Annihilation of critical and tricritical fixed points.} \label{fig:Annihilation} \end{figure} In \cite{part1} we discussed some examples of perturbative complex theories defined by Lagrangians with complex coupling constants. The Potts model is a strongly coupled theory and consequently we don't expect to find any perturbative description. The $Q>4$ complex Potts CFTs can in principle be constructed with the help of lattice models reviewed in section \ref{sec:lat}, either the spin or the cluster one, if one complexifies coupling constants in these models and tunes them to the critical values. To find these fixed points on the lattice, one will need to tune two complex couplings, which can be taken e.g.~the temperature and the vacancy fugacity in the diluted Potts model (see footnote \ref{note:lattice} below). Here we will pursue an alternative method to explore the $Q>4$ CFTs --- by means of analytic continuation from $Q\leqslant 4$. In the previous section we discussed operator dimensions and their multiplicities in the torus partition function, which for $Q\leqslant 4$ are explicit analytic functions of $Q$. It is reasonable to assume that observables in the complex CFTs at $Q>4$ will agree with the analytic continuation of the corresponding observable form $Q\leq4$. In this paper we will only consider analytic continuation in the neighborhood of the real $Q$ axis. We will perform a set of consistency checks that complex CFTs at real $Q>4$ defined by means of such analytic continuation indeed describe the complex fixed points of the Potts model. In the future it would be interesting to explore analytically continued CFTs far away from the real $Q$ axis, and to understand their physical meaning if any. Analytic continuation is easiest for the central charge and the scaling dimensions, since these can be expressed as rational functions of $g$, Eqs.~\reef{cPotts}, \reef{eq:ration}. We will keep these expressions, but we will analytically continue $g(Q)$, given by Eq.~\reef{eq:gQ}, from $Q\leqslant 4$ to $Q>4$. For $Q\to 4^-$ we have $g(Q)\approx 4\pm (2/\pi)\sqrt{4-Q}$. For $Q>4$, $g(Q)$ develops a branch cut singularity, $g(Q)\approx 4\pm i(2/\pi)\sqrt{Q-4}$. The exact expression is \beq g(Q)=4\pm i\frac 2\pi\log\frac{Q-2+\sqrt{Q(Q-4)}}2\,\qquad(Q>4)\,. \label{eq:g(Q)ex} \end{equation} Notice that the real part of $g$ remains constant. We will call $\calC$ the complex CFT corresponding to the $+$ branch, while the other branch is $\overline{\calC}$. Equivalently, we perform analytic continuation from the tricritical branch going around the branch point $Q=4$ from below in the complex $Q$ plane, so that $\sqrt{4-Q}$ for $Q<4$ goes to $ i \sqrt{Q-4}$ for $Q>4$, where both square roots are positive. The choice between analytic continuation from the tricritical and critical branch is arbitrary\footnote{It is somewhat more convenient to continue from the tricritical branch, as it contains the relevant operator $\varepsilon'=\phi_{1,3}$, crucial for our computations below, which drives the RG flow from the tricritical to the critical branch. On the critical branch we have $\varepsilon'=\phi_{3,1}$ which is irrelevant.} --- continuing from the critical branch with the same contour, or from the tricritical branch in the opposite direction, would get $\overline{\calC}$ instead of $\calC$. That is, the real parts of all scaling dimensions would be the same, and the imaginary parts would change signs. This is why there are two CFTs for $Q>4$, one being the complex conjugate of the other. Finally, if one goes around the $Q=4$ point in the complex plane and comes back to real $Q<4$ the tricritical theory becomes the critical one and vice versa. The real parts of analytically continued dimensions of a few low-dimension operators can be read off from the right side of Fig.~\ref{fig:dimRe}. Analogously to the dimensions, the central charge \eqref{cPotts} of the Potts CFT develops an imaginary part for $Q>4$, the central charges of $\overline{\calC}$ and $\calC$ being complex conjugate. We see that the $Q>4$ Potts CFTs contain operators with complex scaling dimensions, and the corresponding conjugate operators are not present in the same theory. In terminology of \cite{part1}, this means that these CFTs are complex, as opposed to real.\footnote{We refer the reader to \cite{part1} for a detailed definition of complex field theories. Here we simply note that the presence of complex scaling dimensions by itself does not yet imply that the theory is complex, in fact there exist real non-unitary CFTs in which operators have complex dimensions, however those operators always come in conjugate pairs.} Moreover there are two complex theories with opposite imaginary parts of all observables, and the size of these imaginary parts is controlled by the parameter $\sqrt{Q-4}$. In such a situation, the real RG flow squeezed between the two complex CFTs exhibits the walking behavior \cite{part1}. % Turning next to the multiplicities of primary operators $M_{h,\bar{h}}$ (see section \ref{sec:spec}), they are polynomials in $Q$ and their analytic continuation is straightforward. In particular, they stay real for any real $Q$. As mentioned, it appears that $M_{h,\bar{h}}$ can be represented as a sum of dimensions of irreducible representations of $S_Q$ analytically continued in $Q$, with $Q$-independent positive integer coefficients. In particular, when we specialize to integer $Q\geqslant 5$, we expect complex Potts CFTs to have a true $S_Q$ symmetry. {For example, there should exist a pair of $S_5$-symmetric complex CFTs of central charge \beq c=13-6\left(\frac{g(5)}{4}+\frac{4}{g(5)}\right)\approx 1.138 \pm 0.021 i\,. \end{equation}} To summarize, we started with the analytic expression for the torus partition function of the critical Potts model with real $Q<4$ and analytically continued operator dimensions and multiplicities to $Q>4$. This is equivalent to the analytic continuation of the partition function itself. In particular all the partition function properties for $Q<4$, like modular invariance, continue to hold for $Q>4$. The information extracted from the partition function is consistent with our conjecture about the existence of complex fixed points at $Q>4$. Further checks involving OPE coefficients will be given below. \section{Walking RG flow in $Q>4$ Potts models} \label{PottsCPT} We will now use the knowledge of the complex CFTs $\calC$ and $\bar \calC$ to study the walking RG flow in the Potts model for $Q\gtrsim 4$. Basic framework of how to do this was presented in \cite{part1}, section 6.3. The real flow trajectory passes halfway between the two complex CFTs. The part of the trajectory close to the CFTs exhibits approximately scale-invariant behavior, and can be accessed using a form of conformal perturbation theory (CPT). Here we will demonstrate this framework by concrete computations. CPT computations require operator dimensions in our complex CFTs, known from the partition function. We will also need OPE coefficients as well as some integrals of the 4pt functions (see \cite{Cardy:1996xt} for a review of first-order and \cite{Komargodski:2016auf,Gaberdiel:2008fn,Ludwig:2002fu} for second-order CPT). In practice we will only need to know those up to some fixed order in $Q-4$ since, as we will see momentarily, the imaginary part of the coupling constant in the walking region will itself be proportional to $Q-4$. We would like to stress, however, that conceptually our procedure is quite different from expanding around the $Q=4$ fixed point. One may imagine that conformal data at the complex fixed point is known exactly, and we are expanding only in the coupling constant of perturbation around this fixed point. In this sense our expansion is a usual CPT, albeit as we will see with a complex coupling. Instead expansion in $Q-4$ around the $Q=4$ Potts model is on a less obvious footing since $Q-4$ itself isn't a coupling constant, but merely a parameter. In particular, models with different $Q$ have different symmetries and expansion around $Q=4$ requires deforming the symmetry, a feature that we would like to avoid. Although the Potts models at general $Q$ are not exactly solved apart from their spectrum, some additional conformal data needed for CPT can be determined for arbitrary $Q$ for the following reason. Comparing \eqref{eq:Kacdeg} and \eqref{eq:ration}, some of the light fields present in the Potts model belong to degenerate conformal families for any $Q$, and consequently their correlation functions satisfy certain differential equations \cite{Belavin:1984vu}. In principle, this fixes the correlators up to a few constants that can be determined by requiring proper crossing symmetry properties, although in practice this procedure is still rather complicated. There is, however, another helpful trick. For a discrete infinite set of $Q$'s between 2 and 4 (called the Beraha numbers) the Potts model central charge agrees with that of the diagonal minimal models ${\cal{M}}_m\equiv \calM(m+1,m)$, $c_m=1-6/[m(m+1)]$.\footnote{Recall that the diagonal (or $A$-series) minimal models only contain scalar primaries $h=\bar h=h_{r,s}$ with multiplicity 1.} We have (see Fig.~\ref{fig:cm}) \begin{align} \label{Qofm} &\text{Tricritical: } &&Q= 2+2 \cos\frac{2\pi}m, &&m=\frac{2 \pi}{\arccos\left(\frac{Q}{2}-1\right)},\\ &\text{Critical: }&&Q=2+2 \cos\frac{2\pi}{m+1}, &&m=\frac{2 \pi}{\arccos\left(\frac{Q}{2}-1\right)}-1\,. \end{align} What is the significance of this agreement? As is well known, the tricritical and critical $Q=2$ Potts (i.e.~Ising) are actually identical to $m=4$ and $m=3$, but for other $Q$'s for which $m$ is an integer, there is no exact coincidence. E.g.~the $Q=3$ Potts models are nondiagonal minimal models -- they contain only a subset of Kac-table operators, and with nontrivial multiplicities, as well as primaries with spin. \begin{figure}[!ht] \centering \includegraphics[width=0.4\textwidth]{cm.pdf} \caption{Central charge of the critical (yellow) and tricritical (blue) Potts model as a function of $Q$. The central charge of several unitary minimal models is indicated by horizontal lines.} \label{fig:cm} \end{figure} Still, there are some operators, singlets under $S_Q$, which occur in all minimal models and in all Potts models. It seems reasonable to assume that their correlators should agree in both models. The reason is that these correlators satisfy both the differential equations and crossing relations, which for singlet operators are identical in Potts and in ${\cal{M}}_m$, and these conditions are extremely constraining. We can then use the OPE coefficients and 4pt functions in the diagonal minimal models computed in \cite{Dotsenko:1984nm,Dotsenko:1985hi} (see also \cite{Poghossian:2013fda} and \cite{Esterlis:2016psv} for some more compact expressions) to learn about the Potts model.\footnote{Although it should be possible to extract OPE data by directly studying non-diagonal minimal models, this is rather more complicated than for the diagonal case, see e.g.~\cite{Fuchs:1989kz} for a general discussion and \cite{1995cond.mat..7033M} for $Q=3$ Potts; for an alternative method of computing the OPE coefficients see \cite{Teschner:1995yf,Migliaccio:2017dch}.} Minimal models provide the OPE data as functions of $m$, which can be expressed via $Q$ through \eqref{Qofm} and analytically continued. Additional source of information is $Q=4$, since the 4-state Potts model is known to be described by the free boson compactified on $S_1/\mathbb{Z}_2$ \cite{Dijkgraaf:1987vp}, and direct computations are possible. To guard against possible subtleties and to obtain information about operators not present in the minimal models, we crosscheck some of the results at $Q=4$ (appendix \ref{app:orbifold}). In fact for some of our considerations knowing the values of OPE coefficients at $Q=4$ will be just enough, while for others higher orders in $Q-4$ are needed, requiring the analytic continuation from the minimal models. \subsection{One-loop beta-function} \label{sec:one-loop} Based on the agreement of dimensions noticed in section \ref{sec:spec}, we have identification \cite{Dotsenko:1984nm}: \begin{align} \text{Critical: }&\varepsilon=\calO_{e_0+2,0}=\phi_{2,1}\,, \\ & \varepsilon' = \calO_{e_0+4,0}=\phi_{3,1}\,,\\ \text{Tricritical: } &\varepsilon=\calO_{e_0+2,0}=\phi_{1,2}\,, \\ &\varepsilon'=\calO_{e_0+4,0}=\phi_{1,3}\,, \end{align} as also indicated in Fig.~\ref{fig:dimRe}. We are most interested in $\varepsilon'$, the subleading energy operator. This singlet operator is irrelevant at the critical point and relevant at the tricritical point for $Q<4$. Operator $\phi_{1,3}$ is known to produce the RG flow between consecutive minimal models \cite{Zamolodchikov:1987ti}. We therefore make an extremely plausible assumption that operator $\varepsilon'$ drives the flow from the tricritical Potts to the critical Potts for any $Q<4$.\footnote{This is not fully obvious since as mentioned the spectrum of the Potts models only partly overlaps with that of the diagonal minimal models.} For $Q=4$ the two CFTs collide, and $\varepsilon'$ becomes marginal. Now consider analytic continuation to $Q>4$. The dimension of $\varepsilon'$ \beq \Delta^{\calC}_{\varepsilon'}=16/g(Q)-2, \end{equation} acquires an imaginary part, negative in the complex theory $\calC$ (it would be positive in $\overline{\calC}$), as well as a negative corrections to the real part (see Fig.~\ref{fig:DeltaO}). Near $Q=4$ we have \beq \Delta^{\calC}_{\varepsilon'}=2-{2i}\frac{\epsilon}{\pi}-\frac{\epsilon^2}{\pi^2}+\ldots\qquad(\epsilon=\sqrt{Q-4})\,. \label{eq:DeltaO} \end{equation} \begin{figure}[!ht] \centering \includegraphics[width=0.4\textwidth]{DeltaO.pdf} \caption{Real and imaginary part of $\Delta_{\varepsilon'}$ as a function of $Q$.} \label{fig:DeltaO} \end{figure} We consider a family of RG flows perturbing $\calC$ by \beq g_0 \int d^2 x\, \varepsilon'(x)\,, \label{g0} \end{equation} for various initial values of $g_0$. {\bf Note:} From now on $g_0$ and $g$ will refer to the bare and renormalized CPT coupling in expansion around $\calC$, to agree with the notation in \cite{part1}. These couplings have nothing to do with the Coulomb gas coupling from section \ref{sec:Q<4}, which was denoted there $g$ or $g(Q)$. The latter coupling will not appear in the rest of the paper. Hopefully this will not create confusion. The theory $\calC$ also contains a strongly relevant singlet operator, analytic continuation of $\varepsilon$, whose coefficient is tuned to zero. We expect these flows to have topology shown in Fig.~\ref{fig:complexPottsFlow}. Notice that because of the negative $O(\epsilon^2)$ correction to $\Delta_{\varepsilon'}^\calC$ and $\Delta_{\varepsilon'}^{\overline{\calC}}$, the trajectories starting at $\calC$ or $\overline{\calC}$ slowly unwind. This effect was not considered in \cite{part1}, where the correction to the real part was neglected, leading to oversimplified flow topology shown in Fig.~2 of \cite{part1}.\footnote{\label{note:lattice}Hence, to realize the complex fixed points $\calC$, $\overline{\calC}$ on the lattice, one has to finetune the couplings of both $\varepsilon$ and $\varepsilon'$. In total one needs to tune two complex, or four real couplings, making lattice studies of the complex fixed points in the Potts model somewhat nontrivial.} \begin{figure}[!ht] \centering \includegraphics[width=0.5\textwidth]{complexPottsFlow.pdf} \caption{RG flow topology expected in the complexified Potts model at $Q>4$.} \label{fig:complexPottsFlow} \end{figure} The part of the RG trajectories close to $\calC$ and $\overline{\calC}$ can be studied in CPT. This concerns in particular the trajectory which does not even begin at $\calC$ or $\overline{\calC}$ but follows the horizontal line halfway between them. According to \cite{part1}, this trajectory describes the walking RG flow.\footnote{In general the real RG flow doesn't have to follow an exact straight line, in fact this property is scheme dependent as we discuss in sections \ref{sec:2loop}. Topology of the RG flow, however, doesn't depend upon the choice of scheme. } Let us recall how one can move between $\calC$ and $\overline{\calC}$, as well as study the walking RG trajectory, using leading order CPT (\cite{part1}, section 6.3). The one-loop beta-function reads \cite{Cardy:1996xt} \begin{equation} \beta(g)=\kappa g+\pi C_{\varepsilon'\varepsilon'\varepsilon'} g^2, \label{eq:b6} \end{equation} where $\kappa=\Delta^\calC_{\varepsilon'}-2$,\footnote{In \cite{part1} we used $\kappa=-i\epsilon$, but here $\epsilon$ stands for $\sqrt{Q-4}$.} and $g$ is the renormalized coupling constant which appears in the expressions for beta-functions and anomalous dimensions, as opposed to the bare coupling $g_0$ used in \eqref{g0}. At one loop we only need $\kappa$ at $O(\epsilon)$ and $C_{\varepsilon'\varepsilon'\varepsilon'}$ at $O(1)$. For later uses we cite $C_{\varepsilon'\varepsilon'\varepsilon'}$ including the first subleading term:\footnote{The expression we used is given in the Appendix A of \cite{Poghossian:2013fda}. There this particular OPE coefficient is expressed as a finite product and hence as an analytic function of $m$. ($\rho$ of \cite{Poghossian:2013fda} is related to $m$ as $\rho=m/(m+1)$.).} \beq C_{\varepsilon'\varepsilon'\varepsilon'}=\frac{4}{\sqrt{3}}-\frac{2 i\sqrt{3}}{\pi}\epsilon+O(\epsilon^2)\,. \label{Cepepep} \end{equation} The beta-function vanishes at $g=0$ and at \beq g=g_{FP}=-\kappa/(\pi C_{\varepsilon'\varepsilon'\varepsilon'})=i\frac{\sqrt{3}\epsilon}{2 \pi^2}+\ldots\,. \label{eq:gFP} \end{equation} Notice that $g_{FP}$ is purely imaginary at the considered leading order. This second fixed point should correspond to $\overline{\calC}$. The first check of this identification is the `Im-flip': the imaginary part of dimension of $\varepsilon'$ changes sign when going from $\calC$ to $\overline{\calC}$. As shown in \cite{part1} this is completely general at this order, and we don't repeat the argument. However, we will see below several other checks of this identification, possible in the situation at hand. Furthermore, the walking trajectory corresponds to $g$ of the form \begin{equation} g=g_{FP}/2-\lambda\,, \label{realflow} \end{equation} with $\lambda$ real. Reality of $\lambda$ is preserved since in terms of $\lambda$ the beta-function is real \cite{part1}: \begin{equation} \beta_\lambda =-\beta(g_{FP}/2-\lambda)=-\frac{\sqrt{3}\epsilon^2}{4 \pi^3}-\frac{4 \pi}{\sqrt{3}}\lambda^2\,. \label{betareal} \end{equation} For small $\epsilon$, this is the walking beta-function of the form \eqref{eq:RGwalk} (up to rescaling $\lambda$). In particular, we can obtain the correlation length in the $Q>Q_c$ Potts models: \begin{equation} \xi_{\rm Potts}=\exp\left({\int_{\lambda_{\rm IR}}^{\lambda_{\rm UV}}\frac{d\lambda}{\beta_\lambda}}\right)\approx const.\exp\left( \frac{\pi^2}{\epsilon}\right)\,, \label{xiPotts} \end{equation} where we integrated from $\lambda_{\rm UV}=-O(1)$ to $\lambda_{\rm IR}=+O(1)$. This agrees with the leading behavior of the exact result for $\xi_{\rm Potts}$, found in \cite{Buffenoir} via the Bethe ansatz. As discussed in \cite{part1}, at this order this prediction does not actually depend on knowing the OPE coefficient $C_{\varepsilon'\varepsilon'\varepsilon'}$, which cancels out of the answer, but only on $\kappa$.\footnote{This can be seen already from the fact that $C_{\varepsilon'\varepsilon'\varepsilon'}$ can be scaled out of the beta-function \reef{eq:b6} by rescaling $g$.} However, the ratios of $C_{\varepsilon'\varepsilon'\varepsilon'}$ to other OPE coefficients is significant as we will now see. Curiously, with an appropriate choice of an expansion parameter, the one-loop answer for $\xi_{\rm Potts}$ turns out to be exact to all orders in perturbation theory, see the discussion around Eq.~\eqref{xiexact}. \subsection{Im-flip for other operators} \label{sec:Imflip} We will now perform the Im-flip check for other operators. At one loop, the anomalous dimension of a generic operator $\phi$ is given by \begin{equation} \gamma_\phi(g) = 2\pi C_{\phi \phi \varepsilon'} g, \label{gamma1} \end{equation} and the Im-flip condition reads \cite{part1}: \beq \frac{\rm Im \Delta^\calC_\phi}{C_{\phi \phi\varepsilon'}}=\frac{\rm Im \Delta^\calC_{\varepsilon'}}{C_{\varepsilon'\varepsilon'\varepsilon'}}=-\frac{\sqrt{3}}{2\pi}\,, \label{eq:OPEcondition} \end{equation} We will consider the following operators \begin{itemize} \item The energy operator $\varepsilon$: \begin{gather} \label{eps2} \Delta^\calC_\varepsilon=\frac{1}{2}-\frac{3 i \epsilon}{4 \pi }-\frac{3 \epsilon^2}{8 \pi ^2}+\ldots,\\ C_{\varepsilon\vep\varepsilon'}=\frac{\sqrt{3}}{2}-\frac{i\sqrt{3} \epsilon}{4 \pi}+\ldots \label{Ceeep} \end{gather} \item The spin operator $\sigma$: \begin{gather} \Delta_{\sigma}^\calC=\frac{1}{8}-\frac{i \epsilon}{16 \pi }+\ldots\,,\\%+\frac{3 \epsilon^2}{32 \pi ^2}\\ C_{\sigma \sigma \varepsilon'}=\frac{1}{8\sqrt{3}}+\ldots \label{Cssep} \end{gather} Apart from orbifold at $Q=4$, this OPE coefficient can be computed exactly for any $Q$ identifying $\sigma=\calO_{\pm1,0}=\phi_{\frac{m}{2},\frac{m}{2}}$ on the tricritical branch and continuing from the minimal models with $m$ even. Analytic continuation is straightforward because the Dotsenko-Fateev expression for $C(\phi_{\frac{m}{2},\frac{m}{2}},\phi_{\frac{m}{2},\frac{m}{2}},\phi_{1,3})$ contains a finite $m$-independent number of terms. This gives an OPE coefficient whose $m\to\infty$ limit agrees with the orbifold result. We won't need the subleading in $\epsilon$ terms so we don't quote them. \item The operator $Z\equiv\calO_{0,1}$, contained in the Potts model with multiplicity $\frac{Q(Q-3)}{2}$, see section \ref{sec:spec}: \begin{gather} \Delta_{Z}^\calC=2+\frac{i \epsilon}{\pi}+\ldots\,,\\ C_{Z Z \varepsilon'}=-\frac{2}{\sqrt{3}}+\ldots\,, \label{eq:CZZe'} \end{gather} which does not appear in any of the minimal models,\footnote{For $Q$ such that $m$ is integer, this operator is actually Kac-degenerate with $r=m-2$ and $s=m+1$, however this is outside of the range of $s$ allowed for $\calM_m$.} but we can determine the $Q=4$ OPE coefficient via the orbifold. Notice that the imaginary parts of $\Delta_{Z}^\calC$ and of $C_{Z Z \varepsilon'}$ have the opposite sign compared to the all the other cases computed so far. This is related to the fact that $Z$ is irrelevant in the UV (on the tricritical branch for $Q<4$), and relevant in the IR (i.e.~on the critical branch), see Fig.~\ref{fig:dimRe}. \end{itemize} As a sanity check, the Im-flip condition \reef{eq:OPEcondition} is satisfied for all these operators by inspection. The success of this check can be traced to the fact that for $Q<4$ we have the flow from tricritical to critical Potts models triggered by the same operator, $\phi_{1,3}$. Im-flip condition for $Q>4$ is the analytically continued counterpart of the condition that ensures an appropriate change in the scaling dimensions of operators along this flow. \subsection{Drifting scaling dimensions} \label{sec:drift} In this section we will use CPT to compute observables in the real physical theory in the range of distances corresponding to the walking regime, that is for $g=\frac{g_{FP}}{2}-\lambda$ with $\lambda$ small. We will discuss below the range of $\lambda$ for which our calculation is under control. Consider the 2pt functions of some primary operator $\phi$. In the walking regime, we expect that the correlation functions exhibit approximate power-law scaling. To quantify this idea, we will define the drifting dimension of an operator $\phi$ as \begin{equation} \delta_\phi(r)=-\frac{1}{2}\frac{1}{G_\phi(r)}\frac{\partial G_\phi(r)}{\partial \log r}\,, \end{equation} where $G_\phi$ is the 2pt function $\langle \phi(r) \phi(0) \rangle$. For a conformal theory, $\delta_\phi(r)$ would be just a constant equal to the scaling dimension, but in the walking regime it will be scale-dependent. In principle, it should be possible to measure the drifting dimensions, or at least closely related quantities, on the lattice as we mention below. We compute $\delta_\phi(r)$ via the Callan-Symanzik (CS) equation. Restoring the dependence of the 2pt function on the renormalization scale $\mu$ and the renormalized coupling $g$, the CS equation for $G_\phi(r,g,\mu)$ reads: \begin{equation} \left[\mu\partial_\mu+\beta(g)\partial_g+2\gamma_\phi(g)\right]G_\phi(r,g,\mu)=0. \end{equation} To proceed we introduce the dimensionless variable $s=\mu r$ and factor out the fixed-point scaling of $G_\phi$: \begin{equation} G_\phi(r,g,\mu)=\frac{c(s,g)}{r^{2\Delta_\phi^\calC}}. \end{equation} Solution of the CS equation for $c$ takes the well-known form: \begin{equation} c(s,g)=\hat c\left(\bar{g}(s,g)\right)\exp\left [ -2 \int_1^{s} d\log s'\, \gamma_\phi(\bar g(s',g))\right] \label{CSc0} \end{equation} where $\bar{g}(s,g)$ is the running coupling with the initial conditions $\bar{g}=g$ at $s=1$. We focus on the real RG trajectory $\bar g=g_{FP}/2-\bar \lambda$ with initial condition $\bar\lambda=0$ for definiteness. The running coupling satisfies $s\del_s\bar g = -\beta(\bar g)$, or equivalently $s\del_s\bar \lambda = -\beta_\lambda(\bar \lambda)$ with $\beta_\lambda$ given in \eqref{betareal}. Integrating this equation we find: \begin{equation} \bar{\lambda}= \frac{\sqrt{3} {\epsilon}}{4 \pi^2}\tan\left(\frac{\epsilon \log s}{\pi}\right). \label{baru} \end{equation} The one-loop contribution to $\hat c$, comes from the integrated 3pt function $\int d^2x \<\phi\,\phi\,\epsilon'(x)\>$. After subtracting the $1/\epsilon$ pole, the $O(1)$ part of this integral vanishes,\footnote{The relevant integral takes the form $\int d^2x/(|x|^{2+\kappa}|x-y|^{2+\kappa})=w(\kappa)^2/w(2\kappa) |y|^{2+2\kappa}$ where $w(\kappa)$ is the factor which arises when going to the Fourier transform $1/|x|^{2+\kappa}\to w(\kappa)|p|^\kappa$. In the small $\kappa$ limit $w(\kappa)\sim 1/\kappa+O(1)$ but it's easy to see that the $O(1)$ term will always disappear from the specific combination $w(\kappa)^2/w(2\kappa)$.} so that \beq \hat c=1+O(i \epsilon) \bar\lambda+\ldots\,.\label{eq:hatc} \end{equation} At the one-loop order we can ignore the correction and set $\hat c=1$. We will comment on this purely imaginary $O(\bar\lambda)$ correction in section \ref{sec:2loop}. Using \eqref{gamma1} we have \begin{equation} \gamma_\phi\left(\frac{g_{FP}}{2}-\lambda\right)=\pi C_{\phi\phi\varepsilon'}g_{FP}-2 \pi C_{\phi\phi\varepsilon'}\lambda. \label{eq:gammaphi} \end{equation} It is easy to see that due to \eqref{eq:OPEcondition}, the constant part of the anomalous dimension cancels exactly the imaginary part of $\Delta_\phi^\calC$ in $1/r^{2\Delta_\phi^\calC}$. Consequently, modulo an overall $r$-independent constant, $G_\phi$ will be real at this order, see below. Substituting \reef{baru} into \reef{eq:gammaphi} and doing the simple integral in \eqref{CSc0} we finally get (denoting $\mu=1/r_0$ where convenient) \begin{equation} \label{Gphi} G_\phi(r)=C(\mu) \frac{\left( \cos\frac{\epsilon\log r/r_0}{\pi}\right)}{r^{2\,\text{Re}\, \Delta_\phi^\calC}}^{-\sqrt{3}C_{\phi\phi\varepsilon'}}. \end{equation} where $C(\mu)=\mu^{2i\,\text{Im} \Delta_\phi^\calC}$. While this factor is in general complex, we can absorb it defining the rescaled real operator $\phi_R$ by \begin{equation} \label{eq:phir} \phi_R=\mu^{-i\text{Im}\, \Delta_\phi^\calC}\phi\;. \end{equation} The two point function of $\phi_R$ is then real in the real theory. We conjecture that the same rescaling renders all higher $n$-point functions real as well, but at the moment this remains one of the future checks of our proposal. Real operators that have real correlation functions are thus related to operators naturally used in CPT by complex normalization factors which depend on the renormalization scale. We should not be surprised that this redefinition is needed to identify real operators, as it corresponds to an ambiguity in the choice of basis of the operators present in the complex theory $\calC$. Using \eqref{Gphi}, we compute the drifting dimension \begin{equation} \delta_{\phi}(r)=\text{Re}\, \Delta_\phi^\calC-\frac{\sqrt{3} \epsilon}{2 \pi}C_{\phi\phi\varepsilon'}\tan\left(\frac{\epsilon\ln r/r_0}{\pi} \right), \label{drift} \end{equation} expressed in terms of the leading in $\epsilon$ values of the OPE coefficient and the operator dimension. For several operators $\phi$ of interest this complex CFT data was given in section \ref{sec:Imflip}. Let us now discuss the range of validity of Eq.~\eqref{drift}. First of all, there will be correction to \eqref{drift} coming from ignoring the higher-order term in the beta-function and anomalous dimension. Since the leading-order result for the deviation $\delta_{\phi}(r)-\Delta^\calC_\phi$ is of order of the running coupling $\bar\lambda(r)$, we see that we can trust it as long as this deviation remains $\ll 1$ (for example there is no constraint that the deviation should remain $O(\epsilon)$ as one might have naively expected). This condition allows the argument of tangent in \eqref{drift} to become $O(1)$ as long as it does not get within $O(\epsilon)$ to $\pi/2$. Another set of corrections to \eqref{drift} will arise from the expansion of the CFT data in $\epsilon$, which are non-zero even at $\lambda=0$. To show a concrete example, we plotted in Fig.~\ref{fig:driftexp} the drifting dimension of the energy operator $\delta_{\varepsilon}$, as a function of the normalized logarithmic scale $x=\epsilon\log(r/r_0)$ for a few values of $Q$. We also indicate a (very rough) estimate of the theoretical error on this quantity. To estimate the $\lambda$-independent correction $[\delta_\varepsilon]_\epsilon$ we used the order $\epsilon^2$ contribution to $\Delta_\varepsilon^\calC$ given in \eqref{eps2}. On the other hand, the higher-loop correction was estimated as a relative correction to the non-trivial part of the drifting dimension proportional to the ratio of two-loop and one-loop terms in the beta-function \eqref{eq:betatwo} below, that is $[\delta_\varepsilon]_\lambda=(\delta_{\varepsilon}(r)-\text{Re}\,\Delta_\varepsilon^\calC)\frac{\beta^{(2)}}{\beta^{(1)}}$. We then add the corrections as mean squares $[\delta_\varepsilon]_{total}=\sqrt{[\delta_\varepsilon]_{\epsilon}^2+[\delta_\varepsilon]_{\lambda}^2}$. Of course this is not meant to be a rigorous procedure, but just an estimate of the magnitude and qualitative behavior of the error. \begin{figure}[!ht] \centering \includegraphics[width=0.6\textwidth]{driftexp.pdf} \caption{Drifting scaling dimension $\delta_{\varepsilon}$ given by the equation \eqref{drift} as a function of $x=\epsilon\log(r/r_0)$ and an estimate of the theoretical uncertainty for $Q=5$ (blue) and 7 (red).} \label{fig:driftexp} \end{figure} Analogously to the drifting scaling dimension $\delta_{\varepsilon}(r)$ one can define a drifting exponent $\nu(r)$ as \begin{equation} \nu(r)=\frac{1}{d-\delta_\varepsilon(r)}\;. \label{eq:nur} \end{equation} Recently a quantity similar to $\nu(r)$ was measured by means of lattice Monte Carlo simulations \cite{2018arXiv180102786I}. Some features of their Fig.~3 suggest qualitative agreement with \eqref{drift}, however, there is also some discrepancy. There is no immediate problem because the quantity they measured was not exactly \reef{eq:nur}, and different reasonable definitions of drifting exponents may not agree with each other. Notice in this regard that detailed behavior of drifting exponents is distinct even for two different definitions used in \cite{2018arXiv180102786I}. In the future it would be interesting to measure a quantity more directly related to \eqref{drift} on the lattice. We believe that it should also be possible to perform an analytic calculation of finite-volume observables, such as those measured in \cite{2018arXiv180102786I}, with the help of CPT around complex Potts model, but we leave this computation for the future. The dependence of drifting dimensions on $\log r$ shown in Fig.~\ref{fig:driftexp}, with an inflexion point at $r=r_0$, is pretty peculiar. It should be possible to use this dependence to differentiate the walking scenario from a more conventional scenario of nearly-scale invariant RG flow, namely the flow which slowly approaches an IR fixed point along a weakly irrelevant direction, with the schematic beta-function \beq \beta \sim \epsilon \lambda + \lambda^2\,. \end{equation} For this flow, deviations of drifting dimensions from IR CFT limits will go like $\sim 1/\log(r)$ in the region $\epsilon\lesssim\lambda\ll 1$, smothly transitioning to a $const./r^\epsilon$ behavior at distances where $\lambda\lesssim \epsilon$. This functional dependence is clearly distinct from \reef{drift}, in particular there is no inflection, and with enough precision it should be possible to distinguish the two scenarios. Finally let us mention that drifting exponents do not seem related by simple analytic continuation to any $Q<4$ quantity. To compute them it was important to first analytically continue the conformal data and then develop the CPT around the complex fixed point. We also stress that even if the exact values of CFT dimensions or OPE coefficients are not known, as for example is the case in all higher-dimensional examples of walking discussed in \cite{part1}, the characteristic form of the drifting dimensions given by Eq.~\eqref{drift} stays the same and as such can be considered the smoking gun of the walking behavior. \subsection{Two-loop beta-function} \label{sec:2loop} Now we would like to go one order higher in $\epsilon$ and do perturbation theory up to two loops. We therefore need to address the question of scheme dependence. Up to two loops, we have a beta-function of the form \begin{equation} \beta^{\text{2-loop}}= \beta_1 g +\beta_2 g^2+\beta_3 g^3\,. \end{equation} Different schemes correspond to changes $g \to g +\alpha g^2 +\ldots$. As is well known, if $\beta_1= 0$, the two-loop beta-function is scheme independent. { However, in our case $\beta_1\ne 0$, so we need to specify the scheme. } {We will use the `OPE scheme' \cite{Gaberdiel:2008fn}, also used in \cite{Poghossian:2013fda}.\footnote{Eq.~\eqref{eq:betatwo} equals $(-2)$ times Eq.~(2.19) of \cite{Poghossian:2013fda} due to different normalization of beta-function used in that work..}} The two-loop beta-function in this scheme takes the following form: \begin{gather} \beta^{\text{2-loop}}= \kappa(\epsilon) g + \pi C_{\varepsilon'\varepsilon'\varepsilon'}(\epsilon) g^2- \frac{\pi}{3}I_{\varepsilon'}g^3, \label{eq:2loopbeta} \end{gather} {where as indicated we include the $\epsilon$-dependence of $\kappa$ and of the OPE coefficient $C_{\varepsilon'\varepsilon'\varepsilon'}$.\footnote{This is different e.g.~from the scheme followed by \cite{Komargodski:2016auf}, where the OPE coefficient in \eqref{eq:2loopbeta} is evaluated at $\epsilon=0$. The two schemes are related by a coupling redefinition $g \to g+ \alpha g^2$, which, at this order, only shifts the $\epsilon g^2$ term of the beta function. At this order, it does not change the value of $I_{\varepsilon'}$.} Taking into account that $g_{FP}=O(\epsilon)$, at the two-loop order we should keep terms of total degree up to three in $\epsilon$ and $g$, which means that we will need $\kappa$ at $O(\epsilon^2)$ and $C_{\varepsilon'\varepsilon'\varepsilon'}$ at $O(\epsilon)$, see \eqref{eq:DeltaO},\eqref{Cepepep}.} The two-loop coefficient $I_{\varepsilon'}$, needed at $O(1)$, originates from the ``triple'' OPE of the field $\varepsilon'$, i.e.~divergences arising when three insertions of the field $\varepsilon'$ are close together. At this order it can be extracted from the integrated 4pt function $\int d^2 z \langle{\varepsilon'(0) \varepsilon'(z) \varepsilon'(1) \varepsilon'(\infty)}\rangle$ of the $Q=4$ Potts model. However, one has to be careful and subtract extra divergences, which are related to the ordinary OPE of the field $\varepsilon'$ with itself or with other relevant operators. Taking into account all the subtractions, we have $I_{\varepsilon'}=-8 \pi$.\footnote{This result was first obtained in \cite{LASSIG1990652} and then in \cite{Poghossian:2013fda}, and we checked it numerically applying methods of \cite{Komargodski:2016auf,Behan:2017emf} to the 4pt function $\langle\varepsilon' \varepsilon' \varepsilon' \varepsilon'\rangle$ given in appendix C of \cite{Poghossian:2013fda}. Minor modifications are required compared to \cite{Behan:2017emf}, as it was tailored to a flow driven by an operator with a vanishing 3pt function.} { Computing the zero of the two-loop beta-function corresponding to $\overline{\calC}$, it turns out that it's still given by \reef{eq:gFP}, with no corrections at $O(\epsilon^2)$. This is a nice feature of the OPE scheme: were we to change $g \to g +\alpha g^2$ then $\text{Re}\, g_{FP}\ne 0$, losing the intuitive picture of $\calC$ and $\bar \calC$ sitting symmetrically around the real RG flow as in Fig.~\ref{fig:complexPottsFlow}. That $g_{FP}$ remains purely imaginary is one of the reasons we chose the `OPE scheme', the other being that the real RG stays a straight line passing halfway between the two complex fixed points, Eq.~\eqref{realflow}, see below. These desirable features would be lost at two loops in most schemes, e.g.~in the scheme of \cite{Komargodski:2016auf}. Next we compute the dimension of $\varepsilon'$ at the $\overline{\calC}$ fixed point, which comes out complex conjugate of $\varepsilon'$ in $\calC$, as it should:} \begin{equation} 2+\beta'(g)|_{g=g_{FP}}=2+\frac{2 i \epsilon}{\pi}-\frac{\epsilon^2}{\pi^2}\,, \end{equation} { We now study the real walking RG trajectory. We claim that in our scheme it still given by $g= \frac{g_{FP}}{2}-\lambda$. To check this, we express the beta-function in terms of $\lambda$ and see that it comes out real:} \begin{equation} \beta^{\text{2-loop}}_\lambda(\lambda)=-\frac{\sqrt{3} \epsilon^2}{ 4\pi^3} - \frac{4 \pi }{\sqrt{3}}\lambda^2+ \frac{\epsilon^2}{2 \pi^2} \lambda + \frac{8 \pi^2 }{3} \lambda^3\,. \label{eq:betatwo} \end{equation} It can also be checked that the anomalous dimension of $\varepsilon'$ has a constant imaginary part, which cancels exactly the imaginary part of its scaling dimension at $\calC$: \begin{equation} \Delta_{\varepsilon'}(\lambda)=2+\beta'(g)|_{g=\frac{g_{FP}}{2}-\lambda}=2+\frac{\epsilon ^2}{2 \pi ^2}-\frac{8 \pi \lambda }{\sqrt{3}}+8 \pi ^2 \lambda ^2. \end{equation} So in the OPE scheme, the real walking theory still corresponds to the line ${\rm Im}\,g=0$ in the space of complex couplings $g\in\bC$. While the Im-flip of $\varepsilon'$ at $\bar \calC$ and cancellation of its imaginary part of the dimension on the real walking theory were automatic at one-loop, at two loops the check of these conditions explicitly involved the values of the OPE coefficients and integrated 4pt function $I_{\varepsilon'}$. { We can also consider other operators. For a generic operator $\phi$, the two-loop anomalous dimension is} \begin{equation} \gamma_\phi(g)=2\pi C_{\phi \phi \varepsilon'}g-\pi I_{\phi} g^2\,. \end{equation} As a check, for $\phi=\varepsilon'$ this agrees with $\Delta_{\varepsilon'}(g)=2+\beta'(g)$. At the considered order we need to keep terms with total degree up to two in $g$ and $\epsilon$. The $ I_{\phi}$ is extracted from $\int d^2 z \langle \phi(0)\varepsilon'(1)\varepsilon'(z)\phi(\infty)\rangle$ in the same way as previously explained for $I_{\varepsilon'}$. {Unfortunately the only other operator for which we currently have access to the 4pt function $\langle \phi\, \varepsilon' \varepsilon' \phi\rangle$ is $\phi=\varepsilon$ \cite{Poghossian:2013fda}. $C_{\varepsilon \varepsilon \varepsilon'}$ is given in \eqref{Ceeep}, and we have $ I_{\varepsilon}=-\pi$.} Again it is easy to check the Im-flip at $\overline{\calC}$ up to $O(\epsilon^2)$, as well as reality of the dimension of $\varepsilon$ on the real axis: \begin{gather} \Delta_\varepsilon(g_{FP})=\Delta_\varepsilon^{\calC}+ \gamma_\varepsilon(g_{FP})=\frac{1}{2}+\frac{3 i \epsilon}{4 \pi }-\frac{3 \epsilon^2}{8 \pi ^2}+\ldots=\Delta_\varepsilon^{\bar{\calC}}\,, \\ \Delta_\varepsilon\left( \frac{g_{FP}}{2}-\lambda \right) =\Delta_\varepsilon^{\calC}+ \gamma_\varepsilon\left( \frac{g_{FP}}{2}-\lambda \right)=\frac{1}{2}-\frac{3 \epsilon ^2}{16 \pi ^2}-\sqrt{3} \pi \lambda +\pi ^2 \lambda ^2+\ldots \end{gather} Although we won't do this, we could use the given two-loop beta-function and the functions $\Delta_\phi\left( \frac{g_{FP}}{2}-\lambda \right)$ to extend the drifting dimension analysis of section \ref{sec:drift} to the two-loop order. The provided information is sufficient to evaluate the integral $\int_1^{s}$ in \reef{CSc0}, giving correction to drifting dimensions of relative order $O(1)\bar\lambda$. Since we verified that the functions entering the integral are real, the correction will be real, as expected in a real walking theory. The correction from $O(i\epsilon)\bar\lambda$ term in $\hat c$ in \reef{eq:hatc} is subleading. Since it is imaginary, we expect it to cancel with the imaginary part of the two-loop term in $\hat c$, although we have not checked. \subsection[General arguments about the real flow]{General arguments about the real flow } \label{sec:realflow} We saw in section \ref{sec:one-loop} that to the one-loop order in CPT reality of the theory at $g=g_{FP}/2-\lambda$ is almost automatic. Let us now present some arguments why we expect to find a real theory to all orders in perturbation theory. In \cite{part1} we defined the complex conjugation map that acts on the space of QFTs, or equivalently on the space of RG flows. A real theory is then a fixed point of this map. At one loop we had the line of purely imaginary $g$ that connected $\calC$ and $\overline{\calC}$ and that was mapped into itself by the conjugation. Obviously any continuous map of an interval into itself has a fixed point. In general we expect that higher order corrections will deform the conjugation map in some continuous fashion, but under such deformations the fixed point is expected to remain. In general a continuous involution\footnote{Involution is a map which square is the identity, a condition that complex conjugation clearly satisfies.} possesses fixed points as long as the topology of the space on which it acts is relatively simple, see e.g.~\cite{Jaworowski1956} and references therein for the precise theorem formulations. Since the topology of the space of theories in the vicinity of $\calC$ and $\overline{\calC}$ is trivial to leading order in CPT, it is likely to stay such under small deformations. Consequently the real theory should continue to exist in higher orders of perturbation theory. In spite of this general argument, the above calculations showed that at the technical level emergence of the real observables is quite non-trivial. In section \ref{sec:2loop} we saw that quantities that do not directly correspond to physical observables, like anomalous dimensions and beta-functions, may actually be complex, and that this property depends on the choice of scheme. Calculation of section \ref{sec:drift} demonstrated that, even at the one-loop order, one is required to use certain complex normalization constants in the definition of real operators. Nevertheless, both calculations do support the statement that the real theory exists and can be accessed by the deformation of the complex CFT. \subsection{The range of $Q$ for which the walking behavior persists} \label{sec:rangeQ} Having studied some higher-order results we can now try to gain some more intuition on the values of the parameter $Q$ for which we expect to see the walking behavior and consequently large correlation length in the Potts model. A rigorous discussion is possible in the limit $Q\to4$, when the imaginary parts of operator dimensions go to zero, but this is not the only physically interesting regime, and moreover large values of the correlation length suggest that the walking regime extends all the way to $Q\sim10$, see Table 1 in \cite{part1}. As it often happens, the $Q-4$ expansion can be extended to large values of $Q$ after various factors of $\pi$ are taken into account. First of all, we see factors $\pi$ and $\pi^2$ in the one- and two-loop terms of the beta-function \eqref{eq:2loopbeta} or \eqref{eq:betatwo}. These factors have purely geometric origin --- they arise from angular integration, and the $n$-loop term will similarly carry factor $\pi^n$. This shows that a natural coupling constant along the real RG flow is $\tilde\lambda=\pi\lambda$.\footnote{This is similar to counting $1/(16\pi^2)$ factors appearing in Feynman-diagrammatic perturbation theory in 4d.} In terms of this variable the beta-function reads \begin{equation} \beta_{\tilde\lambda}=-\frac{\sqrt{3} \epsilon^2}{ 4\pi^2} - \frac{4 }{\sqrt{3}}\tilde\lambda^2+ \frac{\epsilon^2}{2 \pi^2}\tilde \lambda + \frac{8 }{3}\tilde \lambda^3. \end{equation} We see that $\tilde\lambda^2$ and $\tilde\lambda^3$ coefficients became $O(1)$ numbers and we expect this to persist to higher orders in this normalization. We can also observe that the coefficients of different powers of $\tilde \lambda$ admit an expansion in $\epsilon^2/\pi^2$. It is the same expansion that we have seen above for complex CFT data, except that along the real flow only even powers of $i\epsilon/\pi$ enter. The fact that physical observables are expandable in even powers of $\epsilon$ follows from the fact that they are always real quantities, while the factors of $1/\pi$ can be traced back to \reef{eq:g(Q)ex} and should not be confused with the geometric $\pi$ rescaling performed above. Consequently we expect the beta-function to maintain approximately the same form while the expansion parameter remains small: $\epsilon^2/\pi^2\ll 1$. This identification of the expansion parameter makes it not so surprising that the picture obtained in small $\epsilon$ expansion remains reliable even for $\epsilon\sim\sqrt{6}$ corresponding to $Q\sim 10$. More generally, for perturbation around any complex CFT, the expansion will be controlled by the square of the imaginary part of the CFT dimension of the perturbing operator. In case at hand $\rm ({Im }\,\Delta_{\varepsilon'})^2\sim 4\,\epsilon^2/\pi^2 $, and it appears that an extra factor of 4 does not affect the range of the validity of perturbation theory. If we study the dependence of the complex CFT data on $\epsilon$ to higher orders than above, we realize that an even more natural expansion parameter is $4/|m|^2$, which agrees with $\epsilon^2/\pi^2$ to the first nontrivial order, see Fig.~\ref{fig:params}. Here $m=m(Q)$ is the `minimal model' numbering parameter whose relation to $Q$ is given by \reef{Qofm}, so that $g(Q)=4+4/m(Q)$, $m(Q)$ is real for $Q\leqslant 4$ and becomes purely imaginary for $Q>4$. \begin{figure}[!ht] \centering \includegraphics[width=0.5\textwidth]{params.pdf} \caption{Expansion parameters $\frac{\epsilon^2}{\pi^2}$ (red) and $\frac{4}{|m|^2}$ (blue).} \label{fig:params} \end{figure} At this point it would be nice to compute some physical observable along the walking flow, like a drifting dimension, to higher order in $\epsilon/\pi$ or $1/m$ and to confirm the suggested behavior. Unfortunately, such a computation appears to be rather tedious since the first nontrivial correction is expected at relative order $1/m^2$, requiring to compute at NNLO (three loops). Alternatively, we could study the behavior of perturbation theory by expanding in the coupling constant some exact non-perturbative result. One such quantity is the correlation length on the square lattice computed exactly for any $Q$ in \cite{Buffenoir}. Computation of this quantity in perturbation theory using Eq.~\eqref{xiPotts} would include two types of corrections, those coming from the beta-function and those coming from the dependence of $\lambda_{\rm UV}$ and $\lambda_{\rm IR}$ on $Q$. Inspection of the exact answer, however, leads to a big surprise: if $1/m$ is used as an expansion parameter the answer turns out to be one-loop exact! Namely, expanded at small $1/|m|$ the exact correlation length reads\footnote{See Eq.~(4.46) of \cite{Buffenoir}; there is an obvious typo in (4.47).} \begin{equation} \xi_{\rm Potts}=\frac{\sqrt{2}}{16}e^{\pi |m|/2}+O\left(e^{-\pi |m|/2}\right). \label{xiexact} \end{equation} We see that all corrections to the one-loop answer are non-perturbative in $1/m$. As far as we know this observation has not been made before. This fact is absolutely non-manifest in our perturbation theory, and it suggests that there might be an even superior computational scheme. We leave exploration of this possibility for the future. \section{Conclusions} In this paper we carried on with our proposal \cite{part1} that walking behavior can be understood as an RG flow passing between two complex CFTs. Here we were able to provide an example where we have access to the complex CFTs, meaning that we know the operator spectrum and many of the OPE coefficients. The model we studied is the 2d Potts model, which undergoes a weakly first-order phase transition and walking behavior when the number of states $Q$ is in the range $4\lesssim Q\lesssim 10$. For $Q<4$, on the other hand, the model has a critical and a tricritical point, and the corresponding partition functions on the torus, and hence the operator spectrum, are known \cite{diFrancesco:1987qf}. We access the full complex CFT spectrum by analytically continuing these partition functions to $Q>4$. We are also able to analytically continue some OPE coefficients involving Kac-degenerate operators, and determine a few others near $Q=4$ via the orbifold construction of the $Q=4$ Potts model. We can then describe the real walking theory as the complex CFT perturbed by a nearly marginal operator, making predictions for observable quantities. Since the walking regime is only approximately scale invariant, 2pt functions exhibit small deviations from power laws, which we compute using perturbation theory. It would be interesting to check our results for drifting scaling dimensions with lattice measurements. These techniques also allow to compute the correlation length of the model for $Q\gtrsim4$, in agreement with the result obtained using integrability. The construction passes several purely theoretical consistency checks as well. It was anticipated in \cite{part1} that the existence of two complex conjugate CFTs next to each other, as well as of the real theory in between them, requires certain conspiracies in the conformal data. Here we confirmed, up to the two-loop order, that these conspiracies indeed take place in the complex Potts CFTs. We would like to emphasize that our complex CFTs are not just some approximations which may break down upon closer look. On the contrary, they are perfectly nonperturbatively well defined theories which satisfy usual CFT axioms (OPE, crossing, modular-invariant partition function). Being non-unitary, they are naturally defined in Euclidean signature, and may not necessarily allow analytic continuation to Lorentzian signature.\footnote{The Osterwalder-Shrader theorem allowing analytic continuation from Euclidean to Lorentzian only works for reflection-positive, i.e.~unitary, theories.} We outlined how to look for them by studying the Potts model in the space of complexified couplings. There is at least one more example of walking in two dimensions for which some exact information can be extracted about the complex CFTs, thus providing further tests and applications of our idea: the $O(n)$ model. Very similarly to the Potts model, for $-2 \leqslant n \leqslant 2$ there are two branches of fixed points, the critical and the low-temperature fixed point (which is in general non-trivial). At $n=n_c=2$ the two fixed points merge and go into the complex plane. At $n>2$ there is no phase transition, nevertheless, for $n\gtrsim 2$ we expect to find a massive theory without any tunable parameter with large correlation length due to walking RG behavior. Many of our techniques can be applied to the $O(n)$ model in an analogous way. This theory, especially for $n$ integer, has been extensively studied in the past, however, to the best of our knowledge, the walking behavior has not been emphasized (see however \cite{Cardy:1980at}). Notice that the walking behavior for $n\gtrsim 2$ would be a distinct phenomenon from the slow logarithmic running of the nonlinear sigma-model coupling at short distances. It remains to be seen how far above $n_c=2$ the walking regime extends, and whether any vestiges of walking remain visible at $n=3$. Walking can also be realized in higher dimensions, and in \cite{part1} we presented several examples: 3d and 4d gauge theories below conformal window, the three-state Potts model in 3d, and possibly deconfined criticality transitions. Certainly there are others. In these theories it is harder to make quantitative predictions, since the analytic computations of the properties of corresponding complex CFTs are less feasible. Still, the mechanism governing the RG behavior is the same. Our ability to derive the properties of the walking flow from given conformal data is independent of the number of dimensions. Hence several our results, like the form of the walking 2pt function, can be immediately transcribed for the higher-dimensional cases. \section*{Acknowledgements} We thank Damon Binder, Dmitry Chelkak, Jesper Jacobsen and Hubert Saleur for very useful discussions, and John Cardy, Bernard Nienhuis, and Jean-Bernard Zuber for comments on the draft. VG is grateful to CERN and ENS for hospitality. We are all grateful to Caltech for hospitality during the completion of this work, and to the organizers and participants of ``Bootstrap 2018" for their interest and comments. We are grateful to Sylvain Ribault for careful refereeing of our paper for SciPost, and many comments which led to an improvement of presentation. SR is supported by the Simons Foundation grant 488655 (Simons Collaboration on the Nonperturbative Bootstrap), and by Mitsubishi Heavy Industries as an ENS-MHI Chair holder. BZ is supported by the National Centre of Competence in Research SwissMAP funded by the Swiss National Science Foundation.
\section{Introduction} In its natural form, graphite consists of many layers of carbon atoms stacked in a Bernal configuration\cite{Bernal_1924}. When scaling down such graphitic systems to the few-layers level, it is possible that perfect Bernal stacking is broken. For example two neighbouring layers can be shifted\cite{Daboussi2014,Gradinar2012} or rotated\cite{Gail2011,Lopes_dos_Santos_2012,Lopes_dos_Santos_2007,Mele2012,Rong1993} as a whole with respect to the Bernal configuration. Other systems can exhibit local transitions from an AB-stacking to BA-stacking of two layers resulting in stacking domain walls\cite{Yin2016}. Each of these structural deformations result in distinct changes to the electronic properties of few-layered systems. Recently, another type of deformation was observed in bilayer graphene. In this case, the two layers are connected in an usual Bernal configuration, but locally depart from each other\cite{Hao2016,Wang2017}. It was noted previously that the formation of these kinds of structures has a strong impact on the transport properties of charge carriers in bilayer graphene systems\cite{Abdullah2017}. As a consequence, it was proposed to use these kinds of deformations to make devices that are layer-selective. \cite{Abdullah_2016,Lima2016,Brandimarte2017}. The work on electronic transport mentioned above considered a deformation of infinite length across which current flow was studied. However, it is also possible that the region where the two graphene layers are departing from each other is finite in size. These defects occur naturally\cite{Yan2016,Schmitz2017a,Clark_2014}, or one can imagine that such structure can be created by intercalating nano-clusters of atoms in-between the neighbouring sheets\cite{Kim2011a} or even deliberately grow such structures on graphene sheets decorated with nanostructures\cite{Scheerder2017}. The basic structure of a blisters is depicted in Fig. \ref{fig-GQB}(a) and is called a graphene quantum blister (GQB)\cite{Abdullah2018}. A rigorous control of the charge carriers is indispensable in electronic devices fabrication. Essentially, this requires a perfect confinement of the charge carriers as well as external tunability. Unfortunately, perfect electrostatic confinement in graphene is precluded by Klein tunneling and only quasi-confined states with a finite trapping lifetime are allowed\cite{Matulis2008} or by applying a uniform magnetic filed\cite{Giavaras2012}. Apart from the electrostatic confinement, different routs have been proposed to trap electrons in single layer graphene. For example, introducing a gap induced by the substrate\cite{Giavaras2011,Giavaras2010,Recher2009} or cutting a graphene flake into small areas\cite{Hewageegana2008,Costa2014,Mirzakhani2016,Zarenia2010,Zebrowski2013}. However, these proposal associate with some experimental dificulties such as the high sensitivity of QDs to their precise terminations and the control of the induced gap by the dielectric substrates. This hampered deployment of graphene in electronic devices. Recently, many experiments\cite{Zhao2015,Ghahari2017,Gutierrez2016,Lee2016,Freitag2016} have realized such quasi-confined states in quantum dots (QDs) through different approaches. For example, by employing the electrostatic potential induced by the tip of the scanning tunneling microscope (STM) \cite{Zhao2015} or in the presence of a strong magnetic field\cite{Freitag2016}. A GQB not only supports electrostatic confined states with infinite trapping lifetime but also allows external electrostatic tunability. Moreover, its electronic properties are amenable to direct STM measurements\cite{Morgenstern2017}. An alternative way followed in the quest for electronic confinement in graphene uses bilayer graphene as a basis \cite{Mueller2014,J.MiltonPereira2007,Zarenia2009}. For these systems the electronic energy spectrum is parabolic instead of linear as is the case in single layer graphene, and can be gapped by applying a potential bias to the two layers \cite{McCann2006}. By nano-engineering electrostatic gates such that the bilayer graphene spectrum is gapped everywhere except in a locally defined region, charge carriers can indeed be confined \cite{J.MiltonPereira2007}. However, in practice it is challenging to engineer the gates such that the bias profile has the desired shape and the resulting confined electron states loose their interesting ultra-relativistic character. A GQB is a peculiar system, especially in the presence of an external electric field. Indeed, the two graphene layers are nearly delaminated in the center of the blister, while they are composed into Bernal stacking outside of the GQB. Both a delaminated graphene layers and a Bernal bilayer have gapless energy spectra with massless Dirac Fermions for the former and massive Fermions for the latter\cite{Goerbig_2011,Rozhkov_2016,Castro_Neto_2009}. However, the response to an external electric field that results from the application of a potential difference between the two layers is fundamentally different for both systems. While for the delaminated layers the Dirac cones of each layer shift in energy, see Fig. \ref{fig-GQB}(d), a gap is opened in the Bernal bilayer spectrum \cite{Zhang_2009,Ohta_2006} as shown in Fig. \ref{fig-GQB}(e). As a consequence, electronic states with energy in the gap have to be confined in the vicinity of the blister. As such, the GQB becomes a quantum dot with a discrete energy spectrum. Recently, this GQB system\cite{Abdullah2018} has been introduced to achieve an ideal electrostatic confinement in a delaminated bilayer graphene of a Gaussian-dome shape. It also showed the ability of controlling the layer localization by an electrostatic gate for zero angular momentum. Here we consider the blister as delaminated bilayer graphene, which can be considered as monolayer-like system, that connected to AB-stacked bilayer graphene through an abrupt interface, see Fig. \ref{fig-GQB}(a). We systematically scrutinize the electronic properties of the confined states by inspecting the effect of different parameters such as inter-layer bias and coupling as well as size of the blister. Furthermore, within the four band Hamiltonian we present an analytical model to calculate the wave functions in GQB and the respective confined states as well as the local density of state. The characteristics of confined modes in GQBs are mainly sensitive to the global bias. Of particular importance, in the case of homogeneous bias, the confined modes are layer dependent and inherit the symmetry $E_{m,n}=E_{-m,n}$ where $m$ and $n$ are the angular and radial quantum numbers, respectively. On the other hand, considering pristine blisters or with non-homogenous bias leads to a different symmetry, namely, $E_{m,n}=-E_{-m,n}$ and the latter introduces degenerate modes at zero energy for non-zero angular momenta. Such modes live at the interface of the blister and are localised on different layers. Finally, the obtained energy spectrum is found to be robust with respect to changes in the inter-layer coupling inside the GQB and therefore the results obtained in this paper are expected to be widely visible in experiments. The paper is structured as follows. In Sec. \ref{Sec:Model}, we discuss how confinement can be realized and present the electronic model to calculate the bound states in GQB. In Sec. \ref{Results}, we investigate the effect of homogeneous and non-homogeneous inter-layer bias and discuss the character of the confined states. Finally, in Sec. \ref{Conclusions}, we draw our conclusions and highlight the main findings. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=1.96 in]{3DGQB1N_Revs42.pdf}\ \includegraphics[width=1.3 in]{QDN22F.pdf}\\ \ \ \ \ \ \ \ \ \ \includegraphics[width=2.7 in]{inter-coupling-N_Revs.pdf}\\ \includegraphics[width=2.7 in]{bands02-diff-gamma1-N.pdf}\\ \caption{(Color online) (a) Schematic pictures of the proposed circular GQB with radius R with Bernal stacking outside the blister as shown in panel (b). (c) Inter-layer distance and coupling as a function of $\rho$ along the green curve in (a), the dashed black curve represents the abrupt change in the inter-layer coupling at the interface R of the GQB. (d, e) energy spectrum inside and outside the GQB in the presence of a global interlayer bias $\delta$, respectively. Red and blue bands in (d) correspond to upper and lower layers inside the blister and $\gamma_{1}^{0}=0.38$ eV is the standard inter-layer coupling in AB-stacked bilayer graphene. The confinement is possible in the energy range $E<\left\vert \delta_{G} \right \vert$ delimited by the yellow region, where $\delta_{G}$ represents the direct energy gap defined in Eq.\eqref{eq_energy_range}.} \label{fig-GQB} \end{figure} \section{Electronic model}\label{Sec:Model} \subsection{Electrons in bilayer graphene} In Figs. \ref{fig-GQB}(a,b), we show schematically the atomic structure of a circular GQB with radius $R$. In the continuum limit, \textcolor{red}{} if the size of the GQB is much larger than the inter-atomic distance, one can describe charge carriers by a $4\times4$ tight-binding Hamiltonian written in the basis of orbital eigenfunctions of the four atoms making up the crystallographic unit cell of bilayer graphene\cite{McCann2006}. The labelling of the different atoms is shown in Fig. \ref{fig-GQB}(b). In the basis $\mathbf{\Psi}=(\Psi_{A 1},\Psi_{B 1},\Psi_{B 2},\Psi_{A 2})^{T}, $ the Hamiltonian in position representation in valley $K^{\tau}$ reads \begin{equation}\label{starting_Hamiltonian} \hat{H}^\tau(\vec{r})=\left( \begin{array}{cccc} \tau \delta & v_{\rm F}\hat{\pi}_{+}^{\tau} & \gamma_{1}(\vec{r}) & 0 \\ v_{\rm F}\hat{\pi}^{\tau}_{-} & \tau \delta & 0 & 0\\ \gamma_{1}(\vec{r}) & 0& - \tau \delta & v_{\rm F}\hat{\pi}^{\tau}_{-} \\ 0 & 0& v_{\rm F}\hat{\pi}^{\tau}_{+} & - \tau \delta \\ \end{array}% \right)~. \end{equation} In Eq. (\ref{starting_Hamiltonian}), $v_{\rm F}\sim 10^6~{\rm m/s}$ is the graphene Fermi velocity\cite{Castro_Neto_2009} and $\tau=(+1,-1)$ for the $K-$ and $K'-$valley, respectively. Furthermore, we have neglected skew hopping parameters that only affect the energy spectrum for very small energies\cite{Van_Duppen01_2013} and only retain $\gamma_{1}(\vec{r})$, the inter-layer coupling through van der Waals forces\cite{Li2009}. The quantity $\delta$ denotes the potential bias between the two layers and $\hat{\pi}_{\pm}^{\tau}$ are the momentum operators, which in polar coordinates become \cite{Mirzakhani2016} \begin{equation}\label{momentum_operator} \hat{\pi}_{\pm}^{\tau}=\frac{\hbar}{i} e^{\pm i\tau \phi}\left[ \frac{\partial}{\partial \rho} \pm \frac{i \tau}{\rho}\frac{\partial}{\partial \phi} \right]~. \end{equation} In Eq. \eqref{momentum_operator}, $\rho$ is the radial distance to the center of the blister and $\phi$ is the azimuthal angle. Notice that the momentum operator depends on the valley in which the charge carriers reside\cite{da_Costa_2015,Rycerz2007}. \subsection{Inter-layer coupling in a GQB} In Eq. \eqref{starting_Hamiltonian} the function $\gamma_{1}(\vec{r})$ describes the coupling between the two graphene layers. If we consider the GQB as in Fig. \ref{fig-GQB}(a) where the layers depart from each other in the form of a kink, one can describe the inter-layer distance $c(\vec{r})$ as \begin{equation} c(\vec{r}) = \frac{(c_{\rm M}-c_0)}{2} \left[ \tanh\left(\frac{-\rho+R_{\rm QB}}{\xi}\right)+3 \right]~, \label{inter_layer_distance} \end{equation} where $c_{0} \sim 0.33~{\rm nm}$ is the equilibrium inter-layer distance, $c_{\rm M}$ is the inter-layer distance at the center of the blister, $R_{\rm QB}$ is the radius of the blister, $\xi$ is the width of the interface between delaminated and AB-stacked bilayer graphene, and $\rho$ is the radial component. Because the inter-layer coupling strength $\gamma_{1}(\vec{r})$ arises from the overlap of two orbital eigenfunctions in the tight-binding formalism, its value decreases exponentially with increasing inter-layer distance. Following standard practice\cite{Lopes_dos_Santos_2007,Lopes_dos_Santos_2012,Donck2016}, we can write the inter-layer coupling function as \begin{equation} \gamma_{1}(\vec{r}) = \gamma^{0}_{1} \exp\left(-\beta \frac{c(\vec{r})-c_{0}}{c_{0}}\right)~. \label{gamma1_coupling} \end{equation} In Eq. \eqref{gamma1_coupling} we have introduced $\gamma_{1}^{0} = 0.38~{\rm eV}$ \cite{Xu_2010,Lobato_2011,Li2009} the equilibrium inter-layer coupling. The quantity $\beta/c_{0}$ is the inverse inter-layer coupling decay length. For the calculations in this paper we choose $\beta \sim 13.3$, as was used before to match with the values for the skew hopping parameters in twisted bilayer graphene\cite{Donck2016}. However, this value can be even larger when the blister is formed by insertion of nanoclusters in-between two graphene layers as these clusters screen the van der Waals interaction between the layers. By plugging Eq. \eqref{inter_layer_distance} into Eq. \eqref{gamma1_coupling}, one can calculate the radial dependence of the inter-layer coupling for a GQB. In Fig. \ref{fig-GQB}(c) we compare the lateral profile of the GQB to the strength of the inter-layer coupling at the same positions. Because the magnitude of the inter-layer coupling decreases exponentially with inter-layer distance, already for a very small change in inter-layer distance, the coupling is diminished. Outside the GQB, however, the coupling still attains the value $\gamma_{1}^{0}$. As a result, to a very good approximation it is safe to assume that the two graphene layers are decoupled for the entire size of GQB, while just outside the blister the layers are coupled. Hence, we assume in this work that the inter-layer coupling profile has an abrupt transition at position $R$ as shown in Fig. \ref{fig-GQB}(c) by the black-dashed line. However, the results were shown to be robust against a smoothed blister\cite{Abdullah2018}. \subsection{Electronic confinement} In Figs. \ref{fig-GQB}(d,e) we show the energy spectra, respectively, inside and outside the GQB under the application of a finite inter-layer bias $\delta$. Because of the lack of inter-layer coupling the energy spectrum is linear and gapless inside the GQB. The application of a different potential to both layers, therefore, shifts the Dirac point in energy. As a result, for every energy there are electron or hole states available. Outside the GQB, Fig. \ref{fig-GQB}(e) shows that the situation is substantially different. Because here the inter-layer coupling is strong, the inter-layer bias $\delta$ opens up a gap in the energy spectrum. In this region, only evanescent states are allowed and, therefore, the energy spectrum inside the GQB will be discrete and the corresponding modes are confined. The energy range where confinement appears is given by the range $\left[-\delta_{\rm G},\delta_{\rm G}\right]$, where $\delta_{\rm G}$ is related to the inter-layer bias as\cite{Abdullah_2017} \begin{equation} \delta_{\rm G} = \delta \left(1+4\frac{\delta^{2}}{\gamma_{1}^{2}}\right)^{-1/2}~. \label{eq_energy_range} \end{equation} In the following section we calculate the wavefunctions and the respective energy spectrum of the confined states in a GQB with an abrupt interface. For this, we first need to obtain the wavefunctions inside and outside the GQB and require continuity for each of the spinor components at the interface $\rho = R$ to find the energy eigenstates of the GQB in the presence of an inter-layer bias. In all calculations and results, the energy is scaled with the equilibrium inter-layer hopping parameter, $\gamma_1^{0}$, while $l = \hbar v_{\rm F} / \gamma_{1}^{0} \sim 1.65~{\rm nm}$ is the measure for the length scales. \subsection{Wavefunctions outside the GQB} In order to obtain the wavefunction outside the GQB, we solve the Schr\"{o}dinger equation $\hat{H}^{\tau}(\vec{r}) \Phi^{\tau}(\vec{r}) = E \Phi^{\tau}(\vec{r})$ for the Hamiltonian given in Eq. \eqref{starting_Hamiltonian} with $\gamma_{1}(\vec{r}) = \gamma_{1}^{0}$. The equation for the angle $\phi$ directly yields a relation between the phases of each spinor component. This means that the four-component wave function $\Phi^{\tau}(\vec{r})$ in the $\tau$ valley can be written as\cite{Mirzakhani2016} \begin{equation}\label{wave_spinor_angular} \mathbf{\Phi^{\tau}}(\vec{r})=\left( \begin{array}{cccc} \phi_{A1}^{\tau}(\rho)e^{im\phi}\\ i\phi_{B1}^{\tau}(\rho)e^{i(m-\tau)\phi}\\ \phi_{B2}^{\tau}(\rho)e^{im\phi}\\ i\phi_{A2}^{\tau}(\rho)e^{i(m+\tau)\phi} \end{array} \right)~. \end{equation} Solving the Schr\"odinger equation for the radial functions $\phi^{\tau}_{i}(\rho)$, we obtain the following set of coupled equations: \begin{subequations} \begin{eqnarray} &&\left[\frac{d}{d\rho}-\frac{(\tau m-1)}{\rho}\right]\phi_{B1}^{\tau}=(E-\tau\delta)\phi_{A1}^{\tau}-\phi_{B2}^{\tau}~,\label{eq-06}\\ && \left[\frac{d}{d\rho}+\frac{\tau m}{\rho}\right]\phi_{A1}^{\tau}=-(E-\tau\delta)\phi_{B1}^{\tau}~,\label{eq-07}\\ &&\left[\frac{d}{d\rho}+\frac{(\tau m+1)}{\rho}\right]\phi_{A2}^{\tau}=(E+\tau\delta)\phi_{B2}^{\tau}-\phi_{A1}^{\tau}~,\label{eq-08}\\ &&\left[\frac{d}{d\rho}-\frac{\tau m}{\rho}\right]\phi_{B2}^{\tau}=-(E+\tau\delta)\phi_{A2}^{\tau}~.\label{eq-09} \end{eqnarray} \end{subequations} We remind the reader that in this set of equations, the energetic quantities are scaled with $\gamma_{1}^{0}$ and the radial component $\rho$ by $l$, yielding dimensionless equations. The set of first-order differential equations can be written as a single fourth-order differential equation. As explained previously\cite{Xavier2010}, this fourth-order differential equation has two sets of orthogonal solutions given by the solutions of the following second-order differential equations: \begin{equation}\label{eq-10} \left[\frac{d^{2}}{d\rho^{2}}+\frac{1}{\rho}\frac{d}{d\rho}-\left( \frac{m^{2}}{\rho^{2}}+\alpha_{\pm}^{2} \right)\right]\phi_{A1}^{\tau}(\rho)=0~. \end{equation} The two equations only differ by the value of \begin{equation} \alpha_{\pm}^{2}=-(E^{2}+\delta^{2})\pm\sqrt{(E^{2}-\delta^{2})+4E^{2}\delta^{2}}~. \label{alpha_equation} \end{equation} In the energy range where confinement is expected, the square root of Eq. \eqref{alpha_equation} is imaginary. As a consequence, the solutions to Eq. \eqref{eq-10} are Bessel functions with a complex argument\cite{abramowitz1964handbook}. Because we are outside of the GQB, the spinor components need to be finite in the limit $\rho\rightarrow \infty$, so we choose the modified Bessel function of the second kind $K_{m}(\alpha_{\pm} \rho)$ as solutions. Finally, notice that $\alpha_{+} = \alpha_{-}^{*}$, such that the two independent solutions of Eq. \eqref{eq-10} can be written as a superposition of the real and imaginary part of $K_{m}(\alpha_{\pm} \rho)$, and we have \begin{subequations} \begin{equation}\label{eq-11} \phi_{A1}^{\tau}(\rho)=C_{1}^{\tau}\Re \left[ K_{m}(\alpha_{+} \rho) \right]+C_{2}^{\tau}\Im \left[ K_{m}(\alpha_{-} \rho) \right], \end{equation} Using Eqs.(\ref{eq-06}-\ref{eq-09}) we can obtain the other components explicitly as \begin{widetext} \begin{equation}\label{eq-12} \phi_{B1}^{\tau}(\rho)=\frac{1}{(E-\tau \delta)}\left( C_{1}^{\tau}\Re \left[\alpha_{+} K_{m-\tau}(\alpha_{+} \rho) \right]+C_{2}^{\tau}\Im \left[\alpha_{-} K_{m-\tau}(\alpha_{-} \rho) \right] \right)~, \end{equation} \begin{equation}\label{eq-13} \phi_{B2}^{\tau}(\rho)=\frac{1}{(E-\tau \delta)}\left( C_{1}^{\tau}\Re \left[\eta^{+} K_{m}(\alpha_{+} \rho) \right]+C_{2}^{\tau}\Im \left[\eta^{-} K_{m}(\alpha_{-} \rho) \right] \right)~, \end{equation} \begin{equation}\label{eq-14} \phi_{A2}^{\tau}(\rho)=\frac{1}{(E^{2}- \delta^{2})}\left( C_{1}^{\tau}\Re \left[\eta^{+}\alpha_{+} K_{m+\tau}(\alpha_{+} \rho) \right]+ C_{2}^{\tau}\Im \left[\eta^{-}\alpha_{-} K_{m+\tau}(\alpha_{-} \rho) \right] \right)~. \end{equation} \end{widetext} \end{subequations} In these equations, we have introduced the compact notation $\eta^{\pm}=\alpha_{\pm}^{2}+(E-\tau \delta)^{2}$. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=3.5 in]{energy-levels-SG-BG-bias-tryN.pdf}\ \vspace{0.cm} \caption{Energy levels of the GQB as a function of its radius with the same bias inside and outside the GQB $\delta_{<}=\delta_{>}=0.25 \gamma_{1}$. Gray dashed curves correspond to the first energy levels of a biased bilayer nano-disk.}\label{GQB_energy_levels_same_bias} \end{figure} \subsection{Wavefunctions inside the GQB} Inside the GQB the inter-layer coupling vanishes and, therefore, in Eq. \eqref{starting_Hamiltonian} we have to put $\gamma_{1}(\vec{r})=0$. Although the angular solution of the Schr\"{o}dinger equation stays the same as in Eq. \eqref{wave_spinor_angular}, the set of radial equations changes to \begin{subequations} \begin{eqnarray} &&\left[\frac{d}{d\rho}-\frac{(\tau m-1)}{\rho}\right]\phi_{B1}^{\tau}=(E-\tau\delta)\phi_{A1}^{\tau}\label{eq-16}~,\\ && \left[\frac{d}{d\rho}+\frac{\tau m}{\rho}\right]\phi_{A1}^{\tau}=-(E-\tau\delta)\phi_{B1}^{\tau}\label{eq-17}~,\\ &&\left[\frac{d}{d\rho}+\frac{(\tau m+1)}{\rho}\right]\phi_{A2}^{\tau}=(E+\tau\delta)\phi_{B2}^{\tau}\label{eq-18}~,\\ &&\left[\frac{d}{d\rho}-\frac{\tau m}{\rho}\right]\phi_{B2}^{\tau}=-(E+\tau\delta)\phi_{A2}^{\tau}\label{eq-19}~. \end{eqnarray} \end{subequations} In this case, the set of equations is already decoupled for each layer. This allows to find a second-order differential equation for each layer as \begin{equation}\label{eq-20} \left[\frac{d^{2}}{d\rho^{2}}+\frac{1}{\rho}\frac{d}{d\rho}-\left( \frac{m^{2}}{\rho^{2}}-\mu_{\pm}^{2} \right)\right]\phi_{B2/A1}^{\tau}(\rho)=0. \end{equation} In Eq. \eqref{eq-20}, $\mu_{\pm}=E\pm \tau\delta$ and the subscript of the function $\phi_{i}^{\tau}(\rho)$ refers to $B1$ for $\mu_{+}$ and to $A1$ for $\mu_{-}$. The solutions of Eq. \eqref{eq-20} are Bessel functions. Dropping the ones singular at the origin, we find \begin{subequations} \begin{equation}\label{eq-21} \phi_{A1}^{\tau}(\rho)=D_{1}^{\tau} J_{m}(\mu_{-} \rho)~, \end{equation} and \begin{equation}\label{eq-23} \phi_{B2}^{\tau}(\rho)=D_{2}^{\tau} J_{m}(\mu_{+} \rho)~. \end{equation} \end{subequations} The other two components can then be found from Eqs. \eqref{eq-17} and \eqref{eq-19} and yield \begin{subequations} \begin{equation}\label{eq-22} \phi_{B1}^{\tau}(\rho)=-\tau D_{1}^{\tau} J_{m-\tau}(\mu_{-} \rho)~, \end{equation} and \begin{equation}\label{eq-24} \phi_{A2}^{\tau}(\rho)=\tau D_{2}^{\tau} J_{m+\tau}(\mu_{+} \rho)~. \end{equation} \end{subequations}\\ We are now in a position to find the eigenstates and energylevels of a GQB. For this, we need to equate the spinor components inside the GQB with those outside at position $\rho = R$. Doing so, one obtains a set of four equations for four unknowns that can be written in a matrix formalism as \begin{widetext} \begin{equation}\label{eq-05} \mathbf{M^{\tau}}\left( \begin{array}{cccc} D_{1}^{\tau}\\ D_{2}^{\tau}\\ C_{1}^{\tau}\\ C_{2}^{\tau} \end{array} \right)=\left( \begin{array}{cccc} -J_{m}(R\mu_{-}) & 0 & \Re[K_{m}(R\alpha_{+})] & \Im[K_{m}(R\alpha_{-})] \\ \tau J_{m-\tau}(R\mu_{-}) & 0 & \Re[b_+K_{m-\tau}(R\alpha_{+})] & \Im[b_{-}K_{m-\tau}(R\alpha_{-})]\\ 0 & -J_{m}(R\mu_{+})& \Re[c_+K_{m}(R\alpha_{+})]& \Im[c_{-}K_{m}(R\alpha_{-})] \\ 0 & -\tau J_{m+\tau}(R\mu_{+})& \Re[d_+K_{m+\tau}(R\alpha_{+})]& \Im[d_{-}K_{m+\tau}(R\alpha_{-}) \\ \end{array}% \right)\left( \begin{array}{cccc} D_{1}^{\tau}\\ D_{2}^{\tau}\\ C_{1}^{\tau}\\ C_{2}^{\tau} \end{array} \right)=0, \end{equation} \end{widetext} where $b_{\pm}=\alpha_{\pm}/(E-\tau\delta)$, $c_{\pm}=\left[ (E-\tau \delta)^2+\alpha_{\pm}^2 \right]/(E-\tau\delta)$, and $d_{\pm}=\alpha_{\pm}\left[ (E-\tau \delta)^2+\alpha_{\pm}^2 \right]/(E^{2}-\delta^{2}).$ The energy levels $E_{m,n}(R)$ of a GQB with radius $R$ can be found through the roots of the determinant of the matrix $\mathbf{M^{\tau}}$. Here, $n$ is the radial quantum number corresponding to $\vert n \vert$ modes in the radial direction that emerge with increasing the size of the blister. Subsequently, one can obtain the corresponding wavefunction by solving at the given energy and size $R$ for the coefficients $C^{\tau}_{i}$ and $D^{\tau}_{i}$ and obtaining the eigenwavefunction $\Phi^{\tau}_{m,n}(\vec{r})$. From this, the radial probability density (RPD) can be found as\cite{Cohnitz2016,Lain1981} % \begin{equation} \mathcal{P}_{m,n}^{\tau}(\rho) = \rho \left\vert \Phi_{m,n}^{\tau}(\vec{r})\right\vert^{2}~. \label{probability_density} \end{equation} Finally, the local density of states $\mathcal{D}(\vec{r},E)$ for a GQB with radius $R$ can be derived from the eigenstates as \begin{equation} \mathcal{D}(\vec{r},E) = \sum_{m,n} \delta(E - E_{m,n}) \left\vert \Phi_{m,n}^{\tau}(\vec{r})\right\vert^{2}~. \end{equation} In the numerical results displayed in the following section we will replace the Dirac function by a Gaussian profile with a finite spectral width $\Gamma$ \cite{Van_Duppen01_2013}. \section{Confined states in a GQB}\label{Results} \subsection{Homogeneous inter-layer bias} \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=3.4 in]{prob-dens-SG-BG-bias1-F1.pdf} \caption{ (a-h) Radial probability density of $m=0$ stats in Fig. \ref{GQB_energy_levels_same_bias}(a) labelled by (1-8), respectively. The green dashed vertical line represents the radius of the GQB. Note that the states close to the continuum spectrum are mainly localized outside the GQB and preferably on the disconnected sublattices A2 and B1 as indicated in panels (g) and (h), respectively.}\label{Radial_Probability_Density_same_bias} \end{figure} \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{Crossing_strengthF1.pdf} \vspace{0.cm} \caption{Radial probability density outside the blister of the states $E_{0,1}$ in Fig. \ref{GQB_energy_levels_same_bias}(a) labelled by yellow points (4,9,10). The green vertical line represents the radius of the GQB. } \label{RPD_Outside} \end{figure} Now we turn to the discussion of the numerical results for the energy levels in three configurations of GQBs. Specifically, we consider the bias inside the blister to be the same as outside, opposite, and zero. The first configuration is the simplest example, i.e. the case where a homogeneous inter-layer bias potential $\delta$ is applied to the entire system. In Fig. \ref{GQB_energy_levels_same_bias} we show the energy levels as a function of the size $R$ of the GQB for $m=0, \ldots, \pm 3$ with $\delta = 0.25~\gamma_{1}^{0}$. The results indicate that, indeed, for the energy range as defined in Eq. \eqref{eq_energy_range} the GQB has confined modes. Panel (a) of Fig. \ref{GQB_energy_levels_same_bias} shows that in the limit $R\rightarrow 0$, the GQB has two $m=0$ confined modes at energy $\pm \delta_{\rm G}$. As the radius of the GQB increases, the modes approach each other, anti-crossing one another around $E = 0$. As the radius increases further, more $m=0$ modes are allowed inside the GQB. For a given radius, these modes are denoted by the radial quantum number $n$. The number of the confined modes crucially depends on the strength of the applied bias outside the blister $\delta_{>}$ and its size $R$. The energy spectrum of the different modes form anti-crossings with each other. As a consequence, the energy levels oscillate with the size of the GQB. These anti-crossings are a manifestation of coupling of states. This coupling is established through the coupled layers outside the blister, where the confined states on upper and lower layer can feel each other. In panels (b) - (d) of Fig. \ref{GQB_energy_levels_same_bias} we show the energy levels for non-zero angular quantum number $m$. These modes are only supported at larger radii $R$ but their characteristic behavior is similar as the $m=0$ case shown in panel (a). Notice that the results are the same for positive as for negative $m$, i.e $E_{m,n}=E_{-m,n}$. This is in contrast with previous studies where the symmetry between both signs of the angular quantum number is broken.\cite{Recher2009,Costa2014,Mirzakhani2016} To investigate the character of the different energy levels and the behaviour at the anti-crossings, in Fig. \ref{Radial_Probability_Density_same_bias} we show the RPD for $m=0$ at different configurations as indicated by the points in Fig. \ref{GQB_energy_levels_same_bias}(a). We choose these points to be exactly at an anti-crossing, before, and after, and also near the continuum spectrum. Furthermore, we show the contribution of each sublattice to the probability density. Comparing for instance Figs. \ref{Radial_Probability_Density_same_bias}(a) and (b), we see that inside the GQB mainly holes reside on layer 1 while electrons reside on layer 2. In addition, we infer from Figs. \ref{Radial_Probability_Density_same_bias}(c,d) that at the anti-crossing electrons and holes are equally distributed on both layers. A transition in the residence of states takes place when passing an anti-crossing. The states with negative energy mainly reside on layer 2 instead of layer 1 before the anti-crossing point and vice versa for the positive one as shown in Figs. \ref{Radial_Probability_Density_same_bias}(e,f). This means that the modes $E_{0,\pm1}$ {\color{red} } anti-cross each other in Fig. \ref{GQB_energy_levels_same_bias}(a) and correspond mainly to states on one of the two layers before or after an anti-crossing. Peculiarly, however, in this configuration we find that states close to the continuum spectrum have also a large part of the probability located outside the GQB, see Figs. \ref{Radial_Probability_Density_same_bias} (g,h). % \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{Fig4K.pdf}\\ \caption{The radial probability density of $m=\pm1$ states in Fig. \ref{GQB_energy_levels_same_bias}(b) labelled by red and green dots. Top and bottom panels are for the $K-$valley. The green vertical line represents the radius of the GQB. Note that the layer RPD in the vicinity of the $K'-$valley is connected through $\left[ \mathcal{P}_{m,n}^{\tau}(\epsilon,\rho) \right]_{\rm Layer1} =\left[ \mathcal{P}_{m,n}^{-\tau}(\epsilon,\rho) \right]_{\rm Layer2}$ while the total radial probability density is the same in both valleys.} \label{Radial_Probability_Density_same_bias_m1} \end{figure} We can find the radii $R_j$ {\color{red} } at which anti-crossing occur through the following partitioning relation: \begin{subequations} \begin{equation}\label{condition_anticrossing_point} \int_{0}^{R_{j}}d\rho\left[ \mathcal{P}_{m,n}^{\tau}(\rho) \right]_{\rm Layer 1}=\int_{0}^{R_{j}}d\rho\left[ \mathcal{P}_{m,n}^{\tau}(\rho) \right]_{\rm Layer 2}, \end{equation} with \begin{equation} \left[ \mathcal{P}_{m,n}^{\tau}(\rho) \right]_{{\rm Layer}\ i}=\rho\left(\left\vert \phi^{m,n,\tau}_{Ai}(\rho) \right\vert^{2} +\left\vert \phi^{m,n,\tau}_{Bi}(\rho) \right\vert^{2}\right) \end{equation} where the radial part of the wave functions is normalized according to \begin{equation}\label{Normalization} 2\pi\int_{0}^{\infty}d\rho\sum_{i=1,2}\left[ \mathcal{P}_{m,n}^{\tau}(\rho) \right]_{{\rm Layer}\ i}=1. \end{equation} \end{subequations} In other words, two energy levels form an anti-crossing when the probability of finding a state inside the GQB is the same for both layers. Note that a point in the middle between two subsequent anti-crossings associated with modes $E_{m,n}$ also satisfies Eq. \eqref{condition_anticrossing_point}. This point coincides with the anti-crossing in the second pair of energy branches, i.e. $E_{m,\left\vert n \right\vert +1}$, in the spectrum as can be inferred from Fig. \ref{GQB_energy_levels_same_bias}(a). Using Eq. \eqref{condition_anticrossing_point}, we can find the radii $R_j$ where the anti-crossings occur for any pair of energy branches $E_{m,n}$. For example, the first three anti-crossings of the first pair of energy branches $E_{0,\pm1}$ in Fig. \ref{GQB_energy_levels_same_bias}(a) are located at $R_{j}=(8.30,20.74, 33.27)l$. In between these three anti-crossings there are two points, where both layers also contribute the same to the RPD inside the GQB, located at $R_{j}=(14.46,26.98)l$. For large GQB we notice that the strength of the anti-crossings becomes weaker. This is a result of leaking interaction between the two layers through the BLG outside the blister. In Fig. \ref{RPD_Outside} we show the RPD outside the GQB at the first three anti-crossings labelled by the yellow dots (4, 9, 10) in Fig. \ref{GQB_energy_levels_same_bias}(a). We see that the interaction between states on both layers becomes smaller with increasing the radius of GQB. Hence, in the limit $R\rightarrow \infty$ we expect the RPD to be zero outside the GQB and as result the anti-crossings will vanish and the states will be completely localized inside the blister. In this case, the GQB can be seen as a biased bilayer graphene nano-disk. We superimpose the first energy levels of a biased bilayer nono-disk with the respective angular momentum as gray dashed curves on Fig. \ref{GQB_energy_levels_same_bias}. For a bilayer nano-disk we implement hard wall boundary conditions and the energy levels can be found by solving \begin{equation} J_{m}(\mu_{+} R)=0, \ J_{m}(\mu_{-} R)=0 \end{equation} The asymptotic behaviors of bessel function for small and large argument are \begin{equation}\label{asympt_Bessel0} J_{0}(x)=\begin{cases}\sqrt{2/\pi x} \cos\left( x-\pi/4 \right)& x\rightarrow \infty\\1-x^{2}/4 &x\rightarrow 0 \end{cases}, \end{equation} using Eq.\eqref{asympt_Bessel0} one can show that $E\sim1/R$ for small and large size of bilayer nano-disk. For $m\neq0$, we investigate the contribution of the two layers to the probability density for only $m=\pm1$ as shown in Fig. \ref{Radial_Probability_Density_same_bias_m1} , and the findings also apply for $\left\vert m \right\vert>1$. We choose two points before the first anti-crossing of the modes $E_{1,\pm1}$ marked by red and green dots in Fig. \ref{GQB_energy_levels_same_bias}(b). Because of the symmetry between $m$ and $-m$ in this case $(E_{m,n}=E_{-m,n})$, these two points correspond to four modes as indicated in Fig. \ref{Radial_Probability_Density_same_bias_m1} .We see that the states $m=\pm1$ with negative energy (green dot) mainly reside on the lower layer and vice versa for states with positive energy. This corresponds to the case with $m=0$ and it also holds here for the modes $E_{\pm1,\left\vert n \right\vert>1}$. Similar to the spectrum of $m=0$, the radii for which the energy forms anti-crossings can be also found using Eq. \eqref{condition_anticrossing_point}. Notice that from the top panel of Fig. \ref{Radial_Probability_Density_same_bias_m1} the RPD acquires the layer symmetry \begin{subequations} \begin{equation} \left[ \mathcal{P}_{m,n}^{\tau}(E,\rho) \right]_{\rm Layer1} =\left[ \mathcal{P}_{-m,n}^{\tau}(-E,\rho) \right]_{\rm Layer2}. \end{equation} In the bottom panel of Fig. \ref{Radial_Probability_Density_same_bias_m1}, we show the same results as in the top panel but in the vicinity of the $K'-$valley. Comparing top and bottom panels of Fig. \ref{Radial_Probability_Density_same_bias_m1}, we find that the RPD also attains the following symmetry \begin{equation} \left[ \mathcal{P}_{m,n}^{\tau}(E,\rho) \right]_{\rm Layer1} =\left[ \mathcal{P}_{m,n}^{-\tau}(E,\rho) \right]_{\rm Layer2}, \end{equation} \begin{equation} \left[ \mathcal{P}_{m,n}^{\tau}(E,\rho) \right]_{{\rm Layer}\ i} =\left[ \mathcal{P}_{-m,n}^{-\tau}(-E,\rho) \right]_{{\rm Layer}\ i}. \end{equation} \end{subequations} Note that even though the RPD of each layer is different in each valley, the total RPD is the same in both valleys. In Fig. \ref{LDOS_vs_rho_E} we show the local density of states for a GQB of fixed size $R=15~l$ as a function of the energy and distance from the origin for both layers. The results show that the layer selectivity of the modes is not only present for $m=0$, but also for the higher angular quantum numbers. Very pronounced is for example the $m=\pm 1$ mode that is strongly localized on layer 1 for negative energy and on layer 2 for positive energy. Such tunable layer localization was recently also observed on topological states in AB-BA domain walls in bilayer graphene\cite{Jaskolski2018}. Furthermore, the LDOS also shows that states with $\vert m \vert >1$ are not positioned at the center of the GQB, but more towards the edge or even outside the GQB in a classically forbidden region, specially, for those states close to the continuum spectrum. For example, the modes $\epsilon_{1,\pm5}$ exist near the continuum spectrum of the AB-BLG and meanly localized outside the blister that is about $R/3$ far from the blister's edge. Note that the closed the modes to the continuum the far localized from the edge outside the blister. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{LDOS3-ColorF_Revs.pdf}\ \vspace{0.cm} \caption{ LDOS of the GQB for layer 1 (left) and layer 2 (right), with $R=15l$ and $\delta_{<}=\delta_{>}=0.25\gamma_1^0$. The spectral width of the Gaussian profile is $\Gamma=0.02\delta_{>}$. The dashed green vertical lines represent the radius of the GQB.} \label{LDOS_vs_rho_E} \end{figure} \subsection{Non-homogeneous inter-layer bias} In the previous section we have considered the most straightforward case in which the inter-layer bias is the same in all parts of the sample. However, if the blister is formed by encapsulation of a metal colloid, the applied electric field also induces a dipole in the metallic nanoparticle. This will change the electrostatic potential on each layer. As a result, it can be strongly reduced inside the GQB with respect to outside it. To incorporate this difference, we investigate the case for which the inter-layer bias inside the GQB, $\delta_{<}$, is smaller than the bias $\delta_{>}$ outside. In Fig. \ref{GQB_energy_levels_zero_bias} we show the energy levels of a GQB with vanishing $\delta_{<}$ inside as a function of the radius of the blister for different values of the angular quantum number $m$. In this case, the energy levels do not show anti-crossings and approach each other as the size of the GQB increases in a monotonous way. In Fig. \ref{GQB_energy_levels_zero_bias}(a) we show the energy spectrum of the state with zero angular momentum. Here, contrary to the homogeneous bias case, each energy branch corresponds to states residing on a specific layer inside the GQB for any $R$. In Fig. \ref{Radial_Probability_Density_zer_bias_m0} we show the RPD for different energy branches, labelled by yellow dots in Fig. \ref{GQB_energy_levels_zero_bias}(a). States on the first energy branch $E_{0,-1}$ reside on the lower layer, see Fig. \ref{Radial_Probability_Density_zer_bias_m0}(a). While for the second branch $E_{0,-2}$, the states along it reside on the upper layer as shown in Fig. \ref{Radial_Probability_Density_zer_bias_m0}(b). Similarly the third $E_{0,-3}$ and fourth $E_{0,-4}$ branches, marked by points 3 and 4 in Fig. \ref{GQB_energy_levels_zero_bias}(a), the states reside mainly on the lower and upper layer respectively. This is illustrated in Figs. \ref{Radial_Probability_Density_zer_bias_m0}(c,d). Note that for the counterpart branches in the positive energy regime, the modes residence is opposite compared to the negative energy branches. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{energy-levels-SG-BG-zero-bias.pdf}\ \vspace{0.cm} \caption{Energy levels of the GQB as a function of its radius with different bias inside and outside the GQB $\delta_{<}=0$ and $ \delta_{>}=0.25 \gamma^0_{1}$. Solid (dashed) curves are for $m > 0$ ($m < 0$) where yellow horizonal lines delimit the gap outside the GQB. } \label{GQB_energy_levels_zero_bias} \end{figure} For non-zero values of the angular quantum number, however, the symmetry between positive and negative $m$ is broken. This is most clear in the first pair of modes $E_{m>0,\pm1}$ in panels (b) - (d) in Fig. \ref{GQB_energy_levels_zero_bias}. The lowest of the two is only possible for negative $m$ modes, while the highest is for positive $m$. These two modes, labelled by green and red dots in Figs. \ref{GQB_energy_levels_zero_bias}(b-d), are mainly localized at the interface of the blister as can be seen in Fig. \ref{Radial_Probability_Density_zero_bias_m123}. Moreover, inside the blister they mainly reside on the upper and lower layer for $m<0$ and $m>0$, respectively, as shown in Fig. \ref{Radial_Probability_Density_zero_bias_m123}. It turns out that they significantly reside on the disconnected sublattices A2 and B1 for the negative and positive angular momentum, respectively, as shown in Figs. \ref{Radial_Probability_Density_zero_bias_m123}(a-f). The appearance of these localized modes at the interface of the blister is one of its quintessential traits. Reminding ourselves that the lowest modes mainly reside on the upper layer while the upper modes reside on the lower layer, it follows that small GQBs only can support modes with a positive angular momentum on the lower layer while the negative angular momentum-modes reside on the upper layer. For large $R$, we notice that the broken symmetry between the negative and positive angular momentum is almost restored for modes whose radial quantum number $\left\vert n \right\vert >1$ such that $E_{m,n}(R) \approx E_{-m,n}(R)$ as shown in Figs. \ref{GQB_energy_levels_zero_bias}(b-d). The contribution of each layer to these modes is exactly the same as in the case of $m=0$ discussed in Fig. \ref{GQB_energy_levels_zero_bias}(a). For example, in the case of $m=\pm 1$, the first pair of modes labelled by the red circles in Fig. \ref{GQB_energy_levels_zero_bias}(b), mainly reside on the lower and upper layer for modes whose energy is negative and positive, respectively. The opposite occurs for the second pair of modes, labelled by the black circles, and such trend also holds for $\left\vert m \right\vert>1.$ \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{RPD_zero_bias_m0.pdf} \caption{ (a-d) Radial probability density of the $m=0$ states in Fig. \ref{GQB_energy_levels_zero_bias}(a) labelled by (1-4), respectively. The green vertical line represents the radius $R=30l$ of the GQB. }\label{Radial_Probability_Density_zer_bias_m0} \end{figure} In general, the energy levels still retain the following symmetry\cite{Xavier2010} \begin{equation} E_{m,n}(R) = -E_{-m,n}(R)~. \label{overall_symmetry} \end{equation} That this relation holds can be seen in Fig. \ref{energy_levels_angular_depend} where the energy levels in a GQB with radius $R=20~l$ are plotted for a homogeneous inter-layer bias (panel (a)) compared with the case for a vanishing inter-layer bias (panel (b)) in the GQB. The results show that by changing the inter-layer bias inside the GQB, the $m=0$ modes are pushed away from each other while for the modes with finite angular momentum it even allows the total number of states in the GQB to be reduced. Note that considering inter-layer bias inside the blister that is smaller than outside and finite also allows confinement. The confined modes in this case still posses anti-crossings but at larger radius $R$. It also shows that for non-zero angular momentum the symmetry with respect to the sign of $m$ remains strongly broken for small $R$, but that the modes with opposite $m$ make a transition between different radial quantum number $n$. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth ]{RPD_zero_bias_m123.pdf} \caption{ (a-f) Radial probability density of $m=\pm(1,2,3)$ states in Fig. \ref{GQB_energy_levels_zero_bias}(b,c,d) labelled by green and red dots, respectively. The green vertical line represents the radius of the GQB $R=30l$. }{\color{green} } \label{Radial_Probability_Density_zero_bias_m123} \end{figure} Finally, in Fig. \ref{GQB_energy_levels_diff_bias} we show the energy levels in the case when the bias inside the GQB is opposite to outside, i.e. $\delta_{<} = -\delta_{>}$. The $m=0$ result looks similar to the case of a homogeneous bias, but they are slightly different, i.e. $E_{0,n}(R,\delta_{<}) \neq E_{0,n}(R,-\delta_{<})$. For example, the first three anti-crossing points associated with the first pair of energy branches $E_{0,\pm1}$ are located at $R_{j}=(10.93,23.42,35.96)l$. The anti-crossings occur for slightly larger GQB in comparison with the homogeneous inter-layer bias case. Of particular importance is also the layer residency of states, where before the anti-crossing the states with negative energy mainly resided on the upper layer inside the GQB and vice versa for states with positive energy. This can be understood by considering the blister to be pure electron or hole doped\cite{Abdullah2018}. Note that this is exactly the opposite to what happened in the case with homogeneous bias. For a finite angular momentum, the results in Fig. \ref{GQB_energy_levels_diff_bias} show that the modes get pushed into each other, forming anti-crossings when the angular momentum quantum number is the same, while it crosses when $m$ is opposite. As a result, for a given inter-layer bias, there is a radius $R$ for which each of the non-zero $m$ modes are degenerate at $E_{m,1} = -E_{-m,1} = 0$. We notice that the results of non-homogeneous bias also attains the symmetry $E_{m,n}(R) = -E_{-m,n}(R)$. In Fig. \ref{Radial_Probability_Density_opp_bias_m1}, we show the RPD of the modes $\epsilon_{1,1}$ and $E_{-1,1}$ at different radii indicated by the yellow dots in Fig. \ref{GQB_energy_levels_diff_bias}(b). It is evident from Figs. \ref{Radial_Probability_Density_opp_bias_m1}(a,b), that the degenerated modes $E_{\pm1,1}=0$, labelled by point 1 in Fig. \ref{GQB_energy_levels_diff_bias}(b), are mainly localized at the interface of the blister. These modes are primarily confined on the upper and lower layer inside the GQB for positive and negative angular momentum, respectively, as can be seen from Figs. \ref{Radial_Probability_Density_opp_bias_m1}(a,b). While at points 2 and 3 the two layers contribute exactly the same to the confinement of the two states $ E_{\pm1,1}=\mp0.1 \gamma_{1}^{0} $ as shown in Figs. \ref{Radial_Probability_Density_opp_bias_m1}(c,d). Then, a transition occurs in the layer confinement, where at the points 4 and 5 the states $ E_{\pm1,1}=\mp0.06 \gamma_{1}^{0} $ principally reside on the upper and lower layer for positive and negative angular momentum, respectively. The behaviour of the rest of modes $E_{\pm1,\left\vert n \right\vert>1}$ resembles that of the case $m=0$ in Fig. \ref{GQB_energy_levels_diff_bias}(a). This means that before and after anti-crossings, the states with negative and positive angular momentum reside on the upper and lower layer, respectively, while at the anti-crossings they are equally distributed. Analogously for $\left\vert m \right\vert>1$, we find that modes behave similarly to the case of $m=\pm1$. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{m-vs-E1.pdf}\ \vspace{0.cm} \caption{ Energy levels of a GQB as a function of angular momentum label m for $R=20l$ and $\delta_{>}=0.25\gamma_{1}^{0}$ and for different values of $\delta_{<}$. } \label{energy_levels_angular_depend} \end{figure} \subsection{Effect of the inter-layer coupling} The inter-layer coupling $\gamma_{1}$ inside the GQB decreases very fast as the height of the blister increases However, if the blister is small and the layers in the blister remain loosely coupled, it is expected to show a band gap that is much smaller than outside the blister. Therefore, one also expects to find confined modes in this case. In this section, we investigate the energy levels of a non-zero inter-layer coupling in a GQB. In general, for a fixed gap outside the blister, the number of anti-crossings and their location mainly depend on the bias inside the blister. This allows to control the confinement to be mainly localized on a specific layer. In Fig. \ref{GQB_energy_levels_bias-diff_gamma1} we show the energy levels of a GQB with a homogeneous inter-layer bias but different inter-layer coupling inside the blister as a function of the radius $R$. We see that for small radii, the energy levels are similar to the case of a completely decoupled blister, but that as the GQB grows, the energy levels do not cross the gap formed inside the GQB. As a consequence, for large $R$ the oscillations of the lowest positive energy level are decreased and this level approaches the value of $\delta_{\rm G}$, dashed yellow lines, from Eq. \eqref{eq_energy_range} calculated with the inter-layer coupling inside the blister. Finally, the results in the current paper can be elegantly verified by measuring the conductance of electrons through the GQB. According to a recent experiment\cite{Gutierrez2016}, a quantum dot with the size of few nanometers was realized and its electronic spectrum was probed by STM measurements. Thuse, The same approach can be used to prob the electronic spectrum of the GQB. The ideal setup for this purpose is to apply a homogeneous bias to the GQB of strength that allows few modes to be confined within few nanometers size of the blister. The regime where the electronic properties of the GQB can be amenable to STM measurements restricted to a global bias of strength in the range $\backsim(30-100)$ meV with the size $R$ of the order $\backsim (15-40)$ nm. Note that even the bias is not completely homogeneous or the inter layer coupling inside the blister is not strictly zero, confined states still exist. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{GQB-delta-min.pdf}\ \vspace{0.cm} \caption{Energy levels of the GQB as a function of its radius opposite bias inside and outside the GQB with $\delta_{>}=-\delta_{<}=0.25 \gamma^{0}_1$. Solid (dashed) curves are for $m > 0$ ($m < 0$) where yellow horizonal lines delimit the gap outside the GQB. \textcolor{blue}{}} \label{GQB_energy_levels_diff_bias} \end{figure} \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{Fig13.pdf} \caption{ (a-f) Radial probability density of states $\epsilon_{\pm1,\pm1}$ in Fig. \ref{GQB_energy_levels_diff_bias}(b) labelled by points (1-5). The green vertical line represents the radius of the GQB. {\color{green} } } \label{Radial_Probability_Density_opp_bias_m1} \end{figure} \section{Conclusions}\label{Conclusions} In this paper, we used the continuum model to analytically calculate the wave functions and thus the discrete energy levels of bound states trapped in a locally delaminated bilayer graphene system that is called GQB. We have investigated the energy spectrum and eigenstates of such system under the application of an electrostatic potential difference between the graphene layers. We considered three situations where the bias inside the blister is the same as outside, opposite, and zero. The energy spectrum of GQB is layer localized where the confined states localized on either layer or fairly distributed. For a biased blister, as the radius of the GQB increases, the energy levels show anti-crossings when the occupation inside the GQB is the same on both layers. For small size of GQB, the localized states on each layer can feel each other through the AB-BLG flakes outside the blister leading to strong anti-crossings that steadily decreasing with increasing the blister's size. These anti-crossings disappear in case we consider pristine blister; however, the layer localization is still maintained. When a non-homogenous bias is applied to GQB, we found that the system can support edge modes with finite angular momentum. These modes reside mainly on one layer, while the mode with opposite angular momentum resides on the other layer. In addition, the confined modes exhibit certain symmetry that can be altered by the electrostatic bias such that $E^{(e)}_{n,m}=E^{(h)}_{n,\mp m}$ with $-(+)$ corresponds to zero (homogenous) bias inside the blister. Finally, we have shown that the electronic confinement also occurs if the decoupling of both layers is not perfect. By assessing the effect of a residual decrease of inter-layer coupling inside the blister, we showed that outside the energy gap, confined states are also expected. With this paper, we show that GQBs can form an interesting platform for new types of graphene-based\newpage quantum dot systems. As the creation of the dot can be solely tuned by application of a gate to a blistered system, we expect that the work in this manuscript can be elegantly verified by STM measurements. \begin{figure}[t!] \vspace{0.cm} \centering\graphicspath{{./Figures/}} \includegraphics[width=\linewidth]{energy-levels1-SG-BG-bias-diff-gamma1.pdf} \caption{Energy levels of GQB with different strength of the inter-layer coupling inside it, where yellow-horizonal dashed and solid lines delimit the gap inside and outside the GQB, respectively, with $\delta_{<}=\delta_{>}=0.25 \gamma_{1}^{0}$.} \label{GQB_energy_levels_bias-diff_gamma1} \end{figure} \section*{Acknowledgments} HMA and HB acknowledge the Saudi Center for Theoretical Physics (SCTP) for their generous support and the support of KFUPM under physics research group projects RG1502-1 and RG1502-2. This work is supported by the Flemish Science Foundation (FWO-Vl) by a post-doctoral fellowship (BVD).
\section{Introduction} \IEEEPARstart{X}{-ray} computed tomography (CT) is one of the most popular medical imaging methods for screening, diagnosis, and image-guided intervention~\cite{brenner2001estimated}. Potentially, high-resolution (HR) CT (HRCT) imaging may enhance the fidelity of radiomic features as well. Therefore, super-resolution (SR) methods in the CT field are receiving a major attention~\cite{park2003super,greenspan2008super}. The image resolution of a CT imaging system is constrained by x-ray focal spot size, detector element pitch, reconstruction algorithms, and other factors. While physiological and pathological units in the human body are on an order of 10 microns, the in-plane and through-plane resolution of clinical CT systems are on an order of submillimeter or 1 $mm$~\cite{greenspan2008super,schwarzband2005point}. Even though the modern CT imaging and visualization software can generate any small voxels, the intrinsic resolution is still far lower than what is ideal in important applications such as early tumor characterization and coronary artery analysis~\cite{hassan2011technical}. Consequently, how to produce HRCT images at a minimum radiation dose level is a holy grail of the CT field. \begin{figure*}[!ht] \begin{center} \includegraphics[width=7.0in]{overall_framework.pdf} \caption{Proposed GAN framework for SR CT imaging. Our approach uses two generators $G$ and $F$, and the corresponding adversarial discriminators $D_{X}$ and $D_{Y}$ respectively, where $X$ and $Y$ denote a LR CT image and $Y$ is the HR CT counterpart. To regularize the training and deblurring processes, we utilize the generator-adversarial loss ($adv$), cycle-consistency loss ($cyc$), identity loss ($idt$), and joint sparsifying transform loss ($jst$) synergistically. In the supervised/semi-supervised mode, we also apply a supervision loss ($sup$) on $G$ and $F$. For brevity, we denote $G: X\to Y$ and $F: Y \to X$ as $G$ and $F$ respectively.}\label{fig: overall} \end{center} \end{figure*} In general, there are two strategies for improving CT image resolution: (1) hardware-oriented and (2) computational. First, more sophisticated hardware components can be used, including an x-ray tube with a fine focal spot size, detector elements of small pitch, and better mechanical precision for CT scanning. These hardware-oriented methods are generally expensive, increase the CT system cost and radiation dose, and compromise the imaging speed. Especially, it is well known that high X radiation dosage in a patient could induce genetic damages and cancerous diseases~\cite{brenner2007computed,de2004risk}. As a result, the second type of methods for resolution improvement~\cite{la2006penalized,vannier1996iterative,wang1998spiral,robertson1997total,jiang2003blind,jiang2002blind,wang2005blind} is more attractive, which is to obtain HRCT images from LRCT images. This computational deblurring job is a major challenge, representing a seriously ill-posed inverse problem~\cite{greenspan2008super,tian2011survey}. Our neural network approach proposed in this paper is computational, utilizing advanced network architectures. More details are as follows. To reconstruct HRCT images, various algorithms were proposed. These algorithms can be broadly categorized into the following classes: (1)~\textit{Model-based reconstruction methods}~\cite{zhang2014model,bouman1996unified,yu2011fast,sauer1993local,thibault2007three}: These techniques explicitly model the image degradation process and regularize the reconstruction according to the characteristics of projection data. These algorithms promise an optimal image quality under the assumption that model-based priors can be effectively imposed; and (2)~\textit{Learning-based (before deep learning) SR methods}~\cite{yang2010image,wang2015learning,jiang2018super,zhang2012reconstruction,dong2011image}: These methods learn a nonlinear mapping from a training dataset consisting of paired LR and HR images to recover missing high-frequency details. Especially, sparse representation-based approaches have attracted an increasing interest since it exhibits strong robustness in preserving image features, suppressing noise and artifacts. Dong~\textit{et al.}~\cite{dong2011image} applied adaptive sparse domain selection and adaptive regularization to obtain excellent SR results in terms of both visual perceptions and PSNR. Zhang~\textit{et al.}~\cite{zhang2012reconstruction} proposed a patch-based technique for SR enhancements of 4D-CT images. These results demonstrate that learning-based SR methods can greatly enhance overall image quality but the outcomes may still lose image subtleties and yield blocky appearance. Recently, deep learning (DL) has been instrumental for computer vision tasks~\cite{lecun1998gradient,lecun2015deep,krizhevsky2012imagenet}. Hierarchical features and representations derived from a convolutional neural network (CNN) are leveraged to enhance discriminative capacity of visual quality, thus people have started developing SR models for natural images~\cite{wang2017scalable,ledig2017photo,dong2016accelerating,LapSRN,shi2016real,Yuan_2018_CVPR_Workshops}. The key to the success of DL-based methods is its independence from explicit imaging models and backup by big domain-specific data. The image quality is optimized by learning features in an end-to-end manner. More importantly, once a CNN-based SR model is trained, achieving SR is a purely feed-forward propagation, which demands a very low computational overhead. In the medical imaging field, DL is an emerging approach which has exhibited a great potential~\cite{wang2017machine,wang2016perspective,wang2018image}. For several imaging modalities, DL-based SR methods were successfully developed~\cite{chen2018efficient,yu2017computed,park2018computed,chaudhari2018super}. Chen~\textit{et al.}~\cite{chen2018efficient} proposed a deep densely connected super-resolution network to reconstruct HR brain magnetic resonance (MR) images. Chaudhari~\textit{et al.}~\cite{chaudhari2018super} developed a CNN-based network termed DeepResolve to learn a residual transformation from LR images to the corresponding HR images. More recently, Yu~\textit{et al.}~\cite{yu2017computed} proposed two advanced CNN-based models with a skip connection to promote high-frequency textures which are then fused with up-sampled images to produce SR images. \begin{figure*}[!ht] \begin{center} \includegraphics[width=7.0in]{generator.pdf} \caption{Architecture of the SR generators. The generator is composed of feature extraction and reconstruction networks. The default stride is $1$, except for the $1^{st}$ feature blocks in which the stride for the conv layers is $2$. Up-scaling is performed to embed the residual layer for supervised training, and no interpolation method is used in the network for unsupervised feature learning.} \label{fig: generator} \end{center} \end{figure*} \begin{figure*}[!ht] \begin{center} \includegraphics[width=7.0in]{discriminator.pdf} \caption{A architecture of the discriminators. $n$ stands for the number of convolutional kernels, and $s$ stands for stride.~\textit{i.e.}, $n32s1$ means the convolutional layer of 32 kernels with stride 1.} \label{fig: discriminator} \end{center} \end{figure*} \begin{table*}[!ht] \renewcommand{\arraystretch}{1.3} \centering \caption{Number of filters on each convolution (conv) layer of the generative network.} \begin{tabular}{c c c c c c c c c c c c c c c c c c c} \\ \hline\hline & \multicolumn{12}{c}{Feature extraction network} & \multicolumn{6}{c}{Reconstruction network} \\ & 1 & 2 &3 & 4 &5 &6 &7 &8 &9 &10 &11 &12 &A1 &B1 &B2 &C1 &C2 &Output \\ \cline{2-19} $G$/$F$ & 64 & 54 & 48 & 43 & 39 & 35 & 31 & 28 & 25 & 22 & 18 & 16 & 24 & 8 & 8 & 32 & 16 & 1\\ \hline\hline \end{tabular} \label{table: generator_num_filter} \end{table*} Very recently, adversarial learning~\cite{goodfellow2014generative,goodfellow2016nips} has become increasingly popular, which enables the CNN to learn feature representations from complex data distributions, with unprecedented successes. Adversarial learning is performed based on a generative adversarial network (GAN), defined as a~\textit{mini-max} game in which two competing players are a generator $G$ and a discriminator $D$. In the game, $G$ is trained to learn a mapping from source images $\bm{x}$ in a source domain $X$ to target images $\bm{y}$ in the target domain $Y$. On the other hand, $D$ distinguishes the generated images $\hat{\bm{y}}$ and the target images $\bm{y}$ with a binary label. Once well trained, GAN is able to model a high-dimensional distribution of target images. Wolterink~\textit{et al.}~\cite{wolterink2017generative} proposed a unsupervised conditional GAN to optimize the nonlinear mapping from LR images to HR images, successfully enhancing the overall image quality. However, there are still several major limitations in the DL-based SR imaging. First, existing supervised DL-based algorithms cannot address blind SR tasks without LR-HR pairs. In clinical practice, the limited number of LR and HR CT image pairs makes the supervised learning methods impractical since it is infeasible to ask patients to take multiple CT scans with additional radiation doses for paired CT images. Thus, it is essential to resort to semi-supervised learning. Second, utilizing the adversarial strategy can push the generator to learn an inter-domain mapping and produce compelling target images ~\cite{nie2018medical} but there is a potential risk that the network may yield features that are not exhibited in target images due to the degeneracy of the mapping. Since the optimal $G$ is capable of translating $X$ to $\hat{Y}$ distributed identically to $\bm{y}$, the GAN network cannot ensure that the noisy input $\bm{x}$ and predicted output $\hat{\bm{y}}$ are paired in a meaningful way - there exist many mappings $G$ that may yield the same distribution over $\hat{Y}$. Consequently, the mapping is highly under-constrained. Furthermore, it is undesirable to optimize the adversarial objective in isolation: the model collapse problem may occur to map all inputs $\bm{x}$ to the same output image $\hat{\bm{y}}$~\cite{goodfellow2016nips,CycleGAN2017,kang2018cycle}. To address this issue, Cycle-consistent GANs (cycleGAN) was designed to improve the performance of generic GAN, and utilized for SR imaging~\cite{Yuan_2018_CVPR_Workshops}. Third, other limitations of GANs were also pointed out in~\cite{radford2015unsupervised,arjovsky2017wasserstein}. How to steer a GAN learning process is not easy since $G$ may collapse into a narrow distribution which cannot represent diverse samples from a real data distribution. Also, there is no interpretable metric for training progress. Fourth, as the number of layers increases, deep neural networks can derive a hierarchy of increasingly more complex and more abstract features. Frequently, to improve the SR imaging capability of a network, complex networks are often tried with hundreds of millions of parameters. However, given the associated computational overheads, they are hard to use in real-world applications. Fifth, local feature parts in the CT image have different scales. This feature hierarchy can provide more information to reconstruct images, but most DL-based methods~\cite{dong2016accelerating,LapSRN} neglect to use hierarchical features. Finally, the $L_{2}$ distance between $\hat{\bm{y}}$ and $\bm{y}$ is commonly used for the loss function to guide the training process of the network. However, the output optimized by the $L_{2}$ norm may suffer from over-smoothing as discussed in~\cite{zhao2017loss,you2018structure}, since the $L_{2}$ distance means to maximizing the peak signal-to-noise rate (PSNR)~\cite{ledig2017photo}. Motivated by the aforementioned drawbacks, in this study we made major efforts in the following aspects.~\textit{First}, we present a novel~\textbf{residual CNN-based network in the CycleGAN framework} to preserve high-resolution anatomical details with no task specific regularization. Specially, we utilize the cycle-consistency constraint to enforce a strong across-domain consistency between $X$ and $Y$.~\textit{Second}, to address the training problem of GANs~\cite{goodfellow2016nips,arjovsky2017wasserstein}, we use the Wasserstein distance or “Earth Moving” distance (EM distance) instead of the Jensen-Shannon (JS) divergence.~\textit{Third}, inspired by the recent work~\cite{yamanaka2017fast}, we optimize the network according to several fundamental designing principles to alleviate the computational overheads~\cite{he2016deep,huang2017densely,srivastava2014dropout}, which also helps prevent the network from over-fitting.~\textit{Fourth}, we cascade multiple layers to learn highly interpretable and disentangled hierarchical features. Moreover, we enable the information flow across the skip-connected layers to prevent gradient vanishing~\cite{he2016deep}.~\textit{Finally}, we employ the~$L_{1}$~norm instead of~$L_{2}$~norm to refine deblurring, and we propose to use a jointly constrained total variation-based regularization as well, which leverages the~\textit{prior} information to reduce the noise with a minimal loss in spatial resolution or anatomical information. Extensive experiments with three real datasets demonstrate that our proposed composite network can achieve an excellent CT SR imaging performance comparable to or better than that of the state-of-the-art methods~\cite{dong2016accelerating,ledig2017photo,shi2016real,LapSRN,yang2010image}. \section{Methods} \label{sec:methods} Let us first review the SR problems in the medical imaging field. Then, we introduce the proposed adversarial nets framework and also present our SR imaging network architecture. Finally, we describe the optimization process. \subsection{Problem Statement} \label{subsec:problemsetting} Let $\bm{x} \in X$ be an input LR image and a matrix $\bm{y} \in Y$ an output HR image, the conventional formulation of the ill-posed linear SR problem~\cite{yang2010image} can be formulated as \begin{equation} \bm{x} = \textit{S\,H}\,\bm{y} + \bm{\epsilon}, \end{equation} where $\textit{S\,H}$ denote the down-sampling and blurring system matrix, and $\bm{\epsilon}$ the noise and other factors. Note that in practice, both the system matrix and not-modeled factors can be non-linear, instead of being linear (\textit{i.e.}, neither scalable nor additive). Our goal is to computationally improve noisy LRCT images obtained under a low-dose CT (LDCT) protocol to HRCT images. The main challenges in recovering HRCT images can be listed as follows.~\textit{First}, LRCT images contain different or more complex spatial variations, correlations and statistical properties than natural images, which limit the SR imaging performance of the traditional methods.~\textit{Second}, the noise in raw projection data is introduced to the image domain during the reconstruction process, resulting in unique noise and artifact patterns. This creates difficulties for algorithms to produce the perfect image quality.~\textit{Finally}, since the sampling and degradation operations are coupled and ill-posed, SR tasks cannot be performed beyond a marginal degree using the traditional methods, which cannot effectively restore some fine features and suffer from the risk of producing blurry appearance and new artifacts. To address these limitations, here we develop an advanced neural network by composing a number of~\textbf{non-linear SR functional blocks} for SR CT (SRCT) imaging along with the~\textbf{residual module} to learn high-frequency details. Then, we perform~\textbf{adversarial learning in a cyclic manner} to generate perceptually and quantitatively superior SRCT images. \subsection{Deep Cycle-Consistent Adversarial SRCT Model} \subsubsection{\textbf{\textit{Cycle-Consistent Adversarial Model}}} Current DL-based algorithms use feed-forward CNNs to learn non-linear mappings parametrized by $\pmb{\theta}$, which can be written as: \begin{equation} \hat{\bm{y}} = {G_{\bm{\theta}}}(\bm{x}) + \bm{\epsilon}. \end{equation} In order to obtain a decent $\bm{\hat{y}}$, a suitable loss function must be specified to encourage $G_{\bm{\theta}}$ to generate a SR image based on the training samples so that \begin{equation} \hat{\bm{\theta}} = \mathop{\arg\min}_{\bm{\theta}} \sum_{i} \mathcal{L}(\hat{\bm{y}}_{i},\bm{y}_{i}), \end{equation} where $(\bm{x}_{i},\bm{y}_i)$ are paired LRCT and HRCT images for training. To address the limitations mentioned in~\ref{subsec:problemsetting}, our Cyclic SRCT model is shown in Fig.~\ref{fig: overall}. The proposed model includes two generative mappings $G: X\to Y$ and $F: Y \to X$ given training samples $\bm{x}_{i} \in X$ and $\bm{y}_i \in Y$. Note that we denote the two mappings $G: X\to Y$ and $F: Y \to X$ as $G$ and $F$ respectively for brevity. The two mappings $G$ and $F$ are jointly trained to produce synthesized images in a way that confuse the adversarial discriminators $D_{Y}$ and $D_{X}$ respectively, which intend to identify whether the output of each generative mapping is real or artificial.~\textit{i.e.}, given an LRCT image $\bm{x}$, $G$ attempts to generate a synthesized image $\hat{\bm{y}}$ highly similar to a real image $\bm{y}$ so as to fool $D_{Y}$. In a similar way, $D_{X}$ attempts to discriminate between a reconstructed $\hat{\bm{x}}$ from $F$ and a real $\bm{x}$. The key idea is that the generators and discriminators are jointly/alternatively trained to improve their performance metrics synergistically. Thus, we have the following optimization problem: \begin{equation} \mathop{\min}_{G,F}\mathop{\max}_{D_{Y},D_{X}}\mathcal{L}_{\mathrm{GAN}}(G,D_{Y})+\mathcal{L}_{\mathrm{GAN}}(F,D_{X}). \label{eq:obj_D_GAN} \end{equation} To enforce the mappings between the source and target domains and regularize the training procedure, our proposed network combines four types of loss functions:~\textbf{adversarial loss} (\textit{adv});~\textbf{cycle-consistency loss} (\textit{cyc});~\textbf{identity loss} (\textit{idt});~\textbf{joint sparsifying transform loss} (\textit{jst}). \subsubsection{\textbf{Adversarial Loss}} For~\textit{marginal matching}~\cite{goodfellow2014generative}, we employ adversarial losses to urge the generated images to obey the empirical distributions in the source and target domains. To improve the training quality, we apply the Wasserstein distance~\cite{gulrajani2017improved} instead of the negative log-likelihood used in~\cite{goodfellow2014generative}. Thus, we have the adversarial objective with respect to $G$: \begin{multline} \mathop{\min}_{G}\mathop{\max}_{D_{Y}}\mathcal{L}_{\mathrm{WGAN}}(D_{Y},G) = -\mathbb{E}_{\bm{y}}[D(\bm{y})]+\mathbb{E}_{\bm{x}}[D(G(\bm{x}))] \\ +\lambda \mathbb{E}_{\tilde{\bm{y}}}[(||\nabla_{\tilde{\bm{y}}}D(\tilde{\bm{y}})||_2-1)^2], \label{eq: loss_DG_WGAN} \end{multline} where $\mathbb{E}(\cdot)$ denotes the expectation operator; the first two terms are in terms of the Wasserstein estimation, and the third term penalizes the deviation of the gradient norm of its input relative to one, $\tilde{\pmb{y}}$ is uniformly sampled along straight lines for pairs of $G(\bm{x})$ and $\bm{y}$, and $\lambda$ is a regularization parameter. A similar adversarial loss $\min_{F}\max_{D_{X}}\mathcal{L}_{\mathrm{WGAN}}(D_{X},F)$ is defined for marginal matching in the reverse direction. \subsubsection{\textbf{Cycle Consistency Loss}} Adversarial training is for marginal matching~\cite{goodfellow2014generative,goodfellow2016nips}. However, in these earlier studies~\cite{CycleGAN2017,Adda_CVPR2017}, it was found that using adversarial losses alone cannot ensure the learned function can transform a source input successfully to a target output. To promote the consistency between $F(G(\bm{x}))$ and $\bm{x}$, the cycle-consistency loss can be express as: \begin{equation} \begin{aligned} \mathcal{L}_{\mathrm{CYC}}(G,F) &= \mathbb{E}_{\bm{x}} \left[ ||F\left(G(\bm{x})\right)-\bm{x}||_{1} \right] \\ &+ \mathbb{E}_{\bm{y}} \left[ ||G\left(F(\bm{y})\right)-\bm{y}||_{1} \right], \label{eq: cyc_loss} \end{aligned} \end{equation} where $||\cdot||_1$ denotes the $\mathcal{L}_{1}$ norm. Since the cycle consistency loss encourages $F(G(\bm{x})) \approx\bm{x}$ and $G(F(\bm{y}))\approx \bm{y}$, they are referred to as~\textit{forward cycle consistency} and~\textit{backward cycle consistency} respectively. The domain adaptation mapping refers to the~\textbf{cycle-reconstruction mapping}. In effect, it imposes shared-latent space constraints to encourage the source content to be preserved during the cycle-reconstruction mapping. In other words, the cycle consistency enforces latent codes deviating from the prior distribution in the cycle-reconstruction mapping. Additionally, the cycle consistency can help prevent the degeneracy in adversarial learning~\cite{li2017alice}. \subsubsection{\textbf{Identity Loss}} Since a HR image should be a refined version of the LR counterpart, it is necessary to use the identity loss to regularize the training procedure~\cite{CycleGAN2017,kang2018cycle}. Compared with the $\mathcal{L}_{2}$ loss, the $\mathcal{L}_{1}$ loss does not over-penalize large differences or tolerate small errors between estimated and target images. Thus, the $\mathcal{L}_{1}$ loss is preferred to alleviate the limitations of the $\mathcal{L}_{2}$ loss in this context. Additionally, the $\mathcal{L}_{1}$ loss enjoys the same fast convergence speed as that of the $\mathcal{L}_{2}$ loss. The $\mathcal{L}_1$ loss is formulated as follows: \begin{equation} \begin{aligned} \mathcal{L}_{\mathrm{IDT}}(G,F) &= \mathbb{E}_{\bm{y}} \left[ ||G\left(\bm{y}\right)-\bm{y}||_{1} \right] \\ &+ \mathbb{E}_{\bm{x}} \left[ ||\left(F(\bm{x}\right)-\bm{x}||_{1} \right]. \label{eq: loss_idt} \end{aligned} \end{equation} We follow the same training baseline as in~\cite{kang2018cycle}; \textit{i.e.}, in the bi-directional mapping, the size of $G(\bm{y})$ (or $F(\bm{x})$) is the same as that of $\bm{y}$ (or $\bm{x}$). \subsubsection{\textbf{Joint Sparsifying Transform Loss}} The total variation (TV) has demonstrated the state-of-the-art performance in promoting image sparsity and reducing noise in piecewise-constant images~\cite{rudin1992nonlinear,sidky2008image,chen2008prior,vogel1996iterative,song2007sparseness,yang2010high,luo2018interior}. To express image sparsity, we formulate a nonlinear TV-based loss with the joint constraints as follows: \begin{equation} \begin{aligned} \mathcal{L}_{\mathrm{JST}}(G) &= \tau\|G(\bm{x})\|_{\mathrm{TV}} + (1-\tau) \|\bm{y}-G(\bm{x})\|_{\mathrm{TV}}, \label{eq: tv_loss} \end{aligned} \end{equation} where $\tau$ is a scaling factor. Intuitively, the above constrained minimization combines two components: the first component is used for sparsifying reconstructed images and alleviating conspicuous artifacts, and the second helps preserve anatomical characteristics by minimizing the difference image $\bm{y}-G(\bm{x})$. Essentially, these two components require a joint minimization under the bidirectional constraints. In this paper, the control parameter $\tau$ was set to $0.5$. In the case of $\tau=1$, the $\mathcal{L}_{\mathrm{JST}}(G)$ is regarded as the conventional $\mathrm{TV}$ loss. \subsubsection{\textbf{Overall Objective Function}} In the training process, our proposed network is fine-tuned in an end-to-end manner to minimize the following overall objective function: \begin{equation} \begin{aligned} \mathcal{L}_{\mathrm{GAN-CIRCLE}} &= \mathcal{L}_{\mathrm{WGAN}}(D_{Y},G)+\mathcal{L}_{\mathrm{WGAN}}(D_{X},F) \\ &+\lambda_1 \mathcal{L}_{\mathrm{CYC}}(G,F)+\lambda_2 \mathcal{L}_{\mathrm{IDT}}(G,F)\\ &+\lambda_3 \mathcal{L}_{\mathrm{JST}}(G), \label{eq: loss_final} \end{aligned} \end{equation} where $\lambda_1$, $\lambda_2$, and $\lambda_3$ are parameters for balancing among different penalties. We call this modified cycleGAN as the GAN-CIRCLE as summarized in the title of this paper. \subsubsection{\textbf{Supervised learning with GAN-CIRCLE}} In the case where we have access to paired dataset, we can render SRCT problems to train our model in a supervised fashion. Given the training paired data from the true joint,~\textit{i.e.}, $(\bm{x},\bm{y})\sim P_{data}(\bm{X},\bm{Y})$, we can define a supervision loss as follows: \begin{equation} \begin{aligned} \mathcal{L}_{\mathrm{SUP}}(G,F) &= \mathbb{E}_{(\bm{x},\bm{y})} \left[ ||G\left(\bm{x}\right)-\bm{y}||_{1} \right] \\ &+ \mathbb{E}_{(\bm{x},\bm{y})} \left[ ||\left(F(\bm{y}\right)-\bm{x}||_{1} \right]. \label{eq: L_{sup}_loss} \end{aligned} \end{equation} \begin{figure*}[!t] \centering \subfloat[Ground-truth HR]{\includegraphics[width=1.7in]{./eg/eg1/full_size/sr.png}\label{fig: SR1}} \subfloat[Noisy LR]{\includegraphics[width=1.7in]{./eg/eg1/full_size/lr.png}\label{fig: LR1}} \subfloat[NN$^{\pmb{+}}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/nearest.png}\label{fig: nn1}} \subfloat[Bilinear$^{\pmb{+}}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/bilinear.png}\label{fig: br1}} \subfloat[Bicubic$^{\pmb{+}}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/bicubic.png}\label{fig: bc1}} \subfloat[Lanczos$^{\pmb{+}}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/lanczos.png}\label{fig: ls1}} \subfloat[A$^{\pmb{+}}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/aplus.png}\label{fig: aplus}} \subfloat[FSRCNN]{\includegraphics[width=1.7in]{./eg/eg1/full_size/fsrcnn.png}\label{fig: FSRCNN1}} \subfloat[ESPCN]{\includegraphics[width=1.7in]{./eg/eg1/full_size/espcn.png}\label{fig: ESPCN1}} \subfloat[LapSRN]{\includegraphics[width=1.7in]{./eg/eg1/full_size/lapsrn.png}\label{fig: LapSRN1}} \subfloat[SRGAN]{\includegraphics[width=1.7in]{./eg/eg1/full_size/srgan.png}\label{fig: SRGAN1}} \subfloat[G-Fwd]{\includegraphics[width=1.7in]{./eg/eg1/full_size/dcscn.png}\label{fig: DCSCN1}} \subfloat[G-Adv]{\includegraphics[width=1.7in]{./eg/eg1/full_size/gan_dcscn.png}\label{fig: GAN_DCSCN1}} \subfloat[GAN-CIRCLE]{\includegraphics[width=1.7in]{./eg/eg1/full_size/cwgan_sup.png}\label{fig: cWGAN_sup1}} \subfloat[GAN-CIRCLE$^{s}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/cwgan_semisup.png}\label{fig: cWGAN_semisup1}} \subfloat[GAN-CIRCLE$^{u}$]{\includegraphics[width=1.7in]{./eg/eg1/full_size/cwgan_unsup.png}\label{fig: cWGAN_unsup1}} \caption{Visual comparsion of SRCT Case~$1$ from the Tibia dataset. The restored bony structures are shown in the red and yellow boxes in Fig.~\ref{fig: example1_roi}. The display window is [-900, 2000]~HU.} \label{fig: example1} \end{figure*} \begin{figure*}[!t] \begin{minipage}[b]{.70\textwidth} \centering \subfloat[\scriptsize {Original HR}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/sr_roi.png}}~ \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/fsrcnn_roi.png}}\\[+.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/srgan_roi.png}\label{fig:srgan1_roi1}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/cwgan_sup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked1/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg1_roi1}\\[0.5ex] \begin{minipage}[b]{.70\textwidth} \centering \subfloat[\scriptsize {Original HR}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/sr_roi.png}}~ \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/fsrcnn_roi.png}}\\[+.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/srgan_roi.png}\label{fig:srgan1_roi2}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/cwgan_sup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.80in]{./eg/eg1/roi_marked2/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg1_roi2} \caption{Zoomed regions of interest~(ROIs) marked by the red rectangle in Fig.~\ref{fig: example1}. The restored image with GAN-CIRCLE reveals subtle structures better than the other variations of the proposed neural network, especially in the marked regions. The display window is [-900, 2000]~HU.} \label{fig: example1_roi} \end{figure*} \subsection{Network Architecture} \subsubsection{\textbf{Generative Networks}} Although more layers and larger model size usually result in the performance gain, for real application we designed a lightweight model to validate the effectiveness of GAN-CIRCLE. The two generative networks $G$ and $F$ are shown in Fig.~\ref{fig: generator}. The network architecture has been optimized for SR CT imaging. It consists of two processing steams: the feature extraction network and the reconstruction network. In the~\textbf{\textit{feature extraction network}}, we concatenate $12$ sets of non-linear SR feature blocks composed of $3\times 3$ Convolution (Conv) kernels, bias, Leaky ReLU, and a dropout layer. We utilize Leaky ReLU to prevent the `dead ReLU' problem thanks to the nature of leaky rectified linear units (Leaky ReLU): $\max(0,\bm{x})-\alpha \max(0,-\bm{x})$. Applying the dropout layer is to prevent overfitting. The number of filters are shown in Table~\ref{table: generator_num_filter}. In practice, we avoid normalization which is not suitable for SR, because we observe that it discards the range flexibility of the features. Then, to capture both local and the global image features, all outputs of the hidden layers are concatenated before the reconstruction network through skip connection. The skip connection helps prevent training saturation and overfitting. Diverse features which represent different details of the HRCT components can be constructed in the end of feature extraction network. \begin{table*}[!t] \renewcommand{\arraystretch}{1.0} \centering \caption{Quantitative evaluation of state-of-the-art SR algorithms. \textbf{{\color{red} Red}} and {\color{blue} \underline{blue}} indicate the best and the second best performance, respectively.} \setlength{\tabcolsep}{5pt} \begin{tabular}{c c c c c c c c c c c c c c c c} \hline\hline & \multicolumn{3}{c}{Tibia Case} && \multicolumn{3}{c}{Abdominal Case} && \multicolumn{3}{c}{Real Case~$1$} && \multicolumn{3}{c}{Real Case~$2$}\\ & PSNR & SSIM & IFC && PSNR & SSIM & IFC && PSNR & SSIM & IFC && PSNR & SSIM & IFC \\ \cline{2-4}\cline{6-8}\cline{10-12}\cline{14-16} NN$^{\pmb{+}}$ & 24.754 & 0.645 & 2.785 && 26.566 & 0.592 & 1.919 && 28.072 & 0.798 & 0.246 && 27.903 & 0.798 & 0.234 \\ Bilinear$^{\pmb{+}}$ & 24.667 & 0.612 & 2.588 && 27.726 & 0.605 & 1.933 && 28.162 & 0.812 & 0.255 && 27.937 & 0.799 & 0.235 \\ Bicubic$^{\pmb{+}}$ & 25.641 & 0.662 & 2.835 && 28.599 & 0.619 & 2.008 && 28.117 & 0.805 & 0.250 && 27.929 & 0.798 & 0.235 \\ Lanczos$^{\pmb{+}}$ & 25.686 & 0.663 & 2.848 && 28.644 & 0.619 & 2.01 && 28.116 & 0.806 & 0.251 && 27.377 & 0.800 & 0.235 \\ A$^{\pmb{+}}$ & 26.496 & 0.696 & 3.028 && 28.154 & 0.589 & 1.899 && 27.877 & 0.804 & 0.249 && 27.037 & 0.778 & 0.236 \\ FSRCNN & 28.360 & {\color{blue}\underline{0.923}} & 3.533 && 30.950 & {\color{blue}\underline{0.924}} & 2.285 && \textbf{{\color{red}35.384}} & \textbf{{\color{red}0.830}} & 0.265 && 33.643 & \textbf{{\color{red}0.805}} & 0.237 \\ ESPCN & 28.361 & 0.921 & 3.520 && 30.507 & 0.923 & 2.252 && {\color{blue}\underline{35.378}} & \textbf{{\color{red}0.830}} & 0.278 && {\color{blue}\underline{33.689}} & \textbf{{\color{red}0.805}} & \textbf{{\color{red}0.245}} \\ LapSRN & {\color{blue}\underline{28.486}} & {\color{blue}\underline{0.923}} & 3.533 && {\color{blue}\underline{30.985}} & \textbf{{\color{red}0.925}} & 2.299 && 35.372 & \textbf{{\color{red}0.830}} & 0.277 && \textbf{{\color{red}33.711}} & \textbf{{\color{red}0.805}} & {\color{blue}\underline{0.244}} \\ SRGAN & 21.924 & 0.389 & 1.620 && 28.550 & 0.871 & 1.925 && 33.002 & 0.737 & 0.232 && 31.775 & 0.701 & 0.220 \\ G-Fwd & \textbf{{\color{red}28.649}} & \textbf{{\color{red}0.931}} & 3.618 && \textbf{{\color{red}31.282}} & \textbf{{\color{red}0.925}} & {\color{blue}\underline{2.348}} && 35.227 & {\color{blue}\underline{0.829}} & 0.276 && 33.589 & 0.803 & 0.236 \\ G-Adv & 26.945 & 0.676 & 2.999 && 26.930 & 0.889 & 1.765 && 32.518 & 0.725 & 0.199 && 31.712 & 0.700 & 0.210 \\ GAN-CIRCLE & 27.742 & 0.895 & \textbf{{\color{red}3.944}} && 30.720 & {\color{blue}\underline{0.924}} & \textbf{{\color{red}2.435}} && - & - & - && - & - & - \\ GAN-CIRCLE$^{s}$ & 27.071 & 0.887 & {\color{blue}\underline{3.893}} && 29.988 & 0.902 & 2.367 && 33.194 & {\color{blue}\underline{0.829}} & \textbf{{\color{red}0.285}} && 31.252 & {\color{blue}\underline{0.804}} & \textbf{{\color{red}0.245}} \\ GAN-CIRCLE$^{u}$ & 27.255 & 0.891 & 2.713 && 28.439 & 0.894 & 2.019 && 32.138 & 0.824 & {\color{blue}\underline{0.283}} && 30.641 & 0.796 & 0.232 \\ \hline\hline \end{tabular} \label{table: psnr&ssim&ifc} \end{table*} In the~\textbf{\textit{reconstruction network}}, we stack two reconstruction branches and integrate the information flows. Because all the outputs from the feature extraction network are densely connected, we propose a parallelized CNNs (Network in Network)~\cite{lin2013network} which utilize shallow multilayer perceptron (MLP) to perform a nonlinear projection in the spatial domain. There are several benefits with the Network in Network strategy. First, the $1\times 1$ Conv layer can significantly reduce the dimensionality of the filter space for faster computation with less information loss~\cite{lin2013network}. Second, the $1\times 1$ Conv layer can increase non-linearity of the network to learn a complex mapping better at the finer levels. For up-sampling, we adopt the transposed convolutional (up-sampling) layers~\cite{zeiler2010deconvolutional} by a scale of $2$. The last Conv layer fuses all the feature maps, resulting in an entire residual image containing mostly high-frequency details. In the supervised setting, the up-sampled image by the bicubic interpolation layer is combined (via element-wise addition) with the residual image to produce a HR output. In the unsupervised and semi-supervised settings, no interpolation is involved across the skip connection. It should be noted that the generator $F$ shares the same architecture as $G$ in both the supervised and unsupervised scenarios. The default stride size is $1$. However, for unsupervised feature learning, the stride of the Conv layers is $2$ in the $1^{st}$ feature blocks. Also, for supervised feature learning, the stride of the Conv layers is $2$ in the $1^{st}$ and $2^{nd}$ feature blocks of $F$. We refer to the forward generative network $G$ as G-Forward. \begin{figure*}[!t] \begin{minipage}[b]{0.25\textwidth} \centering \subfloat[\scriptsize{Original HR}]{\includegraphics[width=1.63in]{./eg/eg2/full_size/sr.png}} ~~ \subfloat[\scriptsize{Noisy LR}]{\includegraphics[width=1.63in]{./eg/eg2/full_size/lr.png}} ~~ \subfloat[\scriptsize{GAN-CIRCLE}]{\includegraphics[width=1.63in]{./eg/eg2/full_size/cwgan_sup.png}} ~~ \subfloat[\scriptsize{GAN-CIRCLE$^{s}$}]{\includegraphics[width=1.63in]{./eg/eg2/full_size/cwgan_semisup.png}} \end{minipage} \label{fig: sr_lr2}\\[0.5ex] \begin{minipage}[b]{.70\textwidth} \centering \subfloat[\scriptsize {Original HR}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/sr_roi.png}}~ \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/srgan_roi.png}\label{fig:srgan2_roi1}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/cwgan_sup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked1/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg2_roi1}\\[0.5ex] \begin{minipage}[b]{.70\textwidth} \centering \subfloat[\scriptsize {Original HR}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/sr_roi.png}}~ \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/srgan_roi.png}\label{fig:srgan2_roi2}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/cwgan_sup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.80in]{./eg/eg2/roi_marked2/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg2_roi2} \caption{Visual comparison of SRCT Case~$2$ from the abdominal dataset. The display window is [-160, 240]~HU. The restored anatomical features are shown in the red and yellow boxes. (\textbf{Zoomed for visual clarity}).} \label{fig: example2} \end{figure*} \subsubsection{\textbf{Discriminative Networks}} As shown in Fig.~\ref{fig: discriminator}, in reference to the recent successes with GANs~\cite{simonyan2014very,ledig2017photo}, $D$ is designed to have $4$ stages of Conv, bias, instance norm~\cite{instanceNorm2016} (IN) and Leaky ReLU, followed by two fully-connected layers, of which the first has $1024$ units and the other has a single output. In addition, inspired by~\cite{arjovsky2017wasserstein} no sigmoid cross entropy layer is applied by the end of $D$. We apply $4\times4$ filter size for the Conv layers which had different numbers of filters, which are $64, 64, 128, 128, 256, 256, 512, 512$ respectively. \begin{figure*}[!t] \begin{minipage}[b]{0.25\textwidth} \centering \subfloat[\scriptsize{Original HR}]{\includegraphics[width=1.63in]{./eg/eg5/full_size/sr.jpg}} ~~ \subfloat[\scriptsize{Noisy LR}]{\includegraphics[width=1.63in]{./eg/eg5/full_size/lr.png}} ~~ \subfloat[\scriptsize{GAN-CIRCLE$^{s}$}]{\includegraphics[width=1.63in]{./eg/eg5/full_size/cwgan_semisup.jpg}} ~~ \subfloat[\scriptsize{GAN-CIRCLE$^{u}$}]{\includegraphics[width=1.63in]{./eg/eg5/full_size/cwgan_unsup.png}} \end{minipage} \label{fig: sr_lr5}\\[0.5ex] \begin{minipage}[b]{.80\textwidth} \centering \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/srgan_roi.png}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked1/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg5_roi1}\\[0.5ex] \begin{minipage}[b]{.80\textwidth} \centering \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/srgan_roi.png}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.92in]{./eg/eg5/roi_marked2/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg5_roi2} \caption{Visual comparison of SRCT Case~$3$ from the real dataset. The display window is [180, 4096]~HU. The restored anatomical features are shown in the red and yellow boxes. (\textbf{Zoomed for visual clarity}).} \label{fig: example5} \end{figure*} \section{Experiments and results} \label{sec:exp} We discuss our experiments in this section. We first introduce the datasets we utilize and then describe the implementation details and parameter settings in our proposed methods. We also compare our proposed algorithms with the state-of-the-art SR methods~\cite{shi2016real,LapSRN,ledig2017photo,dong2016accelerating} quantitatively and qualitatively. We further evaluate our results in reference to the state-of-the-art, and demonstrate the robustness of our methods in the real SR scenarios. Finally, we present the detailed diagnostic quality assessments from expert radiologists. Note that we use the default parameters of all the evaluated methods. \subsection{Training Datasets} \label{subsec:dataset} In this study, we used two high-quality sets of training images to demonstrate the fidelity and robustness of the proposed GAN-CIRCLE. As shown in Figs.~\ref{fig: example1}~-~\ref{fig: example2}, these two datasets are of very different characteristics. \subsubsection{\textbf{Tibia dataset}} This micro-CT image dataset reflects twenty-five fresh-frozen cadaveric ankle specimens which were removed at mid-tibia from 17 body donors (mean age at death~$\pm$~SD: $79.6\,\pm\,13.2$ Y; $9$ female). After the soft tissue were removed and the tibia was dislocated from the ankle joint, each specimen was scanned on a Siemens microCAT II (Preclinical Solutions, Knoxville, TN, USA) in the cone beam imaging geometry. The micro-CT parameters are briefly summarized as follows: a tube voltage $100$ kV, a tube current $200$ mAs, $720$ projections over a range of $220$ degrees, an exposure time of $1.0$ sec per projection, and the filter backprojection (FBP) method was utilized to produce $28.8~\mu m$ isotropic voxels. Since CT images are not isotropic in each direction, for convenience of our previous analysis~\cite{chen2018quantitative}, we convert micro-CT images to $150~\mu m$ using a windowed sync interpolation method. In this study, the micro-CT images we utilized as HR images were prepared at $150~\mu m$ voxel size, as the target for SR imaging based of the corresponding LR images at $300~\mu m$ voxel size. The full description is in~\cite{chen2018quantitative}. We target $1$X resolution improvement. \begin{figure*}[!t] \begin{minipage}[b]{0.25\textwidth} \centering \subfloat[\scriptsize{Original HR}]{\includegraphics[width=1.63in]{./eg/eg6/full_size/sr.png}} ~~ \subfloat[\scriptsize{Noisy LR}]{\includegraphics[width=1.63in]{./eg/eg6/full_size/lr.png}} ~~ \subfloat[\scriptsize{GAN-CIRCLE$^{s}$}]{\includegraphics[width=1.63in]{./eg/eg6/full_size/cwgan_semisup.png}} ~~ \subfloat[\scriptsize{GAN-CIRCLE$^{u}$}]{\includegraphics[width=1.63in]{./eg/eg6/full_size/cwgan_unsup.png}} \end{minipage} \label{fig: sr_lr6}\\[0.5ex] \begin{minipage}[b]{.80\textwidth} \centering \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/srgan_roi.png}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked1/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg6_roi1}\\[0.5ex] \begin{minipage}[b]{.80\textwidth} \centering \subfloat[\scriptsize {Noisy LR}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/lr_roi.png}}~ \subfloat[\scriptsize {NN$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/nearest_roi.png}}~ \subfloat[\scriptsize {Bilinear$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/bilinear_roi.png}}~ \subfloat[\scriptsize {Bicubic$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/bicubic_roi.png}}~ \subfloat[\scriptsize {Lanczos$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/lanczos_roi.png}}~ \subfloat[\scriptsize {A$^{\pmb{+}}$}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/aplus_roi.png}}~ \subfloat[\scriptsize {FSRCNN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/fsrcnn_roi.png}}\\[0.5ex] \subfloat[\scriptsize {ESPCN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/espcn_roi.png}}~ \subfloat[\scriptsize {LapSRN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/lapsrn_roi.png}}~ \subfloat[\scriptsize {SRGAN}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/srgan_roi.png}}~ \subfloat[\scriptsize {G-Fwd}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/dcscn_roi.png}}~ \subfloat[\scriptsize {G-Adv}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/gan_dcscn_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{s}$}}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/cwgan_semisup_roi.png}}~ \subfloat[\scriptsize {\mbox{GAN-CIRCLE$^{u}$}}]{\includegraphics[width=0.92in]{./eg/eg6/roi_marked2/cwgan_unsup_roi.png}} \end{minipage} \label{fig: eg6_roi2} \caption{Visual comparison of SRCT Case~$4$ from the real dataset. The display window is [180, 4096]~HU. The restored bony structures are shown in the red and yellow boxes. (\textbf{Zoomed for visual clarity}).} \label{fig: example6} \end{figure*} \subsubsection{\textbf{Abdominal dataset}} This clinical dataset is authorized by Mayo Clinic for~\textit{2016 NIH-AAPM-Mayo Clinic Low Dose CT Grand Challenge}. The dataset contains $5,936$ full dose CT images from 10 patients with the reconstruction interval and slice thickness of $0.8~mm$ and $1.0~mm$ respectively. The original CT images were generated by multidetector row CT (MDCT) with image size of $512\times 512$. The projection data is from $2,304$ views per scan. The HR images, with voxel size $0.74\times 0.74\times 0.80~mm^3$, were reconstructed using the FBP method from all $2,304$ projection views. More detailed information of the dataset are given in~\cite{lowdosectgrandchallenge}. We perform image pre-processing for all CT images through the following workflow. The original CT images were first scaled from the CT Hounsfield Value (HU) to the unit interval [0,1], and treated as the ground-truth HRCT images. In addition, we followed the convention in~\cite{jiang2018super,glasner2009super} to generate LR images by adding noise to the original images and then lowering the spatial resolution by a factor of $2$. For convenience in training our proposed network, we up-sampled the LR image via proximal interpolation to ensure that $\bm{x}$ and $\bm{y}$ are of the same size. Since the amount of training data plays a significant role in training neural networks~\cite{liu2018learning}, we extracted overlapping patches from LRCT and HRCT images instead of directly feeding the entire CT images to the training pipeline. The overlapped patches were obtained with a predefined sliding size. This strategy preserves local anatomical details, and boost the number of samples. We randomly cropped HRCT images into patches of $64\times 64$, along with their corresponding LRCT patches of size $32\times 32$ at the same center point for supervised learning. With the unsupervised learning methods, the size of the HRCT and LRCT patches are $64\times 64$ in batches of size $64$. \subsection{Implementation Details} In the proposed GAN-CIRCLE, we initialized the weights of the Conv layer based on~\cite{he2015delving}. We computed~\textit{std} in the manner of $\sqrt[]{2/m}$ where~\textit{std} is the standard deviation, $m=f_{s}^2\times n_{f}$, $f_{s}$ the filter size, and $n_{f}$ the number of filters.~\textit{i.e.}, given $f_{s} = 3$ and $n_{f} = 16$,~\textit{std} = $0.118$ and all bias were initialized to $0$. In the training process, we empirically set $\lambda_1$, $\lambda_2$, $\lambda_3$ to $1$, $0.5$, $0.001$. Dropout regularization~\cite{hinton2012improving} with $p = 0.8$ was applied to each Conv layer. All the Conv and transposed Conv layers were followed by Leaky ReLu with a slope $\alpha = 0.1$. To make the size of all feature maps the same as that of the input, we padded zeros around the boundaries before the convolution. We utilized the Adam optimizer~\cite{kingma2014adam} with $\beta_1=0.5, \beta_2=0.9$ to minimize the loss function of the proposed network. We set the learning rate to $10^{-4}$ for all layers and then decreased by a factor of $2$ for every $50$ epochs and terminated the training after $100$ epochs. All experiments were conducted using the TensorFlow library on a NVIDA TITAN XP GPU. \subsection{Performance Comparison} In this study, we compared the proposed GAN-CIRCLE with the state-of-the-art methods: Nearest-neighbor (NN), Bilinear, Bicubic, Lanczos, adjusted anchored neighborhood regression A$^{\pmb{+}}$~\cite{timofte2014aplus}, FSRCNN~\cite{dong2016accelerating}, ESPCN~\cite{shi2016real}, LapSRN~\cite{LapSRN}, and SRGAN~\cite{ledig2017photo}. For clarity, we categorized the methods into the following classes: the interpolation-based, dictionary-based, PSNR-oriented, and GAN-based methods. Especially, we trained the publicly available FSRCNN, ESPCN, LapSRN and SRGAN with our paired LR and HR images. To demonstrate the effectiveness of the DL-based methods, we first denoised the input LR images and then super-resolved the denoised CT image using the typical interpolation methods: nearest neighbor (NN) up-sampling, bilinear interpolation, bicubic interpolation, lanczos interpolation. BM3D\cite{feruglio2010block} is one of the classic image domain denoising algorithms, which is efficient and powerful. Thus, we preprocessed the noisy LRCT images with BMD3, and then super-solved the denoised images by interpolation methods and A$^{\pmb{+}}$. We refer to interpolation-based methods as NN$^{\pmb{+}}$, Bilinear$^{\pmb{+}}$, Bicubic$^{\pmb{+}}$, Lanczos$^{\pmb{+}}$. We evaluated three variations of the proposed method: (1) G-Forward (G-Fwd), which is the forward generator of GAN-CIRCLE, (2) G-Adversarial (G-Adv), which uses the adversarial learning strategy, and (3) the full-fledged GAN-CIRCLE. To emphasize the effectiveness of the GAN-CIRCLE structure, we first trained the three models using the supervised learning strategy, and then trained our proposed GAN-CIRCLE in the semi-supervised scenario (GAN-CIRCLE$^{s}$), and finally implement GAN-CIRCLE in the unsupervised manner (GAN-CIRCLE$^{u}$). In the semi-supervised settings, two datasets were created separately by randomly splitting the dataset into paired and unpaired dataset with respect to three variants: $100\%$, $50\%$, and $0\%$ paired. To better evaluate the performance of each methods, we use the same size of the dataset for training and testing. We validated the SR performance in terms of three widely-used image quality metrics: Peak signal-to-noise ratio (PSNR), Structural Similarity (SSIM)~\cite{wang2004image}, and Information Fidelity Criterion (IFC)~\cite{sheikh2005information}. Through extensive experiments, we compared all the above-mentioned methods on the two benchmark datasets described in Section~\ref{subsec:dataset}. \subsection{Experimental Results with the Tibia Dataset} \label{subsec:Tibiadataset} We evaluated the proposed algorithms against the state-of-the-art algorithms on the tibia dataset. We present typical results in Fig.~\ref{fig: example1}. It is observed that BM3D can effectively remove the noise, but it over-smoothens the noisy LR images. Then, the interpolation-based methods (NN$^{\pmb{+}}$, Bilinear$^{\pmb{+}}$, Bicubic$^{\pmb{+}}$, Lanczos$^{\pmb{+}}$) yield noticeable artifacts caused by partial aliasing. On the other hand, the DL-based methods suppress such artifacts effectively. It can be seen that our proposed GAN-CIRCLE recovers more fine subtle details and captures more anatomical information in Fig.~\ref{fig: example1_roi}. It is worth mentioning that Fig.~\ref{fig: example1} shows that there are severe distortions of the original images but SRGAN generates compelling results in Figs.~\ref{fig: example2}-\ref{fig: example6}, which indicate VGG network is a task-specific network which can generate images with excellent image quality. We argue that the possible reason is that the VGG network~\cite{simonyan2014very} is a pre-trained CNN-based network based on natural images with structural characteristic correlated with the content of medical images~\cite{shen2017deep}. Fig.~\ref{fig: example1_roi} presents that the proposed GAN-CIRCLE$^{s}$ can predict images with shaper boundaries and richer textures than GAN-CIRCLE, and GAN-CIRCLE$^{u}$ which learns additional anatomical information from the unpaired samples. The quantitative results are in Table~\ref{table: psnr&ssim&ifc}. The results demonstrate that the G-Forward achieves the highest scores using the evaluation metrics, PSNR and SSIM, which outperforms all other methods. However, it has been pointed out in~\cite{yang2018low,shan20183d} that high PSNR and SSIM values cannot guarantee a visually favorable result. Non-GAN based methods (FSRCNN, ESPCN, LapSRN) may fail to recover some fine structure for diagnostic evaluation, such as shown by zoomed boxes in Fig.~\ref{fig: example1_roi}. Quantitatively, GAN-CIRCLE achieves the second best values in terms of SSIM and IFC. It has been pointed out in~\cite{yang2014single} that IFC value is correlated well with the human perception of SR images. Our GAN-CIRCLE$^{s}$ obtained comparable results qualitatively and quantitatively. Table~\ref{table: psnr&ssim&ifc} shows that~\textbf{the proposed semi-supervised method performs similarly compared to the fully supervised methods on the tibia dataset}. In general, our proposed GAN-CIRCLE can generate more pleasant results with sharper image contents. \begin{table*}[!t] \renewcommand{\arraystretch}{0.8} \centering \caption{Diagnostic quality assessment in terms of subjective quality scores for different algorithms (mean$\pm$stds).~\textbf{{\color{red} Red}} and {\color{blue} {blue}} indicate the best and the second best performance, respectively.} \setlength{\tabcolsep}{0.8mm} \begin{tabular}{c c c c c c c c c c c c} \hline\hline & \multicolumn{5}{c}{Tibia Dataset} && \multicolumn{5}{c}{Abdominal Dataset} \\ &~\tiny{\textbf{Image Sharpness}} &~\tiny{\textbf{Image Noise}} &\tiny{\textbf{Contrast Resolution}} &~\tiny{\textbf{Diagnostic Acceptance}} &~\tiny{\textbf{Overall Quality}} &&~\tiny{\textbf{Image Sharpness}} &~\tiny{\textbf{Image Noise}} &\tiny{\textbf{Contrast Resolution}} &~\tiny{\textbf{Diagnostic Acceptance}} &~\tiny{\textbf{Overall Quality}} \\ \cline{2-6}\cline{8-12} \scriptsize{NN$^{\pmb{+}}$} & 1.89$\pm$0.27 & 2.43$\pm$0.21 & 1.89$\pm$0.78 & 1.52$\pm$0.69 & 1.72$\pm$0.33 && 1.98$\pm$0.46 & 3.22$\pm$1.45 & 1.47$\pm$0.23 & 1.67$\pm$0.85 & 2.34$\pm$0.42\\ \scriptsize{Bilinear$^{\pmb{+}}$} & 1.87$\pm$0.41 & 2.52$\pm$0.73 & 2.01$\pm$0.83 & 1.65$\pm$0.73 & 1.95$\pm$0.47 && 2.02$\pm$0.41 & 3.12$\pm$1.58 & 1.85$\pm$0.96 & 1.75$\pm$0.83 & 2.43$\pm$0.45\\ \scriptsize{Bicubic$^{\pmb{+}}$} & 2.55$\pm$0.43 & 2.34$\pm$0.82 & 2.19$\pm$0.91 & 1.82$\pm$0.21 & 2.12$\pm$0.23 && 2.52$\pm$0.53 & 2.87$\pm$1.05 & 2.51$\pm$0.53 & 2.27$\pm$0.45 & 2.61$\pm$0.67\\ \scriptsize{Lanczos$^{\pmb{+}}$} & 2.25$\pm$0.39 & 2.50$\pm$0.85 & 2.36$\pm$0.82 & 1.93$\pm$0.43 & 2.23$\pm$0.29 && 2.53$\pm$0.59 & 2.99$\pm$0.86 & 2.55$\pm$0.64 & 2.21$\pm$0.35 & 2.68$\pm$0.31\\ \scriptsize{A$^{\pmb{+}}$} & 2.34$\pm$0.47 & 2.54$\pm$0.68 & 2.52$\pm$0.67 & 1.98$\pm$0.59 & 2.37$\pm$0.97 && 2.74$\pm$0.75 & 3.07$\pm$0.96 & 2.61$\pm$0.69 & 2.35$\pm$0.57 & 2.74$\pm$0.71\\ \scriptsize{FSRCNN} & 2.85$\pm$0.94 & 3.16$\pm$0.57 & 2.54$\pm$0.96 & 2.77$\pm$0.69 & 3.27$\pm$0.76 && 3.07$\pm$0.89 & {\color{blue}{3.55$\pm$0.50}} & 2.94$\pm$0.78 & 2.92$\pm$0.58 & 3.09$\pm$0.53\\ \scriptsize{ESPCN} & 2.82$\pm$0.86 & 3.18$\pm$0.51 & 2.58$\pm$0.46 & 2.95$\pm$0.46 & 3.49$\pm$0.66 && 2.95$\pm$1.43 & 3.39$\pm$0.80 & 2.85$\pm$0.63 & 2.76$\pm$0.83 & 3.06$\pm$0.85\\ \scriptsize{LapSRN} & 2.91$\pm$0.88 & {\color{blue}{3.49$\bm{\pm}$0.70}} & 2.69$\pm$0.56 & 3.01$\pm$0.78 & 3.63$\pm$0.61 && 3.01$\pm$0.56 & \textbf{{\color{red}3.58$\bm{\pm}$0.81}} & 2.83$\pm$0.71 & 3.25$\pm$0.92 & 3.11$\pm$0.78\\ \scriptsize{SRGAN} & 1.94$\pm$0.37 & 2.71$\pm$0.23 & 1.91$\pm$0.71 & 1.75$\pm$0.83 & 1.93$\pm$1.01 && 3.35$\pm$0.97 & 3.23$\pm$1.01 & 3.27$\pm$0.92 & 3.46$\pm$1.11 & 3.41$\pm$0.94\\ \scriptsize{G-Fwd} & 2.99$\pm$0.42 & \textbf{{\color{red}3.59$\bm{\pm}$0.57}} & 3.07$\pm$0.91 & 3.45$\pm$1.02 & 3.70$\pm$0.71 && 3.25$\pm$0.94 & 3.53$\pm$0.70 & 2.95$\pm$0.57 & 3.38$\pm$0.93 & 3.09$\pm$0.55\\ \scriptsize{G-Adv} & 2.89$\pm$0.86 & 3.13$\pm$1.02 & 3.02$\pm$0.58 & 3.29$\pm$0.69 & 3.62$\pm$0.67 && 3.45$\pm$1.12 & 3.34$\pm$0.81 & 3.31$\pm$0.86 & 3.48$\pm$0.77 & 3.32$\pm$0.82\\ \scriptsize{GAN-CIRCLE} & \textbf{{\color{red}3.12$\bm{\pm}$0.73}} & 3.40$\pm$0.43 & \textbf{{\color{red}3.17$\bm{\pm}$0.46}} & \textbf{{\color{red}3.61$\bm{\pm}$0.36}} & \textbf{{\color{red}3.79$\bm{\pm}$0.72}} && \textbf{{\color{red}3.59$\bm{\pm}$0.41}} & 3.41$\pm$0.42 & \textbf{{\color{red}3.51$\bm{\pm}$0.66}} & \textbf{{\color{red}3.64$\bm{\pm}$0.54}} & \textbf{{\color{red}3.62$\bm{\pm}$0.41}}\\ \scriptsize{GAN-CIRCLE$^{s}$} & {\color{blue}{3.02$\pm$0.78}} & 3.14$\pm$0.68 & {\color{blue}{3.12$\pm$0.88}} & {\color{blue}{3.47$\pm$0.67}} & {\color{blue}{3.71$\pm$0.76}} && {\color{blue}{3.48$\pm$0.81}} & 3.29$\pm$0.80 & {\color{blue}{3.42$\pm$0.78}} & {\color{blue}{3.57$\pm$0.68}} & {\color{blue}{3.51$\pm$0.46}}\\ \scriptsize{GAN-CIRCLE$^{u}$} & 2.91$\pm$0.82 & 3.32$\pm$0.89 & 3.08$\pm$0.94 & 3.32$\pm$0.48 & 3.57$\pm$0.52 && 3.46$\pm$0.73 & 3.39$\pm$1.04 & 3.39$\pm$0.50 & 3.54$\pm$0.53 & 3.34$\pm$1.01\\ \hline\hline \end{tabular} \label{table: reader} \end{table*} \subsection{Experimental Results on the Abdominal Dataset} \label{subsec:Abdominaldataset} We further compared the above-mentioned algorithms on the abdominal benchmark dataset. A similar trend can be observed on this dataset. Our proposed GAN-CIRCLE can preserve better anatomical informations and more clearly visualize the portal vein as shown in Fig.~\ref{fig: example2}. These results demonstrate that PSNR-oriented methods (FSRCNN, ESPCN, LapSRN) can significantly suppress the noise and artifacts. However, it suffers from low image quality as judged by the human observer since it assumes that the impact of noise is independent of local image features, while the sensitivity of the Human Visual System (HVS) to noise depends on local contrast, intensity and structural variations. Fig.~\ref{fig: example2} displays the LRCT images processed by GAN-based methods (SRGAN, G-Adv, GAN-CIRCLE, GAN-CIRCLE$^{s}$, and GAN-CIRCLE$^{u}$) with improved structural identification. It can also observed that the GAN-based models also introduce strong noise into results. For example, there exist tiny artifacts on the results of GAN-CIRCLE$^{u}$. As the SR results shown in Fig.~\ref{fig: example2}, our proposed approaches (GAN-CIRCLE, GAN-CIRCLE$^{s}$) are capable of retaining high-frequency details to reconstruct more realistic images with relatively lower noise compared with the other GAN-based methods (G-Adv, SRGAN). Table~\ref{table: psnr&ssim&ifc} show that G-Fwd achieves the best performance in PSNR. Our proposed methods GAN-CIRCLE and GAN-CIRCLE$^{s}$ both obtain the pleasing results in terms of SSIM and IFC. In other words, the results show that the proposed GAN-CIRCLE and GAN-CIRCLE$^{s}$ generate more visually pleasant results with sharper edges on the abdominal dataset than the competing state-of-the-art methods. \subsection{Super-resolving Real-world Images} \label{subsec:microanimialdataset} We analyzed the performance of the SR methods in the simulated SRCT scenarios in Sections~\ref{subsec:Tibiadataset} and~\ref{subsec:Abdominaldataset}. These experimental results show that the DL-based methods are very effective in addressing the ill-posed SRCT problems with two significant features.~\textit{First}, SRCT aims at recovering a HRCT image from a LRCT images under a low-dose protocol.~\textit{Second}, most DL-based methods assume the paired LRCT images and HRCT images are matched, an assumption which is likely to be violated in clinical practice. In other words, the above-evaluated datasets were simulated, and thus the fully supervised algorithms can easily cope with SRCT tasks, with~\textbf{exactly matched} training samples. Our further goal is to derive the~\textbf{semi-supervised} scheme to handle unmatched/unpaired data with a relative lack of matched/paired data to address real SRCT tasks. In this subsection, we demonstrate a strong capability of the proposed methods in the real applications using~\textbf{a small amount of mismatched} paired LRCT and HRCT images as well as a high flexibility of adapting to various noise distributions. \subsubsection{\textit{Practical SRCT Implementation Details}} We first obtained LRCT and HRCT images using a deceased mouse on the same scanner with two scanning protocols. The micro-CT parameters are as follows: X-ray source circular scanning, $60$ kVp, $134$ mAs, $720$ projections over a range of $360$ degrees, exposure $50$ ms per projection, and the micro-CT images were reconstructed using a conventional filtered back projection algorithm (FDK): HRCT image size $1450\times 1450$, $600$ slices at $48~\mu m$ isotropic voxel size, and the LRCT image size $725\times 725$, $300$ slices at $24~\mu m$ isotropic voxel size. Then, we compared with the state-of-the-art super-resolution methods. Since the real data are unmatched, we accordingly evaluated our proposed GAN-CIRCLE$^{s}$ and GAN-CIRCLE$^{u}$ networks for $1$X resolution improvement. \subsubsection{\textit{Comparison With the State-of-the-Art methods}} The quantitative results were summarized for all the involved methods in Table~\ref{table: psnr&ssim&ifc}. The PSNR-oriented approaches, such as FSRCNN, ESPCN, LapSRN, and our G-Fwd, yield higher PSNR and SSIM values than the GAN-based methods. It is not surprising that the PSNR-oriented methods obtained favorable PSNR values since their goal is to minimize per-pixel distance to the ground truth. However, our GAN-CIRCLE$^{s}$ and GAN-CIRCLE$^{u}$ achieved the highest IFC among all the SR methods. Our method GAN-CIRCLE$^{s}$ obtained the second best results in term of SSIM. The visual comparisons are given in Figs.~\ref{fig: example5} and~\ref{fig: example6}. To demonstrate the robustness of our methods, we examined anatomical features in the lung regions and the bone structures of the mice, as shown in Figs.~\ref{fig: example5} and~\ref{fig: example6} respectively. It is observed that the GAN-based approaches performed favorably over the PSNR-oriented methods in term of perceptual quality as illustrated in Figs.~\ref{fig: example5} and~\ref{fig: example6}. Fig.~\ref{fig: example5} confirms that the PSNR-oriented methods produced blurry results especially in the lung regions, while the GAN-based methods restored anatomical contents satisfactorily. In Fig.~\ref{fig: example6}, it is notable that our methods GAN-CIRCLE$^{s}$ and GAN-CIRCLE$^{u}$ performed better than the other methods in terms of recovering structural information and preserving edges. These SR results demonstrate that our proposed methods can provide better visualization of bone and lung microarchitecture with sharp edge and rich texture. \subsection{Diagnostic Quality Assessment} We invited three board-certified radiologists with mean clinical CT experience of 12.3 years to perform independent qualitative image analysis on $10$ sets of images from two benchmark dataset (Tibia and Abdominal Dataset). Each set includes the same image slice but generated using different methods. We label HRCT and LRCT images in each set as reference. The $10$ sets of images from two datasets were randomized and deidentified so that the radiologists were blind to the post-proprocessing algorithms. Image sharpness, image noise, contrast resolution, diagnostic acceptability and overall image quality were graded on a scale from 1 (worst) to 5 (best). A score of 1 refers to a `non-diagnostic' image, while a score of 5 means an `excellent' diagnostic image quality. The mean scores with their standard deviation are presented in Table~\ref{table: reader}. The radiologists confirmed that~\textbf{GAN-based} methods (G-Adv, SRGAN, GAN-CIRCLE, GAN-CIRCLE$^{s}$ and GAN-CIRCLE$^{u}$) provide sharper images with better texture details, while~\textbf{PSNR-oriented} algorithms (FSRCNN, ESPCN, LapSRN, G-Fwd) give the higher noise suppression scores. Table~\ref{table: reader} shows that our proposed GAN-CIRCLE and GAN-CIRCLE$^{s}$ achieve comparable results, while outperforming the other methods in terms of image sharpness, contrast resolution, diagnostic acceptability and overall image quality. \section{Discussions} \label{sec:discussion} SR imaging holds tremendous promise for practical medical applications;~\textit{i.e.}, depicting bony details, lung structures, and implanted stents, and potentially enhancing radiomics analysis. As a results, X-ray computed tomography can provide compelling practical benefit in biological evaluation. High resolution micro-CT is well-suited for bone imaging. Osteoporosis, characterized by reduced bone density and structural degeneration of bone, greatly diminishes bone strength and increases the risk of fracture~\cite{cummings2002epidemiology}. Histologic studies have convincingly demonstrated that bone micro-structural properties are strong determinants of bone strength and fracture risk~\cite{kleerekoper1985role,legrand2000trabecular,parfitt1983relationships}. Modern whole-body CT technologies, benefitted with high spatial resolution, ultra-high speed scanning, relatively-low dose radiation, and large scan length, allows quantitative characterization of bone micro-structure~\cite{chen2018quantitative}. However, the state-of-the-art CT imaging technologies only allow the spatial resolution comparable or slightly higher than human trabecular bone thickness ($100-200~\mu m^6$~\cite{ding2000quantification}) leading to fuzzy representation of individual trabecular bone micro-structure with significant partial volume effects that adds significant errors in measurements and interpretations. The spatial resolution improvements in bone micro-structural representation will largely reduce such errors and improve generalizability of bone micro-structural measures from multi-vendor CT scanners by homogenizing spatial resolution. Besides revealing micro-architecture, CT scans of the abdomen and pelvis are diagnostic imaging tests used to help detect diseases of the small bowel and colon, kidney stone, and other internal organs, and are often used to determine the cause of unexplained symptoms. With rising concerns over increased lifetime risk of cancer by radiation dose associated with CT, several studies have assessed manipulation of scanning parameters and newer technologic developments as well as adoption of advanced reconstruction techniques for radiation dose reduction~\cite{kalra2004strategies,marin2009low,prakash2010reducing,vasilescu2012assessment,iyer2016quantitative}. However, in practice, the physical constraints of system hardware components and radiation dose considerations constrain the imaging performance, and computational means are necessary to optimize image resolution. For the same reason, high-quality/high-dose CT images are not often available, which means that there are often not enough paired data to train a hierarchical deep generative model. Our results have suggested an interesting topic on how to utilize unpaired data so that the imaging performance could be improved. In this regard, the use of the adversarial learning as the regularization term for SR imaging is a new mechanism to capture anatomical information. However, it should be noted that the existing GAN-based methods introduce additional noise to the results, as seen in Section~\ref{subsec:Tibiadataset} and~\ref{subsec:Abdominaldataset}. To cope with this limitation, we have incorporated the cycle-consistency so that the network can learn a complex deterministic mapping to improve image quality. The enforcement of identity and supervision allows the model to master more latent structural information to improve image resolution. Also, we have used the Wasserstein distance to stabilize the GAN training process. Moreover, typical prior studies used complex inference to learn a hierarchy of latent variables for HR imaging, which is hard to be utilized in medical applications. Thus, we have designed an efficient CNN-based network with skip-connection and network in network techniques. In the feature extraction network, we have optimized the network structures and reduced the computational complexity by applying a small amount of filters in each Conv layer and utilizing the ensemble learning model. Both local and global features are cascaded through skip connections before being fed into the restoration/reconstruction network. Although our model has achieved compelling results, there still exist some limitations. First, the proposed GAN-CIRCLE requires much longer training time than other standard GAN-based methods, which generally requires 1-2 days. Future work in this aspect should consider more principled ways of designing more efficient architectures that allow for learning more complex structural features with less complex networks at less computational cost and lower model complexity. Second, although our proposed model can generate more plausible details and better anatomical details, all subtle structures may not be always faithfully recovered. It has been also observed that the recent literature~\cite{bellemare2017cramer} mentions that the Wasserstein distance may yield the biased sample gradients, is subject to the risk of incorrect minimum, and not well suitable for stochastic gradient descent searching. In the future, experimenting with the variants of GANs are highly recommended. Finally, we notice that the network with the adversarial training can generate more realistic images. However, the restored images cannot be uniformly consistent to the original high-resolution images. To make further progress, we may also undertake efforts to add more constraints such as the sinogram consistence and the low-dimensional manifold constraint to decipher the relationship between noise, blurry appearances of images and the ground truth, and even develop an adaptive and/or task-specific loss function. \section{Conclusions} \label{sec:conclusions} In this paper, we have estabilished a cycle wasserstein regression adversarial training framework for CT SR imaging. Aided by unpaired data, our approach learns complex structured features more effectively with a limited amount of paired data. At a low computational cost, the proposed network G-Forward can achieve the significant SR gain. In general, the proposed GAN-CIRCLE has produced promising results in terms of preserving anatomical information and suppressing image noise in a purely supervised and semi-supervised learning fashion. Visual evaluations by the expert radiologists confirm that our proposed GAN-CIRCLE networks have brought superior diagnostic quality, which is consistent to systematic quantitative evaluations in terms of traditional image quality measures. \section*{Acknowledgment} The authors would like to thank the NVIDIA Corporation for the donation of the TITAN XP GPU to Dr. Ge Wang's laboratory, which was used for this study. The authors would like to thank Dr. Shouhua Luo (Southeast University, China) for providing small animal data collected on an~\textit{in vivo} micro-CT system. \bibliographystyle{IEEEtran}
\section{Introduction} Video cameras are pervasive within the modern operating room (OR) and used extensively during surgery, for example in laparoscopic or robotic assisted surgery, but with minimal video utilization. Specifically many integrated operating rooms now incorporate surveillance cameras or documentation cameras integrated within the surgical lights or in the ceiling. The video data collected by such devices is highly sensitive because it records events during the operation and also the identities of staff and patients within the OR. Yet, the video can have multiple uses in educational material or in the analysis and automation of OR optimisation systems through surgical data science platforms\cite{sds}. To be able to use the recorded videos in the OR, video processing must take place to ensure the data is anonymized and safe to be used. It is possible to approach video anonymization through computer vision algorithms for face detection but making such systems work well in surgical environments is difficult because the OR has variable lighting conditions, multiple occlusion possibilities and also the team wears surgical drapes and masks. \begin{figure}[t!] \centering \includegraphics[width=1\columnwidth]{videos.png} \caption{FaceOff images, collected from Youtube, showing the faces in the surgical environment potentially exposing sensitive information} \label{videos} \end{figure} Real-time face detection is a mature field in computer vision \cite{VJ2014}. As with many problems in the field, techniques using hand crafted features such as HOG\cite{dalalN}, have recently been superseded by convolutional neural networks (CNNs) based approaches using deep learning for detection\cite{fdl1}\cite{fdl2}\cite{fdl3}, pose estimation\cite{pe1}, and emotion prediction\cite{ed1}. The introduction of big datasets such as FDDB\cite{fddb}, IJB-A\cite{ijba}, and WIDER\cite{wider} has empowered the use of deep learning models and enhanced robustness and efficiency, shown by the evolution of approaches from recurrent CNN (RCNN) \cite{rcnn}, followed by Fast-RCNN\cite{fastrcnn}, and finally Faster-RCNN\cite{fasterrcnn}. The results for these architectures are impressive but their translation into the clinical setting faces challenges because the data needs adaptation to deal with masked faces, surgical caps and the lighting variability within the room. In this paper, we adopt the Faster-RCNN model pre-trained on the available WIDER dataset and we adapt it for face detection in the OR. Faces in the OR are very different from the WIDER dataset due to masks, caps, and surgical magnifying glasses. Detecting such faces is difficult and requires model adaptation, which we achieve through collecting surgical data from web search engines, labelled and used to fine-tune the model. To achieve anonymization, it is important that the model catches as many faces as possible. A sliding window for temporal smoothing was implemented and then applied on the detections to have a higher chance of detecting any missed face (a false negative). Our method shows promising results on our validation dataset which will be made available to the community. \section{Methods and Data} \noindent\textbf{Wider Dataset} The dataset consists of 32,203 images with 393,703 faces in 61 different environments (meetings, concerts, parades, etc \dots). It is also worth noting that this dataset include 166 images (in the training set) of faces in the surgical environment. This dataset is commonly used for benchmarking face detection. Faster RCNN is in the top 4 of all the submissions that used the WIDER dataset to benchmark performance\cite{facefaster}.\\ \noindent\textbf{FaceOff Dataset} We collected 15 videos of surgical ORs from the video search engine Youtube. All were publicly available with "Standard Youtube License" (videos can be used freely). The keywords used for searching: surgery, realtime surgery, surgery in the operating room/theatre, recorded surgery... Figure \ref{videos} shows a sample of the dataset. In total, the dataset consists of $6371$ images describing $12786$ faces. The images show variability in scales and occlusions of faces in the OR to achieve a good learning of the facial features in the OR. \subsection{Faster R-CNN} Faster R-CNN uses a regional proposal network (RPN) that estimates bounding boxes around regions in the input image. It is scale invariant as it proposes regions of many scales before interrogating each with one of two CNNs: ZFnet\cite{zfnet} and VGG-16\cite{vgg16}. The convolutional layers are shared with the RPN (unlike the architecture in Fast R-CNN), making computation efficient. The CNNs evaluate regions using the intersection of union (IoU) of each anchor with the ground truth bounding boxes of the input image during training to determine if the region is used as a positive or negative sample. The RPN proposes around $21000$ regions per image but after non-max filtering (NMF) around $2000$ valid anchors remain and only $256$ positive anchors, and $256$ negative anchors are then chosen for training.\\ The loss function of the RPN incorporates several parts shown in the equations below: \begin{equation} \mathcal{L}(p_i, t_i)= \dfrac{1}{N_{cls}}\sum\limits_{i} \mathcal{L}_{cls}(p_i,p_i^*) + \lambda \dfrac{1}{N_{reg}}\sum\limits_{i} p_i^*\mathcal{L}_{reg}(t_i,t_i^*) \label{loss} \end{equation} \begin{equation} \mathcal{L}_{cls}(p_i,p_i^*) = -log(\dfrac{e^{f_{y_i}}}{\sum\limits{j}e^{f_{j}}}) \label{losspart1} \end{equation} \begin{equation} \mathcal{L}_{reg}(t_i,t_i^*) = smooth_{L_1}(t_i-t_i^*)=\begin{cases} 0.5\text{ } (t_i-t_i^*)^2,& \text{if $|t_i-t_i^*|<1$}\\ |t_i-t_i^*| - 0.5,& \text{otherwise} \end{cases} \label{losspart2} \end{equation} The first part measures the error of the classifier whether the region is a class (in this case a face) or not. Where $p_i$ is the predicted probability, $p_i^*$ is either $0$ (when the region describes the background class) or $1$ (when the region describes the foreground class, in this case a face), and finally $N_{cls}$ is the mini-batch size (in this case 2*256 = 512). The classifier loss as shown in equation (\ref{losspart1}) is the soft-max loss of the predicted class. The second part tries to measure the error of box regressors. Where $\lambda$ is a constant, $p_i^*$ is the predicted probability (this means this part of the equation is only activated for positive anchors where $p_i^*$=1),$t_i$ is the predicted box, $t_i^*$ the ground truth box, and finally $N_{reg}$ is the total number of valid anchors (in this case around $2000$). The box regressor loss is the smoothing function of the predicted box as shown in equation (\ref{losspart2}). It tries to minimize the difference between the predicted box and the ground truth box. \begin{figure}[t!] \includegraphics[width=1\columnwidth]{smoother.png} \caption{The kernel size of the sliding average window is 5. The sliding average kernel estimates the missing $Box_2$ at frame $t$ by averaging the corresponding detected $Box_2$ in the adjacent frames $\in [t-2, t+2]$. } \label{smoother} \end{figure} \subsection{Sliding Kernel Smoother} Despite the excellent performance of a per-frame face detection method, temporal discontinuities are still possible and need to be handled with a non-detection driven approach. For anonymization, having a high recall (or low false negatives) is the main target for the model to achieve. While the described Faster R-CNN captures spatial information exceptionally well it can suffer from period occlusion or failure when faces turn or enter variable illumination conditions. But since videos will be inferred using the model, valuable temporal information can potentially be lost. As illustrated in the Fig 2 schematic, the model sometimes misses faces even though it successfully detected the same face in adjacent frames. To take advantage of that, a sliding window of kernel sizes $k=3, 5, 7$ were applied to smooth in the detections to be able to anonymize the missed faces. Doing so will also generate more false positives as the smoothing kernel does not incorporate visual information. As described in Fig 2, the smoothing window will apply a moving average on the centre frame $t$ and estimates $Box_2$ at frame $t$ with the aim of anonymizing a missed face. \begin{figure}[t!] \begin{center} \includegraphics[width=0.95\columnwidth]{IOUthresh.png} \label{threshold} \end{center} \caption{\textbf{ Left}: An example case showing the intuition of picking the right IOU threshold to calculate the metrics. The green and pink bounding boxes describes the ground truth and detected face respectively. As seen in the image, the anonymization has occurred given the area above the mask was detected. The detected region is less than half the area of the annotated face. Therefore, a threshold of $t = 0.3$ was used. \textbf{Right}: The precision and recall as a function of the value of the IOU threshold that counts a detection whether its a true positive or a false positive} \end{figure} \section{Experiments and Results} \subsubsection{Calculating activations}: Given that the model returns a bounding box, a metric must quantify how correct is that bounding box. This section will explain how those metrics where calculated. There are 4 detection cases that occur after inferring the test set. The first case occurs when the intersection over union (IOU) between the ground truth box and the predicted box is above a certain threshold $t$. This detection counts as a true positive. The second case occurs when there is no detected box close to a ground truth box. This counts as a false negative. The third case happens when there is a detected box without a ground truth box around it. This case counts as a false positive. Finally in the fourth case, when the IOU of the ground truth with the detected bounding box is lower that a threshold $t$, it counts as a false positive and a false negative (one for missing the detection, and one for detecting something that is not a face). To set the threshold $t$, the precision and recall were calculated for 9 possible values. The results can be seen in the right section of figure 3. Intuitively speaking, both the precision and recall will drop as the IOU threshold increase as it will be less likely for the predicted box to be more aligned with the ground truth. This graph shows that the precision and recall are stable between $0.1$ and $0.3$. They start slowly decreasing between $t \in [0.4,0.5]$. A sharp drop is observed after $0.5$. After evaluating the above graph, a threshold of $t = 0.3$ was chosen. $0.3$ is a good value for the IOU threshold because faces are mostly covered with surgical masks. The detections sometimes only cover the eye area as shown in the left section of figure 3, even thought the ground truth describes the whole face including the mask. This is a good detection as it anonymizes the face and therefore it must be counted as a true positive. \noindent\textbf{WIDER fine-tuning setup}: For a better anonymization, detecting normal faces is also crucial in the operating room. For that, the model from \cite{facefaster} was used. This paper fine-tuned a VGG-16 faster r-cnn trained on Imagenet using the WIDER dataset. They used stochastic gradient descent (SGD) for $50000$ iterations with base learning rate of $10^{-3}$ and then ran another $30000$ iterations with a base learning rate of $10^{-4}$. \begin{figure}[t!] \includegraphics[width=0.8\columnwidth,center]{1.png} \caption{Sample detections of both models. The WIDER trained model detections are shown in pink and the FaceOff fine-tuned model detections are shown in blue.} \label{detections} \end{figure} \noindent\textbf{FaceOff fine-tuning setup}: After training the model described above, we further fine-tuned the model on the newly collected dataset of faces in the OR. We trained the model on $8485$ faces in the OR for $20000$ iterations. The RPN generates 12000 and 2000 ROIs before and after applying NMF respectively. Model uses a mini-batch (batch of regions of ROIs) size of 64 (for normalisation), an IOU threshold of 0.7 and above to consider the ROI as an example of a face, and an IOU threshold of 0.3 and less to consider the ROI as an example of a background. The remaining ROIs (with IOU between $[0.3,0.7]$ are discarded). Finally, a size set of 256 regions per class (256 regions for the face class, and 256 regions for the background class) is used for training. We inferred the test set using the model trained on the WIDER dataset. The model returned a precision of 66.84\%, a recall of 75.40\%, and an F1 score of 70.86\%. After those promising results, we fine-tuned the model using the FACEOFF collected dataset with the setup discussed above. A precision of 82.58\%, recall of 88.05\%, and and f1 score of 85.23\% was achieved. A sample of the detections can be seen in figure \ref{detections}. In the surgical environment, the model must achieve a high recall since it is more important to detect a face than to falsely detect a face. In other words, the volume of false negatives should be as small as possible irrespective of the volume of false positives. To take advantage of the temporal information found in a video, the detections where smoothed around frames with no detections. Surrounding frames have very similar information with a high probability. Averaging the surrounding detections around a frame should help in detect false negatives. The disadvantage of this approach is that it is more likely to generate false positive than detecting false negatives. After getting the detections from the FaceOff fine-tuned Faster R-CNN model, a sliding window of kernel $ k =3,5,7$ was explored. Table \ref{results} shows that the kernel of size 3 performed the best achieving a recall of 93.46 \%. \begin{center} \begin{table}[t] \renewcommand{\arraystretch}{1.5} \renewcommand{\tabcolsep}{5mm} \caption{Surgical face detection metrics of the different models tested.} \centering \scalebox{0.95}{ \begin{tabular} {|c | c | c | c | } \hline Model & Precision & Recall & F1\\ \hline Off-the-shelf & 66.84\% & 75.40\$ & 70.86\% \\ \hline Fine-Tuned on FaceOff & 82.58\% &88.05\%&85.23\% \\ \hline Post-Smoothing k = 3 & 59.07\% & \textbf{93.46}\% & 72.39\% \\ \hline Post-Smoothing k = 5 & 55.93\% & 93.45\% & 69.96\% \\ \hline Post-Smoothing k = 7 & 53.52\% & 93.26\% & 68.01\% \\ \hline \end{tabular}} \label{results} \end{table} \end{center} \section{Discussion and Conclusion} An increasing number of cameras are integrated in the OR (head mounted, ceiling mounted, light integrated, etc.) and anonymization of video is important in order to be able to use the recorded data for a wide range of purposes like documentation, teaching and surgical data science. In order to automatically blur faces in the recorded video, we have described a method and dataset that adapts the state-of-the-art face detection techniques. Our FaceOff method and dataset describe faces in the surgical environment and use temporal smoothing to increase the recall of detection and hence increase the effectiveness of video anonymization. We fine-tuned the Faster R-CNN pretrained on the face-detection-benchmark WIDER dataset achieving a recall of 88.05 \%. Taking advantage of the temporal nature of the application (anonymizing surgical video), a sliding average window was applied to the detections to smooth the missed detected faces reaching a recall of 93.46\% on the collected FaceOff test-set. The work described in our study is a first step towards building the tools and capabilities needed in order to begin taking advantage of surgical data and building surgical data science pipelines. \section*{Acknowledgements} We gratefully acknowledge the work and support received from the Innovation team at Digital Surgery.\\ Danail Stoyanov receives funding from the EPSRC (EP/N013220/1, EP/N022750/1, EP/N027078/1, NS/A000027/1), Wellcome/EPSRC Centre for Interventional and Surgical Sciences (WEISS) (203145Z/16/Z) and EU-Horizon2020 (H2020-ICT-2015-688592).
