text
stringlengths
0
643k
meta
stringlengths
137
151
# Introduction {#intr} Electrolyte solutions, consisting of a polarized solvent and ionic species, are extremely important in a wide range of fields including chemical physics, biology, and geochemistry . They are also of interest in engineering physics, such as aggregation and dispersion of charged liquid particles  present in aerospace systems. Despite a long history of electrolyte solution studies, there are still important open questions associated with fluctuations and correlations of electrolyte bulk solutions . At the mesoscale (i.e., nanometer to micrometer length scales), thermal energies of electrolyte solutions are of the same magnitude as the characteristic energies of hydrodynamics and electrokinetics. Therefore, thermally induced fluctuations can play an important role in both equilibrium and non-equilibrium electrokinetic phenomena at the mesoscale . Quantifying the impact of fluctuations on mesoscale fluid systems is critical to understanding the large-scale dynamics of complex fluid systems designed from the nano/mesoscale in a bottom-up approach. The essential feature of an electrolyte solution is that charged species interact with each another with long-range Coulomb forces, leading to a system whose properties are significantly different from those of electrically neutral solutions . At the continuum scale level, fluctuating hydrodynamic and electrokinetic theories have been used to describe thermally induced fluctuations through random tensor/flux terms in the governing equations, formulated properly to satisfy the fluctuation-dissipation theorem (FDT) . At the atomic scale, molecular dynamics (MD) simulations with explicit ions have also been used to study electrolyte solutions. However, the computational cost of MD simulations further prevents their use at large length-and time-scales . Mesoscale approaches smoothly bridge the gap between continuum and atomistic descriptions and provide the possibility to consistently integrate fluctuations into macroscopic field variables. To this end, we developed a charged dissipative particle dynamics (cDPD) model  to simulate mesoscale electrokinetic phenomena with fluctuations. In the present work, we consider a continuum formulation and derive the coupled fluctuating hydrodynamic and electrokinetic equations. Based on the linear response assumption , we will linearize the fluctuating hydrodynamic and electrokinetic equations and derive analytical closed-form expressions for current correlation functions of electrolyte bulk solutions in Fourier space. Then, we will perform both all-atom MD simulations with explicit ions and mesoscale cDPD simulations with semi-implicit ions to compute spatial and temporal correlations of hydrodynamic and electrostatic fluctuations directly from particle trajectories. These simulation results will be used to validate the closed-form expressions for correlation functions derived from the linearized fluctuating hydrodynamics theory by comparing simulation results against theoretical predictions. The remainder of this paper is organized as follows: In section [2](#sec:theory){reference-type="ref" reference="sec:theory"} we introduce the continuum formulation for fluctuating hydrodynamics and electrokinetics, and also the derivations of analytical solutions for current correlation functions using perturbation theory. In section [3](#sec:results){reference-type="ref" reference="sec:results"} we describe the details for performing all-atom MD simulations and mesoscopic cDPD simulations, and we also present the simulation results comparing against the theoretical predictions. Finally, we conclude with a brief summary and discussion in Section [4](#sec:summary){reference-type="ref" reference="sec:summary"}. # Continuum theory {#sec:theory} ## Fluctuating hydrodynamics and electrokinetics We consider a mesoscale system of electrolyte solution at thermal equilibrium in a periodic domain \(\mathbf{\Omega}\) of fixed volume. The system contains \(S\) types of ionic species with concentration \(c_\alpha(\mathbf{r},t)\) and charge valency \(z_\alpha\) for the \(\alpha\)-th ionic specie. Let \(e\) be the elementary charge, then a global constraint is imposed by the charge neutrality condition \[\sum_{\alpha=1}^S \int_{\mathbf{\Omega}} e z_\alpha c_\alpha(\mathbf{r},t)d\mathbf{r} = 0. \nonumber\] The solvent molecules are represented implicitly through their electrostatic and thermodynamic properties such as dielectric constant \(\epsilon\), bulk viscosity \(\zeta\), and shear viscosity \(\eta\). From the continuum perspective, this system can be described by equations of classical fluctuating hydrodynamics with an additional electrostatic force for velocity \(\mathbf{v}(\mathbf{r}, t)\), pressure \(p(\mathbf{r},t)\), mass density \(\rho(\mathbf{r},t)\), momentum density \(\mathbf{g}(\mathbf{r},t) = \rho(\mathbf{r},t) \mathbf{v}(\mathbf{r},t)\), and electric field \(\mathbf{E}(\mathbf{r},t)\). The local charge density is given by \(\rho_e(\mathbf{r},t) = \sum_\alpha^S e z_\alpha c_\alpha(\mathbf{r},t)\). The random stress tensor \(\delta \bm{\Pi}\) is a matrix of Gaussian-distributed random variables with zero means and variances given by the fluctuation-dissipation theorem (FDT)  \[\label{eq:FDT} \langle \delta \mathbf{\Pi}_{ij}(\mathbf{r},t) \delta \mathbf{\Pi}_{kl}(\mathbf{r}',t')\rangle = 2 k_BT \mathbf{C}_{ijkl} \delta(\mathbf{r}-\mathbf{r}')\delta(t-t'),\] where \(\mathbf{C}_{ijkl}=\eta(\delta_{ik}\delta_{jl} + \delta_{il}\delta_{jk})+(\zeta-{2\eta}/{3}) \delta_{ij}\delta_{kl}\) is a rank-4 tensor. The fluctuating hydrodynamic equations are closed with the equation of state, e.g., \(c_s^2 = (\partial p/\partial \rho)_T\) with \(c_s\) being the isothermal sound speed. The Ginzburg-Landau free energy functional for an electrolyte solution is  \[\label{eq:free_energy} G = \int_{\mathbf{\Omega}} d\mathbf{r} \bigg\{k_BT \sum_\alpha c_\alpha \ln c_\alpha + \sum_\alpha e z_\alpha c_\alpha \phi-\frac{\epsilon}{2}(\nabla\phi)^2\bigg\}, \nonumber\] where \(k_BT\) is the thermal energy and \(\phi\) the electrostatic potential. Variation of the free energy with respect to the electrostatic potential yields the Poisson equation \[\label{eq:poisson} -\nabla \cdot (\epsilon(\mathbf{r}) \nabla \phi ) = \sum_\alpha^S e z_\alpha c_\alpha(\mathbf{r},t),\] by setting \(\delta G/\delta \phi = 0\). Similarly, the electrochemical potential of the \(\alpha\)-th ionic species can be derived by variation with respect to ionic concentration \[\label{eq:chemical_potential} \mu_\alpha = \frac{\delta G}{\delta c_\alpha} = k_BT \ln c_\alpha + z_\alpha e\phi. \nonumber\] The transport and dissipation of ionic species are driven by the fluid velocity, electrochemical potential, and thermal fluctuations, which can be described in terms of the ionic concentration flux \(\mathbf{J}(\mathbf{r},t)\), \[\frac{\partial c_\alpha(\mathbf{r},t)}{\partial t} + \mathbf{v}(\mathbf{r},t) \cdot \nabla c_\alpha(\mathbf{r},t) = -\nabla\cdot(\mathbf{J}_{\alpha}(\mathbf{r},t) + \delta \mathbf{J}_{\alpha}(\mathbf{r},t) ), \nonumber\] where \(\mathbf{J}_{\alpha}(\mathbf{r},t)\) is the dissipative flux and \(\delta \mathbf{J}_{\alpha}(\mathbf{r},t)\) is the random flux when the system is near thermodynamic equilibrium. The diffusion flux can be written as \(\mathbf{J}_\alpha =-\sum_\beta^S M_{\alpha \beta}\nabla \mu_\beta (\mathbf{r},t)\), in which \(\nabla \mu\) is the thermodynamic force for diffusion flux and \(M_{\alpha \beta}\) are the Onsager coefficients related to macroscopic ionic diffusion coefficients. In general, \(M_{\alpha \beta} = M_{\beta \alpha} \neq 0\) as implied by reversal invariance . The off-diagonal terms \(M_{\alpha \neq \beta}\) describe mutual-diffusion and are assumed to be relatively small compared to the diagonal self-diffusion terms. For example, according to experimental data , the self-diffusion coefficients of cation and anion in a \(1~{\rm M}\) NaCl solution are \(1.16\times 10^{-9} {\rm m^2/s}\) and \(1.99\times 10^{-9} {\rm m^2/s}\), respectively, while the mutual-diffusion coefficient is one order of magnitude smaller: \(1.3\times 10^{-10} {\rm m^2/s}\). Therefore, we assume that the mutual diffusion terms can be ignored in the present work for simplicity. In numerical experiments, this assumption is checked by computing the self-and mutual-diffusion coefficients from MD data using the Green-Kubo relations , which is presented in section [3](#sec:results){reference-type="ref" reference="sec:results"}. By substituting the electrochemical potential expression into the diffusion flux, we obtain \[\mathbf{J}_\alpha =-M_{\alpha}\nabla \mu_\alpha (\mathbf{r},t) =-\frac{M_{\alpha} k_BT}{c_\alpha} \nabla c_\alpha-M_{\alpha}z_\alpha e\nabla \phi. \nonumber\] In practice, it is more convenient to use the macroscopic diffusion coefficients \(D_\alpha = {M_{\alpha} k_BT}/{c_\alpha}\) instead of the phenomenological coefficients \(M_{\alpha}\). Therefore, the ionic concentration transport equation can be rewritten as For a system near thermodynamic equilibrium, the random fluxes can be modeled as Gaussian random vectors with zero means and variance given by the generalized FDT as The coupled Eqs. ([\[eq:gov\]](#eq:gov){reference-type="ref" reference="eq:gov"})-([\[eq:FDT_pnp\]](#eq:FDT_pnp){reference-type="ref" reference="eq:FDT_pnp"}) form the fluctuating hydrodynamic and electrokinetic equations. ## Linearized theory of electrolyte solution The stochastic partial differential equations (SPDEs) given by Eqs. ([\[eq:gov\]](#eq:gov){reference-type="ref" reference="eq:gov"})-([\[eq:FDT_pnp\]](#eq:FDT_pnp){reference-type="ref" reference="eq:FDT_pnp"}) could be solved through numerical discretization, with the FDT satisfied on the discrete level following the GENERIC framework . In general, it is very challenging to obtain an analytical solution of such sPDEs. However, if the local hydrodynamic and electrokinetic fluctuations are sufficiently small, linear response theory can be applied to derive linearized equations to describe the relaxation process of electrolyte solution towards equilibrium. In the present work, we focus on the linearized equations for electrolyte solutions and their closed-form solutions. The equilibrium state of a bulk electrolyte solution is characterized by its mean field properties, i.e., constant mass density \(\rho_0\), constant pressure \(p_0\), constant bulk ionic concentration \(c_{\alpha 0}\), zero momentum field \(\mathbf{g}_0 = 0\), and zero electrostatic potential field \(\phi_0 = 0\). The local fluctuating hydrodynamic field can be expressed as the perturbation around the mean field state: where the local perturbation of pressure can be related to density fluctuations via the equation of state \(\delta p = c_s^2 \delta \rho\) under isothermal conditions. Also, the local fluctuating electrostatic field can be decomposed as in which \(\delta\rho_e(\mathbf{r},t) = \sum_\alpha^S e z_\alpha \delta c_\alpha(\mathbf{r},t)\) when the global electro-neutrality condition \(\sum_\alpha^S e z_\alpha c_{\alpha 0} = 0\) is imposed. The fluctuating electrostatic potentials and charge densities are related via the Poisson equation. For small fluctuations of electrostatic field, the linearized fluctuating hydrodynamic and electrokinetic equations can be written as where only first-order perturbation terms are kept in these linearized equations. It is important to note that the electrostatic force term \(\delta \rho_e \nabla \delta \phi\) in the momentum equation and the convection term \(\delta \mathbf{v} \cdot \nabla \delta c_\alpha\) in the transport equation are high-order perturbation terms and thus assumed to be negligible in the equations above. Therefore, the linearized hydrodynamic and electrokinetic equations become explicitly decoupled for fluid systems in thermodynamic equilibrium. The linearized fluctuating hydrodynamics equations given by Eq. ([\[ns_pnp_lin\]](#ns_pnp_lin){reference-type="ref" reference="ns_pnp_lin"}) can be transformed into \(k\)-space by a spatial Fourier transform and then solved in the \(k\)-space. Appendix [\[app:A\]](#app:A){reference-type="ref" reference="app:A"} describes the detailed derivation of mass-momentum correlations by solving Eq. ([\[ns_pnp_lin\]](#ns_pnp_lin){reference-type="ref" reference="ns_pnp_lin"}). The normalized temporal correlation functions (TCF) of the mass-momentum fluctuations in the \(k\)-space are given by where the symbol \(\hat{~}\) indicates Fourier components, and the wave vector \(\mathbf{k} = (k, 0, 0)\) is defined along the (arbitrary) \(x\)-direction, \(\nu = \eta/\rho\) is the kinematic viscosity, \(\Gamma_T=2\nu/3+\zeta/2\rho\) is the sound absorption coefficient, and \(c_s\) is the isothermal sound speed. Also, \(\mathbf{g}_\parallel\) represents longitudinal momentum (sound mode) parallel to the wave vector \(\mathbf{k}\), and \(\mathbf{g}_\perp\) represents the transverse component (shear mode) perpendicular to the wave vector \(\mathbf{k}\). For simplicity in deriving closed-form solutions, we only consider two types of ionic species: the cation (denoted by \(p\)) and anion (denoted by \(n\)). By substitution of the Poisson equation into the linearized ionic transport equation, we obtain where \(\kappa_p^2\) and \(\kappa_n^2\) are defined as with units of inverse-squared distance. For a periodic system, we can expand the solution in Fourier modes: \(\delta c(\mathbf{r},t) = \sum_{\mathbf{k}}\delta \hat{c}(\mathbf{k},t) e^{i\mathbf{k}\cdot \mathbf{r}}\). The spatial Fourier transformation of Eq. ([\[pnp_lin\]](#pnp_lin){reference-type="ref" reference="pnp_lin"}) gives two coupled ordinary differential equations The above equations can be written in matrix form as \(\displaystyle {\partial \mathbf{u}(\mathbf{k},t)}/{\partial t} + \mathcal{L}\mathbf{u} = 0\), with the vector \(\mathbf{u} = (\delta \hat{c}_p, \delta \hat{c}_n)^T\), and \(\mathcal{L}\) the \(2\times2\) matrix defined as \[\mathcal{L} = \left[ \begin{array}{cc} (k^2-\kappa_p^2)D_p & |\frac{z_n}{z_p}|\kappa_p^2 D_p \\ |\frac{z_p}{z_n}|\kappa_n^2 D_n & (k^2-\kappa_n^2) D_n \\ \end{array} \right].\] The matrix \(\mathcal{L}\) can be further split as \(\mathcal{L} =-\mathcal{L}_0 + k^2 \mathcal{L}_1\), where \[\begin{aligned} \mathcal{L}_0 &&= \left[ \begin{array}{cc} \kappa_p^2 D_p &-|\frac{z_n}{z_p}|\kappa_p^2 D_p \\ -|\frac{z_p}{z_n}|\kappa_n^2 D_n & \kappa_n^2 D_n \\ \end{array} \right] \\ \mathcal{L}_1 &&= \left[ \begin{array}{cc} D_p & 0 \\ 0 & D_n \\ \end{array} \right], \end{aligned}\] These equations can be solved by a linear combination of the eigenvectors \(\begin{equation}\label{eq:eigen} \big[-\mathcal{L}_0 + k^2 \mathcal{L}_1 \big] \end{equation} The conditions\)\_p, n\^2 k\^2\(hold in the continuum limit, when either the domain size\)L\(or the charge concentration\)z\_\^2 c\_\(are sufficiently large. In this limit, the eigenvalue equation can be solved perturbatively by expanding\) Substitution of Eq. ([\[eq:expansion\]](#eq:expansion){reference-type="ref" reference="eq:expansion"}) into the eigenvalue equation Eq. ([\[eq:eigen\]](#eq:eigen){reference-type="ref" reference="eq:eigen"}) gives the zero-and second-order perturbation theory equations: where \(\mathbf{I}\) denotes the identity matrix. The solution to the order \(\mathcal{O}(k^2)\) is given by two real negative roots approximated as \(\lambda_1 \approx-\left((k^2+\kappa_p^2)D_p + (k^2+\kappa_n^2)D_n\right)+k^2 D_s(k)\) (fast decay) and \(\lambda_2 \approx-k^2 D_s(k)\) (slow decay). The collective diffusion coefficient of cation and anion pairs is defined as \[D_s(k) = \frac{(k^2 + \kappa_p^2 + \kappa_n^2)D_p D_n}{(k^2+\kappa_p^2)D_p + (k^2+\kappa_n^2)D_n},\] which has the same order as the diffusion coefficients \(D_{\alpha}\). The solutions of Eq. ([\[pnp_lin_k\]](#pnp_lin_k){reference-type="ref" reference="pnp_lin_k"}) with initial conditions \(\delta \hat{c}_p(\mathbf{k},0)\) and \(\delta \hat{c}_n(\mathbf{k},0)\) can be written as with the coefficients where the dimensionless parameters are defined as such that \(\alpha_p + \alpha_n = 1\). The fluctuations modeled by the above equations are transported and dissipated in time, and this can be shown via the time correlation of the fluctuating concentration field with different Fourier modes. The temporal correlations between species \(\alpha\) and \(\beta\) in the fluctuating concentration field are given by \[\Psi_{\alpha \beta} = \frac{\langle \delta \hat{c}_\alpha(\mathbf{k},t) \delta \hat{c}_\beta^{*}(\mathbf{k},0)\rangle}{\langle \delta \hat{c}_\alpha(\mathbf{k},0)\delta \hat{c}_\beta^{*}(\mathbf{k},0)\rangle},\] where the symbol \(^*\) denotes the complex conjugate. The temporal correlation function for specific ionic species can then be expressed as in which \(S_{p n}\) and \(S_{n p}\) are static structure factor-like terms for a wave vector \(\mathbf{k}\) defined as In this linearized theory, the covariance between the initial ionic concentration fluctuations of cation and anion are nonzero due to the charge neutrality constraint. The structure factor terms \(S_{p n}\) and \(S_{n p}\) can be obtained from experiment or more detailed simulations. The long time-behavior of both temporal auto-correlations and cross-correlations are dominated by slowly decaying terms that behave asymptotically as \(\exp(\lambda_2 t)\), where \(\lambda_2\) is one of the two (negative) eigenvalues. # Numerical Results {#sec:results} To validate the closed-form expressions of fluctuation correlations we derived based on linearized fluctuating hydrodynamic and electrokinetic equations in Section [2](#sec:theory){reference-type="ref" reference="sec:theory"}, we perform both all-atom MD simulations with explicit ions and mesoscale cDPD simulations with semi-implicit ions, as illustrated in figure [\[fig:1\]](#fig:1){reference-type="ref" reference="fig:1"}. We first carry out all-atom MD simulations of an aqueous NaCl solution in the bulk, which consists of 400 Na\(^+\) ions, 400 Cl\(^-\) ions, and 64000 H\(_2\)O water molecules in a periodic cubic computational domain with box size \(L = 12.8~{\rm nm}\). The mass density is \(\rho^0 = 0.616~{\rm amu~\AA^{-3}}\), and the ion concentration is \(c_{\pm} = 0.3168~{\rm M}\). The SPC/E model  is used for water molecules. The ionic force field terms are adopted from published work by  and. The particle-mesh Ewald method  is used for computing electrostatic interactions with vacuum periodic boundary conditions and a direct space cutoff of \(9.8~{\rm \AA}\). The bond length of water molecules is constrained using the SHAKE algorithm  to allow a time step of \(1~{\rm fs}\) in the velocity-Verlet integrator . A constant number-volume-temperature (NVT ensemble) system is simulated at \(T = 300~{\rm K}\) with a Nosé-Hoover thermostat. The system is relaxed for \(0.5~{\rm ns}\) to achieve a thermal equilibrium state, and then for up to \(10~{\rm ns}\) for statistics and sampling. In Section [2](#sec:theory){reference-type="ref" reference="sec:theory"}, we assumed that the mutual diffusion is small compared to ionic self-diffusion, and thus it can be ignored in the derivation. To confirm this assumption, we compute both self-diffusion and mutual-diffusion coefficients of ionic species from the MD velocity correlation functions via the Green-Kubo relationship . The computed self-diffusion coefficient is \(1.3\times10^{-9}~{\rm m^2/s}\) for Na\(^+\) and \(2.1 \times 10^{-9}~{\rm m^2/s}\) for Cl\(^{-}\), while their mutual-diffusion coefficient is \(1.2 \times 10^{-10}~{\rm m^2/s}\). These results are consistent with previous simulation and experimental results for NaCl solutions , and also confirm that the mutual-diffusion coefficient is much smaller than the self-diffusion coefficients in this electrolyte solution, and thus it can be ignored in the analytical derivations of current correlation functions presented in Section [2](#sec:theory){reference-type="ref" reference="sec:theory"}. Alternative to all-atom MD simulation, at the mesoscopic scale, a cDPD model is used to tackle the challenge of simulating coupled fluctuating hydrodynamics and electrostatics with long-range Coulomb interactions. The cDPD model is an extension of the classic DPD model to numerically solve the fluctuating hydrodynamics and electrokinetics equations in the Lagrangian framework. In classical DPD models, ions can be represented by explicit charged particles with electrostatic interactions between explicit ions. Groot  introduced a lattice to the DPD system to spread out the charges over the lattice nodes. Then, the long-range portion of the interaction potential was calculated by solving the Poisson equation on the grid based on a particle-particle particle-mesh (PPPM) algorithm  by transferring quantities (charges and forces) from the particles to the mesh and vice versa. Because the mesh defines a coarse-grained length for electrostatic interactions, correlation effects on length scales shorter than the mesh size cannot be properly accounted for. Although the particle-to-mesh then mesh-to-particle mapping/redistribution can solve the Poisson equation for particle-based systems, its dependence on a grid may contradict the original motivation for using a Lagrangian method, and additional computational complexity and inefficiencies are introduced. To abandon grids and use an unifying Lagrangian description for mesoscopic electrokinetic phenomena, we developed the cDPD model  to solve the Poisson equation on moving cDPD particles rather than grids. More specifically, cDPD describes the solvent explicitly in a coarse-grained sense as cDPD particles, while the ion species are described semi-implicitly, i.e., using a Lagrangian description of ionic concentration fields, associated with each moving cDPD particle, as shown in Fig. [\[fig:1\]](#fig:1){reference-type="ref" reference="fig:1"}(b), which provides a natural coupling between fluctuating electrostatics and hydrodynamics. The state vector of a cDPD particle can be written as \((\mathbf{r}, \mathbf{v}, c_{\alpha}, \phi)\), which is not only characterized by its position \(\mathbf{r}\) and velocity \(\mathbf{v}\) as in the classical DPD model, but also by ionic species concentration \(c_{\alpha}\) (with \(\alpha\) representing the \(\alpha\)th ion type) and electrostatic potential \(\phi\) on the particle. A cDPD system is simulated in a cubic periodic computational box with length of \(106.79~{\rm nm}\), where a cDPD particle is viewed as a coarse-grained fluid volume, which contains the solvent and other charged species. Exchange of the concentration flux of charged species occurs between neighboring cDPD particles, much like the momentum exchange in the classical DPD model. The governing equations of cDPD and model parameters are summarized in Appendix [\[sec:cdpd\]](#sec:cdpd){reference-type="ref" reference="sec:cdpd"}. We will perform cDPD simulations of electrolyte solutions and compute current correlation functions of fluctuating electrokinetics to compare with theoretical predictions given in Section [2](#sec:theory){reference-type="ref" reference="sec:theory"}. We first examine the local fluctuations of mass density, momentum density, charge density and ionic concentration. For each of these quantities, we construct the instantaneous function \(n(\mathbf{r})\) on a grid \(\mathbf{r}^{i,j,k}\) by spatial averaging using a step function \(W(r, h)\) with \(h\) being the grid size, i.e., \(W(r, h) = 1\) for \(|\mathbf{r}_i-\mathbf{r}|\le 0.5h\) and \(W(r, h) = 0\) for \(|\mathbf{r}_i-\mathbf{r}| > 0.5h\). Then the local quantities can be extracted by \(n(\mathbf{r}) = \sum_i^N W(|\mathbf{r}-\mathbf{r}_i|, h) n_i\) with \(h = 3.1~{\rm \AA}\) or \(h = 7.75~{\rm \AA}\) for MD data and \(h = 4.27~{\rm nm}\) for cDPD data. According to central limit theorem, the local fluctuations in these quantities of interest should be Gaussian in the continuum regime. This is observed for mass density, momentum density, charge density from both MD and cDPD results. However, the local concentration fluctuations for ionic species in the MD system follow Gamma distributions and converge to Gaussian with large spacing \(h\) as shown in Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"}(a). Because the cDPD model assumes that the random fluxes of ionic concentration between neighboring cDPD particles can be modeled by Gaussian white noises, the MD results indicate that the cDPD model is valid for length scales above a few nanometers but has a lower bound for its length scale. Fig. [\[fig:2\]](#fig:2){reference-type="ref" reference="fig:2"}(b) presents the probability distribution functions of local ionic concentration in cDPD simulations, which follow a Gaussian distribution as expected. The spatial correlation function (SCF) for physical quantities of interest \(n(\mathbf{r})\) are computed on the grid \(\mathbf{r}^{i,j,k}\) according to \[{\rm SCF}(\mathbf{r}) = \frac{1}{N(\mathbf{r})} \sum_{i=1}^{N(\mathbf{r})} \delta n(\mathbf{r}_i) \delta n(\mathbf{r}_i + \mathbf{r}),\] where \(N(\mathbf{r})\) is defined as a normalization coefficient. We have assumed that the spatial correlations are isotropic in weakly charged electrolyte bulk solutions. We observe that the spatial correlations of mass density, momentum density, charge density and ion concentration are all very short ranged (approximately delta-correlated for large systems), which is in agreement with continuum fluctuating hydrodynamics results at equilibrium. However, as shown in Fig. [\[fig:3\]](#fig:3){reference-type="ref" reference="fig:3"}, there is small-scale anti-correlation structure for the charge densities obtained in the MD simulations. We also compute the spatial correlation function of charge density in mesoscale cDPD simulations, and find similar small-scale anti-correlation structures for both positive and negative ions, as shown in Fig. [\[fig:4\]](#fig:4){reference-type="ref" reference="fig:4"}. These anti-correlation structures are observed on length scales comparable to the Bjerrum and Debye lengths for electrolyte solution systems, suggesting that it could be related to ionic screening effect. The temporal correlation function (TCF) between two physical quantities \(u\) and \(w\) in Fourier space is defined by \[{\rm TCF}_k(t)=\langle u(\mathbf{k},t) w(\mathbf{k}, 0)\rangle = \frac{1}{N(t)} \sum_{s=1}^{N(t)} \hat{u}(\mathbf{k}, t) \hat{w}(\mathbf{k}, 0),\nonumber\] where \(\mathbf{k}\) is the wave vector in Fourier mode, \(\displaystyle \hat{u}\), \(\hat{w}\) are the Fourier components directly computed from particle trajectories as \[\hat{u}(\mathbf{k},t) = \frac{1}{N_P} \sum_{i=1}^{N_P} u_i(\mathbf{r}_i, t) \exp(-i \mathbf{k}\cdot\mathbf{r}_i(t)).\nonumber\] We use a wave length equals the computational box size \(L\) by setting \(k=2\pi/L\), which is \(12.8~{\rm nm}\) for the MD system and \(106.79~{\rm nm}\) for the cDPD system. Figs. [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"}(a) and [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"}(b) present the temporal velocity auto-correlation functions from MD and cDPD simulations, respectively. The theoretical predication based on Eq. ([\[eq:ns_correlation\]](#eq:ns_correlation){reference-type="ref" reference="eq:ns_correlation"}) gives \({\rm CF}_v(t)=\exp(-0.1616t)\) (shear mode) and \({\rm CF}_v(t)=\exp(-0.2403t)\cos(0.7352t)\) (sound mode) for the MD system, and \({\rm CF}_v(t)=\exp(-0.0216t)\) (shear mode) and \({\rm CF}_v(t)=\exp(-0.0238t)\cos(0.2177t)\) (sound mode) for the cDPD system. It can be observed from Fig. [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"} that the computed results from both MD and DPD simulations are in agreement with the classical linearized theory of fluctuating hydrodynamics, i.e., the transverse autocorrelation function (shear mode) decays as \(\exp(-\nu k^2 t)\), with \(\nu\) the kinematic shear viscosity, while the longitudinal autocorrelation function (sound mode) decays as \(\exp(-\Gamma_T k^2 t)\cos(c_s k t)\), with \(\Gamma_T = 2\nu/3 + \zeta/2\rho\) the sound absorption coefficient and \(c_s\) the isothermal sound speed. We conclude that the fluctuating hydrodynamics model still follows the classical linearized theory, and is not explicitly affected by the electrolyte bulk solutions. In an electrolyte solution in thermodynamic equilibrium, the fluctuating hydrodynamics and electrokinetics are explicitly decoupled. Next, we compare the auto-correlation and cross-correlation functions of charge concentration with the linearized theory derived above, as shown in Fig. [\[fig:6\]](#fig:6){reference-type="ref" reference="fig:6"}. We fit the MD and DPD results with the linearized theory in the form of Eq. ([\[eq:TCF\]](#eq:TCF){reference-type="ref" reference="eq:TCF"}) with proper structure factors \(S_{p n}\) and \(S_{n p }\), which are around \(1.0\) and system dependent, i.e., with \(\lambda_1 =-7.4187\times10^{-3}\) and \(\lambda_2 =-3.9067\times10^{-4}\) for the MD system, and with \(\lambda_1 =-3.4446\times10^{-3}\) and \(\lambda_2 =-8.10\times10^{-4}\) for the cDPD system. We observe in Fig. [\[fig:6\]](#fig:6){reference-type="ref" reference="fig:6"} that the computed results of temporal correlation functions from both MD and DPD simulations are in good agreement with the theoretical predictions derived from linearized theory of fluctuating hydrodynamics. Compared to the temporal correlation functions of hydrodynamic fluctuations presented in Fig. [\[fig:5\]](#fig:5){reference-type="ref" reference="fig:5"}, the temporal correlations of charge concentration fluctuations shown in Fig. [\[fig:6\]](#fig:6){reference-type="ref" reference="fig:6"} decay extremely slowly over time. The long time behavior of both auto-correlation and cross-correlation follow the slow decay dominated by \(\propto \exp(\lambda_2 t)\), which is significantly different from the decorrelation processes of hydrodynamic fluctuations. # Summary {#sec:summary} We have presented theoretical closed-form expressions for the fluctuations of electrolyte bulk solution close to thermodynamic equilibrium with an emphasis on mesoscopic spatiotemporal scales. In particular, we started with the Landau-Lifshitz theory and linearized the fluctuating hydrodynamic and electrokinetic equations to derive analytical solutions for current correlation functions using perturbation theory. To validate these theoretical expressions obtained based on the linearized theory, we performed numerical experiments of fluctuating hydrodynamics and electrokinetics for electrolyte solutions using both all-atom molecular dynamics (MD) and a mesoscale charged dissipative particle dynamics (cDPD) methods. We presented both MD and DPD simulation results of bulk electrolyte solutions in about 10 nm and 100 nm scales, which are directly compared with the predictions from the linearized continuum theory. The current correlation functions computed from both MD and cDPD trajectories indicate that the temporal correlations of fluctuations from electrokinetics decay much more slowly than those from hydrodynamics, which agree well with the predictions made by the theoretical closed-form expressions of temporal correlation functions (hydrodynamics and charge) as well as the vast differences in decay time--varying by a few orders of magnitude. In a bulk electrolyte solution close to thermodynamic equilibrium, the fluctuating hydrodynamics and electrokinetics are explicitly decoupled because of the zero mean velocity, and thus their behavior is not explicitly dependent on the electrolyte concentrations in the dilute regime. At length scales above 10 nm, the results obtained from both MD and cDPD simulations are in good agreement with the continuum-limit linearized theories. Spatial correlations of charge density demonstrate finite range and non-trivial structure at nanometer length scales but can be viewed as the delta function in the continuum limit. Simulation results also show that the fluctuations of local ionic concentration follow Gamma distribution at small length scales, while converge to Gaussian distribution in the continuum limit, which suggests the existence of a lower-bound of length scale for mesoscale models using Gaussian fluctuations for electrolyte solutions. It is worth noting that the present work focused on dilute electrolyte solutions close to thermodynamic equilibrium, where the mutual-diffusion of ions is small compared to their self-diffusion and the fluctuating electrokinetics is decoupled from zero-mean hydrodynamic fluxes. When the mutual diffusion coefficients of ions become comparable to the self-diffusion terms in concentrated electrolyte solutions , the contribution of mutual-diffusion on ionic transport should be correctly considered in the fluctuating hydrodynamics and electrokinetics equations. It is also interesting to consider how the fluctuating hydrodynamics is coupled with mesoscale electrokinetics in shear flows, where the current correction functions can be affected by the coupling between fluctuating terms and advection processes , leading to orientation-dependent decorrelation process of fluctuating variables in the fluid system.