\section{Introduction} \label{sec:intro} Floating-point numbers are widely used to represent real numbers in computer programs since they offer a good trade-off between efficiency and precision. The round-off error of a floating-point expression is the difference between the ideal computation in real arithmetic and the actual floating-point computation. These round-off errors accumulate during numerical computations. Besides having a direct effect on the result of mathematical operations, round-off errors may significantly impact the control flow of a program. This happens when the guard of a conditional statement contains a floating-point expression whose round-off error makes the actual Boolean value of the guard differ from the value that would be obtained assuming real arithmetic. In this case, the conditional statement is called an {\em unstable test.} Unstable tests are an inherent feature of floating-point programs. In general, it is not possible to completely avoid them. However, it is possible to mitigate their effect by transforming the original program into another program that conservatively (and soundly) detects and corrects unstable tests. This paper presents a program transformation technique to transform a given program into a new one that returns either the same result of the original program or a warning when the real and floating-point flows may diverge. This transformation is parametric with respect to{} two Boolean abstractions that take into consideration the round-off error in the expressions occurring in the guard. The transformation replaces the unstable conditions with more restrictive conditions that are guaranteed to preserve the control flow of stable tests. The correctness of the proposed transformation is formally verified in the Prototype Verification System (PVS)~\cite{OwreRS92}. The remainder of the paper is organized as follows. \smartref{sec:fp_err} provides technical background on floating-point numbers and round-off errors. The proposed program transformation technique is presented in \smartref{sec:transformation}. \smartref{sec:polycarp} illustrates this technique by transforming the core logic of an algorithm for polygon containment that is part of a geofencing system developed by NASA. \smartref{sec:related} discusses related work and \smartref{sec:concl} concludes the paper. \section{Round-Off Errors and Unstable Tests} \label{sec:fp_err} A floating-point number can be formalized as a pair of integers $(m,\fpexp{}) \in \ensuremath{\mathbb{Z}}^2$, where $m$ is called the \emph{significand} and $\fpexp{}$ the \emph{exponent} of the float~\cite{BoldoMunoz06,Daumas2001}. A floating-point \emph{format} $f$ is defined as a pair of integers $(p,e_{\mathit{min}})$, where $p$ is called the {\em precision} and $e_{\mathit{min}}$ is called the \emph{minimal exponent}. For instance, IEEE single and double precision floating-point numbers are specified by the formats $(24, 149)$ and $(53, 1074)$, \resp. A \emph{canonical} float is a float such that is either a normal or subnormal. A \emph{normal} float is a float such that the significand cannot be multiplied by the radix and still fit in the format. A \emph{subnormal} float is a float having the minimal exponent such that its significand can be multiplied by the radix and still fit in the format. Henceforth, $\ensuremath{\mathbb{F}}$ will denote the set of floating-point numbers in canonical form and the expression $\fpv{}$ will denote a floating-point number $(m,e)$ in $\ensuremath{\mathbb{F}}$. A conversion function $\parensmathoper{{R}}{}: \ensuremath{\mathbb{F}}\rightarrow \ensuremath{\mathbb{R}}$ is defined to refer to the real number represented by a given float, \ie{} $\parensmathoper{{R}}{(m,\fpexp{})} = m \cdot \beta^{\fpexp{}}$. The expression $\RtoF[f]{\rv{}}$ denotes the floating-point number in format $f$ \emph{closest} to $\rv{}$. The format $f$ will be omitted when clear from the context. Let $\fpv{}$ be a floating-point number that represents a real number $\rv{}$, the difference $|\Rfpv{} - \rv{}|$ is called the \emph{round-off error} (or \emph{rounding error}) of $\fpv{}$ with respect to{} $\rv{}$. \subsection{Unstable tests} Given a set $\FOsyms$ of pre-defined floating-point operations, the corresponding set $\Omega$ of operations over real numbers, a finite set $\mathbb{V}$ of variables representing real values, and a finite set $\widetilde{\mathbb{V}}$ of variables representing floating-point values, where $\mathbb{V}$ and $\widetilde{\mathbb{V}}$ are disjoint, the sets $\AExprDom$ and $\widetilde{\mathbb{A}}$ of arithmetic expressions over real numbers and over floating-point numbers, \resp, are defined by the following grammar. \begin{align*} &\AExpr ::= \mathit{d} \mid x \mid \ensuremath{\mathit{op}}(\AExpr,\ldots,\AExpr),\qquad\qquad \widetilde{\mathit{A}} ::= \mathit{\tilde{d}} \mid \fvar \mid \ensuremath{\widetilde{\rop}}(\widetilde{\mathit{A}},\ldots,\widetilde{\mathit{A}}), \end{align*} where $\AExpr \in \AExprDom$, $\mathit{d} \in \ensuremath{\mathbb{R}}$, $x \in \mathbb{V}$, $\ensuremath{\mathit{op}} \in \Omega$, $\widetilde{\mathit{A}} \in \widetilde{\mathbb{A}}$, $\mathit{\tilde{d}} \in \ensuremath{\mathbb{F}}$, $\fvar \in \widetilde{\mathbb{V}}$, $\ensuremath{\widetilde{\rop}} \in \FOsyms$. It is assumed that there is a function $\parensmathoper{\mathit{\chi_{r}}}{}: \widetilde{\mathbb{V}} \rightarrow \mathbb{V}$ that associates to each floating-point variable $\fvar$ a variable $x \in \mathbb{V}$ representing the real value of $\fvar$. The function $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{A}}}}{} : \widetilde{\mathbb{A}} \rightarrow \AExprDom$ converts an arithmetic expression on floating-point numbers to an arithmetic expression on real numbers. It is defined by simply replacing each floating-point operation with the corresponding one on real numbers and by applying $\mathit{R}$ and $\parensmathoper{\mathit{\chi_{r}}}{}$ to floating-point values and variables, respectively. Boolean expressions are defined by the following grammar. \begin{align*} \BExpr &::= \true \mid \false \mid \BExpr \wedge \BExpr \mid \BExpr \vee \BExpr \mid \neg \BExpr \mid \AExpr < \AExpr \mid \AExpr = \AExpr \mid \widetilde{\mathit{A}} < \widetilde{\mathit{A}} \mid \widetilde{\mathit{A}} = \widetilde{\mathit{A}}, \end{align*} where $\AExpr\in\AExprDom$ and $\widetilde{\mathit{A}}\in\widetilde{\mathbb{A}}$. The conjunction~$\wedge$, disjunction~$\vee$, negation~$\neg$, $\true$, and $\false$ have the usual classical logic meaning. The symbols $\BExprDom$ and $\widetilde{\mathbb{B}}$ denote the domain of Boolean expressions over real and floating-point numbers, \resp. The function $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{} : \widetilde{\mathbb{B}} \rightarrow \BExprDom$ converts a Boolean expression on floating-point numbers to a Boolean expression on real numbers. Given a variable assignment $\sigma: \mathbb{V} \rightarrow \ensuremath{\mathbb{R}}$, $\evalBExpr{\sigma}{B} \in \{\true,\false\}$ denotes the evaluation of the real Boolean expression $B$. Similarly, given $\widetilde{B}\in\widetilde{\mathbb{B}}$ and $\widetilde{\sigma}: \widetilde{\mathbb{V}} \rightarrow \ensuremath{\mathbb{F}}$, $\evalFBExpr{\widetilde{\sigma}}{\widetilde{B}} \in \{\true,\false\}$ denotes the evaluation of the floating-point Boolean expression $\widetilde{B}$. The expression language considered in this paper contains binary and $n$-ary conditionals, let expressions, arithmetic expressions, and a warning exceptional statement. Given a set $\Fsyms$ of function symbols, the syntax of program expressions in $\FStmDom$ is given by the following grammar. \begin{equation} \label{eq:lang} \begin{aligned} \mathit{S} ::= & \widetilde{\mathit{A}} \ \mid\ \ite{\widetilde{\mathit{B}}}{\mathit{S}}{\mathit{S}} \ \mid\ \mathrel{\mathit{if}} \widetilde{\mathit{B}} \mathrel{\mathit{then}} \mathit{S}\ [\mathrel{\mathit{elsif}} \widetilde{\mathit{B}} \mathrel{\mathit{then}} \mathit{S}]_{i=1}^{n} \mathrel{\mathit{else}} \mathit{S}\\ & \mid\ \letStm{\fvar}{\widetilde{\mathit{A}}}{\mathit{S}} \ \mid\ \mathit{warning}, \end{aligned} \end{equation} where $\widetilde{\mathit{A}}\in\widetilde{\mathbb{A}}$, $\widetilde{\mathit{B}}\in\widetilde{\mathbb{B}}$, $\fvar \in \widetilde{\mathbb{V}}$, and $n\in\ensuremath{\mathbb{N}}^{>0}$. The notation $[\mathrel{\mathit{elsif}} \widetilde{\mathit{B}} \mathrel{\mathit{then}} \mathit{S}]_{i=1}^{n}$ denotes a list of $n$ $\mathrel{\mathit{elsif}}$ branches. A program is a \emph{function declaration} of the form $\tilde{f}(\fvar_1,\ldots,\fvar_m)=\FStm$, where $\fvar_1,\ldots,\fvar_m$ are pairwise distinct variables in $\widetilde{\mathbb{V}}$ and all free variables appearing in $\FStm$ are in $\{\fvar_1, \ldots,\fvar_m\}$. The natural number $m$ is called the \emph{arity} of $\tilde{f}$. The set of programs is denoted as $\mathbb{P}$. When if-then-else guards contain floating-point expressions, the output of the considered program is not only directly influenced by rounding errors, but also by the error of taking the incorrect branch in the case of unstable tests. \begin{definition}[Conditional Instability]\label{def:stable} A function declaration $\tilde{f}(\!\fvar_1,\!\dots,\!\fvar_n\!)\! =\! \mathit{S}$ is said to have an \emph{unstable conditional} when its body contains a conditional statement of the form $\ite{\tilde{\phi}}{\mathit{S}_1}{\mathit{S}_2}$ and there exist two assignments $\tilde\sigma: \{\fvar_1,\dots,\fvar_n\} \rightarrow \ensuremath{\mathbb{F}}$ and $\sigma: \{\parensmathoper{\mathit{\chi_{r}}}{\fvar_1},\dots,\parensmathoper{\mathit{\chi_{r}}}{\fvar_n}\} \rightarrow \ensuremath{\mathbb{R}}$ such that for all $i\in\{1,\dots,n\}$, $\sigma(\parensmathoper{\mathit{\chi_{r}}}{\fvar_i}) = \mathit{R}({\tilde{\sigma}(\fvar_i)})$ and $\evalBExpr{{\sigma}}{\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\tilde{\phi}}} \neq \evalFBExpr{\tilde\sigma}{\tilde{\phi}}$. Otherwise, the conditional expression is said to be \emph{stable}. \end{definition} In other words, a conditional statement (or test) $\tilde{\phi}$ is unstable when there exists an assignments from the free variables $\tilde{x}_i$ in $\tilde{\phi}$ to $\ensuremath{\mathbb{F}}$ such that $\tilde{\phi}$ evaluates to a different Boolean value with respect to its real valued counterpart $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\tilde{\phi}}$. In these cases, the program is said to follow an \emph{unstable path}, otherwise, when the flows coincide, it is said to follow a \emph{stable path}. \subsection{Floating-Point Denotational Semantics} This section presents a compositional denotational semantics for the expression language of Formula~\eqref{eq:lang} that models both real and floating-point path conditions and outputs. This semantics is a modification of the one introduced in \cite{MoscatoTDM17} and \cite{TitoloFMM18}. The proposed semantics collects for each combination of real and floating-point program paths: the real and floating-point path conditions, two symbolic expressions representing the value of the output assuming the use of real and floating-point arithmetic, \resp, and a flag indicating if the element refers to either a stable or an unstable path. This information is stored in a \emph{conditional tuple}. \begin{definition}[Conditional Tuple]\label{def:ceb} A \emph{conditional tuple} is an expression of the form $\ct{\eta}{\tilde{\eta}}{r}{\tilde{r}}{t}$, where $\eta \in \BExprDom$, $\tilde{\eta} \in \widetilde{\mathbb{B}}$, $r \in \AExprDom\cup\{\bot_{\mathbf{u}}\}$, $\tilde{r} \in \widetilde{\mathbb{A}}\cup\{\bot_{\mathbf{u}}\}$, and $t\in\{\mathbf{s}, \mathbf{u}\}$. \end{definition} Intuitively, $\ct{\eta}{\tilde{\eta}}{r}{\tilde{r}}{t}$ indicates that if the condition $\eta \wedge \tilde{\eta}$ is satisfied, the output of the ideal real-valued implementation of the program is $r$ and the output of the floating-point execution is $\tilde{r}$. The sub-index $t$ is used to mark by construction whether a conditional tuple corresponds to an unstable path, when $t = \mathbf{u}$, or to a stable path, when $t = \mathbf{s}$. The element $\bot_{\mathbf{u}}$ represents the output of the warning construct. Let $\supC$ be the set of all conditional error bounds, and $\mathbb{C} \coloneq \wp (\supC)$ be the domain formed by sets of conditional error bounds. An \emph{environment} is defined as a function mapping a variable to a set of conditional tuples, \ie{} $\mathit{Env} : \widetilde{\mathbb{V}} \rightarrow \mathbb{C}$. The empty environment is denoted as $\bot_{\Env}$ and maps every variable to the empty set $\emptyset$. Given $\nu \in \mathit{Env}$, the semantics of program expressions is defined in \smartref{fig:sem} as a function $\Ssem{}{}{}{} : \FStmDom \times \mathit{Env} \rightarrow \mathbb{C}$ that returns the set of conditional tuples representing the possible real and floating-point computations and their corresponding path conditions. The operator $\lubC{{}}{{}}$ denotes the least upper bound of the domain of conditional error bounds. \begin{figure}[t!] {\small \begin{align*} % % &\Ssem{\mathit{\tilde{d}}}{\nu}{\I} \coloneq \{\ct{\true}{\true}{\parensmathoper{\mathit{R}}{\mathit{\tilde{d}}}}{\mathit{\tilde{d}}}{\mathbf{s}}\} \\[1ex] % % &\Ssem{\mathit{warning}}{\nu}{\I} \coloneq \{\ct{\true}{\true}{\bot_{\mathbf{u}}}{\bot_{\mathbf{u}}}{\mathbf{s}}\} \\[1ex] % % &\Ssem{\fvar}{\nu}{\I} \coloneq \begin{cases} \{\ct{\true}{\true}{\parensmathoper{\mathit{\chi_{r}}}{\fvar}}{\fvar}{\mathbf{s}}\} &\text{if $\nu(\fvar)=\emptyset$}\\ \nu(\fvar) &\text{otherwise} \end{cases} \\[1ex] % % &\Ssem{\ensuremath{\widetilde{\rop}}(\widetilde{\mathit{A}}_{i})_{i=1}^{n}}{\nu}{\I} \coloneq \lubC{}{}\{ \begin{aligned}[t] &\ct{\bigwedge_{i=1}^{n}\phi_i} {\bigwedge_{i=1}^{n}\tilde\phi_i}{\ensuremath{\mathit{op}}(r_i)_{i=1}^{n}} {\ensuremath{\widetilde{\rop}}(\tilde{r}_i)_{i=1}^{n}}{\mathbf{s}} \mid \forall 1 \le i \le n \colon \\ &\ct{\phi_i}{\tilde{\phi}_i}{r_i}{\tilde{r}_i}{\mathbf{s}}\in \Ssem{\widetilde{\mathit{A}}_i}{\nu}{\I}, \bigwedge_{i=1}^{n}\phi_i \mathrel{\not\Rightarrow} \false, \bigwedge_{i=1}^{n}\tilde\phi_i \mathrel{\not\Rightarrow} \false\} \end{aligned} \\[1ex] % % &\Ssem{\letStm{\fvar}{\widetilde{\mathit{A}}}{\mathit{S}}}{\nu}{\I} \coloneq \Ssem{\mathit{S}}{\nu[\fvar \mapsto \Ssem{\widetilde{\mathit{A}}}{\nu}{\I}]}{\I} \\[1ex] % % &\Ssem{\ite{\widetilde{\mathit{B}}}{\mathit{S}_1}{\mathit{S}_2}}{\nu}{\I} \coloneq \propGuard{\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}}{\widetilde{\mathit{B}}}{\Ssem{\mathit{S}_1}{\nu}{\I}} \lubC{{}}{{}}\ \propGuard{\neg\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}}{\neg \widetilde{\mathit{B}}}{\Ssem{\mathit{S}_2}{\nu}{\I}} \lubC{{}}{{}} \\ &\quad \lubC{}{}\{ \ct{\phi_2}{\tilde{\phi}_1}{r_2}{\tilde{r}_1}{\mathbf{u}} \mid \ct{\phi_1}{\tilde{\phi}_1}{r_1}{\tilde{r}_1}{\mathbf{s}} \in \Ssem{\mathit{S}_1}{\nu}{\I},\\ &\qquad\qquad \ct{\phi_2}{\tilde{\phi}_2}{r_2}{\tilde{r}_2}{\mathbf{s}} \in \Ssem{\mathit{S}_2}{\nu}{\I} \} \propGuard{\neg\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}}{\widetilde{\mathit{B}}}{} \lubC{{}}{{}} \\ &\quad \lubC{}{}\{ \ct{\phi_1}{\tilde{\phi}_2}{r_1}{\tilde{r}_2}{\mathbf{u}} \mid \ct{\phi_1}{\tilde{\phi}_1}{r_1}{\tilde{r}_1}{\mathbf{s}} \in \Ssem{\mathit{S}_1}{\nu}{\I},\\ &\qquad\qquad \ct{\phi_2}{\tilde{\phi}_2}{r_2}{\tilde{r}_2}{\mathbf{s}} \in \Ssem{\mathit{S}_2}{\nu}{\I}\} \propGuard{\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}}{\neg \widetilde{\mathit{B}}}{} \\[1ex] % % &\Ssem{\mathrel{\mathit{if}} \widetilde{\mathit{B}}_1 \mathrel{\mathit{then}} \mathit{S}_1\ [\mathrel{\mathit{elsif}} \widetilde{\mathit{B}}_i \mathrel{\mathit{then}} \mathit{S}_i]_{i=2}^{n-1} \mathrel{\mathit{else}} \mathit{S}_{n}}{\nu}{\I} \coloneq\\ &\quad \lubC{}{}_{i=1}^{n-1} \propGuard{\widetilde{\mathit{B}}_i \wedge \bigwedge_{j=1}^{i-1}\neg\widetilde{\mathit{B}}_j} {\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_i} \wedge \bigwedge_{j=1}^{i-1}\neg\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_j}} {\Ssem{\mathit{S}_i}{\nu}{\I}}\\ % &\quad\lubC{{}}{{}} % \propGuard{\bigwedge_{j=1}^{n-1}\neg\widetilde{\mathit{B}}_j} {\bigwedge_{j=1}^{n-1}\neg\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_j}} {\Ssem{\mathit{S}_n}{\nu}{\I}} \lubC{{}}{{}}\\ &\quad {}\lubC{}{} \{ \ct{\eta_i}{\tilde{\eta}_j}{r_i}{\tilde{r}_j}{\mathbf{u}} \mid i,j \in \{1,\dots, n-1\}, i \neq j,\ \ct{\eta_i}{\tilde{\eta}_i}{r_i}{\tilde{r}_i}{\mathbf{s}} \in \Ssem{\mathit{S}_i}{\nu}{\I},\\ &\qquad\qquad\ct{\eta_j}{\tilde{\eta}_j}{r_j}{\tilde{r}_j}{\mathbf{s}} \in \Ssem{\mathit{S}_j}{\nu}{\I}\} \propGuard{\widetilde{\mathit{B}}_j \wedge \bigwedge_{k=1}^{j-1}\neg\widetilde{\mathit{B}}_k} {\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_i} \wedge \bigwedge_{k=1}^{i-1}\neg\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_k}}{} \lubC{{}}{{}}\\ % &\quad \lubC{}{} \{ \ct{\eta_i}{\tilde{\eta}_n}{r_i}{\tilde{r}_n}{\mathbf{u}} \mid i \in \{1,\dots, n-1\},\ \ct{\eta_i}{\tilde{\eta}_i}{r_i}{\tilde{r}_i}{\mathbf{s}} \in \Ssem{\mathit{S}_i}{\nu}{\I},\\ &\qquad\qquad\ct{\eta_n}{\tilde{\eta}_n}{r_n}{\tilde{r}_n}{\mathbf{s}} \in \Ssem{\mathit{S}_n}{\nu}{\I}\} \propGuard{\bigwedge_{k=1}^{n-1}\neg\widetilde{\mathit{B}}_k} {\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_i} \wedge \bigwedge_{k=1}^{i-1}\neg\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_k}}{} % \lubC{{}}{{}}\\ % &\quad \lubC{}{} \{ \ct{\eta_n}{\tilde{\eta}_i}{r_n}{\tilde{r}_i}{\mathbf{u}} \mid i \in \{1,\dots, n-1\},\ \ct{\eta_i}{\tilde{\eta}_i}{r_i}{\tilde{r}_i}{\mathbf{s}} \in \Ssem{\mathit{S}_i}{\nu}{\I},\\ &\qquad\qquad \ct{\eta_n}{\tilde{\eta}_n}{r_n}{\tilde{r}_n}{\mathbf{s}} \in \Ssem{\mathit{S}_n}{\nu}{\I}\} \propGuard{\widetilde{\mathit{B}}_i \wedge \bigwedge_{k=1}^{i-1}\neg\widetilde{\mathit{B}}_k} {\bigwedge_{k=1}^{n-1}\neg\parensmathoper{\mathit{R}}{\widetilde{\mathit{B}}_k}}{} \end{align*} } \caption{Semantics of a program expression.} \label{fig:sem} \end{figure} The semantics of a variable $\fvar\in\widetilde{\mathbb{V}}$ consists of two cases. If $\fvar$ belongs to the environment, then the variable has been previously bound to a program expression $\mathit{S}$ through a let-expression. In this case, the semantics of $\fvar$ is exactly the semantics of $\mathit{S}$. If $\fvar$ does not belong to the environment, then $\fvar$ is a parameter of the function. Here, a new conditional error bound is added with a placeholder $\parensmathoper{\mathit{\chi_{r}}}{\fvar}$ representing the real value of $\fvar$. The semantics of a floating-point arithmetic operation $\ensuremath{\widetilde{\rop}}$ is computed by composing the semantics of its operands. The real and floating-point values are obtained by applying the corresponding arithmetic operation to the values of the operands. The new conditions are obtained as the combination of the conditions of the operands. The semantics of the expression $\letStm{\fvar}{\widetilde{\mathit{A}}}{\mathit{S}}$ updates the current environment by associating with variable $\fvar$ the semantics of expression $\widetilde{\mathit{A}}$. The semantics of the conditional $\ite{\widetilde{\mathit{B}}}{\mathit{S}_1}{\mathit{S}_2}$ uses an auxiliary operator $\propGuard{}{}{}$. \begin{definition}[Condition propagation operator] Given $b\in \BExprDom$ and $\tilde{b} \in \widetilde{\mathbb{B}}$, $\propGuard{b}{\tilde{b}}{\ct{\phi}{\tilde{\phi}}{r}{\tilde{r}}{t}} = \ct{\phi\wedge b}{\tilde{\phi}\wedge \tilde{b}}{r}{\tilde{r}}{t}$ if $\phi \wedge b \wedge \tilde{\phi}\wedge\tilde{b} \mathrel{\not\Rightarrow} \false$, otherwise it is undefined. The definition of $\propGuard{}{}{}$ naturally extends to sets of conditional tuples: given $C\in\mathbb{C}$, $\propGuard{b}{\tilde{b}}{C} = \bigcup_{c \in C} \propGuard{b}{\tilde{b}}{c}$. \end{definition} The semantics of $\mathit{S}_1$ and $\mathit{S}_2$ are enriched with the information about the fact that real and floating-point control flows match, \ie{} both $\widetilde{\mathit{B}}$ and $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}$ have the same value. In addition, new conditional tuples are built to model the unstable cases when real and floating-point control flows do not coincide and, therefore, real and floating-point computations diverge. For example, if $\widetilde{\mathit{B}}$ is satisfied but $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}$ is not, the $\mathit{then}$ branch is taken in the floating-point computation, but the $\mathit{else}$ would have been taken in the real one. In this case, the real condition and its corresponding output are taken from the semantics of $\mathit{S}_2$, while the floating-point condition and its corresponding output are taken from the semantics of $\mathit{S}_1$. The condition $\cond{\neg\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}}{\widetilde{\mathit{B}}}$ is propagated in order to model that $\widetilde{\mathit{B}}$ holds but $\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\widetilde{\mathit{B}}}$ does not. The conditional tuples representing this case are marked with $\mathbf{u}$. Similarly, the semantics of an n-ary conditional is composed of stable and unstable cases. The stable cases are built from the semantics of all the program sub-expressions $S_i$ by enriching them with the information stating that the correspondent guard and its real counter-part hold and all the previous guards and their real counterparts do not hold. All the unstable combinations are built by combining the real parts of the semantics of a program expression $S_i$ and the floating-point contributions of a different program expression $S_j$. In addition, the operator $\propGuard{}{}{}$ is used to propagate the information that the real guard of $S_i$ and the floating-point guard of $S_j$ hold, while the guards of the previous branches do not hold. \section{Program Transformation} \label{sec:transformation} In this section, a program transformation is proposed for detecting when round-off errors affect the evaluation of floating-point conditionals and for ensuring that when the floating-point control flow diverges from the real one a warning is issued. The proposed transformation takes into account round-off errors by abstracting the Boolean expressions in the guards of the original program. This is done by means of two Boolean abstractions $\parensmathoper{\beta^{+}}{}, \parensmathoper{\beta^{-}}{}: \widetilde{\mathbb{B}} \rightarrow \widetilde{\mathbb{B}}$. Given $\tilde{\phi}\in\widetilde{\mathit{B}}$, let $\parensmathoper{\mathit{fv}}{\tilde{\phi}}$ be the set of free variables in $\tilde{\phi}$. For all $\sigma: \{\parensmathoper{\mathit{\chi_{r}}}{\tilde{x}}\mid\tilde{x}\in\parensmathoper{\mathit{fv}}{\tilde{\phi}}\} \rightarrow \ensuremath{\mathbb{R}}$, $\tilde{\sigma}: \parensmathoper{\mathit{fv}}{\tilde{\phi}} \rightarrow \ensuremath{\mathbb{F}}$, and $\fvar\in\parensmathoper{\mathit{fv}}{\tilde{\phi}}$ such that $\parensmathoper{\mathit{R}}{\tilde{\sigma}(\fvar)} = \sigma(\parensmathoper{\mathit{\chi_{r}}}{\fvar})$, $\parensmathoper{\beta^{+}}{}$ and $\parensmathoper{\beta^{-}}{}$ satisfy the following properties. \begin{enumerate} \item\label{pt:pos_prop} $\evalFBExpr{\tilde{\sigma}}{\parensmathoper{\beta^{+}}{\tilde{\phi}}} \Rightarrow \evalFBExpr{\tilde{\sigma}}{\tilde{\phi}} \wedge \evalBExpr{\sigma}{\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\tilde{\phi}}}$. \item\label{pt:neg_prop} $\evalFBExpr{\tilde{\sigma}}{\parensmathoper{\beta^{-}}{\tilde{\phi}}} \Rightarrow \evalFBExpr{\tilde{\sigma}}{\neg\tilde{\phi}} \wedge \evalBExpr{\sigma}{\neg\parensmathoper{\mathit{R}_{\widetilde{\mathbb{B}}}}{\tilde{\phi}}}$. \end{enumerate} Property~\ref{pt:pos_prop} states that for all floating-point Boolean expressions $\tilde{\phi}$, $\parensmathoper{\beta^{+}}{\tilde{\phi}}$ implies both $\tilde{\phi}$ and its real counterpart. Symmetrically, Property~\ref{pt:neg_prop} ensures that $\parensmathoper{\beta^{-}}{\tilde{\phi}}$ implies both the negation of $\tilde{\phi}$ and the negation of its real counterpart. \begin{example} \label{ex:beta} The Boolean abstractions $\parensmathoper{\beta^{+}}{}$ and $\parensmathoper{\beta^{-}}{}$ can be instantiated as follows for conjunctions and disjunction of sign tests. Properties \ref{pt:pos_prop} and \ref{pt:neg_prop} are formally proven in PVS\ to hold for the following definitions of $\parensmathoper{\beta^{+}}{}$ and $\parensmathoper{\beta^{-}}{}$. % Let $\widetilde{\vraexpr}\in\widetilde{\mathbb{A}}$ and $\rerr\in \ensuremath{\mathbb{F}}$ such that $|\widetilde{\vraexpr} - \parensmathoper{\mathit{R}_{\widetilde{\mathbb{A}}}}{\widetilde{\vraexpr}}| \leq \rerr$. % \begin{align*} & \parensmathoper{\beta^{+}}{\widetilde{\vraexpr} \leq 0} = \widetilde{\vraexpr} \leq -\rerr &&\parensmathoper{\beta^{-}}{\widetilde{\vraexpr} \leq 0} = \widetilde{\vraexpr} > \rerr\\ & \parensmathoper{\beta^{+}}{\widetilde{\vraexpr} \geq 0} = \widetilde{\vraexpr} \geq \rerr &&\parensmathoper{\beta^{-}}{\widetilde{\vraexpr} \geq 0} = \widetilde{\vraexpr} < -\rerr\\ & \parensmathoper{\beta^{+}}{\widetilde{\vraexpr} < 0} = \widetilde{\vraexpr} < -\rerr &&\parensmathoper{\beta^{-}}{\widetilde{\vraexpr} < 0} = \widetilde{\vraexpr} \geq \rerr\\ & \parensmathoper{\beta^{+}}{\widetilde{\vraexpr} > 0} = \widetilde{\vraexpr} > \rerr &&\parensmathoper{\beta^{-}}{\widetilde{\vraexpr} > 0} = \widetilde{\vraexpr} \leq -\rerr\\ & \parensmathoper{\beta^{+}}{\tilde{\phi}_1 \wedge \tilde{\phi}_2} = \parensmathoper{\beta^{+}}{\tilde{\phi}_1} \wedge \parensmathoper{\beta^{+}}{\tilde{\phi}_2} &&\parensmathoper{\beta^{-}}{\tilde{\phi}_1 \wedge \tilde{\phi}_2} = \parensmathoper{\beta^{-}}{\tilde{\phi}_1} \vee \parensmathoper{\beta^{-}}{\tilde{\phi}_2}\\ & \parensmathoper{\beta^{+}}{\tilde{\phi}_1 \vee \tilde{\phi}_2} = \parensmathoper{\beta^{+}}{\tilde{\phi}_1} \vee \parensmathoper{\beta^{+}}{\tilde{\phi}_2} &&\parensmathoper{\beta^{-}}{\tilde{\phi}_1 \vee \tilde{\phi}_2} = \parensmathoper{\beta^{-}}{\tilde{\phi}_1} \wedge \parensmathoper{\beta^{-}}{\tilde{\phi}_2}\\ & \parensmathoper{\beta^{+}}{\neg\tilde{\phi}} = \parensmathoper{\beta^{-}}{\tilde{\phi}} &&\parensmathoper{\beta^{-}}{\neg\tilde{\phi}} = \parensmathoper{\beta^{+}}{\tilde{\phi}}\\ \end{align*} The abstractions performed for sign tests are not correct for generic inequalities of the form $a \leq b$. In this case, to compensate for the round-off errors of both expressions, additional floating-point operations must be performed. Thus, the round-off error generated by such operations needs to be considered as well to obtain a sound approximation. The naive application of this strategy leads to a non-\-terminating transformation. The design of an effective approximation for these generic inequalities is left as future work. \end{example} The program transformation is defined as follows. \begin{definition}[Program Transformation] \label{def:prog_trans} Let $\tilde{f}(\fvar_1,\ldots,\fvar_n)=S \in\mathbb{P}$ be a floating-point program that does not contain any $\mathit{warning}$ statements, the transformed program is defined as $\tilde{f}(\fvar_1,\ldots,\fvar_n)=\parensmathoper{\tau}{S}$ where $\parensmathoper{\tau}{}$ is defined as follows. \begin{align*} &\parensmathoper{\tau}{\tilde{A}} = \tilde{A}\\[1ex] % &\parensmathoper{\tau}{\ite{\tilde{\phi}}{S_{1}}{S_{2}}} =\\ &\qquad \ite{\parensmathoper{\beta^{+}}{\tilde{\phi}}}{\parensmathoper{\tau}{S_{1}}} {\ite{\parensmathoper{\beta^{-}}{\tilde{\phi}}}{\parensmathoper{\tau}{S_{2}}}{\mathit{warning}}}\\[1ex] % &\parensmathoper{\tau}{\mathrel{\mathit{if}} \tilde{\phi}_1 \mathrel{\mathit{then}} \mathit{S}_1\ [\mathrel{\mathit{elsif}} \tilde{\phi}_i \mathrel{\mathit{then}} \mathit{S}_i]_{i=2}^{n-1} \mathrel{\mathit{else}} \mathit{S}_{n}} =\\ &\qquad\mathrel{\mathit{if}} \parensmathoper{\beta^{+}}{\tilde{\phi}_1} \mathrel{\mathit{then}} \parensmathoper{\tau}{\mathit{S}_1}\ [\mathrel{\mathit{elsif}} \parensmathoper{\beta^{+}}{\tilde{\phi}_i} \wedge {\textstyle \bigwedge_{j = 1}^{i-1}} \parensmathoper{\beta^{-}}{\tilde{\phi}_j} \mathrel{\mathit{then}} \parensmathoper{\tau}{\mathit{S}_i}]_{i=2}^{n-1}\\ &\qquad\mathrel{\mathit{elsif}} {\textstyle \bigwedge_{j = 1}^{n-1}} \parensmathoper{\beta^{-}}{\tilde{\phi}_j} \mathrel{\mathit{then}} \parensmathoper{\tau}{\mathit{S}_{n}}\\ &\qquad\mathrel{\mathit{else}} \mathit{warning}\\[1ex] % &\parensmathoper{\tau}{\letStm{\fvar}{\tilde{A}}{S}} = \letStm{\fvar}{\tilde{A}}{\parensmathoper{\tau}{S}} \end{align*} \end{definition} In the case of the binary conditional statement, the \emph{then} branch of the transformed program is taken when $\parensmathoper{\beta^{+}}{\tilde{\phi}}$ is satisfied. By Property~\ref{pt:pos_prop}, this means that in the original program both $\tilde{\phi}$ and $\parensmathoper{\mathit{R}}{\tilde{\phi}}$ hold and, thus, the \emph{then} branch is taken in both real and floating-point control flows. Similarly, the \emph{else} branch of the transformed program is taken when $\parensmathoper{\beta^{-}}{\tilde{\phi}}$ holds. This means, by Property~\ref{pt:neg_prop}, that in the original program the else branch is taken in both real and floating-point control flows. In the case real and floating-flows diverge, neither $\parensmathoper{\beta^{+}}{\tilde{\phi}}$ nor $\parensmathoper{\beta^{-}}{\tilde{\phi}}$ is satisfied and a warning is returned. In the case of the n-ary conditional statements, the guard $\tilde{\phi}_i$ of the $i$-th branch is replaced by the conjunction of $\parensmathoper{\beta^{+}}{\tilde{\phi}_i}$ and $\parensmathoper{\beta^{-}}{\tilde{\phi}_j}$ for all the previous branches $j<i$. By properties~\ref{pt:pos_prop} and \ref{pt:neg_prop}, it follows that the transformed program takes the $i$-th branch only when the same branch is taken in both real and floating-point control flows of the original program. Additionally, a warning is issued by the transformed program when real and floating-point control flows of the original program differ. The following theorem states the correctness of the program transformation $\parensmathoper{\tau}{}$. If the transformed program $\parensmathoper{\tau}{P}$ returns an output $\tilde{r}$ different from $\mathit{warning}$, then the original program follows a stable path and returns the floating-point output $\tilde{r}$. Furthermore, in the case the original program presents an unstable behavior, the transformed program returns $\mathit{warning}$. \begin{theorem}[Program Transformation Correctness] \label{th:corr_trans} Given $\tilde{f}(\fvar_1,\!\ldots,\!\fvar_n)\!=\!S \in\mathbb{P}$, $\sigma: \{\parensmathoper{\mathit{\chi_{r}}}{\fvar_1} \dots \parensmathoper{\mathit{\chi_{r}}}{\fvar_n}\} \rightarrow \ensuremath{\mathbb{R}}$, and $\tilde{\sigma}: \{\fvar_1 \dots \fvar_n\} \rightarrow \ensuremath{\mathbb{F}}$, such that for all $i\in\{1,\dots,n\}$, $\parensmathoper{\mathit{R}}{\tilde{\sigma}(\fvar_i)} = \sigma(\parensmathoper{\mathit{\chi_{r}}}{\fvar_i})$: \begin{enumerate} \item for all $\ct{\eta'}{\tilde{\eta}'}{r'}{\tilde{r}'}{t'} \in \Ssem{\parensmathoper{\tau}{S}}{\bot_{\Env}}{}$ such that $\tilde{r}\neq\bot_{\mathbf{u}}$, there exists $\ct{\eta}{\tilde{\eta}}{r}{\tilde{r}}{\mathbf{s}} \in \Ssem{S}{\bot_{\Env}}{}$ such that $\evalFBExpr{\tilde{\sigma}}{\tilde{\eta}'} \Rightarrow \evalBExpr{\sigma}{\eta} \wedge \evalFBExpr{\tilde{\sigma}}{\tilde{\eta}}$ and $\tilde{r} = \tilde{r}'$; \item for all $\ct{\eta}{\tilde{\eta}}{r}{\tilde{r}}{\mathbf{u}} \!\in \Ssem{S}{\bot_{\Env}}{}$, there exists $\ct{\eta'}{\!\tilde{\eta}'}{r'}{\!\bot_{\mathbf{u}}}{t'} \!\in \Ssem{\parensmathoper{\tau}{S}}{\bot_{\Env}}{}$ such that $\evalBExpr{\sigma}{\eta} \wedge \evalFBExpr{\tilde{\sigma}}{\tilde{\eta}} \Rightarrow \evalFBExpr{\tilde{\sigma}}{\tilde{\eta}'}$. \end{enumerate} \end{theorem} The program transformation defined in \smartref{def:prog_trans} has been formalized and \smartref{th:corr_trans} has been proven correct in PVS.\footnote{This formalization is available at \url{https://shemesh.larc.nasa.gov/fm/PRECiSA}.} It is important to remark that the intended semantics of the floating-point transformed program is the real-valued semantics of the original one, i.e., the real-valued semantics of the transformed program is irrelevant. Therefore, even if the transformed program presents unstable tests, \smartref{th:corr_trans} ensures that its floating-point control flow preserves the control flow of stable tests in the original program. \begin{example} Consider the program \textit{eps\_line}, which is part of the ACCoRD conflict detection and resolution algorithm~\cite{DowekMC05}. This function is used to compute an implicitly coordinated horizontal resolution direction for the aircraft involved in a pair-wise conflict. \begin{align*} \textit{eps\_line}(\tilde{v}_{x},\tilde{v}_{y},\tilde{s}_{x},\tilde{s}_{y})=&\mathrel{\mathit{if}} \widetilde{expr}> 0 \mathrel{\mathit{then}} 1\ \mathrel{\mathit{elsif}} \widetilde{expr} < 0 \mathrel{\mathit{then}} -1\ \mathrel{\mathit{else}} 0, \end{align*} where $\widetilde{\mathit{expr}} = (\tilde{s}_{x}*\tilde{v}_{y})- (\tilde{s}_{y}*\tilde{v}_{x})$ and $\tilde{v}_{x},\tilde{v}_{y},\tilde{s}_{x},\tilde{s}_{y}$ are floating-point variables. For example, if the values of such variables are assumed to lie in the range $[-100, 100]$, the tool PRECiSA{}~\cite{MoscatoTDM17,TitoloFMM18} can be used to compute the round-off error estimation $\rerr =6.4801497501321145\times{}10^{-12}$ for $\widetilde{\mathit{expr}}$. PRECiSA{} is a tool that over-approximates the round-off error of floating-point programs. It is fully automatic and generates PVS{} proof certificates that guarantee the correctness of the error estimations with respect to the floating-point IEEE-754 standard. The following program is obtained by using the transformation $\parensmathoper{\tau}{}$ with the Boolean approximations of \smartref{ex:beta}. \begin{align*} \parensmathoper{\tau}{\textit{eps\_line}(\tilde{v}_{x},\tilde{v}_{y},\tilde{s}_{x},\tilde{s}_{y})}=&\mathrel{\mathit{if}} \widetilde{\mathit{expr}}> \rerr \mathrel{\mathit{then}} 1\ \mathrel{\mathit{elsif}} \widetilde{\mathit{expr}} < -\rerr \mathrel{\mathit{then}} -1\\ &\quad\mathrel{\mathit{elsif}} \widetilde{\mathit{expr}} \geq \rerr \wedge \widetilde{\mathit{expr}} \leq -\rerr \mathrel{\mathit{then}} 0\ \mathrel{\mathit{else}} \mathit{warning} \end{align*} The condition $\widetilde{\mathit{expr}} \geq \rerr \wedge \widetilde{\mathit{expr}} \leq -\rerr$ never holds since $\rerr$ is a positive number. Therefore, the transformed program never returns 0. Indeed, when $\widetilde{\mathit{expr}}$ is close to $0$, the test is unstable. The transformed program detects these unstable cases and returns a warning. \end{example} \section{Case Study: PolyCARP algorithm} \label{sec:polycarp} PolyCARP\footnote{PolyCARP is available at \url{https://github.com/nasa/polycarp}.} (Algorithms for Computations with Polygons)~\cite{NarkawiczH16,NarkawiczMD17} is a suite of algorithms for geo-containment applications. One of the main applications of PolyCARP is to provide geofencing capabilities to unmanned aerial systems (UAS), \ie{} detecting whether a UAS is inside or outside a given geographical region, which is modeled using a 2D polygon with a minimum and a maximum altitude. Another application of PolyCARP is the detection of weather cells, modeled as moving polygons, along an aircraft trajectory. A core piece of logic in PolyCARP is the polygon containment algorithm, i.e., the algorithm that checks whether or not a point lies in the interior of a polygon. Algorithms for polygon containment have to be carefully implemented since numerical errors may lead to wrong answers, even in cases where the point is far from the boundaries of the polygon. PolyCARP uses several techniques to detect if a point is contained in a polygon. One of these techniques relies on the computation of the \emph{winding number}. This number corresponds to the number of times the polygon winds around $p$. Consider two consecutive vertices $v$ and $v'$ of the polygon in the Cartesian plane with the point $p$ as the origin. The function \textit{winding\_number\_edge} checks in which quadrants $v$ and $v'$ are located and counts how many axes are crossed by the edge $(v,v')$. If $v$ and $v'$ belong to the same quadrant, the contribution of the edge to the winding number is 0 since no axis is crossed. If $v$ and $v'$ lie in adjacent quadrants, the contribution is 1 (\resp{} -1) if moving from $v$ to $v'$ along the edge is in counterclockwise (\resp{} clockwise) direction. In the case $v$ and $v'$ are in opposite quadrants, the determinant is computed for checking the direction of the edge. If it is counterclockwise the contribution is 2, otherwise it is -2. The winding number is obtained as the sum of the contributions of all the edges of the polygon. If the result is 0 or 4, the point is inside the polygon, otherwise, it is outside. \begin{align*} &\mathit{winding\_number\_edge}(v_x, v_y, v'_x, v'_y, p_x, p_y) =\\ &\quad\mathrel{\mathit{let}} \mathit{t}_x = v_x - p_x \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{t}_y = v_y - p_y \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{n}_x = v'_x - p_x \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{n}_y = v'_y - p_y \mathrel{\mathit{in}}\\ &\qquad\mathrel{\mathit{if}} \mathit{same\_quad} \mathrel{\mathit{then}} 0 \\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{adj\_quad\_ctrclock} \mathrel{\mathit{then}} 1\\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{adj\_quad\_clock} \mathrel{\mathit{then}} -1 \\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{det\_pos} \mathrel{\mathit{then}} 2\\ &\qquad\mathrel{\mathit{else}}\ -2 \end{align*} where \begin{align*} &\mathit{same\_quad} =\\ &\qquad\begin{aligned}[t] &(\mathit{t}_x \geq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \geq 0 \wedge \mathit{n}_y \geq 0) \vee (\mathit{t}_x \leq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \geq 0)\ \vee\\ &(\mathit{t}_x \geq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \geq 0 \wedge \mathit{n}_y \leq 0) \vee (\mathit{t}_x \leq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \leq 0) \end{aligned}\\ &\mathit{adj\_quad\_ctrclock} =\\ &\qquad\begin{aligned}[t] &(\mathit{t}_x \geq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \geq 0 \wedge \mathit{n}_y \geq 0)\vee (\mathit{t}_x \geq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \geq 0)\ \vee\\ &(\mathit{t}_x \leq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \leq 0) \vee (\mathit{t}_x \leq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \geq 0 \wedge \mathit{n}_y \leq 0), \end{aligned}\\ &\mathit{adj\_quad\_clock} =\\ &\qquad\begin{aligned}[t] &(\mathit{t}_x \geq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \geq 0 \wedge \mathit{n}_y \leq 0) \vee (\mathit{t}_x \leq 0 \wedge \mathit{t}_y \geq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \geq 0)\ \vee\\ &(\mathit{t}_x \leq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \geq 0) \vee (\mathit{t}_x \geq 0 \wedge \mathit{t}_y \leq 0 \wedge \mathit{n}_x \leq 0 \wedge \mathit{n}_y \leq 0), \end{aligned}\\ &\mathit{det\_pos} = (\mathit{n}_x - \mathit{t}_x) * \mathit{t}_y - (\mathit{n}_y - \mathit{t}_y) * \mathit{t}_x \leq 0. \end{align*} The function \textit{winding\_number\_edge} has been verified in PVS{} using real arithmetic. However, due to floating-point errors, taking the incorrect branch for one of the edges in the computation of the winding number may result in an incorrect conclusion about the position of the point with respect to{} the polygon. In order to overcome this problem, the transformation $\parensmathoper{\tau}{}$ of \smartref{def:prog_trans} is applied to the function $\mathit{winding\_number\_edge}$ resulting in the following function. Given initial bounds for the input variables, PRECiSA{}~\cite{MoscatoTDM17,TitoloFMM18} can be used to compute the round-off error estimations for $n_x$, $n_y$, $t_x$, $t_y$ and the determinant, which are denoted $\rerr_{t_x}$, $\rerr_{t_y}$, $\rerr_{n_x}$, $\rerr_{n_y}$, and $\rerr_{\textit{det}}$, respectively. \begin{align*} &\parensmathoper{\tau}{\mathit{winding\_number\_edge}(v_x, v_y, v'_x, v'_y, p_x, p_y)} =\\ &\quad\mathrel{\mathit{let}} \mathit{t}_x = v_x - p_x \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{t}_y = v_y - p_y \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{n}_x = v'_x - p_x \mathrel{\mathit{in}}\ \mathrel{\mathit{let}} \mathit{n}_y = v'_y - p_y \mathrel{\mathit{in}}\\ &\qquad\mathrel{\mathit{if}}\ \mathit{same\_quad^{\beta}} \mathrel{\mathit{then}} 0 \\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{adj\_quad\_ctrclock^{\beta}} \mathrel{\mathit{then}} 1\\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{adj\_quad\_clock^{\beta}} \mathrel{\mathit{then}} -1 \\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{det\_pos^{\beta}} \mathrel{\mathit{then}} 2\\ &\qquad\mathrel{\mathit{elsif}}\ \mathit{original\_else^{\beta}} \mathrel{\mathit{else}} -2\\ &\qquad\mathrel{\mathit{else}}\ \mathit{warning}, \end{align*} where \begin{align*} &\mathit{same\_quad^{\beta}} = \parensmathoper{\beta^{+}}{\mathit{same\_quad}} = \begin{aligned}[t] &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \geq \rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \geq \rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y}), \end{aligned}\\[1ex] &\mathit{adj\_quad\_ctrclock^{\beta}} = \parensmathoper{\beta^{+}}{\mathit{adj\_quad\_counterclock}} \wedge \parensmathoper{\beta^{-}}{\mathit{same\_quad}},\\[1ex] &\mathit{adj\_quad\_clock^{\beta}} = \begin{aligned}[t] &\parensmathoper{\beta^{+}}{\mathit{adj\_quad\_clock}} \wedge \parensmathoper{\beta^{-}}{\mathit{adj\_quad\_ctrclock}} \ \wedge\\ & \parensmathoper{\beta^{-}}{\mathit{same\_quad}},\\[1ex] \end{aligned}\\ &\mathit{det\_pos^{\beta}} = \begin{aligned}[t] & (\mathit{n}_x - \mathit{t}_x) * \mathit{t}_y - (\mathit{n}_y - \mathit{t}_y) * \mathit{t}_x \leq -\rerr_{\mathit{det}} \wedge \parensmathoper{\beta^{-}}{\mathit{adj\_quad\_clock}} \ \wedge\\ & \parensmathoper{\beta^{-}}{\mathit{adj\_quad\_ctrclock}} \wedge \parensmathoper{\beta^{-}}{\mathit{same\_quad}},\\[1ex] \end{aligned}\\ &\mathit{original\_else^{\beta}} = \begin{aligned}[t] & (\mathit{n}_x - \mathit{t}_x) * \mathit{t}_y - (\mathit{n}_y - \mathit{t}_y) * \mathit{t}_x > \rerr_{\mathit{det}} \wedge \parensmathoper{\beta^{-}}{\mathit{adj\_quad\_clock}} \ \wedge\\ & \parensmathoper{\beta^{-}}{\mathit{adj\_quad\_ctrclock}} \wedge \parensmathoper{\beta^{-}}{\mathit{same\_quad}},\\[1ex] \end{aligned}\\[1ex] &\parensmathoper{\beta^{-}}{\mathit{same\_quad}} = \begin{aligned}[t] &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x < -\rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x < -\rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y}), \end{aligned}\\[1ex] &\parensmathoper{\beta^{+}}{\mathit{adj\_quad\_ctrclock}} = \begin{aligned}[t] &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \geq \rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \geq \rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y}), \end{aligned}\\[1ex] &\parensmathoper{\beta^{-}}{\mathit{adj\_quad\_ctrclock}}= \begin{aligned}[t] &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x < -\rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x < -\rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y}), \end{aligned}\\[1ex] &\parensmathoper{\beta^{+}}{\mathit{adj\_quad\_clock}} = \begin{aligned}[t] &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \geq \rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \geq \rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \leq -\rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \geq \rerr_{n_y})\ \vee\\ &(\mathit{t}_x \geq \rerr_{t_x} \wedge \mathit{t}_y \leq -\rerr_{t_y} \wedge \mathit{n}_x \leq -\rerr_{n_x} \wedge \mathit{n}_y \leq -\rerr_{n_y}), \end{aligned}\\[1ex] &\parensmathoper{\beta^{-}}{\mathit{adj\_quad\_clock}} = \begin{aligned}[t] &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x < -\rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y < -\rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x > \rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y < -\rerr_{n_y})\ \wedge\\ &(\mathit{t}_x < -\rerr_{t_x} \vee \mathit{t}_y > \rerr_{t_y} \vee \mathit{n}_x > \rerr_{n_x} \vee \mathit{n}_y > \rerr_{n_y}). \end{aligned} \end{align*} Consider a polygonal geofence and a set of randomly generated points in the square that circumscribes it. For each edge of the polygon and each generated point, the original function $\mathit{winding\_number\_edge}$ is executed by using both exact real arithmetic and double-precision floating-point arithmetic. Additionally, the transformed function $\parensmathoper{\tau}{\mathit{winding\_number\_edge}}$ is executed with double-precision floating-point arithmetic. For these randomly generated points, both the original and the transformed program return the same result. However, the closer the generated point is to the border of the polygon, the more likely is for the original program to take an unstable path. By considering a set of randomly generated points very close to the edges of the polygon, the transformed program always returns a warning, showing that these are the cases for which the floating-point computation may diverge from the real one. Since an over-approximation of the round-off error is used, not all the generated warnings reflect an actual problem. In fact, false warnings occur when the compensated error computed by the abstraction is larger than the round-off error that actually occurs in the computation. The amount of false warnings converges to the $50\%$ of the number of total warnings as the distance to the edge decreases. \section{Related Work} \label{sec:related} Recently, several program transformations have been proposed with the aim of improving accuracy and efficiency of floating-point computations. It is possible to distinguish two kinds of approaches: precision allocation tools and program optimization ones. Precision allocation (or tuning) tools aim at selecting the lowest floating-point precision that is necessary to achieve a desired accuracy. This approach avoids using more precision than needed and improves the performance of the program. Rosa~\cite{DarulovaK14,DarulovaK17} uses a compilation algorithm that, from an ideal real-valued implementation, produces a finite-precision version (if it exists) that is guaranteed to meet the desired overall precision. Rosa soundly deals with unstable tests and with bounded loops. Similarly, FPTuner~\cite{ChiangBBSGR17} implements a rigorous approach to precision allocation of mixed-precision arithmetic expressions. Precimonius~\cite{Rubio-GonzalezNNDKSBIH13} is a dynamic tool able to identify parts of a program that can be performed at a lower precision. It generates a transformed program where each floating-point variable is typed to the lowest precision necessary to meet a set of given accuracy and performance constraints. Hence, the transformed program uses variables of lower precision and performs better than the original program. Program optimization tools aim at improving the accuracy of floating-point programs by rewriting arithmetic expressions in equivalent ones with a lower accumulated round-off error. Herbie~\cite{PanchekhaSWT15} is a tool that automatically improves the accuracy of floating-point programs though a heuristic search. Herbie detects the expressions where rounding-errors occur and it applies a series of rewriting and simplification rules. It generates a set of transformed programs that are equivalent to the original one but potentially more accurate. The rewriting and simplification process is then applied recursively to the generated transformed programs until the most accurate program is obtained. CoHD~\cite{ThevenouxLM15} is a source-to-source transformer for C code that automatically compensates for the round-off errors of some basic floating-point operations. SyHD~\cite{ThevenouxLM17} is a C code optimizer that explores a set of programs generated by CoDH and selects the one with the best accuracy and computation-time trade-off. The tool Sardana~\cite{IoualalenM13}, given a Lustre~\cite{CaspiPHP87} program, produces a set of equivalent programs with simplified arithmetic expressions. Then, it selects the ones for which a better accuracy bound can be proved. Salsa~\cite{DamoucheMC17c} combines Sardana with techniques for intra-procedure~\cite{DamoucheMC15} and inter-procedure~\cite{DamoucheMC17a,DamoucheMC17b} program transformation in order to improve the accuracy of a target variable in larger pieces of code containing assignments and control structures. To the best of the authors' knowledge, the program transformation proposed in this work is the only approach that addresses the problem of conditional instability for floating-point programs. \section{Conclusion} \label{sec:concl} This paper presents a formally verified program transformation to detect instability in floating-point programs. The transformed program is guaranteed to return a warning when real and floating-point flows may diverge. Otherwise, it behaves as the original program when real and floating-point control flows coincide. The proposed approach is parametric with respect to{} two Boolean expression abstractions that return more restrictive Boolean conditions using an over-approximation of the round-off error occurring in the guard. These abstractions cause a loss of precision since the guards occurring in the transformed program are more restrictive and, therefore, some stable original traces may be lost in the transformed program. This leads to the possibility of having false instability warnings. However, it is ensured that all the unstable paths of the original program are detected. This transformation has been formalized and formally proven correct in the interactive theorem prover PVS. The PVS tool PVSio can be used to execute the program transformation. However, a full integration with PRECiSA{} is the missing step to compute the round-off error approximations and to make the presented approach fully automatic. The program transformation presented in this paper is the first step towards the much broader goal of improving the quality and reliability of floating-point programs. Future work includes the extension of the formalization to a more expressive language where conditionals are allowed inside Boolean expressions and function calls and loops are supported. This extension is not straightforward since it involves several changes in the formalization. In fact, in such setting, the evaluation of the expressions in the guards can also present unstable behaviors. Additionally, an extensive experimental evaluation is needed in order to assess the quality of the approach and its applicability to real-world applications. Another interesting future direction is the integration of the proposed approach with tools such as Salsa~\cite{DamoucheMC17c} and Herbie~\cite{PanchekhaSWT15}. This integration will improve the accuracy of the mathematical expressions used inside a program and, at the same time, prevent unstable tests that may cause unexpected behaviors. \bibliographystyle{splncs}
\section*{Abstract} We consider an infinite-server queue into which customers arrive according to a Cox process and have independent service times with a general distribution. We prove a functional large deviations principle for the equilibrium queue length process. The model is motivated by a linear feed-forward gene regulatory network, in which the rate of protein synthesis is modulated by the number of RNA molecules present in a cell. The system can be modelled as a non-standard tandem of infinite-server queues, in which the number of customers present in a queue modulates the arrival rate into the next queue in the tandem. We establish large deviation principles for this queueing system in the asymptotic regime in which the arrival process is sped up, while the service process is not scaled. \newpage \section{Introduction} \label{sec:intro} The work in this paper is motivated by the problem of modelling fluctuations in the number of protein molecules in a cell. The synthesis of proteins is catalysed by RNA molecules, which in turn are transcribed from DNA molecules. Both RNA and protein molecules degrade spontaneously after some random time. It is important for proper functioning of the cell that protein numbers are maintained within certain limits, and biologists are interested in understanding the regulatory mechanisms involved in controlling their fluctuations. Consequently, the problem of modelling stochastic fluctuations has attracted interest, and there has been considerable work on Markovian models of such systems; see, e.g., ~\cite{lestas08, paulsson05}. These models assume that each copy of a gene creates RNA molecules according to a Poisson process (while active), that each RNA molecule generates protein molecules according to a Poisson process, and that the lifetimes of RNA and protein molecules are exponentially distributed. The assumption of exponential lifetimes is biologically unrealistic; for example, inhomogeneities in the cellular environment could result in lifetimes that are mixtures of exponential distributions, or the denaturing of molecules could be a multistage process. Our approach relies on modelling the chemical kinetics using $\cdot/G/\infty$ queues rather than Markov processes, which correspond to $\cdot/M/\infty$ queues. Customer arrivals into the queue correspond to the synthesis of molecules of a specified type; after independent lifetimes with a general distribution, the molecules decay which equates to service (and departure) of the corresponding customers. For the problem described above, we have two such queues in series, one for RNA molecules and one for proteins. However, unlike in a tandem queueing network, where departures from one queue enter the next queue in series, here departures just leave the system; the way influence propagates is that the arrival rate into the protein queue is modulated by the occupancy of the preceding queue (here, RNA) in the series. We consider a very simple form of modulation, in which the arrival rate into a queue is proportional to the occupancy of the preceding queue, and the arrival process is conditionally Poisson given the occupancy. Thus, this results in a Cox process model for the arrivals into a queue, and the system is modelled as a series of $Cox/G/\infty$ queues interacting as described. We briefly recall the description of the queue length process in an $M/G/\infty$ queue with arrival rate $\lambda$ and service distribution $F$. The arrival process into this queue can be represented as an inhomogeneous Poisson process on $\mathbb{R} \times \mathbb{R}_+$ with intensity measure $\lambda \otimes F$. If a realisation of this point process has a point at $(t,y)$, it denotes that a customer arrives at time $t$ bringing a service requirement of $y$. The queue length at time $t$ is simply the total number of points of the Poisson process in the set $$ A_t= \{ (s,y): s\le t, y> t-s \}, $$ as a customer arriving at time $s$ will still be in the system at time $t$ if and only if its service requirement is greater than $t-s$. (We follow the convention of defining the queue length process to be right continuous.) Likewise, the queue length process during a time interval $[s,t]$ can be described in terms of the empirical measure of the above Poisson process on the wedge-shaped set $$ A_{[s,t]} = \bigcup_{u \in [s,t]} A_u. $$ In the problem we want to study, the intensity of the arrival process is modulated by the number of customers present in the previous queue. Hence, we need to model it as a Cox process and study the corresponding $Cox/G/\infty$ queue. As described above, this requires us to study the empirical measure of a Cox process on a subset of $\mathbb{R}^2$. We shall in fact study them in a more general setting of $\sigma$-compact Polish spaces, namely Polish spaces that can be covered by countably many compact subsets. Our goal is to obtain functional large deviation principles (FLDPs) for the corresponding queue length processes; we shall obtain these by contraction from LDPs for the empirical measure of the Cox process. We have not been able to drop the technical assumption of $\sigma$-compactness from our proof, but do not know if it is essential for the stated results. In terms of the motivating application, biologists have been interested in understanding fluctuations in molecule numbers, both because large fluctuations can be deleterious, and because the statistics of fluctuations can shed light on underlying regulatory mechanisms. Most work to date has focused on second-order statistics, both the marginal variance, and auto-covariance and cross-covariance functions for protein and mRNA molecule counts~\cite{lestas08}. The scaling regime studied in this paper might be more relevant for understanding the rare but large fluctuations that are most harmful for the cell. Our methods could also provide the foundation for an analysis of regulatory mechanisms, which we do not consider in this paper. Finally, a functional LDP can be used to identify the most likely paths leading to rare events of interest, and thereby to design efficient simulation schemes via importance sampling for estimating these probabilities more accurately. We present our model and main results in the next section, followed by the proofs in the final two sections. \section{Model and Results} \label{sec:model} We now set out our Cox process model. Let $(E,d)$ be a $\sigma$-compact Polish space, and let $\Lambda$ be a random finite Borel measure on $E$; in other words, $\Lambda$ is a random variable taking values in ${\cal M}^f_+(E)$, the space of finite non-negative Borel measures on $E$. A Cox process $\Phi$ with stochastic intensity $\Lambda$ is a point process which is conditionally Poisson, with intensity measure $\lambda$ on the event that $\Lambda=\lambda$. Note that the point process $\Phi$ is almost surely finite. A realisation of $\Phi$ can be thought of as either a point set $\{ x_1,x_2,\ldots,x_k \}$, or as a counting measure $\sum_{i=1}^k \delta_{x_i}$, where $k$ is the (random) number of points in the realisation. We call the latter the empirical measure corresponding to the realisation of the point set, and note that it is also an element of ${\cal M}^f_+(E)$. There are two topologies on ${\cal M}^f_+(E)$ which will be of interest to us. We say that a sequence of measures $\mu_n \in {\cal M}^f_+(E)$ converges to $\mu \in {\cal M}^f_+(E)$ in the weak topology if $\int_E fd\mu_n$ converges to $\int_E fd\mu$ for all bounded continuous functions $f:E\to \mathbb{R}$; we say the measures converge in the vague topology if the integrals converge only for continuous functions with compact support (which are necessarily bounded). We now consider a sequence of Cox point processes $\Phi_n$, with corresponding stochastic intensities $\Lambda_n$. Our first contribution is a large deviation principle (LDP) for their scaled empirical measures: \begin{thm} \label{thm:cox_ldp} Suppose that $(\Lambda_n, n\in \mathbb{N})$ is a sequence of random finite Borel measures on a $\sigma$-compact Polish space $(E,d)$, and that the sequence $\Lambda_n/n$ satisfies an LDP in ${\cal M}^f_+(E)$ equipped with the weak topology, with good rate function $\mathfrak{I}_1(\cdot)$. Let $\Phi_n$ be a Cox process with stochastic intensity $\Lambda_n$, i.e., a random counting measure on $E$ equipped with its Borel $\sigma$-algebra. Then the sequence of measures $\Phi_n/n$ satisfies an LDP in ${\cal M}^f_+(E)$ equipped with the weak topology, with good rate function $$ \mathfrak{I}_2(\mu) = \begin{cases} \inf_{\lambda} \left\{\mathfrak{I}_1(\lambda)+\lambda(E)\right\}, & \mbox{ if $\mu \equiv 0$,} \\ \inf_{\lambda} \left\{\mathfrak{I}_1(\lambda) + {I_{Poi}}(\mu(E),\lambda(E)) +\mu(E) H\bigl( \frac{\mu}{\mu(E)} \bigm| \frac{\lambda}{\lambda(E)} \bigr)\right\}, & \mbox{ if $\mu \not \equiv 0$,} \end{cases} $$ where $H$ and ${I_{Poi}}$ are defined as follows: \begin{eqnarray*} H(\beta|\alpha) &=&\left\{ \begin{array}{ll} \int\log(d\beta/d\alpha)d\beta & \mbox{if } \beta \ll \alpha \mbox{ and } \int|\log(d\beta/d\alpha)|d\beta < \infty \\ +\infty & \mbox{otherwise, } \end{array} \right. \\ {I_{Poi}}(x,\alpha) &=& \begin{cases} x \log \frac{x}{\alpha}-x+\alpha, & \mbox{ if } \alpha>0, \\ 0, & \mbox{ if } \alpha=0, x=0, \\ +\infty, & \mbox{ if } \alpha=0, x>0. \end{cases} \end{eqnarray*} The function $H(\beta|\alpha)$ is called the relative entropy or Kullback-Leibler divergence of $\beta$ with respect to $\alpha$. \end{thm} A slightly different version of this theorem, with only local finiteness of the measures $\Lambda_n$ assumed, has been established by Schreiber~\cite{schreiber03}, albeit in the vague rather than the weak topology; his result also requires a technical assumption about the measures $\Lambda_n/n$ dominating a fixed measure with full support on $E$, which we do not need. However, his result does not require that the space be $\sigma$-compact. The extension of the result to the weak topology is non-trivial, and relies on the finiteness assumption on the intensity measures. In addition, our proof techniques are very different. A functional LDP for rescaled Poisson random measures is proved in \cite{florens98} using projective limits, and in \cite{leonard00} using Cram\'er's theorem and subadditivity arguments. The claim of Theorem~\ref{thm:cox_ldp} appears intuitive from the assumed LDP for the intensity measures $\Lambda_n/n$, the LDP for a Poisson random variable, and Sanov's theorem for the empirical distribution. However, a number of technical conditions need to be checked. Moreover, while these imply an LDP, goodness of the rate function is not immediate. We show this indirectly by establishing exponential tightness; this is the step where finiteness of the measures is crucial. Next, we consider a sequence of stationary $Cox/G/\infty$ queues where the arrival processes are sped up by the index $n \in \mathbb{N}$, while the service process remains unchanged. More precisely, the service times are iid with some fixed distribution $F$ that does not depend on $n$, while the arrival process into the $n^{\rm th}$ queue is a Cox process with stochastic intensity (directing measure) $\Lambda_n$ on $\mathbb{R}$. We make the following assumptions. \noindent\textbf{Assumptions} \begin{enumerate} \item[A1] $(\Lambda_n, n\in \mathbb{N})$ is a sequence of random $\sigma$-finite measures on $\mathbb{R}$, whose laws are translation invariant, such that $\mathbb{E}[\Lambda_n([a,b])] = n\lambda(b-a)$, for some fixed $\lambda>0$, and any compact interval $[a,b]\subset \mathbb{R}$. \item[A2] For any interval $[a,b]$, the sequence $(\Lambda_n/n)|_{[a,b]}$ obeys an LDP on ${\cal M}^f_+([a,b])$ equipped with the weak topology, with good rate function ${I}_{[a,b]}$. \item[A3] Define \begin{align*} \psi_n(\theta) = \log \mathbb{E}\left[ e^{\frac{\theta \Lambda_n([0,1])}{n}}\right]. \end{align*} There is a neighbourhood of $0$ on which $\psi_n(n\theta)/n$ is bounded, uniformly in $n$. \item[A4] The mean service time, given by $\int_0^{\infty} xdF(x) = \int_0^{\infty} \overline{F}(x)dx$, is finite; here $\overline{F}=1-F$ denotes the complementary cumulative distribution function of the service time. \end{enumerate} Let $Q_n(t)$ denote the number of customers at time $t$ in the infinite-server queue with Cox process arrivals with intensity $\Lambda_n$ and iid service times with distribution $F$. Let $L_n$ denote the measure on $\mathbb{R}$ which is absolutely continuous with respect to Lebesgue measure, with density $Q_n(\cdot)$. Our second contribution in this paper is the following: \begin{thm} \label{thm:qldp} Consider a sequence of $Cox/G/\infty$ queues indexed by $n\in \mathbb{N}$, where the arrival process into the $n^{\rm th}$ queue is a Cox process with directing measure $\Lambda_n$, and service times are iid with common distribution $F$. Suppose the arrival and service processes satisfy Assumptions [A1]-[A4]. Let $Q_n(t)$ denote the number of customers in the $n^{\rm th}$ queue at time $t$, and let $L_n$ denote the random measure on $\mathbb{R}$ which is absolutely continuous with respect to Lebesgue measure and has density $Q_n(\cdot)$. Then the sequence of measures $L_n$ satisfies Assumptions [A1]-[A3]. In particular, for any compact interval $[a,b]\subset \mathbb{R}$, the measures $(L_n/n)|_{[a,b]}$ satisfy an LDP on ${\cal M}^f_+([a,b])$ equipped with the weak topology, with a good rate function ${J}_{[a,b]}$. Moreover, the sequence of random variables $Q_n(0)/n$, satisfy an LDP with a good rate function $I_Q$. \end{thm} A fuller description of the rate functions ${J}_{[a,b]}$ and $I_Q$ is provided in the proof of this theorem, in Section~\ref{sec:qldp}. The theorem shows that the sequence of queue occupancy measures $L_n$ also satisfies the above assumptions and, in particular, that they satisfy an LDP. This implies that our analysis extends easily to an arbitrary number of $Cox/G/\infty$ queues in (non-standard) tandem, where the arrivals into each queue constitute a Cox process with directing measure given by the number in the previous queue. Can we prove an LDP, not just for the queue occupancy measures but for the queue lengths at a fixed time, say for the sequence of random variables $Q_n(0)/n = \hat\Phi_n(A_0)/n$? Unfortunately, the map $\mu \mapsto \mu(A_0)$ is not continuous in the weak topology, since the indicator function of the set $A_0$ is not a continuous function. Hence, our approach of invoking the Contraction Principle does not work. It might be possible to get around this, by sandwiching the indicator function of $A_0$ between bounded continuous functions which converge to it pointwise from below and above. We could then prove an LDP for the integral of the queue occupancy measure against these functions. If we could calculate the rate function explicitly, and show that it approaches the same limit for the functions approximating the indicator from above and from below, then that would prove the LDP for the marginal queue length distribution. But as these calculations are quite involve, and distract from the main motivation of the present work, we do not pursue them here. Next, we turn to the departure process from a $Cox/G/\infty$ queue. While it is not directly relevant to the model motivating this work, it is relevant to reaction networks in which the products of one reaction are reactants in the next, rather than catalysts as in our model. In that case, one would have a standard tandem of infinite-server queues, instead of the non-standard tandems that are the focus of this paper. In addition, the departure process is an object of interest in queueing theory. With these motivations, we now describe our results for the departure process. Let $\Phi_n$ denote the Cox point process of arrivals into the $n^{\rm th}$ system as above, with directing measure $\Lambda_n$. Denote by $\hat\Phi_n$ the marked point process obtained by marking each arrival with its service time. Let $\Psi_n$ denote the point process of departures, which may be viewed as a random counting measure on $\mathbb{R}$. From the description of the $\cdot/G/\infty$ queue in terms of point processes given in the Introduction, we see that for any interval $[a,b]$, we have \begin{equation} \label{eq:dep_measure} \Psi_n([a,b]) = \hat\Phi_n( {\rm cl}(A_{[a,b]} \backslash A_b)), \end{equation} since a customer departs during the interval $[a,b]$ only if it arrives at time $t\leq b$, briniging in an amount of work $x$ such that $a \leq t+x\leq b$; here ${\rm cl}(B)$ denotes the closure of a subset $B$ of $\mathbb{R}^2$. Our next result establishes an LDP for the empirical measures, $\Psi_n$, of the departures from the queue. Hence, the results extend easily to a (standard) tandem of such queues. \begin{thm} \label{thm:dep_ldp} Let $\Phi_n$, $n\in \mathbb{N}$, be a sequence of Cox arrival processes satisfying Assumptions [A1]-[A3], and let $\hat\Phi_n$ be a Cox process obtained by marking the arrivals with iid service times drawn according to a distribution $F$ satisfying Assumption [A4]. Let $\Psi_n$ denote the corresponding departure process from an infinite-server queue, as defined precisely in (\ref{eq:dep_measure}). Then, $(\Psi_n, n\in \mathbb{N})$ satisfies [A1]-[A3]; in particular, for any fixed compact interval $[a,b]$, $(\Psi_n/n)|_{[a,b]}$ obeys an LDP on ${\cal M}^f_+([a,b])$ equipped with the weak topology, with a good rate function $K_{[a,b]}$. \end{thm} The $Cox/G/\infty$ model studied in this paper is an instance of a queue in a random environment. The first study of infinite-server queues in random environment was in~\cite{ocinneide86}: factorial moments in stationarity were derived for the $M/M/\infty$ queue in a Markovian environment, namely one in which the arrival and service rates are modulated by a finite state, irreducible, continuous time Markov chain. There has recently been extensive further study of this model, including moments for steady state and transient distributions, and large deviation and central limit asymptotics for the marginal distribution of the queue length; see~\cite{blom16} for a collation of the results. The Markovian assumption on the environment is relaxed in~\cite{jansen16}, where the background process modulating arrivals and services in an $M/M/\infty$ queue is just a general c\`adl\`ag stochastic process. An LDP is proved for the queue length at an arbitrary fixed time, $t$, whereas we establish a process level LDP, without assuming (conditionally) exponential service times. A special type of Cox background process is considered in ~\cite{heemskerk17}, which proves a functional CLT for the scaled queue length process. In all of these cases the queue length is viewed as a random c\`adl\`ag function, whereas we view it as living on a space of measures. The proof of Theorem~\ref{thm:cox_ldp} is presented in Section~\ref{sec:cox_ldp}, and the proofs of Theorems \ref{thm:qldp} and \ref{thm:dep_ldp} in Section~\ref{sec:qldp}. \section{Proof of Empirical Measure LDP} \label{sec:cox_ldp} Our proof of Theorem~\ref{thm:cox_ldp} relies on a theorem of Chaganty~\cite{chaganty97}, which essentially states that a sequence of probability measures on a product space satisfies an LDP if the corresponding sequences of marginal and conditional probability distributions do so, and certain additional technical conditions are satisfied. For completeness, we include below a statement of this theorem, together with an extension of Sanov's theorem by Baxter and Jain~\cite{baxter88} which is needed to check its conditions, and relevant definitions. \begin{defin}\label{chagdef} \normalfont Let $\left(\Omega_1,\mathcal{B}_1\right)$ and $\left(\Omega_2,\mathcal{B}_2\right)$ be two Polish spaces with their associated Borel $\sigma-$fields. Let $\left\{\nu_n(\cdot,\cdot)\right\}$ be a sequence of transition functions on $\Omega_1\times\mathcal{B}_2$, i.e., $\nu_n(x_1,\cdot)$ is a probability measure on $\left(\Omega_2,\mathcal{B}_2\right)$ for each $x_1\in \Omega_1$ and $\nu_n(\cdot, B_2)$ is a measurable function on $\Omega_1$ for each $B_2 \in \mathcal{B}_2$. We say that the sequence of probability transition functions $\left\{\nu_n(x_1,\cdot),x_1\in\Omega_1\right\}$ satisfies the LDP continuously in $x_1$ with rate function $J(x_1,x_2)$, or simply the LDP continuity condition holds, if: \begin{enumerate} \item For each $x_1\in\Omega_1$, $J(x_1,\cdot)$ is a good rate function on $\Omega_2$, i.e., it is non-negative, lower semicontinuous (l.s.c.), and has compact level sets. \item For any sequence $\left\{x_{1n}\right\}$ in $\Omega_1$ such that $x_{1n}\rightarrow x_1$, the sequence of measures $\left\{\nu_n(x_{1n},\cdot)\right\}$ on $\Omega_2$ obeys the LDP with rate function $J(x_1,\cdot)$. \item $J(x_1,x_2)$ is l.s.c. as a function of $(x_1,x_2)$. \end{enumerate} \end{defin} \begin{thm}\label{chagthm} (\cite[Theorem $2.3$]{chaganty97}) Let $\left(\Omega_1,\mathcal{B}_1\right)$, $\left(\Omega_2,\mathcal{B}_2\right)$ be two Polish spaces with their associated Borel $\sigma-$fields. Let $\left\{\mu_{1n}\right\}$ be a sequence of probability measures on $\left(\Omega_1,\mathcal{B}_1\right)$. Let $\left\{\nu_n(x_1,B_2)\right\}$ be a sequence of probability transition functions defined on $\Omega_1\times\mathcal{B}_2$. We define the joint distribution $\mu_n$ on the product space $\Omega_1 \times \Omega_2$, and the marginal distribution $\mu_{2n}$ on $\Omega_2$ by $$ \mu_n(B_1\times B_2) = \int\limits_{B_1}\nu_n(x_1,B_2)d\mu_{1n}(x_1), \quad \mu_{2n}(B_2) = \mu_n(\Omega_1\times B_2). $$ Suppose that the following two conditions are satisfied: \begin{enumerate} \item $\left\{\mu_{1n}\right\}$ satisfies an LDP with good rate function $I_1(x_1)$. \item $\left\{\nu_n(\cdot,\cdot)\right\}$ satisfies the LDP continuity condition with a rate function $J(x_1,x_2)$. \end{enumerate} Then the sequence of joint distributions $\left\{\mu_n\right\}$ satisfies a weak LDP on the product space $\Omega_1\times\Omega_2$, with rate function \begin{align*} I(x_1,x_2)=I_1(x_1)+J(x_1,x_2). \end{align*} The sequence of marginal distributions $\mu_{2n}$ satisfies an LDP with rate function \begin{align*} I_2(x_2)=\inf\limits_{x_1\in\Omega_1}\left[I_1(x_1)+J(x_1,x_2)\right]. \end{align*} Finally, $\left\{\mu_n\right\}$ satisfies the LDP if $I(x_1,x_2)$ is a good rate function. \end{thm} \noindent {\bf Remark.} Recall that a sequence of probability measures (or random variables) is said to satisfy a weak LDP if the large deviations upper bound holds for all compact sets, and to satisfy a (full) LDP if it holds for all closed sets. For both, the large deviations lower bound holds for all open sets. \begin{thm}\label{baxterthm} (\cite{baxter88}, Theorem $5$) Let $(S,d)$ be a Polish space. Let $\left\{\alpha_n\right\}$ be a sequence of probability measures on $(S,d)$ converging weakly to a probability measure $\alpha$. For each $n$, let $X^n_i$, $i\in \mathbb{N}$ be iid $S-$valued random variables with common distribution $\alpha_n$. Let $\mathcal{M}_1(S)$ denote the space of probability measures on $S$ and let $\overline{\mu}_n \in \mathcal{M}_1(S)$ denote the empirical distribution, $\left(\delta_{X^n_1}+...+\delta_{X^n_n}\right)/n$. Then $\left\{\overline{\mu}_n\right\}$ satisfies the LDP with good rate function $H(\cdot|\alpha)$, which was defined in the statement of Theorem~\ref{thm:cox_ldp}. \end{thm} The proof of Theorem~\ref{thm:cox_ldp} proceeds through a sequence of lemmas. We begin with an elementary LDP for a sequence of Poisson random variables. \begin{lemma} \label{poisson_ldp} Let $N_n, n\in \mathbb{N}$ be a sequence of Poisson random variables with parameter $n\alpha_n$, and suppose that $\alpha_n$ tends to $\alpha \ge 0$. Then the sequence $N_n/n$ obeys an LDP in $\mathbb{R}_+$ with good rate function ${I_{Poi}}(\cdot,\alpha)$ defined in the statement of Theorem~\ref{thm:cox_ldp}. \end{lemma} \begin{proof} We apply the G\"artner-Ellis theorem \cite[Theorem 2.3.6]{dembo98} to the sequence $N_n/n$. By direct calculation, $$ \frac{1}{n}\log\mathbb{E}\left[e^{n\theta\frac{N_n}{n}}\right]=\alpha_n \bigl(e^{\theta}-1 \bigr). $$ This sequence of scaled log-moment generating functions converges pointwise to the limit $\alpha(e^{\theta}-1)$, which is finite and differentiable everywhere (hence also continuous, and essentially smooth). Hence, by the G\"artner-Ellis theorem, the sequence of random variables $N_n/n$ obeys an LDP with a rate function which is the convex conjugate of $\alpha(e^{\theta}-1)$. A straightforward calculation confirms that this is the function ${I_{Poi}}(\cdot,\lambda)$ in the statement of the lemma, and that it is l.s.c. with compact level sets for each $\alpha$. \end{proof} The next two lemmas establish conditional LDPs for the scaled empirical measures of Poisson processes whose scaled intensities converge to a limit. \begin{lemma}\label{condldp0} Let $\Phi_n, n\in \mathbb{N}$ be a sequence of Poisson point processes with intensity measures $n\lambda_n \in {\cal M}^f_+(E)$, and suppose that $\lambda_n$ converge weakly in ${\cal M}^f_+(E)$ to the zero measure. Then, $\Phi_n/n, n\in \mathbb{N}$ satisfy the LDP in ${\cal M}^f_+(E)$ equipped with the weak topology, with good rate function $$ {\cal I}_0(\mu) = \begin{cases} 0, & \mbox{ if } \mu \equiv 0, \\ +\infty, & \mbox{ otherwise.} \end{cases} $$ \end{lemma} \begin{proof} As the map $\mu \mapsto \mu(E)$ is weakly continuous (the indicator of $E$ is a bounded, continuous function), it follows that $\lambda_n(E)$ tends to $\lambda(E)=0$. Let $N_n=\Phi_n(E)$ denote the total number of points in the Poisson process $\Phi_n$. Then, $N_n$ is a Poisson random variable with parameter $n\lambda_n(E)$, and it follows from Lemma~\ref{poisson_ldp} that $(N_n/n, n\in \mathbb{N})$ obey an LDP with good rate function $$ {I_{Poi}}(x,0) = \begin{cases} 0, & \mbox{if } x=0, \\ +\infty, &\mbox{if }x>0. \end{cases} $$ Let $F \subset {\cal M}^f_+(E)$ be closed in the weak topology, and suppose that it does not contain the zero measure. Define $$ x_F = \inf \{ \mu(E): \mu \in F \}. $$ We claim that $x_F>0$. Indeed, if $x_F=0$, then we can find a sequence of measures $\mu_n \in F$ such that $\mu_n(E)$ tends to zero, i.e., $\int_E 1d\mu_n$ tends to zero. It follows that $\int_E fd\mu_n$ tends to zero for all bounded, measurable, non-negative functions $f$, and hence also for all bounded measurable functions. Hence, the sequence $\mu_n$ converges weakly to the zero measure, contradicting the assumption that $0\notin F$ and $F$ is closed. We now have the large deviations upper bound for $F$: \begin{eqnarray*} \limsup_{n\to \infty} \frac{1}{n}\log \mathbb{P} \Bigl( \frac{\Phi_n}{n} \in F \Bigr) &\le& \limsup_{n\to \infty} \frac{1}{n}\log \mathbb{P} \Bigl( \frac{\Phi_n(E)}{n} \ge x_F \Bigr) \\ &=& \limsup_{n\to \infty} \frac{1}{n}\log \mathbb{P} \Bigl( \frac{N_n}{n} \ge x_F \Bigr) \; = \; -\infty, \end{eqnarray*} where we have used the LDP for $N_n/n$ with rate function ${I_{Poi}}(\cdot,0)$ and the fact that $x_F>0$ to obtain the last equality. The large deviations lower bound is trivial for open sets $G$ not containing the zero measure, as the infimum of the rate function is infinite on such sets. Now, for $G$ containing the zero measure, we have \begin{eqnarray*} \liminf_{n\to \infty} \frac{1}{n}\log \mathbb{P} \Bigl( \frac{\Phi_n}{n} \in G \Bigr) &\ge& \liminf_{n\to \infty} \frac{1}{n}\log \mathbb{P} \Bigl( \frac{\Phi_n}{n} \equiv 0 \Bigr) \; = \; \liminf_{n\to \infty} \frac{1}{n}\log \mathbb{P} (N_n=0) \\ &=& \liminf_{n\to \infty} (-\lambda_n(E)) \; = \; -\lambda(E) = 0, \end{eqnarray*} as $N_n\sim Poi(n\lambda_n(E))$. This completes the proof of the lemma. \end{proof} \begin{lemma}\label{condldp1} Let $\Phi_n, n\in \mathbb{N}$ be a sequence of Poisson point processes with intensity measures $n\lambda_n$, and suppose that the sequence $\lambda_n$ converges in the weak topology on ${\cal M}^f_+(E)$ to $\lambda \not\equiv 0$. Then, $\Phi_n/n, n\in \mathbb{N}$ satisfy the LDP in ${\cal M}^f_+(E)$ equipped with the weak topology, with good rate function $$ {\cal I}_1(\mu) = \begin{cases} {I_{Poi}}(\mu(E),\lambda(E)) + \mu(E) H \Bigl( \frac{\mu}{\mu(E)} \Bigm| \frac{\lambda}{\lambda(E)} \Bigr), & \mbox{ if } \mu \not\equiv 0, \\ {I_{Poi}}(0,\lambda(E)), & \mbox{ if } \mu \equiv 0. \end{cases} $$ Here, ${I_{Poi}}(\cdot,\cdot)$ and $H(\cdot| \cdot)$ are as defined in Lemma~\ref{poisson_ldp} and Theorem~\ref{baxterthm} respectively. \end{lemma} \begin{proof} We will prove the lemma by first establishing an LDP for the sequence $N_n/n$, then verifying that conditional on this, $\Phi_n/n$ satisfies the LDP continuously, and invoking Theorem~\ref{chagthm}. The LDP for $N_n/n$, with rate function ${I_{Poi}}(\cdot,\lambda(E))$, is immediate from Lemma~\ref{poisson_ldp} since $\lambda_n(E)$ tends to $\lambda(E)$. We now prove an LDP for $\Phi_n/n$, conditional on $N_n/n$. Fix a sequence $N_n$ such that $N_n/n \to x\ge 0$. If $x=0$, then the proof follows that of Lemma~\ref{condldp0}, and yields ${\cal I}_0$ as the rate function. It remains to consider $x>0$. We can write \begin{align*} \Phi_n = \delta_{X^n_1}+\delta_{X^n_2}+\ldots+\delta_{X^n_{N_n}}, \end{align*} where the $X^n_i$ are iid, with law $\frac{\lambda_n}{\lambda_n(E)}$. Note that the probability law of $X^n_i$ is well-defined for all $n$ sufficiently large, as $\lambda_n(E)$ tends to $\lambda(E)>0$. Define $$ \hat \Phi_n = \delta_{X^n_1}+\delta_{X^n_2}+\ldots+\delta_{X^n_{\lfloor nx \rfloor}}, $$ where the dependence of $\hat \Phi_n$ on $x$ has been suppressed in the notation. We claim that the sequences $\Phi_n/n$ and $\hat \Phi_n/n$ are exponentially equivalent (see~\cite[Definition 4.2.10]{dembo98}). To see this, we use the fact that the weak topology on ${\cal M}^f_+(E)$ can be metrised, for instance by the Kantorovich-Rubinstein metric, $$ {d_{\rm KR}}(\mu,\nu) = \sup_{f\in {\rm Lip}(1), \| f \|_{\infty}\le 1} \; \int_E fd\mu - \int_E fd\nu. $$ It is easy to see that, for all bounded measurable $f$, $$ \Bigm| \int_E f d\Phi_n - \int_E fd\hat \Phi_n \Bigm| \; \leq \; \| f \|_{\infty} \; \bigm| N_n-\lfloor nx \rfloor \bigm|, $$ and so, ${d_{\rm KR}}(\Phi_n/n, \hat \Phi_n/n)$ tends to zero deterministically, as $N_n/n$ tends to $x$ deterministically. This establishes the exponential equivalence of the two sequences. Now, we have from Theorem~\ref{baxterthm} and the observation that $\lambda_n(\cdot)/\lambda_n(E)$ converges weakly to $\lambda(\cdot)/\lambda(E)$, that $(\hat \Phi_n/\lfloor nx \rfloor, \lfloor nx \rfloor \in \mathbb{N})$ obey an LDP in ${\cal M}_1(E)$ with good rate function $H \bigl(\cdot \bigm| \frac{\lambda}{\lambda(E)} \bigr)$, and hence also in ${\cal M}^f_+(E)$ with rate function which is the same on ${\cal M}_1(E)$, and infinite outside it. It follows that $(\hat \Phi_n/n, n \in \mathbb{N})$ obey an LDP in ${\cal M}^f_+(E)$ with rate function \begin{equation} \label{condldpx_rate} {H_x}(\mu) = \begin{cases} xH \Bigl( \frac{\mu}{x} \Bigm| \frac{\lambda}{\lambda(E)} \Bigr), &\mbox{ if } \frac{\mu}{x} \in {\cal M}_1(E), \\ +\infty, &\mbox{ otherwise.} \end{cases} \end{equation} Finally, by~\cite[Theorem 4.2.13]{dembo98}, $(\Phi_n/n, n \in \mathbb{N})$ obey an LDP in ${\cal M}^f_+(E)$ with the same rate function ${H_x}$, as they are exponentially equivalent to $\hat \Phi_n/n$. Having established conditional LDPs for $\Phi_n/n$, conditional on $N_n/n$ tending to $x$, we now need to check the LDP continuity conditions in Definition~\ref{chagdef} with $\Omega_1=\mathbb{R}_+$ and $\Omega_2={\cal M}^f_+(E)$, and transition function $\nu_n(x,\cdot)$ defined as the law of $\Phi_n$ conditional on $N_n=\lfloor nx \rfloor$. We defne the function $$ J(x,\mu) = \begin{cases} {\cal I}_0(\mu), &\mbox{ if } x=0, \\ {H_x}(\mu) &\mbox{ if } x>0, \end{cases} $$ where ${\cal I}_0$ is defined in Lemma~\ref{condldp0} and ${H_x}$ in \eqref{condldpx_rate}. Note that $J$ is non-negative as ${\cal I}_0$ and $\{ {H_x}, x\ge 0 \}$ are all non-negative. The first condition in Definition~\ref{chagdef} holds trivially if $x=0$, as all level sets are singletons comprised of the zero measure; if $x>0$, the condition follows from the goodness of the relative entropy function, which is well known from Sanov's theorem (see, e.g.,~\cite[Theorem 6.2.10]{dembo98}). In a bit more detail, given $\alpha>0$, the level set \begin{align*} L_{\alpha} = \left\{\mu\in {\cal M}_1(E): H\left(\mu \left|\frac{\lambda}{\lambda(E)}\right.\right) \le \frac{\alpha}{x}\right\} \end{align*} is compact in ${\cal M}_1(E)$ equipped with the weak topology; hence, so is its image under the continuous map $\mu \mapsto x\mu$ from ${\cal M}_1(E)$ to ${\cal M}^f_+(E)$. The second condition in Definition~\ref{chagdef} is precisely the content of the conditional LDPs that we just obtained. That leaves us to check the third condition, which is that $J(x,\mu)$ is l.s.c. in $(x,\mu)$. As $\mathbb{R}_+ \times {\cal M}^f_+(E)$ is a metric space, we can check this along sequences. Consider a sequence $(x_n,\mu_n)$ converging to $(x,\mu)$. If $(x,\mu)=(0,0)$, then $J(x,\mu)=0$, which is no bigger than $\liminf J(x_n,\mu_n)$. If $x=0$ and $\mu \not\equiv 0$, then $\mu(E)>0$ and so, for all $n$ sufficiently large, $x_n < \mu_n(E)$; consequently, $\mu_n/x_n$ is not a probability measure, and $J(x_n,\mu_n)=+\infty$. The same reasoning applies if $x>0$ and $\mu/x \notin {\cal M}_1(E)$. Finally, suppose $x>0$ and $\mu/x \in {\cal M}_1(E)$, so that $\mu_n/x_n$ converges weakly to $\mu/x$ in ${\cal M}^f_+(E)$. We may restrict attention to the subsequence of $\mathbb{N}$ for which $\mu_n/x_n$ are probability measures, as $J(x_n,\mu_n)=+\infty$ otherwise. Along this subsequence, the desired inequality $\liminf {H_{x_n}}(\mu_n) \ge {H_x}(\mu)$ follows from the lower semicontinuity of $H$, the relative entropy function. We are now in a position to invoke Theorem~\ref{chagthm}, with $\Omega_1=\mathbb{R}_+$ and $\Omega_2={\cal M}^f_+(E)$. The second condition in the theorem is a conditional LDP for $\Phi_n/n$ given that $N_n/n$ tends to $x$, which we have just verified. The first condition is an LDP for $N_n/n$, which was proved in Lemma~\ref{poisson_ldp}. Hence, the conclusion of Theorem~\ref{chagthm} holds, i.e., we have an LDP for $\Phi_n/n$ with rate function $$ I_2(\mu) = \inf_{x\in \mathbb{R}_+} \left\{{I_{Poi}}(x,\lambda(E))+ J(x,\mu)\right\}. $$ As $J(x,\mu)=+\infty$ unless $x=\mu(E)$, it is clear that the infimum is attained at $x=\mu(E)$, and we have \begin{align*} I_2(\mu)={I_{Poi}}(\mu(E),\lambda(E))+J(\mu(E),\mu). \end{align*} This coincides with the rate function in the statement of the lemma, and concludes its proof. \end{proof} We now have all the ingredients required to complete the proof of Theorem~\ref{thm:cox_ldp}. \noindent{\bf Proof of Theorem~\ref{thm:cox_ldp}.} We invoke Theorem~\ref{chagthm} with $\Omega_1$ and $\Omega_2$ both being the space of finite non-negative measures on $E$, equipped with the weak topology and the corresponding Borel $\sigma$-algebra. The sequence $\mu_{1n}$ will denote the laws of the directing (intensity) measures $\Lambda_n$, and the probability transition functions $\nu_n(\lambda,\cdot)$ will denote the law of the scaled Poisson random measures $\Phi_n/n$, where $\Phi_n$ has intensity $n\lambda$. We now check the assumptions of the theorem. The first condition in Theorem~\ref{chagthm} is an LDP for $(\Lambda_n/n, n\in \mathbb{N})$ with a good rate function, which holds by assumption. To check the second condition in Theorem~\ref{chagthm}, define $$ J(\lambda,\mu) = \begin{cases} {\cal I}_0(\mu), &\mbox{ if } \lambda \equiv 0, \\ {\cal I}_1(\mu), &\mbox{ otherwise,} \end{cases} $$ where ${\cal I}_0$ and ${\cal I}_1$ are as defined in Lemmas~\ref{condldp0} and \ref{condldp1}. We need to check that the conditions in Definition~\ref{chagdef} are satisfed. The first condition is satisfied as ${\cal I}_0$ and ${\cal I}_1$ are both good rate functions, as shown in Lemmas~\ref{condldp0} and \ref{condldp1}. The second condition is the content of the conditional LDPs established in these lemmas. That leaves us to check the third condition, that $J(\cdot,\cdot)$ is l.s.c.. As the weak topology on ${\cal M}^f_+(E)$ is metrisable, so is the product topology on ${\cal M}^f_+(E)\times {\cal M}^f_+(E)$, and we can check lower semicontinuity along sequences. Consider a sequence $(\lambda_n,\mu_n)$ converging to $(\lambda,\mu)$, i.e., $\lambda_n$ converges weakly to $\lambda$, and $\mu_n$ to $\mu$. We distinguish four cases: \begin{enumerate} \item If $\lambda \equiv 0$ and $\mu \equiv 0$, then $J(\lambda,\mu)={\cal I}_0(\mu)=0$, which is no bigger than the limit infimum of a non-negative sequence. \item If $\lambda \equiv 0$ and $\mu \not \equiv 0$, then $J(\lambda,\mu)={\cal I}_0(\mu)=+\infty$. But note that $\lambda_n(E) \to \lambda(E)=0$ and $\mu_n(E) \to \mu(E)>0$, and so ${I_{Poi}}(\mu_n(E),\lambda_n(E)) \to +\infty$. As \begin{align*} J(\lambda_n,\mu_n) = {\cal I}_1(\mu_n) \ge {I_{Poi}}(\mu_n(E),\lambda_n(E)), \end{align*} we see that $J(\lambda_n,\mu_n)$ also tends to infinity. \item If $\lambda \not\equiv 0$ and $\mu \equiv 0$, then $J(\lambda,\mu)={\cal I}_1(\mu)={I_{Poi}}(0,\lambda(E))$. On the other hand, $J(\lambda_n,\mu_n) \ge {I_{Poi}}(\mu_n(E),\lambda_n(E))$, which tends to ${I_{Poi}}(0,\lambda(E))$ as $n$ tends to infinity, as ${I_{Poi}}$ is continuous. \item Finally, suppose that $\lambda \not\equiv 0$ and $\mu \not \equiv 0$. In this case, for all $n$ sufficiently large, both $\lambda_n$ and $\mu_n$ are non-zero measures, and we have $J(\lambda_n,\mu_n)={\cal I}_1(\mu_n)$. As $\lambda_n(E)$ and $\mu_n(E)$ converge to $\lambda(E)$ and $\mu(E)$ respectively, it is easy to see that ${I_{Poi}}(\mu_n(E),\lambda_n(E))$ tends to ${I_{Poi}}(\mu(E),\lambda(E))$. Hence, to verify lower semicontinuity, it suffices to show that $H(\beta | \alpha)$ is jointly l.s.c. in its arguments. Recall the Donsker-Varadhan variational formula for the relative entropy (see, e.g.,~\cite[Sec. C.2]{dupuis97}): \begin{eqnarray*} H(\beta|\alpha)=\sup_{g\in C_b(E)}\left\{\int\limits_E g d\beta- \log\int\limits_E e^{g}d\alpha \right\}, \end{eqnarray*} where $C_b(E)$ denotes the set of bounded continuous functions on $E$. But if $g\in C_b(E)$, so is $e^g$, and the map \begin{align*} (\alpha,\beta)\longmapsto \int\limits_E gd\beta -\log\int\limits_E e^{g} d\alpha \end{align*} is continuous. Consequently, $H(\beta | \alpha)$, being the supremum of continuous functions of $(\alpha,\beta)$, is l.s.c.. \end{enumerate} Thus, we have checked all the conditions of Theorem~\ref{chagthm}. Hence, the conclusion of the theorem holds, and yields that $(\Phi_n/n, n\in \mathbb{N})$ obey an LDP on ${\cal M}^f_+(E)$, with rate function $$ \mathfrak{I}_2(\mu) = \inf_{\lambda \in {\cal M}^f_+(E)} \left\{\mathfrak{I}_1(\lambda) + J(\lambda, \mu)\right\}, $$ where $J(\lambda,\mu)$ equals ${\cal I}_0(\mu)$ if $\lambda\equiv 0$ and ${\cal I}_1(\mu)$ otherwise, and ${\cal I}_0$ and ${\cal I}_1$ are defined in Lemmas~\ref{condldp0} and \ref{condldp1} respectively. Using those definitions, we can write the rate function more explicitly as follows: $$ \mathfrak{I}_2(\mu) = \begin{cases} \inf_{\lambda} \left\{\mathfrak{I}_1(\lambda)+\lambda(E)\right\}, & \mbox{ if $\mu \equiv 0$,} \\ \inf_{\lambda} \left\{\mathfrak{I}_1(\lambda) + {I_{Poi}}(\mu(E),\lambda(E)) +\mu(E) H\bigl( \frac{\mu}{\mu(E)} \bigm| \frac{\lambda}{\lambda(E)} \bigr)\right\}, & \mbox{ if $\mu \not \equiv 0$,} \end{cases} $$ where the infimum is taken over all finite Borel measures $\lambda$ on $E$. The expression above coincides with that in the statement of the theorem. It remains only to check that the rate function $\mathfrak{I}_2$ is good. This is a consequence of Lemma~\ref{lem:exp_tight} below, which establishes the exponential tightness of the scaled empirical measures $\Phi_n/n$, and~\cite[Lemma 1.2.18]{dembo98}. This completes the proof of Theorem~\ref{thm:cox_ldp}. \hfill $\Box$ We first state a proposition which provides an explicit construction of compact subsets of ${\cal M}^f_+(E)$, and which we will need for the proof of Lemma~\ref{lem:exp_tight}. The proof of the proposition is deferred until after the lemma, and is where the assumption of $\sigma$-compactness of $E$ is required. \begin{prop} \label{compact_set_measures} Let $K_1 \subseteq K_2 \subseteq \ldots$ be a nested sequence of compact subsets of $E$, whose union is equal to $E$; such a sequence exists by the assumption that $E$ is $\sigma$-compact. Let $\epsilon_0 \ge \epsilon_1 \ge \ldots$ be a sequence of real numbers decreasing to zero. Define $K_0$ to be the empty set. Then, the set $$ L_{(K_n,\epsilon_n)} = \bigl\{ \mu \in {\cal M}^f_+(E): \mu(K_n^c) \le \epsilon_n \; \forall \; n\in \mathbb{N} \bigr\}, $$ is compact in the weak topology on ${\cal M}^f_+(E)$. Moreover, if $\mathcal{K}$ is any compact subset of ${\cal M}^f_+(E)$, and $\epsilon_n, n\in \mathbb{N}_+$ any sequence decreasing to 0, then there exist $\epsilon_0>0$ and compact $K_1 \subseteq K_2 \subseteq \ldots \subseteq E$ such that $\mathcal{K} \subseteq L_{(K_n,\epsilon_n)}$. \end{prop} \begin{lemma} \label{lem:exp_tight} Suppose that $(\Lambda_n, n\in \mathbb{N})$ is a sequence of random finite Borel measures on a Polish space $(E,d)$, which satisfy the assumptions of Theorem~\ref{thm:cox_ldp}. Let $(\Phi_n, n\in \mathbb{N})$ be a sequence of Cox point processes on $E$, with stochastic intensities $\Lambda_n$. Then, the sequence of random measures $\Phi_n/n$ is exponentially tight in ${\cal M}^f_+(E)$ equipped with the weak topology. \end{lemma} \begin{proof} We have to show that for every $\alpha<\infty$, there is a compact $\mathcal{K}_{\alpha} \subseteq {\cal M}^f_+(E)$ such that \begin{equation} \label{eq:exptight_bound} \limsup_{n\rightarrow\infty}\frac{1}{n}\log\ \mathbb{P} \Bigl( \frac{\Phi_n}{n} \in \mathcal{K}_{\alpha}^c \Bigr) <-\alpha. \end{equation} By the assumptions of Theorem~\ref{thm:cox_ldp}, the sequence $\Lambda_n/n$ satisfies an LDP in ${\cal M}^f_+(E)$, with \emph{good} rate function $\mathfrak{I}_1$. Hence, the sequence is exponentially tight, i.e., there is a compact set $\mathcal{\hat K}_{\alpha}\subseteq {\cal M}^f_+(E)$ such that \begin{equation} \label{exptight_intensity} \limsup_{n\rightarrow\infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\Lambda_n}{n}\notin \mathcal{\hat K}_{\alpha} \Bigr) <-\alpha. \end{equation} By Proposition~\ref{compact_set_measures}, $\mathcal{\hat K}_{\alpha}$ is contained in a compact set of the form $L_{(K_n,\epsilon_n)}$, where $\epsilon_n, n\ge 1$ can be chosen to decrease to zero arbitrarily. We will show that, for a suitably chosen sequence $\delta_n \downarrow 0$, the set $L_{(K_n,\delta_n)}$ satisfies the upper bound in (\ref{eq:exptight_bound}). Observe that \begin{eqnarray} \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i,\delta_i)} \Bigr) & \leq & \mathbb{P} \Bigl(\frac{\Phi_n}{n}\notin L_{(K_i,\delta_i)} \Bigm| \frac{\Lambda_n}{n} \in L_{(K_i,\epsilon_i)} \Bigr) +\mathbb{P} \Bigl( \frac{\Lambda_n}{n} \notin L_{(K_i,\epsilon_i)} \Bigr) \nonumber \\ & \leq & \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i,\delta_i)} \Bigm| \frac{\Lambda_n}{n}\in L_{(K_i,\epsilon_i)} \Bigr) + \mathbb{P} \Bigl( \frac{\Lambda_n}{n} \notin \mathcal{\hat K}_{\alpha} \Bigr). \label{exptight_decomp1} \end{eqnarray} Now, conditional on $\Lambda_n$, $\Phi_n$ is a Poisson point process, and $\Phi_n(K_i^c)$ is a Poisson random variable with mean $\Lambda_n(K_i^c)$. Thus, conditional on $\Lambda_n/n \in L_{(K_i, \epsilon_i)}$, the random variable $\Phi_n(K_i^c)$ is stochastically dominated by a Poisson random variable with mean $n\epsilon_i$, for each $i\in \mathbb{N}$. Also, the event $\{ \Phi_n/n \notin L_{(K_i,\delta_i)} \}$ is the union of the events $\{ \Phi_n(K_i^c) > n\delta_i \}$ over $i\in \mathbb{N}$. Define $m_n = \sup \{ i: n\delta_i > 1 \}$. Since $\Phi_n$ is a counting measure, the event $\{ \Phi_n(K_i^c) > n\delta_i \}$ coincides with $\{ \Phi_n(K_i^c) \geq 1 \}$ for $i>m_n$. Hence, we obtain using the union bound that \begin{eqnarray} && \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i, \delta_i)} \Bigm| \frac{\Lambda_n}{n} \in L_{(K_i,\epsilon_i)} \Bigr) \; \leq \; \sum_{i=0}^{\infty} \mathbb{P} \bigl( Poi ( n\epsilon_i )>n\delta_i \bigr) \nonumber \\ && = \; \sum_{i=0}^{m_n} \mathbb{P} \bigl( Poi ( n\epsilon_i )>n\delta_i \bigr) \; + \sum_{i=m_n+1}^{\infty}\mathbb{P} \bigl( Poi ( n\epsilon_i ) \ge 1 \bigr). \label{exptight_decomp2} \end{eqnarray} Without loss of generality, we can take $\epsilon_0 \ge 1$. Take $\epsilon_i = e^{-i}$ and $\delta_i = \kappa/i$ for $i\ge 1$, for a constant $\kappa$ to be determined, depending on $\alpha$. Take $\delta_0 = \kappa \epsilon_0$. Then $m_n=\lfloor \kappa n \rfloor$, and we obtain using Markov's inequality that \begin{equation} \label{tailsum_bound} \sum_{i=m_n+1}^{\infty}\mathbb{P} \bigl( Poi ( n\epsilon_i ) \ge 1 \bigr) \le \sum_{i=\lceil \kappa n \rceil}^{\infty} ne^{-i} \le \frac{n e^{-\kappa n}}{1-e^{-1}}. \end{equation} We also have the large deviations (Chernoff) bound for a Poisson random variable that, for $\mu>\lambda$, $$ \mathbb{P} \bigl( Poi(\lambda)>\mu ) \le \exp \Bigl( -\mu \log \frac{\mu}{\lambda}+\mu-\lambda \Bigr), $$ from which it follows that $$ \mathbb{P} \bigl( Poi ( n\epsilon_i )>n\delta_i \bigr) \le \begin{cases} \exp(-n\epsilon_0 (\kappa \log \kappa-\kappa+1)), & i=0, \\ \exp \bigl( -n \kappa \frac{\log \kappa+i-1-\log i}{i} \bigr), & i\ge 1. \end{cases} $$ Now, $\epsilon_0 \ge 1$ by assumption and, if $\kappa$ is chosen sufficiently large, then it is easy to verify that $(\log \kappa+i-1-\log i)/i$ is bigger than $1/2$ for all $i\ge 1$. Hence, we obtain that \begin{equation} \label{bodysum_bound} \sum_{i=0}^{m_n} \mathbb{P} \bigl( Poi ( n\epsilon_i )>n\delta_i \bigr) \le e^{-n (\kappa \log \kappa-\kappa+1)} + \kappa n e^{-\kappa n/2}, \end{equation} as $m_n=\lfloor \kappa n \rfloor$. Substituting (\ref{tailsum_bound}) and (\ref{bodysum_bound}) in (\ref{exptight_decomp2}), we get $$ \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i, \delta_i)} \Bigm| \frac{\Lambda_n}{n} \in L_{(K_i,\epsilon_i)} \Bigr) \le \frac{n e^{-\kappa n}}{1-e^{-1}} + e^{-n (\kappa \log \kappa-\kappa+1)} + \kappa n e^{-\kappa n/2}. $$ It is clear from this that we can choose $\kappa$ sufficiently large to ensure that \begin{equation} \label{exptight_conditional} \limsup_{n\to \infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i, \delta_i)} \Bigm| \frac{\Lambda_n}{n} \in L_{(K_i,\epsilon_i)} \Bigr) \le -\alpha. \end{equation} Finally, combining (\ref{exptight_intensity}), (\ref{exptight_decomp1}) and (\ref{exptight_conditional}), we conclude that $$ \limsup_{n\to \infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\Phi_n}{n}\notin L_{(K_i, \delta_i)} \Bigr) \le -\alpha. $$ This concludes the proof of the lemma. \end{proof} \noindent{\bf Proof of Proposition~\ref{compact_set_measures}.} The weak topology on the space of finite measures on a Polish space is metrisable~\cite{varadarajan58}), and so it suffices to check sequential compactness. Let $(\mu_n, n\in \mathbb{N})$ be a sequence of finite measures on $E$ satisfying the assumptions of the proposition with respect to a nested sequence of compact sets $K_n$ whose union is equal to $E$, and a sequence $\epsilon_n$ decreasing to zero. In particular, the measures are bounded; $\mu_n(E)\leq \epsilon_0$ for all $n\in \mathbb{N}$. We want to show that $(\mu_n, n\in \mathbb{N})$ contains a convergent subsequence. Recall that the space of subprobability measures on a compact set $K$ is compact in the weak topology; this follows from the Banach-Alaoglu theorem applied to the unit ball in the space of finite signed measures on $K$, which the Riesz representation theorem identifies with the dual of the Banach space $C(K)$ of continuous functions on $K$ equipped with the supremum norm. Hence, by Tychonoff's theorem, so is the space of finite measures on $K$ bounded by an arbitrary constant $\epsilon_0$. Thus, the measures $\mu_n$ restricted to $K_1$ all lie within a compact set; hence, there is a subsequence $\mu_{11}, \mu_{12}, \ldots$, whose restriction to $K_1$ converges weakly to some $\tilde \mu_1 \in {\cal M}^f_+(K_1)$. Similarly, the restriction of this subsequence to $K_2$ all lie within a compact set, and contain a convergent subsubsequence $\mu_{21}, \mu_{22},\ldots$. We can extend this reasoning to $K_3$, $K_4$ and so on. Formally, denote by $p_n$ the projection from ${\cal M}^f_+(E)$ to ${\cal M}^f_+(K_n)$ and by $p_{mn}$ the projection from ${\cal M}^f_+(K_m)$ to ${\cal M}^f_+(K_n)$ for $m\geq n$. Then, we can rewrite the above as: $$ p_1 \mu_{1n} \to \tilde \mu_1 \in {\cal M}^f_+(K_1), \quad p_2 \mu_{2n} \to \tilde \mu_2 \in {\cal M}^f_+(K_2), \quad, \ldots, $$ where the convergence is with respect to the weak topology on the corresponding spaces. Now consider the diagonal sequence $\mu_{kk}$. It is clear from the above that $$ p_n\mu_{kk} \stackrel{k\rightarrow\infty}{\rightarrow} \tilde \mu_n \in {\cal M}^f_+(K_n), $$ for each $n$. A natural question to ask is whether there is a measure $\tilde \mu\in {\cal M}^f_+(E)$ such that $\tilde \mu_n=p_n \tilde \mu$ for all $n$. The answer follows from a generalisation of Kolmogorov's Extension theorem by Yamasaki ~\cite[Proposition 2.1]{yamasaki75}; it is affirmative if the measures $\tilde \mu_n$ satisfy the consistency conditions $p_{mn} \tilde \mu_m=\tilde \mu_n$ for all $m>n$. It is straightforward to verify these. We now show that the diagonal subsequence $\mu_{kk}$ converges weakly to the measure $\tilde \mu$ (whose existence we have just shown) in the weak topology on ${\cal M}^f_+(E)$, and moreover that the limit $\tilde \mu$ is in $L_{(K_n,\epsilon_n)}$. We start with the latter. As $\tilde \mu$ is a finite measure on the Polish space $E$, it is regular; therefore, as $K_n$ are compact sets increasing to $E$, $\tilde \mu(K_n)$ increases to $\tilde \mu(E)$. Hence, for any $m\in \mathbb{N}$, $$ \tilde \mu(K_m^c) = \lim_{n\to \infty} \tilde \mu(K_n) - \tilde \mu(K_m). $$ Now, for any fixed $i>n>m$, $\tilde \mu_i$ is the restriction (or projection) of $\tilde \mu$ to the set $K_i$, and so $$ \tilde \mu(K_n) - \tilde \mu(K_m) = \tilde \mu_i(K_n) - \tilde \mu_i(K_m) \le \tilde \mu_i(K_m^c) \le \epsilon_m. $$ The last inequality holds because $\tilde \mu_i$ is the weak limit of measures whose mass on $K_m^c$ is bounded by $\epsilon_m$, and $K_m^c$ is an open set. As this holds for each $n$, we conclude on taking limits that $\tilde \mu(K_m^c) \le \epsilon_m$. But $m$ was arbitrary, so $\tilde \mu \in L_{(K_n,\epsilon_n)}$. Next, given $\delta>0$ and a bounded continuous function $g:E\to \mathbb{R}$, choose $\ell$ large enough that $\epsilon_{\ell} \| g \|_{\infty} < \delta$. Next, pick $m\geq \ell$ large enough that $$ \Bigm| \int_{K_\ell} gd\mu_{\ell n}- \int_{K_\ell} gd\tilde \mu_{\ell} \Bigm| \le \delta \quad \forall \; n\ge m, $$ which is possible since $\mu_{\ell n}$ converges weakly to $\tilde \mu_{\ell}$ as $n$ tends to infinity. Now, $\mu_{n\cdot}$ is a subsequence of $\mu_{\ell\cdot}$ for $n\ge \ell$, so the above inequality also holds for $\int_{K_{\ell}} g(d\mu_{nn}-d\tilde \mu_{\ell})$ for all $n\ge m$. Thus, we can write $$ \Bigm| \int_E gd\mu_{nn} - \int_E gd\tilde \mu \Bigm| \le \Bigm| \int_{K_{\ell}} g (d\mu_{nn} - d\tilde \mu_{\ell}) \Bigm| + \Bigm| \int_{K_{\ell}} g (d\tilde \mu_{\ell} -d\tilde \mu) \Bigm| +2 \| g \|_{\infty} \epsilon_{\ell}, $$ as $\mu_{nn}(K_{\ell}^c)$ and $\tilde \mu(K_{\ell}^c)$ are both bounded above by $\epsilon_{\ell}$. We have just shown that the first integral above is smaller than $\delta$ in absolute value, for all $n\ge m$. The second integral is zero as $\tilde \mu_{\ell}$ is the restriction or projection of $\tilde \mu$ to $K_{\ell}$. The last term is bounded by $2\delta$ by the choice of $\ell$. Thus, we have shown that we can choose $m$ in such a way that \begin{align*} \left|\int_E gd\mu_{nn} - \int_E gd\tilde \mu\right| \le 3\delta \end{align*} for all $n\ge m$. As $g$ was an arbitrary bounded continuous function, this proves that $\mu_{nn}$ converges to $\tilde \mu$. This completes the proof that $L_{(K_n,\epsilon_n)}$ is compact. For the converse, let $\mathcal{K}$ be compact in ${\cal M}^f_+(E)$ equipped with the weak topology. As the map $\mu \mapsto \mu(E)$ is continuous (the indicator of $E$ is a bounded continuous function $E\to \mathbb{R}$), its supremum over $\mathcal{K}$ is attained. Denote the supremum by $\epsilon_0$. Then $\mu(E)=\mu(K_0^c) \le \epsilon_0$ for all $\mu \in \mathcal{K}$. Next, we invoke a generalisation of Prokhorov's theorem by Bogachev~\cite[Theorem 8.6.2]{bogachev07}), which states that the measures in a compact set are uniformly tight. In other words, given $\epsilon_1>0$, we can find a compact subset $K_1$ of $E$ such that $\mu(K_1^c) \le \epsilon_1$ for all $\mu \in \mathcal{K}$. Similarly, we can find compact $K_2$ such that $\mu(K_2^c) \le \epsilon_2$ for all $\mu \in \mathcal{K}$. Without loss of generality, we can assume that $K_1 \subseteq K_2$; otherwise, re-define $K_2$ as their union. Continuing in the same vein, we obtain a sequence $K_n$ of nested compact sets such that $\mu(K_n^c) \le \epsilon_n$ for all $n\in \mathbb{N}$, for all $\mu \in \mathcal{K}$. If their union is not equal to $E$, it can be extended countably to have this property, by the assumption that $E$ is $\sigma$-compact. Now, $\mathcal{K} \subseteq L_{(K_n,\epsilon_n)}$. \hfill $\Box$ \section{Proof of LDP for Queue Occupancy and Departures} \label{sec:qldp} The proof of Theorems~\ref{thm:qldp} and \ref{thm:dep_ldp} are presented in this section. We begin by recalling how the queue occupancy measure is related to the input to the queue. First, we represent the input to the $n^{\rm th}$ queue as a Cox process on $\mathbb{R} \times \mathbb{R}_+$ by marking each arrival with its service time; the resulting marked point process is a Cox process on $\mathbb{R} \times \mathbb{R}_+$ with stochastic intensity $\Lambda_n \otimes F$. Now, $Q_n(t)$ is equal to the number of points of this Cox process lying in the triangle \begin{align*} A_t=\left\{(s,x)\in\mathbb{R}\times\mathbb{R}_+:s\leq t,x\geq t-s\right\}. \end{align*} Furthermore, the queue length process $\left\{Q_n(t),t\in [a,b]\right\}$, is determined by the restriction of the above Cox process to the wedge \begin{align*} A_{[a,b]}:=\bigcup\limits_{t\in[a,b]}A_t, \end{align*} as illustrated in Figure~\ref{truncatedwedge}. Next, for $u\leq s\leq t$, we will also need to define the truncated sets \begin{align*} A_t^u=\left\{(s,x)\in\mathbb{R}\times\mathbb{R}_+:u\leq s\leq t,x\geq t-s\right\}, \quad A^u_{[s,t]}:=\bigcup\limits_{x\in[s,t]}A^u_x. \end{align*} Finally, recall that we are interested in the occupancy measure $L_n$, which is defined as the random measure that is absolutely continuous with respect to Lebesgue measure, and has density $Q_n(\cdot)$. \begin{figure}[htb] \includegraphics[scale=0.3]{truncatedwedge.pdf} \caption[Truncated Wedge]{The wedge $A_{[s,t]}$ and the truncated wedge $A_{[s,t]}^u$.} \label{truncatedwedge} \end{figure} Our goal is to prove an LDP for $L_n$, restricted to an arbitrary interval $[a,b]$. We start by establishing an LDP for the scaled directing measures $\frac{\Lambda_n}{n}\otimes F$, restricted to a truncated wedge $A^u_{[a,b]}$, for arbitrary $u<a$; we define below a new topology, which we call the tempered topology, in which we establish this LDP. Then, using the projective limit approach described below, we extend this family of LDPs to an LDP on the full wedge $A_{[a,b]}$, in the projective limit topology. However, the queueing map is not continuous in this topology, so we need to strengthen the LDP to the weak topology on the full wedge. We do this by establishing exponential tightness of the measures $\frac{\Lambda_n}{n}\otimes F$ in the tempered topology on $A_{[a,b]}$. Next, we invoke Theorem~\ref{thm:cox_ldp} to deduce an LDP for the Cox process on $A_{[a,b]}$ with this intensity. Finally, we use continuity of the queueing map with respect to the weak topology, and the contraction principle, to obtain the LDP for $L_n$. Checking that $L_n$ also satisfies Assumptions [A1]-[A3] is fairly straightforward. The details of all these steps are presented below. \begin{defin}\label{tempered}\normalfont Let $u\le a<b \in \mathbb{R}$, and let ${\cal M}^f_+(A^u_{[a,b]})$ denote the space of finite measures on the truncated wedge $A^u_{[a,b]}$ defined above. The tempered topology on this space is the weakest topology which makes the maps $\mu \mapsto \int fd\mu$ continuous for all bounded, continuous functions $f:A^u_{[a,b]} \to Rs$ which vanish at the boundary of $A^u_{[a,b]}$. The tempered topology on ${\cal M}^f_+(A_{[a,b]})$ is defined analogously. \end{defin} Notice that the tempered topology is weaker than the weak topology, as it is restricted to test functions that vanish at the boundary. We are now ready to state our first result. \begin{lemma} \label{lem:ldp_trunc_wedge} Fix $u\le a < b \in \mathbb{R}$ and consider the truncated wedge $A^u_{[a,b]}$. The sequence of random measures $\left. \frac{\Lambda_n}{n}\otimes F \right|_{A^u_{[a,b]}}$, $n\in \mathbb{N}$, satisfy an LDP on ${\cal M}^f_+(A^u_{[a,b]})$ equipped with the tempered topology, with good rate function $$ {I}^u_{[a,b]}(\mu)= \inf \left\{ {I}_{[a,b]}(\lambda): \lambda \in {\cal M}^f_+([a,b]),\; \mu= (\lambda \otimes F)\bigm|_{A^u_{[a,b]}} \right\} . $$ \end{lemma} \begin{proof} Define the map \begin{align*} T:{\cal M}^f_+([u,b])\rightarrow{\cal M}^f_+([u,b]\times\mathbb{R}_+) \end{align*} by $T(\mu)=\mu\otimes F$. We first show that this map is continuous in the weak topology. As the weak topology is metrisable, we can check continuity along sequences. To this end, consider a sequence of finite measures $\mu_n$ on $[u,b]$ converging weakly to a finite measure $\mu$, and let $g:[u,b] \times \mathbb{R}_+ \to \mathbb{R}$ be bounded and continuous. Define $h:[u,b]\mapsto \mathbb{R}$ by $h(x)=\int_0^{\infty} g(x,y)dF(y)$. We have $$ \int_{[u,b]\times \mathbb{R}_+} gd(T(\mu_n)) = \int_u^b \Bigl( \int_0^{\infty} g(x,y)dF(y) \Bigr) d\mu_n(x) = \int_u^b h(x)d\mu_n(x), $$ where the first equality follows from Fubini's theorem. If we can show that $h$ is continuous, then it will follow that $\int gd(T(\mu_n))$ converges to $\int gd(T(\mu))$, and, as $g$ was an arbitrary bounded continuous function, that $T(\mu_n)$ converges weakly to $T(\mu)$, thus proving that $T$ is continuous. Now, to show that $h$ is continuous, fix $\epsilon>0$ and $x_0\in \mathbb{R}$ such that $1-F(x_0)\le \epsilon$. Now $g$ is uniformly continuous on the compact set $[u,b]\times [0,x_0]$, so we can find $\delta>0$ such that $|g(x,z)-g(y,z)|<\epsilon$ provided $|x-y|<\delta$. It follows that \begin{eqnarray*} && |h(x)-h(y)| \\ &&\leq \int_0^{x_0} | g(x,z)-g(y,z) | dF(z) + \int_{x_0}^{\infty} |g(x,z)| dF(z) + \int_{x_0}^{\infty} |g(y,z)| dF(z) \\ && \leq (1+2\| g\|_{\infty}) \epsilon. \end{eqnarray*} This proves the continuity of $h$, and consequently of $T$. Next, let $S$ be the map that restricts finite measures on $[u,b]\times \mathbb{R}_+$ to the wedge $A^u_{[a,b]}$. Equip ${\cal M}^f_+([u,b]\times \mathbb{R}_+)$ with the weak topology, and ${\cal M}^f_+(A^u_{[a,b]})$ with the tempered topology. It is easy to see that $S$ is continuous. Indeed, let $\mu_n, n\in \mathbb{N}$ be a sequence of finite measures on $[u,b]\times \mathbb{R}_+$ converging weakly to a finite measure $\mu$ on $[u,b]\times \mathbb{R}_+$, and let $f$ be a bounded, continuous function on $A^u_{[a,b]}$, vanishing on its boundary. Extend it to a bounded, continuous function ${\hat f}:[u,b]\times \mathbb{R}_+ \to \mathbb{R}$ by defining ${\hat f} \equiv f$ on $A^u_{[a,b]}$ and ${\hat f} \equiv 0$ on the complement of $A^u_{[a,b]}$ in $[u,b]\times \mathbb{R}_+$. Then, $$ \int_{A^u_{[a,b]}} fd(S(\mu_n)) = \int_{[u,b]\times \mathbb{R}_+} {\hat f}d\mu_n \rightarrow \int_{[u,b]\times \mathbb{R}_+} {\hat f}d\mu = \int_{A^u_{[a,b]}} fd(S(\mu)), $$ where the convergence holds by the assumption that $\mu_n$ converge weakly to $\mu$. This proves that $S$ is continuous. As $S$ and $T$ are both continuous, so is the composition $S\circ T$. The claim of the lemma now follows from the assumed LDP for $\frac{\Lambda_n}{n} \bigm|_{[u,b]}$ and the contraction principle~\cite[Theorem 4.2.1]{dembo98}. \end{proof} The family of LDPs on the truncated wedges $\{ A^u_{[a,b]}, u<a \}$ can be extended to an LDP on the full wedge $A_{[a,b]}$ using the Dawson-G\"artner theorem for projective limits~\cite[Theorem 4.6.1]{dembo98}. This yields an LDP in the projective limit topology, which is generated by bounded continuous functions supported on the truncated wedges $A^u_{[a,b]}$ and vanishing at their boundaries. In order to strengthen this LDP to the weak topology on $A_{[a,b]}$, we need to show exponential tightness of the measures $\frac{\Lambda_n}{n} \otimes F$ in the weak topology. The following lemma is a key ingredient in establishing this. \begin{lemma} \label{cxorder} Suppose $X,X_1,X_2,...$ are identically distributed random variables with arbitrary joint distribution, and suppose $\alpha_i$, $i\in \mathbb{N}$ are non-negative coefficients whose sum is finite, and which we denote by $\alpha$. Then, $$ \sum\limits_{i=1}^{\infty} \alpha_i X_i \leq_{\rm cx} \alpha X, $$ where we write $Y\leq_{\rm cx} Z$ to denote that $Y$ is dominated by $Z$ in the convex stochastic order, i.e., $\mathbb{E}[\phi(Y)] \le \mathbb{E}[\phi(Z)]$ for all convex functions $\phi$ for which the expectations are defined, possibly infinite. \end{lemma} \begin{proof} By scaling the random variables, we assume $\alpha=1$ without loss of generality. By Jensen's inequality, the inequality $$ \phi \Bigl( \sum_{i=1}^{\infty} \alpha_i X_i(\omega) \Bigr) \le \sum_{i=1}^{\infty} \alpha_i \phi(X_i(\omega)), $$ holds pointwise on the probability space $\Omega$. Taking expectations on both sides yields the result if we can interchange expectation and summation on the right. We can certainly do so (by Tonelli's theorem) if the functions $\phi$ are non-negative, and hence also if they are bounded below. Now, for any $c\in \mathbb{R}$, the function $\phi_c$ defined by $\phi_c(x) = \max \{c,\phi(x) \}$ is convex and bounded below, so we get $$ \mathbb{E} \Bigl[ \phi_c \Bigl( \sum_{i=1}^{\infty} \alpha_i X_i \Bigr) \Bigr] \le \sum_{i=1}^{\infty} \alpha_i \mathbb{E} \Bigl[ \phi_c (X_i) \Bigr] = \Bigl( \sum_{i=1}^{\infty} \alpha_i \Bigr) \mathbb{E} [\phi_c(X) ], $$ as the $X_i$ are identically distributed with the same law as $X$. Since $\phi \leq \phi_c$, it follows that $$ \mathbb{E} \Bigl[ \phi \Bigl( \sum_{i=1}^{\infty} \alpha_i X_i \Bigr) \Bigr] \le \Bigl( \sum_{i=1}^{\infty} \alpha_i \Bigr) \mathbb{E} [\phi_c(X) ], $$ for all $c\in \mathbb{R}$. Letting $c$ decrease to $-\infty$ on the right now yields the claim of the lemma. This can be justified by splitting $\phi$ into its positive and negative parts, and using the Montone Convergence Theorem. \end{proof} We are now ready to show that the directing measures restricted to a wedge are exponentially tight in the weak topology. \begin{prop} \label{etlem} The sequence of random measures \begin{align*} \left(\left.\left(\frac{\Lambda_n}{n}\otimes F\right)\right|_{A_{[a,b]}}\right)_{n\in\mathbb{N}} \end{align*} is exponentially tight in the weak topology. \end{prop} \begin{proof} We have to show that for every $0<\alpha<\infty$, there is a compact set $\mathcal{K}_{\alpha} \subseteq {\cal M}^f_+(A_{[a,b]})$ such that \begin{equation} \label{eq:exptight_bound1} \limsup_{n\rightarrow\infty}\frac{1}{n}\log\ \mathbb{P} \left( \left.\left(\frac{\Lambda_n}{n}\otimes F\right)\right|_{A_{[a,b]}} \in \mathcal{K}_{\alpha}^c \right) <-\alpha. \end{equation} We will use the explicit construction of a weakly compact set of measures given in Proposition~\ref{compact_set_measures}. We seek a nested sequence of compact sets $K_1 \subseteq K_2 \subseteq \ldots \subseteq A_{[a,b]}$, whose union is the wedge $A_{[a,b]}$, and a sequence of positive constants $\epsilon_0 \ge \epsilon_1 \ge \ldots$ decreasing to zero, such that \begin{equation} \label{eq:exptight_bound2} \mathbb{P} \left( \Bigl( \frac{\Lambda_n}{n}\otimes F \Bigr) \Bigl( K_i^c \Bigr) >\epsilon_i\right) \leq e^{-n(i+1)\alpha} \quad \forall \; i\ge 0, \end{equation} where we define $K_0$ to be the empty set. If we can find such $K_i$ and $\epsilon_i$, then the weakly compact set of measures $$ \mathcal{K}_{\alpha} = \Bigl\{ \mu \in {\cal M}^f_+(A_{[a,b]}): \mu(K_i^c) \le \epsilon_i \, \forall \, i\in \mathbb{N} \Bigr\}, $$ satisfies the inequality in (\ref{eq:exptight_bound1}), thus proving the proposition. \begin{figure}[htb] \includegraphics[scale=0.3]{wedgewithstrips.pdf} \caption[Truncated Wedge With Strips]{The wedge $A_{[a,b]}$ split into a compact set $K_i$, infinite rectangle ${R_i}$ and infinite triangle ${T_i}$. The triangle is split into strips of unit width.} \label{wedgewithstrips} \end{figure} Each of the compact sets $K_i$, $i\ge 1$, will be specified by two real numbers $u_i$ and $h_i$ as shown in Figure~\ref{wedgewithstrips}: \begin{align*} K_i = \{ [u_i,b] \times [0,h_i] \} \bigcap A_{[a,b]}. \end{align*} We shall write $K_i^c$ to denote the complement of $K_i$ in $A_{[a,b]}$, and we decompose this set into a triangle \begin{align*} T_i = \left\{(s,x)\in\mathbb{R}\times\mathbb{R}_+:s\leq u_i,x\geq a-s\right\}, \end{align*} and a rectangle \begin{align*} R_i = \left\{(s,x)\in\mathbb{R}\times\mathbb{R}_+:u_i\leq s\leq b,x\geq h_i\right\}; \end{align*} see Figure~\ref{wedgewithstrips}. Thus, we have \begin{equation} \label{eq:prob_complement} \frac{1}{n} (\Lambda_n \otimes F)(K_i^c) = \frac{1}{n} (\Lambda_n \otimes F)(T_i) + \frac{1}{n} (\Lambda_n \otimes F)(R_i). \end{equation} Now, by the translation invariance of $\Lambda_n$, we have $$ (\Lambda_n \otimes F)(T_i) \stackrel{\scriptstyle{\rm d}}{=} (\Lambda_n \otimes F)(T^{a-u_i}) \mbox{ and } (\Lambda_n \otimes F)(R_i) \stackrel{\scriptstyle{\rm d}}{=} \bigl( \Lambda_n \otimes F \bigr) \bigl( R^{h_i}_{b-u_i} \bigr)), $$ where $\stackrel{\scriptstyle{\rm d}}{=}$ denotes equality in distribution, and the sets $T^{\ell}$ and $R^h_z$ are defined as \begin{equation} \label{def_complement} \begin{split} T^{\ell} &= \{ (t,x)\in \mathbb{R} \times \mathbb{R}_+: t \le 0, t+x \ge \ell \} \\ R^{h}_{z} &= \{ (t,x)\in \mathbb{R} \times \mathbb{R}_+: t \in [0,z], x \ge h \}. \end{split} \end{equation} Thus, we obtain from (\ref{eq:prob_complement}) that \begin{eqnarray} \mathbb{P} \left( \Bigl( \frac{\Lambda_n}{n}\otimes F \Bigr) \Bigl( K_i^c \Bigr)>\epsilon_i\right) &\leq& \mathbb{P} \left( \bigl( \Lambda_n\otimes F \bigr) \bigl( T^{a-u_i} \bigr) >\frac{n\epsilon_i}{2} \right) \nonumber \\ && + \mathbb{P} \left( \bigl( \Lambda_n \otimes F \bigr) \bigl( R^{h_i}_{b-u_i} \bigr) >\frac{n\epsilon_i}{2} \right). \label{eq:exptight_bound3} \end{eqnarray} We show in Lemma~\ref{lem:complement_bd} that, given $i\in \mathbb{N}$, $\epsilon_i>0$ and $\alpha>0$, we can choose $u_i$ to make $a-u_i$ sufficiently large that $$ \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( T^{a-u_i} \bigr) > \frac{n\epsilon_i}{2} \Bigr) \le e^{-n(i+1)\alpha}, \quad \forall n\in \mathbb{N}; $$ to see this, take $\epsilon=\epsilon_i/2$ and $\beta=(i+1)\alpha$ in the statement of the lemma. Next, by the same lemma, given $u_i$, and hence $b-u_i$, we can choose $h_i$ sufficiently large to ensure that $$ \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( R^{h_i}_{b-u_i} \bigr) > \frac{n\epsilon_i}{2} \Bigr) \le e^{-n(i+1)\alpha}, \quad \forall n\in \mathbb{N}. $$ Combining these two inequalities with (\ref{eq:exptight_bound3}), we conclude that for all $i\ge 1$, \begin{equation} \label{complement_prob_bd} \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( K_i^c \bigr) > n\epsilon_i \Bigr) \le 2e^{-n(i+1)\alpha}, \quad \forall n\in \mathbb{N}, \end{equation} which is essentially the same as~(\ref{eq:exptight_bound2}). That leaves the case $i=0$. The same argument does not work for $K_0$ as we cannot choose this set; $K_0$ is the empty set and $K_0^c = A_{[a,b]}$. Instead, we need to show that we can choose $\epsilon_0$ sufficiently large that \begin{equation} \label{total_mass_bd} \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( A_{[a,b]} \bigr) > n\epsilon_0 \Bigr) \le e^{-n\alpha}, \quad \forall n\in \mathbb{N}. \end{equation} We first note that $A_{[a,b]} \subset T_0 \cup \{ [a-\ell, b]\times \mathbb{R}_+ \}$, where $$ T_0= \{ (t,x) \in \mathbb{R} \times \mathbb{R}_+ : t \le a-\ell, t+x\ge a \}. $$ Hence \begin{align*} (\Lambda_n \otimes F)(A_{[a,b]}) \le (\Lambda_n \otimes F)(T_0) + \Lambda_n([a-\ell, b]). \end{align*} Moreover, by translation invariance of $\Lambda_n$, we have \begin{align*} (\Lambda_n \otimes F)(T_0) \stackrel{\scriptstyle{\rm d}}{=} (\Lambda_n \otimes F)(T^{\ell}), \end{align*} where $T^{\ell}$ is defined in~(\ref{def_complement}). Using Lemma~\ref{lem:complement_bd} below, we conclude that we can choose $\ell$ sufficiently large that \begin{equation} \label{t_ell_bd} \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( T_0 \bigr) >n \Bigr) \le e^{-n\alpha}, \quad \forall n\in \mathbb{N}. \end{equation} We also see from the proof of Lemma~\ref{lem:complement_bd} that $\Lambda_n([a-\ell, b])$ is dominated, in the increasing convex order, by $\lceil \ell+b-a \rceil \Lambda_n([0,1])$; in particular, $$ \mathbb{E} \left[ e^{\theta \Lambda_n([a-\ell, b])} \right] \leq \mathbb{E} \left[e^{\theta(\ell+1+b-a) \Lambda_n([0,1])} \right] = \exp \Bigl( \psi_n \bigl( n\theta (\ell+1+b-a) \bigr) \Bigr), $$ where $\psi_n$ is defined in Assumption [A3]. By [A3], for given $a,b,\ell$, $\psi_n(n\theta(\ell+1+b-a))/n$ is bounded, for $\theta$ in a neighbourhood of the origin, uniformly in $n$, i.e., there exist constants $\theta, \delta>0$ such that $\psi_n(n\theta) \le n\delta$ for all $n\in \mathbb{N}$. Consequently, by Markov's inequality, $$ \mathbb{P} \left( \Lambda_n([a-\ell, b]) \geq n(\epsilon_0-1) \right) \leq e^{-n\theta (\epsilon_0-1)+n\delta}, \quad \forall n\in \mathbb{N}. $$ Clearly, we can choose $\epsilon_0$ large enough to ensure that $$ \mathbb{P} \left( \Lambda_n([a-\ell, b]) \geq n(\epsilon_0-1) \right) \leq e^{-n\alpha}, \quad \forall n\in \mathbb{N}. $$ Combining the above equation with (\ref{t_ell_bd}), we see that the inequality in (\ref{total_mass_bd}) holds, up to a factor of two. This completes the proof that the inequality in (\ref{eq:exptight_bound2}) holds for all $i\ge 0$, up to a factor of two on the RHS. Now, using the union bound over $i$, we get $$ \mathbb{P} \left( \exists \, i\ge 0 : \Bigl( \frac{\Lambda_n}{n} \otimes F \Bigr) \Bigl( K_i^c \Bigr) > \epsilon_i \right) \leq \sum_{i=0}^{\infty} e^{-n(i+1)\alpha} \leq 2e^{-n\alpha}, $$ from which (\ref{eq:exptight_bound1}) is immediate, given the definition of $\mathcal{K}_{\alpha}$. This completes the proof of the proposition. \end{proof} \begin{lemma} \label{lem:complement_bd} Let $\beta>0$ be a given constant. For $\ell, h, z>0$, let the triangle $T_{\ell}$ and the rectangle $R^h_z$ be defined as in (\ref{def_complement}). Then, we have the following: \begin{enumerate} \item Given $\epsilon>0$, we can choose $\ell$ sufficiently large that $$ \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr)\bigl( T^{\ell} \bigr) > n\epsilon \Bigr) \le e^{-n\beta}, \quad \forall n\in \mathbb{N}. $$ \item Given $z>0$ and $\epsilon>0$, we can choose $h$ sufficiently large that $$ \mathbb{P} \Bigl( \bigl( \Lambda_n\otimes F \bigr) \bigl( R^h_{z} \bigr) > n\epsilon \Bigr) \le e^{-n\beta}, \quad \forall n\in \mathbb{N}. $$ \end{enumerate} \end{lemma} \begin{proof} Fix an $\ell\in\mathbb{R}$. By splitting the triangle $T^{\ell}$ into vertical strips of unit width, we see that $$ \bigl( \Lambda_n \otimes F \bigr) \bigl( T^{\ell} \bigr) \le \sum_{k=0}^{\infty} \Lambda_n \bigl( [-k-1,-k] \bigr) \overline{F}(\ell+k). $$ Now, by translation invariance of $\Lambda_n$, the random variables $\Lambda_n \bigl( [-k-1,-k] \bigr)$ are identically distributed for all $k$. Moreover, the sum of the coefficients $\overline{F}(\ell+k)$ can be bounded as follows: $$ \sum_{k=0}^{\infty} \overline{F}(\ell+k) \leq c_{\ell} := \int_{\ell-1}^{\infty} \overline{F}(x)dx = \mathbb{E} [S\mathbf{1}(S\geq \ell-1)], $$ where $S$ denotes a random variable with the distribution $F$ of the service time, and $\mathbf{1}(E)$ denotes the indicator of the event $E$. This last expectation is finite by the assumption that the service time has finite mean. Hence, invoking Lemma~\ref{cxorder}, we obtain that $$ \bigl( \Lambda_n \otimes F \bigr) \bigl( T^{\ell} \bigr) \le_{icx} c_{\ell} \Lambda_n \bigl( [0,1] \bigr), $$ where, for random variables $X$ and $Y$, we say that $X$ is dominated by $Y$ in the increasing convex order, written $X\le_{icx} Y$, if $\mathbb{E}[\phi(X)] \le \mathbb{E}[\phi(Y)]$ for all increasing convex functions $\phi$. Applying this bound to the increasing convex function $\phi(x)=e^{\theta x}$ for arbitrary $\theta>0$, and using Markov's inequality, we get, for any $\epsilon>0$, $$ \mathbb{P} \Bigl( \bigl( \Lambda_n \otimes F \bigr) \bigl( T^{\ell} \bigr) \geq \frac{n\epsilon}{2} \Bigr) \leq e^{-n\theta \epsilon/2} \mathbb{E} \left[ e^{\theta c_{\ell} \Lambda_n([0,1])} \right] = \exp \Bigl( -\frac{n\theta \epsilon}{2} + \psi_n \bigl( n\theta c_{\ell} \bigr) \Bigr), $$ where the function $\psi_n$ was defined in Assumption [A3]. As $\theta>0$ is arbitrary, it is convenient to rewrite the above inequality, replacing $\theta$ by $\theta/c_{\ell}$, as \begin{equation} \label{eq:triangle_prob_bd} \log \mathbb{P} \Bigl( \bigl( \Lambda_n \otimes F \bigr) \bigl( T^{\ell} \bigr) \geq \frac{n\epsilon}{2} \Bigr) \leq -\frac{n\theta \epsilon}{2c_{\ell}} + \psi_n (n\theta), \mbox{ where } c_{\ell} = \mathbb{E} [S\mathbf{1}(S\geq \ell-1)]. \end{equation} Now, by Assumption [A3], there exist positive constants $\delta$ and $\theta$ such that $\psi_n(n\theta) \le n\delta$, uniformly in $n$. Morever, as $\mathbb{E}[S]$ is finite by Assumption [A4], it follows that $c_{\ell}$ tends to zero as $\ell$ tends to infinity. Hence, we see from (\ref{eq:triangle_prob_bd}) that, given $i\in \mathbb{N}$ and $\beta, \epsilon>0$, we can choose $\ell$ sufficiently large, and consequently $c_{\ell}$ sufficiently small, to ensure that \begin{equation} \label{eq:triangle_prob_bd2} \mathbb{P} \left( \bigl( \Lambda_n \otimes F \bigr) \bigl( T^{\ell} \bigr) \geq n\epsilon \right) \leq e^{-n\beta} \quad \forall \; n\in \mathbb{N}. \end{equation} This completes the proof of the first claim of the lemma. The proof of the second claim is very similar. We show that $$ \bigl( \Lambda_n \otimes F \bigr) \bigl( R^h_{b-a} \bigr) \le_{icx} \lceil b-a \rceil \overline{F}(h) \Lambda_n ([0,1]), $$ and apply Markov's inequality to the exponential of the random variable on the RHS. The details are omitted. \end{proof} We now have all the ingredients required to establish an LDP for the scaled intensity measures $(\Lambda_n \otimes F)/n$, on the wedge $A_{[a,b]}$. \begin{prop} \label{intldp} Suppose that $\Lambda_n, n\in \mathbb{N}$ is a sequence of random measures satisfying Assumptions [A1]-[A3] and $F$ satisfies [A4]. Fix an interval $[a,b] \subset \mathbb{R}$. The sequence of random measures $\left.\left(\frac{\Lambda_n}{n}\otimes F\right)\right|_{A_{[a,b]}}$, $n\in \mathbb{N}$, satisfy an LDP on ${\cal M}^f_+(A_{[a,b]})$ equipped with the weak topology, with good rate function $$ {I}_{[a,b]}(\nu) = \sup_{u\le a} {I}^u_{[a,b]} \bigl( \nu \bigm|_{A^u_{[a,b]}} \bigr), \quad \nu \in {\cal M}^f_+([a,b]). $$ \end{prop} \begin{proof} We will use the Dawson-G\"artner theorem~\cite[Theorem 4.6.1]{dembo98} for projective limits. Letting \begin{align*} J:=\left\{ A^u_{[a,b]}: u\in(-\infty,a)\right\}, \end{align*} it is clear that the collection $(J,\subseteq)$ of truncated wedges $A^u_{[a,b]}$ equipped with set inclusion is totally ordered, and hence also right-filtering. The set is indexed by $u$, and we will use $u$ to denote the element $A^u_{[a,b]}$, to simplify notation. Denote by $\mathcal{Y}_u$ the space ${\cal M}^f_+(A^u_{[a,b]})$ of finite measures on $A^u_{[a,b]}$, equipped with the tempered topology. If $t\le u$, i.e., $A^u_{[a,b]} \subseteq A^t_{[a,b]}$ (note that the order in the projective system reverses inequalities from the order on the real line), define the projection $p_{ut}: \mathcal{Y}_t \to \mathcal{Y}_u$ by the restriction of a measure on $A^t_{[a,b]}$ to the subset $A^u_{[a,b]}$. It is clear that this map is continuous in the tempered topology, since any bounded, continuous function on $A^u_{[a,b]}$, vanishing on its boundary, can be extended to a bounded, continuous function on $A^t_{[a,b]}$, vanishing on its boundary, by setting it to zero outside $A^u_{[a,b]}$. Moreover, the projections satisfy the consistency condition $p_{us}=p_{ut}\circ p_{ts}$ for $s\le t\le u$. Thus, $(\mathcal{Y}_u, p_{ut})_{t\le u}$ constitute a projective system. We can identify ${\cal M}^f_+(A_{[a,b]})$ with the projective limit, with canonical projections \begin{align*} p_u: {\cal M}^f_+(A_{[a,b]})\to {\cal M}^f_+(A^u_{[a,b]}) \end{align*} defined as the restriction of a measure from the full wedge $A_{[a,b]}$ to its truncation $A^u_{[a,b]}$. These are clearly continuous in the tempered topology, by the same argument as above. Now, by Lemma~\ref{lem:ldp_trunc_wedge}, the projections $$ \left. \left( \frac{\Lambda_n}{n}\otimes F \right) \right|_{A^u_{[a,b]}} = p_u \left( \left. \left( \frac{\Lambda_n}{n}\otimes F \right) \right|_{A_{[a,b]}} \right), \; n\in \mathbb{N}, $$ satisfy an LDP for each $u\in (\infty,a)$, with rate function ${I}^u_{[a,b]}$. Hence, by the Dawson-G\"artner theorem, the sequence of measures $\left. \left( \frac{\Lambda_n}{n}\otimes F \right) \right|_{A_{[a,b]}}$, $n\in \mathbb{N}$, satisfies an LDP in the projective limit topology, with good rate function $$ {I}_{[a,b]}(\nu) = \sup_{u\le a} {I}^u_{[a,b]} \bigl( \nu \bigm|_{A^u_{[a,b]}} \bigr), \quad \nu \in {\cal M}^f_+([a,b]). $$ Moreover, by Proposition~\ref{etlem}, the measures $\left. \left( \frac{\Lambda_n}{n}\otimes F \right) \right|_{A_{[a,b]}}$ are exponentially tight in the weak topology on ${\cal M}^f_+(A_{[a,b]})$. Hence, by \cite[Corollary 4.2.6]{dembo98}, we obtain that the LDP holds in the weak topology. Exponential tightness also implies goodness of the rate function~\cite[Lemma 1.2.18]{dembo98}. \end{proof} Next, we show the continuity of the queueing map, which is the prelude to obtaining the LDP for the queue occupancy measure. For a measure $\nu \in {\cal M}^f_+(A_{[a,b]})$, and $t\in [a,b]$, we define $Q^{\nu}(t)=\nu(A_t)$, where we recall that $A_t=A_{[t,t]}$ is the set \begin{align*} \{ (s,x)\in \mathbb{R} \times \mathbb{R}_+: s\le t, s+x\ge t \}. \end{align*} The interpretation is that, if $\nu$ is a counting measure representing the marked arrival process into an infinite-server queue, where each arrival is marked with its service time, then $Q^{\nu}(t)$ denotes the number of customers in the queue at time $t$. Let $L(\nu)$ denote the measure on $[a,b]$ which is absolutely continuous with respect to Lebesgue measure, and has density $Q^{\nu}(\cdot)$; let $L$ denote the map from ${\cal M}^f_+(A_{[a,b]})$ to ${\cal M}^f_+([a,b])$ which takes $\nu$ to $L(\nu)$. We want an explicit characterisation of the map $L$. We will describe $L(\nu)$ through its action on the dual space $C_b([a,b])$ of bounded, continuous functions on $[a,b]$, i.e., by specifying $\int_a^b g(t)dL(\nu)(t)$ for all $g\in C_b([a,b])$. By the Riesz representation theorem, $L(\nu)$ is uniquely determined by these integrals. From the description above, we have \begin{eqnarray} \int_a^b g(t)dL(\nu)(t) &=& \int_a^b g(t) Q^{\nu}(t) dt =\int_{t=a}^b g(t) \nu(A_t) dt \nonumber \\ &=& \int_{A_{[a,b]}} \Bigl( \int_{\max\{a,s\}}^{\min\{s+x,b\}} g(t)dt \Bigr) \nu(ds\times dx). \label{eq:qdual} \end{eqnarray} The last equality is obtained by interchanging the order of integration, noting that an area element at $ds\times dx$ contributes to $\nu(A_t)$ for each $t$ between $\max \{a,s\}$ and $\min \{s+x,b\}$. \begin{lemma}\label{weaklycontmap} The map $L:{\cal M}^f_+(A_{[a,b]}) \to {\cal M}^f_+{([a,b])}$, defined by (\ref{eq:qdual}) via the Riesz representation theorem, is continuous with respect to the weak topology on each of these sets. \end{lemma} \begin{proof} The weak topology on the space of finite measures on a Polish space is metrisable~\cite{varadarajan58}, so we can check continuity of $L$ along sequences. Suppose $\nu_n, n\in \mathbb{N}$ converge to $\nu$ in the weak topology on ${\cal M}^f_+(A_{[a,b]})$. Let $g:[a,b]\to \mathbb{R}$ be a bounded, continuous function. We have by (\ref{eq:qdual}) that \begin{eqnarray} \int_a^b g(t)dL(\nu_n)(t) &=& \int_{A_{[a,b]}} h(s,x) \nu_n(ds\times dx), \nonumber\\ \mbox{where} && h(s,x) = \int_{\max\{a,s\}}^{\min\{s+x,b\}} g(t)dt, \label{eq:qmeasure} \end{eqnarray} where the last integral is defined to be zero if the upper limit of integration is smaller than the lower limit. (In other words, the domain of integration should be understood to be empty in this case, rather than treating it as a signed integral with limits reversed.) It is clear that the the function $h:A_{[a,b]} \to \mathbb{R}$ is bounded and continuous. Hence, it follows from the assumed convergence of $\nu_n$ to $\nu$ in the weak topology that the RHS in (\ref{eq:qmeasure}) converges to \begin{align*} \int_{A_{[a,b]}} h(s,x) \nu(ds\times dx). \end{align*} This completes the proof of the lemma. \end{proof} We are now ready to prove the main result. \noindent {\bf Proof of Theorem~\ref{thm:qldp}.} Let $\Phi_n$ denote the Cox process of arrivals into the $n^{\rm th}$ queue, marked with their service times. Fix $[a,b]\subset \mathbb{R}$. By Proposition~\ref{intldp}, the sequence of measures $\left. \left( \frac{\Lambda_n}{n}\otimes F \right) \right|_{A_{[a,b]}}$, satisfy an LDP on ${\cal M}^f_+(A_{[a,b]})$ equipped with the weak topology, with good rate function ${I}_{[a,b]}$ given therein. Hence, by Theorem~\ref{thm:cox_ldp}, the sequence of Cox point measures $\left. \frac{\Phi_n}{n} \right|_{A_{[a,b]}}$ also satisfies an LDP on ${\cal M}^f_+(A_{[a,b]})$ equipped with the weak topology, with good rate function ${\mathcal{I}}_{[a,b]}$ given by \begin{equation} \label{eq:coxppldp_zero} {\mathcal{I}}_{[a,b]}(\boldsymbol{0}) = \inf_{\lambda} \left\{ {I}_{[a,b]}(\lambda) + \lambda \left( A_{[a,b]} \right)\right\}, \end{equation} where $\boldsymbol{0}$ denotes the zero measure, whereas, for $\mu \not\equiv \boldsymbol{0}$, \begin{eqnarray} {\mathcal{I}}_{[a,b]}(\mu) &=& \inf_{\lambda} \Bigl\{ {I}_{[a,b]}(\lambda) + {I_{Poi}} \left( \mu(A_{[a,b]}), \lambda(A_{[a,b]}) \right) \nonumber \\ && \quad\quad + \mu(A_{[a,b]}) H\Bigl( \frac{\mu}{\mu(A_{[a,b]})} \Bigm| \frac{\lambda}{\lambda(A_{[a,b]})} \Bigr) \Bigr\}, \label{eq:coxppldp} \end{eqnarray} where $H$ and ${I_{Poi}}$ are defined in the statements of Theorem~\ref{baxterthm} and Lemma~\ref{poisson_ldp} respectively. Now, the queue occupancy measures $L_n$ are given by $L_n/n = L(\Phi_n/n)$, where the map $L$ is defined by (\ref{eq:qdual}), and is linear and weakly continuous. Hence, by the contraction principle~\cite[Theorem 4.2.1]{dembo98}, the sequence of measures $L_n/n$ satisfies an LDP on ${\cal M}^f_+([a,b])$ equipped with the weak topology, with good rate function \begin{equation} \label{eq:qocc_ldp} {J}_{[a,b]}(\nu) = \inf \left\{ {\mathcal{I}}_{[a,b]}(\mu): L(\mu)=\nu \right\}, \end{equation} where the infimum of an empty set is defined to be $+\infty$. Thus, the sequence $L_n$ satisfies Assumption [A2]. The measures $L_n$ inherit translation invariance from $\Lambda_n$ via $\Lambda_n \otimes F$ and $\Phi_n$, while finiteness of the mean follows easily from that of $\lambda$ (the mean arrival intensity) and of the service time distribution. Thus, [A1] is verified. It remains to check [A3]. Observe that, analogous to (\ref{eq:qmeasure}), we have \begin{eqnarray*} L_n([0,1]) &=& (L(\Phi_n))([0,1]) \\ &=& \int_{(s,x)\in A_{[0,1]}} \bigl( \min \{s+x,1\} - \max \{s,0\} \bigr) \Phi_n(ds\times dx) \\ &\leq& \Phi_n(A_{[0,1]}). \end{eqnarray*} But, conditional on $\Lambda_n \equiv \boldsymbol{\lambda}$, $\Phi_n([0,1])$ is a Poisson random variable with mean $(\boldsymbol{\lambda}\otimes F)(A_{[0,1]})$. Hence, we have for $\theta \geq 0$ that $$ \mathbb{E} \left[ e^{\theta L_n([0,1])} \right] \leq \mathbb{E} \left[ \exp \Bigl( \bigl( e^{\theta}-1 \bigr) \bigl( \Lambda_n \otimes F \bigr) \bigl(A_{[0,1]} \bigr) \Bigr) \right]. $$ Moreover, it can be shown by splitting $A_{[0,1]}$ into vertical strips of unit width and invoking Lemma~\ref{cxorder}, as in the proof of Lemma~\ref{lem:complement_bd}, that $$ (\Lambda_n \otimes F)(A_{[0,1]}) \le_{icx} (1+\mathbb{E}[S])\Lambda_n([0,1]), $$ where $\mathbb{E}[S]$ denotes the mean service time, and is finite by Assumption [A4]. Hence, we obtain for $\theta \geq 0$ that $$ \mathbb{E} \left[ e^{\theta L_n([0,1])} \right] \leq \mathbb{E} \left[ \exp \Bigl( \bigl( e^{\theta}-1 \bigr) \bigl( 1+\mathbb{E}[S] \bigr) \bigl( \Lambda_n([0,1]) \bigr) \Bigr) \right]. $$ By Assumption [A3], there is a neighbourhood of 0 on which \begin{align*} \frac{\psi_n(n\eta)}{n} =\frac{1}{n}\log \mathbb{E} \left[e^{\eta \Lambda_n(0,1)}\right] \end{align*} is bounded, uniformly in $n$. Setting $\eta=(e^{\theta}-1)(1+\mathbb{E}[S])$, we obtain uniform boundedness of \begin{align*} \frac{1}{n}\log \mathbb{E}\left[e^{\theta L_n([0,1])}\right] \end{align*} for $\theta \geq 0$ sufficiently small, uniformly in $n$. Boundedness is automatic for $\theta<0$ as the random variables $L_n([0,1])$ are non-negative. Thus, the sequence of measures $L_n$ satisfy [A3] as well. This completes the proof of the theorem. \hfill $\Box$ Having established the LDP for the queue occupancy measure, we now turn to the empirical measure of the departure process from the infinite-server queue, which can be expressed as a function of the marked arrival process, where the marks specify the service times. Fix a compact interval $[a,b]\subset \mathbb{R}$, and let $D$ denote the function which maps the marked arrival process on $A_{[a,b]}$, to the departure process measure on $[a,b]$, as described in (\ref{eq:dep_measure}). We will formally define $D$ via the Riesz representation theorem, by specifying, for each $\nu \in {\cal M}^f_+(A_{[a,b]})$, the integral with respect to $D(\nu)$ of arbitrary bounded, continuous functions on $[a,b]$. Let $g \in C_b([a,b])$ be one such function. We define the function $h_g$ on $A_{[a,b]}$ by setting \begin{equation} \label{eq:hdef} h_g(s,x) = \begin{cases} g(s+x), & (s,x) \in {\rm cl}(A_{[a,b]} \backslash A_b), \\ 0, & \mbox{ otherwise,} \end{cases} \end{equation} and define the map $\nu \mapsto D(\nu)$ by setting \begin{equation} \label{eq:dep_riesz} \int_{[a,b]} gd(D(\nu)) = \int_{A_{[a,b]}} hd\nu, \quad \forall \; g\in C_b([a,b]). \end{equation} It is clear from (\ref{eq:dep_measure}) that $$ \int_{[a,b]} gd\Psi_n = \int_{A_{[a,b]}} hd\hat\Phi_n, \quad \forall \; g\in C_b([a,b]), $$ i.e., $\Psi_n = D(\hat \Phi_n)$. We will show that $D(\cdot)$ is continuous in a suitable topology, and use this to establish the desired LDP for $(\Psi_n, n\in \mathbb{N})$. \noindent {\bf Proof of Theorem~\ref{thm:dep_ldp}.} We begin by showing that the map $D:{\cal M}^f_+(A_{[a,b]}) \to {\cal M}^f_+([a,b])$ defined by (\ref{eq:dep_riesz}) is continuous, when ${\cal M}^f_+(A_{[a,b]})$ is equipped with the weak topology, and ${\cal M}^f_+([a,b])$ with the tempered topology. We can check continuity using sequences, as the weak topology on ${\cal M}^f_+(A_{[a,b]})$ is metrisable~\cite{varadarajan58}. Consider a sequence of finite measures $\nu_n$ on $A_{[a,b]}$, converging weakly to a finite measure $\nu$. Let $g$ be a bounded, continuous function on $[a,b]$, vanishing at its end-points, $a$ and $b$. Then, it is clear that the function $h_g$ defined in (\ref{eq:hdef}) is bounded and continuous on $A_{[a,b]}$. Therefore, $\int h_g d\nu_n$ converges to $\int h_d d\nu$, where the integrals are over $A_{[a,b]}$. Hence, by (\ref{eq:dep_riesz}), $\int gdD(\nu_n)$ converges to $\int gdD(\nu)$. It follows that $\nu_n$ converges to $\nu$ in the tempered topology. It was shown in the proof of Theorem~\ref{thm:qldp} that $\hat\Phi_n/n$ (which was denoted $\Phi_n/n$ there!) satisfy the LDP on ${\cal M}^f_+(A_{[a,b]})$ equipped with the weak topology. Since the map $D(\cdot)$ is continuous, it follows by the contraction principle~\cite[Theorem 4.2.1]{dembo98} that $\Psi_n/n$ satisfy the LDP on ${\cal M}^f_+([a,b])$ equipped with the tempered topology, with a good rate function $K_{[a,b]}(\cdot)$, which can be expressed as the solution of a minimisation problem. It remains to strengthen this LDP to the weak topology on ${\cal M}^f_+([a,b])$. We do this by showing that the sequence of random variables $\Psi_n$, $n\in \mathbb{N}$, is exponentially tight in the weak topology. In order to show this, fix $\alpha>0$, arbitrarily large. We need to find a weakly compact subset $K$ of ${\cal M}^f_+([a,b])$ such that $$ \limsup_{n\to \infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\Psi_n}{n} \in K^c \Bigr) \leq -\alpha, $$ where $K^c$ denotes the complement of $K$. Fix $\gamma>0$ sufficiently large, and take $$ K(\gamma)= \{ \nu \in {\cal M}^f_+([a,b]): \nu([a,b]) \leq \gamma \}. $$ Then $K(\gamma)$ is compact in the weak topology, as noted in the proof of Proposition~\ref{compact_set_measures}. Moreover, $$ \Psi_n([a,b]) = \hat\Phi_n( {\rm cl} (A_{[a,b]} \backslash A_b) ) \leq \hat\Phi_n(A_{[a,b]}), $$ and so, $$ \limsup_{n\to \infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\Psi_n}{n} \in K(\gamma)^c \Bigr) \leq \limsup_{n\to \infty} \frac{1}{n} \log \mathbb{P} \Bigl( \frac{\hat\Phi_n}{n} \bigl( A_{[a,b]} \bigr) > \gamma \Bigr). $$ By the goodness of the rate function governing the LDP of $\hat\Phi_n/n$, the last term tends to $-\infty$ as $\gamma$ tends to infinity. Hence, we can choose $\gamma$ large enough to make it smaller than $-\alpha$, as required. Since $(\Psi_n/n, n\in \mathbb{N})$ satisfy the LDP on ${\cal M}^f_+([a,b])$ equipped with the tempered topology, and are exponentially tight in the weak topology, it follows by~\cite[Corollary 4.2.6]{dembo98} that the LDP also holds in the weak topology, and by~\cite[Lemma 1.2.18]{dembo98} that the rate function is good. It remains to show that $\Psi_n/n$ satisfy Assumptions [A1] and [A3]. The proof is very similar to the corresponding part of the proof of Theorem~\ref{thm:qldp}. Translation invariance is inherited from $\hat\Phi_n/n$, and finiteness of the mean intensity is also easy to prove using the same property for $\Phi_n/n$ and $F$. To prove [A3], we use the fact that $\Psi_n([a,b])$ is dominated by $\hat\Phi_n(A_{[a,b]})$. We omit the details, which are identical to the proof of Theorem~\ref{thm:qldp}. \hfill $\Box$ {\bf Acknowledgements} The second author learnt of the biological problem that motivated this work at a workshop at the Mathematical Biosciences Institute, Ohio, in September 2011. He would like to thank Tom Kurtz and the MBI for the invitation.
\section{Introduction} Online social networks (OSNs) have an enormous impact in several human facets. Thanks to the quick development of mobile devices, people tend to split their social activities into several OSNs: They look for family and friends in \verb"Facebook", express their points of views in \verb"Tweeter", and share their photographs in \verb"Instagram", just to give a few examples. Such diversity suggests that studies attempting to understand online social dynamics by including just one single OSN will end up having a strong bias, and therefore, they will typically be incorrect. Individuals involved in two or more OSNs may employ different profile names with some discrepancies about their profile information. In addition, some accounts may have similar profile information, but they still correspond to different users. Hence, OSNs integration is an active area of research. Merging OSNs is of great importance for three major reasons. First, creating more comprehensive social databases for entrepreneurs and scientists. Unified data sources prevent double-counting in research studies involving OSNs and provide invaluable information to test scientific hypothesis. Second, developing automatic contacts merging in mobile devices. Often advanced users provide full access to several OSNs in order to somehow integrate the data streams from their contacts. And third, re-identifying (de-anonymizing) social networks to analyze privacy matters and online security issues. Databases (files) often contain corrupted data with duplicate entries across and within each database. Merging databases and/or removing duplicated records by grouping records pertaining to the same entities lacking unique identifiers is known as record linkage (RL) or entity resolution (ER). Such problem can be viewed as a type of ``microclustering'', with few observations per cluster and a very large number of clusters. This task has applications in all sorts of settings, including public health, human rights, fraud detection, and national security. In this manuscript, we focus our attention on a meaningful RL problem: Identifying accounts across OSNs owned by the same user. Several methods have been studied from the machine learning/computer science perspective for merging OSNs. \citet{vosecky-2009} and \citet{veldman-2009} combine profile features with weights to determine matches through a threshold-based approach. \citet{malhotra-2012} and \citet{nunes-2012} adopt supervised classification to decide on matching. Such methods mainly rely on pairwise profile comparisons, which are computationally very expensive; as a matter of fact, many actors are so dissimilar that there is no need to compare them. In order to reduce computational burden, \citet{zhang-2014} develop a classifier setting up soft constraints to form overlapping clusters to prune unnecessary pairwise comparisons. Beyond profile comparison, \citet{narayanan-2009} introduce a de-anonymization algorithm purely based on network topology, by exploiting the fact that users often have similar social connections in different OSNs. \citet{bartunov-2012} attack the problem employing conditional random fields that account for both profile attributes and social linkage. Their findings confirm that including graph information improves performance by re-identifying users with similar relationship structures. Concurrently, also considering both sources of information, \cite{buccafurri-2012} propose a neighborhood similarity approach to address the problem of multiple social network integration. More recently, \citet{zhang-2015} develop a learning algorithm based on dual decomposition for the same purpose. \citet{shu-2017} review key achievements of user identity linkage across OSNs. Within the Bayesian paradigm to date, there has been significant advances in clustering and latent variable modeling, but to the best of our knowledge there are no references dealing with the problem of merging OSNs. The seminal work of \citet{fellegi-1969} is the classical reference for an unsupervised approach to find links between co-referent records. \citet{belin-1995}, \citet{fienberg-1997}, \citet{larsen-2001} and \citet{tancredi-2011} develop valuable methods to merge two files using samples of multivariate categorical variables. However, these techniques do not easily generalize to either multiple files or duplicate detection. \citet{gutman-2013} devise a general procedure that jointly models both the association between variables and the linkage structure. \citet{liseo-2013} offer a nice review of early Bayesian methodologies for performing RL and making inference using matched units. More recently, \cite{steorts-2014-SMERED}, \cite{steorts-2015-empirical}, and \cite{steorts-2015-graphical}, extending ideas from \citet{domingos-2004}, propose an unsupervised method for linking records across arbitrarily many files, while simultaneously detecting duplicate records within files. Their key innovation consists in representing the pattern of links between records as a bipartite graph, in which records are directly linked to latent true individuals, and only indirectly linked to other records. Even though these models are generative and embedded in the Bayesian paradigm, they rely on field-based records (unimodal data). In this manuscript we propose to extend the bipartite graph approach of \cite{steorts-2015-graphical} by incorporating relational information (bimodal data) in the context of OSN integration. Our proposal can be employed whether network information is available or not, and it is able to handle multiple files simultaneously. The remainder of this manuscript is organized as follows: Section \ref{sec_motivating_examples} motivates our approach in two different settings, namely, re-identification (de-anonymization) and identity resolution. Section \ref{sec_a_RL_model_using_relational_data} introduces a novel approach for RL handling both profile and network data; there, we discuss in detail every aspect of the model including prior specification and computation. Section \ref{sec_posterior_linkage} presents some approaches to posterior linkage estimation and performance assessment. Sections \ref{sec_buccafurri_dataset} and \ref{sec_bartunov_dataset} revisit our motivating examples introduced in Section \ref{sec_motivating_examples} and present analyzes based on our proposed model. Finally, some concluding remarks are provided in Section \ref{sec_extensions}. \section{Motivating examples}\label{sec_motivating_examples} Here we present two problems to motivate our methodological developments in Section \ref{sec_a_RL_model_using_relational_data}. Even though the examples below arise in different contexts, they easily fit in a RL framework in which no more than two records correspond to the same entity, an also, de-duplication is not required. \subsection{Re-identification} \citet{bartunov-2012} considered a local RL setting where the goal is to match (re-identify) anonymized profiles across the contacts of a particular seed user. This task, known as re-identification or de-anonymization, includes several practical applications such as contact merging in mobile devices. \begin{figure}[!t] \centering \includegraphics[scale=.55,]{nets_32526.pdf} \caption{\footnotesize{Facebook and Twitter ego-networks for a particular user (seed node ID 32526). Matches are represented with same color vertices.}} \label{fig_nets_32526} \end{figure} Specifically, for 17 users, a first order snowball sample was taken from \verb"Facebook" and \verb"Twitter", collecting the first order mutual contacts along with their relations (first neighborhood); the authors share an anonymized version of the data at \url{http://modis.ispras.ru/uir/}. Thus, the full dataset consists of 17 anonymized pairs of ego-networks (one pair for each seed user) with manually mapped right projections (ground truth). As a final remark, the authors consider only mutual following in \verb"Twitter" in order to simulate friendship relationships as in \verb"Facebook". Hence, for every seed user, we have two undirected, binary networks with no profile information (all data are anonymized). \begin{table}[!b] \centering \begin{tabular}{l|cccc|cccc} \hline & \multicolumn{4}{c|}{Facebook} & \multicolumn{4}{c}{Twitter} \\ \hline Statistic & Mean & 25\% & 50\% & 75\% & Mean & 25\% & 50\% & 75\% \\ \hline Density & 0.21 & 0.15 & 0.18 & 0.27 & 0.17 & 0.11 & 0.13 & 0.21 \\ Clustering coefficient & 0.30 & 0.14 & 0.29 & 0.40 & 0.43 & 0.36 & 0.40 & 0.52 \\ Assortativity index & -0.53 & -0.63 & -0.52 & -0.45 & -0.29 & -0.42 & -0.24 & -0.21 \\ \hline \end{tabular} \caption{\label{tab_data_stats_uir}\footnotesize{Bartunov's data summary statistics.}} \end{table} Figure \ref{fig_nets_32526} displays one pair of these networks for a particular user (seed node ID 32526). Summary statistics for these data are provided in Table \ref{tab_data_stats_uir}. Note that the networks are quite dense and exhibit a high level of transitivity; the negative assortativity values shown there might be explained by the egocentric nature of the networks. In addition, the total number of matches (also known as anchor nodes in this context) is 152; the ratio of true number of users to total number of nodes ranges from 0.0465 to 0.1915. \subsection{Identity resolution} \cite{buccafurri-2012} faced the problem of determining profiles owned by the same individual across different OSNs, based on both network topology and publicly available personal information. Matching such profiles allows to create a ``global'' profile that gives a complete view of an user's information. To this end, the authors collected data from two popular OSNs, namely, \verb"YouTube" and \verb"Twitter", which is available at \url{http://www.ursino.unirc.it/pkdd-12.html}. This dataset consists of two undirected, binary networks (only mutual following was considered, see Figure \ref{fig_nets_pkdd}) along with the username of each actor. The ground truth (correct matches) is also available. \begin{figure}[h!] \centering \includegraphics[scale=.55,]{pkdd_graph.pdf} \caption{\footnotesize{YouTube and Twitter graphs. Matches are represented with same color vertices.}} \label{fig_nets_pkdd} \end{figure} For our illustrative purposes, we consider a subset of Buccafurri's data. Such subset contains 184 \verb"YouTube" users and 420 \verb"Twitter" users, 19 of which (3.2\%) correspond to the same individual; our goal is to identify as many of those matches as possible relying on their username, which might be distorted, and their connections. For instance, we expect to match \verb"banditooisclutch" in \verb"YouTube" and \verb"negritobandito" in \verb"Twitter" (since the ground truth tell us so), helped by the corresponding relational patterns (they are well connected users, degree 5 and 11, respectively), even though their usernames are somewhat dissimilar. Summary statistics for these data are provided in Table \ref{tab_data_stats_pkdd}. Even though both networks seem to be alike in terms of density, \verb"Twitter"'s graph shows a higher degree of transitivity. The assortative values indicate some negative correlation between nodes of different degree, which to some extent may favor matching. \begin{table}[!h] \centering \begin{tabular}{l|cc} \hline Statistic & \verb"YouTube" & \verb"Twitter" \\ \hline Density & 0.0162 & 0.0122 \\ Clustering coefficient & 0.007 & 0.0366 \\ Assortativity index & -0.2405 & -0.1728 \\ \hline \end{tabular} \caption{\label{tab_data_stats_pkdd}\footnotesize{Buccafurri's data summary statistics.}} \end{table} \section[A record linkage model]{A record linkage model incorporating relational data}\label{sec_a_RL_model_using_relational_data} We begin by specifying some notation and the key idea behind our approach. Then, we present all the details about the model and the prior specification. Finally, remarks about hyperparameter elicitation and computation are provided. \subsection{Notation}\label{sec_notation_RL2} We consider a collection of $J\geq2$ undirected, binary networks with adjacency matrices $\mathbf{Y}}\def\y{\mathbf{y}}\def\Yv{\boldsymbol{Y}}\def\yv{\boldsymbol{y}_j=[y_{i,i',j}]$, such that $y_{i,i',j} = 1$ if there is a link between actors $i$ and $i'$ in network $j$, and $y_{i,i',j}=0$ otherwise, $1\leq i < i'\leq I_j$. On the other hand, let $\pv_{i,j}=(p_{i,j,1},\ldots,p_{i,j,L})$ be the profile (attribute) data associated with the $i$-th actor in network $j$, and let $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_{j}=[p_{i,j,\ell}]$ be the corresponding $I_j\times L$ array for every $j$. For simplicity, we assume that every profile contains $L$ fields in common, field $\ell$ having $M_\ell$ levels. Profile data of this sort may be considered as either categorical or string-valued. Let us say, for instance, that data about gender, state of residency, and race regarding $I_j$ actors in network $j$ are available; in this scenario, $\pv_{i,j}$ is a categorical vector with dimension $L=3$ whose entries have $M_1=2$ (male and female), $M_2=50$ (as of 2017, there are 50 states in the United States), and $M_3=6$ (White, Black or African-American, American Indian or Alaska Native, Asian, Native Hawaiian or Other Pacific Islander, and some other race) levels, respectively. Hence, we can think of records as $L + (I_j - 1)$ dimensional vectors storing profile information ($L$ fields) as well as link information ($I_j-1$ binary fields), while the $j$-th file, in turn, is composed of $I_j$ records. Now, let $\boldsymbol{\pi}_n=(\pi_{n,1},\ldots,\pi_{n,L})$ be the vector of ``true'' attribute values for the $n$-th latent individual, $n=1,\ldots,N$, where $N$ is the total number of latent individuals in the population ($N$ could be as small as $1$ if every record in every file refers to the same entity or as large as $I = \sum_j I_j$ if files do not share records at all). Hence, $\boldsymbol{\pi}=[\pi_{n,\ell}]$ is an unobserved $N\times L$ attribute matrix whose $n$-th row stores the profile data associated with the $n$-th latent individual. Next, we define the linkage structure $\boldsymbol{\xi}=(\boldsymbol{\xi}_{1},\ldots,\boldsymbol{\xi}_{J})$, where $\boldsymbol{\xi}_j=(\xi_{1,j},\ldots,\xi_{I_j,j})$. Here, $\xi_{i,j}$ is an integer from 1 to $N$ indicating which latent individual the $i$-th record in file $j$ refers to, which means that $\pv_{i,j}$ is a possibly-distorted measurement of $\boldsymbol{\pi}_{\xi_{i,j}}$. Such structure unequivocally defines a partition $\mathcal{C}_{\boldsymbol{\xi}}$ on $\{1,\ldots,I\}$. To see this, notice that by definition, two records $(i_1,j_1)$ and $(i_2,j_2)$ correspond to the same individual if and only if $\xi_{i_1,j_1}=\xi_{i_2,j_2}$. Therefore, $\mathcal{C}_{\boldsymbol{\xi}}$ is nothing more than a set composed of $N$ disjoint non-empty subsets $\{C_1,\ldots,C_N\}$ such that $\cup_n C_n = \{1,\ldots,I\}$ where each $C_n$ is defined as the set of all records pointing to latent individual $n$. Hence, the total number of latent individuals $N=N(\boldsymbol{\xi})$ is a function of the linkage structure; specifically, $N=\max\{\xi_{i,j}\}$, since for simplicity we have labeled the cluster assignments with consecutive integers from 1 to $N$. Lastly, $w_{i,j,\ell}$ is a binary variable defined as 1 or 0 according to whether or not a particular field $\ell$ is distorted in $\pv_{i,j}$, i.e., $$ w_{i,j,\ell} = \left\{ \begin{array}{ll} 1, & \hbox{ $p_{i,j,\ell} \neq \pi_{\xi_{i,j},\ell}$;} \\ 0, & \hbox{ $p_{i,j,\ell} = \pi_{\xi_{i,j},\ell}$.} \end{array} \right. $$ Then, each $\wv_j=[w_{i,j,\ell}]$ is a $I_j\times L$ binary matrix containing the (unobserved) distortion indicators of the profile data in file $j$. For example, suppose that the (latent) population has $N=4$ members and they are listed as before by gender, state and race. To illustrate, let the latent population matrix $\boldsymbol{\pi}$ be $$ {\small \boldsymbol{\pi} = \begin{bmatrix} \text{F} & \text{CA} & \text{White} \\ \text{F} & \text{NY} & \text{Black} \\ \text{M} & \text{MI} & \text{Asian} \\ \text{M} & \text{CA} & \text{White} \\ \end{bmatrix}. } $$ We also consider $J=3$ files with $I_1=4$, $I_2=5$, and $I_3=4$ users, whose (observed) profiles might be $$ {\small \mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_1 = \begin{bmatrix} \text{F} & \text{\textbf{CA}} & \text{Black} \\ \text{M} & \text{\textbf{RI}} & \text{Asian} \\ \text{M} & \text{CA} & \text{White} \\ \text{F} & \text{\textbf{MA}} & \text{White} \\ \end{bmatrix},\,\, \mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_2 = \begin{bmatrix} \text{F} & \text{\textbf{LA}} & \text{White} \\ \text{M} & \text{MI} & \text{Asian} \\ \text{F} & \text{\textbf{NJ}} & \text{Black} \\ \text{M} & \text{CA} & \text{White} \\ \text{M} & \text{CA} & \text{White} \\ \end{bmatrix},\,\, \mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_3 = \begin{bmatrix} \text{M} & \text{\textbf{IA}} & \text{White} \\ \text{F} & \text{\textbf{PA}} & \text{White} \\ \text{F} & \text{\textbf{NV}} & \text{Black} \\ \text{M} & \text{MI} & \text{Asian} \\ \end{bmatrix}. } $$ Here, for the sake of keeping the illustration simple, only state is distorted. Thus, comparing the observed profiles $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_1$, $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_2$ and $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_3$ to the latent population $\boldsymbol{\pi}$, the corresponding linkage structure and distortions indicators are $\boldsymbol{\xi}_1 =(2, 3, 4, 1)$, $\boldsymbol{\xi}_2=(1,3,2,4,4)$, $\boldsymbol{\xi}_3=(4,1,2,3)$, $$ {\small \wv_1 = \begin{bmatrix} 0 & 1 & 0 \\ 0 & 1 & 0 \\ 0 & 0 & 0 \\ 0 & 1 & 0 \\ \end{bmatrix},\,\, \wv_2 = \begin{bmatrix} 0 & 1 & 0 \\ 0 & 0 & 0 \\ 0 & 1 & 0 \\ 0 & 0 & 0 \\ 0 & 0 & 0 \\ \end{bmatrix},\,\, \wv_3 = \begin{bmatrix} 0 & 1 & 0 \\ 0 & 1 & 0 \\ 0 & 1 & 0 \\ 0 & 0 & 0 \\ \end{bmatrix}. } $$ Every entry of each $\boldsymbol{\xi}_j$ with a value of 2 means that the corresponding profile in $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_j$ refers to the latent individual with attributes \quo{F}, \quo{NY} and \quo{Black}. The state of this individual has been distorted in all three files as can be seen from every $\wv_j$. We also see other profiles distorted in each $\wv_j$. \begin{figure}[h!] \centering \includegraphics[scale=.38,]{bipartie.pdf} \caption{\footnotesize{Illustration of profiles $\pv_{i,j}$, latent true profiles $\boldsymbol{\pi}_{n}$, and linkage structure (edges) $\boldsymbol{\xi}$.}} \label{fig_bipartie} \end{figure} Figure \ref{fig_bipartie} shows the linkage structure $\boldsymbol{\xi}$ as a bipartite graph in which each edge links a profile to a latent individual. For instance, this figure shows that $\pv_{4,1}$, $\pv_{1,2}$, $\pv_{2,3}$ correspond to the same individual. This toy example makes clear that linking records to a hypothesized latent entity is at its core a clustering problem where the main goal is to make inferences about the cluster assignments $\boldsymbol{\xi}$. In contrast to other clustering tasks, we aim to develop an approach that let the number of records in each cluster be small, even for large datasets; such property is signature in RL and de-duplication applications. In order to incorporate the network information, we will assume that every unique individual $n$ in the population has associated with it a latent position $\uv_n=(u_{n,1},\ldots,u_{n,K})$ of unobserved characteristics, which somehow get \quo{distorted} into the observed links. Notice that $\uv_n$ plays the same role of $\pv_n$, the same way that $\mathbf{Y}}\def\y{\mathbf{y}}\def\Yv{\boldsymbol{Y}}\def\yv{\boldsymbol{y}_j$ plays the same role of $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}_j$. Such mechanism is the key to relate the linkage structure with the profile and network data. \subsection{Model formulation}\label{sec_model_formulation_RL2} Here we present an approach that combines both profile data $\mathbf{P}}\def\p{\mathbf{p}}\def\Pv{\boldsymbol{P}}\def\pv{\boldsymbol{p}=[p_{i,j,\ell}]$ and network data $\mathbf{Y}}\def\y{\mathbf{y}}\def\Yv{\boldsymbol{Y}}\def\yv{\boldsymbol{y}=[y_{i,i',j}]$ in order to uncover multiple records across different files corresponding to the same individual. By assuming that these two sources of information can be modeled independently given the linkage structure $\boldsymbol{\xi}$, our approach handles them separately just having the cluster assignments in common. As before, given the cluster assignments $\xi_{i,j}$ and the latent characteristics $u_{n,k}$, we first model the network data $y_{i,i',j}$ conditionally independent using a latent distance model \citep{hoff-2002}, \begin{equation}\label{eq_model_RL_part_1} y_{i,i',j}\mid \beta_j, \uv_{\xi_{i,j}},\uv_{\xi_{i',j}} \simind \small{\mathsf{Ber}}\left(g^{-1}\left(\beta}\def\bev{\boldsymbol{\beta}_j - \|\uv_{\xi_{i,j}} - \uv_{\xi_{i',j}}\|\right)\right), \end{equation} where $g(\cdot)$ is a (known) link function and $\beta}\def\bev{\boldsymbol{\beta}_j$ is a global intercept associated with file $j$. Regarding the profile data, we model each field depending on whether it is distorted or not. If $p_{i,j,\ell}$ is not distorted, i.e., $w_{i,j,\ell}=0$, we simply keep that particular field intact by giving it a point mass distribution at the true value. On the other hand, if a distortion is present, i.e., $w_{i,j,\ell}=1$, we attempt to recover the real attribute by placing a categorical (multinomial) distribution over all the categories of that particular field. In summary, assuming that the profile data $p_{i,j,\ell}$ are conditional independent given the cluster assignments $\xi_{i,j}$ and the true population attributes $\pi_{n,\ell}$, we have that: \begin{equation}\label{eq_model_RL_part_2} p_{i,j,\ell}\mid\pi_{\xi_{i,j},\ell},w_{i,j,\ell},\zev_{\pi_{\xi_{i,j},\ell},\ell}\simind \left\{ \begin{array}{ll} \delta}\def\delv{\boldsymbol{\delta}_{\pi_{\xi_{i,j},\ell}}, & \hbox{$w_{i,j,\ell}=0$;} \\ \small{\mathsf{Cat}}\left( \zev_{\pi_{\xi_{i,j},\ell},\ell} \right), & \hbox{$w_{i,j,\ell}=1$,} \\ \end{array} \right. \end{equation} where $\delta_a$ is the distribution of a point mass at $a$ and $\zev_{\pi_{\xi_{i,j},\ell},\ell}$ is an $M_\ell$-dimensional vector of multinomial probabilities that may or may not depend on $\pi_{\xi_{i,j},\ell}$. Early approaches considered a probability vector indexed only by $\ell$, say $\vtev_\ell$, which is often taken as the prior probability for the true field \citep{steorts-2014-SMERED}. However, this ignores the fact that the kind of distortion we observe might depend on the value of the true field (e.g., finding state field distorted to CO might be more likely if the true value of the field is CA than WY). When $M_\ell$ is small we can model the corresponding profile values without imposing constraints. On the contrary, if field $\ell$ has too many categories, a different approach is needed in order to reduce the number of parameters. For instance, in the case of string-valued fields, a common approach consists in letting the probability that a distorted value takes the value $s$ be \begin{equation}\label{eq_emipirical_distr_string_field} \zeta}\def\zev{\boldsymbol{\zeta}_{\pi_{\xi_{i,j},\ell},\ell,s} \propto \gamma_\ell(s)\,\ex{-\lambda\,d\left(s,\pi_{\xi_{i,j},\ell}\right)}, \end{equation} where $\gamma_\ell(s)$ is equal to the empirical frequency of $s$ in field $\ell$, $\lambda > 0$ is a known real value, and $d(\cdot,\cdot)$ is some string distance. The probability distribution \eqref{eq_emipirical_distr_string_field} was originally considered as a distortion model in \cite{steorts-2015-empirical}, proving to be successful in their applications. The next stage of the model complements the formulation given in (\ref{eq_model_RL_part_1}) and (\ref{eq_model_RL_part_2}). First, we consider the latent effects $u_{n,k}$ as mutually independent and let $\uv_n\mid\sigma}\def\sigv{\boldsymbol{\sigma}^2\simiid \small{\mathsf{N}}(\boldsymbol{0},\sigma}\def\sigv{\boldsymbol{\sigma}^2\,\mathbf{I}}\def\i{\mathbf{i}}\def\Iv{\boldsymbol{I}}\def\iv{\boldsymbol{i}_K)$. Next, we let the true profile attributes to follow a categorical distribution by placing $\pi_{n,\ell}\mid\vtev_{\ell} \simind \small{\mathsf{Cat}}(\vtev_{\ell})$. Then, given that the distortion indicators $w_{i,j,\ell}$ are binary variables, we simply let $w_{i,j,\ell}\mid\psi_\ell\simind \small{\mathsf{Ber}}(\psi_\ell)$, where for simplicity each distortion probability $\psi_\ell$ depends only on the field. Finally, we complete the model by specifying the independent priors: $\beta_j \sim \small{\mathsf{N}}(0,\omega_j^2)$, $\sigma}\def\sigv{\boldsymbol{\sigma}^2\sim\small{\mathsf{IGam}}(a_\sigma}\def\sigv{\boldsymbol{\sigma},b_\sigma}\def\sigv{\boldsymbol{\sigma})$, $\vtev_{\ell} \simind \small{\mathsf{Dir}}(\alv_{\ell})$, $\psi_\ell \simind \small{\mathsf{Beta}}(a_\ell,b_\ell)$, and $\boldsymbol{\xi}\sim p(\boldsymbol{\xi})$. Hence, our model constitutes a full hierarchical Bayesian framework for discovering duplicate records across multiple files, where $\omega_j^2$, $a_\sigma}\def\sigv{\boldsymbol{\sigma}$, $b_\sigma}\def\sigv{\boldsymbol{\sigma}$, $\alpha}\def\alv{\boldsymbol{\alpha}_{\ell,m}$, $\lambda$, $a_\ell$, $b_\ell$ are all considered as known hyperparameters. Given the characteristics of our examples in Section \ref{sec_motivating_examples}, we consider a specific class of linkage structures in which (a) records within the same file cannot be considered as corrupted versions from each other and (b) no more than two records correspond to the same latent individual. Such a class leads to partitions $\mathcal{C}_{\boldsymbol{\xi}}$ whose elements are either singletons or pairs (of records in different files). Having these restrictions in mind, we assume that every element of $\mathcal{C}_{\boldsymbol{\xi}}$ is equally likely a priori, which means that $\boldsymbol{\xi}$ is restricted to produce partitions composed of equally likely singletons and pairs in such a way that $p(\boldsymbol{\xi})\propto 1$. Even though this assumption implies a non-uniform prior on related quantities, such as the number of individuals in the data, the uniform prior on $\boldsymbol{\xi}$ is convenient because it greatly simplifies computation of the posterior. \subsection{Hyperparameter elicitation}\label{sec_hyperparameter_elicitation} Careful elicitation of the hyperparameters is key to ensure appropriate model performance. For simplicity, we place a diffuse prior distribution on each $\beta_j$ by letting $\omega_j=100$. Then, following \citet[Section 2.4]{krivitsky-2008}, we set $a_\sigma}\def\sigv{\boldsymbol{\sigma}$ and $b_\sigma}\def\sigv{\boldsymbol{\sigma}$ in such a way that a priori $\sigma}\def\sigv{\boldsymbol{\sigma}^2$ is vaguely concentrated (e.g., $\coefvar{\sigma}\def\sigv{\boldsymbol{\sigma}^2} = 0.5$) around $\expec{\sigma}\def\sigv{\boldsymbol{\sigma}^2}= \tfrac{\sqrt{I}}{\sqrt{I} - 2}\, \tfrac{\pi^{K/2}}{ \Gamma(K/2 + 1)}\, I^{2/K}$. Intuitively, each node needs a certain amount of space; since the volume of a $K$-dimensional hypersphere of radius $r$ is $\tfrac{\pi^{K/2}}{ \Gamma(K/2 + 1)}\, r^{K}$, it makes sense to set the prior standard deviation proportional to $I^{1/K}$. As far as the profile hyperparameters is concerned, we set $\alv_{\ell}$ to either $\boldsymbol{1}_{M_\ell}$, an $M_\ell$-dimensional vector of ones, or $\gamma_\ell$, the empirical frequencies of the corresponding values in field $\ell$, depending on whether or not field $\ell$ is taken as categorical independent of $\pi_{\xi_{i,j},\ell}$ or string-valued. Next, following \citet[Section 4]{steorts-2015-empirical}, we set $a_{\ell} = a = 1$ and $b_\ell = b = 99$, which corresponds to a prior mean of 0.01 for the distortion probabilities. This choice seems to be adequate since distortion probabilities cannot be close to 1 for a RL problem to be sensible (typically a small number of corrupted fields is expected), and based on our choice of the beta distribution for each $\psi_\ell$, it follows that $b \gg 1$. Finally, if string-valued fields are available, setting $\lambda = 1$ and letting $d(\cdot,\cdot)$ be the Edit distance \citep{christen-2012} in the distortion model \eqref{eq_emipirical_distr_string_field} is a common choice. \subsection{Computation} For a given value of $K$, Bayesian parameter estimation can be achieved via Markov chain Monte Carlo (MCMC) algorithms. The posterior distribution is approximated using dependent but approximately identically distributed samples $\UPS^{(1)}, \ldots, \UPS^{(S)}$ where \begin{multline*} \UPS^{(s)} = \left( \boldsymbol{\xi}_1^{(s)},\ldots,\boldsymbol{\xi}_J^{(s)},\uv_{1}^{(s)},\ldots,\uv_{N}^{(s)}, \beta_1^{(s)},\ldots,\beta_J^{(s)}, \sigma}\def\sigv{\boldsymbol{\sigma}^{(s)}, \right. \\ \left. \boldsymbol{\pi}_1^{(s)}, \ldots,\boldsymbol{\pi}_N^{(s)}, \vtev_1^{(s)},\ldots,\vtev_L^{(s)}, \wv_1^{(s)},\ldots,\wv_J^{(s)}, \psi_1^{(s)},\ldots,\psi_L^{(s)} \right) . \end{multline*} Notice that we can make inferences about $\boldsymbol{\xi}$, or any function of it, by handling samples $\boldsymbol{\xi}^{(1)},\ldots,\boldsymbol{\xi}^{(S)}$ drawn from the posterior distribution $p(\UPS\mid\text{data})$. Details about posterior linkage estimation are given in Section \ref{sec_posterior_linkage}. In order to derive the joint posterior we need to recall that $\pi_{n,\ell}$, $w_{i,j,\ell}$ and $\xi_{i,j}$ are all interconnected, since $w_{i,j,\ell} = 0$ implies that $\pi_{\xi_{i,j},\ell} = p_{i,j,\ell}$. However, if $\pi_{\xi_{i,j},\ell} = p_{i,j,\ell}$, then $w_{i,j,\ell}$ may or may not equal 0. Full conditional distributions are available in closed form for all the profile parameters. As far as the network parameters is concerned, random walk Metropolis-Hastings steps can be used. Details about the MCMC algorithm are discussed in Appendix \ref{ap_RL2}. \subsection{Remarks} Since estimating the posterior distribution of the linkage structure $\boldsymbol{\xi}$ is the main inference goal, lack of identifiability about the latent positions $\uv_n$ is not an issue here. On the other hand, notice that we are able to make inferences on any function of $\boldsymbol{\xi}$ through the posterior samples $\boldsymbol{\xi}^{(1)},\ldots,\boldsymbol{\xi}^{(S)}$. For example, the posterior mean of the population size $N$ is straightforward to calculate: $$ \expec{N\mid\text{data}} = \frac{1}{S}\sum_{s=1}^S \max\left\{\boldsymbol{\xi}^{(s)}\right\}. $$ Moreover, it is very easy to provide probabilistic statements about any pair of records. Recall that two records $(i_1,j_1)$ and $(i_2,j_2)$ match if and only if they point to the same latent individual (i.e., $\xi_{i_1,j_1} = \xi_{i_2,j_2}$). Hence, the posterior probability of a match can be computed as $$ \pr{\xi_{i_1,j_1} = \xi_{i_2,j_2}\mid\text{data}} = \frac{1}{S}\sum_{s=1}^S\ind{\xi_{i_1,j_1}^{(s)} = \xi_{i_2,j_2}^{(s)}}. $$ As a final remark, the selection of the latent dimension $K$ can be carried out again employing information criteria methods such as the Deviance Information Criterion (DIC) \citep{spiegelhalter2002bayesian,gelman-2014-information,spiegelhalter-2014} and the Watanabe-Akaike Information Criterion (WAIC) \citep{watanabe2010asymptotic,watanabe2013widely,gelman-2014-information} \subsection{Posterior linkage and performance assessment}\label{sec_posterior_linkage} Once posterior samples of $\boldsymbol{\xi}$ have been obtained, we need to provide a point estimate of the overall linkage structure, say $\hat{\boldsymbol{\xi}}$. From a decision-theoretic point of view, we need to define a loss function and then set $\hat{\boldsymbol{\xi}}$ to that configuration of $\boldsymbol{\xi}$ that minimizes the posterior expected loss. We consider a couple of options to estimate the overall linkage structure. \citet[Section 4]{lau-2007} provide a general approach based on a pairwise coincidence loss function \citep{binder-1978,binder-1981} and binary integer programming. On the other hand \citet[Section 3.3]{steorts-2014-SMERED} develop a methodology based on squared error and absolute number of errors loss functions \citep{tancredi-2011} and what they refer to as most probable maximal matching sets. We assess the performance of both methods using conventional precision and recall metrics. Given the ground truth about the linkage structure, there are four possible ways of how predictions about pairs of records can be classified: Correct links (true positives, TP), correct non-links (true negatives, TN), incorrect links (false positives, FP), and incorrect non-links (false negatives, FN). The usual definitions of recall and precision are: $$ \text{Recall}=\frac{\text{TP}}{\text{TP}+\text{FN}},\quad\text{Precision}=\frac{\text{TP}}{\text{TP}+\text{FP}}. $$ Since in practice most of the records are unique, the vast majority of record pairs are classified as TN in most practical RL settings. Hence, we aim to achieve the highest possible recall (true positive rate) while keeping precision (positive predictive value) close to the maximum. Alternatively, the two measures can be combined into a single metric, the $\text{F}_{1}$ score, given by $$ \text{F}_1 = 2\cdot\frac{\text{Precision}\cdot\text{Recall}}{\text{Precision}+\text{Recall}}, $$ which is the harmonic mean of precision and recall. As is the case for recall and precision, the $\text{F}_{1}$ score reaches its best value at 1 and worst at 0. \section{Re-identification example revisited}\label{sec_bartunov_dataset} \begin{figure}[!t] \centering \subfigure[Seed node ID 11209.]{\includegraphics[scale=.27,]{NM2_AUP_uir_11209_WAIC_2.pdf}} \subfigure[Seed node ID 5099.]{\includegraphics[scale=.27,]{NM2_AUP_uir_5099_WAIC_2.pdf}} \caption{\footnotesize{WAIC criteria for selecting the dimension $K$ of the latent space for two users in particular.}} \label{fig_WAIC_uir} \end{figure} In this Section we use the data introduced in Section \ref{sec_bartunov_dataset} to illustrate the ability of our model to match individuals across networks in the presence of network information alone. We fit our model using a logit link and setting $K$ to that value favored by the information criteria discussed in Section \ref{sec_model_selection}. Models are fitted assuming different numbers of anchor nodes, i.e., nodes that are known to match across both networks. All results shown below are based on 10,000 samples obtained after a thinning of 10 iterations and a burn-in period of 10,000 iterations. The clustering methodology proposed by \citet{lau-2007} was used to obtain a point estimate of the posterior linkage structure. First, we analyze in detail two of the 17 pairs of networks. Figure \ref{fig_WAIC_uir} shows the values of the WAIC associated with models of different dimension and fraction of anchor nodes for two seed users (11209 and 5099). We use the optimum value of $K$ pointed out by this criterion every time we fit the model; for instance, a choice of $K=6$ is used for all of our analysis considering user 5099. It is reassuring that the dimension of the latent space is robust to the number of anchors, but it can clearly differ from one dataset to the other. Figure \ref{fig_anchors_plot_WAIC_uir} shows plots of $\text{F}_1$ scores as a function of the anchor nodes fraction. Not surprisingly, Figure \ref{fig_anchors_plot_WAIC_uir} makes clear that it is very difficult to find correct matches just relying on link information with no anchors at all. However, the performance of the procedure improves considerably as more anchors are identified. \begin{figure}[!h] \centering \includegraphics[scale=.27,]{NM2_AUP_uir_11209_results_F_groups_LG.pdf} \caption{\footnotesize{Impact of anchor nodes fraction for our model for two users in particular. Profile information is missing. Values of $K$ selected according to those values favored by the WAIC in Figure \ref{fig_WAIC_uir}. }} \label{fig_anchors_plot_WAIC_uir} \end{figure} Next, we compare our latent model with the approach introduced in \citealp{bartunov-2012} (BARTUNOV for short) on the whole set of 17 pairs of networks. BARTUNOV is a non-symmetric supervised machine learning approach based on conditional random fields built on conditional random fields. Consider graphs $A = (V,E)$ where $V$ denotes the set of vertices (nodes) and $E$ denotes the set of edges. Let $\mu(v)$ be the projection of $v\in A$ to graph $B$. Under this approach observed variables are those nodes (profiles) to be projected in graph $A$, $\mathbf{X}}\def\x{\mathbf{x}}\def\Xv{\boldsymbol{X}}\def\xv{\boldsymbol{x}=\{\x_v = v\mid v\in V\}$, while hidden variables are correct projections of these nodes, $\mathbf{Y}}\def\y{\mathbf{y}}\def\Yv{\boldsymbol{Y}}\def\yv{\boldsymbol{y} = \{\y_v=\mu(v)\mid v\in V\}$. Here, the posterior probability of a projection is $$ p(\mathbf{Y}}\def\y{\mathbf{y}}\def\Yv{\boldsymbol{Y}}\def\yv{\boldsymbol{y}\mid\mathbf{X}}\def\x{\mathbf{x}}\def\Xv{\boldsymbol{X}}\def\xv{\boldsymbol{x}) \propto \ex{-\left(\sum_{v\in V} \Psi(\y_v\mid\x_v) + \sum_{(v,u)\in E} \Omega(\y_v,\y_u) \right)}, $$ where $\Psi$ is an unary energy function (profile distance) and $\Omega$ a binary energy function (network distance). In anonymized settings with no profile attribute information, notice that $\Psi\equiv 0$ and only network information is used. The binary energy function $\Omega$ ranges from 0 to 1 and represents network distance between projections of nodes $v$ and $u$: $$ \Omega(\y_v,\y_u)= \left\{ \begin{array}{ll} \infty, & \hbox{if $\y_v=\y_u$;} \\ 1 - \frac{2\,w(L_v\cap L_u)}{w(L_v) + w(L_u)}, & \hbox{otherwise,} \end{array} \right. $$ where $L_v$ and $L_u$ are sets of neighbors of $v$ and $u$, respectively, and the weighting function is defined as $w(L)=\sum_{v\in L} 1/\log(d(v))$, where $d(v)$ is the degree of node $v$. We refer the reader to Section 3 in \citet{bartunov-2012} for details about training classifiers and computation. We fit both models to each pair of networks assuming different percentages of randomly selected anchors. For our model, we use $K=2$ in order to ease computation, but examine the robustness of the model later. Figure \ref{fig_anchors_plot_uir} shows the average precision, recall, and $\text{F}_1$ score over the 17 datasets. Neither our approach nor BARTUNOV are able to link records when no anchors are provided. When some anchors are fixed, the precision jumps and is practically the same for both alternatives, although our model seems to slightly outperform BARTUNOV. On the other hand, our approach returns a better performance in terms of recall, which means that the latent space model provides more correct links than its competitor. Lower recall values for BARTUNOV might be due to the fact that this approach is not symmetric and does not isolate the anchors from other records, in contrast to our model that automatically does so through the prior specification. Since our model tends to outperform BARTUNOV in terms of both recall and precision, it also does so in terms of $\text{F}_1$ score. \begin{figure}[!h] \centering \subfigure[Recall.]{\includegraphics[scale=.36,]{NM2_results_groups_R_uir.pdf}} \subfigure[Precision.]{\includegraphics[scale=.36,]{NM2_results_groups_P_uir.pdf}} \subfigure[$\text{F}_1$ score.]{\includegraphics[scale=.36,]{NM2_results_groups_F_uir.pdf}} \caption{\footnotesize{Impact of anchor nodes fraction for our latent space model and BARTUNOV. Profile information is missing.}} \label{fig_anchors_plot_uir} \end{figure} To assess the sensitivity of our results with respect to $K$, we fit our model again with both $K=5$ and $K=10$. Figure \ref{fig_anchors_plot_sensitivity_uir} shows a summary of the results for the $\text{F}_1$ score. As anticipated, we see that by fitting our model with higher dimensions, we slightly improve the accuracy of the posterior linkage, especially when the fraction of anchors is low; notice also that in all cases, our approach excels and outperforms BARTUNOV. These results suggest that, at least for this dataset, $K=5$ is a pragmatic choice that allow us to get satisfactory levels of accuracy, and including higher dimensions does not makes a substantial difference. Finally, note also that for both $K=5$ and $K=10$ our model is able to accurately classify some individuals even if no anchors are used. \begin{figure}[hbt!] \centering \includegraphics[scale=.27,]{NM2_results_groups_sensitivity_F_uir.pdf} \caption{\footnotesize{Impact of anchor nodes fraction for our latent space model for $K=2,5,10$ and BARTUNOV. Profile information is missing.}} \label{fig_anchors_plot_sensitivity_uir} \end{figure} \section{Identity resolution example revisited}\label{sec_buccafurri_dataset} In this Section we analyze the data introduced in Section \ref{sec_buccafurri_dataset}. Recall that the main task in this setting is to identify as many accounts corresponding to the same user as possible. Here we illustrate how taking into account network information in such matching process can make a substantial difference. To this end, we fit our model using only profile data (profile model, PM), and also, using both profile and network data (profile and network model, PNM). In this case, \verb"username" is the only profile information available; this attribute is considered as a string-valued field in \eqref{eq_model_RL_part_2}. As before, we use a logit link in \eqref{eq_model_RL_part_1} and set $K$ to that value favored by the information criteria discussed in Section \ref{sec_model_selection}. Results shown below are based on 10,000 samples obtained after a thinning of 10 iterations and a burn-in period of 10,000 iterations. The clustering methodology proposed by \citet{lau-2007} was used to obtain a point estimate of the posterior linkage structure. Table \ref{tab_IC_buccafurri} presents the values of the DIC and WAIC associated with PNM for different dimensions of the latent space. Both criteria favor a choice of $K = 4$; we use such value for all of our analyzes in this Section. \begin{table}[ht] \centering \begin{tabular}{c|ccccccc} \hline $K$ & 2 & 3 & 4 & 5 & 6 & 7 & 8 \\ \hline DIC & 12,805.9 & 12,473.5 & \textbf{12,415.5} & 12,960.9 & 13,911.2 & 14,067.66 & 14,172.0 \\ WAIC & 13,784.2 & 13,168.5 & \textbf{13,113.7} & 13,322.1 & 13,945.6 & 14,080.24 & 14,177.4 \\ \hline \end{tabular} \caption{\label{tab_IC_buccafurri}\footnotesize{ Values of DIC and WAIC for selecting the dimension $K$ of the latent space for our model in the identity resolution example.}} \end{table} Table \ref{tab_results_buccafurri} shows accuracy measures and summary statistics associated with both models. As expected, PNM exhibits higher values of recall and precision, which means that including network information in the analysis improves the accuracy of the posterior linkage. Notice also that PNM provides an estimate of the population size closer to the truth (585 in this case) and even more precise. These findings strongly suggest that combining both sources of information at the cost of incrementing the parameter space is in fact helpful and worth the extra effort. \begin{table}[!h] \centering \begin{tabular}{c|ccccc} \hline Model & Recall & Precision & $\text{F}_1$ & $\expec{N\mid\text{data}}$ & $\sd{N\mid\text{data}}$ \\ \hline PM & 0.26 & 0.62 & 0.37 & 599.67 & 7.94 \\ PNM & 0.52 & 0.71 & 0.60 & 592.06 & 5.74 \\ \hline \end{tabular} \caption{\label{tab_results_buccafurri}\footnotesize{Performance assessment and summary statistics for our model in the identity resolution example. Models using only profile data (profile model, PM), and also, using both profile and network data (profile and network model, PNM) are considered.}} \end{table} \section{Discussion}\label{sec_extensions} We have introduced a novel approach for linking multiple files using both profile and network information. In particular, we have developed relevant aspects of the model including sampling algorithms and point estimates of the overall linkage structure. Our findings suggest that our methodology can produce accurate point estimates of the linkage structure even in the absence of profile information. Our model can be extended in several ways. We could consider distortion probabilities of the form $\psi_{\ell,j}$ depending on both files and fields instead of just fields as in $\psi_\ell$; this modification reflects the fact that different files may be more or less prone to error. Alternatively, in an extra level of refinement, we could also weaken the independence assumption among fields by adding an extra layer of structure to account for dependencies; although as a result the parameter space and the complexity of the model would increase substantially. In addition, we could devise more general priors over the linkage structure that allow us to generate clusters whose sizes grow sublinearly with the size of the data, which is typically the case in RL applications, and also handle RL and de-duplication problems simultaneously. \citet{miller-2015} and \citet{betancourt-2016} have already introduced two alternatives in order to address such micro-clustering requirement. Finally, even though Bayesian methods consider flexible generative models that share power across databases, they mainly rely on MCMC methods, which could potentially turn out to be too slow on big databases. For instance, \citet{zhang-2015} share a dataset with more than 44 million users; the main task is to find as many duplicate users as possible across OSNs as in our identity resolution illustration. Such a dataset makes clear that it is worth considering fast approximation techniques either in the flavor of variational approximations (\citealp{saul-1996}, \citealp{jordan-1998}, \citealp{beal-2003}, \citealp{broderick-2014}) or stochastic gradient dynamics (\citealp{welling-2011}, \citealp{ahn-2012}, \citealp{chen-2014}). \bibliographystyle{apalike}
\section{Introduction} The theory of optimal transportation on Riemannian manifolds has revolutionized Riemannian geometry during the last decade with its characterization of lower bounds on the Ricci curvature in terms of optimal transport and the formulation of synthetic Ricci curvature for metric measure spaces. Einstein's field equations, the central equations of general relativity, are equations for the Ricci curvature of a Lorentzian metric. Thus the prospect of developing generalized notions of spacetimes and solutions to the Einstein field equations readily motivates a theory of optimal transportation in Lorentzian geometry. The works \cite{EcksteinMiller,mccann18,Miller,suhr16} are first steps in this direction, with the work by McCann giving a first characterization of lower Ricci curvatue bounds for globally hyperbolic spacetimes. Optimal transportation in the context of special relativity was proposed in \cite{brenier} and studied in \cite{berpue,BPP,LPZ}. The present theory is formulated for globally hyperbolic Lorentz-Finsler spacetimes. See Section \ref{results} and \cite{besu17} for definitions and properties. The cost function in Lorentz-Finsler geometry is the negative of the time separation, or Lorentzian distance function, for future causally related points and extended by $\infty$ to non-future causally related points. Because of the distance-like character of this cost function the problem is a relativistic version of the original Monge problem. This ensures that optimal couplings of finite cost transport along future pointing causal geodesics. The non-finiteness, non-Lipschitzity and the discontinuity of the cost function at the boundary of $J^+$ cause additional difficulties, though. This article is a continuation of the work \cite{suhr16} by the second author on optimal transportation in Lorentz-Finsler geometry. The first major result, Theorem \ref{thm1}, focuses on the existence of solutions to the dual problem of Lorentzian optimal transportation, also known as the {\it dual Kantorovich problem}, see \cite{villani}. In \cite{suhr16} the second author gave natural conditions on the marginals to obtain optimal couplings and the weak Kantorovich duality. Here the weak Kantorovich duality says that the ``$\inf$-$\sup$-equality'' holds. No statement on the existence of solutions was made, though. The dual problem does in general not admit a solution as Section \ref{1-dim-counterexample} shows. The problem lies on the lightcones. In general only a negligible part of mass is allowed to be transported along lightlike geodesics if a solution is to exist. To circumvent the underlying phenomenon the condition of {\it strict timelikeness} is introduced in Definition \ref{defstricttime}. Theorem \ref{thm1} then shows that dual solutions exists if the marginals satisfy the strict timelikeness condition and at least one marginal has connected support. The conditions are met on a weakly dense subset of pairs of measures by Corollary \ref{cor1}. Theorem \ref{thm1} generalizes results in \cite{berpue,BPP,mccann18}. The condition of strict timelikeness is related to parts of the definition of {\it $q$-separated measures} in \cite{mccann18}. Conversely the existence of a dual solution necessitates that only a negligible part of mass is transported along lightlike geodesics, see Theorem \ref{thm2} the second major result of the present paper. A related result in special relativity is \cite[Theorem C]{BPP}. It should be noted that both the existence and non-existence of dual solutions adapt to the Lorentzian cost with $q\in(0,1)$ as studied in \cite{EcksteinMiller,mccann18}. Indeed, the proof of Theorem \ref{thm1} makes only use of the causality structure. In Example \ref{1-dim-counterexample} and Theorem \ref{thm2} the adjusted upper bound is $-\frac{C}{2} n^{1-\frac{q}{2}}$ and one may replace Lemma \ref{DKP-interpolation} by McCann's result on starshapedness of $q$-separated measures \cite[Proposition 5.5]{mccann18}. An important question for Lorentzian optimal transportation is whether the interpolation measures of an optimal transport are absolutely continuous with respect to the volume measure if at least one marginal is absolutely continuous. Theorem \ref{thm4}, the third major result, shows that intermediate measures are absolutely continuous if one marginal is absolutely continuous and the other marginal is concentrated on an achronal set. This result seems optimal also in the non-relativistic setting, as the non-uniqueness of optimal couplings and interpolation measures usually prevent intermediate measures to be absolutely continuous. However, the optimal couplings constructed from the solution of the relativistic Monge problem can be used to show that there are indeed absolutely continuous intermediate measure though they are non-unique even assuming that transport is along time-affinely parametrized geodesics. We emphasize that the proof of Theorem \ref{thm4} does not rely on the Lipschitz regularity of the transport directions as e.g. in \cite{bebu2}, since Lipschitz regularity is not available, see \cite{suhr16}. We remark that the synthetic proof of existence of optimal transport maps adapts easily to Lorentzian cost functions with $q\in (0,1)$. Indeed, excluding lightlike geodesics one may parametrized geodesics by arclength. Then the non-branching property (Lemma \ref{lem:strong non-branching}) and a weak measure contraction property (Lemma \ref{L1}) or alternatively the $(K,N)$-convexity of the entropy as obtained in \cite{mccann18} are for example sufficient to follow mutatis mutandis the proof of Cavalletti-Huesmann \cite{CH2015NBTrans}. The last major result, Theorem \ref{thm5}, provides a solution to the relativistic Monge problem. It is shown that there exists an optimal transport map between any two causally related measures whenever the first measure is absolutely continuous with respect to any volume form of the differentiable manifold. If the second measure is concentrated on an achronal set this was already proven by the second author, see \cite[Theorem 2.12]{suhr16} which also contains a uniqueness statement. Note, however, the existence proof in this article is independent of \cite{suhr16} and only relies on a non-branching property of time-affinely parametrized geodesics, see Lemma \ref{lem:strong non-branching} below. Uniqueness then follows using \cite[Proposition 3.21]{suhr16} which can be an seen as a stronger non-branching property that is related to the volume form. The article is organized as follows: In Section \ref{results} the setting is introduced and the main results are formulated. In Section \ref{examples} two examples are given. One example shows that not all pairs of measures with an optimal coupling admit a solution to the dual problem. The second example shows that the dual solution does not need to be Lipschitz, i.e. the optimal transport is not bounded away from the lightcones even though there exists a strictly timelike coupling. Finally Section \ref{proofs} contains the proofs of all results. {\it Acknowledgements:} The second author is partially supported by the SFB/TRR 191: Symplectic Structures in Geometry, Algebra and Dynamics. \section{results}\label{results} Let $M$ be a smooth manifold. Throughout the article one fixes a complete Riemannian metric $h$ on $M$, though local changes to the metric will be allowed. Consider a continuous function $\mathbb{L}\colon TM\to \mathbb R$, smooth on $TM\setminus T^0M$ (here $T^0M$ denotes the zero section in $TM$) and positive homogenous of degree $2$ such that the second fiber derivative is non-degenerate with index $\dim M-1$. Let $\mathcal{C}$ be a causal structure of $(M,\mathbb{L})$, see \cite{suhr16}, and define the Lagrangian $L$ on $TM$ by setting $$L(v):=\begin{cases} -\sqrt{\mathbb{L}(v)},& \text{ for }v\in \mathcal{C},\\ \infty,&\text{ otherwise.} \end{cases}$$ The pair $(M,L)$ is referred to as a {\it Lorentz-Finsler manifold}. One calls an absolutely continuous curve $\gamma\colon I\to M$ {\it ($\mathcal{C}$-)causal} if $\dot\gamma\in \mathcal{C}$ for almost all $t\in I$. Note that this condition already implies that the tangent vector is contained in $\mathcal{C}$ whenever it exists. Denote with $J^+(x)$ the set of points $y\in M$ such that there exists a causal curve $\gamma\colon [a,b]\to M$ with $\gamma(a)=x$ and $\gamma(b)=y$. Two points $x$ and $y$ will be called {\it causally related} if $y \in J^+(x)$. Note that this relation is in general asymmetric. Define the set $$J^+:=\{(x,y)\in M\times M|\; y\in J^+(x)\}$$ and $J^-(y):\{x\in M|\; y\in J^+(x)\}$. A Lorentz-Finsler manifold is said to be {\it causal} if it does not admit a closed causal curve, i.e. $J^+\cap \triangle =\emptyset$ for $\triangle:=\{(x,x)|\; x\in M\}$. \begin{definition} A causal Lorentz-Finsler manifold $(M,L)$ is {\it globally hyperbolic} if the sets $J^+(x)\cap J^-(y)$ are compact for all $x,y\in M$. \end{definition} By \cite{besu17} every globally hyperbolic Lorentz-Finsler spacetime admits a diffeomorphism (called a {\it splitting}) $M\cong \mathbb R\times N$ such that the projection $\tau\colon \mathbb R\times N\to \mathbb R$, $(\theta,p)\mapsto \theta$ satisfies $$-d\tau(v) \le \min \{L(v),-|v|\}$$ for all $v\in \mathcal{C}$. In the following one fixes a splitting $\tau$ and refers to it as a {\it time function}. Note that though the proofs below use a particular highly non-unique time function, the existence and uniqueness results do not depend on the choice of such a function. Define the {\it Lagrangian action (relative to $L$)} of a absolutely continuous curve $\gamma\colon [a,b]\to M$: $$\mathcal{A}(\gamma):=\int_a^b L(\dot\gamma)dt \in \mathbb R\cup\{\infty\}$$ Note that $\mathcal{A}(\gamma)\in \mathbb R$ if and only if $\gamma$ is causal. The following result is proven in the same fashion as in the Lorentzian case, see \cite{suhr16}. \begin{prop}\label{P1} Let $(M,L)$ be globally hyperbolic. Then for every pair $(x,y)\in J^+$ there exists a minimizer of $\mathcal{A}$ with finite action connecting the two points. The minimizer $\gamma$ solves the Euler-Lagrange equation of $\mathbb{L}$ up to monotone reparametrization and one has $\dot\gamma\in\mathcal{C}$ everywhere. \end{prop} The Euler-Lagrange equation of $\mathbb{L}$ defines a maximal local flow $$\Phi^\mathbb{L}\colon \mathbb{U}\to TM,$$ where $\mathbb{U}\subset \mathbb R\times TM$ is an open neighborhood of $\{0\}\times (TM\setminus T^0M)$. Note that $\mathcal{C}$ and $\partial \mathcal{C}$ are invariant under $\Phi^\mathbb{L}$. A curve $\gamma\colon I\to M$ is a {\it $\Phi^\mathbb{L}$-orbit} if it solves the Euler-Lagrange equation of $\mathbb{L}$, see \cite{suhr16}. For a globally hyperbolic Lorentz-Finsler manifold $(M,L)$ define the {\it Lorentzian cost function} \begin{align*} c_L\colon M\times M&\to \mathbb R\cup\{\infty\}\\ x,y&\mapsto\min\left\{\left.\mathcal{A}(\gamma)\right|\; \gamma\text{ connects $x$ and $y$}\right\}. \end{align*} It is immediate that $c_L$ is non-positive for causally related points and infinite otherwise. Define $\overline{\tau}\colon M\times M\to \mathbb R$, $(x,y)\mapsto \tau(y)-\tau(x)$. Let $\mathcal{P}_\tau(M\times M)$ be the space of of Borel probability measures $\pi$ on $M\times M$ such that $\overline{\tau}\in L^1(\pi)$. The {\it Lorentzian cost} is the functional $$\mathcal{P}_\tau(M\times M)\to \mathbb R\cup\{\infty\},\; \pi \mapsto \int c_Ld\pi.$$ The minimization problem for the Lorentzian cost is called the {\it Relativistic Monge-Kantorovich problem}: Given two Borel probability measures $\mu_0$ and $\mu_1$ on $M$ find a minimizer of the Lorentzian cost among all Borel probability measures on $M\times M$ with first marginal $\mu_0$ and second marginal $\mu_1$. Any minimizer will be called an {\it optimal coupling} between $\mu_0$ and $\mu_1$. Let $\mathcal{P}(M)$ denote the space of Borel probability measures on $M$. For a splitting $\tau\colon M\to \mathbb R$ define $$\mathcal{P}_\tau^+(M):=\{(\mu_0,\mu_1)|\; \tau\in L^1(\mu_0)\cap L^1(\mu_1)\text{ and $\mu_0$, $\mu_1$ are $J^+$-related}\} $$ where two probability measures are {\it $J^+$-related} (or just {\it causally related}) if there exists a coupling $\pi$ with $\pi(J^+)=1$. Note that if $\pi$ is a coupling of two $J^+$-related probability measures $\mu_0$ and $\mu_1$, then $(\mu_0,\mu_1)\in \mathcal{P}^+_\tau(M)$ if and only if $\pi \in \mathcal{P}_\tau(M\times M)$. A function $\psi\colon M\to \mathbb R\cup\{\infty\}$ with $\psi\not\equiv \infty$ is {\it $c_L$-convex} if there exists a function $\zeta \colon M\to \mathbb R\cup\{\pm\infty\}$ such that $$\psi(x)=\sup\left\{\zeta(y)-c_L(x,y)|\; y\in M\right\}$$ for all $x\in M$. The function \begin{align*} \psi^{c_L}\colon M&\to \mathbb R\cup \{-\infty\}\\ y&\mapsto \inf \left\{ \psi(x)+c_L(x,y)|\; x\in M\right\} \end{align*} is called the {\it $c_L$-transform of $\psi$}. A pair $(x,y)\in M\times M$ belongs to the {\it $c_L$-subdifferential} $\partial_{c_L} \psi$ if $$\psi^{c_L}(y)-\psi (x)=c_L(x,y).$$ \begin{prop}[\cite{suhr16}]\label{P2a} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$. One has $$\inf\left\{\left.\int c_{L}d\pi\right|\pi\text{ is a coupling of $\mu$ and }\nu\right\}= \sup\left\{\int_{M} \phi(y) d\nu(y)-\int_M \psi(x)d\mu(x)\right\}$$ where the supremum is taken over the functions $\psi\in L^1(\mu),\phi\in L^1(\nu)$ with $\phi(y)-\psi(x)\le c_L(x,y)$. \end{prop} Proposition \ref{P2a} shows that the {\it weak Kantorovich duality} holds. \begin{definition} Let $(\mu,\nu)\in \mathcal{}P^+_\tau(M)$. A $c_L$-convex function $$\psi\colon M\to \mathbb R\cup \{\infty\}$$ is a {\it solution to the dual Kantorovich problem (DKP) for $(\mu,\nu)$} if $\psi$ is $\mu$-almost surely finite and $$\psi^{c_L}(y)-\psi(x)=c_L(x,y)$$ $\pi$-almost surely for every optimal coupling $\pi$ of $\mu$ and $\nu$. \end{definition} \begin{definition}[\cite{villani}] A {\it dynamical coupling} of two probability measures $\mu_0$ and $\mu_1$ is a probability measure $\Pi$ on the space of continuous curves $\eta\colon [0,1]\to M$ such that $(\ev_{0})_\sharp\Pi=\mu_{0}$ and $(\ev_{1})_\sharp\Pi=\mu_{1}$. \end{definition} Dynamical couplings in Lorentzian geometry have been studied in \cite{EcksteinMiller,Miller}. \begin{definition}\label{defstricttime} A pair $(\mu,\nu)$ of probability measures is {\it strictly timelike} if there exists a dynamical coupling $\Pi$ supported in the subspace of causal curves such that $(\partial_t\ev)_\sharp (\Pi\times \mathcal{L}|_{[0,1]})$ is locally bounded away from $\partial\mathcal{C}$ where $\partial_t\ev(\gamma,t):= \dot\gamma(t)$. \end{definition} \begin{remark} \begin{itemize} \item[(1)] Recall that every causal curve admits a Lipschitz parameterization. Further the condition of strict timelikeness is convex in the sense that the set of strictly timelike pairs of measures is convex. \item[(2)] The condition of {\it strict timelikeness} generalizes the {\it supercritical speed} for {\it relativistic cost functions} in \cite{berpue,BPP,LPZ}. It is further related to the condition of {\it $q$-separatedness} in \cite{mccann18}. \end{itemize} \end{remark} \begin{theorem}[Existence of dual solutions]\label{thm1} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ be strictly timelike and assume that $\supp \mu$ is connected. Then the DKP for $(\mu,\nu)$ has a solution. More precisely for every optimal coupling $\pi$ there exists a $c_L$-convex function $\psi\colon M\to\mathbb R\cup\{\infty\}$ real-valued on $\supp\mu$ such that $\pi$-almost everywhere $\psi^{c_L}(y)-\psi(x)=c_L(x,y)$, i.e. $\supp\pi \subset \partial_{c_L}\psi$. \end{theorem} The theorem generalizes \cite[Theorem 5.13]{berpue} and \cite[Theorem B]{BPP}. Note that Theorem \ref{thm1} is most likely optimal, as Theorem \ref{thm2} shows that dual solutions cannot exist whenever there are optimal couplings transporting a set of positive measure along $\partial\mathcal{C}$, the boundary of the lightcone. A $1+1$-dimensional example of the non-existence of dual solution is provided in Section \ref{1-dim-counterexample} below. \begin{cor}\label{cor1} Every pair $(\mu_0,\mu_1)\in \mathcal{P}_\tau^+(M)$ can be approximated in the weak topology by a sequence $\{(\mu_0^n,\mu_1^n)\}_{n\in\mathbb N}\subset \mathcal{P}_\tau^+(M)$ such that every pair $(\mu_0^n,\mu_1^n)$ admits a solution to the DKP. \end{cor} \begin{proof}[Proof of Corollary {\ref{cor1}}] Choose a vector field $X\in \Gamma(TM)$ with $L(X)<0$ and $d\tau (X)=1$. Denote with $\phi_t^X$ the flow of $X$. Then $$(\nu_0^n,\nu_1^n):=((\phi_{-t}^X)_\sharp \mu_0,\mu_1)\in \mathcal{P}_\tau^+(M)$$ is strictly timelike for all $n\in\mathbb N$. The measure $\nu_0^n$ can approximated by a measure $o^n$ with connected support and $$\supp \nu_0^n\subset \supp o^n.$$ Now $$(\mu_0^n,\mu_1^n):=\left(\frac{n-1}{n}\nu_0^n+\frac{1}{n}o^n, \frac{n-1}{n}\nu_1^n+\frac{1}{n}(\phi_1^X)_\sharp o^n\right)$$ satisfies the assumptions of Theorem \ref{thm1}. \end{proof} If $c_L(x,y)=0$ then by Proposition \ref{P1} there exists a lightlike $\Phi^\mathbb{L}$-orbit $\eta$, i.e. $L(\dot\eta)\equiv0$, which cannot be parametrized by ``arclength'', i.e. $L(\dot \eta)\equiv 1$. In particular, such lightlike $\Phi^\mathbb{L}$-orbits do not admit a ``preferred affine parametrization'' in any sense. However, using the time function $\tau$ one may reparametrize every causal $\Phi^\mathbb{L}$-orbit as follows: Denote with $\Gamma$ the set of causal minimizers $\gamma\colon [0,1]\to M$ of $\mathcal{A}$ such that $d\tau(\dot\gamma)\equiv \text{const}(\gamma)$. Elements of $\Gamma$ are called {\it time-affinely} parametrized geodesics. For $(x,y)\in J^+$ consider the subspace $$\Gamma_{x\to y}:=\{\gamma\in \Gamma|\; \ev\nolimits_0(\gamma)=x,\; \ev\nolimits_1(\gamma)=y\}$$ where $$\EV\colon \Gamma\times [0,1]\to M,\; (\gamma,t)\mapsto \gamma(t)\text{ and }\ev\nolimits_t:=\ev(.,t).$$ Since $(M,L)$ is assumed to be globally hyperbolic one has $\Gamma_{x\to y} \ne \varnothing$. \begin{definition} A Borel measure $\Pi$ on $\Gamma$ is a {\it dynamical optimal coupling} of $\mu_0:=(\ev_0)_\sharp\Pi$ and $\mu_1:=(\ev_1)_\sharp \Pi$ if $\pi:=(\ev_0,\ev_1)_\sharp \Pi$ is an optimal coupling between $\mu_0$ and $\mu_1$. \end{definition} \begin{prop}[\cite{suhr16}]\label{dynoptcou} Let $(\mu_0,\mu_1)\in \mathcal{P}^+_\tau(M)$. Then there exists a dynamical optimal coupling $\Pi$ for $\mu_0$ and $\mu_1$ with $\supp\Pi\subseteq \Gamma$. \end{prop} In the following all Lebesgue measures are understood to be induced by the Riemannian metric $h$. The assumptions $(i)$ and $(ii)$ of the next theorem are similar and yield the same conclusion. It is not necessarily obvious that Theorem \ref{thm2}$(i)$ is the analogue of the classical solution to the dual Kantorovich problem for real-valued cost functions, see \cite{villani}. The conclusion of Theorem \ref{thm2} under assumption $(ii)$ on the other hand has no counterpart there. \begin{theorem}[Non-existence of dual solutions]\label{thm2} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$. Assume that the supports of both measures are disjoint and that the DKP for $(\mu,\nu)$ admits a solution $\psi\colon M\to\mathbb R\cup\{\infty\}$. Further assume $\mu$ to be either \begin{enumerate} \item[(i)] supported on a spacelike hypersurface $H$ and that it is absolutely continuous with respect to the Lebesgue measure $\mathcal{L}_H$ on $H$ or \item[(ii)]\label{thm3} absolutely continuous with respect to the Lebesgue measure $\mathcal{L}$ on $M$. \end{enumerate} Denote with $\Pi$ a dynamical optimal coupling of $\mu$ and $\nu$ and with $\Gamma_0$ the set of lightlike minimizers in $\Gamma$. Then $\Pi(\Gamma_0)=0$, i.e. only a $\mu$-negligible set of points is transported along lightlike minimizers. \end{theorem} The theorem generalizes \cite[Corollary 3.6]{berpue} and \cite[Theorem C]{BPP}. Note that Theorem \ref{thm2} is proven indirectly and relies on a very similar construction as the $1+1$-dimensional example in Section \ref{1-dim-counterexample}. The following two theorems are the second main result of this article. The first theorem has a counterpart in the work of the second author, see \cite[Theorem 2.13]{suhr16} and the second theorem is a solution to the {\it relativistic Monge problem}: For $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ find a Borel-mesurable map $F\colon M\to M$ such that $\pi:=(\id,F)_\sharp \mu$ is an optimal coupling of $\mu$ and $\nu$. Note that the proofs are independent of \cite[Theorem 2.13]{suhr16} and rely only on a straightforward geometric argument, see \cite[Proposition 3.22]{suhr16}. \begin{definition}\label{defachro} A set $A\subset M$ is {\it achronal} if $c_L|_{A\times A}\ge 0$. In case $c_L|_{A\times A}\equiv \infty$ one says that $A$ is {\it acausal}. \end{definition} It is not difficult to see that any time slice $\{\tau = \tau_0\}$ is acausal. The definition is in accordance with the classical definitions of acausal and achronal sets in Lorentzian geometry. \begin{theorem}[Existence and uniqueness for achronal targets]\label{thm4} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ such that $\mu$ is absolutely continuous with respect to the Lebesgue measure on $M$ and $\nu$ is concentrated on an achronal set. Then there exists a unique dynamical optimal coupling $\Pi$ such that $(\ev_t)_\sharp \Pi$ is absolutely continuous for $t\in[0,1)$ and the optimal couplings $(\ev_t,\ev_1)_\sharp \Pi$ are induced by transport maps. \end{theorem} \begin{remark} Note that the Monge problem is in general highly non-unique even in the non-relativistic setting. In the non-relativistic setting the equivalent to being supported on a time slice would be to assume the second measure is concentrated in a level set of a dual solution to the Monge problem. However, such a condition depends on the first measure. \end{remark} \begin{theorem}[Solution to the relativistic Monge Problem]\label{thm5} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ such that $\mu$ is absolutely continuous with respect to the Lebesgue measure on $M$. Then there exists a Borel-measurable map $F\colon M\to M$ such that $\pi:=(\id,F)_\sharp \mu$ is an optimal coupling of $\mu$ and $\nu$. \end{theorem} \section{Two Examples}\label{examples} \subsection{An example with no dual solution}\label{1-dim-counterexample} Let $M=\mathbb R^2$ and $$\mathbb{L}\colon TM\to \mathbb R,\; (x,v)\mapsto v_1^2-v_2^2$$ with $$\mathcal{C}:=\{(x,v)\in TM|\; v_2\ge |v_1|\},$$ where $v=(v_1,v_2)$. It follows that $c_L$ is the negative Lorentzian distance on the $2$-dimensional Minkowski space. Fix the splitting $$\tau\colon M\to \mathbb R,\; (s,t)\mapsto t.$$ Denote with $i_0,i_1\colon \mathbb R\to M$, the maps $i_0(s):=(s,0)$ and $i_1(s):=(s,1)$, respectively and with $\mathcal{L}_1$ the Lebesgue measure on the real line $\mathbb R$. Consider the transport problem between $$\overline{\mu}:=(i_0)_\sharp(\mathcal{L}_1|_{[0,1]})\text{ and }\overline{\nu}:=(i_1)_\sharp(\mathcal{L}_1|_{[1,2]}).$$ The map $$\overline{T}\colon M\to M,\; (s,t)\mapsto (s+1,t+1)$$ induces a causal coupling $(\id,\overline{T})_\sharp \overline{\mu}$ of $\overline{\mu}$ and $\overline{\nu}$, i.e. $(\overline{\mu},\overline{\nu})\in \mathcal{P}^+_\tau(M)$. \begin{prop}\label{propex} The DKP for $(\overline{\mu}, \overline{\nu})$ does not have a solution. \end{prop} The transport problem for $(\overline{\mu},\overline{\nu})$ is equivalent to the following transport problem on the real line: The restriction of $c_L$ to $$\{((s,0),(t,1))|\; s,t\in \mathbb R\}\subset \mathbb R^2\times \mathbb R^2$$ and the identification $$\{((s,0),(t,1))|\; s,t\in \mathbb R\}\cong \mathbb R\times \mathbb R,\; ((s,0),(t,1))\cong (s,t)$$ yield the cost function $$c\colon \mathbb R\times\mathbb R\to \mathbb R,\; (s,t)\mapsto \begin{cases} -\sqrt{1-(s-t)^2},&\text{ for }|s-t|\le 1\\ \infty,&\text{ for }|s-t|\ge 1\end{cases} $$ and the probability measures $\overline{\mu}$ and $\overline{\nu}$ are identified with $$\mu=\mathcal{L}_1|_{[0,1]}\text{ and }\nu=\mathcal{L}_1|_{[1,2]},$$ respectively. \begin{lemma}\label{lemmaex1} If $\pi$ is a coupling of $\mu$ and $\nu$ with finite $c$-cost, then $$\pi= (\id,T)_\sharp \mu,$$ where $T\colon \mathbb R\to \mathbb R$, $s\mapsto s+1$. \end{lemma} \begin{proof} Let $\pi$ be a coupling of $\mu$ and $\nu$ with finite cost. For every $\e>0$ one has $$\mu([0,\e])=\nu([1,1+\e])=\nu([-1,1+\e]).$$ The support of $\pi$ is contained in $\{(s,t)|\;|s-t|\le 1\}$ since it has finite cost. Therefore $$\mu([0,\e])=\pi([0,\e]\times \mathbb R)=\pi([0,\e]\times[1,1+\e]).$$ By complementary reasoning one concludes that $$\pi([\e,1]\times \mathbb R)=\pi([\e,1]\times[1+\e,2]).$$ An induction over $n$ then implies that the support of $\pi$ is contained in $$\bigcup_{k=0}^{2^n}\left([k\cdot 2^{-n},(k+1)\cdot2^{-n}]\times [1+k\cdot2^{-n},1+(k+1)\cdot2^{-n}]\right)$$ for every $n\in \mathbb N$. The claim follows in the limit for $n\to\infty$. \end{proof} \begin{lemma}\label{lemmadots} Let $[a,b]\subset \mathbb R$, $\e>0$ and a Borel measurable set $B\subset [a,b]$ be given with $\mathcal{L}_1(B)\ge \e(b-a)$. Then for all $n\in\mathbb N$ there exists $\{t_i\}_{1\le i\le n}\subset B$ with $t_1<\ldots <t_n$ and $t_{i+1}-t_i\ge \frac{\e}{2n}(b-a)$. \end{lemma} \begin{proof} Let $n\in\mathbb N$ be given. Consider the function $t\mapsto \mathcal{L}_1(B\cap [a,t])$ and choose $t_1\in B$ such that $$\mathcal{L}_1(B\cap [a,t_1])\in\left(0,\frac{\e}{2n}(b-a)\right).$$ Then one has $$\mathcal{L}_1\left(B\cap \left[a,t_1+\frac{\e}{2n}(b-a)\right)\right)\le \frac{\e}{n}(b-a).$$ Next consider the function $$t\mapsto \mathcal{L}_1\left(B\cap \left[t_1+\frac{\e}{2n}(b-a),t\right]\right),\text{ for }t>t_1+\frac{\e}{2n}(b-a).$$ Choose $t_2\in B$ such that $$\mathcal{L}_1\left(B\cap \left[t_1+\frac{\e}{2n}(b-a),t_2\right]\right)\in \left(0,\frac{\e}{2n}(b-a)\right).$$ Then one has $$\mathcal{L}_1\left(B\cap \left[a,t_2+\frac{\e}{2n}(b-a)\right]\right)\le 2\frac{\e}{n}(b-a)=2\frac{\e}{n}(b-a).$$ Continue inductively. For $k<n$ one has $$\mathcal{L}_1\left(\left[a,t_k+\frac{\e}{2n}(b-a)\right]\right)\le k\frac{\e}{n}(b-a)=\frac{k}{n}\e(b-a)\le \frac{n-1}{n}\e(b-a).$$ Thus one concludes $t_k+\frac{\e}{2n}(b-a)<b$ for all $k<n$. This shows that the construction does not terminate before $n$ points have been chosen. The claimed properties are clear from the construction. \end{proof} \begin{lemma}\label{lemmaex2} There does not exists a $c$-convex function $\psi\colon \mathbb R\to \mathbb R\cup\{\infty\}$ with $\psi|_{[0,1]}\not \equiv \infty$ and $\psi^c(y)-\psi(x)=c(x,y)$ for $\pi$-almost all $(x,y)\in \mathbb R\times \mathbb R$, where $\pi$ is the coupling in Lemma \ref{lemmaex1}. \end{lemma} The existence of a solution to the dual problem is independent of an additive constant in the definition of the cost function, i.e. for $c':=c+1$ the pair $(\phi',\psi')$ solves the DKP for $c'$ iff $(\phi',\psi-1)$ solves the DKP for $c$. \begin{proof} Let $(\phi,\psi)$ be a solution to the DKP for $(\mu,\nu)$, i.e. $c(x,y)\ge \phi(x)+\psi(y)$ and $$\int c\, d\pi' =\int \phi\, d\mu +\int \psi\, d\nu= \int (\phi +\psi)\, d\pi'.$$ Thus one has $c=\phi+\psi$ $\pi'$-almost surely. Let $s<t\in [0,1]$. By Lemma \ref{lemmadots} for every $n\in\mathbb N$ there exist $s\le t_1<\ldots t_n\le t$ with $t_{k+1}-t_k\ge \frac{t-s}{2n}$ and $\phi(t_k)+\psi(t_k+1)=0$. Thus one has $$c\left(t_{k+1},1+t_k\right)\le c\left(0,1-\frac{1}{2n}(t-s)\right)\le -\sqrt{\frac{1}{2n}(t-s)}.$$ As in \cite[page 61]{villani} it follows that \begin{align*} \psi(s)&\le \psi(t)+\sum_{k=1}^{n} c\left(t_{k+1},1+t_k\right)\\ &\le \psi(t)-n\sqrt{\frac{1}{2n}(t-s)}=\psi(t)-\sqrt{\frac{n(t-s)}{2}} \end{align*} for all $n$. Therefore $\psi(s)=-\infty$ for all $s<1$. But this contradicts the definition of $\psi$. \end{proof} \begin{proof}[Proof of Proposition \ref{propex}] The claim follows directly from Lemma \ref{lemmaex2} by reversing the identification $$\{((s,0),(t,1))|\; s,t\in\mathbb R\}\cong \mathbb R\times\mathbb R.$$ \end{proof} \subsection{An example with non-Lipschitz dual solution} An example is given of a strictly timelike pair $(\mu,\nu)$ for which the optimal coupling is not bounded away from $\partial J^+$. This counters the intuition that the optimal coupling of strictly timelike pairs is supported away from $\partial J^+$. Let $0<\e<\frac 1 2$. Choose a function $\bar f\in C^{0,\frac{1}{2}}([0,5])\cap C^\infty ([0,5]\setminus \{2\})$ with \begin{itemize} \item[(1)] $\bar f\equiv 1+\e$ on $[0,1]$, \item[(2)] $\bar f(x)> -c_L((x,0),(1,1))$ for $x\in [1,2)$, \item[(3)] $\bar f(2)=0$ \item[(4)] $\bar f(x)> c_L((3,0),(x,1))$ for $x\in (2,3]$, \item[(5)] $\bar{f}'<0$ near $2$. \item[(6)] $\bar f\equiv \e-1$ on $[3,4]$ \end{itemize} that induces a $\frac{1}{2}$-H\"older continuous function $f$ on $\mathbb R/5\mathbb Z$, smooth except at $[2]\in \mathbb R/5\mathbb Z$. Now consider $\mathbb R/5\mathbb Z\times \mathbb R$ with the inner product $$(\mathbb{L}=)g:=d\theta^2 -dt^2$$ for $(\theta,t)\in \mathbb R/5\mathbb Z\times\mathbb R$ where $$\mathcal{C}:=\{v|\; g(v,v)\le 0,\; dt(v)\ge 0\}.$$ The cost function $c_L$ for the pair $(g,\mathcal{C})$ is $$c_L((\eta,s),(\theta,t))=\begin{cases}-\sqrt{(t-s)^2-(\theta-\eta)^2},&\; s\le t,\; t-s\ge \theta-\eta\\ \infty,&\text{ else.} \end{cases}$$ Define $$\phi\colon \mathbb R/5\mathbb Z\times \mathbb R \to \mathbb R\cup\{\infty\},\; \phi(y):= \inf \{f(\theta)+c_L((\theta,0),y)|\; \theta\in \mathbb R/5\mathbb Z\}.$$ \begin{lemma} One has $$\phi^{c_L}(y)= \inf\nolimits_x\{\phi(x)+c_L(x,y)\}\equiv \phi(y)$$ for all $y\in \mathbb R/5\mathbb Z\times \mathbb R$. It follows that $\phi$ is $c_L$-concave. \end{lemma} \begin{proof} Indeed first since $c_L(x,x)=0$ one has $$\phi^{c_L}(y)=\inf\nolimits_x \{\phi(x)+c_L(x,y)\}\le \phi(y)$$ for all $y$. Fix $y\in \mathbb R/5\mathbb Z\times \mathbb R$ and choose $z\in \mathbb R/5\mathbb Z\times \mathbb R$ with $\phi^{c_L}(y)=\phi(z)+c_L(z,y)$. For $z$ choose $\theta\in \mathbb R/5\mathbb Z$ with $\phi(z)=f(\theta)+c_L((\theta,0),z)$. Then one has $$\phi(y)\le f(\theta)+c_L((\theta,0),y)\le f(\theta) +c_L((\theta,0),z)+c_L(z,y)=\phi(z)+c_L(z,y)=\phi^{c_L}(y)$$ by the triangle inequality for $c_L$. Thus one has $$\phi(y)=\inf\nolimits_x\{\phi(x)+c_L(x,y)\}=\phi^{c_L}(y)$$ for all $y$. \end{proof} As usual define $$\partial_c \phi :=\{(x,y)|\; \phi(y)-\phi(x)=c_L(x,y)\}\subseteq (\mathbb R/5\mathbb Z\times\mathbb R)\times (\mathbb R/5\mathbb Z\times\mathbb R)$$ and $\partial_c\phi_{x}:=p_2(\partial_c\phi \cap (\{x\}\times (\mathbb R/5\mathbb Z\times\mathbb R)))$. Note that for all $(\theta',t)$ with $t\ge 0$ there exists $\theta \in \mathbb R/5\mathbb Z$ with $(\theta',t)\in \partial_c\phi_{(\theta,0)}$ since $c_L$ is continuous on its domain. \begin{lemma} For $\theta\neq [2]$ and $y\in \partial_c \phi_{(\theta,0)}$ with $t(y)>0$ one has $y\in I^+(\theta,0)$. Further for every $(\theta,t)\in\mathbb R/5\mathbb Z\times [0,1]$ with $\theta\neq [2]$ the set $\partial_c\phi_{(\theta,0)}\cap \mathbb R/5\mathbb Z\times\{t\}$ has exactly one element. \end{lemma} \begin{proof} Indeed $y\in \partial_c \phi_{(\theta,0)}$ implies $$\inf\nolimits_{\eta} \{f(\eta)+c_L((\eta,0),y)\}=\phi(y)=f(\theta)+c_L((\theta,0),y),$$ i.e. the function $\eta\mapsto f(\eta)+c_L((\eta,0),y)$ has a minimum in $\theta$. If $c_L((\theta,0),y)=0$ then $\eta\mapsto c_L((\eta,0),y)$ falls off to one side of $\theta\neq [2]$ faster than $f$ can rise by construction. Therefore in this case $\theta$ cannot be a minimum. Thus it follows that $c_L((\theta,0),y)<0$, i.e. $y\in I^+((\theta,0))$. Now fix $\theta\neq [2]$ and $t\in [0,1]$. Then the equation $$\frac{\partial}{\partial\theta}f(\theta)+ \frac{\partial}{\partial\theta} c_L((\theta,0),(\theta',t))=0$$ has exactly one solution $\theta'$. Since by the previous paragraph the points in $\partial_c\phi_{(\theta,0)}$ are characterized as solutions to this equation, the second part of the claim follows. \end{proof} \begin{lemma}\label{L10} For every neighborhood $U$ of $\partial J^+$ and every $t\in (0,1]$, the $1$-dimensional Lebesgue measure of $$\{\theta\in\mathbb R/5\mathbb Z\setminus\{[2]\}|\;((\theta,0),y_{(\theta,t)})\in U\}$$ is positive, where $y_{(\theta,t)}$ denotes the unique point in $\partial_c\phi_{(\theta,0)}\cap \mathbb R/5\mathbb Z\times\{t\}$. \end{lemma} \begin{proof} The Lebesgue measure of points $\theta$ such that $-f'(\theta)\ge C$ is bounded from below by the Lebesgue measure of the set of points with $\frac{\partial}{\partial\theta} c_L((\theta,0),(1,1))\ge C$ for $C$ sufficiently large by the assumptions (2) and (3) above. The last set has positive Lebesgue measure for every $C<\infty$. For every neighborhood $U$ of $\partial J^+$ there exists $C_U<\infty$ such that $\left|\frac{\partial}{\partial\theta} c_L((\theta,0),y)\right|\ge C_U$ for all $((\theta,0),y)\in U$. Now $y=y_{(\theta,t)}$ is the unique solution to the equation $\frac{\partial}{\partial\theta}f(\theta)+ \frac{\partial}{\partial\theta} c_L((\theta,0),y)=0$ with $t(y)=t$, and the claim follows. \end{proof} \begin{lemma}\label{L11} There exists $\delta=\delta(t)>0$ such that $\dist((\theta -t,t),\partial_c \phi_{(\theta,0)})\ge \delta$ for all $\theta\neq [2]$. \end{lemma} \begin{proof} For $\theta\neq [2]$ let $(\theta_t,t)\in \partial_c \phi_{(\theta,0)}$. By the Lemma \ref{L10} one has that $$\eta\mapsto c_L((\eta,0),(\theta_t,t))$$ is smooth at $\theta$ and $$\frac{\partial}{\partial\theta}f(\theta)+ \frac{\partial}{\partial\theta} c_L((\theta,0),(\theta_t,t))=0\Leftrightarrow\frac{\partial}{\partial\theta} c_L((\theta,0),(\theta_t,t)) =-\frac{\partial}{\partial\theta}f(\theta).$$ Since $\frac{\partial}{\partial\theta}f(\theta)$ is bounded outside every neighborhood of $[2]\in \mathbb R/5\mathbb Z$, the existence of $\delta$ follows there. By the assumption $\frac{\partial}{\partial\theta}f<0$ on a neighborhood of $[2]$ the bound follows in fact for all $\theta\neq [2]$ since $\frac{\partial}{\partial\theta} c_L((\theta,0),(\theta',t)) \to -\infty$ for $\theta'\downarrow \theta -t$. \end{proof} Now consider the probability measure $\mu:= I_\sharp \mathcal{L}'$ where $$I\colon \mathbb R/5\mathbb Z\hookrightarrow \mathbb R/5\mathbb Z\times\mathbb R,\; \theta\mapsto (\theta, 0).$$ and $\mathcal{L}'$ is the normalized Lebesgue measure on $\mathbb R/5\mathbb Z$. The following result is a reformulation of \cite[Proposition 3]{bebu1} adapted to the present situation. \begin{props}[\cite{bebu1}] Let $\phi$ be a $c_L$-convex function, and let $\mu$ be a probability measure on $M$. Then there exists a probability measure $\nu$ on $M$ such that $\phi$ solves the DKP for $(\mu,\nu)$. \end{props} By the proposition there exists a probability measure $\nu$ supported on $\mathbb R/5\mathbb Z\times \{1\}$ such that $\phi$ is optimal for the pair $(\mu,\nu)$. By Lemma \ref{L10} the transport is not bounded away from $\partial J^+$. Now a rotation of $\mathbb R/5\mathbb Z$ in the negative direction leaves $\mu$ unchanged, but the coupling induced by $\phi$ is twisted into a coupling whose support has positive distance from $\partial J^+$ by Lemma \ref{L11}. Thus the pair $(\mu,\nu)$ is strictly timelike. \section{Proofs}\label{proofs} \subsection{Proof of Theorem \ref{thm1}} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ be strictly timelike. Further let $\pi$ be an optimal coupling of $\mu$ and $\nu$. Note that $\pi$ is causal since its cost is finite. Fix $(x_0,y_0)\in \supp \pi$. Define \begin{align*} \psi\colon J^-(\supp\nu)&\to\mathbb R\cup\{\pm\infty\},\\ x&\mapsto\sup\left\{\sum_{i=0}^k [c_L(x'_i,y'_i)-c_L(x'_{i+1},y'_i)]\right\} \end{align*} where the supremum is taken over all $k\in \mathbb N$ and all sequences $$\{(x'_i,y'_i)\}_{0\le i\le k+1}\subset\supp \pi\text{ with }x'_{k+1}=x\text{ and }(x'_0,y'_0)=(x_0,y_0).$$ One has $\psi(x_0)\ge c_L(x_0,y_0)-c_L(x_0,y_0)=0$. At the same time the right hand side of the above definition is nonpositive for $x=x_0$ by cyclic monotonicity, see \cite[Proposition 2.7]{suhr16}. Therefore one has $\psi(x_0)=0$. Next one shows that $\psi$ is real-valued and measurable on $\supp \mu$. Fix $(u,w)\in \supp\pi$. Consider for $k\in \mathbb N$ chains $\{(u_i,w_i)\}_{0\le i\le k}\subseteq \supp \pi$ with $u_{i+1}\in J^-(w_i)\cap \supp\mu$ for $0\le i\le k-1$ where $(u_0,w_0)=(u,w)$. Define $$A:=\{w_k|\; \{(u_i,w_i)\}_{0\le i\le k}\text{ as just defined}\}.$$ The claim is that $$p_2(p_1^{-1}(J^-(A))\cap \supp\pi)=A,$$ where $p_1,p_2\colon M\times M\to M$ are the canonical projections onto the first and second factor respectively. It is easy to see that $A$ is contained in $p_2(p_1^{-1}(J^-(A))\cap \supp\pi)$. More precisely let $y\in A$. Choose $(x,y)\in\supp\pi$. Then $x\in J^-(y)\subset J^-(A)$ since $\pi$ is causal, i.e. $y\in p_2(p_1^{-1}(J^-(A))\cap \supp\pi)$. For the opposite inclusion consider $y\in p_2(p_1^{-1}(J^-(A))\cap \supp\pi)$. Then there exists $x\in M$ with $(x,y)\in p_1^{-1}(J^-(A))\cap \supp\pi$, i.e. $(x,y)\in \supp\pi$ and $x\in J^-(A)$. So there exists a chain $$\{(u_i,w_i)\}_{0\le i\le k}\subset \supp\pi$$ with $u_{i+1}\in J^-(w_i)\cap \supp\mu$ for $0\le i\le k-1$, $(u_0,w_0)=(u,w)$ and $x\in J^-(w_k)$. Now define a new chain $$\{(u_i,w_i)\}_{0\le i\le k+1}\subset\supp\pi$$ identical with the original chain for $i\le k$ and $$(u_{k+1},w_{k+1}):=(x,y).$$ Since $(x,y)\in \supp\pi$ this shows that $y\in A$. By the marginal property one has $$\mu(J^-(A))= \pi(p_1^{-1}(J^-(A))\cap \supp\pi)$$ and $$\nu(A)=\pi(p_2^{-1}(A))=\pi(p_2^{-1}(p_2(p_1^{-1}(J^-(A))\cap \supp\pi)))$$ by the above characterization of $A$. Since $B\subset p_2^{-1}(p_2(B))$ for any set $B\subset M\times M$ one knows that $\nu(A)\ge \mu(J^-(A))$. With the inclusion $\supp \pi \subseteq J^+$ one has on the other hand $\nu(A)\le \mu(J^-(A))$, i.e. $\nu(A)= \mu(J^-(A))$. Consequently every causal coupling $\pi'$ of $(\mu,\nu)$ has to couple $J^-(A)$ with $A$, especially the coupling guaranteed by the definition of strict timelikeness. But that means $J^-(A)\cap \supp\mu$ is locally uniformly bounded away from $\partial J^-(A)$. Since $J^-(A)\cap \supp\mu$ is nonempty and open it has to be equal to $\supp\mu$ since $\supp\mu$ is connected. This implies $A=\supp\nu$ by the construction of $A$. Now let $x\in \supp\mu$ be given. Choose $y\in\supp\nu$ with $(x,y)\in\supp \pi$. The above argument for the set $A$ with $(u_0,w_0)=(x,y)$ yields that there exists a finite chain $\{(u_i,w_i)\}_{0\le i\le k+1}\subset \supp\pi$ with $c_L(u_{i+1},w_i)<\infty$ and $(u_{k+1},w_{k+1})=(x_0,y_0)$. By definition of $\psi$ one has $$\psi(x)+ \sum_{i=0}^k [c_L(u_i,w_i)-c_L(u_{i+1},w_i)]\le \psi(x_0)=0.$$ Since $$\sum_{i=0}^k [c_L(u_i,w_i)-c_L(u_{i+1},w_i)]>-\infty$$ one obtains $\psi(x)<\infty$. Next consider the construction of $A$ with $(u_0,w_0)=(x_0,y_0)$. Then there exists a finite chain $\{(u'_i,w'_i)\}_{0\le i\le k+1}\subset \supp\pi$ with $c_L(u'_{i+1},w'_i)<\infty$ and $(u'_{k+1},w'_{k+1})=(x,y)$. This time one has $$\psi(x_0)+ \sum_{i=0}^k [c_L(u'_i,w'_i)-c_L(u'_{i+1},w'_i)]\le \psi(x)$$ and it follows $\psi(x)>-\infty$. Since $c_L$ is continuous and real-valued on $J^+$, one concludes that $\psi$ is measurable. Define $\zeta\colon \supp\nu\to \mathbb R\cup\{-\infty\}$, \begin{align*} \zeta(y):=\sup \left\{\sum_{i=0}^k[c_L(x'_i,y'_i)-c_L(x'_{i+1},y'_i)] +c_L(x'_{k+1},y)\right\}, \end{align*} where the supremum is taken over all $k\in\mathbb N$ and sequences $$\{(x'_i,y'_i)\}_{0\le i\le k+1}\in\supp\pi\text{ with }y'_{k+1}=y\text{ and }(x'_0,y'_0)=(x_0,y_0).$$ Then one has $\psi(x)=\sup_y \{\zeta(y)-c_L(x,y)\}$, i.e. $\psi$ is $c_L$-convex. It follows, like in step 3 of the proof of \cite[Theorem 5.10 (i)]{villani} that $$\psi^{c_L}(y)-\psi(x) =c_L(x,y)$$ for $\pi$-almost all $(x,y)\in M\times M$. This finishes the proof of Theorem \ref{thm1}. \subsection{Proof of Theorem \ref{thm2}(i)} Let $\Pi$ be a dynamical optimal coupling between $\mu$ and $\nu$ and $\psi\colon M\to \mathbb R\cup\{\infty\}$ be a solution to the DKP for $(\mu,\nu)$. The proof is carried out via contradiction, i.e. one assumes that $$\Pi(\Gamma_0)>0$$ or equivalently $\Pi|_{\Gamma_0}\neq 0$. One has $(\ev_0)_\sharp\Pi|_{\Gamma_0}\le \mu$ and therefore $$(\ev\nolimits_0)_\sharp\Pi|_{\Gamma_0}\ll \mathcal{L}_H.$$ The goal is to find a set $V$ with positive measure relative to $\mu$ such that $\psi|_V\equiv -\infty$, i.e. contradicting the definition of a solution to the DKP for $(\mu,\nu)$. Since the problem is local one can assume that $\supp\mu$ and $\supp\nu$ are compact. The Borel measurable map $\Gamma\to TM$, $\gamma\mapsto \dot\gamma(0)$ induces a measure on $\partial\mathcal{C}$ via the push forward of $\Pi|_{\Gamma_0}$. Since $\mu$ and $\nu$ have disjoint compact support there exists a lower bound $\e_0>0$ on the distance between points in the supports. In order to illuminate the construction one can, by diminishing $\e_0$ and considering an intermediate transport, assume that \begin{itemize} \item[(1)] there exists a submanifold chart $U\to \mathbb R^m$ of $H\cong \mathbb R^{m-1}\times \{0\}$ such that $\partial_m\in \inte \mathcal{C}$ everywhere and $$\supp\mu\cup\supp\nu \subset B_{3\e_0}(0)\subset \mathbb R^m\cong U,$$ \item[(2)] the Riemannian metric is induced by the euclidian metric on a convex neighborhood of $\supp\mu\cup\supp\nu$ and \item[(3)] $\exp^\mathbb{L}$ is a diffeomorphism from an open set in $T\mathbb R^m$ onto $B_{1}(0)\times B_{1}(0)$. \end{itemize} In order to justify these assumptions one has to show that the intermediate transport has a solution to the DKP for the transported measures. \begin{lemma}\label{DKP-interpolation} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ such that the DKP for $(\mu,\nu)$ has a solution and let $\Pi$ be a dynamical optimal coupling of $\mu$ and $\nu$. Further let $\sigma_1,\sigma_2\colon \Gamma\to [0,1]$ be measurable with $\sigma_1\le\sigma_2$. Then there exists a solution of the DKP for the intermediate transport between $(\ev\circ\sigma_1)_\sharp \Pi$ and $(\ev\circ\sigma_2)_\sharp \Pi$. \end{lemma} \begin{proof} (i) First consider the special case $\sigma_1\equiv 0$. The assertion then claims that for $\sigma\colon \Gamma\to [0,1]$ the DKP has a solution for the martingales $\mu$ and $\nu_\sigma:=(\ev\circ\sigma)_\sharp \Pi$. Set $\pi:=(\ev_0,\ev_1)_\sharp \Pi$ and let $\psi\colon M\to \mathbb R\cup \{\infty\}$ be a solution of the DKP, i.e. $\psi|_{\supp\mu} \not\equiv \infty$ and \begin{equation}\label{E0} \psi^{c_L}(y)-\psi(x)=c_L(x,y),\text{ $\pi$-almost everywhere.} \end{equation} Choose a set $\Sigma\subset \supp \pi$ of full $\pi$-measure where \eqref{E0} is satisfied. Then $\Pi$ is concentrated on $\Sigma_\Gamma :=(\ev_0,\ev_1)^{-1}(\Sigma)$. By definition of $\psi^{c_L}$ one has $$\psi^{c_L}(y)-\psi(x)\le c_L(x,y),\text{ for all }x,y\in M.$$ Assume that there exists $\gamma\in \Sigma_\Gamma$ and $t\in [0,1]$ such that $$\psi^{c_L}(\gamma(t))-\psi(\gamma(0))< c_L(\gamma(0),\gamma(t)).$$ Then there exists $x\in M$ with $$\psi(x)+c_L(x,\gamma(t))<\psi(\gamma(0))+c_L(\gamma(0),\gamma(t))$$ by the definition of the $c_L$-transform $\psi^{c_L}$. Adding $c_L(\gamma(t),\gamma(1))$ to both sides and applying the triangle inequality, which is an equality on the right hand side, one obtains $$\psi^{c_L}(\gamma(1))\le \psi(x)+c_L(x,\gamma(1))<\psi(\gamma(0))+c_L(\gamma(0),\gamma(1)),$$ which implies $$\psi^{c_L}(\gamma(1))-\psi(\gamma(0))< c_L(\gamma(0),\gamma(1)),$$ a contradiction. Therefore one has $$\psi^{c_L}(\gamma(t))-\psi(\gamma(0))= c_L(\gamma(0),\gamma(t))$$ for all $\gamma\in \Sigma_\Gamma$ and the lemma in the special case $\sigma_1\equiv 0$ is proved. (ii) Second consider the case $\sigma_1\equiv 0$. By definition $\psi^{c_L}$ is a $c_L$-concave function and since $\psi$ is $c_L$-convex one has, cf. \cite{villani}, $$\psi(x)=\sup\{\psi^{c_L}(y)-c_L(x,y)|\; y\in M\}=(\psi^{c_L})^{c_L}(x)$$ for all $x\in M$. This implies that the transport problem between $\mu$ and $\nu$ has a solution of the DKP if and only if there exists a $c_L$-concave function $\phi\colon M\to \mathbb R\cup\{-\infty\}$ with $$\phi(y)-\phi^{c_L}(x)=c_L(x,y),\text{ $\pi$-almost everywhere}$$ for all optimal coupling $\pi$ of $\mu$ and $\nu$. With an analogous argument as in case (i) one obtains $$\phi(\gamma(1))-\phi^{c_L}(\gamma(t))=c_L(\gamma(t),\gamma(1))$$ for all $\gamma\in \Sigma_\Gamma$ and $t\in [0,1]$ with the notation of the special case. Setting $\phi=\psi^{c_L}$ yields the assertion. (iii) To complete the proof consider the succession of first the intermediate transport between $\sigma_1'\equiv 0$ and $\sigma_2'\equiv \sigma$ and second the intermediate transport between $\sigma_1''\equiv \sigma_1$ and $\sigma_2''\equiv 1$. \end{proof} For $v\in T\mathbb R^m\cong TU$ denote with $v_H$ the projection of $v$ along $\partial_m$ onto span$\{\partial_1,\ldots,\partial_{m-1}\}$. Further let $\gamma_v$ be the unique $\Phi$-orbit with $\dot\gamma_v(0)=v$ for $v\in \mathcal{C}$. \begin{lemma} For $\e_0>0$ sufficiently small there exists $C_0<\infty$ and $\phi_0>0$ such that for all $v\in \partial\mathcal{C}\cap T^1B_{3\e_0}(0)$ and $t>0$ such that $$\dist(\gamma_v(0),\gamma_v(t))\in [\e_0,6\e_0]$$ the intersection $$P_{v,t}:= \partial J^-(\gamma_v(t))\cap (\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\})$$ is a smooth hypersurface in $\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\}$ with \begin{itemize} \item[(a)] the norm of the second fundamental form bounded by $C_0$ and \item[(b)] $\angle(v_H,TP_{v,t})>\phi_0$. \end{itemize} \end{lemma} \begin{proof} Consider for $\e>0$ the map $$r_\e\colon B_1(0)\to B_\e(0),\; x\mapsto \e x.$$ The Lagrangians $\mathbb{L}_\e:= \frac{1}{\e^2}r_\e^*\mathbb{L}$ converge uniformly to $\mathbb{L}_0:=\mathbb{L}(0)$ on every compact subset of $TB_1(0)$ for $\e\to 0$ in every $C^k$-topology. The Euler-Lagrange flow of $\mathbb{L}_\e$ then converges uniformly on compact subsets in every $C^k$-topology to the Euler-Lagrange flow of $\mathbb{L}_0$. Note that the Euler-Lagrange equation for $\mathbb{L}_0$ is $\ddot x=0$. Thus one has $\exp_x^{\mathbb{L}_0}(\mathcal{C}_0)=x+\mathcal{C}_0$ and therefore the assertion (a) and (b) hold for $\mathbb{L}_0$. Since the Riemannian metric $h$ is euclidian on $B_1(0)$ one has $\frac{1}{\e^2}r_\e^*h=h$. This together with the fact that $$\exp^{\mathbb{L}_\e}_x(V_{\e,x}\cap \partial\mathcal{C}_{\e,x})=\partial J^+_\e(x)\subset B_1(0)$$ for some neighborhood $V_{\e,x}$ of $0_x$ in $T_x B_1(0)$ one obtains the lemma for $\e>0$ sufficiently small. \end{proof} Statement $(\mathrm{b})$ is equivalent to requiring $$\angle (v_H,N_{v,t})\le \frac{\pi}{2}-\phi_0$$ where $\angle(v,w)$ denotes the euclidian angle between $v$ and $w$ and $N_{v,t}$ denotes the inward pointing unit normal to $P_{v,t}$. Property (a) implies that for $\e_1:=\frac{1}{\sqrt{C_0}}>0$ one has $$B_{\e_1}(\gamma_v(0)+\e_1N_{v,t})\cap (\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\}) \subset J^-(\gamma_v(t))\cap (\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\}).$$ This and (b) then imply that $$\{\gamma_v(0)\}+\text{Cone}\left(v,\frac{\phi_0}{2},\e_2\right)\subset J^-(\gamma_v(t))\cap (\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\})$$ where $$\text{Cone}(v,\phi,\e):=\{w\in \mathbb R^{m-1}\times\{0\}|\angle(v_H,w)<\phi, |w|<\e\}$$ and $$\e_2:=2\e_1\sin\frac{\phi_0}{2}.$$ Now for $p\in B_{3\e_0}(0)$, $v\in \partial \mathcal{C}_p$, $q\in \{p\}-\text{Cone}(v,\frac{\phi_0}{4},\e_2)$ and $w\in \partial \mathcal{C}_q$ with $\angle(w_H,v_H)<\frac{\phi_0}{4}$ one has $$B_{\dist(p,q)\sin\frac{\phi_0}{4}}(p)\cap (\{\gamma_v(0)\}+\mathbb R^{m-1}\times \{0\})\subset J^-(\gamma_w(t))$$ for $\dist(q,\gamma_w(t))\in [\e_0,3\e_0]$. Abbreviate $$A:=\supp [(\ev\nolimits_0)_\sharp(\Pi|_{\Gamma_0})].$$ Define a map $$T\colon \supp (\Pi|_{\Gamma_0})\to S^{m-2},\; \gamma \mapsto \dot\gamma(0)_H.$$ Since $(\pi_{TM}\circ T)_\sharp \Pi|_{\Gamma_0}=\mu|_A$ and $\mu(A)\neq 0$ one has $$T_\sharp (\Pi|_{\Gamma_0})\neq 0$$ where $\pi_{TM}\colon TM\to M$ denotes the canonical projection. Choose $v_0\in S^{m-2}$ such that $$T_\sharp (\Pi|_{\Gamma_0})(B_{\frac{\phi_0}{4}}(v_0))>0.$$ Then $A':= \pi_{TM}(B_{\frac{\phi_0}{4}}(v_0))$ has positive measure with respect to $\mathcal{L}_H$, since $\mu|_A\ll \mathcal{L}_H$ . Let $p$ be a Lebesgue point of $A'$, i.e. $$\lim\nolimits_{\delta\downarrow 0}\frac{\mathcal{L}_H(A'\cap B_\delta(p))}{\mathcal{L}_H(B_\delta(p))}=1.$$ Then there exist $\e_3,\e_4>0$ such that for the unique $v\in\partial\mathcal{C}$ with $v_H=v_0$ $$\mathcal{L}_H\left(A'\cap B_{2\e_3}(p)\setminus B_{\e_3}(p)\cap \left(\{p\}-\text{Cone}\left(v,\frac{\phi_0}{4},\e_2\right)\right)\right)\ge \e_4.$$ Choose polar coordinates $(r,\theta_1,\ldots ,\theta_{m-2})$ on $B_{2\e_3}(p))\subset \mathbb R^{m-1}\times \{0\}$ centered at $p$. By Fubini's Theorem there exists $(\eta_1,\ldots ,\eta_{m-2})$ such that $$\int_{\e_3}^{2\e_3} \chi_{A'}(r,\eta_1,\ldots ,\eta_{m-2}) rdr\ge \e_4.$$ Thus the $1$-dimensional Lebesgue measure $$\mathcal{L}_1(A'\cap \{r\in(\e_3,2\e_3),\theta_1=\eta_1, \ldots ,\theta_{m-2}=\eta_{m-2}\})\ge \frac{\e_4}{2\e_3}.$$ Recall Lemma \ref{lemmadots}: \begin{lem} Let $[a,b]\subset \mathbb R$, $\e>0$ and $B\subset [a,b]$ Borel measurable be given with $\mathcal{L}_1(B)\ge \e(b-a)$. Then for all $n\in\mathbb N$ there exists $\{t_i\}_{1\le i\le n}\subset B$ with $t_1<\ldots <t_n$ and $t_{i+1}-t_i\ge \frac{\e}{2n}$. \end{lem} Applying Lemma \ref{lemmadots} to $$B:=A'\cap \{r\in(\e_3,2\e_3),\theta_1=\eta_1, \ldots ,\theta_{m-2}=\eta_{m-2}\}$$ yields for every $n\in\mathbb N$ points $$x_1,\ldots x_n\in A'\cap \{r\in(\e_3,2\e_3),\theta_1=\eta_1, \ldots ,\theta_{m-2}=\eta_{m-2}\}$$ and $y_1,\dots,y_n\in M$ such that $(x_i,y_i)\in\supp \pi$ for the optimal coupling $\pi$ induced by $\Pi$, $x_{i+1}\in J^-(y_i)$, $\dist(x_i,x_{i+1})\ge \frac{\e_4}{4n\e_3}$ and $B_{\e_3\sin \frac{\phi_0}{4}}(p)\subset J^-(y_n)$. Using the exponential map of $\mathbb{L}$ one sees that there exists $C>0$ such that $c_L(x_{i+1},y_i)\le -\frac{C}{\sqrt{n}}$. Then one has for every point $x'\in B_{\e_3\sin \frac{\phi_0}{4}}(p)$ $$\psi(x')\le \psi(x_1)+\sum c_L(x_{i+1},y_i)\le \psi(x_1)-(n-1)\frac{C}{\sqrt{n}}\le \psi(x_1)-\frac{C}{2}\sqrt{n}$$ for all $n\in \mathbb N$ where $\psi$ denotes the solution to the DKP for $(\mu,\nu)$. Thus $$\psi|_{B_{\e_3\sin \frac{\phi_0}{4}}(p)}\equiv -\infty$$ therefore contradicting that $\psi$ is $c_L$-convex. \subsection{Proof of Theorem \ref{thm3}(ii)} One can prove Theorem \ref{thm3}(ii) in the same fashion as Theorem \ref{thm2}(i), but for the sake of avoiding repetition Theorem \ref{thm3}(ii) is reduced to Theorem \ref{thm2}(i). Let $f_\mu\in L^1(\mathcal{L})$ be the density of $\mu$ with respect to the Lebesgue measure $\mathcal{L}$ on $M$. If $\Pi(\Gamma_0)>0$ there exists a chart $U\to \mathbb R^m$ of $M$ such that $U$ is foliated by spacelike hypersurfaces $\{H_s=\mathbb R^{m-1}\times\{s\}\}_{s\in\mathbb R}$ and $(\ev_0)_\sharp \Pi|_{\Gamma_0}(U)>0$. By \cite[Corollary 3.5]{suhr16} one can then assume that $\supp\mu$ is contained in $U$. By Fubini's Theorem the restriction of $f_\mu$ to $H_s$ is integrable with respect to the Lebesgue measure $\mathcal{L}_{m-1}$ on $\mathbb R^{m-1}$ for almost all $s\in\mathbb R$. For $(x_m)_\sharp\mu$-almost all $s\in \mathbb R$ one has $$m_s:= \int_{H_s}f_\mu d\mathcal{L}_{m-1} >0$$ where $x_m$ denotes the $m$-th coordinate function on $\mathbb R^m$. For $s$ with $m_s\in (0,\infty)$ define $\mu_s$ by $$\mu_s(A):=\frac{1}{m_s}\int_{A\cap H_s} f_\mu d\mathcal{L}_{m-1}.$$ Note that $\mu_s$ is a probability measure on $H_s$. Consider the disintegration $\{\Pi_s\}_{s\in\mathbb R}$ of $\Pi$ along $X_m:=x_m\circ \ev_0\colon \Gamma\to\mathbb R$. Then one has $(\ev_0)_\sharp \Pi_s=\mu_s$ for $\mu_m$-almost all $s$. This can be seen as follows: Obviously one has $(X_m)_\sharp \Pi=\mu_m$ since $(\ev_0)_\sharp \Pi= \mu$. It follows that for all Borel measurable $B\subset M$ one has: \begin{align*} &\int_\mathbb R (\ev\nolimits_0)_\sharp \Pi_s(B)d\mu_m=\int_\mathbb R \Pi_s(\ev_0\nolimits^{-1}(B))d\mu_m\\ &=\int_\mathbb R \Pi_s(\ev_0\nolimits^{-1}(B))d(X_m)_\sharp \Pi=\Pi(\ev_0\nolimits^{-1}(B))=\mu(B) \end{align*} Thus one has $$\mu(.)=\int_\mathbb R (\ev\nolimits_0)_\sharp \Pi_s(.)d\mu_m$$ and the claim follows from the uniqueness part of the Disintegration Theorem. Finally define $\nu_s:=(\ev_1)_\sharp \Pi_s$. \begin{lemma} $\Pi_s$ is an optimal dynamical coupling of $\mu_s$ and $\nu_s$ for $\mu_m:=(x_m)_\sharp\mu$-almost all $s\in\mathbb R$. Further $\psi$ solves the DKP for $(\mu_s,\nu_s)$ for $\mu_m$-almost all $s$. \end{lemma} \begin{proof} The first assertion follows from the second since the pair $(\psi,\psi^{c_L})$ is admissible (see Section \ref{results}). Define $\pi_s:=(\ev_0,\ev_1)_\sharp \Pi_s$. Assume that $\psi$ does not solve the DKP for $(\mu_s,\nu_s)$ for $s$ in a set $B\subset \mathbb R$ of positive $\mu_m$-measure, i.e. $$\int_{M\times M} c_L(x,y)d\pi_s >\int_M \psi^{c_L}(y)d\nu_s -\int_M \psi(x) d\mu_s$$ for all $s\in B$. Then for some $\delta>0$ one has $$\int_{M\times M} c_L(x,y)d\pi_s -\delta>\int_M \psi^{c_L}(y)d\nu_s -\int_M \psi(x) d\mu_s$$ for $s$ in a smaller but $\mu_m$-non-negligible set $B_\delta\subset \mathbb R$. This implies that $$\int_{M\times M}c_L(x,y) d\pi -\delta \int_{B_\delta}m_s d\mu_m> \int_M \psi^{c_L}(y)d\nu -\int_M \psi(x) d\mu$$ since $c_L(x,y)\ge \psi^{c_L}(y)-\psi(x)$ for all $(x,y)$. Note that $\int_{A_\e} m_sd\mu_m>0$ since $B_\delta$ is $\mu_m$-non-negligible. This contradicts the assumption that $\psi$ is a solution to the dual problem for $(\mu,\nu)$ since $\pi$ is minimal. \end{proof} Theorem \ref{thm2}(i) then yields that for almost all $s\in \mathbb R$ one has $\Pi_s(\Gamma_0)=0$. Since $$\Pi(\Gamma_0)=\int_\mathbb R m_s\Pi_s(\Gamma_0) ds$$ the claim follows. The last equation follows from the respective statement about $\mu_s$, i.e. $$\mu(A)=\int_\mathbb R m_s \mu_s(A)ds$$ for all measurable $A\subset \mathbb R^m$. \subsection{Proof of Theorem \ref{thm4}} The proof of Theorem \ref{thm4} relies on ideas of \cite{CH2015NBTrans}, see also \cite{Gigli2012,CM2016TransMapsMCP,kell17}. Note, however, there is no unique equivalent to the assumption of achronality resp. acausality of the support of the second measure. Indeed, the Monge problem is in general highly non-unique. However, the proof in the non-relativistic as well as the relativistic setting relies essentially on the following two properties: Geodesics with endpoints in a given set are non-branching (Lemma \ref{lem:strong non-branching}) and that there is a weak form of the measure contraction property (Lemma \ref{L1}). The latter holds due to differentiability of the time function and the exponential map. For the proof it suffices to consider the case that both $\supp\mu$ and $\supp\nu$ are compact and disjoint. This follows from the observation that absolute continuity is equivalent to absolute continuity on every compact subset. Recall that $$\Phi^\mathbb{L}\colon \mathbb{U}\subset \mathbb R\times TM\to TM$$ denotes the Euler-Lagrange flow of $\mathbb{L}$. Set $$\{1\}\times \mathbb{V}:=(\{1\}\times TM)\cap \mathbb{U}.$$ By \cite[Proposition 3.14]{suhr16} the map $$\exp^\mathbb{L}\colon\mathbb{V}\to M\times M, \; v\mapsto (\pi_{TM}(v),\pi_{TM}\circ \Phi^\mathbb{L}(1,v))$$ is a $C^1$-diffeomorphism of a neighborhood of the zero section onto its image and smooth outside $T^0M$. Here $$\pi_{TM}\colon TM\to M$$ denotes the canonical projection. Set $$\exp_x\colon \mathbb{V}\cap TM_x\to M,\; v\mapsto \pi_{TM}\circ \Phi^{\mathbb{L}}(1,v).$$ Further since $\partial_t (\pi_{TM}\circ \Phi^\mathbb{L}(t,v))=\Phi^\mathbb{L}(t,v)$ and $\Phi^\mathbb{L}(1,tv)=\Phi^\mathbb{L}(t,v)$ one has \begin{equation}\label{E2} d(\exp_x)_0= \partial_v (\pi_{TM}\circ \Phi^\mathbb{L}(1,v))|_{v=0} =\id\nolimits_{TM} \end{equation} via the canonical identification $TM_x\cong T(TM_x)_0$. \begin{prop}\label{P1a} Let $v\in \mathcal{C}_p:=\mathcal{C}\cap TM_p$ such that $$d(\exp_p)_v\colon T(TM_p)_v\to TM_{\exp_p^\mathbb{L}(v)}$$ is singular. Then for every $T>1$ the geodesic $$\eta_v\colon [0,T]\to M,\; t\mapsto \exp_p(tv)$$ is not $\mathcal{A}$-minimizing between its endpoints. \end{prop} \begin{proof} In the case of $v\in \inte\mathcal{C}$ the claim follows mutatis mutandis as in \cite[Proposition 7.4.1.]{bcc}, since $C^1$-small variations of timelike curves remain timelike. The case $v\in \partial\mathcal{C}$ is the subject of \cite[Proposition 6.8]{aj}. Note that the definition of Lorentz-Finsler metrics therein is equivalent to the presently used by virtue of \cite{minguzzi16}. \end{proof} \begin{cor}\label{C1a} Let $K\subset M$ be compact. Consider the set $\mathcal{K}$ of $\mathcal{A}$-minimal causal $\mathbb{L}$-geodesics $\eta\colon [0,1]\to M$, i.e. $\eta(t)= \exp_{\eta(0)}(t\dot\eta(0))$ and $\mathcal{A}(\eta)=c_L(\eta(0),\eta(1))$, with $\eta(0),\eta(1)\in K$. Then there exists a continuous function $e\colon (0,1)\to \mathbb R_{>0}$ with $$\|d(\exp_{\eta(0)})_{t\dot\eta(0)}^{-1}\|\le e(t)$$ for all $\eta\in \mathcal{K}$ and $t\in [0,1)$. Further one has $\lim_{t\to 0}e(t)=1$. \end{cor} \begin{proof} For a single $\mathcal{A}$-minimal geodesic $\eta\colon [0,1]\to M$ the claim follows directly from Proposition \ref{P1a}. Further by \eqref{E2} one has $e(t)\to 1$ for $t\to 0$. Since $K$ is compact the corollary follows from the continuity of the differential of the exponential map. \end{proof} For $v\in \mathcal{C}$ consider the unique time affinely parameterized local $\mathcal{A}$-minimizer $\gamma_v\colon \mathbb R\to M$ with $\dot\gamma_v(0)=v$. According to \cite[Section 3.5]{suhr16} $\gamma_v$ is an orbit of a flow on $\mathcal{C}\setminus T^0M$. Define the map $$\exp^\tau \colon \mathcal{C}\to M, \; v\mapsto \gamma_v(1).$$ Denote with $\exp^\tau_p$ the restriction of $\exp^\tau$ to $\mathcal{C}\cap TM_p$. The map satisfies $\exp^\tau(tv)=\gamma_v(t)$ which implies \begin{equation}\label{E2a} d(\exp^\tau_p)_v\to \id\nolimits_{TM_p} \end{equation} for $v\to 0$ and \begin{equation}\label{E2b} d(\exp^\tau_p)_v(v)=\dot\gamma_v(1). \end{equation} Further by \cite[Proposition 3.5]{suhr16} there exists a smooth map $$s\colon \mathcal{C}\setminus T^0M\to [0,\infty)$$ such that $\exp^\tau(v)=\exp(s(v)v)$ for all $v\in \mathcal{C}\setminus T^0M$. One has \begin{equation}\label{E2c} d(\exp^\tau_p)_v=d(\exp_p)_{s(v)v}(ds_v\otimes v+s(v)\cdot \id\nolimits_{TM_p}). \end{equation} The following lemma is at the heart of the proof of Theorem \ref{thm4}. It is an easy consequence of differentiability of the time function $\tau$ and the exponential map. \begin{lemma}[weak measure contraction property]\label{L1} Let $K\subset M$ be compact. Then there exists a function $f\colon(0,1)\to(0,1)$ with $\lim_{t\to 0} f(t)=1$ such that for all $y\in K$ and all measurable $A\subset K\cap J^-(y)$ it holds \[ \mathcal{L}(A_{t,y})\ge f(t)\mathcal{L}(A) \] where $A_{t,y}=\{ev_{t}\gamma\,|\,\gamma\in(ev_{0},ev_{1})^{-1}(A\times\{y\})\}$. \end{lemma} \begin{proof} From \eqref{E2b} and \eqref{E2c} follows that $d(\exp^\tau_p)_v$ is singular if and only if $d(\exp_p)_v$ is singular. By Corollary \ref{C1a} and continuity of both $d\exp^\tau_p$ and $d\exp_p$ there exists a function $e^\tau \colon (0,1)\to \mathbb R_{>0}$ with \begin{equation}\label{E2d} \|d(\exp^\tau_{\gamma(0)})_{t\dot\gamma(0)}^{-1}\|\le e^\tau(t) \end{equation} for any $\gamma\in (\ev_0,\ev_1)^{-1}(K\times \{y\})$. Now consider $$T_{K,y}:=\{v\in \mathcal{C}|\; \exists \gamma \in (\ev\nolimits_0,\ev\nolimits_1)^{-1}(K\times \{y\})\text{ with }\dot\gamma(0)=v\}.$$ It follows that $$A_{t,y}=\exp^\tau(t(T_{K,y}\cap (\pi_{TM})^{-1}(A))).$$ By equation \eqref{E2d} there exists a function $f\colon (0,1)\to (0,1)$ independent of $A$ with \[ \mathcal{L}(A_{t,y})\ge f(t)\mathcal{L}(A) \] for all $t\in (0,1)$. With property \eqref{E2a} one concludes $f(t)\to 1$ for $t\to 0$. \end{proof} For the following proposition observe that due to the fact that geodesics $\gamma$ with $(\tau\circ\gamma)'\equiv\mathsf{const}$ are uniquely defined by their initial velocity one knows that the image of such a geodesic is a one-dimensional rectifiable curve. In particular, it has zero measure with respect to the Lebesgue measure $\mathcal{L}$ on $M$. This implies that for distinct points $x,y\in M$ the set \begin{align*} B_{x,y} := \{z\in J^-(y)\cap J^-(x) \,|\, &c_L(z,y)=c_L(z,x)+c_L(x,y)\,\\ &\textbf{or }\,c_L(z,x)=c_L(z,y)+c_L(y,x)\} \end{align*} has vanishing $\mathcal{L}$-measure. In particular, $$\mathcal{L}(A_{t,x} \cap A_{t,y})=0$$ for $x\neq y$. Note that if $x$ and $y$ are not causally related then $A_{t,x} \cap A_{t,y} = \varnothing$. A more general statement of this form was obtained by the second author in \cite{suhr16}. \begin{lemma}\label{L20} Let $B$ be a closed achronal set. Then the set \[ \bigcup_{x\ne y \in B} B_{x,y} \] has vanishing $\mathcal{L}$-measure. \end{lemma} \begin{proof} For $z\in \cup_{x\neq y\in B} B_{x,y}$ there exist $x,y\in B$ with $z\in B_{x,y}$. Especially one has $c_L(z,x),c_L(z,y)<\infty$. By the definition of $B_{x,y}$ one concludes that $c_L(x,y)<\infty$ or $c_L(y,x)<\infty$. Now let $\Gamma_B\subset \Gamma$ be the subspace of minimizers which intersect $B$ at least twice. By \cite[Proposition 3.22]{suhr16} the set $$\bigcup_{\gamma\in \Gamma_B} \gamma(\mathbb R)\cap\{\tau=r\}$$ has vanishing Lebesgue measure in $\{\tau=r\}$ for all $r\in\mathbb R$. Thus $$\bigcup_{\gamma\in \Gamma_B} \gamma(\mathbb R)$$ has vanishing Lebesgue measure in $M$. Since $$\bigcup_{x\ne y \in B} B_{x,y}\subset \bigcup_{\gamma\in \Gamma_B} \gamma(\mathbb R)$$ the claim follows. \end{proof} For a map $\sigma:\Gamma\to[0,1]$ and a geodesic $\gamma \in \Gamma$ one writes $\gamma_\sigma = \gamma(\sigma(\gamma))$. Let $S \subset \Gamma$ be a subset of the space of minimizing geodesics. Then for $s,t\in[0,1]$ one defines $$S_{t,s} := (\ev\nolimits_s,\ev\nolimits_t)(S)\subset M\times M,$$ $S_t := \ev_t(S)$ and $S_\sigma:=\{\gamma_\sigma\}_{\gamma\in S}\subset M$. \begin{lemma}\label{lem:strong non-branching} Let $S\subset \Gamma$ be such that $S_{0,1}$ is $c_L$-cyclically monotone. If $S_1$ is achronal then for all Borel-measurable maps $\sigma:S \to (0,1)$ one has $$\mathcal{L}(S^{(1)}_\sigma \cap S^{(2)}_\sigma)=0$$ for all Borel-measurable $S^{(1)},S^{(2)}\subset S$ with $S^{(1)}_1 \cap S^{(2)}_1 = \varnothing$. \end{lemma} \begin{remark} If $S_1$ is additionally acausal, e.g. $S_1$ is contained in a time-slice $\{\tau=\tau_0\}$, then one even has $S^{1}_\sigma \cap S^{2}_\sigma = \varnothing$. \end{remark} \begin{proof} Let $z \in S^{1}_\sigma \cap S^{2}_\sigma$. Then there exist $\gamma_1 \in S^{(1)}$ and $\gamma_2 \in S^{(2)}$ such that $$c_L(x_i,y_i)=c_L(x_i,z)+c_L(z,y_i)$$ for $i=1,2$, $x_i:=\gamma_i(0)$ and $y_i:=\gamma_i(1)$. Since $S_{0,1}$ is $c_L$-cyclically monotone one has \begin{align*} c_{L}(x_{1},y_{1})+c_{L}(x_{2},y_{2}) & \le c_{L}(x_{2},y_{1})+c_{L}(x_{1},y_{2})\\ & \le(c_{L}(x_{2},z)+c_{L}(z,y_{1}))+(c_{L}(x_{1},z)+c_{L}(z,y_{2}))\\ & =c_{L}(x_{1},y_{1})+c_{L}(x_{2},y_{2}). \end{align*} This shows that there is a minimizing geodesic connecting $x_1$ with $y_2$ and passing through $z$. As geodesics are locally unique, either $y_1$ is on the geodesic connecting $z$ and $y_2$ or $y_2$ is on the geodesic connecting $z$ and $y_1$. Thus $z \in B_{y_1,y_2}$ with $y_1 \ne y_2$. In particular, $$S^{1}_\sigma \cap S^{2}_\sigma \subset \bigcup_{y\ne y' \in S_1} B_{y,y'}.$$ Since $S_1$ is achronal it follows that $$\mathcal{L}(S^{1}_\sigma \cap S^{2}_\sigma)=0$$ by Lemma \ref{L20}. \end{proof} Now one combines Lemma \ref{lem:strong non-branching} with the weak measure contraction property to obtain the following. \begin{prop}\label{P2} Assume that $$A\times\{y,z\}\subset\operatorname{supp}\mu\times\operatorname{supp}\nu$$ is $c_{L}$-cyclically monotone for an achronal two-point set $\{y, z\}$ and some measurable set $A$. Then $A$ has vanishing Lebesgue measure. \end{prop} \begin{proof} By inner regularity of $\mathcal{L}$ one may assume $A$ is compact so that for a fixed $\epsilon>0$ and $t$ sufficiently close to $0$ it holds \[ A_{t,y}\cup A_{t,z}\subset A_{\epsilon} \] where $A_{\epsilon}$ is the $\epsilon$-neighborhood of $A$ with respect to the distance $dist$. Lemma \ref{lem:strong non-branching} implies that \[ \mathcal{L}(A_{t,y}\cap A_{t,z})=0\quad\text{for all }t\in[0,1). \] Then the weak measure contraction property yields \begin{align*} \mathcal{L}(A) & =\lim_{\epsilon\to0}\mathcal{L}(A_{\epsilon})\\ & \ge\limsup_{t\to0}\mathcal{L}(A_{t,y}\cup A_{t,z})\\ & =\limsup_{t\to0}\mathcal{L}(A_{t,y})+\mathcal{L}(A_{t,z})\\ & \ge2\limsup_{t\to0}f(t)\mathcal{L}(A)=2\mathcal{L}(A) \end{align*} which can hold only if $A$ has zero measure. \end{proof} Lemma \ref{lem:strong non-branching} can be used to prove an interpolation inequality in form of the weak measure contraction property between any absolutely continuous measure and a causally related achronal discrete measure. In order to prove such an interpolation inequality for general achronal target measures one needs to approximate the target measures via finite measures which satisfy the achronality assumption. As such an approximation seems difficult, one proceeds in two steps: As measures supported in a time slice can be easily approximated one first proves the interpolation inequality for those measures. In a second step one uses this fact together with the strong non-branching property implied by Lemma \ref{lem:strong non-branching} to approximate general achronal target measures. Given a subset $C\subset M\times M$ and $s,t\in (0,1)$ define \[ C_{s,t}=\{(\ev\nolimits_s\gamma,\ev\nolimits_{t}\gamma)\,|\,\gamma\in(ev_{0},ev_{1})^{-1}(C)\} \] and $C_t=p_1(C_{t,t})$. \begin{lemma}\label{lem:finite-approximation} Assume $\pi$ is an optimal coupling with compact support between an absolutely continuous measure $\mu$ and a measure $\nu$ with support in a time-slice $\{\tau = \tau_0\}$. Then there is a sequence $\nu_n = \sum_{i=1}^{N_n}\lambda^n_i \delta_{x_i^n}$ such that $\operatorname{supp}\nu_n \subset \{\tau=\tau_0\}$ and the optimal couplings $\pi_n$ of $(\mu,\nu_n)$ converge weakly to an optimal coupling $\pi'$ of $(\mu,\nu)$. \end{lemma} \begin{proof} Let $X\in\Gamma(TM)$ be a vector field with $L(X)<0$ and $d\tau(X)=1$ everywhere and denote with $\phi_t$ the flow of $X$. The coupling $$\pi_\e':=(\id,\phi_\e)_\sharp \pi$$ is supported in $\{c_L<0\}$. Recall that by \cite[Proposition 3.10]{suhr16} there exists a Borel map $S\colon J^+\to C^0([0,1],M)$ with $S(x,y)\in \Gamma_{x\to y}$. The push forward $\Pi_\e':=S_\sharp \pi_\e'$ is then a dynamical coupling. Consider the subset $\Gamma_{t_0}\subset \Gamma$ of minimizers $\gamma$ with $\tau\circ \gamma(0)\le t_0$ and $\tau\circ \gamma(1)\ge t_0+\e$. The maps $$T_0\colon \Gamma_{t_0}\to [0,1],\; \gamma\mapsto T_0(\gamma)$$ such that $\tau(\gamma(T_0(\gamma)))=t_0$ and $$R\colon \Gamma_{t_0}\to \Gamma_{t_0},\; \gamma\mapsto [t\mapsto \gamma(T_0(\gamma)t)]$$ are continuous. Define $$\Pi_\e:=R_\sharp (\Pi_\e')\text{ and }\pi_\e:=(\ev\nolimits_0,\ev\nolimits_1)_\sharp \Pi_\e.$$ It then follows that $\supp \pi_\e \subset \{c_L<0\}$ and $\supp (p_2)_\sharp \pi_\e\subset \{\tau=\tau_0\}$. Furthermore, the Prokhorov distance between $\nu_\epsilon:=(p_2)_\sharp \pi_\epsilon$ and $\nu$ tends to zero for $\e\to 0$. Observe that for any approximation by finite measures $(\nu_{n,\epsilon})$ of $\nu_\epsilon$ the $C_L$-cost between $\mu$ and $\nu_{n,\epsilon}$ is eventually finite and the distance between $\nu$ and $\nu_n$ is eventually less than $2\epsilon$. One may also assume that $(\nu_{n,\epsilon})$ has support in $\{\tau=\tau_0\}$. Denote by $\pi_{n,\epsilon}$ the $c_L$-optimal coupling of $(\mu,\nu_{n,\epsilon})$. Then $$\liminf_{n\to\infty}\int c_{L}d\pi_{n,\epsilon}\le\int c_{L}d\pi_{\epsilon}.$$ To conclude just observe that for a diagonal sequence $\pi_{(k)}=\pi_{n_k,\frac{1}{k}}$ one has $\pi_{(k)}\rightharpoonup \tilde{\pi}$ satisfying $$\int c_L d\tilde\pi \le \liminf_{k\to\infty} \int c_L d\pi_{(k)} \le \int c_L d\pi.$$ Since $\pi$ is optimal the $\tilde\pi$ must be optimal as well. \end{proof} \begin{remark} If an optimal coupling $\pi$ is supported in the interior of $J^+$ then it is possible to obtain an approximation $\pi_n$ with finite target measures which have support in $\operatorname{supp}\left((p_2)_\sharp \pi\right)$. Thus it follows that it is possible to keep the target approximation $\nu_n$ in a fixed achronal set $B$. Note, however, such an approximation for purely lightlike optimal couplings is not always possible. It even seems difficult to prove Lemma \ref{lem:finite-approximation} under the assumption that $\supp\nu$ is achronal. \end{remark} \begin{prop}\label{P3} Let $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ with $\mu$ being absolutely continuous and $\operatorname{supp}\nu \subset \{\tau=\tau_0\}$. Then there is an optimal coupling $\pi$ of $(\mu,\nu)$ such that for all $c_L$-cyclically monotone sets $C\subset \operatorname{supp} \pi$ with $\pi(C)=1$ it holds \[ \mathcal{L}(C_{t})\ge f(t)\mathcal{L}(C_{0}). \] \end{prop} \begin{proof} First note if $\nu$ is a finite measure then the support $C=\operatorname{supp}\pi$ of any $c_L$-cyclically monotone coupling $\pi$ satisfies the assumption. Indeed, the set of points $x \in C_0$ such that $(x,y),(x,y')\in C$ for distinct $y,y'\in C_1$ has zero $\mathcal{L}$-measure, i.e. $\mathcal{L}(A^i_{t,y_i} \cap A^j_{t,y_j})=0$ for $i\ne j$ and $t\in [0,1)$ where $\{y_i\}_{i=1}^n=C_1$ and $A^i = p_1((p_2)^{-1}(y_i))$. Observe now \begin{align*} \mathcal{L}(C_{t}) =\sum_{i=1}^{n}\mathcal{L}(A_{t,y_{i}}^{i})\ge\sum_{i=1}^{n}f(t)\mathcal{L}(A^{i})=\mathcal{L}(C_{0}) \end{align*} For more general $\nu$ let $\pi$ be the weak limit of a sequence $\pi_n$ with $(p_2)_\sharp \pi_n$ finite as given by Lemma \ref{lem:finite-approximation}. Note by restricting the first marginal of $\pi_n$ slightly one can assume that the support of $\pi_n$ converges in the Hausdorff metric to the support of $\pi$. Note that since $\pi_n$ converges weakly to $\pi$ one must have $\mu(C^{n}_0)\to 1$ where $C^{n}=\operatorname{supp}\pi_n$. If $C=\operatorname{supp}\pi$ is $c_L$-cyclically monotone then for all $\epsilon>0$ and for sufficiently large $n\in\mathbb N$ it holds $(C^{(n)}_t) \subset (C_t)_\epsilon$. Since $C_t$ is compact and $C^{(n)}_0 = C_0$ one obtains \begin{align*} \mathcal{L}(C_{t}) & = \lim_{\epsilon\to 0} \mathcal{L}((C_t)_\epsilon) \\ & = \limsup_{n\to \infty} \mathcal{L}(C^{(n)}_t) \\ & \ge \limsup_{n\to \infty} f(t)\mathcal{L}(C^{(n)_t}) \\ & = f(t) \mathcal{L}(C_0). \end{align*} If the support of $\pi$ is not $c_L$-cyclically monotone, one may find a $c_L$-cyclically monotone subset $C\subset \operatorname{supp}\pi$ of full $\pi$-measure and compact sets $C^{k}\subset C$ such that $\pi(C^{k})\to \pi(C)$ and $\mathcal{L}(C^{k}_0) \to \mathcal{L}(C_0)$. Denote by $\pi_k$ the coupling obtained by restricting $\pi$ to $C^{k}$ and renormalizing. Note that each $\pi_k$ is supported in $C^{k}$ and is given as a weak limit of an appropriate restriction of the approximating sequence $\pi_n$. In particular, one sees that the claim of the proposition holds for $C^{k}$ so that one concludes with the following chain of inequalities \begin{align*} \mathcal{L}(C_{t}) & \ge\limsup_{k\to\infty}\mathcal{L}(C_{t}^{k})\\ & \ge\limsup_{k\to\infty}f(t)\mathcal{L}(C_{0}^{k})=f(t)\mathcal{L}(C_{0}). \end{align*} \end{proof} Combining the results above one obtains the existence and uniqueness of optimal transport maps if the target is supported in a time-slice. \begin{prop}\label{P20} Between any absolutely continuous probability measure $\mu$ and any probability measure $\nu$ supported in a time-slice $\{\tau=\tau_0\}$ such that $(\mu,\nu)\in \mathcal{P}^+_\tau(M)$ there exists a unique $c_L$-optimal coupling $\pi$ and this coupling is induced by a transport map. \end{prop} \begin{proof} Let $\pi$ be an optimal coupling for $(\mu,\nu)$ and choose a $c_L$-cyclically monotone measurable set $C \subset \operatorname{supp}\pi$ of full $\pi$-measure. We claim $\pi$ is induced by a transport map. Note that this implies that $\pi$ is unique. Suppose the statement was wrong. Then the Selection Dichotomy in \cite[Theorem 2.3]{kell17} gives couplings $\pi_1,\pi_2\ll \pi$ which are supported on disjoint sets $K\times A_1$ and $K\times A_2 $ and their first marginals are equal to $\mu_K = \frac{1}{\mu(K)}\mu\big|_K$, where $K\subset M$ is compact. Since $\mu$ is absolutely continuous one can additionally assume $\mu_K$ and $\mathcal{L}\big|_K$ are mutually absolutely continuous. It is easy to see that all three measures $\pi_1$, $\pi_2$ and $\frac{1}{2}(\pi_1 + \pi_2)$ are optimal. Thus by Proposition \ref{P3} there are optimal couplings $\tilde{\pi}_i$ between $(\mu_K, (p_2)_\sharp \pi_i)$ such that the couplings $\tilde{\pi}_i$ are concentrated on disjoint $c_L$-cyclically monotone sets $C^{i}$ satisfying \begin{align*} \mathcal{L}(C_{t}^{i}) & \ge f(t)\mathcal{L}(C^{i}). \end{align*} Let $\epsilon>1$. Then $C^i_t \subset K_\epsilon$ for sufficiently small $t$ where $K_\epsilon$ denotes the $\epsilon$-neighborhood of $K$. Since the sets $C^{1}_0$ and $C^{2}_0$ are disjoint by Lemma \ref{lem:strong non-branching} the sets $C_{t}^{1}$ and $C_{t}^{2}$ are disjoint as well so that one obtains \begin{align*} \mathcal{L}(K) & =\lim_{\epsilon\to0}\mathcal{L}(K_{\epsilon})\\ & \ge\limsup_{t\to0}\mathcal{L}(C_{t}^{1}\dot{\cup}\,C_{t}^{2})\\ & =\limsup_{t\to0}\mathcal{L}(C_{t}^{1})+\mathcal{L}(C_{t}^{2})\\ & \ge2\limsup_{t\to0}f(t)\mathcal{L}(C_{0}). \end{align*} which is a contradiction as $\mu_K(K)=\mu_K(C_0)=1$ and $\mu_K$ and $\mathcal{L}\big|_K$ are mutually absolutely continuous. \end{proof} Using Lemma \ref{lem:strong non-branching} one can extend the proposition to general achronal target measures. \begin{prop} The previous preposition also holds for probability measures $\nu$ supported in an achronal set. Furthermore, for the unique dynamical optimal coupling $\Pi$ and any $c_L$-cyclically monotone set $C\subset\operatorname{supp}\pi$ with $\pi(C)=1$ where $\pi = (\ev_0,\ev_1)_\sharp\Pi$ it holds \[ \mathcal{L}(C_t) \ge f(t) \mathcal{L}(C_0). \] \end{prop} \begin{proof} Assume $\pi$ is a $c_L$-optimal coupling for $(\mu,\nu)$ and choose a $c_L$-cyclically monotone measurable set $C\subset\operatorname{supp}\pi$ of full $\pi$-measure. Set $C^0 = \Delta \cap C$ and $C^{>0} = C \backslash \Delta$ where $\Delta$ is the diagonal in $M \times M$. The intersection $C^0_0 \cap C^{>0}_0$ is $\mu$-negligible. Indeed, all points in the intersection $C^0_0 \cap C^{>0}_0$ would have a minimizer passing through that point which intersects two (necessarily distincts) points in $C^0_0$ and $C^{>0}_1$. Hence the set must be $\mathcal{L}$-negligible which also shows $\mu(C^0_0 \cap C^{>0}_0)=0$. Observe that the claim implies that $\pi$ is induced by a transport map if and only if $\pi$ restricted to $C^{>0}$ is induced by a transport map. If either of the cases holds then $\pi$ must be unique. So without loss of generality one can assume that $\pi$ is concentrated away from the diagonal $\Delta$. In this case $\pi$ must be concentrated on $\bigcup_{\tau_{0}\in\mathbb{Q},n\in\mathbb{N}} \Omega_{\tau_{0},n}$ where \[ \Omega_{\tau_{0},n}=\left\{\tau\le\tau_0-\frac{1}{n}\right\}\times\left\{\tau\ge\tau_0+\frac{1}{n}\right\}. \] Furthermore, $\pi$ is induced by a transport map if and only if for each $\tau_0 \in \mathbb{Q}$ and $n \in \mathbb{N}$, $\pi|_{\Omega_{\tau_0,n}}$ is either the zero measure or induced by a transport map. Thus one may assume that $\pi$ is supported in $\Omega_{\tau_0,n}$ for some $\tau_0 \in \mathbb{Q}$ and $n \in \mathbb{N}$. Let $\sigma:\Gamma \to (0,1)$ be measurable with $\tau(\gamma_\sigma)=\tau_0$ whenever $\gamma(0)\le\tau_0\le\gamma(1)$. Then given an optimal dynamical coupling $\Pi$ one obtains an intermediate measure $\mu_\sigma$ which is supported in the time-slice $\{\tau=\tau_0\}$. By Proposition \ref{P20} for any $\Pi$ there is a unique optimal coupling $\pi_\sigma$ between $\mu$ and $\mu_\sigma$ and a measurable map $T_\sigma$ such that $\pi_\sigma = (\operatorname{id}\otimes T_\sigma)_\sharp \mu$. We claim that $\Pi$ is unique among the dynamical couplings representing $\pi$. Assume $\mu_\sigma^{'}$, $\pi_\sigma^{'}$ and $T_\sigma^{'}$ are obtained from a distinct optimal dynamical coupling $\Pi'$. In this case the maps $T_\sigma$ and $T_\sigma^{'}$ do not agree on a set of positive $\mu$-measure. By construction the measure $\frac{1}{2}(\pi_\sigma+\pi_\sigma^{'})$ is the unique optimal coupling between $\mu$ and $\frac{1}{2}(\mu_\sigma+\mu_\sigma^{'})$ which is induced by a transport map. However, this is only possible if $T_\sigma$ and $T_\sigma^{'}$ agree $\mu$-almost everywhere. This is a contradiction and shows that the dynamical coupling $\Pi$ representing $\pi$ is unique. Note that for $\pi$-almost all $(x,y)\in M\times M$ the point $T_\sigma(x)$ is on a geodesic connecting $x$ and $y$. Since the value of $T_\sigma$ is unique almost everywhere and geodesics are non-branching, for $\mu$-almost all $x\in M$ there can be at most one geodesics $\gamma$ with $\gamma_0=x$ and $\gamma_\sigma = T_\sigma(x)$. In particular, for $\mu$-almost all $x\in M$ there is a unique $(x,y)\in \operatorname{supp}\pi$. But then $\pi$ is induced by a transport map and hence the unique optimal coupling between $\mu$ and $\nu$. It remains to show that the interpolation inequality holds as well: Let $\Pi$ be the unique dynamical optimal coupling and $\pi$ be the unique induced optimal coupling. Let $\chi: \Gamma \to (1-\epsilon,1]$ be a measurable map such that for a set $\Gamma'$ of full $\Pi$ measure the set $\tau\circ\chi(\Gamma')$ is countable and whenever $\gamma(1)=\eta(1)$ then $\tau(\gamma_\chi)=\tau(\eta_\chi)$. Let $\mu_\chi$ be the intermediate measures obtained from $\chi$. Then $\mu_\chi$ is concentrated in countably many time-slices $\{\tau=\tau_k\}_{k\in\mathbb{N}}$. Observe that the interpolation property holds when we restrict the coupling to $M \times \{\tau_k\}$. Since the endpoints for two different time-slices are disjoint Lemma \ref{lem:strong non-branching} implies that the interpolated points never intersect. Thus if $C$ is a $c_L$-cyclically monotone subset of $\operatorname{supp}\pi$ of full $\pi$-measure then the set \[ C^{\chi}=\{(\gamma_{0},\gamma_{\chi})\,|\,\gamma\in(\ev\nolimits_{0},\ev\nolimits_{1})^{-1}(C)\} \] is $c_L$-cyclically monotone and has full $(\ev_0,\ev_\chi)_\sharp \Pi$-measure and it holds \[ \mathcal{L}(C_{t}^{\chi})\ge f(t)\mathcal{L}(C_{0}). \] Via approximation it suffices to show the interpolation property assuming $C$ is compact. Observe now that for compact $C$ and all $\delta>0$ it holds \[ C^\chi_t \subset (C_t)_\delta \] for $\epsilon>0$ sufficiently small. Thus \begin{align*} \mathcal{L}(C_{t}) & =\lim_{\delta\to0}\mathcal{L}((C_{t})_{\delta})\\ & \ge\limsup_{\epsilon\to0}\mathcal{L}(C_{t}^{\chi})\ge f(t)\mathcal{L}(C_{0}). \end{align*}\end{proof} \begin{proof}[Proof of Theorem \ref{thm4}] The only thing that is left is to show that the intermediate measures $\mu_t = (\ev_t)_\sharp \Pi$ are absolutely continuous. For this let $C = \supp \pi$ and assume $\mu_t$ was not absolutely continuous. Then there is a compact set $\tilde{C}\subset C$ such that $\mu(\tilde{C}_0)=\mu_t(\tilde{C}_t)>0$ and $\mathcal{L}(\tilde{C}_t)=0$. In particular, $\mathcal{L}(\tilde{C}_0)>0$. However, the interpolation property shows $ 0 = \mathcal{L}(\tilde{C}_t)\ge f(t)\mathcal{L}(\tilde{C}_0)$ which is clearly a contradiction and thus proving that $\mu_t$ is absolutely continuous. \end{proof} The following corollary turns out to be useful in the next section. \begin{cor}[Self-Intersection Lemma]\label{cor:self-intersection} If $\mu$ and $\nu$ are causally related, $\mu$ is absolutely continuous and $\nu$ is supported on an achronal set then for all sets $A$ of full $\mu$-measure there is a $t_0 \ll 1$ such that the intermediate measures $\mu_t$, $t\in (0,t_0)$ satisfy $\mu_t(A)>0$. In particular, $\mu$ and $\mu_t$ cannot be mutually singular. \end{cor} \begin{proof} By restricting $\mu$ we may assume $\mu$ has density by $M$. Then uniqueness of $\mu_t$ implies that the density of $\mu_t$ is bounded by $M\cdot f(t)^{-1}$, see \cite[5.15]{kell17}. Since $f(t) \to 1$ as $t \to 0$ we see that the densities of $\mu_t$ for sufficiently small $t$ can be uniformly bounded. Now the claim follows directly from the Self-Intersection Lemma in \cite[Lemma 6.4]{kell17}. \end{proof} \begin{remark} The argument shows that for $\mu=g\mathcal{L}$ and $\mu_t = g_t\mathcal{L}$ one has the estimate $$g_t(\gamma_t) \le \frac{1}{f(t)} g(\gamma_0)$$ for $\Pi$-almost all $\gamma \in \Gamma$ where $\Pi$ is the unique optimal dynamical coupling between $\mu$ and $\nu$. \end{remark} \subsection{Proof of Theorem \ref{thm5}} The goal is to reduce the problem to the $1$-di\-men\-sion\-al case and then construct a map from that solution. The proof is very similar to the proof of Bianchini-Cavalletti \cite{BiaCav} for general non-branching geodesic spaces. However, the lack of a natural parametrization of lightlike geodesics prevents a direct application of their proof. One of the features of the proof will be to show how the time function $\tau$ and time-affinely parametrized geodesics can be used to overcome this obstacle and give a complete solution to the Monge problem in the relativistic setting. Note that the proof shows that the optimal coupling is in general non-unique without assuming some relative form of achronality. Indeed, in order to prove uniqueness using the reduction to the $1$-dimensional setting on a set of full measure there must be an almost everywhere defined injective map from the set of transport rays to $M$ which corresponds to the target of the transport. By \cite[Proposition 2.7]{suhr16} one knows that the any optimal coupling is concentrated on a measurable $c_L$-cyclically monotone set $C$. \begin{definition} [Maximal $c_L$-cyclically monotone set] A set $A\subset M\times M$ is {\it maximal $c_{L}$-cyclically monotone in a set $\Sigma\subset\{c_{L}\le0\}$} if it is $c_L$-cyclically monotone and is maximal with respect to inclusion among subsets of $\Sigma$. \end{definition} It is not difficult to see that a maximal $c_{L}$-cyclically monotone set $A$ must be closed if $\Sigma$ is closed. One calls any maximal element $A_{max}$ of a $c_{L}$-cyclically monotone set $A$ a {\it maximal hull}. Note that the maximal hull is in general not unique. \begin{lemma} Every $c_{L}$-cyclically monotone set $A\subset\{c_{L}\le0\}$ is contained in a maximal $c_{L}$-cyclically monotone set $A_{max}\subset\{c_{L}\le0\}$. In particular, if $(\mu,\nu)\in\mathcal{P}^+_\tau(M)$, then any optimal coupling is supported in a maximal $c_{L}$-cyclically monotone set $A_{max}\subset\{c_{L}\le0\}$. \end{lemma} \begin{proof} Just observe that if $\{A_{i}\}_{i\in I}$ is a chain of $c_{L}$-cyclically monotone sets in the closed set $\{c_{L}\le0\}$ then $$\tilde{A}=\bigcup_{i\in I}A_{i}$$ is maximal in $\{c_L\le0\}$ and $c_{L}$-cyclically monotone. Thus Zorn's Lemma gives the existence of a maximal element $A_{max}$ with $$A\subset A_{max}\subset\{c_{L}\le0\}.$$ The last statement follows by observing that a coupling with finite cost must have support in $\{c_{L}\le0\}$. \end{proof} Let $A_{max}$ be a maximal $c_L$-cyclically monotone hull of the support of an optimal coupling $\pi$ of $\mu$ and $\nu$ in $J^+$. Further let $\Pi$ be a dynamical optimal coupling of $(\mu,\nu)$. \begin{lemma}\label{lem:A_x-geodesics} For any point $(x,y)\in A_{max}$ and any point $z\in \gamma\in \Gamma_{x\rightarrow y}$ one has $(x,z),(z,y)\in A_{max}$. \end{lemma} \begin{proof} Let $\{(x_i,y_i)\}_{1\le i\le N}\subset A_{max}$. Then one has \begin{align*} c_L(x,z)&+c_L(z,y)+\sum_{i=1}^N c_L(x_i,y_i) =c_L(x,y)+\sum_{i=1}^N c_L(x_i,y_i)\\ &\le c_L(x,y_1)+\sum_{i=1}^{n-1} c_L(x_i,y_{i+1}) +c_L(x_N,y)\\ &\le c_L(x,y_1)+\sum_{i=1}^{n-1} c_L(x_i,y_{i+1}) +c_L(x_N,z)+c_L(z,y) \end{align*} where the next to last inequality follows from the cyclic monotonicity and the last inequality is the triangle inequality for $c_L$. This implies that $(x,z)\in A_{max}$. The other case is analogous. Note that $c_L(x,y)<\infty$ since $(x,y)\in J^+$ and thus $c_L(x,z),c_L(z,y)<\infty$. \end{proof} Consider the relation $R\subset M\times M$ with $$(x,y)\in R:\Leftrightarrow (x,y)\in A_{max} \text{ or }(y,x)\in A_{max}.$$ Set $R_{>1}:=\{(x,y)\in R|\; \exists z\neq x: (x,z)\in R\}$. Then one can assume without loss of generality that $R_{>1}$ has full measure relative to any optimal coupling. This follows from the observation that on $R\setminus R_{>1}$ all optimal transports are constant. It is assumed from here on that $R=R_{>1}$. Next define the following two sets: $$A^+:=\{x\in M|\; \exists z\neq w\in M: (x,z),(x,w)\in A_{max}\text{ and }(z,w)\notin R\}$$ and $$A^-:=\{y\in M|\; \exists x\neq z\in M: (x,y),(z,y)\in A_{max}\text{ and }(x,z)\notin R\}.$$ Assume the disintegration of $\pi$ with respect to the first projection is given by \[ \pi=\mu\otimes\pi_{x}. \] \begin{lemma}\label{lem:exclude-Aplus} For $\mu$-almost all $x\in A^{+}$ the measures $\pi_{x}$ are supported in $\{(x,x)\}$. \end{lemma} \begin{proof} If $A^+$ is $\mu$-negligible there is nothing to prove. Therefore one can assume by \cite[Corollary 3.12]{suhr16} that $\mu(A^+)=1$. After possibly further restricting the transport problem one can suppose that \[ \operatorname{supp}\pi\subset\{\tau\le\tau_{0}-\varepsilon\}\times\{\tau\ge\tau_{0}+\varepsilon\} \] for a sufficiently small $\e>0$. Let now $$\Gamma_{\tau_0}:=\{\gamma\in \Gamma|\; \tau(\gamma(0))\le \tau_0\le \tau(\gamma(1))\}$$ and $\sigma:\Gamma_{\tau_0}\to[0,1]$ be the map defined by $\tau(\ev(\gamma,\sigma(\gamma)):=\tau_{0}$. Note that $\Pi$ is supported in $\Gamma_{\tau_0}$ under the above assumptions. Then $$\mu_{\sigma}:=(\ev\circ(\id,\sigma))_\sharp\Pi$$ is an intermediate measure of $\mu$ and $\nu$ which is supported in the time-slice $\{\tau=\tau_{0}\}$. Thus by Proposition \ref{P20} there is a unique coupling which, in addition, is induced by a transport map $T_{\sigma}$. The assumption shows that for $\mu$-almost all $x\in A^{+}$ the (unique) geodesics connecting $x$ and $T_{\sigma}(x)$ never intersects $A^{+}$. Thus $\mu_{\sigma,t}(A^{+})=0$ for the any intermediate measure $\mu_{\sigma,t}$ between $\mu$ and $\mu_{\sigma}$. This, however, violates Corollary \ref{cor:self-intersection}. \end{proof} \begin{remark} Under the assumptions of Theorem \ref{thm5} it is even possible to show $\mathcal{L}(A^{+})=0$. For this one needs to know whether any coupling $\tilde{\pi}$ concentrated in $A_{\max}\cap(A^{+}\times\{\tau=\tau_{0}\})$ is induced by a transport map. By Theorem \ref{thm4} a sufficient condition would be that $\tilde{\pi}$ is optimal. \end{remark} If $\pi_{x}=\delta_{x}\otimes\delta_{x}$ for all $x$ in a measurable set $A\subset M$ then $\pi\big|_{A\times M}=(\operatorname{id}\times\operatorname{id})_{\sharp}\mu\big|_{A}$. Thus in the following one will always assume that $\pi_{x}\ne\delta_{x}\otimes\delta_{x}$ for $\mu$-almost all $x\in M$. In particular, the measures $\mu$ and $(p_{1})_{\sharp}(\pi\big|_{M\times M\backslash\Delta})$ are mutually absolutely continuous. In combination with Lemma \ref{lem:exclude-Aplus} one concludes that $\mu(A^{+})=0$. Given a symmetric relation $R\subset M\times M$ let the {\it domain of $R$} be defined by $$\dom(R):=p_{1}(R).$$ In the following one will use the following short hand notation to define a new symmetric relations $R'\subset R$: $R'$ {\it is given by $\dom(R')=A$} for a subset $A\subset\dom R$ if \[ R'=A\times A\cap R. \] One easily verifies that $\dom R'$ is indeed equal to $A$. Furthermore, if $A$ is (Borel) measurable then $R'$ is (Borel) measurable or analytic if $R$ is (Borel) measurable or analytic, respectively. Let $R_{red}$ be obtained by requiring $\dom(R_{red})=\dom(R)\setminus A^+\cup A^-$. Then one may verify that $R_{red}$ is an equivalence relation. Decompose $\mu$ into two measures $\mu_1$ and $\mu_2$ such that $\mu_1$ is concentrated $\dom(R_{red})$ and $\mu_2$ on $A^-$. Choose an optimal coupling $\pi$ along the same decomposition $\mu = \mu_1 + \mu_2$. Denote the second marginals by $\nu_1$ and $\nu_2$, respectively. By the definition of $A^-$ one sees that $\pi_2$ is concentrated on the diagonal. Thus if one finds an optimal coupling $\tilde{\pi}_1$ between $\mu_1$ and $\nu_1$ which is induced by a transport map then $\tilde\pi = \tilde\pi_1 + \pi_2$ is an optimal coupling between $\mu_1$ and $\nu_1$ which is induced by transport maps. Thus one may assume $\mu(A^\pm)=0$. \begin{lemma} There exists a measurable projection $T\colon \text{dom}(R_{red})\to \text{dom}(R_{red})$ with $(x,T(x))\in R_{red}$. \end{lemma} \begin{proof} Choose an enumeration $\{q_n\}_{n\in \mathbb N}$ of $\mathbb Q$. Define inductively disjoint relations $\{R_n\}_{n\in\mathbb N}$ as follows: Set $\tilde{R}_0:=R_{red}$. Assume that $R_k$ for $k\le n$ has been constructed. Define $R_{n+1}$ by $$(x,z)\in R_{n+1}:\Leftrightarrow (x,z)\in \tilde{R}_n\wedge\exists y,y'\in \{\tau=q_{n+1}\}: (x,y),(z,y')\in \tilde{R}_n.$$ $R_{n+1}$ is an equivalence relation since it is the intersection of two equivalence relations. Thus $\tilde{R}_{n+1}:=\tilde{R}_n\setminus R_{n+1}$ is an equivalence relation. Continuing one obtains a measurable partition $\{R_n\}_{n\in \mathbb N}$ of $R_{red}$. This follows from the initial assumption that all minimizer are non-constant. For all $r\in \mathbb R$ there exists a measurable selection $$S_r\colon p_1(R_{red}\cap (M\times \{\tau=r\}))\to \dom(R_{red})\cap \{\tau=r\}.$$ Define the map $$T\colon \dom R_{red}\to \dom R_{red},\; x\mapsto S_{q_n}(x)\text{ for }x\in R_n.$$ \end{proof} Disintegrate $\mu$ along $T$, i.e. for $\mu_{red}:=(T)_\sharp \mu$ let $\{t_x\}_{x\in \dom(R_{red})}$ be the almost everywhere defined family of probability measures on $T(\dom(R_{red}))$ such that $$\mu=\mu_{red}\otimes t_x.$$ \begin{lemma} For $\mu_{red}$-almost all $x\in M$ is the measure $\bar{t}_{x}=\tau_{\#}(t_{x})$ is non-atomic. \end{lemma} \begin{proof} By the assumptions the statement holds for $\pi$ if it holds for $\pi$ restricted to $M\times M\backslash\Delta$. In particular, one can assume that for $\pi$-almost all $(x,y)\in M\times M$ one has $\tau(x)<\tau(y)$. Assume now for a set $A$ of positive $\mu_{red}$-measure the measure $\bar{t}_{x}$ has atoms for all $x \in A$. Then there is a compact set $K\subset M$ of positive $\mu$-measure such that the map $$K\to\mathcal{P}(\mathbb{R}),\; x\mapsto\bar{t}_{x}$$ is weakly continuous. Thus the function $$F\colon K\times\mathbb{R}\to[0,1],\; F(x,r)=\bar{t}_{x}(\{r\})$$ is upper semi-continuous. In particular, the set \[ C=F^{-1}((0,1]) \] is a Borel set and for each $(x,r)\in C$ the point $r$ is an atom of $\bar{t}_{x}$. Applying the Selection Theorem \cite[Section 423]{Fremlin2006} to $C$ yields a measurable selection $T\colon p_1(C)\to C$ such that $(x,T(x))\in C$ for all $x\in p_1(C)$. In particular, $\mu_{red}\big|_K\otimes\delta_{T(x)}$ is non-trivial. Since $t_x$ is atomic for all $x\in K$ one also has \[ \mu_{red}\big|_K\otimes\delta_{T(x)}\ll\mu_{red}\otimes\bar{t}_{x}. \] Translating back to the coupling $\pi$ one sees that there exists a measurable map $S\colon M\to M$ and a set $\tilde{K}$ of positive $\mu$-measure such that $$\pi':=\frac{1}{\mu(K)}(\operatorname{id}\otimes S)_{\sharp}\mu\big|_{K}\ll\pi$$ and for all $x\ne y\in\tilde{K}$ one has $(x,T(y))\notin R_{red}$ and $\tau(x)<\tau(T(x))$. This implies that for any $\sigma:\Gamma\to(0,1)$ the intermediate measures $\mu_{\sigma}^{'}$ of $(p_{1})_{\sharp}\pi'$ and $(p_{2})_{\sharp}\pi'$ would be mutually singular with respect to $(p_{1})_{\sharp}\pi'$. However, as in the proof of Lemma \ref{lem:exclude-Aplus}, this yields a contradiction. \end{proof} \begin{remark} A more involved proof shows that $\bar{t}_{x}$ is absolutely continuous. As this strengthened statement is not needed the details are left to the interested reader. \end{remark} Disintegrating an optimal coupling $\pi$ along $T\circ p_1$ yields a family of probability measures $\{s_x\}$ such that $$\pi=\mu_{red}\otimes s_x,$$ where $s_x$ is a probability measure on $$(R_x\cap\dom(R_{red}))\times R_x\text{ with }R_x:=p_2((\{x\}\times M)\cap R).$$ \begin{lemma} For all $x\in T(\dom(R_{red}))$ the set $R_x$ is diffeomorphic to an interval and the time function $\tau$ is injective on $R_x$. \end{lemma} \begin{proof} From Lemma \ref{lem:A_x-geodesics} and $x\in R_x$ one sees that $R_x$ is formed by the image of geodesics which contain $x$ and meet at most at their endpoints. As $x\in R_x$ is not in $A^+$ or $A^-$, it must be in the interior of $R_x$. Thus, because geodesics are non-branching and the time function $\tau$ is strictly increasing along causal curves one sees that $R_x$ is the image of precisely one geodesic. \end{proof} Define for $x\in T(\dom(R_{red}))$ the measures $r_x:=(p_2)_\sharp(s_x)$, i.e. $$\nu=\mu_{red}\otimes r_x.$$ Next one constructs a transport map for the optimal couplings between $t_x$ and $r_x$. By the previous Lemma the measures $t_x$ and $r_x$ are concentrated on a single geodesic such that the time function $\tau$ give a uniquely defined parametrization. Thus it suffices to solve the one-dimensional optimal transport problem between $t_x$ and $r_x$. First observe the following. \begin{lemma}\label{L21} Let $\gamma \in \Gamma$ and $\mu$, $\nu$ be causally related probability measures on $\gamma$. Then any causal coupling $\pi_\gamma$ is optimal. \end{lemma} \begin{proof} Choose a monotone reparameterization $[0,1]\to[0,1]$ of $\gamma$ to an affine parameter. The cost function for $s,t\in [0,1]$ then is $$c_L(s,t)=\begin{cases} c(t-s),\text{ if }s\le t,\\ \infty\text{ else}\end{cases}$$ for some constant $c=c(\gamma)\le 0$. It is now easy to see that any causal coupling is cyclically monotone, i.e. optimal. \end{proof} By Lusin's Theorem one can assume that $x\mapsto (t_x,r_x)$ is continuous. Set $$m(x,a):=t_x(\tau^{-1}(-\infty,a])$$ and $$n(x,b):=r_x(\tau^{-1}(-\infty,b]).$$ With this define $\phi(x,a)=b$ if $b=\text{argmin}\{m(x,a)\le n(x,b)\}$. Observe that $\phi$ is measurable and $(T,\tau)$ is injective on $\dom(R_{red})$ so that there is a measurable map $\psi:\dom(R_{red})\to M$ such that $\psi(y) = \phi(T(y),\tau(y))$ for $\mu_{red}$-almost all $y\in \dom(R_{red})$. Again by Lusin's Theorem one may assume $\psi$ is continuous. Define a set $\mathcal{T}\subset M\times M$ as follows $$ \mathcal{T} = \{ (y,z) ~|~ (y,z)\in R, \psi(y)=\tau(z) \}. $$ Note that $\mathcal{T}$ is analytic and for each $x\in \dom(R_{red})$ there is exactly one $(x,y)\in \mathcal{T}$. Thus $\mathcal{T}$ agrees on $\dom(R_{red})\times M$ with the graph of a measurable function $\Psi : \dom(R_{red}) \to M$. The choice of $\phi$ implies $\Psi_\sharp t_x = r_x$. Thus $(\operatorname{id}\times\Psi)_\sharp \mu $ is a coupling of $\mu$ and $\nu$. Since $\Psi$ transports monotonously along each $R_x$ one sees that $\Psi$ is an optimal transport map between $t_x$ and $r_x$. As the initial coupling was optimal, we see that along each transport ray the cost is not change In particular, the coupling $(\operatorname{id}\times\Psi)_\sharp \mu $ is optimal between $\mu$ and $\nu$. This finishes the proof of Theorem \ref{thm5}.