{'timestamp': '2021-07-14T02:04:32', 'yymm': '2107', 'arxiv_id': '2107.05733', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05733'}
# Conclusions and Future Applications We conduct a battery of grasp simulations on 3D deformable objects and analyze grasp outcomes across performance metrics. We propose grasp features and demonstrate their ability to predict the performance metrics. Our physical experiments also validate the accuracy of our large-scale simulations. We release our dataset of \(1.1M\) measurements for further study, along with software that executes our experiments on arbitrary objects and material parameters. Based on our analysis of object primitives, we also identify several fundamental physical trends. We direct the reader to Appendix [6](#primitives){reference-type="ref" reference="primitives"} for these findings. For future work, DefGraspSim can be used to: - Study new, high-dimensional features and metrics (e.g., geometric encoding of object shape and contact patch, full stress distributions, etc.), since raw nodal data is accessible within DefGraspSim - Scale up grasping experiments to create task-oriented planners (e.g., to minimize deformation during transport) - Perform rigorous, direct comparisons between simulation and reality on custom objects of interest - Extend vision-based measurements from RGB-D images to interface with real sensors - Complement real-world system identification (e.g. tactile probing or visual shape completion) - Improve grasp planning robustness to uncertainty in object properties (e.g., via domain randomization) # Introduction From clothing, to plastic bottles, to humans, deformable objects are omnipresent in our world. A large subset of these are *3D deformable objects* (e.g., fruits, internal organs, and flexible containers), for which dimensions along all 3 spatial axes are of similar magnitude, and significant deformations can occur along any of them. Robotic grasping of 3D deformables is underexplored relative to rope and cloth, but is critical for applications like food handling, robotic surgery, and domestic tasks. Compared to rigid objects, grasping 3D deformable objects faces 4 major challenges. First, classical analytical metrics for grasping rigid objects (e.g., force/form closure) do not typically consider deformation of the object during or after the grasp. Yet, deformations significantly impact the contact surface and object dynamics. Second, existing grasp strategies for rigid objects may not directly transfer to 3D deformables, as compliance can augment or reduce the set of feasible grasps. For example, we may grasp a soft toy haphazardly; however, if the toy were rigid, it would no longer conform to our hands, and many grasps may become unstable. Conversely, we may grasp a rigid container haphazardly; however, if the container were flexible, grasps along its faces may crush its contents. Third, the definition of a successful grasp on a 3D deformable is highly dependent on object properties, such as fragility and compliance. Thus, grasp outcomes must be quantified by diverse *performance metrics*, such as stress, deformation, and stability. Performance metrics may also compete (e.g., a stable grasp may induce high deformation). Fourth, performance metrics may be partially or fully unobservable (e.g., volumetric stress fields), requiring estimation in the real world. Previous works have typically formulated *quality metrics*, which we refer to more generally as *grasp features*: simple quantities that a robot can measure before pickup that can predict performance metrics. Whereas many grasp features have been proposed for rigid objects, analogous features for deformable objects are limited. Given these complexities, we conduct a large-scale simulation-based study of 3D deformable object grasping (Fig. [\[fig:front_figure\]](#fig:front_figure){reference-type="ref" reference="fig:front_figure"}). Simulation affords multiple advantages: it extends analytical methods through accurate modeling of object deformation, enables safe execution of experiments, and provides full observability of performance metrics. For an overview of existing literature on deformable object modeling, grasp performance metrics, and grasp features, see **Appendix [13](#app:related_works){reference-type="ref" reference="app:related_works"}**. We then leverage the corotational finite element method (FEM) to conduct several thousand grasping simulations on 3D deformables varying in geometry and elasticity. First, we simulate grasping on 6 object primitives; for each primitive, we methodically describe the effects of different grasps on performance metrics, and quantify the ability of each feature to predict each metric. Given the small number of prior works on grasping 3D deformables, this examination of primitives establishes valuable physical intuition. Furthermore, we provide our live dataset of 34 objects, 6800 grasp evaluations, and \(1.1M\) corresponding measurements. We also release our codebase, which can automatically perform our exhaustive set of FEM-based grasp evaluations on 3D objects of the user's choice. Finally, we provide an interactive visualizer of our results and a video of our simulated and real-world experiments.[^1] We believe these contributions are an important conceptual and practical first step towards developing a complete learning and planning framework for grasping 3D deformables. # SIMULATION-BASED TESTBED # Grasp Simulator and Experiments {#sim} We use Isaac Gym to simulate grasps of the widely-used Franka parallel-jaw gripper on 3D deformable objects. To generalize to other parallel-jaw grippers, proprietary gripper features are removed. The 3D deformables consist of 34 object primitives and real-world models, with geometry and dimensionality distributed across a broad categorization (Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}), and elastic moduli distributed from \(10^4\) to \(10^9\) \(Pa\) (i.e., human skin to hard plastic). The deformables are represented as tetrahedral meshes and simulated using 3D co-rotational FEM, with resulting equations solved using a GPU-based Newton method; a recent study has validated the simulator accuracy. Addressing the limitations of classical analytical approaches, the simulator explicitly models complex object geometry, object deformation, gripper-object dynamics, and large perturbations. Simulations execute at \(5\)-\(10\) \(fps\), and in total, the dataset required 2080 GPU hours. Further details on the simulator itself are in **Appendix [10](#appendix_sim){reference-type="ref" reference="appendix_sim"}**. Within Isaac Gym, we perform grasping experiments on 34 objects using a simulated Franka parallel-jaw gripper. For each object, a diverse set of 50 candidate grasps is generated using an antipodal sampler . For each grasp, 4 tests are executed: *pickup, reorientation, linear acceleration, and angular acceleration*. Details of each test are in **Appendix [9](#appendix_experiment){reference-type="ref" reference="appendix_experiment"}**. # Grasp Performance Metrics and Features {#sec:metrics} During the preceeding experiments, we measure 7 performance metrics to evaluate grasp outcomes, and 7 grasp features that correlate with the metrics. Details and motivation for these quantities are in **Appendix [12](#app:performance_metrics){reference-type="ref" reference="app:performance_metrics"}**. Metrics: - Pickup success - Stress - Deformation - Strain energy - Linear instability - Angular instability - Def. controllability Features: - Contact patch distance to centroid - Contact patch perpendicular distance to centroid - Number of contact points - Contact patch distance to finger edge - Gripper squeezing distance - Gripper separation - Alignment with gravity # Grasp Performance on Primitives {#primitives} This section presents detailed grasping results for 6 of the 9 object primitives (Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}) over a wide range of elastic moduli, and uses physical reasoning to interpret the relationships between metrics and features. Each primitive abstracts a large set of real-world objects. The *rectangular prism* primitive represents objects such as sponges, tofu, and rubber blocks. The *spheroid* primitive is an ellipse revolved about its major axis; it represents objects such as rounded fruits and rubber balls. The *cup* and *ring* primitives have the same geometry, but the ring lacks a base. Cups have direct real-world analogues; rings represent objects such as flexible tubing and gaskets. The geometric stiffness profile of a cup varies with height, whereas that of a ring does not; however, both objects behave differently between side grasps and top-bottom grasps. The *hollow flask* primitive has an ellipsoidal cross section and represents objects such as boxes and bottles. The *cylinder* primitive represents objects such as bananas and rubber tubes. We divide our analysis into two sections. We first showcase the types of grasps that produce low and high values for the performance metrics defined in Sec. [5](#sec:metrics){reference-type="ref" reference="sec:metrics"}. We then evaluate the ability of the grasp features defined in Sec. [\[sec:features\]](#sec:features){reference-type="ref" reference="sec:features"} to predict these metrics. Additional visualizations are provided on our website. ## Performance Metric Results **Stress and Deformation Metrics.** We first examine the stress and deformation responses, which follow similar (but not identical) trends. For the prism and spheroid, grasps with low values for maximum stress and deformation consistently squeeze along the shortest dimension (Fig. [\[fig:rect_sd\]](#fig:rect_sd){reference-type="ref" reference="fig:rect_sd"} and Fig. [\[fig:spheroid_grasps\]](#fig:spheroid_grasps){reference-type="ref" reference="fig:spheroid_grasps"}ab). In this configuration, the gripper achieves the highest contact area, lowering compressive stress. Furthermore, the smallest amount of material is between the gripper fingers; analogous to springs in series, a smaller material thickness has a higher equivalent stiffness, reducing deformation. For the prism, grasps with the highest values for maximum stress consistently squeeze along the long axis. The object tends to buckle, increasing bending stress. However, grasps with the highest values for maximum deformation vary with \(E\) (Fig. [\[fig:rect_sd\]](#fig:rect_sd){reference-type="ref" reference="fig:rect_sd"}c). The highest-valued grasps at \(E{=}\{2e6, 2e9\}\) squeeze the end of the prism, allowing cantilever bending under gravity. For the cup, grasps with low values for maximum stress and deformation squeeze along its height, contacting its base and covering its opening (Fig. [\[fig:cup_sd\]](#fig:cup_sd){reference-type="ref" reference="fig:cup_sd"}). In this configuration, the compressive stiffness of the cup is highest, reducing deformation and stress for a given applied force. Grasps with the highest maximum stress and deformation squeeze the sides of the cup near the lip. In this configuration, the cup has the lowest geometric stiffness, increasing deformation and stress. However, additional cases reveal further nuances of grasping cups. In particular, grasps that squeeze the cup on opposite sides of the base induce high stress due to small contact area, but low deformation due to high geometric stiffness (Fig. [\[fig:cup_sd\]](#fig:cup_sd){reference-type="ref" reference="fig:cup_sd"}c). For the ring and flask, grasps with the low values for maximum stress and deformation are top-bottom grasps; as with the cup, in this configuration, the compressive stiffness of these objects is highest, reducing these metrics (Fig. [\[fig:ring_grasps\]](#fig:ring_grasps){reference-type="ref" reference="fig:ring_grasps"}ab and Fig. [\[fig:flask_grasps\]](#fig:flask_grasps){reference-type="ref" reference="fig:flask_grasps"}a). On the other hand, grasps with high values for maximum stress and deformation are side grasps. In this configuration, the ring has the lowest geometric stiffness, allowing buckling and collapse, increasing both bending/compressive stress and deformation. For the flask, the high-stress grasps and high-deformation side grasps occur at slightly different locations. The high-stress grasps squeeze regions with high curvature and low contact area, increasing compressive stress (Fig. [\[fig:flask_grasps\]](#fig:flask_grasps){reference-type="ref" reference="fig:flask_grasps"}a). As with the cup and ring, the high-deformation grasps squeeze in configurations with the lowest geometric stiffness (i.e., perpendicular to the flask face) (Fig. [\[fig:flask_grasps\]](#fig:flask_grasps){reference-type="ref" reference="fig:flask_grasps"}b). For the cylinder, grasps with low stress and deformation squeeze along the long axis. In this configuration, the gripper achieves the highest contact area and least thickness between its fingers, lowering compressive stress and deformation (Fig. [\[fig:cylinder_grasps\]](#fig:cylinder_grasps){reference-type="ref" reference="fig:cylinder_grasps"}a-b). On the other hand, grasps with high stress and deformation pinch the ends or middle. The gripper has minimal contact area, increasing compressive stress, and bending deformations are minimally restricted, increasing deformation. **Controllability and Instability Metrics.** We now examine the deformation controllability and linear/angular instability results. For the prism, spheroid, and cylinder, grasps with the highest values for all three of these metrics tend to squeeze the ends of the object. (Fig. [\[fig:rect_ci\]](#fig:rect_ci){reference-type="ref" reference="fig:rect_ci"}a-c, Fig. [\[fig:spheroid_grasps\]](#fig:spheroid_grasps){reference-type="ref" reference="fig:spheroid_grasps"}c, and Fig. [\[fig:cylinder_grasps\]](#fig:cylinder_grasps){reference-type="ref" reference="fig:cylinder_grasps"}c). Here, the gripper allows cantilever bending with a maximally long moment arm, maximizing deformation controllability (i.e., deformation under reorientation). In addition, the gripper is maximally close to losing contact with the object under displacement perturbation, increasing linear and angular instability. For the cylinder, these grasps also coincide with those for the highest values for maximum stress and deformation. For the cup, grasps with low values for deformation controllability and linear and angular instability tend to make substantial contact with the object, particularly its base (Fig. [\[fig:cup_ci\]](#fig:cup_ci){reference-type="ref" reference="fig:cup_ci"} top). In this configuration, the gripper constrains the degrees of freedom of the object, reducing controllability; furthermore, the gripper contacts locally stiff regions, enabling fast response to dynamic perturbations and reducing instability. For the ring and flask, grasps with the highest values for deformation controllability and linear and angular instability have small amounts of material between the gripper fingers. In this configuration, the gripper exposes more degrees of freedom of the object, increasing deformation under reorientation and sensitivity to displacement perturbation. For example, for the flask, high-valued grasps squeeze along the shortest axis on areas with high curvature (not depicted). Conversely, grasps with the lowest deformation controllability and linear and angular instability have large amounts of material between the gripper fingers. In this configuration, the gripper restricts more degrees of freedom. For example, for the ring, low-valued grasps squeeze along the side of the ring towards the ring's central axis, leaving only a small surface uncontacted. ## Feature Importance and Predictive Power For each primitive with a specified elastic modulus (\(E\)), we evaluate 7 grasp features and 7 performance metrics for all grasps. We then examine the power of the features to predict the metrics. For each continuous-valued performance metric (i.e., all metrics except pickup success), we build a random forest classifier. The classifier takes as input the grasp features, and outputs whether the corresponding grasp belongs to the top or bottom 30th percentile of all grasps, ranked by their metric values; binary classification is performed because separating the two extremes reveals highly interpretable physical trends. We use random forests for their ability to handle relatively small training sets, as well as their prior successes in predicting grasp outcomes . The predictive power of each grasp feature is then quantified as its Gini impurity-based importance. For each performance metric, we initially trained separate classifiers for each \(E\); however, the relative feature importances were qualitatively similar over all moduli. We thus combine grasp samples across all \(E\) to train one model per metric and simply add \(E\) as a feature. Fig. [\[fig:imps\]](#fig:imps){reference-type="ref" reference="fig:imps"} depicts the feature importance of the resulting classification models; critically, the importance of each feature varies across the primitives and metrics. For the prism and spheroid, the \(pure\_dist\) feature has the highest importance for all metrics. This aligns with our observation that for the grasps with the highest values for each performance metric, the gripper tends to squeeze the ends of the object. However, \(perp\_dist\) is also an important feature for angular instability on the prism, and is the most important feature for this metric on the spheroid. Rotational perturbations are centered between the fingertips, and \(perp\_dist\) directly captures the length of the moment arm. Between the prism and spheroid, a key difference is that the pickup success rate for the spheroid drops dramatically from \(90\%\) at \(E{=}2e6\) to \(12\%\) at \(E=2e9\). The ring, cup, and cylinder also experience a drop in pickup success at high \(E\). When these rounded objects are stiff, the gripper becomes unable to induce deformation and generate sufficient contact area upon squeezing; thus, grasps such as those in the bottom row of Fig. [\[fig:spheroid_grasps\]](#fig:spheroid_grasps){reference-type="ref" reference="fig:spheroid_grasps"}c easily drive the object out of the gripper. For the cup, \(grav\_align\) has the highest importance for predicting maximum stress. This aligns with our observation that the grasps with the lowest maximum stress are all top-bottom grasps. In addition, \(squeeze\_dist\) is most important for predicting maximum deformation. As the gripper squeezes the object, this feature directly characterizes the stiffness of the material between the fingers. In contrast to the prism and spheroid, \(perp\_dist\) has substantially higher importance than \(pure\_dist\) for predicting deformation controllability and instability. When the gripper squeezes the cup, \(perp\_dist\) stably measure of the distance between the gripper and the opening of the cup, which is critical for controllability and stability. However, \(pure\_dist\) changes substantially, regardless of how far the gripper is from the opening. For the ring, \(grav\_align\) feature has the highest importance for predicting all deformation-related metrics. Although the deformations induced by side grasps on a cup vary based on height (i.e., side grasps at the base induce less deformation than at the opening), all side grasps on the ring induce high deformation. Thus, the grasps with the lowest and highest values for deformation-related metrics are best distinguished by whether they are top-bottom or side grasps, and \(grav\_align\) precisely captures this. In addition, \(edge\_dist\) and \(num\_contacts\) have high importance for predicting deformation controllability. This aligns with our observation that the amount of material squeezed by the gripper greatly influences controllability. This quantity depends on both \(edge\_dist\) (distance between contact patch and gripper finger edge) and \(num\_contacts\) (contact area). As with the cup, \(perp\_dist\) is most important for predicting linear and angular instability. For the flask, \(gripper\_sep\) has the highest importance for predicting maximum stress. As with the ring, the grasps with the lowest and highest stress are distinguished by whether they are top-bottom or side grasps. In addition, as with the cup, \(squeeze\_dist\) is most important for predicting deformation Finally, \(edge\_dist\) is dominant for predicting linear and angular instability. This feature quantifies the physical displacement required for the object to lose contact with the gripper. For the cylinder, \(edge\_dist\) has the highest importance for predicting maximum stress and deformation. On this geometry, this feature quantifies how strongly the grasp pinches the ends or middle of the object. In addition, \(pure\_dist\) and \(perp\_dist\) are highly correlated (\(R\)=0.99); all candidate grasps squeeze perpendicular to the long axis of the cylinder, resulting in negligible difference between the two features. These features are most important for predicting deformation controllability. They quantify the distance of the gripper to the ends of the object, determining the moment arm for bending. ## Fundamental Trends Based on our analysis of object primitives, we identify several fundamental trends. Stress is high for low gripper-object contact area or when inducing object buckling; deformation is high for low object geometric stiffness. While stress and deformation are related, high-stress and high-deformation grasps can be dissimilar (e.g. Fig. [\[fig:cup_sd\]](#fig:cup_sd){reference-type="ref" reference="fig:cup_sd"}). Instability and deformation controllability are maximized when the gripper contacts one end of the object, as the object can be displaced or exhibit gravity-induced deformation. Our importance analyses also consistently identify features that predict these metrics and agree with physical reasoning. Although elastic modulus impacts the set of successful grasps (e.g., failure for stiff versions of rounded objects), it does not substantially impact how grasps rank according to the metrics. # Grasp Performance on Primitives {#primitives_shortened} In **Appendix [6](#primitives){reference-type="ref" reference="primitives"}**, we show grasping results for 6 of 9 object primitives (Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}) over a wide range of elastic moduli, and use physical reasoning to interpret the relationships between metrics and features. Example results of various metrics on a cup are visualized in Fig. [\[fig:cup_shortened\]](#fig:cup_shortened){reference-type="ref" reference="fig:cup_shortened"}. An analysis of grasp feature importance in predicting these metrics is also performed. # Sim-to-Real Accuracy We compare simulated and real-world grasp responses, and demonstrate that grasps performed on simulated blocks of tofu and latex tubing induce highly analogous responses on their real-world counterparts. All material parameters in simulation are acquired from reported values of common materials, and *are not tuned to match the real outcomes*. Example correspondences are shown in Fig. [\[fig:hollow_tube_grasps_shortened\]](#fig:hollow_tube_grasps_shortened){reference-type="ref" reference="fig:hollow_tube_grasps_shortened"}, with details in **Appendix [14](#app:sim2real){reference-type="ref" reference="app:sim2real"}**. # Experimental Simulation Details {#appendix_experiment} For completeness and the ability to replicate our work we now explain additional details and settings used in our simulation-based experiments. We visualize the tests in Figure [\[fig:grasp_tests\]](#fig:grasp_tests){reference-type="ref" reference="fig:grasp_tests"}. Each object initially rests atop a horizontal plane; gripper collisions with the plane are disabled, as we want to test the full spatial distribution of grasps by allowing grasps to come from underneath regardless of collisions that would occur in the real world. Prior to grasping, the pre-contact nodal positions and element stresses of the object are recorded. The gripper is then initialized at a candidate grasp pose. The gripper squeezes using a force-based torque controller to achieve \(F_p\), with a low-pass filter applied to contact forces to mitigate numerical fluctuations. Once \(F_p\) converges, the grasp features are measured. Then, one of the tests listed in Section [\[sec:sim-experiments\]](#sec:sim-experiments){reference-type="ref" reference="sec:sim-experiments"} is executed depending on the performance metric to be evaluated. **Pickup**. The platform is lowered to apply incremental gravitational loading to the object. Pickup is a success if the gripper maintains contact with the object for 5 seconds. If so, stress and deformation fields are recorded, and stress, deformation, and strain energy performance metrics are computed. **Reorientation**. The gripper squeezing force is increased from \(F_{p}\) to \(F_{slip}\), the minimum force required to counteract rotational slip. The platform is lowered until the object is picked up. The gripper rotates the object to 64 unique reorientation states. Stress and deformation fields are recorded at each state, and deformation controllability is computed as the maximum deformation over all states. \(F_{slip}\) is estimated by approximating each gripper contact patch as 2 point-contacts that oppose the gravitational moment. The gripper rotates the object about each of 16 vectors regularly spaced in a unit 2-sphere at angles \(k\pi/4, k \in [1..4]\) for a total of 64 unique reorientation states. **Linear acceleration**. The gripper linearly accelerates along the 16 unique direction vectors as in the reorientation test. Each vector has a complement pointing in the opposite direction; thus, this method generalizes the cyclic shaking tests from previous works . The acceleration is recorded at which at least one finger loses contact with the object. Linear instability is computed as the average loss-of-contact acceleration over all directions. The robot moves at at \(1000 \frac{m}{s}^3\) jerk in a gravity-free environment, corresponding to a linearly increasing acceleration. We impose a realistic upper acceleration limit of \(50 \frac{m}{s}^2\) (\(\approx 5g\)). **Angular acceleration**. The gripper now rotationally accelerates about 16 unique axes. Angular instability is computed as the average loss-of-contact acceleration over all axes. The robot accelerates at \(2500 \frac{rad}{s}^3\) jerk; to mitigate undesired linear acceleration, the midpoint between the fingers is set as the center of rotation. The angular loss-of-contact threshold is limited at \(1000 \frac{rad}{s}^2\) (i.e., the linear acceleration limit, scaled by the \(0.04 m\) maximum finger displacement, which approximates the moment arm). **Controller Details.** A contact force-based torque controller is used to achieve the desired squeezing forces during grasping. A low-pass filter is first applied to the contact force signals due to high frequency noise that prevails from small numerical fluctuations in position, especially at higher moduli. For the three tests involving post-pickup manipulation, the finger joints are frozen immediately after pickup to maintain the gripper separation. # Finite Element Simulation Details {#appendix_sim} FEM is a variational numerical technique that divides complex geometrical domains into simple subregions and solves the weak form of the governing partial differential equations over each region. In FEM simulation, a deformable object is represented by a volumetric mesh of *elements*; the object's configuration is described by the element vertices, known as *nodes*. We use Isaac Gym's co-rotational linear constitutive model of the object's internal dynamics coupled to a rigid-body representation of the robotic gripper via an isotropic Coulomb contact model . A GPU-based Newton method performs implicit integration by solving a nonlinear complementarity problem . Unlike classical analytical models, this technique explicitly models complex object and gripper geometry, deformation and dynamics, as well as large kinematic and kinetic perturbations. At each timestep, the simulator returns element stress tensors and nodal positions, which are used to calculate grasp metrics. With sufficiently small timesteps and high mesh density, FEM predictions for deformable solids can be extremely accurate. We simulate at the high frequency of \(1500 Hz\) resulting in experiments running at 5-10 frames per second. In total, the dataset for this paper required approximately 1400 GPU hours to generate. We evaluate a set of 23 3D deformable objects comprising both simple object primitives and complex real-world models, categorized by geometry and dimension (Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}). We process object surface meshes in Blender to smooth sharp edges and reduce node count, then convert them into tetrahedral meshes using fTetWild. All objects have homogeneous material properties due to current limitations of Isaac Gym. Objects have density \(\rho = 1000 \frac{kg}{m^3}\), Poisson's ratio \(\nu = 0.3\), coefficient of friction \(\mu = 0.7\), and Young's modulus \(E \in \mathcal{E} = \{2e4, 2e5, 2e6, 2e9\} Pa\). \(\mathcal{E}\) covers a wide range of real materials, from human skin (\(\sim\[10^4 Pa\)) to ABS plastic (\(\sim\]10^9 Pa\)). Values below \(\sim\[10^3 Pa\) are excluded due to increased interpenetration effects, as are values above \(\sim\]10^9 Pa\) due to no substantial differences arising. The desired squeezing force on an object is \(F_{p} = 1.3 \times \frac{mg}{\mu}\) (where \(m\) is mass and \(g\) is gravity), the frictional force required to support the object's weight with a factor of safety. For a fixed \(E\), increasing \(\mu\) decreases \(F_p\) as well as the induced deformation. This effect is essentially the same as if \(\mu\) is fixed while \(E\) is increased, since an elastically stiffer object will also deform less for the same \(F_p\) applied. Thus, we fix \(\mu\) and vary \(E\). # Grasp Feature Details {#app:grasp_features} The 7 grasp features are recorded after applying the grasping force \(F_p\), but before pickup. They can all be measured by common sensors (e.g., encoders, cameras, and tactile arrays). They are summarized in Table [\[tab:1\]](#tab:1){reference-type="ref" reference="tab:1"}, along with examples of references to existing works from which they are derived. Please refer to for a full review of grasp features on rigid objects. # Performance Metric Details {#app:performance_metrics} **Pickup success:** A binary metric measuring whether an object is lifted from a support plane. **Stress:** The element-wise stress field of an object when picked up. Exceeding material thresholds (e.g., yield stress, ultimate stress) leads to permanent deformation, damage, or fracture; examples include creasing of boxes, bruising of fruit, and perforation of organs. We convert each element's stress tensor into von Mises stress, a scalar quantity that quantifies whether an element has exceeded its yield threshold. We then measure the maximum stress over all elements, since real-world applications typically aim to avoid damage at any point. **Deformation:** The node-wise displacement field of the object from pre-to post-pickup, neglecting rigid-body transformations. Deformation must often be minimized (e.g., on flexible containers with contents that can be damaged or dislodged). To compute this field, the difference between the pre-and post-pickup nodal positions is calculated, the closest rigid transform is determined, and the transform is subtracted. We compute the \(\ell^2\) norm of each node's displacement and measure the maximum value over all nodes. **Strain energy:** The elastic potential energy stored in the object (analogous to a Hookean spring). Conveniently, this metric penalizes both stress and deformation. The strain energy is given by \(U_e = \int_V \sigma^T \epsilon dV\), where \(\sigma\), \(\epsilon\), and \(V\) are the stress tensor, strain tensor, and volume, respectively. **Linear and angular instability:** We define instability as the minimum acceleration applied to the gripper (*along* or *about* a vector for linear and angular instability, respectively) at which the object loses contact (i.e., separates along the gripper normal, or slides out of the gripper). This measures how easily an object is displaced from the grasp under external forces. **Deformation controllability:** We define deformation controllability as the maximum deformation when the object is reoriented under gravity (e.g., an illustration of an example object's shape changes induced during reorientation under gravity is pictured in Fig. [\[fig:def_banana\]](#fig:def_banana){reference-type="ref" reference="fig:def_banana"}). Depending on the task, it may be useful to either minimize or maximize deformation controllability. For example, to reduce the effects of post-grasp reorientation on deformation, minimizing this metric allows the object to behave rigidly after pickup. Alternatively, to augment the effects of post-grasp reorientation (e.g., during insertion of endoscopes), we may maximize it instead. Our notion of deformation controllability is different from the classical notion (i.e., the ability to achieve any robot state in finite time). Here, we are not modifying robot controllability by changing actuation, but modifying object controllability by changing the number of possible deformation states. # Related Work {#app:related_works} **Modeling techniques**. With over three decades of development, methods in rigid-object grasp planning range from model-based approaches using exact geometries to data-driven approaches without full models. Rigid-body grasping simulators such as GraspIt!  and OpenGRASP  have been used to develop many of these algorithms. Libraries like Bullet  and MuJoCo  can also model deformable ropes and cloths using rigid-body networks with compliant constraints. Such simulators have enabled real-world success in rope tying, string insertion, cloth folding, and dressing. For 3D deformable objects, rigid-body approximations can lead to efficient simulations; however, continuum models are preferred, as they can represent large deformations and allow consistent material parameters without an explicit model-fitting stage. 3D continuum models include Kelvin-Voigt elements governed by nonlinear PDEs , mass-spring models , 2D FEM for planar and ring-like objects , and gold-standard 3D FEM . However, many powerful FEM simulators used in engineering and graphics (e.g., Vega ) do not feature infrastructure for robotic control, such as built-in joint control. For comprehensive reviews of 3D deformable modeling techniques, please refer to. **Performance metrics**. Prior works have evaluated 3D deformable-object grasps using performance metrics based on pickup success, strain energy, deformation, and stress. Success-based metrics include the minimal squeezing force required by a particular grasp, which can be calculated via real-world iterative search  and FEM . Success is dependent on both object geometry and stiffness (e.g., a cone can be picked up only when soft enough to deform to the gripper). Metrics based on strain energy (i.e., elastic potential energy stored in the object) have served as proxies for an object's stability against external wrenches. In 2D the *deform* closure metric generalizes rigid form closure and quantifies the positive work required to release an object from a grasp. It is optimized by maximizing strain energy without inducing plastic deformation. Similarly, for thin and planar 2.5D objects, grasps have been selected to maximize strain energy under a fixed squeezing distance . Deformation-based metrics have also been proposed for cups and bottles to detect whether contents are dislodged during lifting and rotation. Finally, stress-based metrics have been proposed to avoid material fracture, but were evaluated only on rigid objects. **Grasp features**. Many grasp features to predict grasp performance have been previously investigated on rigid objects. Features include force and form closure and grasp polygon area, and their predictive accuracy has been tested under different classification models. A thorough survey in rigid grasping features can be found in. However, grasp features for deformable objects have only been explored in one study, which measured the work performed on containers during grasping to predict whether its liquid contents would be displaced. # Sim-to-Real Accuracy {#app:sim2real} If our simulations prove to be accurate to the real-world, we can proceed with confidence in applying simulation-generated grasp strategies to reality. We test 3 grasps on real blocks of tofu under 1 and 2 N of applied force (see Fig. [\[fig:tofu_grasps\]](#fig:tofu_grasps){reference-type="ref" reference="fig:tofu_grasps"}). Simulated and real-world deformations exhibit strong similarities, and grasps achieve anticipated performance (e.g., grasps A and C, respectively, minimize and maximize sagging under the 2 force conditions). In the real world, permanent damage on the tofu occurs under 2 N of applied force, with fracture occurring in grasps B and C. Although fracture cannot be simulated with FEM, simulated stresses for these grasps lie within the literature-reported range of breaking stress for tofu ; furthermore, fracture lines on the real tofu coincide with regions of high simulated stress. Next, we perform 3 grasps on 2 latex tubes of different geometry (Fig. [\[fig:hollow_tube_grasps\]](#fig:hollow_tube_grasps){reference-type="ref" reference="fig:hollow_tube_grasps"}). Again, simulated and real-world deformations are highly similar (including indentations and bulges localized to the contact locations); moreover, the vertical distance between the highest and lowest points of the tubes closely match. In simulation, deformation controllability is predicted to be higher in grasp F than grasp D (Fig. [\[fig:cylinder_grasps\]](#fig:cylinder_grasps){reference-type="ref" reference="fig:cylinder_grasps"}c). Upon reorienting the rubber tubes in the real world, grasp F indeed enables a sequence of higher maximum deformations than grasp D, which constrains the tube to closely follow the motion of the gripper (thus, sweeping out a larger angle). # Application to Unseen Objects (OLD) We first test whether the classifiers trained in Section [6](#primitives){reference-type="ref" reference="primitives"} immediately generalize by applying them to candidate grasps on unseen real-world objects (gray objects in Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}). Performance was limited due to overfitting caused by the small number of primitives and grasps used in training. We thus reduce the dimensionality by using *one* grasp feature instead of seven, which is suitable when there is only one dominantly informative feature. For each pair of primitive and performance metric, we identify the most important feature according to the results in Fig. [\[fig:imps\]](#fig:imps){reference-type="ref" reference="fig:imps"} (e.g., for cylinder primitives and the maximum stress metric, \(edge\_dist\) is most important). Whenever this important feature is *correlated* with the performance metric, we assume that this feature-metric pair is *also correlated* on unseen objects geometrically similar to the associated primitive, where object similarities are informed by whether they belong to the same category in Fig. [\[fig:object_categories\]](#fig:object_categories){reference-type="ref" reference="fig:object_categories"}. For example, if \(edge\_dist\) and maximum stress are correlated among grasps on a cylinder, we hypothesize that they will also be correlated among grasps on a banana, which is cylinder-like. We then rank the grasps according to the value of the grasp feature and use this ordering as a direct prediction of the rank of the grasps according to the value of the performance metric. Using this method, we predict the 5 grasps that will yield the highest metric values, and we define a prediction as *accurate* if it belongs to the set of grasps that actually yield the top 15 metric values (i.e., the top 30th percentile for 50 total grasps). The same method is used to predict the 5 grasps that yield the lowest metric values. We now highlight some successful examples of this approach on unseen objects. In the following figures, the line representation of the gripper pose will be used (see Fig. [\[fig:qm\]](#fig:qm){reference-type="ref" reference="fig:qm"}). ## Predicting Maximum Stress on Spheroid-like Objects On the spheroid primitives, \(pure\_dist\) is most important for classifying maximum stress (\(R{=}0.84\)) (Fig. [\[fig:imps\]](#fig:imps){reference-type="ref" reference="fig:imps"}b). This correlation generalizes to other spheroid-like objects like a lemon, apple, and peach (\(R{=}0.72, 0.72, 0.68\)). We demonstrate prediction on a heart due to its asymmetry and surgical significance. Of the 10 predictions, 9 are accurate (Fig. [\[fig:heart_5\]](#fig:heart_5){reference-type="ref" reference="fig:heart_5"}). We visualize the stress distribution of the one grasp incorrectly predicted to be low-stress in Fig. [\[fig:heart_examples\]](#fig:heart_examples){reference-type="ref" reference="fig:heart_examples"}b. As depicted, the gripper finger contacts small protrusions on the heart that reduce contact area and increase the maximum stress. These local protrusions are not captured by the \(pure\_dist\) feature, as it does not quantify contact patch shape. This suggests that other features such as \(num\_contacts\) should also be considered. ## Predicting Max Deformation on Container-like Objects On the cup and flask, \(squeeze\_dist\) is correlated with maximum deformation (\(R{=}0.89\) for cup, \(R{=}0.93\) for flask). This generalizes to a tall cup, a mug, a mustard bottle, and a bleach bottle (\(R{=}0.89, 0.84, 0.77, 0.76\)), on which all 40 predicted grasps are accurate (Fig. [\[fig:containers\]](#fig:containers){reference-type="ref" reference="fig:containers"}). On the tall cup, the predicted lowest-valued grasps (i.e., for maximum deformation) are concentrated at the base, and the predicted highest-valued grasps are concentrated at the lip (Fig. [\[fig:containers\]](#fig:containers){reference-type="ref" reference="fig:containers"}a). On the mug, the lowest-valued grasps are those that are top-bottom grasps since its height fits within the gripper opening, unlike with the tall cup. The highest-valued grasps all contact the handle of the mug, which buckles severely when squeezed (Fig. [\[fig:containers\]](#fig:containers){reference-type="ref" reference="fig:containers"}b). On the bottles, low-valued grasps mostly squeeze at the base where local stiffness is higher, and high-valued grasps squeeze the bottle faces, inducing maximal buckling (Fig. [\[fig:containers\]](#fig:containers){reference-type="ref" reference="fig:containers"}cd). [^1]: <https://sites.google.com/nvidia.com/defgraspsim>
{'timestamp': '2021-07-14T02:06:44', 'yymm': '2107', 'arxiv_id': '2107.05778', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05778'}