\section{Clifford configurations}\label{sec:clifford} The combinatorial n-hypercube $H_n$ has as set of vertices all the subsets of $\menge{1,2,\dots,n}$. There is an edge between $I$ and $I'$ in the hypercube if these two sets differ by exactly one index. We call a vertex of the hypercube even (odd) if the cardinality of the corresponding index set is even (odd). The distinction between odd and even sets depends on what vertex has been labeled by the empty set. However, whether two vertices belong to the same parity is independent of that choice. \begin{definition} The \emph{Clifford-n-circle configuration} $C_n$ is a map from the n-hypercube $H_n$ to points and circles in the plane $\Ce$. Every even vertex is mapped to a point and every odd one to a circle, such that a point incident to a circle in the cube is mapped to that circle in the plane (see figure \ref{fig:clifford} for two examples). \end{definition} Clifford's theorem then says that given $n$ cyclically ordered circles in the plane all intersecting in one point, they can be extended uniquely to the whole Clifford configuration $C_n$. We will denote circles in a Clifford configuration by $c_I$, intersection points by $V_I$ and circle centers by $M_I$. In order to facilitate notation, we will be slightly imprecise and identify the vertices of $H_n$ with the corresponding intersection points or circle centers in $\Ce$. The connection of the Clifford configuration $C_4$ to the octahedron recurrence and the M\"obius mutation map becomes apparent in the next lemma. \begin{figure}[ht] \centering \begin{minipage}[b]{0.46\textwidth} \ggbcliffordthree \end{minipage} \begin{minipage}[b]{0.46\textwidth} \ggbcliffordfour \end{minipage} \caption{The Clifford configurations $C_3$ and $C_4$.} \label{fig:clifford} \end{figure} \begin{lemma} \label{lem:cliffordmenelaus} Consider the Clifford configuration $C_4$. The following two equivalent equalities hold: \begin{align} \mob(V_{12},V_{23},V_{34},V_{14})(V) &= V_{1234} \\ \sr(V; V_{12},V_{23},V_{34},V_{14}) &= \sr(V_{1234}; V_{12},V_{23},V_{34},V_{14}) \end{align} \end{lemma} \proof{The proof follows the one of Konopelchenko and Schief \cite{wolfgangclifford} closely and employs Menelaus's theorem. It states that given three lines with three distinct intersection points $A_{12},A_{23},A_{13}$ and an additional line intersecting the three previous lines in the points $B_1,B_2,B_3$, we have an equality for the multi-ratio of the six points: \begin{align} \mr(A_{12},B_2,A_{23},B_3,A_{13},B_1) := \f{A_{12}-B_2}{B_2-A_{23}}\f{A_{23}-B_3}{B_3-A_{13}}\f{A_{13}-B_1}{B_1-A_{12}} = -1 \end{align} To apply this to $C_4$ we send $V_{13}$ to infinity via a M\"obius transformation. As a result the circles $c_1,c_3,c_{123}$ and $c_{134}$ are four lines with the six intersection points $V,V_{12},V_{14},V_{23},V_{34},V_{1234}$ and of course $V_{13}$ at infinity, compare with figure \ref{fig:menelaus}. In this setting Menelaus's theorem gives the following two equalities: \begin{align} m_1&:=\mr(V_{34},V_{14},V_{1234},V_{12},V_{23},V)=-1\\ m_2&:=\mr(V_{14},V_{34},V_{1234},V_{23},V_{12},V)=-1 \end{align} Both $m_1$ and $m_2$ are actually M\"obius invariant quantities as they can be expressed in terms of cross ratios: \begin{align} m_1 &= \cro(V_{34},V_{14},V_{1234},V_{13})\cro(V_{1234},V_{12},V_{23},V_{13})\cro(V_{23},V,V_{34},V_{13})\\ m_2 &= \cro(V_{14},V_{34},V_{1234},V_{13})\cro(V_{1234},V_{23},V_{12},V_{13})\cro(V_{12},V,V_{14},V_{13}) \end{align} The quotient of star-ratios on the other hand can be expressed by the quantities $m_1$ and $m_2$ \begin{align} \f{\sr(V; V_{12},V_{23},V_{34},V_{14})}{\sr(V_{1234}; V_{12},V_{23},V_{34},V_{14})} = \f{m_2}{m_1} = 1 \end{align} Because that expression is an equation in cross ratios it is invariant under M\"obius transformations and the claim is proven.\qed\\} \begin{figure}[h] \centering \ggbmenelaus \caption{Menelaus's theorem applied to $C_4$ with $V_{13}$ sent to infinity via a suitable M\"obius transformation.} \label{fig:menelaus} \end{figure} To simplify notation, let us introduce the shift operator $\shift J$ which acts as a symmetric difference operator on the indices of the arguments of a function, that is: \begin{align} \shift J f(x_{I_1} , x_{I_2}, ..., x_{I_m}) &= f(x_{J \Delta I_1} , x_{J \Delta I_2}, ..., x_{J \Delta I_m})\\ I\ \Delta\ J &= (I \cup J) \setminus (I\cap J) \end{align} Here, the $x$ variables could be vertices $V$, circles $c$ or circle centers $M$. Employing this notation the M\"obius mutation map acts as a shift operator on $C_4$. \begin{align} \mob(V_{12},V_{23},V_{34},V_{14})(V_I) = \shift{1234} V_I,\qquad\mob(V_{12},V_{23},V_{34},V_{14})(c_I) = \shift{1234} c_{I \end{align} This tells us that $\mob(V_{12},V_{23},V_{34},V_{14})$ acts as a total shift on the circles and intersection points of $C_4$. However, one should be aware of the fact that the M\"obius mutation will in general not act as a shift operator on the circle centers.\\ In terms of shift notation it is also possible to express the invariance of the star-ratio as follows: \begin{align} \sr(V; V_{12},V_{23},V_{34},V_{14}) = \shift{1234} \sr(V; V_{12},V_{23},V_{34},V_{14}) \end{align} Let us reiterate that in the $C_4$ configuration two points share the same star-ratio with respect to their same four neighbours. We can translate this fact into a lemma. \begin{lemma} \label{lem:cliffordmobius} Let $G\in \obs$ be a graph, $z$ a face drawing of $G$ and let $f\in F$ be a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common circle. The Clifford move (see definition \ref{def:cliffordmove}) coincides with the M\"obius mutation map. \begin{align} \cli_f(z) = \mob_f(z) \end{align} \end{lemma} This identification makes it natural to interpret the star-ratio preserving M\"obius mutation map as the extension of the Clifford move to the case where all five points lie on a common circle. In the next section we prove a similar result for the Miquel move, thereby proving Theorem \ref{th:miquelclifford} relating Miquel dynamics and Clifford lattices.\\ In order to make progress later, we will study here a few more cross ratio identities of Clifford configurations. We borrow the following definition from Bobenko, Mercat and Suris \cite{nonlinearconformal}. \begin{definition} Given a map $X: H_n \rightarrow \Ce$ from the hypercube $H_n$ to the plane, we say it is an \emph{integrable cross ratio system} if and only if for any $k, a,b\in\menge{1,2,\dots,n} , I\subset\menge{1,2,\dots,n}$: \begin{align} \shift{k}\cro(X_I, \shift{a} X_I, \shift{ab}X_I, \shift{b} X_I) = \cro(X_I, \shift{a} X_I, \shift{ab}X_I, \shift{b} X_I) \end{align} That is, on any 3-cube in $H_n$ the cross ratios on opposite 2-faces are the same. \end{definition} While this definition does not consider circle centers or intersection points, it can be applied to Clifford configurations and circle patterns. \begin{lemma} \label{lem:cliffordintegrable} The $C_n$ configuration is an integrable cross ratio system. \end{lemma} \proof{ A 3-cube in $C_n$ is simply $C_3$ (see figure \ref{fig:clifford}) and can be interpreted as an ideal hyperbolic tetrahedron in the Poincar\'e half-space model (see \cite{hypgeom} for a reference on hyperbolic geometry). The circles represent the ideal boundary of the four involved planes and the intersection points are the four ideal vertices of the tetrahedron. The cross ratio $\cro(V,M_1,V_{12},M_2)$ has absolute value 1 and its argument is twice the intersection angles of the circles $c_1$ and $c_2$. Also, it is well known that intersection angles on opposite edges in ideal tetrahedra sum to $\pi$. Thus: \begin{align} &\cro(V,M_1,V_{12},M_2)\cro(V_{13},M_{123},V_{23},M_3) = 1\\ \Rightarrow\qquad& \cro(V,M_1,V_{12},M_2) = \cro(M_3,V_{13},M_{123},V_{23}) = \shift{3} \cro(V,M_1,V_{12},M_2) \end{align} Due to symmetry, this argument works for any cross ratios on pairs of opposing faces in $C_3$.\qed\\ } \begin{lemma} \label{lem:tetrahedracrossratios} In $C_4$ we have that \begin{align} \cro (V_I,\shift{ab} V_I,\shift{bc} V_I,\shift{ac} V_I) = \shift k \cro (V_I,\shift{ab} V_I,\shift{bc} V_I,\shift{ac} V_I) \end{align} for any $k\in \menge{1,2,3,4}$. \end{lemma} \proof{We are comparing the cross ratios of the intersection points of two $C_3$ configurations situated in $C_4$. As already noted in Lemma \ref{lem:cliffordintegrable}, these $C_3$ configurations represent hyperbolic tetrahedra. In fact, these are two hyperbolic tetrahedra with the same intersection angles. It is well known \cite{hypgeom} that this is equivalent to the existence of a hyperbolic isometry, which is a M\"obius transformation of $\Ce$, that maps one of the tetrahedra onto the other. Thus, as M\"obius transformations do not change cross ratios, the lemma is proven.\qed\\} Note that even though circle centers are not invariant under M\"obius transformations, the previous lemma does indeed relate cross ratios on intersection points of a $C_3$ configuration to the cross ratios of circle centers of that same $C_3$ configuration. This allows us to prove in the next lemma that star-ratios of circle centers are also preserved under the total shift $\Delta_{1234}$. \begin{lemma} \label{lem:dualsr} Assume a $C_4$ configuration, where we picked the origin of the hypercube at the circle center $M$. The following relation holds: \begin{align} \sr(M; M_{12},M_{23},M_{34},M_{14}) = \shift{1234}\sr(M; M_{12},M_{23},M_{34},M_{14}) \end{align} \end{lemma} \proof{ First, we check that this is true for the argument: \begin{align} \arg \sr(M; M_{12},M_{23},M_{34},M_{14}) &= \arg \cro (V_1,V_2,V_3,V_4)\\ &= \arg \shift{1234} \cro (V_1,V_2,V_3,V_4)\\ &= \arg \shift{1234} \sr(M; M_{12},M_{23},M_{34},M_{14}) \end{align} Thus it suffices to check that the quotient of the squares is equal to one. Call this quotient $S^2$ and decompose it into cross ratios of circle centers. \begin{align} S^2 :=& \left(\f{\sr(M; M_{12},M_{23},M_{34},M_{14})}{\sr(M_{1234}; M_{12},M_{23},M_{34},M_{14})} \right)^2 \\=&\ \f{\cro(M,M_{12},M_{13},M_{23})}{\cro(M_{1234},M_{34},M_{13},M_{23})}\f{\cro(M,M_{34},M_{13},M_{14})}{\cro(M_{1234},M_{12},M_{13},M_{14})} \\&\cdot\f{\cro(M,M_{34},M_{24},M_{23})}{\cro(M_{1234},M_{34},M_{24},M_{14})}\f{\cro(M,M_{12},M_{24},M_{14})}{\cro(M_{1234},M_{12},M_{24},M_{23})} \end{align} Notice that each cross ratio is a cross ratio of a $C_3$ configuration, therefore we are able to apply Lemma \ref{lem:tetrahedracrossratios}. We shift each cross ratio such that we arrive at an expression in which all the cross ratios cancel. \begin{align} S^2= \f{\cro(V_{123},V_{3},V_{2},V_{1})}{\cro(V_{124},V_{4},V_{1},V_{2})}\f{\cro(V_{134},V_{1},V_{4},V_{3})}{\cro(V_{234},V_{2},V_{3},V_{4})} \f{\cro(V_{234},V_{2},V_{3},V_{4})}{\cro(V_{123},V_{3},V_{2},V_{1})}\f{\cro(V_{124},V_{4},V_{1},V_{2})}{\cro(V_{134},V_{1},V_{4},V_{3})} =1 \end{align} \qed \\} For the special case that the circles at a quadrilateral are in a $C_4$ configuration, Lemma \ref{lem:dualsr} already proves the equivalence of Clifford and Miquel move. In particular, the so called integrable circle patterns \cite{nonlinearconformal} consist of $C_n$ configurations at all faces and vertices. As a result both the Miquel move and the Clifford move map integrable circle patterns to integrable circle patterns. However, we do not need this result here. Instead, we will prove in the next section \ref{sec:miquel} that locally, it is possible to reduce the case of general circle patterns to the case of an integrable cross ratio system. \section{Concluding remarks} \label{sec:conclusion} Circle patterns are an inherently M\"obius invariant object, in the sense that circle patterns remain circle patterns after a M\"obius transformation. However, the object we used for the definition of the dimer model associated to a circle pattern are not. In particular M\"obius transformations do not map circle centers to circle centers, distances are not preserved and neither are star-ratios. It is therefore an interesting question how M\"obius transformations affect the statistics. It should be mentioned though that circle centers are closely related to Similarity geometry as a subgeometry of M\"obius geometry. If we choose one particular point $P_\infty \in \Ce$, then we can define the so called conformal center of circle $c$ as reflection of $P_\infty$ about $c$. If $P_\infty = \infty$ then the conformal centers are just the usual circle centers. In this definition the star-ratio actually factors into cross ratios: \begin{align} \sr(P_0; P_1,P_2,P_3,P_4) = \cro(P_1,P_0,P_2,P_\infty)\cro(P_3,P_0,P_4,P_\infty) \end{align} If we apply a M\"obius transformation to all the points including $P_\infty$, the star-ratios are invariants. However, this is really just invariance under Similarity transformations if we mod out transformations that do not fix $P_\infty$.\\ Another interesting question is if indeed Miquel dynamics are about circle patterns, or if they are slightly more fundamentally about real star-ratios and the existence of a consistent reflection system. By a consistent reflection system we mean the fact that the primal points are reflected about lines through the dual points. These two notions coincide on the sphere and the plane, but they differ on the torus. In fact, neither the equivalence to urban renewal nor to Clifford lattices depends on the existence of the global circle pattern, only on the existence of the reflection system.\\ Furthermore, we have shown that the dual star-ratios under Miquel dynamics carry the structure of a discrete integrable system as investigated in \cite{dimerintegrable} for graphs on the torus. However, it is unclear whether given star-ratios correspond to unique circle patterns or reflection systems on the torus. It is clear that on the infinite plane they are not sufficient, as discussed in section \ref{sec:lattice} where we showed that star-ratios only determine a $\Z^2$ lattice if one dimensional Cauchy-data are given.\\ Both the dimer and the Ising model have been studied on isoradial graphs and are known to be critical \cite{isoradialdimercritical, baxter}. For the case of the Ising model there has been recent progress and it was proven by Lis \cite{criticalisingcirclepattern} that one can assign weights to a general circle pattern such that the resulting Ising model is critical. It seems a natural question to ask whether a similar result, using the edge weights for general circle patterns introduced here as a generalization of Kenyon's weights for isoradial graphs \cite{dimersisoradial}, give rise to a dimer model that is critical as well.\\ \section{Introduction} \label{sec:intro} Miquel dynamics were first introduced by Ramassamy following an idea of Kenyon, see \cite{miquel} and references therein. In each time step, this discrete dynamical system replaces every second circle of a square grid circle pattern. If the circle pattern is doubly periodic, it is conjectured that these dynamics feature a form of discrete integrability, and that they are related to dimer statistics or dimer integrable systems \cite{dimerintegrable}. First progress towards integrability has been made by Glutsyuk and Ramassamy in \cite{miquel2} for the case of the doubly periodic $2\times2$ grid.\\ In Theorem \ref{th:miquelclifford} we show that the collection of circle centers under Miquel dynamics form a special case of Clifford lattices, a discrete integrable system studied by Konopelchenko and Schief \cite{wolfgangclifford}. We introduce the geometric star-ratio function, and the centers of circle patterns are exactly the Clifford lattices with real star-ratios.\\ If the star-ratios are real and positive, we say a circle pattern is Kasteleyn. To a Kasteleyn circle pattern we associate a dimer model with edge weights equal to the distances of circle centers. We show in Theorem \ref{th:miqueldimers} that the Miquel move induces urban renewal on the associated dimer model. This proves that under Miquel dynamics the star-ratios transform exactly as the face weight coordinates of the discrete cluster integrable system as introduced by Goncharov and Kenyon \cite{dimerintegrable}. However, the star-ratios do not fully govern Miquel dynamics as they do not uniquely determine the circle pattern. The analysis of the additional information needed to fully describe Miquel dynamics is a topic of ongoing research.\\ We want to stress that all our proofs are of a local nature. This has the advantage that the theory is not restricted to $\Z^2$ combinatorics. The structure of the paper is as follows: In the following section~\ref{sec:prelim} we revisit the definition of dimer statistics and introduce notation for the graphs, circle patterns and the star-ratios considered throughout this paper. We also define both the local Miquel and the local Clifford move. After stating the two main theorems \ref{th:miquelclifford} and \ref{th:miqueldimers} in section~\ref{sec:main} we introduce in section \ref{sec:mobius} the M\"obius geometric mutation map which underlies both the Clifford and the Miquel move. We also calculate the transformation formulas for star-ratios under the M\"obius mutation map. In section \ref{sec:clifford} we study the Clifford configuration, giving a geometric construction of the M\"obius mutation map and relating it to work of Konopelchenko and Schief \cite{wolfgangclifford}. Additionally, we derive several useful lemmas by investigating the relation between the Clifford configuration, integrable cross ratio systems and integrable circle patterns as defined by Bobenko, Mercat and Suris \cite{nonlinearconformal}. Finally, we assemble the pieces in section~\ref{sec:miquel} to relate star-ratios with the Miquel move thereby proving the two main theorems. Even though we prove everything locally, it is interesting how this translates to the setting of lattice dynamics, which we briefly outline in section~\ref{sec:lattice}. Section~\ref{sec:conclusion} contains concluding remarks and open questions. \section{Lattice dynamics} \label{sec:lattice} Even though the new results of this paper are of local nature, we want to shortly outline the connection to dynamics on lattices. In particular, Miquel dynamics have originally been defined as an evolution of combinatorics on periodic $\Z^2$ lattices, and the study of Clifford lattices has taken place on the octahedral lattice, a sublattice of $\Z^3$.\\ Define the parity $|p|$ of a point $p = (p_1,p_2,p_3)\in \Z^3$ as follows: \begin{align} |\cdot|: \Z^3 \rightarrow \Z_2,\qquad |p| = \sum_{k=1}^3p_k \mod 2 \end{align} \begin{definition} The three dimensional \emph{octahedral lattice} $\Z_0^3$ consists of all points in $\Z^3$ that have even parity, together with edges between the nearest neighbours: \begin{align} V\left(\Z_0^3\right) &= \menge[p\in \Z^3]{|p| = 0}\\ E\left(\Z_0^3\right) &= \menge[(p,p')\in V\left(\Z_0^3\right) \times V\left(\Z_0^3\right)]{\max_{k=1,2,3} |p_k-p_k'| = 1 } \end{align} Define a \emph{level slice} $S_k$ of the octahedral lattice as the vertices with third coordinate in $\menge{k,k+1}$ together with the edges of $\Z_0^3$ that connect two different layers. \begin{align} V(S_k) &= \menge[p\in V\left(\Z_0^3\right)]{p_3 \in \menge{k,k+1}}\\ E(S_k) &= \menge[(p,p')\in E\left(\Z_0^3\right)]{p,p'\in V\left(\Z_0^3\right) \mbox{ and } p_3 \neq p'_3} \end{align} \end{definition} It is clear that such a level slice $S_k$ has the combinatorics of the $\Z^2$ lattice. As such, it can be bi-partitioned into the set of points which have $p_3 = k$ and the set of points which have $p_3=k+1$. \begin{align} S^0_k &:= \menge[p\in V\left(S_k\right)]{p_3 = k}\\ S^+_k &:= \menge[p\in V\left(S_k\right)]{p_3 = k+1} \end{align} It follows that $S_k$ and $S_{k+1}$ are two $\Z^2$ lattices that as subsets of the octahedral lattice agree on every second point, that is $S^+_k= S^0_{k+1}$.\\ Set $G=S_k\in \obs^*$ considering it as a surface graph. Then the combinatoric 4-mutation at every vertex in $S^0_k$ gives a new graph $G'$ isomorphic to $\Z^2$ which we can identify with $S_{k+1}$, such that $S^+_k = S^0_{k+1}$ and all the vertices we mutated at are in $S^0_k$ before mutation and in $S^+_{k+1}$ after mutation. In that sense mutation replaces a vertex with the vertex two steps into the 3-direction of the octahedral lattice.\\ Let $z \in \Ce^{V_k}$ be a drawing where $V_k = V(S_k)$. Then by the combinatorial identification above and the M\"obius mutation map this drawing determines a unique function $z: V\left(\Z_0^3\right) \rightarrow \Ce$ from the octahedral lattice to the complex plane. \begin{align} z(p_{x,y,z+1}) = \mob(z(p_{x+1,y+1,z}), z(p_{x+1,y-1,z}), z(p_{x-1,y-1,z}), z(p_{x-1,y+1,z}))(z(p_{x,y,z-1})) \end{align} Functions on octahedral lattices which are constructed as above have been characterized as discrete integrable systems in \cite{wolfgangclifford}. A system is called \emph{discretely integrable} if there exists a function on a lattice such that it satisfies a given set of local equations at each point in the lattice.\\ It is clear from the construction above that this is a 3-d integrable system in the sense that the data that determines the whole system (the Cauchy data) is 2-d, as we can choose freely the function on all points of a given slice in the octahedral lattice. In the case of circle patterns it is clear that we can choose as Cauchy data any circle pattern with the combinatorics of $\Z^2$. Such a circle pattern can be constructed row by row. Given a row, each circle center of the next row has to be on the bisector of the two corresponding intersection points of the given row, therefore there is a 1-dimensional real degree of freedom per circle. If we are interested in Kasteleyn circle patterns, then each circle center has to be chosen on an $\R^+$ ray and the Cauchy data is therefore still 2-d.\\ Given fixed star-ratios on $\Z^2 = S_k$, then Lemma \ref{lem:srmobius} asserts that we know the star-ratios on all slices $S_{k'}$ of the octahedral lattice. However, the knowledge of all the star-ratios on $\Z^2$ does not fix the drawing $z \in \Ce^{\Z_2}$. Instead, the fixed star-ratios determine a 2-d discrete integrable system themselves. Given the drawing $z$ on a strip $\Z \times \menge{l,l+1}$, the star-ratios determine the whole drawing on $\Z^2$. This strip is in fact the intersection of two level slices in two different directions. In this case, the prescription of real star-ratios corresponds to the case of circle patterns and the prescription of real and positive star-ratios corresponds to the case of Kasteleyn circle patterns.\\ An octahedral lattice constructed by the M\"obius mutation from given data on $\Z^2$ carries additional symmetry: The three space directions of the lattice are indistinguishable. This is a consequence of the symmetric nature of the M\"obius mutation map as explained in section \ref{sec:mobius}. In particular, if the star-ratios are the same on the two opposing stars in an octahedron of the lattice, then they are equal on all three stars in that octahedron. Moreover, if we prescribe real star-ratios in the given Cauchy data, then all the star-ratios of the whole lattice will be real, see Lemma \ref{lem:srmobius}. Therefore an octahedral lattice with real star-ratios induces three families of $\Z^2$ circle patterns, each family consisting of circle patterns related via Miquel dynamics. However, this symmetry does not hold for Kasteleyn circle patterns. If one level slice $S_k$ corresponds to a Kasteleyn circle pattern, then all the parallel slices are Kasteleyn as well, but the slices in the other directions are necessarily not Kasteleyn. This is an immediate consequence of the identities in equation \eqref{eq:sroctahedron}, which shows that positive star-ratios in one direction imply negative star-ratios in the other directions. \section{Main theorems} \label{sec:main} \begin{theorem} \label{th:miquelclifford} Let $G \in \obs$ be a graph, let $z\in \CP^G$ be a circle pattern of $G$ and let $z^* \in \Ce^F$ be the dual drawing induced by the circle centers of $z$. Let $f\in F$ be a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z^*$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common circle. Then the Miquel move at $f$ acts on the circle pattern such that the circle centers change as they do under the Clifford move: \begin{align} (\miq_f(z))^* = \cli_{f}(z^*) \end{align} \end{theorem} It is an implication of this theorem that the change of the circle centers does not depend on a particular choice of circles with these circle centers. That is, if $z_1,z_2 \in \CP^G$ are such that $z_1^*=z_2^*$, then: \begin{align} (\miq_f(z_1))^* = (\miq_f(z_2))^* \end{align} \begin{definition}\label{def:geometricdimer} Given a graph $G \in \obs$, the map $\psi:\CP^G\rightarrow\R_+^E$ associates edge weights to a circle pattern $z\in\CP^G$ as follows. \begin{align} \psi:\CP^G\rightarrow\R_+^E,\qquad (\psi(z))(e) = |z^*(f)-z^*(f')|\quad \forall e\in E,\ (f,f')=e^* \end{align} \end{definition} \begin{theorem} \label{th:miqueldimers} Let $G \in \obs$ be a surface graph, $z\in \CP^G$ a Kasteleyn circle pattern and $f \in F$ a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z^*$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common line. Then the edge weights $\omega = \psi(z) \in \R_+^E$ and $\tilde\omega = \psi(\miq_fz) \in \R_+^{\tilde E}$ are related by urban renewal. \end{theorem} We prove Theorem \ref{th:miquelclifford} and Theorem \ref{th:miqueldimers} at the end of section \ref{sec:miquel}. \section{Circle patterns and Miquel dynamics}\label{sec:miquel} In this section we prove the two main theorems by applying our previous results to the Miquel move. In Lemma \ref{lem:cphaverealsr} we have already proven that circle patterns feature real star-ratios, now we show that in the case of the sphere and the plane the reverse direction is true as well. \begin{lemma} \label{lem:realsrleadtocp} Let $G\in \obs$ such that it is a decomposition of the sphere $S^2$ or the plane $\R^2$. Let $y\in \Ce^F$ be a face drawing of $G$ such that all star-ratios of $y$ are real. Then there exists a two parameter family of drawings $z\in \CP^G$ which are circle patterns such that $z^* = y$. \end{lemma} \proof{Let $v_0\in V_G$ be a fixed vertex, $z_0\in \Ce$ and set $z(v_0) = z_0$. We prove that we can extend this uniquely to a circle pattern on all of $G$. If $y=z^*$ is given and $z(v)$ is given, then $z(v')$ is uniquely determined for all $(v,v')\in E_G$. This is because $z(v')$ is the reflection of $z(v)$ about the line through the two incident circle centers. As $G$ is connected, there is at most one circle pattern such that $z(v_0) = z_0$. It remains to show that this extension always exists. For this it is sufficient to check that around any cycle in $G$, the propagation of the drawing via reflections closes. As all cycles in $G$ can be generated by face cycles, it suffices to check the closing condition around face cycles. This however is an immediate consequence of the identification of the total reflection angle with the argument of the star-ratio as in Lemma \ref{lem:cphaverealsr}. \qed\\} Note that on surfaces like the torus, where cycles exist that are not generated by the face cycles, there need not exist a global circle pattern even if all the star-ratios are real. If it does exist, there will not necessarily be a one parameter family of circle patterns either.\\ \begin{figure}[th] \centering \begin{minipage}[b]{0.46\textwidth} \ggbmiquel \end{minipage} \begin{minipage}[b]{0.46\textwidth} \ggbmiquelmenelaus \end{minipage} \caption{The general Miquel configuration on the left and the Miquel-Menelaus configuration on the right, where triples of circle centers are on a line.} \label{fig:miquelmenelaus} \end{figure} In the next step, we show that the action of the Miquel move on the circle centers does not depend on a particular choice of circle pattern with these centers. \begin{lemma} \label{lem:independentofradii} If we fix the six circle centers of a Miquel configuration (see figure \ref{fig:miquelmenelaus}), one of the circle intersection points can be chosen arbitrarily in $\Ce$. \end{lemma} \proof{Choose the labeling of the Miquel configuration as in figure \ref{fig:miquelmenelaus}. We show that given $M,M_{12}, M_{23}, M_{34}, M_{14}$ then $M_{1234}$ is fixed no matter where we pick the intersection point $V_1$. Denote by $R_{AB}$ the reflection in the line through the points $A$ and $B$. Then all other intersection points arise as reflections of $V_1$ about lines through the given circle centers. In particular we have that: \begin{align} V_{123} = R_{M_{12}M_{23}}\circ R_{M_{12}M}\circ R_{M_{12}M_{14}}(V_{124}) \end{align} Of course, this composition of three reflections about three lines intersecting in the point $M_{12}$ is a reflection about a line $\ell_{12}$ itself. This line $\ell_{12}$ is the perpendicular bisector of $V_{123}$ and $V_{124}$ which is therefore independent of the choice of $V_{1}$. By the same argument we find the lines $\ell_{23}, \ell_{34}$ and $\ell_{14}$ as well. Finally, $M_{1234}$ is the intersection point of these four lines, which is therefore also independent of the choice of $V_{1}$.\qed\\ } Therefore the construction of the sixth circle center via Miquel dynamics does not require a realization by circles, knowing the five other circle centers is actually enough information. The next lemma is the last piece we need to prove our main theorems. \begin{figure}[th] \centering \ggblocalintegrability \caption{The Miquel configuration as we use it in the proof of Lemma \ref{lem:miquelsr}, case (ii).} \label{fig:localintegrability} \end{figure} \begin{lemma} \label{lem:miquelsr} Consider six circles in Miquel's configuration, then: \begin{align} \sr(M; M_{12}, M_{23}, M_{34}, M_{14}) = \sr(M_{1234}; M_{12}, M_{23}, M_{34}, M_{14}) \end{align} \end{lemma} \proof{We distinguish two cases: \begin{itemize} \item[(i)] In the slightly degenerate case that $M$ is on the line $M_{k-1,k}M_{k,k+1}$, we will employ Menelaus's theorem again. \item[(ii)] If that is not the case, we show that there is a choice of circles such that the Miquel configuration is actually a part of a $C_4$ configuration. \end{itemize} For the proof of case (i), let us relabel the indices such that $M\in M_{12}M_{23}$, see figure \ref{fig:miquelmenelaus}. The first consequence of $M\in M_{12}M_{23}$ is that $V_1=V_3$. The second consequence is that thus also $M\in M_{34}M_{14}$. We also note that by definition $V_{134} = V_{123} = V_1$. As a result, the perpendicular bisectors to $V_{124},V_{123}$ respectively $V_{124},V_{134}$ both coincide with the line $M_{12}M_{14}$. The same holds for the perpendicular bisectors to $V_{234},V_{123}$ respectively $V_{234},V_{134}$, which are both the line $M_{23}M_{34}$. Finally we have that $M_{1234} = M_{12}M_{14}\cap M_{23}M_{34}$ and we realize that the circle centers are in Menelaus's configuration, see figure \ref{fig:miquelmenelaus}.\\ In Menelaus's configuration we can use the same argument as in Lemma \ref{lem:cliffordmenelaus} to show that: \begin{align} \mr_1 &= \mr(M_{1234},M_{23},M_{34},M,M_{14},M_{12}) = -1\\ \mr_2 &= \mr(M_{1234},M_{34},M_{23},M,M_{12},M_{14}) = -1\\ \implies\qquad \f{\mr_1}{\mr_2} &= \f{\sr(M; M_{12},M_{23},M_{34},M_{14})}{\sr(M_{1234}; M_{12},M_{23},M_{34},M_{14})} = 1 \end{align} For the proof of case (ii) we show that: Given the six midpoints $M,M_{12}, M_{23}, M_{34},M_{14}, M_{1234}$ of a Miquel configuration in general position, there is a choice of $V_1$ such that the configuration can be extended to a Clifford four circle configuration. \\ To show that such a choice exists, we introduce a parameter $t\in [0,1]$ moving $V_1(t)$ along a small circle $q_1$ centered at $M_{12}$ and then use a continuity argument, see also figure \ref{fig:localintegrability}. In particular, we will show that the circles $c_{13}^2(t)$ and $c_{13}^4(t)$ defined by the point triplets $V_1(t),V_3(t),V_{123}(t)$ and $V_1(t),V_3(t),V_{134}(t)$ coincide for some $t_0$ and therefore the choice $V_1(t_0)$ determines a $C_4$ configuration.\\ Because all the intersection points are determined by reflections about lines given by the circle centers, if $V_1(t)$ moves along a circle so do the other intersection points. We also define the circles $q_3,q_{123},q_{134}$ as the trajectories of the points $V_3(t),V_{123}(t),V_{134}(t)$. Because $V_{134}(t)$ is given by the successive reflections of $V_1(t)$ about the lines $M_{12}M_{23}$ and $M_{12}M$ the circle $q_{134}$ is in fact the same one as $q_1$. We choose the radius of the circle $c_{12}$, and therefore of all trajectory circles small enough such that the circles $q_1,q_3$ and $q_{123}$ are disjoint. It suffices to show that none of the centers $m_1,m_3,m_{123}$ of these circles coincide. Because $m_3$ is the reflection of $m_1=M_{12}$ about the line $MM_{34}$, these two could only coincide if $M,M_{12},M_{34}$ were collinear, which we have treated in case (i). Similarly, if $m_{123} = m_1$ or $m_{123} = m_3$, then $M,M_{14}, M_{34}$ would be collinear.\\ Now if we choose the circle radii very small, it is clear that of the two intersection points of $c_{13}^2(t)$ with $q_1$, one moves clockwise and one moves counter clockwise on $q_1$. Because $V_{134}(t)$ is a constant rotation away from $V_1(t)$ on $q_1$, both travel in the same direction on $q_1$. Therefore $V_{134}(t)$ will be on $c_{13}^2(t)$ for some $t$ which we can therefore select as $t_0$. Because $c_{13}^2(t_0)$ and $c_{13}^4(t_0)$ have the three points $V_1(t_0),V_3(t_0), V_{134}(t_0)$ in common they are in fact the same.\\ This proves that we can choose the intersection points such that $M,M_{12}, M_{23}, M_{34},M_{14}, M_{1234}$ are centers of a Clifford four circle configuration and thus it proves this case due to Lemma \ref{lem:dualsr}. \qed\\ } We have now shown that indeed the Miquel move on the circle centers acts as the M\"obius mutation does. As in the previous section, let us put this into a lemma. \begin{lemma} \label{lem:miquelmobius} Let $G\in \obs$ be a graph, $z\in \Ce_0^G$ be a circle pattern and let $f\in F$ be a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z^*$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common line. The M\"obius move (see definition \ref{def:miquelmove}) coincides with the M\"obius mutation map on the induced face drawing $z^*$: \begin{align} (\miq_f(z))^* = \mob_f(z^*) \end{align} \end{lemma} As in the case of the Clifford move, it is possible to interpret the M\"obius mutation map as the extension of the Miquel move on the circle centers to the degenerate case that all the five centers are on a common line.\\ We can now proceed to prove the two main theorems. As a short reminder, Theorem \ref{th:miquelclifford} states that the Miquel and the Clifford move coincide and Theorem \ref{th:miqueldimers} states that the Miquel move behaves like urban renewal on the dimer model induced by the dual edge lengths. \proof[P\textbf{roof of Theorem \ref{th:miquelclifford}}]{ Let $z$ be a circle pattern of $G\in \obs$ and $f$ be a valid face. In Lemma \ref{lem:cliffordmobius} and Lemma \ref{lem:miquelmobius} we have proven the following two equalities: \begin{align} \cli_f(z^*) &= \mob_f(z^*)\\ (\miq_f(z))^* &= \mob_f(z^*) \end{align} Together these two equations imply the theorem, namely that: \begin{align} \cli_f(z^*) = (\miq_f(z))^* \end{align} \qed\\ } \proof[P\textbf{roof of Theorem \ref{th:miqueldimers}}]{ In the case of a Kasteleyn circle pattern $z\in \CP^G$ all the star-ratios of $z^*\in \Ce^F$ are real and positive. Therefore in this case, the star-ratios only depend on the absolute values of the differences. Thus, if we consider the dimer edge weights $\psi$ on $G$ given by $z$ as in definition \ref{def:geometricdimer}, we conclude that: \begin{align} (\tau(\psi(z)))(v) = (\sr(z^*))(v^*) \qquad \forall v \in V \end{align} Hence, the star-ratios are indeed the face weights of the associated dimer model. We have proven that the star-ratios transform under the Miquel move as they do under the M\"obius mutation map in Lemma \ref{lem:srmobius}. In the case that the star-ratios are real, these are indeed real formulae as well. We observe that they are exactly those of Lemma \ref{lem:urbanfaceweights} on the change of face weights $\tau$ in urban renewal. Thus the theorem is proven.\qed\\ } \section{The star-ratio preserving M\"obius map} \label{sec:mobius} In this section we introduce M\"obius maps that preserve star-ratios. In particular we are interested in the following problem: Given five points $z,z_1,z_2,z_3,z_4 \in \Ce$, where are all points $\tilde z \in \Ce$ such that the star-ratio of $z,z_1,z_2,z_3,z_4$ and $\tilde z,z_1,z_2,z_3,z_4$ are the same? It turns out that there is at most one such $\tilde z \neq z$, and that $\tilde z$ can be expressed as a fractional linear transform of $z$ with coefficients consisting of $z_1,z_2,z_3$ and $z_4$. This motivates the definition a unique non-trivial M\"obius map that takes any $z$ to $\tilde z$ for fixed $z_1,z_2,z_3,z_4$. \begin{definition} Given four points $z_1,z_2,z_3,z_4$ such that $z_k\neq z_{k+1}$, we define the \emph{M\"obius mutation map} $\mob(z_1,z_2,z_3,z_4)$. \begin{align} \mob(z_1,z_2,z_3,z_4): \Ce \rightarrow \Ce,\qquad z \mapsto\f{zC_2 +C_3}{zC_1-C_2 } \end{align} The coefficients are the following homogeneous polynomials in the four points $z_k$: \begin{align} C_1 &= z_1-z_2+z_3-z_4\\ C_2 &= z_1z_3-z_2z_4\\ C_3 &= z_2z_3z_4-z_1z_3z_4+z_1z_2z_4-z_1z_2z_3 \end{align} \end{definition} Of course, a fractional linear transform only corresponds to a M\"obius map if the determinant given by ${-C_2^2-C_1C_3}$ is not zero. However, the determinant is non vanishing because it factors as follows: \begin{align} \det \mob(z_1,z_2,z_3,z_4) = (z_1-z_2)(z_2-z_3)(z_3-z_4)(z_4-z_1) \end{align} Notice that the trace of the M\"obius mutation map is zero, consequently it can not be the identity. If $z_1\neq z_3$ or $z_2 \neq z_4$ then the M\"obius mutation map is the unique map that maps $z_k$ to $z_{k+2}$. It is straight-forward to verify that the map interchanges the points as stated. Because we have prescribed the image of at least three points, the map is also unique. If $z_1 = z_3$ and $z_2 = z_4$ then the mutation map is the unique map that has $z_1$ and $z_2$ as fixed points and that sends the point $\f12(z_1+z_2)$ to the point at infinity. \begin{lemma} \label{lem:srmobius} Let $z_1,z_2,z_3,z_4 \in \Ce$ such that $z_k\neq z_{k+1}$ and let $z\in \Ce$ be such that $z\neq z_k$ for any of the four points. Then the M\"obius mutation map and the identity are the unique M\"obius maps $M: \Ce\rightarrow\Ce$ such that the following relation holds: \begin{align} \f{\sr(z;z_1,z_2,z_3,z_4)}{\sr(M(z);z_1,z_2,z_3,z_4)}=1\label{eq:srsame} \end{align} \end{lemma} \proof{Notice that the quotient of star-ratios is decomposable into cross ratios as follows: \begin{align} \f{\sr(z;z_1,z_2,z_3,z_4)}{\sr(M(z);z_1,z_2,z_3,z_4)} =\cro(z,z_1,M(z),z_2)\cro(z,z_3,M(z),z_4) \end{align} Therefore, if $M$ satisfies equation \eqref{eq:srsame}, it will do so also after some other M\"obius map has been applied. Hence we can assume that no point is at infinity. In that case, equation \eqref{eq:srsame} is a quadratic equation for $M(z)$ and a simple calculation shows that indeed $M = \mob(z_1,z_2,z_3,z_4)$ or $M$ is the identity. These are the only possibilities because there are at most two solutions.\qed } \begin{definition} Let $G\in \obs$, $z$ a face drawing and let $f\in F$ be a valid face of $G$. Extend the definition of the M\"obius mutation map to the setting of surface graphs and mutations as follows: \begin{align} \mob_f: \Ce^F \rightarrow \Ce^{\tilde F}, \qquad(\mob_f(z))(f') = \begin{cases} \mob(z(f_1),z(f_2),z(f_3),z(f_4))(z(f)) & f' = f\\ z(f') & f' \neq f \end{cases} \end{align} \end{definition} \begin{figure}[ht] \centering \ggbsroctahedron \caption{The octahedron which is reflected onto itself by the M\"obius mutation map $\mob(z_1,z_2,z_{\bar{1}}, z_{\bar{2}})$.} \label{fig:octahedronquiver} \end{figure} \begin{lemma} \label{lem:srmutation} Let $G\in \obs$, $z$ a face drawing and let $f\in F$ be a valid face. Let the tilde denote the quantities on the mutated graph $\widetilde G = \mut_f G$. Under M\"obius mutation, the star-ratios change according to the following relations: \begin{align} \widetilde\sr(\tilde z)(f') = \begin{cases} (\sr(z))^{-1}(f') & f'=f\\ \sr(z)(f') (1+ \sr(z)(f)) & (f',f) \in E\\ \sr(z)(f') (1+ (\sr(z)(f))^{-1})^{-1} & (f, f') \in E\\ \sr(z)(f') & \mbox{else}\\ \end{cases} \end{align} \end{lemma} \proof{Let $f \in F$ be as in the lemma with $(f_1,f),(f,f_2),(f_3,f),(f,f_4) \in E^*$. Introduce the 3-cube $H_3 \in \obs$, its dual is the octahedron. The faces of $H_3$ are $F_O = \menge{g_1,g_{\bar1},g_2,g_{\bar2},g_3,g_{\bar3}}$ as in figure \ref{fig:octahedronquiver}. Choose a face drawing $z'\in \Ce^{F_O}$ by writing $z'_k=z(u_k)$ and by imposing the following relations: \begin{align} z'_2 &= z(f_1),\ z'_3 = z(f_2),\ z'_{\bar2} = z(f_3),\ z'_{\bar3} = z(f_4)\\ z'_1 &= z(f),\ z'_{\bar1} = \mob(z'_2, z'_3,z'_{\bar2}, z'_{\bar3})(z'_1) \end{align} By the definition of the M\"obius mutation map we can deduce the following symmetric action of the mutation map on the octahedron. \begin{align} z'_{\bar{k}}&=\mob(z'_l,z'_m,z'_{\bar{l}}, z'_{\bar{m}})(z'_k)\qquad \forall k,l,m \in \menge{1,2,3},\ l\neq m \end{align} Indeed, it does not matter which two pairs of opposite points we choose to define the mutation map. \begin{align} \mob(z'_k,z'_l,z'_{\bar{k}}, z'_{\bar{l}}) = \mob(z'_m,z'_n,z'_{\bar{m}}, z'_{\bar{n}})\qquad\forall k,l,m,n \in \menge{1,2,3},\ k\neq l,\ m\neq n \end{align} Denote by $\sr'_k = (\sr(z'))(g_k)$ the star-ratios of the cube and by $\sr_k = (\sr(z))(f_k)$ the star-ratios in the graph $G$. Lemma \ref{lem:srmobius} already ensures that $\sr'_k = \sr'_{\bar k}$. Additionally, a direct calculation shows that if we know $\sr_1$ we also know $\sr_2$ and $\sr_3$: \begin{align} \sr'_3 = -(1+(\sr'_1)^{-1}),\quad \sr'_2 = -(1+\sr'_1)^{-1}\label{eq:sroctahedron} \end{align} We identify the star-ratios $\sr$ of the cube with the star-ratios $\widetilde{\sr}$ before and after mutation at $f$ in $G$. \begin{align} \sr_1 & = \sr'_1\\ \widetilde\sr_1 &= (\sr'_{\bar1})^{-1}\\ \f{\sr_1}{\widetilde\sr_1} = \f{\sr_3}{\widetilde\sr_3} &= {-\sr'_3}\\ \f{\sr_2}{\widetilde\sr_2} = \f{\sr_4}{\widetilde\sr_4} &= {-\sr'_2} \end{align} Inserting the expressions from equation \eqref{eq:sroctahedron} yields the statement of the lemma. \qed\\ } Let us summarize what we have proven in this section. We have shown that for four points $z_1,z_2,z_3,z_4$ in valid position there exists a unique non trivial M\"obius map that preserves star-ratios with respect to the four points. If we use this map together with a mutation of combinatorics, we know that the star-ratios transform as in Lemma \ref{lem:srmutation}. \\It is our goal to identify star-ratios and face weights of dimer statistics. Due to the results of this section, it will suffice to show that the maps of Clifford and Miquel moves preserve the star-ratio of the face where the move is based at. \section*{Funding} This research was supported by the Deutsche Forschungsgemeinschaft (DFG) Collaborative Research Center TRR 109 ``Discretization in Geometry and Dynamics''. \section*{Acknowledgments} The author would like to thank Ananth Sridhar, Boris Springborn, Wolfgang Schief and Jan Techter for discussions and good advice. \bibliographystyle{alpha} \section{Preliminaries} \label{sec:prelim} \subsection{Dimer statistics}\label{subsec:dimers} Given a graph $G = (V,E)$ we call a function $\omega: E\rightarrow \R_+$ an \emph{edge weight function}, where $\R_+$ is the set of strictly positive reals. Equivalently, we write $\omega\in \R_+^{E}$ and call $\omega$ the \emph{edge weights}. \begin{definition} A \emph{perfect matching} of a simple graph $G=(V,E)$ is a subset $M\subset E$ is a subset of the edge set such that each vertex of the graph is incident to exactly one edge in $M$. We denote the set of perfect matchings of a graph by $\mathcal M(G)$. The \emph{weight} $\omega(M)$ of a perfect matching $M$ with respect to edge weights $\omega$ is: \begin{align} \omega(M) = \prod_{e\in M} \omega(e) \end{align} The \emph{dimer partition function} $Z_G$ is defined : \begin{align} Z_G: \R_+^{E} \rightarrow \R_+,\qquad \omega \mapsto \sum_{M\in \mathcal M(G)}\omega(M) \end{align} The \emph{probability} $P_\omega(M)$ of a perfect matching is proportional to its weight with the partition function as normalization constant. \begin{align} P_\omega(M) = \f{\omega(M)}{Z_G(\omega)} \end{align} \end{definition} \subsection{Bipartite surface graphs $\obs$} We start by defining the class $\obs$ of bipartite surface graphs for which we prove our lemmas and theorems. \begin{definition} \label{def:surface} A graph $G = (V,E)$ embedded in an oriented and closed surface is in $\obs$ if: \begin{itemize} \item The complement of $G$ is a collection $F$ of disjoint open disks, and $(V,E,F)$ is a locally finite CW-decomposition of the surface. \item $G$ is bipartite, that is the set of vertices $V$ is the disjoint union of the two independent sets $V^+$ and $V^-$. \item Every vertex in $V$ has degree at least 3 and every face has degree at least 2. \end{itemize} \end{definition} In order to simplify notation we assume that we can identify an edge $e\in E$ with its two incident vertices $v$ and $v'$ and therefore write $e =(v,v')$. Similarly for dual edges $e^*\in E^*$ we write $e^* = (f,f')$ where $f$ and $f'$ are the two faces incident to $e$. We usually consider edges at some distinct face $f_0$, and the cyclic order of edges around $f_0$ will usually clear up any confusion.\\ We also use a standard orientation of the edges of both $G$ and the dual $G^*$. An edge $e=(v^-,v^+)$ is always incident to a vertex $v^+\in V^+$ and a vertex $v^-\in V^-$, and we orient that edge as pointing from $v^-$ to $v^+$. Each dual edge $e^*$ is oriented such that it crosses the oriented primal edge $e$ from the left to the right. As a consequence, the dual edges are oriented counter clockwise around vertices in $V^+$ and clockwise around vertices in $V^-$. For an example of the standard orientation see figure \ref{fig:orientationexample}. \begin{figure}[th] \centering \ggborientationexample \caption{An excerpt of a circle pattern $z\in \CP^G$, $G\in \obs$. The vertices in $V^+$ ($V^-$) are colored black (white), the circle centers which correspond to faces of $G$ are colored gray. Edges of $G$ are drawn with black arrows and edges of $G^*$ with gray arrows. The direction of an arrow indicates the orientation of the edge.} \label{fig:orientationexample} \end{figure} \begin{figure}[th] \centering \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb00000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb10000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb11000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb10100 \end{minipage}\\ \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb11111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb01111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb00111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmutationcomb01011 \end{minipage} \caption{The eight local configurations up to rotations at a face $f$ with four neighbours. The black edges are the edges in $N_f$ of the primal graph $G\in \obs$. The gray arrows are the edges of the dual graph $G^*$. In each column the bottom configuration is the mutation of the upper one and vice versa. Under mutation the set of faces is preserved, and the outer four faces are connected to the rest of $G$.} \label{fig:mutationcombinatorics} \end{figure} \begin{definition} \label{def:edgeneighbours} Let $G\in \obs$ and let $f \in F$ be a quadrilateral with the four neighbours $f_1,f_2,f_3,f_4$. Then we define the \emph{edge neighbourhood $N_f$} of $f$ as the set of edges that is not incident with any other face except $f_1,f_2,f_3,f_4$ or $f$. The dual edge neighbourhood $N^*_f$ is the set of edges dual to edges in $N_f$. \end{definition} \begin{definition} Given $G\in\obs$ and a quadrilateral $f\in F$ we denote by $\mut_fG\in \obs$ the graph resulting from the \emph{4-mutation at $f$}. It differs from $G$ by a local change of combinatorics centered at $f$. We will write $\tilde G = \mut_f G$ and $\tilde G = (\tilde V,\tilde E, \tilde F)$. The face set is invariant under mutation $\tilde F = F$, and therefore it is easiest to describe the change in combinatorics with respect to the dual of $G$: \begin{align} \tilde E^* = E^*\ \Delta\ \menge{(f_1,f_2),(f_3,f_2),(f_3,f_4),(f_4,f_1)} \end{align} Where $\Delta$ denotes the symmetric difference operator. Figure \ref{fig:mutationcombinatorics} shows all eight possible configurations and their relation by mutation. The mutation at $f$ only affect edges in $N_f$ and only inserts or deletes vertices incident to $f$. The mutation is an involution i.e., $G = \mut_f \tilde G$. \end{definition} The term mutation is borrowed from the theory of cluster algebras, where the 4-mutation corresponds to the mutation at a degree four vertex. Indeed, both dimer statistics and Miquel dynamics may be formulated in the language of cluster algebras. We refrain from doing so because we do not need to use any results from the theory of cluster algebras in this paper. \subsection{Urban renewal} Because mutation at a quadrilateral $f$ only affects the edges in $N_f$, the complementary sets $N^\mathsf{c}$ and $\tilde N^\mathsf{c}$ can be identified. Therefore we are able to compare a matching $M_0\in \mathcal M(G)$ with a matching $M$ from $\mathcal M(G)$ or $\mathcal M(\tilde G)$ by comparing their restrictions to $ N_f^\mathsf{c}$. If $M_0$ and $M$ agree on $N_f^\mathsf{c}$, we write $M_0 \sim_f M$. \begin{definition} \label{def:urbanrenewal} Fix a quadrilateral $f\in F$ and consider two edge weight functions $\omega \in \R_+^{E}$ and $\tilde\omega \in \R_+^{\tilde E}$. We say they are \emph{related by urban renewal} if the following two conditions are satisfied:\\ \begin{itemize} \item[(i)] For all $e\in N_f^\mathsf{c}: \quad \omega(e) = \tilde\omega(e)$ \item[(ii)] For any fixed matching $M_0\in \mathcal{M}(G)$: \begin{align} \sum_{\substack{M \in\mathcal{M}(G)\\M \sim_f M_0 } }P_\omega(M) = \sum_{\substack{M \in\mathcal{M}(\tilde G)\\M \sim_f M_0 } }P_{\tilde\omega}(M) \end{align} \end{itemize} \end{definition} \begin{definition} For a graph $G\in \obs$ we define the \emph{face weight function} $\tau$ as an alternating ratio of the edge weights as follows: \begin{align} \tau: \R_+^{E} \rightarrow \R_+^{F}, \qquad (\tau(\omega))(f) = \prod_{\substack{e\in E\\e^*=(f,f')}} \omega(e) \prod_{\substack{e\in E\\e^*=(f',f)}} \left(\omega(e)\right)^{-1} \end{align} The first product is over the edges whose duals point into $f$ and the second product is over edges whose duals point away from $f$, where we use the orientation of the dual edges described in definition \ref{def:surface}. \end{definition} The next lemma relating urban renewal and face weights is well known \cite{propp, dimerintegrable}. \begin{lemma} \label{lem:urbanfaceweights} Consider two edge weight functions $\omega \in \R_+^{E}$ and $\tilde\omega \in \R_+^{\tilde E}$ that agree on all $e\in N^\mathsf{c}$. Adopt the following abbreviations: $\tau_f = (\tau(\omega))(f)$ and $\tilde\tau_f = (\tau(\tilde\omega))(f)$. Then $\omega$ and $\tilde{\omega}$ are related by urban renewal if and only if the face weights $\tau$ before and the face weights $\tilde \tau$ after mutation are related as follows: \begin{align} \tilde\tau_{f'} = \begin{cases} \tau^{-1}_{f'} & f'=f\\ \tau_{f'} (1+ \tau_f) & (f',f) \in E_G\\ \tau_{f'} (1+ \tau^{-1}_f)^{-1} & (f, f') \in E_G\\ \tau_{f'} & \mbox{else}\\ \end{cases} \end{align} \end{lemma} \subsection{Circle patterns} \begin{definition} Let $G$ be a simple graph and $z: V_G\rightarrow \Ce$. Then we call $z$ a \emph{vertex drawing of $G$} if no two adjacent vertices are mapped to the same point. Similarly, if $z: F_G\rightarrow \Ce$ is a map such that no two adjacent faces are mapped to the same point we call this a \emph{face drawing of $G$}. \end{definition} We work with circles in $\Ce$, which encompass both the euclidean circles and the straight lines of $\R^2$ which we identified with $\C = \Ce \setminus \menge{\infty}$. We call the reflection of $\infty$ about a circle the circle center. Therefore the center of a straight line is $\infty$. \begin{definition} Let $z$ be a vertex drawing of $G\in \obs$. We call $z$ a \emph{circle pattern} if two conditions are fulfilled: The first condition is that for each face $f\in F$, the vertices incident to $f$ are mapped to a common circle in $\Ce$. This allows us to define a map $z^* \in \Ce^F$ that maps each face of $G$ to the corresponding circle center in $\Ce$. The second condition for $z$ to be a circle pattern is that $z^*$ is a face drawing of $G^*$. We denote the set of circle patterns of $G$ by $\CP^G$. \end{definition} For an example of a circle pattern see figure \ref{fig:orientationexample}. \begin{definition} Let $G\in \obs$, then the \emph{star-ratio} $\sr$ is a map from $\Ce^F$ to itself: \begin{align} \sr: \Ce^F \rightarrow \Ce^F,\quad (\sr(z))(v) = -\f{\prod_{(v', v) \in E} (z(v')-z(v))}{\prod_{(v, v') \in E} (z(v')-z(v))} \end{align} For computations we will also sometimes write: \begin{align} \sr(y;y_1,y_2,y_3,y_4) = -\f{(y_1-y)(y_3-y)}{(y_2-y)(y_4-y)} \end{align} Where $y,y_1,y_2,y_3,y_4$ are all in $\Ce$. \end{definition} In this definition we use the standard approach of M\"obius geometry in which infinities cancel and division by zero yields infinity. \begin{lemma} \label{lem:cphaverealsr} Given $G\in \obs$ and a circle pattern $z\in \CP^G$, the star-ratios of the dual drawing $z^*\in \Ce^F$ are real. That is: \begin{align} \forall f\in F: \qquad (\sr(z^*))(f) \in \R \end{align} \end{lemma} \proof{Let $v_1, v_2,...,v_{2n}$ be the vertices incident to $f$ and $f_1, f_2,...,f_{2n}$ the incident faces, then $z(v_{k+1})$ is the reflection of $z(v_k)$ about the line through $z^*(f)$ and $z^*(f_k)$. Because $v_{2n+1} = v_{1}$, the concatenation of all reflections is the identity. The argument of the star-ratio is exactly $\pi$ plus half of the sum of the reflection angles and is therefore in $\pi \Z$.\qed\\ } \begin{definition} We call a circle pattern $z\in \CP^G$ of $G\in\obs$ \emph{Kasteleyn} if and only if all the star-ratios of $z^*\in \Ce^F$ are real positive. \end{definition} The usage of the term Kasteleyn is justified because if one would use the complex vectors of the oriented differences between circle centers as weights in an adjacency matrix, this matrix would be Kasteleyn-flat \cite{kasteleyn,kuperberg}. The square root of the determinant of a Kasteleyn-matrix counts weighted perfect matchings.\\ Furthermore, any circle pattern $z\in \CP^G$ such that the drawing $z$ is an embedding of $G$ into $\C$ is Kasteleyn. Therefore a natural and well investigated class of Kasteleyn circle patterns does indeed exist.\\ \begin{figure}[h] \centering \begin{minipage}[b]{0.22\textwidth} \ggbmiqcomb00000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmiqcomb10000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbcliffordcomb00000 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbcliffordcomb10100 \end{minipage}\\ \begin{minipage}[b]{0.22\textwidth} \ggbmiqcomb11111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbmiqcomb01111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbcliffordcomb11111 \end{minipage} \begin{minipage}[b]{0.22\textwidth} \ggbcliffordcomb01011 \end{minipage} \caption{On the left we have two examples of configurations before (on top) the Miquel move and after (below) the Miquel move. The edges of $G$ are drawn in black, notice that the quadrilaterals have a different set of legs. On the right side we see two examples of the Clifford move, where the arrows indicate the oriented dual edges.} \label{fig:geometrymoves} \end{figure} \begin{definition} Let $G\in \obs$ and $z$ be a face drawing of $G$. Then we call a face $f\in F$ a \emph{valid face} if the following two conditions are fulfilled: \begin{itemize} \item The face $f$ has exactly four neighbours $f_1,f_2,f_3,f_4$, which are listed here in the cyclic order with respect to the orientation of the graph. \item No two consecutive faces are mapped to the same point, that is $z(f_k) \neq z(f_{k+1})$ for all four values of $k$. \end{itemize} \end{definition} We will now introduce the Miquel and the Clifford move which are based on Miquel's six circle theorem respectively Clifford's four circle theorem. They locally alter the geometry and are accompanied by a mutation of the combinatorics. For examples see figure \ref{fig:geometrymoves}. Miquel's six circle theorem states that given the four circles $c_1,c_2,c_3,c_4$ and their four pairs of intersection points $\menge{I_k,\tilde I_k} = c_k\cap c_{k+1}$, then: If the four points $I_1,I_2,I_3,I_4$ are on a circle $c$ then $\tilde I_1,\tilde I_2,\tilde I_3,\tilde I_4$ are on a circle $\tilde c$. The Miquel move replaces the circle $c$ with the circle $\tilde c$. For the definition of the Miquel move, denote the center of $c$ by $M$ and the center of $\tilde c$ by $\tilde M$. \begin{definition}\label{def:miquelmove} Let $G\in \obs$, $z\in \CP^G$ be a circle pattern and $f\in F$ a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common line. Let $v_1,v_2,v_3,v_4$ be the four vertices incident to $f$. Identify $z^*(f) = M$ with the center of circle $c$ in Miquel's six circle theorem. Also identify $z(v_k)$ with $I_k$. Then the \emph{Miquel move} replaces the circle associated to $f$ with the alternate one that exists due to Miquel's theorem: \begin{align} \miq_f&: \CP^G \rightarrow \CP^{\tilde G}\\ \qquad (\miq_f(z^*))(f') &= \begin{cases} \tilde M & f' =f\\ z^*(f') & f' \neq f \end{cases}\\ \qquad (\miq_f(z))(v') &= \begin{cases} \tilde I_k & v' = v_k\\ z(v') & v' \neq v \end{cases} \end{align} \end{definition} Clifford's four circle theorem considers circles $c_1$ to $c_4$ that intersect in one common point $I$. Therefore the four pairs of intersection points of subsequent circles are $\menge{I,J_{k,k+1}} = c_k\cap c_{k+1}$. There are two more intersection points $J_{k,k+2} = c_k\cap c_{k+2}$. Define the additional four circles $\tilde c_k = (J_{k,k+1},J_{k-1,k}, J_{k-1,k+1})$. Clifford's four circle theorem states that in fact all four circles $\tilde c_k$ intersect in one point $\tilde I$. \begin{definition}\label{def:cliffordmove} Let $G \in \obs$ be a graph and $z\in \Ce^F$ be a face drawing of $G$ and $f\in F$ a valid face with the four neighbours $f_1,f_2,f_3,f_4$, such that $z$ does not map the five points $f,f_1,f_2,f_3,f_3$ to a common circle. Identify $z(f) = I$ and $z(f_k) = J_{k,k+1}$ with the intersection points in Clifford's four circle theorem above, then set $(\cli_f(z))(f) = \tilde I$. This defines the \emph{Clifford move}. \begin{align} \cli_f: \Ce^F \rightarrow \Ce^{\tilde F}: \qquad (\cli_f(z))(f') = \begin{cases} \tilde I & f' =f\\ z(f') & f' \neq f \end{cases} \end{align} \end{definition}
\section{Introduction} The sizes of galaxies reflect their assembly histories and their connection to their dark matter halos \citep{Mo1997TheDisks,Kravtsov2012TheGalaxies,Jiang2018IsSize}. Different modes of assembly of stars in galaxies lead to a different growth of their radii: passive evolution will cause no significant growth in size or mass, but only a maturation of the existing stellar population; dry major mergers lead to a proportional growth in size and mass as the two bodies come to dynamic equilibrium; and dry minor mergers increase the size of galaxies more rapidly by building an outer envelope \citep{Bezanson2009,Naab2009MinorGalaxies}. When gas physics are considered the evolution can be more complex; e.g., ``wet" gas-rich mergers may trigger compact starbursts leading to larger post-merger disks \citep{Hernquist1989TidalGalaxies,Robertson2005AFormation}, while gas flows to the central regions may both form compact bulges and feed a central black hole \citep{Efstathiou1982TheGalaxies,Dekel2013WetNuggets,Barro2017SpatiallyObservations}. The size of a galaxy may also hold information on the properties of the dark matter halo; galaxy size may be proportional to the halo virial radius as a result of conservation of angular momentum during the collapse and cooling of a galaxy \citep{Mo1997TheDisks,Dutton2006AExpansion,Shankar2011SizeUniverse,Kravtsov2012TheGalaxies,Porter2014UnderstandingGalaxies,Somerville2017a}, although it is unclear whether this expected correlation is actually preserved in the galaxy formation process \citep{DeFelippis2017TheSimulation, Jiang2018IsSize}. Observationally, the sizes of galaxies have been found to vary significantly with galaxy mass, color (or star formation activity) and redshift. Generally, the sizes are larger for galaxies that are more massive, galaxies that are forming stars, and galaxies at lower redshift \citep{Kormendy1996,Shen2003TheSurvey,Ferguson2003TheGalaxies,Trujillo2005TheFIRES,Elmegreen2007ResolvedRedshift,Williams2009TheZ=2,Mosleh2017Connection=2,Ono2012Evolution7,VanderWel2014a,Bernardi2012SystematicMorphology,Carollo2013,Lange2014GalaxyZ}. At intermediate masses, the slope of the size-mass relation is found to be shallow for star forming galaxies ($r_{\rm eff} \propto M^{0.2}_{\star}$) and steeper for quenched galaxies ($r_{\rm eff} \propto M^{0.8}_{\star}$), where $r_{\rm eff}$ is the half-light radius. Both galaxy types exhibit a large intrinsic scatter in the size-mass relation at all redshifts \citep{VanderWel2014a}. The slope of the size-mass relation of star forming galaxies is similar to the growth track of individual galaxies, both in observations and simulations \citep{Lilly1997HubbleZ=1,Ravindranath2004EvolutionDistribution,Trujillo2005TheFIRES,VanDokkum2015_compactmassive}. Following quenching galaxies follow a steeper growth track in the size-mass plane, probably because dry minor mergers rapidly increase the size \citep[see][]{Hilz2012HowFraction,Carollo2013,VanDokkum2015_compactmassive}. Physically, the central stellar density has been proposed as a key parameter connecting galaxy morphology and star formation histories \citep{Bezanson2009,Carollo2013,Fang2013AGalaxies,VanDokkum2014_densecore,Whitaker2016}. Galaxies with high central densities are found to be redder with lower specific star formation rate than bluer galaxies at a given redshift. A possible explanation is that feedback mechanisms that shut off star formation are more effective when the central density becomes high \citep[e.g.,][]{Croton2005TheGalaxies,Conroy2014PreventingHeating}. Whether the same processes operate in the most massive galaxies, here defined as galaxies with $M_{\rm\star}>2\times 10^{11}$\,M$_{\odot}$, is still an outstanding question. \citet{Carollo2013} present a comprehensive analysis of the sizes of galaxies at 0.2$<$z$<$1 in the COSMOS field, measured from the ACS F814W imaging. Out to $z\sim 1$ nearly all such galaxies are found to be quiescent \citep{Hahn2014PRIMUS:0.8}. At higher redshift this mass range is not commonly studied, as their number is low in the fields that have been observed so far with \textit{Hubble Space Telescope} (HST) in the near-IR. \citet{VanderWel2014a} studied the mass-size relation in the 3D-HST/CANDELS fields, and finds that the most massive star forming and quiescent galaxies at $z\sim 2.5$ have similar sizes. That is, the ``rule'' that star forming galaxies are larger than quiescent galaxies appears to not apply at the highest masses and redshifts. However, given the small number of galaxies with masses $>2\times 10^{11}$\,M$_{\odot}$ found within extragalctic pencil-beam studies, this is largely driven by the extrapolation of trends seen at lower masses; essentially, the fitted relations to lower mass galaxies intersect at $M_* \sim 5\times 10^{11}$\,M$_{\odot}$. Recently \citet{Faisst2017} studied the sizes of galaxies in this mass range out to $z\sim 2$ using ground-based imaging, calibrated with HST data in smaller fields. They find similar results as \citet{VanderWel2014a}. Similarly, \citet{Hill2017} study the size evolution of galaxies since $z\sim 5$ using number density-matched samples, again consistent with previous size measurements in smaller fields. Here we build on these previous studies by studying the most massive galaxies out to $z\sim 3$ with a new wide-field HST survey, COSMOS-Drift And SHift (DASH). COSMOS-DASH provides the large area and high resolution needed for structural study of massive galaxies at $1.5 \leq z \leq 3.0$. It is a wide and medium depth survey using the near-infrared channel of Wide Field Camera 3 (WFC3) on HST, utilizing a novel drift-and-shift technique. COSMOS-DASH covers 0.49 deg$^2$ of the UltraVISTA \citep{McCracken2012} deep stripes in the COSMOS field down to $H_{160}=25.1$, or 0.66 deg$^2$ when archival data are included \ref{tab:archival}, tripling the extragalactic survey area observed by HST in the near-IR \citep{Momcheva2016a}. The paper is structured as follows. In Section \ref{sec:dash} we give a brief description of the COSMOS-DASH survey. In Section \ref{sec:sample}, the selection of the massive galaxy sample and the separation of quenched galaxies from the star forming galaxies are described. Section \ref{sec:size} goes into the details of the size measurement of galaxies using COSMOS-DASH images. Analysis of the evolution of size-mass relation is described in Section \ref{sec:evolution}, while in Section \ref{sec:discussion} we interpret the results in the context of the termination of star formation in the most massive galaxies. In this paper, we assume a $\Lambda$CDM cosmology with $\Omega_{\rm m}=$ 0.3, $\Omega_{\Lambda}=$ 0.7, and $H_0=$ 70 km s$^{-1}$ Mpc$^{-1}$. \section{COSMOS-DASH} \label{sec:dash} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{dash_wht.png} \caption{The COSMOS-DASH $H_{160}$ mosaic. The science image is shown in the main figure, along with the exposure map in the colored inset. Zoomed-in portions of the science image are shown as well. The area contributed by COSMOS-DASH is 0.49\,deg$^2$; the total area with $H_{160}$ data (including the deeper CANDELS imaging and various other archival data sets listed in Table \ref{tab:archival}) is 0.66\,deg$^2$. The magenta outline shows the 1.64 degree$^2$ covered by ACS $I_{814}$ \citep{Koekemoer2007TheProcessing}.} \label{fig:dash_wht} \end{figure*} Wide-field near-infrared (IR) surveys have proven invaluable for the study of the high mass end of the galaxy mass function at $z>1$ (where the rest-frame optical emission shifts into the near-IR) and for determining the prevalence of short-lived events such as mergers, the properties and demographics of AGN, and the evolution of galaxy groups and clusters. Such surveys have been undertaken from the ground (e.g. NMBS \citep{Whitaker_2011}, UltraVISTA \citep{McCracken2012,Muzzin2013THESURVEY}, UKIDSS-UDS \citep{Lawrence2007, Williams2009TheZ=2}) but so far not with the \textit{Hubble Space Telescope} (HST). The largest area imaged with HST in the optical ($I_{814}$) is the 1.7 deg$^2$ COSMOS field in 640 orbits \citep{Scoville2006TheOverview}, whereas the largest area imaged in the near-IR ($J_{125}$ and $H_{160}$) is the 0.25 deg$^2$ CANDELS survey \citep[900 orbits;][]{Koekemoer2007TheProcessing}. Until now HST near-IR surveys over larger areas have not been done because it is very inefficient to observe multiple pointings within a single HST orbit. We have developed a technique to circumvent this limitation, enabling an order of magnitude increase in the efficiency of large area mapping with HST. The Drift And SHift technique greatly increases the efficiency of mapping large areas as it requires only a single guide star acquisition per pointing. In the COSMOS-DASH survey, we imaged 0.49 deg$^2$ of the COSMOS field in H$_{160}$ in 57 orbits (31 arcmin$^2/$orbit) reaching a depth of $H_{160}=25.1$ (0\farcs3 aperture). \subsection{Drift And SHift (DASH)} \begin{figure*}[t] \centering \includegraphics[width=\textwidth]{dash_uvista_image.png} \caption{Images of massive galaxies at z$>$1.5 observed with UltraVISTA (top panel) and COSMOS-DASH (bottom panel). The UltraVISTA images are created using the UVISTA $H$ and $i$ band images. The COSMOS-DASH images are created using the $H_{160}$ and $I_{814}$ images. Each panel is $8\arcsec\times8\arcsec$. The first three galaxies are close pairs in the COSMOS-DASH image which appear as single object in the UltraVISTA image.} \label{fig:dash_uvista_compare} \end{figure*} Drift And SHift (DASH) is a new technique for efficient large area observations using the near-infrared (IR) channel of Wide Field Camera 3 (WFC3) on the \textit{Hubble Space Telescope} \citep{Momcheva2016a}. In standard HST observations guide stars are acquired for each new pointing. Acquiring a guide star takes approximately 10 minutes, which means that short exposures are only possible with very large overheads and the total number of pointings that can be obtained within an orbit's visibility window is small\footnote{HST is limited to two acquisitions per orbit by policy.}. This limitation can be circumvented by acquiring guide star for only the first pointing and guiding with the three HST gyros for the rest of the pointings. This makes it possible to observe up to 8 WFC3 pointings in a single orbit, greatly increasing HST's large scale mapping capabilities. During a standard guided exposure, the three HST gyros receive continuous corrections from the Fine Guidance Sensors (FGS). Turning off guiding stops the stream of corrections from the FGS and the telescope begins to drift with an expected rate of $0\farcs 001 - 0\farcs 002$ per second. In CCDs this would lead to detrimental smearing of the image in a typical 5 minute exposure. However, the WFC3/IR detector can perform multiple non-destructive, zero overhead reads throughout the exposure. By setting the time between reads to 25 seconds or less, the drift in between reads is $\leq 0\farcs 05$ - less than half a pixel (pixel scale $=0\farcs129$). The data obtained in between the reads can be treated as independent 25\,s exposures, that can be drizzled to restore the full resolution of WFC3. In \citet{Momcheva2016a} we demonstrated that the resolution of the WFC3 camera is preserved in this process, and that structural parameters of the galaxies are consistent with those measured in guided observations. \subsection{Observations and Data Reduction} The ``Drift And SHift" (DASH) method was used in the Cycle 23 COSMOS-DASH program (Program ID: GO-14114) to obtain 456 WFC3 $H_{160}$ pointings in 57 orbits, covering an area of 0.49 degree$^2$ in the COSMOS field. The data were obtained between November 2016 and June 2017. The data were reduced by constructing 11 or 12 individual 25\,s exposures from the differences between subsequent reads within each science exposure. The full set of $\sim 5000$ exposures, together with all other existing $H_{160}$ data in the COSMOS field, were then drizzled into a single, large mosaic. The details of the reduction procedure are described in \citet{Momcheva2016a} and in Appendix \ref{ap:reduction}. The final mosaic of the COSMOS-DASH image is $50,000\times 50,000$ pixels (with $0\farcs 1$\,pix$^{-1}$), centered at RA$=$10:00:28.6, DEC$=+$02:12:21.0. It is shown in Fig.\ 1 and is available from the COSMOS-DASH website\footnote{\url{http://www.stsci.edu/~imomcheva/data/COSMOS_DASH/}}. The total area of the $H_{160}$ imaging is 0.66 deg$^2$, with COSMOS-DASH contributing 0.49 deg$^2$ and the remainder archival data taken in a variety of programs (list given in the appendix). This roughly triples the area of extragalactic blank survey fields that have been imaged in the near-IR with HST. We note that of these additional programs, our mosaic subsumes the data from GO-12990 (PI: Muzzin) which obtained targeted imaging of 12 galaxies with $\log M_*>11.6$ at 1.5 $<$ z $<$ 3.0 in COSMOS with $\sim$1000 second integration time. \section{Sample of Massive galaxies} \label{sec:sample} \subsection{UVISTA Catalog} \label{sec:uvista} We use the UitraVISTA catalog of \citet{Muzzin2013THESURVEY} for our sample selection in the COSMOS field. Objects are selected from UltraVISTA $K_s$ band imaging that reaches a depth of $K_{\rm s,tot}=23.4$ AB at 90\,\% completeness. The catalog contains PSF-matched photometry in 30 photometric bands covering the wavelength range 0.1$\mu$m $\to$ 24$\mu$m and includes the available GALEX, CFHT/Subaru, UltraVISTA, and S-COSMOS dataset. Each galaxy in the catalog has a photometric redshift determined by fitting the photometry in the 0.1$\mu$m $\to$ 8.0$\mu$m bands to template Spectral Energy Distribution (SEDs) using the EAZY code \citep{Brammer2008}. EAZY also provides rest-frame U, V and J colors which we used to separate the star-forming and quiescent galaxies. We note that \citet{Muzzin2013THESURVEY} used the default EAZY template set, and did not include the ``old and dusty" template used in \citet{Skelton20143D-HSTMasses}. This template was designed to extend the red boundary in the UVJ color-color space (see \ref{fig:uvj}). Without spectroscopic redshifts for the reddest galaxies at the highest redshifts it is difficult to determine which template set provides the most accurate description of the galaxy population. Stellar masses for all galaxies in the catalog were determined by fitting the SEDs of galaxies to stellar population synthesis (SPS) models using the FAST code \citep{Kriek2009AnZ=2.2} using \citet{Bruzual2003Stellar2003} templates with solar metallicity, a wide range in age, an exponentially declining star formation history, a \citet{Chabrier2003} IMF and a \citet{Calzetti1999TheGalaxies} dust extinction function. Details of the catalog can be found in \citet{Muzzin2013THESURVEY}. Although this catalog is based on an early release of the near-IR data in this field (UltraVISTA-DR1) it is easily deep enough for the relatively bright galaxies analyzed in this paper. In Appendix \ref{ap:flux_correct} we describe two corrections that are applied to the masses. We first correct them for flux that is missing in the catalog aperture, using the GALFIT total magnitudes. Next we determine whether any systematic offsets need to be applied. We show that the stellar masses (and photometric redshifts) are in very good agreement with the recent COSMOS2015 catalog (based on DR2; \citep{Laigle2016}). However, the masses are 0.1 dex {\em lower} than those in \citet{VanderWel2014a}, for the same galaxies. The same offset is obtained when matching the number density of galaxies with masses $M_*>10^{11}$\,M$_{\odot}$ in the two catalogs. As discussed in the Appendix we apply a 0.1 dex offset to all the masses, for consistency with \citet{VanderWel2014a}. \subsection{Selection of Galaxies for Size Analysis} In this paper we study the most massive galaxies at $0.1\leq z_{\rm phot} \leq 3.0$ with $M_{\star}\geq 2 \times10^{11} M_{\odot}$. The existing 3D-HST/CANDELS samples are sufficiently large for determining the size-mass relation below this limit \citep{VanderWel2014a}; furthermore, at lower masses the COSMOS-DASH imaging is too shallow for accurate measurements of structural parameters at the highest redshifts. Figure \ref{fig:mass_cut} shows all galaxies in UltraVISTA in the plane of mass versus redshift, before the corrections are applied. Our sample is well above the completeness limits of the catalog, even at $z=3$. We find 910\ galaxies in the catalog with $M_{\rm \star,corr}>2\times10^{11}M_{\odot}$, of which 748\ galaxies are at $0.1<z<1.5$ and 162\ galaxies are at $1.5<z<3.0$. \begin{figure}[t] \centering \includegraphics[width=0.46\textwidth]{uvista_masscut.png} \caption{Sample selection from the UltraVISTA catalog \citet{Muzzin2013THESURVEY}. The entire UltraVISTA sample with $H<21.5$ is shown. The white line shows the 100\,\% mass-completeness limit from \citet{Muzzin2013THESURVEY}. } \label{fig:mass_cut} \end{figure} \begin{figure}[t] \centering \includegraphics[width=0.46\textwidth]{sample_hist.png} \caption{The number of massive galaxies with $\log M_*>11.3$ at $0.1<z<3.0$ per deg$^2$ for which a stable fit has been found. The star-forming and quiescent galaxies are shown in blue and red respectively, while the entire sample is shown in grey. Sizes of galaxies at $z>1.5$ are measured from the COSMOS-DASH image ($H_{160}$) and from ACS ($I_{814}$) imaging at $z<1.5$.} \label{fig:mass_hist} \end{figure} The 0.66 deg$^2$ COSMOS-DASH mosaic does not cover the entire UltraVISTA area. Furthermore, at $z\sim 2$ the $H_{160}$ filter samples the rest-frame $V$ band, but at $z\sim 1$ it samples the rest-frame $I$ band. Because of these considerations we use the COSMOS-DASH data only in the redshift range $1.5<z<3.0$. For galaxies at $0.1<z<1.5$ we use the HST ACS $I_{814}$ observations of the COSMOS field \citep{Koekemoer2007TheProcessing}. The ACS mosaic spans $1.66$\,deg$^2$, and covers the entire UltraVISTA area. By combining the ACS and WFC3 imaging we ensure that the volumes at $z\sim 1$ and $z\sim 2$ are roughly matched, and that we measure sizes at approximately the same rest-frame wavelengths. As discussed in appendix \ref{ap:wave_correct}, we correct for residual wavelength-dependent effects using previously-measured color gradients of galaxies. We obtained the reduced ACS v2.0 mosaic from the NASA/IPAC Infrared Science Research Archive\footnote{\url{http://irsa.ipac.caltech.edu/data/COSMOS/images/acs_mosaic_2.0/}}. The image mosaic software Montage v5.0\footnote{\url{http://montage.ipac.caltech.edu/}} was used to create square cutouts of $18\arcsec \times 18\arcsec$ centered on the galaxies. We visually inspected all galaxies which are covered by the images and remove those that are on an edge. A total of 203 galaxies at $1.5<z<3.0$ are covered by the 0.66 deg$^2$ COSMOS-DASH mosaic (308 galaxies/deg$^2$), while 788 galaxies at $0.1<z<1.5$ are covered by the 1.64 deg$^2$ ACS-COSMOS (493 galaxies/deg$^2$). These 991 galaxies at $0.1<z<3.0$ form our sample for the structural study. \subsection{Classifying Star Forming and Quiescent Galaxies} As part of the analysis we split the sample into star-forming and quiescent sub-population of galaxies. Observationally, for intermediate to massive galaxies, the sizes at a fixed stellar mass and redshift are dependent on their colors, with the bluer galaxies being larger than redder galaxies. We want to test whether this relation holds at the highest masses and redshifts. We use the rest-frame $U-V$ and $V-J$ color space to separate galaxies into star-forming (SF) and quiescent (Q) candidates. Galaxies occupy distinct regions in the $U-V$ vs. $V-J$ plane depending on their specific star formation rate and dust content, as demonstrated by \citet{Labbe2002, Whitaker2012}. Young galaxies with high star formation rates which are red due to high dust content occupy a different region in the $UVJ$ diagram than old quenched galaxies. In this paper we use a redshift-dependent separation line in the $UVJ$ diagram to identify ourSF and Q galaxy candidates \citep{Muzzin2013THESURVEY}. Quiescent galaxies are defined as: \begin{align} U-V \textnormal{ } &> \textnormal{ } 1.3 \textnormal{ \hspace{0.2cm} and \hspace{0.2cm} } V-J < 1.5 & \textnormal{ [all z]} \nonumber \\ U-V \textnormal{ } &> \textnormal{ } 0.88\textnormal{ }(V-J) \textnormal{ }+ \textnormal{ }0.69 & [0.0<z<1.0] \label{eq:sfq} \\ U-V \textnormal{ } &> \textnormal{ } 0.88\textnormal{ }(V-J) \textnormal{ }+ \textnormal{ }0.59 & [1.0<z<3.0] \nonumber \end{align} This separation was originally defined by \citet{Williams2008DETECTIONFROM} to maximize the difference in specific star formation rates (sSFRs) between the two distinct sub-populations on the $UVJ$ diagram. The separation was adjusted by \citet{Muzzin2013THESURVEY} to fit the UVISTA sample since the rest-frame color distribution is different from the \citet{Williams2008DETECTIONFROM} sample, presumably due to small differences in photometric methods. The distribution of our sample of galaxies in the $U-V$ vs.\ $V-J$ plane is shown in Fig. \ref{fig:uvj}. At low redshift, the galaxy samples separate into distinct sub-populations in the $UVJ$ parameter space. However, at high redshift the galaxies tend to move closer to the separation line. This may indicate that there are more transition galaxies at $z\sim 2$ than at other epochs. \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{UVJ_all.png} \caption{Rest-frame $U-V$ vs.\ $V-J$ color distribution for six redshift bins. Quiescent and star-forming galaxies are separated by the selection criteria defined in Eq. \ref{eq:sfq}, shown by the black lines. All the galaxies in the UltraVISTA catalog with $\log(M_{\star}/{\rm M}_{\odot})>9.0$ at $0.1<z<3.0$ are shown in grey. Galaxies in our sample with $M_*>2\times10^{11}$\,M$_{\odot}$ are shown in colors: star-forming galaxies are shown as blue rings and quiescent galaxies as red circles.} \label{fig:uvj} \end{figure*} There are more galaxies at $0.1<z<1.5$ than at $1.5<z<3.0$, both because the area of ACS-COSMOS is 2.5 larger than the area of the COSMOS-DASH mosaic and because the density of massive galaxies per square degree in the low redshift bin is more than double that in the higher redshift bin. This is demonstrated in Figure \ref{fig:mass_hist}, which shows the number of galaxies per square degree in six redshift bins. The higher number of more massive galaxies at low redshift is expected from the evolution of stellar mass function of galaxies. Figure \ref{fig:mass_hist} also shows the number of SF and Q galaxies per degree $^{2}$ at 0.1$<$z$<$3.0. At z$<$0.5 less than 10$\%$ of the total galaxies are SF, whereas at 2.5$<$z$<$3.0 more than 85$\%$ of the galaxies are SF (see also \citet{Marchesini2014}). We will return to this in Section \ref{sec:transition}. In all the plots in this paper, ``all" galaxies are represented by grey squares and solid lines, ``quiescent" galaxies are presented by red dots and dashed lines and ``star-forming" galaxies are represented by blue circles and dotted lines, unless stated otherwise. \section{Size Determinations} \label{sec:size} We use GALFIT \citep{Peng2010} to fit one-component S\'ersic profiles to the galaxies. The effective radius ($r_{\rm eff}$) is the semi-major axis of the ellipse containing half of the total flux of the best-fitting model. For galaxies at $0.1<z<1.5$ the $I_{814}$ ACS-COSMOS image is used and for galaxies at $1.5<z<3.0$ the $H_{160}$ COSMOS-DASH image is used. Unless otherwise stated, both the $I_{814}$ and $H_{160}$ images are processed in the same way prior to running GALFIT on them. \subsection{Preparation of Images} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{display_stamps.png} \caption{Images of example massive galaxies created from COSMOS-DASH $H_{160}$ and ACS $I_{814}$ images. Each image is 50 kpc$\times$50 kpc. The $\log$(M$_{\star}$/M$_{\odot}$) and photometric redshift $z$ of each galaxy from the UltraVISTA catalog are listed in the images. Redshift increases from top to bottom, and star formation rate increases from left to right within each row (that is, they are ordered by their distance from the UVJ separation line). The spectral energy distributions (SEDs) of these galaxies are shown in Fig. \ref{fig:gal_sed}.} \label{fig:gal_image} \end{figure*} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{display_seds.png} \caption{Restframe UV to near-IR spectral energy distributions of galaxies shown in Fig. \ref{fig:gal_image}. The blue spectra are the best-fitting EAZY \citep{Brammer2008} model, the red circles show the model fluxes in the observed filters and the open black circles show the observed fluxes. } \label{fig:gal_sed} \end{figure*} The galaxy images are prepared for fitting in the following way. First, image cutouts are created from the mosaic that is appropriate for its redshift (ACS for $z<1.5$; WFC3 for $z>1.5$). The size of the square cutout is determined in two stages. In stage 1, for each individual galaxy the image mosaic software Montage v5.0 is used to create square cutouts of sides $18\arcsec$, centered on the galaxy. We use SExtractor \citep{Bertin1996} v2.19.5 to identify all sources in the cutouts. SExtractor is run on the individual cutouts with a fixed detection threshold of 1.5 times the standard deviation above the background RMS level, 32 deblending sub-thresholds, and a minimum contrast parameter of 0.005. The size of the central object of interest is determined from the Kron radius measured by SExtractor. In stage 2, square cutouts are created with sides of length equal to 7 times the semi-major axis Kron radius (7$\times$\,A\_IMAGE\,$\times$\,KRON\_RADIUS, as expressed in SExtractor outputs). SExtractor is run again on the individual final cutouts with the same setup as described above. We use the SExtractor segmentation map to create a mask that contains all detected objects except the galaxy of interest. Noise maps are made for individual galaxies with the same size as the final cutouts, assuming that the sky background is the dominant noise component. \subsection{PSF Model} Detailed knowledge of the image PSF is required for robust modeling of the galaxy morphologies with GALFIT. Many previous studies derive an empirical PSF for a given image mosaic taken from an average of observed images of isolated stars (e.g., \citet{VanderWel2014a} ). The COSMOS-DASH mosaic used here is generated from both the shallow DASH exposures themselves and from deeper archival observations taken under the more standard ``guided and dithered'' observation strategy. To account for the heterogeneous depth and dither/guiding properties of the COSMOS-DASH mosaic, we adopt a new metho for generating PSF models by using the WFC3/IR empirical PSF library from \citet{Anderson2016}. The WFC3/IR empirical PSFs are provided for all broad band filters and with the spatial variation across the detector sampled on a 3$\times$3 grid. Four sub-pixel center positions are provided at each of these grid points. For each galaxy we wish to model, we first insert the appropriate empirical PSF model at the exact object location in the detector frame of each individual exposure in which that object is found. Then we drizzle these models to the same pixel grid as the final mosaic using identical parameters (i.e., the relative image weights and pixel scale parameters). In this way, the final model PSFs of each object\footnote{Drizzled PSFs used with GALFIT for each of our massive galaxies are made available at \url{http://www.stsci.edu/~imomcheva/data/COSMOS_DASH/}. The software used for creating the drizzled empirical PSFs is available at \url{https://github.com/gbrammer/grizli/}.} fully account for the effects of instrument orientation, pixel resampling and image weighting that together determine the PSF in the science mosaics. \subsection{Fitting} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{galfit_output_hist.png} \caption{Histograms showing the distribution of stellar mass and structural parameters of our sample galaxies. The star-forming galaxies are represented by the blue-circle and the quiescent galaxies by the red-dot hatched histograms. The grey envelopes represent the distribution of all galaxies. The left panel shows the distribution of stellar mass, the upper right panels show distributions of effective radius and S\`ersic index, and the bottom right panels show the distributions of axis ratio and of integrated magnitude.} \label{fig:structural_hist} \end{figure*} The image cutouts, along with the noise map, the appropriate PSF model, and mask, are provided to GALFIT, which is used to find the best-fitting S\'ersic model for each object. The fit parameters are total magnitude ($M$), half-light radius ($r_{\rm eff}$) measured along the semi-major axis, S\`ersic index ($n$), axis ratio ($b/a$), position angle (PA), central position ($x_0$, $y_0$) and an additive constant ($\textit{sky}$). Initial guesses for these parameters are taken from the SExtractor detection catalog that was used to create the masks. A constraints file is constructed so that GALFIT is forced to keep the S\'ersic index between 0.2 and 8, the effective radius between 0.03$\farcs$ and 40$\arcsec$ (0.3 and 400 pixels for COSMOS-DASH, 0.1$\farcs$ and 1200 pixels for ACS-COSMOS), the axis ratio between 0.0001 and 1, the magnitude between $-3$ and $+3$ magnitudes from the input value (the SExtractor magnitude). We use a wrapper to create the GALFIT feedfiles and to run GALFIT on individual galaxy stamps. Neighboring objects in each image cutout are fit simultaneously or masked out, depending on their proximity and brightness compared to the main object: galaxies are fit simultaneously if they are less than 4 magnitudes fainter and if they are within 1$\arcsec$ from the main target (see Section \ref{sec:pair} for fitting close pairs of objects). \subsection{Close Pairs} \label{sec:pair} A number of galaxies which are cataloged as a single object in the UVISTA catalog are split into pairs in the COSMOS-DASH image. Out of the 203 galaxies in our sample at $z>1.5$, 18 split into pairs. For each of the pairs, we fit the two objects simultaneously with GALFIT using the same constraints as those described above. We then estimate the mass of each of the components of the pair by dividing the total mass into two parts weighed by the flux of the components in the $H_{160}$ filter: \begin{equation} M_{\star,i} = M_{\star,\rm tot} \times \frac{F_i}{F_i+F_j} \label{eq:pair} \end{equation} where $M_{\star,\rm tot}$ is the total stellar mass of the galaxy given in the UVISTA catalog and $F_i$ and $F_j$ are the total model fluxes of the two components from GALFIT. If $M_{\star,i}>2 \times 10^{11} M_{\odot}$ then the object is kept in the sample (with the same UVISTA ID number) or else it is rejected from the sample. However, there are no pairs where both the components are above the mass cut. 14 out of the 18 have one component above the mass cut and remain in the sample with their revised mass. \subsection{Visual Inspection and Additional Steps} After each individual object is fit by the GALFIT wrapper, the $\chi^2$ value of the fit and the effective radius of the model are checked to ensure that the fits are reasonable. Any fits with $\chi^2 > 1.2$ or $r_{\rm eff} >$ 40 kpc are rejected and refit by tweaking the initial conditions. Most of these ``failed" fits occur for objects with nearby bright stars, overlapping background/foreground objects or objects which are close to the edge of the mosaic with low signal to noise. In those cases the initial GALFIT estimates (based on the SExtractor analysis) may be (too) far from the true values. If a reasonable fit is obtained by changing the initial conditions or by altering the mask, the galaxy is kept in the sample. Otherwise the galaxy is rejected from our sample. In the second stage, all objects with $n=0.2$ or $n=8$, i.e. the boundary conditions given on the GALFIT constraint file, are visually inspected. Most of the $n=8$ objects are found to have a bright central pixel, in some cases probably due to the presence of an active nucleus. We first refit the objects following the procedure described above. If this does not resolve the problem, the galaxy is refit by fixing the S\`ersic index to the S\`ersic index determined by SExtractor. Even though SExtractor does not incorporate the PSF in its fit and the S\`ersic indices {\em should} not be reliable, in practice they correlate quite well with the GALFIT-determined ones with no obvious systematic offset. 23$\%$ of the galaxies at $0.1<z<1.5$ and 17\,\% of the galaxies at $1.5<z<1.5$ are refit with fixed $n$. In the third stage, each of the individual galaxies, their S\`ersic models and the subtracted background images produced by GALFIT are visually inspected. Any ``obviously'' unreasonable fit is manually refit as above. We rejected 14 galaxies because they are almost invisible in the DASH image. A total of 935 galaxies passed this final quality control step and formed the sample for our size-mass analysis. In the remainder of the paper we are describing the results for these galaxies only. The fraction of rejected objects is similar to that in previous studies. \subsection{Stellar Mass and Size Corrections and Final Sample} As explained above and in the Appendix, the stellar masses are corrected so they are self-consistent with the best-fit S\`ersic model and consistent with the mass estimates from \citet{VanderWel2014a} sample. The sizes are corrected for color gradients, following the procedure of \citet{VanderWel2014a}; details are given in Appendix \ref{ap:wave_correct}. The final sample is selected such that $M_{\rm \star, corr}\geq 2 \times10^{11} M_{\odot}$. We find a total of 910\ galaxies at $0.1<z<3.0$ of which 748\ are measured from the ACS-COSMOS image ($z<1.5$) and 162\ are measured from the COSMOS-DASH image ($z>1.5$). We also include the galaxies with $M_{\rm \star, vdW}\geq 2 \times10^{11} M_{\odot}$ from the CANDELS field measured by \citet{VanderWel2014a} that are not in our study. Hence the total number of massive galaxies used in the size-mass analysis are 1090, where 813 are quiescent and 277 are star-forming. \subsection{GALFIT Error Estimation} \begin{figure*}[ht] \centering \includegraphics[width=\textwidth]{size_mass_dash.png} \caption{Size-stellar mass distributions of star-forming and quiescent galaxies with $M_{\rm \star,corr}>2\times10^{11}M_{\odot}$ in six redshift bins. Star-forming galaxies are shown in blue circles and quiescent galaxies in red dot.} \label{fig:size_mass_dash_massive} \end{figure*} In order to estimate the uncertainty in the measured size of an individual galaxy, we place the best-fitting S\`ersic models in empty regions of our image mosaics, and refit them with GALFIT using the exact same procedures as described above. For each galaxy we create 100 realizations, using randomly chosen regions in the image mosaics. The uncertainties in $r_{\rm e}$ are then taken as the 16$^{\rm th}$ and 84$^{\rm th}$ values in the ordered list of 100 effective radii. This procedure ensures that the exact noise properties of the mosaics are taken into account. \section{Sizes of the most massive galaxies} The sizes of the most massive galaxies with $\log(M_{\rm \star,corr}/M_{\odot})>$11.3, as a function of stellar mass in six bins of redshift between 0.1$<$z$<$3.0, are presented in Figure \ref{fig:size_mass_dash_massive}. They blue circles represent the star-forming galaxies whereas the red dots represent the quiescent galaxies. Visually there is little difference between the size-mass distribution of the two populations, particularly at high redshift. In the following we quantify these relations and the offsets between star forming and quiescent galaxies. \subsection{Median size and scatter of galaxies} \begin{table*}[t] \centering \caption{Median sizes of galaxies as a function of galaxy mass and redshift. The redshift dependencies, parameterized by $r_{\rm eff} = B_z \times (1+z)^{-\beta_z}$, are also given.} \begin{tabular}{|c|cc|cc|cc} \hline \multirow{2}{*}{z} & \multicolumn{2}{c|}{\textbf{All}} & \multicolumn{2}{c|}{\textbf{Star-forming}} & \multicolumn{2}{c|}{\textbf{Quiescent}} \\ \cline{2-7} & Med r$_{\rm eff}$ (kpc) & $\sigma$ $\log$ r$_{\rm eff}$ &Med r$_{\rm eff}$ (kpc) & $\sigma$ $\log$ r$_{\rm eff}$ & Med r$_{\rm eff}$ (kpc) & \multicolumn{1}{c|}{$\sigma$ $\log$ r$_{\rm eff}$} \\ \hline 0.25 & 9.34 $\pm$0.34 & 0.22$\pm$0.01 & 15.74$\pm$2.21 & 0.21$\pm$0.01 & 8.84$\pm$0.36 & \multicolumn{1}{c|}{0.22$\pm$0.04} \\ 0.75 & 6.99$\pm$0.20 & 0.27$\pm$0.01 & 9.25$\pm$1.0 & \multicolumn{1}{c|}{0.30$\pm$0.04} & 6.76$\pm$0.20 & 0.26$\pm$0.01\\ 1.25 & 6.26$\pm$0.26 & 0.28$\pm$0.01 & 8.33$\pm$0.66 & \multicolumn{1}{c|}{0.22$\pm$0.03} & 5.71$\pm$0.26 & 0.28$\pm$0.01\\ 1.75 & 5.33$\pm$0.25 & 0.27$\pm$0.02 & 6.33$\pm$0.37 & \multicolumn{1}{c|}{0.23$\pm$0.02} & 4.38$\pm$0.29 & 0.23$\pm$0.02 \\ 2.25 & 5.02$\pm$0.28 & 0.26$\pm$0.02 & 5.34$\pm$0.32 & \multicolumn{1}{c|}{0.23$\pm$0.02} & 3.56$\pm$0.54 & 0.30$\pm$0.04 \\ 2.75 & 4.32$\pm$0.38 & 0.27$\pm$0.03 & 4.32$\pm$0.40 & \multicolumn{1}{c|}{0.27$\pm$0.02} & 5.07$\pm$1.22 & 0.17$\pm$0.06 \\ \hline B$_z$ & \multicolumn{2}{c|}{10.4$\pm$0.4} & \multicolumn{2}{c|}{18.0$\pm$2.1} & \multicolumn{2}{c|}{10.8$\pm$0.4} \\ $\beta_z$ & \multicolumn{2}{c|}{0.65$\pm$0.05} & \multicolumn{2}{c|}{1.04$\pm$0.11} & \multicolumn{2}{c|}{0.84$\pm$0.06} \\ \hline \end{tabular} \label{tab:med} \end{table*} \begin{figure*}[] \centering \includegraphics[width=\textwidth]{evolution_all_sfq_medstd.png} \caption{Median size (left) and observed scatter in size (right) of massive galaxies as a function of redshift for all galaxies (grey squares), quiescent galaxies (red dots) and star-forming galaxies (blue circles). In the left panel, the lines represent the fits to the median sizes of the form r$_{\rm eff}/$kpc $=$ B$_z$(1+z)$^{\beta_z}$. The median size of star-forming galaxies is larger and evolves slightly more rapidly with redshift than that of the quiescent galaxies. The median size of all galaxies is similar to that of star-forming galaxies at higher redshift and to quiescent galaxies at lower redshift, with the overall evolution being shallower than either of the populations. The right panel shows the evolution of the observed scatter in the sizes of the different populations of galaxies. Within errors, there is no difference in the observed scatter between the populations. The median sizes and observed scatter of all, star-forming and quiescent galaxies are given in Table \ref{tab:med}. } \label{fig:med_scatter} \end{figure*} We first examine the distribution of stellar mass within our mass-limited sample. The median stellar mass of all galaxies with $\log(M_{\star}/M_{\odot})>$ 11.3 at z$\sim$0.25 is $\log(M_{\star}/M_{\odot})=$ 11.43$\pm$0.01. At this epoch quiescent and star-forming galaxies have a similar median stellar mass. At $z\sim2.75$, the median stellar mass of all galaxies is $\log(M_{\star}/M_{\odot})=$ 11.46$\pm$0.03. The star-forming galaxies have a similar median stellar mass as the full sample as they make up the bulk of the population at this epoch; the few quiescent galaxies are slightly less massive with $\log(M_{\star}/M_{\odot})=$ 11.36$\pm$0.04. Next, we use the biweight estimator for the location and scale of a distribution to calculate the median size and its scatter, as this estimator gives higher weights to the center of distribution and is insensitive to outliers. Figure \ref{fig:med_scatter} shows the evolution of the median size of galaxies in 0.1$<$z$<$3.0. The median size of all galaxies and of the two sub-populations have increased from z$\sim$3 to z$\sim$0.1. The median size of all galaxies at 2.5$<$z$<$3.0 was 4.3$\pm$0.4 kpc which has increased to 9.3$\pm$0.4 kpc at 0.1$<$z$<$0.5. The median size of quiescent galaxies at 2.5$<$z$<$3.0 was 5.1$\pm$1.2 kpc which has increased to 8.8$\pm$0.4 kpc at 0.1$<$z$<$0.5. The median size of star-forming galaxies at 2.5$<$z$<$3.0 was 4.3$\pm$0.4 kpc which has rapidly increased to 15.7$\pm$2.1 kpc at 0.1$<$z$<$0.5. Note that the median size of all galaxies changes more slowly with redshift than that of either of the subpopulation; this reflects of the fact that the fraction of quiescent galaxies increases from 13 $\%$ at 2.5$<$z$<$3.0 to 90 $\%$ 0.1$<$z$<$0.5. This is discussed in more detail in Section \ref{sec:transition}. We determine the significance of the difference in the sizes of quiescent and star-forming galaxies with the two-sided Mann-Whitney test. The probability that the quiescent and star-forming galaxies are drawn from the same sample at 0.1$<$z$<$0.5 is less than $5 \times 10^{-5}$. This probability rises to more than 40 $\%$ at 2.5$<$z$<$3.0, and we conclude that the sizes of the most massive star forming and quiescent galaxies are not significantly different at $2.5<z<3.0$. However, due to the small sample of Q galaxies at $z>2.5$ we cannot rule out that a small size differences emerges when more data are available. We also present the measurement of the observed scatter in the sizes for all massive galaxies and the subsamples of quiescent and star forming galaxies. We find no strong evolution in the observed scatter for the full sample, or either of the subpopulations. The scatters range between $0.2-0.3$\,dex, in good agreement with the values found by previous studies. \subsection{Evolution of the median size} We parameterize the evolution of the median size of the galaxies as \begin{equation} r_{\rm eff} = B_z \times (1+z)^{-\beta_z}. \end{equation} The grey, red and blue lines in Figure \ref{fig:med_scatter} represent the evolution of the median sizes of all galaxies, the quiescent galaxies, and the star-forming galaxies respectively. We find $\beta=$0.65$\pm$0.05 for the full sample. For the star-forming galaxies $\beta_z=$1.04$\pm$0.11, and for quiescent galaxies we find $\beta=$0.84$\pm$0.06. The size evolution of the star-forming and the quiescent galaxies is only marginally significant. This is consistent with the results of \citet{Faisst2017} who found a similar evolution for ultra-massive star-forming and quiescent galaxies at 0.5$<$z$<$2.5 (although they found a slightly faster evolution of 1.21$\pm$0.20 for the quiescent population). This behavior is qualitatively different from the evolution of lower mass galaxies, where quiescent galaxies show a more rapid size evolution than star-forming galaxies. Specifically, \citet{VanderWel2014a} find that galaxies with $\log(M_{\star}/M_{\odot}\sim 10.75$ have $\beta_z=$1.24$\pm$0.08 and 0.72$\pm$0.09 for quiescent and star-forming galaxies respectively. \section{Evolution of the size-mass distribution from \label{sec:evolution} \begin{figure*}[t] \centering \includegraphics[width=\textwidth]{size_mass_fit_all.png} \caption{Size-stellar mass distribution of star-forming and quiescent galaxies for $\log(M_{\star}/M_{\odot}>$9.0 at $0.1<z<3.0$. The small dots in the background show the combined sample of \citep{VanderWel2014a} and the most massive galaxies from this study. The points show the median sizes of all the galaxies with their $1\sigma$ dispersion. The lines indicate fits to the size-mass relation of all, star-forming, and quiescent galaxies. The median sizes of intermediate mass star-forming and quiescent galaxies are significantly different at a given stellar mass at all redshifts. However, at the high mass end the gap closes with the two populations having similar sizes, in agreement with previous studies.} \label{fig:size_all} \end{figure*} \begin{figure*}[t] \centering \includegraphics[width=\textwidth]{analytic_fit.png} \caption{Redshift evolution of the parameters of the analytic size mass relations. The left panel shows the intercept and the right panel shows the slope of the power law fits shown in Figure \ref{fig:size_fit} at fixed stellar mass of $M_{\star}=5\times10^{10}M_{\odot}$.} \label{fig:size_fit} \end{figure*} In this Section we combine our size measurements of the most massive galaxies with the large \citet{VanderWel2014a} sample to study the size-mass distribution over a large dynamical range of mass and redshift. Figure \ref{fig:size_all} shows the size-mass distribution of galaxies with $\log(M_{\star}/M_{\odot})>$9.0 at 0.1$<$z$<$3.0. Visually, the most massive galaxies follow extrapolations from the trends seen for less massive galaxies. We fit the size-mass distribution of galaxies with $\log(M_{\star}/M_{\odot})>$9.0 at 0.1$<$z$<$3.0. We fit the star-forming and quiescent populations separately as has been done previously by \citet{VanderWel2014a}, but now with a more populated high mass end. We also provide fits to the full sample of galaxies, that is, not split up by their stellar populations. \subsection{Analytic Fits to Galaxy Size Evolution} \begin{table*}[] \centering \caption{Results from the parameterized fits to the size-mass distribution of the form $r_{\rm eff}$/kpc $=$ A(M$_{\star}$/5 $\times$ 10$^{10}$ M$_{\odot}$)$^{\alpha}$, as described in Section \ref{sec:size} and shown in Figures \ref{fig:size_fit}} \begin{tabular}{|c|ll|cc|cc|} \hline \multirow{2}{*}{z} & \multicolumn{2}{c|}{\textbf{All}} & \multicolumn{2}{c|}{\textbf{Star-forming}} & \multicolumn{2}{c|}{\textbf{Quiescent}} \\ \cline{2-7} & $\log$ (A) & $\alpha$ & $\log$ (A) & $\alpha$ & $\log$ (A) & $\alpha$ \\ \hline 0.25 & 0.74$\pm$0.02 & 0.27$\pm$0.03 & 0.83 $\pm$ 0.02 & 0.29 $\pm$ 0.04 & 0.59 $\pm$ 0.02 & 0.47 $\pm$ 0.03 \\ 0.75 & 0.65$\pm$0.03 & 0.17$\pm$0.04 & 0.74 $\pm$ 0.02 & 0.21 $\pm$ 0.02 & 0.44 $\pm$ 0.02 & 0.57$\pm$ 0.04 \\ 1.25 & 0.60$\pm$0.02 & 0.13$\pm$0.03 & 0.67 $\pm$ 0.01 & 0.19 $\pm$ 0.02 & 0.26 $\pm$ 0.01 & 0.65 $\pm$ 0.03 \\ 1.75 & 0.53$\pm$0.02 & 0.09$\pm$0.03 & 0.61 $\pm$ 0.01 & 0.18 $\pm$ 0.01 & 0.17$\pm$ 0.02 & 0.63 $\pm$ 0.05 \\ 2.25 & 0.49$\pm$0.01 & 0.13$\pm$0.02 & 0.53 $\pm$ 0.06 & 0.18 $\pm$ 0.01 & 0.06 $\pm$ 0.06 & 0.48 $\pm$ 0.11 \\ 2.75 & 0.48$\pm$0.02 & 0.11$\pm$0.03 & 0.51 $\pm$ 0.09 & 0.14 $\pm$ 0.03 & 0.12 $\pm$ 0.09 & 0.59 $\pm$ 0.23 \\ \hline \end{tabular} \label{tab:fit} \end{table*} We fit the size-mass relation of the combined sample of the most massive galaxies of this study and the \citet{VanderWel2014a} sample. Following \citet{Shen2003TheSurvey}, we assume a log-normal distribution N($\log (r_{\rm eff})$, $\sigma_{\log r_{\rm eff}}$, where $\log (r_{\rm eff})$ is the mean and $\sigma_{\log r_{\rm eff}}$ is the dispersion. Similar to \citet{VanderWel2014a}, $r_{\rm eff}$ is taken to be a function of galaxy mass such that: \begin{equation} r_{\rm eff}(m_{\star})/{\rm kpc} = A \times m_{\star}^{\alpha}, \end{equation} where $m_{\star}$ $\equiv$ M$_{\star}$/7 $\times$ 10$^{10}$ M$_{\odot}$. The basic characteristics of the galaxy size distribution are given by the slope $\alpha$, intercept $A$, and intrinsic scatter $\sigma_{\log r}$ of size as a function of mass. Following \citet{VanderWel2014a}\, we fit all star-forming galaxies with M$_{\star}$ $>$ 3 $\times$ 10$^9$ M$_{\odot}$ and for the quiescent sample we fit galaxies with M$_{\star}$ $>$ 2 $\times$ 10$^{10}$ M$_{\odot}$, in the redshift range $0.1<z<3.0$. This stellar mass limit is derived from integrated magnitude limit, as GALFIT is able to reasonably estimate effective radius for galaxies with m$<$24.0 and S\`ersic index for galaxies with m$<$23. The analytic fits to the size-mass distributions are shown in Figure \ref{fig:size_all}. The lines in Figure \ref{fig:size_all} indicate the best-fit relations, while the evolution of the individual parameters (intercept $A$ and slope $\alpha$) are shown in Figure \ref{fig:size_fit}. The best-fit parameters are also given in Table \ref{tab:fit}. These new analytic fits have been performed on the same data for stellar mass $\log$(M$_{\star}$/M$_{\odot})<$ 11.3 as of \citet{VanderWel2014a} but on a three times larger dataset for $\log$(M$_{\star}$/M$_{\odot})>$ 11.3 at z$>$1.5 and on a five times larger dataset at z$<$1.5. Our size-mass relation of star-forming galaxies agrees well with that found by the \citet{VanderWel2014a}; in other words, the sizes of the most massive star-forming galaxies are similar to those expected from their relations. The slope of the size-mass relation of star-forming galaxies is $\approx$0.25, with the slope slightly decreasing with redshift. However, we find a shallower size-mass relation of quiescent galaxies than \citet{VanderWel2014a}; we find an approximate constant slope at all redshifts of $0.5-0.6$, whereas \citet{VanderWel2014a} found a slope of $\approx 0.75$ (at all redshifts). Finally, we fit the redshift evolution of the parameters of the best-fitting relations, to arrive at a complete description of the sizes of galaxies as a function of mass and redshift. For the full sample of galaxies the parameters evolve as $\log A=-0.26$ $\log (1+z)+0.60$ and $\alpha=-0.17\log (1+z)+0.16$. For the star forming galaxies we find $\log A = -0.32\log(1+z)+0.67$ and $\alpha=-0.12\log(1+z)+0.21$. For the quiescent galaxies the slope does not evolve significantly with redshift, and we derive $\log A=-0.52\log(1+z)+0.31$ and $\alpha=0.57$. \subsection{Evolution of the Median Sizes of Galaxies} \begin{figure*}[t] \centering \includegraphics[width=0.98\textwidth]{median_size_all_ratio.png} \caption{Median size of all (top-left), star-forming (top-right) and quiescent (bottom-left) galaxies, and ratio of median sizes of star-forming and quiescent galaxies (bottom-right) as a function of stellar mass and redshift. The median sizes are calculated from the combined sample of this study and \citet{VanderWel2014a}. } \label{fig:size_med} \end{figure*} So far we have considered the relation between size and mass at fixed redshifts. In Fig.\ \ref{fig:size_med} we show the complementary information, that is, the relation between size and redshift for particular masses. The median sizes are calculated from the combined sample of this study and \citet{VanderWel2014a}. The trends in this Figure show the same behavior as discussed earlier in the paper. The slope of the evolution of the full sample does not change significantly with stellar mass. The evolution of quiescent galaxies is not strongly mass-dependent and is more rapid than that of star forming galaxies. The rate of evolution of star-forming galaxies increases with stellar mass, such that the redshift evolution of the most massive star forming galaxies is very similar to that of the most massive quiescent galaxies. \begin{table*}[] \centering \caption{Median sizes of galaxies as a function of stellar mass and redshift for all, star-forming and quiescent galaxies. The stellar masses in the header and the redshifts in the first column are the centers of each 0.5-wide bins. Evolution of size with redshift for each stellar mass bin in the form of r$_{\rm eff}$/kpc $=$ B$_{\rm z}(1+z)^{-\beta_z}$ are also given.} \begin{tabular}{|c|cccc||cccc||cccc|} \hline \multirow{2}{*}{\textbf{z}} & \multicolumn{4}{c||}{\textbf{ All} Median \textbf{r$_e$ (kpc)}} & \multicolumn{4}{c||}{\textbf{Star-forming} Median \textbf{r$_e$ (kpc)}} & \multicolumn{4}{c|}{\textbf{Quiescent} Median \textbf{r$_e$ (kpc)}} \\ & \multicolumn{1}{c|}{$M_{\star}=10^{10}$} & \multicolumn{1}{c|}{10.5} & \multicolumn{1}{c|}{11} & \multicolumn{1}{c||}{$>$11.3} & \multicolumn{1}{c|}{$M_{\star}=10^{10}$} & \multicolumn{1}{c|}{10.5} & \multicolumn{1}{c|}{11} & \multicolumn{1}{c||}{$>$11.3}& \multicolumn{1}{c|}{$M_{\star}=10^{10}$} & \multicolumn{1}{c|}{10.5} & \multicolumn{1}{c|}{11} & \multicolumn{1}{c||}{$>$11.3} \\ \hline 0.25 & 3.5$\pm$0.1 & 4.5$\pm$0.1 & 7.7$\pm$0.2 & 9.2$\pm$0.1 & 4.2$\pm$0.1 & 5.6$\pm$0.1 & 8.9$\pm$0.3 & 15.8$\pm$0.4 & 2.1$\pm$0.2 & 3.1$\pm$0.2 & 6.4$\pm$0.2 & 8.7$\pm$0.1 \\ 0.75 & 3.3$\pm$0.1 & 3.5$\pm$0.1 & 5.6$\pm$0.1 & 7.0$\pm$0.1 & 4.0$\pm$0 & 4.8$\pm$0.1 & 6.9$\pm$0.1 & 9.5$\pm$0.3 & 1.5$\pm$0.1 & 2.2$\pm$0.1 & 4.5$\pm$0.1 & 6.8$\pm$0.1 \\ 1.25 & 3.4$\pm$0 & 3.2$\pm$0.1 & 4.4$\pm$0.1 & 6.1$\pm$0.1 & 3.6$\pm$0 & 4.3$\pm$0.1 & 5.4$\pm$0.1 & 8.5$\pm$0.3 & 1.2$\pm$0.2 & 1.5$\pm$0.1 & 2.9$\pm$0.1 & 5.7$\pm$0.1\\ 1.75 & 3.1$\pm$0.1 & 2.9$\pm$0.1 & 3.3$\pm$0.1 & 5.3$\pm$0.2 & 3.2$\pm$0.1 & 4.0$\pm$0.1 & 4.5$\pm$0.1 & 6.6$\pm$0.2& 1.1$\pm$0.3 & 1.3$\pm$0.1 & 2.3$\pm$0.1 & 4.4$\pm$0.2 \\ 2.25 & 2.7$\pm$0.1 & 2.8$\pm$0.1 & 3.0$\pm$0.1 & 4.8$\pm$0.2 & 2.8$\pm$0.1 & 3.3$\pm$0.1 & 3.7$\pm$0.1 & 5.1$\pm$0.2 & 0.6$\pm$1.8 & 1.1$\pm$0.2 & 1.9$\pm$0.2 & 3.6$\pm$0.4 \\ 2.75 & 2.7$\pm$0.1 & 2.9$\pm$0.2 & 2.8$\pm$0.2 & 4.4$\pm$0.3 & 2.7$\pm$0.1 & 3.2$\pm$0.2 & 3.1$\pm$0.3 & 4.3$\pm$0.3 & ... & 1.1$\pm$0.8 & 2.1$\pm$0.4 & 4.9$\pm$0.9 \\ \hline \hline \multicolumn{1}{|l|}{B$_z$} & \multicolumn{1}{c}{3.7$\pm$0.2} & \multicolumn{1}{l}{4.6$\pm$0.2} & 9.7$\pm$0.3 & 10.7$\pm$0.2 & \multicolumn{1}{c}{5.1$\pm$0.2} & \multicolumn{1}{l}{6.3$\pm$0.2} & 11.0$\pm$0.3 & 19.8$\pm$1.2 & \multicolumn{1}{c}{2.5$\pm$0.1} & \multicolumn{1}{l}{4.1$\pm$0.2} & 8.8$\pm$0.5 & 10.5$\pm$0.3 \\ \multicolumn{1}{|l|}{$\beta_z$} & \multicolumn{1}{c}{0.2$\pm$0.1} & \multicolumn{1}{l}{0.2$\pm$0.1} & 1.0$\pm$0.1 & 0.7$\pm$0.1 & \multicolumn{1}{c}{0.4$\pm$0.1} & \multicolumn{1}{l}{0.5$\pm$0.1} & 0.9$\pm$0.03 & 1.1$\pm$0.1 & \multicolumn{1}{c}{0.9$\pm$0.1} & \multicolumn{1}{l}{1.1$\pm$0.1} & 1.3$\pm$0.1 & 0.8$\pm$0.1 \\ \hline \end{tabular} \end{table*} \section{Discussion} \label{sec:discussion} \subsection{Comparison to Previous Studies} We present the first comprehensive measurements of the sizes of the most massive galaxies with $M_{\star}>2\times 10^{11}$ M$_{\odot}$ within $0.1<z<3.0$ measured at HST resolution. As shown in Figure \ref{fig:size_med}, we confirm that the galaxies in this study are larger in size than the less massive galaxies \citep{Shen2003TheSurvey, Carollo2013,VanderWel2014a} at the same epoch. The bottom-left panel of Figure \ref{fig:size_med} shows the ratio of median sizes of star-forming galaxies to that of quiescent galaxies. For intermediate to massive galaxies, with stellar masses between $ 10^{9}$ and $10^{11} M_{\odot}$, quiescent galaxies are, on average, smaller than star-forming galaxies \citep{Corollo2013,VanderWel2014a}. At z$\sim$2.25, for stellar mass of $M_{\star}\sim 5 \times 10^{10}$ M$_{\odot}$ the median size of star-forming galaxy is 3.39$\pm$0.08 kpc and the median size of quiescent galaxy is 1.20$\pm$0.03 kpc, which is almost a third of the size of the star-forming galaxies. However, for galaxies with stellar masses $\geq 2 \times 10^{11} M_{\odot}$ the two classes of galaxies are found to have similar sizes of 5.1$^{+0.6}_{-0.1}$ kpc and 3.6$^{+1.9}_{-0.4}$ kpc. Our results are consistent with the measurements of \citealt{VanderWel2014a} in the same mass range, although their sample is smaller by a factor of 3--4. More precisely, they confirm the extrapolated size-mass relations of \citet{VanderWel2014a}, which were dominated by less massive galaxies. Our results are also in agreement with the ground-based measurements of \citet{Faisst2017} and \citet{Hill2017}. \citet{Faisst2017} studied galaxies with $\log(M_{\star}/M_{\odot})>11.4$, slightly more massive than galaxies in our sample. Within the uncertainties, the sizes of these galaxies are fully consistent with our median sizes. \subsection{Central Density of the Most Massive Galaxies} \label{sec:transition} \begin{figure}[ht] \centering \includegraphics[width=0.46\textwidth]{Sersic_evolution.png} \caption{Evolution of median S\`ersic indices with redshift of all, star-forming and quiescent galaxies.} \label{fig:Sersic} \end{figure} \begin{figure}[ht] \centering \includegraphics[width=0.5\textwidth]{vdisp_frac.png} \caption{Top panel: Evolution of the fraction of the most massive star forming and quiescent galaxies. The fraction of star-forming galaxies increases with redshift while that of quiescent galaxies decreases with the cross-over happening at z$\sim$2. Bottom panel: Evolution of the central mass density of star-forming and quiescent galaxies. The central mass density is the density of the central 1 kpc of the galaxy, calculated using Eq.\ \ref{eq:vsig}. The blue circles and red dots show the median central densities of the star-forming and quiescent populations, and the hatched areas show 1-$\sigma$ spread. The black line is the median velocity dispersion of all quenched galaxies with $9.0<\log(M_{\star}/M_{\odot})<12.0$ measured by \citet{Whitaker2015}. The dotted black line is the assumed constant threshold in velocity dispersion above which galaxies at $1.5<z<3.0$ quench from \citet{VanDokkum2015_compactmassive}. The dashed black line is the predicted quenching threshold from \citet{Voit2015Precipitation-RegulatedGalaxies} normalized to 300 km/s at z$=$2. } \label{fig:core} \end{figure} Studies of the central galaxy density out to z$=$3 \citep{Cheung2012The0.5,Saracco2012OnGalaxies,Barro2012CANDELS:Z2,Barro2015} find that the innermost structure of galaxies correlates with the star formation rate. Quenching of galaxies (whether by AGN feedback or other mechanisms) is thought to become very efficient when the central density reaches a certain threshold \citep{VanDokkum2015_compactmassive,Whitaker2016}. As stellar density and velocity dispersion are closely related, observations therefore indicate that galaxies are statistically more likely to be quiescent once they have surpassed a threshold in either density or velocity dispersion. This has been studied in detail by \citet{Whitaker2016} who found an abrupt cessation of star formation when galaxies reach a threshold central stellar density. We can use the information of the two dimensional light profiles of the galaxies and their total stellar mass to infer the central stellar density of the galaxy, assuming spherical symmetry. We follow the prescription from \citet{Bezanson2009} and \citet{Whitaker2016} to calculate the central stellar density and central velocity dispersions of the galaxies. We perform an Abel transform to deproject the circularized, three-dimensional light profile using: \begin{equation} \rho(x) = \frac{b_n}{\pi} \frac{I_0}{r_{\rm eff}} x^{1/n-1} \int^{\infty}_1 \frac{{\rm exp}(-b_nx^{1/n}t)}{\sqrt{t^{2n}-1}} dt, \end{equation} with $\rho$ the three-dimensional (3D) luminosity density in a particular filter, $x\equiv r/r_{\rm eff}$, $r_{\rm eff}$ the circularized effective radius, the $n$ the S\`ersic index, and $b_n$ the $n$-dependent normalization parameter of the S\`ersic profile. We note that this methodology may lead to errors for galaxies that are far from spherical symmetry, in particular for flat disks. The mass within $r=1$\,kpc is calculated by integrating the 3D luminosity profiles. Assuming mass follows light and neglecting color gradients, we convert the central luminosity to central stellar mass using the corrected total stellar masses from the UVISTA catalog. The central density is calculated by numerically integrating the following equation: \begin{equation} \rho_{\rm 1kpc} = \frac{\int^{\rm 1kpc}_0 \rho(r)r^2 dr }{\int^{\infty}_0 \rho(r)r^2 dr}\frac{M_{\rm tot}}{\frac{4}{3}\pi \rm(1 kpc)^3}. \label{eq:vsig} \end{equation} Figure \ref{fig:core} shows the central stellar densities of star-forming and quiescent galaxies in our sample. The central velocity dispersion is calculated assuming $v_{\rm disp, 1kpc}=v_{\rm circ, 1kpc}/\sqrt{2}$, where $v_{\rm circ, 1kpc}=\sqrt{4/3 G \rho_{\rm 1kpc}}$ and $G$ is the gravitational constant. As can be seen, the central stellar density of both populations of galaxies are lower at $z=0$ than at $z\sim3$, but the central density of quiescent galaxies is always higher than that of star-forming galaxies: the equivalent velocity dispersion of star-forming galaxies decreased from 181 km/s to 67 km/s whereas that of quiescent galaxies decreased from 285 km/s to 180 km/s between z$\sim$2.63 and z$\sim$0.13. This difference in central density between star forming and quiescent galaxies may seem surprising, given the fact that they have very similar sizes at fixed mass. However, the Sersic indices also enter the calculation of the central densities, and they are significantly different between the two samples: we find $\langle n\rangle=4.0 \pm 0.$ for quiescent galaxies at $z\sim 2.75$ and $\langle n\rangle=2.2 \pm 0.2$ for star forming galaxies, as shown in Fig. \ref{fig:Sersic}. The difference in central density between the two samples is driven by this difference in the profile shape. We show quenching threshold velocity dispersions from previous studies in Fig.\ \ref{fig:core}. As can be seen the median central density of quenched galaxies are always above the threshold density while that of star-forming galaxies is above the threshold density only at the highest redshifts. This analysis thus provides evidence that it is indeed the central density, rather than the average surface density within the effective radius \citep[e.g.,][]{Franx2008,Maier2009The0.5}, that determines whether a galaxy is star forming or quenched. We note here that quenching may not be a single event in the life of a galaxy; specifically, many of the massive star forming galaxies at low redshift may be rejuvenated by fresh gas infall. These transitions change the fraction of quiescent and star forming galaxies, with young quiescent galaxies being added to the sample (Fig.\ \ref{fig:core} upper panel, also see, e.g., \citet{VanDokkum2001_morphology, Carollo2013}). \section{Summary} \label{sec:conclusion} In this paper we presented the COSMOS-DASH mosaic, the widest-area near-IR imaging survey yet done with HST. We used this dataset to measure the distribution of 910\ galaxies with $M_{\star}>2\times10^{11}M_\odot$ in the size-mass plane over the redshift range 0.1$<$z$<$3.0. We also combine this sample with the extensive sample of lower mass galaxies of \citet{VanderWel2014a}. We find the following: \begin{itemize} \item We find that the size of galaxies increases with their mass, and that this trend continues at the highest masses. Some intriguing individual exceptions exist: we find a small number of extremely small and massive galaxies and it will be interesting to obtain follow-up spectroscopy of these objects \citep[see, e.g.,][]{Nelson2014}. \item The size of the most massive galaxies decreases with increasing redshift. As shown in Fig.\ \ref{fig:med_scatter} the size of the most massive star-forming galaxies decreases by a factor of $\approx 3.5$ from $z=0.2$ to $z=2.75$, and the most massive guiescent galaxies decrease in size by a factor of $\approx 2.5$ over that same redshift range. \item The evolution of the {\em ratio} between the sizes of star forming galaxies and quiescent galaxies shows a strong mass-dependence. At low to intermediate masses, the size difference between these populations increases with redshift; however, at the highest masses quiescent and star forming galaxies are approximately the same size at all redshifts (see Fig.\ 13). \item We derive analytic fits to the relations between mass and size, and between the parameters of these fits with redshift. Together this set of equations provides a complete description of the median sizes of galaxies as a function of mass, redshift, and star formation rate. The data presented hear are consistent with most published data sets, although very few have focused specifically at this mass end. \item Finally, we inferred the central stellar density and velocity dispersion of the galaxies and show that the central densities of quiescent galaxies are higher than those of star-forming galaxies even though their sizes are similar. The fact that the most massive star forming galaxies at $z=2.5-3.0$ are close to the ``quenching thresholds'' derived in other studies, and (particularly) their rapid drop in number fraction at lower redshifts, suggest that massive galaxies are undergoing rapid assembly at $z=3$ followed by a transition to quiescence at $z\lesssim 2$. \end{itemize} This study provides an updated description of the evolution of the size-mass relation of galaxies, and the largest samples to date of HST morphologies of massive high redshift galaxies. Additionally, this is the first implementation of the DASH technique for rapid mapping of large areas with HST. We find that the technique is efficient and produces images of nearly the same quality as guided exposures, and encourage further exploitation of this observing mode. \acknowledgments This paper is based on observations made with the NASA/ESA Hubble Space Telescope, obtained at the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS 5-26555. These observations are associated with program GO-14114. Support for GO-14114 is gratefully acknowledged. This research made use of Montage. It is funded by the National Science Foundation under Grant Number ACI-1440620, and was previously funded by the National Aeronautics and Space Administration's Earth Science Technology Office, Computation Technologies Project, under Cooperative Agreement Number NCC5-626 between NASA and the California Institute of Technology. J.L. is supported by an NSF Astronomy and Astrophysics Postdoctoral Fellowship under award AST-1701487. The Cosmic Dawn Center is funded by the Danish National Research Foundation.
\section{Introduction} \label{} For training large-scale deep neural networks (DNNs) on multiple computing nodes, data parallelism has emerged as the most popular choice due to its simplicity and effectiveness \cite{dean2012large, recht2011hogwild}. However, the limited communication bandwidth of the interconnected network has become the bottleneck limiting data parallel performance. First, models of DNNs, which already contain tens to hundreds of layers and totaling 10-20 million parameters today, continue to grow bigger~\cite{real2018regularized}. Therefore, the requirement of fast synchronizing model parameter updates among all computing nodes poses a greater challenge. Second, the development of DNN-customized training accelerators has shifted the bottleneck of training from computing hardware towards communication across nodes. Meanwhile, the evolution of the interconnected network is not as fast as computing hardware, and this trend still continues. As shown in Figure\ref{fig:IBvsGPU}, in the past decade, the most powerful GPU has been over 40 times faster, comparing the latest Tesla V100 GPU with G8800 GPU. However, the network bandwidth of switches in clusters is only 5 times faster, comparing InfiniBand HDR with InfiniBand QDR. Third, high-quality network fabric like InfiniBand is too expensive to be available for every data center. Publicly available cloud computing resources are still connected by the low-level network. For example, Amazon EC2 instances now provide a maximum bandwidth of 25 Gbps, far less than 96 Gbps of InfiniBand EDR 4-Link speed. \begin{figure}[ht!] \centering \includegraphics[width=0.45\textwidth]{./gpuvsIB-EN} \caption{Evolution Speed of Infiniband and GPU.} \label{fig:IBvsGPU} \end{figure} Many recent studies focused on reducing the communication cost between nodes by reducing the size of the gradients to be transmitted. One line of work \cite{seide20141, wen2017terngrad} propose to quantize the gradients to low-precision values. Considering compression ratio (ratio of compressed gradients size to their original size) achieved by quantization is limited, another line of research orthogonal to quantization is to sparsify communication gradients and restrict weight-updates to a small subset of parameters. Residual Gradient Compression (RGC) method \cite{strom2015scalable, aji2017sparse, chen2018adacomp, lin2017deep, sattler2018sparse} is currently the most promising sparsification method to achieve good compression ratio while ensuring no loss of training accuracy. It transmits only a small subset of gradients and maintains the remaining gradients locally as residuals to be added to gradients of the next iteration. The first RGC implementation is proposed by Strom\cite{strom2015scalable} and uses a threshold-based method to only send gradients larger than a predefined constant threshold for fully-connected layers. Considering a predefined threshold is hard to be chosen appropriately, Aji et. al.\cite{aji2017sparse} improve the robustness of RGC by selecting top 1\% gradients to communicate according to their magnitude. Because these two implementations are tuned for some specific network structures, applying them to other DNNs will lead to accuracy loss as indicated in AdaComp\cite{chen2018adacomp}. Based on their work, after introducing some key modifications, the latest RGC variant called DGC\cite{ lin2017deep} is able to achieve a 0.1\% compression ratio on local gradients while ensuring almost no loss of model accuracy on a variety of DNN structures. Despite good model accuracy achieved with simulation experiments, no recent studies have discussed the potential performance gain after integrating the latest RGC methods to a real distributed training system, especially to the multi-GPU systems equipped with high-quality network infrastructures. The challenges of applying RGC to distributed GPU systems come from two aspects. First, there is no efficient compression algorithm of RGC method designed for massive parallel processors such as GPU. According to our experimental results of Section \ref{sec:select}, selecting top-0.1\% elements with the state-of-the-art GPU-based top-$k$ algorithm are so expensive that the overhead of compression is much higher than the benefits of network bandwidth reduction. Second, the synchronization scheme of sparse data structures generated by the RGC method has not been well studied. It is not easy to be supported with existing efficient communication libraries, such as Message Passing Interface (MPI), which are designed for dense data structures. To increase scalability and efficiency of DNN training, we propose a systematic distributed design called RedSync (short for \textbf{Red}uction of \textbf{Sync}hronization Bandwidth), which combines RGC-based sparsification and quantization techniques together to compress transmitting gradient size of each node to its 0.1\%. Our contributions are listed as follows: \begin{itemize} \item In terms of the algorithm level design, we propose a quantization technique called Alternating Signs Quantization (ASQ) to further compress the size of transmitting data sparsified by RGC to its half. In addition, we adapt the-state-of-the-art algorithmic improvements of RGC to a distributed situation. Applying the proposed algorithmic improvements, RGC+ASQ improves the efficiency of RGC-only in tasks of training a set of state-of-the-art DNN models with no accuracy loss. \item In terms of the system level design, we remove two main obstacles for efficient RGC deployment. A set of parallel-friendly top-0.1\% selection algorithms are proposed to support the sparsification process. They are orders of magnitude faster than the state-of-the-art top-$k$ selection method on GPU. Considering the distribution characteristics of communication data, we apply Allgather operation using MPI for a sparse synchronization scheme. A cost model is derived to analyze both communication cost and calculation overhead. Based on it, we pointed out potential performance gain and the bottleneck of current RGC method. \item This is the first work, as far as we know, to evaluate the performance of RGC method on supercomputer scale. On 128 GPUs, RedSync provides significant performance improvements for communication-intensive networks, like VGG, AlexNet, and some LSTMs. \end{itemize} \section{Design of RedSync} \begin{algorithm}[ht!] \small \caption{\small{RedSync Workflow}} \label{algo:rgcframework} \begin{algorithmic} \renewcommand{\algorithmicrequire}{\textbf{Input:}} \renewcommand{\algorithmicensure}{\textbf{Output:}} \REQUIRE node id $k$; the number of node $N$ \REQUIRE training dataset $\chi$; mini batch size $b$ per node \REQUIRE initial model $\textbf{w} = {\textbf{w}[0], ... , \textbf{w}[\#layer]}$; compression ratio $D$ \STATE $V^k \gets 0$ \FOR {$t = 0,1, ... max\_iter$} \STATE sample $b$ elements as $\chi_k^t$ \STATE $G^k$ $\gets \nabla$ $f$($\chi_k^t$ ; \textbf{w}) : forward and backward propagation \FOR {$j = \#layer, \#layer-1, ..., 0$} \STATE $V_j^k += G_j^k $ \STATE {Masks} $\gets$ $\tt{select}$ $(V_j^k, D)$ \STATE $G_j^k$ $\gets$ $\tt{Sparse\-Allreduce}$($\tt{compress}$($\tt{quantize}$($V_j^k$ $\odot$ Masks))) \STATE $V_j^k \gets V_j^k \odot$ (1 - Masks) \ENDFOR \STATE \textbf{w} $\gets$ SGD(\textbf{w}, $\tt{decompress}$($G^k$)) \ENDFOR \end{algorithmic} \end{algorithm} Algorithm \ref{algo:rgcframework} presents the workflow used in RedSync. We denote a DNN model as $f(\textbf{w})$, where $\textbf{w}$ is the vector of parameters. We assume a system has $N$ workers. Each worker, say the $k$-th worker, holds a local dataset $\chi_k^t$ at iteration $t$ with size $b$ and a local copy of the global weight $\textbf{w}$. Synchronous SGD method is adopted in RedSync. At each iteration, node $k$ computes the gradient $G^k$ using local data and we represent $G_j^k$ as gradients of layer $j$. Each node also maintains a residual $V^k$, which is initialized as $0$ and used to accumulate untransmitted gradient from previous iterations. After added with latest gradient, a subset of residuals is selected as the \textit{communication-set}. The $\tt{select}$ operation in Algorithm \ref{algo:rgcframework} chooses important elements as communication-set based on magnitude. Masks is a 0/1 matrix, in which 1 indicating that the element at the corresponding position is selected as communication-set. After $\tt{quantize}$ operation, the quantized communication-set is compressed into sparse data structures for communication. Those selected elements are synchronized among all the nodes using $\tt{Sparse\-Allreduce}$ operations. Synchronous SGD implemented with Allreduce, rather than Parameter Server\cite{li2014scaling}, has been widely adopted in state-of-the-art large-scale DNN training tasks\cite{goyal2017accurate}\cite{you2017imagenet} on HPC platforms. Remaining elements outside the communication-set are assigned as new residuals of the next iteration. Figure \ref{fig:RedSync} presents the design overview of RedSync according to the Algorithm \ref{algo:rgcframework}. In the following, we details our contribution in design of $\tt{select}$, $\tt{quantize}$, $\tt{Sparse\-Allreduce}$ and $\tt{decompress}$ operations to make this workflow work efficient in practice. \begin{figure}[ht!] \centering \includegraphics[width=0.45\textwidth]{./RedSync-workflow-crop.pdf} \caption{Overview of RedSync Design.} \label{fig:RedSync} \end{figure} \subsection{Parallel-Friendly Residual Sparsification} \label{sec:select} The efficiency of communication-set selection operation to sparsify the gradients is critical to the overall performance of the system. There is still a lack of efficient implementation methods on parallel architectures such as GPUs, which is a major obstacle to the deployment of RGC methods. Recent RGC works \cite{lin2017deep, sattler2018sparse} suggest selecting top $0.1\%$ elements from residuals of each layer as the communication-set. It is well-known that, by applying \textit{Quickselect} algorithm \cite{hoare1961find}, the time complexity of a top-$k$ selection on a list of $n$ elements using a single-core CPU is $O(n)$. However, the top-$0.1\%$ selection is not trivial to be implemented on massively parallel architectures, such as GPUs. One of the most efficient top-$k$ selection methods designed for GPU can be implemented based on \textit{radixSelect} algorithm \cite{alabi2012fast}, which determines each bit of the $k$-th largest element by scan and scatter. The \textit{scan} \cite{sengupta2007scan} and scatter operations are not suitable for parallel processing and are extremely time-consuming. As shown in Figure \ref{fig:select_time}, the computation time for top-0.1\% with radixSelect on a Titan X GPU sometimes is even slightly higher than the time for synchronizing these parameters through a 28 Gbps network. To overcome the problem of slow radixSelect operation on GPU, we propose two communication-set selection algorithms called \textit{trimmed top-$k$ selection} and \textit{threshold binary search selection}, which are more efficient on GPUs. \textbf{Trimmed top-0.1\% selection.} We notice that the distribution of residuals is usually similar to a normal distribution, we can use statistical features to remove most of the smaller elements and apply radixSelect operation on a relatively small subset. As shown in Algorithm \ref{algo:topk}, we first calculate the mean and maximum of residuals' absolute values of this layer. A relative large threshold value is chosen according to mean and maximum value, for example, $0.8\times(max - mean) + mean$. Operation $\tt{count\_nonzero}$ gets the number of elements whose absolute values are greater than the threshold. If the number is smaller than $k$ (the number of top-0.1\% elements ), we dynamically decrease the threshold until we find the number of parameters whose absolute value above the threshold is larger than $k$. Then we trim all elements that are less than the threshold and perform a top-$k$ selection operation using radixSelect on the remaining elements. Operation $\tt{mean}, \tt{max}$ and $\tt{count\_nonzero}$ can all be efficiently implemented with a single reduction operation. $\tt{nonzero\_indices}$ is a typical \textit{stream compaction} problem, which uses just one scan operation as its backbone \cite{sengupta2006work}. \textbf{Threshold binary search selection.} For a network layer with a large number of parameters, even using radixSelect operation on a small number of gradient elements is still a very time consuming operation. In order to completely avoid using radixSelect operation on GPU, we propose a method to select approximate top-0.1\% elements as communication-set. Instead of identifying the $k$th (top 0.1\%th) largest element, we search for a threshold to make it between the $k$th to $2k$th largest element, and then select elements larger than the threshold as communication-set. In this case, at least 0.1\% largest elements are included in the communication-set, so the convergence rate of the algorithm will not be affected. As shown in Algorithm \ref{algo:thd}, we use a binary search algorithm to find such a threshold. To avoid over-searching, the algorithm will automatically terminate when the difference between the left and right borders is less than the small value $\epsilon$. For layers with large sizes, such as the first fully-connected layer in VGG16 and softmax layer in LSTM, the time for $\tt{count\_nonzero}$ operation is still not negligible. We further improve the efficiency of the selection algorithm by reducing the number of $\tt{count\_nonzero}$ operations. We recommend that, after a threshold binary search for this layer, the threshold element can be reused in the next few iterations. The interval of search is empirically set to 5, and the selection algorithm introduces only one $\tt{nonzero\_count}$ overhead on average. Such a method is called sampled Threshold binary search selection. \begin{algorithm}[ht!] \caption{Trimmed Top-0.1\% Selection} \label{algo:topk} \begin{algorithmic}[1] \renewcommand{\algorithmicrequire}{\textbf{Input:}} \renewcommand{\algorithmicensure}{\textbf{Output:}} \REQUIRE tensor to be compressed $X$ \REQUIRE number of elements remained $k$ \ENSURE $<indices, values>$ \STATE $mean$ $\gets$ $\tt{mean}$(abs($X$)); $max$ $\gets$ $\tt{max}$(abs($X$)) \STATE $\epsilon \gets 0.2$; $ratio \gets (1-\epsilon)$ \STATE $nnz$ = $\tt{count\_nonzero}$(abs($X$) $>$ $threshold$) \WHILE{$nnz < k$} \STATE $threshold \gets mean + ratio \times (max - mean)$ \STATE $nnz$ = $\tt{count\_nonzero}$(abs($X$) $>$ $threshold$) \STATE $ratio = ratio-\epsilon$ \ENDWHILE \STATE $indices$ $\gets$ $\tt{nonzero\_indices}$(abs($X$) $>$ $threshold$)) \STATE $values \gets X[indice]$ \end{algorithmic} \end{algorithm} \begin{algorithm}[ht!] \caption{Top-0.1\% using Threshold Binary Search Selection} \label{algo:thd} \begin{algorithmic}[1] \renewcommand{\algorithmicrequire}{\textbf{Input:}} \renewcommand{\algorithmicensure}{\textbf{Output:}} \REQUIRE tensor to be compressed $X$ \REQUIRE number of elements remained $k$ \REQUIRE Termination condition parameter $\epsilon$ \ENSURE $<indices, values>$ \STATE $mean$ $\gets$ $\tt{mean}$(abs($X$)); $max$ $\gets$ $\tt{max}$(abs($X$)) \STATE $l \gets 0.0$; $r \gets 1.0$; $threshold = 0.0$ \WHILE{$r - l > \epsilon$} \STATE $ratio = l + (r - l) / 2$ \STATE $threshold \gets mean + ratio \times (max - mean)$ \STATE $nnz$ = $\tt{count\_nonzero}$(abs($X$) $>$ $threshold$) \IF{$nnz > k$ and $2k > nnz$} \STATE break \ELSIF {$nnz < k/2$} \STATE $r = ratio$ \ELSE \STATE $l = ratio$ \ENDIF \ENDWHILE \STATE $indices \gets $ $\tt{nonzero\_indices}$(abs($X$) $>$ $threshold$)) \STATE $values \gets X[indices]$ \end{algorithmic} \end{algorithm} In Figure \ref{fig:select_time}, we compared the time cost of different selection approaches applied to data of different sizes. Test data is generated from a standard uniform distribution. $\tt{Allreduce}$ indicates the time cost to synchronize messages using the Allreduce operation, with a peak network bandwidth of 28 Gbps. Performance is measured as total time cost for 100 times independent operations. Compared with directly performing radixSelect, both proposed methods significantly reduce the selection operation time for data of large size. For top-0.1\% selection on 64MB elements, trimmed top-0.1\% and sampled threshold binary search selection are 38.13 and 16.17 $\times$ faster than radixSelect. In practice, a hybrid compression strategy is adopted: For smaller parameter sets such as biases and batch norm layers, we do not compress residuals or directly use radixSelect to select top-0.1\% significant elements. Trimmed top-0.1\% selection is suitable for parameters of middle size layers, like convolutional layers, because it can ensure the compression ratio to be exactly 0.1\% and introduce no extra communication bandwidth requirements. Threshold binary search based selection is suitable for large size layers, like hidden layers and softmax layers in LSTMs, for which the compression cost is more critical to be optimized than the communication cost. \begin{figure}[ht!] \centering \includegraphics[width=0.5\textwidth]{./topk-EN} \caption{ Performance of four communication-set selection algorithms vs Data sizes. } \label{fig:select_time} \end{figure} \subsection{Quantization of Sparsified Residuals} The sparsified communication-set to be transmitted includes $k$ index elements and $k$ value elements. As indicated in Strom\cite{strom2015scalable}, by setting all value elements of the same sign to their average, the communication bandwidth requirement of value elements can be eliminated by transmitting only one average element instead of $k$ elements. As there are both positive and negative elements in the communication-set, an extra data structure is used to record the sign of each element and extra efforts are required for quantization and de-quantization. To eliminate this overhead, we design a quantization approach called \textit{Alternating Signs Quantization (ASQ)} to further reduce 1/2 of the bandwidth requirement. In two adjacent training iterations, ASQ alternately quantizes the maximum 0.1\% elements and the minimum 0.1\% elements as communication-set instead of quantifying the maximum 0.1\% elements with the largest absolute value. In other words, if we select the largest $k$ elements (all positive numbers) of this layer as the communication-set at current iteration, we will choose smallest $k$ elements (all negative numbers) as the communication-set for the next iteration. Since top-0.1\% and bottom-0.1\% elements are all of the same sign, no communication bandwidth requires to transmit extra sign information. As shown in experimental results, the quantized RedSync using ASQ approach is able to guarantee no accuracy loss. As elements of residuals are designed to be delayed updated hundreds of steps, updating the elements of the same sign one more step later does not have signification impact on the direction of the gradient update. ASQ introduces no quantization overhead and can be implemented efficiently by slightly modifying our parallel-friendly top-0.1\% approaches. Compared with Strom's quantization method, ASQ approach is more memory-efficient and overhead-reduced. Their method uses an extra bitmap to record the sign of each value element, which is also required to be transmitted. Instead of once scan of entire data as ASQ, they have to separate positive and negative elements in the communication-set, and quantize them individually. In addition, it is worth noting that \textit{sampled threshold binary search selection} cannot be used with quantization. We also do not quantify the output layer of the DNN, in order to distinguish the correct classification information. \subsection{Sparse Synchronization and Decompression} \label{sec:sparseAllreduceComm} Synchronization of dense gradient structures in traditional distributed DNN systems can be simply implemented with an Allreduce operation, which has been well-studied on multiple-GPU systems\cite{awan2017s}. However, the design of a sparse Allreduce in a distributed setting is not as simple because each worker may contribute different non-zero indices from its own communication-set. According to our observation, there are very few overlapping indices of the communication-set distribution of different nodes. For example, training VGG16 on Cifar10 dataset using 16 GPUs with a compression ratio as 0.1\% for each node, the averaged compression ratio of synchronized residuals of all nodes is 1.55\%. In this case, it is inefficient to use a sparse Allreduce~\cite{zhao2014kylix, renggli2018sparcml} for synchronization. We utilize the Allgather operation, an operation in which the data contributed by each node is gathered at all nodes, to implement sparse Allreduce. The compressed message representing communication-set of each node should include the information of indices and values of elements in communication-set. When using threshold binary search selection, the length of each node's message is different. As a result, the packaged message should also include an initial element, which indicates the length of the compressed elements. Instead of using two Allgather operations for indices and values message separately, we package the indices and values into a single message to reduce latency. After finishing the Allgather operation, each node collects $N$ compressed communication-sets from all the other nodes. We add the compressed communication-sets to the corresponding weights in the local model after scaling with the learning rate. It can be seen as an operation that adds a sparse array to a dense array, which has been fully-optimized in Level 1 function axpyi() of cuSparse library on GPU. To analyze the potential performance gain of sparse synchronization, we adopt a performance model which is widely-used by~\cite{barnett1994interprocessor, mitra1995fast, thakur2005optimization} to analyze the cost in terms of latency and bandwidth used. We assume that the time taken to send a message between any two nodes can be modeled as $\alpha + n\beta$, where $\alpha$ is the latency (or startup time) per message, independent of message size, $\beta$ is the transfer time per byte, and $n$ is the number of bytes transferred. Generally, the node's network interface is assumed to be single ported, i.e. at most one message can be sent and one message can be received simultaneously. $M$ is the number of elements in residuals of the current layer. $D$ is the compression ratio. If we use \textit{threshold binary search} for communication-set selection, $D$ here should be the average compression ratio of all nodes. In the case of reduction operations, we assume that $\gamma_2$ is the computational cost for performing the reduction operation for a message of size $M$, and $\gamma_1$ is the cost to decompress the collected sparse message of size $M$. Suppose that we use recursive doubling for Allgather and Rabenseifner's algorithm mentioned in \cite{thakur2005optimization} for Allreduce communication. The cost of quantized sparse and dense synchronization is illustrated Equation (\ref{eq:sprs}) and Equation (\ref{eq:dns}), respectively. The derivations are as follows: The left part of Figure \ref{fig:Allgatheralldreduce} illustrates how sparse Allgather works by recursive doubling method. In the first step, nodes that are a distance 1 apart exchange their compressed data, the size of which is $M \times D$. In the second step, nodes that are a distance 2 apart exchange their own compressed data as well as the data they received in the previous step, which is $2M\times D$ in total. In the third step, nodes that are a distance 4 apart exchange their own data as well the data they received in the previous two steps, which is $4M\times D$ in total. In this way, for a power-of-two number of processes, all processes get all the data in lg$p$ steps. The amount of data exchanged by each node is $M\times D$ in the first step, 2$M\times D$ in the second step, and so forth, up to $2^{lg(p)-1}M\times D$ in the last step. Therefore, The time for message transfer taken by this algorithm is $T_{transfer}$ = $lg(p)\alpha + (p-1)M\times D \beta$. After including decompressing overhead $\gamma$ and communication-set selection overhead $T_{select}$, the time for all-gather based synchronization should be $T_{Allgather}$ = $T_{select} + lg(p)\alpha + (p-1)M\times D \beta + p \gamma_1$. As shown in the right part of Figure \ref{fig:Allgatheralldreduce}, the Rabenseifner's algorithm is adopted for Allreduce operation. It does a reduce-scatter followed by an Allgather. Reduce-scatter is a variant of reducing in which the results, instead of being stored at the root, are scattered among all $p$ nodes. We use a recursive halving algorithm, which is analogous to the recursive doubling algorithm used for Allgather but in a reverse way. In the first step, each node exchanges data with a node that is a distance $p/2$ away: Each process sends the data needed by all processes in the other half, which is of size $M/2$. They also receive the data needed by all processes in its own half and performs the reduction operation on the received data. In the second step, each process exchanges data with a process that is a distance $p/4$ away. This procedure continues recursively, halving the data communicated at each step, for a total of lg$p$ steps. After reduce-scatter, Allgather phase will have the the same bandwidth and latency requirements. Therefore, the communication time taken by this algorithm is $T_{transfer}$ = $2lg(p)\alpha + 2\frac{p-1}{p}M\beta$. The time taken by Allreduce is the sum of the times taken by reduce-scatter, Allgather and reduction operations. The total time should be $T_{dense\_Allreduce}$ = $2lg(p)\alpha + 2\frac{p-1}{p}M\beta + \frac{p-1}{p}\gamma_2$. \begin{figure}[ht!] \centering \includegraphics[width=0.5\textwidth]{./allgather-allreduce-crop.pdf} \caption{Communication pattern of sparse synchronization with Allgather and dense synchronization with Allreduce.} \label{fig:Allgatheralldreduce} \end{figure} \begin{equation} \small T_{sparse\_Allreduce} = T_{select} + \lg(p) \alpha + {(p-1)}{(MD)} \beta + p\gamma_1 \label{eq:sprs} \end{equation} \begin{equation} \small T_{dense\_Allreduce} = 2\lg(p) \alpha + 2\frac{p-1}{p} M\beta + \frac{p-1}{p}\gamma_2 \label{eq:dns} \end{equation} As implicated by the performance model, two important conclusions about the current RGC algorithm can be drawn. First, \textbf{the compression rate for the model is not equal to the compression rate for communication bandwidth.} The bandwidth term of sparse synchronization is ($p-1$)$DM$$\beta$, which is proportional to the number of nodes $p$. Even if the compression ratio $D$ is 0.1\% for all $p$ node, when $p$ is 128, the communication bandwidth for sparse synchronization will be 12.8\% of dense synchronization rather than 0.1\%. Second, \textbf{the overhead of decompression rather than communication will be a bottleneck when scaling RGC method to larger scale.} The last term $p\gamma_1$ in Equation \ref{eq:sprs} indicates that the overhead of decompression in sparse Allreduce also increases linearly with the number of nodes $p$. However, in Equation \ref{eq:dns}, reduction overhead of dense Allreduce almost does not increase with number of nodes. \subsection{Overlapping Communication and Computation} \label{sec:overlap} It is necessary to improve data parallel efficiency by overlapping communication with computation through pipelining gradient Allreduce operations and backpropogation calculations. Before updating aggregated gradients to weights, gradient clipping is usually adopted to avoid gradient explosion. It rescales all of the gradients when the sum of their norms exceeds a threshold. For RGC methods, the local clipping technique \cite{lin2017deep} is used to perform gradient clipping by a new threshold ($N^{-1/2}$ of the original one) locally before adding the current gradients to previous residuals. The difference is that traditional data parallel does clipping after communication of all layers is completed, while the RGC algorithm needs to do clipping before communication. In this case, we need to wait for the completion of the entire back-propagation to get gradients of all layers. And then we do clipping on gradients and then perform compression for communication. Local clipping introduces synchronization between computing and communication and thus eliminates the overlapping of communication and computation. As shown in Figure \ref{fig:overlap}, RedSync has abandoned gradient clipping for CNNs, which seldom have gradient exploration problem in order to explore the potential overlapping. As for RNNs, gradients are achieved after backpropagation of all time steps using Back Propagation Through Time (BPTT). When backpropagation of the last time step is completed, gradients of all layers are used to conduct local gradient clipping. In this case, the communication time can only overlap with the compression (selection) operation. \begin{figure}[ht!] \centering \includegraphics[width=0.5\textwidth]{./comm_overlap-crop.pdf} \caption{CNNs and RNNs adopt different schemes to overlap communication with computation.} \label{fig:overlap} \end{figure} \subsection{Other techniques} RedSync supports a set of algorithmic improvements proposed by DGC\cite{lin2017deep} to avoid convergence problem. For momentum SGD and Nesterov momentum SGD optimizers, the momentum masking and momentum correction schemes of DGC are implemented by simply modifying workflow of Algorithm \ref{algo:rgcframework}. A warm-up training, by exponentially decreasing the compression ratio in the first few epochs, is generally adopted to accelerate convergence. For example, it is recommended to decrease the compression ratio in the warm-up period as follows: 25\%, 6.25\%, 1.5625\%, 0.4\%, 0.1\%. However, according to our performance model of communication, such an approach is inefficient on a large scale. For example, synchronization with a compression ratio as 1.5625\% requires 100\% bandwidth of dense Allreduce for quantized RedSync on 64 GPUs. Instead of adopting a high-compression-ratio RGC method of warm-up training, we use original SGD optimizer synchronized by dense Allreduce in first few epochs if necessary. \section{Experimental Results} \subsection{Setups} We tested the accuracy, speed of convergence and scalability of RedSync on two different multi-GPU systems, including a world's top GPU supercomputer (Piz Daint) and a multi-GPU server (Muradin). \textbf{Muradin} is a server with eight GPUs in the same node. It is equipped with one Intel(R) Xeon(R) CPU E5-2640 v4 and 8 TITAN Vs, which is connected to the CPU through PCI-E 3.0. \textbf{Piz Daint} is a GPU supercomputer. Each node of it includes two Intel Xeon E5-2690v3 CPUs and one NVIDIA Tesla P100 GPUs. In total, there are 5320 nodes connected by Aries interconnect with Dragonfly topology. We used pytorch v0.4 to conduct DNN training on a single GPU. In terms of the communication library, an MPI wrapper upon pytorch called horovod \cite{sergeev2017meet}, is used to provide collective communication operations. The CUDA version is 9.1 on Muradin and 8.0 on Piz Daint. Horovod was compiled with OpenMPI v3.1 with cuda-aware supported on both systems. Two major types of mainstream deep learning applications are used in the experiments. For \textbf{Image Classification} tasks, we studied ResNet44 and VGG16 on Cifar10\cite{krizhevsky2009learning}, AlexNet, VGG16 and ResNet-50 on ImageNet\cite{deng2009imagenet}. For all CNNs, we used Nesterov's momentum SGD as the optimizer. RGC methods used the same learning rate strategies as SGD. The warm-up technique was applied to the first 5 epochs of ResNet50 and VGG16 for both SGD and RGC. For \textbf{Language Modeling} tasks, we picked two datasets for evaluation. The Penn Treebank corpus (PTB) dataset \cite{marcus1993building} consists of 923,000 training, 73,000 validation and 82,000 test words. The WikiText language modeling dataset is a collection of over 100 million tokens extracted from the set of verified Good and Featured articles on Wikipedia \cite{merity2016pointer}. It consists 2,088,628 training, 217,646 and 245,569 test words. We adopted a 2-layer LSTM language model architecture with 1500 hidden units per layer \cite{press2016using} to evaluate both datasets. We tied the weights of encoder and decoder and use vanilla SGD with gradient clipping. Learning rate decays when no improvement has been made in validation loss. For RedSync, we used trimmed top-0.1\% selection for convolutional layers larger than 128 KB and used threshold binary search top-0.1\% selection for hidden layers and the softmax layer of LSTM. \subsection{Evaluation of Accuracy and Convergence Speed} \begin{table}[ht!] \small \caption{Accuracy Results for Various DNNs. } \centering \begin{tabular}{|c||c|c|c|c|c|c|c|} \hline \bf \multirow{ 2}{*}{Dataset} & \bf \multirow{ 2}{*}{DNN} & \bf \multirow{ 2}{*}{Size} & \bf \multirow{ 2}{*}{Gflops} & \multicolumn{3}{c|}{\bf Accuracy} \\ \cline{5-7} & \bf & \bf & \bf & \bf SGD & \bf RGC & \bf RGC+ASQ \\ \hline \hline \multirow{ 2}{*}{Cifar10} & ResNet44 & 2.65 & 0.20 & 7.48\% & \textbf{7.17\%} & 7.87\% \\ \cline{2-7} & VGG16 & 59 & 0.31 & 8.31\% & 8.45\% & \textbf{ 8.13\%} \\ \hline \multirow{ 2}{*}{ImageNet} & AlexNet & 233 & 0.72 & \textbf{44.73\%} & 44.91\% & 44.80\% \\ \cline{2-7} & ResNet50 & 103 & 8.22 & 24.07\% & 23.98\% & \textbf{23.85\%} \\ \cline{2-7} & VGG16 & 528 & 15.5 & 29.5\% & \textbf{29.1\%} & 29.3\%\\ \hline PTB & LSTM & 204 & 2.52 & 75.86 & {75.14} & \textbf{74.69} \\ \hline Wiki2 & LSTM & 344 & 2.52 & 88.23 & 88.01 & \textbf{87.84} \\ \hline \end{tabular} \label{tab:acc1} \end{table} As shown in Table \ref{tab:acc1}, we examined the accuracy of both RGC and our proposed quantization version RGC+ASQ on Muradin. The results of RGC and RGC+ASQ are compared with a classical data parallel implementation using SGD. Size indicates the model size in Megabyte. GFlop shows Giga Floating-Point Operations required for a forward pass using a single input sample. Accuracy of CNNs was measured as top-1 validation errors, and accuracy of LSTMs is measured as perplexity on validating dataset. Results on Cifar10 were achieved using 4 nodes (batch-size\footnote{The batch-size here is for a single node.} = 64). Results on ImageNet were achieved using 6 nodes (batch-size = 32). Results of LSTM were achieved using 4 nodes (batch-size = 5). As implicated by Table \ref{tab:acc1}, the accuracy of the models obtained by the RGC and RGC+ASQ methods using RedSync is similar to that obtained by the SGD method using classical data parallel, with a difference of no more than 1\%. In only one case (ImageNet-AlexNet), SGD achieves the best accuracy results, and in the other six cases, RGC and RGC+ASQ are even slightly better than SGD. In three cases (Cifar10-VGG16, ImageNet-ResNet50, Wiki2-LSTM), RGC+ASQ is slightly better than RGC, which indicates that the ASQ quantization method proposed in this chapter is very reliable and has no impact on training accuracy. \begin{table}[ht!] \small \caption{Accuracy of RGC and SGD Methods Under Different Batch Size.} \centering \begin{tabular}{|c||c|c|c|c|c|c|c|} \hline & Batch Size & 128 & 256 & 512 & 1024 & 2048\\ \hline \hline \multirow{3}{*}{ResNet44} & SGD & 7.09\% & 7.48\% & 8.18\% & \textbf{10.02\%} & 10.84\% \\ \cline{2-7} & RGC & \textbf{6.40\%} & \textbf{7.17\%} & \textbf{7.47\%} & 10.13\% & 10.87\% \\ \cline{2-7} & RGC+ASQ & 7.06\% & 7.87\% & 7.62\% & 11.86\% & \textbf{10.83\%} \\ \hline \hline \multirow{3}{*}{VGG16} & SGD & 7.74\% & 8.31\% & \textbf{9.06\%} & \textbf{9.49\%} & 10.09\% \\ \cline{2-7} & RGC & \textbf{7.43\%} & 8.45\% & 9.31\% & 9.90\% & 11.12\% \\ \cline{2-7} & RGC+ASQ & 8.17\% & \textbf{8.13\%} & 9.09\% & 9.97\% & \textbf{9.81\%} \\ \hline \end{tabular} \label{tab:acc2} \end{table} Figure \ref{fig:acccurv} shows the speed of convergence of RGC and RGC+ASQ implemented with RedSync on three typical test cases compared with SGD implemented with the classical data parallel. The left figure shows top-1 validation accuracy vs the number of epochs of training VGG16 on Cifar10 (batch-size = 64). The center figure shows top-1 validation accuracy vs the number of epochs of training ResNet50 on ImageNet (batch-size = 32). The right figure shows Perplexity vs the number of epochs of training LSTM on PTB (batch-size = 5). \begin{figure*}[ht!] \centering \includegraphics[width=0.75\textwidth]{./RedSync-Convergence-EN} \caption{ Speed of Convergence using RedSync compared with classical data parallel implementation. } \label{fig:acccurv} \end{figure*} As shown in Table \ref{tab:acc2}, we also tested the sensitivity of the RGC and RGC+ASQ methods to large training data batch size. when increasing the batch size to 2048, RedSync got no loss of accuracy compared to the original SGD. \subsection{Evaluation of Scalability} To evaluate the scalability of RedSync on different scales, we compare RGC and RGC+ASQ implemented by RedSync with SGD implemented by the data parallel scheme provided by horovod. The performance was measured by averaging training time of 1000 iterations. Figure \ref{fig:muradin} shows the performance of RedSync on Muradin with six test cases. Figure \ref{fig:daint} illustrates the scalability of RedSync on Piz Daint with four test cases. In order to find time-consuming parts, we also illustrate the cost of different parts in RedSync in Figure \ref{fig:percent} when scaling it to 128 GPUs on Piz Daint. Our observations are summarized as follows. Our proposed parallel-friendly selection algorithms for gradient sparsification are critical for improving the overall performance of RGC-based system. In Figure \ref{fig:muradin}, we added a naive RGC implementation, which uses radixSelect to select top 0.1\% elements as communication-set rather than our proposed methods. Since the compression time is too long, the performance of the naive RGC is even much slower than the original data parallel SGD version. After adopting our top-0.1\% selection algorithms, the RGC and RGC+ASQ systems are now able to run faster than the SGD version. Our proposed RGC+ASQ method is better than RGC-only method in most cases. RGC+ASQ always achieves better performance than RGC for CNNs. However, for LSTM training on a small scale, RGC+ASQ achieves worse performance than ASQ. The variance of communication and computational overhead accounts for such a phenomenon. CNN adopts trimmed top-0.1\% as the communication-set selection method and its quantized version (RGC+ASQ) has a similar computation cost. As shown in Figure \ref{fig:percent}, no significant difference of \textit{selection} cost between RCG and RGC+ASQ in CNN training. Therefore, the reducing of communication cost by ASQ improves the system's overall performance. As for selection algorithm of LSTMs, RGC uses sampled threshold binary search selection as communication-set selection, but RGC+ASQ uses threshold binary search. As we mentioned, the sampled selection is much faster. Therefore, on small-scale, RGC has better scalability than RGC+ASQ due to less selection overhead. When scaling to more than 16 GPUs, benefit from the reduction of communication bandwidth compensates for the cost of the communication-set selection. RedSync is suitable for training DNNs of high communication to computation ratio. In the past, these DNNs have been considered as not suitable for classical data parallel. As shown in the Figure \ref{fig:daint}, for VGG16, AlexNet, and LSTM, although the performance of RedSync using RGC and RGC+ASQ on a single GPU are not as good as the data parallel due to compression and decompression overhead, RedSync can achieve significant speedup on more than 2 GPUs. An exception is ResNet50. in most of the cases, RedSync brings no performance gain for it both on Piz Daint and Muradin. As implicated in Table \ref{tab:acc1}, the ratio of computation to the communication of ResNet50 is the highest in the DNNs we investigated. On a large scale, most of the time during ResNet50 training with RedSync is wasted on the decompression phase, as shown in Figure \ref{fig:percent}, which overshadows the benefit of communication bandwidth reduction. RedSync is suitable for the medium parallel scale. As shown in the right part of Figure \ref{fig:daint}, for the AlexNet network, RedSync is strong (brings the most significant performance improvement) on 4-16 nodes, bringing around 3x speedup. For the ResNet50 network, RedSync is strong on 4-16 nodes, bringing around 1.2x speedup. For the VGG16 network, RedSync is strong on 4-64 nodes, bringing around 2x speedup. For LSTM networks, RedSync is strong on 2-16 nodes, bringing around 3x speedup. Since both communication bandwidth requirements and decompression overhead increase linearly with the number of GPUs in use, RedSync is relatively weak on a larger scale. This phenomenon just confirms the communication performance model proposed in Section \ref{sec:sparseAllreduceComm}. \begin{figure*}[ht!] \centering \includegraphics[width=0.78\textwidth]{./RedSync-muradin-EN} \caption{Scalability of RedSync for CNNs and RNNs training using Muradin.} \label{fig:muradin} \end{figure*} \begin{figure*}[ht!] \centering \includegraphics[width=0.78\textwidth]{./RedSync-time-decomp-EN} \caption{Decomposition of time cost of RedSync on Piz Daint. For each two-column group, the left one is for RGC+ASQ and the right one is for RGC. Y-axis is presented as 10 average iteration time.} \label{fig:percent} \end{figure*} \begin{figure*}[ht!] \centering \includegraphics[width=0.80\textwidth]{./RedSync-PizDaint-EN} \caption{Left: Scalability of RedSync for four DNNs on Piz Daint. Right: Speedup of RedSync compared with a classical data parallel implementation.} \label{fig:daint} \end{figure*} \section{Related Works} As shown in Table \ref{tab:relatedworks}, the related works to reduce communication cost in data parallel training of DNNs can be divided into two categories: quantification (Qunat.) and sparsification (Spars.). The compression ratio (Ratio in the table) is for a single node. Impl. in the table Indicates whether the method has been implemented in a real distributed environment. \begin{table}[ht!] \small \centering \caption{Related Works.} \begin{tabular}{|c||c|c|c|c|c|c|c|} \hline Name & Spars. & Quant. & 1/Ratio & Sync. & Impl. & Scale\\ \hline \hline 1-bit SGD\cite{seide20141} & $\times$ & $\surd$ & 32x & PS & $\surd$ & 40 GPU\\ \hline QSGD\cite{alistarh2017qsgd} & $\times$ & $\surd$ & 4-6.8x & PS & $\surd$ & 16 GPU\\ \hline Strom\cite{strom2015scalable} & $\surd$ & $\surd$ & 800x & PS & $\surd$ & 80 GPU\\ \hline AdaComp\cite{chen2018adacomp} & $\surd$ & $\times$ & 40-200x & PS & $\times$ & -\\ \hline TernGrad\cite{wen2017terngrad} & $\times$ & $\surd$ & 16x & PS & $\times$ & - \\ \hline DGC\cite{lin2017deep} & $\surd$ & $\times$ & 1000x & AllRed. & $\times$ & -\\ \hline SparCML\cite{renggli2018sparcml} & $\surd$ & $\surd$ & 256x & AllRed. & $\surd$ & 128 GPU\\ \hline \end{tabular} \label{tab:relatedworks} \end{table} In terms of synchronization scheme (Sync.), DGC and SparCML use Allreduce and the other methods adopt Parameter Server (PS). Allreduce is more suitable for HPC platforms, while PS can hardly benefit from efficient Allreduce routines designed for HPC network hardware. For Allreduce systems, according to analysis in Section \ref{sec:sparseAllreduceComm}, it should be distinguished from the compression ratio of communication bandwidth. Similar for PS systems, the local compression ratio only reflects the bandwidth reduction of pushing gradients of works to the servers, while the bandwidth requirement of pulling gradients from the servers to works also increases linearly with the number of nodes. RedSync is the best in terms of scale compared with the other distributed implementations. SparCML also scales DNN training to 128 GPUs, but it adopts a "fast randomized top-$k$ algorithm", which is not equal to the top-$k$ selection. Its communication-set misses some important gradient elements and the system will suffer from convergence problem. Both Storm and SparCML combine quantization technique with sparsification, but in a less efficient way than our proposed ASQ method. As we mentioned, Storm's method is less efficient than ASQ, while SparCML quantizes the value elements of communication-set using 4-bit precision. In terms of accuracy, DGC, TernGrad, and AdaComp presented comprehensive evaluation results on classical CNNs and RNNs. The other methods are either tested on some specified DNN models or have relative large accuracy loss compared with SGD. RedSync has been comprehensively evaluated using most of the test cases used in DGC. It is unfair to compare the absolute speedup achieved by each proposed method, because the achievable benefit is dependent on multiple factors of experimental settings, including the type of DNN model, the bandwidth of network hardware and the speed of computing hardware. The Aries interconnect of Piz Daint used in our experiments is the most high-quality one compared with others, which means RedSync is able to achieve more performance gain on low-quality network hardware. \section{Conclusion} This paper proposes an innovative data parallel DNN training design called RedSync that compressing transmitting data by gradient sparsification and quantization. Residual Gradient Compression (RGC) method is used for sparsification. RedSync solved two major obstacles to implement RGC on multi-GPU systems: the high overhead of communication-set selection on GPU and lack of support for collective communication scheme for sparse data structures. Based on RGC, Alternating Signs Quantization (ASQ) method is first proposed, which further reduces half of the communication bandwidth requirement and introduces no extra overhead. The performance and accuracy of RedSync are evaluated on two typical GPU platforms, including a supercomputer system and a multi-GPU server. For AlexNet, VGG16, and LSTM, RedSync brings significant speedup for large-scale DNN training.
\section{Introduction} \label{intro} Causal Dynamical Triangulations (CDT) is an attempt to formulate a non-per\-turbative lattice theory of quantum gravity (see \cite{physrep,loll} for reviews). As in other lattice field theories, the length of the links $\varepsilon$ provides us with an UV cut-off, and the continuum limit should be obtained by removing the cut-off, i.e., by adjusting the bare (dimensionless) lattice coupling constants in such a way that $\varepsilon \to 0$ while some suitably chosen physical observables remain constant \cite{munster}. The use of so-called ``dynamical triangulations'' (DT) goes all the way back to attempts to provide a non-perturbative formulation of Polyakov's string theory. It provided a lattice formulation where the functional integration over the intrinsic worldsheet metric was represented as a summation over two-dimensional triangulations \cite{DT,5,6,7}. These triangulations were constructed by gluing together equilateral triangles, which were considered flat in the interior, such that they formed a piecewise linear manifold with a fixed topology. The side-length $\varepsilon$ of the triangles served as the UV cut-off. In this way, each piecewise linear manifold (i.e., triangulation) was equipped with a geometry, different triangulations corresponded to different geometries, and one had a coordinate-free representation of the geometries. While the bosonic strings in physical target dimensions (i.e., dimensions larger than two) presumably do not exist because of the existence of tachyons in the spectrum, the so-called non-critical strings, which in the Polyakov formulation are represented as two-dimensional quantum gravity coupled to conformal field theories with central charge $c < 1$, are well defined theories, {many aspects of which} can be found analytically, both working in the continuum \cite{KPZ,Dav88,DK89,fateev} and (surprisingly) also in the lattice DT formalism \cite{2dDT,more2dDT}. The results agree in the $\varepsilon \to 0$ limit, thus providing explicit examples of successful lattice regularizations of diffeomorphism-invariant theories. A nice feature of the DT formalism is that it is coordinate-independent, and this includes the cut-off $\varepsilon$. The generalization of DT to quantum gravity with Euclidean signature in higher dimensions is in principle straightforward \cite{higherDT,Agishtein:1991cv}. {Extrapolating from the two-dimensional theory, we might thus have a four-dimensional lattice theory of gravity where the continuum limit provides us with a diffeomorphism-invariant theory of quantum gravity.} However, it has not (yet) been possible to find an interesting $\varepsilon \to 0$ limit for the lattice theory \cite{firstorder,Catterall:1997xj,firstorder1,Coumbe:2014nea}. This led to CDT~\cite{originalCDT,Ambjorn:2005qt,ajl1,agjl,Ambjorn:2007jv}, where the starting point is a globally hyperbolic manifold and a corresponding time foliation; thus, the functional integral is then performed over Lorentzian geometries. CDT provides a lattice description of this, which involves a lattice choice of a proper time coordinate, but where the spatial geometries at each lattice time are represented as three-dimensional Euclidean-signature DT triangulations. While DT represents a completely coordinate-free lattice formulation of the path integral of quantum gravity, the precise continuum interpretation of CDT is still open for interpretation. It is a lattice theory which can be viewed as coordinate-free in the spatial directions, while a gauge fixing of the lab-function has been made in the time direction. Presently it is not known if the resulting continuum theory (assuming it can be defined) should be viewed as a gauge fixed version of General Relativity (GR) or Ho\v{r}ava-Lifshitz gravity (HLG) \cite{horava1,horava2}, the later being defined precisely as a theory with a time-foliation and being invariant under spatial diffeomorphisms. Whether CDT is a lattice representation of GR or HLG, each lattice configuration that appears in the CDT path integral is ``coordinate-free'' in the spatial directions. If one knows the three-dimensional triangulation of space, i.e., which simplices are glued together, one can in principle reconstruct the exact piecewise linear spatial geometry. From the point of view of both GR and HLG, this seems to be an ideal situation. Just by being given the connectivity of the triangulation (which simplices are glued together, etc.) the geometry is given without the use of coordinates. However, being configurations in a path integral, these geometries are quite fractal, since they incorporate quantum fluctuations at all scales, and to actually obtain a useful description of such geometries, it might be advantageous to have a suitable coordinate system. This is where the topology of space can play a role. If the topology of space is that of a three-torus ($T^3$), rather than the simpler topology of the three-sphere ($S^3$), we can use the periodic structure and the presence of non-contractible loops both to introduce useful coordinates and to map out the fractal structure of space in typical configurations present in the path integral. This is one of the reasons we have extended the original studies of CDT where space had the topology of $S^3$ to the situation where space has the topology of $T^3$; this line of research has been pursued in \cite{pseudo-car,fractal-torus,cosmic-void,long-article}. There are other motivations for extending the study of CDT with spatial topology $S^3$ to that of $T^3$. Contrary to four-dimensional DT, the lattice theory based on CDT has an interesting phase diagram. By that, we mean that when we vary the bare coupling constants of the theory, we observe second-order phase transitions. Such transitions are usually believed to be a necessity if one attempts to remove the lattice cut-off $\varepsilon$ by changing the bare coupling constants in such a way that physical observables stay fixed (and equal to the value they are assumed to have in the continuum theory). The reason is that second-order phase transitions are often related to the appearance of a divergent correlation length, and expressing physics in terms of this divergent correlation length makes it possible to move from a lattice to a continuum description. In the CDT theory, we have second-order phase transitions, which could be candidates for defining a continuum limit of the lattice theory. Usually, properties of such phase transitions are dictated by physics in the bulk, and one would expect them to be independent of the topology of the underlying spacetime. However, the phase transitions found in CDT are in many respects quite special and share some characteristics with so-called topological phase transitions studied in condensed matter systems. Thus, it was not ruled out that changing topology could also change the nature of the phase transitions. In the end, this was not what we observed, but changing the topology of space from $S^3$ to $T^3$ makes it easier to access certain parts of the phase diagram and thus allowed us to obtain a more complete picture of the CDT phase diagram, as is described below \cite{torus-phases1,towardsUV,torus-phases2}. One achievement of the study of CDT with spatial topology $S^3$ was that for certain choices of the bare coupling constants, the measurements of the scale factor $a(t)$ of the universe, where $t$ is the above mentioned CDT proper time, could be described by a Hartle--Hawking minisuperspace model \cite{originalCDT,Ambjorn:2005qt,ajl1,agjl,Ambjorn:2007jv}. Even the fluctuations of the measured scale factor were well described by the minisuperspace model. Changing the spatial topology provides a non-trivial test of this picture, since the term in the Hartle--Hawking minisuperspace model that reflects the curvature of space is different for spherical and toroidal spatial topology. It turns out that in order to fit the computer data obtained for the toroidal topology of space, we have to make precisely such an adjustment of the minisuperspace action. We consider this consistency to be quite remarkable, and it should be emphasized that at no point is any background geometry put in by hand. Nevertheless, after integrating out all degrees of freedom except the scale factor, the resulting path integral results in an effective action similar to the Hartle--Hawking minisuperspace action, and the average value of the scale factor is the extremum of this action. Thus, for both spherical and toroidal spatial topology backgrounds, ``geometries'' have emerged from the path integral, and these backgrounds are, as will be described below, very different \cite{impact-topology,kevin}. Here the toroidal case is especially interesting, since it allows us to measure terms in the effective minisuperspace action, which are not just terms similar to the usual terms one obtains from the standard Einstein--Hilbert action by assuming isotropy and homogeneity of space. They thus represent genuine quantum effects. As we will explain below, it is not possible to measure these terms when the spatial topology is $S^3$. Finally, spatial toroidal topology allows us to study the effect of adding dynamical scalar fields with non-trivial winding numbers to the action, and whereas scalar fields did not have a large impact on the spacetime dynamics of CDT with spherical topology, the situation is very different when the topology is toroidal and boundary conditions of the scalar fields are non-trivial. The rest of the article is organized as follows: in Section~\ref{sec2}, we provide for completeness a short definition of CDT and discuss the CDT phase diagram as seen when the spatial topology is $T^3$. In Section~\ref{sec3}, we show that the minisuperspace description is still valid when the spatial topology is $T^3$, while Section~\ref{sec4} discusses why the minisuperspace description, albeit quite precise, does not really reveal how spatial baby universes can dominate quantum fluctuations. Section~\ref{sec5} shows that, in the case of toroidal topology, one can use scalar fields with non-trivial boundary conditions as coordinates, and that the use of these coordinates provides us with a detailed map of the quantum geometry. In Section~\ref{sec6}, we study the effects of including dynamical scalar fields with non-trivial boundary conditions in the action. The results seem to be quite dramatic, as the inclusion of dynamical scalar fields results in a new kind of phase transition. Finally, Section~\ref{sec7} contains a discussion. \section{CDT and Its Phase Diagram}\label{sec2} \subsection{Defining CDT} Let us briefly describe how CDT implements the lattice version of a four-dimensional hyperbolic manifold with a Lorentzian geometry (for details, we refer to \cite{physrep}). First, one chooses integer time labels $t_n$. For each such time $t_n$, one constructs a three-dimensional Euclidean piecewise linear manifold $\Sigma(t_n)$ by gluing together three-dimensional tetrahedra with link lengths $a_s\!=\! \varepsilon$. All $\Sigma(t_n)$ have the same topology, which we denote $\Sigma_{top}$. The four-dimensional slab between two three-dimensional triangulations at $t_n$ and $t_{n+1}$ is now ``filled out'' by four-simplices that have four vertices at $t_{n}$ (i.e., they form one of the tetrahedra there) and one vertex at $t_{n+1}$. We denote such a four-simplex a (4,1)-simplex. Alternatively, a four-simplex can have three vertices at $t_{n}$ (which form a triangle, shared by two of the tetrahedra at $t_n$) and two vertices at $t_{n+1}$ (which form a link shared by a number of tetrahedra at $t_{n+1}$). We denote such a four-simplex a (3,2)-simplex. The construction is illustrated in Figure~\ref{F:Simplices}. Analogously, one can construct (2,3)-simplices and (1,4)-simplices. For each of these four-simplices, the links connecting $t_n$ and $t_{n+1}$ are considered time-like with proper length squared $a^2_t = -\a\, \varepsilon^2$, $\a > 0$. The gluing of these four-simplices should be such that the topology of the slab between $t_n$ and $t_{n+1}$ is $\Sigma_{top} \times [0,1]$. In the CDT path integral, one now performs a summation over all possible three-dimensional triangulations for each of the time slices with topology $\Sigma_{top}$ and all possible ways to connect two neighboring time slices in the way described above. The lattice spacing $\varepsilon$ is the UV cut-off in the path integral. In a continuum path integral, we would like to use the Einstein--Hilbert action. There might be good reasons to also include higher derivative terms, but here we will restrict ourselves to the Einstein--Hilbert action, which has a natural geometric representation on piecewise linear manifolds, known as the Regge action \cite{regge} (for attempts to add in an explicit way higher curvature terms to the Regge action, see~\cite{highercurvature}). One important aspect of the CDT construction is that we, for each four-dimensional triangulation, can perform a rotation to Euclidean geometry by rotating $\a \to -\a$ via the lower complex plane. By such a rotation, we have the following transformation of the Regge action for a Lorentzian CDT triangulation $T_L$ to an Euclidean triangulation $T_E\;$: $i S_R(T_L) \to -S_R(T_E)$. Because our piecewise linear manifold is constructed by gluing together only the two kinds of four-simplices shown in Figure~\ref{F:Simplices}, the Regge action becomes very simple, and remarkably, it depends only on the total number of (4,1)-, (1,4)-, (3,2)- and (2,3)-simplices, the number of vertices $N_0$, the asymmetry parameter $\a$ and the bare lattice coupling constants. After the rotation to an Euclidean triangulation $T_E$, the Regge action can be written as \beql{SRegge} S_{R}[T_E]=- (K_{0} + 6 \Delta) N_{0}+K_{4}\left(N_{(4,1)}+N_{(3,2)}\right)+\Delta \ N_{(4,1)}. \end{equation} where $N_{(4,1)}$ is the number of (4,1)- and (1,4)-simplices and similarly $N_{(3,2)}$ denotes the number of (3,2)- and (2,3)-simplices. $\Delta$ is a rather complicated function of $\a$ and it is called the asymmetry parameter. $\Delta =0$ corresponds to $a_s = a_t$. Finally, $K_0$ is proportional to the inverse of the bare, dimensionless lattice version of Newton's gravitational coupling constant, and $K_4$ can be related to the bare lattice cosmological constant. While $\Delta$ appears as an asymmetry between spatial and time directions that we have put in by hand, we will treat it as an additional coupling constant. Thus, our model has three coupling constants, $\Delta$, $K_0$ and $K_4$. \begin{figure}[t] \centering \includegraphics[width=0.45\linewidth]{41simplexC.pdf} \includegraphics[width=0.45\linewidth]{32simplexC.pdf} \caption{ {Visualization of the elementary building blocks of four-dimensional Causal Dynamical Triangulations (CDT), the $(4,1)$-simplex (\textbf{left}) and the $(3,2)$-simplex (\textbf{right}). }} \label{F:Simplices} \end{figure} After the rotation from Lorentzian triangulations $T_L$ to Euclidean triangulations $T_E$, we can view the path integral as a partition function for a statistical theory of random geometries, but note that the set of Euclidean triangulations we obtain this way is different from the set of Euclidean triangulations one constructs in DT, since they have a time foliation. We now write: \beql{ZE} { Z}_{CDT} = \sum_{ T_L}\mbox{e}^{i S_{R}[ T_L]} \xrightarrow[\alpha \, \to \, -\alpha]{} { Z}_{CDT} = \sum_{ T_E}\mbox{e}^{-S_{R}[{ T_E} ]} \ . \end{equation} The advantage of this rotation is that we can study the partition function using Monte Carlo simulations, which we do in the rest of this article. Such Monte Carlo simulations can be used to generate a sequence of spacetime configurations, where the relative probability of a given configuration (i.e., an Euclidean CDT triangulation $T$) will be given by the Boltzmann factor $e^{-S_R[T]}$. Thus, one can use a sequence of such configurations to calculate expectation values of spacetime ``observables'', or one can try to study specific features of the configurations. \subsection{The CDT Phase Diagram} As mentioned above, one of the first tasks in a lattice field theory is to determine the phase diagram, i.e., to understand where there can be phase transitions as a function of the bare coupling constants of the theory. Values of the bare coupling constants where a second order phase transition occurs are points where one might attempt to define a continuum limit of the lattice field theory. We study the theory using Monte Carlo simulations. Thus, we are always bound to have a finite spacetime volume. There are two implications of this. First of all, real phase transitions only take place at infinite spacetime volume, so what we observe for finite volume is a ``pseudo-transition''. Sometimes it is not easy to decide if the system really moves towards a critical behavior of the variable chosen to characterize the transition when the size of the system goes to infinity, or whether one is just observing some rapid ``cross-over'' of that variable. It might require a systematic study of the system as a function of the lattice size $N$. For a theory of gravity, there is the additional twist that the volume of spacetime itself is a dynamical variable. In the Monte Carlo simulations, the volume $N_4$, the number of four-simplices forming the spacetime, fluctuates. In the Monte Carlo simulations, we have often found it convenient to fix $N_4$ or $N_{(4,1)}$ (to the extent {allowed by} the computer algorithms {we use to evolve the triangulations).} We compensate for this by performing computer simulations for a whole range of $N_4$. From the action \rf{SRegge}, it is seen that keeping $N_4$ or $N_{(4,1)}$ fixed implies that $K_4$ is not playing a role in the phase diagram, which is thus two-dimensional, depending on $K_0$ and $\Delta$. Despite the very simple nature of the action \rf{SRegge}, the phase diagram is quite complicated, as shown in Figure~\ref{Phasediagram}. The red curves show what is believed to be second-order phase transitions, the blue curve shows a first order transition, and the black curve a transition {of either first or second order, to be determined in further studies.} Most of the phase diagram was {established} some time ago, using the original CDT set-up, where the constant time slices $\Sigma(t)$ had the topology of $S^3$. However, the neighborhood of the black curve, which is perhaps the most interesting part, was only reachable in the Monte Carlo simulations after we changed the topology of $\Sigma(t)$ to $T^3$. We will discuss below why there could be such a dependence on topology. The phase transitions in lattice gravity are unusual, since they are transitions involving spacetime itself. Usually, phase transitions of a statistical system take place in a fixed spacetime background, and higher-order transitions are typically defined by a divergent correlation length associated with an order parameter (e.g., the correlation length of spin correlation functions for ferromagnetic systems). Measurements also take place on a fixed spacetime background, which of course is most often just flat spacetime. In lattice gravity, however, it is not clear what order parameter to use and whether or not it makes sense to talk about a correlation length of a wildly fluctuating geometry. In view of this, it is maybe unsurprising that the phase transitions we have observed have been somewhat unusual. Nevertheless, it has to some extent been possible to apply the usual understanding of phase transitions, as we will now explain. \begin{figure}[t] \includegraphics[width=0.95\linewidth]{PhaseLinesJan-1.pdf} \caption{The CDT phase diagram. The phase transition between phase $C_{dS}$ and $C_b$ is (most likely) second order, as is the transition between $C_b$ and $B$, while the transition between $C_{dS}$ and $A$ is first-order. The transition between $C_{dS}$ and $B$ is still under investigation, and so is the $A-B$ phase transition.} \label{Phasediagram} \end{figure} Our present understanding of the phases is the following. What is denoted as the $C_{dS}$-phase (the so-called de Sitter phase; sometimes denoted as just the C phase) in Figure~\ref{Phasediagram} is characterized by the homogeneity and isotropy of the spatial triangulations of $\Sigma(t)$ in the limit where the number of tetrahedra goes to infinity. The phase transition between phase $C_{dS}$ and the so-called bifurcation phase $C_b$ breaks this symmetry. Special vertices of high order (i.e., vertices sharing a large number of simplices) start to develop, and they are {only} loosely connected over time $t$. As we move towards the phase denoted $B$, the order of these singular vertices grows, and the universe starts to contract in the time direction. The phase transition between the $C_b$ and the $B$ phase is one where the time dimension effectively disappears, with most of the $N_{(4,1)}$ simplices incident on a single time-slice, i.e., a phase transition of dimensional reduction. Finally, the phase transition between phase $C_{dS}$ and the so-called phase $A$ also has an interpretation as a change of geometry. Phase $C_{dS}$ is characterized by a strong correlation between neighboring time slices, and it is this correlation that ensures that the geometries in the $C_{dS}$ phase have an interpretation as a genuine four-dimensional geometry (as we will discuss in detail in the next Section). However, the transition to phase $A$ is one where this correlation is lost, and phase $A$ can, loosely speaking, be viewed as a time-sequence of disconnected spatial universes, and one interpretation is that, moving into phase A, the conformal factor instability of Euclidean gravity will dominate. The transition between phases $A$ and $B$ is probably not so interesting from the point of view of physics, but the point where the C, B and A phases meet {\it is} very interesting, as it can be a potential fixed point of the theory and can thus play an important role in understanding how to obtain the continuum limit of the lattice theory. \begin{figure}[th] \includegraphics[width=0.32\linewidth]{fazaAa-new.pdf} \includegraphics[width=0.32\linewidth]{fazaBa-new.pdf} \includegraphics[width=0.32\linewidth]{fazaCa-new.pdf} \caption{{{Typical volume profiles} $n_t=N_{(4,1)}(t)$ in various CDT phases in spherical spatial topology $\Sigma=S^3$.}} \label{F:VolSphere} \end{figure} \vspace{-6pt} \begin{figure}[h] \includegraphics[width=0.3\linewidth]{fazaAt-new.pdf} \includegraphics[width=0.3\linewidth]{fazaBt-new.pdf} \includegraphics[width=0.3\linewidth]{fazaCt-new.pdf} \caption{ {{Typical volume profiles} $n_t= N_{(4,1)}(t)$ in various CDT phases with toroidal spatial topology $\Sigma=T^3$. The volume profile in the $C_b$ phase is similar to the profile for $\Sigma =S^3$}.} \label{F:VolTorus} \end{figure} {The different types of spatial volume profiles just discussed are shown in \mbox{Figures~\ref{F:VolSphere} and \ref{F:VolTorus}}.} They show $N_{(4,1)}(t)$ for typical triangulations generated by Monte Carlo simulations in the various phases. In phase $C_{dS}$, it is seen that the universe has a well-defined extension both in space and time directions. This is true both for the spatial topology $S^3$ and $T^3$, although the average profiles around which the spatial volume fluctuates are very different in the two cases. {{In the case of }$\Sigma=S^3$ the spatial volume profile in phase $C_b$ is seemingly very similar to the profile in phase $C_{dS}$. However, a closer analysis shows that the time extension of a ``blob'', like the one shown in Figure~\ref{F:VolSphere} (right), in phase $C_b$ does not scale in the correct way in the time direction when one increases the size $N_4$ of the triangulation. If the spatial topology is $\Sigma=T^3$, the volume profile in phase $C_b$ has a ``blob'', like for topology $S^3$, and thus looks increasingly different from the volume profile in phase $C_{dS}$ when one approaches phase $B$}. We will discuss this in the next section. Although the phase transitions observed in CDT have a relatively transparent physical interpretation as being related to a change in the typical geometry of configurations dominating the partition function when one changes the coupling constants, i.e., a competition between entropy of a certain kind of configurations and weight they receive via their action, the characteristics of the phase transitions are somewhat atypical. One atypical feature is that the second-order transitions for smaller systems show hysteresis and atypical double peak structures {for histograms} of some of the observables. These are features that are associated with first-order transitions, and they usually become more pronounced when the system size increases. Here, the opposite often happens: the double peaks and the hysteresis disappear with increasing system size. Furthermore, when we analyze the change in the position of the pseudo-critical points as a function of the system size, the critical exponents associated with such a change favor higher order transitions for the transition lines shown in red in Figure~\ref{Phasediagram}. As an example, one can choose as an order parameter the ratio $OP_2 = N_{(3,2)}/N_{(4,1)}$ and study the change of $\langle OP_2(K_0,\Delta)\rangle$, as well as the so-called susceptibility $\chi_{OP_2} = \langle OP_2^2 \rangle - \langle OP_2\rangle^2$, {when $K_0$ and/or $\Delta$ are changed}. One usually identifies the pseudo-critical points as the values $K_0, \Delta$ where $\chi_{OP}$ has a peak (assuming that $OP$ is a good order parameter for the transition). Figure~\ref{Figfit} shows the results of such measurements for the $C_b-B$ transition for toroidal topology for the case where $K_0$ is kept fixed and $\Delta$ is varied until one finds the maximum of $\chi_{OP_2}$, thus identifying the pseudo-critical $\Delta^c(N_{(4,1)})$. The fit is of the form \beql{ja1} \Delta^c(N_{(4,1)}) = \Delta^c (\infty) - {C}\,{N_{(4,1)}^{-1/\nu}}, \end{equation} {where $\nu =1$ is the exponent for first-order transitions and $\nu > 1$ is expected for higher-order transitions.} \begin{figure}[t] \centering \includegraphics[width=0.7\linewidth]{ScalingFit.pdf} \caption{Lattice volume dependence of the pseudo-critical $\Delta^c(N_{(4,1)})$ values in CDT with toroidal spatial topology and for fixed $K_0=2.2$ together with the fit of the finite size scaling relation \rf{ja1} with critical exponent $\nu=2.7$ (orange solid line) and the same fit with a forced value of $\nu=1$ (blue dashed~line). } \label{Figfit} \end{figure} To understand why some of the results of the numerical simulations are ambiguous, it is important to understand the nature of the simulations: they are Monte Carlo simulations where one attempts to locally change the triangulations, and where the change is accepted or rejected according to the so-called Metropolis algorithm {with a probability} depending on the action of the configurations. Eventually, starting with one triangulation and making a number of such local changes, one will generate another statistically independent triangulation, with the relative probability dictated by the exponential of the action. However, even with a local updating algorithm that is ergodic, i.e., whose repeated application allows one to reach any configuration {with the same topology}, many such local updates might be needed. This problem is well known near phase transitions {in simpler statistical systems, and it might occur here as well.} Our present understanding is that the creation of {high-order vertices} might be easy using a local updating algorithm, but resolving them might take many attempts, as it might require a major rearrangement of the triangulation. This might explain why certain rearrangements might be easier {in the case of larger triangulations, for which the hysteresis disappears}. It might also explain why certain aspects of the phase transitions look different {depending on} {whether} we impose spatial topology $S^3$ or $T^3$. As already mentioned, we are only able to reach the region near the $C_{dS}$ and $B$ transition using toroidal topology. In the case of spherical topology, the computer time it takes to generate genuinely independent triangulations becomes too long for large triangulations. \section{The Effective Minisuperspace Action}\label{sec3} Let us consider the computer simulations of a quantum universe, for $N_4$ (or for convenience, often $N_{(4,1)}$) fixed, for a choice of coupling constants $K_0, \Delta$ such that we are in the de Sitter phase, and with periodicity in the time direction assumed. In the case where the spatial topology is that of $S^3$, this {assumption is made} mainly for the convenience of the computer simulations, and it plays no role in the numerical results if the total length $T$ of the time {coordinate} is large enough. In the case of toroidal spatial topology, however, it is {not only convenient, but also} natural. From plots of the spatial volumes $n_t \!=\! N_{(4,1)}(t)$ as functions of $t$, as shown in Figures~\ref{F:VolSphere} and \ref{F:VolTorus}, it is clear that the volume profiles $n_t$ are very different when space has the topology of {$T^3$ rather than that of $S^3$.} The profiles are also relatively well defined; i.e., it makes sense to attempt an interpretation of these profiles as a ''background profile'' with superimposed quantum fluctuations. One can try to substantiate such a picture by a careful study of the $\langle n_t\rangle $ and $\langle n_t n_{t'}\rangle$. In this way, we are basically studying the quantum mechanics of a single variable, namely the ``scale factor'' $a(t) := n^{1/3}_t$ of the universe. Note that we are not imposing a minisuperspace restriction on our theory, but we are simply integrating out all degrees of freedom other than $a(t)$ in the path integral. A priori, it is not clear that one will obtain any useful description of the system in terms of $a(t)$, or that it makes sense to talk about a ``background profile'' for $a(t)$, since no background geometry is put into the path integral. $\langle n_t \rangle$ is shown in Figure~\ref{fig:spheretorus}, together with profiles for typical configurations, for $\Sigma$ with the topology of $S^3$ and $T^3$, so that one can assess the size of the fluctuations around $\langle n_t \rangle$ for the particular size of triangulations used. \begin{figure}[t] \includegraphics[width=0.5\textwidth]{nt-sphere.pdf} \includegraphics[width=0.5\textwidth]{nt-torus.pdf} \caption{The average (red) and typical (blue) volume profiles for spherical spatial topology (left figure) and for toroidal spatial topology (right figure) in the $C_{dS}$ phase. In both cases, the time direction has length T = 80 (in lattice units) with periodic boundary conditions. } \label{fig:spheretorus} \end{figure} In the case of the sphere, the part of the volume profile where $\langle n_t \rangle$ is significantly larger than the minimal value (i.e., five tetrahedra forming a triangulation of $S^3$) is given by the formula \beql{ja3} \langle n_t \rangle \propto N_{(4,1)}^{3/4} \cos^3 \left( c \;\frac{t}{ N^{1/4}_{(4,1)}} \right). \end{equation} The constant $c$ in the above expression is independent of $T$ and $N_{(4,1)}$. The important point is that {the} time-extent of the ``blob'' is independent of $T$ (for sufficiently large $T$), and thus the time-extent of the blob will grow as $N_{(4,1)}^{1/4}$, showing that the blob represents a genuine four-dimensional ``sphere''. In the case of the torus, we have on the other hand, \beql{ja4} \langle n_t \rangle \propto \frac{N_{(4,1)}}{T}, \end{equation} and thus the spatial volume profile depends on the choice of $T$. Since the fluctuations are relatively small, and increasingly so, for increasing $N_{(4,1)}$, it makes sense to construct a minisuperspace action $S[n_t]$ such that the extremum of $S[n_t]$ is $\langle n_t \rangle$ and the fluctuations $\eta_t = n_t - \bar n_t$ are described by the quadratic expansion of $S[n_t]$ around $\bar{n}_t = \langle n_t \rangle$. Thus, we write \begin{equation}\label{j2} {S[n = \bar n + \eta] = S[\bar n] + \frac{1}{2} \sum_{t,t'} \eta_t P_{t t'} \eta_{t'} + O(\eta^3).} \end{equation} To quadratic order in the fluctuations we can determine $P_{tt'}$ by measuring the covariance matrix \begin{equation}\label{j1} C_{t t'} = \langle \eta_t \eta_{t'} \rangle = \left\langle (n_t - \langle n_t \rangle) (n_{t'} - \langle n_{t'} \rangle) \right\rangle. \end{equation} To quadratic order in $\eta_t$, $P$ is the inverse of the covariance matrix: \begin{equation}\label{j3} P_{t t'} = [C^{-1}]_{t t'} = \left. \frac{\partial^2 S[n_t]}{\partial n_t \partial n_{t'}}\right|_{{n_t =\bar{n}_t }}. \end{equation} In this way, a measurement of the covariance matrix in principle allows us to determine the minisuperspace action $S[n_t]$ up to quadratic order in the fluctuations. In practice, there are a number of technical issues, which {depend somewhat on whether $\Sigma(t)$ has the topology of $S^3$ or that of $T^3$.} For the case of $S^3$, we refer the reader to the original articles or to the review \cite{physrep}, while details for $T^3$ can be found in \cite{impact-topology,kevin}. Let us here just summarize the results in the following formula: \begin{equation}\label{j20} {S[n_t] = \sum_t\left[ \frac{1}{\Gamma} \frac{(n_{t + 1} - n_t)^2}{n_{t + 1} + n_t} + \alpha \,n_t^{1/3}+ \mu \, n_t^{\gamma} +\lambda \, n_t\right] .} \end{equation} It should be mentioned that it is possible to derive \rf{j20} by an independent method, which we refer to as the transfer matrix method. It studies the transition amplitude between neighboring time-slices and relates the amplitude to an effective action (for details, see~\cite{transfer,transfer2} for the general description and the use in the case of $S^3$, and \cite{kevin} for the use in the case of $T^3$). Within measurement precision, the action \rf{j20} can reproduce our measurements of $\langle n_t \rangle$ and $\langle n_t n_{t'}\rangle$. In the effective action $S[n_t]$, the first term is a discretized version of a kinetic term, and the coefficient $\Gamma$ is the same for both spherical and toroidal spatial topology. $\Gamma$ depends on the bare coupling constants used in the simulation and can be viewed as proportional to a dimensionless lattice gravitational coupling constant. The next term is linear in the scale factor $a(t) = n_t^{1/3}$. As we will discuss shortly, its origin in a minisuperspace model of the universe, where one assumes isotropy and homogeneity, is that of intrinsic curvature of the three-dimensional space at time $t$, i.e., a term $V_3(t) R_3(t) \propto a(t)$, where $V_3(t)$ is the three-dimensional volume and $R_3(t)$ is the scalar curvature on the three-dimensional space at $t$. In the case of $S^3$, such a term is present, and we find indeed that $\a$ is not zero when we construct $S[n_t]$. For the torus, one has $R_3(t) =0$, and we find that $\a\! = \! 0$ is consistent with our data for $T^3$. The coupling constant $\lambda$ has a minisuperspace interpretation as proportional to a cosmological constant. However, as long as we fix the four-volume in our computer simulations, $\lambda$ does not really play the role of a physical cosmological constant, but rather of a Lagrange multiplier, which ensures that the extremum of $S[n_t]$ is the $\bar{n}_t$ we observe. In the case of $S^3$, this implies that $\lambda \propto - 1/N_{(4,1)}^{1/2}$. In the $T^3$ case, the constant solution shown in Figure~\ref{fig:spheretorus} corresponds to $\lambda\!=\! 0$ if we ignore the term $\mu\, n_t^\gamma$ in \rf{j20}. Let us now turn to this term. As we will show below, all terms on the right-hand side of \mbox{Equation~\rf{j20}} appear in a classical GR minisuperspace action, except the term $ \mu \, n_t^\gamma$. This term thus seems to be a genuine quantum term. Unfortunately, it is subleading compared to the term $\a \, n_t^{1/3}$ in the case of the sphere. Thus, we cannot really determine it reliably from the data. However, in the toroidal case, $\a \, n_t^{1/3}$ is absent, and we can determine the term. We find that the exponent $\gamma \approx -1.5$. Currently, we do not understand the origin of such a non-integer power, and since it is determined numerically, it might just be one among further subleading terms. Furthermore, it is unclear if it is linked to the topology of space since, as mentioned, we cannot determine it reliably for spherical topology. {Of course, such terms are of great interest since they might be important when the spatial volume of the universe is small. We hope to be able to determine the terms more precisely in future simulations.} It is natural to compare the action \rf{j20} to the standard Hartle--Hawking minisuperspace action in spaces with Euclidean signature, which is derived from the standard Einstein--Hilbert action by assuming isotropy and homogeneity of space. If we fix the time coordinate to be proper-time with a lapse function equal 1, the minisuperspace action can be written as \begin{equation}\label{eq:scovcont} S[v] = \int d t \, \left[ \frac{1}{\tilde\Gamma} \frac{\dot{v}^2}{v} + \tilde\a \, v^{1/3} + \tilde\lambda \, vs. \right], \end{equation} where $v(t)$ is the physical spatial volume. Here, $\tilde{\Gamma}$ is negative and $\a\! =\! 0$ for $T^3$, while for the sphere, there is a precise relation between $\tilde{\Gamma}$ and $\a$ (see \cite{impact-topology} for a detailed derivation). The negative sign of the ``kinetic'' term reflects the unboundedness of the Euclidean Einstein--Hilbert action. We are using a discretized version of the Einstein--Hilbert action, and our action is also unbounded from below in the $N_4 \to \infty$ limit. However, a remarkable interplay between the entropy of configurations with the same value of the action and the actual value of the discretized action seems to be able to cure the unboundedness problem and produce a kinetic term with a healthy sign. It is also remarkable that despite the negative sign of the ``kinetic'' term in \rf{eq:scovcont}, the extremum of $S[v]$, found under the constraint that the total four-volume is fixed, i.e., that $\tilde{\lambda}$ is a Lagrange multiplier, produces precisely the solution \rf{ja3} with $\langle n_t \rangle$ replaced by the solution $\bar{v}(t)$ to \rf{eq:scovcont}. \section{Semiclassical Geometry and Baby Universes}\label{sec4} \subsection{Boundaries and Elementary Cells} As mentioned above, in some sense, the DT formalism contains GR in its purest form: we only know the local neighborhood, the vertex where we are and its connection to the neighbors, and we are equipped with our measuring devices, the links, which provide us with the geodesic distance to the neighbors, and from there we work our way out and determine the geometry. This is to a large extent what we have done so far in the computer simulations, both in the old DT studies and in the spatial directions in CDT. However, the description one obtains this way has its limitations, in particular if we want to understand some characteristic features of a typical geometry appearing in the path integral. While a configuration (a geometry) picked from the path integral is not physical, in the same sense that a path of a particle in the path integral is not physical (we cannot measure it), it might nevertheless tell us a lot about how we should think about the quantum aspects of geometry. Here, a good coordinate system can be useful. The time coordinate in CDT is an example where a ``good'' choice of a coordinate allows us to determine an effective minisuperspace description of our quantum universe. In the case where the topology of the spatial slices is that of $S^3$, we have not been able to find equally useful coordinates in the spatial directions. However if the topology of the spatial slices is that of $T^3$, one can use the periodic structure, as well as the non-contractible loops of $T^3$, to obtain new information about the geometry of the path integral configurations. The first thing to be aware of is that the computer simulations change the connectivity of the triangulations. While the change by construction respects the time foliation, there is no such restriction in the spatial directions. If the starting configuration was constructed with $T^3$ topology, the local changes of the triangulation made by the computer simulations will preserve this topology, but not any initial foliation of $T^3$. If we want to make maximal use of the periodic structure of a triangulation with $T^3$ topology, we have to identify such structure, and since it is in no way unique (even for a regular triangulation), we also want a ``reasonable'' periodic structure, which is a somewhat non-trivial task if the triangulation is quite fractal. Let us briefly describe how we define the periodic structure (for details, we refer to \cite{pseudo-car}). The idea is to start with a regular triangulation where the periodic structure can be defined in a trivial way (see again \cite{pseudo-car} for details) and then keep track of this structure and modify it appropriately, such that when the triangulation is changed in the Monte Carlo simulations, we can still identify a ``reasonable'' periodic structure despite having quite a fractal geometry. The periodic structure will be defined by {boundaries}, and it is convenient to view $T^4$ as an infinite system of {elementary cells} in $\mathbb{R}^4$, separated by these boundaries. In order to keep track of the boundaries, we introduce a labeling of the dual lattice. Each simplex in the triangulation is represented as a vertex in the dual lattice, and each tetrahedron, being the boundary between two simplices, is represented as a link $(i, j)$ between the two vertices $i$ and $j$ on the dual lattice. The concept of the spatial directions (and time direction) is {well} defined for our nice starting triangulation, which is a triangulation of a hypercube whose opposite sides are identified, {and thus we can use it to} define boundaries that are ``orthogonal'' to what we denote $x,y,z$ and $t$ directions, and where the $t$ direction will coincide with our CDT time direction. We label the three spatial boundaries $x,y$ and $z$, as we will try to define coordinates where the boundaries correspond to $x=0$, etc. We now assign four values $B_{i j}^\sigma$ (a four-vector, one can say) to each link $(i, j)$, where $\sigma =x,y,z$ or $t$. The value 0 corresponds to the case when both $i$ and $j$ belong to the same cell. Values $B_{i j}^\sigma =\pm 1$ imply that the link $(i, j)$ crosses the $\sigma$-boundary between two cells in the positive or in the negative direction. If we have a closed loop of dual links, defined by a sequence of vertices $i_n$, $n=1,\ldots,k$, where $i_{k+1} = i_1$ (up to the cell number), we may form the sum of vectors $\sum_{n=1}^k B^\sigma_{i_n i_{n+1}}$ along the loop. For a contractible loop, the sum must be the zero vector, while for a non-contractible loop (closed by the periodic boundary conditions), the sum gives topological information about the winding number of the loop. The boundaries are not physical, and the Einstein--Hilbert action \rf{SRegge} does not depend on the boundaries. The computer algorithm changes one triangulation into another one by performing local changes. When we perform such changes, we check if the boundaries between elementary cells pass through the affected region of the triangulation. If not, we perform the change of the triangulation as if the boundaries were not there. If a boundary between two cells crosses the affected region, we deform the boundary, but not the triangulation itself, in such a way that it is still connected but outside the region. We then perform the change of geometry, and we try to modify the boundary in the new geometry such that its size, i.e., its three-volume, will be minimized. From time to time during the computer generated changes of the triangulation, we check if a local modification of boundaries can minimize the three-volumes of the boundaries in all directions. In this way, we try to keep the boundaries ``reasonably" small during the changes of the triangulation generated by the computer. \subsection{Pseudo-Cartesian Coordinates}\label{Sec:pseudo} Once the boundaries of a toroidal triangulation are defined, they can be used to erect what we denote a {pseudo-Cartesian} coordinate system. Let us consider a spatial boundary, e.g., the $x$-boundary of an elementary cell. For {every (dual lattice)} link $(i, j)$ that crosses the boundary with value $B^x_{ij}=+1$, we assign to vertex $j$ a coordinate $x=1$. From each already visited vertex, we move to the neighboring vertices, but we are not allowed to cross the boundary in the negative direction. We mark these vertices with coordinate $x=2$ and continue this way until each vertex in the dual graph has an $x$-coordinate. The way this is actually done is by studying a discretized version of a diffusion equation on the dual lattice; for details, we refer to \cite{pseudo-car}. It is also possible to cross the boundary in the negative direction, and we can assign a coordinate $x' =1$ to the vertices we meet on the negative side of the boundary and then extend this construction to each vertex, as for the $x$ coordinate. In this way, each vertex $v$ has two coordinates: $x(v)$ and $x'(v)$. The construction described is illustrated on a two-dimensional lattice in Figure~\ref{fig:visualize}. \begin{figure}[t] \begin{center} {\includegraphics[width=13cm]{visualize.pdf}} \end{center} \caption{{A (two-dimensional) visualization of a triangulation (colored triangles) with toroidal topology. The (smallest) boundary orthogonal to the ${x}$ direction is plotted as a red solid line, and the boundary orthogonal to the other direction as a red dashed line (the red solid lines, as well as the red dashed lines, are identified). Different colors mark different ${ x}$ coordinates. All triangles of the same color and texture form single { slices}. For ${ x}= 1, 2, 3, 5$, one has only a single slice for each ${x}$ coordinate, but for ${ x}=4$, one can distinguish three separate slices. All triangles but the dark red one belong to the trunk, and the dark red triangle belongs to a branch. For each triangle, one can find (one or more) minimal loops with a nontrivial winding number: all triangles whose centers are marked by a solid zigzag arrow belong to the same $\{1,0\}$ loop (green arrow) and also to the same $\{-1,0\}$ loop (blue arrow); the length of these loops is $4$. } } \label{fig:visualize} \end{figure} Do these spatial coordinates qualify as good coordinates? We are mainly interested in this question for configurations in the de Sitter phase $C_{dS}$. In Figure \ref{shifts}, we show the probability distribution $p(x(v)+x'(v) )$. For a completely regular triangulation, {$p(x+x')$ would be zero except for one peak observed for $x+x'=h_x$}, the length of the shortest non-contractible loop crossing the $x$-boundary. Clearly this is not what we observe, showing us that the elementary cell after many changes of the local geometry is no longer that regular. While this indeed is to be expected, unfortunately the coordinates are not that optimal. If we look at the set of points with constant $x$, we would like this to be a connected hypersurface, but this is not the case. \begin{figure}[t] \includegraphics[width=6.5cm]{xplusxprim80.pdf} \includegraphics[width=6.5cm]{xplusxprim160.pdf} \caption{Distributions of $p({ x}+{ x'})$ (blue), $p({ y}+{ y'})$ (green) and $p({ z}+{ z'})$ (orange) for systems with $N_{(4,1)}=80k$ (left) and $N_{(4,1)}=$160k (right) and $T =4$. One can show that the distributions scale as $ \big(N_{(4,1)}\big)^{1/4}$. } \label{shifts} \end{figure} For a detailed analysis, we refer to \cite{pseudo-car}, and here let us just describe the situation qualitatively: given a simplex, i.e., a vertex $v$ on the dual lattice, with coordinate $x_0=x(v)$, we can identify the vertices $\{w(v)\}$ with coordinates $x(w) =x_0$, where in addition $w$ is connected to $v$ by moving only between vertices $u$ where $x(u) \geq x(v)$. We call such a set the {\it slice} associated with $v$. The set of all vertices with coordinate $x_0$ will in general consist of a set of disconnected slices. A slice at $x_0$ is connected via links to precisely one slice at $x_0-1$ but can connect to many (or zero) slices at $x_0+1$. All vertices at $x_0=1$ are connected and thus form a slice, which we denote the {\it root} of the {\it trunk}, where the trunk consists of the slices which are connected with slices of increasing $x$ all the way from the root to the ``top'' boundary of the cell. The trunk may split into several pieces when reaching the top boundary. Furthermore, starting at a slice at $x_0$ and following its connections to slices at $x_0+1$, etc., this set of slices might never reach the top boundary. We call such a set of slices a {\it branch}, and the branches clearly have a {tree structure}. All this is in principle illustrated in \mbox{Figure~\ref{fig:visualize}}, where the deep red triangle with coordinate labels $(x,x') = (5,2)$ is a branch. Figure~\ref{branches} shows, for a large triangulation, the number of branches one encounters at coordinate $x$ and their corresponding volumes. The number of branches is large, but their volumes are not that large. The existence of these branches and the corresponding disconnectedness of the hypersurfaces of constant $x$ implies that the pseudo-Cartesian coordinates are not an optimal choice of coordinates; in Section~\ref{sec5}, we will introduce a better set of coordinates. However, they highlight the fractal structure of a typical geometry, which seems to share a number of characteristics with the fractal geometry encountered in 2d DT \cite{kawai-wata,aw,ajw} and in the so-called generalized 2d CDT \cite{cdtsft,stochastic-cdt}, something definitely worth exploring. It turns out that we can dissect the fractal structure slightly further by using the non-contractible loops introduced and the periodic structure of the triangulations. We now turn to this~topic. \subsection{ Semiclassical and Fractal Geometry from Loops} We now have the setup to use non-contractible loops to obtain information about the toroidal geometry of a generic CDT configuration. {Let us consider the loops passing through a vertex $v$ in the dual lattice, i.e., a given simplex in the triangulation. The loop lengths of the shortest non-contractible loops around the torus in what we have called the $x$, $y$ and $z$ directions tell us much about the position of the vertex $v$ in the torus. The logic behind this is illustrated in Figure~\ref{fignew}. If the torus consists of a ``semiclassical'' center and ``quantum'' outgrowths, the loop lengths will be large when $v$ is in the outgrowths and smaller when $v$ is in the center. We will now present some evidence for this picture. \begin{figure}[t] \begin{center} \includegraphics[width=7cm]{branches.pdf}~~ \includegraphics[width=7cm]{branch_volume.pdf} \end{center} \vspace{-0.5cm} \caption{ The number of branches at a distance ${x}$ (left figure) and the average branch volume (right figure) in a triangulation from phase $C_{dS}$. } \label{branches} \end{figure} \begin{figure}[t] \includegraphics[height=55mm]{small-center-fractal.png} \hspace{0.8mm} \includegraphics[height=55mm]{drawc=0.pdf} \caption{ Left: illustration of a torus with outgrowths. The blue and red lines represent two non-equivalent and non-contractible loops. The green loop is the shortest loop passing through the green point in the same direction as the blue line. Right: embedding of a triangulation of the two-torus consisting of 150,000 triangles into the Euclidean plane (picture from \cite{ab}). Shown in red is the shortest non-contractible loop.} \label{fignew} \end{figure} {According to our discussion}, the shortest loops should wind around the center of the torus. Thus, it is convenient to denote the length of the shortest non-contractible loops of a vertex $v$ as {height} labels $h_x(v),h_y(v),h_z(v),h_t(v)$, telling us how far inside an outgrowth $v$ is. Evidence for such an interpretation can be found by using the representation of the torus $T^4$ as a repetition of elementary cells on $\mathbb{R}^4$. On $\mathbb{R}^4$, each copy of the elementary cell is labeled by ``cell coordinates'' $(n_x,n_y,n_z,n_t)$, constructed from the number of times one passes the cell boundaries from the starting elementary cell. By studying the above-mentioned diffusion equation on $\mathbb{R}^4$, we can then find the shortest path between copies of a vertex $v$ in the other cells. {The length of such a path is not necessarily just a multiple of the length of the shortest path between $v$ in neighboring cells,} the reason being that we can increase the winding number of a {loop going through a} vertex in an outgrowth by first moving to the central part and then circling a number of times around the center before finally moving out in the outgrowth again in order to close the loop. This is illustrated in Figure~\ref{fig:av}. For the particular configuration used in the figure, the shortest loop in the x-direction is 18. Furthermore, it turns out that for this configuration, there is only one loop of length, 18. Rather remarkably, if we we ask for the shortest loop winding eight times around the torus in the $x$-direction, it will wind around at least one time following precisely this shortest loop, no matter from which vertex $v$ we start. \begin{figure}[t] \centering \includegraphics[width=10cm]{avdist160k.pdf} \caption{Distance from a starting simplex to its copy in cell $\{n,0,0,0\}$ minus distance from the same simplex to its copy in cell $\{n-1,0,0,0\}$, averaged over all the simplices of the configuration. Already for $n=8$, the minimal value of 18 is reached.} \label{fig:av} \end{figure} As shown in Figure~\ref{fig:sim2}, we have chosen a vertex $v_0$ deep into an outgrowth with a large height $h_x(v_0)$. We then follow the vertices $v$ that belong to the shortest loops associated with $v_0$ when the loops wind around the torus one, two, three and six times. It is seen that $h_x(v)$ decreases when $v$ approaches the center. At some point, $v$ starts to belong to the shortest loop of length 18, and it stays there, i.e., $h_x(v) = 18$, winding around a number of times, until it leaves and moves into the outgrowth again in order to return to $v_0$ and close the loop. When it returns to the outgrowth, $h_x(v)$ starts to increase again, until eventually it reaches the value $h_x(v_0)$. It is also seen that the values of $h_y(v)$ (and $h_z(v)$) are quite correlated with the values $h_x(v)$. Heights in the outgrowths are in general large in all directions, and all heights in the center are small. \begin{figure}[t] \centering \begin{tabular}{cc} \includegraphics[width= 0.47 \textwidth]{x1n.pdf} & \includegraphics[width= 0.47 \textwidth]{y1n.pdf} \end{tabular} \caption{Heights in 2 basic directions of consecutive simplices along loops of winding numbers $\{1,0,0,0\}$ (blue), $\{2,0,0,0\}$ (orange), $\{3,0,0,0\}$ (green), $\{6,0,0,0\}$ (red) starting from a simplex in an outgrowth. The dashed lines indicate the minimal and maximal heights in the configuration, and the dotted line indicates the height of the initial simplex.} \label{fig:sim2} \end{figure} A number of other measurements, for which we refer the reader to \cite{fractal-torus}, corroborate the picture advocated above, namely that in the de Sitter phase of the toroidal CDT the spatial $T^3$ part consists of a relatively small toroidal center, with outgrowths of almost spherical topology which contain most of the simplices. Measurements show that the number of simplices (vertices in the dual graph) where the height function has a local maximum is not small. This suggests that the outgrowths, even if they have almost spherical topology (except for the small region of attachment to the center), are quite fractal, having a large number of baby universes. {Furthermore, in the DT models of gravity baby universes have played an important role in determining the fractal structure of the geometries} \cite{babyuniverses,Ambjorn:1993nr,Ambjorn:1993vz}}. An important feature of the non-contractible loops is that the length distribution scales as $N_4^{1/4}$, as {also noted for the distribution of $x+x'$} in the figure caption to Figure~\ref{shifts}. The consequence of such a ``canonical'' scaling is that the volume of the toroidal center, although small compared to the volume of the outgrowths, will also scale canonically. This justifies thinking of it as semi-classical. This is in contrast to the toroidal center part of the two-dimensional configuration shown in the right part of Figure~\ref{fignew}, which can be shown to vanish in the large volume limit, and thus is not semiclassical but entirely quantum, a known feature of 2D DT. \section{Toroidal Coordinates Via Scalar Fields}\label{sec5} In the pseudo-Cartesian coordinates approach, {discussed in Section \ref{Sec:pseudo} above,} the constant-coordinate hypersurfaces were quite disconnected. This can be traced back to the fractal structure of the configurations, when viewed in terms of geodesic distances. The pseudo-Cartesian coordinates were basically labeled by their geodesic distance to the cell boundaries, and if there is a fractal structure when expressed in terms of geodesic distances, it is unsurprising that the distance function from a cell boundary will have many local maxima, i.e., the {branches} that we encountered. How can we do better? What comes to mind is that harmonic functions, solved on compact domains with suitable boundary conditions, never have local extrema in the interior of the domain. It thus seems that if suitable boundary conditions are used for our elementary cell, we might use a solution to the Laplace equation as a coordinate, increasing when moving from the lower to the upper boundary of an elementary cell. Let us now show that this works, and let us first discuss the problem using the standard language of differential geometry and then show that it can be translated to our triangulations. Consider two Riemannian manifolds $\mathcal{M}(g_{\mu\nu})$ and $\mathcal{N}(h_{\alpha\beta})$, with metrics $g_{\mu\nu}(\xi)$ and $h_{\alpha\beta}(\eta)$, where $\xi$ and $\eta$ denote some coordinates on $\mathcal{M}$ and $\mathcal{N}$. A harmonic map $\phi^\sigma$ from $\mathcal{M}$ to $\mathcal{N}$ can be defined as a map that minimizes the following action: \begin{eqnarray} S_M[\phi] = \frac{1}{2} \int \mathrm{d}^n \xi \sqrt{g(\xi)} \; g^{\mu \nu} (\xi) \; h_{\rho \sigma}(\phi(\xi)) \; \partial_\mu \phi^\rho(\xi) \partial_\nu \phi^\sigma(\xi). \label{classical_field_eq} \end{eqnarray} In our case, we are interested in the situation where $\mathcal{M}$ has the topology of $T^4$ and $\mathcal{N}$ the topology of $T^1 \equiv S^1$. Since $\mathcal{N}$ is one-dimensional, we can always choose $h_{\rho \sigma}=1$, and the Laplace equation reads \begin{eqnarray} \Delta_\xi \phi(\xi) = 0,\quad \Delta_\xi = \frac{1}{\sqrt{g(\xi)}}\frac{\partial}{\partial \xi_\mu} \sqrt{g(\xi)}\,g^{\mu\nu}(\xi)\frac{\partial}{\partial \xi_\nu}. \label{laplace_eq} \end{eqnarray} Let us for illustration first consider the case where $\mathcal{M}$ also has the topology of $S^1$. In that case, we can also choose coordinates $\xi$ such that $g_{\mu\nu}(\xi)$ is constant, but we prefer to keep the general notation. We want $\xi \to \phi(\xi)$ to be a non-trivial map $S^1\to S^1$ such that $\phi$ can serve as a coordinate instead of $\xi$. One way to implement this is to represent $S^1$ periodically on $\mathbb{R}$, precisely as we repeated the elementary cell periodically on $\mathbb{R}^4$, and require that $\phi$ satisfies \begin{equation} \phi(\xi+n)=\phi(\xi)+n \delta, \label{phi_cont_eq} \end{equation} which maps the circle with a unit circumference to a circle with a circumference $\delta$. The solution to the Laplace equation in this case satisfies \begin{equation}\label{jx1} \mathrm{d} \phi(\xi) = \delta \cdot \sqrt{g(\xi)} \; \mathrm{d}\xi. \end{equation} The solution $\phi(\xi)$ is fixed by choosing a $\xi_0$ where $\phi(\xi_0)=0$. The map $\xi \to \phi(\xi)$ becomes a monotonically increasing invertible map in the whole $\mathbb{R}$, and we can use $\phi$ as a coordinate instead of $\xi$. With such a change of coordinates, the volume is invariant, i.e., $\sqrt{ g(\phi)} \,\mathrm{d}\phi = \delta \sqrt{g(\xi)}\,\mathrm{d}\xi$, or from \rf{jx1}, $g(\phi) = 1$. We can also consider the function $\psi(\xi) = \textrm{mod}(\phi(\xi)-\phi(\xi_1),\delta)$. This satisfies the Laplace equation in the range between $\xi_1$ (where $\psi(\xi)=0$) and $\xi_1+1$ (where $\psi(\xi)=\delta$). The equation satisfied by $\psi(\xi)$ becomes a Poisson equation with the extra inhomogeneous local term, producing jumps at boundary points $\xi = \xi_1$ and $\xi=\xi_1+1$. It can still be considered to be a Laplace equation with a non-trivial boundary ``jump'' condition. Generalizing this to ${\cal M}$ with the topology of $T^4$, we want a solution to the Laplace Equation~(\ref{laplace_eq}) that wraps around $S^1$ in a particular direction once, and, in addition, we want the points $\xi$ in ${\cal M}$ that satisfy $\phi(\xi) =c$ to form hypersurfaces $H(c)$ whose union for $c$ varying in a range of length 1 covers the whole ${\cal M}$. Finally we want four such functions $\phi^\sigma (\xi)$ and $\psi^\sigma(\xi)$, where $\sigma$ signifies the four chosen coordinate directions on ${\cal M}$, which we will denote $x,y,z,t$. We now translate this formalism to our CDT triangulations. Let $N_4$ be the number of simplices in the triangulation, i.e., the number of vertices in the dual lattice. We label the vertices (or simplices) $i$. In order to identify the boundaries, in Section~\ref{sec4}, we have defined the quantities $B^{\sigma}_{ij}$ for links $(i, j)$ on the dual lattice. We now extend the definition to include all pairs of vertices, in this way making $B^\sigma_{ij}$ a (sparse) $N_4\times N_4$ anti-symmetric matrix for each direction $\sigma$ ($\sigma =x,y,z$ and $t$). Thus, we have \begin{equation} \label{adjacency} {B}_{ij}^\sigma = \begin{cases} \pm 1 & \textrm{if link $(i, j)$ crosses the boundary,}\\ 0 & \textrm{otherwise}. \end{cases} \end{equation} The number of directed boundary faces of a simplex $i$ is given by $b_i^\sigma=\sum_j {B}_{ij}^\sigma$ and $\sum_i b_i^\sigma = 0$. For any simplex $i$ adjacent to a boundary, the values ${B}_{ij}^\sigma$ are all positive or zero (on one side of the boundary), or all negative or zero (on the other side). We consider four scalar fields $\phi_i^\sigma$ located in the centers of simplices, i.e., at vertices of the dual lattice, and solve the minimization problem for the following discrete version of the continuous action in Equation~(\ref{classical_field_eq}), for each field $\phi_i^\sigma$: \begin{eqnarray} \label{CDT_laplace_eq} S_M^{CDT}[\phi^\sigma,{T}]= \frac{1}{2} \sum_{ (i, j)} (\phi_i^\sigma - \phi_j^\sigma -\delta \,{B}_{ij}^\sigma)^2 . \end{eqnarray} In (\ref{CDT_laplace_eq}), the sum is over all links $(i, j)$ on the graph dual to the triangulation $T$ (representing the manifold $\mathcal{M}(g_{\mu\nu})$ in Equation~(\ref{classical_field_eq})). The parameter $\delta$ plays the same role as in the one-dimensional example considered previously. By rescaling the field, we can always set $\delta=1$, and we do that in the following. The action (\ref{CDT_laplace_eq}) is invariant under a constant shift of the scalar field (the Laplacian zero mode). Furthermore, the boundary is immaterial if we consider a harmonic map $\phi$ from $T^4$ to $S^1$, and it was only introduced to represent $T^4$ and $S^1$ as $\mathbb{R}^4$ and $\mathbb{R}$. The manifestation of this is that the action stays invariant under a modification of the boundary ${B}_{ij}^\sigma$ and a shift by $\pm 1$ (depending on the side of the boundary) of the field value in a simplex $i$ adjacent to the boundary, i.e., ``moving'' the simplex to the other side of the boundary and compensating for the change of the field in its center. After such a move, the number of faces belonging to the boundary will in general change. Let us now denote the classical field that minimizes the action (\ref{CDT_laplace_eq}) $\phi_i^\sigma$. It satisfies the non-homogeneous Poisson-like equation \begin{equation} \label{classical} {L}\phi^\sigma = b^\sigma, \end{equation} where ${L}=5 { I}- {A}$ is the $N_4\times N_4$ Laplacian matrix and ${A}_{ij}$ is the adjacency matrix with entries of value 1 if simplices $i$ and $j$ are neighbors and 0 otherwise. To be more precise, the Laplacian zero mode can be eliminated if we fix a value of the field $\phi_{i_0}^\sigma=0$ for an arbitrary simplex $i_0$. After that, we can solve for $\phi^\sigma$ in \rf{classical}. The analogue of the one-dimensional function $\psi(x)$ is given by $\psi_i^\sigma$: \begin{equation} \psi_i^\sigma = \textrm{mod}(\phi_i^\sigma, 1). \end{equation} As in the one-dimensional case, this definition eliminates the original boundaries but creates new ones defined by viewing \rf{classical} as an equation that defines the boundaries if we are given a solution, i.e., the new boundary is defined by $\bar{b}^\sigma = {L}\psi^\sigma$. This allows us to reconstruct a new three-dimensional hypersurface $H$, separating the elementary cell from its copies in the direction $\sigma$ and characterized by the fact that the field jumps from 0 to 1 when crossing $H$. This hypersurface can be moved to another position if we consider a family of hypersurfaces $H(\alpha^\sigma)$ obtained from \begin{equation} \label{alpha} \psi_i^\sigma(\alpha^\sigma) = \textrm{mod}(\phi_i^\sigma-\alpha^\sigma, 1),\quad \bar{b}^\sigma(\alpha^\sigma) = {L}\psi^\sigma(\alpha^\sigma). \end{equation} By changing $0\leq \alpha^\sigma<1$, we shift the position of the hypersurface $H(\a^\sigma =0)$ to that of $H(\a^\sigma)$ and cover in this way the whole elementary cell. There are a number of subtleties associated with this since we have a discrete lattice structure and $\a^\sigma$ is a continuous variable. This implies that the various hypersurfaces defined in this way might not be disjunct if two values of $\a^\sigma$ are too close. We refer to \cite{long-article} for details, and for the discussion of other non-trivial aspects of these hypersurfaces, but viewed in the right way, we can say that in this way we obtain a foliation in the direction $\sigma$. We may now use $\psi_i^\sigma= \psi_i^\sigma(0)$ as a coordinate in the $\sigma$-direction, and the same construction can be repeated in all directions $\sigma$. {Note also that the solutions viewed as belonging to $S^1$ are independent of precise locations of the hypersurfaces, as long as the deformations of the hypersurfaces respect the toroidal topology of the piecewise linear manifold}. {Thus, we have obtained our goal:} for any toroidal configuration obtained in the numerical simulations, we can assign a set of coordinates $(\psi^x_i,\psi^y_i,\psi^z_i,\psi^t_i)$, all in the range between 0 and 1. In addition, these coordinates ``preserve'' the structure of the triangulation, since a solution to the Laplace equation has the property that coordinates of each simplex are equal to the mean value of coordinates of its neighbors. {The coordinates are the lattice analogy of harmonic coordinates, and harmonic coordinates are viewed as being as close as one can get in GR to Cartesian coordinates representing an inertial system in special relativity. They are thus expected to be good coordinates in which to represent physical observables.} The coordinate $\psi^t_i$ is not the same as the one coming from the original foliation of the CDT model. However, they are quite correlated, as shown in Figure~\ref{phi-xy_plot}. Using our new coordinates, we can analyze the distribution of the four-volume (the number of simplices) contained in hypercubic blocks with sizes $(\Delta\psi^x_i, \Delta\psi^y_i, \Delta\psi^z_i, \Delta\psi^t_i)$, which is equivalent to measuring the integrated $\sqrt{g(\psi)}$: \begin{eqnarray} \Delta N(\psi) = \sqrt{g(\psi)} \prod_\sigma \Delta \psi^\sigma = N(\psi) \prod_\sigma \Delta \psi^\sigma. \label{hypers_vol_eq_psi} \end{eqnarray} We can measure the full four-dimensional distribution $N(\psi)$, but to present it graphically, we show in Figure~\ref{phi-xy_plot} the projections of the volume density distribution of a typical configuration on the $xy$-plane and the $tx$-plane, respectively, integrating over the remaining two directions. One observes a remarkable pattern of voids and filaments \cite{cosmic-void}, which qualitatively looks quite similar to pictures of voids and filaments observed in our real~Universe. \begin{figure}[t] \includegraphics[width=0.45\textwidth]{color-xy-ft.png} \hspace{0.5cm} \includegraphics[width=0.45\textwidth]{color-tx-ft.png} \caption{Left figure is the projection of four-volume on the $xy$-plane, as defined by (\ref{hypers_vol_eq_psi}) for a CDT configuration. Right figure is the projection on the $tx$-plane of the same configuration. Different colors correspond to different times $t$ of the original $t$-foliation. There is a strong correlation between the original $t$-foliation (color) and new time coordinate $\psi^t$ (horizontal axis), for the projection on the $tx$-plane.} \label{phi-xy_plot} \end{figure} Using the new coordinates, we can now in principle repeat many of the measurements we originally performed using the CDT time coordinate. This includes studies of the profiles of the volume of hypersurfaces as a function of one of the $x,y$ or $z$ coordinates and studies of the corresponding volume--volume correlation functions and their minisuperspace actions. However, we also have other options, since we now have reasonable coordinates in all directions, as can be seen in Figure~\ref{phi-xy_plot}, which illustrates complicated structures at all scales. All this is work in progress. \section{Dynamical Scalar Fields with Non-Trivial Topology}\label{sec6} Above we used classical scalar fields with non-trivial winding numbers as coordinates for a generic quantum geometry configuration. Given the geometry, the fields were solutions to the Laplace equation. We now ask what happens if such scalar fields, with action \rf{classical_field_eq}, are added to the path integral and become dynamical fields. As we will see, the interplay between the non-trivial topology of spacetime and the non-trivial topology of the scalar fields (the requirement that the fields have non-trivial winding numbers matching the non-contractible spacetime loops) will have a surprisingly dramatic effect on the geometry. Let us for simplicity consider the scalar field in the time direction, where the boundary conditions are simple when using the original CDT time coordinate, and where we, in the absence of the scalar field, know that the volume profiles $v(t)$ are well described by the minisuperspace action \rf{eq:scovcont} with $\tilde\alpha =0$ when spacetime is toroidal. What we observed was that, to a good approximation, we had a solution $v(t) = V_4/T$ when the four-volume $V_4$ and the time extension $T$ were kept fixed. Adding a scalar field to the minisuperspace action, we obtain \begin{equation}\label{jax1} \tilde{S}[v] = \int d t \, \left[ \frac{1}{\tilde\Gamma} \frac{\dot{v}^2}{v} + \tilde\lambda \, vs. + v\, \dot{\phi}^2 +\kappa \dot{\phi} \right]. \end{equation} Here we have assumed that the scalar field $\phi$ only depends on time, and in order to impose the constraint that $\phi[-T/2] = \phi[T/2] + \delta$, we have added the last term in \rf{jax1} with a new Lagrange multiplier $\kappa$, in addition to the Lagrange multiplier $\tilde{\lambda}$, which is there to ensure that the spacetime volume is $V_4$. One can now ask for the minimum of \begin{equation}\label{jax2} S[v] = \int d t \, \left[ \frac{1}{\tilde\Gamma} \frac{\dot{v}^2}{v} + v\, \dot{\phi}^2 \right] \end{equation} under the given constraints and find the solutions. We refer to \cite{long-article} for the details. However, the main points are easily explained without any analytic solutions. For small $\delta$, the constant solution is still the minimum with $\phi(t) = \delta\cdot t/T$. However, for $\delta$ larger than some critical value $\delta_c$ of order 1, the situation changes, as illustrated in Figure~\ref{fig-pinch}. In the left plot, we have a torus with spacetime volume $V_4$ and time length $T$. It is pinched such that the space volume is $\epsilon$ during a time length $L$. The field $\phi(t)$ changes uniformly from 0 to $\delta/2$ over a distance $L/2$ in the lower red part. In the blue part $\phi=\delta/2$, and in the upper red region, the field changes uniformly from $\delta/2$ to $\delta$. The total matter action of this field configuration is then \begin{equation}\label{jan50} \Big( \frac{\delta}{L}\Big)^2 L \, \epsilon = \delta^2 \frac{\epsilon}{L}, \end{equation} \begin{figure}[t] \includegraphics[scale=0.23]{pinch-review.pdf} \vspace{-1cm} \caption{{Left}: a torus (opposite sides identified) with a pinch. {Right}: a torus where $\phi$ is constant in horizontal direction and uniformly increases from 0 to $\delta$ from bottom to top. The two tori are assumed to have the same vertical length $T$ and the same spacetime volume $V_4$.} \label{fig-pinch} \end{figure} Clearly, this value can be made arbitrarily small when $\epsilon \to 0$. On the right plot, we also have a torus with spacetime volume $V_4$ and time length $T$. For this geometry, the matter action is minimal for a field changing uniformly from 0 to $\delta$, when we move from bottom to top; i.e., we obtain a matter action \begin{equation}\label{jan51} \Big( \frac{\delta}{T}\Big)^2 V_4 = \delta^2 \frac{V_4}{T^2}, \end{equation} which is bounded from below when $V_4$ and $T$ are fixed, as they are in our computer simulations. The conclusion is the same for a more careful analysis of the full minisuperspace action \rf{jax2}. Thus, we have a picture where for small $\delta$, the effect of the scalar field is small, and we can say that the scalar field couples to and follows the geometry. However, when $\delta > \delta_c$, a transition occurs: the scalar field pinches the geometry to a spatial volume which is small or maybe even zero, and all changes of $\phi$ take place in this region of very small volume. Thus, $\phi$ basically separates a spacetime that has a non-trivial winding number in the time direction in two parts: {one (of cutoff size) with a winding number and one} without a winding number. This analysis is of course based on the very simple minisuperspace action, which might be a good description in the time direction, but not necessarily in the spatial directions. We have thus studied the situation when we have dynamical scalar fields with winding numbers in the spatial directions, using MC simulations. Thus, there is no minisuperspace approximation, and it is the full quantum theory we consider. In Figure~\ref{1dsmall}, we show the volume profiles for a typical configuration for a small $\delta$ and a typical configuration for a large $\delta$. As coordinates in the spatial directions, we use the classical scalar fields $\psi$ with non-trivial winding numbers as described above. It is seen that the top and bottom part of Figure~ \ref{1dsmall} match very well with the right and left part of Figure~\ref{fig-pinch}. All the change of $\psi$ in the left part of Figure~ \ref{1dsmall} takes place in a a region where the spatial volume is very small, while $\psi$ is nearly constant where the volume is large. \begin{figure}[t] \centerline{\includegraphics[width=0.49\textwidth]{volume_alpha-jump3_01-zamiana.pdf} \includegraphics[width=0.49\textwidth]{volume_alpha-jump3_10.pdf}} \caption{Left: the projection of four-volume, as defined by (\ref{hypers_vol_eq_psi}) in one spatial direction ($x$, $y$ or $z$) for a typical CDT configuration with small jump magnitude $\delta=0.1$. Right: The projection of four-volume, as defined by (\ref{hypers_vol_eq_psi}), in one spatial direction ($x$, $y$ or $z$) for a typical CDT configuration with large jump magnitude $\delta=1.0$. The horizontal axis is $\bar{\phi}/\delta$.} \label{1dsmall} \end{figure} To summarize: A scalar field with a winding number seems to have a dramatic effect on the geometry and can even induce a phase transition where the geometry is pinched or even becomes cut into pieces. {However, presently we do not have a simple matter model, which in a natural way provides us with a such a scalar field. } \section{Discussion}\label{sec7} In this review article we have summarized how the study of quantum universes with toroidal topology can help us understand better the quantum nature of geometry at and close to the Planck scale. Firstly, the use of toroidal spatial topology allowed us to obtain a more complete CDT phase diagram. As discussed, the fact that topology at all plays a role for the transitions is most likely a finite volume effect and related to rearrangements of the geometric structures. For the size of volumes used in the computer simulations, some of these rearrangements may be easier implemented when the spatial topology is toroidal. Furthermore, the ease with which such changes take place probably depends on the Monte Carlo algorithms used, but presently we only have available the ones based on the so-called Pachner moves. Secondly, the picture of an emergent background geometry around which there are relatively small quantum fluctuations is corroborated by the results obtained using toroidal spatial topology. This picture was first obtained when the spatial topology was that of $S^3$, but the emergent background geometries are very different in the two cases. It should be remembered that no background geometry is imposed in the CDT path integral, so it is non-trivial that two four-dimensional background geometries that are so different can emerge when spherical and toroidal spatial topology are imposed. Likewise, it is non-trivial that minisuperspace descriptions respecting the spatial topologies work so well in both cases. In the toroidal case, one is able to measure genuine quantum correction terms in the minisuperspace effective action. These terms can in principle be compared to correction terms of minisuperspace models derived from a continuum theory of quantum gravity. Thirdly, the use of toroidal spatial geometry allows us to dissect in some detail global aspects of the geometries of typical path integral configurations by using the existence of non-contractible loops. The study of the lengths of the shortest non-contractible loops passing through vertices on the dual lattice provides us with a picture of a typical spatial toroidal path integral geometry as a semiclassical toroidal ``core'' with large, quite fractal outgrowths. By using a representation of the torus $T^3$ as a periodic structure in $\mathbb{R}^3$, this becomes particularly transparent. Finally, we can use the toroidal spatial topology to introduce spatial coordinates. Of course one nice aspect of the CDT formalism is that it is independent of spatial coordinates. However, as discussed, coordinates {\it can} be useful and help us understand aspects of the geometry, if chosen appropriately. We described two ways to introduce coordinates, both taking advantage of the toroidal topology. The starting point for both coordinate systems was the definition of an elementary cell which defined the three-torus as a periodic structure in $\mathbb{R}^3$. With the first set of coordinates, which we denoted pseudo-Cartesian coordinates, we tried, loosely speaking, to use the geodesic distance from the boundaries as coordinates. The study of these coordinates revealed a lot about the fractal structure of the geometry involved, but the same fractal structure made the coordinate system less useful for other purposes since the hypersurfaces of a constant coordinate consisted of many disconnected parts. To deal with this problem, we introduced instead classical scalar fields with non-trivial boundary conditions at the boundaries of the elementary cell. Since these scalar fields are solutions to the Laplace equation for the given geometry in the interior of the elementary cell, it is ensured that they will not have local maxima or minima in the interior of the cell. In this way, they work well as coordinates for a given geometry, and we are presently trying to express a number of observables in terms of these coordinates. \mbox{Figure~\ref{phi-xy_plot}} shows the fractal structure of a geometry viewed with the help of these coordinates. The scalar fields that we used to define the coordinates in these quantum universes were purely classical fields, not interacting with the quantum geometry. In the real world, we have matter fields interacting with geometry, and in particular, it has been speculated that scalar fields may play a very important role by creating the inflation that might have taken place in our Universe. From a technical point of view, it is easy to include scalar fields in the action such that they become dynamical fields interacting with the geometry. We have already done this in the case where no non-trivial topology was imposed on the scalar field. In that case, the effect of the scalar fields on the geometry was relatively minor and could be understood as equivalent to a change in the bare coupling constants of the model without scalar fields. However, the situation seems different if the scalar field has a non-trivial winding number, and the results mentioned above indicate that there can be new phase transitions of the geometry associated with the presence of such scalar fields. Details of this are currently being explored, as is the search for matter models where such non-trivial winding numbers of the scalar fields can occur in a cosmological context. \vspace{6pt} \subsection*{Acknowledgments} {Z.D. acknowledges support from the National Science Centre, Poland, grant \\ no. 2019/32/T/ST2/00390. J.G.-S. acknowledges support of the grant no. \\ UMO-2016/23/ST2/00289 from the National Science Centre Poland. A.G. acknowledges support by the National Science Centre, Poland, under grant no. 2015/17/D/ST2/03479. J.J. acknowledges support from the National Science Centre, Poland, grant no. 2019/33/B/ST2/00589. D.N. acknowledges support from National Science Centre, Poland with grant no. 2019/32/T/ST2/00389.}
\section{Introduction}\label{introduction} \vspace{-0.05cm} When deploying deep neural networks (DNNs) trained on a \emph{given} dataset (\textit{i.e.,} source domain) in real-world \emph{unseen} data (\textit{i.e.,} target domain), DNNs often fail to perform properly due to the domain shift. Overcoming this issue is crucial, especially for safety-critical applications such as autonomous driving. In particular, real-world data consist of unexpected and unseen samples, for example, those images taken under diverse illumination, adverse weather conditions, or from different locations. It is generally impossible to model such a full data distribution with limited training data, so reducing the domain gap between source and target domains has been a long-standing problem in computer vision. \begin{figure}[t!] \begin{center} \includegraphics[width=1.00\linewidth]{latex/figures/fig_introduction_v3.pdf} \end{center} \vspace*{-0.1cm} \caption{\textbf{Overview of our motivation.} (a) We first identify the feature covariance sensitive to the photometric transformation and examine the tendency of the images in each group. (b) Sensitive covariances: Illumination (\textit{i.e.,} style) tends to significantly vary. (c) Insensitive covariances: Sensitive to scene structure differences (\textit{i.e.,} content) but unaffected by the photometric transformation. Accordingly, we aim to \emph{selectively} remove only the style-sensitive covariances that may cause the domain shift.} \label{fig:overview} \vspace*{-0.45cm} \end{figure} Domain adaptation (DA) is an approach to mitigate the performance degradation caused by such a domain gap~\cite{ben2007analysis,ganin2016domain,hoffman2018cycada,ganin2015unsupervised,zou2018unsupervised,murez2018image,vu2019advent,pan2020unsupervised,saito2018maximum}. Generally, DA focuses on adapting the source domain distribution to that of the target domain, but it requires access to the samples in the target domain, which limits their applicability. When we set the entire real world as a target domain, it is difficult in pactice to obtain data samples that fully cover the target domain. Domain generalization (DG) overcomes this limitation by improving the robustness of DNNs to arbitrary unseen domains. In general, most DG methods~\cite{li2018domain,seo2019learning,dou2019domain,motiian2017unified,muandet2013domain,Ghifary_2015_ICCV,li2017learning,balaji2018metareg,li2019episodic,li2019feature} accomplish this through the learning of a shared representation across multiple source domains. However, collecting such multi-domain datasets is costly and labor-intensive, and furthermore, the performance highly depends on the number of source datasets. A recent study~\cite{pan2018two} has shown that the DG problem can be addressed by exploiting instance normalization layers~\cite{ulyanov2016instance} instead of relying on multiple source domains, leading to a simple and cost-effective training process. The instance normalization just standardizes features while not considering the correlation between channels. However, a number of studies~\cite{gatys2015texture,gatys2016image,li2017universal,siarohin2018whitening,roy2019unsupervised,luo2017learning,cho2019image,pan2019switchable,sun2016deep} claim that feature covariance contains domain-specific style such as texture and color. This implies that applying instance normalization to the networks may not be sufficient for domain generalization, because the feature covariance is not considered. A whitening transformation is a technique that removes feature correlation and makes each feature have unit variance. It has been proven that the feature whitening effectively eliminates domain-specific style information as shown in image translation~\cite{cho2019image}, style transfer~\cite{li2017universal}, and domain adaptation~\cite{pan2019switchable,sun2016deep,roy2019unsupervised}, and thus it may improve the generalization ability of the feature representation, but not yet fully explored in DG. However, simply adopting the whitening transformation to improve the robustness of DNNs is not straightforward, since it may eliminate domain-specific style and domain-invariant content at the same time. Decoupling the two factors and selectively removing the domain-specific style is the main scope of this paper. In this paper, we present an instance \emph{selective} whitening loss that alleviates the limitations of the existing whitening transformation for domain generalization, by selectively removing information that causes a domain shift while maintaining a discriminative power of feature within DNNs. Our method does not rely on an explicit \emph{closed-form} whitening transformation, but implicitly encourage the networks to learn such a whitening transformation through the proposed loss function, thus requiring negligible computational cost. As illustrated in Fig.~\ref{fig:overview}, our method selectively removes only those feature covariances that respond sensitively to photometric augmentation such as color transformation. Our experiments on urban-scene segmentation in DG settings, performed using several backbone networks, show evidence that our approach consistently boosts the DG performance. The main contributions include the following: \vspace{-0.0cm} \begin{itemize} \vspace{-0.2cm} \item We propose an instance selective whitening loss for domain generalization, which disentangles domain-specific and domain-invariant properties from higher-order statistics of the feature representation and selectively suppresses domain-specific ones. \vspace{-0.2cm} \item Our proposed loss can easily be used in existing models and significantly improves the generalization ability with negligible computational cost. \vspace{-0.2cm} \item We apply the proposed loss to urban-scene segmentation in a DG setting and show the superiority of our approach over existing approaches in both a qualitative and quantitative manner. \end{itemize} \section{Related Work} \vspace{-0.15cm} \paragraph{Domain adaptation and generalization} It is well known that significant labeling efforts are required so as to ensure the reliable performance of various tasks such as semantic segmentation~\cite{long2015fully,badrinarayanan2017segnet,chen2017rethinking,zhu2019improving,choi2020cars}. To tackle this challenge, domain adaptation (DA) methods were proposed to transfer the knowledge learned from abundant labeled data (\textit{i.e.,} a source domain) to a target domain where labeled data are scarce. In contrast to DA, domain generalization (DG) methods assume that the model cannot access the target domain during training and aim to improve the generalization ability to perform well in an unseen target domain. Various approaches such as meta-learning~\cite{li2017learning,balaji2018metareg,li2019episodic,li2019feature}, adversarial training~\cite{li2018domain,li2018deep,rahman2020correlation}, autoencoder~\cite{Ghifary_2015_ICCV,li2018domain}, metric learning~\cite{dou2019domain,motiian2017unified}, data augmentation~\cite{yue2019domain,gong2019dlow,zhou2020learning} have been proposed to learn domain-agnostic feature representations. Recently, several studies~\cite{pan2018two,seo2019learning} have shown the effectiveness of exploiting both batch normalization (BN)~\cite{ioffe2015batch} and instance normalization (IN)~\cite{ulyanov2016instance} within DNNs to solve the DG problem. These studies show that BN improves discriminative ability on features, while IN prevents overfitting on training data, so that generalization performance is improved on unseen domains by combining BN and IN. Especially, IBN-Net~\cite{pan2018two} shows a significant performance improvement with the marginal architectural modification that incorporates the IN layers through training on a single source domain, unlike most DG methods that require multiple source domains. This normalization based DG method is attractive because it can be applied as a complement to other DG methods based on multiple source domains \vspace{-0.45cm} \paragraph{Semantic segmentation in DG} Based on the synthetic data such as GTAV~\cite{Richter_2016_ECCV} and SYNTHIA~\cite{Ros_2016_CVPR}, numerous DA studies~\cite{pan2020unsupervised,vu2019advent,saleh2018effective,chen2018road,zou2018unsupervised,hoffman2018cycada,tsai2018learning,ma2018exemplar,zhang2017curriculum} have been proposed in semantic segmentation, but only a few DG studies~\cite{yue2019domain,pan2018two} address semantic segmentation, as the majority of the DG methods mainly focused on image classification. DA, which can access the target domains, generally has better performance than DG, but DG methods that can handle an arbitrary unseen domain without access to the target domain are mandatory in the real world. This paper focuses on the DG method practically helpful in semantic segmentation where various conditions exist such as adverse weather, diverse illumination, location differences, and so on. \vspace{-0.45cm} \paragraph{Feature covariance} The seminal studies~\cite{gatys2015texture,gatys2016image} have demonstrated that feature correlations (\textit{i.e.,} a gram matrix or covariance matrix) take style information of images. Since then, numerous studies exploit the feature correlation in style transfer~\cite{li2017universal}, image-to-image translation~\cite{cho2019image}, domain adaptation~\cite{roy2019unsupervised,sun2016deep} and networks architecture~\cite{luo2017learning,pan2019switchable,huang2018decorrelated,siarohin2018whitening}. Especially, the whitening transformation that removes feature correlation and makes each feature have unit variance, has been known to help to remove the style information from the feature representations~\cite{li2017universal,pan2019switchable,cho2019image}. Our work explores the whitening transformation to improve domain generalization performance. To the best of our knowledge, this is the first attempt to apply whitening to DG. \begin{figure*}[ht!] \vspace*{-0.0cm} \centering\includegraphics[width=0.97\linewidth]{latex/figures/fig_method_01.pdf} \vspace*{-0.0cm} \caption{\textbf{Overall process of our proposed method.} (a) Instance standardization. (b) Deriving a covariance matrix from a standardized feature map. (c) Leaving only the covariance to which the whitening loss is applied. (d) Applying the criterion that measures the mean absolute error between the remaining covariance values and zero. No additional computation is required for inference as the operations in red are used only for training. Notations; $\mathbf{X}$: intermediate feature map, $\mathbf{X_s}$: standardized feature map, $\mathbf{\Sigma_s}$: covariance matrix of the standardized feature map, $\mathbf{M}$: matrix for masking, $\mathcal{L}_{\text{IW}}$: our proposed instance whitening loss. } \label{fig:whitening_overview} \vspace*{-0.4cm} \end{figure*} \vspace*{-0.05cm} \section{Preliminaries} \vspace*{-0.1cm} \paragraph{Whitening transformation (WT)} Let $\mathbf{X}\in\mathbb{R}^{C\times HW}$ denote the intermediate feature map, where $C$ is the number of channels, $H$ and $W$ are the spatial dimensions of the feature map, height and width, respectively.\vspace{0.02cm} WT is a linear transformation that makes the variance term of each channel equal to one and the covariances between each pair of channels equal to zero. A whitening-transformed feature map\vspace{0.05cm} $\mathbf{\tilde{X}}$ from $\mathbf{X}$ satisfies that $\mathbf{\tilde{X}}\cdot\mathbf{\tilde{X}}^\top=(HW)\cdot\mathbf{I}\in\mathbb{R}^{C\times C}$, where $\mathbf{I}$ denotes the identity matrix, and can be computed as \begin{equation} \label{eq_whitening_transform} \mathbf{\tilde{X}}=\mathbf{\Sigma}_{\mu}^{-\frac{1}{2}}\left(\mathbf{X}-\boldsymbol{\mu}\cdot{\mathbf{1}^\top}\right), \end{equation} where $\mathbf{1}\in\mathbb{R}^{HW}$ is a column vector of ones, and $\boldsymbol{\mu}$ and $\mathbf{\Sigma}_{\mu}$ are the mean vector and the covariance matrix, respectively, \textit{i.e.,} \vspace{-0.1cm} \begin{equation}\label{eq_mean} \vspace{-0.05cm} \boldsymbol{\mu}=\tfrac{1}{HW}\mathbf{X}\cdot{\mathbf{1}}\in \mathbb{R}^{C\times{1}}, \end{equation} \begin{equation}\label{eq_covariance} \mathbf{\Sigma}_{\mu}=\tfrac{1}{HW}\left(\mathbf{X}-\boldsymbol{\mu}\cdot{\mathbf{1}^\top}\right)\left(\mathbf{X}-\boldsymbol{\mu}\cdot{\mathbf{1}^\top}\right)^\top\in\mathbb{R}^{C\times{C}}. \end{equation} Since the covariance matrix $\mathbf{\Sigma}_{\mu}$ can be further eigen-decomposed such that $\mathbf{Q}\mathbf{\Lambda}\mathbf{Q}^\top$, where $\mathbf{Q}\in\mathbb{R}^{C\times{C}}$ is the orthogonal matrix of eigenvectors, and $\mathbf{\Lambda}\in\mathbb{R}^{C\times{C}}$ is the diagonal matrix that contains each eigenvalue of the corresponding eigenvector from $\mathbf{Q}$, we can calculate an inverse square root of the covariance matrix $\mathbf{\Sigma}_{\mu}^{-\frac{1}{2}}$ as \vspace{-0.05cm} \begin{equation}\label{eq_inverse_square_root} \mathbf{\Sigma}_{\mu}^{-\frac{1}{2}}=\mathbf{Q}\mathbf{\Lambda}^{-\frac{1}{2}}\mathbf{Q}^\top. \vspace{-0.05cm} \end{equation} It has been known that WT can effectively remove style information by being applied to each instance in style transfer~\cite{li2017universal}. \vspace{-0.4cm} \paragraph{Limitations of WT} We can compute the whitening transformation matrix $\mathbf{\Sigma}_\mu^{-\frac{1}{2}}$ analytically through Eq.~\eqref{eq_inverse_square_root}, but eigenvalue decomposition is computationally expensive, leading to slow training and inference speed and prevents the gradient back-propagation~\cite{huang2018decorrelated, cho2019image}. To alleviate these problems, previous studies have shown that the goal of WT can be achieved without the eigen-decomposition through the whitening loss~\cite{cho2019image} or approximating the whitening transformation matrix using Newton's iteration~\cite{huang2019iterative,huang2018decorrelated,pan2019switchable}. Especially, GDWCT~\cite{cho2019image} proposes the deep whitening transformation (DWT) that implicitly makes the covariance matrix $\mathbf{\Sigma}_{\mu}$ close to the identity matrix $\mathbf{I}$ by means of the loss defined as \vspace{-0.1cm} \begin{equation} \label{eq_whitening_loss} \mathcal{L}_{\text{DWT}} = \mathbb{E}[\Vert\mathbf{\Sigma_\mu} - \mathbf{I}\Vert_1], \vspace{-0.1cm} \end{equation} where $\mathbb{E}$ denotes the arithmetic mean. GDWCT applies this loss to image-to-image translation for more significant style changes than other methods~\cite{huang2018multimodal,lee2018diverse} of aligning only the first-order statistics (\textit{i.e.,} channel-wise mean and variance). However, applying these alternative methods of WT to DG is not straightforward. Whitening all covariance elements may diminish feature discrimination~\cite{pan2019switchable,wadia2020whitening} and distort the boundary of an object~\cite{li2018closed,li2017universal} because domain-specific style and domain-invariant content are simultaneously encoded in the covariance of the feature map. \vspace{-0.0cm} \section{Proposed Method}\label{sec:proposed_method} \vspace{-0.05cm} This section presents our approach to solve the domain generalization problem through whitening the feature representation by mitigating undesirable effects of a whitening transformation. Our method disentangles the covariance into the encoded style and content so that only the style information can be selectively removed, thus increasing the domain generalization ability. We firstly propose an instance whitening and instance-relaxed loss in Section~\ref{method:deep_instance_whitening} and then finally propose our novel instance selective whitening loss in Section~\ref{method:deep_instance_selective_whitening}. \vspace{-0.05cm} \subsection{Instance Whitening Loss}\label{method:deep_instance_whitening} \vspace{-0.1cm} This subsection describes a series of steps to transform the input feature into the whitening transformed feature as shown in Fig.~\ref{fig:whitening_overview}. Note that our method is applied to each instance, not to a mini-batch. Let $\mathbf{\Sigma}_{\mu\,(i,i)}$ denote a diagonal element ($i,i$) and $\mathbf{\Sigma}_{\mu\,(i,j)}$ denote an off-diagonal element ($i,j$) of the covariance matrix $\mathbf{\Sigma}_{\mu}$ of the intermediate feature map, where $0\le i,j<C$, $i\ne j$. The DWT loss in Eq.~\eqref{eq_whitening_loss} can be decomposed as \vspace{-0.05cm} \begin{equation}\label{eq_cov_elements_loss1} {\big\Vert}\mathbf{\Sigma}_{\mu\,(i,i)}-1{\big\Vert}_1={\big\Vert}\tfrac{\mathbf{x}_{i}^\top\cdot\mathbf{x}_{i}}{HW}-1{\big\Vert}_1={\big\Vert}\tfrac{\vert\mathbf{x}_{i}\vert\vert\mathbf{x}_{i}\vert\cos\text{0}^{\circ}}{HW}-1{\big\Vert}_1 \vspace{-0.05cm} \end{equation} \begin{equation}\label{eq_cov_elements_loss2} \Vert\mathbf{\Sigma}_{\mu\,(i,j)}\Vert_1={\big\Vert}\tfrac{\mathbf{x}_{i}^\top\cdot\mathbf{x}_{j}}{HW}{\big\Vert}_1={\big\Vert}\tfrac{\vert\mathbf{x}_{i}\vert\vert\mathbf{x}_{j}\vert\cos\theta}{HW}{\big\Vert}_{1}, \vspace{0.05cm} \end{equation} where $\mathbf{x}_{i}\in\mathbb{R}^{HW}$ denotes the $i$-th channel of the intermediate feature map $\mathbf{X}\in\mathbb{R}^{C\times HW}$. Note that Eq.~\eqref{eq_cov_elements_loss1} applies to the diagonal elements, and Eq.~\eqref{eq_cov_elements_loss2} applies to the off-diagonal elements of the covariance matrix. The optimization process for the whitening loss should minimize both Eq.~\eqref{eq_cov_elements_loss1} and Eq.~\eqref{eq_cov_elements_loss2} simultaneously, but there exists a limitation on it. The scale of each channel (\textit{i.e.,} $\vert\mathbf{x}_{i}\vert$) is forced to increase to the value of $\sqrt{HW}$ by Eq.~\eqref{eq_cov_elements_loss1} and decrease to zero by Eq.~\eqref{eq_cov_elements_loss2}. Therefore, forcing the diagonal and off-diagonal of the covariance matrix to be one and zero, respectively, conflicts with each other, so it is difficult to optimize both at the same time. To address this issue, the feature map $\mathbf{X}$ can first be standardized into $\mathbf{X_s}$ through an instance normalization~\cite{ulyanov2016instance}: \vspace{-0.1cm} \begin{equation}\label{standardization} \mathbf{X_s}=\left(\text{diag}(\mathbf{\Sigma}_{\mu})\right)^{-\frac{1}{2}}\odot(\mathbf{X}-\boldsymbol{\mu}\cdot{\mathbf{1}^\top}), \end{equation} where $\odot$ is an element-wise multiplication, and $\text{diag}(\mathbf{\Sigma}_{\mu})\in\mathbb{R}^{C\times1}$ denotes the column vector consisting of diagonal elements in the covariance matrix. Note that each diagonal element is copied along with the spatial dimension $HW$ for element-wise multiplication. Since the scale of each feature vector is already fixed as the unit value after the instance standardization, the whitening loss only affects the $\cos\theta$ term in Eq.~\eqref{eq_cov_elements_loss2}. In the end, this approach fits the purpose of the whitening transformation to decorrelate the features. After standardization of the intermediate feature map, the covariance matrix is calculated as \begin{equation}\label{eq_mean_std_covariance} \mathbf{\Sigma_s}=\tfrac{1}{HW}(\mathbf{X_s})(\mathbf{X_s})^\top\in\mathbb{R}^{C\times{C}}, \end{equation} where $\mathbf{X_s}$ is the standardized feature map. Thanks to the standardization process, diagonal elements of the covariance matrix are already set as unit values. Thus, we only need to make the off-diagonals of the covariance matrix close to zero, which makes it easy to optimize for the whitening process, and the aforementioned conflict can thus be resolved. Since the covariance matrix is symmetric, the loss can be applied only to the strict upper triangular part. Our instance whitening (IW) loss is formulated as \begin{equation} \label{eq_our_whitening_loss} \mathcal{L}_{\text{IW}} = \mathbb{E}[\Vert\mathbf{\Sigma_s}\odot\mathbf{M}\Vert_1], \end{equation} where $\mathbb{E}$ denotes the arithmetic mean and $\mathbf{M}\in\mathbb{R}^{C\times C}$ denotes a strict upper triangular matrix, \textit{i.e.,} \begin{equation} \label{eq_mask} \mathbf{M}_{i,j} =\begin{cases} 0, & \text{if $i \geq j$}\\ 1, & \text{otherwise} \end{cases} \quad 0\le i,j<C. \vspace*{-0.1cm} \end{equation} \begin{figure*}[ht!] \vspace*{-0.0cm} \centering\includegraphics[width=0.97\linewidth]{latex/figures/fig_method_02_v1.pdf} \vspace*{-0.0cm} \caption{\textbf{Instance selective whitening loss}. (a) The variance matrix $\mathbf{V}$ is computed out of the covariance matrices of the $i$-th image $x_i$ and its photometric transformed image $\tau(x_i)$ to identify those elements sensitive to the transformation (blue boxes). Note that these matrices are symmetric. (b) The covariance matrix $\mathbf{\Sigma_s}$ is masked by the matrix $\mathbf{\tilde{M}}$ to selectively suppress style-sensitive covariances by $\mathcal{L}_{\text{ISW}}$. } \label{fig:disentangling_covariance} \vspace{-0.45cm} \end{figure*} \vspace*{-0.18cm} \subsection{Margin-based relaxation of whitening loss} \vspace*{-0.12cm} The instance whitening loss (Eq.~\eqref{eq_our_whitening_loss}) suppresses all covariance elements to zero, so it can adversely affect the discriminative power of features within DNNs. To address this issue, we propose an instance-\emph{relaxed} whitening (IRW) loss to sustain the covariance elements essential in maintaining the discriminative power. The IRW loss is designed so that the expected value of the total covariance lies within a specified margin $\delta$ rather than being close to zero, \textit{i.e.,} \begin{equation} \label{eq_our_whitening_loss_with_margin} \mathcal{L}_{\text{IRW}} = \max(\mathbb{E}[\Vert\mathbf{\Sigma_s}\odot\mathbf{M}\Vert_1]-\delta, \ 0) \end{equation} The loss $\mathcal{L}_{\text{IRW}}$ allows the covariance to have a certain level of values, so it gives room to keep discriminative features intact. The empirical effect of the IRW loss can be found in Section~\ref{exp:effectiveness}. It shows better performance compared to the IW loss not including margin $\delta$ (Eq.~\eqref{eq_our_whitening_loss}). Nonetheless, it may not be sufficient because we cannot guarantee that only the covariance useful for generalization performance remains through the margin relaxation. \vspace*{-0.05cm} \subsection{Separating Covariance Elements}\label{method:deep_instance_selective_whitening} \vspace*{-0.1cm} To further improve our approach, we need to separate the covariance terms into two groups: domain-specific style and domain-invariant content. We propose to selectively suppress only the style-encoded covariances that cause the domain shift. Assuming that the domain shift includes changes in color and blurriness, we simulate the domain shift through photometric augmentation such as color jittering and Gaussian blurring. First, we add only the instance standardization layer into the networks (Fig.~\ref{fig:whitening_overview}(a)) and train them during the $n$ initial epochs without the whitening loss to get the pure statistics of the covariance matrices from training images. $n$ is a hyper-parameter, which we empirically set to 5. Afterwards, we extract two covariance matrices by inferring from two input images, namely an original and a photometric-transformed image, and calculate the variance matrix from the differences between two different covariance matrices. Formally, the variance matrix $\mathbf{V}\in\mathbb{R}^{C\times C}$ is defined as \vspace*{-0.1cm} \begin{equation} \label{eq_var_covar_sigma} \mathbf{V}=\frac{1}{N}\sum_{i=1}^N\boldsymbol{\sigma}_i^2, \end{equation} from mean $\boldsymbol{\mu}_{\mathbf{\Sigma}_i}$ and variance $\boldsymbol{\sigma}_i^2$ for each element from two different covariance matrices of the $i$-th image, \textit{i.e.,} \vspace*{-0.1cm} \begin{equation} \label{eq_var_covar_mu} \boldsymbol{\mu}_{\mathbf{\Sigma}_i}=\tfrac{1}{2}\left(\mathbf{\Sigma_s}({x_i})+ \mathbf{\Sigma_s}(\tau(x_i)\right) \vspace*{-0.2cm} \end{equation} \begin{equation} \label{eq_var_covar_sig} \boldsymbol{\sigma}_i^2=\tfrac{1}{2}\left(\left(\mathbf{\Sigma_s}\left({x_i}\right)-\boldsymbol{\mu}_{\mathbf{\Sigma}_i}\right)^2 + \left(\mathbf{\Sigma_s}\left(\tau\left(x_i\right)\right)-\boldsymbol{\mu}_{\mathbf{\Sigma}_i}\right)^2\right) \vspace*{-0.1cm} \end{equation} where $N$ denotes the number of image samples, $x_i$ is the $i$-th image sample, $\tau$ is a photometric transformation, and $\mathbf{\Sigma_s}(\cdot)$ extracts the covariance matrix of the intermediate feature map from an input image. As a result, $\mathbf{V}$ consists of elements of the variance of each covariance element across various photometric transformations. We assume that the variance matrix $\textbf{V}$ implies the sensitivity of the corresponding covariance to the photometric transformation. This means that the covariance elements with high variance value contain the domain-specific style such as color and blurriness. To identify such elements, we apply \textit{k}-means clustering on the strict upper triangular elements $\mathbf{V}_{i,j}\; (i<j)$ of the variance matrix $\mathbf{V}$ to assign the elements into $k$ clusters $C=\{c_1, c_2,\dots,c_k\}$ with respect to the value. Next, we split the $k$ clusters into two groups, $G_{low}=\{c_1,\dots,c_m\}$ with low variance value and $G_{high}=\{c_{m+1},\dots,c_k\}$ with high variance value. The hyper-parameters $k$ and $m$ are empirically set to 3 and 1, respectively. More details can be found in the supplementary Section \todow{A.2}. We assume that $G_{high}$ contains the domain-specific style and $G_{low}$ contains domain-invariant content. Finally, we propose an instance \emph{selective} whitening (ISW) loss that selectively suppresses only to the style-encoded covariances. Let the mask matrix $\mathbf{{M}}$ in Eq.~\eqref{eq_mask} change to $\mathbf{\tilde{M}}\in\mathbb{R}^{C \times C}$ for the ISW loss as \vspace{-0.1cm} \begin{equation} \label{eq_selective_mask} \mathbf{\tilde{M}}_{i,j} =\begin{cases} 1, & \text{if $\mathbf{V}_{i,j}\in G_{high}$}\\ 0, & \text{otherwise} \end{cases} \quad \vspace*{-0.05cm} \end{equation} The ISW loss is defined as \vspace*{-0.05cm} \begin{equation} \label{eq_our_whitening_loss_selective} \mathcal{L}_{\text{ISW}} = \mathbb{E}[\Vert\mathbf{\Sigma_s}\odot\mathbf{\tilde{M}}\Vert_1]. \vspace*{-0.05cm} \end{equation} The networks continue training for the remaining epochs incorporating the proposed ISW loss. \begin{figure}[b!] \vspace{-0.3cm} \begin{center} \includegraphics[width=1.0\linewidth]{latex/figures/fig_method_03.pdf} \end{center} \vspace*{-0.3cm} \caption{\textbf{Architecture comparison with other methods}: (a) the original residual block~\cite{he2016deep}; (b) IBN-b~\cite{pan2018two} combining instance normalization with batch normalization; (c) IterNorm~\cite{huang2019iterative} employing Newton's iterations for efficient whitening; (d) Our proposed ISW loss applied to instance normalization. } \label{fig:architectural_comparison} \end{figure} \vspace*{-0.0cm} \subsection{Network architecture with proposed ISW loss}\label{sec:network_architecture} \vspace*{-0.05cm} IBN-Net~\cite{pan2018two} has explored a number of ResNet~\cite{he2016deep}-based architectures to combine instance normalization with batch normalization and proposed several IBN blocks based on a residual block (Fig.~\ref{fig:architectural_comparison}(a)). Among the proposed blocks, IBN-b, which adds an instance normalization layer right after the addition operation of a residual block (Fig.~\ref{fig:architectural_comparison}(b)), shows the best generalization performance on semantic segmentation tasks. After all, they add three instance normalization layers after the first three convolution groups (\textit{i.e.,} conv1, conv2\_x, and conv3\_x). We follow this architectural approach as our baseline. As shown in Fig.~\ref{fig:architectural_comparison}(d), we simply add our proposed ISW loss to the instance normalization layer. Our loss in total is described as \vspace{-0.25cm} \begin{equation} \label{eq_final_loss} \mathcal{L}_{\text{total}} = \mathcal{L}_{\text{task}} + \lambda(\frac{1}{L}\sum_i^L\mathcal{L}_{\text{ISW}}^i), \vspace{-0.15cm} \end{equation} where $\lambda$ denotes the weight of our ISW loss and is empirically set to 0.6, $\mathcal{L}_{\text{task}}$ is the task loss (\textit{e.g.,} a per-pixel cross-entropy loss for semantic segmentation), $i$ indicates the layer index, and $L$ is the number of layers to which the ISW loss is applied. The hyper-parameter $\lambda$ is analyzed in the supplementary Section \todow{A.2}. $L$ is set to three by following IBN-Net. An affine transformation is not used since the subsequent convolution operation after a whitening transformation can do the equivalent job, and empirically, we found no performance gain by explicitly adding the affine transformation. \vspace{-0.1cm} \vspace{-0.0cm} \section{Experiments} \vspace{-0.1cm} This section describes the experimental setup and presents evaluation results to assess the effectiveness of our proposed methods on semantic segmentation with comparison to other methods. Furthermore, we provide an in-depth analysis of our results including the covariance matrices. \vspace{-0.07cm} \subsection{Experimental Setup} \vspace{-0.08cm} We train our model on several datasets (\textit{e.g.,} Cityscapes) and show its performance on other datasets (\textit{e.g.,} BDD-100K, Mapillary, GTAV, and SYNTHIA) to measure the generalization capability on unseen domains. For fair comparisons with other normalization techniques, we re-implement IBN-Net~\cite{pan2018two} and IterNorm~\cite{huang2019iterative} on our baseline models and compare them with our methods. As described in Section~\ref{sec:network_architecture}, our proposed loss can easily be added to existing models, so we apply our methods to various backbone networks such as ResNet~\cite{he2016deep}, ShuffleNetV2~\cite{ma2018shufflenet} and MobileNetV2~\cite{sandler2018mobilenetv2} and show wide applicability of the proposed methods. For all the quantitative experiments, mean Intersection over Union (mIoU) is used to measure the segmentation performance. \vspace{-0.4cm} \subsubsection{Implementation details} \vspace{-0.1cm} We adopt DeepLabV3+~\cite{chen2018encoder} for a semantic segmentation architecture, and SGD optimizer with an initial learning rate of 1e-2 and momentum of 0.9 is used. Besides, we follow the polynomial learning rate scheduling~\cite{liu2015parsenet} with the power of 0.9. We train all the models for 40K iteration, except for multi-source models, which are trained for 110K iterations. To prevent the model from overfitting, color and positional augmentations such as color jittering, Gaussian blur, random cropping, random horizontal flipping, and random scaling with the range of [0.5, 2.0] are conducted. For the photometric transformation in ISW, we apply color jittering and Gaussian blur. Also, as suggested by IBN-Net, we add three instance normalization layers after the first three convolution groups and apply our proposed loss. Further details are provided in the supplementary Section \todow{A.3}. \vspace{-0.35cm} \subsubsection{Datasets} \vspace{-0.2cm} To verify the generalization capability of our methods, we conduct the experiments on five different datasets. \vspace{-0.48cm} \paragraph{Real-world datasets} Cityscapes~\cite{Cordts2016Cityscapes} is a large-scale dataset containing high-resolution (\textit{e.g.,} 2048$\times$1024) urban scene images collected from 50 different cities in primarily Germany. It provides 3,450 finely-annotated images and 20,000 coarsely-annotated images. We use only a finely-annotated set for training and validation. BDD-100K~\cite{yu2020bdd100k} is another real-world dataset that contains diverse urban driving scene images with the resolution of 1280$\times$720. The images are collected from various locations in the US. For a semantic segmentation task, 7,000 training and 1,000 validation images are provided. The last real-world dataset we use is Mapillary~\cite{neuhold2017mapillary}, a diverse street-view dataset consisting of 25,000 high-resolution images with a minimum resolution of 1920$\times$1080 collected from all around the world. \vspace{-0.48cm} \paragraph{Synthetic datasets} GTAV~\cite{Richter_2016_ECCV} is a large-scale dataset containing 24,966 driving-scene images generated from Grand Theft Auto V game engine. It has 12,403, 6,382, and 6,181 images of size 1914$\times$1052 for a train, a validation, and a test set, respectively. It has 19 object categories compatible with Cityscapes. Also, we use SYNTHIA~\cite{ros2016synthia}, composed of photo-realistic synthetic images containing 9,400 samples with a resolution of 960$\times$720. \vspace{-0.1cm} \subsection{Quantitative Evaluation} \vspace{-0.1cm} This subsection provides ablation studies, the comparisons of our results against other normalization methods, the evaluation on multiple source domains, and the analysis of computational cost. Since the experiments follow domain generalization settings, the model cannot access any datasets other than the source data. \vspace{-0.38cm} \subsubsection{Effectiveness of instance selective whitening loss}\label{exp:effectiveness} \vspace{-0.17cm} To verify the effectiveness of our methods, we conduct comparisons with other normalization methods and ablation studies on instance whitening (IW), instance-relaxed whitening (IRW), and instance selective whitening (ISW). \textbf{Note that all the experiments in this subsection are performed three times and averaged for fair comparisons}. \begin{table}[t!] \vspace*{-0.0cm} \begin{center} \footnotesize \begin{tabular}{c|c|c|c|c||c} \toprule Models (GTAV) & C & B & M & S & G\\ \drule Baseline & 28.95 & 25.14 & 28.18 & 26.23 & 73.45 \\ \midrule $^\dagger$SW~\cite{pan2019switchable} & 29.91 & 27.48 & 29.71 & 27.61 & \textbf{73.50} \\ \midrule $^\dagger$IBN-Net~\cite{pan2018two} & 33.85 & 32.30 & 37.75 & 27.90 & 72.90 \\ \midrule $^\dagger$IterNorm~\cite{huang2019iterative} & 31.81 & 32.70 & 33.88 & 27.07 & 73.19 \\ \midrule Ours (IW) & 33.21 & 32.67 & 37.35 & 27.57 & 72.06 \\ \midrule Ours (IRW) & 33.57 & 33.18 & 38.42 & 27.29 & 71.96 \\ \midrule Ours (ISW) & \textbf{36.58} & \textbf{35.20} & \textbf{40.33} & \textbf{28.30} & 72.10 \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.15cm} \caption{Comparison of mIoU(\%). Compared models are trained on GTAV train set, and validated on Cityscapes (C), BDD-100K (B), Mapillary (M), SYNTHIA (S) and GTAV (G) validation sets. ResNet-50 with an output stride of 16 is used. $^\dagger$ denotes our own re-implemented models. SW denotes Switchable Whitening~\cite{pan2019switchable}.} \label{tab_best_model_16_gtav} \vspace*{-0.53cm} \end{table} Table~\ref{tab_best_model_16_gtav} shows the generalization performance of the models trained on GTAV dataset. ISW outperforms other methods on all datasets except the source dataset (\textit{i.e.,} GTAV). Especially, ISW shows a significant improvement on real-world datasets (i.e., Cityscapes, BDD-100K, and Mapillary). Table~\ref{tab_best_model_16_city} shows the generalization performance of those models trained on Cityscapes dataset. Although IterNorm outperforms our models on GTAV, the performance gap is minimal. ISW outperforms other normalization and baseline models on BDD-100K, Mapillary, and SYNTHIA datasets. \begin{table}[b!] \vspace{-0.4cm} \begin{center} \footnotesize \begin{tabular}{c|c|c|c|c||c} \toprule Models (Cityscapes) & B & M & G & S & C \\ \drule Baseline & 44.96 & 51.68 & 42.55 & 23.29 & \textbf{77.51} \\ \midrule $^\dagger$SW~\cite{pan2019switchable} & 48.49 & 55.82 & 44.87 & 26.10 & 77.30 \\ \midrule $^\dagger$IBN-Net~\cite{pan2018two} & 48.56 & 57.04 & 45.06 & 26.14 & 76.55 \\ \midrule $^\dagger$IterNorm~\cite{huang2019iterative} & 49.23 & 56.26 & \textbf{45.73} & 25.98 & 76.02 \\ \midrule Ours (IW) & 48.19 & 58.90 & 45.21 & 25.81 & 76.06 \\ \midrule Ours (IRW) & 48.67 & \textbf{59.20} & 45.64 & 26.05 & 76.13 \\ \midrule Ours (ISW) & \textbf{50.73} & 58.64 & 45.00 & \textbf{26.20} & 76.41 \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.17cm} \caption{Comparison of mIoU(\%). The models are trained on Cityscapes train set. ResNet-50 with an output stride of 16 is used. $^\dagger$ denotes re-implemented models.} \label{tab_best_model_16_city} \vspace{-0.2cm} \end{table} Baseline, Switchable Whitening (SW), and IBN-Net, which are less generalizable than our method, tend to overfit the source domain, suffering from performance degradation on the target domain due to the large domain shift. Our method may sacrifice the performance on the source domains (\textit{i.e.,} training and evaluating on the same dataset) as shown in the last column in Table~\ref{tab_best_model_16_gtav} and ~\ref{tab_best_model_16_city}. However, our models shows good generalizability, which is critical when deployed in the wild, where large domain-shift is expected. Table~\ref{tab_various_backbone_cityscapes} explains the wide applicability of our work. The first group is reported by adopting ShuffleNetV2, and the second group is using MobileNetV2 as backbone networks. In both cases, our model with ISW outperforms the baseline and IBN-Net on real-world datasets. To further validate the capability of our method, we present the comparison with baselines trained on multiple synthetic domains, GTAV, and SYNTHIA. For the training, we aggregate the training domains without any joint training methodologies. Learning domain-invariant features across multiple datasets is essential to optimize the model on different distributions of multiple datasets. Table~\ref{tab_multi_source_best} shows our model trained on multiple datasets performs better than other models due to its generalization ability by extracting domain-invariant features during training. \begin{table}[t!] \vspace*{-0.0cm} \begin{center} \setlength\tabcolsep{5.2pt} \footnotesize \begin{tabular}{c|c|c|c|c||c} \toprule Models (GTAV) & C & B & M & S & G \\ \drule Baseline & 25.56 & 22.17 & 28.60 & 23.33 & \textbf{66.47} \\ \midrule $^\dagger$IBN-Net~\cite{pan2018two} & 27.10 & 31.82 & 34.89 & \textbf{25.56} & 65.44 \\ \midrule Ours (ISW) & \textbf{30.98} & \textbf{32.06} & \textbf{35.31} & 24.31 & 64.99 \\ \toprule Baseline & 25.92 & 25.73 & 26.45 & 24.03 & \textbf{68.12} \\ \midrule $^\dagger$IBN-Net~\cite{pan2018two} & 30.14 & 27.66 & 27.07 & \textbf{24.98} & 67.66 \\ \midrule Ours (ISW) & \textbf{30.86} & \textbf{30.05} & \textbf{30.67} & 24.43 & 67.48 \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.15cm} \caption{Comparison of mIoU(\%). The models are trained on GTAV train set. The backbone networks of the first group are ShuffleNetV2~\cite{ma2018shufflenet} and the second group is MobileNetV2~\cite{sandler2018mobilenetv2}. \label{tab_various_backbone_cityscapes} \vspace*{-0.55cm} \end{table} \begin{table}[h] \vspace*{-0.15cm} \begin{center} \footnotesize \begin{tabular}{c|c|c|c||c|c} \toprule Models (G + S) & C & B & M & G & S \\ \drule Baseline & 35.46 & 25.09 & 31.94 & 68.48 & 67.99 \\ \midrule IBN-Net & 35.55 & 32.18 & 38.09 & \textbf{69.72} & 66.90 \\ \midrule \textbf{Ours} & \textbf{37.69} & \textbf{34.09} & \textbf{38.49} & 68.26 & \textbf{68.77} \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.1cm} \caption{Comparison of mIoU(\%). The models are trained on multiple synthetic domains. The backbone is ResNet-50 with an output stride of 16. $^\dagger$ denotes re-implemented models.} \label{tab_multi_source_best} \vspace*{-0.5cm} \end{table} \begin{table}[b!] \vspace*{-0.0cm} \begin{center} \setlength\tabcolsep{4.2pt} \footnotesize \begin{tabular}{c|cc|cc|cc} \toprule Models (GTAV) & \multicolumn{2}{c|}{C} & \multicolumn{2}{c|}{B} & \multicolumn{2}{c}{M} \\ \drule Baseline & 22.20 & \multirow{2}{*}{7.40 $\uparrow$} & \multicolumn{2}{c|}{\multirow{2}{*}{N/A}} & \multicolumn{2}{c}{\multirow{2}{*}{N/A}} \\ IBN-Net~\cite{pan2018two} & 29.60 & & & & & \\ \midrule Baseline & 32.45 & \multirow{2}{*}{4.97$\uparrow$} & 26.73 & \multirow{2}{*}{5.41$\uparrow$} & 25.66 & \multirow{2}{*}{8.46$\uparrow$} \\ DRPC~\cite{yue2019domain} & \textbf{37.42} & & 32.14 & & 34.12 & \\ \midrule Baseline & 28.95 & \multirow{2}{*}{\textbf{7.63}$\uparrow$} & 25.14 & \multirow{2}{*}{\textbf{10.06}$\uparrow$} & 28.18 & \multirow{2}{*}{\textbf{12.15}$\uparrow$} \\ Ours (ISW) & 36.58 & & \textbf{35.20} & & \textbf{40.33} & \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.15cm} \caption{mIoU(\%) comparison with IBN-Net and DRPC trained on GTAV train set. The backbone is ResNet-50. Note that IBN-Net does not report the performance on BDD-100K and Mapillary.} \label{tab_best_model_8} \vspace*{-0.2cm} \end{table} \vspace{-0.35cm} \subsubsection{Comparison with other DG and DA methods} \vspace{-0.2cm} This subsection compares our method with two existing DG methods on semantic segmentation task, based on the results reported in the papers~\cite{pan2018two,yue2019domain}. DRPC~\cite{yue2019domain} proposes a domain randomization method, which maps the synthetic images to multiple auxiliary real domains using image-to-image translation with the style of real images (\textit{e.g.,} ImageNet). As shown in Table~\ref{tab_best_model_8}, our model gains the largest performance increase on average, compared to other methods such as IBN-Net~\cite{pan2018two} and DRPC~\cite{yue2019domain}. Our method shows a large amount of performance improvement on BDD-100K and Mapillary datasets that involve significantly more diverse driving scenes than Cityscapes. In addition, we compare the result of our method with those reported from several domain adaptation methods. See the supplementary Section \todow{A.1}. \begin{table}[t!] \vspace*{-0.0cm} \begin{center} \setlength\tabcolsep{4.2pt} \footnotesize \begin{tabular}{c|c|c|c} \toprule Models & \# of Params & GFLOPS & Inference Time (ms) \\ \drule Baseline & 45.082M & 554.31 & 10.48\\ \midrule $^\dagger$IBN-Net~\cite{pan2018two} & 45.083M & 554.31 & 10.51\\ \midrule $^\dagger$IterNorm~\cite{huang2019iterative} & 45.081M & 554.31 & 40.31\\ \midrule Ours & 45.081M & 554.31 & 10.43 \\ \bottomrule \end{tabular} \end{center} \vspace*{-0.2cm} \caption{Comparison of computational cost. Tested with the image size of 2048$\times$1024 on NVIDIA A100 GPU. The inference time is averaged over 500 trials. $^\dagger$ denotes re-implemented models.} \label{tab_computational_cost} \vspace*{-0.5cm} \end{table} \vspace{-0.3cm} \subsubsection{Computational cost analysis} \vspace{-0.15cm} To ensure our method requires no additional computational cost, we report the number of parameters, GFLOPS, and inference time. As seen in Fig.~\ref{fig:architectural_comparison}, all the models in Table~\ref{tab_computational_cost} share the same network architecture, but with different normalization methods. As shown in Table~\ref{tab_computational_cost}, our approach performs a whitening transformation without additional computational cost. \vspace*{-0.0cm} \subsection{Qualitative Analysis} \vspace*{-0.05cm} \paragraph{Comparison of covariance matrices} To show how the covariance matrix is selectively whitened, we visualize the covariance matrix of intermediate feature maps from IBN-Net~\cite{pan2018two} and our model with ISW. As shown in Fig.~\ref{fig:covariance_matrix}, the first pair of covariance matrices are from the first convolution layer and the others are from the second convolution layer. Note that the style information mainly exists in the early layers of the network as pointed out in IBN-Net. Moreover, the style information is encoded as a form of the features covariance as revealed in previous studies~\cite{gatys2015texture, gatys2016image}. Hence, the covariance matrices are sparser at the second pair, compared to the first ones. By comparing the covariance maps from IBN-Net and ISW, we can find the ones from ours are whitened but a small number of covariance elements remain large, showing our ISW selectively eliminates the covariance. \begin{figure}[b!] \vspace*{-0.3cm} \begin{center} \includegraphics[width=0.98\linewidth]{latex/figures/fig_visualization_covariance.pdf} \end{center} \vspace*{-0.2cm} \caption{Visualization of covariance matrices extracted from IBN-Net and our model. The first and the second pairs are extracted from the first and the second convolution layers, respectively.} \label{fig:covariance_matrix} \vspace*{-0.0cm} \end{figure} \vspace*{-0.45cm} \paragraph{Reconstructing images with whitened features} For in-depth analysis, we reconstruct input images from the whitened feature maps of our ISW model. For the experiment, we adopt U-Net~\cite{ronneberger2015u} as reconstruction networks. To newly train a decoder, we append the decoder to the backbone of a pre-trained baseline and train the decoder. We then replace the backbone network with the pre-trained ISW model. As seen in Fig.~\ref{fig:reconstruction}, generated images preserve the relevant content information for segmentation while the style information such as illumination and colors is suppressed. These examples support the validity of our approach that selectively suppresses the style information. \begin{figure}[t!] \begin{center} \includegraphics[width=1.0\linewidth]{latex/figures/fig_reconstruction.pdf} \end{center} \vspace*{-0.3cm} \caption{Reconstructed images from ISW-whitened feature maps using U-Net; the first row: a baseline backbone, the second row: an ISW model backbone. The image contents are properly maintained while the style such as illumination and colors vanish.} \label{fig:reconstruction} \vspace*{-0.45cm} \end{figure} \vspace{-0.1cm} \section{Discussions} \vspace{-0.1cm} In this section, we discuss potential issues and improvements of our approach for further research. \vspace{-10pt} \vspace{-0.1cm} \paragraph{Affine parameters.} Most of the normalization layers contain affine parameters to recover the original distribution and enhance the representation of a network. We attempted to deploy this by adding affine parameters or a 1$\times$1 convolution layer after the normalization layer incorporating our proposed whitening loss. Despite our effort, this approach did not improve our method. We conjecture it is because affine parameters or a 1$\times$1 convolution layer do not have sufficient complexity in recovering the original distribution.\vspace{-20pt} \vspace{-0.1cm} \paragraph{Photometric transformation.} Our method adopted photometric transformation to separate the style and content information, where we found that applying color transform and Gaussian blur does not harm the content information. We expect our approach can be further improved by exploring various photometric augmentation techniques. \vspace{-0.1cm} \section{Conclusions} \vspace{-0.1cm} This paper proposed a novel instance selective whitening (ISW) loss, which facilitates disentangling the covariances of the intermediate features into the style- and content-related ones and suppressing only the former to learn the domain-invariant feature representation. We focused on solving the domain generalization problem in urban-scene segmentation, which has practical impact when deployed in the wild but has not been studied much. In this regard, we strive to promote the importance of the domain generalization and inspire new research paths in this area. \vspace*{0.15cm} { \small \noindent\textbf{Acknowledgments} This work was partially supported by Institute of Information \& communications Technology Planning \& Evaluation (IITP) grant funded by the Korea government(MSIT) (No. 2019-0-00075, Artificial Intelligence Graduate School Program(KAIST) and No. 2020-0-00368, A Neural-Symbolic Model for Knowledge Acquisition and Inference Techniques), the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. NRF-2019R1A2C4070420). } \clearpage {\small \bibliographystyle{latex/ieee_fullname}
\section{Introduction} The magnetic Kelvin-Helmholtz instability (KHI) is a magnetohydrodynamic (MHD) shear-driven instability frequently observed in solar system plasmas. KHI can be induced at the surface between two media with different flow velocity and plasma conditions. This shear instability is fundamental and can be found in many flow shear systems throughout the Universe. The KHI that has been most studied in situ is at the Earth’s magnetopause and low-latitude boundary layers where periodic fluctuations of magnetic fields and plasma parameters are observed \citep[e.g.,][]{1981JGR....86..814H, 2000JGR...10521159F, Hasegawa2004, Foullon2008, Eriksson2016a}. This is because the Earth’s flank magnetopause is prone to the KHI onset condition which prefers weak magnetic field in the direction of the shear flow. Nevertheless, KHI has been observed in strong magnetic field environments such as in the solar corona \citep{Ofman2011} and at the flank of a coronal mass ejection (CME) \citep[e.g.,][]{Foullon2011a, Foullon2013, Mostl2013} via Extreme Ultraviolet (EUV) imaging by the Solar Dynamics Observatory (SDO). Variations of the KHI such as a sinusoidal mode have also been observed in a solar prominence \citep{Hillier2018} using Interface Region Imaging Spectrograph \citep{2014SoPh..289.2733D}. Recently, remote observations above the solar corona using Heliospheric Imager instrument on board the Solar-Terrestrial Relations Observatory (STEREO/HI1) have revealed a transition in texture of the solar wind from highly anisotropic coronal plasma, or ``striae'', to more isotropic, or ``flocculated'', solar-wind plasma \citep{DeForest2016}. The transition is found to be consistent with the onset of hydrodynamic and MHD instabilities leading to development of turbulence. Qualitatively, this transition is found to occur near the first surface of plasma $\beta = 1$, where the $\beta$ changes from $\beta \ll 1$ near the Sun to $\beta \approx 1$, and the Alfvén critical surface where the solar wind speed reaches the Alfvén speed ($V = V_A$) \citep{Chhiber2018}. \citet{Ruffolo2020} propose that the transition from striae to flocculation of the young solar wind is powered by shear-driven instabilities such as the KHI, caused by the relative velocities of adjacent coronal magnetic flux tubes. This is supported by compressible MHD numerical simulations in which several features observed by Parker Solar Probe \citep[PSP;][]{2016SSRv..204....7F} including the magnetic ``switchback'' signatures near perihelia are reproduced. It is argued that the KHI can be triggered when the relative velocity between flux tubes is larger than the local Alfvén velocity ($\Delta V > V_A$) when the magnetic field is along the velocity shear, leading to shear-driven turbulence just outside the Alfvén critical zone. In theory, the KHI may develop at tangential discontinuities (TDs) because there are relative changes in velocity field ($\mathbf{V}$) and magnetic field ($\mathbf{B}$) across them and no normal magnetic field threading through them, which would otherwise stabilize the instability (as for rotational discontinuities). The solar wind is full of TDs \citep[e.g.,][]{1977JGR....82.3191B, Knetter2004, Neugebauer2010}, which separate different plasma regions. TDs are thought of as surfaces that separate adjacent solar wind flux-tubes \citep[e.g.,][]{Hollweg1982} that originated from granules, or meso/super granules in the Sun's photosphere \citep[e.g.,][]{1986SoPh..107...11R, 1992sws..coll....1A} with different plasma properties and composition and spread out in the heliosphere \citep[e.g.,][]{2005LRSP....2....4B, 2008JGRA..113.8110B}. It was demonstrated theoretically by many authors that TDs can support MHD surface waves \citep[e.g.,][]{Hollweg1982}. In particular, TDs could support the KHI \citep[e.g.,][]{Burlaga1972, Neugebauer1986}. As for the flux tube picture, it was suggested that the KHI should be induced when adjacent flux tubes move relative to each other with a speed greater than the Alfvén speed \citep{Burlaga1972}. \citet{Zaqarashvili2014} consider the topology of magnetic flux tubes and found that, while the axial $\mathbf{B}$ of the flux tubes stabilizes the KHI, a slight twist in the $\mathbf{B}$ (i.e., as for when the $\mathbf{B}$ does not align with the $\mathbf{V}$) may allow the surface between them with $\Delta V < V_A$ to become unstable to the KHI. Across TDs, an alignment between the change in velocity ($\Delta V$) and the change in magnetic field ($\Delta B$) are commonly observed \citep{Neugebauer1985, Neugebauer1986, Neugebauer2006, Knetter2004}. This alignment is not expected from the MHD discontinuity theory, unlike at rotational discontinuities where this alignment is expected \citep{Hudson1970}. This alignment of $\Delta V$ and $\Delta B$ is observed independent of the type of solar wind stream between 1 and 2.2 AU based on IMP 8 and Voyager 2 data \citep{Neugebauer1985}. Based on Helios data, \citet{Neugebauer1986} report that this alignment is also observed as close as $0.3$ AU. They further consider the possibility that the KHI may have developed across TDs and destroyed the random alignment between $\Delta V$ and $\Delta B$. Since the number of TDs per unit time decrease with distance from the Sun \citep[e.g.,][]{1979JGR....84.2773T, 1986JGR....91.8725L}, \citet{Neugebauer1986} suggested that the KHI may have destroyed TDs as the KHI growth rate becomes larger with decreasing Alfvén speed. Despite all these postulations, the KHI has not been observed in situ in the solar wind to our knowledge. Here we report unambiguous in-situ KHI detection in Solar Orbiter observations \citep[SolO;][]{Muller2020} during its cruise phase. SolO is an ESA mission, launched on February 10, 2020, aimed to study the Sun and inner heliosphere from out-of-ecliptic vantage points. The cruise phase started in June 2020 with the in-situ instruments operated nominally after a successful commissioning. SolO was at $0.69$ AU during the observations presented here when several periodic fluctuations in plasma parameters are observed. In this work, we report quasi-periodic magnetic and plasma variations within a shear layer in the slow solar wind consistent with the development of the KHI, supported by the linear theory analysis and numerical simulations. The paper is organized as follows. First, we present the instrumentation and overview, context, and KHI observations in Section~\ref{sec:obs}. Additionally, we report observations of magnetic reconnection signatures in the KHI. Then, we focus on the linear theory, boundary layer analyses, numerical simulations, and magnetic spectra of the KHI in Section~\ref{sec:results}. As this event shows clear evidence of the KHI in the solar wind, we discuss why it was not observed in past data, as well as its implications for solar wind dynamics in Section~\ref{sec:discussion}. We summarize our findings and discussion in Section~\ref{sec:conclusions}. \section{Observations} \label{sec:obs} \subsection{Instrumentation and overview} \begin{figure} \centering \includegraphics[width=3.25in]{Solo-position-3Dview.png} \caption{Overview of SolO and other spacecraft positions on 23 July 2020 at 20:01:08 UT in the RTN coordinates. Orange solid lines represent solar wind Parker spirals \citep{1958ApJ...128..664P} calculated using a constant velocity of $300$ km s$^{-1}$. This figure was obtained using the 3DView software \citep{GENOT2018111}.} \label{fig:SOpos} \end{figure} We use magnetic field data from the fluxgate vector magnetometer \citep[MAG;][]{Horbury2020}. MAG continuously samples the magnetic field with the rate up to 16 vector/s in the normal mode and up to 128 vector/s in the burst mode with a precision of about 5 pT. We also use particle data from the Proton and Alpha Particle Sensor (PAS) that is part of the Solar Wind Analysis instrument suite \citep[SWA;][]{Owen2020}. PAS provides high-cadence measurements of 3D velocity distribution function of solar wind particles (electrons, protons, alpha particles, and heavy ions). We use the Radial Tangential Normal (RTN) coordinate system throughout this paper unless stated otherwise. In this system, the coordinates are centred at the spacecraft where $R$ is directed radially outward from the Sun to spacecraft, $T$ is longitudinal along the cross product of the Sun's rotation vector with $R$, and $N$ completes the right-handed orthogonal set, which points in the latitudinal direction. \begin{figure}[ht] \centering \includegraphics[width=3.5in]{adapt_map2.png} \caption{Connectivity map of the observations on July 23, 2020, produced from the Connectivity Tool \citep{Rouillard2020} to provide a global context. The background is a combined image from remote observation using SDO/AIA and STEREO-A/EUVI 193 $\AA$ Carrington maps. The SolO position is projected to the area of observation and is shown as a blue cross (see text). The Heliospheric Current Sheet (HCS) is marked with a red dashed line. } \label{fig:map} \end{figure} On July 23 - 24, 2020, SolO was at the distance 0.69 AU from the Sun. From July 23 at 12:00 UT to July 24 at 12:00 UT, SolO was moving from the distance $r = 1.03 \times 10^8$ km ($0.68$ AU) to $r = 1.04 \times 10^8$ km ($0.70$ AU) from the Sun. Fig.~\ref{fig:SOpos} shows the projected position of SolO onto the equatorial plane with the solar wind Parker spiral (orange lines) \citep{1958ApJ...128..664P} calculated using a constant solar wind speed of $300$ km s$^{-1}$. This figure is obtained using the 3DView software \citep{GENOT2018111} available at \url{http://3dview.cdpp.eu/}. The radial speed of SolO was $V_R = 11.3$ km s$^{-1}$ throughout this interval. Fig.~\ref{fig:map} shows the global context on July 23, 2020 from 18 to 24 UT of the solar observations with the SolO position (blue cross) projected back to the Sun's surface. This figure is obtained from the Magnetic Connectivity Tool \citep{Rouillard2020}, accessible at \url{http://connect-tool.irap.omp.eu/}, that can be used to connect between remote observations and in-situ observations. The background image is produced by combining images taken by SDO and STEREO-A in EUV at $193$ $\AA$, using the Heliospheric Imagers (HI) instruments on board. The green and red dots indicate the points at the surface that are most likely to be magnetically connected to SolO, assuming uniform slow and fast wind flows. The SolO position is estimated to be at the blue cross position. The connected positions are projected on magnetograms from the ADAPT (Air Force Data Assimilative Photospheric Flux Transport) flux transport model \citep{2010AIPC.1216..343A, 2015SoPh..290.1105H}. On this image, the SolO position appears at low-latitude ($\sim 0^o$) and near the Heliospheric Current Sheet marked by a red dashed line. In this work, we report SolO observations of the KHI near an edge of the HCS. \begin{figure*} \centering \includegraphics[width=6.5in]{fig_context_thetadVdB_new_AA.png} \caption{Solar Orbiter observations between 16:00 UT on 23 July 2020 and 6:00 UT on 24 July 2020 showing the context of the Kelvin-Helmholtz instability observation (shaded area). (a) Magnetic fields in the RTN coordinates. (b) Ion bulk velocity $V_R$ component. (c) Ion bulk velocity $V_T$ and $V_N$ components. (d) Ion number density. (e) Alfvén Mach number. (f) Normalized cross-helicity. (g) The angle between $\delta \mathbf{v}$ and $\delta \mathbf{b}$ (see text). The Heliospheric Current Sheet (HCS) is observed between 22:00 UT on 23 July 2020 and 2:00 UT on 24 July 2020, marked by purple dotted lines. The Magnetic Increase with Central Current Sheet (MICCS) is observed between 17:35 and 18:08 UT on 23 July 2020, marked by orange dotted lines.} \label{fig:12hr} \end{figure*} \subsection{12-hour context} Fig.~\ref{fig:12hr} shows SolO observations between 16:00 UT on July 23, 2020 and 6:00 UT on July 24, 2020, covering a 12-hour interval. In Fig.~\ref{fig:12hr}a, we show the magnetic field components and magnitude. Fig.~\ref{fig:12hr}b displays the radial component ($V_R$) and Fig.~\ref{fig:12hr}c the tangential ($V_T$) and out-of-ecliptic ($V_N$) components of the ion bulk flow velocity. Two main HCS crossings are observed between 22:00 UT on July 23 and 2:00 UT on July 24 in between the purple vertical dotted lines. The HCS is characterized by a large-scale ($\sim$several hours) change in the polarity of the radial magnetic field ($B_R$). Around 18:00 UT on July 23, we mark a meso-scale structure ($\sim$a few hours) between vertical orange dotted lines, characterizing bipolar magnetic fields with a sharp magnetic transition (i.e., current sheet) at the center. At this central current sheet, there is an ion jet clearly seen in $V_R$ and $V_N$, probably indicating ongoing magnetic reconnection. This structure is known as Magnetic Increase with Central Current Sheet (MICCS) and it has been observed with Parker Solar Probe \citep{Fargette2021}; this signature corresponds to two magnetic flux tubes that become interlinked and with magnetic reconnection at the interface \citep[e.g.,][]{Louarn2004, Kacem2018, Oieroset2019, Kieokaew2020}. Although mentioned here for context, this feature is not discussed any more in our study. \begin{figure*} \centering \includegraphics[width=6.5in]{fig_KHI_AA.png} \caption{Solar Orbiter observations on 23 July 2020 between 20:10 UT and 21:50 UT. (a) Magnetic field in the RTN coordinates. (b) Ion bulk velocity $V_R$ component. (c) Ion bulk velocity $V_T$ and $V_N$ components. (d) Alfvén speed $|\mathbf{V}_A|$ and Alfvén velocity components ($V_{A,r}, V_{A,t}, V_{A,n}$). (e) Ion number density. (f) Plasma pressure $P_p$, magnetic pressure $P_m$, and total pressure $P_{tot}$. (g) Plasma beta $\beta$. The KH waves can be noticed between 20:45 and 21:30 UT. The vertical grey dashed lines (1) - (7) mark the boundary layer crossings corresponding to KH trailing edges. The magenta dashed-dotted lines mark times when the plasma parameters reach asymptotic values on Side 1 (20:38 UT) and Side 2 (21:29 UT) of the shear layer. } \label{fig:KH} \end{figure*} From 20:45 to 21:30 UT on July 23 in Fig.~\ref{fig:12hr}c, we observe a velocity shear of about $30$ km s$^{-1}$ in the $V_T$ (green) and about $20$ km~s$^{-1}$ in the $V_N$ (blue) components. This velocity shear interval features periodic fluctuations in the magnetic fields (Fig.~\ref{fig:12hr}a) and the radial velocity ($V_R$; Fig.~\ref{fig:12hr}b). The shear layer is also accompanied by changes in the ion number density shown in Fig.~\ref{fig:12hr}d. This interval as shaded in grey exhibits KH-like signatures; we show a zoom-in of this interval in the next section. Figs.~\ref{fig:12hr}e, ~\ref{fig:12hr}f, and ~\ref{fig:12hr}g show the Alfvén Mach number ($M_A$), the normalized cross-helicity ($\sigma_c$), and the angle between $\mathbf{V}$ and $\mathbf{B}$ changes ($\theta_{VB}$), respectively. During the shaded interval, the $M_A$ is $12$, indicating that the solar wind is super-Alfvénic. The $\sigma_c$ \citep{1982JGR....87.6011M, Roberts1992} is calculated from $\sigma_c = 2 \langle \delta \mathbf{v} \cdot \delta \mathbf{b} \rangle / \langle | \delta \mathbf{v}|^2 + |\delta \mathbf{b}|^2 \rangle$, where $\delta \mathbf{v} = \mathbf{V} - \langle \mathbf{V} \rangle_{20min}$ and $\delta \mathbf{b} - \langle \mathbf{b} \rangle_{20min}$ are the velocity field and magnetic field fluctuations from the $20-$min running averages of $\mathbf{V}$ and $\mathbf{b} = \mathbf{B}/\sqrt{\mu_0 \rho}$, where $\mu_0$ is the vacuum permeability and $\rho$ is the average proton mass density, respectively. The magnetic field $\mathbf{b}$ is measured in Alfvén speed units in km s$^{-1}$. The sum ($\langle \rangle$) brackets are also taken over $20$-min running averages. $\sigma_c$ relates to the cross helicity $H_c = \frac{1}{2} \int (\mathbf{V} \cdot \mathbf{b}) d^2 x $ and the energy per unit mass $E = \frac{1}{2} \int (\mathbf{V}^2 + \mathbf{b}^2) d^2 x$ through the relation $\sigma_c = 2 H_c / E$. This quantity measures the Alfvénicity with $\sigma_c = \pm 1$ indicating Alfvénic fluctuations, where the signs $+, -$ correspond to Alfvénic propagation anti-parallel or parallel to the mean field, respectively. During the shaded interval, $\sigma_c$ is fluctuating around $0.5$, indicating that the solar wind is not strongly Alfvénic. The angle $\theta_{VB}$ is calculated from $ \arccos (\delta \mathbf{v} \cdot \delta \mathbf{b} / (|\delta \mathbf{v}||\delta \mathbf{b}|))$. For the shaded time period, Fig.~\ref{fig:12hr}g shows that the angle between $\delta \mathbf{v}$ and $\delta \mathbf{b}$ is spreading from $90^o$ to $120^o$. The non-alignment of $\delta \mathbf{v}$ and $\delta \mathbf{b}$ during this interval indicates the possibility for this shear layer to be unstable to the KHI. The KHI would be suppressed if the magnetic field change aligns with the velocity field change due to the magnetic tension exerted in the direction of the shear flow \citep[e.g.,][]{1961hhs..book.....C}, i.e., when $\theta_{VB}$ is near $0^o$ or $180^o$. \subsection{KHI observations} \label{subsec:KHI} Fig.~\ref{fig:KH} shows a zoom-in around the shaded time period in Fig.~\ref{fig:12hr} between 20:45 and 21:30 UT on July 23, 2020. The quasi-periodic fluctuations in several parameters resemble in-situ KH waves at the interface between shear flows \citep[e.g.,][]{Hasegawa2004}. The magnetic field in Fig.~\ref{fig:KH}a clearly shows repeated, homologous fluctuations in all components. We mark sharp magnetic rotations (1) - (7) with vertical dashed lines. Fig.~\ref{fig:KH}b shows $V_R$ and Fig.~\ref{fig:KH}c shows $V_T$ and $V_N$ components of the ion bulk velocity. The velocity shear is clearly seen in the $V_T$ component. To mark the shear layer, we define Side 1 at 20:38 UT as the beginning of the shear interval and Side 2 as the end of the shear interval at 21:29 UT, marked by magenta dotted-dashed lines. Sides 1 and 2 are characterized mainly by the tangential velocity $V_T$ which reached local minimum and maximum, respectively. The periodic features are also seen in the velocity fields especially for the tangential ($V_T$) component in Fig.~\ref{fig:KH}c in which sudden, sharp transitions colocate with the changes in the magnetic field marked by the vertical dashed lines. To facilitate discussion, we define the magnetic rotations (1) - (7) as ``wave edges'' that mark sudden changes in both magnetic and velocity fields. Table~\ref{table:waveedge} notes times of these wave edges and time differences between these edges. These time differences correspond to the period of the waves. The average time difference between wave edges is $7$ minutes $17$ seconds (s) and the standard deviation is $55$ s. We analyze the wave edges in detail in Section~\ref{subsec:boundary-analysis}. \begin{table} \caption{Timing of the KH wave edges marked in Fig.~\ref{fig:KH} and time difference between them.} \label{table:waveedge} \centering \begin{tabular}{ccc} \hline\hline Numbers & Times (UT) & Time difference (mm:ss) \\ \hline (1) & 20:45:59 & - \\ (2) & 20:53:43 & 07:44 \\ (3) & 21:02:11 & 08:28 \\ (4) & 21:09:56 & 07:45 \\ (5) & 21:17:32 & 07:36 \\ (6) & 21:23:39 & 06:07 \\ (7) & 21:29:38 & 05:59 \\ \hline\hline \end{tabular} \end{table} Fig.~\ref{fig:KH}d shows Alfvén speed and Alfvén velocity components ($\mathbf{V}_A = \mathbf{B} /\sqrt{\mu_0 n_i m_p}$, where $n_i$ is the ion number density and $m_p$ is the proton mass). The average Alfvén speed in this interval is $26$ km s$^{-1}$. Fig.~\ref{fig:KH}e shows the ion number density ($n_{ion}$). Despite some fluctuations, $n_{ion}$ gradually changes from $30$ cm$^{-1}$ at Side 1 to $22$ cm$^{-1}$ at Side 2. Fig~\ref{fig:KH}f shows the magnetic ($P_m$), thermal ($P_p$), and total pressures ($P_{tot} = P_m + P_p$). The total pressure is approximately constant, indicating approximate pressure balance across the shear layer. Fig.~\ref{fig:KH}g shows the ion beta ($\beta$). The $\beta$ is changing from $\beta \approx 2$ at Side 1 to $\beta \approx 1$ at Side 2. A strong peak in $\beta$ of about $\beta \approx 7$ is observed adjacent to wave edge (3). At wave edge (3), there is an ion jet in $V_N$ (blue in Fig.~\ref{fig:KH}c) with $\Delta V_N \sim 11$ km s$^{-1}$ that colocates with the magnetic rotation observed in $B_N$ (blue in Fig.~\ref{fig:KH}a). We explain that this ion jet may be produced by magnetic reconnection, in Section~\ref{subsec:recon}. Table~\ref{table:values} summarizes the values of $\mathbf{V}, \mathbf{B}$ and $n_{ion}$ at Sides 1 and 2. Considering the velocity change across the shear layer, we define $\Delta \mathbf{V} = \mathbf{V}_2 - \mathbf{V}_1$, where the subscripts $1$ and $2$ label Sides 1 and 2, respectively. The velocity change is $\Delta \mathbf{V} = (\Delta V_R, \Delta V_T, \Delta V_N) = (30, 30, -11) $ km s$^{-1}$, with $|\Delta \mathbf{V}| = 44$ km s$^{-1}$. The ratio of the velocity change across the shear layer to the average Alfvén speed is therefore $\Delta V / V_A = 1.7$. An important criterion of the KHI from the linear theory of stability of a shear layer in plasmas considered by \citet{1961hhs..book.....C}, \citet{Sen1963}, and \citet{Landau1960} is that the KHI would be suppressed for $\Delta V < {V_A}$, i.e., when the velocity shear is less than the local Alfvénic speed. Note that this condition is obtained in a simplistic configuration of an infinitely thin shear layer embedded in the uniform density and magnetic field and with the magnetic field being exactly along the velocity shear. The observed shear velocity exceeds the local Alfvén speed for this approximate consideration and thus the KHI is not suppressed. In Section~\ref{subsec:linear-theory}, to test whether the observed local shear conditions support the KHI growth, we consider the KHI onset condition by taking into account the nonuniform conditions on either side of the shear layer derived from the linear theory. We also set up a local MHD simulation using these empirical conditions in Section~\ref{subsec:sim}. \begin{table} \caption{Parameter values on Side 1 and Side 2 of the shear layer marked in Fig.~\ref{fig:KH}.} \label{table:values} \centering \begin{tabular}{c r r c} \hline\hline Parameters & Side 1 & Side 2 & Units \\ \hline $V_R$ & $285$ & $305$ & km s$^{-1}$ \\ $V_T$ & $-20$ & $10$ & km s$^{-1}$ \\ $V_N$ & $-5$ & $-16$ & km s$^{-1}$ \\ \hline $B_R$ & $4$ & $4$ & nT \\ $B_T$ & $2$ & $-2$ & nT \\ $B_N$ & $0$ & $3$ & nT \\ \hline $n_{ion}$ & $30$ & $22$ & cm$^{-3}$ \\ \hline\hline \end{tabular} \end{table} \subsection{Magnetic reconnection} \label{subsec:recon} \begin{figure}[ht] \centering \includegraphics[width=3.5in]{fig_recon_AA.png} \caption{Magnetic reconnection signatures at wave edge (3) in Fig.~\ref{fig:KH}. (a) Magnetic field strength. (b) Magnetic field reconnecting $L$-component. (c) Magnetic field $M, N$ components. (d) Ion bulk velocity $V_L$ component with the predicted velocity jet ($V_{A,L}$; cyan). (e) Ion number density. (f) Ion temperature. Dashed orange lines mark the extent of the ion jet. A dashed grey line marks the maximum ion velocity during the jet. } \label{fig:recon} \end{figure} Fig.~\ref{fig:recon} shows a zoom-in at wave edge (3) in Fig.~\ref{fig:KH} that contains an ion jet colocated with the change in magnetic field seen in the $N$ component (blue). The current sheet interval at the wave edge is delineated by orange dashed lines between 21:02:00 and 21:02:40 UT. The magnetic field magnitude in Fig.~\ref{fig:recon}a shows a drop at the centre of the current sheet of about $2.5$ nT. To clearly see the ion jet, we transform the magnetic field into local current sheet $LMN$ coordinates using the hybrid Maximum Variance Analysis (MVA) technique \citep{Gosling2013}. In this coordinate system, $L$ points in the magnetic shear direction (i.e., the reconnecting component), $N$ points in the direction normal to the shear plane, and $M = N \times L$ points in the out-of-plane direction (i.e., the guide-field direction). We transform the magnetic field from the $RTN$ coordinates to $LMN$ coordinates as follows. First, the current sheet normal $N$ is obtained from the cross-product of the asymptotic $10$-s averaged magnetic fields just outside the current sheet interval. Second, the $M$ component is obtained from $N \times L_1$, where $L_1$ is the maximum variance direction obtained from the MVA technique \citep{Sonnerup1967} applied in the current sheet interval. Finally, $L= M \times N$ completes the right-handed orthonormal system. We obtain $L = [-0.285, 0.245, -0.924], M = [0.882, 0.44, -0.156] $, and $N = [0.37, -0.863, -0.343]$. The magnetic field rotation is clearly seen in the $B_L$ component in Fig.~\ref{fig:recon}b. $B_L$ rotates from positive to negative during the current sheet interval in colocation with the ion jet seen in the $V_L$ component in Fig.~\ref{fig:recon}e. Note that the velocity data have lower cadence ($4$ s) than the magnetic field data ($1$ s), thus the velocity is sampled only at a few points in the vicinity of the current sheet interval. The velocity peak is marked by a grey dashed line. This ion jet has a magnitude of $\Delta V = 13$ km s$^{-1}$. Although there is only one velocity measurement associated with the peak inside the jet, one should note that the operation cycle of the PAS instrument is such that each sample is made over only $1$ s every $4$ s. The measurement is thus made over a limited time exactly in the center of the current sheet, rather than over $4$ s which would have led to significant time aliasing across the current sheet. The change in $B_L$ correlates with the change in $V_L$ negatively on the inbound side and positively on the outbound side. This sequence of correlations is consistent with a jet that is produced by magnetic reconnection. Although we acknowledge that there is only one velocity measurement in the jet, there are additional signatures that are consistent with the interpretation of magnetic reconnection, such as the enhanced ion number density shown in Fig.~\ref{fig:recon}e, consistent with mixing of ions from either side of the current sheet in the reconnection exhaust \citep{Gosling2005} and the enhanced ion temperature consistent with plasma heating within the reconnection exhaust \citep{2014GeoRL..41.7002P} in Fig.~\ref{fig:recon}f. To more quantitatively assess whether this jet is consistent with reconnection, we consider the Walén relation: $\Delta \mathbf{V}_A \sim \pm \Delta \mathbf{B} / (\mu_0 m_p n_{ion})^{1/2}$, where $+$ or $-$ is applied for a positive or negative correlation between $\mathbf{B}$ and $\mathbf{V}$, respectively, \citep{Hudson1970, Paschmann1986} within the exhaust as bounded by dashed orange lines in Fig.~\ref{fig:recon}. The predicted jet velocity is shown as cyan in Fig.~\ref{fig:recon}d. The predicted velocity produces a trend that resembles the observed jet. However, the predicted velocity jet from the Walén relation is estimated to be $\Delta V_A = 33$ km s$^{-1}$. Thus, the observed jet has a velocity that is $40$\% of the predicted jet velocity. A sub-Alfvénic reconnection jet is not unusual in observations. In the literature, sub-Alfvénic jet speeds are found when the spacecraft crosses the reconnection exhaust near the X-line. The development of secondary instabilities due to high plasma-$\beta$ was also found to lower the reconnection jet speed \citep{Haggerty2018}. The presence of reconnection within KH waves may imply that it is produced as a consequence of vortex-induced-reconnection \citep[e.g.,][]{Nykyri2001, Nakamura2006, Karimabadi2013, Eriksson2016a}, which can be triggered when KH vortices develop and create thin current sheets between them. We further discuss this possibility in the discussion section. \section{Results} \label{sec:results} \subsection{Linear theory analysis} \label{subsec:linear-theory} To test whether the observed local conditions in Table~\ref{table:values} satisfy the KHI onset criterion, we consider the stability of a shear layer derived using the linear theory of \citet{1961hhs..book.....C}. The KHI onset criterion derived for an infinitely thin boundary layer in an incompressible plasma can be written \citep{1975pine.book.....H} as \begin{equation} \left[ \mathbf{k} \cdot (\mathbf{V}_1 - \mathbf{V}_2) \right]^2 > \frac{n_1 + n_2}{\mu_0 m_p n_1 n_2} \left[ (\mathbf{k} \cdot \mathbf{B}_1)^2 + (\mathbf{k} \cdot \mathbf{B}_2)^2 \right] \label{eq:onset} \end{equation} where $\mathbf{k}$ is the wave vector, $\mathbf{V}$ is the velocity field, $\mathbf{B}$ is the magnetic field, and $n$ is the ion number density, with the subscripts $1, 2$ representing either side of the shear layer. The phase velocity of the KH mode, associated with the real part of the KH dispersion relation $V_{ph} = \omega / k$, where $\omega$ is the wave frequency and $k$ is the wave number, is given as \begin{equation} V_{ph} = \dfrac{n_1 \mathbf{k} \cdot \mathbf{V}_1 + n_2 \mathbf{k} \cdot \mathbf{V}_2}{k (n_1 + n_2)} \label{eq:Vph} \end{equation} The growth rate of the KHI, associated with the imaginary part of the dispersion relation, can be written as \begin{equation} \gamma = [ \alpha_1 \alpha_2 [ (\mathbf{V}_1 - \mathbf{V}_2) \cdot \mathbf{k}]^2 - \alpha_1 ( \mathbf{V_{A,1}} \cdot \mathbf{k})^2 - \alpha_2 ( \mathbf{V_{A,2}} \cdot \mathbf{k})^2 ]^{1/2} \label{eq:growth} \end{equation} where $\alpha_1 = n_1 / (n_1 + n_2)$ and $\alpha_2 = n_2 / (n_1 + n_2)$, and $\mathbf{V_{A,1}}, \mathbf{V_{A,2}}$ label the Alfvén speeds on either side of the boundary. \begin{figure} \centering \includegraphics[width=3.5in]{fig_BV_MVA_box_AA.png} \caption{Magnetic and velocity fields in the local shear frame obtained from the application of the MVA to the ion bulk velocity. (a) Magnetic field in the maximum ($X$), intermediate ($Y$), and minimum ($Z$) variance directions and its magnitude. (b, c, d) Velocity field in the $X$, $Y$, and $Z$ directions, respectively. (e) Simplified shear boundary layer configuration obtained from the transformation to the maximum shear frame. } \label{fig:MVA-box} \end{figure} To simplify the configuration of the observed shear layer, we transform the velocity field using the application of the MVA technique to the ion bulk velocity from 20:14 to 21:50 UT. The maximum, intermediate, and minimum variance directions are found to be $[0.53, 0.79, -0.32], [0.84, -0.53, 0.07]$, and $[0.12, 0.31, 0.95]$, respectively. The ratios of the maximum to the intermediate eigenvalues ($\lambda_1 / \lambda_2$) and the intermediate to the minimum eigenvalues ($\lambda_3 / \lambda_2$) are $7.7$ and $2.0$, respectively, indicating reliable estimations \citep{1972JGR....77.1321S}. The maximum variance direction is the direction where we find the velocity jump (i.e., the wave amplitude direction); it is assigned as $Y$. The minimum variance direction is the invariant direction; it is assigned as $Z$. The intermediate variance direction is the wave propagation direction; it is assigned as $X$. The transformed $\mathbf{B}$ and $\mathbf{V}$ are shown in Figs.~\ref{fig:MVA-box}a - \ref{fig:MVA-box}d. The velocity jump is clearly seen in Fig.~\ref{fig:MVA-box}b with $\Delta V = 40$ km s$^{-1}$. Fig.~\ref{fig:MVA-box}e shows a simplified configuration of this shear layer in the $X-Y$ plane. Note that the $V_y$ and $V_z$ are nearly constant and thus not shown in this figure. We may calculate a KH growth rate from the simplified configuration in Fig.~\ref{fig:MVA-box}e. In this frame, the shear velocity is $\Delta \mathbf{V} = \mathbf{V}_2 - \mathbf{V}_1 \approx (40, 0, 0) $ km s$^{-1}$. Since the magnetic field perpendicular to the shear direction, i.e., the $B_z$ component (the invariant direction), does not impact the KHI \citep{1961hhs..book.....C}, we can ignore this component. Assuming that the wave vector $\mathbf{k}$ is in the $X-Y$ plane and makes an angle $\phi$ from the $Y$-direction such that $\mathbf{k} = (k \cos \phi, k \sin \phi, 0)$, Eq.~\ref{eq:growth} can be written as \begin{eqnarray} \left( \frac{\gamma}{k} \right)^2 &=& \frac{\rho_1 \rho_2}{(\rho_1 + \rho_2)^2} \left[ \Delta V_x \cos \phi + \Delta V_y \sin \phi \right]^2 \nonumber \\ & & - \frac{1}{\mu_0 (\rho_1 + \rho_2)} \left[ B_{1,x} \cos \phi + B_{1,y} \sin \phi \right]^2 \nonumber \\ & & - \frac{1}{\mu_0 (\rho_1 + \rho_2)} \left[ B_{2,x} \cos \phi + B_{2,y} \sin \phi \right]^2 \label{eq:growthxy} \end{eqnarray} where $\rho_i = m_p n_i$, $i = 1, 2$. We find positive growth rates for an arbitrary angle $\phi$ with a maximum growth rate ($\gamma / k$) of $16$ km s$^{-1}$. This means that the observed conditions of this event are unstable to the KHI. In brief, the linear theory analysis supports the KHI interpretation. Assuming that the wave vector $\mathbf{k}$ is in the same direction as the flow, we obtain the KH phase velocity from Eq. (\ref{eq:Vph}) to be $V_{ph} = 152$ km s$^{-1}$. Since the average wave period from Table~\ref{table:waveedge} is found to be $437 \pm 55$ s ($7.3 \pm 0.9$ minutes), the KH wavelength is estimated to be $\lambda_{KH} = 66,400 \pm 8,400$ km or $0.10 \pm 0.01$ solar radii. The linear theory analysis of a finite-thickness shear layer by \cite{Miura1982} predicts that the fastest growing mode occurs for $k L \sim 0.5 - 1.0$, where $ L$ is the initial shear layer thickness. Using $k = 2 \pi / \lambda$, the fastest growing mode should have the wavelength of $2 \pi L - 4 \pi L$. Using our estimated $\lambda_{KH}$, we estimate the initial shear layer thickness to be $L \approx 5,300$ - $10,500$ km. Note that this estimate ignores any vortex merging or potential influence of pre-existing turbulence that could influence the size of the vortices that are observed. \subsection{KH simulation} \label{subsec:sim} \begin{figure*} \centering \includegraphics[width=6.5in]{KH-sim-solo-annotated.png} \caption{A snapshot of the numerical simulation of the KHI using empirical values of the SolO event from Side 1 and Side 2. The color-scale represents values of the out-of-plane flow vorticity ($\omega$). The KHI quickly reaches the non-linear stage where rolled-up KH vortices form and coalesce. The stripes in vorticity in the lower part of the simulation are shocks produced by the supersonic flow as the Mach number $\sim 3$ (see text).} \label{fig:KHsim}% \end{figure*} To further test whether the observed conditions would support the KHI, we performed a numerical simulation using SolO observations for Side 1 and Side 2 as boundary conditions. We exploit a numerical simulation that solves compressible MHD equations via a hybrid compact-weighted essentially non-oscillatory (WENO) scheme \citep{2016JCoPh.306...73Y}. This hybrid scheme couples a sixth-order compact finite difference scheme for smooth regions and a fifth-order WENO scheme in shock regions, suitable for capturing strong discontinuities in MHD systems. The time stepping is performed by the third-order Runge-Kutta scheme. This code has been used to study compressible MHD turbulence \citep{2016PhRvE..93f1102Y, 2017PhFl...29c5105Y} and shear-driven turbulence by the KHI near the Sun \citep{Ruffolo2020}. To simulate our event, we consider the local shear frame in Fig.