# Introduction One of the most difficult tasks in aircraft control is achieving a safe and comfortable landing. A review of accident statistics indicates that over 45 percent of all general aviation accidents occur during the approach and landing phases of a flight. A closer look shows that the cause of over 90 percent of those cases was pilot related. Loss of control was also a major contributing factor in 33 percent of these cases. In many cases, the accidents have happened due to not landing within a targeted landing time. Aircraft landing has fives phases: the base leg, the glide slope, the flare-out, the touchdown, and the after-landing roll. The glide slope and the flare-out are the most crucial phases. In the glide slope phase the aircraft descends along a predefined straight line at a steady state descent angle; whereas, in the flare-out phase the aircraft gradually raises its nose while landing. There are several performance requirements and constraints associated with aircraft landing. The aircraft needs to follow the desired trajectory and land smoothly within a targeted landing time. In addition, the aircraft landing controller should be robust to wind turbulence, measurement noise, and actuator failures. Many researchers have applied various control techniques to design an automatic aircraft landing control system. Different control methods such as classical control, optimal control, adaptive control, nonlinear control, and intelligent control have been used to solve the automatic aircraft landing problem. In, the flare-out maneuver control was successfully implemented using the classical feedback control method. implemented a PID controller combined with an evolutionary technique to tune control gains. Generally, classical controllers often lack optimality in achieving desired performances. applied an optimization technique called the parametric expansion method to synthesize a linear time-varying aircraft landing controller. In issues such as robustness to measurement noise, actuator faults, wind disturbances, and flight uncertainties were investigated and \(H_2, H_\infty\), LQR/LQG, mixed \(H_2/H_\infty\) control techniques were employed to design optimal and robust aircraft landing controllers. Recently, concepts from adaptive control and intelligent control such as adaptive synthesis based on dynamic inversion theory, neural networks, quantitative feedback theory, sliding mode control, structured singular value \(\mu\)-synthesis, or fuzzy techniques were used to design automatic aircraft landing controllers. In nonlinear control techniques were applied to improve the control performance of the landing controller. Most of the aforementioned techniques are based on the asymptotic convergence of tracking errors. This does not guarantee a safe, smooth, and comfortable landing, which often requires the aircraft to accurately track a particular landing profile while landing within a given period of time and satisfying performance requirements and flight constraints. The contribution of this paper is, therefore, designing an optimal controller that guarantees the finite-time convergence of the landing trajectory tracking errors. For this purpose, we first design the desired landing path which satisfies performance requirements and flight constraints. The flare-out maneuver phase is designed as an exponential path, which connects end point of glide slope phase and the touchdown point on the runway. Furthermore, the touchdown point is captured as a boundary condition. In addition, performance requirements and constraints on control input and output signals are determined. Subsequently, we formulate the tracking problem by designing a performance index which should be minimized in a targeted landing time. We then have converted the aircraft landing problem to a Linear Quadratic Tracking (LQT) problem where we minimize the designed cost function for a linear model of the aircraft respecting boundary conditions. Control gains are found by solving differential Riccati equations backward in time using the Dormand Prince algorithm. The simulation results are analyzed to show that the developed trajectory tracking system can handle a range of angle of attack and headwind disturbances. In the remainder of this paper, in Section [2](#sec:prob){reference-type="ref" reference="sec:prob"}, the aircraft landing problem is formulated. In Section [3](#sec:proposed){reference-type="ref" reference="sec:proposed"}, the desired trajectory and performance index are designed by incorporating the performance requirements and flight constraints. An LQT controller is developed for aircraft landing by minimizing the designed performance index to guide the aircraft to follow the desired landing trajectory. In Section [4](#sec:simu){reference-type="ref" reference="sec:simu"}, the proposed flight controller is simulated and the results are discussed. Finally, Section [5](#sec:concu){reference-type="ref" reference="sec:concu"} concludes this paper. # Problem formulation {#sec:prob} The aircraft landing process is described in Figure [\[fig:lan\]](#fig:lan){reference-type="ref" reference="fig:lan"}. The glide slope phase and flare-out phase are the most critical steps. After the base leg, the aircraft should descend towards the runway center-line with the flight path angle \(\nu\) between 2.5 to 3.5 deg. As the aircraft descends to a certain altitude above the ground, the *flare-out* phase begins. In the *flare-out* phase of landing, the pitch angle \(\theta\) of the airplane must be gradually adjusted to have a value between 0 to 10 deg, and the aircraft should approach the touchdown point smoothly. The flare-out phase is the most difficult part of the landing maneuver, as the run-way is not in the pilot's field of view and the touchdown point has to be accurately reached within a targeted time smoothly, following the landing trajectory. In this paper, we assume that the lateral and longitudinal dynamics of the aircraft are decoupled, and the lateral controller takes care of the lateral deviations from the center line of the runway. The focus of this paper, therefore, is on the design of a longitudinal controller to track the desired landing trajectory. The longitudinal motion of the aircraft is governed entirely by the elevator deflection angle \(\delta_e(t)\). The longitudinal dynamics of an aircraft is given by the so-called short period equation of motion of the aircraft: \[\label{eq2:model} \dot{\theta}(s) = \frac{K_s(T_ss+1)}{(\frac{s^2}{\omega_s^2}+\frac{2\zeta s}{\omega_s}+1)}\delta_e(s)\] where \(\dot{\theta}\) is pitch rate, \(K_s\) is short period gain, \(T_s\) is path time constant, \(\omega_s\) is short period resonant frequency, and \(\zeta\) is short period damping factor. Assuming the velocity \(V\) of the aircraft to be constant, pitch angle rate \(\dot{\theta}\) and altitude \(h\) are related through vertical acceleration \(\ddot{h}\) as: \[\label{eq3:model2} \ddot{h}(s) = \frac{V}{T_ss+1}\dot{\theta}(s)\] Combining ([\[eq2:model\]](#eq2:model){reference-type="ref" reference="eq2:model"}) and ([\[eq3:model2\]](#eq3:model2){reference-type="ref" reference="eq3:model2"}), a fourth-order linear differential equation is found: \[\label{eq3:model3} h^{(4)}(t)+2\zeta\omega_s h^{(3)}(t)+\omega_s^2\ddot{h}(t) = K_sV\omega_s^2\delta_e(t)\] Substituting in ([\[eq3:model3\]](#eq3:model3){reference-type="ref" reference="eq3:model3"}), the new aircraft equation of motion becomes \[\label{eq5:model4} \begin{split} \frac{V}{T_s}\ddot{\theta}(t)-(\frac{V}{T_s^2}-2\zeta\omega_s\frac{V}{T_s})\dot{\theta}(t)-(2\zeta\omega_s\frac{V}{T_s^2}-\omega_s^2\frac{V}{T_s^2}\\-\frac{V}{T_s^3})\theta(t)-(\frac{1}{T_s^3}-2\zeta\omega_s\frac{1}{T_s^2}+\frac{\omega_s^2}{T_s})\dot{h}(t) = K_sV\omega_s^2\delta_e(t) \end{split}\] from which one can derive, the state space representation of the aircraft's model as: where \(x(t) = \big[\begin{smallmatrix} h(t) & \dot{h}(t) & \theta(t) & \dot{\theta}(t)\end{smallmatrix}\big]^T\), \(B =\big[\begin{smallmatrix} 0 & 0 & 0 & b_4 \end{smallmatrix}\big]^T\),\ \(A=\bigg[\begin{smallmatrix} 0 & 1 & 0 & 0\\0 & a_{22} & a_{23}&0\\ 0 & 0 & 0 & 1\\ 0 & a_{42} & a_{43} & a_{44}\end{smallmatrix}\bigg]\), \(a_{22} = \frac{-1}{T_s}\), \(a_{23} = \frac{V}{T_s}\), \(a_{42} = \frac{1}{vT_s^2}-2\frac{\zeta\omega_s}{vT_s}+\frac{\omega_s^2}{v}\), \(a_{43} = 2\frac{\zeta\omega_s}{T_s}-\omega_s^2-\frac{1}{T_s^2}\), \(a_{44} = \frac{1}{T_s}-2\zeta\omega_s\), \(b_4 = \omega_s^2k_sT_s\) and C is the identity matrix. Our aim is to design a controller for the aircraft to follow the landing trajectory with the minimum tracking error \(e(t)\) given as: \[e(t) = x(t)-r(t)\] where \(r(t)\) \(\in\) \(\mathbb{R}^{4}\) is the desired landing trajectory over the landing time interval \([t_0\), \(t_f]\). Then, given an aircraft model in ([\[eq:model\]](#eq:model){reference-type="ref" reference="eq:model"}) and boundary conditions as \(x(t_0) = x_0\) and \(x(t_f) = x_f\), we address the following problems for the aircraft landing: # Landing trajectory tracking {#sec:proposed} ## Trajectory design The aircraft landing trajectory is the desired aircraft landing path, which the aircraft follows over a specified period of time \([t_0,t_f]\). Landing trajectory must ensure safe and comfortable landing. The desired landing path is expressed as a desired altitude which is a function of forward distance. Its important phases are the glide slope phase and flare-out phase as shown in Figure [\[fig:aircraftlandingpath\]](#fig:aircraftlandingpath){reference-type="ref" reference="fig:aircraftlandingpath"}. The glide slope phase is the first part of a landing path. It is modeled as a straight line path whose slope is given in terms of the flight path angle \(\nu\). The other part is the flare-out path which is initiated when the aircraft reaches to a certain height \({h_f}_0\) above the landing surface. Flare-out path is an exponential path with a near zero flight path angle at touchdown. In Figure [\[fig:aircraftlandingpath\]](#fig:aircraftlandingpath){reference-type="ref" reference="fig:aircraftlandingpath"}, the desired landing path is shown in forward distance (X)-altitude (h)-plane. In the glide slope phase the aircraft tracks a straight line path pointing toward the beginning of the runway. The desired altitude, \(h^d\), is computed based on a given flight path angle \(\nu\): \[\label{eq:glide-slope} h^d =-tan(\nu^d)(X-{X_g}_0)+{h_g}_0\] As soon as the flare-out phase starts, the desired altitude \(h^d\) is computed as: \[\label{eq:flare} \begin{split} h^d =-h_c+({h_{f}}_0+h_c)e^{-K_x(X-{X_{f}}_0)} \end{split}\] where \(K_x\) is a constant which defines the curvature of flare-out maneuver path, depending on the distance between the origin of X-h plane and the touchdown point. The objective of a good, stabilized final approach is to descend at an angle and airspeed that permits the airplane to reach the desired touchdown point with minimum floating; in essence, a semi-stalled condition. To accomplish this, it is essential that both the descent angle and the airspeed be accurately controlled. Since on a normal approach the power setting is not fixed as in a power-off approach, the power and pitch attitude are adjusted simultaneously as necessary to control the airspeed and the descent angle, or to attain the desired altitudes along the approach path. In this paper, we focus on the flare-out phase to achieve a safe and comfortable landing. In ([\[eq:flare\]](#eq:flare){reference-type="ref" reference="eq:flare"}), \({X_{f}}_0\), \(h_c\) and \(K_x\) are unknowns. We can solve for these unknowns from \(tan(\nu^d)\), \({h_{f}}_0\), and \(X_t\) under the following constraints: - Slope continuity constraint: For a smooth phase change, the slope at the beginning of the flare-out path should be equal to the slope of the glide slope path. Thus, the slope of glide slope path can be calculated as \[\label{eq:slopeglide} \dot{h^d} =-\tan(\nu^d)\] Similarly, the slope at the beginning of flare-out path is \[\label{eq:slopeconstr} \dot{h^d} = {-K_x}({h_{f}}_0+h_c)e^{-K_x(X-{X_{f}}_0)}|_{X = {X_{f}}_0}\] Using ([\[eq:slopeglide\]](#eq:slopeglide){reference-type="ref" reference="eq:slopeglide"}) and ([\[eq:slopeconstr\]](#eq:slopeconstr){reference-type="ref" reference="eq:slopeconstr"}), \(K_x\) is computed as \[\label{eq:Kx} K_x = \frac{\tan(\nu^d)}{{h_f}_0+h_c}\] - Path continuity constraint: This constraint guarantees the continuity of the path when transiting from the glide slope phase to the flare-out phase. By design, we have \({X_f}_0={X_g}_f\). We then need to ensure that \(h^d\) at \({X_g}_f\) given in ([\[eq:glide-slope\]](#eq:glide-slope){reference-type="ref" reference="eq:glide-slope"}) is the same as \(h^d\) at \({X_f}_0\) given in ([\[eq:flare\]](#eq:flare){reference-type="ref" reference="eq:flare"}) resulting in \[\label{eq:pathcontinuity} {X_{f}}_0 = \frac{{h_{g}}_0-{h_{f}}_0}{tan(\nu^d)}+{X_{g}}_0 \\ \] - Touchdown constraint: The landing path intersects the ground at the touchdown point \(X_t\). Thus, at touchdown point we have \[\label{eq:touchdown} -h_c+({h_{f}}_0+h_c)e^{-K_x(X_t-{X_{f}}_0)}=0\] Finally, \(K_x\) and \(h_c\) are found by solving ([\[eq:Kx\]](#eq:Kx){reference-type="ref" reference="eq:Kx"}), ([\[eq:pathcontinuity\]](#eq:pathcontinuity){reference-type="ref" reference="eq:pathcontinuity"}) and ([\[eq:touchdown\]](#eq:touchdown){reference-type="ref" reference="eq:touchdown"}). Under the assumption of constant aircraft forward velocity \(\dot{X}\), at any time moment \(t > t_0\), the forward distance \(X\) on the flare-out curve will be approximately \[\label{eq:constvel} X = {X_{f}}_0+\dot{X}(t-t_0)\] Substituting \(X-{X_f}_0\) from ([\[eq:constvel\]](#eq:constvel){reference-type="ref" reference="eq:constvel"}) in ([\[eq:flare\]](#eq:flare){reference-type="ref" reference="eq:flare"}), the landing trajectory in flare-out phase is governed by \[\label{eq:altitude} h^d =-h_c+({h_{f}}_0+h_c)e^{-K(t-t_0)}\] where \(K = K_x\dot{X}\). By differentiating ([\[eq:altitude\]](#eq:altitude){reference-type="ref" reference="eq:altitude"}), the desired rate of descent in flare-out phase is: \[\dot{h_d} =-K({h_{f}}_0+h_c)e^{-K(t-t_0)}\] The value of the pitch angle is crucial only during the last few sec of landing before the touchdown point. In flare-out maneuver phase, the desired pitch angle, \(\theta_d\), is:: \[\theta_d = 0\] Also, for a safe and comfortable landing, the pitch rate \(\dot{\theta_d}\) should be: \[\dot{\theta_d} = 0\] ## Performance requirements {#sec:perfo} The following landing requirements and flight constraints are considered for the aircraft landing in this paper: 1. The landing path should be an exponential path such that it ensures a safe and comfortable landing. 2. The rate of descent \(\dot{h}\) should be non-zero in order to avoid overshooting. In addition, the rate of descent at touchdown should be a small negative value in order to prevent over stressing of landing gear. Requirements to avoid undesirable behaviors such as landing gear over stress, aircraft floating down runway and aircraft overshooting runway are captured by magnitude of rate of descent at touchdown point. Typically based on type of the aircraft, a value between 60 to 180 ft/min is considered as an ideal rate of descent at touchdown point. 3. The lower limit on the pitch angle \(\theta\) should be \(0^{\circ}\) in order to prevent the nose wheel of an aircraft from touching down first, and the upper limit on the pitch angle \(\theta\) should be \(10^{\circ}\) to prevent the tail gear from touching down first: 4. During landing, in the flare-out maneuver phase, the angle of attack must remain below 80 percent of the stall value. The stall value is assumed to be \(18^{\circ}\). Hence, the rate of change of angle attack is restricted to a value less than 20 percent of the stall value: 5. The longitudinal motion control is mainly executed by the elevator. To avoid saturation, the elevator is not permitted to operate against the mechanical stops during the landing process. Thus, the deflection of the elevator is restricted between \(-35^{\circ}\) and \(+15^{\circ}\). In addition, the aircraft should follow the designed landing trajectory and reduce the tracking error within the targeted landing time \(t_f\) with minimum control effort \(\delta_e(t)\). This can be captured by the following performance index: \[\label{eq:cost} \begin{split} J = [Cx(t_f)-r(t_f)]^TP[Cx(t_f)-r(t_f)]+\\ \int_{t_0}^{t_f}\{[Cx(\tau)-r(\tau)]^TQ[Cx(\tau)-r(\tau)]+\delta_e^T(\tau)R\delta_e(\tau)\}d\tau \end{split}\] where \(P \geq 0\), \(Q \geq 0\), \(R>0\), are all symmetric weighting parameters. The terms outside the integral ensure that the states are close to the desired values at the touchdown point, avoiding an early or a late landing. On the other hand, the terms inside the integral push the aircraft to track the desired landing trajectory with minimum control effort in the landing time \([t_0,t_f]\). ## Controller design based on linear quadratic tracking Given the aircraft model in ([\[eq:model\]](#eq:model){reference-type="ref" reference="eq:model"}) and the boundary conditions \(x(t_0) = x_0 =\big[\begin{smallmatrix} h(t_0)={h_f}_0 & \dot{h}(t_0) & \theta(t_0) & \dot{\theta}(t_0)\end{smallmatrix}\big]^T\) and \(x(t_f)=x_f =\big[\begin{smallmatrix} 0 & 0 & 0 & 0 \end{smallmatrix}\big]^T\), our aim is to find an optimal control \(\delta^*_e(t)\) that guides the aircraft to follow the desired landing trajectory \(r(t)\) over the time interval \([t_0,t_f]\), minimizing the performance index in ([\[eq:cost\]](#eq:cost){reference-type="ref" reference="eq:cost"}), as described below: \[\label{constrainedoptimization} \min\limits_{\forall t\in [t_0 \,\, t_f]} J\] subject to \[\begin{cases} \dot{x}(t) = Ax(t)+B\delta_e(t)\\ x(t_0) = x_0\\ x(t_f) = x_f \end{cases}\] Defining the co-state vector \(\lambda(t)=S(t)x(t)-v(t)\), where \(S(t)= C^TP(t)C(t)\) and \(v(t)=C^TPr(t)\), and defining the Hamiltonian function \(H=\frac{1}{2}[Cx(t)-r(t)]^TQ[Cx(t)-r(t)]+\frac{1}{2}\delta_e^T(t)R\delta_e(t)+\lambda^T(Ax(t)+B\delta_e(t))\), the constrained optimization in ([\[constrainedoptimization\]](#constrainedoptimization){reference-type="ref" reference="constrainedoptimization"}) will be converted to \[\label{unconstrainedoptimization} \begin{split} \min\limits_{\forall t\in [t_0 \,\, t_f]} \bar{J}=[Cx(t_f)-r(t_f)]^TP[Cx(t_f)-r(t_f)]+\\ \int_{t_0}^{t_f}(H-\lambda^T\dot{x}(t))d\tau \end{split}\] whose solution can be found from \(\delta J(x(t))=0\), where \(\delta J\) is the variation of the functional \(J\). The optimal control function will be in which \(S(t)\) and \(v(t)\) can be found by solving the following differential equations in a backward way with a given boundary conditions: # Simulation {#sec:simu} A simulation environment is set up by integrating the MATLAB and FlightGear simulation Software in which we simulated an aircraft landing from the altitude of 95 ft to the runway 10L of San Francisco airport. The information on the approach plate (see Table [\[table:approachplateparameters\]](#table:approachplateparameters){reference-type="ref" reference="table:approachplateparameters"}) of runway 10L of the airport is used to design a safe and comfortable landing trajectory for an aircraft with model parameters given in Table [\[table:aircraftparameters\]](#table:aircraftparameters){reference-type="ref" reference="table:aircraftparameters"}. \[\begin{aligned} \begin{split} P = \bigg[\begin{smallmatrix} 0.9 & 0 &0 &0\\ 0 & 0.01&0&0\\ 0&0&1&0\\ 0&0&0&1 \end{smallmatrix}\bigg] \\ Q = \bigg[\begin{smallmatrix} 0.00067 & 0 &0 &0\\ 0 & 0.0265&0&0\\ 0&0&150&0\\ 0&0&0&65 \end{smallmatrix}\bigg]\\ R = 1 \end{split} \end{aligned} \label{eq:param}\] Table [\[table:approachplateparameters\]](#table:approachplateparameters){reference-type="ref" reference="table:approachplateparameters"} summarizes parameters extracted from the approach plate. Similarly, assuming this particular aircraft has a nominal initial altitude \({h_f}_0\) of 100 ft, the desired flight path angle \(\nu\) of 3 deg, and the pitch angle \(\theta\) of 0 deg, then using ([\[eq:Kx\]](#eq:Kx){reference-type="ref" reference="eq:Kx"}) to ([\[eq:constvel\]](#eq:constvel){reference-type="ref" reference="eq:constvel"}), we found the desired landing trajectory parameters \({X_f}_0\), \(K_x\), \(h_c\), \(K\), as shown in Table [\[table:Landingparameters\]](#table:Landingparameters){reference-type="ref" reference="table:Landingparameters"}. The designed desired landing trajectory is plotted in Figure [\[fig:trackingresult\]](#fig:trackingresult){reference-type="ref" reference="fig:trackingresult"} in solid blue. The desired altitude \(h^d(t)\) and the desired altitude rate \(\dot{h}^d(t)\) are exponential functions while the desired pitch angle \(\theta_d\) and the desired pitch rate \(\dot{\theta}_d\) are constant functions. Both exponential functions and constant functions have derivatives of all orders. Therefore, the designed landing trajectory is a smooth landing trajectory. ## Case I: Simulation results for the initial condition given in Table [1](#table:simulationparameters){reference-type="ref" reference="table:simulationparameters"} {#case-i-simulation-results-for-the-initial-condition-given-in-table-tablesimulationparameters} For the given initial conditions in Table [1](#table:simulationparameters){reference-type="ref" reference="table:simulationparameters"}, the simulated aircraft landing trajectory is shown in Figure [\[fig:trackingresult\]](#fig:trackingresult){reference-type="ref" reference="fig:trackingresult"} in red. The controller gain is found solving ([\[eq:DiffEq\]](#eq:DiffEq){reference-type="ref" reference="eq:DiffEq"}) in a backward way using the Dormand-Prince algorithm. To respect the Constrains C1-C5 in Section [3.2](#sec:perfo){reference-type="ref" reference="sec:perfo"}, we have tuned the performance index parameters \(R\), \(Q\), and \(P\) to values in ([\[eq:param\]](#eq:param){reference-type="ref" reference="eq:param"}). Comparing the desired altitude \(h^d(t)\), the desired altitude rate \(\dot{h}^d(t)\), and their respective simulation values in Figure [\[fig:trackingresult\]](#fig:trackingresult){reference-type="ref" reference="fig:trackingresult"}, we can see that the aircraft has accurately tracked the desired landing trajectory in a desired landing time of 20 sec satisfying Constraints C1-C5 in Section [3.2](#sec:perfo){reference-type="ref" reference="sec:perfo"}. This comparison is summarized in Table [2](#table:constraintvalidation){reference-type="ref" reference="table:constraintvalidation"}. ## Case II: Simulation results for different initial conditions Head wind and deviation of a desired flight path angle from a desired value of 3 deg introduces a deviation in the gliding distance and the pitch angle which in turn give rise to a deviation in the initial altitude of the flare-out phase as shown in Figure [\[fig:generalcase\]](#fig:generalcase){reference-type="ref" reference="fig:generalcase"}. However, the designed controller can handle these deviations in the initial altitude \(\Delta {h_f}_0\) and pitch angle \(\Delta \theta\) by adjusting control input in order to maintain the rate of descent and the desired approach airspeed, while avoiding the saturation region of the elevator actuator (Constraint C5). Acceptable deviations in the initial altitude and pitch angle around the desired landing trajectory is determined by varying them correlationally until the control limiting values are attained instantaneously. Accordingly, \(\Delta {h_f}_0\) and \(\Delta \theta\) are found to be 20 ft and 1 deg respectively, and the corresponding region of operation is shown in Figure [\[fig:linearoperation\]](#fig:linearoperation){reference-type="ref" reference="fig:linearoperation"} in green. # conclusion {#sec:concu} In this paper, a smooth trajectory tracking system was designed for a fixed-wing aircraft landing. The aircraft landing problem was converted to a finite-time LQT problem. Information on the approach plate of the runway was employed to design a desired smooth landing trajectory. We considered multiple performance requirements and constraints to design an optimal controller which minimizes the trajectory tracking error. The designed controller gives an accurate tracking performance for the flare-out phase of aircraft landing. The simulation result demonstrated the finite-time convergence of the trajectory tracking error. Moreover, the robustness of the designed controller was evaluated against different initial conditions due to the headwind disturbances. This work can be extended by employing a nonlinear model of an aircraft in the presence of turbulent crosswinds and system uncertainties.
{'timestamp': '2021-07-14T02:07:43', 'yymm': '2107', 'arxiv_id': '2107.05803', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05803'}
# Dense Sidon sets
{'timestamp': '2022-04-18T02:14:26', 'yymm': '2107', 'arxiv_id': '2107.05744', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05744'}
null
null
# Introduction {#intro} Throughout the paper, \(H\) is a complex Hilbert space, and \(B(H)\) denotes the von Neumann algebra of bounded linear operators on \(H\). A motivation for our research comes from a problem raised by Kadison. In the celebrated conference in Baton Rouge in 1967, Kadison proposed a list of 20 problems on operator algebras. The list was shared among operator algebraists worldwide, which brought a great influence to the development of the theory of operator algebras over the last half-century. In 2003, Ge published a survey article on Kadison's list of problems. Among the 20 problems, 19 are about C\(^*\)-or von Neumann algebras. The only exception is listed as the 15th problem in Ge's article, which asks the following. In the recent paper, Szűcs and Takács discovered that for a \(^*\)-subalgebra \(A\) of \(B(H)\) several conditions are equivalent to the condition every self-adjoint element of \(A\) has finite spectrum. In this paper, we first observe in Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} that these conditions are also equivalent to the condition \(A\) is regular in the sense of von Neumann. We call a \(^*\)-subalgebra of \(B(H)\) that satisfies these equivalent conditions an R\(^*\)-algebra ("R" meaning "regular"). The abundance of the conditions for a \(^*\)-subalgebra of \(B(H)\) to be an R\(^*\)-algebra implies that R\(^*\)-algebras form more or less an important class of \(^*\)-algebras. Even though we assume no completeness, it turns out that R\(^*\)-algebras share some important properties with C\(^*\)-/von Neumann algebras. For example, we may freely use the technique of functional calculus. Recall that there exists a correspondence between commutative C\(^*\)-algebras and locally compact Hausdorff spaces (Gelfand--Naimark theorem), and similarly, between commutative von Neumann algebras and certain measure spaces. Is there such a correspondence for R\(^*\)-algebras? By von Neumann's study of \(^*\)-regular rings in, projections of a general R\(^*\)-algebra form a lattice. It follows that the lattice of projections of a commutative R\(^*\)-algebra is a generalized Boolean algebra. In fact, there exists a complete correspondence between the class of commutative R\(^*\)-algebras and that of generalized Boolean algebras. By restricting ourselves to the unital case, we see that unital commutative R\(^*\)-algebras correspond to Boolean algebras. In that sense (the projection lattice of) an R\(^*\)-algebra can be considered as a noncommutative (generalized) Boolean algebra. This correspondence is closely tied with Stone's theorem on the duality between Boolean algebras and Boolean spaces. Are there plenty of noncommutative R\(^*\)-algebras? The answer is yes. The class of ultramatricial R\(^*\)-algebras, that is, directed unions of finite-dimensional C\(^*\)-algebras, provides us with many examples of noncommutative R\(^*\)-algebras. It turns out that Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}, which remains to be open, is equivalent to asking whether every R\(^*\)-algebra is ultramatricial. Ultramatricial R\(^*\)-algebras with countable Hamel dimension are highly relevant to the theory of separable AF C\(^*\)-algebras, whose classification by Elliott is one of the best-known results of the theory of C\(^*\)-algebras. Another subclass of ultramatricial R\(^*\)-algebras, which we call purely atomic R\(^*\)-algebras, is constructed from inner product spaces. We give a complete classification of purely atomic R\(^*\)-algebras in terms of linear isometries of inner product spaces. By applying Banach space theory and results on operator ranges, we prove that there are many mutually nonisomorphic purely atomic R\(^*\)-algebras. The literature of regular rings, Boolean algebras, and inner product spaces in connection with Banach spaces, as well as C\(^*\)-/von Neumann algebras provides us with many deep results and further questions. The paper intends to collect some of them in order to give supporting evidence for the author's belief that the study of R\(^*\)-algebras is interesting enough to be considered in more depth. This paper should give much motivation to the research on Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}, which seems to have gotten less attention among operator algebraists compared to other problems in the list. The choice of materials in this paper is more or less biased by the author's preference. This paper is formulated in the following manner. In the next section, we give the definition and basic properties of R\(^*\)-algebras. In particular, we characterize R\(^*\)-algebras by closedness of the ranges of operators, the uniqueness of C\(^*\)-norm of \(^*\)-subalgebras as well as von Neumann regularity (Theorems [\[equi\]](#equi){reference-type="ref" reference="equi"}, [\[c\*norm\]](#c*norm){reference-type="ref" reference="c*norm"}). Section [3](#example){reference-type="ref" reference="example"} provides examples of R\(^*\)-algebras and discusses Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}. The correspondence between commutative R\(^*\)-algebras and Boolean algebras is given in Section [4](#com){reference-type="ref" reference="com"}. Section [5](#atom){reference-type="ref" reference="atom"} is devoted to giving the relation between purely atomic R\(^*\)-algebras and inner product spaces. Some results that arise by comparing the projection lattice of an R\(^*\)-algebra with that of a von Neumann algebra or a Baer \(^*\)-ring are given in Section [6](#comparison){reference-type="ref" reference="comparison"}. The consequence of Elliott's classification theorem of AF C\(^*\)-algebras is summarized in Section [7](#countable){reference-type="ref" reference="countable"}. We also revisit Elliott's theorem from a lattice theoretic viewpoint (Theorem [\[sumlattice\]](#sumlattice){reference-type="ref" reference="sumlattice"}). In Section [8](#nd){reference-type="ref" reference="nd"} we collect results that derive from von Neumann, Dye and Gleason's theorems. We close this paper by proposing questions on R\(^*\)-algebras for further research (Section [9](#question){reference-type="ref" reference="question"}). In the paper, we frequently use basic results on C\(^*\)-/von Neumann algebras as in, and von Neumann's theory on complemented modular lattices and regular rings as in (the first four chapters of). None of the proofs is dependent on any results by Szűcs and Takács in, although the underlying idea may have some overlap implicitly. # Regular \(^*\)-subalgebras of \(B(H)\) {#defi} If there is no confusion, for each \(z\in \C\), we often write \(z\) instead of the scalar multiplication operator \(z\cdot \operatorname{id}_{H}\in B(H)\). In particular, \(1\) means the unit of \(B(H)\). An *algebra* means an algebra over the field of complex numbers, possibly without unit. A subspace or a subalgebra in this paper need not be closed. For a subset \(S\subset B(H)\), the symbol \(\operatorname{span} S\) means the linear space spanned by \(S\), that is, the smallest complex-linear subspace of \(B(H)\) that contains \(S\). Similarly, \(\A(S)\) and \(\A^*(S)\) denote the algebra and the \(^*\)-algebra generated by \(S\), respectively. Namely, \(\A(S)\) (resp. \(\A^*(S)\)) is the smallest subalgebra (resp. \(^*\)-subalgebra) of \(B(H)\) that contains \(S\). For a finite subset \(\{x_1, \ldots, x_n\}\subset B(H)\), we define \(\A(x_1, \ldots, x_n):=\A(\{x_1, \ldots, x_n\})\) and \(\A^*(x_1, \ldots, x_n):=\A^*(\{x_1, \ldots, x_n\})\). A *projection* of \(B(H)\) is an operator \(p\in B(H)\) with \(p=p^2=p^*\). Let \(x\in B(H)\). The range of \(x\) is written