~\ref{fig:MVA-box}e, derived in Section~\ref{subsec:linear-theory}. Moreover, we consider the local KHI frame that travels with the KH phase speed at $V_{ph} \approx 150$ km s$^{-1}$. In this frame, the speeds on Sides 1 and 2 are $U_{X,1} = -15$ km s$^{-1}$ and $U_{X,2} = 25$ km s$^{-1}$, respectively. Since the magnetic field perpendicular to the shear flow does not impact the KH growth \citep{1961hhs..book.....C}, we only include magnetic field in the shear flow direction. The ion number density values on Sides 1 and 2 are $n_1 = 30$ cm$^{-3}$ and $n_2 = 22$ cm$^{-3}$, respectively. The ion temperature values on Sides 1 and 2 are set to $T_1 = 1.32$ eV and $T_2 = 3.63$ eV, respectively. The ion $\beta$ is set to $1$. The magnetosonic Mach number across the shear layer is $\Delta U / c_{s,1} = 2.75$, where $\Delta U = 40$ km s$^{-1}$ and $c_{s,1}$ is the sound speed on Side 1. The Alfvén Mach number is $\Delta U / V_{A,1} = 2.52$, where $V_{A,1}$ is the Alfvén speed on Side 1. The numerical simulation is performed using a $L_x \times L_y = 8\pi \times 4\pi$ domain with $n_x \times n_y = 1024 \times 512$ resolution with periodic boundary conditions in the $X$-direction. For simplicity, equal viscosity and resistivity $\mu = \eta$ are used, i.e., the magnetic Prandtl number is set to unity. We solve the dimensionless form of the MHD equations by introducing several reference scales. The normalizations are $U_0 = 100$ km s$^{-1}$, $n_0 = 30$ cm$^{-3}$, $B_0 = 25$ nT, and $T_0 = 66$ eV. The simulation is 2-D as we ignore the invariant direction and only impose the magnetic field in the direction of the shear flow. We set up double shear layers in the simulation domain similar to those of \citet{Ruffolo2020}. The velocity and magnetic profiles are only set in the $X$-direction and both are colocated. The velocity profile is given by \begin{eqnarray} u_x = U_\alpha \left[ 1 - \tanh \left( \frac{y - L_y / 4}{d} \right) + \tanh \left( \frac{y - 3L_y / 4}{d} \right) \right] + U_\beta, \label{eq:Uy} \end{eqnarray} where $U_\alpha = \left( \frac{U_1 - U_2}{2} \right)$, $U_\beta = \left( \frac{U_1 + U_2}{2} \right) $, $U_1 = -0.15 U_0$, $U_2 = 0.25 U_0$, and $d = 0.003 L_y$ is the half thickness of the shear layer. The magnetic profile is given in a similar way as \begin{eqnarray} B_x = B_\alpha \left[ 1 - \tanh \left( \frac{y - L_y / 4}{d} \right) + \tanh \left( \frac{y - 3L_y / 4}{d} \right) \right] + B_\beta, \label{eq:By} \end{eqnarray} where $B_\alpha = \left( \frac{B_1 - B_2}{2} \right)$, $B_\beta = \left( \frac{B_1 + B_2}{2} \right) $, $B_1 = 0.16 B_0$, and $B_2 = 0.0$. The density is set with $\rho_1 = \rho_0$ and $\rho_2 = 0.73 \rho_0$ in normalized units. The initial temperature profile is set such that the total (magnetic plus thermal) pressure is balanced across the shear layer, where $T_1 = 0.02 T_0$ and $T_2 = 0.055 T_0$. Finally, the background shear is initially perturbed by adding a small compressive velocity field in the $Y$-direction in the form \begin{eqnarray} d u_y = \delta u_0 \left[ e^{\left( \frac{y - L_y/4}{4d} \right)^2} - e^{- \left( \frac{y - 3L_y/4}{4d} \right)^2} \right] \text{ran}(x) \nonumber \end{eqnarray} where $\delta u_0 = 0.008 (U_2 - U_1)$ (i.e., less than $10\%$ of the shear flow magnitude) and $\text{ran}(x)$ represents a random number generator in the range [-0.5, 0.5] at each grid value. Fig.~\ref{fig:KHsim} shows a snapshot of the simulation at $\sim 13$ large-eddy turnover time for one of the shear layers (the two shear layer develop similar KHI structures). The color represents the flow vorticity ($\omega$) in the out-of-plane direction. The KH waves are seen to develop in the simulation. They quickly reach the non-linear stage where rolled-up KH vortices clearly form (from $\sim 6$ large-eddy turnover times onwards) with visible vortex merging. This confirms that the solar wind observations by SolO are consistent with the KHI growth. In the lower part of the simulation (Side 1), there are features seen as stripes in vorticity. These features are shocks that are produced by the supersonic flow on Side 1 (Mach number $\sim 3$) as the speed difference between the recirculating vortex and the nearby passing flow exceeds the sound speed \citep[e.g.,][]{1987flme.book.....L}. Future work ought to determine whether such features are sometimes observed in spacecraft data. For the present work, the key point would remain that the KHI does develop. \subsection{Boundary layer analysis} \label{subsec:boundary-analysis} \begin{figure}[ht] \centering \includegraphics[width=3.5in]{fig_KH_BVperp_sketch.pdf} \caption{SolO observations on July 23, 2020 with marked outbound and inbound crossings (i.e., wave edges) of the in-situ KH waves and a schematic sketch of the event. (a) Magnetic fields. (b, c) Magnetic field fluctuations from the averages in the $R-T$ and $R-N$ planes, respectively. (d) Ion bulk velocity $V_R$ component. (e) Ion bulk velocity $V_T$ and $V_N$ components. (f, g) Velocity field perturbations in the $R-T$ and $R-N$ planes, respectively. Cyan dashed lines mark times of the outbound crossings, which correspond to KH trailing edges. Magenta dashed lines mark times of the inbound crossings, which correspond to KH leading edges. Normal directions of the inbound and outbound crossings are listed in Table~\ref{table:normal}. (h) Schematic sketch of the KH waves based on the normal angle (red arrows) at the wave edges. } \label{fig:edges} \end{figure} To understand local configurations of the KH waves, we characterize orientations of the observed wave edges in the RTN coordinates. In Fig.~\ref{fig:KH}, the magnetic rotations are clearly defined for wave edges (2), (3), and (4). Fig.~\ref{fig:edges} shows $\mathbf{B}$ and $\mathbf{V}$ and their fluctuations from the average values between 20:35 and 21:20 UT. Wave edges (2) - (3), defined by clear rotations of $\mathbf{B}$ in Fig.~\ref{fig:edges}a and $\mathbf{V}$ in Figs.~\ref{fig:edges}d and \ref{fig:edges}e, are marked by cyan vertical dashed lines. We define these sharp rotations as the ``outbound crossings", which correspond to crossings of KH wave trailing edges that separate adjacent vortices. A KH trailing edge is typically thin, seen as a sharp transition, as a consequence of the compression between two waveforms or vortices. Smaller magnetic field rotations are also visible between these outbound crossings. We mark these smaller rotations as (2'), (3') , and (4') with magenta vertical dashed lines in Fig.~\ref{fig:edges}. These edges show reverse transitions compared to the outbound crossings in $B_R$ (red) and $B_N$ (blue) components. We define these smaller transitions as ``inbound crossings'', which correspond to crossings of KH wave leading edges. A KH leading edge is typically less sharply defined in in-situ data as it is in the vicinity of KH vortices that are regions of plasma mixing, so the transitions between two regions of the shear layer are less clear \citep[e.g.,][]{1993GeoRL..20.2699C, Fairfield2000a}. To analyze the orientations of the wave edges, we calculate the boundary normals of the inbound and outbound pairs marked in Fig.~\ref{fig:edges}. The normal of a discontinuity (i.e., current sheet) can be obtained from the cross-product of magnetic fields on either side of the discontinuity, i.e., $\mathbf{n} = \pm (\langle \mathbf{B}_1 \rangle \times \langle \mathbf{B}_2 \rangle) / |\langle \mathbf{B}_1 \rangle \times \langle \mathbf{B}_2 \rangle |$, where $\langle \mathbf{B}_1 \rangle$ and $\langle \mathbf{B}_2 \rangle$ are time averages of asymptotic magnetic fields before and after the current sheet interval, respectively. The obtained normal direction has a sign ambiguity ($\pm$); we assign a direction outward from the Sun, i.e., by forcing the radial component of $\mathbf{n}$ to be positive. The time-averaged $\langle \mathbf{B}_i \rangle$, where $i = 1,2$, are defined as $10$-s averages of the magnetic fields. We obtain the normal orientations ($\mathbf{n} = [n_R, n_T, n_N]$) of the marked inbound and outbound crossings in Fig.~\ref{fig:edges}. In addition, we define an angle $\phi = \arctan(-n_T/n_R) $ to be the angle of the current sheet normal from the $R$ direction in the $RTN$ coordinate system. The angle $\phi$ is in range $[-90^o, 90^o]$ where $\phi = 0^o$ is parallel to the Sun-SolO line and $\phi = -90^o$ and $90^0$ are perpendicular to the Sun-SolO line in the $T$ and $-T$ directions, respectively. \begin{table} \caption{Normal directions and orientations of the inbound (leading edge) and outbound (trailing edge) crossings with their normal directions ($\mathbf{n}$) and associated angle $\phi = \arctan(- n_T / n_R)$.} \label{table:normal} \centering \begin{tabular}{l c c c} \hline\hline Wave edges & Times (UT) & Normal direction & Angle $\phi$ \\ \hline Inbound (2') & 20:49:20 & [0.64, -0.57, -0.51] & $41.7^o$ \\ Outbound (2) & 20:53:43 & [0.78, -0.56, -0.28] & $35.7^o$ \\ \hline Inbound (3') & 20:58:08 & [0.71, -0.63, -0.31] & $41.5^o$ \\ Outbound (3) & 21:02:11 & [0.91, -0.36, -0.21] & $21.6^o$ \\ \hline Inbound (4') & 21:06:50 & [0.70, -0.68, 0.2] & $44.2^o$ \\ Outbound (4) & 21:09:56 & [0.58, -0.67, 0.45] & $49.1^o$ \\ \hline\hline \end{tabular} \end{table} Table~\ref{table:normal} notes times of the inbound and outbound pairs, their normal directions ($\mathbf{n}$), and the normal angle $\phi$. The normal directions for all inbound and outbound crossings are in between the $R$ and $-T$ directions; these translate to the normal angles between $0^o$ and $90^o$. The normal angles ($\phi$) of an inbound-outbound pair were used to characterize in-situ waves at the Earth's magnetopause by \citep{Plaschke2016a}. By considering the angles of an inbound and outbound pair, we can determine whether the in-situ waveform is consistent with a sinusoidal wave, a KH wave, or another type of wave. Of particular relevance is that, when the waveform is a KH vortex (i.e., a rolled-up KH wave), the angles of the inbound and outbound pair should be in the same range (cf. Fig.~1 of \citet{Plaschke2016a}). The observed angles of all the inbound-outbound pairs in Table~\ref{table:normal} are well consistent with the steepening of KH vortices. This result supports the argument that the KHI is developed at the shear layer. We sketch the wave trains based on the normal angles with a hypothetical relative SolO trajectory in Fig.~\ref{fig:edges}h. Note that, in reality, the spacecraft is relatively static as the structures flow past with the solar wind. To further see the vortex-type variations in $\mathbf{B}$ and $\mathbf{V}$, we define their fluctuation vectors from the averages ($\delta \mathbf{B}$ and $\delta \mathbf{V}$) between 20:35 and 21:20 UT. Figs.~\ref{fig:edges}b and ~\ref{fig:edges}c show $\delta \mathbf{B}$ in the $R-T$ and $R-N$ planes, respectively. Around the inbound crossing (3'), $\delta \mathbf{B}$ in the $R-N$ plane rotates smoothly in a clockwise sense. This pattern is also observed at other inbound crossings, although it is less pronounced. Figs.~\ref{fig:edges}f and ~\ref{fig:edges}g show $\delta \mathbf{V}$ in the $R-T$ and $R-N$ planes, respectively. A clockwise pattern is also visible between (2) and (3') in Fig.~\ref{fig:edges}f. This pattern of rotation seen in both $\delta \mathbf{B}$ and $\delta \mathbf{V}$ is consistent with a vortical structure (i.e., a rolled-up KH vortex). The pattern is not as obvious at other inbound crossings; this may indicate that SolO does not pass centrally through the KH vortices in these cases. \subsection{Magnetic spectra} \label{subsec:turbulence} We now examine turbulence properties of the KH event. Fig.~\ref{fig:KH-turbulence-overview} shows the KHI interval with KH sub-regions V1 to V6 highlighted with colors (middle) together with time periods before and after the KH interval (see top). Fig.~\ref{fig:KH-turbulence-overview}h shows a spectrogram of magnetic spectrum. The magnetic spectrum shows enhancement within the KH region compared to before or after the interval. The enhancement is visually strongest in V2 compared with other vortices. This V2 is the same interval as between (2) and (3') in Fig.~\ref{fig:edges} where we see a clear clockwise rotation in the magnetic field and velocity field perturbations consistent with a rolled-up KH vortex. Thus, the strong enhancement in magnetic wave power provides evidence of enhanced activity in this vortex as plausibly facilitated by the development of a nonlinear KH vortex. The enhancement of the magnetic spectrum in V4 is also strong but less than for V2. \begin{figure} \centering \includegraphics[width=3.5in]{SolO_KHturbulence_overview_annotate.png} \caption{Overview of the intervals for magnetic spectrum analysis. The KH region is marked in the middle (see top) together with the intervals before (top left) and after (top right). The KH vortices V1 to V6, marked between the compressed current sheets, are shaded in colors. (a) Total magnetic field. (b) Magnetic field in the RTN system. (c, d, e) Velocity field $R$, $T$, and $N$ components, respectively. (f) Ion number density. (g) Ion temperature. (h) Magnetic spectrum. } \label{fig:KH-turbulence-overview} \end{figure} \begin{figure} \centering \includegraphics[width=3.5in]{SolO_KHturbulence_spectra_fft_v2.pdf} \caption{Magnetic spectra of all regions marked in Fig.~\ref{fig:KH-turbulence-overview}. The Kolmogorov power law $k^{-5/3}$ and the dissipation range scalings $k^{-2.8}$ are plotted for reference as straight black dashed lines. The vortex size is noted by an arrow (top left). The ion gyroradius scale ($\rho_p$) and the ion inertial length ($d_p$) are marked by vertical black solid and dashed lines, respectively. } \label{fig:KH-spectra} \end{figure} To quantitatively assess the magnetic field fluctuations in the full KHI region and in each of the six sub-regions V1-V6 marked in Fig.~\ref{fig:KH-turbulence-overview}, we computed magnetic field spectra, which are shown in Fig.~\ref{fig:KH-spectra}. Additionally, the KH-stable regions immediately before and after the KHI event are shown for reference. The vortex size is marked by an arrow (top left). The spectrum for the full KH region is shown in black while the spectra of the intervals before and after are shown in grey. As references, power law scalings of $k^{-5/3}$ \citep{Kolmogorov1941} at MHD scales and $k^{-2.8}$ at ion scales \citep[i.e.,][]{2009PhRvL.103p5003A} are plotted as black dashed lines. The scale of a thermal ion gyroradius ($\rho_p$) and an ion inertial length ($d_p$) based on the average properties in the KH region are marked with vertical solid and dashed black lines, respectively. The spectrum of the entire KH interval has more power than the intervals before and after, which both have similar low-intensity spectra. This suggests that the KHI is exciting additional fluctuations. The magnetic spectrum of the KH region approximately follows both power laws with a spectral breakpoint at $f \sim 0.2$ Hz. The spectrum essentially follows the power law $k^{-2.8}$ for scales smaller than the ion gyroradius. This indicates that the magnetic spectrum of the KHI interval is consistent with a classic turbulence cascade down to the kinetic scales \citep[e.g.,][]{2014ApJ...793L..15B, 2017MNRAS.472.1052B}. This result provides evidence of shear-driven turbulence as driven by the local KHI. Fig.~\ref{fig:KH-spectra} also shows magnetic spectra for individual vortices V1 - V6. Note that the compressed current sheets are excluded for the analyses of these vortices (this is why the colored regions are not exactly contiguous on Fig.~\ref{fig:KH-turbulence-overview}). The powers of the magnetic spectra of all vortices are weaker than that of the entire KH region, indicating that the current sheets are key regions for enhancing the power spectrum. V2 (blue) and V4 (green) appear to have higher powers compared to other vortices and almost reach the power of the entire KH region (black). The enhanced power in these vortices may be related to the excitation of turbulent fluctuations through secondary instabilities and the nonlinear evolution of the KHI. The difference in the power spectrum between the different vortices may indicate that SolO was crossing different parts of KH vortices while crossing through the shear layer from Side 1 to Side 2. It is likely that SolO was passing through the center of a rolled-up vortex in V2, for reasons noted earlier. The lower powers of V1, V5, and V6 may indicate that SolO was skimming through the trough or crest parts of KH vortices. These results are in agreement with the assumed spacecraft trajectory through the KHI structure using the boundary layer analysis in Section~\ref{subsec:boundary-analysis}. \section{Discussion} \label{sec:discussion} We have reported observations of the KHI within a shear layer embedded in the slow solar wind close to an HCS using Solar Orbiter. The event is observed in the inner heliosphere at a distance of $\sim 0.69$ AU. Despite several theoretical postulations \citep[e.g.,][]{Parker1963, Sturrock1966, Miura1982, Korzhov1984, Neugebauer1986, Hollweg1987} and spacecraft missions in the inner heliosphere, direct evidences for the KHI were not reported in past in-situ observations of the solar wind. We discuss why this event may be favorable for a KHI detection as well as implications of the KHI in the solar wind as follows. \subsection{KHI criterion in the solar wind} \label{diss:KHI-onset} First, we consider solar wind conditions that are favorable for the KHI. Based on the KHI onset condition (Eq.~\ref{eq:onset}), the shear layer can more easily become unstable to the KHI when $B$ is low and $n$ is high because it requires a velocity jump across the shear layer greater than the local Alfvén speed ($\Delta V > V_A$). Near the Sun, $B$ and $V_A$ are typically large. This inhibitory effect on the KHI criterion should be stronger near the Sun. Nevertheless, there may be several situations where the local conditions allow the KHI. For example, remote sensing by \citet{2018ApJ...862...18D} show a particularly strong shear values of a $\Delta V_R \sim 200$ km s$^{-1}$ across streamer structures in the young solar wind. \citet{Ruffolo2020} also propose the KHI development near the Alfvén critical zone, at $R < 0.17$ AU. The event we analyze here was observed near the HCS with many coherent structures and shears. Besides, this event is found in the slow wind, which is generally dense, making the conditions to meet the KHI criterion easier. Second, we consider the magnetic and velocity field configurations across shear layers. The KHI is suppressed when $\mathbf{B}$ is strong in the direction of $\Delta \mathbf{V}$ due to the stabilization by magnetic tension in the direction of the shear flow. In this interplanetary medium, we typically expect a shear interface along the Parker spiral direction (see Fig.~\ref{fig:sketch}) so $\mathbf{B}$ may usually be aligned with $\Delta \mathbf{V}$. However, near the Sun, there may be velocity shear due to the solar-wind corotation with the Sun. Several studies have shown that the KHI may occur in various situations, i.e., at the edge of a CME \citep[e.g.,][]{Foullon2013, Mostl2013} and at the interfaces between CME and sheath and between sheath and solar wind \citep[e.g.,][]{Paez2017}. Third, Eq.~\ref{eq:onset} is derived by assuming an ideal MHD plasma with an infinitely thin shear layer. In reality, non-ideal MHD effects such as the compressibility can stabilize the KHI \citep[e.g.,][]{Sen1964}; for example, the KHI only grows for a limited range of the velocity jump across a shear flow for a 1-D TD in homogeneous plasmas and magnetic fields \citep[e.g.,][]{Talwar1964, Pu1983}. The solar wind is indeed compressible and thus we expect some stabilizing effects. In addition, shear layers have finite thicknesses. A finite thickness of the shear layer can also stabilize the KH mode for small wavelength perturbations (i.e., for large wave number $k$). A combination of the compressibility and the finite thickness can stabilize the KHI such that only certain modes of $k \Delta L$, where $\Delta L$ is the shear layer thickness, are KHI unstable \citep{1982JGR....87.7431M}. Although these two factors can impact the shear-layer stability, we do not expect their effects to be large, nor to be specifically dependent on distance from the Sun. To summarize, there are factors that can impact the KHI development in the solar wind. The magnitude of $B$ and $V_A$ depend on distance from the Sun. As $V_A$ is higher closer to the Sun, the KHI criterion should be more difficult to satisfy, except where the shear $\Delta V$ is particularly strong. Often $\mathbf{B}$ may be parallel to the velocity shear, tending to inhibit the KHI, except in some circumstances, e.g., when there is a CME that changes the local conditions. Compressibility of the solar wind and a finite thickness of the shear region can help stabilize the KHI. Since the observed conditions during our event are not particularly unusual for dense solar wind near the HCS, KHI development should not be rare. We now consider arguments related to KHI timescale and configuration as follows. \subsection{KHI timescale} A first fact to consider now is that when the KHI develops at a shear layer, it quickly reaches the non-linear stage (i.e., the rolled-up stage). The periodic features and vortical structures then get rapidly destroyed as the plasmas from either side of the shear layer mix and vortices coalesce. At such late stage, they would be indistinguishable from other solar wind types, albeit likely associated with higher levels of fluctuations as we have actually found in Section~\ref{subsec:turbulence} for this event. The timescale for the decay of a KH vortex is on the order of one to a few eddy turnover time. The eddy turnover time of a KH vortex scales as a fraction of the KH wavelength ($\lambda_{KH}$) divided by the KH wave phase speed ($V_{ph}$). Assuming that the KH vortex size is about $\lambda_{KH}/3$ to $\lambda_{KH}/2$ ($22,000$ to $33,000$ km) for the fastest growing mode \citep[i.e.,][]{Walker1981, Miura1982}, with the $V_{ph} = 152$ km s$^{-1}$ (see Section~\ref{subsec:linear-theory}), we obtain a KH vortex turnover time of $2.4$ to $3.6$ minutes. Since the conditions of our event are not unusual for dense solar wind near the HCS, this short timescale for turnover time (before the vortex decay) may contribute to the rarity of KHI detection. \begin{figure} \centering \includegraphics[width=3.5in]{fig_KH-draw-solo_AA.pdf} \caption{(top) Schematic illustrations of scenarios for which the KHI develops (a) near SolO position and (b) at $1$ AU, shown in the ecliptic plane with the Parker spirals shown with orange solid lines (similar to Fig.~\ref{fig:SOpos}). At (a), we project the derived $X-Y$ plane onto the $R-T$ plan as described in the text. The main flow is radially outward from the Sun as marked with vectors $\vec{r_a}$ and $\vec{r_b}$. As the Parker spiral becomes more bent at (b), the spacecraft relative spacecraft trajectory is more perpendicular to the shear interface, making the likelihood of crossing several vortices much lower than in the inner heliosphere at (a). (bottom, c) A simplistic 3-D view of the KHI in (a) with the out-of-plane ($Z$) magnetic field shown with arrows on Sides 1 and 2, with corresponding values in Fig.~\ref{fig:MVA-box}e. } \label{fig:sketch} \end{figure} It is also possible that KH waves were detected by past missions but their signatures were not resolved. Several periodic oscillations in magnetic field strength were observed by \cite{Burlaga1968} using the Pioneer-6 spacecraft, launched in 1965, at $\sim 0.8$ AU. One of the cases considered was found to have sinusoidal $|\mathbf{B}|$ oscillations with a period of $\sim 5$ minutes, embedded in a velocity shear layer. Although no other fluctuations were seen in the data, it was suggested that these waves were generated by a KHI. \subsection{KHI configuration} When TDs form in the solar wind, they are typically at the boundary between solar wind flux tubes that move with relative velocity. Since the solar wind flux tubes bend following Parker spiral arcs to first order, we expect the normal of shear interfaces to be generally perpendicular to the Parker's spiral. Fig.~\ref{fig:sketch} shows a schematic illustration of expected KHI configurations with respect to the solar wind Parker spiral in the ecliptic plane, produced using a constant velocity of $300$ km s$^{-1}$ close to the observed speed. We illustrate two scenarios of the KHI configuration (a) in the interplanetary medium between $0.3$ and $0.7$ AU and (b) near $1$ AU. We describe a scenario for which the KHI develops relative to the Parker spiral based on our data as follows. For our event at $\sim 0.7$ AU depicted at (a), we found that the velocity jumps for a displacement is in the direction $Y = [0.53, 0.79, -0.32]_{RTN}$ (the maximum variance direction of $\mathbf{V}$). This direction is indeed perpendicular to the Parker spiral, which is rather oriented along what we call the $X$ direction, as shown at (a) (see frame definition in upper right part of the Fig.~\ref{fig:sketch}). The KH wave amplitude spreads in the Y direction as it is perpendicular to the shear interface. The wave propagation direction is $X = [0.84, -0.53, 0.07]_{RTN}$ (the intermediate variance direction of $\mathbf{V}$). We expect that the KHI configuration in the solar wind will often be similar to this geometry. As explained next, such a KHI configuration relative to a more slowly moving spacecraft in the inner heliosphere impacts the likelihood of in-situ observations of the KHI. We now consider two scenarios of KHI development (a) near SolO position at $\sim0.7$ AU and (b) near 1 AU in Fig.~\ref{fig:sketch}. As the main solar wind flow is in the radial direction, a static spacecraft at (a) would sample several vortices within the shear layer only if it has an appropriate relative trajectory through the layer. Note that SolO was relatively static (with a speed of $11$ km s$^{-1}$) compared to the KH wave phase speed ($152$ km s$^{-1}$). At a further distance from the Sun, i.e., near $1$ AU as shown in (b), the Parker's spiral becomes more bent. The shear interface thus becomes more tilted relative to the outward solar wind flow as compared to the geometry observed at locations in the inner heliosphere (as show in Fig.~\ref{fig:sketch}a). Consequently, a spacecraft located in the inner heliosphere has a relative trajectory that makes it more likely to sample several vortices than a spacecraft that is farther out in the heliosphere, and which will make a more perpendicular cut across the shear layer, as depicted in Fig.~\ref{fig:sketch}b. This may be a prime explanation as to why despite the many spacecraft near $1$ AU, there were no reports of in-situ KHI detection. Note that the above considerations are based on a simplistic 2-D view. In reality, 3-D effects such as out-of-ecliptic magnetic and velocity fields can significantly impact the KHI configuration and development with respect to the Parker spiral. For example, we show magnetic fields perpendicular to the shear plane in Fig.~\ref{fig:sketch}c and these are in fact required to avoid the alignment of the velocity and magnetic shear, which otherwise has a stabilizing effect on the KHI. We acknowledge that our considerations are to first order only; future work should address this in more detail. \subsection{Implications of the KHI in the solar wind} The KHI is expected to play important roles, such as allowing for plasma mixing, generating turbulence, or producing Alfvénic fluctuations in the solar wind as mediated by KH vortex dynamics. During the present event, SolO observed an ion jet consistent with magnetic reconnection (see Section~\ref{subsec:recon}). An interesting question is whether this reconnection is produced due to dynamics of a KH vortex. For vortex-induced reconnection (VIR), we expect reconnection to be produced at a thin current sheet in between two vortices. At the Earth's magnetopause, VIR jets were found to orient themselves along KH trailing edges \citep[e.g.,][]{Eriksson2016a} as the vortex evolves and further enhances the magnetic shear. In our case, we found that the jet is in the out-of-ecliptic direction while the KH trailing edges (see Table.~\ref{table:normal}) and the shear layer are in the $R, T$ directions. Thus, it is unclear whether the observed jet is a VIR. We think that the $N-$ directed jet is rather a consequence of the inclination of the local current sheet. Nevertheless, the KH vortex may further increase the magnetic shear at the KH edge and make the current sheet thin enough to trigger magnetic reconnection. We now discuss the magnetic and velocity field fluctuations. We found that the KHI enhances fluctuations compared to outside the interval and the magnetic spectrum of the KHI region approximately follows the power law scalings of $k^{-5/3}$ and $k^{-2.8}$ at inertial and kinetic scales, respectively (Section~\ref{subsec:turbulence}). These enhanced fluctuations are consistent with turbulence generation by the KHI at the magnetopause \citep[e.g.,][]{2016JGRA..12111021S, 2017NatCo...8.1582N}. Therefore, the magnetic spectrum is consistent with a classical turbulence cascade down to the kinetic scales. These observations are consistent with an enhancement of turbulence in the solar wind as driven by the local KHI \citep[e.g.,][]{1989GMS....54..113G}. We also note that current sheets are key structures that contribute to the power spectrum, as power spectra of only vortex regions are lower than the overall spectrum. In addition, several of the vortices have enhanced power within them, which may be due to secondary instabilities, perhaps supporting the idea that the KHI helps to drive some fraction of the turbulent fluctuations in the solar wind. One important implication of KHI in the solar wind is that it can contribute to the evolution of the magnetic and velocity fluctuations. Near the Sun, the KHI is believed to be a mechanism that leads to shear-driven turbulence at the Alfvén critical zone where $V = V_A$ and in the vicinity of the $\beta = 1$ surface \citep{DeForest2016, Chhiber2018}, leading to more isotropic solar-wind streams. Furthermore, the dynamical evolution invoked by shear-driven instabilities such as the KHI is found to be able to account for features observed by PSP including magnetic ``switchbacks'' near perihelia \citep{Ruffolo2020}. This topic needs to be investigated further but it is beyond the scope of the present study. \section{Conclusions} \label{sec:conclusions} We report observations of the KHI with SolO on July 23, 2020 at $0.69$ AU, during the cruise phase. The KH waves are observed within the velocity shear layer with periodic fluctuations in several parameters in the slow solar wind near an HCS. Several KH waveforms are observed with a period of $\sim 7$ minutes but only a few vortices are clearly noticed. One of them is found to have magnetic and velocity field perturbations consistent with a rolled-up KH vortex in the non-linear stage. We test the observed conditions on either side of the shear layer with linear theory and find that the shear layer is indeed KHI-unstable. The maximum variance direction of the shear flow, associated to the KH wave amplitude direction, is found in the direction approximately perpendicular to the Parker spiral. The intermediate variance direction of the shear flow, associated with the net flow and thus the direction of the KH wave propagation, is along the Parker spiral. Using linear theory, the wave phase speed is estimated to be $152$ km s$^{-1}$. The KH wavelength is approximately $66,400$ km or $0.1$ solar radii. We also comfirm the local KHI development by exploiting a 2-D MHD simulation with the empirical values. Additionally, we report the observation of an ion jet consistent with magnetic reconnection at one of the outbound (trailing) edges, likely as a result of current sheet compression in between two KH vortices. The ion jet has $\Delta V = 11$ km s$^{-1}$ along the maximum variance direction, consistent with magnetic reconnection with a sub-Alfvénic jet. Nevertheless, we found other signatures consistent with magnetic reconnection, namely a drop in magnetic field strength, an ion number density enhancement \citep{Gosling2005}, and plasma heating \citep{2014GeoRL..41.7002P}. It is unclear whether this jet is produced due to KH vortex-induced reconnection \citep[e.g.,][]{Nakamura2006} or the local inclination of the magnetic field, as the jet direction does not correspond to the KH trailing edge orientation \citep{Eriksson2016a}. We also report the enhancement of the magnetic and velocity field fluctuations within the KHI interval compared to intervals before and after. The power of the magnetic spectrum of the entire KHI interval approximately follows the power law scalings of $k^{-5.3}$ and $k^{-2.8}$ in the inertial and kinetic ranges, respectively, consistent with the turbulent cascade in the solar wind. This provides evidence for the local enhancement of turbulence as driven by the KHI. Moreover, we find that current sheets within the KHI interval are key structures that enhance the power, as the magnetic spectra of individual KH vortices (excluding compressed current sheet intervals) generally have less power. As our reported event here is an unambiguous in-situ observation of the KHI in the solar wind, we discuss possible reasons why the KHI was not reported in past in-situ observations. First, the KHI onset criterion requires a velocity jump across the shear layer that is larger than the local Alfvén speed ($\Delta V > V_A$) and weak magnetic field in the direction of the shear flow (i.e., low $\mathbf{B} \cdot \mathbf{V}$). Second, the KHI is estimated to quickly reaches the nonlinear stage where KH vortices roll up and merge. This timescale should be on the order of a few eddy turnover. The observed conditions are typical in the solar wind, and we estimate the timescale of the KHI to be on the order of minutes. In other words, when KHI develops in the solar wind, it evolves rapidly and is thus rather ephemeral. Third, the configuration in which the KHI develops may not be optimal for detection by a relatively slow-moving spacecraft near $1$ AU owing to the geometry of the Parker spiral. The KHI develops at discontinuities formed in between solar wind flux tubes that move with a relative velocity. In this picture, the KH wave amplitude should spread in a direction perpendicular to the Parker spiral, albeit often with significant north-south components as in our case. Owing to its more skimming trajectory, a spacecraft in the inner heliosphere such as SolO may more easily pick up several waveforms in the shear layer. Further from the Sun, in contrast, the Parker spiral becomes more bent. A spacecraft near $1$ AU is less likely to sample several vortices along its trajectory which has a larger angle to the discontinuity, making it difficult to recognize KH waves. We think these are main factors that contribute to the rarity of in-situ KHI detection in the solar wind. This event provides evidence for the existence of the KHI in the solar wind. It sheds new light on solar wind shear processes in the interplanetary medium with direct applications to shear-driven turbulence mediated by the KHI, likely contributing to the solar wind fluctuations observed at $1$ AU \citep[e.g.,][]{Ruffolo2020}. As the Alfvén speed decreases away from the Sun, the KH growth rate becomes higher \citep[e.g.,][]{Neugebauer1986} and thus the KHI may be more common. Due to the short timescale of the linear KHI, there may be more chances to detect nonlinear KHI or its remnants. Recently, techniques for detecting kinetic features of the KHI during the nonlinear and turbulent stage of the KHI were proposed \citep{2021arXiv210204117S}. Further studies would be needed to study secondary processes induced by the KHI such as vortex-induced reconnection and other kinetic mechanisms, as the KHI is rich with magnetic and plasma structures as is well known for the case of the magnetopause. \begin{acknowledgements} Work at IRAP was supported by the Centre National de la Recherche Scientifique (CNRS, France), the Centre National d’Etudes Spatiales (CNES, France), and the Université Paul Sabatier (UPS). Solar Orbiter data are publicly available at \url{http://soar.esac.esa.int/soar/}. We acknowledge science teams of the Connectivity Tool (\url{http://connect-tool.irap.omp.eu/}) and 3DView (\url{http://3dview.irap.omp.eu/}) at IRAP and CNES. Y. Y. is supported by grant No. 11902138 from the National Natural Science Foundation of China. The computing resources were provided by the Center for Computational Science and Engineering of Southern University of Science and Technology. D.R. is supported by grant RTA6280002 from Thailand Science Research and Innovation. J.E.S is supported by the Royal Society University Research Fellowship URF$\backslash$R1$\backslash$201286. C.J.O. is funded under STFC grant number ST/5000240/1. Solar Orbiter Solar Wind Analyser (SWA) data are derived from scientific sensors which have been designed and created, and are operated under funding provided in numerous contracts from the UK Space Agency (UKSA), the UK Science and Technology Facilities Council (STFC), the Agenzia Spaziale Italiana (ASI), the CNES, the CNRS, the Czech contribution to the ESA PRODEX programme and NASA. Solar Orbiter SWA work at UCL/MSSL is currently funded under STFC grants ST/T001356/1 and ST/S000240/1. \end{acknowledgements} \bibliographystyle{aa}
\section{Introduction} All groups in this paper are finite. Given a nonabelian group $G$, the \textit{commuting graph} of $G$ is the graph whose vertex set is $G\setminus\centerof{G}$, the set of non-central elements of $G$, and there is an edge between distinct vertices $x$ and $y$ when $xy=yx$. We denote this graph by $\Gamma(G)$. A related graph, denoted by $\Delta(G)$, takes $G^{\#}=G\setminus\id$ as its vertex set, and there is an edge between distinct vertices $x$ and $y$ when $\langle x,y\rangle$ is cyclic. We call this the \textit{cyclic graph} of $G$. The cyclic graph of a group has also appeared in the literature under name \textit{punctured enhanced power graph}. The commuting graph has been studied in many papers; more than we want to cite here. For our purposes, \cite{parker} is the most relevant. We believe the cyclic graph was first studied in \cite{imperatore}. As we have said, it is closely related to the enhanced power graph which was introduced in \cite{cameron} and studied in \cite{bera} among others. The work in this paper arose in conjunction with the work done on the cyclic graph in \cite{directprod} and \cite{zgroup}. Our primary focus is the cyclic graphs of $2$-Frobenius groups. A group $G$ is a \textit{$2$-Frobenius group} if it has normal subgroups $K$ and $L$ such that $L$ is a Frobenius group with Frobenius kernel $K$ and $G/K$ is a Frobenius group with Frobenius kernel $L/K$. The best known example of a $2$-Frobenius group is $S_{4}$, and in Section \ref{last sec}, we will present a number of other examples of $2$-Frobenius groups. When $G$ is a $2$-Frobenius group, $\centerof{G}=\id$, and so, $\Delta(G)$ is a spanning subgraph of $\Gamma(G)$. Parker in \cite{parker} shows that $\Gamma(G)$ is disconnected when $G$ is a Frobenius or a $2$-Frobenius group, and so $\Delta(G)$ is disconnected. In fact, Parker proves that the only solvable groups $G$ with trivial center that have $\Gamma (G)$ disconnected are Frobenius and $2$-Frobenius groups. We demonstrate easily that the number of connected components for $\Gamma(G)$ and $\Delta(G)$ are the same when $G$ is a Frobenius group. Also, it is not difficult to compute the number of connected components of $\Gamma(G)$ when $G$ is a $2$-Frobenius group. However, counting the number of connected components of $\Delta (G)$ is more complicated when $G$ is $2$-Frobenius group, and this is the main goal of this paper. We split this count into three different cases. The first case is when $K$ does not have prime power order, the second case is $K$ and $G/L$ are $p$-groups for some prime $p$, and the third case is when $K$ is a $p$-group for some prime $p$ and $G/L$ is not a $p$-group. We will see when $K$ does not have prime power order that the number of connected components for $\Delta(G)$ is the same as for $\Gamma(G)$, but in the other two cases, the count for the number of connected components of $\Delta(G)$ will differ from the count for $\Gamma(G)$. We first have the formula when $K$ does not have prime power order. \begin{main} \label{main1} Let $G$ be a $2$-Frobenius group with $K$ as in the definition. If $|K|$ is divisible by at least two distinct prime numbers, then $\Delta(G)$ has $|K|+1$ connected components. \end{main} In the remaining two cases, $K$ is a group of prime power order. We see that the counts in these situations are more complicated. We write $m_{p}(G)$ to denote the number of subgroups of order $p$ of $G$. Next, we find the formula for the case that $K$ and $G/L$ are $p$-groups for some prime $p$. \begin{main} \label{main2} Let $G$ be a $2$-Frobenius group, and assume that $K$ and $G/L$ are $p$-groups for some prime $p$, where $K$ and $L$ are as in the definition. Then $\Delta(G)$ has $|K|+m_{p}(G)$ connected components. \end{main} Finally, we compute the formula when $K$ is a $p$-group and $G/L$ is not a $p$-group for some prime $p$. \begin{main} \label{main3} Let $G$ be a $2$-Frobenius group, and let $p$ be a prime number. Assume that $K$ is a $p$-group for some prime $p$ and that $G/L$ is not a $p$-group, where $K$ and $L$ are as in the definition. Then the number of connected components of $\Delta(G)$ is $$|K|+|L:K|+m_{p}^{\ast},$$ where $m_{p}^{\ast}$ is the number of subgroups of order $p$ in $G$ that are not centralized by an element of prime order other than $p$. \end{main} In the final section, we compute the number of connected components of $\Delta(G)$ for several different $2$-Frobenius groups $G$. Portions of this paper appear as a part of the first author’s dissertation under the direction of the second author at Kent State University. Some of this research was conducted during the summer 2019 REU at Kent State University with the funding of NSF Grant DMS-1653002. We thank the NSF and Profs. Soprunova and Chebotar for their support. We also thank Stefano Schmidt, Eyob Tsegaye, and Gabe Udell for several discussions. \section{Structural properties of $2$-Frobenius groups} We start by fixing some notation. Let $G$ be a group, and fix elements $x,y\in G$. When the subgroup $\langle x,y\rangle$ is cyclic, we write $x\approx y$. Note that $x \approx y$ indicates that either $x$ and $y$ are adjacent in the cyclic graph of $G$ or $x=y$. Similarly, when $xy=yx$, we write $x\sim y$, and this indicates either $x$ and $y$ are adjacent in the commuting graph or $x=y$. In the literature, results concerning the structure of a $2$-Frobenius group are often merely mentioned or used implicitly. As such, we feel that it is appropriate to write a brief section that gathers up some of these structural properties, along with the easy proofs. These results are known in the folklore and are not original to us. When $G$ is a $2$-Frobenius group, we use $K$ and $L$ to denote the subgroups that are defined in the definition. We write $H$ for a Frobenius complement for $L$, we set $N=\normalizer{G}{H}$, and we take to $D$ to denote a subgroup of $G$ such that $D/K$ is a Frobenius complement for $G/K$. When $G$ is a $2$-Frobenius group, we chose $H$ to be a Frobenius complement for the normal subgroup $L$, but we now show that $H$ is also a Frobenius kernel of its normalizer. \begin{lem} If $G$ is a $2$-Frobenius group, then $N$ is a Frobenius group with Frobenius kernel $H$. \end{lem} \begin{proof} By a Frattini Argument, $G=KN$. We have $G/K\cong N$ as $K\cap N=\normalizer{K}{H}=\id$, and so $N$ is a Frobenius group. The Frobenius kernel of $N$ has order $|L:K|=|H|$. Since $H$ is normal in $N$, the Frobenius kernel of $N$ must be $H$ by Theorem 12.6.8 in \cite{wrscott}. \end{proof} It follows that $H$ is simultaneously a Frobenius kernel and a Frobenius complement. We now show that its structure is quite limited. \begin{lem}\label{Hcyclic} If $G$ is a $2$-Frobenius group, then $H$ is cyclic of odd order. \end{lem} \begin{proof} Seeking a contradiction, we assume $|H|$ is even. As $H$ is a Frobenius complement, it has a unique involution; call it $z$. Note that $o(z)=o(z\sigma)$ for every $\sigma\in\textnormal{Aut}(H)$. Hence $z=z\sigma$, and so $z\in\textnormal{Fix}_{H^{\#}}(\textnormal{Aut}(H))$. In particular, $H$ does \textit{not} admit a fixed-point-free automorphism. But $H$ is also a Frobenius kernel. These conditions are not compatible; thus $|H|$ must be odd. As $H$ is a Frobenius kernel, $H$ is nilpotent and every Sylow subgroup of $H$ is normal in $H$. As $H$ is a Frobenius complement of odd order, the Sylow subgroups of $H$ are cyclic. Thus $H$ is cyclic. \end{proof} The structure of a Frobenius complement for $N$ is also easily determined. \begin{lem}\label{normalizerDHcyclic} If $G$ is a $2$-Frobenius group, then $\normalizer{D}{H}$ is cyclic. \end{lem} \begin{proof} Note that $G=HD$, and so $N=N\cap HD=H(N\cap D)=H\normalizer{D}{H}$, by Dedekind's Lemma. As $H\cap\normalizer{D}{H}=\id$, the subgroup $\normalizer{D}{H}$ is a Frobenius complement for $N$. Observe that $\centralizer{D}{H}=\id$. Thus $\normalizer{D}{H}$ embeds in $\textnormal{Aut}(H)$. By Lemma \ref{Hcyclic}, $\textnormal{Aut}(H)$ is abelian. Hence $\normalizer{D}{H}$ is an abelian Frobenius complement, which yields the conclusion. \end{proof} Next, we obtain a factorization of the subgroup $D$. \begin{lem}\label{factorizationofD} If $G$ is a $2$-Frobenius group, then $D=K\normalizer{D}{H}$. \end{lem} \begin{proof} Simply observe that $D=D\cap G=D\cap KN=K(D\cap N)=K\normalizer{D}{H}$ by Dedekind's Lemma. \end{proof} It is now easy to see that $D$ is a Hall subgroup of $G$. \begin{lem}\label{DisHall} If $G$ is a $2$-Frobenius group, then $D$ is a Hall subgroup of $G$. \end{lem} \begin{proof} Notice that $|G:D|=|H|$. Using Lemma \ref{factorizationofD}, $|D|=|K||\normalizer{D}{H}|$. The result follows. \end{proof} \section{Preliminaries} In this section, we include some specific results concerning the cyclic graph of a group. We begin with two results that appeared in \cite{directprod}. The first is a basic fact about the cyclic graph of a $p$-group that is used in the proof of Theorem \ref{Dpgroup}. The proof of this lemma is easy and can be found as Lemma 2.3 of \cite{directprod}. \begin{lem}\label{cyclicgraphofapgroup} If $G$ is a $p$-group for some prime number $p$, then $\Delta(G)$ has $m_{p}(G)$ connected components. \end{lem} If $G$ is a group and $x,y\in G^{\#}$, then a sufficient condition for $x$ and $y$ to be adajcent in $\Delta(G)$ is that $x$ and $y$ have coprime orders and commute. The following lemma is a consequence of this fact. Again, the proof of this lemma is easy and can be found as Corollary 4.2 in \cite{directprod}. \begin{lem}\label{nilpotentnotapgroup} If $G$ is a nilpotent group such that $|G|$ is divisible by at least two distinct primes, then $\Delta(G)$ is connected. \end{lem} The following technical lemma will be used in the proof of Theorem \ref{completecount}. \begin{lem}\label{pgroupcentralizer} Let $G$ be a group, and let $a\in G$ with $o(a)=p$, where $p$ is a prime number. Let $\Xi$ be the connected component of $\Delta(G)$ that contains $a$. If $\centralizer{G}{a}$ is a $p$-group, then $a\approx b$ for each $b\in\Xi\setminus\{a\}$. In particular, the only elements of order $p$ connected to $a$ belong to the set $\langle a\rangle\setminus\id$. \end{lem} \begin{proof} Suppose that the result is false. Thus, there exist elements in $\Xi$ that are \textit{not} adjacent to $a$. In particular, there must exist a vertex $c\in\Xi$ with $d(a,c)=2$. Let $a\approx b\approx c$ be a path of length $2$. Since $b\in\centralizer{G}{a}$, we see that $b$ is a $p$-element. Hence $|\langle b^{t}\rangle|=p$ for some integer $t$. The subgroup $\langle a,b\rangle$ is cyclic and, therefore, has a unique subgroup of order $p$, forcing $\langle a\rangle=\langle b^{t}\rangle$. Now, $a$ is a power of $b$, and so $$\langle a,c\rangle\le\langle b,c\rangle,$$ which yields that $a\approx c$, a contradiction. Finally, let $b\in\Xi$ with $o(b)=p$. Then $b\approx a$, and so $\langle a,b\rangle$ has a unique subgroup of order $p$. Hence $\langle a\rangle=\langle b\rangle$, and it follows that $b\in\langle a\rangle\setminus\id$. \end{proof} We now record a basic fact about Frobenius groups, which is a consequence of Theorem 4.1.8 in \cite{kurz}. We will use this fact in Theorem \ref{completecount}. \begin{lem}\label{frobcompcontain} Let $G$ be a Frobenius group with Frobenius kernel $K$ and Frobenius complement $H$. If $U\le G$ with $U\cap K=\id$, then $U\le H^{g}$ for some $g\in G$. \end{lem} At this point, we are able to count the number of connected components of $\Delta(G)$ for a Frobenius group $G$. \begin{thrm}\label{Frob grp} Let $G$ be a Frobenius group with Frobenius kernel $K$. If $K$ is a $p$-group for some prime number $p$, then $\Delta(G)$ has $|K|+m_{p}(K)$ connected components. If $K$ is not a group of prime power order, then $\Delta(G)$ has $|K|+1$ connected components. \end{thrm} \begin{proof}[Sketch of proof] Let $H$ be a Frobenius complement of $G$. Each conjugate of $H^{\#}$ constitutes a connected component of $\Delta(G)$, and there are $|K|$ such conjugates. Since $$K^{\#}=G\setminus\bigcup_{g\in G}H^{g},$$ the conclusion follows from the nilpotency of $K$, Lemma \ref{cyclicgraphofapgroup}, and Lemma \ref{nilpotentnotapgroup}. \end{proof} We next present a few basic facts about $2$-Frobenius groups. We first show that the elements adjacent in $\Delta (G)$ to elements in $D \setminus K$ must lie in $D$. \begin{lem}\label{swimmingintoD} If $G$ is a $2$-Frobenius group and $g\in G^{\#}$ with $g\approx d$ for some $d\in D\setminus K$, then $g\in D$. \end{lem} \begin{proof} Since $Kd\in (D/K)^{\#}$, $Kg\in\centralizer{G/K}{Kd}\le D/K$. Hence $g\in D$. \end{proof} Recall that $H$ is a Frobenius complement of $L$. Similar to the Frobenius group case, we see that the elements in $H^\#$ make up a connected component of $\Delta (G)$ when $G$ is a $2$-Frobenius group. \begin{lem}\label{Hconnected} If $G$ is a $2$-Frobenius group, then $H^{\#}$ is a connected component of $\Delta(G)$. \end{lem} \begin{proof} The cyclic graph of a Frobenius complement is connected. (See the proof of Theorem \ref{Frob grp}. In fact, the diameter of the cyclic graph of a Frobenius complement is at most $2$.) Let $h\in H^{\#}$, and suppose that $g\in G^{\#}$ with $g\approx h$. Write $g=ak$, where $a\in N$, $k\in K$. Observe that $h\in H\cap H^{ak}=H\cap H^{k}$ since $h=h^{g}=h^{ak}$. Now $H=H^{k}$, and so $k\in K\cap H=\id$. Hence $g=a\in\centralizer{N}{h}\le H$. \end{proof} We now show that an element of a $2$-Frobenius group $G$ of prime order that does not lie in any conjugate of $H$ must centralize a nontrivial element of $K$. \begin{lem}\label{thomp} Let $G$ be a $2$-Frobenius group, and let $x\in G\setminus\bigcup_{g\in G} H^{g}$. If $o(x)=p$, a prime, then $\centralizer{K}{x}\neq\id$. \end{lem} \begin{proof} Conjugation by $x$ induces an automorphism of $L$. If $\centralizer{L}{x}=\id$, then $L$ admits a fixed-point-free automorphism of prime order and is therefore nilpotent by Theorem 10.2.1 in \cite{gorenstein}, a contradiction. Hence $\centralizer{L}{x}\neq\id$. By Lemma \ref{Hconnected}, $x$ must centralize an element in the set $L\setminus\bigcup_{g\in L} H^{g}=K^{\#}$. \end{proof} Let $G$ be a $2$-Frobenius group. At this juncture, we are able to obtain a count on the number of connected components of $\Gamma(G)$. As mentioned, Lemma \ref{Hconnected} actually shows that each $(H^{g})^{\#}$ ($g\in G$) constitutes a connected component of $\Gamma(G)$, and there are $|K|$ such conjugates. As the subgroup $K$ is nilpotent, $\centerof{K}\ne\id$. Fix $z\in\centerof{K}^{\#}$. Now, let $g\in G\setminus\bigcup_{g\in G} H^{g}$ be arbitrary. For some natural number $t$, the element $x=g^{t}$ has prime order. (Of course, $x$ will lie outside $\bigcup_{g\in G} H^{g}$, too.) Hence $\centralizer{K}{x}\ne\id$. Let $1\ne k\in\centralizer{K}{x}$, and observe that $g\sim x\sim k\sim z$. It follows immediately that $G\setminus\bigcup_{g\in G} H^{g}$ is a connected component of $\Gamma(G)$. Hence, if $G$ is a $2$-Frobenius group, then $\Gamma(G)$ has $|K|+1$ connected components. \section{Main Results} We now present our main results. If $G$ is a $2$-Frobenius group and the subgroup $K$ is not a group of prime power order, then a ``nice'' count on the number of connected components of $\Delta(G)$ is available; in fact, under this assumption, $\Delta(G)$ will have the same number of connected components as $\Gamma(G)$. We now prove Theorem \ref{main1}. \begin{proof} [Proof of Theorem \ref{main1}] By Lemma \ref{Hconnected}, the set $\left(\bigcup_{g\in G} H^{g}\right)^{\#}$ is partitioned into $|K|$ connected components of $\Delta(G)$. Let $d\in G\setminus\left(\bigcup_{g\in G} H^{g}\right)$. Our task is to show that there exists a path from $d$ into $K^{\#}$. Raise $d$ to an appropriate power to obtain an element $x$ of prime order $p$. If $x\in K$, then $d\approx x$ is a path from $d$ into $K^{\#}$. So, assume that $x\notin K$. Let $Q\in\syl{q}{K}$, where $q\neq p$, and let $K_{0}$ be the normal $q$-complement of $K$. Write $\overline{G}=G/K_{0}$, and note that $\overline{G}$ is a $2$-Frobenius group. By Lemma \ref{thomp}, $\overline{x}$ centralizes an element $\overline{y}\in \left(\overline{K}\right)^{\#}$. Hence $[x,y]\in K_{0}$. The coset representative $y$ can be chosen to belong to $Q$. Note that $[x,y]\in Q$ as $Q\nsub G$. Hence $[x,y]\in Q\cap K_{0}=\id$. Because $x$ and $y$ commute and have coprime orders, $x\approx y$. Now, $d\approx x\approx y$. As $|K|$ is divisible by at least two distinct primes, the set $G\setminus\left(\bigcup_{g\in H} H^{g}\right)$ constitutes a connected component of $\Delta(G)$. \end{proof} We next consider the case where $D$ is a $p$-group for some prime $p$. Notice that $D$ is a $p$-group for some prime $p$ if and only if $K$ and $G/L$ are $p$-groups. Thus, this next theorem is Theorem \ref{main2}. \begin{thrm}\label{Dpgroup} If $G$ is a $2$-Frobenius group and $D$ is a $p$-group for some prime $p$, then $\Delta(G)$ has $|K|+ m_{p}(G)$ connected components. \end{thrm} \begin{proof} The set $\left(\bigcup_{g\in G} H^{g}\right)^{\#}$ is partitioned into $|K|$ connected components of $\Delta(G)$ by Lemma \ref{Hconnected}. Note that $$G\setminus\bigcup_{g\in G} H^{g}=\left(\bigcup_{g\in G} D^{g}\right)^{\#}.$$ The hypothesis and Lemma \ref{DisHall} yield that $D\in\syl{p}{G}$. Hence, every subgroup of order $p$ in $G$ is contained in some conjugate of $D$. Lemma \ref{swimmingintoD} ensures that no point in the set $\left(G\setminus\left(\bigcup_{g\in G} D^{g}\right)\right)^{\#}$ is adjacent to a point in any conjugate of $D$. So, we are left to show that if $\langle x\rangle$ and $\langle y\rangle$ are distinct subgroups of $G$ of order $p$, then $x$ and $y$ belong to distinct connected components of $\Delta(G)$. For a contradiction, suppose that $x$ and $y$ lie in the same connected component of $\Delta(G)$, say $\Xi$. Since $\Xi\subseteq\bigcup_{g\in G} D^{g}$, every element of $\Xi$ is a $p$-element. Now, write $d(x,y)=n$, and note that $n>1$. Let $$x\approx x_{1}\approx x_{2}\approx\dots\approx x_{n-1}\approx y$$ be a path of length $n$. The subgroup $\langle x,x_{1}\rangle$ has a unique subgroup of order $p$. Since $x_{1}$ is a $p$-element, $o(x_{1}^{t})=p$ for some positive integer $t$. Thus, $\langle x\rangle=\langle x_{1}^{t}\rangle$. Similarly, the subgroup $\langle x_{1},x_{2}\rangle$ has a unique subgroup of order $p$. As $x_{2}$ is a $p$-element, $o(x_{2}^{s})=p$ for some positive integer $s$. Hence $\langle x_{1}^{t}\rangle=\langle x_{2}^{s}\rangle$. But now $\langle x\rangle=\langle x_{2}^{s}\rangle$, and so $x=x_{2}^{u}$ for some positive integer $u$. It follows that $x\approx x_{2}$, which implies $d(x,y)\le n-1$, a contradiction. \end{proof} Finally, we have the case that $K$ is a $p$-group and $D$ is not a $p$-group for some prime $p$. Since this is equivalent to $K$ being a $p$-group and $G/L$ not being a $p$-group, this next theorem is Theorem \ref{main3}. \begin{thrm}\label{completecount} Let $G$ be a $2$-Frobenius group, and let $p$ be a prime. Assume that $K$ is a $p$-group and that $D$ is not a $p$-group. Then, the number of connected components of $\Delta(G)$ is $$|K|+|H|+m_{p}^{\ast},$$ where $m_{p}^{\ast}$ is the number of subgroups of order $p$ in $G$ that are not centralized by an element of prime order other than $p$. \end{thrm} \begin{proof} As usual, the set $\left( \bigcup_{g\in G} H^{g}\right)^{\#}$ is partitioned into $|K|$ connected components of $\Delta(G)$. (See Lemma \ref{Hconnected}.) We claim that every nonidentity element in $\bigcup_{g\in G} D^{g}$ is connected to an element of order $p$ in $G$. Let $1\neq d\in\bigcup_{g\in G} D^{g}$. For some positive integer $t$, the element $d^{t}$ has prime order. If $o(d^{t})=p$, then $d\approx d^{t}$, and we are done. Assume that $o(d^{t})\in\mathbb{P}\setminus\{p\}$. Conjugation by $d^{t}$ induces an automorphism of $L$. By Lemma \ref{thomp}, $\centralizer{K}{d^{t}}\neq\id$. Let $k\in\centralizer{K}{d^{t}}$ be an element of order $p$. Since $d^{t}$ and $k$ are commuting elements with coprimes orders, $d^{t}\approx k$. Hence $d\approx d^{t}\approx k$. The claim has been established. Let $a\in G$ be an element of order $p$. Notice that $\centralizer{G}{a}\cap L=\centralizer{L}{a}\le K$, and so $\centralizer{G}{a}K\cap L=K\centralizer{L}{a}=K$. In particular, $\centralizer{G}{a}K/K$ intersects $L/K$ trivially. By Lemma \ref{frobcompcontain}, $\centralizer{G}{a}K/K$ is contained in some conjugate of $D/K$, and, consequently, $\centralizer{G}{a}$ is contained in some conjugate of $D$. Suppose that $\langle a\rangle$ is a subgroup of $G$ with $|\langle a\rangle|=p$ and that $\langle a\rangle$ is \textit{not} centralized by an element of prime order other than $p$. Hence $\centralizer{G}{\langle a\rangle}=\centralizer{G}{a}$ is a $p$-group. Lemma \ref{pgroupcentralizer} yields that the only elements of order $p$ adjacent to $a$ belong to the set $\langle a\rangle\setminus\id$. We therefore count $m_{p}^{\ast}$ connected components of this type. Next, let $\pi=\pi(\normalizer{D}{H})\setminus\{p\}$. Because $\normalizer{D}{H}$ is cyclic, $\normalizer{D}{H}$ has a subgroup $Q$ with $|Q|=|\normalizer{D}{H}|_{\pi}$, the $\pi$-part of $|\normalizer{D}{H}|$. Note that $|D|_{\pi}=|\normalizer{D}{H}|_{\pi}$, and so $Q$ is a Hall $\pi$-subgroup of $D$. The solvability of $D$ ensures that $Q^{D}$ is the set of all Hall $\pi$-subgroups of $D$. Hence, every $p$-regular element of $D$ belongs to a conjugate of $Q$. Let $\mathcal{D}=\{x\in D\mid o(x)\in\pi\}$, and let $\mathcal{E}$ be the set of all elements of order $p$ that belong to $\centralizer{G}{d}$ for some $d\in\mathcal{D}$. We shall show that all of the elements in $\mathcal{D}\cup\mathcal{E}$ lie in a single connected component of $\Delta(G)$. Fix $x\in\mathcal{D}$ with $o(x)=q\in\pi$. Since $x$ is a $p$-regular element of $D$, the element $x$ lies in some $D$-conjugate of $Q$. Consequently, $x$ lies in some $D$-conjugate of $\normalizer{D}{H}$, and so $x$ normalizes $H^{d}$ for some $d\in D$. The subgroup $K$ is nilpotent, and so $\centerof{K}\neq \id$. As $\centerof{K}\characteristic K\nsub G$, the subgroup $\centerof{K}$ is normal in $G$. Hence $\centerof{K}H^{d}\langle x\rangle$ forms a subgroup of $G$ and is, in fact, a $2$-Frobenius group. Applying Lemma \ref{thomp}, $\centralizer{\centerof{K}}{x}\neq \id$. Let $y\in\mathcal{D}$ with $o(y)=q$. As $G/L\cong\normalizer{D}{H}$, the factor group $G/L$ is cyclic. In particular, $G/L$ has a unique subgroup of order $q$. It follows that $L\langle x\rangle=L\langle y\rangle$. Now, using Dedekind's Lemma, observe that $$K\langle x\rangle=(D\cap L)\langle x\rangle=D\cap L\langle x\rangle=D\cap L\langle y\rangle=(D\cap L)\langle y\rangle=K\langle y\rangle.$$ Notice that $\id<\centralizer{\centerof{K}}{x}\le \centerof{K\langle x\rangle}\cap K$. The elements $x$ and $y$ are therefore adjacent to every element in the set $(\centerof{K\langle x\rangle}\cap K)^{\#}$. Of course, $x$ is adjacent to every element in $\centralizer{K}{x}^{\#}$ and $y$ is adjacent to every element in $\centralizer{K}{y}^{\#}$. We point out also that this argument shows that if $d\in\mathcal{D}$, then $d$ connects to every element in $d^{D}$. Now, let $v\in\mathcal{D}$ with $o(v)=r\in\pi\setminus\{q\}$. Some $D$-conjugate of $v$ lies in $Q$, say $v^{d}$, where $d\in D$. Now, $$v\approx\dots\approx v^{d}\approx x,$$ as $Q$ is cyclic. It follows that the set $\mathcal{D}\cup\mathcal{E}$ is contained in a single connected component. Let $D$ and $D^{g}$, ($g\in G$), be distinct conjugates. Pick $d_{1}\in D\setminus K$ and $d_{2}\in D^{g}\setminus K$. The factor group $G/K$ is a Frobenius group and the subgroup $K\langle d_{1},d_{2}\rangle$ cannot be contained in a conjugate of $D/K$. Hence $K\langle d_{1}, d_{2}\rangle\cap L/K$ is nontrivial. Working back in $G$, it follows that $K\langle d_{1},d_{2}\rangle \cap L> K$. Now, the subgroup $\langle d_{1}, d_{2}\rangle$ must contain a nontrivial element from a conjugate of $H$, say $h$. So $\centralizer{K}{d_{1}}\cap\centralizer{K}{d_{2}}\le\centralizer{K}{h}=\id$. We conclude that any element of order $p$ in $K$ cannot be adjacent to elements in $D\setminus K$ and $D^{g}\setminus K$ for distinct conjugates $D$ and $D^{g}$. In light of the previous paragraph, if $g\in G\setminus D$, the sets $\mathcal{D}\cup\mathcal{E}$ and $(\mathcal{D}\cup\mathcal{E})^{g}$ lie in distinct connected components of $\Delta(G)$. There are $|D^{G}|=|H|$ connected components of this type. All elements in $G$ have been accounted for, and thus there are $|K|+|H|+m_{p}^{\ast}$ connected components of $\Delta(G)$. \end{proof} \section{Examples} \label{last sec} In this section, we present some examples. The notation from the previous sections remains in effect. We shall use $Z_{n}$ to denote the cyclic group of order $n$. For most of these examples, the computations were done using the computer algebra system Magma. (See \cite{magma} for information about Magma.) \begin{enumerate}[leftmargin=*] \smallskip \item For this first example, we present a $2$-Frobenius group where the subgroup $D$ is a group of prime power order. This gives an illustration of computing the formula in Theorem B. Take $G = S_4$. Notice that $D$ is a $2$-group, and so by Theorem B, the number of connected components in $\Delta(G)$ is $|K| + m_{2}(G)$. Observe that $|K| = 4$ and $m_{2}(G)=9$. Hence, the number of connected components in $\Delta(G)$ is $4 +9 = 13$. \smallskip \item Next, we present an example where $K$ is a $p$-group and $D/K$ has order $q \ne p$ and $m_p^*$ is not $0$. This illustrates one of the possibilities for the formula in Theorem C. Consider the $2$-Frobenius group $G=((Z_5\times Z_5)\rtimes Z_3)\times Z_2$. This group satisfies the hypotheses of Theorem C, and using Theorem C, we see that the number of connected components of $\Gamma(G)$ is $|K| + |H| + m_5^{*}$. Note that $|K| = 25$ and $|H| = 3$. Using Magma, we find $m_5^* = 3$. We compute that the number of connected components of $\Delta(G)$ is $25+3+3=31$. In Magma, the group $G$ is \texttt{PrimitiveGroup(25,3)} from the Primitive groups database. (See \cite{prim} for information regarding the Primitive groups database.) \smallskip \item We now consider an example where $K$ is not a group of prime power order. This demonstrates the formula in Theorem A. Let $G$ be the $2$-Frobenius group $(((Z_2 \times Z_2) \times (Z_5 \times Z_5))\rtimes Z_3)\rtimes Z_2$. By Theorem A, the number of connected components of $\Delta(G)$ is $|K| + 1 = 100 + 1 = 101$. In Magma, this group $G$ can be found as \texttt{SmallGroup (600,179)} from the Small groups database. (A nice article about the small groups database is \cite{small}.) \smallskip \item We present another example where $K$ is a $p$-group and $D/K$ has order $q \ne p$ for a prime $q$, and in this case, however, $m_p^* = 0$. This give a second example a group meeting the hypotheses of Theorem C. The purpose of this example is to show that $m_p^* = 0$ can occur. Take $G=((Z_2 \times Z_2 \times Z_2) \rtimes Z_7)\rtimes Z_3$. Then $G$ satisfies the hypotheses of Theorem C. Hence, the number of connected components of $\Gamma (G)$ is $|K| + |H| + m_2^*$. Note that $|K| = 8$ and $|H| = 7$. Using Magma, we compute that $m_2^* = 0$. Thus, the number of connected components of $\Delta (G)$ is $8 + 7 + 0 = 15$. In Magma, $G$ is \texttt{PrimitiveGroup(8,2)}. \smallskip \item We now present a situation where $K$ is a $p$-group, $D$ is not a $p$-group, but $p$ divides $|D:K|$. Take $G = ((Z_2^{10}) \rtimes Z_{11}) \rtimes Z_{10}$, which is \texttt{PrimitiveGroup(1024,8)} in Magma. This provides an example where $G$ satisfies the hypotheses of Theorem C and $|K|$ and $|G:L|$ are not coprime. Hence, the number of connected components of $\Gamma (G)$ is $|K| + |H| + m_2^*$. Observe that $|K| = 2^{10} = 1024$ and $|H| = 11$. Using Magma, we compute that $m_2^* = 990$. We deduce that the number connected components of $\Delta (G)$ is $1024 + 11 + 990 = 2025$. \smallskip \item We conclude with one more example of what can happen in Theorem C. In this example, the subgroup $K$ is a $2$-group and $D/K$ is a $2'$-group so that $|D:K|$ is not a prime. Take $G = ((Z_2^{15}) \rtimes Z_{151}) \rtimes Z_{15}$. The group $G$ is too large to appear in Magma's databases, and so we will do the computations explicitly. Observe that we can think of $G$ as the additive group of a field of order $2^{15}$ being acted on by the subgroup of order $151$ in the multiplicative group and then all of this being acted on by the Galois group of the field which has order $15$. It is easy to see that $|K| = 2^{15} = 32768$ and $|H| = 151$. We need to compute $m_2^*$. Suppose that $x\in G$ has order $15$. It is not difficult to see that $|\centralizer{K}{x}|=2$ and so $\normalizer{G}{\langle x \rangle}=\centralizer{G}{x}= Z_2 \times Z_{15}$. Next, suppose that $x \in G$ has order $3$, then $|\centralizer{K}{x}| = 2^5 = 32$ and so $\normalizer{G}{\langle x \rangle} = \centralizer{G}{x} = (Z_2^5 \times Z_3) \rtimes Z_5$. Similarly, if $x \in G$ has order $5$, then $|\centralizer{K}{x}| = 2^3 = 8$ and $\normalizer{G}{\langle x \rangle} = \centralizer{G}{x} = (Z_2^3 \times Z_5) \rtimes Z_3$. On the other hand, if $x \in G$ has order $2$, then $\centralizer{G}{x}$ is one of the following: $K$, $K \rtimes Z_3$, $K \rtimes Z_5$, or $K \rtimes Z_{15}$. We see that $G$ has $151 \cdot 2^{14}$ subgroups of order $15$. Each subgroup of order $15$ centralizes one element of order $2$. On the other hand, each element $x$ of order $2$ that is fixed by an element of order $15$ will fixed by all the of the subgroups of order $15$ in $\centralizer{G}{x}$, and we see that there are $2^{14}$ such subgroups. Hence, there are $151$ elements of order $2$ in $G$ that are fixed by an element of order $15$. Observe that $G$ has $151 \cdot 2^{10}$ subgroups of order $3$. Each subgroup $C$ of order $3$ centralizes $31$ elements of order $2$. On the other hand, each element $x$ of order $2$ that is fixed by $C$ will be fixed by all of the subgroups of order $3$ in $\centralizer{G}{x}$, and we see that there are $2^{10}$ such subgroups. Notice that a Sylow $5$-subgroup of $\normalizer{G}{C}$ will centralize one of the elements of order $2$ in $K$, and the Sylow $2$-subgroup of $\centerof{\centralizer{G}{C}}$ will be generated by this element. Hence, it will be the only element in $\centralizer{K}{C}$ that is fixed by an element of order $15$. It follows that $C$ centralizes $30$ elements of order $2$ that are not centralized by an element of order $15$, and so $G$ has $151 \cdot 30$ elements of order $2$ that are centralized by an element of order $3$ and not an element of order $15$. We now do a similar computation to compute the number of elements of order $2$ that are fixed by a subgroup of order $5$ and not a subgroup of order $15$. Observe that $G$ has $151 \cdot 2^{12}$ subgroups of order $5$. Each subgroup $C$ of order $5$ centralizes $7$ elements of order $2$. On the other hand, each element $x$ of order $2$ that is fixed by $C$ will be fixed by all of the subgroups of order $5$ in $\centralizer{G}{x}$, and we see that there are $2^{12}$ such subgroups. Notice that a Sylow $5$-subgroup of $\normalizer{G}{C}$ will centralize one of the elements of order $2$ in $K$, and the Sylow $2$-subgroup of $\centerof{\centralizer{G}{C}}$ will be generated by this element. Hence, it will be the only element in $\centralizer{K}{C}$ that is fixed by an element of order $15$. It follows that $C$ centralizes $6$ elements of order $2$ that are not centralized by an element of order $15$, and so, $G$ has $151 \cdot 6$ elements of order $2$ that are centralized by an element of order $5$ and not an element of order $15$. The number of elements of order $2$ in $G$ that are fixed by an element of prime order other than $2$ is $151 + 151 \cdot 30 + 151 \cdot 6 = 151 \cdot 37$. On the other hand, $G$ contains $2^{15} - 1 = 217 \cdot 151$ elements of order $2$. This implies that $m_{2}^{*} = 217 \cdot 151 - 37 \cdot 151 = 180 * 151 = 27180$. Hence $\Delta(G)$ has $32768 + 151 + 27180 = 59919$ connected components. \end{enumerate}
\section{Motivation and Overview}\label{sec:Motivation} It is a familiar thing to anyone who works in optimization that the objective functions in different optimization problems vary along important `dimensions', giving rise to different large classes of problems. For example, we are aware that objectives may take discrete, continuous or mixed input variables; they may give bounded or unbounded outputs which may be discrete or continuous; they may be closed-form expressions or require more-or-less complicated simulations; if they are closed-form they may be linear, nonlinear but convex, or nonconvex; they may be non-computable in practice, instead requiring experimental processes to be evaluated; and, they may be precise, certain and repeatable, or they may be uncertain objective functions, subject to parametric or output noise. Given this natural variety in the objective functions seen in different (single-objective) problems, it should not be surprising that when considering multiobjective optimization problems, the different objective function components forming the overall function may also be quite different from one another. Indeed, one aspect of the difference is very well known and well accounted for historically: the function components may give outputs in different units, and those units may be incommensurable; this incommensurability of objective function values is a key motivation of ``true'' multiobjective methods --- those that do not form combinations of objective values, except with explicit reference to a proper preference model or preference elicitation process. Although it is not surprising that different objective functions should be not just different in the scale, range or units of their outputs (incommensurable), but different in the more fundamental ways listed above, there has been very little stated explicitly about this heterogeneity in the literature, and almost no work that seeks to offer ways to handle it inside multiobjective algorithms. The first work the authors are aware of was by us~\cite{allmendinger2013hang}. We were motivated in that work to consider a particular type of heterogeneity that could potentially cause a lot of inefficiency in a standard evolutionary multi-objective optimization (EMO) approach, namely that the objective function components were of different {\em latency}\/ i.e., evaluation time. Our motivation came from a number of real problems we had been looking at under the banner of ``closed-loop optimization'', which is to say at least one of the objective function components was dependent on a non-computational experiment for evaluation, such as a physical, chemical or biological experiment. Allmendinger's PhD thesis~\cite{Allmendinger2012phd} studied many different consequences apparent in these closed-loop problems (including dynamic constraints and interruptions), and this followed much real experimental work in this vein by Knowles and co-authors~\cite{Kno2009closed,ohagan2005closed,ohagan2007closed,platt2009aptamer}. Varying per-objective latencies can, of course, arise also in scenarios requiring intense computational experiments, such as CFD and other complex simulations; for example, obtaining objective function values may require the execution of multiple time-consuming simulations, which may vary in running time. Following our publication of the above-mentioned paper~\cite{allmendinger2013hang}, which dealt with heterogeneity in latency between the different objectives of a problem, Knowles proposed a broader discussion topic on Heterogeneous Functions~\cite{eichfelder4} at a Dagstuhl Seminar~\cite{Dagstuhl15031}, in which the topic was fleshed out by the participants of the seminar over the course of three or four days. Since then, there have been two significant strands of work. First, we (the authors of this chapter) have presented a further study on heterogeneity~\cite{ejor:Latencies}, in which we extended our work on handling differing latency within a pair of objectives in a bi-objective problem. This was also further extended in~\cite{chugh2018surrogate}, and then by Jin and co-authors in~\cite{10.1145/3377930.3390147}, with both of these studies adapting surrogate-assisted evolutionary algorithms to cope with latencies between objectives. Secondly, Thomann and co-authors have published a pair of papers, and PhD thesis, on heterogeneity~\cite{thomann2019representation,thomann2019trust,thomann2019trust_PhD} particularly concerning non-evolutionary methods. Our aim in this chapter is to review the basic concepts and algorithms explored so far, and to look ahead to future developments. We begin in the next section with some fundamental concepts needed to handle heterogeneity in latency, and then provide a broader categorisation of other types of heterogeneity not yet explored in detail. The remainder of the chapter builds a deeper understanding of how heterogeneity has been handled so far, and the prospects for further work. \section{Fundamental concepts and types of heterogeneity}\label{sec:FundConcepts} Handling heterogeneous functions relies first on the usual definitions used in multiobjective optimization (available elsewhere in this book). Added to that, we need some well-defined notion of a time budget if we are going to handle problems with different latencies across the objectives. Let's review the required definitions. \begin{comment} \subsection{Basic definitions} \begin{definition}{(Multiobjective optimization (MO) problem)} The general formulation of a MO problem is to ``maximize'' an $m$-dimensional objective function vector: $\mathbf{\bob}(\mathbf{\bx}) = (f_{1}(\mathbf{\bx}),\ldots,f_{i}(\mathbf{\bx}),\ldots,f_{m}(\mathbf{\bx}))$, where each objective depends upon a vector $\mathbf{\bx} = (x_{1},\ldots,x_j,\ldots,x_{n})$ of $n$ decision variables; we refer to $\mathbf{\bx}$ also as the candidate solution vector or simply as a solution. A MO problem may also include equality and inequality constraints, and these constraints define a feasible design space, $X\subseteq \mathbb{R}^n$. The objective space image of $X$ is denoted $Y$, and termed the feasible objective space. The term ``maximize'' is rendered in quotes to indicate that there are no unique maxima to a MO problem in general, and a further definition is needed to define an ordering on candidate solutions (see below). \end{definition} \begin{definition}{(Pareto dominance)} Consider two solutions $\bx_1\in X$ and $\bx_2\in X$. We say that $\bx_1$ dominates $\bx_2$, also written as $\bx_2 \prec \bx_1$, if and only if $\exists i$ such that $f_{i}(\bx_1) > f_{i}(\bx_2)$ and $\forall j, f_{j}(\bx_1) \geq f_{j}(\bx_2)$. \end{definition} \begin{definition}{(Pareto optimal)} A solution $\bx_1\in X$ is called Pareto optimal if there does not exist a solution $\bx_2\in X$ that dominates it. \end{definition} \begin{definition}{(Pareto set)} The set of all Pareto optimal solutions is said to form the Pareto set. \end{definition} \begin{definition}{(Pareto front)} The image of the Pareto set in the objective space is known as the Pareto front. \end{definition} \begin{definition}{(Pareto archive)} Pareto archive is a set of mutually non-dominated solutions: \begin{equation*} A = \{\bx^1 \in X \:|\: \forall \bx^2 \in A \: : \: \bx^2 \nprec \bx^1 \; \land \; \bx^1 \nprec \bx^2 \} \end{equation*} In the context of multiobjective evolutionary and metaheuristic algorithms Pareto archive is used to store potentially Pareto optimal solutions, i.e., solutions non-dominated (Pareto optimal) among all solutions generated by such method. The Pareto archive may be bounded (by $\mu \in \mathbb{Z}^+$), i.e., may contain only a limited number of $\mu$ solutions, or unbounded. \end{definition} \end{comment} \subsection{Fixed evaluation budget definitions}\label{definitions} As in some of our previous work~\cite{allmendinger2013hang,ejor:Latencies}, we adopt the notion of a fixed evaluation budget in our optimization~(cf.\cite{jansen2012fixed}), as this framework is central to the practical problem of handling heterogeneity in evaluation costs (specifically latency differences between objective components). \begin{definition}{(Total budget)} The total budget for solving an optimization problem is the total number of time steps $B$ available for solving it, under the assumption that only solution evaluations consume any time.\label{TotBudget} \end{definition} \begin{definition}{(Limited-capacity parallel evaluation model)} We assume parallelization of the evaluation of solutions is available, in two senses. First, a solution may (but need not) be evaluated on one objective in parallel to its being evaluated on another objective. Secondly, a number of (at most $\lambda$) solutions may be evaluated at the same time (i.e., as a batch or population) on any objective, provided their evaluation is started at the same time step, and finishes at the same time step (i.e., batches cannot be interrupted, added to, etc., during evaluation). For sake of simplicity, we assume $\lambda$ is the same for all objectives.\label{CapEvalMode} \end{definition} \begin{definition}{(Per-objective latency)} Assume that each objective $i$ can be evaluated in $k_i \in \mathbb{Z}^+$ time steps (for a whole batch). Here, we consider a bi-objective case, and for simplicity, we define $k_1=1$ and $k_2=\ks>1$, so that the slower objective is $\ks$ times slower than the faster one.\label{PerObLatency} \end{definition} \begin{definition}{(Per-objective budgets)} From Definitions~\ref{TotBudget}-~\ref{PerObLatency}, it follows that the total budget of evaluations per objective is different. The budget for $f_1$ is $\lambda B$, whereas the budget for $f_2$ is $\lambda \lfloor B/\ks \rfloor$. In Algorithm~\ref{alg:Heterogeneous} (Section~\ref{algorithms}), we will be referring to the fast and slow objective as $f^{\text{fast}}$ and $f^{\text{slow}}$, respectively, and to their per-objective budgets as $\mathit{MaxFE}^{\text{fast}}$ and $\mathit{MaxFE}^{\text{slow}}$. \end{definition} \subsection{Types of heterogeneity} We believe that heterogeneous objectives are the norm in multiobjective optimization rather than the exception. Nevertheless, it is still a largely unexplored topic to understand how each different type of heterogeneity causes specific difficulties to existing multiobjective techniques. In many cases, e.g., in industry, the heterogeneity in objectives is perhaps just handled in an {\em ad hoc}\/ way, with some adaptations to existing algorithms. Whether or not such {\em ad hoc}\/ solutions are effective remains an unanswered question for which there is a lot of scope for academic or more foundational work. Heterogeneity in the latency of different objectives is perhaps the area where it is obvious that the usual {\em ad hoc} solution (``waiting'' for all objectives of a solution to be evaluated) is in need of re-thinking, as our work has shown (for two objectives only so far --- but see the remainder of this chapter for a sketch of a generalization of this). More generally though, the different types of heterogeneity that might need accounting for in many-objective algorithm design, are as follows (based on but extending~\cite{eichfelder4}): \begin{enumerate}[i] \item Scaling: Different ranges of objective function values are handled by most EMO approaches using either Pareto ranking or dynamic normalization techniques. \item Landscape: Variation in landscape features, such as ruggedness, presence of plateaus, separability, or smoothness. Exploratory landscape analysis (ELA)~\cite{MerBisTraPreuWeiRud11:gecco} can help to characterize the landscapes associated with the individual objective functions but there is a lack of research on characterizing the complexity of a multi-objective optimization (MO) problem as a whole (e.g., front shape, local fronts). \item Parallelization: Batch vs Sequential evaluation requirements may vary across objectives, and this would complicate the control flow of most types of optimization algorithms. \item White vs Grey vs Black Box objectives: A mix of these across the objectives in a single problem would necessitate coordination of different types of searching behaviour, e.g., for Black Box, evolutionary techniques might be effective, but for white box problems, a more efficient search based on knowledge of the objective function may be possible. \item Subject to interruptions~\cite{OrseauArmstrong2016,allmendinger2014tuning} or ephemeral resource constraints (ERCs)~\cite{allmendinger2013handling}: If evaluating an objective value of a solution depends upon an experiment which depends upon a resource (such as availability of equipment), then for certain solutions, it may be interrupted if the resource becomes unavailable. This is already an involved problem in the single objective case (ibid). \item Variable type (integer, continuous or mixed): These different types usually require different types of algorithm which would need coordination in a multiobjective one. \item Determinism: In stochastic settings, objective functions values may depend upon hidden uncontrolled variables necessitating some way of accounting for this variation such as robust or distributionally robust approaches~\cite{bertsimas2019adaptive}. \item Noisy vs noiseless: The usual way of handling output (e.g. measurement) noise on objective values is to re-evaluate them to obtain a mean; it would be wasteful to re-evaluate deterministic objectives however --- this seems easily handled, but perhaps there is hidden difficulty. \item Theoretical and practical difficulty: This relates to the difficulty of finding the optimum as a whole, not the cost or complexity of evaluating. Combining a simpler objective with a harder one might cause EMO methods to be biased. \item Safety~\cite{AllKno2011ecta,KimAllLop2020safe}: This relates to safe optimization, and the tightness of an objective's safety threshold. Evaluating a (non-safe) solution that has an objective value below the safety threshold causes an irrecoverable loss (e.g., breakage of a machine or equipment, or life threat). \item Correlations between objectives: Conflicting objectives are considered the norm in multiobjective optimization. However, anti-correlated objectives in particular can lead to very large Pareto fronts, and hence difficulties for multiobjective algorithms (see~\cite{KnoCor2003emo,PaqStu06:mqap}). This may be exacerbated in cases of \emph{many}\/ conflicting objectives, and algorithm settings would need to be carefully chosen to handle these situations~\cite{PurFle2007tec}. \item Evaluation times (latency): This is the topic explored most fully to date, particularly in~\cite{allmendinger2013hang,ejor:Latencies,chugh2018surrogate,10.1145/3377930.3390147,thomann2019representation,thomann2019trust,thomann2019trust_PhD}. \end{enumerate} Of course, several of these heterogeneities may exist together in a single problem, which would usually make things even more challenging to handle. Having said that, under certain circumstances, heterogeneity can improve performance. For example, in~\cite{ejor:Latencies,chugh2018surrogate} we observed that a low level of latency between the fast and slow objective can lead to improved results and help reach parts of the Pareto front that may not have been reached otherwise. \section{Algorithms and benchmarking}\label{sec:algorithms} In this section we will describe several existing algorithm schemes and benchmark problems/considerations when tackling MO problems with heterogeneous objectives, in particular differing latencies. For this we will refer back to the definitions provided in Section~\ref{definitions}. \subsection{Algorithms}\label{algorithms} This section outlines the three existing algorithm schemes for coping with differing latencies, Waiting, Fast-First, and Interleaving. Figure~\ref{fig:schematic} provides a schematic of these three schemes. \\ \begin{figure}[tb!] \centering \includegraphics[width=1.22\textwidth]{schematic-latency.pdf} \caption{Schematic of the main types of strategy for handling heterogeneous latencies. A biobjective problem is assumed with a slower and a faster objective function (the faster objective is twice as fast as the slower one in the figure, without loss of generality). Further, it is assumed that we are interested in performing well (in a multiobjective sense) given a fixed budget of total evaluation time, and a limited capacity parallel evaluation model (see Section~\ref{definitions}). Three different general strategies are shown --- Waiting, Fast-First, and Interleaving. The time axis is from top to bottom. After initialization, individual solutions need to be evaluated in a parallel batch (population), before entering the usual evolutionary algorithm phases of ranking, selection and variation (R,S,V). When these phases are carried out using evaluations from both objectives, we denote it as MO R,S,V. When only one objective has been evaluated, we denote it as SO R,S,V. In Waiting, only MO R,S,V is used (and a standard MOEA can be employed). In the Fast-First strategy, SO R,S,V is used for some generations, and then subsequently Waiting is used for the remaining generations. In Interleaving, a much more complicated approach, SO R,S,V and MO R,S,V are both used, and solutions evaluated partially and fully are interleaved so that there is less `dead time' than in Waiting, and more guidance than in Fast-First. Interleaving is generally the best. Fuller algorithmic details of these strategies are given in pseudocode in the original papers~\cite{allmendinger2013hang,ejor:Latencies}.} \label{fig:schematic} \end{figure} \noindent \textbf{Waiting. \;} The most straightforward strategy to deal with varying latencies of objectives is to go at the rate of the slow objective, thus fully exploiting the per-objective budget of the slow objective and only partially of the fast objective. This approach avoids the development of customised strategies and is applicable to many-objective problems. In~\cite{ejor:Latencies}, this was referred to as a \textit{Waiting strategy}. It prevents the introduction of search bias, for example, towards the fast objectives, and it has shown to perform better as the evaluation budget increases. \\ \noindent\textbf{Fast-First. \; Strategies falling into this category neglect the time-consuming objective function(s) as long as possible in order to make potentially better use of the time budget by performing a search directed by the cheaper objective function(s). The approach was first proposed in~\cite{ejor:Latencies}, where it was called the Fast-First strategy. It evaluates solutions at the rate of the fastest objective (ignoring other objectives) using a standard (single-objective) EA for part of the optimization, and then switches late (as late as seems reasonable) in the optimization run to a final, evaluation of some selected solutions on the other (slower) objectives to ensure that at least some solutions are evaluated on all objectives. That is, this approaches uses fully the per-objective budget of the fast objective, but only a fraction of the per-objective budget of the slow objective(s). Fast-First has shown to perform well for problems with highly positively correlated objectives (for obvious reasons), being able to reach parts of the Pareto front (extreme solutions on the fast objective) that may not have been reached otherwise. Moreover, Fast-First is also almost unaffected by the length of latency, and performed better within a generational multiobjective EA (MOEA) than within a steady state-based MOEA~\cite{ejor:Latencies}. Similar to Waiting, Fast-First is readily applicable to many-objective problems. \\ \noindent\textbf{Interleaving. \;} These strategies are less straightforward since they employ a mechanism to coordinate the evaluation of the objectives during search so as to use the per-objective budgets of all objectives as efficiently and thoroughly as possible. Also, so far Interleaving strategies have been applied to bi-objective problems (one slow and one fast objective) only. In our initial work on latencies~\cite{allmendinger2013hang}, we proposed an Interleaving strategy embodied by a \textit{ranking-based EMOA} that maintained a population unbounded in size, and which assigned pseudovalues to a solution's slow objective until that objective has been evaluated. Different techniques to assign pseudovalues have been proposed including one based on fitness-inheritance. The approach works similarly to a standard ranking-based EMOA, where offspring are generated by a process of (multiobjective) selection, crossover and mutation. Every time a batch of solutions has been evaluated on the slow objective, their pseudovalues are replaced with the true objective values, and a new batch of solutions (selected from the current unbounded population) is submitted for evaluation on the slow objective, and new pseudovalues assigned to these solutions' slow objectives. This new batch consists either of the most recently generated solutions that have not been evaluated on the slow objective yet, or of solutions selected based on their anticipated quality computed based on their non-dominated sorting rank. This very first approach to cope with heterogeneous evaluation times performed well for long latencies when compared to a Waiting scheme. In~\cite{ejor:Latencies}, we proposed two further variations of interleaving strategies, \textit{Brood Interleaving (BI)} and \textit{Speculative Interleaving (SI)}. As in the approach explained above, both strategies evaluate solutions on both objectives in parallel. However, BI and SI employ a constant population size, and use the time while the slow objective is being evaluated (the interleaving period) to generate and evaluate solutions on the fast objective only: The Brood Interleaving strategy generates these solutions using uniform selection and variation applied to the population currently evaluated on the slow objective, while SI initializes an inner (single-objective) EA with this population and applies it to the optimization of the fast objective for the remainder of the interleaving period. The solutions evaluated on the fast objective are then used as a quality indicator to decide which solutions to evaluate on the slow objective in the next generation.\footnote{Solutions evaluated on the fast objective are considered for evaluation on the slow objective in the next generation if they outperform at least one of their parents on the fast objective.} The difference between SI and BI translates into deliberately optimizing the fast objective vs maintaining selection pressure where possible. As shown in~\cite{ejor:Latencies}, the Speculative Interleaving strategy performs well for low evaluation budgets and/or when latencies are long, objectives positively correlated, and fitness landscapes rugged. Similar to Waiting, BI performs well for larger evaluation budgets, with BI performing better for longer latencies and larger search spaces. Furthermore, BI performs significantly better when used in combination with a steady state-based MOEA than a generational-based MOEA. \begin{algorithm}[t] \KwIn {$\mathit{MaxFE}^{\text{slow}}$ and $\mathit{MaxFE}^{\text{fast}}$: per-objective budget of slow ($f^{\text{slow}}$) and fast objective ($f^{\text{fast}}$); $\ks$: latency; $\lambda$: initial population size; $u$: number of new samples per iteration; $\tau$: transfer learning trigger} \KwOut{Non-dominated solutions of the archive $A$} Create an initial population \textit{P}, set archives to $A=A^{\text{fast}}:=\emptyset$, iteration counter to $i:=0$, and evaluation counters to $\mathit{FE}^{\text{slow}}=\mathit{FE}^{\text{fast}}:=0$\\ \While{$P$ $\text{\upshape is evaluated on}$ $f^{\text{slow}}$}{ Evaluate $P$ on $f^{\text{fast}}$, and add solutions to $A^{\text{fast}}$ \\ Run a single-objective EA to optimize $f^{\text{fast}}$ using $\lambda \times (\ks- 1)$ function evaluations, and add the solutions to $A^{\text{fast}}$ } Update archive and counters to $A:=P$, $\mathit{FE}^{\text{slow}}:=\lambda$, $\mathit{FE}^{\text{fast}}:= \lambda\times\ks$, $i:=i+1$\\ \While{$\mathit{FE}^{\text{slow}}$ < $\mathit{MaxFE}^{\text{slow}}$ $\text{\upshape and}$ $\mathit{FE}^{\text{fast}}$ < $\mathit{MaxFE}^{\text{fast}}$}{ \uIf {HK-RVEA}{ Build surrogates for the slow and fast objective function based on $A$ and $A^{\text{fast}}$\\ Run a multiobjective EA (RVEA~\cite{cheng2016reference}) to find samples for updating the surrogates\\ Form new population $P$ by selecting $u$ samples using the acquisition function from the K-RVEA algorithm~\cite{chugh2016surrogate}\\ } \uIf {T-SAEA}{ Build surrogates for the slow and fast objective function based on $A$ and $A^{\text{fast}}$, but, every $\tau$ iterations (if $i\mod{\tau}=0$), build the surrogate of the slow objective function using a transfer learning approach\\ Run a multiobjective EA (RVEA~\cite{cheng2016reference}) to find samples for updating the surrogates\\ Form new population $P$ by selecting $u$ samples using an adaptive acquisition function~\cite{wang2020adaptive} followed by the angle-penalized distance approach (taken from RVEA~\cite{cheng2016reference})\\ } \While{$P$ $\text{\upshape is evaluated on}$ $f^{\text{slow}}$}{ Evaluate $P$ on $f^{\text{fast}}$, and add solutions to $A^{\text{fast}}$ \\ \uIf {HK-RVEA}{ Create $u\times(\ks- 1)$ solutions via uniform selection and variation applied to $P$\\} \uIf {T-SAEA}{ Create $u\times(\ks- 1)$ solutions via Latin hypercube sampling around $P$\\ } Evaluate newly created solutions on $f^{\text{fast}}$, and add them to $A^{\text{fast}}$ } Update archive and counters to $A:=A\cup P$, $\mathit{FE}^{\text{slow}}:=\mathit{FE}^{\text{slow}}+u$, $\mathit{FE}^{\text{fast}}:= u\times\ks$, $i:=i+1$\\ } \caption{{Interleaving surrogate-based strategies (HK-RVEA, T-SAEA)} \label{alg:Heterogeneous}} \end{algorithm} Two surrogate-based interleaving strategies for coping with latencies in the objectives (one fast and one slow) have been proposed recently in~\cite{chugh2018surrogate} (HK-RVEA) and ~\cite{10.1145/3377930.3390147} (T-SAEA); see Algorithm \ref{alg:Heterogeneous} for a sketch of the two algorithms. Although these and the non-surrogate-based strategies outlined above adopt the same limited-capacity parallel evaluation model, the surrogate-based methods opted to use a different value of $\lambda$ (number of solutions evaluated in parallel) during search: a large $\lambda$ is used to create the initial training data set, while a significantly smaller $\lambda$ is used thereafter. Identifying and evaluating fewer samples in each iteration, but doing more iterations, is more suitable for a surrogate-based approach; in fact, traditional surrogate-based methods, e.g. see~\cite{JonSchWel98go}, use one sample per iteration. Consequently, in~\cite{chugh2018surrogate,10.1145/3377930.3390147}, the stopping criterion was not the maximum number of time steps (or iterations), as used by the non-surrogate-based methods, but the maximum number of per-objective function evaluations only (ignoring the number of time steps used). In practice, the stopping criteria (times steps vs function evaluations only) are dictated by the problem (context) at hand, thus making certain surrogate-based methods potentially unsuitable. For example, in some of our closed-loop optimization work~\cite{Kno2009closed}, the experimental platform dictates that a batch of solutions of a certain size should be evaluated in parallel (a 96-well plate was used in some experiments, in others a microarray for assaying 9,000 DNA strands was available). The strategy proposed in~\cite{chugh2018surrogate}, called \textit{HK-RVEA}, resembles a hybrid between BI and SI combined with a surrogate-assisted approach for selecting solutions to be evaluated on the slow and fast objective. Following initialization of the population and submitting it for evaluation on both objectives, HK-RVEA uses a single-objective EA (without any surrogate) to optimize the fast objective (like in SI) whilst the slow objective is being evaluated. In the main loop, the EA is replaced by repetitively applying crossover and mutation to the population (as in BI) as the number of solutions (samples) evaluated on the slow objective is much lower than the initial population size. HK-RVEA maintains a separate archive of evaluated solutions for the slow and fast objective, and then uses these archives (i.e., different samples) to build an objective-specific surrogate. A multiobjective EA (RVEA~\cite{cheng2016reference}) is used to find (three) samples for updating the surrogates using the infill criteria from the K-RVEA algorithm~\cite{chugh2016surrogate}. HK-RVEA has been shown to perform well for problems with short latencies, occasionally even outperforming a multiobjective EA (K-RVEA) optimizing the same problem but without latency. The approach proposed in~\cite{10.1145/3377930.3390147} is called \textit{T-SAEA} and it varies from HK-RVEA primarily in that it combines a surrogate-assisted evolutionary algorithm with a transfer learning approach, which is used to update the surrogate for the slow objective (for most of the time). The motivation is that if there is a strong similarity or correlation between the slow and fast objective, then knowledge transfer is beneficial, otherwise negative transfer may occur. The basis of the proposed transfer learning approach is a preceding filter-based feature selection method~\cite{cervante2012binary} adopted to identify the most relevant decision variables to share between the surrogate of the slow and fast objective. Based on the identified subset of decision variables, an adaptive aggregation method is then used to share the parameters of the two surrogates. The adaptive component, in essence, shifts the importance of sharing parameters of the fast objective surrogate to the parameters of the slow objective surrogate as the optimization progresses. T-SAEA has shown significantly better performance~\cite{10.1145/3377930.3390147} compared to non-surrogate methods designed for handling latencies. The algorithm seems to do well also against HK-RVEA, allowing us to tentatively conclude that transfer learning is a promising approach to cope with latencies, provided the non-trivial issue around negative transfer (decrease in learning performance in the target domain) can be addressed. \\ \noindent\textbf{Non-evolutionary approaches. \;}The approaches discussed above employ evolutionary search at some stage. Thomann and co-authors~\cite{thomann2019trust,thomann2019trust_PhD} propose a non-evolutionary approach based on the trust region method, which optimizes one point at a time. The method is called \textit{MHT} (short for multiobjective heterogeneous trust region algorithm) and it differs from other trust region methods in the way the search direction is computed and the replacement of the objectives by quick-to-evaluate surrogates. In fact, MHT replaces all objectives (slow and fast ones) with a local quadratic model that interpolates the current iteration point, and is agnostic about the per-objective latencies. The next iteration point is determined by first solving the classical trust region subproblem to obtain the ideal point, followed by solving an auxiliary problem (know as the Tammer-Weidner functional~\cite{gerth1990nonconvex}) to determine a trial point. The trial point is accepted as the next iteration point if a multiobjective condition describing the improvement of the function values is fulfilled. Otherwise, the current point is kept and the size of the trust region (the trust region radius) reduced. MHT stops when there is no improvement in the iteration point. To keep the number of evaluations of the slow objective to a minimum, MHT evaluates the slow objective only when the surrogate becomes inaccurate. MHT is scalable to any number of objectives and any combination of fast vs slow objectives (while the approaches above assumed a bi-objective problem with one fast and one slow objective, though Waiting and Fast-First are easily scalable). However, the assumption taken here is that while the expensive functions are black box (and slow to compute), the fast objectives are given as analytical functions for which function values and derivatives can easily be computed (above we assumed that the fast objective can be black box and there is a budget on how often the fast objective can be evaluated). Moreover, it is assumed that the slow (black-box) objectives are twice continuously differentiable, which is a strong assumption to make, as noted by the authors~\cite{thomann2019trust_PhD}. In~\cite{thomann2019representation,thomann2019trust_PhD}, Thomann and Eichfelder propose three heuristics augmented onto the standard version of MHT outlined above. The purpose of these heuristics, which are motivated by ideas for bi-objective optimization problems, is to exploit the heterogeneity of the objective functions further to identify additional Pareto optimal solutions that are spread over the Pareto front. For the heuristics to be applicable it is assumed that the fast objective can be optimized with reasonable numerical effort, and that it is bounded from below (assuming a minimization problem); in these heuristics the fast objective is not replaced by a surrogate. Below we explain these heuristics briefly. The idea of the first heuristic, referred to as \textit{Spreading}, is to minimize the fast objective on local areas that move in the direction of the optima of the fast objective. A local area can be seen as a trust region (defined by user-provided radius, or spreading distance) around an optimal input point. The initial (weakly) optimal input point can be obtained, e.g., by applying the standard version of MHT. The point in this local area that minimizes the fast objective only, can then be used as the starting point for the next run of MHT. Repeating this process allows one to successively identify new optimal (weakly efficient) input points until the global optimal value of the fast objective has been reached. Finally, dominated solutions are deleted to leave optimal solutions only. Note, the closer the initial optimal point to the global minimal value of the fast objective, the fewer successive optimal points can be computed. Also, the larger the spreading distance, the bigger the distance between the computed points and thus the fewer optimal points can be obtained. The second heuristic, \textit{Image Space Split}, splits the objective space into disjoint areas (which can be thought of as slices in a two-dimensional objective space) in which then a modified version of MHT is applied. The reason for needing a modified version of MHT to accommodate this heuristic is that the presence of a lower bound on the values of the fast objective requires an additional constraint for computing the ideal point and a modified auxiliary problem for determining the descent direction; all other steps in MHT remain unchanged. When splitting the objective space into several disjoint search areas before applying any version of MHT, the choice of starting points in the disjoint search areas is important. A heuristic approach to determine starting points is suggested, and so is a heuristic stopping criterion to save function evaluations. The challenge for this heuristic is to decide on a suitable number of disjoint search regions. In general, the greater this number, the more efficient points are computed and the more function evaluations are required. However, this does not need to be always the case because of the non-linear relationship between the location of the individual search regions and the position of the starting points, resulting in scenarios where not all search regions contain (weakly) optimal points and some starting points being already close to efficient points. The third heuristic is a \textit{Combination of Image Space Split and Spreading}. This heuristic first executes Image Space Split, and then applies Spreading in the space captured by both adjacent optimal solutions identified through Image Space Split to compute further optimal points. The challenges associated with the two individual heuristics (merged together) persist in this heuristic. An initial study~\cite{THOMANN2019104103}, comparing MHT against a weighted sum-based approach and direct multisearch for multiobjective optimization, concluded that the proposed approach can yield good results. \begin{comment} The area around dealing with Potentially some other are - Constraint dominance methods --> Check feasibility of a solution before investing resources to evaluate it - Delta evaluation in local search \end{comment} \subsection{Empirical study: Towards many-objective heterogeneous latencies} In this section we will present and analyze original empirical results concerning the relationship between the number of objectives and the level of heterogeneity one might expect in a problem; all this is done in the context of varying latencies. For this experiment, assume a problem with a certain number of objectives, each being associated with a per-objective latency drawn from a given distribution. We want to understand the likely range of latencies among the objectives. Having a better understanding about the level of heterogeneity can help us in the design and selection of suitable algorithms. The experiment consists of creating problems that vary in the number of objectives (1-25 objectives) with per-objective latencies drawn from one of three Beta distributions --- $\texttt{beta}(2,8)$ (skewed to the right), $\texttt{beta}(8,2)$ (skewed to the left), and $\texttt{beta}(5,5)$ (symmetric), each defined on the interval [0,1]. Each combination of objective number and distribution ($25\times3=75$ combinations in total), was realized 100 times, and the mean and standard error of the minimum and maximum differences in per-objective latencies plotted in Figure~\ref{fig:HetOb}. The reason to use a Beta distribution is that it allows for a convenient simulation of skewness in the per-objective latencies, and due to its wide-spread use in the literature and practice to quantify the duration of tasks (see seminal paper of~\cite{PERT1959}). \begin{figure}[!t] \centering \includegraphics[height=170pt]{heterogenous_new.pdf} \caption{Mean and standard error of the maximum (triangles) and minimum differences (circles) in per-objective latencies (y-axis) as a function of the number of objectives in a problem (x-axis). Per-objective latencies are drawn from one of three Beta distributions.} \label{fig:HetOb} \end{figure} Two main observations can be made from the figure: \begin{itemize} \item Regardless of the probability distribution (skewness) used, the mean of the minimum and maximum difference in per-objective latencies starts roughly from the same level for a bi-objective problem, with the mean differences then increasing/decreasing logarithmically with the number of objectives. This pattern is due to sampling from a wide distribution, where it becomes gradually more likely that the per-objective of a new objective is either more similar or more distinct to the per-objective latencies of an existing objective. If all per-objective latencies were identical, then the minimum and maximium difference in per-objective latencies would be identical and of value 0 for all objectives. \item There is an asymmetry between the minimum and maximum difference in the per-objective latencies as a function of the number of objectives. The mean minimum difference is very similar for the three Beta distributions with the mean difference flattening quickly beyond around 15 objectives. However, there is a statistical difference between the Beta distributions when considering the mean of the maximum differences. In particular, the mean maximum difference obtained with the symmetric distribution ($\texttt{beta}(5,5)$) increases more rapidly than with the mean maximum difference of the two skewed Beta distributions. This pattern is due to the higher probability of sampling extreme per-objective latencies with the symmetric Beta distribution. \end{itemize} The conclusion of this experiment is that, given knowledge of how many objectives a problem has, and even a limited knowledge about the distribution of per-objective latencies, then one can estimate with reasonable accuracy the level of heterogeneity in terms of the greatest latency difference one will observe in practice. This should facilitate the detailed design of algorithms one might consider for handling the heterogeneity. \subsection{Benchmarking} Validating algorithms designed for coping with heterogeneity in the objective evaluation times requires careful consideration of how evaluations are counted/simulated, what test problems to use, and how to validate performance. Below we will discuss how these are affected in an environment with heterogeneous objectives. \subsubsection{How to count/simulate evaluations?} In a standard multi/many-objective optimization problem, where homogeneous evaluation times of objectives are assumed, one evaluation is typically equivalent to evaluating one solution on all objectives that the problem has with the stopping criterion being a given maximum number of evaluations. When simulating a real problem with latencies, the maximum number of function evaluations available can be different for each of the objectives, meaning not all solutions can be evaluated on all objectives. Moreover, depending on the problem at hand, the stopping criteria may indeed be only the maximum number of function evaluations on both objectives (regardless of the number of time steps used up) (as used in~\cite{chugh2018surrogate,10.1145/3377930.3390147}) but it can also be the maximum number of time steps available (as used in~\cite{ejor:Latencies,allmendinger2013hang}). The latter would apply in the case where the optimization process has to be terminated within a certain time frame. When simulating a real problem with latencies, it is also important to reveal objective values to the optimizer only when the simulated evaluation of an objective is complete. If solutions can be evaluated in a batch, then multiple objective values are revealed in one go. In~\cite{thomann2019trust,thomann2019representation,thomann2019trust_PhD}, the difference in evaluation times of the slow and fast objective was not simulated, solutions were not evaluated in parallel, and search was terminated if there is no improvement in a solution's objective function values. Also, since the slow objective was evaluated only if the surrogate model was not accurate enough, it is unknown a priori how often the slow and fast objective will be evaluated. This setup needs to be taken into account when tackling a practical problem. \subsubsection{Test problems} In an ideal world, one would evaluate an algorithm on a real problem featuring heterogeneous evaluation times. However, this is not feasible because it would usually be too cost and time prohibitive, especially considering that a (stochastic) algorithm would need to be executed multiple times on a problem to obtain information about statistical significance in performance results. This is a typical issue in expensive optimization. Consequently, it is suggested and also accepted by the community, to adapt existing test problems to simulate heterogeneity in the objectives. This is the approach taken to validate all algorithms described above. To simulate heterogeneity in the objective evaluation time, one can simply take any existing multi/many-objective test problem, and declare one/some of the objectives as slow (expensive) and also specify by how much these are slower than the other objectives. In principle, this way one can create a problem where all objectives differ in their evaluation time. Consequently, one can study the impact on algorithm performance of different ratios between the slow and fast objective(s), as done, for example, in~\cite{allmendinger2013hang,ejor:Latencies,chugh2018surrogate,10.1145/3377930.3390147}. Of course, if the underlying problem has configurable problem parameters, then the impact of these on heterogeneous evaluation times can be investigated too. For example, in~\cite{ejor:Latencies,chugh2018surrogate} we proposed a binary and continuous bi-objective toy problem with configurable correlation levels between the fast and slow objective, in~\cite{ejor:Latencies} we investigated the impact of the landscape ruggedness on algorithm performance (using MNK landscapes), and in~\cite{thomann2019trust_PhD} the impact of varying the number of decision variables was investigated. All research so far on heterogeneous objective evaluation times considered problems with exactly one slow objective, and at least one fast objective. Typically, a random objective or the most difficult objective (as done in~\cite{thomann2019trust_PhD}) was declared as the slow objective. \subsubsection{Validating performance} It is obvious that any new proposed algorithm for dealing with heterogeneous objective evaluation times should be compared against other methods designed for the same purpose. As a baseline, it makes sense to compare with Waiting (to mimic a naive approach), and, to upper bound performance, to optimize the same problem without heterogeneity (i.e., assume that all objectives have the same evaluation time). So far, standard performance metrics designed for multiobjective optimization were used to measure algorithm performance, such as IGD and the hypervolume metric, and, for the non-evolutionary approaches proposed in~\cite{thomann2019trust_PhD}, the number of Pareto optimal solutions and functions evaluations needed to discover these were recorded. To understand visually whether the heterogeneity in evaluation times introduced any search bias (e.g., towards the optimization of the fast objective), plotting the median attainment surface is a reasonable approach (though this is applicable to bi and tri-objective problems only). \section{Related research}\label{sec:RelatedResearch} Research on heterogeneous objectives can be related to and gain inspiration from a number of other areas in the literature. In the following we briefly discuss some of these relationships. An obvious connection exists with the use of asynchronous evolutionary algorithms in MO in distributed environments as arising, for example, in grid computing, multi-core CPUs, clusters of CPUs or on virtual clouds of CPUs~\cite{scott2015evaluation,yagoubi2011asynchronous,lewis2009asynchronous}. Here it is assumed that the cloud computing resource induces heterogeneity and/or unreliability causing the evaluation time of a solution to vary across computing resources. This introduces asynchronicity across the population and not across the individual objectives, which is our focus. Despite considering a different problem setup, the research questions in the two areas are similar and are centred around understanding (i)~how to utilize efficiently the available resources to perform MO in the presence of heterogeneous resources (per solution vs per objective) and (ii)~the bias induced by heterogeneity on the search path taken by the optimizer (bias towards search regions quick to evaluate solutions vs quick to evaluate objective ). Machine learning methods focused on dealing with missing data~\cite{little2019statistical,garcia2010pattern,allison2001missing} and surrogate models~\cite{allmendinger2017surrogate,tabatabaei2015survey,SnoLarAda2012nips} are of importance when designing algorithms for coping with heterogeneous objectives. In particular, these methods can be used to substitute missing objective function values with proxies and substitute expensive functions with an approximation function that is cheap to evaluate, respectively. This is relevant, for example, when dealing with heterogeneity in the evaluation times of objectives, and MO problems that are subject to interruptions or ERCs. The application of surrogate-assisted methods to batch optimization~\cite{azimi2010batch,gonzalez2016batch,chugh2016surrogate} and asynchronous batch optimization~\cite{ginsbourger2011dealing,SnoLarAda2012nips} is also highly relevant to multiobjective problems with differing latencies. The application of transfer learning~\cite{pan2009survey}, potentially combined with dimensionality reduction~\cite{van2009dimensionality}, as done by T-SAEA~\cite{10.1145/3377930.3390147} (see above), is another machine learning methodology that can find application to problems with heterogeneous objectives beyond problems with latencies. Methods for dimensionality reduction can also be applied to the objective space~\cite{brockhoff2009objective} with the aim of homogenizing the objectives. For example, removing an expensive objective that is positively correlated with a cheap objective, would reduce the total number of objectives and homogenize the set of remaining objectives, simplifying their optimization. A potential issue with this approach is that the level of correlation between objectives is a statistical observable that may not hold all over the entire search space and in particular may not hold crucially at or near optimality. Scheduling concepts and methods~\cite{gonzalez2016batch,kalashnikov2013mathematical,talbi2008parallel,brucker1999resource} are also of relevance for MO problems with heterogeneous objectives, especially when faced with latencies or ERCs. Here, scheduling methods can help, for example, to decide on when to evaluate which solution on which objective such that, for example, idle time where no objective is being evaluated is minimized, and existing resources required for evaluating an objective are being utilized most efficiently. To cope with heterogeneous objectives, inspiration can be gained, for example, from classical resource-constrained scheduling~\cite{brucker1999resource}, parallelization of MO algorithms~\cite{talbi2008parallel}, queuing theory~\cite{kalashnikov2013mathematical} and batch expensive optimization~\cite{gonzalez2016batch}. \section{Conclusions and future work}\label{sec:FutureResearch} This chapter reviewed the topic of multi/many-objective optimization problems with heterogeneous objectives, meaning the objectives vary in different aspects, such as computational complexity, evaluation effort, or determinism, or a combination of these. Although heterogeneous objectives exist in practical applications, very little research has been carried out by the community to address this problem feature. This chapter started by describing motivational examples of problems with heterogeneous objectives, followed by the introduction of basic concepts and a taxonomy for modelling heterogeneity. We then discussed different types of heterogeneity, described existing algorithms designed for coping with heterogeneous objectives, and reviewed benchmarking considerations arising due to heterogeneity. Finally, we have reviewed related research. The algorithm part of the chapter was focused largely on a particular type of heterogeneity, namely different evaluation times of objectives, as this is the only type that has gained attention in the community, originating from work carried out by the authors of this chapter. The chapter has highlighted that heterogeneous objectives exist in a range of practical applications, and, although the community has started to look at this issue, there is much more that can and needs to be done. First and foremost, we need to raise awareness in the decision and data science community and amongst practitioners about the meaning of heterogeneous objectives and that we have approaches to cope with this issue. This chapter will hopefully contribute to this aspect. However, at the same time, it needs to be made clear that the existing approaches have limitations, and that the only type of heterogeneity investigated so far is different evaluation times of objectives (where one objective is slow and the others fast to evaluate). More research is needed to extend the existing methods to cope with many-objective problems where the objectives can be of any duration (and not of two modes only, slow vs fast). The development of methods to cope with other types of heterogeneity is needed too, and so are methods for problems where heterogeneity of multiples types exist in one problem. There is also a need for a customized benchmarking process. In particular, configurable many-objective test problems to simulate and adjust heterogeneity are needed, and existing performance metrics and visualisation tools may need to be adjusted/extended to understand further the impact of heterogeneous objectives. We look forward to future progress by the field in these directions. \bibliographystyle{plain}
\section{Introduction} \label{sec:Introduction} Chemists usually think of a transition state as a stationary-point structure connecting a reactant with one product state, thus linking two minima on the potential energy surface (PES). However, it is well established that PESs can also feature bifurcations which open the opportunity to explore pathways that start at the same reactant, share the same path for a while, but lead to more than one reaction channel at some point, thus connecting the same reactant to more than one product state.\cite{Ess2008,Rehbein2011} As will be described in more detail below, such bifurcations along a reaction pathway usually occur after a transition state, leading to what is called ``downhill bifurcations'', but in rare cases so-called ``uphill bifurcations'' occur before even reaching a transition state. Chemical substitution represents the classic way to change the PES and, thus, to manipulate also such bifurcations. Within this traditional approach, the underlying energy landscape gets changed due to steric and other electronic effects which can offer the possibility to arrive at new reaction pathways.\cite{Jones2001,Limanto2003,Wang2005,Katori2010} Obviously, these manipulations can only be realized in a discrete manner by exchanging one atom or a group of atoms by another one. In stark contrast, it is well established in the framework of covalent mechanochemistry~\cite{Beyer2005,Caruso2009,Ribas-Arino2012,Stauch2016} that potential energy landscapes, i.e. PESs, can be {\em continuously} distorted as a result of applying external forces to molecules.\cite{Ong2009,Ribas-Arino2009,% Ribas-Arino2012} As reviewed in depth from the experimental~\cite{Caruso2009} and computational~\cite{Ribas-Arino2012} viewpoints, mechanochemical activation can lead to different products from the usual thermally or photochemically favored ones, if sufficiently large forces are applied. In the following, we will explore in detail for a specific system class, namely for cyclopropanes, how bifurcations can be systematically tuned by means of applying such mechanical forces to molecules. \begin{figure} \begin{center} \centering \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Bifurkation_Downhill} \subcaption{Downhill} \label{fig:Bifurcations_Generell_Downhill} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Bifurkation_Uphill} \subcaption{Uphill} \label{fig:Bifurcations_Generell_Uphill} \end{subfigure} \caption{% Schematic potential energy surfaces with downhill (a) and uphill (b) bifurcations. The reactions in (a) and (b) proceed from top to bottom and from bottom to top, respectively, as indicated by the two vertical arrows to the left of the landscapes. } \label{fig:Bifurcations_Generell} \end{center} \end{figure} A scenario that is rather often found in the literature are bifurcations in the post-transition state region as sketched in Fig.~\ref{fig:Bifurcations_Generell}(a), which are usually denoted as downhill bifurcations. The common pathway that starts in the reactant state ascends in energy (not visible in the figure) until it reaches the transition state $\textrm{TS}_{\textrm{Rct}}$ and from there on it exclusively moves downhill in energy (from top to bottom in Fig.~\ref{fig:Bifurcations_Generell}(a)) as in any standard chemical reaction. At some distinct point upon moving toward the product state, however, the common path arrives at the bifurcation where it splits into two separate pathways which ultimately lead to two different minima denoted as Prod$_{1}$ and Prod$_{2}$ in Fig.~\ref{fig:Bifurcations_Generell}(a). These two products, in turn, are connected by a second transition state, $\textrm{TS}_{\textrm{1-2}}$, which is related to the direct interconversion of Product~1 and~2. Thus, a PES exhibiting a downhill bifurcation possesses two close-lying and consecutive transition states with no local minimum in between. Much more seldomly found, and thus of considerable fundamental interest, are uphill bifurcations such as the one sketched in Fig.~\ref{fig:Bifurcations_Generell}(b). An uphill bifurcation is best described by a reaction path that starts at the reactant minimum and leads uphill in energy while initially passing through a unique valley akin to any standard chemical reaction thereby moving from bottom to top in Fig.~\ref{fig:Bifurcations_Generell}(b). At some specific point, however, the valley branches at the bifurcation {\em before} any transition state is reached and two new valleys with their own subsequent transition states, labeled as TS$_1$ and TS$_2$ in Fig.~\ref{fig:Bifurcations_Generell}(b), emerge. Although downhill bifurcations are, for instance, well-established in the realm of thermal cycloaddition reactions~\cite{Yu2015,Yu2017}, uphill bifurcations are far less frequently described in the extant literature~\cite{Valtazanos1986,Baker1988,Quapp2001,Windhorn2003,Lasorne2005}. Indeed, this rare topological phenomenon has not been addressed at all in recent authoritative overview articles on reaction path bifurcations~\cite{Ess2008,Rehbein2011}, whereas a rigorous definition can be found in Ref.~\citenum{Quapp2004}. Mechanochemical ring-opening of cyclopropane derivatives (see Fig.~\ref{fig:reaction}) might be a good candidate reaction to search for force-induced bifurcation changes in view of various surprising findings in the recent literature.\cite{Lenhardt2009,Lenhardt2010,% Dopieralski2011,Akbulatov2012,Klukovich2013,Wang2014,Wollenhaupt2015,Wang2015,Wang2015b,Martinez-Craig-2015,boulatov-craig-2016,Wang-2016} In particular, \textit{ab initio} molecular dynamics simulations at constant force revealed very puzzling behavior of {\em trans}-1,1-dichloro-2,3-dimethyl\-cyclo\-propane upon disrotatory ring-opening at finite temperatures,\cite{Dopieralski2011} namely the preferential generation of two different diastereomers depending on the magnitude of the force (see Fig.~3 in Ref.~\citenum{Dopieralski2011}); note that this reactant, which is (2\textit{S},3\textit{S})-1,1-dichloro-2,3-dimethyl\-cyclo\-propane, is abbreviated in the literature by \textit{trans}-\textit{gem}-dichlorocyclopropane or by {\em trans-g}DCC. Spurred by the findings, we explored the force-transformed potential energy surfaces (FT-PES) of this cyclopropane derivative in more detail based on static isotensional calculations and discovered a qualitative change in the energetically preferred reaction channel.\cite{Wollenhaupt2015} Analyzing the Intrinsic Reaction Coordinates (IRC), we could show that disrotatory ring-opening, which is symmetry-allowed in the thermal limit at zero force, switches to the conrotatory process at forces exceeding about 1.6~nN (being symmetry-forbidden in the thermal activation limit).\cite{Wollenhaupt2015} Moreover, we demonstrated that the conrotatory mechanism does even exist down to zero force where it is symmetry-forbidden, albeit as a high-energy reaction channel.\cite{Wollenhaupt2015} These key computational findings~\cite{Wollenhaupt2015} are in line with a subsequent publication on single-molecule force spectroscopy measurements.\cite{Wang2015} In this work, we significantly transcend the current knowledge by demonstrating that a system class as simple as cyclopropane derivatives indeed features not only downhill but also uphill bifurcations which can be manipulated systematically by applying mechanical forces. The \textit{trans}-\textit{gem}-dihalocyclopropanes being in the focus of the present study are able to undergo disrotatory and conrotatory ring-opening reactions together with subsequent halogen migration to one or the other neighboring carbon site within the three-membered ring as shown in Fig.~\ref{fig:reaction}. In case of the fluorine disubstituted system it is important to note that halogen migration corresponds to a higher-lying reaction channel than the experimentally observed ring-opening/closing process,\cite{Borden1994,Borden1998_exp} which we discuss in detail in Sec.~1.2 of the SI. Ring-opening with subsequent halogen migration leads to four product species in total which can be classified in terms of Woodward-Hoffmann (WH) allowed and forbidden electrocyclic reactions as a result of thermal activation together with the migration direction of the halogen. Upon mechanochemical activation, it will be unveiled that this system features fundamental topological phenomena since both contributions to the full reaction mechanism are connected to uphill/downhill bifurcations that can be tuned by external force. In order to set the stage, we initially investigate the disrotatory reactions of differently substituted dihalocyclopropanes which are the WH allowed processes upon thermal activation. We discover that the bifurcations deciding on the migration direction of the moving atom depend on the particular halogen, and thus that these bifurcations can indeed be manipulated by means of classic chemical substitution. For the total disrotatory and conrotatory reaction profile of \textit{trans}-\textit{gem}-dichlorocyclopropane we find both types of bifurcation to be present at zero force. The subsequent core part of our investigation is focused on how both the downhill and uphill bifuractions in the dichloro derivative can be manipulated by applying tensile forces to the two methyl substituents and, in addition, reveals catastrophes at specific critical force magnitudes. \section{Results and Discussion} \label{sec:Results and discussion} \subsection{Chemical Substitution of Cyclopropanes: From Fluorine to Iodine} \label{subsec: Chemical Substitution: From Fluorine to Iodine} \begin{figure} % \centering \includegraphics[width=0.4\textwidth]{Reaktant_und_Produkte} \caption{% The reactant species (i.e. (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethylcyclopropanes a.k.a. \textit{trans}-\textit{gem}-dihalocyclopropanes or {\em trans-g}DHC) at the center and the corresponding four products in the corners are schematically depicted including their IUPAC nomenclature as well as our short hand notation that is used in the present work; see Sec.~1.1 in the SI for details regarding our nomenclature. } \label{fig:reaction} \end{figure} As a first step toward investigating putative force-induced topology changes of the PES of cyclopropane derivatives, cf. Fig.~\ref{fig:reaction}, the bifurcation structures of the (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethylcyclopropanes are analyzed in the usual thermal limit for the fluorine up to iodine disubstituted species. It is found that the difluorinated cyclopropane derivative exhibits two separate disrotatory transition states, one leading to what we call the fluorine-left-product whereas the other one connects to the fluorine-right-product (left and right being defined for the migration of the halogen within our reference frame as specified in Fig.~S1 of the SI). These two transition states correspond to energetically higher-lying reaction pathways compared to the theoretically~\cite{Borden1994} predicted and experimentally~\cite{Borden1998_exp} established ring-opening/closing reaction channels of this system as detailed in Sec.~1.2 of the SI. However, in the present case exactly these higher-lying reaction pathways of the ring-opening and subsequent fluorine migration processes are of fundamental interest in order to coherently compare the changes of the PES upon chemical substitution. The paths to these two first-order saddle points on the PES start at the same stationary point representing the reactant species and initially share the identical pathway, both structurally and energetically, when moving uphill (the energies along the corresponding IRCs are shown in Fig.~S3 of the SI). At some specific point, however, an uphill bifurcation occurs where two distinct pathways emerge which evolve separately {\em via} their own transition states, TS$_{\rm left}$ and TS$_{\rm right}$, to two different stationary states being the respective disrotatory products, dis-left and dis-right, as illustrated in Fig.~\ref{fig:Bifurcations_Halogens}(a). This is exactly the scenario that has been discussed in the introduction with the help of Fig.~\ref{fig:Bifurcations_Generell}(b) and therefore adds (2\textit{S},3\textit{S})-1,1-difluoro-2,3-dimethylcyclopropane to the few known chemical reactions that feature an uphill bifurcation.% \begin{figure} \begin{center} \centering \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Reaction-Schemata_Halogen-Substitution_Fluor_Uphill} \subcaption{Substitution with fluorine:\\ Uphill bifurcation.} \label{fig:Bifurcations_Halogens_Fluor_Uphill} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Reaction-Schemata_Halogen-Substitution_Cl-Br-I_Downhill} \subcaption{Substitution with chlorine, bromine, and iodine: Downhill bifurcation.} \label{fig:Bifurcations_Halogens_Cl-Br-I_Downhill} \end{subfigure} \caption{% Disrotatory reaction schemes depending on the dihalogen substitution of (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethylcyclopropane in the thermal reference case (corresponding to the zero-force limit). Reactant and product minima, transition states, and bifurcations are depicted in blue, red and green, respectively. } \label{fig:Bifurcations_Halogens} \end{center} \end{figure}% In stark contrast to the difluoro species, substitution with chlorine, bromine and iodine leads to one common thermal disrotatory transition state, TS$_{\rm reaction}$, and a subsequent downhill bifurcation such as the one sketched in Fig.~\ref{fig:Bifurcations_Generell}(a) that decides about the direction of the migration of the moving halogen atom to the dis-left and dis-right product states. Investigating the evolution of particular vibrational modes along IRCs has recently been successfully employed in order to analyze bifurcations~\cite{Maeda2015}, although frequency analyses have to be interpreted carefully if the analyzed structure is not a stationary point on the PES. (see also Sec.~1.4 in the SI). In the present case, the evolution of the lowest two frequencies of the fluorine species along the IRC corresponding to the thermal disrotatory ring-opening reaction depicted in Fig.~\ref{fig:Freqs-along-IRCs_Halogens}(a) is distinctly different from that of the chlorine~(b), bromine~(c) and iodine~(d) disubstituted cyclopropane derivatives (which all look quite similar). Only one imaginary frequency is observed for disrotatory ring-opening of the difluoro species which is related to the fluorine-carbon stretch that belongs to the transition state of the overall reaction either along TS$_{\rm left}$ or TS$_{\rm right}$ toward the dis-left and dis-right product, respectively. The appearance of a single imaginary frequency along a reaction path that bifurcates, which is left/right fluorine migration in the present case as indicated using solid/dashed lines in Fig.~\ref{fig:Freqs-along-IRCs_Halogens}(a), is a characteristic feature of the above-mentioned uphill bifurcation being in accord with the topology of Fig.~\ref{fig:Bifurcations_Generell}(b). \begin{figure} \begin{center} \centering \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Lowest2Freqs_F-c3_Dis_F_0000} \subcaption{Fluorine} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Lowest2Freqs_c3_Dis_F_0000} \subcaption{Chlorine} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Lowest2Freqs_Br-c3_Dis_F_0000} \subcaption{Bromine} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{Lowest2Freqs_I-c3_Dis_F_0000} \subcaption{Iodine} \end{subfigure} \caption{Frequency analysis along the IRCs for disrotatory ring-opening of (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethylcyclopropane derivatives subject to F~(in panel~a), Cl~(b), Br~(c), and I~(d) disubstitution in the thermal reference case, $F_0=0$~nN. The evolution of the magnitude of the two lowest frequencies (negative values correspond to imaginary frequencies) is shown from the reactant state {\em via} the transition state to the product state. } \label{fig:Freqs-along-IRCs_Halogens} \end{center} \end{figure} In comparison to the fluorine case, the IRCs of the three other halogen derivatives feature more than one imaginary frequency. The same halogen-carbon stretch as in the fluorine case becomes most prominently imaginary when reaching the transition state, followed by one additional imaginary frequency that is directly related to the bifurcation that sets in after having passed TS$_{\rm reaction}$ when moving toward the products. It is essentially a bending vibration that is mainly related to the halogen left/right migration leading directly to the dis-left/right products and also describes the pathway that directly interconverts the dis-left and dis-right products via TS$_{\rm 1-2}$; a detailed decomposition of this frequency analysis along the reaction paths for the chlorine case even for the force transformed PES can be found in Sec.~1.4.2 of the SI. This mode softening scenario agrees nicely with what is expected for a downhill bifurcation according to the generic PES in Fig.~\ref{fig:Bifurcations_Generell}(a). It is concluded that the difluorinated derivative of (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethyl\-cyclo\-propanes features one of the rarely observed uphill bifurcations upon thermally activated ring-opening followed by fluorine migration, while the dichlorine species is found to be the first one in this halogen homologous series that is characterized by a downhill bifurcation instead. \subsection{Mechanochemistry of Dichlorocyclopropane: Force-induced Topology Changes} \label{subsec: Mechanical forces on / Mechanochemistry of Chlorine-Derivative: Reactant regime / part} What has been unveiled in the previous section provokes the question if it might be possible to manipulate the bifurcation scenario of the dichlorocyclopropane species upon applying tensile stress with the aim to systematically influence the bifurcations. The remainder of this investigation will focus on that question by discussing the behavior of (2\textit{S},3\textit{S})-1,1-dichloro-2,3-dimethylcyclopropane as a function of constant force. Within this section, the global changes of the Born-Oppenheimer PES upon its force-transformation will be discussed, culminating in a topological catastrophe when reaching a specific critical force $F_0^{\rm crit}$. Afterwards, the topological details in terms of how the uphill and downhill bifurcations and transition states shift as a function of mechanical force will be addressed separately for the respective parts of the FT-PES in the subsequent sections. A broad understanding of the reaction behavior of this cylcopropane derivative under the influence of finite tensile forces has been obtained earlier based on dynamical explorations of wider regions of its energy landscape.\cite{Dopieralski2011} This included extensive mappings of multi-dimensional free energy surfaces for disrotatory ring-opening based on isotensional {\em ab initio} metadynamics as well as corresponding trajectory shooting simulations at a set of finite forces. Our subsequent static analysis of not only the disrotatory pathway as before,\cite{Dopieralski2011} but also of the conrotatory ring-opening along the corresponding IRCs as a function of the external force has brought deeper insights into the evolution of the electronic structure along these distinct reaction channels.\cite{Wollenhaupt2015} \begin{figure*}[htb] \centering \includegraphics[width=0.65\textwidth]{PES-Wolke_+_Reactionsschemata} \caption{% Force-transformed effective potential energy surfaces (FT-ePES) at two different constant forces of $F_{0}=1.0$~nN and $F_{0}=2.0$~nN in panel~(a) and~(b), respectively, depicted in the reaction subspace spanned by the three selected collective variables (see text) as indicated. In addition, high/low energy parts of the FT-ePES are encoded using red/blue colors. The corresponding Dijkstra paths (see Sec.~1.6 in the SI for details) are included using a necklace representation. Panel~(c) introduces the stereochemical formula of the (2\textit{S},3\textit{S})-1,1-dichloro-2,3-dimethylcyclopropane reactant, its atom numbering, and also indicates how the constant colinear force $F_0$ acts on the two methyl groups. Panels~(d) and~(e) represent the two topologically distinct reaction schemes valid for zero (and moderate) forces in~(d) and large forces in~(e) corresponding to the FT-ePES of panel~(a) and~(b), respectively, and also display the stereochemical formulae of all products. } \label{fig:ReactionSchemes} \end{figure*} In what follows, we combine these approaches in the sense that we now use isotensional {\em ab initio} molecular dynamics at several constant forces (within the EFEI approach as explained in the SI) in order to sample a vast ensemble of configurations with corresponding electronic energies. This allows us to generate the FT-PES as a function of force in a low-dimensional subspace which, in a second step, will be analyzed in terms of bifurcations and a catastrophe after adopting a static topology viewpoint; the generation of the FT-PES based on isotensional trajectories at a set of constant forces is explained in Sec.~1.5 of the SI. Three key structural parameters or collective variables (CVs) have been identified of being able to describe the important aspects of the processes in a reduced reaction subspace, see Fig.~\ref{fig:ReactionSchemes}, rather than considering all internal degrees of freedom in full dimensionality. As the ring-opening and thus the bond breaking of the carbon-carbon bond within the three-membered cyclopropane ring constitutes a major part of the reaction, the corresponding distance \mbox{(C2--C4)} has been chosen as the first variable, CV1. Next, the dihedral angle of what we call the right methyl group is used as CV2 to discriminate between disrotatory and conrotatory trajectories. Last but not least, in order to differentiate between the left and right products, the relative position of the migrating chlorine atom, which is Cl7, is employed as our third dimension, CV3. Therefore, the resulting FT-PES is not represented in the full-dimensional space defined in terms of all internal degrees of freedom, but in the three-dimensional (3D) reaction subspace spanned by the chosen collective variables, i.e. PES(CV1,CV2,CV3), which is why we call it the (force-transformed) ``effective potential energy surface'' \mbox{(FT-) ePES}. This dimensionality reduction from 39 down to only~3 variables turns out to be crucial not only to analyze, but also to visualize the force-induced changes of the bifurcations. On the FT-ePES, all four reaction paths from the reactant to the four possible products have been located by applying the Dijkstra algorithm,\cite{Dijkstra1959} thus providing what we call Dijkstra paths. Note that standard approaches to determine reaction pathways fail to map bifurcations which are usually not stationary points. The Dijkstra algorithm, in detail described in Sec.~1.6.1 of the SI, is therefore crucial to fully understand the changes of the ePES with respect to force transformation. Depending on the magnitude of the applied external force, we have found two topologically distinct reaction schemes that can connect the same reactant state with the four products. These scenarios correspond to uphill and downhill bifurcations according to panels~(a,c) and (b,e) in Fig.~\ref{fig:ReactionSchemes} which are separated by a catastrophe that is triggered when using the magnitude of the external force as the control parameter in the spirit of catastrophe theory.\cite{Gilmore1981} For clarity, we will first describe and explain the reaction course that is observed at zero force, i.e. in limit of a thermally activated process, which is a scenario that is still topologically valid at moderate finite forces. As depicted in the left part of Fig.~\ref{fig:ReactionSchemes}, the processes leading to the four products share initially the same pathway on the FT-ePES. At some point, however, an uphill bifurcation deciding between disrotatory and conrotatory ring-opening occurs (denoted by ``dis-con bifurcation'' in panel~(a) of Fig.~\ref{fig:ReactionSchemes}) where the common path splits into two distinct ascending reaction channels before any transition state is reached. After having passed this bifurcation that is still on the reactant side of the energy landscape, each of the paths climbs further up in energy and reaches its own transition state, denoted by con- and disrotatory TS in panel~(a); note that irrespective of the occurrence of (uphill/downhill) bifurcations along a specific path the transition state remains always the (stationary first-order saddle) point of highest energy along that pathway whereas bifurcations do usually not correspond to stationary points and thus cannot be detected using the standard geometry optimizers in quantum chemistry packages. Only from the transition state on do the pathways descend in energy toward the products. One of the transition states corresponds to the disrotatory ring-opening reaction, whereas at the other the methyl groups rotate in the same fashion thus following a conrotatory mechanism. Overall, we observe the following scenario at zero up to moderate forces, see Fig.~\ref{fig:ReactionSchemes}(d). All four paths are degenerate before reaching the uphill bifurcation in the ascending part of the FT-ePES where they split into two pairs which remain degenerate all the way up to their transition states. After having passed their own transition state, thus being now on the descending side of the FT-ePES, they remain degenerate for a while before reaching the downhill bifurcation, where they finally split into left and right products. Hence, the four respective product channels represent a combination of con/disrotatory ring-opening and left/right chlorine migration that involve uphill and downhill bifurcations, respectively. At forces higher than a specific critical value (denoted as $F_{0}^{\rm{crit}}$, see next section for its quantification), the reaction scenario changes significantly as supported by the topology changes of the FT-ePES, see right panels of Fig.~\ref{fig:ReactionSchemes}. In this high-force regime, again all four paths start in the reactant minimum but remain degenerate and thus do not bifurcate before they reach their common transition state. In contrast to the reaction route at sub-critical forces including the thermal activation limit, the FT-ePES in Fig.~\ref{fig:ReactionSchemes}(b) does not contain any uphill bifurcation since a common transition state is reached directly after the ascending side of the energy landscape. After this joint transition state, however, a first downhill bifurcation can be found which leads to the splitting of the common pathway into two reaction channels (each being two-fold degenerate) corresponding to disrotatory and conrotatory ring-opening. Subsequently, yet another pair of downhill bifurcations occurs which decide on the left/right movement of the migrating chlorine atom (Cl7) after either con- or disrotatory ring-opening, and thus lift the remaining degeneracy by splitting the two paths for a second time. \subsection{Mechanochemistry of Dichlorocyclopropane: Reactant Regime} \begin{figure} \centering \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-Reactant_+_Marked-Paths_F_0-00} \subcaption{$F_{0}$ = 0.0 nN} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-Reactant_+_Marked-Paths_F_1-00} \subcaption{$F_{0}$ = 1.0 nN} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-Reactant_+_Marked-Paths_F_1-50} \subcaption{$F_{0}$ = 1.5 nN} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-Reactant_+_Marked-Paths_F_2-00} \subcaption{$F_{0}$ = 2.0 nN} \end{subfigure} \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-Reactant_+_Marked-Paths_F_3-00} \subcaption{$F_{0}$ = 3.0 nN} \end{subfigure} \caption{Schematic illustration of the disrotatory and conrotatory Dijkstra paths on a set of 2D-slices of the 3D FT-ePES obtained at different constant forces from the thermally activated limit at 0~nN in panel~(a) up to 3~nN in (e). The $x$-axis represents the dihedral angle of the methyl group (CV2) whereas the $y$-axis corresponds to the length of the breaking carbon-carbon bond (CV1). The reaction paths lead from the reactant region (bottom part of each panel) to the region of transition state/s (central part) and finally toward the dis- and conrotatory products (left and right upper parts, respectively); the arrow heads indicate the transition states whereas the branching points correspond to the bifurcations. The reactant energy is set to \SI{0}{\kilo\calorie\per\mole} for each FT-ePES and the depicted energy contour lines are separated by an equidistant spacing of \SI{2}{\kilo\calorie\per\mol} where red encodes increasing and blue decreasing energies compared to the reactant energy. } \label{fig:2D-Slices-Reactant_Energies_+_marked_Paths} \end{figure} The quasi-3D representations of Fig.~\ref{fig:ReactionSchemes}(a) and (b) are useful to visualize and discuss the global topology corresponding to the sub- and super-critical reaction scenarios, respectively, as they take place on the FT-ePES. Yet, only their reduction to specifically selected two-dimensional slices allows one to gain deeper insights as depicted in Fig.~\ref{fig:2D-Slices-Reactant_Energies_+_marked_Paths} for several constant forces from the thermal activation limit in panel~(a) up to 3~nN in (e). These 2D-slices have been optimized in such a way that they cover the relevant parts of the 3D-PES with a focus on those regions where the bifurcations take place; one coordinate is essentially the breaking carbon-carbon bond and thus describes the first part of the reaction progress whereas the second coordinate is mostly the methyl dihedral and thus discriminates between the con- and disrotatory parts of the FT-ePES. The energy barriers for the reaction, being the difference between the reactant and the transition state regions, decrease with increasing mechanical forces (see Sec.~1.6.2 and~1.6.3 in the SI for reaction paths on the FT-ePES). The force-dependent Dijkstra paths corresponding to the disrotatory and conrotatory ring-opening are schematically sketched on these 2D-slices using lines and arrows as collected in Fig.~\ref{fig:2D-Slices-Reactant_Energies_+_marked_Paths}; see Sec.~1.6.1 in the SI for details on computing the Dijkstra paths numerically. At zero force, i.e. in the thermal reference case~(a), all paths start at the same reactant but diverge readily afterwards. The left paths lead to the disrotatory side of the FT-ePES while the right paths connect the reactant to the conrotatory products; note that the left/right migration that decides about the final product after the ring-opening cannot be seen in this subspace of coordinates. As seen from the pattern of the contour lines, the initial part of the reaction channel is quite wide, which provides the possibility for an early divergence of the two paths that eventually lead to the dis- and conrotatory products. Clearly, the bifurcation between disrotatory and conrotatory ring-opening is positioned on the part of the FT-ePES with ascending energy, i.e. long before the two corresponding transition states are reached and, therefore, represents an uphill bifurcation. The two distinct transition states for the dis- and conrotatory reactions, TS$_\text{dis}$ and TS$_\text{con}$, are located in the central left and right region about where the arrow heads are. Moreover, the two transition states are clearly separated from each other by an energy barrier which keeps these two reaction channels apart. This zero-force scenario is qualitatively valid up to a force of roughly 1.5~nN as shown in panel~(c). With increasing force, however, in the vicinity of the reactant, the reaction channel gets more narrow, which can be seen from the changing shape of the contour lines in the lower part moving from (a) to (b) to (c). More importantly, the two paths leading eventually to the dis- and conrotatory processes are found to increasingly share the same part of the FT-ePES, which graphically shifts the bifuraction region upwards in the graphs upon increasing the force. Concurrently, the disrotatory and conrotatory transition states approach each other both structurally and energetically, implying that the energy barrier in between them gets systematically suppressed. The significant qualitative change with respect to the zero- to moderate-force scenario can most clearly be detected at a force of 3~nN, see Fig.~\ref{fig:2D-Slices-Reactant_Energies_+_marked_Paths}(e). Now, the bifurcation into dis- and conrotatory ring-opening pathways occurs clearly after a common transition state TS$_\text{reation}$ which is shared by the two distinct ring-opening processes. This implies that the bifurcation into dis- and conrotatory ring-openings occurs thereafter and, thus, that it is a downhill bifurcation at such sufficiently large forces. In effect, the uphill bifurcation in the thermally activated reference case has been turned into a downhill bifurcation and thus has been shifted from the reactant (energy ascending) side of the energy landscape to the product (descending) side upon mechanochemical activation. In concert with this force-induced shift, the two formerly separated dis- and conrotatory transition states become confluent at sufficiently large forces and thus generate a single transition state that is common to both ring-opening reactions; note that the subsequent left/right bifurcation related to chlorine migration remains on the downhill (product) side irrespective of the force as will be discussed later. All these phenomena are already present at 2~nN in~(d). \begin{figure*} \centering \includegraphics[width=0.9\textwidth]{TS-Verschmelzung} \caption{ Schematic representation of the force-induced distortions of the potential energy surface (FT-PES) in the region around the disrotatory ($\textrm{TS}_{\textrm{dis}}$) and conrotatory ($\textrm{TS}_{\textrm{con}}$) transition states. The cut through the FT-PESs is chosen to be perpendicular to the pathways {\em via} both $\textrm{TS}_{\textrm{dis}}$ and $\textrm{TS}_{\textrm{con}}$ which implies that the transition states appear as minima along the $x$-axis in this scheme whereas the central barrier is the one that energetically separates the two distinct pathways. Increasing the magnitude of the external force $F_0$ transforms the topology of the energy landscape from the one characterizing the sub-critical regime sketched in~(a) and also in~(b) to that in the super-critical limit depicted in~(c). The rightmost diagram~(d) visualizes as a function of the control parameter $F_0$ the change of topology upon increasing the force beyond its critical value, $F_0 = F_{0}^{\rm{crit}}$, where the topological catastrophe occurs. } \label{fig:TS_Vereinigung-Schema} \end{figure*} Based on this topological analysis, we conclude from the distortion of the FT-ePES that the catastrophe, which switches the topology from the reaction scenario valid in the thermal limit up to moderate forces (see Fig.~\ref{fig:ReactionSchemes}(a) and (d)) to the large-force scenario (see Fig.~\ref{fig:ReactionSchemes}(b) and (e)), occurs at a critical force $F_0^{\rm crit}$ that is bracketed by 1.5 and 2.0~nN. However, being close to the topological catastrophe, that part of the FT-ePES in panel~(d), which covers the confluence of the two distinct transition states and the concurrent conversion of the uphill into a downhill bifurcation which needs to shift onto the other side of the new joint transition state, is very flat close to the critical force. This is borne out by analyzing the force-transformed energy profiles on the FT-ePES along the two Dijkstra paths corresponding to the dis- and conrotatory ring-opening processes, see Fig.~S8(a) of the SI. As one can see, the conrotatory curve only slowly approaches the lower-lying disrotatory one upon increasing $F_0$ such that the energy difference between the two processes eventually becomes insignificant before reaching $F_0^{\rm crit}$. This energy difference is $\approx 1.2$~kcal/mol at $F_0 = 1.5$~nN and is on the order of only 0.1~kcal/mol at 1.8 and 1.9~nN before it vanishes at 2.0~nN, recall that the thermal energy, $k_{\rm B}T$, corresponds to $\approx 0.6$~kcal/mol at room temperature. Moreover, it is difficult to fully quantitatively analyze the catastrophe given the numerical inaccuracies due to the \textit{ab initio} molecular dynamics sampling of the FT-PES in all 39~internal coordinates which underlies the construction of the coarse-grained effective energy landscape, FT-ePES, in terms of only 3~collective variables. Last but not least, it is the full-dimensional FT-PES (and not the reduced-dimensionality treatment in terms of the FT-ePES that we introduced in order to access the rather complex bifurcation topology and its change at a function of force) which determines $F_{0}^{\rm{crit}}$. The former has been analyzed previously~\cite{Wollenhaupt2015} in terms of IRCs based on static isotensional quantum chemical calculations and is reproduced in Fig.~S8(b) of the SI. As found for the Dijkstra paths in panel~(a), the IRCs on the FT-PES start to come close at around 1.5~nN, where the conrotatory pathway is about 0.8~kcal/mol above the disrotatory one, before they essentially meet around 1.6~nN (where the corresponding energy difference is decreased to only $\approx 0.3$~kcal/mol whereas no disrotatory transition state could be optimized at 1.7~nN and beyond). Based on this discussion, we conclude that the topological catastrophe occurs at a critical force close to $F_{0}^{\rm{crit}}=1.6$~nN. \subsection{Analysis of the Catastrophe on the Force-transformed PES} \label{subsec: D)} With the help of catastrophe theory\cite{Gilmore1981}, the shift and the confluence of the disrotatory and conrotatory transition states of the dicholorocyclopropane species as a result of applying constant mechanical forces can be viewed as a topological problem~\cite{Ribas-Arino2009}, as already computationally exploited by us~\cite{Ribas-Arino2010} quite some time back for another mechanochemical reaction. The key idea is that the systematic distortion of the usual Born-Oppenheimer PES as a result of its force transformation that yields the FT-PES can not only lead to quantitative changes for instance of activation or reaction energies, but can also induce qualitative changes of the FT-PES compared to the zero force (Born-Oppenheimer) PES; see Sec.~4.3 in Ref.~\citenum{Ribas-Arino2012} for a review of these concepts. These force-induced qualitative changes of the energy landscape correspond to a switching between different topologies of the FT-PES at some specific force value, $F_0^{\rm crit}$, thus the magnitude of the applied force is identified to be the ``control parameter'' in the language of catastrophe theory,\cite{Ribas-Arino2010} whereas the catastrophe itself is the sudden change of topology upon reaching $F_0^{\rm crit}$. The situation that we disclosed herein for dichlorocyclopropane is visualized with the help of Fig.~\ref{fig:TS_Vereinigung-Schema} in terms of simplified cuts through the FT-PES. At forces smaller than $F_{0}^{\rm{crit}}$, an uphill bifurcation leads to separate pathways for dis- and conrotatory ring-opening to which the two distinct transition states that are shown in panel~(a), i.e. TS$_{\rm dis}$ and TS$_{\rm con}$, correspond to. Increasing the mechanical force $F_0$ leads to systematic shifts of TS$_{\rm dis}$ and TS$_{\rm con}$ in both energy and relative position within the energy landscape as qualitatively revealed when comparing panel~(b) to~(a). The activation energy associated to both pathways is gradually lowered upon increasing the applied external force, which is the usual mechanochemical activation due to suppressing the activation barrier w.r.t. the initial state {\em at the same force}. Thus, both TSs get lower in energy (relative to the reactant state serving as the reference) for larger $F_0$, but the conrotatory pathway is more susceptible to force which implies that the energy of TS$_{\rm con}$ decreases more quickly compared to TS$_{\rm dis}$ as symbolized by the length of the downward-pointing vertical arrows in panels~(a) and~(b). Concurrent to the lowering of the relative energy is also a confluence in configuration space, i.e. the two TSs move toward each other upon increasing $F_0$ as encoded by the two horizontal arrows in these panels. At forces greater than $F_{0}^{\rm{crit}}$, the two individual transition states have merged as depicted in (c) of Fig.~\ref{fig:TS_Vereinigung-Schema} and form one joint transition state ($\textrm{TS}_{\textrm{dis+con}}$) that is common to both reaction pathways (which eventually lead to dis- and conrotatory ring-opening after having passed the resulting downhill bifurcation, {\em vide infra}). Once TS$_{\rm con}$ and TS$_{\rm dis}$ are confluent and $\textrm{TS}_{\textrm{dis+con}}$ has emerged, the two distinct uphill dis/conrotatory pathways including the underlying uphill bifurcation vanish as well. The resulting (local) cusp catastrophe occurs right at $F_0 = F_{0}^{\rm{crit}}$ as visualized in panel~(d) of Fig.~\ref{fig:TS_Vereinigung-Schema} as a function of the continuous control parameter $F_0$. \subsection{Mechanochemistry of Dichlorocyclopropane: Product Regime} \label{subsubsec: MC on Cl-C3: Product part} After having discussed how the reaction channels originating in the reactant state split into dis- and conrotatory ring-opening processes below and above the catastrophe at $F_0^{\rm crit}$, we finally turn to the analysis of the decision about chlorine left/right migration in terms of the FT-ePES which takes place in the product regime of the energy landscape. The 2D-slices on the product side of the disrotatory reaction region in Fig.~\ref{fig:2D-Slices-Bifurcation_Energies} are oriented in such a way that the horizontal axis corresponds to the Cl~position that nicely indicates left/right migration of Cl7, whereas the vertical axis results from a suitable combination of the distance of the breaking carbon-carbon bond and the methyl dihedral. In the following digression, we will concentrate on the bifurcation between dis-left- and dis-right-products, because the corresponding bifurcation on the conrotatory part of the FT-ePESs is essentially symmetric due to the underlying structural symmetries along this ring-opening channel, which are not broken by applying colinear external forces at the two methyl groups. \begin{figure} \centering \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-DisBifurcation_+_Marked-Paths_F_0-00.eps} \caption{$F_{0} = $ 0.0~nN} \label{fig:PES_DisBifurcation_0.00} \end{subfigure} \hfill \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-DisBifurcation_F_1-00} \caption{$F_{0} = $ 1.0~nN} \label{fig:PES_DisBifurcation_1.00} \end{subfigure} \hfill \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-DisBifurcation_F_1-50} \caption{$F_{0} = $ 1.5~nN} \label{fig:PES_DisBifurcation_1.50} \end{subfigure} \hfill \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-DisBifurcation_F_2-00} \caption{$F_{0} = $ 2.0~nN} \label{fig:PES_DisBifurcation_2.00} \end{subfigure} \hfill \begin{subfigure}{0.23\textwidth} \centering \includegraphics[width=\textwidth]{PES_Slice-DisBifurcation_F_3-00} \caption{$F_{0} = $ 3.0~nN} \label{fig:PES_DisBifurcation_3.00} \end{subfigure} \caption{Schematic illustration of the Dijkstra paths for left/right migration of chlorine after disrotatory ring-opening on a set of 2D-slices of the 3D FT-ePES obtained at different constant forces from the thermally activated limit at 0~nN in panel~(a) up to 3~nN in (e). The $x$-axis corresponds to the Cl~position (CV3) whereas the $y$-axis is a suitable combination of the length of the breaking carbon-carbon bond (CV1) and the methyl dihedral (CV2). Starting at the disrotatory transition state (top part of each panel), the reaction pathways lead down in energy toward the left-right downhill bifurcation (central part) that connect to the dis-left and dis-right final products (left and right bottom parts, respectively). The reactant energy is set to \SI{0}{\kilo\calorie\per\mole} for each FT-ePES and the depicted energy contour lines are separated by an equidistant spacing of \SI{2}{\kilo\calorie\per\mol} where red encodes increasing and blue decreasing energies compared to the reactant energy. } \label{fig:2D-Slices-Bifurcation_Energies} \end{figure} In the thermal reference case at 0~nN, the disrotatory transition state is located in the top part of the 2D-slice from there on the reaction paths evolve down in energy, see Fig.~\ref{fig:2D-Slices-Bifurcation_Energies}(a). The reaction channel in the middle part of the shown FT-ePES is relatively flat in the direction perpendicular to the course of the reaction, thus facilitating the structural separation of the two paths toward left and right migration. The resulting dis-left- and dis-right products in the bottom left/right corners of the FT-ePES are separated by the second transition state, TS$_{\rm left/right}$ (being analogous to the generic $\textrm{TS}_{\textrm{1-2}}$ depicted in panel~(a) of Fig.~\ref{fig:Bifurcations_Generell}), that is clearly visible in the bottom-middle area in terms of the pattern of the contour lines. As expected, the zero-force ePES gets distorted both in energy and shape due to the application of the tensile force to the methyl groups. With increasing force, the bifurcation area becomes flatter, which can be easily estimated by the decreasing number of contour lines when going from (a) to (b) etc. Furthermore, the position of the second transition state, which directly connects the dis-left to the dis-right product, shifts when applying a mechanical force. The second transition state (region) is located to a greater extent close to the center of the bifurcation area, making the surface more symmetric. Thus, in the case of a sufficiently large force and at finite temperatures, the force-transformed energy landscape, FT-ePES, would lead to a higher amount of the dis-right product compared to the thermal situation at zero force. Clearly, after the catastrophe on the reactant side of the energy landscape occurred, i.e. at forces exceeding $F_{0}^{\rm{crit}}$, the isolines in the top part of Fig.~\ref{fig:2D-Slices-Bifurcation_Energies}(d) and~(e) do no longer correspond to a transition state as they did at the lower forces in panels~(a) to (c). Overall, it is found that the region of that downhill bifurcation which decides about the left/right direction of the migrating chlorine atom, Cl7, does only change in quantitative details when applying tensile forces to the methyl groups, whereas the local topology of this part of the energy landscape remains invariant in agreement with the two disrotatory branches in the lower parts of panels~(d) and~(e) in Fig.~\ref{fig:ReactionSchemes} that connect to the dis-left and dis-right products. \section{Conclusions and Outlook} \label{sec:Conclusions_and_outlook} It is well appreciated in the extant literature that dihalogenated cyclopropanes display unexpected chemistry upon mechanochemical ring-opening reactions. In an effort to shed light on this puzzle, we investigated in the first step of the present study the impact of halogen substitution on the thermally activated ring-opening process followed by halogen migration of (2\textit{S},3\textit{S})-1,1-dihalo-2,3-dimethylcyclopropanes in the case of~F, Cl, Br, and~I disubstitution. Surprisingly, the decision about the direction of halogen migration (called ``left'' and ``right'' for simplicity) in case of disrotatory ring-opening occurs in qualitatively different ways for this difluorinated cyclopropane compared to the homologous Cl, Br, and I~species. For \textit{trans}-\textit{gem}-difluorocyclopropane, the left/right decision is governed by an uphill bifurcation followed by two separate transition states for each migration direction, whereas the disrotatory transition state is first surmounted in the other three cases followed by a downhill bifurcation into the left and right disrotatory products. This change in the bifurcation scenario is corroborated by vibrational mode analysis performed along the respective intrinsic reaction coordinates. Thus, chemical substitution is found to qualitatively change the potential energy landscape for the ring-opening of cyclopropanes. In our second step, which is based on quantum mechanochemical computations at constant external forces, we discover that the topology of the energy landscape for mechanochemically activated ring-opening of \textit{trans}-\textit{gem}-dichlorocyclopropane is qualitatively different in the high force regime compared to low forces down to the thermal limit. In particular, an uphill bifurcation that decides about dis- {\em versus} conrotatory ring-opening at low forces gets transmuted at sufficiently high forces such that first, one transition state common to both dis- and conrotatory pathways is encountered followed by a first downhill bifurcation that decides about dis- and conrotatory ring-opening and, subsequently, by two additional separate downhill bifurcations for left/right migration. The two topologically distinct low- and high-force energy landscapes are separated from each other by a cusp catastrophe, which happens at a critical force $F_0^{\rm crit}$ of roughly 1.6~nN in the present case. Analysis of the energy profiles as a function of external force in conjunction with topological analysis reveals that disrotatory ring-opening is energetically preferred below $F_0^{\rm crit}$ down to the zero force limit (where it becomes the Woodward-Hoffmann allowed electrocyclic reaction), whereas the conrotatory and disrotatory processes possess the same transition state in the high force limit beyond $F_{0}^{\rm{crit}}$. Thus, we find here that it is an intricate topological catastrophe that underlies and therefore explains the previously predicted~\cite{Wollenhaupt2015} change in the ring-opening mechanism of \textit{trans}-\textit{gem}-dichlorocyclopropanes at about 1.6~nN in accord with subsequent single-molecule force spectroscopy experiments.\cite{Wang2015} In more general terms, sequential transition states and the branching of reaction pathways {\em via} bifurcations that lead to multiple product channels are well known in the study of chemical reactivity. Here, we show that both uphill and downhill bifurcations being pre- and post-transition-state features, respectively, can be shifted {\em continuously} by applying external mechanical forces as typically generated by sonication techniques. These changes can be merely quantitative in certain force regimes, but they can also qualitatively change the topology of the energy landscape that describes the process, for instance by shifting an uphill bifurcation over transition states to the downhill side. Beyond the specific case, the present findings delineate an approach towards steering the selectivity of chemical reactions in favor of desired products by means of mechanochemical activation. \section{Methods} \label{sec:Methods} Optimization of both, transition states and IRCs of the four halogen-substituted cyclopropane derivatives have been performed using the unrestricted BLYP density functional and the TZVP basis set as implemented in Gaussian~09.\cite{g09-C1_KurzForm} For the specific case of the dichloro cyclopropane derivative investigated in this study, good agreement between BLYP and CASSCF calculations can be observed as demonstrated in the SI of Ref.~\citenum{Wollenhaupt2015} and supported by previous benchmark calculations for bond breaking in mechanochemical reactions.\cite{Iozzi2009} In addition, the NEVPT2 calculations in Sec.~1.2 of the SI of the present work for the difluoro species support this conclusion. A detailed description of the computational methods can be found in Sec.~1.3 of the SI. The force-transformed potential energy landscapes (FT-PES) have been generated by means of \textit{ab initio} molecular dynamics simulations~\cite{Marx2009} on the basis of the Car-Parrinello method.\cite{Car1985} The reduced-dimensionality versions (FT-ePES) have been analyzed in terms of reaction pathways, not only including transition states but also bifurcation points, with the help of the so-called Dijkstra algorithm,\cite{Dijkstra1959} thus providing what we call Dijkstra paths. An extensive discussion of the respective computational details can be found in Sects.~1.5 and 1.6 of the SI. \section{Acknowledgement} It gives us pleasure to thank Przemyslaw Dopieralski and Michael R\"omelt for helpful discussions. We gratefully acknowledge generous financial support by the Reinhart Koselleck Grant "{}Understanding Mechanochemistry{}" (DFG MA~1547/9) as well as computer resources at HLRS Stuttgart, {\sc BoViLab}@RUB, and RV--NRW. \input{manuscript.bbl} \end{document}