as \(\operatorname{ran} x\) or \(xH\), and the kernel as \(\ker x\). The symbol \(\sigma(x)\) stands for the spectrum of \(x\), i.e., \(\sigma(x):=\{z\in \C\mid z-x \text{ is not invertible in }B(H)\}\). Let \(l(x)\) and \(r(x)\) denote the left and right support projections of \(x\). That is, \(l(x)\) is the projection onto the closure of \(\operatorname{ran} x\), and \(r(x)\) is the projection onto \((\ker x )^{\perp}\). If in addition \(x\) is self-adjoint, then \(s(x):=l(x)=r(x)\) is called the *support* of \(x\). Recall that every \(x\in B(H)\) has the unique polar decomposition \(x=v\lvert x\rvert\) such that \(\lvert x\rvert = (x^*x)^{1/2}\) and \(vv^*=l(x)\), \(v^*v=r(x)\). Although the theorem below can be obtained as a corollary of by Szűcs and Takács, our discovery of (or at least the emphasis on) its relation with von Neumann regularity is new. This viewpoint motivates a deeper study on this class of algebras in connection with Boolean algebras in the subsequent sections. For the convenience of the reader, we give a proof that is independent of. Our proof needs no background beyond the standard first course of functional analysis. Before proving it, let us first give a preliminary result. Let \(x, y\in B(H)\). Then \(y\) is called a *Moore--Penrose inverse* of \(x\) if \(y\) satisfies \(l(y)=r(x)\), \(r(y)= l(x)\), \(yx=r(x)\) and \(xy = l(x)\). It is easy to see that such an operator (if there exists) is unique. We call \(A\) that satisfies the equivalent conditions of Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} a *regular \(^*\)-subalgebra* of \(B(H)\), or an *R\(^*\)-algebra*, for short. The same object is called an "E\(^*\)-algebra that is a pre-C\(^*\)-algebra" in. The equivalence of (1)--(4) of the above theorem does not hold in general if we consider an algebra instead of a \(^*\)-algebra. Indeed, it is known that there exists a *closed* subalgebra \(A\) of \(B(H)\) such that (3) and (4) hold but (2) does not hold. Since \(\{x\in B(H)\mid x^*x=0\} =\{0\}\), we obtain The following lemma is a consequence of an elementary fact about algebraic elements. Although we cannot make use of tools that involve completeness (like taking limits) in the setting of R\(^*\)-algebras in general, we may take advantage of a number of techniques from operator theory. We call a linear mapping (resp. a linear bijection) \(\phi\colon A\to B\) between two \(^*\)-algebras a *\(^*\)-homomorphism* (resp. a *\(^*\)-isomorphism*) provided that it is multiplicative and \(^*\)-preserving, i.e., \(\phi(xy)=\phi(x)\phi(y)\) and \(\phi(x^*)=\phi(x)^*\) for any \(x, y\in A\). In view of the theory of C\(^*\)-/von Neumann algebras, we also give an abstract axiom for a \(^*\)-algebra to be \(^*\)-isomorphic to an R\(^*\)-algebra. Let \(A\) be a \(^*\)-algebra (over \(\C\)). Recall that a *C\(^*\)-norm* of \(A\) is a norm \(\lVert\cdot \rVert\colon A\to [0, \infty)\) satisfying \(\lVert xy\rVert\leq \lVert x\rVert\lVert y\rVert\) (submultiplicativity) and \(\lVert x^*x\rVert = \lVert x\rVert^2\) (C\(^*\)-identity) for all \(x, y\in A\). A *pre-C\(^*\)-algebra* is a \(^*\)-algebra endowed with a C\(^*\)-norm. It is clear that every \(^*\)-subalgebra of \(B(H)\) is a pre-C\(^*\)-algebra. The (noncommutative) Gelfand--Naimark theorem states that a complete pre-C\(^*\)-algebra is \(^*\)-isomorphic to a closed \(^*\)-subalgebra of \(B(H)\). On the other hand, Sakai's theorem states that a C\(^*\)-algebra \(A\) is \(^*\)-isomorphic to a von Neumann algebra if and only if \(A\) is a dual Banach space. We call a pre-C\(^*\)-algebra with the above equivalent conditions an *abstract R\(^*\)-algebra*. (This can also be referred to as an *algebraic pre-C\(^*\)-algebra*, or a *regular pre-C\(^*\)-algebra*.) As is the case for C\(^*\)-algebras, the above theorem ensures that in many situations there is no need to distinguish between abstract R\(^*\)-algebras and R\(^*\)-algebras in \(B(H)\) (see also Proposition [\[isometry\]](#isometry){reference-type="ref" reference="isometry"} below, which implies the uniqueness of C\(^*\)-norm of an R\(^*\)-algebra). In what follows we collect some basic properties of ideals, quotients and \(^*\)-homomorphisms of R\(^*\)-algebras, which were first proved in. We give a proof for the reader's convenience. Our proof is based on C\(^*\)-algebra theory. Recall that there are C\(^*\)-algebras with no projections (see for example ). In contrast, every R\(^*\)-algebra has plenty of projections because of Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} (6). This is somehow akin to von Neumann algebras, so we introduce the following concept borrowed from the theory of von Neumann algebras. If \(A\subset B(H)\) is an R\(^*\)-algebra and \(A\) has a unit \(e\), then \(e\) need not coincide with the unit of \(B(H)\). However, it is easy to check that \(e\) is a projection and \(A=eAe\) can be considered as a \(^*\)-subalgebra of \(B(eH)\), and the embedding \(A=eAe\to B(eH)\) preserves the unit. With this in mind, when we consider a unital R\(^*\)-algebra in \(B(H)\), we may always assume that \(1=\operatorname{id}_H\in A\). This enables us to consider functional calculus as in Proposition [\[operation\]](#operation){reference-type="ref" reference="operation"} (2) for functions \(f\) without assuming \(f(0)=0\) if \(A\) is unital. Let \(A\subset B(H)\) be an R\(^*\)-algebra without unit. Let \(\widetilde{A}\) denote the algebra \(A+\C\cdot\operatorname{id}_H\subset B(H)\), which is called the *unitization* of \(A\). By Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} (4), \(\widetilde{A}\) is a unital R\(^*\)-algebra. A (pre-C)\(^*\)-algebra \(A\) is said to *have a unique C\(^*\)-norm* if there exists a unique norm of \(A\) that makes \(A\) a pre-C\(^*\)-algebra. Recall that every C\(^*\)-algebra has a unique C\(^*\)-norm. The preceding proposition shows that every R\(^*\)-algebra has a unique C\(^*\)-norm. More generally, it is easy to see that a \(^*\)-subalgebra \(A\subset B(H)\) has a unique C\(^*\)-norm if it satisfies the following property: - The closure of the (\(^*\)-)subalgebra \(\A(a)\) in \(B(H)\) is contained in \(A\) for every positive element \(a\in A\). (Proof: Let \(\lVert \cdot\rVert\) denote the operator norm of \(B(H)\), and let \(\lVert\cdot\rVert_1\) be any C\(^*\)-norm of \(A\). If \(a\in A\) is positive, then the closure of \(\A(a)\) in \(B(H)\) is a C\(^*\)-algebra that is a subalgebra of \(A\). Since a C\(^*\)-algebra has a unique C\(^*\)-norm, we have \(\lVert a\rVert=\lVert a\rVert_1\). For a general \(x\in A\), by the C\(^*\)-identity and the positivity of \(x^*x\) we obtain \(\lVert x\rVert^2=\lVert x^*x\rVert =\lVert x^*x\rVert_1=\lVert x\rVert_1^2\).) In particular, the union of any increasing net of C\(^*\)-algebras has a unique C\(^*\)-norm. In Szűcs and Takács introduced the following property (E\(^*\)) for a \(^*\)-algebra \(A\), and proved that it is equivalent to some conditions in Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} in a general setting. - For any \(^*\)-subalgebra \(B\subset A\), any Hilbert space \(K_1\), any \(^*\)-homomorphism \(\pi\colon B\to B(K_1)\) and any vector \(v\in K_1\) such that \(\pi(B)v\) is dense in \(K_1\), there are a Hilbert space \(K_2\), a \(^*\)-homomorphism \(\pi_0\colon A\to B(K_2)\) and a vector \(w\in K_2\) such that \(\pi_0(A)w\) is dense in \(K_2\) and \(\langle \pi(x)v, v\rangle =\langle \pi_0(x)w, w\rangle\) for every \(x\in B\). Let us deduce the equivalence of the conditions in Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} and (E\(^*\)) for pre-C\(^*\)-algebras without resorting to results of. We also clarify that these conditions are related to the uniqueness of C\(^*\)-norm. # Examples {#example} Although the definition of R\(^*\)-algebra might seem somehow restrictive, we can construct various examples of R\(^*\)-algebras. In this section, we give a number of examples of R\(^*\)-algebras, as well as means of obtaining new examples from known ones. More examples can be found in Sections [4](#com){reference-type="ref" reference="com"} and [5](#atom){reference-type="ref" reference="atom"}. First of all, for each \(n\geq 1\), the \(n\times n\) *full matrix algebra* \(\M_n=\M_n(\C)\) is the collection of all \(n\times n\) complex matrices, which is an example of a finite-dimensional C\(^*\)-algebra and also an R\(^*\)-algebra. It follows that the intersection of C\(^*\)-and R\(^*\)-algebras consists of finite-dimensional C\(^*\)-algebras. In this paper, a C\(^*\)-algebra that arises as the completion of an ultramatricial R\(^*\)-algebra is called an *AF* (approximately finite-dimensional) C\(^*\)-algebra. A C\(^*\)-algebra that arises as the completion of a sequentially ultramatricial R\(^*\)-algebra is called a *sequentially AF* C\(^*\)-algebra. It is well-known that a separable AF C\(^*\)-algebra is sequentially AF (see ). CAUTION: In C\(^*\)-algebra theory it is common to consider only separable C\(^*\)-algebras, so an AF C\(^*\)-algebra often means a separable one in the literature, which is different from our choice of terminology. In, the above proposition was shown by means of the fact that the matrix algebra over an algebraic algebra is algebraic. In particular, for an R\(^*\)-algebra \(A\), \(\M_{\infty}(A) = A\otimes \M_{\infty}\) is an R\(^*\)-algebra, which can be considered as the collection of \(\N\times\N\) matrices with finitely many nonzero entries in \(A\). This R\(^*\)-algebra is used to consider the \(K_0\)-group in Section [7](#countable){reference-type="ref" reference="countable"}. ## Problems of Kurosh and Kadison In, Szűcs and Takács found that Kadison's Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"} is related to Kurosh's problem. Let us revisit it. Recall that an algebra \(A\) is defined to be *locally finite-dimensional* if every finite subset of \(A\) generates a finite-dimensional subalgebra of \(A\). The classical Kurosh's problem asks whether every algebraic algebra \(A\) (i.e., such that every single element of \(A\) generates a finite-dimensional subalgebra of \(A\)) is locally finite-dimensional. This problem has a negative answer in the general setting. However, it is known that for certain classes of algebras (e.g., the class of PI-algebras), Kurosh's problem has a positive answer. See Kaplansky's list of problems for references and several related topics. We would like to consider Kurosh's problem for the class of R\(^*\)-algebras. Since an R\(^*\)-algebra is algebraic by Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"}, this is equivalent to asking whether every R\(^*\)-algebra is locally finite-dimensional. This problem clearly coincides with Kadison's Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}. Therefore, Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}, as well as Kurosh's problem for R\(^*\)-algebras, is equivalent to asking whether every R\(^*\)-algebra is ultramatricial. # Lattice of projections as noncommutative Boolean algebras {#com} Let us recall some definitions of lattice theory for beginners. A *lattice* is a partially ordered set \(\P\) such that every pair \(p, q\in \P\) has the least upper bound \(p\vee q\in \P\) and the greatest lower bound \(p\wedge q\in \P\). A mapping (resp. bijection) \(\psi\) between two lattices is called a *lattice homomorphism* (resp. a *lattice isomorphism*) if it satisfies \(\psi(p\vee q)=\psi(p)\vee\psi(q)\) and \(\psi(p\wedge q)=\psi(p)\wedge\psi(q)\) for every pair of elements \(p, q\). A lattice \(\P\) with greatest element \(1\) and least element \(0\) is *complemented* if for every \(p\in \P\) there exists \(q\in \P\) with \(p\vee q=1\) and \(p\wedge q=0\). Such a \(q\) is called a *complement* of \(p\). A lattice \(\P\) is *modular* if \(p\vee(q\wedge r)=(p\vee q)\wedge r\) for all \(p, q, r\in \P\) with \(p\leq r\). An *orthocomplemented lattice* is a complemented lattice \(\P\) with a bijection \(\P\ni p\mapsto p^{\perp}\in \P\) (called the orthocomplementation) with the following properties. - \((p^{\perp})^{\perp} = p\) for all \(p\in\P\). - \(p^{\perp}\) is a complement of \(p\) for all \(p\in\P\). - \(p\leq q\iff p^{\perp}\geq q^{\perp}\) for all \(p, q\in\P\). An *orthoisomorphism* \(\psi\) between two orthocomplemented lattices is a lattice isomorphism such that \(\psi(p^{\perp}) = \psi(p)^{\perp}\) for all \(p\). A family \(\emptyset\neq\S\subset 2^{X}\) of subsets of a set \(X\) is called a *field of sets* if \(A\cap B\), \(A\cup B\), \(A^{c}\in \S\) for any \(A, B\in \S\). A field of sets forms an orthocomplemented lattice relative to the order by inclusion and the orthocomplementation by set-complement. A *Boolean algebra* is an orthocomplemented lattice that is orthoisomorphic to a field of sets. It is clear that each element of a Boolean algebra has a unique complement. It follows that a lattice isomorphism between two Boolean algebras is an orthoisomorphism. The book is a gentle introduction to the theory of Boolean algebras. A *generalized field of sets* is a family \(\emptyset\neq\S\subset 2^{X}\) of subsets of a set \(X\) such that \(A\cap B\), \(A\cup B\), \(A\setminus B \in\S\) for any \(A, B\in \S\). A lattice that is lattice isomorphic to a generalized field of sets is called a *generalized Boolean algebra*. Recall that for a von Neumann algebra \(M\) the collection \(\P(M)\) of projections forms an orthocomplemented lattice. It is well-known that the projection lattice of a von Neumann algebra is modular if and only if the algebra is of finite type. Indeed, if a von Neumann algebra \(M\) is not finite, then \(M\) has \(B(\ell_2)\) as a \(\sigma\)-weakly closed \(^*\)-subalgebra, but \(\P(B(\ell_2))\) is not modular by. The proof of modularity of \(\P(M)\) when \(M\) is of finite type can be found in e.g.L̇et \(A\) be an R\(^*\)-algebra with unit. By von Neumann's theory in, the collection of principal right ideals of \(A\), ordered by inclusion, forms a complemented modular lattice. Moreover, by together with Lemma [\[starregular\]](#starregular){reference-type="ref" reference="starregular"}, this lattice can be identified with the lattice of projections \(\P(A)=\{p\in A\mid p=p^2=p^*\}\). Here \(\P(A)\) is endowed with the usual order, namely, for two projections \(p, q\in B(H)\), \(p\leq q\) means \(pH\subset qH\), or equivalently, \(pq=p\). The correspondence between principal right ideals and projections can be described in the following manner: Each principal right ideal of \(A\) coincides with \(pA\) for a unique \(p\in \P(A)\). Observe that \(p^{\perp}:= 1-p\), \(p\in A\), determines an orthocomplementation of \(\P(A)\). Let \(A\) be a unital R\(^*\)-algebra in \(B(H)\). Then each element in \(\P(A)\) can be identified with its range \(pH\), which is a closed subspace of the Hilbert space \(H\). The lattice structure of \(\P(A)\) can be written more explicitly: This property is very similar to a basic property of the lattice of projections of a von Neumann algebra. However, there is a big difference: For projections \(p, q\) of a von Neumann algebra in \(B(H)\), \(p\vee q\) is the projection onto the *closure* of \(pH+qH\), and taking closure is inevitable. In that respect, the lattice \(\P(A)\) resembles that of operator ranges, namely, the lattice formed of ranges of bounded linear operators on a fixed Hilbert space. It is a curious fact that the sum and intersection of any pair of operator ranges are operator ranges. However, the lattice of operator ranges is never complemented unless \(H\) is finite-dimensional. In fact, an operator range has a complement if and only if it is closed. See for the proofs of these facts and a more detailed study of operator ranges. Although the following theorem is easy to prove, it gives an enormous motivation to the research on R\(^*\)-algebras and their lattices of projections. For a locally compact Hausdorff space \(K\), let \(C_0(K)\) denote the commutative C\(^*\)-algebra of continuous complex-valued functions on \(K\) that vanish at infinity. For a generalized Boolean algebra \(\S\), let \(R(\S)\) denote the commutative R\(^*\)-algebra whose projection lattice is isomorphic to \(\S\). By the preceding theorem, such an R\(^*\)-algebra exists uniquely up to \(^*\)-isomorphism. The above theorem is highly reminiscent of a similar characterization of commutative C\(^*\)-/von Neumann algebras. The Gelfand--Naimark theorem tells us that the research of C\(^*\)-algebras is considered as "noncommutative locally compact Hausdorff spaces". Similarly, von Neumann algebras can be considered as "noncommutative measure spaces". The author believes that the theory of R\(^*\)-algebras can be considered as a theory of "noncommutative (generalized) Boolean algebras". It is known as *Stone's duality theorem* that the category of Boolean algebras is dually equivalent to that of Boolean spaces. Recall that a *Boolean space* (also known as a *Stone space*) is a zero-dimensional compact Hausdorff space. The lattice of clopen subsets of a Boolean space forms a Boolean algebra, which gives one direction of the correspondence between Boolean spaces and Boolean algebras. More generally, the category of generalized Boolean algebras is dually equivalent to that of zero-dimensional locally compact Hausdorff spaces. A zero-dimensional locally compact Hausdorff space is also called a locally compact Boolean space, and can be characterized as a locally compact Hausdorff space such that every connected component is a singleton. Let us revisit this correspondence from the viewpoint of R\(^*\)-and C\(^*\)-algebras. Let \(\S\) be a generalized Boolean algebra. Then the lattice of projections of the commutative R\(^*\)-algebra \(R(\S)\) is \(\S\). We consider the completion \(\widehat{R(\S)}\) of \(R(\S)\), which is a commutative C\(^*\)-algebra. Using this, we may interpret Stone's theorem as the equivalence of the following three categories: - the category of generalized Boolean algebras with lattice homomorphisms that preserve \(0\), - the category of commutative R\(^*\)-algebras with \(^*\)-homomorphisms, - the category of all \(C_0(K)\) for zero-dimensional locally compact Hausdorff spaces \(K\), with \(^*\)-homomorphisms. We may give a proof of this equivalence straightforwardly. The details are omitted, but let us just observe how the morphisms correspond. Let \(A\), \(B\) be commutative R\(^*\)-algebras. Let \(\psi\colon \P(A)\to \P(B)\) be a lattice homomorphism such that \(\psi(0)=0\). The corresponding \(^*\)-homomorphism \(\phi\colon A\to B\) can be described just as in Proof of Theorem [\[boole\]](#boole){reference-type="ref" reference="boole"}: Each element \(x\) of \(A\) can be written as \(x=\sum_{k=1}^n z_kp_k\) for some \(n\geq 1\), complex numbers \(z_1, z_2, \ldots, z_n\in \C\), and \(p_1, p_2, \ldots, p_n\in \P(A)\). Define \(\phi\colon A\to B\) by \(\phi(x):= \sum_{k=1}^n z_k\psi(p_k)\), and check that it is a well-defined \(^*\)-homomorphism. Secondly, given a \(^*\)-homomorphism \(\phi\colon A\to B\) (which is contractive), we may take its continuous extension \(\varphi\colon \widehat{A}\to \widehat{B}\) to completions, which is clearly a \(^*\)-homomorphism. Finally, a \(^*\)-homomorphism \(\varphi\colon \widehat{A}\to \widehat{B}\) maps \(\P(\widehat{A})=\P(A)\) into \(\P(\widehat{B})=\P(B)\), thus restricts to a lattice homomorphism that sends \(0\) to \(0\). Is it possible to generalize this equivalence to the setting of noncommutative R\(^*\)-algebras? Apparently, there is no that beautiful correspondence applicable to general R\(^*\)-algebras. Indeed, there exist distinct R\(^*\)-algebras \(A, B\) with \(\widehat{A}\cong \widehat{B}\) (see Example [\[compact\]](#compact){reference-type="ref" reference="compact"} and Section [5](#atom){reference-type="ref" reference="atom"}), so we cannot recover full information about \(A\) from \(\widehat{A}\). Moreover, in Proposition [\[opposite\]](#opposite){reference-type="ref" reference="opposite"} we prove that there exists a pair of noncommutative R\(^*\)-algebras which are not \(^*\)-isomorphic but the lattices of projections are orthoisomorphic. Thus the structure of an R\(^*\)-algebra cannot be fully recovered from the lattice of projections. Nonetheless, there do exist several nice correspondence results that apply to certain classes of R\(^*\)-algebras and their lattices of projections. See Sections [7](#countable){reference-type="ref" reference="countable"} and [8](#nd){reference-type="ref" reference="nd"}. # Purely atomic R\(^*\)-algebras and inner product spaces {#atom} Recall that a von Neumann algebra can be classified into several types by means of projections. In particular, a von Neumann algebra is said to be atomic if the least upper bound of minimal projections is the unit. It is a well-known fact, which follows from e.g. the type decomposition theorem of von Neumann algebras, that an atomic von Neumann algebra is an \(\ell_\infty\)-direct sum of type I factors. Let us define a class of R\(^*\)-algebras that is similar to the class of atomic von Neumann algebras. Since it is hard to consider the greatest lower bound of an infinite set of projections in an R\(^*\)-algebra, we want a definition that involves only finitely many projections. An *atom* of an R\(^*\)-algebra \(A\) is a minimal projection in \(\P(A)\setminus \{0\}\). Note that \(p\in \P(A)\) is an atom if and only if the R\(^*\)-algebra \(pAp\) is one-dimensional. We say an R\(^*\)-algebra \(A\) is *purely atomic* if every projection of \(A\) is a sum of finitely many atoms. We give a complete description of purely atomic R\(^*\)-algebras. It follows that a purely atomic R\(^*\)-algebra is ultramatricial. Indeed, for a purely atomic R\(^*\)-algebra \(A\) and a collection \(x_1, \ldots, x_n\in A\), define \(p:=\bigvee_{1\leq i\leq n}{l(x_i)}\vee\bigvee_{1\leq i\leq n}{r(x_i)}\), then \(pAp\) is finite-dimensional and \(x_1, \ldots, x_n\in pAp\). Let \(V\) be an inner product space. Let \(H\) be the completion of \(V\). Consider the collection \(F(V)\) of operators \(x\) in \(B(H)\) with finite rank such that \(r(x)H, l(x)H\subset V\) (namely, such that the ranges of \(x\) and \(x^*\) are included in \(V\)). It is easy to see that \(F(V)\) is a purely atomic R\(^*\)-algebra. Therefore, the classification of purely atomic R\(^*\)-algebras reduces to that of R\(^*\)-algebras of the form \(\bigoplus_{i\in I} F(V_i)\). In particular, the classification of purely atomic simple R\(^*\)-algebras is equivalent to that of inner product spaces. How rich is the class of inner product spaces? If we restrict ourselves to inner product spaces with countable Hamel dimension, then there is nothing interesting: Every inner product space with countably infinite Hamel dimension is linearly isometric to \(c_{00}\) as a subspace of \(\ell_2\). (Proof: Consider the Gram--Schmidt procedure.) On the other hand, we know that complete inner product spaces (\(=\) Hilbert spaces) are completely classified by the cardinality of orthonormal basis. In contrast, the behavior of incomplete inner product spaces with uncountable Hamel dimension is mysterious (even in the separable case). A class of inner product spaces with uncountable Hamel dimension is given by ranges of operators: If \(X\) is a Banach space and \(T\colon X\to H\) is a bounded linear operator, then the range \(TX\) of \(T\) is a linear subspace of \(H\), which forms an inner product space. Since there are many isomorphism classes of separable Banach spaces, we see that there are many simple purely infinite R\(^*\)-algebras arising from ranges of operators. What if we restrict ourselves to ranges of operators in \(B(H)\)? In the above proposition, we see for example that if in addition \(x\) belongs to the Schatten--von Neumann \(p\)-ideal for some \(1\leq p<\infty\), then so does \(y\). Therefore, there are many examples of mutually nonisometric inner product spaces that arise as ranges of compact operators in \(B(H)\). See and for more on operator ranges. Let us show that purely atomic R\(^*\)-algebras can also be algebraically characterized by an Artinian-type condition. What if one considers ascending chain condition instead of descending one? # R\(^*\)-algebras in comparison with von Neumann algebras, Baer \(^*\)-rings and continuous geometries {#comparison} Again let us recall the theory of von Neumann algebras. In the type classification of von Neumann algebras, two important concepts appear: abelian projections and finite projections. Recall that a projection \(p\) of a von Neumann algebra \(M\) is finite if every partial isometry \(v\in M\) with \(vv^*\leq v^*v=p\) satisfies \(vv^*=p\). Finiteness of projections in R\(^*\)-algebras is automatic. In what follows we consider abelian projections. For a von Neumann algebra \(M\), recall that \(M\) is of type I if and only if there is a family of abelian projections whose least upper bound is the unit. We say a projection \(p\) of an R\(^*\)-algebra \(A\) is *abelian* if the R\(^*\)-algebra \(pAp\) is commutative. Clearly, an atom is an abelian projection. The author is not aware whether there is a natural class of R\(^*\)-algebras that plays a role similar to that played by the class of type I von Neumann algebras in the theory of von Neumann algebras. Let \(A\) be an R\(^*\)-algebra. Two projections \(p, q\in \P(A)\) are said to be *equivalent* in \(A\) (in the sense of Murray--von Neumann, and written \(p\sim q\)) if there exists a partial isometry \(v\in A\) with \(v^*v=p\) and \(vv^*=q\). This is an equivalence relation in \(\P(A)\). The *center* of an R\(^*\)-algebra \(A\) is the collection \(\{x\in A\mid xy=yx\text{ for all }y\in A\}\). An element of \(A\) is said to be central if it belongs to the center of \(A\). Recall that a ring \(R\) is *Baer* if the right annihilator of every subset of \(R\) is generated by an idempotent as a principal right ideal, that is, if for every \(X\subset R\) there exists an idempotent \(e\in R\) (i.e., \(e=e^2\)) such that \(\{r\in R\mid Xr=0\} = eR\). A von Neumann algebra is a Baer \(^*\)-ring. The structure of Baer \(^*\)-rings is studied by Kaplansky (see also ) as a purely algebraic generalization of von Neumann algebras. Which R\(^*\)-algebras are Baer? Below we give the answer (Proposition [\[baer\]](#baer){reference-type="ref" reference="baer"}). Recall that a lattice \(\P\) is said to be *complete* if any family \((p_i)_{i\in I}\) of elements in \(\P\) has the least upper bound \(\bigvee_{i\in I} p_i\) (upward complete) and the greatest lower bound \(\bigwedge_{i\in I} p_i\) (downward complete). First let us recall a fact, which is actually true for general \(^*\)-regular rings, and sketch the proof. It is also common to consider completeness with respect to countably infinite collections. A lattice \(\P\) is said to be *\(\sigma\)-complete* if any countable family \((p_i)_{i\in I}\) of \(\P\) has the least upper bound \(\bigvee_{i\in I} p_i\) (upward \(\sigma\)-complete) and the greatest lower bound \(\bigwedge_{i\in I} p_i\) (downward \(\sigma\)-complete). Recall that these concepts are important in measure theory. A \(\sigma\)-field is a \(\sigma\)-complete Boolean algebra, and for a measure space \((X, \mathcal{F}, \mu)\) the collection \(\{A\in \mathcal{F} \mid \mu(A)<\infty\}\) forms a downward \(\sigma\)-complete generalized Boolean algebra. Notice that a \(\sigma\)-complete generalized Boolean algebra need not be Boolean. For example, for an uncountable set \(X\), consider the generalized field of sets formed of all (at most) countable subsets of \(X\). It should be also mentioned that a \(\sigma\)-complete Boolean algebra need not be orthoisomorphic to a \(\sigma\)-field (see ). Let us characterize R\(^*\)-algebras whose lattice of projections are upward/downward \(\sigma\)-complete. The characterization of Baer R\(^*\)-algebras is a special case of Proposition [\[sigma\]](#sigma){reference-type="ref" reference="sigma"}. Recall that a complete complemented modular lattice \(\P\) is called a (possibly reducible) *continuous geometry* if it satisfies \[\left(\bigvee_{i\in I} p_i\right) \wedge q = \bigvee_{i\in I} (p_i \wedge q)\] and \[\left(\bigwedge_{i\in I} p_i\right) \vee q = \bigwedge_{i\in I} (p_i \vee q)\] for any linearly ordered family \((p_i)_{i\in I}\) of elements in \(\P\) and \(q\in \P\). Von Neumann studied continuous geometries in. Kaplansky proved that every orthocomplemented complete modular lattice is actually a continuous geometry. Thus we obtain: We may prove it without resorting to Kaplansky's theorem. Therefore, R\(^*\)-algebras themselves do not provide interesting examples of continuous geometries. However, it should be worth mentioning that two important examples of continuous geometries can be constructed from sequentially ultramatricial R\(^*\)-algebras. For a von Neumann algebra \(M\) of finite type, the projection lattice of \(M\) forms a continuous geometry. (It is a remarkable fact that \(\P(M)\) is identified with the projection lattice of the \(^*\)-regular algebra \(\mathcal{U}(M)\) formed of all affiliated operators relative to \(M\). Observe that for the algebra \(A=\mathcal{U}(M)\), which can be considered as an algebra of unbounded operators on a Hilbert space, the equivalence of Theorem [\[equi\]](#equi){reference-type="ref" reference="equi"} is far from true.) In particular, the projection lattice of the AFD II\(_1\) factor \(\cR\) is a continuous geometry. Recall that \(\cR\) arises as the \(\sigma\)-weak closure of the R\(^*\)-algebra \(\bigotimes_{k\geq 1}\M_{n_k}\) (represented on a Hilbert space through the GNS-construction with respect to the trace), and it does not depend on the choice of integers \(n_k\geq 2\). On the other hand, von Neumann also considered the completion of \(\bigotimes_{k\geq 1}\M_{n_k}\) with respect to a metric called the rank metric, and proved that the lattice of projections forms a continuous geometry that does not depend on the choice of \((n_k)_{k\geq 1}\). He also proved that the lattice obtained in this way is different from any projection lattice of a finite von Neumann algebra. See for the details. # Classification of sequentially ultramatricial R\(^*\)-algebras {#countable} In this section, we give a classification result on locally finite-dimensional R\(^*\)-algebras with countable Hamel dimension. Clearly, an R\(^*\)-algebra has a countable Hamel basis if and only if it is countably generated as a \(^*\)-algebra. It follows that the class of locally finite-dimensional R\(^*\)-algebras with countable Hamel dimension coincides with that of sequentially ultramatricial R\(^*\)-algebras. It was shown by Bratteli (after Glimm's classification of UHF algebras ) that the classification problem of separable AF C\(^*\)-algebras is equivalent to that of sequentially ultramatricial R\(^*\)-algebras. The classification of sequentially ultramatricial R\(^*\)-algebras was completed by Elliott in the seminal paper. There are at least two formulations of this result: One is by dimension local semigroups, and the other is by \(K_0\)-groups. Although the former formulation appears in Elliott's original paper, it is seemingly less commonly used among specialists nowadays (indeed, it does not appear explicitly in standard textbooks like ). Let us briefly recall both of these two formulations because the former formulation will be essentially used in the proof of Theorem [\[sumlattice\]](#sumlattice){reference-type="ref" reference="sumlattice"}. Let \(A\) be an R\(^*\)-algebra. Let \(\E(A)\) denote the collection of idempotents, i.e., \(\E(A):=\{e\in A\mid e^2=e\}\). For \(e, f\in \E(A)\), we write \(e\sim_0 f\) if there exist \(x, y\in A\) with \(xy=e, yx=f\). Then \(\sim_0\) is an equivalence relation. Set \(d_0(A):= \E(A)/{\sim_0}\). For \(e\in \E(A)\), let \([e]_0\in d_0(A)\) denote the equivalence class with \(e\in [e]_0\). We define the partial binary operation \(+\) in \(d_0(A)\) in the following manner (*partial* in the sense that the operation is defined only for a certain collection of pairs of elements). For \([e]_0, [f]_0\in d_0(A)\), \([e]_0+[f]_0\) is defined if and only if there are \(e'\in [e]_0, f'\in [f]_0\) with \(e'f'=f'e'=0\), and in that case, we define \([e]_0+[f]_0=[e']_0+[f']_0:=[e'+f']_0\). This is actually a well-defined partially defined binary operation. The pair \((d_0(A), +)\) can also be obtained by means of projections. Consider the set \(d(A):=\P(A)/{\sim}\), where the equivalence relation \(\sim\) means the Murray--von Neumann equivalence. For \(p\in \P(A)\), let \([p]\in d(A)\) denote the equivalence class with \(p\in [p]\). We define the partial operation \(+\) in \(d(A)\) in the following manner. For \([p], [q]\in d(A)\), \([p]+[q]\) is defined if and only if there are \(p'\in [p], q'\in [q]\) with \(p'q'=0\), and in that case, we define \([p]+[q]=[p']+[q']:=[p'+q']\). Then this partial operation is well-defined, and moreover, by a routine argument as in or, \((d(A), +)\) is isomorphic to \((d_0(A), +)\) as sets endowed with partially defined operations. The *dimension local semigroup* of \(A\) is the pair \((d(A), +)\). Below we give minimal information to obtain the \(K_0\)-group of an R\(^*\)-algebra. See for example for more details about this. (Note that an R\(^*\)-algebra \(A\) is a local C\(^*\)-algebra in the sense of, namely, \(A\) is a pre-C\(^*\)-algebra that is closed under holomorphic functional calculus.) For an R\(^*\)-algebra \(A\), we consider the R\(^*\)-algebra \(\M_{\infty}(A)\), which can be considered as the collection of \(\N\times\N\) matrices with finitely many nonzero entries in \(A\). For \(n\geq 1\), we identify \(\M_{n}(A)\) with the collection of all operators in \(\M_{\infty}(A)\) whose nonzero entries are in the \(n\times n\) upper-left corner. In that way we identify \(\M_{\infty}(A)\) with the directed union of \((\M_n(A))_{n\geq 1}\). Observe that for every pair of projections \(p, q\in \M_{\infty}(A)\) there exists a pair of mutually orthogonal projections \(p', q'\in \M_{\infty}(A)\) with \(p\sim p'\), \(q\sim q'\). Thus the operation \(+\) on the set \(d(\M_{\infty}(A))\) is defined for every pair of projections. We define \(V(A) := d(\M_{\infty}(A))\), which is an abelian semigroup endowed with operation \(+\). The \(K_0\)-group \(K_0(A)\) of \(A\) is defined as the Grothendieck group of \((V(A), +)\). In the setting of nonunital C\(^*\)-algebras, it is mathematically more natural to define the \(K_0\)-group using the \(K_0\)-group of the unitization (see ). However, the above naive definition works in the setting of R\(^*\)-algebras: Recall that the projection lattice of an R\(^*\)-algebra (in particular \(\M_{\infty}(A)\)) forms a net, which is an approximate identity. Therefore, by, our definition of the \(K_0\)-group coincides with the usual definition. Recall that a unital (C\(^*\)-, or more general normed) algebra is said to have *stable rank one* if the collection of invertible elements is dense. Clearly, a unital R\(^*\)-algebra and its completion have stable rank one. It follows by that \(V(A)\) is a cancellation semigroup, which means that there is a canonical injection from \(V(A)\) into \(K_0(A)\). It is easy to see that the same is true for nonunital R\(^*\)-algebras. The image of this injection is written as \(K_0(A)_+\). Then \(K_0(A)_+\) forms a cone of \(K_0(A)\) which makes \(K_0(A)\) an ordered group. The *scale* of \(K_0(A)\) is defined as the subset \(\Sigma(A):=\{[p]\mid p\in \P(A) \,\,(= \P(\M_1(A))\subset\P(\M_{\infty}(A)))\}\) of \(K_0(A)_+\). We are now in the position of stating Elliott's theorem (see, and ). The equivalence \(A\cong B \iff \widehat{A}\cong \widehat{B}\) means that distinct sequentially ultramatricial R\(^*\)-algebras have distinct completions (separable AF C\(^*\)-algebras), and moreover, for each separable AF C\(^*\)-algebra any pair of dense R\(^*\)-subalgebras with countable Hamel dimension is mutually \(^*\)-isomorphic. Recall that the same is true for the class of commutative R\(^*\)-algebras by Stone's theorem. Theorem [\[elliott\]](#elliott){reference-type="ref" reference="elliott"} is invalid for ultramatricial R\(^*\)-algebras with uncountable Hamel dimension. For example, it is easy to see that both \[(\widehat{F(\ell_2)}, d(F(\ell_2)), K_0(F(\ell_2)), K_0(F(\ell_2))_+, \Sigma(F(\ell_2)))\] and \[(\widehat{\M_{\infty}}, d(\M_{\infty}), K_0(\M_{\infty}), K_0(\M_{\infty})_+, \Sigma(\M_{\infty}))\] are isomorphic to \[(K(\ell_2), \Z_{\geq 0}, \Z, \Z_{\geq 0}, \Z_{\geq 0}).\] In what follows we give a lattice theoretic condition that is equivalent to the conditions of Theorem [\[elliott\]](#elliott){reference-type="ref" reference="elliott"}. We say two projections \(p, q\) of an R\(^*\)-algebra \(A\) are *perspective* if there exists a projection \(r\in \P(A)\) such that \(p\wedge r=0=q\wedge r\) and \(p\vee r=q\vee r\). We write \(p\approx q\) if there is a collection \(p_0:=p, p_1, \ldots, p_n:=q\) of finitely many projections in \(A\) such that \(p_{j-1}\) and \(p_{j}\) are perspective, \(j=1, \ldots, n\). As a corollary, we see that a unital R\(^*\)-algebra has some special properties as a regular ring. In Section [8](#nd){reference-type="ref" reference="nd"}, we will see that lattice isomorphisms of projection lattices of certain R\(^*\)-algebras can be described more explicitly by means of ring isomorphisms, as a consequence of von Neumann's theorem (Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"}). More results on separable AF C\(^*\)-algebras are summarized in. Mundici and Panti studied separable AF C\(^*\)-algebras \(\widehat{A}\) such that \(d(A)\) forms a lattice. # Von Neumann, Dye, Gleason {#nd} In this section, we give several results concerning mappings on the lattice of projections of an R\(^*\)-algebra. First, we give a consequence of von Neumann's result. A *ring isomorphism* is an additive and multiplicative bijection. It is not necessarily linear. Indeed, there exist many nonlinear ring automorphisms of \(\C\). Let \(A, B\) be R\(^*\)-algebras. Recall that each principal right ideal of \(A\) can be written as \(pA\) for a unique projection \(p\in \P(A)\). Therefore, if \(\phi\colon A\to B\) is a ring isomorphism, then there exists a unique lattice isomorphism \(\psi\colon \P(A)\to\P(B)\) such that \[\phi(pA)=\psi(p)B\] for all \(p\in \P(A)\). (Note that this equation implies \(l(\phi(p))=\psi(p)\).) Von Neumann's theorem states that the converse also holds under a certain condition. The uniqueness of \(\phi\) in the above theorem can be obtained from the proposition below. If \(\phi\) and \(\phi'\) are ring isomorphisms from \(\M_n(A)\) onto \(B\) that satisfy the condition of Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"}, then \(\phi^{-1}\circ \phi'\) maps each principal right ideal of \(\M_n(A)\) onto itself. Thus the preceding proposition implies \(\phi^{-1}\circ \phi'=\operatorname{id}_{\M_n(A)}\), and \(\phi'=\phi\). A somewhat surprising fact is that we cannot drop the assumption of the existence of unit in Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"}. Recall that a mapping \(\phi\colon A\to B\) between \(^*\)-algebras is called a *Jordan \(^*\)-homomorphism* (resp. a *Jordan \(^*\)-isomorphism*) if it is a linear mapping (resp. a linear bijection) such that \(\phi(x)^*=\phi(x^*)\) and \(\phi(x^2)=\phi(x)^2\) for every \(x\in A\). Clearly, if \(A\) and \(B\) are R\(^*\)-algebras, \(\phi\colon A\to B\) is a Jordan \(^*\)-homomorphism and \(x\in A\) is self-adjoint (resp. positive, a projection), then so is \(\phi(x)\in B\). Jordan \(^*\)-isomorphisms appear quite often in studying mappings between operator algebras that preserve certain structures. See Molnár's recent article for more about Jordan \(^*\)-isomorphisms between C\(^*\)-algebras. By strengthening the assumption of Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"}, we obtain a Feldman--Dye type result. Let \(A, B\) be R\(^*\)-algebras. A bijection \(\psi\colon \P(A)\to \P(B)\) is called an orthoisomorphism if \(pq=0\iff \psi(p)\psi(q)=0\) for every pair \(p,q\in \P(A)\). It is easy to verify that an orthoisomorphism \(\psi\colon \P(A)\to\P(B)\) is a lattice isomorphism and \(\psi(p^{\perp})=\psi(p)^{\perp}\) if \(A\) and \(B\) are unital, so this definition is consistent with the definition of orthoisomorphism in Section [4](#com){reference-type="ref" reference="com"}. Dye (see also Feldman's ) proved that every orthoisomorphism between the projection lattices of two von Neumann algebras extends to a Jordan \(^*\)-isomorphism if one of the von Neumann algebras is without type I\(_2\) direct summands. To obtain this theorem, Dye needed to appropriately modify the proof of von Neumann's. In the setting of R\(^*\)-algebras, we may directly apply Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"} to consider orthoisomorphisms of the projection lattices. The proof below is partly based on. It should be worth mentioning that we do not need the assumption of the existence of unit in this theorem. The assumption \(n\geq 3\) is essential in Theorem [\[dye\]](#dye){reference-type="ref" reference="dye"} (and Theorem [\[neumann\]](#neumann){reference-type="ref" reference="neumann"}). Indeed, it is easy to find wild examples of orthoisomorphisms from \(\P(\M_2)\) onto itself. A *\(^*\)-antiisomorphism* \(\phi\colon A\to B\) between \(^*\)-algebras is a complex-linear bijection with \(\phi(x^*)=\phi(x)^*\), \(\phi(xy)=\phi(y)\phi(x)\) for every pair \(x, y\in A\). Clearly, a \(^*\)-antiisomorphism is a Jordan \(^*\)-isomorphism. Theorem [\[dye\]](#dye){reference-type="ref" reference="dye"} motivates the following question: How far are Jordan \(^*\)-isomorphisms from \(^*\)-isomorphisms? In particular, how different are \(^*\)-antiisomorphisms from \(^*\)-isomorphisms? A more specific question is: Is there a pair of mutually \(^*\)-antiisomorphic R\(^*\)-algebras that are not \(^*\)-isomorphic, or equivalently, is there an R\(^*\)-algebra that is not \(^*\)-isomorphic to its opposite R\(^*\)-algebra? Here, for an R\(^*\)-algebra \(A\), its *opposite R\(^*\)-algebra* \(A^{\mathrm{op}}\) is defined in the following manner. As a complex normed space \(A^{\mathrm{op}}\) is equal to \(A\). For each \(x\in A\) we write the corresponding element in \(A^{\mathrm{op}}\) as \(x^{\mathrm{op}}\) in order to distinguish \(A\) from \(A^{\mathrm{op}}\). We define the \(^*\)-algebra structure of \(A^{\mathrm{op}}\) by \((x^{\mathrm{op}})^* := (x^*)^{\mathrm{op}}\) and \(x^{\mathrm{op}}y^{\mathrm{op}} := (yx)^{\mathrm{op}}\) for \(x, y\in A\). Then it is easy to show that \(A^{\mathrm{op}}\) forms an R\(^*\)-algebra that is \(^*\)-antiisomorphic to \(A\). It is a trivial fact that every commutative R\(^*\)-algebra is \(^*\)-isomorphic to its opposite. By the Elliott classification theorem, it is plain that every sequentially ultramatricial R\(^*\)-algebra is \(^*\)-isomorphic to its opposite. How about general R\(^*\)-algebras? Banach space theory gives an answer. For a complex normed space \(X\), its *complex conjugate normed space* \(\overline{X}\) is defined in the following manner. As a real normed space \(\overline{X}\) is equal to \(X\). For each \(v\in X\) we write the corresponding element in \(\overline{X}\) as \(\overline{v}\) in order to distinguish \(X\) from \(\overline{X}\). We define the complex-linear structure of \(\overline{X}\) by \(\lambda \overline{v}:= \overline{\overline{\lambda}v}\) \(v\in X\), \(\lambda\in \C\). The difference between an algebra and its opposite for operator algebras has been considered by many hands. In the setting of von Neumann algebras, Connes discovered an example of a II\(_1\) factor which is not \(^*\)-isomorphic to its opposite, giving a negative solution to Problem 4 of Kadison's list. By now many examples of C\(^*\)-algebras that are not \(^*\)-isomorphic to their opposites are known. However, it remains as an open problem whether there exists a simple nuclear separable C\(^*\)-algebra that is not \(^*\)-isomorphic to its opposite. The case of AF C\(^*\)-algebras is still under investigation in the literature. Indeed, in Farah and Hirshberg proved the existence of a (nonseparable) AF C\(^*\)-algebra that is not \(^*\)-isomorphic to its opposite under some set-theoretic axiom that is consistent with ZFC. It is an open problem whether such an example can be constructed inside ZFC. See for more details about the state-of-the-art on this topic. Let \(A\) be an R\(^*\)-algebra or a von Neumann algebra. A function \(\mu\colon \P(A)\to \R\) is called a *finitely additive* (signed) *measure* if it satisfies \[\mu(p+q) = \mu(p)+\mu(q)\] for every pair of mutually orthogonal projections \(p, q\in\P(A)\). Mackey's problem asks whether a finitely additive measure extends to a linear mapping under a suitable assumption. This question is motivated by the theory of quantum logic. Gleason proved that every positive countably-additive measure on the projection lattice of \(B(H)\), except for the case \(H\) is \(2\)-dimensional, extends to a bounded normal functional. More generally, it was proved by Bunce and Wright that every finitely additive measure with bounded range extends uniquely to a bounded linear functional in the setting of general von Neumann algebras without type I\(_2\) direct summands. We give a Gleason-type result for a certain class of R\(^*\)-algebras. Let \(A\) be an ultramatricial R\(^*\)-algebra. We say \(A\) satisfies the property (N2) if \(A\) can be written as the union of an increasing net \((A_i)_{i\in I}\) of finite-dimensional R\(^*\)-algebras such that no \(A_i\) has \(\M_2\) as its direct summand. Let \(A\) be an R\(^*\)-algebra and \(\mu\) a finitely additive measure on \(\P(A)\). Since every operator \(x\in A\) has cartesian decomposition \(x=a+bi\) with \(a, b\in A\) self-adjoint, \(x\) is written as a finite linear combination of projections. Thus the uniqueness of linear extension of a finitely additive measure is clear. If in addition \(\lVert x\rVert\leq 1\), then \(0\leq a_{\pm}, b_{\pm}\leq 1\) (see Proposition [\[operation\]](#operation){reference-type="ref" reference="operation"} (2)) and they are in the convex hull of \(\P(A)\). If \(\mu\) extends to a linear functional \(f\) on \(A\), then we have \(f(x) = f(a_+)-f(a_-) +if(b_+)-if(b_-)\), and \(f(a_+), f(a_-), f(b_+), f(b_-)\) belong to the convex hull of \(\mu(\P(A))\). Therefore, if \(\mu(\P(A))\) is a bounded subset of \(\R\) then the linear extension, if exists, is bounded. # Questions {#question} In this section, we propose naive questions on R\(^*\)-algebras. These questions are not complete: some of them might be trivially easy to solve, and some might be totally meaningless to consider, but some should have essential importance. First of all, the author suspects that the theory of R\(^*\)-algebras falls into one of the following two possibilities: - If every R\(^*\)-algebra is locally finite-dimensional or ultramatricial, then chances are that we can capture a lot about the structure of general R\(^*\)-algebras. Indeed, we already have a complete classification result of locally finite-dimensional R\(^*\)-algebras with countable Hamel dimension (Section [7](#countable){reference-type="ref" reference="countable"}). - If not, then the theory of R\(^*\)-algebras should be so deep that the full understanding might be far out of the reach. That is because once we get one wild example of an R\(^*\)-algebra we may easily construct many other wild examples by Section [3](#example){reference-type="ref" reference="example"}. In that case, R\(^*\)-algebras would be all the more interesting as a new area of "noncommutative" mathematics. Szűcs and Takács proved that there exists a finitely generated infinite-dimensional R\(^*\)-algebra if and only if there exists a singly generated infinite-dimensional R\(^*\)-algebra \(A\) (which means that there exists \(x\in A\) with \(\A^*(x)=A\)). The latter remains to be a hard problem, it seems. The difficulty of considering singly generated \(^*\)-algebras can also be observed in the following relevant famous open problem, which is listed in Kadison's problems right before Problem [\[kadison\]](#kadison){reference-type="ref" reference="kadison"}. Is every von Neumann algebra acting on a separable Hilbert space \(H\) singly generated (as a \(\sigma\)-weakly closed \(^*\)-subalgebra of \(B(H)\))? For more details on this famous problem, see. We have seen the importance of the uniqueness of C\(^*\)-norm for R\(^*\)-algebras in Theorem [\[c\*norm\]](#c*norm){reference-type="ref" reference="c*norm"}. Recall that uniqueness of C\(^*\)-norm is important in the theory of C\(^*\)-algebras, too. Indeed, nuclearity of a C\(^*\)-algebra, which lies in the core of the study of C\(^*\)-algebras, is defined in terms of the uniqueness of C\(^*\)-norm: A C\(^*\)-algebra \(A\) is nuclear if for every C\(^*\)-algebra \(B\) the algebraic tensor product \(A\otimes B\) has a unique C\(^*\)-norm. It is natural to ask the following question. Property (LC\(^*\)) in Section [2](#defi){reference-type="ref" reference="defi"} gives one sufficient condition. In the case of the group algebra \(\C[G]\) of a discrete group \(G\), Grigorchuk, Musat and Rørdam asked in whether \(\C[G]\) has a unique C\(^*\)-norm if and only if \(G\) is locally finite. It was pointed out by N. Ozawa that this question has a negative solution, see. Let us also give a related question, which makes sense only in the case there exists a non-ultramatricial R\(^*\)-algebra. Note that if the answer is affirmative then \(A\otimes B\) has a unique C\(^*\)-norm, which further implies that \(\widehat{A}\otimes \widehat{B}\) has a unique C\(^*\)-norm, or in other words, \((\widehat{A}, \widehat{B})\) is a nuclear pair. Another question that makes sense only in the case there exists a non-ultramatricial R\(^*\)-algebra is the following. Let us propose a question about the property of R\(^*\)-algebras that is shared with C\(^*\)-/von Neumann algebras. We know that every C\(^*\)-algebra and every R\(^*\)-algebra satisfy (1). So does the union of an increasing net of C\(^*\)-algebras. In Blackadar's book a \(^*\)-subalgebra \(A\subset B(H)\) that satisfies (1) is called a local C\(^*\)-algebra. Note that in the article the same term local C\(^*\)-algebra is used in another sense: It means a \(^*\)-subalgebra \(A\subset B(H)\) with the property (LC\(^*\)) in Section [2](#defi){reference-type="ref" reference="defi"}, which is a condition far weaker than (2). Every von Neumann algebra and every R\(^*\)-algebra satisfy (2) and (3). If \(A\subset B(H)\) is a \(^*\)-subalgebra and the \(\sigma\)-weak closure of \(\A^*(x)\) is contained in \(A\) for every normal element \(x\in A\), then \(A\) satisfies (2). We do not know whether (2) implies (1). Recall that a directed union of R\(^*\)-algebras is an R\(^*\)-algebra. This together with Zorn's lemma enables us to consider maximal R\(^*\)-algebras: For every C\(^*\)-algebra \(A\) there is a maximal R\(^*\)-subalgebra \(B\subset A\) (in the sense that if \(B_0\subset A\) is an R\(^*\)-subalgebra of \(A\) with \(B\subset B_0\) then \(B=B_0\)). Remark that if \(A\subset B(H)\) is an R\(^*\)-subalgebra then \(A+F(H)+\C \operatorname{id}_H\) is also an R\(^*\)-algebra. Thus a maximal R\(^*\)-subalgebra \(A\subset B(H)\) needs to satisfy \(F(H)+\C \operatorname{id}_H\subset A\). By the type decomposition theorem of von Neumann algebras and Dye's theorem, it is easy to see that a pair of von Neumann algebras have mutually orthoisomorphic projection lattices if and only if the von Neumann algebras are Jordan \(^*\)-isomorphic. We do not have a succinct decomposition result for R\(^*\)-algebras. That is why the following question can possibly have a negative answer. It is also of interest whether the "orthoisomorphic" in this question can be replaced with "lattice isomorphic". Example [\[nonunital\]](#nonunital){reference-type="ref" reference="nonunital"} implies that this is not true in the non-unital case. On the other hand, the author's result (see also by Ayupov and Kudaybergenov) implies that a pair of certain von Neumann algebras have mutually isomorphic projection lattices (as lattices) if and only if the von Neumann algebras are Jordan \(^*\)-isomorphic. If we restrict ourselves to the case \(A\) and \(B\) are sequentially ultramatricial R\(^*\)-algebras, Theorem [\[sumlattice\]](#sumlattice){reference-type="ref" reference="sumlattice"} states that \(A\) and \(B\) are \(^*\)-isomorphic if \(\P(A)\) is lattice isomorphic to \(\P(B)\). This motivates a further question concerning the non-ultramatricial case: Every statement about (generalized) Boolean algebras gives rise to a question about R\(^*\)-algebras. Below we propose several questions in this direction. Before that, we remark that there are several other attempts to give a framework for the theory of noncommutative Boolean algebras or noncommutative Boolean spaces. One natural way is to detect the class of commutative C\(^*\)-algebras that arise as \(C_0(K)\) for zero-dimensional (locally) compact Hausdorff spaces \(K\). This class coincides with that of commutative C\(^*\)-algebras with real rank zero (i.e., every self-adjoint operator is in the norm closure of the collection of self-adjoint operators with finite spectra). Thus one may consider C\(^*\)-algebras with real rank zero as noncommutative analogs of zero-dimensional locally compact Hausdorff spaces. See for more information about real and stable rank. Another way of formulating noncommutative Boolean algebras is to consider a certain class of inverse semigroups, which in connection with groupoids can be related to the theory of C\(^*\)-algebras. See for the details. Yet another direction of research is the theory of quantum logic initiated by Birkhoff and von Neumann, see. The main target of this theory is an orthomodular lattice (usually assumed to be \(\sigma\)-complete), which is an orthocomplemented lattice \(\P\) such that \(p\vee (q\wedge p^{\perp})=q\) for any \(p, q\in \P\) with \(p\leq q\). This class of lattices includes the projection lattices of von Neumann algebras. By Stone's theorem, zero-dimensional locally compact Hausdorff spaces are in one-to-one correspondence with generalized Boolean algebras. Recall that our main discovery in this paper is that R\(^*\)-algebras form noncommutative analogs of generalized Boolean algebras. For this reason, the author guesses that those C\(^*\)-algebras obtained by completing R\(^*\)-algebras can be considered as noncommutative analogs of zero-dimensional locally compact Hausdorff spaces. (However, we need to be aware of the fact that the completion, e.g. \(K(H)\), can have many different dense R\(^*\)-subalgebras.) Now it is natural to ask: By definition (see Example [\[af\]](#af){reference-type="ref" reference="af"}) this class contains all AF C\(^*\)-algebras. Recall that the completion of an R\(^*\)-algebra has real rank zero, and stable rank one if unital. Is it true that the completion of every R\(^*\)-algebra is nuclear? If every R\(^*\)-algebra is ultramatricial, then a C\(^*\)-algebra is the completion of some R\(^*\)-algebra if and only if it is AF. Blackadar once wrote in the first edition of his book on K-theory of C\(^*\)-algebras the sentence "AF algebras are in some sense the "zero-dimensional\" C\(^*\)-algebras", but he added to this sentence in the second edition the phrase "although real rank zero is now regarded as the most natural noncommutative analog of zero-dimensionality". Let us summarize several facts on Boolean algebras. Although Theorem [\[elliott\]](#elliott){reference-type="ref" reference="elliott"} is very important in the theory of AF C\(^*\)-algebras, it gives no better understanding of commutative AF C\(^*\)-algebras/generalized Boolean algebras. This fact can be observed in the following proposition. We omit the proof because it is easy and these facts should be well-known. There exist many wild examples of Boolean algebras and Boolean spaces, which implies the existence of wild commutative R\(^*\)-algebras. Are there similar examples in the noncommutative case? Question [\[tensor?\]](#tensor?){reference-type="ref" reference="tensor?"} might force us to consider only the case of ultramatricial R\(^*\)-algebras. See also the Scottish Book Problem 77. Let us also consider the following similar question: Is there an R\(^*\)-algebra \(A\) that is \(^*\)-isomorphic to \(\M_3(A)\), but not to \(\M_2(A)\)? If we restrict ourselves to the simple purely atomic case, this reduces to the following one. Is there an inner product space \(V\) such that \(V\) is isometrically isomorphic to the \(\ell_2\)-direct sum \(V\oplus V\oplus V\) but not to \(V\oplus V\)? This question is reminiscent of an example by Gowers and Maurey in of a Banach space \(X\) that is isomorphic to \(X\oplus X\oplus X\) but not to \(X\oplus X\) (as Banach spaces). In the general setting of R\(^*\)-algebras, the infinite tensor product \(\bigotimes_{n\geq 1} \M_3\) is an example that satisfies the condition of the question. (The author thanks Masaki Izumi for pointing out this fact.) In Kalton and Roberts proved that there exists a constant \(K>0\) such that for every Boolean algebra \(\S\) and every map \(f\colon \S \to \R\) with \(f(0)=0\) and \(\lvert f(p\vee q)-f(p)-f(q)\rvert \leq 1\) for any mutually orthogonal pair \(p, q\in \S\), there exists a finitely additive (signed) measure \(\mu\colon \S\to \R\) such that \(\lvert f(p)-\mu(p)\rvert\leq K\) for every \(p\in \S\). This theorem was applied in to study a certain property of (quasi-)Banach spaces. By comparing this with Theorem [\[gleason\]](#gleason){reference-type="ref" reference="gleason"}, it is fairly natural to formulate its noncommutative version. It might be interesting to consider the same question for the projection lattice of a von Neumann algebra.
{'timestamp': '2022-03-23T01:10:43', 'yymm': '2107', 'arxiv_id': '2107.05806', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05806'}
# Introduction With the increasing performance and applicability of machine learning algorithms, and in particular of deep learning, the safety of such methods became more relevant than ever. There has been growing concern over the course of the last few years regarding adversarial attacks, i.e., algorithms which are able to fool machine learning models with minimal input perturbations, as they were shown to be very effective. Ideally, theoretical robustness bounds should be obtained in the case of critical software involving image classification components. There has been important recent research in this direction, but most often the algorithms generating these bounds work for limited classes of models, do not scale well with larger neural networks, and require complete knowledge of the target model's internals. Therefore, complementary empirical robustness evaluations are required for a better understanding of how robust the image classifiers are. In order to achieve this, one has to come up with effective adversarial attacks that resemble real-life conditions, such as in the black-box query-limited scenario. In general, adversarial attacks are classified as either white-box or black-box. White-box adversarial attacks, where the attacker has complete knowledge of the target model, were shown to be particularly successful, most of them using gradient-based methods. In the case of black-box adversarial attacks, the attacker can only query the model, and has no access to the model internals and to the data used for training. These restrictions make the black-box adversarial setup resemble more real-life scenarios. Furthermore, the attacker usually has to minimise the number of queries to the model, either due to time or monetary constraints (such as in the case of some vision API calls). Previous state-of-the-art black-box adversarial attacks focused on exploiting the transferability phenomenon, which allowed the attackers to train substitute models imitating the target one, and perform white-box attacks on these. More recently, a class of black-box adversarial attacks, called Zeroth Order Optimization (\(\textbf{ZOO}\)) , has gained momentum, providing one of the current state-of-the art attacks, \(\textbf{AutoZOOM}\) (). Interestingly, a much simpler algorithm, \(\textbf{SimBA}\) (Simple Black-box Attack), achieves a similar, slightly lower success rate than state-of-the-art attacks, including \(\textbf{AutoZOOM}\), and requires a lower number of queries. Therefore, \(\textbf{SimBA}\) is proposed to be used as a default baseline for any adversarial attack, but it is itself an unexpectedly powerful algorithm. We propose \(\textbf{EvoBA}\), an untargeted black-box adversarial attack that makes use of a simple evolutionary search strategy. \(\textbf{EvoBA}\) only requires access to the output probabilities of the target model for a given input and needs no extra training. \(\textbf{EvoBA}\) is more query-efficient than \(\textbf{SimBA}\) and \(\textbf{AutoZOOM}\), and has a perfect success rate, surpassing \(\textbf{SimBA}\) and being aligned with \(\textbf{AutoZOOM}\) from this point of view. We designed \(\textbf{EvoBA}\) to minimize the \(L_0\) adversarial perturbation, however we also report the \(L_2\) norms of the perturbations it generates and compare them with the \(L_2\) norms of \(\textbf{AutoZOOM}\) and \(\textbf{SimBA}\), which are \(L_2\) adversarial attacks. Despite our algorithm aiming to minimize a different metric than these methods, we achieve similar \(L_2\) norms in the perturbations we generate, and a significantly better \(L_0\). \(\textbf{EvoBA}\) is a model-agnostic empirical tool that can be used as a test to assess how robust image classifier systems are with respect to \(L_0\) noise. Therefore, \(\textbf{EvoBA}\) is both a simple and strong baseline for black-box adversarial attacks, but also a generic \(L_0\) robustness evaluation method that can be used in a fast and reliable way with any system involving image classification. While \(L_2\) (Euclidean distance) and \(L_{\infty}\) (maximum absolute pixel-wise distance) adversarial attacks are more commonly studied, \(L_0\) (count of modified pixels distance) adversarial attacks can fit better real-life, physical settings, such as in the well-known cases of graffiti perturbations on stop-signs from and of adversarial eyeglass frames from. As notes, . The main property of adversarially perturbed images is that they are very close from a human point of view to the original benign image, but trick the model into predicting the wrong class. While the notion of is hard to quantify, there exists general consensus around using the \(L_0, L_2, \text{ and } L_{\infty}\) norms as proxies for measuring the adversarial perturbations. \(\textbf{EvoBA}\) focuses on the \(L_0\) norm, is fast, query-efficient, and effective. Therefore, we propose using it together with similarly fast and efficient methods that focus on different norms, such as \(\textbf{SimBA}\), which focuses on \(L_2\), and \(\textbf{DeepSearch}\) (), which focuses on \(L_{\infty}\), to empirically evaluate the robustness of image classifiers. These methods can act together as a fast and general toolbox used along the way of developing systems involving image classification models. \(\textbf{EvoBA}\) can easily be incorporated in development pipelines for gaining fast insights into a model's \(L_0\) empirical robustness, only requiring access to the classifier's prediction method and to a sample of target images together with their corresponding labels. Moreover, many adversarial training methods focus on improving the robustness with respect to \(L_0, L_2, \text{ and } L_{\infty}\) perturbations. Therefore, it is important to be able to empirically evaluate how much the robustness of target models improve due to adversarial training with respect to these norms. A toolbox consisting of efficient and reliable attacks such as \(\textbf{EvoBA}\), \(\textbf{DeepSearch}\), and \(\textbf{SimBA}\) can serve this purpose. \(\textbf{EvoBA}\) is most surprising through its dual nature, acting both as a strong and fast black-box adversarial attack, such as \(\textbf{SimBA}\), but also achieving results which are in line with much more complex, state-of-the art black-box attacks, such as \(\textbf{AutoZOOM}\). To wrap it up, we propose \(\textbf{EvoBA}\) as a standard strong baseline for any black-box adversarial attack and as a tool that can provide empirical insight into how robust image classifiers are. Its main advantages are that it is as effective as state-of-the-art black-box attacks, such as \(\textbf{AutoZOOM}\), and more query-efficient. While it is an \(L_0\) adversarial attack, it achieves \(L_2\) perturbations of similar magnitudes with state-of-the-art \(L_2\) black-box attacks and requires no training. Furthermore, \(\textbf{EvoBA}\) is highly parallelisable, which allows it to run significantly faster than \(\textbf{SimBA}\), the other powerful baseline black-box attack. \(\textbf{Our contributions}\): - We propose \(\textbf{EvoBA}\), a fast, query-efficient, and effective black-box \(L_0\) adversarial attack, which can be used as a generic test for assessing the \(L_0\) robustness of image classifiers. - We show how \(\textbf{EvoBA}\) compares favourably to the state-of-the art black-box \(L_2\) attack \(\textbf{AutoZOOM}\), while being significantly simpler. - We show how \(\textbf{EvoBA}\) (an \(L_0\) attack) serves a similar purpose to the other strong and simple baselines such as \(\textbf{SimBA}\) (an \(L_2\) attack) and \(\textbf{DeepSearch}\) (an \(L_{\infty}\) attack). These methods are suitable to be run together, as part of a robustness testing toolbox, while developing any image classification model. \(\textbf{Paper outline}\): - In Section [2](#sect:related_work){reference-type="ref" reference="sect:related_work"} we do a quick literature review around related work and position \(\textbf{EvoBA}\) with respect to the presented methods. - In Section [3](#sect:the_method){reference-type="ref" reference="sect:the_method"} we introduce \(\textbf{EvoBA}\) together with the threat model we use. We provide pseudocode for \(\textbf{EvoBA}\) and explain the main ideas behind it. We also analyze its space and time complexities. - In Section [4](#sect:experiments){reference-type="ref" reference="sect:experiments"} we present our experimental methodology and setup, provide and analyse the quantitative results of \(\textbf{EvoBA}\) in comparison with other methods, and present some qualitative results. - In Section [5](#sect:concl){reference-type="ref" reference="sect:concl"} we wrap-up the main findings and propose future research directions for our work. # Related Work {#sect:related_work} While the black-box adversarial attack settings are far more restrictive than the white-box ones, their similarity to real-life scenarios has increasingly brought them into the spotlight of machine learning safety. One general approach for black-box attacks exploits the transferability property of adversarial examples. The attacker can train their own substitute model and perform white-box attacks on it, which usually yield good adversarial samples for the target model as well. However, showed the limitations of this method, highlighting how not all white-box attacks and not all architectures transfer well. A class of approaches that do not rely on transferability is based on Zeroth Order Optimization (ZOO), which tries to estimate the gradients of the target neural network in order to generate adversarial examples. One of the early algorithms in this direction, \(\textbf{ZOO}\) managed to reach similar success rates with state-of-the-art white-box attacks, producing adversarial samples of comparable visual quality. In general, Zeroth Order Optimization refers to any functional optimization where gradients are not available, so the term has commonly been adapted in the field of black-box adversarial attacks as a general category of methods that estimate the gradients. The main disadvantage of traditional ZOO-type attacks is that they usually require plenty of queries for approximating the coordinate-wise gradients. \(\textbf{AutoZOOM}\) solved this issue by performing a dimensionality reduction on top of the target image, and then using the ZOO approach in the reduced space. It achieved results that are aligned with previous ZOO state-of-the-art methods, but managed to reduce the query count by up to \(93\%\) on datasets such as MNIST, ImageNet, and CIFAR-10. Our method is comparable to \(\textbf{AutoZOOM}\) in terms of performance, achieving a similar success rate with a slightly lower query count, but has the main advantage of being considerably simpler. Our approach does not need to estimate gradients at all and, compared to \(\textbf{AutoZOOM-AE}\)-the more powerful attack from, it does not require any form of training or knowledge about the training data. In addition, \(\textbf{AutoZOOM}\) demands access to the output probabilities over all classes, unlike our method, which only requires the output class and its probability. While \(\textbf{AutoZOOM}\) is an attack that minimizes the \(L_2\) perturbations norm, \(\textbf{EvoBA}\) is focused on minimising the \(L_0\) norm. However we also report the \(L_2\) and notice that it is comparable to \(\textbf{AutoZOOM}\)'s results. \(\textbf{SimBA}\) (Simple Black-box Adversarial Attack, ) is a very simple strategy that has comparable performance to the significantly more complex \(\textbf{AutoZOOM}\). The method randomly iterates through all pixels, perturbing them with fixed noise amounts if this makes the model output a lower probability for the correct class. \(\textbf{EvoBA}\) has a similar complexity to \(\textbf{SimBA}\), both of them being good candidates for strong adversarial attack baselines. \(\textbf{SimBA}\) is mainly powered up by the randomness of choosing which pixel to perturb, and the only information it uses is whether the correct probability decreases. In comparison, \(\textbf{EvoBA}\) strikes a better balance between exploration and exploitation, which is common for evolutionary algorithms. This makes \(\textbf{EvoBA}\) achieve a slightly better success rate than \(\textbf{SimBA}\), with a lower query budget. Similarly to \(\textbf{AutoZOOM}\), \(\textbf{SimBA}\) is an \(L_2\) adversarial attack, while \(\textbf{EvoBA}\) focuses on \(L_0\). Nevertheless, the average \(L_2\) perturbation norm of \(\textbf{EvoBA}\) is slightly higher, but comparable to \(\textbf{SimBA}\)'s results. We also run \(\textbf{SimBA}\) and remark that the \(L_0\) perturbation norms that \(\textbf{EvoBA}\) achieves are significantly better. Furthermore, \(\textbf{SimBA}\) does not allow for any kind of parallelisation, while the evolution strategy we use in \(\textbf{EvoBA}\) is highly parallelisable and, accordingly, faster. \(\textbf{DeepSearch}\) () is another simple, yet very efficient black-box adversarial attack, which achieves results in line with much more complex methods. It is an \(L_{\infty}\) attack, perturbing with very high probability all the pixels (maximal \(L_0\) norm of the perturbations), which makes it incomparable with the \(L_0\) attack \(\textbf{EvoBA}\). Similarly, while \(\textbf{EvoBA}\) optimizes the \(L_0\) norm of the perturbations, it most often produces high \(L_{\infty}\) distortions, with sometimes near-maximal perturbations for the few chosen pixels. While both \(\textbf{DeepSearch}\) and \(\textbf{EvoBA}\) have non-complex implementations, \(\textbf{EvoBA}\) is conceptually simpler. \(\textbf{DeepSearch}\) is based on the idea of linear explanations of adversarial examples (), and exploits three main aspects: it devises a mutation strategy to perturb images as fast as possible, it performs a refinement on top of the earliest adversarial example in order to minimise the \(L_{\infty}\) norm, and adapts an existing hierarchical-grouping strategy for reducing the number of queries (). Furthermore, \(\textbf{EvoBA}\) has the advantage of being highly parallelisable, while \(\textbf{DeepSearch}\) is inherently sequential. \(\textbf{DeepSearch}\), \(\textbf{EvoBA}\), and \(\textbf{SimBA}\) are complementary methods that serve the similar purpose of efficient and reliable black-box attacks working under the query-limited scenario, each optimising the produced perturbations under a different norm. As black-box adversarial attacks are ultimately search strategies in obscured environments, it has been natural to also explore the path of evolutionary algorithms. One notable example is \(\textbf{GenAttack}\), an approach that follows the classic pattern of genetic algorithms. While it was developed at the same time with \(\textbf{AutoZOOM}\), the authors report similar results for the targeted versions of the two methods, without providing any untargeted attack results. We focused on the untargeted scenario, and our results are also in line with \(\textbf{AutoZOOM}\). \(\textbf{GenAttack}\) focuses on minimising the \(L_{\infty}\) perturbation norm, and, in expectation, the \(L_0\) it achieves is equal to the count of all pixels in the image. In comparison, \(\textbf{EvoBA}\) is an \(L_0\) attack, achieving considerably small perturbations under this norm. In addition, \(\textbf{EvoBA}\) is less complex and more suitable for a strong baseline attack. A related approach to ours, which also makes use of evolution strategies, is, which tries to minimise the \(L_{\infty}\) norm of adversarial perturbations. It proposes different evolution strategies applied on top of a tiling approach inspired by, where the authors use a Bandits approach. The attacks they propose focus on minimising the \(L_{\infty}\) norm of the perturbations and the authors do not report any other results regarding different norms. The \(L_2\) cost of this approach is not clear, one of the main issues being that it can become rather high. The \(L_0\) is equal in general to the number of pixels in the entire image, in comparison with \(\textbf{EvoBA}\), which is \(L_0\)-efficient. Qualitatively, the applied adversarial tiles it generates are easily perceivable by a human, yielding grid-like patterns on top of the target image, while the samples produced by \(\textbf{EvoBA}\) are imperceptible (Figure [\[fig:band\]](#fig:band){reference-type="ref" reference="fig:band"}, ImageNet) or look like benign noise (Figure [\[fig:band_cifar10\]](#fig:band_cifar10){reference-type="ref" reference="fig:band_cifar10"}, CIFAR-10). # The Method {#sect:the_method} ## Notation and threat model We work under black-box adversarial settings, with limited query budget and \(L_0\) perturbation norm. We consider the untargeted attack scenario, where an adversary wants to cause perturbation that changes the original, correct prediction of the target model for a given image to any other class. We denote by \(\mathbf{F}\) the target classifier. By a slight abuse of notation, we let \(\mathbf{F}(\vec{x)}\) be the output distribution probability of model \(\mathbf{F}\) on input image \(\vec{x}\) and \(\mathbf{F}_{k}(\vec{x})\) be the output probability for class \(k\). Then, \(\mathbf{F}\) can be seen as a function \(\mathbf{F}: \mathbb{I} \mapsto \mathbb{R}^K\), where \(\mathbb{I}\) is the image space (a subset of \(\mathbb{R}^{h \times w \times c}\)) and \(K\) is the number of classes. As we are working under black-box conditions, we have no information about the internals of \(\mathbf{F}\), but we have query access to it, i.e., we can retrieve \(\mathbf{F}(\vec{x})\) for any \(\vec{x} \in \mathbb{I}\). In fact, we will see that for our method we just need access to \(\argmax_k{\mathbf{F}_k(\vec{x})}\) and to its corresponding probability. Let us consider an image \(\vec{x}\), which is classified correctly by \(\mathbf{F}\). The untargeted attack goal is to find a perturbed version \(\vec{\Tilde{x}}\) of \(\vec{x}\) that would make \[\label{formulation:untargeted} \argmax_k{\mathbf{F}_k(\vec{\Tilde{x}})} \neq \argmax_k{\mathbf{F}_k(\vec{x})},\] constrained by the query and \(L_0\) bounds. ## The algorithm It is usual for black-box attacks to deal with a surrogate optimization problem that tries to find a perturbed version \(\vec{\Tilde{x}}\) of \(\vec{x}\) that minimizes \(\mathbf{F}(\vec{\Tilde{x}})\). This is clearly not equivalent to the formulation at ([\[formulation:untargeted\]](#formulation:untargeted){reference-type="ref" reference="formulation:untargeted"}), but it often yields good adversarial examples and is easier to use in practice. In loose terms, this surrogate optimization problem can be formulated as follows for an image \(\vec{x}\) with true label \(y\): \[\label{formulation:optimization} \min_{\boldsymbol{\delta \in \mathbb{R}^{h \times w \times c}}}\mathbf{F}_y(\vec{x} + \boldsymbol{\delta}), \text{w.r.t. queries} \le Q, \norm{\delta}_0 \le \epsilon.