\section{Introduction} Graph signals arise in various applications such as the study of brain signals \cite{7544580} and sensor networks \cite{1583238}. The area of graph signal processing (GSP) has gained considerable interest in the last decade. GSP theory extends concepts and techniques from traditional digital signal processing (DSP) to data indexed by generic graphs, including the graph Fourier transform (GFT), graph filter design \cite{8347162,Shuman_Ortega_2013,Isufi_Leus2017}, and sampling and recovery of graph signals \cite{9244650,6854325,7352352,9043719}. Many modern network applications involve complex models and large datasets and are characterized by nonlinear models \cite{9343697,8347160}, for example, the brain network connectivity \cite{shen2016nonlinear}, environment monitoring \cite{8496842}, and power flow equations in power systems \cite{drayer2018detection,Grotas_2019,shaked2021identification}. The recovery of graph signals in such networks is often intractable, especially for large networks. For example, the recovery of voltages from power measurements is an NP-hard nonconvex optimization problem \cite{bienstock2019strong}, which is at the core of power system analysis \cite{Abor}. In this case, the graph represents an electrical network, and the signals are the voltages. Thus, the development of GSP methods for the estimation of graph signals has significant practical importance, in addition to its contribution to the enrichment of theoretical statistical GSP tools. The recovery of random graph signals can be performed by state-of-the-art Bayesian estimators, such as the minimum mean-squared-error (MMSE) and the linear MMSE (LMMSE) estimators. However, MMSE estimation is often computationally intractable and does not have a closed-form expression in nonlinear models. The LMMSE can be used when the second-order statistics are completely specified. In some cases (e.g. \cite{6891254,7931630,berman2020resource}), accurate characterization of the nonlinear model is possible by using tools such as Bussgang's theorem. However, for the general case, the distributions (e.g. the covariance matrices) of the desired graph signal and the observations are difficult to determine. Moreover, in many practical applications, the graph signal has a broad correlation function so that estimating this correlation from data with high accuracy often necessitates a larger sample size than is available \cite{Eldar_merhav} and requires stationarity of the signals. Low-complexity estimation algorithms have been considered as an alternative. For example, in \cite{Edfors_Borjesson_1996}, a low-rank approximation is applied to the LMMSE estimator by using the singular value decomposition (SVD) of the covariance matrices. The dual-diagonal LMMSE (DD-LMMSE) channel estimation algorithm, which is based on the diagonal of the covariance matrices, was proposed in \cite{dd}. However, these methods may lead to considerable performance loss compared with LMMSE estimation. Graph filters have been used for many signal processing tasks, such as denoising \cite{7032244,ZHANG20083328}, classification \cite{6778068}, and anomaly detection \cite{drayer2018detection}. The design of graph filters to obtain a desired graph frequency response for the general case has been studied and analyzed in various works \cite{6808520,sparse_paper,Isufi_Leus2017,7926424}. Model-based recovery of a graph signal from noisy measurements by graph filters for {\em{linear}} models was treated in \cite{7117446,7032244,Isufi_Leus2017,7891646}. To derive classical graph filters, such as the Wiener filter, more restrictive assumptions on the graph signal are required \cite{7891646}. Nonlinear graph filters were considered in \cite{8496842}, but they require higher-order statistics that are not completely specified in the general case. Graph neural network approaches were considered in \cite{Isufi_Ribeiro,gama2020graphs}; however, data-based methods necessitate extensive training sets, and result in nonlinear estimators, while in this paper, we focus on linear estimation with limited training data. Fitting graph-based models to given data was considered in \cite{7763882,Hua_Sayed_2020,rey2021robust}. In \cite{confPaper}, we proposed a two-stage method for graph signal estimation from a known nonlinear observation model, which is based on fitting a graph-based model and then implementing least-squares recovery on the approximate model. However, model-fitting approaches aim to minimize the modeling error and in general have significantly lower performance than estimators that minimize the estimation error directly. A fundamental question remains regarding how to use knowledge of the nonlinear physical model and on the graph topology to obtain a low-complexity estimator for the general nonlinear case that has optimal MSE performance. In this paper, we consider the estimation of random graph signals from a nonlinear observation model. First, we present the sample-LMMSE estimator, in which the analytical expressions of the LMMSE estimator are replaced by their estimated values; this requires use of large training datasets. Next, we propose the GSP-LMMSE estimator, which minimizes the MSE among the subset of estimators that are represented as an output of a graph filter. We discuss the advantages of the GSP-LMMSE estimator in terms of complexity and show that 1) for models with diagonal covariance matrices in the graph frequency domain, the GSP-LMMSE and LMMSE estimators coincide; and 2) for linear models, the GSP-LMMSE estimator coincides with the graphical Wiener filter \cite{7891646}. We develop the MSE-optimal parametrization of the GSP-LMMSE estimator by shift-invariant graph filters that approximate the graph frequency response of the GSP-LMMSE estimator. The parameterized estimators can be applied to any topology, making them more robust to network topology changes. We also implement three types of the parameterized GSP-LMMSE estimator based on well-known graph filters. Finally, we perform numerical simulations for the problem of state estimation in power systems. We show that in this case the sample-GSP estimators outperform the sample-LMMSE estimator for a limited training dataset and coincide with the sample-LMMSE estimator otherwise. Moreover, the proposed estimators are more robust to changes in the network topology in the form of adding/removing vertices/edges. The rest of this paper is organized as follows. In Section \ref{background_sec} we introduce the basics of GSP and three examples of graph filters. In Section \ref{problem_formulation}, we formulate the estimation problem and present the MMSE and the LMMSE estimators. In Section \ref{GSP_estimator_section}, we develop the proposed GSP-LMMSE estimator and present parameterizations of the GSP-LMMSE estimator in Section \ref{General_design}. Simulation are shown in Section \ref{simulation}. Finally, the paper concluded in Section \ref{conclusion}. We denote vectors by boldface lowercase letters and matrices by boldface uppercase letters. The operators $(\cdot)^T$, $(\cdot)^{-1}$, and $(\cdot)^\dagger$ represent the transpose, inverse, and pseudo-inverse, respectively. The notation $\circ$ denotes the Hadamard product. For a matrix ${\bf{A}}$, $\text{rank}({\bf{A}})$ is its rank. For a vector ${\bf{a}}$, ${\text{diag}}({\bf{a}})$ is a diagonal matrix whose $i$th diagonal entry is ${\bf{a}}_i$; when applied to a matrix, ${\text{diag}}({\bf{A}})$ is a vector collecting the diagonal elements of ${\bf{A}}$. The $m$th element of the vector ${\bf{a}}$ is written as $a_m$ or $[{\bf{a}}]_m$. The $(m,q)$th element of the matrix ${\bf{A}}$ is written as $A_{m,q}$ or $[{\bf{A}}]_{m,q}$. The identity matrix of dimension $N$ is written as ${\bf{I}}_N$ and the vector ${\bf{0}}_N$ is a length $N$ vector of all zeros. The multivariate Gaussian distribution of ${\bf{y}}$ with mean vector, ${\mbox{\boldmath $\mu$}}$, and covariance matrix, ${\bf{\Sigma}}$, is denoted by ${\bf{y}} \sim \pazocal{N}({\mbox{\boldmath $\mu$}},{\bf{\Sigma}})$. The cross-covariance matrix of the vectors ${\bf{a}}$ and ${\bf{b}}$ is denoted by ${\bf{C}}_{{\bf{a}}{\bf{b}}}\triangleq \EX[({\bf{a}}-\EX[{\bf{a}}]) ({\bf{b}}-\EX[{\bf{b}}])^T]$. \section{Background: Graph Signal Processing (GSP)} \label{background_sec} We begin by reviewing GSP and general graph filters in Subsection \ref{Background}. Three commonly-used graph filters are then presented in Subsections \ref{LFI_representation}, \ref{ARMA_representation}, \ref{LR_representation}, and will be used later in the paper. \subsection{GSP background}\label{Background} Consider an undirected, connected, weighted graph ${\pazocal{G}}({\pazocal{V}},\xi,{\bf{W}})$, where $\pazocal{V}$ and $\xi$ are sets of vertices and edges, respectively. The matrix ${\bf{W}} \in \mathbb{R}^{N \times N}$ is the non-negative weighted adjacency matrix of the graph, where $N \stackrel{\triangle}{=} |\pazocal{V}|$ is the number of vertices in the graph. If there is an edge $(i, j) \in \xi$ connecting vertices $i$ and $j$, the entry ${\bf{W}}_{i,j}$ represents the weight of the edge; otherwise, ${\bf{W}}_{i,j} = 0$. A common way to represent the graph topology is by the Laplacian matrix, which is defined by \begin{equation} {\bf{L}} \stackrel{\triangle}{=} \text{diag}\left({\bf{W}}{\bf{1}}\right) - {\bf{W}}. \end{equation} The Laplacian matrix, ${\bf{L}}$, is a real and positive semidefinite matrix and its eigenvalue decomposition (EVD) is given by \begin{equation} {\bf{L}}={\bf{V}}{\bf{\Lambda}}{\bf{V}}^{T}, \label{SVD_new_eq} \end{equation} where ${\bf{\Lambda}}$ is a diagonal matrix consisting of the eigenvalues of ${\bf{L}}$, $0= \lambda_1 < \lambda_2 \leq \ldots \leq \lambda_N $, ${\bf{V}}$ is a matrix whose $n$th column, ${\bf{v}}_N$, is the eigenvector of ${\bf{L}}$ that is associated with $\lambda_n$, and ${\bf{V}}^{T}={\bf{V}}^{-1}$. We assume, without loss of generality, that ${\pazocal{G}}$ is a connected graph, i.e., that $\lambda_2\neq0$ \cite{Newman_2010}. In this paper, a {\em{graph signal}} is an $N$-dimensional vector, ${\bf{a}}$, that assigns a scalar value to each vertex, i.e., each entry $a_n$ denotes the signal value at vertix $n$, for $n=1,\ldots, N$. The GFT of the graph signal ${\bf{a}}$ is defined as \cite{Shuman_Ortega_2013} \begin{equation} \label{GFT} \tilde{{\bf{a}}} \triangleq {\bf{V}}^{T}{\bf{a}}. \end{equation} Similarly, the inverse GFT (IGFT) of $\tilde{{\bf{a}}}$ is given by ${\bf{V}}\tilde{{\bf{a}}}$. Finally, a graph signal is a graph-bandlimited signal with cutoff graph frequency $N_s$ if it satisfies \cite{8347162} \begin{equation} \label{bandlimited_def} \tilde{a}_n =0,~ n =N_s+1,\dots,N. \end{equation} Graph filters are useful tools for various GSP tasks. Linear and shift-invariant graph filters with respect to (w.r.t.) the graph shift operator (GSO) play essential roles in GSP. These filters generalize linear time-invariant filters used in DSP for time series, and enable performing tractable operations over graphs \cite{8347162,Shuman_Ortega_2013}. A graph filter is a function $f(\cdot)$ applied to a GSO, where here we use the GSO given by ${\bf{L}}$, that allows an eigendecomposition as follows \cite{8347162}: \begin{equation} \label{laplacian_graph_filter} f({\bf{L}})= {\bf{V}} f({\bf{\Lambda}}){\bf{V}}^T, \end{equation} where $f({\bf{\Lambda}})$ is a diagonal matrix. That is, $f(\lambda_n)$ is the graph frequency response of the filter at graph frequency $\lambda_n$, $n=1,\dots,N$, and $f({\bf{L}})$ is diagonalized by the eigenvector matrix ${\bf{V}}$ of ${\bf{L}}$. We assume that the graph filter, $f(\cdot)$, is a well-defined function on the spectrum $\{\lambda_1,\ldots,\lambda_N\}$ of ${\bf{L}}$. Throughout this paper, we consider three commonly-used parametrizations of the graph filter function, $f(\cdot)$, that are appropriate for modeling low-pass graph filters. For clarity of representation, we will write this specific function as $h(\cdot;{\mbox{\boldmath $\alpha$}})$, where ${\mbox{\boldmath $\alpha$}}$ contains the graph filter parameters. It should be noted that under simple conditions, all filters in the form of \eqref{laplacian_graph_filter} can be represented as a finite polynomial of ${\bf{L}}$ \cite{6638849}. Linear graph filters can be implemented locally, e.g., with exchanges of information among neighbors \cite{6638849}. However, due to the nature of the polynomial fitting problem, linear graph filters usually have limited accuracy when used for approximating a desired graph frequency response (see, e.g. in \cite{sparse_paper,6808520,7926424}). This is further discussed in Subsection \ref{GSP_estimator_section}, where the benefits of the presented parametrization in this context are outlined. \subsection{Linear pseudo-inverse graph filter} \label{LFI_representation} In a linear graph filter, the filter is a polynomial of a GSO, such as the Laplacian matrix \cite{8347162,Shuman_Ortega_2013}. In addition, the Moore-Penrose pseudo-inverse of the Laplacian matrix plays an essential role in many graph-based applications \cite{4072747,4053117}. Inspired by the linear graph filter, we define the linear pseudo-inverse graph filter, $f({\bf{L}})=h^{{\text{LPI}}}({\bf{L}}^\dagger;{\mbox{\boldmath $\alpha$}}^{\text{LPI}})$, as \begin{equation} \label{pseudo_inverse_filter_def} h^{\text{LPI}}({\bf{L}}^\dagger;{\mbox{\boldmath $\alpha$}}^{\text{LPI}}) \stackrel{\triangle}{=} h_{0}{\bf{I}}_N+h_{1}{\bf{L}}^\dagger +\ldots+h_{K}({\bf{L}}^\dagger)^{K}, \end{equation} where $K$ is the filter order and the filter coefficients vector is \begin{equation} \label{LPI_coefficients} {\mbox{\boldmath $\alpha$}}^{\text{LPI}} = \begin{bmatrix} h_0,\dots,h_K \end{bmatrix}^T \in \mathbb{R}^{K+1}, \end{equation} with $K<N$ due to the Cayley-Hamilton theorem. From \eqref{laplacian_graph_filter} and \eqref{pseudo_inverse_filter_def}, we conclude that the frequency response of the linear pseudo-inverse graph filter at graph frequency $\lambda_n$ can be expressed as \begin{equation}\label{LPI graph filter} h^{{\text{LPI}}}(\lambda_n;{\mbox{\boldmath $\alpha$}}^{\text{LPI}})= \begin{cases} h_0, &n=1\\ \sum_{k=0}^K h_k\lambda_n^{-k}, & n=2,\dots,N. \end{cases} \end{equation} \subsection{Autoregressive Moving Average (ARMA) graph filter} \label{ARMA_representation} Similar to temporal ARMA filters \cite{StatisticalDigitalSignalProcessingHayes}, an ARMA graph filter is characterized by a rational polynomial in the Laplacian matrix \cite{Isufi_Leus2017}. In this case, $f({\bf{L}})=h^{{\text{ARMA}}}({\bf{L}};{\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}})$, where the ARMA graph filter is defined as \begin{equation} \label{eq:0} h^{{\text{ARMA}}}({\bf{L}};{\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}}) \stackrel{\triangle}{=} \left( {\bf{I}}_N+\sum_{r=1}^{R} a_{r}{\bf{L}}^{r} \right)^{-1}\sum_{q=0}^Q c_q{\bf{L}}^q \end{equation} and the ARMA filter coefficient vector is \begin{equation} \label{ARMA_coefficients} {\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}} = [{\bf{a}}^T, {\bf{c}}^T]^T, \end{equation} where ${\bf{a}}= [1,a_1,\ldots,a_{R}]^T$ and ${\bf{c}}= [c_0,\ldots,c_Q]^T$. It is assumed that ${\bf{I}}_N+\sum_{r=1}^{R} a_{r}{\bf{L}}^{r}$ is a non-singular matrix. From \eqref{laplacian_graph_filter} and \eqref{eq:0}, the graph-ARMA filter frequency response at graph frequency $\lambda_n$ can be expressed as \begin{equation}\label{ARMA graph filter} h^{{\text{ARMA}}}(\lambda_n;{\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}})= \frac{\sum_{q=0}^Qc_q\lambda_n^q}{1 +\sum_{r=1}^{R} a_{r}\lambda_n^{r}}, \end{equation} $ n =1,\dots,N$, where we assume that $1+ \sum_{r=1}^{R}a_{r}\lambda_n^{r} \neq 0$. The linear graph filter, which is a polynomial of the Laplacian matrix, ${\bf{L}}$: \begin{equation} \label{Linear_filter_def} h^{\text{lin}}({\bf{L}};{\mbox{\boldmath $\alpha$}}^{\text{lin}}) \stackrel{\triangle}{=} h_{0}{\bf{I}}_N+h_{1}{\bf{L}} +\ldots+h_{K}{\bf{L}}^{K}, \end{equation} where $K$ is the filter order and $ {\mbox{\boldmath $\alpha$}}^{\text{lin}} = \begin{bmatrix} h_0,\dots,h_K \end{bmatrix}^T$ is the filter coefficients vector, can be obtained as a special case of the ARMA graph filter by setting $a_{r}=0$, $r=1,\ldots,R$ and $Q=K$ in \eqref{eq:0}. However, the ARMA graph filter improves the accuracy of the approximation of the desired graph frequency response and requires fewer coefficients compared to linear graph filters \cite{sparse_paper}. In addition, unlike the linear pseudo-inverse graph filter, the ARMA graph filter has distributed implementations, as shown in \cite{sparse_paper,7001054}. \subsection{Low-rank graph filter}\label{LR_representation} In many GSP applications, the graph signals are assumed to be {\em{bandlimited}} in the graph spectrum domain \cite{7208894}. In particular, under the assumption of a low-frequency graph signal, we are interested in filtering only the lowest graph frequencies and equating the output graph signal at high graph frequencies to zero. To this end, we use a low-rank graph filter. A low-rank graph filter can be designed based on any graph filter, $f(\cdot)$, by substituting the following low-rank matrix: \begin{equation} \label{L_bar_def} \bar{{\bf{L}}} = \sum\nolimits_{n=1}^{N_s} \lambda_n{\bf{v}}_n{\bf{v}}_n^T, \end{equation} which contains the $N_s$ smallest eigenvalues of the Laplacian matrix, ${\bf{L}}$, and their associated eigenvectors, in $f(\cdot)$. That is, we use the filter $f(\bar{{\bf{L}}})$ instead of $f({\bf{L}})$. Note that, $\text{rank}(\bar{{\bf{L}}})=N_s-1<N-1$ and that $\bar{{\bf{L}}}$ is not a Laplacian matrix. For these filters, we use the convention that the zero power of the matrix $\bar{{\bf{L}}}$ is \begin{equation} \label{I_bar_def} \bar{{\bf{L}}}^0 = \sum_{n=1}^{N_s} {\bf{v}}_n{\bf{v}}_n^T. \end{equation} Substituting \eqref{L_bar_def} in \eqref{laplacian_graph_filter}, the frequency response of a low-rank graph filter at the graph frequency $\lambda_n$ is \begin{equation}\label{LR graph filter} [f({\bf{\Lambda}})]_{n,n}= \begin{cases} f(\lambda_n), &n=1,\dots,N_s\\ 0, &n =N_s+1,\dots, N. \end{cases} \end{equation} The advantage of the low-rank graph filter is that it requires less filter coefficients and computation of only the $N_s$ smallest eigenvalues and eigenvectors. As a result, the evaluation of the filter coefficients has lower computational complexity. In this paper, we use the low-rank ARMA (LR-ARMA) graph filter, \begin{equation} \label{LR_ARMA_def} f(\bar{{\bf{L}}})=h^{{\text{ARMA}}}(\bar{{\bf{L}}};{{\mbox{\boldmath $\alpha$}}}^{{\text{LR}}}), \end{equation} where $h^{{\text{ARMA}}}(\cdot;\cdot)$ is defined in \eqref{eq:0} and the reduced, low-rank Laplacian matrix is defined in \eqref{L_bar_def}. The filter coefficients vector in this case is given by \begin{equation} \label{LR_ARMA_coefficients} \begin{split} {\mbox{\boldmath $\alpha$}}^{{\text{LR}}} = [ ({\bf{a}}^{\text{LR}})^T, ({\bf{c}}^{\text{LR}})^T]^T, \end{split} \end{equation} where ${\bf{a}}^{\text{LR}}= [ 1,a_1^{\text{LR}},\ldots,a_{R}^{\text{LR}}]^T$ and ${\bf{c}}^{\text{LR}}=[c_0^{\text{LR}},\ldots,c_Q^{\text{LR}}]^T$. From \eqref{laplacian_graph_filter}, \eqref{eq:0}, \eqref{ARMA graph filter}, and \eqref{LR graph filter}, the graph-LR-ARMA filter frequency response at graph frequency $\lambda_n$ can be expressed as \begin{equation} \label{LR_ARMA_frequency_domain} \begin{split} h^{{\text{LR-ARMA}}}(\lambda_n;{\mbox{\boldmath $\alpha$}}^{\text{LR}}) =\begin{cases} \frac{\sum_{q=0}^{Q_{{\text{LR}}}} c_q^{\text{LR}}\lambda_n^q}{1+\sum_{r=1}^{{R}_{{\text{LR}}}}a_{r}^{\text{LR}}\lambda_n^{r}}, & n =1,\dots,N_s\\ 0, &n =N_s+1,\dots, N, \end{cases} \end{split} \end{equation} where we assume that $1+ \sum_{r=1}^{R}a_{r}^{\text{LR}}\lambda_n^{r} \neq 0$, $\forall n = 1,\dots,N_s$. However, it should be noted that distributed implementations of the graph-LR-ARMA filter do not exist. Moreover, the LR-ARMA filter may not be a suitable parametrization of a graph frequency response that contains nonzero (small) values at high graph frequencies. \section{Model and problem formulation} \label{problem_formulation} We now introduce the problem of estimating a random graph signal by observing its noisy nonlinear function, which is determined by the graph topology. In Subsection \ref{model_sub_sec}, we present the measurement model. In Subsection \ref{Monte_Carlo_LMMSE_estimator}, the LMMSE and the sample-LMMSE estimators are derived. \subsection{Model and problem formulation}\label{model_sub_sec} Consider the problem of recovering a random input graph signal, ${\bf{x}}\in\mathbb{R}^N$, based on the following nonlinear measurement model: \begin{equation} \label{Model} {\bf{y}} = {\bf{g}}({\bf{L}},{\bf{x}}) + {\bf{w}}, \end{equation} where the measurement function, ${\bf{g}}:\mathbb{R}^{N \times N} \times{\mathbb{R}}^N \rightarrow {\mathbb{R}}^N$, and the Laplacian matrix, ${\bf{L}}$, which represents the influence of the graph topology, are assumed to be known. The noise, ${\bf{w}}$, has a known probability density function (pdf), $f_{\bf{w}}$, with zero mean and covariance matrix ${\bf{C}}_{{\bf{w}}\wvec}$. We assume that the pdf of ${\bf{x}}$, $f_{\bf{x}}$, is known, and that ${\bf{w}}$ and ${\bf{x}}$ are independent. This model comprises a broad family of statistical estimation problems over graphs. For example, a core problem of power system analysis is the recovery of voltages from power measurements \cite{Abor}, where both the voltages and the powers can be considered as graph signals \cite{routtenberg2020,drayer2018detection,dabush2021state} and the Laplacian matrix is the susceptance matrix. This problem is NP-hard and nonconvex \cite{bienstock2019strong}; It will be discussed further in Section \ref{simulation}. Similarly, for a water distribution system we are interested in estimating the nodal demands from measurements of the pressure heads and pipe flows using the nonlinear relation between them \cite{letting2017estimation}. Another example is the problem of estimating a graph signal based on noisy observations \cite{alaoui2019computational}. This setting comprises a broad family of estimation problems, including group synchronization on graphs, community detection, and low-rank matrix estimation. Finally, this model can be extended to other topology matrices, such as the adjacency matrix and the Markov matrix \cite{Newman_2010}. We are interested in recovering the input graph signal, ${\bf{x}}$, from the observation vector ${\bf{y}}$ in \eqref{Model}, based on minimizing the MSE. Thus, we seek an estimator of ${\bf{x}}$, as follows: \begin{equation} \label{Distance} \hat{\bf{x}}^{\text{MMSE}} = \argmin_{\hat{\bf{x}}({\bf{y}},{\bf{L}}) \in \mathbb{R}^N}\EX\left[(\hat{\bf{x}}({\bf{y}},{\bf{L}}) - {\bf{x}} )^T(\hat{\bf{x}}({\bf{y}},{\bf{L}}) - {\bf{x}})\right]. \end{equation} In the general case where the statistics of ${\bf{x}}$ and ${\bf{y}}$ are known, the MMSE estimator, $\hat{\bf{x}}^{\text{MMSE}} = \EX[{\bf{x}}|{\bf{y}}]$, solves \eqref{Distance}. Computing $\hat{\bf{x}}^{\text{MMSE}}$ requires an expression for the posterior pdf of ${\bf{x}}$ given ${\bf{y}}$, denoted by $f_{{\bf{x}}|{\bf{y}}}$. For the considered model, the pdf of ${\bf{y}}$ satisfies \begin{equation} \label{pdf_x} f_{{\bf{y}}} = f_{{\bf{g}}({\bf{L}},{\bf{x}} )} \ast f_{{\bf{w}}}, \end{equation} where $\ast $ denotes the convolution operator and $f_{{\bf{g}}({\bf{L}},{\bf{x}} )}$ is the pdf of ${\bf{g}}({\bf{L}},{\bf{x}} )$. Since ${\bf{g}}({\bf{L}},{\bf{x}})$ is a nonlinear function, the pdf of the transformation of ${\bf{x}}$ given by ${\bf{g}}({\bf{L}},{\bf{x}})$ does not have a closed-form expression, and therefore, the pdf of ${\bf{y}}$ and the posterior pdf of ${\bf{x}}$ given ${\bf{y}}$ (i.e., $f_{\bf{y}}$ and $f_{{\bf{x}}|{\bf{y}}}$) do not have analytical closed-form expressions. As a result, the MMSE estimator does not have a closed-form solution. Moreover, the computational complexity of the numerical evaluation of the MMSE estimator by multidimensional integration is very high, making the evaluation impractical, especially, for large networks, i.e., large $N$. \subsection{LMMSE and sample-LMMSE estimators} \label{Monte_Carlo_LMMSE_estimator} A common sub-optimal approach is to choose to retain the MMSE criterion, but constrain the subset of estimators. The LMMSE estimator is the optimal solution to \eqref{Distance} over the subset of estimators that are linear functions of the measurements, ${\bf{y}}$, and is given by \cite{Kayestimation} \begin{equation} \label{LMMSE} \hat{\bf{x}}^{(\text{LMMSE})} = \EX[{\bf{x}}] + {\bf{C}}_{{\bf{x}}{\bf{y}}}{\bf{C}}_{{\bf{y}}\yvec}^{-1}({\bf{y}} - \EX[{\bf{y}}]), \end{equation} where it is assumed that ${\bf{C}}_{{\bf{y}}\yvec}$ is a non-singular matrix. The LMMSE estimator can be used when the second-order statistics of ${\bf{x}}$ and ${\bf{y}}$ are known. However, in the considered case, the LMMSE estimator is often intractable as well, as an expression for the covariance is not generally known. Since the pdf of ${\bf{x}}$, the statistics of the noise, the Laplacian matrix ${\bf{L}}$, and the measurement function are all known, the {\em{sample-LMMSE}} estimator can be evaluated based on a two-stage procedure (\cite{6827237}, p. 728 in \cite{van2004optimum}). First, the mean and covariance matrices from \eqref{LMMSE}, $\EX[{\bf{y}}]$, ${\bf{C}}_{{\bf{x}}{\bf{y}}}$, and ${\bf{C}}_{{\bf{y}}\yvec}$, are estimated by the sample-means and sample-covariance matrices from a training set\footnote{In our model, $\EX[{\bf{x}}]$ is known, and thus, is not replaced by its sample mean.}. Second, these estimators are plugged into the LMMSE estimator in \eqref{LMMSE} to obtain the sample-LMMSE estimator (\cite{6827237}, p. 728 in \cite{van2004optimum}). In the first stage, $P$ random samples of ${\bf{x}}$, $\{{\bf{x}}_p\}_{p=1}^P$, are generated, with a pdf $f_{\bf{x}}$. This is the training dataset. The associated output vectors under the generating model in \eqref{Model} are denoted by $\{{\bf{y}}_p\}_{p=1}^P$. Then, assuming zero-mean noise in \eqref{Model} and using the function ${\bf{g}}(\cdot,\cdot)$, the sample-mean observation vector from \eqref{Model} is \begin{equation} \label{sample_mean} \hat{{\bf{y}}} = \frac{1}{P} \sum\nolimits_{p=1}^P{\bf{g}}({\bf{L}},{\bf{x}}_p). \end{equation} Similarly, since ${\bf{x}}$ and ${\bf{w}}$ are assumed to be statistically independent, the sample cross-covariance matrix of ${\bf{x}}$ and ${\bf{y}}$, and the sample covariance matrix of ${\bf{y}}$ are computed by \begin{equation} \label{hat_C_theta_x} \hat{{\bf{C}}}_{{\bf{x}}{\bf{y}}} = \frac{1}{P} \sum\nolimits_{p=1}^P ({\bf{x}}_p - \EX[{\bf{x}}])({\bf{y}}_p - \hat{{\bf{y}}})^T \end{equation} and \begin{equation} \label{hat_C_y} \hat{{\bf{C}}}_{{\bf{y}}\yvec} = \frac{1}{P} \sum\nolimits_{p=1}^P ({\bf{y}}_p - \hat{{\bf{y}}})({\bf{y}}_p - \hat{{\bf{y}}})^T + {\bf{C}}_{{\bf{w}}\wvec}, \end{equation} respectively, where ${\bf{C}}_{{\bf{w}}\wvec}$ is assumed to be known. In the second stage, the sample-LMMSE estimator is obtained by plugging the sample-mean and sample covariance matrices from \eqref{sample_mean}, \eqref{hat_C_theta_x}, and \eqref{hat_C_y} into \eqref{LMMSE}, which results in \begin{equation} \label{Monte_Carlo_LMMSE} \hat{\bf{x}}^{(\text{sample-LMMSE})} = \EX[{\bf{x}}] + \hat{{\bf{C}}}_{{\bf{x}}{\bf{y}}}\hat{{\bf{C}}}_{{\bf{y}}\yvec}^{-1}({\bf{y}} - \hat{{\bf{y}}}). \end{equation} The sample-LMMSE estimator requires the computation of the inverse sample covariance matrix of ${\bf{y}}$, $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$, from \eqref{hat_C_y}. Therefore, a drawback of this method is that it requires an extensive dataset for stable estimation of the inverse sample covariance matrix. However, the dataset is usually limited in practical applications since the function ${\bf{g}}({\bf{x}},{\bf{L}})$ may change over time due to changes in the topology. Moreover, numerical evaluation of the LMMSE may discard information about the relationship between the graph signal and its underlying graph structure. Thus, it is less robust to changes in the graph topology, and there is no straightforward methodology to update the estimator to new topology, which may happen when vertices or edges are added or removed from the network. Finally, the sample-LMMSE estimator ignores the GSP properties and does not exploit additional information on the graph signal, such as smoothness or graph-bandlimitness, that can improve estimation performance. On the other hand, existing GSP-based approaches have been developed for simple {\em{linear}} models (see, e.g. \cite{7891646,Isufi_Leus2017,7032244}). In order to reduce the computational complexity of the sample-LMMSE estimator, the sample-version of the diagonal-LMMSE estimator can be used \cite{dd}. This estimator minimizes the MSE among linear estimators where the estimation matrix that multiplies ${\bf{y}}$ is restricted to be diagonal. By plugging in the sample mean and sample covariance values from \eqref{sample_mean}-\eqref{hat_C_y} in the diagonal-LMMSE estimator (see, e.g. Eq. (18) in \cite{dd}), the sample-diagonal-LMMSE estimator is given by \begin{eqnarray} \label{Monte_Carlo_local_LMMSE} \hat{\bf{x}}^{(\text{sample-D-LMMSE})} = \EX[{\bf{x}}]\hspace{4cm}\nonumber\\ + \text{diag}(\text{diag}(\hat{{\bf{C}}}_{{\bf{x}}{\bf{y}}}))(\text{diag}(\text{diag}(\hat{{\bf{C}}}_{{\bf{y}}\yvec})))^{-1}({\bf{y}} - \hat{{\bf{y}}}). \end{eqnarray} The use of diagonal matrices in \eqref{Monte_Carlo_local_LMMSE} results in lower computational complexity than that of the sample-LMMSE estimator. However, the performance of \eqref{Monte_Carlo_local_LMMSE} is significantly poorer than the other methods presented in this paper (as shown in \cite{dd} and was confirmed by our simulations). This motivates us to seek improved solutions that also involve diagonal matrices and, at the same time, use the given graph. \section{The GSP-LMMSE estimator} \label{GSP_estimator_section} In this section, we develop the GSP-LMMSE and the sample-GSP-LMMSE estimators in Subsection \ref{prob_form_sec} and discuss their properties in Subsection \ref{prop_subsection}. Conditions under which the proposed GSP-LMMSE estimator is also the LMMSE estimator are developed in Subsection \ref{separately_model_section}. \subsection{GSP-LMMSE and sample-GSP-LMMSE estimators} \label{prob_form_sec} In this subsection we develop a graph-based linear estimator. We consider estimators of the form \begin{equation} \label{opt_estimator} \hat{{\bf{x}}} = f({\bf{L}}){\bf{y}} +{\bf{b}} = {\bf{V}} f({\bf{\Lambda}} ){\bf{V}}^T{\bf{y}} +{\bf{b}} , \end{equation} where ${\bf{b}}$ is a constant vector, ${\bf{V}}$ and ${\bf{\Lambda}}$ are the eigenvector-eigenvalue matrices of the Laplacian matrix, ${\bf{L}}$, as defined in \eqref{SVD_new_eq}, and $f(\cdot)$ is the graph filter defined in \eqref{laplacian_graph_filter}. The GSP-LMMSE estimator is an estimator which minimizes the MSE in \eqref{Distance} over the subset of GSP estimators in the form of \eqref{opt_estimator}. By substituting \eqref{opt_estimator} in \eqref{Distance}, the general GSP-LMMSE estimator is defined by \begin{eqnarray} \label{LMMSE_GSP_o} \hat{\bf{x}}^{(\text{GSP-LMMSE})}= {\bf{V}} \hat{f}({\bf{\Lambda}}){\bf{V}}^T{\bf{y}} +\hat{{\bf{b}}}, \end{eqnarray} where \begin{eqnarray} \label{Distance_GSP} \{\hat{f}({\bf{\Lambda}}), \hat{{\bf{b}}}\}=\hspace{-0.15cm} \argmin_{f({\bf{\Lambda}} ) \in {\mathcal{D}}_N,{\bf{b}}\in{\mathbb{R}}^N}\EX\left[||{\bf{V}} f({\bf{\Lambda}} ){\bf{V}}^T{\bf{y}} +{\bf{b}} - {\bf{x}} ||^2\right] \end{eqnarray} and ${\mathcal{D}}_N$ is the set of diagonal matrices of size $N \times N$. Since ${\bf{V}}$ is a unitary matrix, i.e., ${\bf{V}}\Vmat^T = {\bf{I}}_N$, the minimization problem \eqref{Distance_GSP} can be rewritten in the graph frequency domain as follows: \begin{eqnarray}\label{Distance_GSP_frequency_domain} \{\hat{f}({\bf{\Lambda}}), \hat{{\bf{b}}}\} = \argmin_{f({\bf{\Lambda}} ) \in {\mathcal{D}}_N,\tilde{{\bf{b}}}\in{\mathbb{R}}^N}\EX\left[|| f({\bf{\Lambda}} )\tilde{{\bf{y}}} +\tilde{{\bf{b}}} - \tilde{{\bf{x}}} ||^2\right], \end{eqnarray} where $\tilde{\bf{y}}$, $\tilde{\bf{x}}$, and $\tilde{\bf{b}}$ are the GFT of ${\bf{y}}$, ${\bf{x}}$, and ${\bf{b}}$, respectively, as defined in \eqref{GFT}. We first consider the solution for $\tilde{{\bf{b}}}$: \begin{equation} \label{Bayesian_minimize_opt} \hat{\tilde{{\bf{b}}}} = \argmin_{\tilde{{\bf{b}}}\in \mathbb{R}^N} \EX\left[|| f({\bf{\Lambda}} )\tilde{{\bf{y}}} +\tilde{{\bf{b}}} - \tilde{{\bf{x}}} ||^2\right]. \end{equation} Since \eqref{Bayesian_minimize_opt} is convex, the optimal solution is obtained by equating the derivative w.r.t. $\tilde{{\bf{b}}}$ to zero, which results in \begin{equation} \label{b_evaluate_old} \hat{\tilde{{\bf{b}}}} = \EX[\tilde{{\bf{x}}}] - f({\bf{\Lambda}})\EX[\tilde{{\bf{y}}}]. \end{equation} This implies \begin{equation} \label{b_evaluate_old2} \hat{{\bf{b}}}={\bf{V}} \hat{\tilde{{\bf{b}}}} = \EX[{{\bf{x}}}] - {\bf{V}} f({\bf{\Lambda}}){\bf{V}}^T \EX[{{\bf{y}}}]. \end{equation} Substituting \eqref{b_evaluate_old} into \eqref{Distance_GSP_frequency_domain} we obtain that the graph frequency response of the GSP-LMMSE estimator is given by \begin{eqnarray} \label{derivative_opt_f_only} \hat{f}({\bf{\Lambda}}) = \argmin_{ f({\bf{\Lambda}})\in {\mathcal{D}}_N} \EX \left[||f({\bf{\Lambda}} )(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) - \left(\tilde{{\bf{x}}} - \EX\left[\tilde{{\bf{x}}}\right] \right)||^2\right]. \end{eqnarray} The solution to \eqref{derivative_opt_f_only} is given by \begin{equation} \label{opt_f} \hat{f}({\bf{\Lambda}}) = {\text{diag}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}, \end{equation} where \begin{equation} \label{d_def} {\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} \stackrel{\triangle}{=} {\text{diag}}({\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}),~~~ {\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} \stackrel{\triangle}{=} \text{diag}\left( \text{diag}({\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} ) \right). \end{equation} We assume that ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is non-singular. The GSP-LMMSE estimator is then given by \begin{equation} \label{opt_LMMSE_GSP} \hat{{\bf{x}}}^{(\text{GSP-LMMSE})} = \EX[{\bf{x}}] + {\bf{V}} {\text{diag}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}{\bf{V}}^T({\bf{y}} - \EX[{\bf{y}}]). \end{equation} The GSP-LMMSE estimator from \eqref{opt_LMMSE_GSP} is based on the {\em{diagonal}} of the covariance matrices of $\tilde{{\bf{x}}}$ and $\tilde{{\bf{y}}}$ that are defined in \eqref{d_def}, which has advantages from a computational point of view, compared with the LMMSE estimator in \eqref{LMMSE} that uses the full covariance matrices of ${\bf{x}}$ and ${\bf{y}}$. The GSP-LMMSE estimator is in fact the diagonal-LMMSE estimator \cite{dd} in the {\em{graph frequency domain}}. This estimator minimizes the MSE among the linear estimators of $\tilde{{\bf{x}}}$, where the estimation matrix that multiplies $\tilde{{\bf{y}}}$ is restricted to be a diagonal matrix. Similar to the sample-LMMSE estimator in Subsection \ref{Monte_Carlo_LMMSE_estimator}, we can use the sample-mean version of the GSP-LMMSE estimator when the statistics are not completely specified. The idea is to use $P$ random samples of ${\bf{x}}$, ${\bf{x}}_1,\ldots,{\bf{x}}_p$, that are generated from the model in \eqref{Model} to compute the sample-mean vector from \eqref{sample_mean} and the diagonal sample covariance matrices from \eqref{d_def} by \begin{eqnarray} \label{sample_d} \hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}= \frac{1}{P}\sum_{p=1}^P ( \tilde{\bf{x}}_p- \EX[\tilde{\bf{x}}])\circ \left( {\bf{V}}^T{\bf{g}}({\bf{L}},{\bf{x}}_p)- {\bf{V}}^T\hat{{\bf{y}}}\right) \end{eqnarray} and \begin{eqnarray} \label{sample_D} [\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}]_{i,i} = \frac{1}{P} \sum_{p=1}^P\left([{\bf{V}}^T{\bf{g}}({\bf{L}},{\bf{x}}_p)]_i - [{\bf{V}}^T\bar{\bf{y}}]_i\right)^2 + [{\bf{C}}_{\tilde{{\bf{w}}}\tilde{{\bf{w}}}}]_{i,i}, \end{eqnarray} respectively, where $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a diagonal matrix, $\tilde{{\bf{w}}}$ is the GFT of ${\bf{w}}$, and $\hat{{\bf{y}}}$ is defined in \eqref{sample_mean}. By substituting \eqref{sample_mean}, \eqref{sample_d}, and \eqref{sample_D} in \eqref{opt_LMMSE_GSP}, we obtain the sample-GSP-LMMSE estimator: \begin{equation} \label{sample_LMMSE_GSP} \hat{{\bf{x}}}^{(\text{sGSP-LMMSE})} = \EX[{\bf{x}}] + {\bf{V}} {\text{diag}}(\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}})\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}{\bf{V}}^T({\bf{y}} - \hat{{\bf{y}}}), \end{equation} where we assume that $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a non-singular matrix. This approach is summarized in Algorithm \ref{Alg_opt}. \vspace{-0.25cm} \begin{algorithm}[hbt] \SetAlgoLined \textbf{Input:} \begin{itemize} \item The function ${\bf{g}}({\bf{L}},{\bf{x}})$. \item The Laplacian matrix ${\bf{L}}$. \item The distribution of ${\bf{x}}$, $f_{\bf{x}}$, and its mean, $\EX[{\bf{x}}]$. \item The distribution of ${\bf{w}}$. \end{itemize} {\textbf{Algorithm Steps:}} \begin{enumerate} \setlength\itemsep{0.2em} \item Generate $P$ random samples of ${\bf{x}}$, with a pdf $f_{\bf{x}}$. \item Evaluate the sample vectors: $\hat{{\bf{y}}}$, $\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$, and $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{sample_mean}, \eqref{sample_d}, and \eqref{sample_D}, respectively. \end{enumerate} \vspace{1mm} {\textbf{Output$\colon$}} sample-GSP-LMMSE estimator $\hat{\bf{x}}^{(\text{sGSP-LMMSE})} = \EX[{\bf{x}}]+ {\bf{V}}\text{diag}(\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} ) \hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}{\bf{V}}^T ({\bf{y}} - \hat{{\bf{y}}}).$ \caption{Sample-GSP-LMMSE estimator} \label{Alg_opt} \end{algorithm} \subsection{Advantages and discussion} \label{prop_subsection} The GSP representation affords insight into the frequency contents of {\em{nonlinear}} graph signals, such as smoothness and graph-bandlimitness, which can be incorporated into the GSP estimators. In addition, a main advantage of the proposed sample-GSP-LMMSE estimator is that it requires the estimation of only two $N$-length vectors that contain the diagonal of the covariance and of the cross-covariance matrices, as described in \eqref{sample_d} and \eqref{sample_D}. This is in contrast with the sample-LMMSE estimator from \eqref{LMMSE} that requires estimating two $N\times N$ matrices, $\hat{{\bf{C}}}_{{\bf{x}}{\bf{y}}}$ and $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$ from \eqref{hat_C_theta_x} and \eqref{hat_C_y}, respectively. This advantage improves the sample-GSP-LMMSE estimator performance compared to the sample-LMMSE estimator with limited datasets used for the non-parametric estimation of the different sample-mean values. Moreover, the estimation of the inverse sample diagonal covariance matrix, $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{sample_D}, is more robust to limited data (i.e., smaller $P$) than the estimation of the inverse sample covariance matrix, $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$ from \eqref{hat_C_y}. Since $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a diagonal matrix, it is a non-singular matrix with probability 1 for any $P\geq 2$ (under the assumption that ${\bf{x}}$ is a continuous random variable), while the non-diagonal matrix, $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$, requires $P$ to be much larger to be a non-singular matrix. As a result, in settings where the sample size ($P$) is comparable to the observation dimension ($N$), the sample-LMMSE estimator exhibits severe performance degradation \cite{4914845,5484583}. This is because the sample covariance matrix is not well-conditioned in the small sample size regime, and inverting it amplifies the estimation error \cite{ledoit2004well}. In the asymptotic regime where the observation dimension, $N$, is fixed and $P\rightarrow \infty$, the sample mean and sample covariance matrices are consistent estimators. Thus, in the asymptotic case, the sample-LMMSE and the sample-GSP-LMMSE estimators converge to the LMMSE and the GSP-LMMSE estimators. In terms of computational complexity, the sample-LMMSE estimator from \eqref{Monte_Carlo_LMMSE} requires: 1) forming the sample mean and the sample covariance matrices $ \hat{{\bf{C}}}_{{\bf{x}}{\bf{y}}}$ and $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$ from \eqref{sample_mean}, \eqref{hat_C_theta_x}, and \eqref{hat_C_y}, respectively, with full matrix multiplications and an additional cost of $\mathcal{O}(P N^2)$; 2) computing the inverse of the $N\times N$ matrix $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$, which has a complexity of $\mathcal{O}(N^3)$; and 3) performing full matrix multiplications, with a computational complexity of $\mathcal{O}(N^3)$. The sample-GSP-LMMSE estimator from \eqref{sample_LMMSE_GSP} requires: 1) forming the sample mean in \eqref{sample_mean} and the {\em{diagonal}} sample covariance matrices $ {\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} $ and ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{sample_d} and \eqref{sample_D}, respectively, with a cost of $\mathcal{O}(P N)$, where the data is generated in the graph frequency domain; 2) computing the inverse of the diagonal matrix $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$, which has a complexity of $\mathcal{O}(N)$; and 3) performing multiplications of diagonal matrices with a cost of $\mathcal{O}(N^2)$. The estimator in the vertex domain in \eqref{sample_LMMSE_GSP} requires matrix multiplication by ${\bf{V}}$ and ${\bf{V}}^T$ with a cost of $\mathcal{O}(N^3)$. The use of the graph frequency domain in the GSP-LMMSE estimator requires the computation of the EVD of the Laplacian matrix, which is of order $\mathcal{O}(N^3)$, and can be computed offline. If the EVD can be assumed to be known then this task may be avoided. Recent works propose low-complexity methods to reduce the complexity of this task (see, e.g. \cite{SVD}). In addition, the computational complexity of the GSP-LMMSE estimator can be reduced even further by using the properties of the Laplacian matrix, which tends to be sparse, and therefore, matrix operations may require fewer computations. \subsection{Linear optimality conditions} \label{separately_model_section} In this subsection, we address the question of under which situations the proposed GSP-LMMSE estimator coincides with the LMMSE estimator and with the graphical Wiener filter. The following theorem states sufficient and necessary conditions for the GSP-LMMSE and LMMSE estimators to coincide. \begin{Theorem} \label{claim_coincides} The GSP-LMMSE estimator coincides with the LMMSE estimator if \begin{equation} \label{coincides_condition} {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}{\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}= {\text{\normalfont{diag}}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}, \end{equation} where $\tilde{\bf{y}}$ and $\tilde{\bf{x}}$ are the GFT of ${\bf{y}}$ and ${\bf{x}}$, and where ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ and ${{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are non-singular matrices. \end{Theorem} \begin{proof} By comparing the r.h.s. of \eqref{LMMSE} and the r.h.s. of \eqref{opt_LMMSE_GSP}, it can be verified that the GSP-LMMSE estimator coincides with the LMMSE estimator if \begin{equation} \label{coincides_Appendix_to_prove_2} {\bf{C}}_{{\bf{x}}{\bf{y}}}{\bf{C}}_{{\bf{y}}\yvec}^{-1}= {\bf{V}} {\text{diag}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}{\bf{V}}^T. \end{equation} By right and left multiplication of \eqref{coincides_Appendix_to_prove_2} by ${\bf{V}}^T$ and ${\bf{V}}$, respectively, and using ${\bf{V}}^T{\bf{V}}={\bf{V}}\Vmat^T={\bf{I}}_N$, we obtain \begin{equation} \label{coincides_Appendix_to_prove_3} {\bf{V}}^T {\bf{C}}_{{\bf{x}}{\bf{y}}}{\bf{V}}\Vmat^T{\bf{C}}_{{\bf{y}}\yvec}^{-1}{\bf{V}}= {\text{diag}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}. \end{equation} Using the GFT definition in \eqref{GFT}, the condition in \eqref{coincides_Appendix_to_prove_3} can be rewritten as \eqref{coincides_condition}. \end{proof} The intuition behind the result in Theorem \ref{claim_coincides} is that if \eqref{coincides_condition} is satisfied, then the LMMSE estimator is also the diagonal LMMSE estimator in the graph frequency domain, i.e., the GSP-LMMSE estimator. By using the definitions in \eqref{d_def}, it can be verified that a sufficient (but not necessary) condition for \eqref{coincides_condition} to hold is that ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ and ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are diagonal matrices. In this case, ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}={\text{diag}}( {\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} )$ and ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}={\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$. In the following Theorems we present two special cases for which ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ and ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are diagonal matrices, and thus, \eqref{coincides_condition} holds. \begin{Theorem}\label{claim_separately_Model} The GSP-LMMSE estimator coincides with the LMMSE estimator if the following conditions hold: \renewcommand{\theenumi}{C.\arabic{enumi}} \begin{enumerate} \item\label{cond1} The nonlinear measurements function, ${\bf{g}}({\bf{L}},{\bf{x}})$, is separable in the graph frequency domain (``orthogonal frequencies"). That is, it satisfies \begin{equation} \label{separately_Model} [\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_n = [\tilde{{\bf{g}}}({\bf{L}},\tilde{x}_n{\bf{v}}_n)]_n,~n=1,\ldots,N, \end{equation} where $\tilde{x}_n$ is the $n$th element of $\tilde{{\bf{x}}}$ and $\tilde{{\bf{g}}}={\bf{V}}^T{\bf{g}}({\bf{L}},{\bf{x}})$. \item\label{cond2} The elements of the input graph signal, ${\bf{x}}$, are statistically independent in the graph frequency domain. \item\label{cond3} The noise vector, ${\bf{w}}$, is uncorrelated in the graph frequency domain, i.e., ${\bf{C}}_{\tilde{{\bf{w}}}\tilde{{\bf{w}}}}$ is a diagonal matrix. \end{enumerate} \end{Theorem} \begin{proof} The proof is given in Appendix \ref{separately_Model_Appendix}. \end{proof} \begin{Theorem}\label{claim_graphical_Model} The GSP-LMMSE estimator coincides with the LMMSE estimator if Condition \ref{cond3} holds and in addition \renewcommand{\theenumi}{C.\arabic{enumi}} \begin{enumerate} \setcounter{enumi}{3} \item\label{cond4} The measurement function, ${\bf{g}}({\bf{L}},{\bf{x}})$, is the output of a linear graph filter as defined in \eqref{laplacian_graph_filter}, i.e., \begin{equation} \label{g_filter} {\bf{g}}({\bf{L}},{\bf{x}}) = {\bf{V}} f({\bf{\Lambda}}){\bf{V}}^T {\bf{x}}. \end{equation} \item\label{cond5} The covariance matrix of the input graph signal, ${\bf{C}}_{{\bf{x}}\xvec}$, is diagonalizable by the eigenvector matrix of the Laplacian, ${\bf{V}}$, i.e., ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{x}}}}$ is a diagonal matrix. \end{enumerate} \end{Theorem} \begin{proof} The proof is given in Appendix \ref{graphical_Model_Appendix}. \end{proof} The special case in Theorem \ref{claim_graphical_Model} fits the model behind the development of the graphical Wiener filter \cite{7891646}: First, Conditions \ref{cond3} and \ref{cond4} imply the linear model assumed in developing the graphical Wiener filter in Subsection V-A in \cite{7891646}. Second, under Condition \ref{cond5}, the signal $ {\bf{x}} - \EX[{\bf{x}}]$ is a Graph Wide-Sense Stationary (GWSS) signal (see Definition 3 and Theorem 1 in \cite{7891646}), which is the requirement for the graphical Wiener filter. Therefore, under the conditions of Theorem \ref{claim_graphical_Model} the GSP-LMMSE estimator coincides with the graphical Wiener filter (Eq. (13) in \cite{7891646}), which is also the LMMSE estimator in this case. Therefore, the proposed GSP-LMMSE estimator can be interpreted as the graphical Wiener filter, but without assuming a linear model or GWSS signals. Conditions \ref{cond2} and \ref{cond5} are common assumptions in the GSP framework \cite{Dong_Vandergheynst_2016,ramezani2019graph}. However, it should be noted that even if the elements of the input graph signal, ${\bf{x}}$, are statistically independent, they are not necessarily statistically independent in the graph frequency domain, as required in Condition \ref{cond2}, nor even uncorrelated. In addition, Condition \ref{cond1} is satisfied if the function ${\bf{g}}({\bf{L}},{\bf{x}})$ is diagonalized by the eigenvector matrix ${\bf{V}}$ of ${\bf{L}}$. Condition \ref{cond4}, in which the measurements are obtained as a synthetic output of a graph linear filter as described in \eqref{g_filter}, is a sufficient condition for Condition \ref{cond1}. Finally, since Condition \ref{cond1} is less restrictive then Condition \ref{cond4}, Condition \ref{cond2} (independency) is more restrictive than Condition \ref{cond5} (decorrelation). \section{GSP estimators by parametric graph filters} \label{General_design} In the previous section, we presented a general approach to finding the optimal GSP-LMMSE estimator. However, the GSP-LMMSE estimator is a function of the specific graph structure with fixed dimensions, and thus: 1) it is not optimal when the topology is changed; 2) it is not adaptive to changes in the number of vertices, $N$, since when vertices are added or removed, the dimension of the Laplacian matrix and of the graph signal are changed and the GSP-LMMSE in \eqref{opt_LMMSE_GSP} is not a valid estimator; and 3) there is no straightforward way to incorporate other graph frequency constraints. Thus, the optimal graph frequency response needs to be redeveloped for any small change in the topology. In this section, we formulate the problem of designing a graph filter that is MSE-optimal with a specific parametric representation. Then, we develop three implementations of this design by using the three specific graph filters from Section \ref{background_sec}: a linear pseudo-inverse graph filter (Subsection \ref{linear_pseudo_inverse_filter_subsection}), an ARMA graph filter (Subsection \ref{ARMA_filter_subsection}), and a low-rank ARMA graph filter (Subsection \ref{LC_ARMA_filter_subsection}). This universal design of graph filters by fitting the frequency response over a continuous range of graph frequencies based on the graph frequency response is adaptive to topology changes, e.g. in cases when the number of vertices and/or edges is changed. In addition, the parametric representation provides a straightforward way to integrate GSP properties. Finally, since in practice the desired graph frequency response is often approximated by its sample-mean version based on a training dataset, parametrizations can reduce outlier errors and noise effects. The choice between the different graph filters used in this section can be done according to the trade-off between approximation accuracy, convergence rate, and computational complexity, as detailed in recent literature \cite{Isufi_Leus2017, sparse_paper}. In particular, the parametrization by the linear pseudo-inverse graph filter requires, in general, a higher filter order than the ARMA graph filter, i.e., $K > Q, R$, in order to obtain a good approximation, which may lead to stability problems in large networks. However, finding the ARMA graph filter parameters is based on a nonconvex optimization, while the parameters of the linear pseudo-inverse graph filter have a closed-form solution. Using the ARMA filter is known to improve the approximation accuracy and reduce the number of required filter coefficients compared with those of the linear (``finite impulse response") filter \cite{sparse_paper}. The LR-ARMA GSP estimator uses only part of the EVD of ${\bf{L}}$ and requires a lower filter order compared with the ARMA graph filter. However, its performance may be significantly degraded compared to other filters for signals that are not low-frequency graph signals. \subsection{General design of the graph frequency response} \label{General_design_sub} The graph frequency response of the sample-GSP-LMMSE estimator from \eqref{opt_f} is defined only at graph frequencies $\lambda_n$, $n=1,\dots,N$. In this subsection, our goal is to develop a graph-based linear estimator of the form of \eqref{opt_estimator} that minimizes \eqref{Distance}, but where $f({\bf{\Lambda}})$ is restricted to specific parametrizations as a linear and shift-invariant graph filter. To this end, the MSE-optimal parameter vector, ${\mbox{\boldmath $\alpha$}}$, for any graph-filter parametrizations, $h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})$, is found by solving \eqref{derivative_opt_f_only} after substituting the specific parametrizations $f({\bf{\Lambda}})=h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})$: \begin{equation} \label{derivative_opt_alpha} \hat{{\mbox{\boldmath $\alpha$}}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} \EX \left[||h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) - (\tilde{{\bf{x}}} - \EX[\tilde{{\bf{x}}}]) ||^2\right], \end{equation} where $\Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}$ is the relevant parameter space, which is defined by the specific choice of graph filter. This parametric representation of the graph filters interpolates the graph frequency response of the GSP-LMMSE estimator to any graph frequency. Therefore, when the topology is changed, e.g. by adding/removing vertices, we can substitute the new eigenvalue matrix, ${\bf{\Lambda}}$, in the graph filter to obtain the approximation, without generating new training data. The following theorem states the relation between the frequency response of the GSP-LMMSE estimator from \eqref{opt_f} and the optimal parameter vector of a specific parametrization. \begin{Theorem} \label{claim_equivalent} The problem in \eqref{derivative_opt_alpha} is equivalent to the following problem: \begin{eqnarray} \label{filter_coefficients_opt} \hat{{\mbox{\boldmath $\alpha$}}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}} \in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} ||{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{\frac{1}{2}}( \text{diag}(h ({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})) - \text{diag}( \hat{f}({\bf{\Lambda}})) )||^2, \end{eqnarray} where $\hat{f}({\bf{\Lambda}})$ and ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are given in \eqref{opt_f} and \eqref{d_def}, respectively. \end{Theorem} \begin{proof} The proof is given in Appendix \ref{WLS_formulation}. \end{proof} From Theorem \ref{claim_equivalent}, the minimization of the MSE for a specific linear and shift-invariant graph filter in \eqref{derivative_opt_alpha} is equivalent to the minimization of the WLS distance between the desired graph frequency response of the GSP-LMMSE estimator and the graph frequency responses of the chosen graph filter. Using the solution of \eqref{filter_coefficients_opt}, the h-GSP-LMMSE estimator with a general parameterized filter $h(\cdot)$ is given by \begin{equation} \label{GSP_estimator} \hat{{\bf{x}}}^{(\text{h-GSP})} = \EX[{\bf{x}}] + {\bf{V}} h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}){\bf{V}}^T({\bf{y}} - \hat{{\bf{y}}}). \end{equation} Similar to the implementation of the sample-LMMSE and the sample-GSP-LMMSE estimators, using the sample-mean version of $\hat{f}({\bf{\Lambda}})$, obtained by substituting \eqref{sample_d} and \eqref{sample_D} in \eqref{opt_f}, we obtain that the sample-mean version of the optimal graph filter parameters from \eqref{filter_coefficients_opt}: \begin{eqnarray} \label{filter_coefficients_opt_s} \hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}} \in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} ||\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{\frac{1}{2}}\left( \text{diag}(h ({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})) - \hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} \right)||^2. \end{eqnarray} Then, by substituting $h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}})=h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}})$ in \eqref{GSP_estimator}, the sample-mean version of the h-GSP-LMMSE estimator with a general parameterized filter, $h(\cdot)$, is given by \begin{equation} \label{sGSP_estimator} \hat{{\bf{x}}}^{(\text{sh-GSP})} = \EX[{\bf{x}}] + {\bf{V}} h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}){\bf{V}}^T({\bf{y}} - \hat{{\bf{y}}}). \end{equation} The sample-h-GSP estimator for a general graph filter is summarized in Algorithm \ref{algorithm_general}. \vspace{-0.25cm} \begin{algorithm}[hbt] \SetAlgoLined \textbf{Input:} \begin{itemize} \item The function ${\bf{g}}({\bf{L}},{\bf{x}})$. \item The Laplacian matrix ${\bf{L}}$. \item The distribution of ${\bf{x}}$, $f_{\bf{x}}$, and its mean, $\EX[{\bf{x}}]$. \item The distribution of ${\bf{w}}$. \item Parameterized filter $h(\cdot)$. \end{itemize} {\textbf{Algorithm Steps:}} \begin{enumerate} \setlength\itemsep{0.2em} \item Generate $P$ random samples of ${\bf{x}}$, with a pdf $f_{\bf{x}}$. \item Evaluate the sample vectors: $\hat{{\bf{y}}}$, $\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$, and $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{sample_mean}, \eqref{sample_d}, and \eqref{sample_D}, respectively. \label{sample_step} \item Compute the optimal graph filter coefficient vector, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$ by solving \eqref{filter_coefficients_opt_s}. \label{Compute_step} \end{enumerate} \vspace{1mm} {\textbf{Output$\colon$}} sample-h-GSP estimator $\hat{{\bf{x}}}^{(\text{sh-GSP})} = \EX[{\bf{x}}] + {\bf{V}} h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}){\bf{V}}^T({\bf{y}} - \hat{{\bf{y}}}).$ \caption{Sample-h-GSP estimator} \label{algorithm_general} \end{algorithm} \vspace{-0.25cm} In the following subsections, we present three different GSP estimators for different choices of typical graph filters $h(\cdot;{\mbox{\boldmath $\alpha$}})$ and we evaluate their associated optimal parameters. The difference between the estimators in Subsections \ref{linear_pseudo_inverse_filter_subsection}- \ref{LC_ARMA_filter_subsection} is that they are based on different parametrizations and implementations. The minimization in \eqref{filter_coefficients_opt} implies that one should choose a graph-filter parametrization, $h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})$, that will be close to the desired graph frequency response, $\hat{f}({\bf{\Lambda}})$, from \eqref{opt_f}. Therefore, the shape of the desired graph frequency response curve affects the suitable choice of the graph filter parameterization, which is application-dependent. The study of $\hat{f}({\bf{\Lambda}})$ is expected to lead to a better understanding of what kinds of filters are useful. This study can be done, for example, based on theoretical properties such as low-pass and high-pass graph filters \cite{Rama2020Anna} and on a simulation study. For example, in the simulations in Section \ref{simulation}, $\hat{f}({\bf{\Lambda}})$ behaves as a low-pass graph filter, and thus, we choose graph filters suitable for this case. The presented framework can be easily extended to other graph filters for different shapes of $\hat{f}({\bf{\Lambda}})$. \subsection{Filter 1: sample linear pseudo-inverse GSP estimator} \label{linear_pseudo_inverse_filter_subsection} For the linear pseudo-inverse graph filter from Subsection \ref{LFI_representation}, the graph filter from \eqref{pseudo_inverse_filter_def} satisfies \begin{equation} \label{new h} \text{diag}(h^{\text{LPI}}({\bf{\Lambda}}^{\dagger};{\mbox{\boldmath $\alpha$}}^{\text{LPI}})) = \bar{\bf{\Gamma}}_K{\mbox{\boldmath $\alpha$}}^{\text{LPI}}, \end{equation} where ${\mbox{\boldmath $\alpha$}}^{\text{LPI}}$ is the filter coefficients vector from \eqref{LPI_coefficients} and $\bar{\bf{\Gamma}}_K$ is a $N \times (K+1)$ matrix with elements \begin{equation} \label{barGammamat} [\bar{\bf{\Gamma}}_K]_{i,j} = \begin{cases} \lambda_i^{-(j-1)}, &\text{for } 2 \leq i \leq N,~ j =1,\dots,K+1\\ 1, &\text{for } i=j =1\\ 0, &\text{otherwise.} \end{cases} \end{equation} Therefore, the optimal filter coefficients, ${\mbox{\boldmath $\alpha$}}^{\text{LPI}}$, are obtained by substituting \eqref{new h} in \eqref{filter_coefficients_opt_s} and removing a constant term, which results in \begin{equation} \label{Linear pseudo-inverse graph filter objective function} \hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \mathbb{R}^{K+1}} {\mbox{\boldmath $\alpha$}}^T\bar{{\bf{\Gamma}}}_K^T\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}\bar{{\bf{\Gamma}}}_K {\mbox{\boldmath $\alpha$}} - 2\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}^T\bar{{\bf{\Gamma}}}_K{\mbox{\boldmath $\alpha$}}. \end{equation} To avoid overfitting, we replace \eqref{Linear pseudo-inverse graph filter objective function} by the following regularized minimization: \begin{equation} \label{minimization_LPI_final} \hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \mathbb{R}^{K+1}} {\mbox{\boldmath $\alpha$}}^T\bar{{\bf{\Gamma}}}_K^T\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}\bar{{\bf{\Gamma}}}_K {\mbox{\boldmath $\alpha$}} - 2\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}^T\bar{{\bf{\Gamma}}}_K{\mbox{\boldmath $\alpha$}} + \mu {\mbox{\boldmath $\alpha$}}^T{\bf{M}}_{\text{LPI}}{\mbox{\boldmath $\alpha$}}, \end{equation} where $\mu \geq 0$ is a regularization coefficient and ${\bf{M}}_{\text{LPI}}$ is a positive semidefinite regularization matrix. By equating the gradient of \eqref{minimization_LPI_final} w.r.t. ${\mbox{\boldmath $\alpha$}}$ to zero, we obtain \begin{equation} \label{LPI_invers_Matrix} \hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}} = \left(\bar{{\bf{\Gamma}}}_K^T\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}\bar{{\bf{\Gamma}}}_K + \mu{\bf{M}}_{\text{LPI}} \right )^{-1}\bar{{\bf{\Gamma}}}_K^T \hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}. \end{equation} In practice, in order to avoid the numerically unstable problem of inverting the $(K+1)\times (K+1)$ matrix, one can solve the convex optimization problem in \eqref{minimization_LPI_final} by using any existing quadratic programming algorithm. The sample-h-GSP estimator with the linear pseudo-inverse graph filter is implemented by Algorithm \ref{algorithm_general}, where Step \ref{Compute_step} is obtained by evaluating the matrix $\bar{\bf{\Gamma}}$ from \eqref{barGammamat} and then computing $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}}$ either by \eqref{LPI_invers_Matrix} or by using a quadratic programming algorithm to solve \eqref{minimization_LPI_final}. Since the regularization matrix, ${\bf{M}}_{\text{LPI}}$, is a positive semidefinite matrix, the optimization problem in \eqref{minimization_LPI_final} is a convex optimization problem and $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}}$ is its unique solution, for any $\mu \geq 0$ as long as the matrix $\bar{{\bf{\Gamma}}}_K^T\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}\bar{{\bf{\Gamma}}}_K$ is a positive definite matrix. This condition holds if $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a positive definite matrix and $\text{rank}(\bar{{\bf{\Gamma}}}_K) = K+1$ (see e.g. Chapter 7 in \cite{Horn_Johnson_book}). It is assumed in this paper that ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{d_def} is non-singular (and thus, positive definite). Thus, by taking enough off-line measurements, ${\bf{x}}_1,\ldots,{\bf{x}}_P$, the sample covariance matrix $\hat{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a positive definite matrix as well. The following claim states a condition for $\bar{{\bf{\Gamma}}}_K$ from \eqref{barGammamat} to be full (column) rank. \begin{Claim} \label{claim1} If there are $K+1$ distinct eigenvalues of the matrix ${\bf{L}}$ such that $\lambda_n \neq \lambda_k$, $\forall n \neq k$, then, $\text{rank}(\bar{{\bf{\Gamma}}}_K) = K+1 $. \label{diff_lambda_i_2} \end{Claim} \begin{proof} See Appendix \ref{rank_Appendix}. \end{proof} \subsection{Filter 2: sample ARMA GSP estimator} \label{ARMA_filter_subsection} For the ARMA graph filter from Subsection \ref{ARMA_representation}, the graph filter \eqref{eq:0} satisfies \begin{eqnarray} \label{ARMA filter as matrix} \text{diag}(h^{{\text{ARMA}}}({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}})) \hspace{3cm} \nonumber\\= \left(\text{diag}({\bf{\Phi}}(N,R){\bf{a}})\right)^{-1}{\bf{\Phi}}(N,Q){\bf{c}}, \end{eqnarray} where ${\mbox{\boldmath $\alpha$}}^{{\text{ARMA}}}$ is the filter coefficients vector from \eqref{ARMA_coefficients}, ${\bf{\Phi}}(N,O)$ is a $N \times (O+1)$ Vandermonde matrix defined by \begin{equation} \label{Gammamat_def} {\bf{\Phi}}(N,O)\stackrel{\triangle}{=} \left[\begin{array}{cccc} 1 & \lambda_1 &\dots & \lambda_1^{O} \\ \vdots & \vdots & \ddots & \vdots\\ 1 & \lambda_N & \dots & \lambda_N^{O} \end{array}\right]. \end{equation} The associated filter coefficients, ${\mbox{\boldmath $\alpha$}}^{\text{ARMA}} = [{\bf{a}}^T,{\bf{c}}^T]^T$, are obtained by substituting \eqref{ARMA filter as matrix} in \eqref{filter_coefficients_opt_s} and removing a constant term, which results in \begin{eqnarray}\label{minimization ARMA} \left(\hat{\bf{a}},\hat{\bf{c}}\right) = \argmin_{\substack{{\bf{a}}\in \mathbb{R}^{R+1}\\{\bf{c}}\in \mathbb{R}^{Q+1}}} \left\{ {\bf{c}}^T{\bf{\Phi}}^T(N,Q)\left(\text{diag}({\bf{\Phi}}(N,R){\bf{a}})\right)^{-1}\right.\nonumber \\ \times \hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} \left(\text{diag}({\bf{\Phi}}(N,R){\bf{a}})\right)^{-1} {\bf{\Phi}}(N,Q){\bf{c}} \nonumber \\ - 2\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}^T \left(\text{diag}({\bf{\Phi}}(N,R){\bf{a}})\right)^{-1}{\bf{\Phi}}(N,Q){\bf{c}} \nonumber\\\left. + \mu{\bf{a}}^T{\bf{M}}_{{\bf{a}}}{\bf{a}} +\mu{\bf{c}}^T{\bf{M}}_{{\bf{c}}}{\bf{c}}\right\}, \end{eqnarray} where $a_0 =1$ and the last two terms are regularization terms that have been added to avoid overfitting, in which $\mu \geq 0$ is a regularization coefficient, and ${\bf{M}}_{{\bf{a}}}$ and ${\bf{M}}_{{\bf{c}}}$ are positive semidefinite regularization matrices. Equating the derivative of \eqref{minimization ARMA} w.r.t. ${\bf{c}}$ to zero, results in \begin{equation} \label{b ARMA} \begin{split} \hat{{\bf{c}}}^{\text{ARMA}}({\bf{a}}) = \hspace{6cm}\\ ( {\bf{\Phi}}^T(N,Q)(\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} \hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}(\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} \\ \times {\bf{\Phi}}(N,Q) +\mu{\bf{M}}_{{\bf{c}}})^{-1} {\bf{\Phi}}^T(N,Q)(\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1}\hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}. \end{split} \end{equation} By substituting \eqref{b ARMA} in the objective function from \eqref{minimization ARMA}, we obtain \begin{eqnarray}\label{minimization_ARMA_new} \hat{\bf{a}}^{\text{ARMA}} = \argmax_{{\bf{a}}\in \mathbb{R}^{R+1}} \hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}^T(\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1}\hspace{1cm} \nonumber\\ \times {\bf{\Phi}}(N,Q) \hat{{\bf{c}}}^{\text{ARMA}}({\bf{a}}) + \mu{\bf{a}}^T{\bf{M}}_{{\bf{a}}}{\bf{a}}, \end{eqnarray} where $a_0 =1$. The optimal ${\bf{c}}$ is given by substituting the solution of \eqref{minimization_ARMA_new} in \eqref{b ARMA}, i.e., $\hat{{\bf{c}}}^{\text{ARMA}} = {\bf{c}}(\hat{{\bf{a}}}^{\text{ARMA}})$. Finally, the sample-GSP estimator with the ARMA graph filter is implemented by Algorithm \ref{algorithm_general}, where Step \ref{Compute_step} is obtained by: I. evaluating the matrices ${\bf{\Phi}}(N,R)$ and ${\bf{\Phi}}(N,Q)$ from \eqref{Gammamat_def}; II. computing $\hat{{\bf{a}}}$ by solving \eqref{minimization_ARMA_new} numerically; and III. Computing $\hat{{\bf{c}}}$ by substituting the result of II in \eqref{b ARMA}. In the simulations we used the Matlab function `fminsearch' to approximate \eqref{minimization_ARMA_new}. Since the regularization matrix, ${\bf{M}}_{{\bf{c}}}$, is a positive semidefinite matrix, \eqref{minimization ARMA} is a convex optimization problem w.r.t. ${\bf{c}}$ for any $\mu\geq 0$ as long as $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is positive definite and $\text{rank}((\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} {\bf{\Phi}}(N,Q)) = Q+1$. The following claim states the condition for this matrix to be full rank. \begin{Claim} \label{claim2} If there are $Q+1$ distinct eigenvalues of the matrix ${\bf{L}}$ and $[{\bf{\Phi}}(N,R){\bf{a}}]_n \neq 0$, $\forall n=1,\dots,N$, then, $\text{rank}((\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} {\bf{\Phi}}(N,Q)) = Q+1 $. \end{Claim} \begin{proof} See Appendix \ref{rank_Appendix}. \end{proof} Therefore, if $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a positive definite matrix and the condition in Claim \ref{claim2} holds, then the objective function in \eqref{minimization ARMA} is a convex optimization problem w.r.t. ${\bf{c}}$ and $\hat{{\bf{c}}}^{\text{ARMA}}({\bf{a}})$ is its unique solution. It should be noted that the ARMA graph filter involves Vandermonde matrices; in order to obtain a stable solution, $R$ and $Q$ should be chosen to have small values \cite{sparse_paper}. As explained after \eqref{Linear_filter_def}, the linear graph filter is a special case of the ARMA graph filter. Thus, the optimal coefficients of the linear graph filter are obtained by substituting ${\bf{a}} = a_0 = 1$, $R=0$, $Q=K$, and $\mu=0$ in \eqref{b ARMA}, which results in \begin{eqnarray}\label{Linear_coefficients_opt} \hat{{\mbox{\boldmath $\alpha$}}}^{\text{lin}} =\hat{{\bf{c}}}^{\text{ARMA}}({\bf{a}}= 1) \hspace{4.5cm}\nonumber\\= \left({\bf{\Phi}}(N,K)^T\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}{\bf{\Phi}}(N,K) \right )^{-1}{\bf{\Phi}}(N,K)^T \hat{{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}, \end{eqnarray} where ${\bf{\Phi}}(\cdot,\cdot)$ is the Vandermonde matrix defined in \eqref{Gammamat_def}. While all filter designs have an equivalent polynomial filter, the matrix ${\bf{\Phi}}(N,K)$ needs to be well-conditioned in order to obtain good estimation by using the filter in \eqref{Linear_filter_def} with the coefficients in \eqref{Linear_coefficients_opt}. This will only be the case for small graph sizes $N$ and/or small filter orders $K$ \cite{sparse_paper,6808520,7926424}, which leads to limited accuracy of the linear graph filter. \subsection{Filter 3: sample low-rank ARMA GSP estimator} \label{LC_ARMA_filter_subsection} For the LR-ARMA graph filter from Subsection \ref{LR_representation}, the graph filter from \eqref{LR_ARMA_def} satisfies \begin{eqnarray}\label{LC_ARMA_filter_as_matrix} h^{{\text{LR-ARMA}}}(\bar{{\bf{\Lambda}}};{\mbox{\boldmath $\alpha$}}^{\text{LR}}) \hspace{5cm}\nonumber\\ =\left[ ( (\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}}^{{\text{LR}}}))^{-1}{\bf{\Phi}}(N_s,Q){\bf{c}}^{{\text{LR}}})^T, {\bf{0}}_{N-N_s}^T \right]^T , \end{eqnarray} where ${\mbox{\boldmath $\alpha$}}^{{\text{LR}}}= [{\bf{a}}^{{\text{LR}}^T},{\bf{c}}^{{\text{LR}}^T}]^T$ is the filter coefficients vector from \eqref{LR_ARMA_coefficients}, and ${\bf{\Phi}}(\cdot,\cdot)$ is the Vandermonde matrix defined in \eqref{Gammamat_def}. Let $\mathcal{U} = \{1,\dots,N_s\}$, $\hat{{\bf{D}}}_{{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}_{\mathcal{U}}}$ denotes the matrix that includes the first $N_s$ rows and columns of $\hat{{\bf{D}}}_{{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}}$ and $\hat{{\bf{d}}}_{{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}_\mathcal{U}}$ denotes the vector that includes the first $N_s$ elements of $\hat{{\bf{d}}}_{{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}}$. Then, similarly to \eqref{b ARMA}-\eqref{minimization_ARMA_new}, the coefficient vector, ${\mbox{\boldmath $\alpha$}}^{\text{LR}} $, is obtained by minimizing \eqref{filter_coefficients_opt_s} with a regularization term after the substitution of \eqref{LC_ARMA_filter_as_matrix}, where ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a diagonal matrix and the last $N-N_s$ entries of \eqref{LC_ARMA_filter_as_matrix} are zero, which results in \begin{eqnarray} \label{b LR-ARMA} \hat{{\bf{c}}}^{\text{LR}}({\bf{a}}) = \left( {\bf{\Phi}}^T(N_s,Q)(\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}}))^{-1}\hat{{\bf{D}}}_{{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}_{\mathcal{U}}} \nonumber\right.\\\left. \times (\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}}))^{-1}{\bf{\Phi}}(N_s,Q) +\mu{\bf{M}}_{{\bf{c}}^{\text{LR}}} \vphantom{ ({\bf{\Phi}}(N_s,Q))^T(\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}}))^{-1}{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}(\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}}))^{-1}{\bf{\Phi}}(N_s,Q) +\mu{\bf{M}}_{{\bf{c}}^{\text{LR}}} } \right)^{-1} \nonumber \hspace{-0.98cm}\\ \times {\bf{\Phi}}^T(N_s,Q)\left(\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}})\right)^{-1} \hat{{\bf{d}}}_{{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}_\mathcal{U}}, \end{eqnarray} and \begin{eqnarray} \label{minimization LR-ARMA new} \hat{\bf{a}}^{\text{LR}} = \argmin_{{\bf{a}}\in \mathbb{R}^{R+1}} \hat{{\bf{d}}}_{{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}_\mathcal{U}}^T\left(\text{diag}({\bf{\Phi}}(N_s,R){\bf{a}})\right)^{-1}{\bf{\Phi}}(N_s,Q) \hat{{\bf{c}}}^{\text{LR}}({\bf{a}})\hspace{-0.98cm} \nonumber\\ + \mu{\bf{a}}^T{\bf{M}}_{{\bf{a}}^{\text{LR}}}{\bf{a}}, \hspace{3cm} \end{eqnarray} where $a_0 =1$ and $\mu \geq 0, {\bf{M}}_{{\bf{a}}^{\text{LR}}}, {\bf{M}}_{{\bf{c}}^{\text{LR}}} 0$ are regularization coefficient and positive semidefinite matrices. Then, the optimal ${\bf{c}}$ is given by substituting the solution of \eqref{minimization LR-ARMA new} in \eqref{b LR-ARMA}, i.e., $\hat{{\bf{c}}}^{\text{LR}} = {\bf{c}}(\hat{{\bf{a}}}^{\text{LR}})$. Similar to Claim \ref{claim2}, the conditions for convexity w.r.t. ${\bf{c}}$ can be derived. Finally, the sample-GSP estimator with the LR-ARMA graph filter is implemented by Algorithm \ref{algorithm_general}, wherein Step \ref{sample_step} evaluates the sample subvectors, $\hat{{\bf{y}}}_\mathcal{U}$, $\hat{{\bf{d}}}_{{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}_\mathcal{U}}$, and $\hat{{\bf{D}}}_{{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}_{\mathcal{U}}}$ from \eqref{sample_mean}, \eqref{sample_d}, and \eqref{sample_D}, respectively; and Step \ref{Compute_step} is obtained by evaluating the matrices ${\bf{\Phi}}(N_s,R)$ and ${\bf{\Phi}}(N_s,Q)$ from \eqref{Gammamat_def} and computing $\hat{{\bf{c}}}^{\text{LR}}({\bf{a}})$ and $\hat{{\bf{a}}}^{\text{LR}}$ by solving \eqref{b LR-ARMA} and \eqref{minimization LR-ARMA new}, respectively. \subsection{Advantages and discussion} \label{computational complexity} An important advantage of the sample linear pseudo-inverse GSP estimator is that its parameters have a closed-form analytic expression in \eqref{LPI_invers_Matrix}. In contrast, the evaluation of the sample ARMA and the LR-ARMA GSP estimators requires solving nonconvex optimization problems \eqref{minimization_ARMA_new} and \eqref{minimization LR-ARMA new}, respectively. On the other hand, since the graph frequency response of the linear pseudo-inverse graph filter from \eqref{LPI graph filter} has a discontinuity at $\lambda = 0$, it may be unstable when $\lambda_2$ approaches $0$ due to topology changes. Since $\lambda_2$ describes the graph connectivity \cite{Newman_2010}, this is only a problem when the network becomes disconnected. The relation between the spectrum of the Laplacian matrix of graphs and the graph is extensively discussed in the literature (see, e.g. in \cite{oellermann1991laplacian2}). For example, suppose the desired graph frequency response, $\hat{f}({\bf{\Lambda}})$, from \eqref{opt_f} and the graph-filter parametrization, $h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})$, satisfy some smoothness assumptions. In this case, it can be shown by using results from \cite{Isufi_Ribeiro,9206091,gao2021stability,kenlay2021interpretable} that the difference between the optimal graph frequency response {\em{after the change}} and the graph-filter parametrization, $h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})$, that is computed with the new ${\bf{\Lambda}}$, is bounded when the topology change is bounded. In terms of computational complexity, the sample-h-GSP from \eqref{sGSP_estimator} computes the same expressions as the sample-GSP-LMMSE estimator from \eqref{sample_LMMSE_GSP}, and thus, has the same computational complexity as described in Subsection \ref{prop_subsection}, with an additional complexity that stems from: a) performing the matrix multiplications of ${\bf{V}} h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}){\bf{V}}^T$, with a computational complexity of $\mathcal{O}(N^3)$; and b) the implementation of the specific graph filter. In detail, implementing the sample linear pseudo-inverse GSP estimator from Subsection \ref{linear_pseudo_inverse_filter_subsection} requires: 1) evaluating the optimal filter coefficients $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{LPI}}$ from \eqref{LPI_invers_Matrix} by computing the inverse of a $K+1 \times K+1$ matrix, with complexity $\mathcal{O}(K^3)$, where $K \ll N$; and 2) computing the graph frequency response from \eqref{new h} with a matrix-vector multiplication of $\mathcal{O}(NK)$. Implementing the sample ARMA and LR-ARMA GSP estimators from Subsections \ref{ARMA_filter_subsection} and \ref{LC_ARMA_filter_subsection}, respectively, requires: 1) evaluating the optimal filter coefficients by solving the nonconvex optimization problem from \eqref{minimization_ARMA_new} and \eqref{minimization LR-ARMA new}, respectively, which has a complexity that depends on the chosen optimization algorithm; and 2) computing the graph frequency response from \eqref{ARMA filter as matrix} and \eqref{LC_ARMA_filter_as_matrix}, respectively, with a matrix-vector multiplication and computing the inverse of the diagonal matrix, with a cost of $\mathcal{O}(N(K+1))$. Finally, all GSP estimators require the EVD of the Laplacian matrix for computing ${\bf{V}}$. This typically requires a $\mathcal{O}(N^3)$ complexity cost, but several fast computation methods for spectral decompositions \cite{le2017approximate,lu2019fast} can be used. The main advantage of the sample-h-GSP estimators is their low computational complexity needed for updating the estimators when the topology changes. In this case, the updated estimator is evaluated by using the graph filter coefficients, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$, that were evaluated based on the original topology, with the Laplacian matrix of the new topology. As a result, the updated sample-h-GSP estimator from \eqref{sGSP_estimator} only requires reevaluation of $h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}})$, where the graph filter coefficients, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$, are known, which has a maximum complexity of $\mathcal{O}(N^3)$. This is in contrast with the reevaluation needed for the sample-LMMSE and the sample-GSP-LMMSE estimators. In addition, the low complexity and distributed implementation of the sample ARMA GSP estimator is described in \cite{sparse_paper,7001054}. \section{Simulation} \label{simulation} In this section we evaluate the performance of the proposed GSP-LMMSE estimator from Section \ref{GSP_estimator_section} and the three parametrizations from Subsections \ref{linear_pseudo_inverse_filter_subsection}-\ref{LC_ARMA_filter_subsection} for solving the problem of power system state estimation (PSSE), which is essential for various monitoring purposes \cite{Abor}. The setting of the PSSE problem is presented in Subsection \ref{seeting_sec}. The different estimation methods that are presented in this section are described in Subsection \ref{Methods}. The results for stationary networks and for networks with topology changes are presented in Subsections \ref{subsection_statonary} and \ref{subsection_change}, respectively. \subsection{Case study: PSSE in electrical networks} \label{seeting_sec} A power system can be represented as an undirected weighted graph, ${\pazocal{G}}({\pazocal{V}},\xi)$, where the set of vertices, $\pazocal{V}$, is the set of buses (generators or loads) and the edge set, $\xi$, is the set of transmission lines between these buses. The measurement vector of the active powers at the buses, ${\bf{y}}$, can be described by the model in \eqref{Model}, with nonlinear measurement function \begin{eqnarray} \label{g_AC} \left[{\bf{g}}({\bf{L}},{\bf{x}})\right]_n\ \stackrel{\triangle}{=} \sum_{m=1}^N |v_n||v_m|(G_{n,m}\cos(x_n -x_{m}) \nonumber\\+B_{n,m}\sin(x_n -x_{m})),\hspace{1.5cm} \end{eqnarray} $n=1,\ldots,N$. Here $x_n$ and $|v_n|$ are the voltage phase and amplitude at the $n$th bus, and $G_{n,m}$ and $B_{n,m}$ are the conductance and susceptance of the transmission line between the buses $n$ and $m$ \cite{Abor}, where $(n,m)\in\xi$. In the graph modeling of the electrical network, the Laplacian matrix, ${\bf{L}}$, is constructed by using $B_{n,m}$, $n,m=1,\ldots,N$ (see Subsection II-C in \cite{Grotas_2019}). We assume that $|v_n|=1$, which is a common assumption \cite{Abor}, and $G_{n,m}$ and $B_{n,m}$ are all known. The goal of PSSE is to recover the state vector, ${\bf{x}}$, from the power measurements of ${\bf{g}}({\bf{L}},{\bf{x}})$, which is known to be a NP-hard problem \cite{bienstock2019strong}. The input graph signal, ${\bf{x}}$, is shown to be smooth \cite{drayer2018detection,dabush2021state}, i.e., its graph smoothness \cite{Shuman_Ortega_2013,8347162}, is small. Therefore, we model the distribution of the input graph signal, ${\bf{x}}$, in the graph frequency domain \cite{Dong_Vandergheynst_2016,ramezani2019graph}, as a smooth Gaussian distribution, as follows: \begin{equation} \label{theta_distribution_simulation} \tilde{{\bf{x}}}_{\text{2$\colon$end}} \sim \pazocal{N}({\bf{0}},\beta {\bf{\Lambda}}^{-1}_{\text{2$\colon$end},\text{2$\colon$end}}), \end{equation} where $\beta$ is a smoothness level. The smooth distribution of $\tilde{{\bf{x}}}$ from \eqref{theta_distribution_simulation} implies in particular that the first graph frequency of ${\bf{x}}$ satisfies $\tilde{x}_1 =0$. Finally, we assume that the noise term, ${\bf{w}}$, from the model in \eqref{Model} in this case is zero-mean Gaussian with covariance matrix ${\bf{C}}_{{\bf{w}}\wvec}=\sigma^2{\bf{I}}_N$. It can be seen that for this example, Conditions \ref{cond2}, \ref{cond3}, and \ref{cond5} from Theorems \ref{claim_separately_Model} and \ref{claim_graphical_Model} are satisfied, but Conditions \ref{cond1} and \ref{cond4} are not satisfied. It can also be shown that \eqref{coincides_Appendix_to_prove_2} is not satisfied. Therefore, the proposed approach is neither the LMMSE estimator nor the graphical Wiener filter \cite{7891646} in this case. The values of the different physical parameters in \eqref{g_AC} are taken from the test case of a 118-bus IEEE power system \cite{iEEEdata}, where $N=118$. The MSE of the different estimators is calculated by performing 10,000 Monte Carlo simulations. \subsection{Methods} \label{Methods} In the simulations we compare the performance of the following estimators:\\ 1) The sample-LMMSE estimator from \eqref{Monte_Carlo_LMMSE}.\\ 2) The sample-LMMSE estimator from \eqref{Monte_Carlo_LMMSE} with a large $P$ ($P=5 \cdot 10^6 \hspace{-0.15cm}\gg \hspace{-0.15cm}N$), denoted as $P_\infty$-LMMSE. In this asymptotic regime, the sample-LMMSE estimator converges to the LMMSE estimator. Since the MSE of the LMMSE estimator is lower than the MSE of any linear estimator, it can be used as a benchmark for a stationary network.\\ 3) The sample-GSP-LMMSE estimator from Algorithm \ref{Alg_opt}.\\ 4) The sample linear pseudo-inverse GSP estimator from Algorithm \ref{algorithm_general} with $K=6$, where Step \ref{Compute_step} is implemented as explained after \eqref{LPI_invers_Matrix}, and the regularization matrix is set to $ {\bf{M}}_{\text{LPI}} = \text{diag}(\lambda_N^0,\dots,\lambda_N^{K})$ in order to restrict the length of the filter and of the power of the pseudo-inverse of the Laplacian.\\ 5) The sample ARMA GSP estimator, which is implemented as explained after \eqref{minimization_ARMA_new}, with $R,Q = 3$, ${\bf{M}}_{{\bf{a}}} = {\bf{I}}_{R}$, ${\bf{M}}_{{\bf{c}}} = {\bf{I}}_Q$. \\ 6) The sample LR-ARMA GSP estimator, which is implemented as explained after \eqref{minimization LR-ARMA new}, with ${R}_{{\text{LR}}},Q_{{\text{LR}}} = 2$, ${\bf{M}}_{{\bf{a}}^{\text{LR}}}= {\bf{I}}_{{R}_{{\text{LR}}}}$, ${\bf{M}}_{{\bf{c}}^{\text{LR}}}= {\bf{I}}_{Q_{{\text{LR}}}}$, and the cutoff frequency $N_s = 0.3N$. Thus, it uses only the $30\%$ smallest eigenvalues and their associated eigenvectors of the Laplacian matrix, ${\bf{L}}$.\\ 7) The LMMSE estimator evaluated for the linear approximation of the model in \eqref{g_AC}. That is, the nonlinear function from \eqref{g_AC} is linearized by \cite{Abor} $ {\bf{g}}({\bf{L}},{\bf{x}}) \approx {\bf{L}}{\bf{x}}$. Then, $\EX[{\bf{y}}] = {\bf{0}}$, ${\bf{C}}_{{\bf{y}}\yvec} = \beta{\bf{L}} + \sigma^2{\bf{I}}_N $, and $ {\bf{C}}_{{\bf{x}}{\bf{y}}} = \beta{\bf{L}}^{\dagger}{\bf{L}}$, resulting in \begin{equation} \label{LS} \hat{\bf{x}}^{(\text{aLMMSE})} =\beta {\bf{L}}^\dagger{\bf{L}}(\beta{\bf{L}} + \sigma^2{\bf{I}}_N)^{-1}{\bf{y}}. \end{equation} \subsection{Example A: stationary network} \label{subsection_statonary} In this subsection, we investigate the case where the topology is constant and, thus, the statistical properties of ${\bf{y}},{\bf{x}}$ are constant. In Fig. \ref{fig:Diff N}, we present the MSE of the methods from Subsection \ref{Methods} for different values of $P$, i.e., different numbers of training data points used to evaluate the sample-mean values. It can be seen that the linearized-model based estimator from \eqref{LS} and the lower bound obtained by $P_\infty$-LMMSE are independent of $P$, as expected. The sample-LMMSE estimator from \eqref{Monte_Carlo_LMMSE} uses the inverse of the sample covariance matrix $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$, which requires a large number of training data points to achieve a stable estimation. Thus, it can be seen that for $P<10N$, where $N=118$, the MSE of the sample-LMMSE estimator is higher than the MSE of the proposed methods: the sample-GSP-LMMSE, the sample linear pseudo-inverse GSP, and the sample ARMA GSP estimators. In this example, the sample linear pseudo-inverse GSP and the sample ARMA GSP estimators coincide with the sample-GSP-LMMSE estimator. Thus, the chosen parametrizations are an accurate approximation of the desired graph frequency response. In addition, for $P>10^4$, these GSP estimators and the sample-LMMSE estimator converge. It can be seen that the MSE of the LMMSE estimator, represented by $P_\infty$-LMMSE, provides a lower bound on the MSE of any linear estimator, where the GSP-LMMSE, linear pseudo-inverse GSP, and ARMA GSP estimators achieve this lower bound for a much smaller value of $P$ than the sample-LMMSE estimator. This result holds although Condition \ref{cond1} from Theorem \ref{claim_separately_Model} is not satisfied and the proposed GSP-LMMSE estimator differs from the LMMSE estimator. Finally, the sample LR-ARMA GSP estimator has a lower MSE than the sample-LMMSE estimator for $P<3N$ and achieves lower MSE than the LMMSE estimator evaluated for the linear approximation from \eqref{LS} for $P>0.1N$. \vspace{-0.35cm} \begin{figure}[hbt] \centering \includegraphics[width=0.7\linewidth]{Diff_N2.eps} \caption{The MSE versus $P$ for the different estimators, where $\sigma^2 = 0.05$ and $\beta = 3$.} \label{fig:Diff N} \vspace{-0.5cm} \end{figure} In Fig. \ref{fig:Diff sigma}, we present the MSE versus the noise variance, $\sigma^2$ for $P=500$ and $\beta=3$. It can be seen that the MSE of all estimators (except the aLMMSE from \eqref{LS}, which is based on a linearization of the model) increases as the noise variance increases. In this case, the sample-GSP-LMMSE, the sample linear pseudo-inverse GSP, and the sample ARMA GSP estimators outperform the sample-LMMSE estimator and approach the lower bound obtained by $P_\infty$-LMMSE for all values of the noise variance. \vspace{-0.25cm} \begin{figure}[hbt] \centering \includegraphics[width=0.7\linewidth]{Diff_sigma2.eps} \caption{The MSE versus $\frac{1}{\sigma^2}$ for the different estimators, where $P = 500$ and $\beta = 3$.} \label{fig:Diff sigma} \vspace{-0.25cm} \end{figure} In order to demonstrate the complexity of the estimators empirically, the average computation time was evaluated using Matlab on an Intel Core(TM) i7-7700K CPU computer, 4.2 GHz. In Fig. \ref{fig:Times}, we present the runtime of the different estimators versus the target MSE, where $\sigma^2 = 0.05$ and $\beta = 3$. It can be seen that the runtime of all the estimators increases as the target MSE decreases. The runtimes of the sample ARMA GSP and the sample LR-ARMA GSP estimators are the highest since finding their optimal coefficients requires solving a nonconvex optimization problem (see Subsections \ref{ARMA_filter_subsection} and \ref{LC_ARMA_filter_subsection}, respectively), while the LR-ARMA has a lower runtime since it has fewer coefficients. The proposed sample-GSP-LMMSE estimator has the lowest runtime for any target MSE, and the proposed sample linear pseudo-inverse GSP estimator is the second-best in terms of runtime. It should be noted that the topology is stationary in this simulation. Thus, the EVD of the Laplacian matrix, ${\bf{L}}$, is assumed to be known and given in advance. When there is a change in the network, the computational complexity of updating the sample-h-GSP estimators is much lower than those of the other estimators and, thus, has a shorter runtime. This is since the sample-h-GSP estimators use the graph filter coefficients, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$, that were evaluated on the initial topology. In contrast, the sample-LMMSE and the sample-GSP-LMMSE estimators require a reevaluation for each new topology, as shown in the following subsection. \vspace{-0.4cm} \begin{figure}[hbt] \centering \includegraphics[width=0.75\linewidth]{run_time.eps} \caption{The runtime for the different estimators versus the target MSE, where $\sigma^2 = 0.05$ and $\beta = 3$.} \label{fig:Times} \vspace{-0.5cm} \end{figure} \subsection{Example B: estimation under topology changes} \label{subsection_change} \vspace{-0.1cm} In this subsection, we discuss the case where the underlying topology changes over time. For example, when a sensor fails or changes its location, the sensor network's topology changes. Similarly, the power grid topology may be changed by failure, opening and closing of switches on power lines, and the presence of new loads and generators. When ${\bf{L}}$ changes, the measurement function, ${\bf{g}}({\bf{L}},{\bf{x}})$, from the model in \eqref{Model} and the distribution from \eqref{theta_distribution_simulation}, change. Our goal is to estimate ${\bf{x}}$ without generating new dataset. The MSE of the different estimators is considered under random changes in the topology with the constraints that the graph will remain well-connected, i.e., assuming that $\lambda_2$, which is related to the connectivity \cite{Newman_2010} did not reduce significantly. The MSE shown is the average MSE over 100 random changes on the graph. \subsubsection{Estimation under edge changes} In this case, the changes in the topology are due to the addition or removal of edges. Thus, the problem dimension did not change. In order to evaluate all the estimators from Section \ref{Methods} we use the mean of ${\bf{x}}$, i.e., $\EX[{\bf{x}}]$, the eigenvalue and eigenvectors of the Laplacian matrix with the historical sample values, such as $\hat{{\bf{C}}}_{{\bf{y}}\yvec}$ from \eqref{hat_C_y}, $\hat{{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ from \eqref{sample_D}. It should be noted that in the following, the sample-LMMSE estimator is based on the initial topology, where the sample-GSP-LMMSE, the sample linear pseudo-inverse GSP, and the sample ARMA GSP estimators have been updated to the new topology, as described after \eqref{derivative_opt_alpha}. Figures \ref{fig:frequency_response} and \ref{fig:frequency_response_7_new} present the graph frequency response of the different sample-GSP estimators, where $P = 500$, $\sigma^2 = 0.05$ and $\beta = 3$ for the stationary network from Example A (Fig. \ref{fig:frequency_response}) and for the topology change from Example B, where $M = 7$ new edges were added (Fig. \ref{fig:frequency_response_7_new}). It can be seen that in both cases, all GSP filters achieve almost the same graph frequency response as the sample-GSP-LMMSE estimator and, thus, they can be considered as robust to topology changes. The graph frequency response of the sample GSP-LMMSE at $\lambda_1 $ is $0$, which is approximated by the h-GSP filters as a small value. However, it can be seen that the graph frequency response is a nonzero (small) response (i.e. the output ${\bf{y}}$ is not a perfect graph low-frequency signal) while the graph frequency response of the LR-ARMA GSP estimator is absolutely zero for $\lambda>36$. Therefore, the LR-ARMA GSP estimator does not perform well in the simulations. For perfectly low-frequency signals (not shown here due to space limitations), the LR-ARMA GSP estimator achieves the same performance as the other h-GSP estimators. In addition, it can be seen in Fig. \ref{fig:frequency_response_7_new} that the graph frequency response of the sample-GSP-LMMSE estimator that was evaluated based on the initial topology (red) is a less accurate approximation of the optimal graph frequency response. Finally, the desired graph frequency response, $\hat{f}({\bf{\Lambda}})$, includes a sharp transition since $f(\lambda_1)=0$; thus, a linear graph filter as in \eqref{Linear_filter_def} is inappropriate for this case since it requires a high filter order leading to a high implementation cost and limited accuracy \cite{sparse_paper}. \begin{figure}[hbt] \centering \subcaptionbox{\label{fig:frequency_response}}[\linewidth] { \includegraphics[width=0.75\linewidth]{frequency_response.eps}\vspace{-0.2cm}} \subcaptionbox{\label{fig:frequency_response_7_new}}[\linewidth] {\includegraphics[width=0.75\linewidth]{frequency_response_7.eps}\vspace{-0.2cm}} \caption{ The graph frequency response of the different estimators, where $P = 500$, $\sigma^2 = 0.05$ and $\beta = 3$, for (a) a stationary network; and (b) a network with the addition of $M=7$ edges. } \end{figure} Figures \ref{fig:add edge} and \ref{fig:remove edge} present the case where the sample-mean values were calculated from the dataset which is evaluated on a topology before $M$ edges are added or removed. Since there is no straightforward methodology to update the sample-LMMSE estimator to the new topology, its performance in the sense of the MSE is impaired for both cases: added and removed edges. Moreover, even when a small number of new edges is added, the MSE of the sample-LMMSE significantly increases. It can be seen that even for $2$ new edges, the sample LR-ARMA GSP estimator has a lower MSE than the sample-LMMSE estimator. The sample linear pseudo-inverse GSP and the sample ARMA GSP estimators have a lower MSE for any number of edges added or removed. The sample-GSP-LMMSE estimator that has been updated to the new topology, has the same MSE as the sample linear pseudo-inverse GSP estimator and the sample ARMA GSP estimator for a small number of edges added or removed, and a slightly higher MSE for a large number of edges added or removed. The aMMSE estimator performance increases for edges removed and improves for the case where new edges are added. It should be noted that in addition to their advantage in terms of MSE, the computational complexity of updating the sample-h-GSP estimators is lower than those of the sample-LMMSE and the sample-GSP-LMMSE estimators. This is since the sample-h-GSP estimators use the graph filter coefficients, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$, that were evaluated on the initial topology, while the sample-LMMSE and the sample-GSP-LMMSE estimators require to reevaluate the estimators from scratch for the new topology. \begin{figure}[hbt] \centering \subcaptionbox{\label{fig:add edge}}[\linewidth] { \includegraphics[width=0.75\linewidth]{new_edges.eps}\vspace{-0.2cm}} \subcaptionbox{\label{fig:remove edge}}[\linewidth] {\includegraphics[width=0.75\linewidth]{remove_edges.eps}\vspace{-0.2cm}} \caption{ The MSE of the updated GSP estimators, the sample-LMMSE estimator, and the aLMMSE estimator, where $P = 500$, $\sigma^2 = 0.05$, and $\beta = 3$, for (a) the addition of $M$ new edges; and (b) a removal of $M$ edges. The error bars show confidence intervals of $\pm 0.5$ standard deviations.} \end{figure} \subsubsection{Estimation under vertices changes} When $M$ vertices are removed or added, the problem dimension changes. That is, ${\bf{x}},{\bf{y}} \in \mathbb{R}^{N\pm M}.$ Since the sample-LMMSE and the sample-GSP-LMMSE estimators are $\mathbb{R}^{N} \rightarrow \mathbb{R}^{N}$ estimators, they cannot be implemented in the new problem. Therefore, we use the following methods: 1) for $M$ new vertices, the sample-LMMSE and the sample-GSP-LMMSE estimators estimate the signal at the new vertices by zero and do not use measurements from those vertices; 2) for $M$ removed vertices, the sample-LMMSE and the sample-GSP-LMMSE estimators are updated by removing the appropriate rows and columns. That is, the sample-LMMSE estimator from \eqref{Monte_Carlo_LMMSE} is given by \begin{equation} \label{update1} \begin{split} \hat{\bf{x}}^{(\text{sLMMSE})}_{\mathcal{S}} = \EX[{\bf{x}}] + [\hat{{\bf{C}}}_{{{\bf{x}}{\bf{y}}}}\hat{{\bf{C}}}_{{{\bf{y}}\yvec}}^{-1}]_{\mathcal{S}}\left({\bf{y}}_{\mathcal{S}} - \hat{{\bf{y}}}_{\mathcal{S}}\right), \end{split} \end{equation} and the sample-GSP-LMMSE estimator from \eqref{sample_LMMSE_GSP} is given by \begin{equation} \label{update2} \begin{split} \hat{{\bf{x}}}^{(\text{sGSP-LMMSE})}_{\mathcal{S}} = \EX[{\bf{x}}] + [{\bf{V}}\hat{f}({\bf{\Lambda}}){\bf{V}}^T]_{\mathcal{S}} ({\bf{y}}_{\mathcal{S}} - \hat{{\bf{y}}}_{\mathcal{S}}), \end{split} \end{equation} where we use the historical eigenvalue and eigenvectors of the Laplacian matrix and the historical sample values of the covariance matrices, evaluated using the historical dataset. In \eqref{update1} and \eqref{update2} we use the notation that ${\bf{A}}_{\mathcal{S}}$ is the submatrix of ${\bf{A}}$ whose rows and columns are indicated by the set $\mathcal{S}$, where $\mathcal{S}$ is the set of the remaining vertices. In addition, any sample-h-GSP estimator from \eqref{sGSP_estimator}, can be updated to the new topology for both cases: vertices added or removed, as follows: \begin{equation} \label{update_GSP_estimator2} \hat{{\bf{x}}}^{(\text{update-sh-GSP})} = \EX[{\bf{x}}] + {\bf{V}} h({\bf{\Lambda}};\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}){\bf{V}}^T({\bf{y}} - \hat{\bar{{\bf{y}}}}), \end{equation} where we use the true value of $\EX[{\bf{x}}]$, the eigenvalue and eigenvectors of the Laplacian matrix with the filter coefficient, $\hat{{\mbox{\boldmath $\alpha$}}}^{\text{sample}}$, that were evaluated using the historical dataset and $\hat{\bar{{\bf{y}}}} \in \mathbb{R}^{N\pm M} $ that is defined by \begin{equation} [\hat{\bar{{\bf{y}}}}]_n =\begin{cases} 0 & \text{if } n \text{ is added} \\ [\hat{{\bf{y}}}]_n, &\text{if } n \text{ is unchanged} \end{cases},~n=1,\ldots,N, \end{equation} where $\hat{{\bf{y}}}$ is evaluated for the old topology by \eqref{sample_mean}. Figures \ref{fig:add vertices} and \ref{fig:remove vertices} present the case where the historical sample values were calculated from the dataset evaluated on a topology before the addition or removal of the $M$ vertices, respectively. Since there is no straightforward methodology to update the sample-LMMSE and the sample-GSP-LMMSE estimators to the new topology, their MSE is impaired for added and removed vertices. Moreover, even when a small number of new vertices is added, the MSE of the sample-LMMSE and the sample-GSP-LMMSE estimators significantly increases. The other estimators' performance for the cases of added or removed vertices is similar to the result in the cases of added or removed edges in Figs. \ref{fig:add edge} and \ref{fig:remove edge}. In Figs. \ref{fig:add vertices} and \ref{fig:remove vertices}, the confidence intervals of $\pm 0.5$ standard deviations are significant due to the variability in the topology of the different experiments. Thus, increasing the number of experiments does not reduce this confidence interval. \begin{figure}[hbt] \centering \subcaptionbox{\label{fig:add vertices}}[\linewidth] { \includegraphics[width=0.75\linewidth]{new_vertices.eps}\vspace{-0.2cm}} \subcaptionbox{\label{fig:remove vertices}}[\linewidth] {\includegraphics[width=0.75\linewidth]{remove_vertices.eps}\vspace{-0.2cm}} \caption{ The MSE of the updated GSP estimators, the sample-LMMSE estimator, and the aLMMSE estimator, where $P = 500$, $\sigma^2 = 0.05$, and $\beta = 3$, for (a) an addition of $M$ new vertices; and (b) a removal of $M$. The error bars show confidence intervals of $\pm 0.5$ standard deviations.} \vspace{-0.5cm} \end{figure} \section{conclusion} \label{conclusion} In this paper, we discuss a GSP-based Bayesian approach for the recovery of random graph signals from nonlinear measurements. We develop the GSP-LMMSE estimator, which minimizes the MSE among the subset of estimators that are represented as an output of a graph filter. We evaluate the conditions for the GSP-LMMSE estimator to coincide with the LMMSE estimator and with the graphical Wiener filter. If the distributions of the graph signal and the observations are intractable, the sample-mean versions of the different estimators can be used. The diagonal structure of the sample-GSP-LMMSE estimator in the graph frequency domain bypasses the requirement for an extensive dataset to obtain stable estimation of the sample-LMMSE estimator. However, the GSP-LMMSE estimator is a function of the specific graph structure with fixed dimensions, and thus it is not necessarily optimal when the topology changes and is not adaptive to changes in the number of vertices. Therefore, we develop the sample-h-GSP estimators that are the MSE-optimal parametrization of the sample-GSP-LMMSE estimator by graph filters. The sample-h-GSP estimators can be updated when the topology changes without generating a new dataset, even in the case of changes in the number of vertices. In the simulations, we show that the proposed sample-GSP estimators achieve lower MSE than the sample-LMMSE estimator for a limited training dataset, and they coincide with the sample-LMMSE estimator for sufficiently large datasets. In addition, it is shown that the three specific parametric implementations of the GSP-LMMSE: the linear pseudo-inverse GSP estimator, ARMA GSP estimator, and the low-rank ARMA GSP estimator, are robust to changes in the topology without the need for generating new training data. The sample linear pseudo-inverse GSP and the sample ARMA GSP estimators achieve the lowest MSE in these cases, where the ARMA GSP estimator requires less filter coefficients. Thus, the proposed approach is a practical method to recover nonlinear graph signals in networks. There are several directions left for future work. One direction is to study the use of graph neural networks and other nonlinear approaches \cite{Isufi_Ribeiro,gama2020graphs}. In addition, the development of Bayesian bounds on the MSE of general (not necessarily linear) estimators of graph signals, in a similar manner to the non-Bayesian graph Cram$\acute{\text{e}}$r-Rao bound from \cite{routtenberg2020}, should be investigated. Finally, it is interesting to consider distributed implementation of the proposed estimators that include the computation of the optimal coefficient vector and the diagonal sample covariance matrices. \appendices \renewcommand{\thesectiondis}[2]{\Alph{section}:} \section{Proof of Theorem \ref{claim_separately_Model}} \label{separately_Model_Appendix} In this Appendix, we show that under the conditions of Theorem \ref{claim_separately_Model} the equality in \eqref{coincides_condition} holds. Since ${\bf{x}}$ and ${\bf{w}}$ are statistically independent under the considered model, the covariance matrix of $\tilde{{\bf{y}}}$ is given by \begin{equation} \label{separately_Model_Appendix_covariance_matrix} {\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} = {\bf{C}}_{\tilde{{\bf{g}}}\tilde{{\bf{g}}}} + {\bf{C}}_{\tilde{{\bf{w}}}\tilde{{\bf{w}}}}, \end{equation} where $\tilde{{\bf{g}}}={\bf{V}}^T{\bf{g}}({\bf{L}},{\bf{x}})$. Similarly, \begin{equation} \label{crros_covariance_matrix_app_2} {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}= {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{g}}}}. \end{equation} Since from Condition \ref{cond1} the measurement function, ${\bf{g}}({\bf{L}},{\bf{x}})$, satisfies \eqref{separately_Model}, we obtain that the off-diagonal elements of the matrix ${\bf{C}}_{\tilde{{\bf{g}}}\tilde{{\bf{g}}}}$ from \eqref{separately_Model_Appendix_covariance_matrix} satisfy \begin{eqnarray} \label{covariance_matrix_app_1} [{\bf{C}}_{\tilde{{\bf{g}}}\tilde{{\bf{g}}}}]_{n,k} = \EX\Big[([\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_{n} - \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_n) \hspace{1.5cm}\nonumber\\ \times ([\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_{k} - \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_k)\Big] \hspace{1.45cm}\nonumber\\ = \EX\Big[([\tilde{{\bf{g}}}({\bf{L}},\tilde{x}_n{\bf{v}}_n)]_{n} - \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_n) \hspace{0.9cm}\nonumber\\ \times ([\tilde{{\bf{g}}}({\bf{L}},\tilde{x}_k{\bf{v}}_k)]_{k} - \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_k)\Big] =0, \end{eqnarray} for any $n\neq k$, where the last equality follows from Condition \ref{cond2}. Substituting \eqref{covariance_matrix_app_1} in \eqref{separately_Model_Appendix_covariance_matrix} and using Condition \ref{cond3}, which implies that ${\bf{C}}_{\tilde{{\bf{w}}}\tilde{{\bf{w}}}}$ is a diagonal matrix, the matrix ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is also a diagonal matrix, which satisfies \begin{equation}\label{separately_Model_Appendix_C_xx_f} {\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} = \text{diag}\left( \text{diag}({\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} ) \right)= {{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}. \end{equation} Similarly, using Condition \ref{cond1}, the off-diagonal elements of the cross-covariance matrix, ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{g}}}}$ from \eqref{crros_covariance_matrix_app_2} satisfy \begin{eqnarray} \label{separately_Model_Appendix_C_tx} [{\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{g}}}}]_{n,k} = \EX\left[\left([\tilde{{\bf{x}}}]_n- \EX[\tilde{{\bf{x}}}]_n\right) \left([\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_k- \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_k\right)\right] \nonumber\\ = \EX\left[\left([\tilde{{\bf{x}}}]_n- \EX[\tilde{{\bf{x}}}]_n\right) \left([\tilde{{\bf{g}}}({\bf{L}},\tilde{x}_k{\bf{v}}_k)]_k- \EX[\tilde{{\bf{g}}}({\bf{L}},{\bf{x}})]_k\right)\right] \hspace{-0.55cm}\nonumber\\= 0,\hspace{6.33cm} \end{eqnarray} for any $n\neq k$, where the last equality follows from Condition \ref{cond2}. By substituting \eqref{separately_Model_Appendix_C_tx} in \eqref{crros_covariance_matrix_app_2}, we have \begin{equation} \label{separately_Model_Appendix_C_tx_f} {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} ={\text{diag}}({\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}})= \text{diag}({{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}). \end{equation} Therefore, \eqref{separately_Model_Appendix_C_xx_f} and \eqref{separately_Model_Appendix_C_tx_f} imply that ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ and ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are diagonal matrices, and that \eqref{coincides_condition} holds. \section{Proof of Theorem \ref{claim_graphical_Model}} \label{graphical_Model_Appendix} In this Appendix, we show that under the assumption of Theorem \ref{claim_graphical_Model} the equality in \eqref{coincides_condition} holds. By using \eqref{g_filter} from Condition \ref{cond4}, we obtain that $\tilde{{\bf{g}}}({\bf{L}},{\bf{x}}) = f({\bf{\Lambda}}) {\bf{V}}^{T}{{\bf{x}}}$ and thus, \begin{eqnarray} \label{covariance_matrix_app_2} {\bf{C}}_{\tilde{{\bf{g}}}\tilde{{\bf{g}}}} = \EX[( f({\bf{\Lambda}})(\tilde{{\bf{x}}}- \EX[\tilde{{\bf{x}}})]) ( f({\bf{\Lambda}})(\tilde{{\bf{x}}}- \EX[\tilde{{\bf{x}}})])^T] \nonumber\\ = f({\bf{\Lambda}}){\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{x}}}}f({\bf{\Lambda}}),\hspace{3.5cm} \end{eqnarray} where we use the symmetry of $f({\bf{\Lambda}})$. By substituting \eqref{covariance_matrix_app_2} in \eqref{separately_Model_Appendix_covariance_matrix} from Appendix \ref{separately_Model_Appendix} and using Condition \ref{cond3} and Condition \ref{cond5}, which implies that ${\bf{C}}_{\tilde{{\bf{w}}}\tilde{{\bf{w}}}}$ and ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{x}}}}$ are diagonal matrices, we obtain that ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a diagonal matrix, which satisfies \begin{equation}\label{graphical_Model_Appendix_C_xx_f} {\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} =\text{diag}\left( \text{diag}({\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} ) \right)= {{\bf{D}}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}. \end{equation} Similarly, the cross-covariance matrix, ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{g}}}}$ from \eqref{crros_covariance_matrix_app_2} satisfies \begin{eqnarray} \label{graphical_Model_Appendix_C_tx} {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{g}}}} = \EX\left[(\tilde{{\bf{x}}}- \EX[\tilde{{\bf{x}}}]) ( f({\bf{\Lambda}})\left(\tilde{{\bf{x}}}- \EX[\tilde{{\bf{x}}}]\right))^T\right] = {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{x}}}}f({\bf{\Lambda}}), \end{eqnarray} where we use the fact that $f({\bf{\Lambda}})$ is a symmetric matrix. By substituting \eqref{graphical_Model_Appendix_C_tx} in \eqref{crros_covariance_matrix_app_2} from Appendix \ref{separately_Model_Appendix}, the cross-covariance matrix of $\tilde{{\bf{x}}}$ and $\tilde{{\bf{y}}}$ is a diagonal matrix, and satisfies \begin{equation} \label{graphical_Model_Appendix_C_tx_f} {\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} = \text{diag}({{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}), \end{equation} where ${{\bf{d}}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ is defined in \eqref{d_def}. Therefore, \eqref{graphical_Model_Appendix_C_xx_f} and \eqref{graphical_Model_Appendix_C_tx_f} imply that ${\bf{C}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ and ${\bf{C}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are diagonal matrices, and that \eqref{coincides_condition} holds. \section{Derivation of \eqref{filter_coefficients_opt}} \label{WLS_formulation} In this Appendix we show that solving \eqref{derivative_opt_alpha} is equivalent to \eqref{filter_coefficients_opt}. By adding and subtracting $\hat{f}({\bf{\Lambda}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}])$ from the r.h.s. of \eqref{derivative_opt_alpha}, one obtains \begin{eqnarray} \hat{{\mbox{\boldmath $\alpha$}}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} \EX [||h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) - (\tilde{{\bf{x}}} - \EX[\tilde{{\bf{x}}}]) \hspace{0.9cm}\nonumber \\ -\hat{f}({\bf{\Lambda}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) + \hat{f}({\bf{\Lambda}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) ||^2] \hspace{0.40cm}\nonumber\\= \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} \EX [|| ( (h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})-\hat{f}({\bf{\Lambda}}) ) (\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}])) ||^2] \hspace{0.13cm}\nonumber\\+ 2\EX [(\hat{f}({\bf{\Lambda}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) - ((\tilde{{\bf{x}}} -\EX[\tilde{{\bf{x}}}]) ))^T \hspace{0.009cm}\nonumber\\ \times ( (h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})-\hat{f}({\bf{\Lambda}}) ) (\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) )],\hspace{0.85cm} \label{last_eq} \end{eqnarray} where the last equality is obtained by removing constant terms w.r.t. ${\mbox{\boldmath $\alpha$}}$. In addition, by substituting $\hat{f}({\bf{\Lambda}})$ from \eqref{opt_f} in the last term of \eqref{last_eq} it can be verified that \begin{eqnarray} \EX [(\hat{f}({\bf{\Lambda}})(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) - ((\tilde{{\bf{x}}} -\EX[\tilde{{\bf{x}}}]) ))^T \hspace{2.3cm}\nonumber\\ \times ((h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})-\hat{f}({\bf{\Lambda}})) (\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) )] \nonumber\\= (\text{diag}(\hat{f}({\bf{\Lambda}})))^T{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}( \text{diag}(h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}))- \text{diag}(\hat{f}({\bf{\Lambda}})) ) \hspace{0.06cm}\nonumber\\ - {\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}^T( \text{diag}(h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}))- \text{diag}(\hat{f}({\bf{\Lambda}})) ) = 0,\hspace{1.5cm} \label{zerp_eq} \end{eqnarray} where ${\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}$ and ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ are defined in \eqref{d_def}. By substituting \eqref{zerp_eq} in \eqref{last_eq}, one obtains \begin{eqnarray} \hat{{\mbox{\boldmath $\alpha$}}} = \argmin_{{\mbox{\boldmath {\scriptsize $\alpha$}}}\in \Omega_{{\mbox{\boldmath {\scriptsize $\alpha$}}}}} \EX [|| (h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})-\hat{f}({\bf{\Lambda}}) ) (\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}]) ||^2] \nonumber\\ = \EX [|| \text{diag}(\tilde{{\bf{y}}} - \EX[\tilde{{\bf{y}}}])\text{diag}(h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}})-\hat{f}({\bf{\Lambda}}) ) ||^2] \hspace{-0.138cm}\nonumber\\ = (\text{diag}(h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}))-\text{diag}(\hat{f}({\bf{\Lambda}})) )^T{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} \hspace{1.4cm}\nonumber\\ \times (\text{diag}(h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}))-\text{diag}(\hat{f}({\bf{\Lambda}})) ), \label{last_app_B} \end{eqnarray} where the second equality follows since $h({\bf{\Lambda}};{\mbox{\boldmath $\alpha$}}))$ and $(\hat{f}({\bf{\Lambda}})$ are diagonal matrices. Then, since ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}$ is a diagonal matrix, and thus, a symmetric matrix and it is assumed that it is also a non-singular (and therefore, positive definite) matrix, we obtain \eqref{filter_coefficients_opt} by substituting ${\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}} = {\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{\frac{1}{2}}{\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{\frac{1}{2}}$ and ${\text{diag}}({\text{diag}}({\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}}){\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}) = {\bf{D}}_{\tilde{{\bf{y}}}\tilde{{\bf{y}}}}^{-1}{\bf{d}}_{\tilde{{\bf{x}}}\tilde{{\bf{y}}}} $ in \eqref{last_app_B}. \section{Proof of Claim \ref{claim1} and Claim \ref{claim2}} \label{rank_Appendix} We prove Claim \ref{claim1} by showing that $\text{rank}(\bar{\bf{\Gamma}}) = K+1$ under the condition in Claim \ref{claim1}, where $\bar{\bf{\Gamma}}_K$ is defined in \eqref{barGammamat} and $K+1\leq N$. First, it can be seen that \begin{eqnarray} \label{Gamma2} \bar{{\bf{\Gamma}}}_K = \text{diag}(1,\lambda_2^{-K},\dots,\lambda_N^{-K}) {\bf{B}}_K(\lambda_1,\ldots,\lambda_N), \end{eqnarray} where \[ {\bf{B}}_K(\lambda_1,\ldots,\lambda_N)\stackrel{\triangle}{=} \begin{bmatrix} 1 & 0 &\dots & 0&0 \\ \lambda_2^{K} & \lambda_2^{K-1} &\dots &\lambda_2& 1 \\ \vdots & \vdots & \ddots & \vdots& \vdots\\ \lambda_N^{K} & \lambda_N^{K-1} & \dots &\lambda_N& 1 \end{bmatrix}. \] We assume that the graph is connected, i.e. $0<\lambda_n$, $ n=2,\ldots,N$. Thus, $\text{diag}(1,\lambda_1^{-K},\dots,\lambda_N^{-K})$ is a non-singular matrix. The multiplication of ${\bf{B}}_K(\lambda_1,\ldots,\lambda_N)$ by an $N\times N$ non-singular matrix, in \eqref{Gamma2} implies that (see 0.4.6 in \cite{Horn_Johnson_book}) \begin{eqnarray} \label{Gamma3} \text{rank}(\bar{{\bf{\Gamma}}}_K ) = \text{rank}({\bf{B}}_K(\lambda_1,\ldots,\lambda_N)). \end{eqnarray} By reordering the columns of ${\bf{B}}_K(\lambda_1,\ldots,\lambda_N)$ and using the properties of the Vandermonde matrix ${\bf{\Phi}}(N-1,K)$ from \eqref{Gammamat_def} (see 0.9.11 \cite{Horn_Johnson_book}), we obtain that if there are $K+1$ distinct eigenvalues, then $\text{rank}({\bf{B}}_K(\lambda_1,\ldots,\lambda_N))=K+1$. By using \eqref{Gamma3}, this statement implies that if there are $K+1$ distinct eigenvalues, then $\text{rank}(\bar{{\bf{\Gamma}}}_K )=K+1$. Second, we prove Claim \ref{claim2} by showing that \begin{equation} \label{Matrix_full_rank_1} \text{rank}((\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} {\bf{\Phi}}(N,Q)) = Q+1 \end{equation} under the condition in Claim \ref{claim2}, where ${\bf{\Phi}}(N,R)$ and ${\bf{\Phi}}(N,Q)$ are defined in \eqref{Gammamat_def}, and $Q+1\leq N$. We assume that $[{\bf{\Phi}}(N,R){\bf{a}}]_n \neq 0$, $\forall n=1,\dots,N$ and thus, $\left(\text{diag}({\bf{\Phi}}(N,R){\bf{a}})\right)$ is a non-singular matrix. The multiplication of ${\bf{\Phi}}(N,Q)$ by an $N\times N$ non-singular matrix, $(\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1}$, in \eqref{Matrix_full_rank_1} implies that (see 0.4.6 in \cite{Horn_Johnson_book}) \begin{equation} \label{Matrix_full_rank_2} \text{rank}((\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} {\bf{\Phi}}(N,Q)) = \text{rank}({\bf{\Phi}}(N,Q)).\hspace{-0.07cm} \end{equation} Using the properties (see 0.9.11 \cite{Horn_Johnson_book}) of the Vandermonde matrix, ${\bf{\Phi}}(N,Q)$, we obtain that if there are $Q+1$ distinct eigenvalues, then $\text{rank}({\bf{\Phi}}(N,Q))=Q+1$. By using \eqref{Matrix_full_rank_2}, this statement implies that if there are $Q+1$ distinct eigenvalues, then $\text{rank}((\text{diag}({\bf{\Phi}}(N,R){\bf{a}}))^{-1} {\bf{\Phi}}(N,Q)) = Q+1$. \bibliographystyle{IEEEtran}
\section{Details on the numerical analysis} We integrated AMB+ with a parallel pseudo-spectral code employing periodic boundary conditions and Euler time-update. In all our simulations we set $K=1$, $a=1/4$, spatial spatial discretisation $\Delta x=1$, time-step $dt=2\times 10^{-2}$; we checked that our results are stable upon decreasing $\Delta x$ and $dt$. \subsection{Identification of the interface} To locate the interface, for every $x$ coordinate, we find the first pixel $\bar{y}$ such $\phi(x, \bar{y})>\phi_{th}$, where $\phi_{th}=(\phi_1+\phi_2)/2$. We then place the interface at \begin{eqnarray} h(x) = \bar{y} + \frac{\phi(x, \bar{y})-\phi_{th}}{\phi(x, \bar{y}) - \phi(x, \bar{y}+\Delta x)}\,. \end{eqnarray} Different values of $\phi_{th}$ do not change the results as far as $\phi_{th}$ is sufficiently far from the binodals. \subsection{ Measure of the bubble-size distribution } To measure the distribution of bubbles area, we first transformed the density field in a binary matrix using the threshold $\phi_{th}$. Scanning this matrix sequentially, we then applied a breadth-first search algorithm; the outcome is an $L_x\times L_y$ matrix where each pixel is labeled accordingly to the cluster it belongs to. Building the probability distribution function (PDF) of the vapor regions is then straghtforward. The analysis was performed on a smoothened density field obtained by running a few time-steps of the dynamics without noise. \section{Effective interface equation in the mean-field approximation} In this Appendix we detail the derivation of the effective interface equation (5) of the main text. We start from the mean-field problem ($D=0$) in Appendix \ref{app:effective_int_eq_d0} and consider the effect of noise in Appendix \ref{app:noise}. We also obtain the leading non-linear terms, of order $\mathcal{O}(h^2)$, that correct eq. (5). The full, non-linear, effective equation for $h$ that we obtain is \begin{eqnarray}\label{eq:app:AMB-effectve-eq-h_nonlinear} \partial_t h = &-&\frac{2\sigma_{cw}(q) q^3}{A(q)} h + \zeta \frac{C(q)}{A(q)} \big\{-q^2 \mathcal{F}\left[ |\nabla_{\mathbf{x}} \hat{h}|^2 \right]\nonumber\\ &+&\mathcal{F}\left[\nabla_{\mathbf{x}}\cdot (\nabla_{\mathbf{x}}^2 \hat{h} \nabla_{\mathbf{x}} \hat{h})\right] \big\} +\chi +\mathcal{O}(\zeta q^3 h^3) \end{eqnarray} where $q=|{\bf q} |$, $\mathcal{F}[\cdot ] = \int d\mathbf{x} \,e^{-i {\bf q}\cdot \mathbf{x}}\,\cdot\, $ is the Fourier transform operator along the $\mathbf{x}$ direction (the same convention for the Fourier transform is used throughout what follows), and \begin{eqnarray} C(q) = \int dy_1 dy_2\, \psi'(y_1) \varphi'^2(y_2) e^{-q |y_1-y_2|}\,. \end{eqnarray} The other quantities appearing in (\ref{eq:app:AMB-effectve-eq-h_nonlinear}) were defined in the main text and are reported here for convenience: \begin{eqnarray} &&\sigma_{\rm cw}(q) = \sigma_{\lambda}+ \frac{3\zeta }{4} \int dy_1 dy_2\, \frac{(y_1-y_2)}{|y_1-y_2|} \frac{\psi'(y_1) \varphi'^2(y_2)}{e^{q|y_1-y_2|}}\nonumber \\ &&\sigma_\lambda = K \int dy\,\varphi'(y) \psi'(y)\label{app:eq:sigma_lambda} \\ && A(q) = \int dy_1 dy_2\,\psi'(y_1)\varphi'(y_2) \exp\left(-q |y_1-y_2|\right)\label{app:eq-Aq}\\ && B(q)= \int dy_1 dy_2\, \psi'(y_1)\psi'(y_2)\exp(-q |y_1-y_2|)\,.\label{app:eq-Bq} \end{eqnarray} Finally, the noise $\chi$ is Gaussian and has correlations $\langle\chi ({\bf q}_1,t_1) \chi ({\bf q}_2,t_2)\rangle = C_\chi(q_1) \delta({\bf q}_1+{\bf q}_2)\delta(t_1-t_2)$, where \begin{eqnarray}\label{eq:app:effective-noise} C_\chi(q) = 4(2\pi)^{d-1}\frac{D B(q)}{A^2(q)}q\,. \end{eqnarray} \subsection{Effective interface equation for D=0}\label{app:effective_int_eq_d0} Assuming \begin{eqnarray}\label{eq:app-Ansatz} \phi(\mathbf{r},t)=\varphi(y-\hat{h}(\mathbf{x},t)) \end{eqnarray} in the AMB+ dynamics, we obtain \begin{eqnarray}\label{eq:h-intermediate-app} \nabla^{-2}\partial_t \varphi &= f'(\varphi) - K \nabla^2\varphi +\lambda|\nabla\varphi|^2\nonumber\\ &-\zeta \nabla^{-2}\nabla\cdot\left[(\nabla^2\varphi)\nabla\varphi\right] \end{eqnarray} where $\hat{g}(\mathbf{x},y) = \nabla^{-2}\hat{s}(\mathbf{x},y)$ means that $\hat{g}$ solves $\nabla^2 \hat{g} =\hat{s}$. It is easy to show that the Fourier transform of $\hat{g}$ along $\mathbf{x}$ is given by \begin{eqnarray}\label{eq:app:inverse-lapl} g({\bf q},y) = -\frac{1}{2 q}\int dy_1 e^{-q |y-y_1|}s({\bf q},y_1)\,. \end{eqnarray} Let us first consider the equilibrium case $\lambda=\zeta=0$, hence generalizing the approach of~\cite{bray2001interface} to arbitrary $q$-values. Applying the chain rule to (\ref{eq:h-intermediate-app}) gives \begin{align} \label{eq:A12_def-0} -\nabla^{-2} \left[ \varphi' \partial_{t} \hat{h}\right] &=\\ & f'(\varphi) - K \varphi''(1+|\nabla_{\mathbf{x}} \hat{h}|^2) + K \varphi'\nabla_{\mathbf{x}}^2 \hat{h}\nonumber \end{align} where $\nabla_{\mathbf{x}}$ is the gradient with respect to $\mathbf{x}$. We then multiply by $\varphi'$ and integrate over $u=y-\hat{h}(\mathbf{x},t)$ across the interface to get \begin{align} \label{eq:A12_def} -\int du \varphi'(u) \nabla^{-2} \left[ \varphi'(u) \partial_{t} \hat{h}\right] = \Delta f + \sigma_{eq}\nabla_{\mathbf{x}}^2 \hat{h} \end{align} where $\Delta f=f(\phi_2)-f(\phi_1)$, we have assumed that $\phi(y\to\infty)=\phi_2$ and $\phi(y\to-\infty)=\phi_1$, and that $\varphi'$ vanishes in the bulk. Fourier transforming along the $\mathbf{x}$ direction and using (\ref{eq:app:inverse-lapl}) gives \begin{eqnarray}\label{eq:app:AMB-effectve-eq-h-1} \partial_t h = -\frac{2\sigma_{eq} q^3}{A_{eq}(q)} h \end{eqnarray} where $A_{eq}(q) =\int dy_1 dy_2\,\varphi'(y_1)\varphi'(y_2) \exp\left(-q |y_1-y_2|\right)$. Observe that the term coming from $\Delta f$ in (\ref{eq:A12_def}) is proportional to $q\delta({\bf q})$ and thus vanishes. Eq. (\ref{eq:app:AMB-effectve-eq-h-1}) is the deterministic part of the effective interface equation for Model B. We now consider $\lambda, \zeta\neq0$. From (\ref{eq:h-intermediate-app}), the analog to (\ref{eq:A12_def-0}) now reads \begin{eqnarray}\label{eq:A12_def-B+} -\nabla^{-2} \left[ \varphi'(u) \partial_{t} \hat{h}\right] = \mu_{\lambda} + \mu_{\zeta} \end{eqnarray} where \begin{eqnarray} \mu_{\lambda} &=& f'(\varphi) +(1+|\nabla_{\mathbf{x}} \hat{h}|^2)(\lambda\varphi'^2- K \varphi'') + K\varphi' \nabla_{\mathbf{x}}^2 \hat{h} \nonumber\\ \mu_{\zeta} &=& - \zeta \nabla^{-2}\left\{ \nabla_{\mathbf{x}}\cdot \Big[ \left(\varphi'' |\nabla_{\mathbf{x}} \hat{h}|^2 - \varphi' \nabla_{\mathbf{x}}^2 \hat{h} + \varphi''\right)\right.\label{eq:app:mu_zeta}\\ &&\left( -\varphi' \nabla_{\mathbf{x}} \hat{h} \right) \Big] \left. + \partial_y\left[ \left(\varphi'' |\nabla_{\mathbf{x}} \hat{h}|^2 - \varphi' \nabla_{\mathbf{x}}^2 \hat{h}+\varphi'' \right)\varphi'\right]\right\}\,.\nonumber \end{eqnarray} In order to progress we need to introduce the pseudo-variables~\cite{tjhung2018cluster} $\psi,g$, defined as the solution to \begin{eqnarray}\label{eq:def-psi-g} \frac{\partial^2 \psi}{\partial\phi^2} = \frac{\zeta-2\lambda}{K}\frac{\partial \psi}{\partial\phi} \quad\text{and}\quad \frac{\partial g}{\partial \psi} = \frac{\partial f}{\partial \phi} \, \end{eqnarray} such that $\psi\to\phi$ and $g(\phi) \to f(\phi)$ in the passive limit ($\lambda\to0$ and $\zeta\to0$). These quantities play the same technical role as the one played by the density $\phi$ and by the local free energy $f$ in equilibrium systems for computing the binodals~\cite{tjhung2018cluster,solon2018generalized} or for computing the surface tension $\sigma$~\cite{tjhung2018cluster}, although they lack the analogous physical interpretation. We then multiply (\ref{eq:A12_def-B+}) by $\psi'$, integrate across the interface and apply the Fourier transform along $\mathbf{x}$. For the left hand side of (\ref{eq:A12_def-B+}) we obtain \begin{eqnarray}\label{eq:app:pt-int} \frac{A(q)}{2 q} \partial_t h({\bf q} ,t) \end{eqnarray} where $A(q)$ is given in the main text and in (\ref{app:eq-Aq}). Concerning the right hand side of (\ref{eq:A12_def-B+}), the first term in $\mu_{\lambda}$ becomes \begin{eqnarray} \delta({\bf q}) \int_{-\infty}^{\infty} du\, \psi'(u) f'(\varphi) = g(\psi_2)-g(\psi_1)=0\,\nonumber \end{eqnarray} where we used the definition of $g$. To evaluate the second term in $\mu_\lambda$ we observe that \begin{eqnarray}\label{eq:app:pt-int-1} & \int_{-\infty}^{\infty}du\, (\lambda\varphi'^2(u)- K \varphi''(u))\psi'(u)\nonumber\\ &= \frac{\zeta}{2} \int_{-\infty}^{\infty}du\, \varphi'^2(u)\psi'(u) \end{eqnarray} where we have used (\ref{eq:def-psi-g}). The contribution in (\ref{eq:app:pt-int-1}) will be cancelled by an opposite one coming from $\mu_\zeta$. The third term in $\mu_\lambda$ gives \begin{eqnarray}\label{eq:app:pt-int-2} - q^2 \sigma_\lambda h({\bf q},t) \end{eqnarray} where $\sigma_\lambda$ is defined in (\ref{app:eq:sigma_lambda}). We now consider $\mu_\zeta$ in (\ref{eq:app:mu_zeta}). Expanding in powers of $\hat{h}$, we have \begin{eqnarray} &\nabla_{\mathbf{x}}^2\left(\frac{1}{\zeta}\mu_\zeta\right) = -\frac{1}{2} \partial^2_y (\varphi'^2) +\frac{3}{2} \partial_y (\varphi'^2) \nabla^2_{\mathbf{x}} \hat{h}\\ &-\varphi'^2 \nabla_{\mathbf{x}}\cdot [\nabla_{\mathbf{x}}^2 h \nabla_{\mathbf{x}}\hat{h}] - \partial^2_y(\varphi'^2) |\nabla_{\mathbf{x}}\hat{h}|^2 +\mathcal{O}(\zeta q^3 h^3)\,. \nonumber \end{eqnarray} We then invert the Laplacian using (\ref{eq:app:inverse-lapl}) and use \begin{eqnarray}\label{app:eq:puexp} \partial_u e^{-q|y-u|} = q\,\, \textrm{sgn}(y-u) e^{-q |y-u|} \end{eqnarray} where $\textrm{sgn}$ is the sign function. Applying the same procedure as before and adding up the result with (\ref{eq:app:pt-int}), (\ref{eq:app:pt-int-1}), (\ref{eq:app:pt-int-2}) we obtain the deterministic part of (\ref{eq:app:AMB-effectve-eq-h_nonlinear}). \begin{figure}[ht!]\center \centering \includegraphics[width=1\linewidth]{./FigSM1} \caption{ Eigenvalues $\alpha_i$ of $\mathcal{L}(q_1,q_2)$ for a system of linear size $L_y=128$ in the vicinity of $Re(\alpha_i)=0$ (the minimal eigenvalues for this system size have real part of order $-10^3$), spatial discretization $\Delta x=1$ and values of the parameters as in the legend. The solid lines are our estimate of the continuous spectrum of $\mathcal{L}(q_1,q_2)$ in the infinite system-size limit, obtained from a fit of the discrete spectrum. Although the spectrum is modified with respect to the equilibrium case, its crucial properties are not: all eigenvalues are negative and touch $0$ in the infinite system-size limit implying that the vapor-liquid interface is stable to normal perturbations but disturbances will only decay algebraically in time. Inset: $-Re(\alpha_i)$ for $\zeta= 2, \lambda=0.5$ as a function of $i$ for three system sizes, showing that the eigenvalue with the largest real part approaches zero.} \label{fig:spectrum} \end{figure} \subsection{Effect of $D\neq0$}\label{app:noise} We now consider $D\neq 0$. Our goal is twofold: first, we derive the noise $\chi$ that enters in the effective interface equation (\ref{eq:app:AMB-effectve-eq-h_nonlinear}); second, we show that the Ito term that might correct (\ref{eq:app:AMB-effectve-eq-h_nonlinear}) actually vanishes. We start from this latter point by rewriting (\ref{eq:app-Ansatz}) as \begin{eqnarray} \phi(\mathbf{r},t)=\varphi\left(y-\frac{1}{(2\pi)^{d-1}}\int d{\bf q} \,h({\bf q} ,t) e^{i {\bf q}\cdot \mathbf{x}}\right)\,. \end{eqnarray} The time derivative of $\phi$ gives \begin{eqnarray} \partial_t \phi &= -\varphi' \partial_t \hat{h} + \frac{1}{(2\pi)^{2(d-1)}}\varphi'' \int d{\bf q}_1 d{\bf q}_2\, e^{i({\bf q}_1+{\bf q}_2)\cdot \mathbf{x}} \nonumber\\ &2 D q_1\frac{ B(q_1)}{A^2(q_1)} \delta({\bf q}_1+{\bf q}_2) \end{eqnarray} and hence \begin{eqnarray} \partial_t \phi= -\varphi' \partial_t \hat{h} + \frac{2D}{(2\pi)^{2(d-1)}}\varphi'' \int d{\bf q} \,\,q\frac{ B(q)}{A^2(q)}\,\label{eq:app-ptphi_Dnot0} \end{eqnarray} where last term in (\ref{eq:app-ptphi_Dnot0}) is the Ito contribution. It is then easy to show that this term gives a contribution proportional to $q \delta(q)$ in $\partial_t h$, and hence vanishes. We are left with deriving the noise $\chi$ and show that its correlation is given by (\ref{eq:app:effective-noise}). We first consider \begin{eqnarray} \xi(\mathbf{x},y,t)=(\nabla^{-2} \eta)(\mathbf{x},y,t)\, \end{eqnarray} where $\eta = -\nabla\cdot\sqrt{2D} \mathbf{\Lambda}$. Being a linear transformation of $\eta$, $\xi$ is also a Gaussian noise. Its correlation reads \begin{eqnarray} C_{\xi}(\mathbf{x},y,t) = -2D \nabla^{-2}\delta(\mathbf{x})\delta(y)\delta(t)\, \end{eqnarray} and its Fourier transform along $\mathbf{x}$ \begin{eqnarray} C_\xi(q,y,t) = \frac{D}{q}e^{-q|y|}\delta(t) \end{eqnarray} where we have used (\ref{eq:app:inverse-lapl}). The noise $\chi$ is given by \begin{eqnarray} \chi({\bf q},t) = \frac{2q}{A(q)}\mathcal{F}\left[ \int du \, \psi'(u) \xi(\mathbf{x},u+\hat{h}(\mathbf{x},t),t) \right] ({\bf q},t)\nonumber \end{eqnarray} which is also Gaussian. It is now straightforward to show that the correlation of $\chi$ is given by (\ref{eq:app:effective-noise}). This concludes the derivation of the effective interface equation (\ref{eq:app:AMB-effectve-eq-h_nonlinear}). \begin{figure*}[ht!]\centering \includegraphics[width=0.9\linewidth]{./FigSM2} \caption{ Current ${\bf J}$ close to (left) the stable interface and normal Ostwald ripening ($\zeta=2\lambda=0.5$), (middle) stable interface and reversed Ostwald ripening for bubbles ($\zeta=2\lambda=2.2$) and (right) unstable interface ($\zeta=\lambda=2$). Simulations are at mean-field ($D=0$). The liquid is shown in dark gray and the magnitude of the current in colors. Only a small part of the system is shown. We measured $\bar{J}_V - \bar{J}_L = 0.04$ for $2\lambda=\zeta=0.5$, $\bar{J}_V - \bar{J}_L = 0.08$ for $2\lambda=\zeta=2.2$ and $\bar{J}_V - \bar{J}_L = -0.02$ for $2\lambda=\zeta=2$. This confirms that the instability arises only when the current on the liquid side overwhelms the one on the vapor side.} \label{fig:g} \end{figure*} \section{Profile $\varphi$ of the flat interface} As reported in the main text, the flat interfacial profile $\varphi(y)$ can be found analytically only for the case $2\lambda=\zeta$, where it equals the equilibrium case. For generic values of $\lambda,\zeta$, however, $w(\phi)=\varphi'^2$ can be obtained with a very simple numerical procedure using a technique introduced in~\cite{Wittkowski14} and then applied to AMB+ in~\cite{tjhung2018cluster}. We report it here for completeness. First, as shown in~\cite{tjhung2018cluster}, the binodals are easily obtained numerically solving $\mu = f'(\phi_1)=f'(\phi_2)$ and $\mu\psi_1-g(\phi_1) = \mu\psi_2-g(\phi_2)$. It is then easy to show that $w$ solves \begin{eqnarray} K w' = (2\lambda-\zeta)w + 2(f'-\mu)\, \end{eqnarray} which is solved by \begin{eqnarray}\label{eq:app-interface-w-sol-gen} w(x) = e^{-\frac{\zeta-2\lambda}{K} x} \left[ c + \frac{2}{K}\int_1^x e^{\frac{\zeta-2\lambda}{K} y} (f'(x) -\mu) dy \right] . \end{eqnarray} The knowledge of $\phi_{1,2}$ allows to fix the integration constant $c$ and the numerical evaluation of $w$ via (\ref{eq:app-interface-w-sol-gen}) is straightforward. \section{Stability against normal perturbations} We study here the linear stability to normal perturbations of the flat interface $\varphi$ at mean-field level ($D=0$). In this Appendix, for simplicity, we restrict to the case of one-dimensional interfaces. Due to mass conservation, the perturbed interface can be written as \begin{eqnarray}\label{app:eq:ansatz-1d-stability} \phi(\mathbf{x},y,t)=\varphi(y) + \partial_y \epsilon(y,t) \end{eqnarray} where $\varphi$ solves \begin{eqnarray} \partial_y^2 \left[ f''(\varphi) -K \partial_y^2\varphi +(\lambda-\zeta/2)\varphi'^2 \right]=0\,. \end{eqnarray} Hence $\epsilon$ satisfies \begin{eqnarray} \partial_t \epsilon = \mathcal{L}\epsilon+\mathcal{O}(\epsilon^2) \end{eqnarray} where the linear operator $\mathcal{L}$ is \begin{eqnarray}\label{app:eq-L} \mathcal{L} = \partial_y\left[ f''(\varphi)-K\partial_y^2 +(2\lambda-\zeta)\varphi' \partial_y\right]\partial_y\,. \end{eqnarray} We are thus led to study the spectrum of $\mathcal{L}$. In the equilibrium case, and thus also when $\zeta=2\lambda$, it was shown in~\cite{shinozaki1993dispersion,bricmont1999stability} analytically that this is continuous for an infinite system and it touches $0$, resulting in algebraic decay of $\epsilon$ in time. This result relies on the fact that $\mathcal{L}$ is self-adjoint when $\zeta=2\lambda$. Extending this analysis to general $\zeta,\lambda$ lies beyond our scope. We compute numerically the spectrum of $\mathcal{L}$, concluding that the flat interface remains stable to normal perturbations irrespective of the sign of $\sigma$ and $\sigma_{\rm cw}$. Again the spectrum of $\mathcal{L}$ approaches $0$ in the large-system limit, indicating algebraic decay of $\epsilon$. For generic $\lambda$ and $\zeta$, we studied numerically the spectrum of $\mathcal{L}$ for finite systems. By Fourier transforming along $y$, and for the choice of a double well local free energy $f$, we consider the kernel $\mathcal{L}(q_1,q_2)$ of $\mathcal{L}$ defined from the relation $(\mathcal{L} \epsilon) (q_1) = \int dq_2 \mathcal{L}(q_1,q_2) \epsilon(q_2)$ for any test function $\epsilon$. Explicitly: \begin{eqnarray}\label{eq:app:L-Fourier} \mathcal{L}(q_1,q_2) &=& (-K q_1^4+A q^2)\delta(q_1-q_2)\\ &-&3A q_1 q_2 \mathcal{F}_y[\varphi^2](q_1-q_2)\nonumber\\ &+&(2\lambda-\zeta)q_1 q_2^2(q_1-q_2) \mathcal{F}_y[\varphi](q_1-q_2)\nonumber \end{eqnarray} where $\mathcal{F}_y[\cdot]$ denotes the Fourier transform operator along $y$. We discretised $\mathcal{L}(q_1,q_2)$ on a grid with discretization step $\Delta x=1$ and total length $L_y$, so that $q_i=2\pi n_i/L_y$, $n_i=1,...,N$, $N\Delta x=L_y$. We then computed numerically the eigenvalues $\alpha_i$ of $\mathcal{L}$ for several values of $\lambda, \zeta$. Some of our results are reported in Fig. \ref{fig:spectrum}, showing that the qualitative picture is the same as at equilibrium: the spectrum of $\mathcal{L}$ is expected to be continuous and to touch $0$ for an infinite system. It should be observed that these conclusions apply irrespectively of the sign of both $\sigma$ and $\sigma_{cw}$: in both cases, $\varphi$ is stable against normal perturbations. \begin{figure}[h!]\center \centering \includegraphics[width=1.\linewidth]{./FigSM3} \caption{ (Left) Damping rate $1/\tau(q)$ vs $q$ at $\zeta=1$ crossing the stability line, located at $\lambda\simeq 1.29$. The most unstable mode (the minimum of $1/\tau(q)$) goes to $q=0$ as one approaches the critical $\lambda$. (Right) Plot of $\tau(q)/q^3$, showing that the change of sign of the damping rate happens at the estimated critical value of $\lambda$.} \label{fig:SM1} \end{figure} \section{Instability against height perturbations ($\sigma_{cw}<0$)} In the main text, we have discussed the analogy between the instability of the flat interface taking place when $\sigma_{cw}<0$ and the Mullins-Sekerka instability~\cite{langer1980instabilities}. In Fig. \ref{fig:g} we further support this mechanistic picture, plotting the quasi-static current close to the perturbed interface. We consider three sets of parameter values corresponding to normal Ostwald ripening ($\sigma>0$), reversed Ostwald ripening but stable interface ($\sigma<0$, $\sigma_{cw}>0$), and unstable interface ($\sigma<0, \sigma_{cw}<0$). The current on the vapor side is always stabilizing while it is stabilizing in the liquid side only if $\sigma>0$. However, $\sigma<0$ is not sufficient to drive the instability. For this, the destabilizing current on the liquid side needs to be stronger than the one on the vapor side. This happens only in the rightmost case of Fig. \ref{fig:g}, which corresponds to $\sigma_{cw}<0$. To show this, we have measured the average current $\bar{J}_V$ in the liquid projected along $ e_\mathbf{x}=\mathbf{x}/|\mathbf{x}|$ defined as \begin{eqnarray} \bar J_L^2 = \int dx\int_{\{y|\phi(\mathbf{x},y,t)>\phi_{th}\}} dy ({\bf J}\cdot e_\mathbf{x})^2 \end{eqnarray} and the analogous quantity in the vapor $\bar J_V$. We further show that most unstable mode is the smallest one ($q=0$ in an infinite system) in the vicinity of the critical $\lambda$ value. To show this we leveraged on the fact that we have an analytic expression, eq. (6) of the main text, for the damping rate $1/\tau(q)$ in the effective interface equation. From simulations at $D=0$ and system-size $L_x=L_y=256$ we extracted the interfacial profile $\varphi(y)$ and then used it to evaluate $\tau(q)$ at arbitrarily low $q$. The results for $\zeta=1$ and varying $\lambda$ are reported in Fig. \ref{fig:SM1}. \begin{figure}[h!]\center \centering \includegraphics[width=1.\linewidth]{./FigSM4} \caption{ PDF of the density for $\zeta=2$, $\lambda=1.75$, $D=0.05$ in a system $128\times 256$ and several global densities $\phi_0$ reported in the legend.} \label{fig:SM-PDF} \end{figure} \section{Liquid and vapor densities in the microphase separated and active foam states} In Fig. 4, we report the PDF of the density as a function of the global density $\phi_0$. The vapor density is found, to a good accuracy, independent of $\phi_0$. Instead, the liquid density varies rather significantly with $\phi_0$. This is expected because of two reasons: the liquid density with which a finite size vapor bubble is in equilibrium differs from the binodal~\cite{tjhung2018cluster} and the presence of multiple droplets further change such value. Obtaining the dependence of the liquid density on $\phi_0$ is an open problem. \begin{figure}[h!]\center \centering \includegraphics[width=0.8\linewidth]{./FigSM5} \caption{ Evolution in time of the average bubble size $\langle A\rangle$ and of their number $N(t)$ for $\zeta=2,\lambda=1.75$ and various noise values starting either from an uniform or from a band (a fully phase separated state with a flat interface).} \label{fig:evolution-MPS} \end{figure} \section{Evolution towards the microphase separated state} In Fig. \ref{fig:evolution-MPS} we plot the evolution, starting from an homogeneous state or a fully phase separated state, of the average size of bubbles and their number while converging to the microphase separated state. As shown, the convergence slows down when decreasing the noise value. This is because the initially formed bubbles are stable to small perturbations of their interface and evolution to the steady state is possible only by rare events at low noise. \section{Movies} \begin{itemize} \item Movie 1 : Interfacial instability starting from a fully phase separated initial condition with noise added in the bulk. Parameters: $D=0, \zeta=2.25, \lambda=1.8$. System size $L_x=L_y=128$. Total density $\phi_0=0.2$, leading to a microphase separation in the steady state. \item Movie 2 : Phase diagram for $D=0.05, \zeta=2,\lambda=1.75$ as a function of the density, showing the dynamics in the microphase separated and in the active foam state. System size $2L_x=L_y=256$. \item Movie 3 : Evolution from a phase separated initial condition for $\zeta=1.5,\lambda=2.5, D=0.1$, which corresponds to $\sigma_{cw}<0$, and for $\zeta=2\lambda=2.2, D=0.25$, which corresponds to $\sigma_{cw}>0$. This show the markedly different evolution towards the microphase separated states found at $\sigma_{cw}<0$ and at $\sigma_{cw}>0$. Total simulation time is $10^6$ and system size $L_x=L_y=400$. \end{itemize} \end{document}
\section{Introduction} \label{section:introduction} Time delays are effectively used to model a wide range of physical, economic, social and biological phenomena. Examples include modeling industrial processes and their control, epidemic dynamics, operations research and computer network flows. TDS are linear but infinite-dimensional, rendering their behavioral analysis more challenging as compared to their finite-dimensional counterparts. The methodology presented in this paper performs stability analysis in a given parametric space. Thus, it is natural to compare it to $\mathcal{D}$-partitioning and $\tau$-partitioning methods (\cite{gryazina2004, neimark1998, lee1969, elsgolts1973}). Such methods view the parametric space as being split into multiple partitions, with the number of unstable poles being invariant inside each individual partition. In that context, the proposed method determines one such partition, starting from any parametric point from within that partition. The method finds the entire partition, regardless of its shape. The difference between $\tau$-partitioning and $\mathcal{D}$-partitioning lies in the selection of parameters which are allowed to vary (delay versus non-delay parameters). In this paper, the stability is investigated with respect to both parameter classes. Similarities can also be drawn towards methods which determine the parametric stability crossing set (SCS). The SCS is defined as the collection of surfaces in the parametric space for which there is at least one system pole on the imaginary axis. Such approaches have been successfully demonstrated for retarded systems with two and three independent delays (\cite{hale1993,gu2005,sipahi2005,gu2011}), providing insightful graphical representation of stability equivalence regions. Similar methods have been proposed in the domain of robust control (\cite{morarescu2006}). Alternatively, instead of computing the SCS in a high dimensional parametric space, it is possible to directly compute the projection of SCS to a low dimensional space (\cite{sipahi2009,delice2010}). Finally, SCS-based methods may be used to determine the stability radius of a given parametric point (\cite{gu2007}). The method proposed in the present paper bears similarities with frequency sweeping stability analysis methods, such as the ones proposed in \citet*{chen1995, niculescu1999, li2013, li2015, li2017}. The nature of similarities is technical, as the proposed method involves frequency sweeping tests. On the other hand, the proposed method differs from the aforementioned ones in terms of problem formulation, classes of applicable systems and/or the resulting conservatism. The proposed methodology is also applicable to systems containing distributed delays. Stability analysis of such systems is challenging due to their form, which is less well-behaved compared to their discrete delay counterparts. Interesting techniques for stability analysis of such systems can be found in \cite{morarescu2007,gu2003,zeng2015}. General behavioral analysis of TDS can be found in papers such as \cite{datko1978,cooke1982,bellman1963,michiels2007}. An overview of existing TDS stability analysis methods is provided in several monographs, including \cite{dugard1998,gu2003,niculescu2004,wu2010,fridman2014,michiels2014}. The strength of the presented method can further be described by a combination of two facts. Firstly, the obtained conditions are necessary and sufficient, in the sense that the method determines the stability equivalence region without any conservatism. Secondly, the method is applicable to a broad class of TDS, including retarded, incommensurate and distributed delays. A simplified methodology, giving stability conditions along a parametric line in the case of a specific system involving two delays, was previously considered in \cite{turkulov2019}. \paragraph*{Notations.} \label{section:notation} The paper utilizes standard mathematical notations. Symbol $s$ denotes the Laplace variable. Angled brackets $\langle\cdot,\cdot\rangle$ represent the dot product. The $p$-norm of a vector $\mathbf{x}$ is denoted as $||\mathbf{x}||_p$. The set of non-negative real numbers is denoted as $\mathbb{R}_0^+$ and the set of non-negative integers by $\mathbb{N}_0$. Boundary of set $\mathcal{X}$ is denoted $\partial \mathcal{X}$ and the interior of set $\mathcal{X}$ is denoted $\interior \big(\mathcal{X}\big)$. The expressions ``left-hand side" and ``right-hand side" are abbreviated to LHS and RHS, respectively. The Bromwich-Wagner contour enveloping the entire right half of the complex plane is denoted as $\mathcal{C}$ and defined as \begin{equation} \begin{split} \mathcal{C} &= \mathcal{C}_a \cup \mathcal{C}_c \\ \mathcal{C}_a &= \{s = j\omega \; | \; \omega \in \mathbb{R}\} \\ \mathcal{C}_c &= \left\{s = \lim_{\rho \rightarrow \infty} \rho e^{j\varphi} \; \Big| \; \varphi \in \left(-\frac{\pi}{2}, \frac{\pi}{2}\right)\right\} \end{split} \end{equation} The characteristic function of a linear TDS is defined as \begin{equation} f:\mathbb{C} \times \mathcal{T} \rightarrow \mathbb{C}, \label{eq:characteristic_definition} \end{equation} where $\mathcal{T} \subset (\mathbb{R}_0^+)^n$ denotes a parametric space. A parametric point is denoted as $\bm{\tau} = [\tau_1, \tau_2, \dotsc, \tau_n] \in \mathcal{T}$. The gradient vector field of $f$ over the parametric space is denoted as $\nabla f$. $NU_f(\bm{\tau})$ designates the number of zeros of the characteristic function $f(s, \bm{\tau})$ with non-negative real part, where each zero is counted as many times as its multiplicity. The set of all parametric points of $f(s, \bm{\tau})$ sharing the same number of zeros with non-negative real part as a starting point $\bm{\tau^0} \in \mathcal{T}$ is defined as \begin{equation} \mathcal{M}_{f}^{\#}(\bm{\tau^0}) = \{ \bm{\tau} \in \mathcal{T} \quad | \quad NU_f(\bm{\tau}) = NU_f(\bm{\tau^0}) \}. \end{equation} Define the maximum surrounding stability equivalence region of $\bm{\tau^0}$, $\mathcal{M}_f(\bm{\tau^0})$, as a set of points $\bm{\tau}$ satisfying the following conditions: \begin{enumerate} \item $\bm{\tau} \in \mathcal{M}_{f}^{\#}(\bm{\tau^0}) \subset \mathcal{T}$ \item There exists a path $\mathcal{P}$ which connects $\bm{\tau^0}$ with $\bm{\tau}$, such that $\mathcal{P} \subset \interior \big(\mathcal{M}_f^{\#}(\bm{\tau^0})\big)$. \end{enumerate} \vspace{-0.5cm} \paragraph*{Paper outline.} The paper is organized as follows: Section \ref{section:problem} defines problems considered in the remainder of the paper. The main results of the paper are presented in Sections \ref{section:line} and \ref{section:region}. Section \ref{section:line} lays out the theory for extending the stability along a line, with additional adaptations well-suited for retarded TDS. Section \ref{section:region} extends the methodology to analyze stability within a region. Methods presented in Sections \ref{section:line} and \ref{section:region} are illustrated on examples with retarded and non-retarded TDS. Finally, Section \ref{section:conclusion} presents a short summary with several closing comments. The paper also contains a short appendix containing proofs of some instrumental lemmas. \section{Problem definition} \label{section:problem} Consider a linear TDS with a characteristic function $f(s, \bm{\tau})$ given in an explicit form. Starting from a parametric point $\bm{\tau^0} \in \mathcal{T}$, two versions of the problem are defined: \begin{enumerate}[label=(P\arabic*)] \item \label{problem1} \textbf{Stability equivalence along a line}. Find the maximum segment $\mathcal{E} \subset \mathcal{T}$ along a predefined direction originating from $\bm{\tau^0}$ such that $NU_f(\bm{\tau^0}) = NU_f(\bm{\tau}), \forall \bm{\tau} \in \mathcal{E}$. \item \label{problem2} \textbf{Stability equivalence inside a region}. Find $\mathcal{M}_{f}(\bm{\tau^0})$, representing the maximum stability equivalence region surrounding $\bm{\tau^0}$. \end{enumerate} Likewise, the paper presents two versions of the method (line-based in Section \ref{section:line} and region-based in Section \ref{section:region}) for solving both problems. For the method to be applicable, the following hypotheses must hold: \begin{enumerate}[label=(H\arabic*)] \item \label{hypothesis1} System characteristic function must be holomorphic in the open right half complex-plane and continuous on the imaginary axis for all $\bm{\tau} \in \mathcal{T}$. These conditions hold for a majority of TDS, but they fail for most systems with spatially distributed and/or fractional dynamics. \item \label{hypothesis2} The characteristic function must satisfy \begin{equation} \lim_{\rho \rightarrow \infty} \frac{\big| f(\rho e^{j \varphi}, \bm{\tau^A})\big|} {\left|\int_{\bm{\tau^A}}^{\bm{\tau^B}} \langle \nabla f(\rho e^{j\varphi}, \bm{\tau}), d\bm{\tau}\rangle \right|} = \infty, \label{eq:h2} \end{equation} $\forall \bm{\tau^A}, \bm{\tau^B} \in \mathcal{T}$, $\forall \varphi \in (-\frac{\pi}{2}, \frac{\pi}{2})$, where $\int_{\bm{\tau^A}}^{\bm{\tau^B}}$ denotes a line integral along a curve $\gamma$ connecting points $\bm{\tau^A}$ and $\bm{\tau^B}$ such that $\gamma \subset \mathcal{T}$. \end{enumerate} The hypotheses (H1) and (H2) are the only conditions for the results of this paper to hold. The following two lemmas show that these hypotheses are satisfied by a wide class of systems, including all retarded and some distributed delay systems. \begin{lem} \label{lem:wide_retarded_systems} The hypotheses \ref{hypothesis1} and \ref{hypothesis2} hold true for all characteristic functions of the form \begin{equation} f(s, \bm{\tau}) = s^m + \sum_{i=0}^{m-1} s^i \left( \sum_{k=1}^n \alpha_{i,k}(\bm{\tau}) e^{-s \beta_{i,k}(\bm{\tau})} \right) \label{eq:wide_retarded_systems} \end{equation} where $\alpha_{i,k}(\bm{\tau}), \beta_{i,k}(\bm{\tau}) : \mathcal{T} \rightarrow \mathbb{R}$ are differentiable functions for $i = 0, 1, \cdots, m-1$, $k = 1, 2, \cdots, n$ and $\beta_{i,k}(\bm{\tau}) \geq 0, \forall \bm{\tau} \in \mathcal{T}$. \end{lem} \begin{lem} \label{lem:distributed_delay_systems} Let $x\in\mathbb{R}^m$, $A_0, A_{1,i}, A_{2, j} \in \mathbb{R}^{m,m}$, $\tau_i>0$, for $i = 1, \cdots, N_1$, and $~0 < \underline{\tau_{j}} < \overline{\tau_{j}}$, for $j=1, \cdots, N_2$. Let $\gamma_j(\xi) = \sum_{\ell=0}^{n_j} g_{j,\ell} \xi^\ell$ for some $g_{j, \ell} \in \mathbb{R}$, with $n_j < \infty$. Then, the characteristic function of \begin{equation} \dot x = A_0 x + \sum_{i=1}^{N_1} A_{1,i} x(t-\tau_i) + \sum_{j=1}^{N_2} A_{2,j} \int_{\underline{\tau_{j}}}^{\overline{\tau_{j}}} \gamma_j(\xi) x(t-\xi) d\xi \label{eq:lemma_distributed_delay_systems} \end{equation} can always be expressed as in \eqref{eq:wide_retarded_systems}. \end{lem} The proofs of the lemmas are given in Appendix \ref{section:appendix}. According to Lemma \ref{lem:distributed_delay_systems}, hypotheses (H1) and (H2) hold for all TDS having retarded and/or distributed delays with polynomial distribution functions $\gamma_j$, which cover a wide class of distributed TDS encountered in the literature. Although the results, presented in Sections \ref{section:line} and \ref{section:region}, are valid for all kind of TDS satisfying (H1) and (H2), including those defined by Lemmas \ref{lem:wide_retarded_systems} and \ref{lem:distributed_delay_systems}, special attention is given to TDS of retarded type as they introduce further simplifications to the established results. Finally, it is important to stress that the stability addressed in this paper is the exponential one. A linear TDS is considered to be exponentially stable if and only if all zeros of its characteristic function have strictly negative real parts. A similar method, investigating BIBO stability of fractional non-commensurate systems subject to perturbations in differentiation orders, is proposed in \cite{rapaic2019}. \section{Stability equivalence along a line} \label{section:line} In this section, a solution to Problem \ref{problem1} is given. Let us characterize variations of $\bm{\tau}$ along a line starting from $\bm{\tau^0}$ by a single scalar non-negative parameter $\theta$ as \begin{equation} \bm{\tau} (\theta) = \bm{\tau^0} + \theta \bm{\tau^d}, \qquad \theta \geq 0 \label{eq:line_parametrization} \end{equation} where $\bm{\tau^d}$ is an arbitrarily chosen unit direction vector. Define the starting value of $\theta$ as $\theta_0 = 0$, corresponding to $\bm{\tau}(0) = \bm{\tau^0}$. For simplicity, in this section, the characteristic function is expressed as $f(s, \bm{\tau}(\theta)) \equiv f(s, \theta)$. The Problem \ref{problem1} reduces to finding the maximum value of $\theta$ for which the number of non-negative zeros of $f$ is preserved. Such stability-limiting value of $\theta$ is defined as \begin{equation} \theta_{lim} = \sup { \left\{\theta^* \Big| NU_f(\bm{\tau}(\theta))=NU_f(\bm{\tau_0}) \;, \; \forall \theta \in [\theta_0, \theta^*) \right\}} \;. \label{eq:theta_lim} \end{equation} \subsection{Sufficient condition} As a first step towards finding $\theta_{lim}$, sufficient stability equivalence condition along a line is provided. \begin{thm} Let $f$ satisfy hypotheses \ref{hypothesis1} and \ref{hypothesis2}. Let $\theta_0 \geq 0$ be an initial point such that $f(j\omega, \bm{\tau}(\theta_0)) \neq 0, \forall \omega \in \mathbb{R}$. Let $\bm{\tau}(\theta)$ be defined as in \eqref{eq:line_parametrization}. Then, \begin{equation*} NU_f(\bm{\tau}(\theta_0)) = NU_f(\bm{\tau}(\theta_0 + \Delta)) \end{equation*} holds for all $0 \le \Delta < \overline{\Delta}(\theta_0)$, where \begin{equation} \overline{\Delta}(\theta_0) = \min_{\omega \in \mathbb{R}_0^+}\frac{|f(j\omega, \theta_0)|} {\displaystyle \max_{\theta_0 \leq \beta \leq \theta_0 + \overline{\Delta}(\theta_0)} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Big|}. \label{eq:line_sufficient} \end{equation} \label{thm:line_sufficient} \end{thm} \vspace{-0.7cm} \begin{pf} Due to \ref{hypothesis1}, Rouch\'e's theorem can be applied to $f$ as \begin{multline} |f(s,\theta_0 + \Delta) - f(s, \theta_0)| < |f(s, \theta_0)|, \forall s \in \mathcal{C} \Rightarrow\\ NU_f(\bm{\tau}(\theta_0)) = NU_f(\bm{\tau}(\theta_0 + \Delta)). \label{eq:rouche} \end{multline} Furthermore, the fundamental theorem of calculus can be applied to the inequality in \eqref{eq:rouche}, resulting in \begin{equation} \Bigg| \int_{\theta_0}^{\theta_0 + \Delta} \frac{\partial f}{\partial \theta} (s, \theta=\beta)d\beta \Bigg|< |f(s, \theta_0)|. \label{eq:fundamental} \end{equation} Due to \ref{hypothesis2}, inequality \eqref{eq:fundamental} holds $\forall s \in \mathcal{C}_c$. Taking the symmetry of $f(s, \theta)$ into account, further analysis is restricted to $s = j\omega, \forall \omega \in \mathbb{R}_0^+$. Notice that \begin{multline} \Bigg|\int_{\theta_0}^{\theta_0 + \Delta} \frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) d\beta\Bigg| \leq\\ \int_{\theta_0}^{\theta_0 + \Delta}\Bigg| \frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Bigg| d\beta \leq \\ \Delta \max_{\theta_0 \leq \beta \leq \theta_0+\Delta} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Big|. \label{eq:conservative_integral} \end{multline} Introducing the conservative bound \eqref{eq:conservative_integral} in \eqref{eq:fundamental} yields \begin{equation} \Delta \cdot \max_{\theta_0 \leq \beta \leq \theta_0+\Delta} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Big| < |f(j\omega, \theta_0)|. \label{eq:fundamental2} \end{equation} The LHS of \eqref{eq:fundamental2} is non-decreasing, as a product of two non-decreasing functions. Consequently, if inequality \eqref{eq:fundamental2} holds for some value of $(\theta_0 + \Delta)$, it also holds for all values of $\beta \in [\theta_0, \theta_0+\Delta]$. Based on that fact, \eqref{eq:fundamental2} yields \begin{equation} \Delta < \frac{|f(j\omega, \theta_0)|} {\displaystyle \max_{\theta_0 \leq \beta \leq \theta_0 + \Delta} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Big|}. \label{eq:line_imaginary_axis} \end{equation} Steps smaller than $\Delta$ retain stability if \eqref{eq:line_imaginary_axis} holds $\forall \omega \in \mathbb{R}_0^+$. Thus, a valid step limit can be obtained by finding the minimum of \eqref{eq:line_imaginary_axis} with respect to $\omega$ (the worst-case scenario), resulting in \eqref{eq:line_sufficient} and concluding the proof. \qed \end{pf} \begin{rem} \label{rem:circularity} The maximal step size $\overline{\Delta}$ appears on both sides of \eqref{eq:line_sufficient}, making the expression circular. However, the LHS of \eqref{eq:line_sufficient} is strictly increasing, while the RHS is non-increasing. Thus, a valid value of the (not necessarily maximal) step size $\Delta$ can be found by bisection up to a certain tolerance threshold. Any conservatism introduced at this point is overcome by iterating the method, as shown in Section \ref{section:line_nsc}. Lastly, for retarded TDS the RHS of \eqref{eq:line_sufficient} can be substituted by a conservative form, independent of $\overline{\Delta}$ (hence removing circularity), as discussed below. \end{rem} \subsection*{Application to retarded TDS} \label{section:line_retarded} Although applicable to a wide class of linear systems, the proposed method is particularly simple in case of retarded TDS. The characteristic function of such systems is given by \begin{equation} f(s, \bm{\tau}) = s^m + \sum_{i=1}^{n} P_i(s)e^{-s\tau_i}, \label{eq:retarded_characteristic} \end{equation} where $P_i(s)$ are polynomials with $\deg P_i(s) < m$. Plugging \eqref{eq:line_parametrization} into \eqref{eq:retarded_characteristic} yields \begin{equation} f(s, \theta) = s^m + \sum_{i=1}^n f_i(s)e^{-s \theta a_i}, \label{eq:retarded_characteristic3} \end{equation} where $a_i$ are real scalars and $f_i(s)$ are complex functions, independent of $\theta$, that can easily be computed from \eqref{eq:retarded_characteristic}. This result is important because of the convenient form of \eqref{eq:retarded_characteristic3}, which however is not limited to retarded TDS. Namely, to implement the general form \eqref{eq:line_sufficient}, evaluation of $|f(j\omega, \theta_0)|$ and $\max_{\theta_0 \leq \beta \leq \theta_0 + \Delta} |\frac{\partial f}{\partial \theta} (j\omega, \beta) |$ is required. The former expression is directly evaluated from \eqref{eq:retarded_characteristic3}. For the latter, observe that \begin{multline} \max_{\theta_0 \leq \beta \leq \theta_0 + \Delta} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta = \beta) \Big| \leq \sum_{i=1}^n \omega \big| a_i f_i(j\omega)|, \label{eq:retarded_simplification} \end{multline} which yields an elegant expression, albeit conservative. Hence, the following corollary to Theorem \ref{thm:line_sufficient} can be formulated. \begin{cor} Let $f$ be defined as in \eqref{eq:retarded_characteristic3}. Let $\theta_0 \geq 0$ be an initial value such that $f(j\omega, \bm{\tau}(\theta_0)) \neq 0, \forall \omega \in \mathbb{R}$. Let $\bm{\tau}(\theta)$ be defined as in \eqref{eq:line_parametrization}. Then, \begin{equation} NU_f(\bm{\tau}(\theta_0)) = NU_f(\bm{\tau}(\theta_0 + \Delta)) \end{equation} holds if \begin{equation} \Delta < \min_{\omega \in \mathbb{R}_0^+} \frac{|f(j\omega, \theta)|}{\sum_{i=\textcolor{red}{1}}^n \omega |a_i f_i(j\omega)|}. \label{eq:algorithm_retarded} \end{equation} \label{cor:line_retarded} \end{cor} This corollary presents a convenient alternative to Theorem \ref{thm:line_sufficient}, since \eqref{eq:algorithm_retarded} avoids the circularity of \eqref{eq:line_sufficient}. \subsection{Necessary and sufficient conditions} \label{section:line_nsc} Under assumptions of Theorem \ref{thm:line_sufficient}, by applying \eqref{eq:line_sufficient}, one can obtain a stability equivalence interval defined by the endpoint \begin{equation} \theta_1 = \theta_0 + \Delta. \end{equation} The method can now be applied again, taking previously obtained value $\theta_1$ as the new starting point. Formally, the method can be iterated a certain number of times \begin{equation} \theta_{k+1} = \theta_k + \Delta_k, \quad \forall k \in \mathbb{N}_0. \label{eq:line_algorithm} \end{equation} Such iterative application of the method presents necessary and sufficient conditions for finding the stability boundary. The conditions are considered necessary and sufficient since the resulting sequence $\theta_k$ exactly converges to $\theta_{lim}$, provided that $\theta_{lim}$ exists. If $\theta_{lim}$ does not exist, the sequence $\theta_k$ diverges. The aforementioned claim is formalized and proven in the following lemma and theorem. \begin{lem} Let the hypotheses of Theorem \ref{thm:line_sufficient} be satisfied. Let $\theta_{lim}$ be defined in \eqref{eq:theta_lim} and let a sequence $\theta_k$ be obtained by \eqref{eq:line_algorithm}, with increments $\Delta_k = \eta \overline{\Delta}(\theta_k)$, with $\eta\in(0,1)$ and $\overline{\Delta}(\theta_k)$ computed according to \eqref{eq:line_sufficient} in each iteration. Then, the following statements hold: \begin{enumerate}[label=(C\arabic*)] \item \label{item:statement1} If $ \theta_{lim}$ exists, then $\theta_k < \theta_{lim}, \forall k \in \mathbb{N}_0$. \item \label{item:statement2} If $\displaystyle \lim_{k \rightarrow \infty} \theta_k$ exists, then $\displaystyle \lim_{k \rightarrow \infty} \theta_k = \theta_{lim}$. \end{enumerate} \label{lem:merged} \end{lem} \begin{pf} Claim \ref{item:statement1} is a direct consequence of Theorem \ref{thm:line_sufficient}, since $0 < \eta < 1$. Claim \ref{item:statement2} can be proven by contradiction. Assume that $\lim_{k \rightarrow \infty} \theta_k$ converges to some $ \theta_{\#} < \theta_{lim}$. As a consequence of \ref{item:statement1}, such $\theta_{\#}$ must be smaller than $\theta_{lim}$. The bare existence of a convergence limit implies that values $\Delta_k$ get arbitrary small as $k \rightarrow \infty$. This, combined with \eqref{eq:line_sufficient} implies that the value of \begin{equation} \min_\omega|f(j\omega, \theta_k)| \label{eq:proof} \end{equation} becomes arbitrary small as $k \rightarrow \infty$ and $\theta \rightarrow \theta_{\#}$. However, it is not possible that \eqref{eq:proof} becomes arbitrarily small near $\theta_{\#}$ because: \begin{enumerate} \item Function $|f(j\omega, \theta)|$ is continuous with regards to $\theta$. \item {By definition \eqref{eq:theta_lim}, $\theta_{lim}$ is the smallest value of $\theta \in [\theta_0, \infty)$ for which $\exists \omega \in \mathbb{R}$ such that \begin{equation} |f(j\omega, \theta)|=0. \end{equation} } \end{enumerate} Thus, $\exists \alpha \in \mathbb{R}^+$ and $\exists \varepsilon \in \mathbb{R}^+$ such that \begin{equation} \min_\omega|f(j\omega, \theta)| > \alpha, \forall \theta \in (\theta_{\#}-\varepsilon, \theta_{\#}+\varepsilon), \end{equation} contradicting the assumption that $\theta_k \rightarrow \theta_{\#}$. In other words, values of $\Delta_k$ cannot be arbitrarily small in the neighborhood of any $\theta_\# < \theta_{lim}$. \qed \end{pf} \begin{thm} Let the hypotheses of Theorem \ref{thm:line_sufficient} be satisfied. Let $\theta_{lim}$ be defined in \eqref{eq:theta_lim} and let a sequence $\theta_k$ be obtained by \eqref{eq:line_algorithm}, with increments $\Delta_k = \eta \overline{\Delta}(\theta_k)$, $0<\eta<1$, and $\overline{\Delta}(\theta_k)$ fulfilling \eqref{eq:line_sufficient}. If $\theta_{lim}$ exists, then $\theta_{k}$ converges to $\theta_{lim}$. Otherwise, $\theta_{k}$ diverges. \label{thm:line_nsc_convergence} \end{thm} \begin{pf} Assume that $\theta_{lim}$ exists. From \eqref{eq:line_sufficient} and since $\eta > 0$, the sequence $\theta_k$ is strictly increasing. From Lemma \ref{lem:merged}, the sequence $\theta_k$ will never overshoot $\theta_{lim}$. Hence, the sequence $\theta_k$ must converge to a value in the interval $[\theta_0, \theta_{lim}]$. From Lemma \ref{lem:merged}, the only possible value of convergence in the given interval is $\theta_{lim}$. On the other hand, assume that $\theta_{lim}$ does not exist. Similarly to Lemma \ref{lem:merged}, the convergence of an increasing sequence $\theta_k$ would imply that the values of $\min_\omega|f(j\omega, \theta_k)|$ get arbitrary small as $k \rightarrow \infty$. This is not possible because the non-existence of $\theta_{lim}$ implies that $\exists \alpha > 0$ such that \begin{equation} \min_\omega|f(j\omega, \theta_k)| > \alpha, \;\; \forall \theta > \theta_0. \end{equation} Thus, the steps $\Delta_k$ cannot become arbitrarily small, concluding the proof.\qed \end{pf} \paragraph*{Implementation issues} While it is natural to implement iterative algorithms on a digital computer, such implementations introduce issues related to finite precision and representation of large numbers. If $\theta_k$ is convergent, it is expected, as $\theta_k$ iteratively increases, that the steps $\Delta_k$ start converging towards zero. Since the algorithm cannot be run indefinitely and the computer precision is finite, a termination criterion needs to be introduced. The simplest one is to terminate the algorithm when the step $\Delta_k$ becomes smaller than a prescribed value $\delta$, although more sophisticated termination criteria can be established as well. A similar problem occurs if $\theta_k$ is divergent, since it might lead to $\Delta_k > \delta, \forall k \in \mathbb{N}_0$. Therefore, the algorithm is also terminated if $\theta_k$ becomes larger than a prescribed value $\Theta$. Finally, \eqref{eq:line_sufficient} depends on finding the global minimum of a function. A wrongly evaluated minimum might lead to an incorrect jump $\Delta_k$, invalidating the results. Thus, care must be taken, when performing the necessary global optimizations, to avoid invalid jumps. This is precisely the reason why it may be beneficial to use smaller values of the scaling factor $\eta \in (0, 1)$ in Lemma \ref{lem:merged}, and consequently in Theorem \ref{thm:line_nsc_convergence}. Taking that into account, the procedure for approximate evaluation of $\theta_{lim}$ is presented as Algorithm~\ref{alg:line}. \begin{algorithm} \hrulefill \begin{algorithmic}[0] \Require $\delta > 0, \Theta > 0, \theta_0 \in [0, \Theta), \eta \in (0, 1)$ \State $\theta_k := \theta_0$ \State $\overline{\Delta_k} := \infty$ \While{$\eta \overline{\Delta_k} > \delta \text{ and } \theta_k < \Theta$} \State $\overline{\Delta_k} := \displaystyle \min_{\omega}\frac{|f(j\omega, \theta_k)|} {\max_{\theta_k \leq \beta \leq \theta_k + \overline{\Delta_k}} \Big|\frac{\partial f}{\partial \theta} (j\omega, \theta=\beta) \Big|}$ \State $\theta_k := \theta_k + \eta \overline{\Delta_k}$ \State $k := k + 1$ \EndWhile{} \State $\theta_{lim} = \theta_k$ \end{algorithmic} \caption{Approximate computation of $\theta_{lim}$} \label{alg:line} \hrulefill \end{algorithm} It is worth emphasizing that the complexity of Algorithm~\ref{alg:line} is independent from $n$ (the dimension of $\bm{\tau}$), since only the scalar $\theta$ in \eqref{eq:line_parametrization} is computed iteratively. \begin{rem} In this section, the stability equivalence has been extended along a straight line defined by \eqref{eq:line_parametrization}. However, the line can be replaced by any smooth curve parametrized by a scalar $\theta$, provided that $\bm{\tau}(\theta_0 = 0) = \bm{\tau^0}$. For example, one might analyze stability along an arc of an \mbox{n-sphere}. \label{rem:LineCurve} \end{rem} \begin{exmp} Consider a system modeled by \begin{equation} \dot{x}(t) = -x(t-\tau_1) -\int_{-\tau_2}^{0} e^{k\alpha} x(t+\alpha) d\alpha. \end{equation} Its stability is investigated with respect to $\tau_1$, $\tau_2$ and $k$. \label{example:example_3d} \end{exmp} System characteristic function is given by \begin{equation*} f(s,\tau_1, \tau_2, k) = s^2 + s(k+e^{-s\tau_1}) + k e^{-s\tau_1} + 1 - e^{-\tau_2(k+s)} \end{equation*} fulfilling \ref{hypothesis1} and \ref{hypothesis2}. Algorithm \ref{alg:line} is applied to a manually chosen starting point $(\tau_1, \tau_2, k) = (0.250, 8.000, 0.003)$. The obtained stability equivalence rays are plotted in Fig. \ref{fig:example_3d}. \qed \begin{figure} \begin{center} \centering \includegraphics[scale=1.2]{example3d_line.png} \caption{Stability analysis of Example \ref{example:example_3d}, computed from the starting point $(\tau_1, \tau_2, k) = (0.250, 8.000, 0.003)$} \label{fig:example_3d} \end{center} \end{figure} \begin{exmp} Consider a system with a characteristic function given by \begin{equation} f(s, \bm{\tau}) = s^2 + 2se^{-s\tau_1} + e^{-s\tau_2}. \end{equation} Its stability is investigated with respect to $\bm{\tau} = [\tau_1, \tau_2]$. \label{example:example_retarded} \end{exmp} Since the system is retarded, the simplified version of the algorithm (using Corollary \ref{cor:line_retarded}) is applied. The algorithm is initialized at five different points, for which the number of unstable poles has been determined using the methodology from \cite{li2017}. The results are displayed in Fig. \ref{fig:example_retarded_line} and compared to the stability crossing set (SCS) obtained by \cite{gu2005} for verification purposes. Although applying the algorithm to obtain a plethora of rays gives a good sketch of the stability equivalence region, the result does not guarantee stability equivalence in a dense set of $(\tau_1, \tau_2)$. This shortcoming is overcome in Section \ref{section:region} by analyzing stability inside a region.\qed \begin{figure} \begin{center} \includegraphics{example_retarded_line} \caption{Stability analysis of Example \ref{example:example_retarded}} \label{fig:example_retarded_line} \end{center} \end{figure} \section{Stability equivalence within a region} \label{section:region} In this section, a solution to \ref{problem2} is given. \subsection{Sufficient condition} \begin{thm} Let $f$ satisfy \ref{hypothesis1} and \ref{hypothesis2}. Let $\bm{\tau^0} \in \mathcal{T}$ be any parameter point satisfying $f(j\omega, \bm{\tau^0}) \neq 0, \forall \omega \in \mathbb{R}$. Let $p$ and $q$ satisfy \begin{equation} \frac{1}{p} + \frac{1}{q} = 1, \quad 1 \leq p, q \leq \infty. \label{eq:pq} \end{equation} Then, $$NU_f(\bm{\tau^0}) = NU_f(\bm{\tau}^0 + \mathbf{v})$$ holds for every $\mathbf{v}$ such that $\|\mathbf{v}\|_q < \overline{\varepsilon}_q(\bm{\tau}^0)$, where \begin{equation} \overline{\varepsilon}_q(\bm{\tau}^0) = \min_{\omega \in \mathbb{R}_0^+} \frac{|f(j\omega, \bm{\tau^0})|}{\displaystyle \max_{||\mathbf{v}||_q \le \overline{\varepsilon}_q(\bm{\tau}^0)}||\nabla f(j\omega,\bm{\tau^0} + \mathbf{v})||_p}. \label{eq:region_final_theorem} \end{equation} \label{thm:region_sufficient} \end{thm} \vspace{-0.75cm} \begin{pf} To build towards the proof, it is beneficial to start by analyzing stability equivalence of two arbitrary parameter points. To that end, define a parameter point $\bm{\tau}$ as \begin{equation} \bm{\tau}(\mathbf{v}) = \bm{\tau^0} + \mathbf{v}, \end{equation} where $\bm{\tau^0} \in \mathcal{T}$ represents a chosen starting point and $\mathbf{v}$ represents a change vector. The objective is to discuss the stability equivalence of parameter points $\bm{\tau^0} = \bm{\tau}(\mathbf{0})$ and $\bm{\tau}(\mathbf{v})$. From Rouch\'e's theorem, it is known that stability equivalence of these points is guaranteed if \begin{multline} |f(s,\bm{\tau}(\mathbf{v})) - f(s, \bm{\tau}(\mathbf{0}))| < |f(s, \bm{\tau}(\mathbf{0}))|, \forall s \in \mathcal{C}. \label{eq:region1} \end{multline} The LHS of \eqref{eq:region1} can further be elaborated to obtain \begin{align*} &|f(s, \bm{\tau}(\mathbf{v})) - f(s, \bm{\tau}(\mathbf{0}))| = \Bigg|\int_{\gamma} \Big\langle \nabla f(s, \bm{\tau}(\mathbf{r})), d\mathbf{r} \Big\rangle \Bigg|= \\ &\Bigg|\int_0^1 \Big\langle \nabla f (s, \bm{\tau}(\mathbf{r}(\beta))), \mathbf{r'} \Big\rangle d\beta \Bigg| \leq \\ &\int_0^1 \Bigg| \Big\langle \nabla f (s, \bm{\tau}(\mathbf{r}(\beta))), \mathbf{r'} \Big\rangle \Bigg| d\beta , \label{eq:region2} \end{align*} where $\mathbf{r}(\beta)$ represents parameterization of curve $\gamma$ which connects the $\mathbf{0}$ vector with $\mathbf{v}$ for $\beta \in [0, 1]$, and $\mathbf{r'}$ represents the derivative of $\mathbf{r}(\beta)$ with respect to $\beta$. Introducing the obtained conservative bound in \eqref{eq:region1}, and using \ref{hypothesis2} and the symmetry of $f$, implies that for every $\omega>0$ \begin{equation*} \int_0^1 \Bigg| \Big\langle \nabla f (j\omega, \bm{\tau}(\mathbf{r}(\beta))), \mathbf{r'} \Big\rangle \Bigg| d\beta < |f(j\omega, \bm{\tau}(\mathbf{0}))| \;. \label{eq:region2.5} \end{equation*} In order to simplify notation, in the remainder of this proof $f(j\omega, \bm{\tau}(\mathbf{v}))$ and $\nabla f(j\omega, \bm{\tau}(\beta \mathbf{v}))$ will be denoted as $f(\mathbf{v})$ and $\nabla f(\beta \mathbf{v})$, respectively. By defining the curve $\gamma$ as $\mathbf{r}(\beta) = \beta\mathbf{v}$ and applying the H\"older's inequality, \begin{equation} \int_0^1 \Bigg|\Big\langle \nabla f (\beta\mathbf{v}), \mathbf{v} \Big\rangle \Bigg|d\beta \leq \int_0^1 ||\nabla f(\beta\mathbf{v})||_p ||\mathbf{v}||_q\;d\beta. \label{eq:region3} \end{equation} The results presented so far guarantee stability equivalence for a specific change vector $\mathbf{v}$. Choosing arbitrary positive $\varepsilon_q$, one may notice that for any $\mathbf{v}$ which satisfies $||\mathbf{v}||_q \le \varepsilon_q$, it is possible to substitute \eqref{eq:region3} with a more conservative expression \begin{equation*} \int_0^1 ||\nabla f(\beta\mathbf{v})||_p\;||\mathbf{v}||_q\;d\beta \; \leq \; \max_{||\mathbf{v}||_q<\varepsilon_q}||\nabla f(\mathbf{v})||_p \; \varepsilon_q \;, \label{eq:region4} \end{equation*} derived from the fact that the integral of a positive quantity is always less or equal than the product of the maximum of the integrand by the length of the integration interval. Finally, the upper bound on $\varepsilon_q$, denoted as $\overline{\varepsilon}_q(\bm{\tau}^0)$, defining the permissible stability equivalence region, is obtained as in \eqref{eq:region_final_theorem}, concluding the proof. \qed \end{pf} \begin{rem} \label{rem:circularity_region} The inequality \eqref{eq:region_final_theorem} is circular, since $\overline{\varepsilon}_q(\bm{\tau}^0)$ appears on both sides. Similarly to \eqref{eq:line_sufficient}, the monotonicity of the involved expressions allows finding a valid value of $\varepsilon_q$ by bisection. Moreover, specific system types (such as \eqref{eq:retarded_characteristic}) allow a direct (albeit conservative) evaluation of the LHS, removing the circularity, as illustrated in the following subsection. \end{rem} \subsection*{Application to retarded TDS} \label{section:region_retarded} Analogously to the line-based version of the method, the convenient form of retarded TDS characteristic function given by \eqref{eq:retarded_characteristic} can be utilized to further simplify \eqref{eq:region_final_theorem}. To evaluate $||\nabla f (j\omega, \bm{\tau})||_p$ in \eqref{eq:region_final_theorem}, it is beneficial to first find the upper bounds for partial derivatives of $f$ with regards to each parameter component $\tau_i$. Assuming $\omega \geq 0$, observe that \begin{equation} \bigg| \frac{\partial f}{\partial \tau_i} (j\omega, \bm{\tau}) \bigg| = \bigg| -j\omega P_i(j\omega)e^{-j\omega\tau_i} \bigg| = \omega \bigg| P_i(j\omega) \bigg| \end{equation} which allows to set a conservative upper bound \begin{equation} ||\nabla f (j\omega, \bm{\tau})||_p = \Bigg(\sum_{i=1}^n \Big( \omega \big|P_i(j\omega)\big|\Big)^p \Bigg)^{\frac{1}{p}} \end{equation} which does not depend on $\bm{\tau}$ and removes the circularity from \eqref{eq:region_final_theorem}. \begin{cor} \label{cor:final} Let $f$ be defined as in \eqref{eq:retarded_characteristic}. Let $\bm{\tau^0} \in \mathcal{T}$ be any parameter point satisfying $f(j\omega, \bm{\tau^0}) \neq 0, \forall \omega \in \mathbb{R}$. Let $p$ and $q$ satisfy \eqref{eq:pq}. Then, $$NU_f(\bm{\tau^0}) = NU_f(\bm{\tau}^0 + \mathbf{v}), $$ holds if \begin{equation} ||\mathbf{v}||_q < \min_{\omega \in \mathbb{R}_0^+} \frac{|f(j\omega, \bm{\tau^0})|} {\Big(\sum_{i=1}^n \big( \omega|P_i(j\omega)|\big)^p \Big)^{\frac{1}{p}}}. \label{eq:region_retarded_final} \end{equation} \end{cor} The application of \eqref{eq:region_final_theorem} is analogous to performing a single step of the line version algorithm. Fig. \ref{fig:example_retarded_random_regions} shows the results of applying Corollary \ref{cor:final} to Example \ref{example:example_retarded}, with different shapes corresponding to different combinations of $(p, q)$ and different starting points. The number of unstable poles is equivalent for all the points inside each individual region. \begin{figure} \begin{center} \includegraphics{example_retarded_random_regions.pdf} \caption{Results of applying Corollary \ref{cor:final} to various parametric points in Example \ref{example:example_retarded}.} \label{fig:example_retarded_random_regions} \end{center} \end{figure} \subsection{Necessary and sufficient conditions} \label{section:region_nsc} Analogously to the line-based version of the method, necessary and sufficient conditions are established for characteristic functions to have the same number of non-negative zeros when their parameters vary in a region. First, choose $p$ and $q$ satisfying \eqref{eq:pq}, and $\eta \in (0, 1)$. Choose a starting point $\bm{\tau}^0$ and define a set $\mathcal{S}_0$ as \begin{equation} \mathcal{S}_0 = \{\bm{\tau^0}\}. \label{eq:region_s0} \end{equation} Construct a monotonously growing sequence of sets \begin{equation} \mathcal{S}_{k+1} = \mathcal{S}_k \cup \bigcup_{\bm{\tau} \in \partial \mathcal{S}_k} \mathcal{W}_{\eta}(\bm{\tau}), \quad \forall k \in \mathbb{N}_0 \;, \label{eq:region_iterative} \end{equation} where \begin{equation} \mathcal{W}_{\eta}(\bm{\tau}) = \left\{(\bm{\tau} + \mathbf{v}) \in \mathcal{T} \; \Big| \; ||\mathbf{v}||_q \leq \eta \overline{\varepsilon}_q(\bm{\tau})\right\} \;, \label{eq:w} \end{equation} with $\overline{\varepsilon}_q(\bm{\tau})$ defined in \eqref{eq:region_final_theorem}. It is now established that $\mathcal{S}_k$ converges to $\mathcal{M}_f(\bm{\tau^0})$. \begin{thm} Let $f$ satisfy \ref{hypothesis1} and \ref{hypothesis2}. Let $p$ and $q$ satisfy \eqref{eq:pq}. Let $\bm{\tau^0} \in \mathcal{T}$ be any parameter point satisfying $f(j\omega, \bm{\tau^0}) \neq 0, \forall \omega \in \mathbb{R}$. Define $\mathcal{S}_k$, $k\ge0$ as in \eqref{eq:region_s0} and \eqref{eq:region_iterative}. Then, \begin{equation} \limsup_{k \rightarrow \infty} \mathcal{S}_k = \mathcal{M}_f(\bm{\tau^0}). \end{equation} \label{thm:region_nsc} \end{thm} \vspace{-0.75cm} \begin{pf} Choose any point $\bm{\tau^*} \in \mathcal{M}_f(\bm{\tau^0})$. By definition of $\mathcal{M}_f(\bm{\tau^0})$, there exists a path $\mathcal{P}$ defined by a continuous bijective function $g : [0,1] \rightarrow \mathcal{P} \subset \interior\big(\mathcal{M}_f(\bm{\tau^0})\big)$ such that $g(0) = \bm{\tau^0}$ and $g(1) = \bm{\tau^*}$. Define the sequence \begin{equation} m_k = \max \left\{x \in [0,1] \; \Big| \; g(x) \in \mathcal{S}_k\right\}. \label{eq:m_k} \end{equation} For any fixed $k$, the set $\mathcal{S}_k$ is closed and bounded, and therefore compact. Consequently, the maximum in \eqref{eq:m_k} is well-defined. Define the sequence $\bm{\tau^k} = g(m_k)$, which represents the farthest point along the path $\mathcal{P}$ (referenced from $\bm{\tau^0}$) such that $\bm{\tau^k} \in \mathcal{S}_k$ at iteration $k$. There are two possible scenarios: \begin{enumerate} \item \label{scenario1} $\bm{\tau^{k-1}} < \bm{\tau^*}$, implying $\bm{\tau^k} \in \partial \mathcal{S}_k$. In this scenario, $\bm{\tau^k}$ is one of the points on which \eqref{eq:region_iterative} is evaluated at iteration $k$. \item \label{scenario2} $\bm{\tau^{k-1}} = \bm{\tau^*}$, implying that the endpoint $\bm{\tau^*}$ has already been reached. \end{enumerate} Let us further analyze scenario (\ref{scenario1}). Since $\bm{\tau^k} \in \interior\big(\mathcal{M}_f(\bm{\tau^0})\big)$, it holds that $|f(j\omega, \bm{\tau^k})| > 0, \forall k \in \mathbb{N}_0, \forall \omega \geq 0$, further implying that the resulting $\varepsilon_q$ from \eqref{eq:region_final_theorem} is strictly positive $\forall k \in \mathbb{N}_0$. Consequently, either $m_k = 1$, or $m_k < m_{k+1}$, meaning that $\bm{\tau^k}$ gets strictly closer to $\bm{\tau}^*$ along $\mathcal{P}$ at each successive iteration unless $\bm{\tau^k} = \bm{\tau^*}$. Thus, $\exists k_0$ such that $\bm{\tau^*} \in \mathcal{S}_{k}, \forall k \geq k_0$. Since the same reasoning can be applied to any chosen point $\bm{\tau^*} \in \mathcal{M}_f(\bm{\tau^0})$, the proof is concluded. \qed \end{pf} In practice, the sequence $\mathcal{S}_k$ is constructed on a finite set of sampled points belonging to $\partial \mathcal{S}_k$, rather than an infinite set as in \eqref{eq:region_iterative}. Theorem 13 shows that it is possible, in principle, to construct a procedure that identifies the entire stability equivalence region surrounding $\bm{\tau^0} \in \mathcal{T} \subset (\mathbb{R}_0^+)^n$. However, formulating an explicit and computationally efficient algorithm that evaluates $\mathcal{M}_f(\bm{\tau^0})$, in the general case (i.e. whatever the dimension $n$), rises some implementation issues related to the way the boundary is sampled. \begin{exmp} Consider a distributed delay system modeled by \begin{equation} \dot{x}(t) = -\int_{-\tau}^{0} e^{k\alpha} x(t+\alpha) d\alpha. \end{equation} Its stability is investigated with respect to $\tau$ and $k$. \label{example:example_distributed} \end{exmp} System characteristic function, \begin{equation} f(s,\tau,k) = s^2+sk+1-e^{-\tau(s+k)}, \end{equation} fulfills \ref{hypothesis1} and \ref{hypothesis2}. \begin{figure*} \begin{center} \includegraphics{example_distributed_region.png} \caption{Results of iteratively applying \eqref{eq:region_final_theorem} to Example \ref{example:example_distributed}} \label{fig:example_distributed_region} \end{center} \end{figure*} Fig. \ref{fig:example_distributed_region} shows the results of applying \eqref{eq:region_iterative} to ten different starting points, for which the number of unstable poles are determined using Cauchy's argument principle. The obtained stability regions are similar regardless which starting point is chosen in the interior of the represented regions\footnote{ If a starting point is on the boundary of two regions, then condition $f(j\omega, \bm{\tau^0}) \neq 0$ is not satisfied and Theorems \ref{thm:line_sufficient}, \ref{thm:line_nsc_convergence}, \ref{thm:region_sufficient} and \ref{thm:region_nsc} cannot be applied.}. The algorithm diverges in the positive (north and east) directions of both axes, indicating that the stability limit is $\infty$ (Theorem \ref{thm:line_nsc_convergence}). In those directions, the system is stable independently of $\tau$ and $k$. Additionally, Fig. \ref{fig:example_retarded_region} shows the results of iterative applications of Corollary \ref{cor:final} to Example \ref{example:example_retarded}. \begin{figure} \begin{center} \includegraphics{example_retarded_region.png} \caption{Results of iteratively applying \eqref{eq:region_retarded_final} to Example \ref{example:example_retarded}} \label{fig:example_retarded_region} \end{center} \end{figure} \begin{rem} \label{remark:stability_radius} The region-based method can be compared to methods tackling robust stability and robust control, such as \cite{gu2007, knospe2006, hinrichsen1986, kressner2006}. However, the problems being solved are slightly different. When dealing with robust stability problems, the aim is often to find the stability radius of a given parametric point (minimal distance from the given parametric point to the stability crossing set). On the other hand, the methodology proposed in this paper aims at finding the entire stability equivalence region surrounding the given parametric point. \end{rem} \section{Conclusions and discussions} \label{section:conclusion} This paper presents a new methodology for analyzing stability of a large class of linear TDS, including retarded and distributed delay systems. Necessary and sufficient conditions for exploring stability equivalence along a line and inside a region within the parametric space are provided. The primary comparative advantage of the proposed methodology is that it can be applied in a uniform manner to a wide class of problems: the only conditions are captured by hypotheses (H1) and (H2). The consequent Lemmas \ref{lem:wide_retarded_systems} and \ref{lem:distributed_delay_systems} present specific important classes of systems which satisfy these hypotheses. It is worth emphasizing, however, that the time complexity of the line-based Algorithm~\ref{alg:line}, which allows to reach the boundary of the stability domain in a prescribed direction, is independent of the dimension of the parametric vector $\bm{\tau}$. The proposed method is not able to address neutral-type systems (which violate hypothesis (H2)). Weakening (H2), and consequently extending the results to neutral-type systems, is an interesting perspective of this work. Further perspectives are linked to establishing a computationally efficient algorithm for finding the whole or even all stability regions in a prescribed $n$-dimensional space using the results of either the line-based stability or the region-based stability. \bibliographystyle{newapa}
\section{Introduction} Polymers with a branched structure are very promising compounds for modern materials science and engineering. Branched macromolecules are usually used as elementary structural units of a vast range of functional polymer materials, such as liquid gels and aerogels, elastomers, melts, thermoplastics, {\sl etc.} High functionality of branched polymers opens new opportunities for their use in drug delivery, robotics, antibacterial and antifouling surfaces, food industry and others applications. In biological processes, such as stabilization of globular proteins or transcriptional regulation of genes, an important role is played by multiple loop formation in branched macromolecules. That is why it is of fundamental interest to study the conformational properties of complex polymer architectures \cite{haydukivska2020universal,douglas1990characterization}. In order to understand the role of ring constituents in compactification of branched polymers, the authors of paper \cite{blavatska2015conformational} considered a model of a star-like polymer, where one part of the arms were linear Gaussian polymers, while the rest were ring ones. The authors studied the conformational behavior of star-like Gaussian macromolecules containing a total of $f_1$ ring arms (petals) and $f_2$ linear chains (branches). Within the framework of the continuous model of a Gaussian macromolecule, they applied the path integral approach to estimate the gyration radius and asphericity of the typical conformation as functions of the $f_1$ and $f_2$ parameters. In particular, their results reveal the extent of anisotropy of star-like topologies relative to the rosette structures of the same total molecular weight. Moreover, their analytical results quantitatively confirm the compactification (decrease in the effective size) of multiple loop polymer structures as compared with structures containing only linear segments. The authors of paper \cite{haydukivska2020universal} determined the mean-square gyration radius and the average hydrodynamic radius of the star-like Gaussian polymer, and estimated their ratio with its dependence on the numbers of petals and branches. Moreover, they obtained quantitative estimate of the compactification degree of these polymers with an increasing number of petals as compared to linear or star-shaped molecules of the same total molecular weight \cite{haydukivska2020universal}. Despite the fact that the behavior of the mean-square gyration radius of branched macromolecules has been extensively studied \cite{blavatska2015conformational,haydukivska2020universal}, the behavior of the probability distribution function (PDF) of the gyration radius of star-like macromolecules remains unclear. In particular, it is important to understand how the replacement of the linear branches with ring ones can qualitatively change the PDF behavior. In this paper, we attempt to answer this question, considering two limiting examples of the branched polymer: a Gaussian star polymer with $f$ identical branches (see Fig. 1a) and a Gaussian rosette (Fig. 1b) with $f$ petals. Each arm is a Gaussian linear polymer for the star macromolecule and a Gaussian ring polymer -- for the rosette. In the framework of the path integral approach proposed in our previous paper \cite{Budkov2016}, we for the first time obtain analytical expressions for characteristic functions of the gyration radius distributions and then estimate the asymptotics of the corresponding PDF for star and rosette macromolecules in the limit of a large number of arms. \begin{figure}[h] \centering \includegraphics[width=1.0\linewidth]{star.pdf} \caption{Schematic representation of a Gaussian star (a) and a Gaussian rosette (b).} \label{fig:corr_pore} \end{figure} \section{Statement of the problem} The probability distribution function (PDF) of the gyration radius of star-like Gaussian macromolecules with $f$ linear or ring arms (see Fig. 1(a,b)) can be written as the following path integral \begin{equation} P(R_{g}^2)=\int\frac{\mathcal{D}\bold{r}_{1}}{Z_{0}^{(1)}}..\int\frac{\mathcal{D}\bold{r}_{f}}{Z_{0}^{(f)}}e^{-\frac{3}{2b^2}\sum\limits_{i=1}^{f}\int\limits_{0}^{N}d\tau\dot{\bold{r}}_{i}^2(\tau)}\delta\left(R_{g}^2-\frac{1}{2N^2f^2}\sum\limits_{i,j=1}^{f}\int\limits_{0}^{N}\!\!\int\limits_{0}^{N}d\tau_1 d\tau_2\left(\bold{r}_{i}(\tau_1)-\bold{r}_{j}(\tau_2)\right)^2\right), \end{equation} where \begin{equation} Z_{0}^{(i)}=\int{\mathcal{D}\bold{r}_{i}} \exp\left[-\frac{3}{2b^2}\int\limits_{0}^{N}d\tau\dot{\bold{r}}_{i}^2(\tau)\right] \end{equation} are the normalization constants of the Gaussian measures; $N$ is the polymerization degree and $b$ is the Kuhn length. Using the Fourier-representation of the delta-function \begin{equation} \delta(x)=\int\limits_{-\infty}^{\infty}\frac{d\xi}{2\pi}e^{-i\xi x}, \end{equation} we obtain \begin{equation} P(R_{g}^2)=\int\limits_{-\infty}^{\infty}\frac{d\xi}{2\pi}e^{-i\xi R_{g}^2}K(\xi), \end{equation} where \begin{equation} K(\xi)=\int\frac{\mathcal{D}\bold{r}_{1}}{Z_{0}^{(1)}}..\int\frac{\mathcal{D}\bold{r}_{f}}{Z_{0}^{(f)}}e^{-\frac{3}{2Nb^2}\sum\limits_{i=1}^{f}\int\limits_{0}^{1}ds\dot{\bold{r}}_{i}^2(s)+\frac{i\xi}{2f^2}\sum\limits_{i,j=1}^{f}\int\limits_{0}^{1}\!\!\int\limits_{0}^{1}ds_1 ds_2\left(\bold{r}_{i}(s_1)-\bold{r}_{j}(s_2)\right)^2} \end{equation} is the characteristic function \cite{gnedenko2018theory}, where we turned to the variables $s=\tau/N \in [0,1]$. Our aim is to calculate the characteristic function $K(\xi)$ as the Gaussian path integral and then to evaluate the PDF by the steepest descent method \cite{lavrentiev1987methods}. As is well known, the characteristic function can be related to the moments $\mu_{k}$ and cumulants $\chi_k$ by the expansions \begin{equation} K(\xi)=1+\sum\limits_{k=1}^{\infty}\frac{\mu_{k}}{k!}(i\xi)^{k}, \end{equation} \begin{equation} \label{Ln_K} \ln K(\xi)=\sum\limits_{k=1}^{\infty}\frac{\chi_{k}}{k!}(i\xi)^{k}, \end{equation} so that the moments $\mu_k$ and cumulants $\chi_{k}$ are related to each other by the expressions \begin{equation} \label{moments} \mu_{1}=\chi_{1},~\mu_{2}=\chi_{2}+\mu_{1}^2,.. \end{equation} \section{Characteristic functions} In this section, we demonstrate a derivation of the analytical expressions for the characteristic functions of star and rosette Gaussian polymers within the path integral approach. \subsection{Star polymer} Here, we consider the case of a star-like Gaussian polymer -- a set of $f$ identical Gaussian chains grafted to one point (see, Fig. 1a). Using the equality \begin{equation} e^{-\frac{\bold{b}^2}{4a}}=\left(\frac{a}{\pi}\right)^{3/2}\int d\bold{x}e^{-a\bold{x}^2+i\bold{b}\bold{x}}, \end{equation} the characteristic function can be rewritten as follows \begin{equation} \nonumber K(\xi)=\int..\int\prod\limits_{i=1}^{f}\frac{\mathcal{D}\bold{r}_{i}}{Z_{0}^{(i)}}e^{-\frac{3}{2Nb^2}\int\limits_{0}^{1}ds\left(\dot{\bold{r}}_{i}^2(s)-\omega^2\bold{r}_{i}^2(s)\right)}\exp\left[-\frac{i\xi}{f^2}\left(\sum\limits_{i=1}^{f}\int\limits_{0}^{1}ds\bold{r}_{i}(s)\right)^2\right]= \end{equation} \begin{equation} \label{K} \left(\frac{f^2}{4\pi i\xi}\right)^{3/2}\int d\bold{x} e^{\frac{if^2\bold{x}^2}{4\xi}}\left[\int\frac{\mathcal{D}\bold{r}}{Z_{0}}e^{-S[\bold{r}]}\right]^{f}, \end{equation} where the auxiliary functional \begin{equation} \label{S} S[\bold{r}]=\frac{3}{2Nb^2}\int\limits_{0}^{1}ds\left(\dot{\bold{r}}^2(s)-\omega^2\bold{r}^2(s)\right)-i\bold{x}\int_{0}^{1}ds\bold{r}(s), \end{equation} and notation $\omega^2=2Nb^2i\xi/3f$ are introduced. Then it is necessary to calculate the path integral in eq. (\ref{K}). Using the saddle-point method \cite{Budkov2016,paradezhenko2020gaussian,zinn2010path}, we obtain \begin{equation} \label{path} \int\frac{\mathcal{D}\bold{r}}{Z_{0}}e^{-S[\bold{r}]}=\left(\frac{3}{2\pi Nb^2}\right)^{3/2}\left(\frac{\omega}{\sin{\omega}}\right)^{3/2}\int d\bold{R}e^{-S[\bold{v}_{SP}]}, \end{equation} where \begin{equation} \bold{v}_{SP}(s)=-\frac{i\bold{x}Nb^2}{3\omega^2}\left(1-\cos{\omega s}-\frac{\sin{\omega s}(1-\cos{\omega})}{\sin{\omega}}\right)+\frac{\bold{R}\sin{\omega s}}{\sin{\omega}} \end{equation} is the solution of the Euler-Lagrange equation $\delta S[\bold{r}]/\delta \bold{r}(s)=0$ with the boundary conditions $\bold{r}(0)=0$ and $\bold{r}(1)=\bold{R}$. Taking into account that \begin{equation} S[\bold{v}_{SP}]=\frac{3R^2\omega}{2Nb^2\tan{\omega}}-\frac{i\bold{R}\bold{x}\tan{\frac{\omega}{2}}}{\omega}+\frac{i\bold{x}^2f}{4\xi}-\frac{i\bold{x}^2f}{2\xi}\frac{\tan{\frac{\omega}{2}}}{\omega}, \end{equation} after integration over the end point of the chain, $\bold{R}$, in eq. (\ref{path}), and subsequent integration over the auxiliary variable, $\bold{x}$, we arrive at the new analytical expression for the characteristic function \begin{equation} \label{char_func} K(\xi)=\left(\frac{\omega}{\sin{\omega}}\right)^{3/2}\left(\frac{1}{\cos{\omega}}\right)^{3(f-1)/2}. \end{equation} Note that for a linear Gaussian chain ($f=1$), eq. (\ref{char_func}) transforms into the well-known characteristic function $K(\xi)=(\omega/\sin{\omega})^{3/2}$ that was first obtained by Fixman \cite{fixman1962radius} within the Wang-Uhlenbeck method \cite{yamakawa1971modern}. The logarithm of the characteristic function can be expanded into the following power series \begin{equation} \ln K(\xi)=\sum\limits_{k=1}^{\infty}\left(\frac{2}{3}\right)^{k-1}\frac{2^{2k-1}}{k(2k)!}(1+(f-1)(2^{2k}-1))B_{2k-1}\left(\frac{Nb^2}{f}\right)^{k}(i\xi)^{k}, \end{equation} so that the cumulants (see, eq. (\ref{Ln_K})) are determined by \begin{equation} \label{chi} \chi_{k}=\left(\frac{2}{3}\right)^{k-1}\frac{2^{2k-1}(k-1)!}{(2k)!}(1+(f-1)(2^{2k}-1))B_{2k-1}\left(\frac{Nb^2}{f}\right)^{k}, \end{equation} where we use the following power series \begin{equation} \ln\frac{\omega}{\sin{\omega}}=\sum\limits_{k=1}^{\infty}\frac{2^{2k-1}B_{2k-1}}{k(2k)!}\omega^{2k}, \end{equation} \begin{equation} \ln\cos{\omega}=\sum\limits_{k=1}^{\infty}\frac{2^{2k-1}B_{2k-1}(1-2^{2k})}{k(2k)!}\omega^{2k}, \end{equation} with the Bernoulli numbers $B_{1}=1/6$, $B_{3}=1/30$, $B_{5}=1/42$,... In particular, we obtain the well-known expression \cite{zimm1949dimensions,blavatska2015conformational} \begin{equation} \left<R_{g}^2\right>=\mu_{1}=\chi_{1}=\frac{3f-2}{f}\frac{Nb^2}{6}, \label{eq:star_first_moment} \end{equation} and the second moment \begin{equation} \label{mu2} \left<R_{g}^4\right>=\mu_{2}=\chi_{2}+\mu_{1}^2=\frac{(Nb^2)^2}{540}\frac{135f^2-120f+4}{f^2}. \end{equation} In a similar way, using eq. (\ref{chi}), we can calculate the higher moments of the distribution. \subsection{Rosette} Now let us calculate the characteristic function for a Gaussian rosette with $f$ petals (Fig. 1b). Performing the same calculations as in the previous subsection, we obtain \begin{equation} \label{char_3} K(\xi)=\left(\frac{f^2}{4\pi i\xi}\right)^{3/2}\int d\bold{x} e^{\frac{if^2\bold{x}^2}{4\xi}}\left[\int\frac{\mathcal{D}\bold{r}}{Z_{0}}e^{-S[\bold{r}]}\right]^{f}, \end{equation} where the random vector-function $\bold{r}(s)$ satisfies the following boundary conditions $\bold{r}(0)=\bold{r}(1)=0$ (the rosette center is placed at the origin) and the $S[\bold{r}]$ functional is determined by eq.(\ref{S}). Expanding the random vector-function, $\bold{r}(s)$, into a Fourier series \begin{equation} \bold{r}(s)=\sqrt{2}\sum\limits_{n=1}^{\infty}{\bf\rho}_n \sin{\pi ns}, \end{equation} we turn to the integration over the Fourier components\cite{Budkov2016}, $\bold{\rho}_{n}$, i.e. \begin{equation} \nonumber \int\frac{\mathcal{D}\bold{r}}{Z_{0}}e^{-S[\bold{r}]}= \frac{\int..\int\prod\limits_{n=1}^{\infty}d\bold{\rho}_{n}\exp\left[-\frac{3}{2Nb^2}\sum\limits_{n=1}^{\infty}(\pi^2n^2-\omega^2)\bold{\rho}_n^2+\frac{2i\sqrt{2}\bold{x}}{\pi}\sum\limits_{k=1}^{\infty}\frac{\bold{\rho}_{2k-1}}{2k-1}\right]}{\int..\int\prod\limits_{n=1}^{\infty}d\bold{\rho}_{n}\exp\left[-\frac{3}{2Nb^2}\sum\limits_{n=1}^{\infty}\pi^2n^2\bold{\rho}_n^2\right]}= \end{equation} \begin{equation} \nonumber \left(\prod\limits_{n=1}^{\infty}\frac{\pi^2n^2}{\pi^2n^2-\omega^2}\right)^{3/2}\exp\left[-\frac{4Nb^2\bold{x}^2}{3\pi^2}\sum\limits_{k=1}^{\infty}\frac{1}{(2k-1)^2(\pi^2(2k-1)^2-\omega^2)}\right]= \end{equation} \begin{equation} \label{fourier} \left(\frac{\omega}{\sin\omega}\right)^{3/2}\exp\left[\frac{i\bold{x}^2f}{4\xi}\left(\frac{2}{\omega}\tan{\frac{\omega}{2}-1}\right)\right]. \end{equation} Therefore, substituting eq. (\ref{fourier}) for eq. (\ref{char_3}), after the integration over variable $\bold{x}$, we arrive at the new analytical expressions for the characteristic function for the Gaussian rosette \begin{equation} \label{char_2} K(\xi)=\left(\frac{\omega}{\sin{\omega}}\right)^{3(f-1)/2}\left(\frac{\omega}{2\sin{\frac{\omega}{2}}}\right)^{3}. \end{equation} Eq. (\ref{char_2}) allows us to obtain analytical expressions for cumulants. Indeed, the logarithm of the characteristic function takes the form \begin{equation} \ln{K(\xi)}=\sum\limits_{k=1}^{\infty}\frac{B_{2k-1}}{k(2k)!}\left(\frac{2}{3}\right)^{k-1}\left(1+2^{2k-1}(f-1)\right)\left(\frac{Nb^2}{f}\right)^{k}(i\xi)^{k}, \end{equation} so that the cumulants can be calculated by the following analytical expression: \begin{equation} \label{chi2} \chi_{k}=\frac{(k-1)!}{(2k)!}\left(\frac{2}{3}\right)^{k-1}\left(1+2^{2k-1}(f-1)\right)B_{2k-1}\left(\frac{Nb^2}{f}\right)^{k}. \end{equation} Using eqs. (\ref{moments}), we obtain the moments: \begin{equation} \label{moments} \mu_{1}=\left<R_{g}^2\right>=\frac{Nb^2}{12}\frac{2f-1}{f},~\mu_{2}=\left<R_{g}^4\right>=\frac{60f^2-44f+1}{f^2}\frac{N^2b^4}{2160},... \end{equation} Note that the above expression for the first moment, $\mu_{1}$, was obtained recently in paper \cite{blavatska2015conformational}. \section{Probability distribution functions} In this section, we apply the steepest descent method to study the asymptotic behavior of the PDF of the Gaussian star-like macromolecules discussed above \cite{lavrentiev1987methods}. \subsection{Star polymer} For the star polymer, the PDF can be rewritten in the form \begin{equation} P(R_g^2)=\int\limits_{-\infty}^{+\infty}\frac{d\xi}{2\pi}\exp\left[-W(\xi)\right], \end{equation} where we introduce the following auxiliary function \begin{equation} W(\xi)=\frac{(3f-2)\alpha^2\omega^2(\xi)}{4}-\frac{3}{2}\ln{\frac{\omega(\xi)}{\sin{\omega(\xi)}}}+\frac{3(f-1)}{2}\ln{\cos{\omega(\xi)}} \end{equation} and expansion factor $\alpha=R_{g}/\left<R_{g}^2\right>^{1/2}$. In order to estimate the PDF, we use the steepest descent method \cite{lavrentiev1987methods}. At first, we have to find the saddle-point, $\xi_{0}$, from the solution of the saddle-point equation \begin{equation} W^{\prime}(\xi_0)=\frac{3}{2\xi_0}\left(\frac{(3f-2)\alpha^2\omega_0^2}{6}-\frac{1}{2}\left(1-\frac{\omega_0}{\tan{\omega_0}}\right)-\frac{1}{2}(f-1)\omega_0\tan{\omega_0}\right)=0, \end{equation} where $\omega_0=\omega(\xi_0)$. Note that the contour of integration must be deformed along the steepest descent line. In the vicinity of $\xi_0$ we have \begin{equation} W(\xi)=W(\xi_0)+\frac{1}{2}W^{\prime\prime}(\xi_0)(\xi-\xi_0)^2+.., \end{equation} where the second derivative takes the form \begin{equation} W^{\prime\prime}(\xi_0)=\frac{3}{8\xi_0^2}\left(2-\frac{\omega_0}{\tan{\omega_0}}-\frac{\omega_0^2}{\sin^2{\omega_0}}+(f-1)\left(\omega_0\tan{\omega_0}-\frac{\omega_0}{\cos^2{\omega_0}}\right)\right). \end{equation} In what follows, we will consider only the case of a large number of arms ($f\gg 1$) for two limiting regimes -- $\alpha\gg 1$ and $\alpha\ll 1$. In this $"$thermodynamic$"$ limit, the steepest descent method must yield the exact asymptotic behavior of the PDF. The saddle-point equation at $f\gg 1$ takes the following simplified form \begin{equation} \frac{\tan{\omega_0}}{\omega_0}=\alpha^2, \end{equation} whereas the second derivative is \begin{equation} W^{\prime\prime}(\xi_0)\simeq \frac{3f}{8\xi_0^2}\left(\omega_0\tan{\omega_0}-\frac{\omega_0^2}{\cos^2{\omega_0}}\right). \end{equation} For the highly expanded polymer star ($\alpha\gg 1$), the saddle-point is $\omega_0\simeq \frac{\pi}{2}-\frac{2}{\pi \alpha^2}$, which yields \begin{equation} W(\xi_0)\simeq \frac{3f\pi^2\alpha^2}{16}-\frac{3f}{2}\ln{\frac{\pi\alpha^2}{2}}-\frac{3f}{2},~W^{\prime\prime}(\xi_0)\simeq \frac{\alpha^4N^2b^4}{6f}. \end{equation} Thus, calculating the integral, we obtain \begin{equation} P(R_{g}^2)\simeq \left(\frac{3f}{\pi}\right)^{1/2}\left(\frac{e\pi}{2}\right)^{3f/2}\frac{\alpha^{3f}}{Nb^2}\exp\left[-\frac{3\pi^2f\alpha^2}{16}\right]. \end{equation} In the opposite case, $\alpha\ll 1$, the saddle-point is $\omega_0\simeq{i}/{\alpha^2}$. In this case, we have \begin{equation} W(\xi_0)\simeq \frac{3f}{4\alpha^2}-\frac{3f}{2}\ln{2},~W^{\prime\prime}(\xi_0)\simeq \frac{\alpha^6 N^2b^4}{6f}, \end{equation} and the PDF acquires the following form \begin{equation} P(R_g^2)=\left(\frac{3f}{\pi}\right)^{1/2}\frac{2^{3f/2}}{\alpha^3Nb^2}\exp\left[-\frac{3f}{4\alpha^2}\right]. \end{equation} Collecting together the above results, we eventually obtain the following limiting laws for the PDF \begin{equation} \label{PDF1} P(R_g^2)\simeq \begin{cases} \left(\frac{3f}{\pi}\right)^{1/2}\left(\frac{e\pi}{2}\right)^{3f/2}\frac{\alpha^{3f}}{Nb^2}\exp\left[-\frac{3\pi^2f\alpha^2}{16}\right], &\alpha\gg 1\,\\ \left(\frac{3f}{\pi}\right)^{1/2}\frac{2^{3f/2}}{\alpha^3Nb^2}\exp\left[-\frac{3f}{4\alpha^2}\right], &\alpha\ll 1. \end{cases} \end{equation} It is worth noting that the PDF can be described by the Gaussian function only at $\alpha\gg 1$ (PDF has a Gaussian tail). At small $\alpha$, the PDF goes to zero faster than any positive power of $\alpha$. The obtained asymptotic relations (\ref{PDF1}) allow us to estimate the limiting behavior of the conformational entropy, $S(R_g^2)=\ln{P(R_{g}^2)}$, of the Gaussian star polymer in the limit $f\gg 1$. Thus, we have \begin{equation} \label{entropy} {S(R_g^2)}/{f}\simeq \begin{cases} -\frac{3\pi^2\alpha^2}{16}+3\ln{\alpha}+\frac{3}{2}\ln{\frac{\pi e}{2}}, &\alpha\gg 1\,\\ -\frac{3}{4\alpha^2}+\frac{3}{2}\ln{2}, &\alpha\ll 1, \end{cases} \end{equation} where we kept only the terms that are proportional to $f$. We would like to note that the limiting relations (\ref{entropy}) can be used for a theoretical description of the conformational behavior of star macromolecules in solvent media in the same manner as the conformational entropy of the linear Gaussian chain \cite{Budkov2016,fixman1962radius} can be used within the Flory-type mean-field theories \cite{Budkov2016,budkov2018models}. \subsection{Rosette} In a similar way, for the Gaussian rosette, the PDF can be written in the form \begin{equation} P(R_g^2)=\int\limits_{-\infty}^{+\infty}\frac{d\xi}{2\pi}\exp\left[-W(\xi)\right], \end{equation} where we introduce the following auxiliary function \begin{equation} W(\xi)=\frac{(2f-1)\alpha^2\omega^2(\xi)}{8}-3\ln{\frac{\omega(\xi)}{2\sin{\frac{\omega(\xi)}{2}}}}-\frac{3(f-1)}{2}\ln{\frac{\omega(\xi)}{\sin{\omega(\xi)}}}, \end{equation} with the expansion factor, $\alpha^2=R_{g}^2/\left<R_{g}^2\right>$. The saddle-point equation is \begin{equation} W^{\prime}(\xi_0)=\frac{3}{2\xi_{0}}\left(\frac{(2f-1)\alpha^2\omega_0^2}{12}+\frac{\omega_0}{2\tan{\frac{\omega_0}{2}}}-1-\frac{f-1}{2}\left(1-\frac{\omega_0}{\tan{\omega_0}}\right)\right), \end{equation} where $\omega_0=\omega(\xi_0)$. The second derivative is \begin{equation} W^{\prime\prime}(\xi_0)=\frac{3}{4\xi_0^2}\left(f+1-\frac{\omega_0}{2\tan{\frac{\omega_0}{2}}}-\frac{\omega_0^2}{4\sin^2{\frac{\omega_0}{2}}}-\frac{1}{2}(f-1)\frac{\omega_0}{\sin{\omega_0}}\left(\cos{\omega_0}+\frac{\omega_0}{\sin{\omega_0}}\right)\right). \end{equation} As for the star polymer, we consider only the case of a large number of arms ($f\gg 1$). The saddle-point equation in this case is simplified to \begin{equation} \frac{3}{\omega_0^2}\left(1-\frac{\omega_0}{\tan{\omega_0}}\right)={\alpha^2}. \end{equation} In the regime of a highly expanded macromolecule ($\alpha\gg 1$), the solution of the saddle-point equation is $\omega_0\simeq\pi-3/\pi\alpha^2$, which yields \begin{equation} W(\xi_0)\simeq\frac{\pi^2\alpha^2f}{4}-\frac{3f}{2}\ln{\frac{\pi^2e\alpha^2}{3}},~W^{\prime\prime}(\xi_0)\simeq \frac{\alpha^4N^2b^4}{144f}.` \end{equation} The PDF in this regime has the following asymptotic behavior \begin{equation} P(R_g^2)=\left(\frac{72f}{\pi}\right)^{1/2}\left(\frac{e\pi^2}{3}\right)^{3f/2}\frac{\alpha^{3f}}{Nb^2}e^{-\frac{\pi^2f\alpha^2}{4}}. \end{equation} In the opposite regime of a collapsed macromolecule, $\alpha\ll 1$, the saddle-point is $\omega_0\simeq 3i/{\alpha^2}$. Thus, one can get \begin{equation} W(\xi_0)\simeq \frac{9f}{4\alpha^2}+\frac{3f}{2}\ln{\frac{\alpha^2}{6}},~ W^{\prime\prime}(\xi_0)\simeq \frac{N^2b^4\alpha^6}{162f}. \end{equation} After the integration, we arrive at \begin{equation} P(R_g^2)\simeq 6^{3f/2}\left(\frac{243f}{\pi}\right)^{1/2}\frac{\alpha^{-3f}}{Nb^2}\exp\left[-\frac{9f}{4\alpha^2}\right]. \end{equation} Collecting together the obtained results, we get \begin{equation} \label{PDF_2} P(R_g^2)\simeq \begin{cases} \left(\frac{72f}{\pi}\right)^{1/2}\left(\frac{\pi^2e}{3}\right)^{3f/2}\frac{\alpha^{3f}}{Nb^2}\exp\left[-\frac{\pi^2f\alpha^2}{4}\right], &\alpha\gg 1\,\\ \left(\frac{243f}{\pi}\right)^{1/2}6^{3f/2}\frac{\alpha^{-3f}}{Nb^2}\exp\left[-\frac{9f}{4\alpha^2}\right], &\alpha\ll 1. \end{cases} \end{equation} The conformational entropy in the thermodynamic limit $f\gg 1$ has the following limiting behavior \begin{equation} \label{entropy2} S(R_{g}^2)/f\simeq \begin{cases} -\frac{\pi^2\alpha^2}{4}+3\ln{\alpha}+\frac{3}{2}\ln{\frac{\pi^2e}{3}}, &\alpha\gg 1\,\\ -\frac{9}{4\alpha^2}-3\ln{\alpha}+\frac{3}{2}\ln{6}, &\alpha\ll 1. \end{cases} \end{equation} It is instructive to discuss the asymptotic behavior of the gyration radius distribution function for the Gaussian ring polymer as well. As it follows from eq. (\ref{char_2}), the characteristic function for the ring Gaussian polymer ($f=1$) is \begin{equation} K(\xi)=\left(\frac{\omega}{2\sin{\frac{\omega}{2}}}\right)^3. \end{equation} Performing analogous calculations as below and in ref. \cite{Budkov2016}, we arrive at the following asymptotic expressions for PDF \begin{equation} \label{ring} P(R_g^2)\simeq \begin{cases} \frac{2^{7/2}e^{1/2}3^{1/2}\pi^{11/2}}{Nb^2}\alpha^4\exp\left[-\frac{\pi^2\alpha^2}{2}\right], &\alpha\gg 1\,\\ \frac{6^5}{(2\pi)^{1/2}Nb^2}\alpha^{-9}\exp\left[-\frac{9}{2\alpha^2}\right], &\alpha\ll 1. \end{cases} \end{equation} \section{Discussion of results} As it follows from eqs. (\ref{PDF1}) and (\ref{PDF_2}), the probability distribution function at $f\gg 1$ for a Gaussian rosette at $\alpha \gg 1$ behaves as $\sim \exp\left[-\pi^2f\alpha^2/4\right]$, whereas for a star polymer - as $\sim \exp\left[-3\pi^2f\alpha^2/16\right]$. Thus, the first distribution function goes to zero at $\alpha \to \infty$ much faster than the second one. At $\alpha\ll 1$, the distribution function, described by the function $\sim \exp\left[-9f/(4\alpha^2)\right]$, also tends to zero much faster than the second distribution function, which behaves as $\sim \exp\left[-3f/(4\alpha^2)\right]$. Therefore, the probability distribution function of the Gaussian rosette gyration radius is localized near its maximal value more densely than the corresponding distribution function for the Gaussian star. Thus, we can say that the Gaussian star with a large number of arms is not only larger \cite{blavatska2015conformational}, but also much softer than the Gaussian rosette. This conclusion can be made using other arguments. As is well known \cite{gnedenko2018theory}, the localization of the distribution can be quantitatively characterized by the dispersion $\chi_{2}=\mu_2-\mu_1^2$. In order to compare the localization of the gyration radius distributions in the limit $f\to \infty$, it is necessary to calculate $\lim_{f\to\infty}\chi_{2}^{(r)}(f)/\chi_{2}^{(s)}(f)$, where $\chi_{2}^{(r)}(f)$ and $\chi_{2}^{(s)}(f)$ are the dispersions of the gyration radius distributions for the rosette and the star, respectively. Using eqs. (\ref{chi}) and (\ref{chi2}) for $k=2$, we obtain \begin{equation} \lim_{f\to\infty}\frac{\chi_{2}^{(r)}(f)}{\chi_{2}^{(s)}(f)}=\frac{1}{15}. \end{equation} Thus, the limit of the ratio of the dispersions is much smaller than unity, which additionally confirms the above conclusion. Fig. (\ref{fig:chi}) shows the dependence of ratio $\chi_{2}^{(r)}(f)/\chi_{2}^{(s)}(f)$ on the number $f$ of arms. As is seen, the limit $1/15$ is already achieved at $f\simeq 10$. \begin{figure}[h] \centering \includegraphics[width=0.8\linewidth]{Fig3.png} \caption{The ratio $\chi_{2}^{(r)}(f)/\chi_{2}^{(s)}(f)$ as a function of number of arms $f$.} \label{fig:chi} \end{figure} Note that the obtained exact values of cumulants and moments can be used as a starting point to apply the renormalization group technique to account for the volume interactions between monomer segments of nonideal star-like polymers \cite{douglas1984penetration,douglas1990characterization}. We would also like to note that the obtained asymptotic relations for the gyration radius distributions for the Gaussian rosette (\ref{PDF1}) and single Gaussian ring polymer (\ref{ring}) have limited applicability to real macromolecules. As is well known, an important role in real ring polymers must be played by the topological constraints~\cite{khokhlov1994statistical,douglas1990characterization,koniaris1991knottedness} on possible conformations that are not taken into account in the present study. Thus, the obtained results can be used only for qualitative analysis of the conformational behavior of star-like polymers with ring constituents. We would like to note that a successful attempt to effectively take into account the topological constrains in ring polymers was recently proposed in paper \cite{polovnikov2018effective}. \begin{figure}[h] \centering \includegraphics[width=0.8\linewidth]{Fig2.png} \caption{Comparison between two limiting cases (\ref{PDF1}) of the probability distribution function for star polymer with $f = 30$ and proposed interpolation formula (\ref{eq:interpolation}).} \label{fig:corr_pore} \end{figure} Based on the two limiting expressions (\ref{PDF1}), we propose the following interpolation of the distribution function for a star polymer in the limit $f \gg 1$ and $N \gg 1$: \begin{equation} p(\alpha^2)=\left<R_{g}^2\right> P(R_g^2)=C_{f} \exp\left[-\frac{3f}{4\alpha^2}\right]\exp\left[-\frac{3\pi^2f\alpha^2}{16}\right]\left(\alpha^{2nf}+\alpha^{2mf}\right), \label{eq:interpolation} \end{equation} where $C_f$ is a normalization constant, $n$ and $m$ are the fitting parameters. Eq.(\ref{eq:interpolation}) was constructed in order to reproduce the exponential decays and the exponential function with two adjustable parameters describing the transition between them. The parameters were chosen from the least square optimization (performed via the Matlab function \textit{fminsearch}). We approximated the ratio between the first moment calculated by the interpolation formula and Eq.(\ref{eq:star_first_moment}), and the ratio between the interpolated PDF and its limiting expression at $\alpha = 4$ (the value is chosen arbitrarily and represents the "infinity" point). The resulting parameters are summarized in Table \ref{tab:I} for several different values of $f$. One can see that the value of $\bar{\mu}_2$ tends to unity as $f$ increases. The values of the adjustable parameters $n$ and $m$ seem to tend to certain saturation values as $f$ increases. Fig. \ref{fig:corr_pore} demonstrates the quality of the interpolation; one can see that the values of the interpolated PDF at $\alpha\gg 1$ coincide with the asymptotic expression more precisely than that at $\alpha\ll 1$. The discrepancy indicates the possibly erroneous assumption regarding the PDF behavior in the "middle" of the $\alpha$ range. However, it could easily turn out that the real PDF cannot be expressed through a combination of elementary functions, as it is in the case of a linear Gaussian chain \cite{yamakawa1971modern}. \begin{table}[] \caption{Optimized parameters of interpolation formula Eq.(\ref{eq:interpolation}) for different $f$ values; $\bar{\mu}_2=\mu_2/\left<R_{g}^2\right>^2$ is the ratio between the second moment calculated with the proposed interpolation formula and the square of (\ref{eq:star_first_moment}); $\bar{\mu}_{2}^{(theor)}$ is calculated using eqs. (\ref{eq:star_first_moment}) and (\ref{mu2}).} \label{tab:I} \begin{tabular}{l|l|l|l|l|l} \hline $f$ & $n$ & $m$ & $C_f$ & $\bar{\mu}_2$ & $\bar{\mu}_2^{(theor)}$ \\ \hline 10 & 1.3824 & 0.5789 & $1.4707~10^{11}$ & 1.061 & 1.046 \\ \hline 15 & 1.3666 & 0.6760 & $7.724~10^{16}$ & 1.043 & 1.030 \\ \hline 20 & 1.359 & 0.7244 & $3.7884~10^{22}$ & 1.034 & 1.023 \\ \hline 25 & 1.3546 & 0.7533 & $1.7922~10^{28}$ & 1.029 & 1.018 \\ \hline 30 & 1.3510 & 0.7725 & $8.2905~10^{33}$ & 1.020 & 1.015\\ \hline \end{tabular} \end{table} It should be mentioned that the interpolation formula of the probability distribution function allows us to describe the thermodynamic behavior of the star polymer. Starting from the entropy of the ideal polymeric star: \begin{equation} \label{entropy} S(R_g^2)/k_B f = -\frac{3}{4 \alpha^2} - \frac{3 \pi^2 \alpha^2}{16} + f^{-1} \ln\biggl(\alpha^{2nf}+\alpha^{2mf}\biggl) + \textit{const}, \end{equation} where $\textit{const}$ is a constant which does not depend on $R_g$, one can calculate other thermodynamic potentials, for instance, the Helmholtz free energy \cite{rubinstein2003polymer,khokhlov1994statistical}. This fact is of interest for the developing Flory-type models \cite{budkov2017flory,budkov2018models} aiming to study conformational behavior of a polymer in a solution. We would also like to note that eq. (\ref{entropy}) can be used to describe the conformational entropy of the star-like macromolecules in the theta-solvent regime \cite{khokhlov1994statistical}. \section{Conclusions} In conclusion, using the path integral approach, we have for the first time calculated the characteristic functions of the gyration radius distributions for Gaussian star and Gaussian rosette polymers. We have also been the first to obtain analytical expressions for the cumulants of both distributions. Using the steepest descent method, we have estimated the probability distribution functions of the gyration radius in the limit of a large number of arms of the star and rosette in two limiting regimes: for strongly expanded and strongly collapsed polymers. We have found that in the regime of a large gyration radius relative to its mean-square value the probability distribution functions in both cases can be described by the Gaussian functions. In the opposite regime of a strongly collapsed macromolecule both distribution functions tend to zero faster than any power of the gyration radius. Based on the asymptotic analysis, we have found that the probability distribution function for the rosette is more densely localized near its maximum than that is for the star polymer. Using the nonlinear least-square approach, we have proposed the interpolation formula for the probability distribution function of the gyration radius for the Gaussian star macromolecule. \section*{Acknowledgments} The research is supported by the grant from the President of the Russian Federation (project MD-341.2021.1.3). The research was partially supported by grant 18-29-06008 from the RFBR.
\section{Introduction} \IEEEPARstart{N}{owadays}, with the rapid advancement of the Earth observation program, an ever-growing number of optical remote sensing images are available. These images are widely applied in land cover change detection \cite{Turgay_Celik}, environmental analysis \cite{Bruzzone_2000_Automatic}, disaster monitoring \cite{Kahraman16}, etc. Among these applications, change detection is one of the most important techniques to monitor the changed surfaces on the Earth. In most cases, researches are mainly interested in changes caused by human activities and natural disasters. However, such changes may be difficult to be detected due to some interfering factors. For instance, vegetation colors are different between summer and winter. These changes caused by seasonal variation may yield false alarms. Many change detection methods are affected by seasonal variation. As illustrated in Fig. 1, the change map generated by the PCAKM \cite{Turgay_Celik} contains many noisy regions. These regions are mainly vegetations whose appearances are different between winter and summer. Such variations are falsely detected as changes. Therefore, if a function can be learnt to map remote sensing images captured in summer to images captured in winter, the false alarms in change detection caused by seasonal variation can be alleviated effectively. \begin{figure} \centering \includegraphics[width=3.4in]{intro_figure.pdf} \caption{Illustration of the problem in change detection caused by season variation. The change map generated by PCAKM \cite{Turgay_Celik} is polluted with noisy regions. Specifically, the vegetation colors are different between summer and winter. The change detection method considers them as significant changes.} \end{figure} The image-to-image translation \cite{Isola_2017_CVPR} task aims to transform one representation of a scene into another. So image translation is natural to be adopted in a change detection framework to solve the aforementioned problem caused by seasonal variation. Many researchers have leveraged generative adversarial networks \cite{NIPS2014_Goodfellow} into image translation. Isola et al. \cite{Isola_2017_CVPR} used a conditional generative adversarial network (cGAN) for supervised pairwise image translation. Zhu et al. \cite{Zhu_2017_ICCV} proposed an unsupervised CycleGAN by imposing a cycle consistency loss, which is capable of learning the distinctive semantic difference between image sets from two domains and translating them correspondingly without direct pair-wise supervision. Several attempts have been made to translate remote sensing images between different domains. Enomoto et al. \cite{Enomoto18_igarss} proposed a GAN-based image translation method for environmental monitoring. Niu et al. \cite{Niu_pcm2018} proposed an image translation method between optical and SAR data based on conditional GAN for land cover classification. Saha et al. \cite{saha20_tgrs} employed the CycleGAN to learn the transcoding between SAR and optical images, where the CycleGAN provides useful semantic features for building change detection. The above-mentioned methods are designed for the image translation task between SAR and optical images. However, image translation focusing on seasonal variation is seldom explored. Although the tasks of SAR-to-optical translation and seasonal translation look similar, the latter is more challenging, since it focuses on transferring the seasonal features while maintaining other more important features. However, such seasonal features are difficult to be captured during the translation procedure. To tackle this issue, we consider the seasonal features of a remote sensing image as its style features, and introduce a style-based recalibration module to better capture the style features. Besides, a new style discriminator is designed to improve the translation performance during the training stage. In this letter, the main contributions of our work can be summarized in twofold. \begin{itemize} \item We present an image translation method for season-varying multitemporal remote sensing images, which can effectively improve the change detection performance. To the best of our knowledge, this is the first attempt to incorporate image translation in the season-varying image change detection task. \item To effectively capture the seasonal features, a style-based recalibration module and a new style discriminator are designed to improve the translation performance during the training phase. \item Extensive experiments on the season-varying dataset demonstrate the superiority of the proposed method over the state-of-the-art methods. As a byproduct, we released the codes and data to facilitate other researchers. \end{itemize} \section{Methodology} The architecture of the proposed method is shown in Fig. 2, where CycleGAN \cite{Zhu_2017_ICCV} is used as the backbone since it can be trained in an unsupervised way by utilizing two collections of unpaired data without labels. The model has two generators: $G_{XY}$ represents the mapping from domain $X$ (summer) to domain $Y$ (winter), while $G_{YX}$ denotes the mapping from domain $Y$ to domain $X$. Given the image collections $\left\{ x_i \right\}_{i=1}^{N_s}$ where $x_i \in X$ and $\left\{ y_j \right\}_{j=1}^{N_w}$ where $y_j \in Y$. $N_s$ denotes the number of images in the summer domain, and $N_w$ denotes the number of images in the winter domain. The discriminator $D_X$ is trained to distinguish between images $\left\{ x \right\}$ from real domain $X$ and translated images $\left\{ G_{YX}(y) \right\}$. The discriminator $D_Y$ is trained to distinguish between images $\{y\}$ from real domain $Y$ and translated images $\left\{ G_{XY}(x) \right\}$. \begin{figure}[] \centering \includegraphics[width=3.2in]{network.pdf} \caption{The framework of our proposed network. Domain $X$ represents images captured in summer while domain $Y$ represents images captured in winter.} \end{figure} \begin{figure*}[!htb] \centering \includegraphics[width=4.5in]{gdsrm.pdf} \caption{The architecture of the basic components from our image-to-image translation network. (a) represents the Generator, which takes an image as the input and outputs the translated image. (b) represents the new Style Discriminator, which is designed to figure out whether the input is a real image or a translated one. It outputs a scalar of $[0,1]$ as the decision as well as a style vector which encode the style of the input to compute the style loss between real and translated images. (c) illustrates the SRMConvBlock utilized in both Generator and Style Discriminator.} \end{figure*} \subsection{The Generator with Style-Based Recalibration Module} As shown in Fig. 3(a), the generator follows an Encoder-Transformation-Decoder structure. The encoder contains three convolutional layers to encode the image to the feature space, while the decoder utilizes two fractionally-strided convolutions and one convolutional layer to reconstruct the image from the feature space. The essential transformation module is comprised of 9 residual blocks which manipulate the feature maps to conduct the translation process. In order to represent style features effectively in feature space, we introduce the style-based recalibration module (SRM)\cite{Lee_iccv2019} into the residual block. The SRM is comprised of two parts: \emph{style pooling} and \emph{style~integration}. The style pooling operator extracts style features from each channel by summarizing feature responses across spatial dimensions. It is followed by the style integration operator, which produces example-specific style weights by utilizing style features via channel-wise operation. Finally, the style weights recalibrate the feature maps to either emphasize or suppress their information. Note that SRMConvBlock represents the residual block which integrates SRM. Details can be found in Fig. 3 (c). In \emph{style pooling}, the average mean and standard deviation of the feature map are selected as style features. Denote the input feature map as $F \in \mathbb{R}^{C \times H \times W}$, where $C$ is the total number of channels, and $H$, $W$ denote spatial dimensions. The style feature $T\in \mathbb{R}^{C \times 2}$ can be computed in each channel by: \begin{eqnarray} \mu_{c} = \frac{1}{HW} \sum\limits_{i=1}^{H}, \sum\limits_{j=1}^{W} f_{cij} \end{eqnarray} \begin{eqnarray} \sigma_{c} = \sqrt{ \frac{1}{HW} \sum\limits_{i=1}^{H} \sum\limits_{j=1}^{W} (f_{cij} - \mu_{c})^2 }, \end{eqnarray} \begin{eqnarray} t_{c} = [\mu_{c}~,~\sigma_{c}], \end{eqnarray} where the style vector $t_c$ serves as a summary descriptor of the style information for $c^{th}$ channel. To be specific, $\mu_{c}$ and $\sigma_{c}$ are concatenated to form $t_{c}$. In \emph{style integration}, the style features are converted into channel-wise style weights. Ref. \cite{Lee_iccv2019} applied a learnable channel-wise fully connected layer to achieve style integration. However, it is found that the fully connected layer has high computational burden. Therefore, in our implementation, a 1-d convolutional layer with fewer parameters but a competitive capability is used to integrate the style. Given $T \in \mathbb{R}^{C \times 2}$ from style pooling as the input, the style integration weight $G \in \mathbb{R}^{C \times 1}$ performs as the following in each channel: \begin{equation} g_{c} = \sigma (w * t_{c}), \end{equation} where $g_c$ denotes the weight for $c^{th}$ channel, $\sigma(\cdot)$ denotes the sigmoid function, $w$ denotes the convolution kernel, and * denotes convolution. Finally, the input feature $F \in \mathbb{R}^{C \times H \times W}$ is recalibrated by the channel-wise style integration weights $G \in \mathbb{R}^{C \times 1}$ to produce the output $\hat{F}\in \mathbb{R}^{C\times H \times W}$ as: \begin{equation} \hat{F} = G \cdot F. \end{equation} Here, channel-wise multiplication is employed between the style integration weight $G$ and the input feature map $F$. \subsection{Style Discriminator} In order to perform better image translation, we propose a new style discriminator, which not only produces a decision for the fake or real sample, but also returns a style vector according to the channel-wise correlations. By constraining the L1 loss between two style vectors of the translated image and the real target domain image, the style discriminator can distinguish the style information better. The proposed style discriminator is illustrated in Fig. 3 (b). Given an input image, it is encoded to the feature space by adopting several convolutional layers and SRM layers. Then, the encoded feature $M$ is fed into two different modules. On the one hand, after convolution, $M$ is mapped into a set of overlapping image patches. Then, the decision results of each patch will be generated, and the results are averaged to a final scalar of [0, 1]. On the other hand, we consider the correlations of different channels as another kind of style representation for evaluating the style distance between translated images and target images. This correlation style representation can explore more style information across channels because in \emph{style pooling}, the style features are computed in every separate channel. First, $M \in \mathbb{R}^{C \times H \times W}$ is provided to max and average pooling layers. After each max pooling and average pooling, the aggregated feature maps are combined and fed into the next two pooling layers. Through four pooling and fusion operations, the feature map $M$ is transformed to $V \in \mathbb{R}^{C \times 1 \times 1}$. Since each channel from total number of $C$ is now represent by a single value, $V \in \mathbb{R}^{C \times 1 \times 1}$ is reshaped to $V \in \mathbb{R}^{1 \times C}$. Therefore, the correlation between different channels can be described as a matrix $V^{T}V \in \mathbb{R}^{C \times C}$ by element-wise multiplication between the transpose of $V$ and itself. Only keeping the upper triangular elements of $V^{T}V$ while setting the other elements as 0, a style vector $v$ with the length of $C \times C$ is generated after flattening the correlation matrix. Then the L1 loss can be applied to measure the distance between two style vectors that represent translated and target images. \subsection{Training Overflow} As mentioned before, our goal is to learn the mapping functions $G_{XY} : X \to Y$ and $G_{YX} : Y \to X$. The objective function contains three types of terms: 1) \emph{adversarial loss} $\mathcal{L}_\textrm{GAN}$ aims to match the distribution of translated images to the data distribution in the target domain; 2) \emph{style loss} $\mathcal{L}_{S}$ calculates the differences between the translated image and the target image with two style vectors which are generated by the style discriminator $D_X$ and $D_Y$; 3) \emph{cycle consistency loss} $\mathcal{L}_{cyc}$ aims to prevent the mappings $G_{XY}$ and $G_{YX}$ from contradicting each other. The overall objective function can be summarized as: \begin{eqnarray} \mathcal{L} &=& \mathcal{L}_\textrm{GAN}(G_{XY},D_Y,X,Y) + \mathcal{L}_{S}(G_{XY}(X),Y) \nonumber \\ &+& \mathcal{L}_\textrm{GAN}(G_{YX},D_X,Y,X) + \mathcal{L}_{S}(G_{YX}(Y),X) \nonumber \\ &+& \lambda\mathcal{L}_{cyc}(G_{XY},G_{YX}) \end{eqnarray} where $\lambda$ controls the relative importance of the cycle consistency loss, and $\lambda = 10$ in the following experiments. For both $\mathcal{L}_\textrm{GAN}$, the negative log-likelihood objective is replaced with a least-squares loss, which is more stable during training and can generate higher quality samples. Specifically, the generator $G_{XY}$ aims to minimize the following objective function: \begin{eqnarray} \mathcal{L}_{G_{XY}} &=& \mathcal{L}_\textrm{GAN} + \mathcal{L}_{cyc} + \mathcal{L}_{id}, ~~~~~~~~ ~~~~~~~ ~~~~~~ \end{eqnarray} \begin{eqnarray} \mathcal{L}_\textrm{GAN} &=& \mathbb{E}_{x\sim p_\textrm{data}(x)}[( D_{Y}(G_{XY}(x)) - 1)^2], ~~~~ \end{eqnarray} \begin{eqnarray} \mathcal{L}_{cyc} &=& \mathbb{E}_{x\sim p_\textrm{data}(x)}[\Vert G_{YX}(G_{XY}(x)) - x \Vert_1], \end{eqnarray} \begin{eqnarray} \mathcal{L}_{id} &=& \mathbb{E}_{y\sim p_\textrm{data}(y)}[\Vert G_{XY}(y) - y \Vert_1], ~~~~~ \end{eqnarray} where an additional loss $\mathcal{L}_{id}$ is used to regularize the generator to approximate an identity mapping when real samples of the target domain are provided as the input to the generator. The generator $G_{YX}$ operates in the same way. For the style discriminator $D_{Y}$, it aims to minimize: \begin{eqnarray} \mathcal{L}_{D_{Y}} = \mathcal{L}_\textrm{GAN} + \mathcal{L}_{S}, ~~~~~~~ ~~~~~~~~ ~~~~~~~~~ \end{eqnarray} \begin{eqnarray} \mathcal{L}_\textrm{GAN}=\mathbb{E}_{y\sim p_\textrm{data}(y)}[(D_{Y}(y) - 1)^2] ~~~~~~~~ ~~~ \nonumber \\ + \mathbb{E}_{x\sim p_\textrm{data}(x)}[(D_{Y}(G_{XY}(x)))^2], \end{eqnarray} \begin{eqnarray} \mathcal{L}_{S}=\mathbb{E}_{x\sim p_\textrm{data}(x),y\sim p_\textrm{data}(y)}[\Vert (D_{Y}(G_{XY}(x)) - D_{Y}(y) \Vert_1], \end{eqnarray} where $\mathcal{L}_\textrm{GAN}$ minimizes the output decision whereas $\mathcal{L}_{S}$ regularizes the style vectors. The style discriminator $D_{X}$ is trained in the same manner. \section{Experimental Results and Discussions} \subsection{Datasets and Training Details} Two sets of high resolution remote sensing images are collected for experiments from Google Earth. They are acquired at the same area from three cities in China, including Beijing, Tianjin, and Qingdao. Images in summer are captured in December 2016, and images in winter are captured in June 2019. All images are randomly cropped into 256$\times$256 pixels. We generate 869 images as the training set, and 217 images as the testing set. The proposed method is trained from scratch with a learning rate of 0.0002. We keep the same learning rate for the first 100 epochs and linearly decay the rate to zero over the next 100 epochs. \subsection{Image-to-Image Translation Evaluation} In order to evaluate our translation model, we employ three criteria: Inception Score (IS) \cite{Salimans_IS}, Fr\'echet Inception Distance (FID) \cite{Martin_FID}, and Kernel Inception Distance (KID) \cite{Bi2018Demystifying}. IS measures the quality and diversity of the translated images. FID compares features of real and generated images that extracted by a layer from a pre-trained Inception Network. KID computes the squared maximum mean discrepancy between the Inception feature representations of real target domain images and translated images. \begin{table}[htpb] \centering \renewcommand{\arraystretch}{1.2} \caption{Quantitative Evaluation on Translation} \begin{tabular}{c|ccc} \toprule \multirow{2}{*}{Method} & \multicolumn{3}{c}{Winter to summer} \\ \cline{2-4} & ~~ IS $\uparrow$ ~~ & ~~ FID $\downarrow$ ~~ & ~~ KID $\downarrow$ ~~ \\ \midrule MUNIT\cite{Huang2018MUNIT} & 3.61 & 210.09 & 7.72 \\ U-GAT-IT\cite{Kim2020Ugatit} & 3.81 & 146.58 & 2.51 \\ CycleGAN\cite{Zhu_2017_ICCV} & 3.71 & 130.76 & 2.41 \\ SECycleGAN\cite{Wang2021pixel} & 3.77 & 125.08 & 1.49 \\ Ours & 3.72 & 119.75 & 1.20 \\ \bottomrule \multirow{2}{*}{Method} & \multicolumn {3}{c}{Summer to winter} \\ \cline{2-4} & IS $\uparrow$ & FID $\downarrow$ & KID $\downarrow$ \\ \midrule MUNIT\cite{Huang2018MUNIT} & 3.38 & 216.41 & 8.48 \\ U-GAT-IT\cite{Kim2020Ugatit} & 3.88 & 183.26 & 5.12 \\ CycleGAN\cite{Zhu_2017_ICCV} & 3.99 & 129.02 & 1.04 \\ SECycleGAN\cite{Wang2021pixel} & 3.90 & 125.89 & 0.89 \\ Ours & 4.18 & 124.19 & 0.82 \\ \bottomrule \end{tabular} \label{table_1} \end{table} Four state-of-the-art unsupervised image-to-image translation methods including MUNIT \cite{Huang2018MUNIT}, U-GAT-IT \cite{Kim2020Ugatit}, CycleGAN \cite{Zhu_2017_ICCV}, and SECycleGAN \cite{Wang2021pixel} are selected as the baselines to evaluate the proposed method. The quantitative results are presented in Table \ref{table_1}. It shows that our proposed image-to-image translation model achieves the lowest FID and KID scores, and it is quite competitive on IS score with the CycleGAN, SECycleGAN and U-GAT-IT. These quantitative evaluation results indicate that our image translation model has learnt both mapping functions $G_{XY} : X \to Y$ and $G_{YX} : Y \to X$ well after training. Besides quantitative evaluation, we also conduct two computational efficiency analysis on our proposed method, and the results are illustrated in Table \ref{table_2} and Table \ref{table_3}. First, Table \ref{table_2} presents the translation time of the proposed method tested on images of 256$\times$256 and 512$\times$512 pixels. It demonstrates that our method is capable of performing fast image translation. Second, Table \ref{table_3} shows the amount of parameters and GFLOPs of our image translation model compared with others. It demonstrates that the introduced style-based recalibration module and the new style discriminator can improve the translation performance only with less computational burden added. \begin{table} \centering \renewcommand{\arraystretch}{1.2} \caption{Computational Efficiency Analysis I} \begin{tabular}{c|cc} \toprule \multirow{2}{*}{Mappings} & \multicolumn{2}{c}{Translation time per image (s)} \\ & ~~ 256$\times$256 ~~ & ~~ 512$\times$512 ~~ \\ \midrule Translation (Winter to Summer) & 0.039 & 0.188 \\ Translation (Summer to Winter) & 0.040 & 0.185 \\ \bottomrule \end{tabular} \label{table_2} \end{table} \begin{table} \centering \renewcommand{\arraystretch}{1.2} \caption{Computational Efficiency Analysis II} \begin{tabular}{c|c c} \toprule Method & ~~~ Params ~~~ & ~~~ GFLOPs ~~~ \\ \midrule MUNIT\cite{Huang2018MUNIT} & 15.026 M & 77.320 \\ U-GAT-IT\cite{Kim2020Ugatit} & 10.587 M & 52.506 \\ CycleGAN\cite{Zhu_2017_ICCV} & 11.378 M & 56.832 \\ SECycleGAN\cite{Wang2021pixel} & 11.378 M & 56.832 \\ Ours & 12.634 M & 56.843 \\ \bottomrule \end{tabular} \label{table_3} \end{table} \subsection{Performance Analysis for Season-Varying Image Change Detection} We now consider the use of the proposed method to assist in season-varying image change detection. In our approach, we first apply the method to translate multitemporal images to the same domain. Then, two well-known algorithms, PCAKM\cite{Turgay_Celik} and GETNET\cite{Wang2019getnet}, are used to obtain the change detection results. To verify the change detection performance, false alarms (FA), missed alarms (MA), overall errors (OE), and percentage correct classification (PCC) are adopted as the evaluation criteria. One typical region are selected for discussion to verify the effectiveness of the proposed image translation method. \begin{figure} \centering \includegraphics[width=3.2in]{CD_region.pdf} \caption{Visualized change detection results of the selected region.} \label{fig_change_2} \end{figure} \begin{table} \centering \renewcommand{\arraystretch}{1.2} \caption{Change Detection Results of the selected region} \begin{tabular}{c|cccc} \toprule Methods & FA & MA & OE & PCC(\%) \\ \midrule PCAKM & 21518 & 131 & 21649 & 66.96\\ GETNET & 17663 & 144 & 17807 & 72.83\\ (Winter to Summer) + PCAKM & 390 & 146 & 536 & 99.18\\ (Summer to Winter) + PCAKM & 2682 & 26 & 2708 & 95.87\\ (Winter to Summer) + GETNET & 149 & 119 & 268 & 99.59\\ (Summer to Winter) + GETNET & 1903 & 53 & 1956 & 97.01\\ \bottomrule \end{tabular} \label{table_change_2} \end{table} As can be observed from Fig. \ref{fig_change_2}, new structures are built in this region. At first, we generate change maps directly by using PCAKM \cite{Turgay_Celik} and GETNET \cite{Wang2019getnet}. We can see that if PCAKM or GETNET is directly employed to generate the change map, many false alarms are generated since the vegetation colors are different between summer and winter. Then, Fig. \ref{fig_change_2} also demonstrates that the results generated through image translation are less noisy than the original methods. It is evident that the false alarms are greatly reduced, which means that the proposed image translation method improves the change detection performance to some extent. The corresponding quantitative results are illustrated in Table \ref{table_change_2}. By employing the seasonal translation, the PCC values are improved significantly. Moreover, the change maps generated by winter-to-summer translation achieve 99.18\% and 99.59\% for both methods, rather close to the ground truth. All these compared quantitative results reveal that the proposed scheme can produce much better change detection results generally, not only on one change detection algorithm. \section{Conclusion} In this letter, we present a remote sensing image translation method, which can capture seasonal features to improve the detection performance on real changes of interest. A style-based recalibration module and a new style discriminator are designed to improve the translation during the training phase. The encouraging experimental results verify the effectiveness of the proposed method and indicate the necessity of integrating the proposed translation scheme in the season-varying image change detection task. Although our method achieves good results in change detection, we believe that there is still room for improvement, such as integrating the image translation and change detection operators into an end-to-end network.
\section{Introduction} \subsection{Background} Geyser eruption is one of the signature attractions at the Yellowstone National Park, which is home to two-thirds of the worlds' geysers. Tourists around the world crave to witness this fascinating natural phenomenon. Many researchers are interested in studying geyser eruptions and the underlying mechanisms. \citet{Fournier1969} built a physical model to describe the time interval between eruptions for the Old Faithful geyser, which is one of the most famous geysers in the Yellowstone National Park. \citet{Rinehart1972} showed that the Old Faithful Geyser activities are affected by earth tidal forces, barometric pressure, and tectonic stresses. However, geyser eruptions have not been studied by statistical methods. This paper develops a statistical model for analyzing geyser eruption data from a bivariate geyser system. This work will benefit the geyser study community for understanding and effectively modeling geyser eruption activities. Typical geyser eruption is a repeating process and hence can be modeled with a recurrent process for events repeatedly occurring over time. Recurrent processes have had broad applications in diverse areas. For example, they have been widely used for studying vehicle failures in warranty studies \citep{Lawless1995}, relapse biomarkers in cancer research \citep{Schaubel2004}, and sports injury analysis \citep{Ullah2014}. Typically the time interval between two consecutive events, which is also referred to as the gap time, is studied to model the event frequency in a recurrent process. The proportional intensity models (\citealp{Cox1972}, and \citealp{AndersenGill1982}) are popular for modeling event occurrences of a single type of event. In more sophisticated studies, there are multiple types of recurrent events observed in a single system. The occurrence of any type of event will result in a system event. In addition, in a multi-type recurrent event process, the gap time for different event types could be correlated. For example, the occurrence of one type of event could cause other types of events to occur more frequently. In this case, a multivariate recurrent process should be considered to model the interdependence of multiple event types in the same system. In many event analyses, covariates are found to be useful for modeling the event occurrence time and frequency. Many recurrent processes are affected by process conditions. For example, some mechanical failures could occur at a higher frequency under a higher temperature, humidity, or pressure. Incorporating covariates into the recurrent process models could improve the model performance and provide a more precise estimation of the event time and frequency. Models of this type are referred to as the covariate-adjusted recurrent event process models. In this paper, we focus on modeling and analysis of geyser eruptions for a two geyser system in the Yellowstone National Park. In a multi-type recurrent event system, the system events can result from either type of events, and hence any consecutive events could be associated with the same or different event types. In order to describe this bivariate recurrent event process, we need to not only understand the marginal behavior of each type of event, but also understand the interdependence between the two types of events. We consider a bivariate distribution for the gap times between successive events for a bivariate event system. To improve the estimation, we leverage the covariate information on the eruption duration and develop a covariate-adjusted bivariate recurrent event process model for estimating the eruption gap time of a two geyser system formed by West Triplet Geyser and Grotto Geyser in the Yellowstone National Park. \subsection{Related Literature} Recurrent event processes are extensively studied in the areas of reliability, public health, and medical studies. The nonparametric estimation of gap time distribution based on multivariate failure time data was introduced in \citet{Schaubel2004}. \citet{Dauxois2009} considered the risks of two nosocomial infections for patients admitted to hospitals. \citet{Bouaziz2013} provided a nonparametric method to estimate the intensity function of a recurrent process. Other than hazard functions and intensity functions, survival status in time is often of interest as well. \citet{Huang2007} investigated the disease free survival rate in a recurrent heart failure study. \citet{Zeng2009} and \citet{Garre2008} focused on studying the terminal events in recurrent systems. \citet{meyer2015bayesian} presented Bayesian analysis of recurrent event using copulas. An earlier review regarding recurrent events can be found in \citet{Lawless1995} and a review on modeling of repairable systems can be found in \citet{Lindqvist2006}. Classical books on recurrent event data analysis include \citet{vere2003introduction}, \citet{CookLawless2007}, and \citet{DuchateauJanssen2008}. In medical research, \citet{Liu2009} presented repeated measurements of biomarker to determine the HIV survival status in a recurrent event system. \citet{Sun2006} applied covariate-adjusted additive hazard model for the data, which is involving recurrent gap times. \citet{PrasadRao2002} used a proportional hazard function with covariate adjustment in a repairable system. In another application of recurrent event data, \citet{Huzurbazar2010} incorporated covariates in a flowgraph model. \citet{YangZhangHong2013} introduced multivariate lognormal assumption on event gap times of different event types. \citet{YangHongZhangLi2017} considered a parametric model for the multi-type event recurrent event data without covariates and developed copula function on gap times for the recurrent process in a car body manufacturing process. Existing research does not consider correlated renewal process with covariate adjustments. Motivated by the geyser data, we propose the CARP model to study the eruption gap time for a two-geyser system. Application-wise, geyser eruption is rarely studied by statistical models. For the geyser eruption study, the modeling and analysis presented in this paper are new to geyser research. \subsection{Overview} The rest of this paper is organized as follows. Section \ref{sec: geyser data} provides more details on the geyser eruption data from the Yellowstone National Park. Section \ref{sec:data.and.model} discusses the model formulation for the multi-type recurrent event system. Section \ref{sec:par.est} describes the maximum likelihood approach for estimating the model parameters. A simulation study is described in Section~\ref{sec:simulation} to evaluate the proposed method with model comparisons made under different parameter settings. The modeling and analysis of the Yellowstone geyser data are detailed in Section~\ref{sec:application}. Section~\ref{sec:conclusion} contains some concluding remarks. \section{Geyser Data}\label{sec: geyser data} We use the publicly available Yellowstone geyser eruption data, which were collected in 2008 by the Geyser Observation and Study Association (GOSA). By using underground sensors, water levels were measured continuously, and occurrences of geyser eruptions were detected automatically. For each geyser, the GOSA data include the starting time and duration of each eruption. We choose to analyze the data from the West Triplet Geyser and the Grotto Geyser during the study period between June 2008 and November 2008. This particular dataset and study period were chosen to ensure that completely uninterrupted recurrent event data are available over a relatively long time span to allow for the dependence modeling for the two geysers. We merge their eruption records in a temporal order as illustrated in Table~\ref{table:data.example}. The data include the date and time when an eruption occurred, the eruption duration, and which geyser had the eruption. During the study period, the West Triplet Geyser erupted more frequently than the Grotto Geyser. Also, the eruptions of the West Triplet Geyser also lasted longer than those of the Grotto Geyser on average. More specifically, the average eruption gap time for the West Triplet Geyser is 6.8 hours with a standard deviation of 2.8 hours, while the Grotto Geyser had an average eruption gap time of 9.3 hours with a standard deviation of 8.6 hours. For the eruption duration, the Grotto Geyser eruptions lasted generally longer than the West Triplet Geyser, with the average duration of the Grotto Geyser eruptions being 3.5 hours with a standard deviation of 5.2 hours and the eruption duration of the West Triplet Geyser averaged at 0.7 hours with a 0.5 hours standard deviation. Figures~\ref{Fig:time.to.eruption} and~\ref{Fig:duration} display the side-by-side boxplots of the time between eruptions and the duration of eruptions, respectively, for the West Triplet and Grotto geysers. We can see compared with the West Triplet Geyser, the Grotto Geyser has a much larger variation of the eruption gap time with a number of extremely long gaps between eruptions and also more variation in the eruption frequency. On the other hand, the West Triplet Geyser has considerably shorter and less variable eruption durations than the Grotto Geyser. In addition, Figure~\ref{Fig:gap_vs_duration} shows the plots of the time between eruptions versus the duration time of the previous eruption for both geysers. We can observe a moderate correlation between these two variables for the West Triplet Geyser and a strong correlation for the Grotto geyser. Hence, we decided to utilize the duration of the previous eruption for both geysers to help model the eruption gap time. Figure \ref{fig:Geyser_plot} illustrates the data obtained for the two-geyser system. In this figure, $W_{kj}$ denotes the gap time of the $k$th eruption (i.e., the time interval between the $(k-1)$th and $k$th eruptions) for geyser $j$ where $j=1$ for the West Triplet Geyser and $j=2$ for the Grotto Geyser. The covariate $x_{i}$ denotes the eruption duration for the $i$th eruption in the bivariate geyser system, where $i=1,\cdots,n$, $n=n_1+n_2$ is the total number of eruptions for both geysers, and $n_j$ denotes the number of eruptions for the $j$th geyser. In particular, $n_1=580$, $n_2=421$, and $n=1001$ for the dataset we analyzed. Note here the time between eruptions are labeled separately for each individual geyser. To model the bivariate geyser system, we will introduce new notation for jointly describing the event time, event type and covariate information in Section~\ref{sec:data.and.model}. \begin{table} \caption{Sample observations from the West Triplet and Grotto Geysers.}\label{table:data.example} \begin{center} \begin{tabular}{ c | c| c } \hline \hline Eruption time & Duration (hours) & Geyser\\ \hline 2008-06-20 16:58:00 & 0.93 & Grotto \\ \hline 2008-06-20 20:46:00 & 0.75 & West Triplet \\ \hline 2008-06-20 21:31:00 & 2.05 & Grotto \\ \hline 2008-06-21 02:51:00 & 1.08 & West Triplet \\ \hline 2008-06-21 04:48:00 & 2.63 & Grotto\\ \hline 2008-06-21 11:15:00 & 1.72 & Grotto\\ \hline 2008-06-21 13:02:00 & 0.48 & West Triplet\\ \hline 2008-06-21 17:56:00 & 3.58 & Grotto\\ \hline 2008-06-21 18:20:00 & 0.73 & West Triplet\\ \hline 2008-06-22 00:11:00 & 0.93 & Grotto\\ \hline \hline \end{tabular} \end{center} \end{table} \begin{figure} \centering \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=\textwidth]{plot4.eps} \caption{Time to eruption (Hour)} \label{Fig:time.to.eruption} \end{subfigure}% ~ \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=\textwidth]{plot5.eps} \caption{Eruption duration (Hour)} \label{Fig:duration} \end{subfigure} \caption{Boxplots for the time to eruption and the eruption duration for the West Triplet Geyser and Grotto Geyser from June to November in 2008. Note that the $y-$axis is on log scale.} \end{figure} \begin{figure} \centering \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=\textwidth]{WT_duration_age.eps} \caption{The West Triplet Geyser} \end{subfigure}% ~ \begin{subfigure}{0.48\textwidth} \centering \includegraphics[width=\textwidth]{Grotto_duration_age.eps} \caption{The Grotto Geyser} \end{subfigure} \caption{The plot of the time between eruptions versus the eruption duration for (a) the West Triplet Geyser and (b) the Grotto Geyser from June to November in 2008. Note that both the $x-$axis and the $y-$axis are on log scale.}\label{Fig:gap_vs_duration} \end{figure} \begin{figure} \centering \includegraphics[width=0.8\textwidth]{geyser_plot.eps} \caption{Illustration of geyser eruptions with West Triplet and Grotto Geysers. } \label{fig:Geyser_plot} \end{figure} \section{Data Setup and Model}\label{sec:data.and.model} \subsection{Data Setup} \label{subsection:proposed.model} Suppose that in a bivariate recurrent process with $n$ total events, the systematic event time is described by the variable $T_i$ for $i=1,\cdots,n$. We use $T_{0}$ to denote the starting time or the system installation time, and $T_n$ denotes the last event time in the system. In a bivariate system, there are two types of events, and hence we use an indicator variable $\Delta_{i} \in \{ 1,2\}$ to represent the type of event. For an event that occurs at time $t_i$, the covariate vector on the event duration is denoted by $\boldsymbol{X}_{i}$, which is a vector of the previous duration for both types of events. Therefore, each event can be represented by $\{T_{i}, \Delta_{i}, \boldsymbol{X}_{i}\}$, where $i = 1, \cdots, n$. We use $\{t_{i}, \delta_{i}, \boldsymbol{x}_{i}\}$ to denote the observations of the $i$th event which occurs at time $t_{i}$ and it is from event type $\delta_{i}$ with covariates measured as $\boldsymbol{x}_{i}$. Note in an observed recurrent process with $n$ total events, the last event is observed at time $t_{n}$, where $t_{n}\leq \kappa$ with $\kappa$ being the pre-defined study termination time. This sequence of bivariate events can be expressed as a counting process $\{N(t):t\ge 0\}$, where $N(t)$ denotes the cumulative number of events at time $t$ regardless of the event type. Similarly, we define the counting process for each individual event type $j$ as $\{N_{j}(t): t\ge 0\}$, where $j = 1$ or $2$. In addition, we denote the event history of the system up to a time point $s \leq \kappa$ by $\mathcal{H}_{s} = \{N(t): t \le s\}.$ Similarly, the covariate history can be expressed as $\mathcal{X}_{s} = \{\boldsymbol{x}_{t}: t \le s\}.$ For further discussion, we use $\mathcal{F}_{s} = \{ \mathcal{H}_{s}, \mathcal{X}_{s} \}$ to denote the history including both event and covariate information. For a bivariate recurrent process system, event time variable $T_i$ defined above satisfies $$0=T_{0}<T_{1}<\cdots<T_{i}<\cdots<T_n\leq\kappa.$$ Similarly, for events of type $j$, the event time variables are defined as $T_{lj}$, where $l = 1, \dots, n_{j}$ and $n_{j}$ is the number of events from type $j$. In a bivariate recurrent system, we have the relation $n_{1} + n_{2} = n$. The time variable $T_{lj}$ is also presented in temporal order. For the events of type $j$, $ j = 1$ or $2$, we have $$0=T_{0j}<T_{1j}<\cdots<T_{lj}<\cdots<T_{n_{j}, j}\leq\kappa.$$ Based on the ordered event times, the event gap time for the $j$th type as the interval between two consecutive events can be calculated as $W_{lj}=T_{l+1, j}-T_{lj}$, where $l=0, 1, \dots, n_{j}-1$. Now consider the joint bivariate recurrent system. For the $i$th event in the system, the two-dimensional event gap time variable is defined as $${\boldsymbol{W}}_i=(W_{l_{i1}, 1}, W_{l_{i2}, 2})',$$ where $l_{ij}=N_j(t_i)$ is the cumulative number of events for $j$th event type by time $t_{i}$. For example, at the system installation time where $t = 0$, the event gap time vector is ${\boldsymbol{W}}_{0} =(W_{01}, W_{02})'$. If the first event occurs at time $t_{1}$ and is from event type 1, then the event gap time vector is denoted as ${\boldsymbol{W}}_{1} =(W_{11}, W_{02})'$. In this case, $l_{11}=1$ since one event of type~1 has occurred as of time $t_1$, while $l_{12}=0$ as no event of type~2 has occurred by that time point. To link the event gap time ${\boldsymbol{W}}_i$ with the system event time $T_i$, we introduce an age variable at time $t$ which is defined as the time between the time point $t$ and the time of the latest event of each event type. In a bivariate recurrent process, the age variable is a vector of two components denoted as $${\boldsymbol{A}}_{i}=[A_{1}(T_i), A_{2}(T_i)]',$$ where $A_{j}(t)= t -T_{N_j(t),\,j}$ for $j = 1$ and $2$. For an observed event at time $t_i$, the observed age vector is denoted as ${\boldsymbol{a}}_{i}=[a_{1}(t_{i}), a_{2}(t_{i})]'$, where $a_{j}(t)=t-t_{N_j(t),\,j}$. For example, at the system installation time at $t = 0$, the age vector is ${\boldsymbol{a}}_{0}=(0,0)'$. If the first event occurs from type 1 at time $t_1$, then ${\boldsymbol{a}}_{1}=(0, t_1)'$. The age variable then connects between the system event time and the event gap time ${\boldsymbol{W}}_{i}$ through the relation ${\boldsymbol{W}}_i \geq {\boldsymbol{A}}_i$. Here, the vector comparison is defined to be an element-wise comparison. In other words, ${\boldsymbol{W}}_i \geq {\boldsymbol{A}}_i$ suggests $W_{l_{ij}, j}\geq A_j(T_i)$ for both $j=1$ and $2$. \subsection{Model} In this section, we introduce the proposed covariate-adjusted recurrent process (CARP). After an event occurred at time $t_i$ (or after the system installation at time $t_0=0$), the distribution of the event gap time is given by \begin{align}\label{eqn:cond.prp} {\boldsymbol{W}}_i|\mathcal{F}_{t_i}\sim F_{{\boldsymbol{W}}}({\boldsymbol{v}}|{\boldsymbol{a}}_i, \boldsymbol{x}_{i}), \quad i=0, 1,2,\cdots, n. \end{align} Here, ${\boldsymbol{W}}=(W_1, W_2)'$, ${\boldsymbol{v}}=(v_1, v_2)'$, and \begin{align}\label{eqn:prp.renewal} F_{{\boldsymbol{W}}}({\boldsymbol{v}}|{\boldsymbol{a}}_i, \boldsymbol{x}_i)={\rm Pr}({\boldsymbol{W}}_i\leq{\boldsymbol{v}}|{\boldsymbol{W}}_i\geq{\boldsymbol{a}}_i, \boldsymbol{x}_i) \end{align} is the joint cumulative distribution function (cdf) of the event gap time conditioned on the age and covariates. At any event time, the information we have about the event type that has not yet occurred is captured through its age and the conditional probability that is conditioned on the event eruption time is greater than or equal to the age since the last eruption. At each event time, the age is set to be zero for the occurred event type. The event gap time variable ${\boldsymbol{W}}_{i}$ is adjusted by covariates $\boldsymbol{x}_i$ which is further discussed in Section \ref{sec:Net_dependence} in more detail. \subsection{Dependence Modeling and Covariate Adjustment} \label{sec:Net_dependence} Dependence between events from different types in a bivariate system is modeled by implementing distributional assumptions on variable ${\boldsymbol{W}}_i = (W_{i1}, W_{i2})'$. In this paper, we use a bivariate lognormal distribution and a copula function to model the random vector ${\boldsymbol{W}}_{i}$, where in both models, covariates $\boldsymbol{x}_i$ are used for adjustment. We refer to the CARP models under these assumptions as the CARP-MLN and CARP-copula models, respectively. Here MLN is short for multivariate lognormal. \subsubsection*{The CARP-MLN Model} For the multivariate lognormal distribution, $${\boldsymbol{W}}_i\sim \textrm{MLN}[\boldsymbol{\mu}(\boldsymbol{x}_i), {\boldsymbol{\Sigma}}],$$ where the location parameter in the bivariate lognormal distribution is expressed as a linear form of covariates $\boldsymbol{x}_{i}$. That is, \begin{align}\label{eqn:linear_tran} \boldsymbol{\mu}(\boldsymbol{x}_{i}) = \boldsymbol{\mu}_{0} + {\mathbf{B}} \boldsymbol{x}_{i}\,. \end{align} In the linear expression above, $\boldsymbol{\mu}_{0}$ is a vector of baseline location parameters and ${\mathbf{B}}$ is a 2 $\times$ 2 coefficient matrix. In the bivariate lognormal assumption, we use a covariance matrix ${\boldsymbol{\Sigma}}$ to capture the event dependence between events from two event types. Specifically, the diagonal elements in ${\boldsymbol{\Sigma}}$ represent marginal variances while the off diagonal elements stand for the covariances. When using the bivariate lognormal distribution, the covariance matrix is defined as ${\boldsymbol{\Sigma}} = {\mathbf{C}} {\mathbf{C}}'$ to ensure ${\boldsymbol{\Sigma}}$ to be positive definite, where \begin{align}\label{eqn:C_matrix} {\mathbf{C}} = \left(\begin{array}{cc} \sigma_{1} & 0 \\ \eta & \sigma_{2} \end{array}\right). \end{align} The correlation $\rho$ is determined by $\sigma_2$ and $\eta$ as $$\rho =\frac{ \eta} {\sqrt{\sigma^2_2 + \eta^2} }.$$ Note the above covariance matrix offers great flexibility to model different correlation relationships of varied size and direction. The sign of the $\eta$ value determines if the two types of events have a positive or negative correlation. In a bivariate lognormal distribution, the marginal distribution of each dimension also follows a lognormal distribution. Therefore, when the observed marginal distributions do not seem to follow the lognormal distributions, or their dependency cannot be characterized by the covariance matrix ${\boldsymbol{\Sigma}}$, the assumed bivariate lognormal distribution is not appropriate. In this case, the alternative strategy is to define $W_{1}$ and $W_{2}$ by separate distributions and combine them through a more flexible copula function. This is referred to as the CARP-copula model, which will be introduced in the next section. \subsubsection*{The CARP-copula Model} Let $F_{1}$ and $F_{2}$ denote the marginal cdfs of $W_1$ and $W_2$. There always exists a copula function $C$ such that the joint cdf of the two dimensional variable $(W_{1}, W_{2})'$ can be written as \begin{align}\label{eqn:sklar} F(v_{1}, v_{2}) = C[F_{1}(v_{1}), F_{2}(v_{2})], \end{align} where for any unitary uniform variable $U_{j}, j = 1, 2$, the bivariate copula is defined as $$ C(u_{1}, u_{2}) = {\rm Pr}(U_{1} \le u_{1}, U_{2} \le u_{2}). $$ This is also known as the Sklar's Theorem. By using a copula function, we have the flexibility to choose marginal distributions separately for each event type. For instance, a Gamma distribution and a Weibull distribution can be used as marginal distributions for the two types of events, respectively. With selected $F_{1}$ and $F_{2}$, one can combine the marginal distributions by using different copula functions. Note the copula approach allows us to model the marginal distributions separately and then combine them through an appropriate copula function for modeling the dependence structure. For the geyser system, we choose to use parametric distributions for modeling the marginal distributions. However, the method can be easily generalized to using nonparametric methods for modeling the marginal distributions and hence offers great flexibility to be adapted for broad applications. In the literature, a variety of copula functions has been introduced to capture different dependence patterns among the marginal distributions. A Gaussian copula uses a multivariate normal distribution of transformed marginal distributions based on the inverse cdf of the standard normal distribution. The Archimedean copulas are an associative class of copula functions that model the multivariate dependence through a single parameter. The power variance function copulas including Clayton, Gumbel and Inverse Gaussian are among the most popular ones that are flexible for modeling various dependence structures (e.g., \citealp{romeo2018bayesian}). In this paper, we use the Gumbel copula function which is popular for modeling stronger dependence in the positive tail. We refer to the CARP model with the use of Gumbel copula as CARP-copula model for the rest of the paper. In fact, the CARP-MLN model is a special case of the CARP-copula model, where in CARP-MLN, the Gaussian copula is applied and lognormal marginal distributions are selected. The CARP-MLN model characterizes the dependence among event types through the covariance matrix ${\boldsymbol{\Sigma}}$, while the CARP-copula model quantifies dependence using the copula parameter. Particularly, in the Gumbel copula model, the parameter is denoted as $\alpha$. As a result, in the CARP-MLN and CARP-copula models, we have different parameters to characterize event dependence. In order to compare dependence from different models, we introduce the Kendall's tau. In the CARP-copula model, the Kendall's tau is expressed as $\tau = 1 -1/\alpha,$ where $\alpha$ is the copula coefficient in the Gumbel copula. In the CARP-MLN model, the Kendall's tau is calculated as $ \tau = (2/\pi)\arcsin(\eta/\sqrt{\sigma_2^2+\eta^2}),$ where $\eta$ and $\sigma_2$ can be found in \eqref{eqn:C_matrix}. Similar to the CARP-MLN model, for the CARP-copula model, we also use a linear form of the covariates $\boldsymbol{x}_i$ to represent location parameters in marginal distributions as in \eqref{eqn:linear_tran}. In the CARP-MLN model, we use a two dimensional vector $\boldsymbol{\mu}(\boldsymbol{x}_i) = [\mu_{1}(\boldsymbol{x}_{i}), \mu_{2}(\boldsymbol{x}_{i})]'$ to represent the location parameter of the lognormal distribution. While in the CARP-copula, $\mu_{1}(\boldsymbol{x}_{i})$ and $\mu_{2}(\boldsymbol{x}_{i})$ stand for the location parameters for the first and second marginal distributions, respectively. \subsection{Properties of CARP}\label{subsection:properties.tprp} For event gap time variable ${\boldsymbol{W}}_i$, we define the survival function (sf), cdf and hazard function as follows. We denote the joint sf of ${\boldsymbol{W}}_i$ as, \begin{align}\label{eqn:bi.survival} S({\boldsymbol{v}})={\rm Pr}(W_{i1}>v_1, W_{i2}>v_2). \end{align} The joint cdf is $$F_{{\boldsymbol{W}}}({\boldsymbol{v}})={\rm Pr}(W_{i1}\leq v_1, W_{i2}\leq v_2),$$ and the corresponding joint probability density function (pdf) is denoted by $f_{{\boldsymbol{W}}}({\boldsymbol{v}})$. According to \eqref{eqn:prp.renewal}, the joint pdf of the event gap time variable given all historical events ${\boldsymbol{W}}_i|\mathcal{F}_{t_i}$ is given by \begin{align}\label{eqn:cond.density} f_{{\boldsymbol{W}}}({\boldsymbol{v}}|{\boldsymbol{a}}_i, \boldsymbol{x}_i)=&\frac{f_{{\boldsymbol{W}}}[a_1(c_1), a_2(c_2)]}{S({\boldsymbol{a}}_i)}, \quad v_j>a_j(t_i), \quad j=1, 2, \end{align} where $c_j=t_{l_{ij},j}+W_j, j=1,2$. The denominator in \eqref{eqn:cond.density} takes age condition into account, while the numerator builds the relationship among the event gap time $W_j$, the event time $t_{l_{ij},j}$ and the age $a_j(c_j)$. Covariates $\boldsymbol{x}_i$ are used to adjust the gap time ${\boldsymbol{W}}_i$ as discussed in Section \ref{sec:Net_dependence}. For further discussions, let $\mathcal{F}_{t^{-}}$ be the event history up to time $t$. Note that for event type $j$, $T_{N_j(t^{-}),j}$ gives the most recent event time by time $t$, and the age variable prior to time $t$ is denoted as $A_{j}^{-}(t)=t-T_{N_j(t^{-}),j}$, which calculates the cumulative running time upon time $t$ since the last event. We use ${\boldsymbol{a}}^{-}(t)=[a_{1}^{-}(t), a_{2}^{-}(t)]'$ to denote the age vector for the two event processes prior to time $t$. Hence, prior to an event time $t_i$, the age vector is denoted as ${\boldsymbol{a}}_i^{-}={\boldsymbol{a}}^{-}(t_i)$. For example, at the initial time 0, the vector is ${\boldsymbol{a}}_{0}^{-}=(0,0)'$. If the event type is $\delta_1=1$ at $t_1$, then ${\boldsymbol{a}}_{1}^{-}=(t_1, t_1)'$. Note that ${\boldsymbol{a}}_1$ updates the age to be zero for the corresponding event type at an event time, while ${\boldsymbol{a}}_1^{-}$ does not. This notation is used to derive the likelihood in Section \ref{sec:par.est}, is also used to define the hazard function below. In the literature, the sub-intensity function (i.e., cause-specific event intensity function) is often used to characterize an event process. In particular, the sub-intensity function for event type $j$ is defined as \begin{align}\label{eqn:sub.intensity.def} h_j(t)=\lim_{\Delta t\to0}\ffrac{{\rm Pr}[T\in (t, t+\Delta t), \Delta=\delta_{j}|\mathcal{F}_{t^{-}}]}{\Delta t}, \end{align} where $T$ is the event time, and $\Delta$ is the event type. The sub-cumulative intensity function is $H_j(t)=\int_{0}^th_j(s)ds$. The hazard function and cumulative hazard function for the system are calculated as the sum of corresponding functions for the two event types, $$h(t)=\sum_{j=1}^2h_j(t) \quad \textrm{and} \quad H(t)=\sum_{j=1}^2H_j(t).$$ The sub-intensity function in \eqref{eqn:sub.intensity.def} is calculated as \begin{align}\label{eqn:hkt} h_j(t)=\frac{D_j[{\boldsymbol{a}}^{-}(t)]}{S[{\boldsymbol{a}}^{-}(t)]},\quad \textrm{ where }\quad D_j(\widetilde{{\boldsymbol{v}}})=-\frac{\partial S({\boldsymbol{v}})}{\partial v_{j}}\bigg|_{{\boldsymbol{v}}=\widetilde{{\boldsymbol{v}}}}, \end{align} and $\widetilde{{\boldsymbol{v}}}=(\widetilde{v}_1, \widetilde{v}_2)'$ is a vector with two components. More detail about the calculation of $D_j(\widetilde{{\boldsymbol{v}}})$ under different models will be discussed in Section \ref{sec:par.est}. \section{Parameter Estimation}\label{sec:par.est} The maximum likelihood (ML) approach is used to estimate model parameters. Parameters in the model include parameters in the joint distribution function, the copula function and the linear covariate transformation function. Given all the event history $\mathcal{F}_{\tau}$, the likelihood function is constructed as follows: \begin{align}\label{eqn:likelihood} L({\boldsymbol{\theta}} |\mathcal{F}_{\tau})=\prod_{i=1}^{n}L_{i}({\boldsymbol{\theta}} | {\boldsymbol{a}}_i, \boldsymbol{x}_i), \end{align} where \begin{align}\label{eqn:Li} L_{i}({\boldsymbol{\theta}} | {\boldsymbol{a}}_i, \boldsymbol{x}_i)={\rm Pr}[T_{i}\in(t_{i}, t_{i}+\Delta t), \Delta_{i}=\delta_{i}|\mathcal{F}_{t_{i-1}}], \quad \textrm{for} \quad i=1,\cdots, n. \end{align} Let ${\boldsymbol{\theta}} $ denote the vector of all the parameters in the model. The estimated parameters $\widehat{\thetavec}$ are asymptotically normally distributed based on the large sample ML theory \citep{casella2002statistical}. The calculation of the likelihood $L_{i}$ for the proposed CARP models is shown below. For any observed recurrent process with $n$ total events, the likelihood contribution for $i=1,\cdots, n$ in \eqref{eqn:Li} is given by \begin{align}\label{eqn:Li2} L_{i}({\boldsymbol{\theta}} | {\boldsymbol{a}}_i, \boldsymbol{x}_i) =\frac{D_{\delta_i}({\boldsymbol{a}}_i^{-})}{S({\boldsymbol{a}}_{i-1})}. \end{align} In \eqref{eqn:Li2}, the quantity $D_{\delta_i}({\boldsymbol{a}}_i^{-})$, which is introduced in \eqref{eqn:hkt}, is the partial derivative of the bivariate sf $S({\boldsymbol{a}}_i^{-})$. The covariates $\boldsymbol{x}_i$ are used to adjust the distribution of ${\boldsymbol{W}}_i$. Likelihood calculations so far are the same for both the CARP-MLN and CARP-copula models. However, we need different ways to calculate $D_j({\boldsymbol{a}}_i^{-})$ for the two CARP models based on how the survival functions are calculated, which are detailed below. For the CARP-MLN model, the sf is calculated in a closed form as discussed in \eqref{eqn:bi.survival}, and the partial derivative with regard to the $j$th event type can be written as \begin{align}\label{eqn:partial.derivative} D_j({\boldsymbol{a}}_i^{-})=-\frac{\partial S(v_{j}, v_{j'})}{\partial v_{j}}\bigg|_{{\boldsymbol{v}}={\boldsymbol{a}}_i^{-}} = f_{j}[a^{-}_{j}(t_{i})] \times \Pr[W_{j'} \ge a^{-}_{j'}(t_{i}); j' \neq j | W_{j} = a^{-}_{j}(t_{i})], \end{align} where $f_{j}[a^{-}_{j}(t_{i})]$ is the $j$th marginal density function from a bivariate lognormal distribution. In \eqref{eqn:partial.derivative}, the conditional probability can be calculated from the conditional normal distribution with a logarithm transformation. Calculation details can be found in Appendix~\ref{Conditional Lognormal Probability}. For the CARP-copula model, the likelihood function is calculated based on the relationship between the bivariate sf $S({\boldsymbol{a}}_i^{-})$ and the cdf $F({\boldsymbol{a}}_i^{-})$. In bivariate cases, the sf and cdf have the following relationship: $$S[a_{1}(t_{i}), a_{2}(t_{i})] = 1 - F[a_{1}(t_{i}), \infty] - F[\infty, a_{2}(t_{i})] + F[a_{1}(t_{i}), a_{2}(t_{i})],$$ where the joint cdf can be calculated by the copula as in \eqref{eqn:sklar}. The calculated likelihood will vary for different choices of the marginal distribution and the copula function. In our case, we chose the Gumbel copula as described in Section~\ref{sec:Net_dependence}. The ML estimates $\widehat{\thetavec}$ are obtained by maximizing the likelihood function in \eqref{eqn:likelihood}. \section{Simulation Study}\label{sec:simulation} This section describes the simulation study we conducted for evaluating the proposed method. We simulated bivariate recurrent system data based on different models and parameter values. The performance of the proposed method was then evaluated based on the simulated data. Different parameter values were considered in the simulation for both the CARP-MLN and the CARP-copula models to understand the impact of the model parameters. We evaluated the model goodness of fit by calculating the average AIC and the mean squared error (MSE) of the estimated model parameters. The goal is to demonstrate the performance of the proposed method and the improvement by using the covariate adjustment. \subsection{Simulation Setting} We used both the CARP-MLN and CARP-copula models to simulate the data. For each generated data set, both models were fitted to the data and results were evaluated. The model used to generate data is referred to as the true model, while the models used to fit the data are referred to as the fitted models. We explored changing the sample sizes ($n$), the Kendall's tau value, the scale parameters ($\sigma_j$, $j=1, 2$), and the linear transformation matrix (${\mathbf{B}}$) to understand their impacts on the analysis. First, to understand the impact of sample size, we varied the sample size at $n=$200, 500, 1000 and 2000 when generating the data using each model. For the CARP-copula model, the lognormal marginal distributions were used for both event types along with the Gumbel copula function. The location and scale parameters for lognormal marginal distributions in the true model were specified at $(\mu_{1} = 1, \sigma_{1} = 0.25)$ and $(\mu_{2} = 1.5, \sigma_{2} = 0.25)$. For the linear transformation matrix ${\mathbf{B}}$, we used the 2 $\times$ 2 matrix below \begin{align}\label{eqn:B_matrix} {\mathbf{B}} = \left(\begin{array}{cc} 1.5 & 0 \\ 0 & 0.1 \end{array}\right). \end{align} We chose to set the Gumbel copula parameter $\alpha$ at 1.5. When generating the data based on the CARP-MLN model, we used the same location and scale parameters for the marginal lognormal distributions, and adjusted the correlation parameter $\eta$ to obtain the same Kendall's tau as in the CARP-copula model. Second, to evaluate the effect of the Gumbel copula coefficient $\alpha$, we varied its value at 1, 1.12, 1.5 and 2.22 by changing the Kendall's tau parameter in the true models, while keeping all other parameters the same with the sample size fixed at $n=1000$. Considering that the CARP-MLN and CARP-copula models quantify the Kendall's tau differently, we used $\eta$ at 0, 0.0443, 0.1445 and 0.299 for the CARP-MLN model, so that the Kendall's tau from both CARPs are varied at 0, 0.11, 0.33 and 0.55. We also explored the impact of the scale parameters by letting $\sigma_{1}$ and $\sigma_{2}$ vary at 0.35, 0.3, 0.25 to 0.20 for the marginal lognormal distributions of the CARP-Copula model while keeping sample size at $n=1000$ and the Kendall's tau was kept at 0.33. Similarly for the CARP-MLN model, covariance matrices were adjusted to align with the marginal distributions used in the CARP-Copula model. Lastly, the effect of covariate adjustment was studied by using different types of ${\mathbf{B}}$. True models used both non-zero and zero ${\mathbf{B}}$ matrices. In the non-zero ${\mathbf{B}}$ case, we used the coefficient matrix in \eqref{eqn:B_matrix} to generate data. In the zero ${\mathbf{B}}$ case, ${\mathbf{B}} = \boldsymbol{0}$ was used. The Kendall's tau was set to be 0.33, while other parameters are the same as ones in the sample size case. A sample size of 1000 is used across true models. \subsection{Simulation Results} The simulation results under different true models and fitted models are summarized in this section. For each true model, the model performance was summarized over 1000 simulated data sets. The simulation size was chosen to ensure a reliable analysis result while balancing the computing time needed to evaluate a broad number of scenarios. Further increasing the simulation size would not result in a meaningful change in the evaluated summary statistics and the drawn conclusions. Under each fitted model, the average AIC was computed. In order to evaluate the performance of parameter estimates, we calculated the MSE of the location parameter $\mu$, scale parameter $\sigma$ and the linear transformation parameter ${\mathbf{B}}$ for different sample sizes. \begin{table} \caption{Average AIC from CARP-MLN and CARP-copula calculated by 1000 repeated samples on true models generated by both CARP-MLN and copula models. Sample sizes from true models are changed from 200, 500, 1000 and 2000.} \centering \begin{tabular}{P{2cm}|P{2cm}|P{2cm}P{2cm}|P{2cm}P{2cm}} \hline \hline \multicolumn{2}{c|}{True Model} & \multicolumn{2}{c|}{Copula Generation} & \multicolumn{2}{c}{MLN Generation} \\ \hline \multicolumn{2}{c|}{Fitted Model} & MLN & Copula & MLN & Copula\\ \hline \multirow{4}{2cm}{\centering Sample size $n$} & 200 & 702.0 & 722.5 & 722.9 & 721.9\\ & 500& 1755.4 & 1751.3 & 1806.1 & 1808.7 \\ & 1000 & 3513.7 & 3504.9 & 3615.4 & 3622.3 \\ & 2000 & 7027.7 & 7014.3 & 7220.0 & 7234.8 \\ \hline \hline \end{tabular} \label{table:result1} \end{table} \begin{table} \caption{Average AIC by CARP-MLN and copula under different Kendall's tau. $\alpha$ and $\eta$ are used to adjust the Kendall's tau in the true models for CARP-MLN and CARP-copula, respectively.} \centering \begin{tabular}{P{2cm}|P{2cm}|P{2cm}P{2cm}|P{2cm}P{2cm}} \hline \hline \multicolumn{2}{c|}{True Model} & \multicolumn{2}{c|}{Copula Generation} & \multicolumn{2}{c}{MLN Generation} \\ \hline \multicolumn{2}{c|}{Fitted Model} & MLN & Copula & MLN & Copula\\ \hline \multirow{4}{2cm}{\centering Kendall's tau ($\tau$)} & 0& 3472.2 & 3459.5 & 3459.4 & 3455.7 \\ & 0.11 & 3510.5 & 3506.9 & 3489.3 & 3490.8 \\ &0.33 & 3513.7 & 3504.9 & 3611.7 & 3618.6 \\ &0.55 & 3445.6 & 3439.7 & 3837.3 & 3852.3 \\ \hline \hline \end{tabular} \label{table:result2} \end{table} \begin{table} \caption{The Average AIC by CARP-MLN and copula under different scale parameters. $\sigma_1$ and $\sigma_2$ are set equal in the true models for CARP-MLN and CARP-copula.} \centering \begin{tabular}{P{2cm}|P{2cm}|P{2cm}P{2cm}|P{2cm}P{2cm}} \hline \hline \multicolumn{2}{c|}{True Model} & \multicolumn{2}{c|}{Copula Generation} & \multicolumn{2}{c}{MLN Generation} \\ \hline \multicolumn{2}{c|}{Fitted Model} & MLN & Copula & MLN & Copula\\ \hline \multirow{4}{2cm}{\centering Scale parameter ($\sigma_1$ and $\sigma_2$)} & 0.35& 4084.7 & 4071.7 & 4148.9& 4158.1 \\ & 0.30 & 3747.4 & 3736.1 & 3820.0 & 3826.7 \\ &0.25 & 3513.7 & 3504.9 & 3615.4 & 3622.3 \\ &0.20 & 2891.6 & 2882.7 & 2980.9 & 2983.3 \\ \hline \hline \end{tabular} \label{table:result5} \end{table} \begin{table} \caption{Average AIC from different true models and fitted models to evaluate effect of covariate adjustment. True and fitted models are copula and MLN with or without coefficient ${\mathbf{B}}$.} \label{Table:misspecfication} \centering \begin{tabular}{ P{2.1cm} | P{2.2cm} | P{2.2cm} P{2.1cm} | P{2.2cm} P{2.1cm}} \hline \hline \multicolumn{2}{c|}{ \multirow{2}{*}{\centering \backslashbox{True Model}{Fitted Model}} } & \multicolumn{2}{c|}{Copula} & \multicolumn{2}{c}{MLN}\\ \hhline{~~~~~~} \multicolumn{2}{c|}{} & Non-zero ${\mathbf{B}}$ & Zero ${\mathbf{B}}$ & Non-zero ${\mathbf{B}}$ & Zero ${\mathbf{B}}$ \\ \hline \multirow{2}{*}{ Copula} & Non-zero ${\mathbf{B}}$ & 3505.6 & 4069.9 & 3514.4 & 4064.8 \\ \hhline{~~~~~~} & Zero ${\mathbf{B}}$ & 2480.5 & 2485.1 & 2492.9 & 2489.0\\ \hline \multirow{2}{*}{ MLN} & Non-zero ${\mathbf{B}}$ & 3617.7 & 4186.2 & 3610.8 & 4180.0\\ \hhline{~~~~~~} & Zero ${\mathbf{B}}$ & 2572.9 & 2568.7 & 2565.3 & 2561.1\\ \hline \hline \end{tabular} \label{table:result4} \end{table} \begin{figure} \centering \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=6cm]{plot6_1.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_2.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_3.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_4.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_5.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_6.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_7.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot6_8.eps} \end{subfigure}% ~ \caption{MSE for the location and parameter $\mu_1$, $\mu_2$, scale parameter $\sigma_1$, $\sigma_2$ and coefficient ${\mathbf{B}}$, calculated by both CARP-MLN and copula model with different sample sizes. The true model is CARP-copula with lognormal marginal distributions.} \label{Fig:result1} \end{figure} \begin{figure} \centering \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_1.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_2.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_3.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_4.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_5.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_6.eps} \end{subfigure}% ~\\[-4ex] \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_7.eps} \end{subfigure}% ~ \begin{subfigure}[h]{0.5\textwidth} \centering \includegraphics[width=\textwidth, height=5.9cm]{plot7_8.eps} \end{subfigure}% ~ \caption{MSE for the location parameter $\mu_1$, $\mu_2$, scale parameter $\sigma_1$, $\sigma_2$ and ${\mathbf{B}}$, calculated by both CARP-MLN and copula model with different sample sizes. The true model used to generated data is CARP-MLN.} \label{Fig:result2} \end{figure} Table~\ref{table:result1} shows the average AIC of the fitted models summarized over the 1000 simulated data sets generated using both the CARP-copula and CARP-MLN models at different sample sizes. Both the CARP-MLN and CARP-copula models were applied to each simulated data set. We can see at each fixed sample size, the fitted CARP model that matches the true model used for simulating the data generally outperforms the other model by having a smaller average AIC value, except for the smallest size case at $n=200$ where the difference in the average AIC values are extremely small. The advantage of using the true model becomes more prominent as the sample size increases. Figures \ref{Fig:result1} and \ref{Fig:result2} compare the MSE of the estimated parameters at different sample sizes between the two fitted models for the simulated data generated from the CARP-copula and the CARP-MLN models, respectively. The MSEs are evaluated for the location parameter $\mu$, the scale parameter $\sigma$ and linear transformation coefficient ${\mathbf{B}}$ which are included in both figures. The black solid lines represent the MSE based on the fitted CARP-MLN model, and the red dashed lines represent the estimates from the fitted CARP-copula model. Two major conclusions can be drawn from these two figures. First, the MSEs of all the parameters decrease with the sample size. The more data we generate and use to fit the models, the more reliable the estimated models are with more accurate estimates of model parameters regardless of the choice of the model. Second, the use of the correct model does lead to slightly more accurate estimate of the model parameters across all sample size and model parameters. However, the improvement is more prominent for the scale parameters $\sigma$ than other model parameters. When the true underlying model is generated by CARP-copula and far from bivariate lognormal, CARP-copula fits data better. Table \ref{table:result2} shows the average AIC values of the fitted models when the Kendall's tau for capturing the dependence between two event types varies at the levels of 0, 0.11, 0.33 and 0.55. When the Kendall's tau is not zero which suggests some level of dependence between two marginal variables, using a fitted model that matches the true model for generating the data will result in a smaller average AIC value with a bigger improvement achieved when stronger dependence exists between the two types of events. When the Kendall's tau is zero indicating the marginal distributions are independent, the average AIC values are generally similar regardless which model is used to fit the data. Table \ref{table:result5} shows the comparison based on using different scale parameters in the true underlying model for both the CARP-copula and CARP-MLN models. Again, across all evaluated scale parameter values, we observe consistently smaller average AIC values when the fitted model matches the true model used for data generation. Lastly, Table \ref{Table:misspecfication} compares the results of using different coefficient matrix ${\mathbf{B}}$. We simulated data with both non-zero and zero ${\mathbf{B}}$ using both the CARP-MLN and CARP-copula models. For each simulated data, we fitted both the CARP-MLN and CARP-copula models with non-zero and zero ${\mathbf{B}}$. Similar patterns can be observed. When the true model was used as the fitted model, it results in the smallest AIC value. When non-zero ${\mathbf{B}}$ was used to generate the data, the use of covariate adjustment led to substantial improvement in the average AIC of the fitted model compared to using zero ${\mathbf{B}}$. On the other hand, when the data were generated with zero ${\mathbf{B}}$, using the non-zero ${\mathbf{B}}$ fitted models produced similar AIC values as the zero ${\mathbf{B}}$ models. Therefore, the covariate adjustment is generally recommended due to its potential to substantially improving the model performance by leveraging the additional covariate information. \section{Analysis of the Geyser Data}\label{sec:application} In this section, we present the analysis for the bivariate geyser system in the Yellowstone National Park using the proposed CARP models. Two adjacent geysers including the West Triplet and the Grotto Geyser are considered for our analysis. Geyser eruptions are highly related to underground water levels, which can be affected by a nearby geyser eruption. Also, it is believed that the eruption duration could affect the gap time until the next eruption. In particular, the longer the current eruption lasts, the longer it will take for the next eruption to occur. This is because a longer eruption usually indicates more water consumption during the eruption and hence a longer water gathering time is expected to reach the next eruption. We use both the CARP-MLN and the CARP-copula models with lognormal marginal distributions to analyze the geyser data. For the CARP-MLN model, the parameters are ${\boldsymbol{\theta}} = ( \mu_{1}, \mu_{2}, \sigma_{1}, \sigma_{2}, \eta, b_{11}, b_{12}, b_{21}, b_{22})^\prime$, where $\mu_{1}, \mu_{2}, \sigma_{1}, \sigma_{2} \textrm{ and } \eta$ define the baseline location parameters and scale parameters in the bivariate lognormal distribution. For the CARP-Copula model, the parameters are ${\boldsymbol{\theta}} = ( \mu_{1}, \mu_{2}, \sigma_{1}, \sigma_{2}, \alpha, b_{11}, b_{12}, b_{21}, b_{22} )^\prime$, where $\mu_{1}, \mu_{2}, \sigma_{1} \textrm{ and } \sigma_{2}$ are the location and scale parameters in marginal lognormal distributions, and $\alpha$ is the coefficient parameter in the Gumbel copula. In both cases, the 2 $\times$ 2 matrix ${\mathbf{B}}$ is the linear coefficient, and it can be denoted as $${\mathbf{B}} = \left(\begin{array}{cc} b_{11} & b_{12} \\ b_{21} & b_{22} \end{array}\right).$$ Table \ref{table:geyser_result_lognormal} shows estimation results for the CARP-MLN model, while Table \ref{table:geyser_result_copula} presents estimation results for the CARP-copula model. For simplicity, we use $\widehat{{\boldsymbol{\theta}}}_{\textrm{MLN}} $ and $\widehat{{\boldsymbol{\theta}}}_{\textrm{CP}} $ to represent parameter estimates based on the CARP-MLN and CARP-copula models, respectively. The estimated linear coefficients $\widehat{{\mathbf{B}}}$ for both models are shown as follows, \begin{align}\label{eqn:estimated_B} \widehat{{\mathbf{B}}}_{\textrm{MLN}} = \left(\begin{array}{cc} 0.880 & -0.003 \\ 0.058 & 0.063 \end{array}\right) \quad \text{ and }\quad \widehat{{\mathbf{B}}}_{\textrm{CP}} = \left(\begin{array}{cc} 0.862 & -0.017 \\ 0.081 & 0.062 \end{array}\right). \end{align} The estimates in \eqref{eqn:estimated_B} indicate that in general the longer the previous eruption duration is, the longer waiting time it takes until the next eruption. The eruption duration impact is substantial for the West Triplet Geyser as shown by $\widehat{b}_{11}= 0.880$ in $\widehat{{\mathbf{B}}}_{\textrm{MLN}}$, which suggests the marginal previous eruption duration effect of West Triplet Geyser on its location parameter is 0.880 on average. \begin{table} \caption{Parameter estimates and 95\% confidence intervals from CARP-MLN model for the geyser data.} \label{table:geyser_result_lognormal} \begin{center} \begin{tabular}{ c | rrr} \hline \hline Parameter & Estimates & 95\% lower & 95\% upper\\ \hline $\mu_{1}$ & 1.881 & 1.839 & 1.922 \\ $\mu_{2}$ & 2.126 & 2.072 & 2.180 \\ $b_{11}$ & 0.880 & 0.720 & 1.041 \\ $b_{21}$ & 0.058 &$-$0.166 & 0.283 \\ $b_{12}$ & $-$0.003 & $-$0.008 & 0.003 \\ $b_{22}$ & 0.063 & 0.050 & 0.077 \\ $\eta$ & $-$0.053 & $-$0.093 & $-$0.014 \\ $\sigma_{1}$ & 0.416 & 0.391 & 0.440 \\ $\sigma_{2}$ & 0.493 & 0.459 & 0.527 \\ $\tau$ & $-$0.069 & $-$0.070 & $-$0.067\\ \hline \hline \end{tabular} \end{center} \end{table} \begin{table} \caption{Parameter estimates and the corresponding 95\% confidence intervals from CARP-copula model using lognormal marginal distributions for the geyser data.} \label{table:geyser_result_copula} \begin{center} \begin{tabular}{ c | rrr} \hline \hline Parameter & Estimates & 95\% lower & 95\% upper\\ \hline $\mu_{1}$ & 1.847 & 1.809 & 1.886 \\ $\mu_{2}$ & 2.102 & 2.051 & 2.152 \\ $b_{11}$ & 0.862 & 0.700 & 1.024 \\ $b_{21}$ & 0.081 & $-$0.147 & 0.311 \\ $b_{12}$ & $-$0.017 & $-$0.007 & 0.004 \\ $b_{22}$ & 0.062 & 0.047 & 0.076 \\ $\sigma_{1}$ & 0.417 & 0.392 & 0.442\\ $\sigma_{2}$ & 0.497 & 0.459 & 0.535 \\ $\alpha$ & 1.000 & 0.958 & 1.042\\ $\tau$ & 0.000 & $-$0.001 & 0.001 \\ \hline \hline \end{tabular} \end{center} \end{table} For the CARP-MLN model, the estimated covariance matrix is $$\widehat{{\boldsymbol{\Sigma}}} = \left(\begin{array}{cc} 0.172 & -0.022 \\ -0.022 & 0.246 \end{array}\right),$$ where the correlation estimation is calculated as $\widehat{\eta} / \sqrt{\widehat{\sigma}^2_2 + \widehat{\eta}^2} = -0.05$. This indicates a small negative correlation between the event gap times of the West Triplet and Grotto Geysers. In other words, a longer eruption gap time for West Triplet Geyser could be associated with a shorter time interval for the next eruption of the Grotto Geyser. The Kendall's tau provides a measure on event dependence in both models. The estimates from the CARP-MLN and the CARP-copula models are $\widehat{\tau}_{\textrm{MLN}}=-0.07$ and $\widehat{\tau}_{\textrm{CP}} = 0$, respectively. The confidence intervals for $\tau$ is calculated by the Delta method in Appendix~\ref{Confidence Interval for Kendall's tauy}. The calculated AICs for the CARP-MLN and CARP-copula models are 5113.1 and 5120.5, respectively, indicating the CARP-MLN model is a slightly better fit for the geyser data. One way to measure the goodness of fit is to compare the estimated cumulative intensity function with the observed. The estimated and observed cumulative intensity functions from both models are shown in Figures \ref{fig:lognormal_intensity} and \ref{fig:copula_intensity}, with the black solid lines and the red dashed lines representing the estimated and the observed cumulative intensity functions respectively. We can see a better agreement between the estimated and the observed cumulative intensity functions based on the CARP-copula model compared with the CARP-MLN model. \begin{figure} \centering \includegraphics[width=.6\linewidth, height=9.5cm]{plot2.eps} \captionof{figure}{Cumulative intensity function from fitted CARP-MLN model using the geyser data. } \label{fig:lognormal_intensity} \end{figure} \begin{figure} \centering \includegraphics[width=.6\linewidth, height=9.5cm]{plot3.eps} \captionof{figure}{Cumulative intensity function calculated from the CARP-copula model with the lognormal marginal distributions.} \label{fig:copula_intensity} \end{figure} \section{Concluding Remarks}\label{sec:conclusion} This paper introduces two CARP models, CARP-MLN and CARP-Copula, for modeling a bivariate recurrent process. With the covariate adjustment, the CARP models provide improvements over traditional models for capturing the interdependence of the bivariate event system. When the underlying data are close to a bivariate lognormal distribution, both models work similarly well. However, when the real data are inconsistent with a bivariate lognormal distribution, the CARP-copula model is recommended to improve the model performance. A special case of Archimedean copulas, the Gumbel copula function, is considered in this paper. However, the general method can easily be adapted for other copula functions available for the chosen models. One example is the Frank copula. Compared to the Gumbel copula where only positive dependence can be quantified, the Frank copula can accommodate both positive and negative dependence between two event types. On the other hand, the Gumbel copula has an asymmetric dependence structure where correlations on the tail can be very different than both the Gaussian and Frank copulas. In addition, differences of the joint density functions between the Frank and Gaussian copulas are negligible when the marginal distributions are the same. The adjustment by using effective covariates significantly improves the model performance. We have shown through the simulation study, when the true model includes a significant covariate effect, that using the covariate adjustment significantly improves model fitting. On the other hand, if there is no significant covariate effect, using the covariate adjustment does not raise the AIC values. Therefore, in general we recommend using the covariate adjustment given the true underlying model is unknown. The choice of the marginal distributions in the CARP-copula model was made based on the AIC value. Marginal distributions achieving the minimum AIC value were selected in our model. One advantage of using the CARP-copula model is that different marginal distributions can be easily used to model different event types. This offers tremendous flexibility and broader generality to the CARP-copula model. A multivariate CARP model will be considered for future work when there are more than two event types in the recurrent system. For the geyser application, other covariates in addition to the eruption duration would also be explored to further improve the performance of the CARP models. In engineering applications when testing the reliability of systems is often of interest. The loading-sharing system is related to the CARP model (e.g., \citealp{smith1983limit}, \citealp{tierney1982asymptotic}, \citealp{sutar2014accelerated}, and \citealp{zhang2020reliability}). In the future, it will be interesting to apply the CARP to model the reliability of loading sharing systems. \section*{Acknowledgments} The authors thank the editor, associate editor, and two referees, for their valuable comments that helped in improving the paper significantly. The authors acknowledge the Advanced Research Computing program at Virginia Tech for providing computational resources. The work by Hong was partially supported by National Science Foundation Grant CMMI-1904165 to Virginia Tech.
\section{Introduction} \label{sec:intro} Mismatch between training and test data is common when using automatic speech recognition (ASR) systems in realistic conditions. Among other robustness methods, adaptation algorithms developed for ASR aim at alleviating this mismatch. Adapting large and complex models, especially deep neural network (DNN)-based models, is challenging with typically a small amount of adaptation (target) data and without explicit supervision \cite{bell2020}. Adaptation algorithms use adaptation data, which should be matched to the target test data, to adapt the trained ASR system and close the gap between training and test. The transcriptions, or labels, of the adaptation data are required in supervised adaptation. However, manual transcriptions are not always available because obtaining these transcriptions for a large amount of data is costly. When manual transcriptions are not available, ASR hypotheses, or ``pseudo-labels", can be used in the place of manual transcriptions. The ASR hypotheses are obtained by decoding the adaptation data using the trained (non-adapted) system. When ASR hypotheses are used, inaccurate information is present because the automatic transcriptions are typically not free of errors. End-to-end speech recognition uses a single neural network architecture within the deep learning framework to perform speech-to-text task. In the training of end-to-end speech recognition systems, the need for having prior alignments between acoustic frames and output symbols is eliminated thanks to the use of training criteria such as the attention mechanism \cite{chorowski2015} or the connectionist temporal classification (CTC) loss function \cite{graves2014}. Connectionist temporal classification (CTC) is the process of automatically labeling unsegmented data sequences using a neural network \cite{graves2006}. The training of a neural network using the CTC loss function thus does not require prior alignments between the input and target sequences. In the training of neural network using CTC loss and characters as output symbols, for a given transcription of the input sequence, there are as many possible alignments as there are different ways of separating the characters with blanks. As the exact character sequence, derived from the transcription, corresponding to the input sequence is not known, the sum over all possible character sequences is performed \cite{graves2014}. In semi-supervised or unsupervised adaptation where ASR hypotheses are used, the computation of the CTC loss could be unfavorably affected because there are errors in the transcriptions which are in essence the ASR hypotheses. In this paper, we propose an adaptation method for CTC-based end-to-end speech recognition in which the impact of errors in the transcriptions to the CTC loss computation is alleviated by combining CTC losses computed from different ASR 1-best hypotheses. In the present paper, the ASR 1-best hypotheses are obtained by using ASR systems with different acoustic features to decode the unlabeled adaptation data. We show the effectiveness of the proposed adaptation method in semi-supervised adaptation scenarios where the CTC-based end-to-end speech recognition systems are trained either on clean training data from the Wall Street Journal (WSJ) corpus \cite{paul1992} or on multi-condition training data of the CHiME-4 corpus \cite{vincent2017}, while evaluating on the test data of Aurora-4 corpus \cite{parihar2002}. The paper is organized as follows. Section \ref{sec:related_works} presents related works. The proposed adaptation method using multiple ASR hypotheses and CTC losses combination is introduced in section \ref{sec:adaptation_method}. Sections \ref{sec:asr_system_data} and \ref{sec:adaptation_experiments} present about ASR systems training and adaptation experiments, respectively. Results are presented in section \ref{sec:results}. Finally, section \ref{sec:conclusion} concludes the paper. \vspace{-5pt} \section{Related works} \label{sec:related_works} Adaptation of end-to-end speech recognition has been investigated in a number of studies \cite{samarakoon2018, li_slt2018, ochiai2018, delcroix2018, meng2019, tsunoo2019, sari_icassp2020, do_eusipco2020, ding2020}. In \cite{li_slt2018}, adaptation of the end-to-end model was achieved by introducing Kullback-Leibler divergence (KLD) regularization and multi-task learning (MTL) criterion into the CTC loss function. The training criteria are the linear combination of the standard CTC loss and the KLD or the MTL criterion. Multiple hypotheses were previously used in cross-system acoustic model adaptation where the transcriptions for adaptation were generated by several systems, which were built with various phoneme sets or acoustic front-ends \cite{giuliani2007, stueker2006}. In the present work, a new loss function created by combining the CTC losses computed from different ASR 1-best hypotheses is used during adaptation. The ASR 1-best hypotheses are obtained by decoding the unlabeled adaptation data with ASR systems using different acoustic features. \section{Proposed adaptation method} \label{sec:adaptation_method} \subsection{Training of CTC-based end-to-end speech recognition} \label{sec:ctc_training} Given a $T$-length acoustic feature vector sequence $X = \{\mathbf{x}_t \in \mathbb{R}^d | t = 1,...,T\}$, where $\mathbf{x}_t$ is a $d$-dimensional feature vector at frame $t$, and a transcription $C = \{c_l \in \mathcal{U}| l = 1,...,L\}$ which consists of $L$ characters, where $\mathcal{U}$ is a set of distinct characters, during the training of the neural network the standard CTC loss function $L_{CTC}$ is defined as follows: \begin{equation} \label{equ:ctc_loss} L_{CTC} = -\log P_{\theta} (C|X), \end{equation} \noindent where $\theta$ are the network parameters. The network is trained to minimize $L_{CTC}$. In equation (\ref{equ:ctc_loss}), $C$ is the transcription of $X$ which can be either a manual transcription or an ASR hypothesis. In the present work, the ASR systems are trained using manual transcriptions in supervised training mode. The convolutional neural network (CNN) \cite{lecun1995} - bidirectional long short-term memory (BLSTM) \cite{hochreiter1997} architecture is used. The CTC loss function in equation (\ref{equ:ctc_loss}) can be computed thanks to the introduction of the CTC path $a$ which forces the output character sequence to have the same length as the input feature sequence by adding blank as an additional label and allowing repetition of labels \cite{graves2014}. The CTC loss $L_{CTC}$ is thus computed by integrating over all possible CTC paths $\mathcal{B}^{-1}(C)$ expanded from $C$: \begin{equation} \label{equa:ctc_paths} L_{CTC} = -\log P_{\theta} (C|X) = -\log\sum_{a \in \mathcal{B}^{-1}(C)}P_{\theta} (a|X). \end{equation} \subsection{Multiple-hypothesis CTC-based adaptation} \label{sec:ctc_adaptation} Given adaptation data, among other adaptation methods mentioned in section \ref{sec:related_works}, the CTC-based end-to-end speech recognition system can be adapted by using back-propagation algorithm \cite{rumelhart1986} to fine-tune the trained neural network \cite{do_eusipco2020}. During the minimization of the CTC loss function using stochastic gradient descent \cite{ruder2016}, the parameters of the neural network are updated. When the manual transcriptions of the adaptation data are not available, ASR 1-best hypotheses obtained by using the trained neural network to decode the adaptation data can be used in the adaptation process. In this paper, we propose to integrate multiple ASR 1-best hypotheses in the computation of the CTC loss function during adaptation, when the manual transcriptions are not available, as follows: \begin{equation} \label{equa:multiple_hypothesis_ctc} L^{*}_{CTC} = -\left( \sum^{N}_{i=1} \log P_{\theta} (\widehat{C}_i|X) \right), \end{equation} \noindent where $\widehat{C}_i, i = 1, ..., N$ are the 1-best hypotheses obtained by decoding the unlabeled adaptation data using $N$ different trained neural networks. By combining multiple 1-best hypotheses in the computation of the CTC loss, the impact of the errors in the ASR hypotheses to the computation of the CTC loss function could be alleviated. Using property of the logarithm, the equation (\ref{equa:multiple_hypothesis_ctc}) can be rewritten as follows: \begingroup \scriptsize \begin{equation} \label{equa:ctc_product} L^{*}_{CTC} = - \log \prod^{N}_{i=1} P_{\theta} (\widehat{C}_i|X) = - \log\prod^{N}_{i=1}\left(\sum_{a_i \in \mathcal{B}^{-1}(\widehat{C}_i)}P_{\theta} (a_i|X)\right), \end{equation} \endgroup \noindent where $a_i$ is a CTC path linking the 1-best hypothesis $\widehat{C}_i$ and the acoustic feature sequence $X$. In the computation of the new CTC loss $L^{*}_{CTC}$ in the present paper, different ASR 1-best hypotheses are obtained by decoding the adaptation data with different ASR systems. Different ASR hypotheses could be obtained by other means, for instance by using N-best hypotheses from one decoding. This possibility is not explored in the present paper. Also, no confidence-based filtering \cite{bell2020} is applied on the ASR hypotheses. In the experiments of the present paper, the use of two systems ($N=2$) is explored. \subsection{Analysis} \label{sec:anslysis} We analyze the new loss function $L^{*}_{CTC}$ for the simplified case where two 1-best hypotheses are used. The equation (\ref{equa:ctc_product}) becomes: \begingroup \scriptsize \begin{equation} \label{equa:ctc_product_2} L^{*}_{CTC} = - \log \left[ \left(\sum_{a_i \in \mathcal{B}^{-1}(\widehat{C}_1)}P_{\theta} (a_i|X)\right)\left(\sum_{b_j \in \mathcal{B}^{-1}(\widehat{C}_2)}P_{\theta} (b_j|X)\right)\right], \end{equation} \endgroup \noindent where $a_i$ and $b_j$ are ones of the CTC paths linking the 1-best hypotheses $\widehat{C}_1$ and $\widehat{C}_2$, respectively, with the acoustic feature sequence $X$. From equation (\ref{equa:ctc_product_2}), it can be seen that a probability $P_{\theta} (a_i|X)$, computed by using the CTC path $a_i$, would be multiplied with all the probabilities $P_{\theta} (b_j|X), b_j \in \mathcal{B}^{-1}(\widehat{C}_2)$. This weighting, based on the probabilities computed from different CTC paths in $\mathcal{B}^{-1}(\widehat{C}_2)$, could possibly alleviate the impact of uncertainty in the CTC paths $a_i \in \mathcal{B}^{-1}(\widehat{C}_1)$, caused by transcription errors in $\widehat{C}_1$, to the computation of the CTC loss $L^{*}_{CTC}$. \vspace{-5pt} \section{Speech recognition system and data} \label{sec:asr_system_data} The effectiveness of the proposed adaptation method is evaluated in semi-supervised adaptation scenarios where only part of the adaptation data have manual transcriptions. This scenario is popular when manual transcriptions can be obtained only for a small amount of adaptation data instead of total amount of adaptation data, to reduce the cost. The end-to-end ASR systems are trained using the standard CTC loss function (see equation (\ref{equ:ctc_loss})). The proposed CTC loss function $L^{*}_{CTC}$ is used only in the adaptation using the proposed multiple-hypothesis CTC-based adaptation method. Other adaptations use the standard CTC loss function as in equation (\ref{equ:ctc_loss}). \subsection{CTC-based end-to-end speech recognition systems} \label{sec:e2e_systems} \subsubsection{Acoustic features} \label{sec:acoustic_features} CNN-BLSTM neural network architecture is trained with CTC loss to map acoustic feature sequences to character sequences. A baseline system is trained by using 40-dimensional log-Mel filter-bank (FBANK) features \cite{mohamed2012} as acoustic features. The FBANK features are augmented with 3 dimensional pitch features \cite{watanabe2018, povey2011}. Delta and acceleration features are appended to the static features. The feature extraction of the baseline system was performed by using the standard feature extraction recipe of Kaldi toolkit \cite{povey2011}. To have additional ASR hypotheses, another system is trained to decode the unlabeled adaptation data. The system is trained by using 40-dimensional subband temporal envelope (STE) features \cite{do2017_interspeech} together with 3-dimensional pitch features. Similar to the system trained with FBANK features, the delta and acceleration features are included. STE features track energy peaks in perceptual frequency bands which reflect the resonant properties of the vocal tract. These features have been shown to be on par with the standard FBANK features in various speech recognition scenarios \cite{doddipatla2018, do2019}. FBANK and STE features are also complementary to each other and combining the systems using these features yielded significant WER reductions compared to single system \cite{do2017_interspeech, doddipatla2018, do2019}. \vspace{-5pt} \subsubsection{Neural network architecture} \label{sec:architecture} The neural network architecture for end-to-end ASR systems is made up of initial layers of the VGG net architecture (deep CNN) \cite{simonyan2015} followed by a 6-layer pyramid BLSTM (BLSTM with subsampling \cite{watanabe2018}). We use a 6-layer CNN architecture which consists of two consecutive 2D convolutional layers followed by one 2D Max-pooling layer, then another two 2D convolutional layers followed by one 2D max-pooling layer. The 2D filters used in the convolutional layers have the same size of 3$\times$3. The max-pooling layers have patch of 3$\times$3 and stride of 2$\times$2. The 6-layer BLSTM has 1024 memory blocks in each layer and direction, and linear projection is followed by each BLSTM layer. The subsampling factor performed by the BLSTM is 4 \cite{watanabe2018}. During decoding, CTC score is used in a one-pass beam search algorithm \cite{watanabe2018}. The beam width is set to 20. Training and decoding are performed using the ESPnet toolkit \cite{watanabe2018}. \vspace{-5pt} \subsection{Data} \subsubsection{Clean training data} \label{sec:clean_training} WSJ is a corpus of read speech \cite{paul1992}. All the speech utterances are sampled at 16 kHz and are fairly clean. The WSJ's standard training set \footnotesize \texttt{train\_si284} \normalsize consists of around 81 hours of speech. During training, the standard development set \footnotesize \texttt{test\_dev93}, \normalsize which consists of around 1 hour of speech, is used for cross-validation. \vspace{-5pt} \subsubsection{Multi-condition training data} \label{sec:multi_condition_training} The multi-condition training data of CHiME-4 corpus \cite{vincent2017} consists of around 189 hours of speech, in total. The CHiME-4 multi-condition training data consists of the clean speech utterances from WSJ training corpus and simulated and real noisy data. The real data consists of 6-channel recordings of utterances from WSJ corpus spoken in four environments: caf\'e, street junction, public transport (bus), and pedestrian area. The simulated data was constructed by mixing WSJ clean utterances with the environment background recordings from the four mentioned environments. All the data were sampled at 16 kHz. Audio recorded from all the microphone channels are included in the CHiME-4 multi-condition training data, named \footnotesize \texttt{tr05\_multi\_noisy\_si284} \normalsize in the ESPnet CHiME-4 recipe. The \footnotesize \texttt{dt05\_multi\_isolated\_1ch\_track} \normalsize set was used for cross-validation during training. \vspace{-10pt} \subsubsection{Test and adaptation data} \label{sec:test} Test and adaptation sets are created from the test sets of the Aurora-4 corpus \cite{parihar2002}. The Aurora-4 corpus has 14 test sets which were created by corrupting two clean test sets, recorded by a primary Sennheiser microphone and a secondary microphone, with six types of noises: airport, babble, car, restaurant, street, and train, at 5-15 dB SNRs. The two clean test sets were also included in the 14 test sets. There are 330 utterances in each test set. The noises in Aurora-4 are different from those in the CHiME-4 multi-condition training data. In this work, the .wv1 data \cite{parihar2002} from 7 test sets created from the clean test set recorded by the primary Sennheiser microphone are used to create test and adaptation sets From 2310 utterances taken from the 7 test sets of .wv1 data, a test set of 1400 utterances (approx. 2.8 hours of speech), a labeled adaptation set of 300 utterances (approx. 36 minutes), and an unlabeled adaptation set of 610 utterances (approx. 1.2 hours) are separated. The selection of the utterances in the three sets are random. The utterances in the three sets are not overlapped. These sets are used for testing and adaptation in both clean training and multi-condition training scenarios. \vspace{-5pt} \section{Adaptation experiments} \label{sec:adaptation_experiments} Let $\mathbb{M}_{\text{FB}}$ and $\mathbb{M}_{\text{STE}}$ be the end-to-end models trained with FBANK and STE features, respectively, on the clean or multi-condition training data, the semi-supervised adaptation experiment is performed as follows (in this section, for the sake of clarity, notations for clean and multi-condition training data are not included): \begin{itemize}[leftmargin=*] \item First the back-propagation algorithm is used to fine-tune the models $\mathbb{M}_{\text{FB}}$ and $\mathbb{M}_{\text{STE}}$ in supervised mode using the labeled adaptation set of 300 utterances to obtain the adapted model $\widehat{\mathbb{M}}_{\text{FB}}$ and $\widehat{\mathbb{M}}_{\text{STE}}$, respectively (see Figure \ref{fig:supervised_adapt}). This step is done to make use of the available labeled adaptation data and to reduce further the WERs of the ASR systems. \item The models $\widehat{\mathbb{M}}_{\text{FB}}$ and $\widehat{\mathbb{M}}_{\text{STE}}$ are subsequently used to decode the unlabeled adaptation set of 610 utterances. Assume that $\mathcal{H}^{\textup{FB}}_{610}$ and $\mathcal{H}^{\textup{STE}}_{610}$ are the sets of 1-best hypotheses obtained from these decoding and $\mathcal{T}_{300}$ is the set of manual transcriptions available for the 300 utterances set, we group the 300-utterance and 610-utterance sets to create an adaptation set of 910 utterances whose labels could be either $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{FB}}_{610}$ or $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{STE}}_{610}$. \item Finally, the 910-utterance set is used to adapt the model $\mathbb{M}_{\text{FB}}$, which is the initial model, using back-propagation algorithm to obtain the semi-supervised adapted model $\widetilde{\mathbb{M}}_{\text{FB}}$. \end{itemize} \begin{figure}[ht] \centering \includegraphics[width=1.0\columnwidth]{supervised_adapt.pdf} \caption{\label{fig:supervised_adapt} Supervised adaptation of initial models $\mathbb{M}_{\text{FB}}$ and $\mathbb{M}_{\text{STE}}$ using the 300-utterance set with manual transcriptions $\mathcal{T}_{300}$. The models can be trained either on clean or multi-condition training data.} \end{figure} \begin{figure}[ht] \centering \includegraphics[width=1.0\columnwidth]{semi_supervised_adapt.pdf} \caption{\label{fig:semi_supervised_adapt} Semi-supervised adaptations using the 910-utterance adaptation set, of which the labels include the manual transcriptions $\mathcal{T}_{300}$ and one of the sets of 1-best hypotheses, $\mathcal{H}^{\textup{FB}}_{610}$ and $\mathcal{H}^{\textup{STE}}_{610}$, or both.\vspace{-15pt}} \end{figure} The 910-utterance adaptation set in which 610 utterances do not have manual transcriptions is used to adapt the initial FBANK-based system in semi-supervised mode since only 300 utterances have manual transcriptions. The conventional semi-supervised adaptation using the 910-utterance adaptation set can be done with the labels from $\mathcal{T}_{300}$ and, either $\mathcal{H}^{\textup{FB}}_{610}$ or $\mathcal{H}^{\textup{STE}}_{610}$. This adaptation uses the standard CTC loss $L_{CTC}$. The proposed multiple-hypothesis CTC-based adaptation method, denoted as MH-CTC, uses the $\mathcal{T}_{300}$ manual transcriptions and both sets of 1-best hypotheses, $\mathcal{H}^{\textup{FB}}_{610}$ and $\mathcal{H}^{\textup{STE}}_{610}$. This adaptation used the $L^{*}_{CTC}$ loss. These semi-supervised adaptation experiments are depicted in Figure \ref{fig:semi_supervised_adapt}. The referenced performance which can be considered as an upper bound performance for all the mentioned adaptation methods is that obtained with the supervised adaptation where all 910 utterances have manual transcriptions $\mathcal{T}_{910}$. During adaptation, the learning rate is kept unchanged compared to that used during training because this configuration yields better performance than using different learning rates during training and adaptation. On the other hand, the 1-best hypotheses are obtained after one pass of decoding. \vspace{-5pt} \section{Results} \label{sec:results} \vspace{-5pt} \subsection{Clean training} \label{sec:results_clean_training} In the scenario where the systems are trained on the WSJ clean training data and tested on the test set consisting of 1400 Aurora-4 utterances, the initial systems which use the models $\mathbb{M}_{\text{FB}}$ and $\mathbb{M}_{\text{STE}}$, respectively, have WERs of 55.2\% and 60.3\%, respectively. The results of applying different adaptation methods to the FBANK-based system are shown in Table \ref{tab:clean_training}. Adapting the initial FBANK-based and STE-based systems with the labeled adaptation set of 300 utterances reduces the WERs of these systems measured on the 1400-utterance test set to 27.2\% and 24.5\%, respectively. The corresponding WERs measured on the 610-utterance unlabeled adaptation set are 29.1\% and 25.6\%, respectively. Supervised adaptation using the 300-utterance adaptation set with manual transcriptions $\mathcal{T}_{300}$ is used as the baseline. It can be observed from Table \ref{tab:clean_training}, that, the proposed multiple-hypothesis CTC-based adaptation method yields 6.6\% relative WER reduction compared to the baseline. In contrast, the two conventional semi-supervised adaptations which use both manual transcriptions and one of the sets of 1-best hypotheses, $\mathcal{H}^{\textup{FB-C}}_{610}$ or $\mathcal{H}^{\textup{STE-C}}_{610}$, do not yield WER reduction compared to the FBANK-based baseline system. \subsection{Multi-condition training} \label{sec:results_multi_condition_training} The experiments in the clean training scenario are repeated for the multi-condition training scenario. When being trained on multi-condition training data of CHiME-4 and tested on the 1400-utterance test set from Aurora-4, the initial CTC-based end-to-end ASR systems using FBANK and STE features have WERs of 31.0\% and 33.8\%, respectively. Adapting the initial FBANK-based and STE-based systems with the labeled adaptation set of 300 utterances reduces the WERs of these systems measured on the 1400-utterance test set to 17.2\% and 17.3\%, respectively. The corresponding WERs which are measured on the 610-utterance unlabeled adaptation set are 18.3\% and 18.9\%, respectively. Results of the adaptation experiments in this scenario are shown in Table \ref{tab:multi_condition_training}. Similar to in the clean training scenario, the proposed adaptation method (MH-CTC) yields 5.8\% relative WER reduction compared to the baseline. The semi-supervised adaptations using single 1-best hypotheses $\mathcal{H}^{\textup{FB-M}}_{610}$ or $\mathcal{H}^{\textup{STE-M}}_{610}$ together with the manual transcriptions $\mathcal{T}_{300}$ do not yield WER reduction compared to the baseline. \begin{table}[t] \begin{center} \captionof{table}{Adaptation of the FBANK-based ASR system trained on WSJ clean training set with different adaptation methods. $\mathcal{H}^{\textup{FB-C}}_{610}$ and $\mathcal{H}^{\textup{STE-C}}_{610}$ are obtained in the decoding using clean training models.} \label{tab:clean_training} \begin{tabular}{|l|c|l|c|} \hline \footnotesize Adaptation method & \footnotesize \# Utts. & \footnotesize Adapt. data's labels & \footnotesize WER \\\hline\hline \footnotesize No adapt. (initial model) & \footnotesize N/A & \footnotesize N/A & \footnotesize 55.2\\ \hline \footnotesize Supervised-300 \scriptsize (baseline) & \footnotesize 300 & \scriptsize $\mathcal{T}_{300}$ & \footnotesize 27.2\\ \hline \footnotesize Semi-supervised-FB & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{FB-C}}_{610}$ & \footnotesize 28.4\\ \hline \footnotesize Semi-supervised-STE & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{STE-C}}_{610}$ & \footnotesize 27.4\\ \hline \footnotesize MH-CTC (proposed) & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{FB-C}}_{610} \cup \mathcal{H}^{\textup{STE-C}}_{610}$ & \footnotesize \textbf{25.4}\\ \hline \footnotesize Supervised-910 & \footnotesize 910 & \footnotesize $\mathcal{T}_{910}$ & \footnotesize 13.2\\ \hline \end{tabular} \end{center} \normalsize \vspace{-10pt} \begin{center} \captionof{table}{Adaptation of the FBANK-based ASR system trained on CHiME-4 multi-condition training set with different adaptation methods. $\mathcal{H}^{\textup{FB-M}}_{610}$ and $\mathcal{H}^{\textup{STE-M}}_{610}$ are obtained in the decoding using multi-condition training models.} \label{tab:multi_condition_training} \begin{tabular}{|l|c|l|c|} \hline \footnotesize Adaptation method & \footnotesize \# Utts. & \footnotesize Adapt. data's labels & \footnotesize WER \\\hline\hline \footnotesize No adapt. (initial model) & \footnotesize N/A & \footnotesize N/A & \footnotesize 31.0\\ \hline \footnotesize Supervised-300 \scriptsize (baseline) & \footnotesize 300 & \footnotesize $\mathcal{T}_{300}$ & \footnotesize 17.2\\ \hline \footnotesize Semi-supervised-FB & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{FB-M}}_{610}$ & \footnotesize 17.7\\ \hline \footnotesize Semi-supervised-STE & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{STE-M}}_{610}$ & \footnotesize 17.9\\ \hline \footnotesize MH-CTC (proposed) & \footnotesize 910 & \scriptsize $\mathcal{T}_{300} \cup \mathcal{H}^{\textup{FB-M}}_{610} \cup \mathcal{H}^{\textup{STE-M}}_{610}$ & \footnotesize \textbf{16.2}\\ \hline \footnotesize Supervised-910 & \footnotesize 910 & \footnotesize $\mathcal{T}_{910}$ & \footnotesize 6.7\\ \hline \end{tabular} \end{center} \vspace{-10pt} \end{table} \normalsize In both clean and multi-condition training scenarios, the supervised adaptations which use manual transcriptions for all 910 utterances have the lowest WERs. \section{Conclusion} \label{sec:conclusion} This paper has proposed an adaptation method for end-to-end speech recognition. Multiple ASR 1-best hypotheses were used in the computation of the CTC loss function to alleviate the impact of errors in the ASR hypotheses to the computation of CTC loss when the 1-best hypotheses are used as labels instead of manual transcriptions. The 1-best hypotheses were obtained by using a main ASR system and an additional ASR system which use FBANK and STE features, respectively, to decode the unlabeled adaptation data. In clean and multi-condition training scenarios, the proposed adaptation method yielded 6.6\% and 5.8\% relative WER reductions, respectively, compared to the baseline system which was adapted with back-propagation fine-tuning using an adaptation subset having manual transcriptions. In contrast, conventional semi-supervised back-propagation fine-tuning did not yield WER reduction compared to the baseline system. To our knowledge, this is the first time the integration of multiple ASR hypotheses in the CTC loss function has been shown to be consistently effective in reducing WER, and thus, is promising for future work. \newpage \bibliographystyle{IEEEbib}