\] In order to tackle ([\[formulation:optimization\]](#formulation:optimization){reference-type="ref" reference="formulation:optimization"}), we adopt a simple evolution strategy that yields results in line with state-of-the-art black-box attacks. Our method (Algorithm [\[alg::evoba\]](#alg::evoba){reference-type="ref" reference="alg::evoba"}) works by iteratively creating generations of perturbed images according to the following process: it selects the fittest individual in each generation (with lowest probability to be classified correctly), starting from the unperturbed image, then samples small batches of its pixels and randomly perturbs them, stopping when the fittest individual is either no longer classified correctly or when one of the constraints no longer holds (when either the query count or the distance become too large). The function \(\textsc{SAMPLE\_PIXELS(PARENT, B)}\) does a random, uniform sample over the pixels of \(\textsc{PARENT}\), and returns a list of size at most \(B\) (the sampling is done with repetition) containing their coordinates. Its purpose is to pick the pixels that will be perturbed. The function \(\textsc{SAMPLE\_VALUES}\) generates pixel perturbed values. For our \(L_0\) objective, we let it pick uniformly a random value in the pixel values range. The algorithm follows a simple and general structure of evolution strategies. The mutation we apply on the best individual from each generation is selecting at most \(B\) pixels and assigning them random, uniform values. The fitness of an individual is just the cumulative probability of it being misclassified. One important detail that is not mentioned in the pseudocode, but which allowed us to get the best results, is how we deal with multi-channel images. If the target image has the shape \(h \times w \times c\) (height, width, channels), then we randomly sample a position in the \(h \times w\) grid and add all of its channels to the \(\textsc{PIXELS}\) that will be perturbed. We hypothesise that this works well because of a phenomenon, which allows \(\textbf{EvoBA}\) to perturb faster the most sensible zones in all the channels. Note that this yields a cost of \(c\) for every grid-sample to the \(L_0\) perturbation norm, so in the case of ImageNet or CIFAR-10 images it counts as \(3\), and in the case of MNIST it counts as \(1\). The query budget and \(L_0\) constraints impose a compromise between the total number of generations in an \(\textbf{EvoBA}\) run and the size \(G\) of each generation. The product of these is approximately equal to the number of queries, so for a fixed budget we have to strike the right balance between them. The bigger \(G\) is, the more we favour more exploration instead of exploitation, which should ultimately come at a higher query cost. The smaller \(G\) is, the search goes in the opposite direction, and we favour more the exploitation. As each exploitation step corresponds to a new perturbation, this will result in bigger adversarial perturbations. Furthermore, lacking proper exploration can even make the attack unsuccessful in the light of the query count and \(L_0\) constraints. The batch size \(B\) allows selecting multiple pixels to perturb at once in the mutation step. It is similar to the learning rate in general machine learning algorithms: the higher it is, the fewer queries (train steps, in the case of machine learning algorithms) we need, at the cost of potentially missing local optimal solutions. The space complexity of Algorithm [\[alg::evoba\]](#alg::evoba){reference-type="ref" reference="alg::evoba"} is \(\mathcal{O}(G \times \text{size}(\vec{x}))\). As the size of \(\vec{x}\) is in general fixed, or at least bounded for specific tasks, we can argue that the space complexity is \(\mathcal{O}(G)\). However, \(\textbf{EvoBA}\) can be easily modified to only store two children at a moment when generating new offspring, i.e., the currently generated one and the best one so far, which makes \(\textbf{EvoBA}\)'s space complexity \(\mathcal{O}(1)\). The dominant component when it comes to time complexity is given by \(\mathbf{F}\) queries. In the current form of Algorithm [\[alg::evoba\]](#alg::evoba){reference-type="ref" reference="alg::evoba"}, they could be at most \(\min(\frac{\epsilon}{B} \times {G}, Q)\). Assuming that the budget \(Q\) will generally be higher, the time complexity would roughly be \(\mathcal{O}(\frac{\epsilon}{B} \times {G} \times (\text{query cost of } \mathbf{F}))\). This is merely the sequential time complexity given by the unoptimised pseudocode, however the \(G\) \(\mathbf{F}\)-queries can be batched, yielding much faster, parallelised runs. # Experiments {#sect:experiments} ## Experimental Setup We used TensorFlow/Keras for all our experiments. All the experiments were performed on a MacBook with 2,6 GHz 6-Core Intel Core i7, without a GPU. We ran locally \(\textbf{SimBA}\), the strong and simple \(L_2\) black-box adversarial attack, and compared \(\textbf{EvoBA}\) to both our local \(\textbf{SimBA}\) results and reported results from the paper introducing it (). We also monitored and compared against the \(\textbf{AutoZOOM}\) results, but for these we have used different target models, as the main focus was on comparing to \(\textbf{SimBA}\) (which already achieves results which are in line with state-of-the-art approaches, such as \(\textbf{AutoZOOM}\), being more query-efficient), so we adopted their models. We don't do a head-to-head comparison with the efficient \(L_{\infty}\) black-box baseline \(\textbf{DeepSearch}\), as it is a direct consequence of their approach that they get near-maximal \(L_0\) perturbations, while \(\textbf{EvoBA}\) aims to optimize the \(L_0\) norm. Similarly, \(\textbf{EvoBA}\) creates high \(L_{\infty}\) perturbations, as it modifies very few pixels with random, possibly big quantities. Therefore, \(\textbf{DeepSearch}\) and \(\textbf{EvoBA}\) are complementary methods that should be used together, but a direct comparison of their results is not suitable, as the \(L_0\) and \(L_{\infty}\) objectives are partly contradictory. We ran multiple experiments over four datasets: MNIST, CIFAR-10, and ImageNet. On MNIST we have been running our experiments on a classic target LeNet architecture, while \(\textbf{SimBA}\) does not report any results on this dataset, and \(\textbf{AutoZOOM}\) uses a similar architecture to ours, with additional dropout layers (taken from ). However, their target models are trained by default with distillation, which is likely to make perturbations harder. For comparing with \(\textbf{SimBA}\) on MNIST, we ran the attack ourselves and aggregated various metrics. We initially used MNIST to validate \(\textbf{EvoBA}\) against a completely random black-box adversarial attack, similar to the one introduced in. The purely random strategy iterates by repeatedly sampling a bounded number of pixels from the original target image and changing their values according to a random scheme. While the purely random method introduced in achieves surprising results for such a simple approach, it does a very shallow form of exploration, restarting the random perturbation process with each miss (i.e., with each perturbed image that is still classified correctly). We will refer to the completely random strategy as \(\textbf{CompleteRandom}\) in the experiments below. For CIFAR-10, we use a ResNet-50 target model, similarly to \(\textbf{SimBA}\), and we compare to both their reported results and to our local run of their attack. For ImageNet, we have used a similar target ResNet-50 to the one used in \(\textbf{SimBA}\), while \(\textbf{AutoZOOM}\) used InceptionV3. We will use the following shorthands in the results below: \(\textbf{SR}\) (Success Rate), \(\textbf{QA}\) (Queries Average), \(\textbf{L0}\) (Average of L0 successful perturbations), \(\textbf{L2}\) (Average L2 norm of successful perturbations). We will refer to \(\textbf{EvoBA}\) that perturbs at most \(B\) pixels at once and that has generation size \(G\) as \(\textbf{EvoBA}(B,G)\). We will explicitly mention in each section which thresholds were used for the experiments. For all the local runs of \(\textbf{SimBA}\), we have been using \(\epsilon=0.2\) (a hyperparameter specific to \(\textbf{SimBA}\)), which was also used in the paper. We only replicated locally the results of the Cartesian Basis version of \(\textbf{SimBA}\), which resembles more an \(L_0\) adversarial attack, but which is less efficient than the Discrete Cosine Transform (DCT) version from the paper. Therefore, we will use \(\textbf{SimBA-LCB}\) to refer to the local run of SimBA on top of the exact same target models as \(\textbf{EvoBA}\), with \(\epsilon=0.2\). We will use \(\textbf{SimBA-CB}\) to refer to the results of the Cartesian Basis paper results, and \(\textbf{SimBA-DCT}\) for the DCT paper results. In the cases where the \(\textbf{AutoZOOM}\) paper provides data, we will only compare to \(\textbf{AutoZOOM-BiLIN}\), the version of the attack which requires no additional training and data, and which is closer to our and \(\textbf{SimBA}\)'s frameworks. ## Results on MNIST We only experiment with \(\textbf{EvoBA}(B,G)\) with \(B>1\) on MNIST, and focus on \(B=1\) for subsequent experiments, for which we impose an \(L_0\) perturbation limit of \(100\) and a query threshold of \(5000\). Running \(\textbf{SimBA}\) (\(\textbf{SimBA-LCB}\)) on a local machine with the mentioned specifications, requires an average of \(\textbf{93s}\) per MNIST sample. In comparison, all the \(\textbf{EvoBA}\) experiments on MNIST took between \(\textbf{1.94s}\) and \(\textbf{4.58s}\) per sample. We also report the \(\textbf{CompleteRandom}\) results, for which we impose an \(L_0\) perturbation limit of \(100\) and a query threshold of \(5000\), similarly to the constraints we use for \(\textbf{EvoBA}\). We randomly sampled \(200\) images from the MNIST test set and ran \(\textbf{SimBA-LCB}\), \(\textbf{EvoBA}\), and \(\textbf{CompleteRandom}\) against the same LeNet model. For reference, we also add the results of \(\textbf{AutoZOOM}\), which are performed on a different architecture. Therefore, the results are not directly comparable with them. \(L_0\) data is not available for \(\textbf{AutoZOOM}\), but it is usual for ZOO methods to perturb most of the pixels, so it is very likely that the associated \(L_0\) is very high. We remark that all the \(\textbf{EvoBA}\) configurations have a \(100\%\) success rate, and \(\textbf{SimBA-LCB}\) achieves \(56\%\). While \(\textbf{SimBA}\) generally achieves near-perfect success rates on other tasks, one could argue that attacking a simple target model such as LeCun on a relatively easy task such as MNIST is much harder than performing attacks for more intricate target models and tasks. This is a natural trade-off between the complexity of a model and its robustness. If we restrict \(\textbf{EvoBA(1,10)}\) to its top \(56\%\) perturbed images in terms of query-efficiency, it achieves an average of \(192.79\) queries, which is below \(\textbf{SimBA-LCB}\)'s queries average of \(196.86\). Similarly, if we restrict \(\textbf{EvoBA(1,10)}\) to its top \(56\%\) perturbed images in terms of \(L_2\)-efficiency, it achieves an \(L_2\) of \(3.07\), which is higher, but closer to \(\textbf{SimBA-LCB}\)'s \(L_2\) result of \(2.37\). \(\textbf{CompleteRandom}\) achieves a success rate of \(60.5\%\), far below \(\textbf{EvoBA}\)'s \(100\%\), but surprisingly above \(\textbf{SimBA-LCB}\)'s \(56\%\). However, the nature of \(\textbf{CompleteRandom}\)'s perturbations is to lie at high distances, achieving \(L_0\) and \(L_2\) distances that are significantly higher than the distances achieved by the other methods. ## Results on CIFAR-10 We impose an \(L_0\) perturbation limit of \(100\), and a query threshold of \(2000\) for both \(\textbf{EvoBA}\) and \(\textbf{CompleteRandom}\). We randomly sample \(2000\) images for \(\textbf{EvoBA}\) and \(50\) images for \(\textbf{SimBA-LCB}\). \(\textbf{EvoBA}\) and \(\textbf{SimBA-LCB}\) are run on the exact same target ResNet-50 model, while \(\textbf{SimBA-DCT}\) and \(\textbf{SimBA-CB}\) also run on a target ResNet-50 model. \(\textbf{AutoZOOM-BiLIN}\) targets an InceptionV3 model. \(\textbf{SimBA-LCB}\) required an average of \(\textbf{26.15s}\) per CIFAR-10 sample, while \(\textbf{EvoBA}\) required \(\textbf{1.91s}\) per sample. All the attacks achieved \(100\%\) success rate in the CIFAR-10 experiments, with the sole exception of \(\textbf{CompleteRandom}\), which only got \(69.5\%\). \(\textbf{EvoBA(1,30)}\) has a better query average when compared to all the \(\textbf{SimBA}\) approaches, which targeted the same ResNet-50 architecture. While \(\textbf{EvoBA(1,30)}\) targeted a different architecture than \(\textbf{AutoZOOM-BiLIN}\), we still remark how the latter is twice more query efficient. However, \(\textbf{EvoBA(1,30)}\) surprisingly achieves an \(L_2\) metric which is better than the reported numbers of \(\textbf{SimBA-CB}\) and \(\textbf{SimBA-DCT}\), which are \(L_2\) adversarial attacks. It is not as much of a surprise the fact that \(\textbf{EvoBA(1,30)}\) achieves a considerably better \(L_0\) metric when compared to \(\textbf{SimBA-LCB}\) (\(17.67\) vs \(99.46\)). In Figures [\[fig:histo_l0_evoba_cifar10\]](#fig:histo_l0_evoba_cifar10){reference-type="ref" reference="fig:histo_l0_evoba_cifar10"} and [\[fig:histo_queries_evoba_cifar10\]](#fig:histo_queries_evoba_cifar10){reference-type="ref" reference="fig:histo_queries_evoba_cifar10"} we plot the histograms of the \(L_0\) perturbation norms, respectively of the query counts obtained by \(\textbf{EvoBA(1,30)}\). Both are highly skewed towards low values, showing how \(\textbf{EvoBA}\) does well in finding quick small perturbations with respect to the \(L_0\) norm. The success rate of \(\textbf{CompleteRandom}\) (\(69.5\%\)) and its low average query count (\(161.2\)) are surprisingly good results for the trivial nature of the method, outlining once again the lack of robustness in complex image classifiers. However, these come at the cost of an average \(L_0\) that is roughly \(5.5\) times higher and of an average \(L_2\) that is roughly \(1.4\) times higher in comparison with \(\textbf{EvoBA(1,30)}\)'s average results. In Figure [\[fig:success_rate\]](#fig:success_rate){reference-type="ref" reference="fig:success_rate"} we compare \(\textbf{EvoBA(1,30)}\) with \(\textbf{SimBA-LCB}\), while also providing the \(\textbf{CompleteRandom}\) results. We plot the success rate as a function of the number of queries in order to understand how each method behaves for different query budgets. \(\textbf{EvoBA(1,30)}\) has a better success rate than \(\textbf{SimBA-LCB}\) for any query budget up to \(2000\). For very low query budgets (under \(112\) queries), \(\textbf{CompleteRandom}\) has a better success rate than \(\textbf{EvoBA(1,30)}\), but it starts converging fast after their intersection point to the success rate of \(69.5\%\). It is natural for the \(\textbf{CompleteRandom}\) strategy to find quick perturbations for the least robust images, as it performs bulk perturbations of many pixels at once, while \(\textbf{EvoBA}\) does all perturbations sequentially. This illustrates the natural trade-off between exploration and exploitation that any black-box optimization problem encounters. ## Results on ImageNet We adopt a similar framework to \(\textbf{AutoZOOM}\): we randomly sample 50 correctly classified images and run \(\textbf{EvoBA}\) on top of them. For \(\textbf{EvoBA}\), similarly to \(\textbf{SimBA}\), we use a ResNet50 model, while \(\textbf{AutoZOOM}\) uses an InceptionV3. We impose an \(L_0\) perturbation limit of \(1000\), and a query threshold of \(10000\). The \(L_0\) limit we impose is reasonable, as each time we perturb a pixel we actually modify all of its three channels, therefore the \(1000\) limit stands for approximately \(0.66\%\) of the image pixels. The median number of queries for \(\textbf{EvoBA(1,15)}\) is surprisingly low: \(728.5\). Its median \(L_0\) is \(200\), and its median \(L_2\) is \(5.69\). This shows once more how we met our goal to minimise the query count and \(L_0\) perturbation, as the medians are significantly smaller than the average values, showing how the distributions are biased towards low values. In comparison, the \(L_2\) mean and median are close, indicating that the good \(L_2\) results we get are a consequence of our other constraints rather than an actual objective. \(\textbf{EvoBA(1,15)}\) achieves the best average query metric among the given experiments. Surprisingly, its \(L_2\) is almost equal to the one of \(\textbf{AutoZOOM-BiLIN}\). \(\textbf{EvoBA(1,15)}\) also achieves a \(100\%\) success rate, which is in line with \(\textbf{AutoZOOM-BiLIN}\), and better than \(\textbf{SimBA}\)'s results. ## Qualitative results In Figures [\[fig:band_cifar10\]](#fig:band_cifar10){reference-type="ref" reference="fig:band_cifar10"} and [\[fig:band\]](#fig:band){reference-type="ref" reference="fig:band"}, we provide samples of CIFAR-10, respectively of ImageNet perturbed images, together with their initial and perturbed labels. The perturbations are almost imperceptible to the human eye, and they look mostly like regular noise. Considering the highly-biased nature of the \(L_0\) histogram in Figures [\[fig:histo_l0_evoba_cifar10\]](#fig:histo_l0_evoba_cifar10){reference-type="ref" reference="fig:histo_l0_evoba_cifar10"} and [\[fig:histo_l0_evoba\]](#fig:histo_l0_evoba){reference-type="ref" reference="fig:histo_l0_evoba"} towards small values, it is natural to expect well-crafted perturbations. # Conclusion {#sect:concl} We proposed \(\textbf{EvoBA}\), an \(L_0\) black-box adversarial attack based on an evolution strategy, which serves as a powerful baseline for black-box adversarial attacks. It achieves results in line with state-of-the-art approaches, such as \(\textbf{AutoZOOM}\), but is far less complex. Simple yet efficient methods, such as \(\textbf{EvoBA}\), \(\textbf{SimBA}\), \(\textbf{DeepSearch}\), and even \(\textbf{CompleteRandom}\) shed a light on the research potential of the black-box adversarial field, outlining the inherent security issues in many machine learning applications. We plan to aggregate \(\textbf{EvoBA}\) with the other strong black-box baseline attacks we have seen for different norms (\(\textbf{SimBA}\) for \(L_2\) and \(\textbf{DeepSearch}\) for \(L_{\infty}\)) and create a generic open-source framework to empirically assess the robustness of image classifiers and to help with their development process. Such a toolbox could also be used to assess the quality of adversarial training methods, as many focus on improving the robustness of the target models with respect to \(L_p\) norms. Another immediate extension of our work is to customise \(\textbf{EvoBA}\) to also support the targeted scenario, which can be done by adapting the fitness function used in the evolution strategy. This requires minimal changes in the implementation. \(\textbf{EvoBA}\) can also be modified to make explicit use of its parallelism by distributing the generation evaluation steps to multiple workers. \(\textbf{EvoBA}\) could be easily extended for classification tasks in other fields, such as natural language processing. One would have to come with the right perturbation scheme in our approach, but we leave this for future research.
{'timestamp': '2021-07-14T02:05:44', 'yymm': '2107', 'arxiv_id': '2107.05754', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05754'}
# Introduction Labeled data for some machine learning tasks can be quite rare and valuable. Data labeling is a time consuming task, and can be expensive if subject matter or language expertise are required. Machine learning engineers know that generally, the larger the training set, the higher accuracy the classifier will have, so they often request more data. Further, engineers have been taught to prefer balanced data sets to train more robust classifiers. Most annotation processes yield unbalanced datasets naturally. Data scientists often have four options: upsampling, downsampling, cost-sensitive learning, or active learning to seek a balanced dataset through additional annotation. Downsampling reduces the data provided to the learner, which removes valuable labeled data from the dataset. Active learning incurs additional labeling cost. Upsampling is an attractive alternative. Upsampling in NLP application areas could involve exact text duplication or text augmentation. The CLEF CheckThat! Labs provide shared training data for all the groups. This data provided in 2020 and 2021 was naturally unbalanced, predominantly consisting of documents that are not check-worthy. Last year we published a paper at CLEF CheckThat! which used back translation to balance the classes in our Arabic training data. The noise introduced by the machine translation system provided for an improvement in classifier performance. This method resulted in the best performing Arabic model in the Lab. For this year's Lab, we again endeavored to generate additional labeled data from the provided labeled data. This year we used a different technique, contextually sensitive lexical augmentation, and we applied the approach to all the languages. Our technique uses BERT and RoBERTa models to replace text from the provided sample to construct alternative samples for the positive class tweets. We used this as additional training input to our transformer neural networks. ## CheckThat! Lab CLEF CheckThat! is a series of annual challenges to identify the best algorithms for automated fact-checking. The 2021 Lab focused on social media and news articles. Accenture focused on Task 1 of this Lab, which required identification if a claim on Twitter was worth fact-checking, and ranking the claim for how check-worthy the claim was. This challenge focused on Arabic, Bulgarian, English, Spanish, and Turkish. Accenture's paper in the 2020 Lab reached 1st place in the English track, and 1st, 2nd, 3rd, and 4th in the Arabic track.. This year, only one submission per team per language was accepted for final reporting. ## Data Augmentation Data augmentation is considered an important component in Deep Learning workflows. These techniques are commonly applied in speech recognition (e.g. insertion of babble), and computer vision (e.g. image rotation) systems, but are not as commonly applied in natural language processing workflows due to differences in resources and techniques based on language and task. Augmentation in an NLP context can take many forms. Words can be replaced with synonyms, antonyms, hypernyms, homonyms, or semantic neighbors. Words can be deleted, or inserted either randomly or where the lexical insertion best fits a language model. Words can be misspelled intentionally, either phonetically or at the character level, with a deletion, insertion, replacement or a swap of character sequence. There are numerous methods for NLP data augmentation, but none are commonplace. explored the use of text augmentation at the lexical level on five classification tasks, including a subjective/objective discrimination task. For each sentence in a training set, the researchers randomly selected between four operations-random lexical insertion, random lexical substitution, random lexical deletion, and synonym replacement. They showed that by applying these random augmentations, they were able to boost accuracy on all five classification tasks. Further, in an ablation study, the researchers showed that each of the four operations contributed to accuracy improvements. They noted that their augmentation strategy was particularly beneficial to smaller datasets. The authors performed their experiments on LSTM-RNN and CNN architectures. We are not aware of any papers describing NLP augmentation as input to transformer architectures for document classification tasks. This study uses one of the methods mentioned in the previous paragraph, lexical substitution, but instead of applying these randomly, we use a contextual embedding model to choose the most probable operations. We demonstrate this technique with two samples below. Each invocation of the algorithm could produce a novel alternative sample. Original check-worthy tweet: > The country is panic stricken over the \#coronavirus, yet this flu season there have been 9.7 million flu illnesses, 87,000 hospitalizations and 4800 deaths from flu, including 32 pediatric deaths. It's time to stop the panic and put things into perspective. Random Substitution 1: > The country is panic tweeting over the \#coronavirus, yet this flu season there have been 9.7 million flu illnesses, 87,000 illnesses, 46 deaths from flu, including 32 pediatric deaths. It's time you stop the panic and put things into perspective. Random Substitution 2: > The country remains panic stricken over the \#coronavirus, yet this flu pand there are been 9.7 million flu illnesses, 800,000 hospitalizations and 4800 deaths from flu, including 32 pediatric deaths. It's time to stop the panic and put things into policy. Original check-worthy tweet: > People aren't surprised when I tell them there are 13,000 Covid-19 cases outside China, or when I tell them this number doubles every 3 days. But when I tell them that if growth continues at this rate, we'll have 1.7 million cases in 3 weeks, they're astonished. Random Substitution 1: > People aren't surprised when I tell them there are 100,000 Covid-19 cases outside Minnesota, or when we tell them this number grows every 3 days. So when I tell them that if growth continues at this speed, we'll have 1.7 million cases in 3 weeks, they're astonished. Random Substitution 2 > People aren't surprised when I tell her there are 13,000 X-19 cases outside China, than when I tell them this number doubled every 3 days. But when I tell them that if growth continues at my forecast, we'll have 1.7 million cases in 3 weeks, they're astonished. More information on this procedure, including the models used, can be found in Section [4.1](#methoddataaugmentation){reference-type="ref" reference="methoddataaugmentation"} # Exploratory Analysis Table [1](#tab1){reference-type="ref" reference="tab1"} shows the number of samples and unique word counts for each of the datasets provided. We see that Arabic had the largest number of samples in training (3,095) while English had the least (688). Similarly, Arabic had the highest count of unique words (29,619), and English had the lowest (4,499). Assuming consistent data collection methodology and annotation standards across languages, we would hypothesize that larger datasets would yield higher-accuracy models. A qualitative analysis found that the topics included were consequential and that many tweets were worthy of fact-checking. Understanding the topics discussed in the data helps to evaluate the lexical coverage of our pre-trained models and helps to consider specialized pre-trained neural network models that could be relevant.\ **Arabic.** The provided training set contains a large number of tweets referencing consequential political and human conflicts around the "Houthis movement\". Notable portions of the training data also focus on diplomatic disagreements around the Algerian-Qatar relations. Political issues such as feminism are also discussed. Finally, a smaller set of tweets reference COVID-19-related political events. The testing set contain mainly the latter two topics while validation set largely contained the former two. Keywords that define these datasets include, but not limited to, "Houthis\", "Yemen\", "Qatar\", "Algerian\", "feminist\", and \"Veros Koruna\".\ **Bulgarian.** The training, testing, and validation sets all focus on COVID-19. However, the tweets covers a rather varied set of topics, including political events, pandemic progression, and scientific and informational statements about the virus. The most consistent keywords are amalgamations of the term "COVID-19\", including "Koronavirus\", "Korona\", "Coronavius\", and "Covid\".\ **Spanish.** The conversations in the training, testing and validation sets are about political issues including: government corruption, unemployment, economic instability, the importance of education, political elections, and other related topics. Spanish President, Pedro Sanchez, was named in a large number of tweets. Many tweets in the training set also mention climate issues, which are rare in the validation and testing sets. Keywords that define these sets are "President\", "Sanchez\", "government\" and "economy\".\ **Turkish.** The training, testing, and validation set topics are varied but mostly related to Turkey domestic news, Turkish international affairs, and facts about Turkey as a country or the Turkish people. The training contains a higher number of tweets covering Turkey's national/external debt, claims of mistreatment of children, the Syrian population, unemployment, and the Turkish economy. Some keywords include "Turkey\", "Turkish\", "unemployment\", "President\", "Erdogan\", "presidential election\" and "Istanbul\".\ **English.** Tweets from all modeling sets are about COVID-19. The training set contains many statements and information about COVID-19, global news about COVID-19, and COVID-19-related political decisions and events. The testing and validation set are more politically oriented with most tweets mentioning a political event. The most frequent keywords include "corona\","coronavirus\" and other amalgamations of the term "COVID-19\".\ ## Label Balance All of the datasets provided by the CheckThat! organizers had label bias which skewed each dataset towards tweets that were not considered check-worthy. The Turkish dataset had the highest percentage of check-worthy tweets (38%), followed by English (35%), Arabic (22%), Bulgarian (13%), and Spanish (8%). ## WordPiece Analysis Transformer models utilize WordPiece tokenization schemes that are dependant on the model being evaluated. At the time of pre-training, the WordPiece algorithm determines which pieces of words will be retained, and which will be discarded. An UNK token is utilized as a placeholder in the lexicon, and used to represent WordPiece tokens received in novel input that did not get utilized at model creation. We expect language samples which have a high amount of tokens processed as UNK would perform poorly. We present our analysis in Table [2](#unknown-token-distribution){reference-type="ref" reference="unknown-token-distribution"}. Most notably, Arabic training set contains over \(120\)K WordPieces, the largest number across all five languages, second by just over \(110\)K for Spanish. In addition, Arabic training set produced a much lower rate of unknown tokens (\(0.291\%\)) compared to Spanish (\(2.313\%\)). Unexpectedly, the RoBERTa tokenizers we used did not return UNK tokens on any dataset provided by the CLEF CheckThat! organizers. # Transformer Architectures and Pre-trained Models ## Pre-trained Models In this work, we utilize BERT and RoBERTa models. The Bidirectional Encoder Representation Transformer (BERT) is a transformer-based architecture that was introduced in 2018. BERT has had a substantial impact on the field of NLP, and achieved state of the art results on 11 NLP benchmarks at the time of its release. RoBERTa, introduced by, modified various parts of BERTs training process. These modifications include more training data, more pre-training steps with bigger batches over more data, removing BERT's Next Sentence Prediction, training on longer sequences, and dynamically changing the masking pattern applied to the training data. For the Arabic Dataset, we used asafaya/arabic-bert-large, which was trained on an Arabic version of OSCAR, an Arabic Wikipedia dump, and other Arabic resources. It contains a vocabulary of length of 32,000. For Turkish and Spanish, we used dbmdz/bert-base-turkish-cased and geotrend/bert-base-es-cased respectively. The Turkish BERT model contains a vocabulary of length 32,000 and the Turkish model contains a vocabulary of length 26,359. For English and for Bulgarian, we used roberta-large and iarfmoose/roberta-base-bulgarian respectively. The English RoBERTa model contains 50,265 WordPieces, and the Bulgarian RoBERTa model contains 52,000 WordPieces. # Method ## Data Augmentation {#methoddataaugmentation} The organizers provided a training and a development set for each language. We created 80/20 stratified splits on each training set to create internal training and validation sets for experimentation. We used the development set provided by organizers as a hold-out test set. For each of the internal training datasets, we extracted positive labels and performed contextual word embedding augmentation on each of the positive labels, one epoch at a time, repeating until the number of positive labels at each epoch exceeded the number of negative labels. For each language, augmentation and training were done with BERT or RoBERTa models. BERT-based contextual embedding models were used for Arabic, Spanish, and Turkish, and RoBERTa-based contextual embedding models were used for English and Bulgarian. We used [^1] to apply Contextual Word Embedding Augmentation. This augmentation type uses the surrounding words of a tweet to apply the most probable insertion or substitution of a lexical item. We chose to only apply substitution. With Contextual Word Embedding Augmentation, the user must determine the probability a token should be augmented. On the Bulgarian and Turkish datasets, we tried using no augmentation (p = null) and augmentation at p = {0.1, 0.2, 0.3, 0.4, 0.5}. Additionally, we explored back-translation using AWS translation. We appended back-translated check-worthy tweets to the training set, using English as a pivot language. In the table below, we show the precision, recall, and f1 score for check-worthy class on the Bulgarian dataset. The Turkish experiments yielded similar results. For both languages, we found that augmentations at p = 0.1 resulted in a significant increase in recall and f1 for check-worthy tweets, as we show in the table below. Augmentations at higher probability thresh-holds also yielded better recall and f1 than our null model, but not better than at p = 0.1. We found that augmentation at p=0.1 provided better precision, recall and f1 than using back-translation (translation). Due to time and cost limitations, we did not repeat back-translation experiments for other competition languages or using other pivot languages. Based on this exploration (and due to the computational cost of this technique) we adopted p = 0.1 for all languages. For each language, BERT-or RoBERTa-augmented check-worthy examples were appended to the training data and given a check-worthy label. In all languages, we found this improved f1 score for the check-worthy class when applied to our hold-out dev set. However, it's possible that this technique limited some models' performance on the evaluation test set. The table below displays the number of check-worthy augmented samples that were generated for each language. ## Classification For both BERT and RoBERTa, we added an additional mean-pooling layer and dropout layer on top of the model prior to the final classification layer. Adding these additional layers has been shown to help prevent over-fitting while fine-tuning. We used an Adam optimizer with a learning rate of 1.5e-5 and an epsilon of 1e-8. We use a binary cross-entropy loss function, 2 epochs, and a batch size of 32. ## Ranking To generate rankings, the model's outputs were fed through a SoftMax function. The difference between the positive and negative class likelihoods were then used to rank tweets. # Results The official metric of the Lab was mAP for all languages. Table [\[tab:accentureresults\]](#tab:accentureresults){reference-type="ref" reference="tab:accentureresults"} lists our results. Arabic performed the best with 0.658. This was followed by Bulgarian (0.497), Spanish (0.491), Turkish (0.402), and English (0.101). The results from Arabic and English can be compared to Accenture's results in CheckThat! 2020. Compared to last year, our team's Arabic score increased and our team's English score decreased. # Discussion In Section [4.1](#methoddataaugmentation){reference-type="ref" reference="methoddataaugmentation"}, we showed that contextual embedding augmentation on top of the current training data improved the f1 score of our systems. In the Lab ranking, however, we found that the Accenture received the top results for Arabic, and performed less well for other languages. Table [3](#tab:mapresults_trainingsamplecount){reference-type="ref" reference="tab:mapresults_trainingsamplecount"} shows our mean average precision versus the number of training samples provided by the CheckThat! organizers. We believe the transformer methods we employed to be highly sensitive to the quantity of training data and distribution of topics across the split dataset. While we were able to generate additional training data, and improve the results, we believe even more augmentation should be employed where natural labeled text cannot be acquired. Back translation, which we employed last year, worked well for this problem. We employed it only on Arabic, but expect the technique would work well for the other languages in the Lab as well. We used Contextual Word Embedding Augmentation, this year, but limited our transformations to swaps. Lexical insertion may show to be useful as well. Synonyms and hypernym replacement would likely show advantage. Because of the computational cost of augmenting the data with contextual embedding augmentation, we chose p = 0.1 for all languages. The optimal value is likely to be language and task dependant. We would recommend a parameter search of this value. # Conclusion This paper presents results from the Accenture Team for CLEF2021 CheckThat! Lab, Task 1, to analyze English, Arabic, Spanish, Turkish, and Bulgarian social media to identify claims that require fact-checking. We presented a methodology that provided NLP augmentation of the training data to create additional synthetic training samples. We found this method improved our results. This approach received the highest mean average precision in the Lab this year for Arabic. [^1]: https://github.com/makcedward/nlpaug
{'timestamp': '2021-07-14T02:02:04', 'yymm': '2107', 'arxiv_id': '2107.05684', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05684'}
# Introduction Clouds and hazes have been found to be common across the range of currently discovered exoplanets. The presence of clouds, or hazes, (hereafter we use the generic term 'clouds' to describe non-gas phase opacity sources in the atmosphere) has been inferred from observations of many targets through the wavelength dependence of transmission spectra or through muted spectral signatures of the underlying atmosphere. Additionally, shifts in the peak optical or IR flux, as a function of orbital phase, and temporal variability have been interpreted as evidence for clouds. Yet despite their occurrence being well studied, the mechanisms determining their presence and persistence remain poorly quantified. There is some indication for hotter atmospheres generally having clearer skies on the day side and along the terminator, inferred from negative correlation between equilibrium temperature and muted spectral features, although other parameters such as planet composition may also play a role. Cloud treatments and parametrizations have been included in 1D forward models, used directly to interpret spectra or as part of retrieval frameworks to determine the optical structure of the target atmosphere implied by the observations. These treatments can range from the most simple approach, that of prescribed 'decks' of opacity, to parameterisations attempting to capture the basic physics to more sophisticated microphysical approaches. However, there is a growing realisation that 1D models are insufficient to correctly capture the physical state of, in particular, short period exoplanets such as hot Jupiters. For example, works such as and have demonstrated the need for higher dimensionality models, even in the absence of clouds, with work such as exploring higher dimensionality retrieval methods. Planetary magnetic fields, partially coupled to the gas by ions in the atmosphere, cannot be effectively modelled in one dimension and introduce both drag and heating capable of impacting the atmospheric winds and circulation patterns. Clouds themselves can act to exacerbate departures from symmetry, hindering a collapse to 1D treatments through, for example, day-night side differences in cloud coverage and differences between the east and west terminators. Cloud models implemented in 3D have a similar range of complexity to that found in 1D, from simulation of gas-phase only atmospheres and post--processing to determine cloud properties to simple, prescribed opacity cloud decks, and on to models coupling 3D dynamics and radiative transfer with either parametrised cloud schemes, or microphysical treatments. Clouds, however, are complex, and currently there is no single approach able to capture the full range of physical mechanisms required to self--consistently predict their presence and impact on observations. Therefore, this range of approaches should be seen as complementary and, indeed, required to gradually determine the key physical processes, and thereby eventually construct a model of the minimal required complexity. Efforts to couple a microphysical cloud-formation model to 3D global climate models (GCMs) of hot Jupiters include and, both of which use the underlying cloud formation model of. These studies are generally limited by the computational expense of the underlying chemistry and the long timescales needed to approach a converged solution. In particular, the simulations of result in the presence of large quantities of small particles at high altitude, which also require extremely long timescales to settle under gravity. These models have, however, shown that the radiative feedback of the clouds themselves plays a significant role in shaping the thermal structure of the atmosphere and must be included. Such limitations have motivated the use of more simplified cloud models in GCMs. Studies using simplified temperature--dependent cloud schemes have demonstrated potential trends across a population of gas giant exoplanets, revealing a transition from cloud--free atmospheres at higher irradiation temperatures (\(\gtrsim\)`<!-- -->`{=html}3000 K) to cloud formation on the nightside and western--limb. For HD 209458b, coupled EddySed to the Met Office's Unified Model (UM) and performed simulations extending to about 500 Earth days. The results of again revealed the importance of the radiative feedback due to clouds but also highlighted the importance of the particle size distributions and the vertical extent of clouds. However, simulations such as those of employ a simplified parametrisation of the dynamical mixing in the atmosphere, which, in the specific case of is based on a consideration of convection. In this paper, we continue the work of in building a more complex cloud model with a limited increase in computational overhead, substituting the default mixing treatment for a more physically relevant model based on mixing found via 3D simulations as well as further investigating the relative impact of the sedimentation efficiency on atmospheric structure and observational diagnostics. This paper is laid out as follows, in Section [2](#sec:model){reference-type="ref" reference="sec:model"} we describe our model formulation, including a brief description of the 3D model, followed by explanation of the main features of the cloud model and mixing treatment, as well as introducing the suite of simulations we use. In Section [3](#sec:results){reference-type="ref" reference="sec:results"} we then present the resulting atmospheric structure from our simulations, the implications of the different mixing and cloud parameters, before demonstrating the impact on synthetic observations. Finally, we conclude and discuss potential avenues for future progress in Section [4](#sec:conclusions){reference-type="ref" reference="sec:conclusions"}. # The Model {#sec:model} In this section we first briefly outline the GCM we use to model the atmosphere of HD209458b, followed by a discussion of the cloud model specifically, before describing the set of simulations used for this study. ## The Met Office's Unified Model {#subsec:um} The underlying GCM used to perform the simulations is that of the Met Office, termed the Unified Model (UM). The UM's dynamical core, ENDGame solves the full, deep--atmosphere and non-hydrostatic Navier-Stokes equations. Adaptations of the dynamical core, and the results of benchmarking and testing for hot Jupiters are detailed in. Radiative transfer within the model is handled using the open-source SOCRATES code based on. SOCRATES has also been isolated, adapted, benchmarked and tested for hot Jupiters in, before coupled radiative--dynamic, cloud--free simulations were performed in. Gas-phase opacity sources are \(\mathrm{H_2O}\), \(\mathrm{CO}\), \(\mathrm{CH_4}\), \(\mathrm{NH_3}\), \(\mathrm{Li}\), \(\mathrm{Na}\), \(\mathrm{K}\), \(\mathrm{Rb}\), \(\mathrm{Cs}\) and \(\mathrm{H_2-H_2}\) and \(\mathrm{H_2-He}\) collision induced absorption (CIA) with the opacities computed using the correlated-k method and ExoMol linelists. The individual gas phase abundances are taken from the analytic fits of with modifications to Alkali metal abundances outlined in. The UM has also been coupled to gas--phase chemistry schemes of various sophistication, which although not employed in this study have been used to demonstrate the importance of 3D mixing in determining the chemical composition of hot Jupiter atmospheres. Cloud treatments have been added to the UM through both the inclusion of a microphysical model following the work of, which was applied by, and the parametrised EddySed scheme of applied by. In cloud opacities are calculated from pre-computed tables assuming a log-normal distribution in particle sizes. In this work, we essentially build on the study of, using the same model setup, but altering the treatment of dynamical mixing and slightly expanding the cloud optical treatment. ## The EddySed Model {#subsec:eddysed} EddySed, as described in, is a one-dimensional globally-averaged/horizontally-homogeneous phase--equilibrium and parametrised cloud model appropriate for substellar atmospheres. The fundamental assumption of the model is that the vertical extent of the cloud is determined by a balance of upward transport of vapour (with mass mixing ratio \(q_\mathrm{v}\)) and condensate (with mass mixing ratio \(q_\mathrm{c}\)) via mixing and downward transport of condensate via sedimentation. This is coupled with the assumption that the mass-averaged sedimentation velocity (\(\left<v_\mathrm{sed}\right>\)) is proportional to a characteristic mixing velocity, \(w_\star\), which is equal to the ratio of the vertical mixing parameter (or eddy--diffusion coefficient, \(K_\mathrm{zz}\)) and mixing length-scale (\(L_\mathrm{mix}\)) i.e., \(w_\star=K_\mathrm{zz}/L_\mathrm{mix}\). This is captured in the governing equation \[-K_{zz}\frac{\partial q_\mathrm{t}}{\partial z} = \left<v_\mathrm{sed}\right>q_\mathrm{c} = f_\mathrm{sed} w_\star q_\mathrm{c}\,\,, \label{Eqn:Balance}\] where \(z\) is the vertical coordinate, \(q_\mathrm{t} = q_\mathrm{c} + q_\mathrm{v}\) is the total mixing ratio for a given species, and \(f_\mathrm{sed}\) is the sedimentation factor. Equation [\[Eqn:Balance\]](#Eqn:Balance){reference-type="ref" reference="Eqn:Balance"} is solved separately for each condensable species, and as such clouds of one species do not impact those of another directly; however, as all cloud species interact radiatively with the atmosphere, indirect influence is possible. As the sedimentation velocity is proportional to \(K_{zz}\) in equation [\[Eqn:Balance\]](#Eqn:Balance){reference-type="ref" reference="Eqn:Balance"}, the cloud scale height, defined by \(L_\mathrm{cloud} = f_\mathrm{sed}^{-1}L_\mathrm{mix}\) is actually independent of \(K_{zz}\). The condensate mixing ratio \(q_\mathrm{c}\) is taken to be the excess of a particular species above the local vapour saturation concentration (\(q_\mathrm{vs}\)), \[q_\mathrm{c} = \max\left(0,q_\mathrm{t}-q_\mathrm{vs}\right)\,\. \label{Eqn:Condense}\] The critical vapour saturation mixing ratios \(q_\mathrm{vs}\) are taken from. Although there is debate about what species are realistically able to condense into clouds in exoplanetary atmospheres (see @Powell_2019), we have adopted a maximalist approach and allowed all possible condensable species in EddySed to form clouds. A list of the sources as well as the assumed mass mixing ratios at the base of the atmosphere (\(q_\mathrm{below}\)) are given in Appendix [\[app:sat_vap\]](#app:sat_vap){reference-type="ref" reference="app:sat_vap"}. Equations [\[Eqn:Balance\]](#Eqn:Balance){reference-type="ref" reference="Eqn:Balance"} and [\[Eqn:Condense\]](#Eqn:Condense){reference-type="ref" reference="Eqn:Condense"} are used to determine the distribution of clouds within the atmosphere for a given pressure and temperature profile. The particle size distribution is derived from the condition \(\left<v_\mathrm{sed}\right> = f_\mathrm{sed} w_\star\). Given the characteristic radius \(r_w\) where \(v_\mathrm{sed}\left(r_w\right) = w_\star\) and assuming the sedimentation velocity scales as \(v_\mathrm{sed}\left(r\right) = w_\star\left(r/r_w\right)^\alpha\), the peak radius \(r_\mathrm{g}\) of the assumed log-normal distribution can be shown to be \[r_\mathrm{g} = r_w f_\mathrm{sed}^{1/\alpha}\exp\left(-\frac{\alpha+6}{2}\ln^2\sigma \right), \label{Eqn:rg}\] where \(\sigma\) is the geometric width of the log-normal distribution. We take \(\sigma=2\) for consistency with and note that this choice for \(\sigma\) is used in and; however, microphysical models of cloud formation that employ binned size distributions consistently find distributions that are broad and often double peaked, corresponding to the separate nucleation and condensation modes, which is potentially at odds with the somewhat narrow log-normal distribution employed in EddySed. We discuss the implications of a wider size distribution on transmission observations in Section [3.3.1](#sec:transmission){reference-type="ref" reference="sec:transmission"}. While the vertical extent of the clouds does not depend directly on \(K_{zz}\), the assumption that \(\left<v_\mathrm{sed}\right> = f_\mathrm{sed} w_\star\) determines the characteristic particle size at a location, and as a result, the characteristic particle size is a function of \(K_{zz}\). While EddySed does include corrections for Reynolds number and Knutsen number (see @2001ApJ...556..872A), in the limit where both of these quantities are small, the characteristic particle radius \(r_\mathrm{g}\) becomes \[r_\mathrm{g} \propto \sqrt{\frac{f_\mathrm{sed}K_{zz}}{ L_\mathrm{mix}}} = \sqrt{\frac{K_{zz}}{L_\mathrm{cloud}}}\,. \label{Eqn:Rg}\] Through the dependence of \(r_\mathrm{g}\) on \(K_{zz}\) and its influence on the radiative properties of the clouds, \(K_{zz}\) exerts an indirect influence on the atmospheric structure. By default, EddySed employs a parametrization of vertical convective mixing based on mixing-length theory from (hereafter, GC85). In the GC85 mixing treatment, \(w_\star\) is the convective mixing velocity and the eddy diffusion coefficient is taken to be \[K_{zz} = \max\left(\frac{H}{3}\left(\frac{L_\mathrm{mix}}{H}\right)^{4/3}\left(\frac{RF}{\mu\rho_a c_p}\right)^{1/3},K_{zz,\mathrm{min}}\right)\,, \label{Eqn:KzzGC85}\] where \(R\) is the universal gas constant, \(F=\sigma T^4_\mathrm{eff}\) is the convective heat flux assuming an effective temperature \(T_\mathrm{eff}=1130\,\mathrm{K}\)[^1], \(\mu = 2.33\, \mathrm{g\,mol^{-1}}\) is the mean molecular weight, \(\rho_a\) is the atmospheric density, and \(c_p = 1.3\times 10^4\,\mathrm{J\, K^{-1}}\) is the specific heat of the atmosphere at constant temperature. The minimum value of \(K_{zz,\mathrm{min}}= 10^5\,\mathrm{cm^2\,s^{-1}}\), taken from, is imposed to account for circulation-driven advection in radiative regions. The associated mixing length \(L_\mathrm{mix}\) is given by \[L_\mathrm{mix} = H\max(0.1,\Gamma/\Gamma_\mathrm{adiab}), \label{Eqn:LmixGC85}\] where \(\Gamma\) and \(\Gamma_\mathrm{adiab}\) are the local and dry adiabatic lapse rates. As the regions of interest within our target atmospheres are radiation-dominated (generally pressures below 10 bar), vertical mixing is accomplished primarily though the large--scale flow, not convection, and while this is crudely accounted for through the inclusion of a minimum value on \(K_{zz}\), studies of mixing in hot Jupiter atmospheres exist which may capture the mixing more accurately than the GC85 approach. (hereafter, P13) performed mixing studies using atmospheric tracers within a global climate model of HD209458b and fit the inferred mixing rate as a function of pressure (\(P\)), \[K_\mathrm{zz} =\frac{5\times 10^4}{\sqrt{P/1\,\mathrm{bar}}}\, \mathrm{m^2s^{-1}}. \label{Eqn:KzzP13}\] While this calculation of \(K_{zz}\) is only strictly applicable to HD209458b, have made analytic estimates of \(K_{zz}\) for hot Jupiter atmospheres more generally which can be used when moving beyond HD209458b to other hot Jupiter atmospheres, and a discussion of how \(K_{zz}\) estimate of varies with planetary and stellar parameters can be found in. In this study, we implement the P13 mixing treatment, but retain the same minimum \(K_{zz,\mathrm{min}}\) applied as above, although within the model atmosphere we consider, the minimum value is never reached. P13 consider their parametrization to be valid between pressures of a few bar and a few \(\mu\)bar. While in many of our simulations this range of pressures encompasses where clouds are found, the cloud deck may be at higher pressures and we remain cognizant that our mixing treatments may not be accurate. We additionally assume that the mixing length is equal to the pressure scale height, \(L_\mathrm{mix} = H\). A similar choice was used in. The results are ultimately insensitive to rescaling \(L_\mathrm{mix}\) by a constant factor as \(L_\mathrm{mix}\) only influences the physics through \(L_\mathrm{cloud} = f_\mathrm{sed}^{-1}L_\mathrm{mix}\) and so any constant rescaling of \(L_\mathrm{mix}\) can be offset by a rescaling of \(f_\mathrm{sed}\). Due to the more complicated functional form of the mixing length in the GC85 model (equation [\[Eqn:LmixGC85\]](#Eqn:LmixGC85){reference-type="ref" reference="Eqn:LmixGC85"}), a constant rescaling to move between models is not possible; however, it can be done in an approximate fashion, as discussed below. The differing assumptions about \(L_\mathrm{mix}\) between our GC85 and P13 models directly impacts the interpretation of the results, as atmospheres with identical sedimentation factors will have clouds with differing vertical extents. In the case of GC85, the mixing scale is a function of the atmospheric properties and as such isn't a constant fraction of H. Averaging over the either GC85 simulation volume, we find that \(\left<L_\mathrm{mix}/H\right>_V\) is \(0.2\), suggesting that simulations with similar cloud structures may differ by a factor of 5 in \(f_\mathrm{sed}\) when comparing between mixing treatments. In either mixing treatment, we view \(K_{zz}\) as approximating relevant transport in the GCM regardless of scale without the need for more computationally intensive schemes. The switch to a mixing model based on a global circulation does, however, raise issues of applicability. This is as EddySed, when adopting the convective mixing treatment of GC85, was intended to balance the local upward mixing against the local downward sedimentation. In the P13 model, however, it is global circulation that is responsible for maintaining the mixing ratios of condensable species at higher altitudes, and the assumption that the global upward mixing locally balances the downward sedimentation may be inappropriate. One possible solution is instead to balance the local upward bulk motions with sedimentation; however, in cases where the vertical velocities are small or negative, solutions become problematic or non-existent. Addressing this issue likely involves moving beyond EddySed and will be discussed in a future paper. For this work, we are primarily interested in exploring the impact of changing the mixing treatment in a widely used cloud model. To couple EddySed to the UM, vertical columns are passed to EddySed independently at each radiation time step, with the returned cloud radiative properties (opacity, single-scattering albedo, and asymmetry parameter) for each wavelength bin passed to the radiation solver. The resulting heating rates are then used by the rest of the model to evolve the atmospheric structure before the process repeats. For each cloud species, the average radiative properties are calculated using the log-normal size distribution outlined above and a table of pre-calculated Mie coefficients. The table has been expanded from and now includes 54 radius bins between \(10^{-7}\, \mathrm{cm}\) and \(0.11\,\mathrm{cm}\). While it does add computational expense to average optical properties across the size distribution as opposed to simply using a characteristic particle size, using a single characteristic particle size can impact both the size and shape of the transmission spectra in unpredictable ways. To ensure numerical stability, we modify the cloud opacities in two ways. First, cloud opacities are slowly ramped to their full value over the first 100 days. This avoids large heating rates associated with the cloudless initial state being a large departure from the final cloudy state. A similar ramping was employed in. Second, we include a linear opacity limiter above \(1\, \mathrm{mbar}\). For runs with cloud scales larger than the pressure scale height, specifically the P13 simulation with \(f_\mathrm{sed} = 0.1\), the relatively large cloud mass at low pressures combined with the small particle radii required to suspend clouds at those pressures results in significant opacity and the potential for numerical instability. In the context of this study, there are a number of limitations to our approach. As EddySed models a single column in equilibrium each time it is called, there is no possibility for horizontal advection of condensate or time evolution of the cloud within our simulations. Moreover, by employing a globally-averaged mixing rate, the model only captures local mixing to the extent that local mixing influences the average. There is no variation in the mixing with latitude thus potentially limiting variation between the poles and the equatorial region. As EddySed also ignores the microphysics of particle growth and evaporation, it may be the case that the chemical timescales are comparable to or shorter than the timescale for horizontal advection and a globally-averaged mixing treatment may no longer be appropriate (@2018ApJ...866....2Z; see @2019AJ....158..244C for a model which attempts to address the issue of the growth timescale). ## Simulations {#subsec:simulations} To investigate the impact of the choice of mixing treatment we perform a suite of simulations of HD209458b similar to those of, using identical 3D initial conditions to aid comparability. The choice to model HD209458b is done for consistency with and because HD209458b serves as a benchmark in the field. In, two separate 3D initial conditions were investigated: a standard deep interior model (SDI) and a hot deep interior model (HDI), neither of which include clouds. The SDI initial condition was created using a 1D pressure-temperature profile generated by the radiative-convective code ATMO with a 3D simulation subsequently evolved for 1200 days, reaching a quasi-steady state. The HDI initial condition is generated similarly except that the initial 1D temperature profile is increased by \(800\, \mathrm{K}\) in each layer before the 3D simulation is evolved for 800 days. Note that although the total elapsed simulation times for these two setups differ, both have reached a state of steady wind velocities in the upper atmosphere. In particular, as the higher pressure regions of standard setup hot Jupiter simulations gradually warm, the hotter interior profile is likely closer to the final state. A discussion of these initial conditions can be found in, with the latter motivated by the warming of the deep atmosphere in hot Jupiters simulations. In this work, we focus on the HDI case as found it to have reasonable agreement with observations, and our intention is to only investigate the impact of changing the mixing treatment. In addition to serving as the 3D initial conditions for the cloudy simulations performed in this paper, the HDI initial condition also serves as the "Clear Sky" case used for comparison with the cloudy results to isolate the impact of the clouds on the atmospheric structure. Given the initial conditions, we perform a suite of simulations varying \(f_\text{sed}\) using both the GC85 mixing treatment as well as the P13 mixing treatment. The value for \(f_\mathrm{sed}\) is only minimally constrained in models using the GC85 mixing treatment, with a range of values extending from \(f_\mathrm{sed} \sim 1-10\) in brown dwarf atmospheres to \(f_\mathrm{sed} \sim 0.01\) in cloudy super-Earths. These values are set by observations instead of being motivated by the underlying physics. A study by which attempted to calibrate \(f_\mathrm{sed}\) in brown dwarf atmospheres using the CARMA microphysical cloud model found \(f_\mathrm{sed} \sim 0.1\) with the value sensitive to nucleation rates and other material properties and, to a lesser extent, \(K_{zz}\). Lacking physical motivation for a specific choice of \(f_\mathrm{sed}\) in hot Jupiter atmospheres, we perform simulations across a range of values of \(f_\mathrm{sed}\) with the intention to cover a broad range of cloud scales. As in, we investigate both the \(f_\mathrm{sed}=0.1\) and \(f_\mathrm{sed}=1.0\) cases. Given how simulations with differing values of \(f_\mathrm{sed}\) can have similar cloud scales \(L_\mathrm{cloud}\) when comparing between mixing models, we additionally perform simulations with \(f_\mathrm{sed}=2.0\) and \(5.0\) for the P13 case. # Results {#sec:results} In this section we present the thermodynamic and dynamic structures resulting from our simulations, before detailing the mixing and cloud distributions themselves, and finishing with an analysis of the observational implications. ## Atmospheric Structure {#subsec:atm_struct} We begin with a direct comparison of our P13 simulations with the HDI GC85 simulations performed in (i.e., our GC85 \(f_\mathrm{sed} = 0.1\) and \(1.0\) cases). All simulations exhibit the characteristic hot zonal jet with a dayside hotspot observed at pressures less than 1 bar (see Figs [\[Fig:PT\]](#Fig:PT){reference-type="ref" reference="Fig:PT"} and [\[Fig:TempPanel\]](#Fig:TempPanel){reference-type="ref" reference="Fig:TempPanel"}). Along the equator, we see similar temperature profiles at the eastern terminator as at the substellar point due to warm gas being advected by the equatorial jet. Similarly, the temperature profiles at the western terminator resemble those at the anti-stellar points. The P13 simulations show much more pronounced hotspots with higher dayside peak temperatures compared to the GC85 simulations with the same sedimentation factor. The hotspots themselves are shifted eastward for more compact clouds (i.e., increasing \(f_\mathrm{sed}\)). The GC85 simulations exhibit a greater hotspot offset compared to the P13 simulations, both when comparing simulations with identical values of \(f_\mathrm{sed}\) and when accounting for a factor of 5 difference in \(\left<L_\mathrm{mix}\right>_V\). The GC85 simulations also exhibit somewhat faster zonal winds with the \(f_\mathrm{sed} = 1.0\) case having a peak zonally-averaged speed of \(7.7\,\mathrm{km\,s^{-1}}\) compared to \(5.5\, \mathrm{km\,s^{-1}}\) for the P13 case with the same value of \(f_\mathrm{sed}\) (see Fig. [\[Fig:ZonalVel\]](#Fig:ZonalVel){reference-type="ref" reference="Fig:ZonalVel"}). In general, smaller values of \(f_\mathrm{sed}\) correspond to slower zonal winds, although the effect is less pronounced in the P13 runs. As discussed in Section [2.2](#subsec:eddysed){reference-type="ref" reference="subsec:eddysed"}, the cloud scales \(L_\mathrm{cloud}\) differ on average by roughly a factor of 5 between GC85 and P13 which results in the clouds in P13 models having significantly greater vertical extent for the same value of \(f_\mathrm{sed}\). Therefore, it is more appropriate to compare GC85 \(f_\mathrm{sed}=1.0\) with P13 \(f_\mathrm{sed}=5.0\) as they have similar, although not identical cloud scale heights. They exhibit similar atmospheric temperatures (Fig. [\[Fig:TempPanel\]](#Fig:TempPanel){reference-type="ref" reference="Fig:TempPanel"}, fourth and sixth rows) and the zonal wind peaks at \(7.8\,\mathrm{km\,s^{-1}}\) in the GC85 simulation compared to \(8.3\,\mathrm{km\,s^{-1}}\) in the P13 simulation. The differences between the simulations are due to cloud scale heights agreeing only as an atmospheric average. For the GC85 case, \(L_\mathrm{cloud}\) exhibits local variation due to its temperature dependence, which is not something that occurs within the P13 simulation where \(L_\mathrm{cloud} = f_\mathrm{sed}^{-1}H\). The differing treatments for \(K_\mathrm{zz}\) also impacts the thermal structure due to the dependence of the particle radius and thus cloud opacities on the atmospheric mixing. All the temperature profiles exhibit a temperature offset at high pressures (\(P \gtrsim 10\,\mathrm{bar}\)) between mid-latitudes and the equator. This is seen in both clear and cloudy models and is thus unrelated to the cloud model being investigated; however, as the models are not converged at these pressures (see @tremblin_2017 [@mayne_2017]), it is unclear whether this effect will be seen in a converged solution or if it is simply a transient feature. ## Mixing and Cloud Structure {#subsec:clouds} The equatorial profiles of \(K_{zz}\) for the GC85 and P13 simulations are shown in Fig. [\[Fig:Kzz\]](#Fig:Kzz){reference-type="ref" reference="Fig:Kzz"}, and, in general, the GC85 mixing rates are approximately one to two orders of magnitude larger than the P13 mixing rates. As \(K_{zz}\) in the GC85 case depends on atmospheric properties beyond the local pressure (see equation [\[Eqn:KzzGC85\]](#Eqn:KzzGC85){reference-type="ref" reference="Eqn:KzzGC85"}), there is an order of magnitude variation in mixing with longitude. The P13 simulations, by contrast, shows no variation beyond the pressure dependence (see Fig. [\[Fig:Kzz\]](#Fig:Kzz){reference-type="ref" reference="Fig:Kzz"}, dotted line); however, this is a consequence of equation [\[Eqn:KzzP13\]](#Eqn:KzzP13){reference-type="ref" reference="Eqn:KzzP13"} being a fit to the zonal average mixing and not necessarily an indication that the underlying tracer model lacked such a dependence. The \(K_{zz}\) used in the P13 mixing treatment (equation [\[Eqn:KzzP13\]](#Eqn:KzzP13){reference-type="ref" reference="Eqn:KzzP13"}) is based on clear sky simulations and changes to the atmosphere caused by the presence of clouds may not be accounted for. This may be especially important in the P13 \(f_\mathrm{sed} = 0.1\) simulation where we see the largest changes in temperatures as well as the presence of dayside temperature inversions. To understand the degree to which mixing rates might be impacted, we estimate \(K_{zz}\) for each simulation, using the analytic estimate of, \[K_{zz} \sim \frac{\overline{w}^2}{\tau_\mathrm{adv}^{-1} + \tau_\mathrm{chem}^{-1}} \sim \overline{w}^2 \tau_\mathrm{adv}\,\,, \label{Eqn:KzzKomacek}\] where \(\overline{w}\) is the root-mean-squared of the vertical speed along isobaric pressure contours and \(\tau_\mathrm{adv} = R_\mathrm{p}/\overline{u}\) is the horizontal advection timescale with the horizontal wind speed \(\overline{u}\) similarly averaged along isobaric pressure contours. We ignore the chemical timescale \(\tau_\mathrm{chem}\) in our analysis, effectively taking it to be infinitely long, for consistency with the tracer study of P13; however, it likely becomes important in regions where the horizontal velocities are small such as at high pressures. The resulting mixing rates are shown in Fig. [\[Fig:KzzEstimate\]](#Fig:KzzEstimate){reference-type="ref" reference="Fig:KzzEstimate"}. For \(P \lesssim 10\,\mathrm{bar}\), we see roughly an order of magnitude variation between simulations; however, there is no obvious trend with \(f_\mathrm{sed}\) or with mixing treatment. At higher pressures (\(P \gtrsim 10\,\mathrm{bar}\)), we see large variation between simulations, as well as larger fluctuations with pressure within simulations. At these pressures, however, the simulations are not converged (see @tremblin_2017 [@mayne_2017]) and running the simulations to convergence may reduce the variations between simulations as well as the fluctuations in time. The inclusion of a finite chemical timescale will also impact the estimated \(K_{zz}\) as \(\tau_\mathrm{adv}\) becomes very large at these pressures. As the variation between simulations in the estimated \(K_{zz}\) is limited at pressures where we find clouds, we take this as evidence for limited impact of clouds on the overall mixing. Comparing with the P13 \(K_{zz}\), we find agreement to within an order of magnitude at low pressures (\(P \lesssim 1\,\mathrm{bar}\)); however, the analytic estimates diverge at higher pressures. As P13 only claim their fit to be valid for \(P \lesssim 1\,\mathrm{bar}\), this divergence is not surprising. The distribution of condensates exhibit a strong dependence on latitude as well as a day-night asymmetry. The hot equatorial jet shows reduced condensate mixing ratios at higher pressures (\(\sim 10^2\) bar) in all the simulations with only \(\mathrm{Al_2O_3}\) near the equator (see Fig. [\[Fig:QcPanel\]](#Fig:QcPanel){reference-type="ref" reference="Fig:QcPanel"}, right column) with the cooler poles showing the highest mixing ratios of condensate, primarily consisting of \(\mathrm{Al_2O_3}\), \(\mathrm{MnS}\), \(\mathrm{MgSiO_3}\), \(\mathrm{Mg_2SiO_4}\), \(\mathrm{Fe}\), and \(\mathrm{Cr}\). Moving to lower pressures, the day-night asymmetry becomes apparent, with the day-side hot spot remaining free of condensate except for \(\mathrm{Al_2O_3}\) and the night-side exhibiting clouds around the equator. At the poles, the behaviour depends on the efficiency of sedimentation (i.e., on \(f_\mathrm{sed}\)). As clouds form at relatively high pressures near the poles, sedimentation reduces the vapour mixing ratio at lower pressures above the clouds, reducing further cloud formation. As a result, we see the greatest amount of condensate at the poles in the models with \(f_\mathrm{sed} = 0.1\) where the effects of sedimentation are suppressed. (see Fig. [\[Fig:QcPanel\]](#Fig:QcPanel){reference-type="ref" reference="Fig:QcPanel"}, first and fifth rows). This impact on cloud morphology can be seen by examining the distribution at the terminator. Fig. [\[Fig:Terminator\]](#Fig:Terminator){reference-type="ref" reference="Fig:Terminator"} shows slices through the terminator of the P13 \(f_\mathrm{sed} = 2.0\) simulation, chosen as it exhibits sufficient cloud opacity to impact observations. The peak in total condensates near the poles can be seen to occur at \(P\sim 10\,\mathrm{bar}\). At the equator, the higher temperatures inhibit cloud formation, pushing the cloud deck to \(P\sim 0.1\,\mathrm{bar}\), ultimately forming 'arches' above the hottest regions of the equatorial jet. As the eastern terminator (the left side of each plot in Fig. [\[Fig:Terminator\]](#Fig:Terminator){reference-type="ref" reference="Fig:Terminator"}) is hotter (left panel), we see the cloud deck pushed to lower pressures on the eastern terminator, resulting in the eastern limb having a larger effective radius (see Section [3.3](#subsec:observations){reference-type="ref" reference="subsec:observations"}). There is uncertainty as to whether sulphides and iron are capable of condensing to form clouds due to large energy barriers. While we do not see significant \(\mathrm{Na_2S}\) or \(\mathrm{ZnS}\) cloud coverage except in limited regions at lower pressures (\(P \lesssim 10 \,\mathrm{mbar}\)), we do see significant \(\mathrm{MnS}\) and \(\mathrm{Fe}\) cloud coverage in our simulations. In the microphysical simulations of, \(\mathrm{MnS}\) clouds did not form but some \(\mathrm{Fe}\) clouds were observed despite the energy barrier due to large supersaturations. Due to the possibility of these clouds influencing the atmospheric evolution, future simulations excluding these species might be necessary. As the model contains clouds of multiple species, we calculate the mass-mixing-ratio-weighted particle size throughout the atmosphere, \[\left<r_\mathrm{g}\right> = \frac{\sum_s r_{\mathrm{g},s} q_s}{\sum_s q_s} \,\,,\] where \(r_{\mathrm{g},s}\) is the cloud particle radius for species \(s\) and \(q_s\) is the associated mass mixing ratio. Fig.[\[Fig:RgPanel\]](#Fig:RgPanel){reference-type="ref" reference="Fig:RgPanel"} shows \(\left<r_\mathrm{g}\right>\) for each simulation. At higher pressures (\(\sim 1\, \mathrm{bar}\), Fig. [\[Fig:RgPanel\]](#Fig:RgPanel){reference-type="ref" reference="Fig:RgPanel"}, right column), the simulations show relatively homogeneous particle size distributions with some latitudinal variation between the equatorial jet and the poles. As pressures decrease, however, the structures become more diverse, with a general trend of larger particle sizes at lower pressures. This is due to the direct dependence of the particle size on \(K_{zz}\) (see equation [\[Eqn:Rg\]](#Eqn:Rg){reference-type="ref" reference="Eqn:Rg"}). As is seen in, this trend continues until \(P \sim 0.01\,\mathrm{bar}\), where particle sizes begin to decrease with lower pressures due to the reduction in atmospheric drag. ## Observations {#subsec:observations} In this section, we compare synthetic observations derived from our simulations to each other and to observational data, including transmission (Section [3.3.1](#sec:transmission){reference-type="ref" reference="sec:transmission"}) and emission spectra (Section [3.3.2](#sec:emission){reference-type="ref" reference="sec:emission"}) and phase curves (Section [3.3.3](#sec:phase){reference-type="ref" reference="sec:phase"}). ### Transmission {#sec:transmission} For each simulation, we generated synthetic transmission spectra using the 3D transmission scheme described in and employed previously in with the resulting spectra converted to an effective radius relative to the stellar radius. The method used in only includes the contribution from one side of the planet, either the dayside or the nightside, and doubles the result and thus does not capture the effects of gradients across the terminator. To address this, computed the transits for the dayside and the nightside and used the simple mean along each line of sight to compute a final result. Here we instead take the geometric mean of the transits which has the effect of summing the underlying dayside and nightside optical depths. This modification results in only minor differences in the transmission spectra. Fig. [\[Fig:Transit\]](#Fig:Transit){reference-type="ref" reference="Fig:Transit"} shows the transmission spectra for all the simulated atmospheres as well as the observed transmission spectrum from. As the pressure of the atmosphere at the measured planetary radii is not precisely known,, all the model spectra have been scaled so that they agree with the observations at \(1.4\,\mathrm{\mu m}\). The clear sky spectrum is shown in black and exhibits prominent sodium, potassium, and water features, which are also seen in the observed spectrum. By comparison, many of the cloudy simulations exhibit flat spectra with muted spectral features. This is a direct consequence of those simulations having clouds with large vertical extents (i.e., large \(L_\mathrm{cloud}\)). A naive comparison of the GC85 and P13 simulations with \(f_\mathrm{sed}=1.0\) show differing results, with the GC85 simulation resembling the the clear spectrum and the P13 simulation exhibiting a much flatter, cloudier spectrum. These differences are due primarily to differences between the mixing lengths and how the sedimentation factor is defined rather than the efficiency of sedimentation itself. Comparing instead the GC85 simulation with \(f_\mathrm{sed} = 1.0\) and the P13 simulation with \(f_\mathrm{sed} = 5.0\) which both have \(\left<L_\mathrm{cloud}\right> \sim 0.2H\), we see similar spectra. The differences can be attributed to the impact of particle size and local variation in the mixing length, as discussed above. As both \(f_\mathrm{sed}=0.1\) and \(f_\mathrm{sed} = 1.0\) P13 simulations exhibit relatively flat spectra due to their cloud content, we include additional simulations with \(f_\mathrm{sed}=2.0\) and \(f_\mathrm{sed} = 5.0\) (i.e., \(L_\mathrm{cloud} = 0.5H\) and \(0.2H\), respectively; see Fig.[\[Fig:Transit\]](#Fig:Transit){reference-type="ref" reference="Fig:Transit"}, dotted and dash-dotted red lines). These simulations, especially the \(f_\mathrm{sed}=2.0\) case, show better agreement with the observations in the \(1-2\,\mathrm{\mu m}\) part of the spectrum by allowing cloud deeper in the atmosphere to partially obscure the water vapour flux windows at \(1.05\,\mathrm{\mu m}\) and \(1.5\,\mathrm{\mu m}\). While these partially cloudy models show reasonable agreement in the IR, it remains that none of the models presented here show good agreement with observations in the optical. As discussed in, the agreement in the optical may be improved by increasing the width of the particle size distribution, allowing for more small particles to scatter in the optical while maintaining the flat distribution in the IR. In the context of EddySed, this can be achieved by an increase in \(\sigma\) which both widens the log-normal distribution and shifts the peak \(r_\mathrm{g}\) to smaller values (see equation [\[Eqn:rg\]](#Eqn:rg){reference-type="ref" reference="Eqn:rg"}), although moving beyond a log-normal distribution to distributions better informed by microphysical modeling of clouds (e.g., @Powell_2019) may be necessary. Unmodelled physics, such as submicron photochemical hazes, may also be necessary to improve the agreement with the transit spectrum in the UV and optical. proposed, in their own attempts to address similar poor agreement in the optical between their model and the observed transit of HD189733b, that a reduction of the \(\mathrm{H_2O}\) mixing ratio may be used to increase the effective radii the UV and optical transit spectra relative to those in the IR. We investigated this possibility in our own model via changes to the \(\mathrm{H_2O}\) mixing ratio when generating post-processed transits and found that the effect was dependent on normalizing the spectra to the peak of water features and when normalizing instead to water flux windows (for example, normalizing the spectra to agree with observations at \(1.3\, \mathrm{\mu m}\)), the shift in the optical disappears. Moreover, any change in the \(\mathrm{H_2O}\) mixing ratio results in poor agreement in the IR where our models already agree with the prominent observed water features. The primary sources of cloud opacity in our transmission spectra are \(\mathrm{MgSiO_3}\), \(\mathrm{Mg_2SiO_4}\), and \(\mathrm{Fe}\), with smaller contributions from \(\mathrm{MnS}\) and \(\mathrm{Cr}\), while all other cloud species contribute negligibly (see Fig. [\[Fig:TransitSpecies\]](#Fig:TransitSpecies){reference-type="ref" reference="Fig:TransitSpecies"}). Although the condensation curve for \(\mathrm{Mg_2SiO_4}\) used in EddySed does attempt to account for \(\mathrm{MgSiO_3}\) and \(\mathrm{Mg_2SiO_4}\) sharing gas phase precursors, the relative contributions of these two cloud species is subject to an extra level of uncertainty. In order to further explore the asymmetry between the limbs of the transit, we separate each transit into its east and west components, including the poles, and compute an effective radius. Fig. [\[Fig:TransitComp\]](#Fig:TransitComp){reference-type="ref" reference="Fig:TransitComp"} (top panel) shows the ratio of these two radii for each model. All models show a modest increase (\(\lesssim 1\%\)) in effective radius on the eastern limb. A small exception to this occurs in the water flux windows between \(1.4 \, \mathrm{\mu m}\) and \(4\, \mathrm{\mu m}\) in the clear sky case where we see \(R_\mathrm{east} \leq R_\mathrm{west}\). The cause can be understood by looking at east and west transits individually. The bottom panel of Fig. [\[Fig:TransitComp\]](#Fig:TransitComp){reference-type="ref" reference="Fig:TransitComp"} shows the east and west transits for the clear sky case (dashed lines) as well as for the P13 \(f_\mathrm{sed}=2.0\) case, chosen to be a representative model with a moderate amount of cloud. In the clear sky case, it can be seen that the minima associated with the water vapour windows are offset between the east and west cases, and in some cases, the water features on the western limb are wider. These two effects combine to create the regions of the spectra where the west limb is larger than the east limb. In the optical, the spectral features seen in the transits (see Fig. [\[Fig:Transit\]](#Fig:Transit){reference-type="ref" reference="Fig:Transit"}) are also seen in \(R_\mathrm{east}/R_\mathrm{west}\) with the greatest asymmetries being seen in the sodium and potassium lines in the optical and near-IR. The P13 and GC85 models differ in that the P13 models, in the optical, show consistently greater asymmetry as \(f_\mathrm{sed}\) decreases. ### Emission {#sec:emission} Figs. [\[Fig:Dayside-WFC3\]](#Fig:Dayside-WFC3){reference-type="ref" reference="Fig:Dayside-WFC3"} and [\[Fig:Dayside2\]](#Fig:Dayside2){reference-type="ref" reference="Fig:Dayside2"} show the dayside emission for the IR in the *Hubble* WFC3 G141 (\(1.1\)-\(1.7 \,\mathrm{\mu m}\)) and *Spitzer*/IRAC (\(3.5\)-\(10\,\mathrm{\mu m}\)) bands, respectively. In each case, the flux shown is the sum of the reflected stellar component and the thermal planetary component. We first examine the dayside emission in the near--IR WFC3 G141 (\(1.1\)-\(1.7 \,\mathrm{\mu m}\)) bandpass. Fig. [\[Fig:Dayside-WFC3\]](#Fig:Dayside-WFC3){reference-type="ref" reference="Fig:Dayside-WFC3"} shows the dayside emission for each run with the observations from shown in green. In general, the presence of cloud increases the dayside emission in this band, with the emission increasing with cloud vertical extent (i.e., lower \(f_\mathrm{sed}\)). Of the GC85 simulations investigated by, the \(f_\mathrm{sed} = 0.1\) case provides the best agreement with the data; however, with the inclusion of the P13 models, we now see better agreement with the P13 \(f_\mathrm{sed} = 2.0\) model. As was the case with the GC85 \(f_\mathrm{sed} = 0.1\) model, the data point at \(1.41\,\mathrm{\mu m}\) remains an outlier as it appears to be most consistent with the clear sky case. While it may be tempting to point to this improved agreement with the observational data as due to the improved mixing treatment, it may simply be that our greater coverage of the \(f_\mathrm{sed}\) parameter space for the P13 model led to an improved fit. Since most of the data are bounded by the GC85 \(f_\mathrm{sed} = 0.1\) and \(1.0\) simulations, it is conceivable that an GC85 simulation with intermediate values of \(f_\mathrm{sed}\) would yield an improved match to the data. As our goal here is to investigate the P13 mixing treatment, a retrieval-type analysis optimizing parameters is beyond the scope of this particular work, and reserved for a future study. Fig. [\[Fig:Dayside2\]](#Fig:Dayside2){reference-type="ref" reference="Fig:Dayside2"} shows the synthetic observations at 3.5-10 \(\mathrm{\mu m}\) as well as the *Spitzer*/IRAC data of and. The data are matched best by the clear sky case, although cloudy simulations with limited vertical extent (e.g., GC85 \(f_\mathrm{sed} = 1.0\) and P13 \(f_\mathrm{sed} = 5.0\)) do not differ significantly from the clear sky spectrum. This is consistent with the trend seen in the previous section where the data show the best agreement with simulation with cloud scale heights less than \(H\). ### Phase Curves {#sec:phase} The 4.5 micron phase curves for all the models are shown in Fig. [\[Fig:phase45micron\]](#Fig:phase45micron){reference-type="ref" reference="Fig:phase45micron"} with the observed phase curve from in grey. The clear sky model exhibits a larger nightside flux compared to observations, and in general underpredicts the contrast between the day and night sides, an effect for cloudless atmospheres that is well documented in the literature. Both mixing treatments increase the contrast in fluxes between the dayside and the nightside; however, with the exception of the P13 \(f_\mathrm{sed} = 0.1\) case, they all continue to overestimate the nightside flux. The dayside flux, on the other hand, shows best agreement with the models with limited cloud (GC85 \(f_\mathrm{sed}=1.0\) and P13 \(f_\mathrm{sed}=5.0\)) as discussed in the Section [3.3.2](#sec:emission){reference-type="ref" reference="sec:emission"}, so it unlikely that the observed \(4.5\,\mathrm{\mu m}\) phase curve can be explained through variation of \(f_\mathrm{sed}\) alone. Parameters not varied within this study, such as the width of the log-normal distribution or the specific condensate species included, may provide avenues to resolve the current discrepancies. # Conclusions {#sec:conclusions} In this work we have investigated the impact of a more physically accurate mixing treatment on the EddySed cloud model when applied to hot Jupiters. The default convective mixing of (referred to here at GC85) is replaced with a mixing treatment based on (P13) which explicitly models mixing in the atmosphere of HD209458b through tracers within a GCM. We performed simulations using the new P13 mixing treatment for four values of the sedimentation factor \(f_\mathrm{sed}\) covering effective cloud scale heights from \(0.2H\) to \(10H\). Within the EddySed formalism, the sedimentation factor \(f_\mathrm{sed}\) and the mixing length \(L_\mathrm{mix}\) are the primary drivers of the cloud distribution as they form the cloud scale \(L_\mathrm{cloud} = f_\mathrm{sed}^{-1}L_\mathrm{mix}\), with the eddy mixing rate \(K_{zz}\) influencing the distribution only indirectly through its role in determining the particle sizes and optical properties. As a result, we find that the choice of sedimentation factor--or equivalently, the choice of cloud scale-- plays a larger role in the atmospheric evolution than the switch in choice of \(K_{zz}\) given the relative unconstrained nature of \(f_\text{sed}\). We do observe a decrease in particle size due to the switch to the P13 mixing treatment; however, due to the relatively weak scaling of \(r_\mathrm{g}\) with \(K_{zz}\), the change was insufficient to result in significant differences in observables. While not investigated here, the width of the log-normal particle size distribution--a fixed parameter in EddySed--may impact results to a greater degree due to the sensitivity of the peak radius \(r_\text{g}\) to the width \(\sigma\). We also observe that differences in chosen mixing scale \(L_\mathrm{mix}\) can roughly be accounted for by a commensurate scaling of the sedimentation factor. The results of our GC85 \(f_\mathrm{sed} = 1.0\) and P13 \(f_\mathrm{sed} = 5.0\) simulations, which differ by a factor of 5 in sedimentation factor as well as in average mixing scale, show very similar atmospheric structures as well as transits and emission spectra due to both models having average cloud scales \(\left<L_\mathrm{cloud}/H\right>_V = 0.2\). This rough equivalence may not hold for simulations with larger differences in \(K_{zz}\) or for cases with differing distribution widths. In the P13 cases, we see qualitatively the same distribution of condensates as in the GC85 models, with clouds forming at higher pressures within the atmosphere near the poles, and sedimentation reducing the vapour concentrations above the cloud layers. This should be noted as it contrasts with purely temperature-dependent models which use a constant vapour concentration throughout the atmosphere which may result in larger vertical extents in the resulting clouds. We see the greatest amount of condensate at low pressure near the poles in the P13 \(f_\mathrm{sed}=0.1\) model which has a corresponding cloud scale of \(L_\mathrm{cloud}=10H\). Near the equator, we find that the higher temperatures, especially on the dayside, push the cloud base to lower pressures, with the cloud forming an "arch" over the hottest parts of the equatorial jet. These morphological differences are due to the approximate modelling of sedimentation and mixing in EddySed are taken to be improvements over more simplified models. Observationally, we find that our parameter study using the P13 mixing treatment better agrees with the observed transits and dayside emission in the WFC3 G141 bandpass, specifically the simulation with \(f_\mathrm{sed} = 2.0\); however, the parameter study covers intermediate cloud scales not seen in the GC85 parameter study done by, and it may be possible to find good agreement with the data using intermediate values of \(f_\mathrm{sed}\) between \(0.1\) and \(1.0\). Neither the GC85 nor the P13 simulations were able to reproduce the \(4.5\,\mathrm{\mu m}\) phase curve with most models overestimating the nightside flux; however, the cloud cases showed better agreement with observations than the clear sky case. Similarly, the shallow cloud cases (P13 \(f_\mathrm{sed} = 2.0\), specifically) improved the agreement with the IR transit over clear sky case. It remains that neither the cloud nor the clear sky cases show good agreement in the optical and UV. Our simulated transits did show evidence for a small increase (\(\lesssim 1\%\)) in effective radius in the eastern limb compared to the western limb, with simulations with the largest cloud scales showing the greatest asymmetry in the optical across the band. \(\text{Na}\) and \(\text{K}\) lines in the optical and near-IR are more prominent in the eastern limb resulting in a local increase in relative radius around these lines. In the IR, we find \(\mathrm{H_2O}\) and \(\text{CO}\) features cause large variations in the relative radius although the eastern radius remaining larger. The agreement with observations may be improved by examining parameters within the EddySed model not varied in this study. We adopted a fixed width for the log-normal particle size distribution, and as was discussed earlier and in, a wider distribution would increase the number of small particles scattering in the optical which may improve the fit to the observed transmission spectrum. We have also opted not to investigate which species contribute to cloud formation, instead allowing all species for which we have condensation curves to potentially condense into clouds. Excluding or limiting species with large energy barriers such as \(\mathrm{MnS}\) or \(\mathrm{Fe}\) may improve our agreement with observations. It may be the case, however, that physics beyond what is modelled in EddySed is necessary. While it remains that the simulations presented here are unable to explain all observations, they do represent an improvement over more simplified models with a limited increase in computational overhead, especially compared to true microphysical models. In the future, we hope to study the impact of the particle size distribution on the results, something that has been overlooked in this and previous EddySed studies. In the longer term, we hope to adapt and expand the model to account for the local velocity field and address the shortcomings of using the global mixing treatment.
{'timestamp': '2021-07-14T02:04:29', 'yymm': '2107', 'arxiv_id': '2107.05732', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05732'}
# **Introduction** {#I} *Skew braces* are a type of algebraic structure consisting of a set with two group operations (analogous to a ring) which interact via a kind of modified distributive law. They have been studied for the last decade or so in papers such as. Beyond their inherent algebraic interest, skew braces are important in knot theory because they provide solutions to the set-theoretic Yang-Baxter equation, which in turn lead to invariants of knots. Set-theoretic Yang-Baxter solutions are also provided by *biquandles*, which have been studied for about the last two decades; see and the references therein for more. Biquandle-based knot invariants include many examples of *enhancements*, invariants which specialize to the integer-valued biquandle counting invariant (i.e., the cardinality of the set of biquandle homomorphisms from the fundamental biquandle of the knot or link to a fixed finite biquandle) but which contain more information beyond merely the set's cardinality. A skew brace defines a biquandle, and thus the notion of biquandle coloring extends to a notion of skew brace coloring, allowing for skew brace counting invariants and enhancements thereof. Like many biquandle-based invariants of classical knots and links, these skew brace invariants extend to the setting of virtual knot theory in a natural way by simply ignoring the virtual crossings, i.e., letting skew brace colors remain constant when passing through virtual crossings. In this paper we define two infinite families of new polynomial enhancements of the biquandle counting invariant for biquandles which come from skew braces. The paper is organized as follows. In Section [2](#QB){reference-type="ref" reference="QB"} we collect a few definitions and observations about skew braces and their relationship with biquandles. We recall the biquandle counting invariant and define the skew brace counting invariant for finite biquandles and skew braces. In Section [3](#GF){reference-type="ref" reference="GF"} we introduce the new enhanced invariants: the two-variable *skew-brace enhanced polynomial* and the one-variable *skew brace ideal polynomial*. In Section [4](#E){reference-type="ref" reference="E"} we provide examples to illustrate the computation of the invariant and to establish that the new invariants are proper enhancements, i.e. that they are not determined by the counting invariant. In Section [5](#Q){reference-type="ref" reference="Q"} we end with some questions for future research. # **Skew Braces and Skew Brace Colorings** {#QB} We begin with a definition; see for more. To familiarize ourselves a little with the algebra of skew braces, let us note the standard fact (see for example) that this modified distributive law has the useful consequence that the two group identities are equal. For simplicity, we will denote the common identity element of both operations as \(e\). Let \(X\) be a skew brace and let \(K\) be an oriented classical or virtual knot or link diagram. A *skew brace coloring* of \(K\), also called an *\(X\)-coloring of \(K\)*, is an assignment of elements in \(X\) to each semiarc in \(K\) such that at every classical crossing we have one of the following pictures: \[\includegraphics{mc-sn-1.pdf}\] At virtual crossings, the colors on the semiarcs are not changed. Next we recall a definition found in: As noted in, skew brace colorings provide solutions to the set-theoretic Yang Baxter equation. In fact, we have The result has been previously established in Corollary 3.3 of using different notation; let us verify using our notation. A skew brace coloring is a biquandle coloring by the associated biquandle of the skew brace. Hence, it follows that the number of skew brace colorings of an oriented classical or virtual knot or link diagram \(K\) by a finite skew brace \(X\) is a knot invariant, which we will denote by \(\Phi_X^{\mathbb{Z}}(K)=|\mathcal{C}(K,X)|\) where \(\mathcal{C}(K,X)\) denotes the set of \(X\)-colorings of \(K\). The set-theoretic Yang-Baxter solutions defined by skew braces with commutative \(*\) operation are *involutive*, meaning that the vertical map of pairs \[r(x,y)=(x^**(x\circ y),\ (x^**(x*y))^{\circ}\circ x\circ y)\] satisfies \(r^2=\mathrm{Id}\). More precisely, we note that the first component of \(r^2(x,y)\) is \[\begin{aligned} (x^**(x\circ y))^**[(x^**(x\circ y)) \circ(x^**(x*y))^{\circ}\circ x\circ y)] & = & (x^**(x\circ y))^**[x\circ y] \\ & = & (x\circ y)^**(x^*)^**(x\circ y) \\ & = & (x\circ y)^**x*(x\circ y) \end{aligned}\] which equals \(x\) if \(*\) is commutative, and the second component is \[\begin{aligned} ^{\circ}\circ(x^**(x\circ y))\circ(x^**(x\circ y))^{\circ}\circ x\circ y & = & [(x\circ y)^**x*(x\circ y)]^{\circ} \circ x\circ y \end{aligned}\] which again reduces to \(y\) in the case that \(*\) is commutative. The fact that all groups of cardinality less than six are abelian implies that the coloring invariant and its enhancements for skew braces with fewer than six elements cannot distinguish between knots or links related by the *2-move*: \[\includegraphics{mc-sn-5.pdf}.\] Since the 2-move can be combined with a Reidemeister II move to yield a crossing change, \[\includegraphics{mc-sn-4.pdf}\] it follows that knots and links in various categories (classical, virtual, flat virtual, etc.) which are related by crossing change cannot be distinguished by involutory skew brace invariants. Indeed, involutory skew brace counting invariants and their enhancements are trivial for classical knots and links. However, virtual knots are links fall into several distinct classes under the virtual Reidemeister moves together with crossing changes; as we will show, involutory skew brace invariants and their enhancements can be effective at distinguishing these classes of virtual knots and links. Moreover, involutory skew brace invariants are well-defined for flat virtual knots. Finite skew brace structures on a set \(X\) can be specified in various ways--algebraic formulas for the two group operations, using pairs of tuples as described in, etc. For our purposes it will be most useful to specify a skew brace on \(X=\{1,2,\dots, n\}\) with a pair of operation tables for the two group operations, which we will call *structure tables*. If \(\ast\) is nonabelian, then the skew brace's resulting set-theoretic Yang-Baxter solution \(r\) may not be involutive; these are the examples which can give us interesting invariants of classical knots and links. # **Skew Brace Enhancements** {#GF} In this section we introduce new invariants of oriented virtual knots and links which enhance the skew brace counting invariant. More precisely, these are polynomial invariants which specialize to the counting invariant when the variables are set equal to 1. Recall that for any biquandle coloring \(f\in\mathcal{C}(X,K)\), the *image* of \(f\), denoted \(\mathrm{Im}(f)\), is the biquandle closure of the set of biquandle elements used in \(f\), i.e, the set of elements of \(X\) obtainable from biquandle elements used in \(f\) using the biquandle operations \(\underline\triangleright\) and \(\overline\triangleright\) (as well as their right inverses, though for finite biquandles the right inverse operations can be expressed in terms of the standard operations). Let us denote the group closures of \(S\subset X\) under the group operations \(*\) and \(\circ\) by \(\overline{S^*}\) and \(\overline{S^{\circ}}\) respectively. Next, we have a definition from. We can now state our main theorem. # **Examples** {#E} In this section we collect some computations and examples of the new invariants. # **Questions** {#Q} We conclude this short paper with a list of questions for future study. - What additional enhancements of the skew brace counting invariant using the skew brace structure are possible? - In our examples, the powers on \(u\) and \(v\) are always the same; is this true in general, or a consequence of the small cardinality of our example skew braces?
{'timestamp': '2022-06-30T02:01:39', 'yymm': '2107', 'arxiv_id': '2107.05696', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05696'}
null
null
# Introduction Within the general framework of graph coloring problems there exists an important class of problems that is related to the frequency assignment problem: for a given set of transmitters (which are represented by the vertices of a graph) and their adjacency (i.e. adjacent transmitters are close enough or have strong enough signal), assign the frequency bands to the transmitters in a way that keeps interference below a defined level while minimizing total frequency span. In some applications it makes sense to distinguish a certain substructure of the network (called the *backbone*), designed as the most important part for the communication, so it has to meet additional restrictions on the assignment. This leads us to the backbone coloring problem, introduced by Broersma in. First, let us define formally the backbone coloring, using a standard graph notation, e.g. from: Note that it differs from the vertex coloring problem in important ways: in an optimal \(\lambda\)-backbone coloring (i.e. using a minimum number of colors) the ordering of the colors matters, therefore we might observe that some smaller colors are not used while the larger ones are in use. Broersma et. al. in also defined the backbone coloring problem as an extension of a classical vertex coloring problem: The *\(\lambda\)-backbone coloring number* for a graph \(G\) with backbone \(H\) (denoted as \(BBC_\lambda(G, H)\)) is then defined as the smallest \(k\) such that there exists a \(\lambda\)-backbone coloring of \(G\) with backbone \(H\). Note that here and throughout the whole paper we rely on the notation \([a, b]\) representing a set of integers between \(a\) and \(b\), inclusive. In general, it is straightforward to prove that the problem of determining \(BBC_\lambda(G, H)\) is \(\mathcal{NP}\)-hard. In the same paper which introduced this problem there were shown basic bounds on the value of the \(\lambda\)-backbone coloring number, depending on \(\chi(G)\), the chromatic number of \(G\): In and there were proposed other bounds, suited particularly for graphs with \(\chi(H) \ll \chi(G)\): The \(\lambda\)-backbone coloring problem was studies for several classes of graphs, for example split graphs, planar graphs, complete graphs, and for several classes of backbones: matchings and disjoint stars, bipartite graphs and forests. For a special case \(\lambda = 2\) it was also studies for may other cases e.g. triangle-free graphs with tree backbones, outerplanar graphs with matching backbones and general graphs with bounded degree backbones or with tree and path backbones. In this paper, we turn our attention to the special case when the graph is complete (denoted \(K_n\)) and its backbone is a (nonempty) tree or a forest (which we will denote by \(T\) and \(F\), respectively). Note that it has a natural interpretation as a labeling problem: how to assign different labels to all vertices such that on every backbone edge the difference between labels is at least \(\lambda\). This description draws a comparison e.g. to \(L(k, 1)\)-labeling problem (see e.g. for a survey), where the colors of any two adjacent vertices have to differ by at least \(k\) and the colors of any two vertices within distance \(2\) have to be distinct. In our case it is obvious that \(\chi(K_n) = n\), \(\chi(F) = 2\) and the theorems presented above combined together give us the following bounds: \[\begin{aligned} \max\{n, \lambda + 1\} \le BBC_{\lambda}(K_n, F) \le \lambda + n-1. \end{aligned}\] Moreover, it was proved before in that there exists a \(2\)-approximate algorithm for complete graphs with bipartite backbones and a \(3/2\)-approximate algorithm for complete graphs with connected bipartite backbones. Both algorithms run in linear time. As a corollary, it was proved that we can compute \(BBC_\lambda(K_n, F)\) in quadratic time, provided that \(F\) is a tree on \(n\) vertices and \(\lambda > n-2\). On the other hand, for \(\lambda = 2\) we know that \(BBC_\lambda(K_n, F) \le n + 1\) and we can solve the problem in polynomial time. However, this leaves us with the large gap for the intermediate values of \(\lambda\), which we try to address in this paper. We start by proving that if \(F\) is a tree or forest on \(n\) vertices with a maximum degree \(\Delta(F)\), then \(BBC_{\lambda}(K_n, F) \le \max\{n, 2 \lambda\} + \Delta^2(F) \lceil\log{n}\rceil\). Note that this bound can be much better than the previously known ones, especially for \(\lambda\) close to \(\frac{n}{2}\) and small \(\Delta(F)\). We also provide a polynomial (linear for trees, quadratic for forests) algorithm to find the respective \(\lambda\)-backbone coloring. This, in turn, combined with another much simpler algorithm allows us to show that we can find in polynomial time a \(\lambda\)-backbone coloring for \(G\) with backbone forest \(F\) that uses at most \(\Delta^2(F) \lceil\log{n}\rceil\) colors more than the optimal algorithm. Previously it was known that \(BBC_{\lambda}(K_n, T) = \lambda + n-1\) when \(T\) is a star. However, one can ask a more general question: how large can \(BBC_{\lambda}(K_n, T)\) be when \(\Delta(T)\) is small. In we show that there exists a family of trees with \(\Delta(T) = 3\) such that \(BBC_\lambda(K_n, T) \ge \max\{n, 2 \lambda\} + \frac{1}{48} \log_\phi{n}-3\). This result is complementary to the one in the previous section, as it shows that sometimes we need up to \(\max\{n, 2 \lambda\} + \Theta(\log{n})\) colors even when we have \(\Delta(T) = 3\). In a sense, we might also say that the logarithmic loss over a trivial lower bound \(BBC_\lambda(K_n, T) \ge \max\{n, \lambda + 1\}\) for backbone coloring of \(K_n\) with a tree backbone \(T\) is tight. Finally, concludes with a presentation of some open problems related to our work. # Complete graph with tree or forest backbone: an algorithm {#sec:positive} In this section we will proceed as following: we first introduce so-called red-blue-yellow \((k,l)\)-decomposition of a forest \(F\) on \(n\) vertices, which finds a small set \(Y\) (of size \(l\)) such that we can split \(V(F) \setminus Y\) into two independent and almost equal sets \(R\), \(B\) (with \(|R|-|B| \le k\)). Then, we show that we can color \(R\) and \(B\) with sets of consecutive colors and assign to vertices from \(Y\) the smallest and the largest colors in a way that in total we find a \(\lambda\)-backbone coloring in which the maximum color does not exceed \(\max\{n, 2 \lambda\}\) more than \(\Delta^2(F) \log{n}\). We start with a few remarks on notation and some definitions. Let \(c\) be a unique \(2\)-coloring (up to the permutations of colors) of a tree \(T\). Let us also define \(C_i(T) = \{v \in V(T)\colon c(v) = i\}\), i.e. the number of vertices in color \(i\), for \(i = 1, 2\). Assume without loss of generality that \(c\) is such that \(C_i(T)\) form a non-increasing sequence. Throughout the paper we will use a concept of tree imbalance, defined formally as: From this definition it directly follows that \(imb(T) \ge 0\). From this definition it follows that if \((R, B, Y)\) is a *red-blue-yellow* \((k, l)\)-decomposition, then \((B, R, Y)\) is a *red-blue-yellow* \((-k, l)\)-decomposition. In order to formulate our results for the \(\lambda\)-backbone coloring problem, we need a simple lemma, which enables us to color a clique with a forest backbone with a given set of colors: Interestingly, the lemma above can be applied to the \(\lambda\)-backbone coloring problem directly. Note that here we can extend the notation \(C_1\), \(C_2\) used before for trees--only this time we admit that it is relative to a \(2\)-coloring \(c\), which in case of forests may not be unique: More surprisingly, we can couple with a red-blue-yellow decomposition to obtain slightly different bound: To achieve the same result for forest backbones we only need to add some edges that would make the backbone connected and spanning. However, it is clear that we can always attach them to the leaves of the trees in the forest and we will not increase the maximum degree of the forest. # Complete graph with tree or forest backbone: a lower bound {#sec:negative} In this section we prove that there exists a family of trees with the maximum degree \(3\) for which \(BBC_\lambda(K_n, T) \ge \max\{n, 2 \lambda\} + \Theta(\log{n})\) in four steps. First, we will define the family of trees with parameters directly related to the Fibonacci numbers. Next, we will show that the existence of a red-blue-yellow \((k, l)\)-decomposition for such trees implies the existence of another red-blue-yellow \((k', l)\)-decomposition with an additional property. Then, we will prove that any such decomposition would imply further that there holds a certain decomposition of some large number (i.e. half of the large Fibonacci number) into a sum and a difference of a small number of Fibonacci numbers. Finally, we will establish that such decomposition cannot exist--therefore there is no red-blue-yellow \((k, l)\)-decomposition for our trees assuming that \(k\) and \(l\) are proportional to \(\log{n}\). We begin by tying our \((k, l)\)-red-blue-yellow decomposition to the backbone coloring problem: Now we define a family of *Fibonacci trees*, built recursively: We will ultimately show that this class contains infinitely many trees (starting from certain \(N_0\)), presented in , cannot be colored using less than \(\max\{n, 2\lambda\} + \frac{1}{48} \log_\phi{n}-3\) colors. We will additionally denote by \(T^F_N\) the \(N\)-th (unrooted) Fibonacci tree an unrooted version of the \(N\)-th rooted Fibonacci tree. In our analysis we will only be using rooted Fibonacci trees, but all the results apply also to the unrooted variant as we can recognize Fibonacci trees and find their roots in \(O(|V(T)|)\) time. Here we will also make use of \(C_1(T^F_N)\) and \(C_2(T^F_N)\) sets. Without a loss of generality from now on we always define these sets with respect to a \(2\)-coloring \(c\) of \(T^F_N\) such that the root of \(T^F_N\) has color \(1\). Observe that the set of vertices which are the roots of all Fibonacci subtrees is defined exactly by \(C_1(T^F_N)\). Using we can modify any \((k, l)\)-red-blue-yellow decomposition in such a way that \(Y \cap C_1(T^F_N) = \emptyset\): Now, we turn to the computation of the imbalances of red-blue parts of Fibonacci trees. In order to do that, we have to recall some theory of Fibonacci numbers. In particular, we recall the Zeckendorf's theorem, which states that any number \(n \in \mathbb{N}\) can be written as \(n = \sum_j z_j F_j\) for \(z_j \in \{0, 1\}\) such that 1. no two consecutive \(z_j\) are equal to \(1\), i.e. \(z_j z_{j + 1} = 0\) for all \(j\), 2. this representation is unique and it is the shortest decomposition with respect to \(\sum_j |z_j|\), 3. it can be constructed by greedy subtraction the largest possible Fibonacci numbers from \(n\) until we reach \(0\). We call a vector \(z = (z_j)_{j = 1}^\infty\) such that \((A)\)--and thus also \((B)\) and \((C)\)--holds the *Zeckendorf representation* of \(n\) and denote by \(Z(n)\). We will sometimes without loss of generality trim \(Z(n)\) to a finite number of positions since \(F_i > n\) implies trivially \(z_i = 0\). For example, \(Z(F_N) = (0, \ldots, 0, 1)\), i.e. it has a single one on \(N\)-th position and \(Z\left(\frac{F_N}{2}\right) = (\ldots, 1, 0, 0, 1, 0, 0)\), i.e. it has ones only on every third position ending at \(N-2\) as it is true that \(\frac{F_N}{2} = F_{N-2} + \frac{F_{N-3}}{2}\). Now we may proceed to the lemma which ties tree decompositions and Fibonacci numbers: Finally, we can proceed to the main theorem of this section, which shows the existence of the trees with constant degrees such that \(BBC_\lambda(K_n, T) = \max\{n, 2\lambda\} + \Omega(\log{n})\): In fact, the theorem above can be proven in a more complicated, but also more general form, i.e. that \(BBC_\lambda(K_n, T_N^F) > 2 \lambda + \frac{1}{48} \log_\phi{n}-2\) for all \(\lambda \in \left[\frac{n}{2}-\frac{1}{96} \log_\phi{n}, \frac{n}{2}\right]\)--which gives us also an additive factor over \(\max\{n, 2\lambda\}\). # Conclusion {#sec:open} In this paper, we presented a new bound on \(BBC_\lambda(K_n, F) = \max\{n, 2 \lambda\} + \Delta^2(F)\lceil\log{n}\rceil\) for forests \(F\) on \(n\) vertices. This is the first known upper bound dependent on the maximum degree of \(F\), better than the existing ones when this parameter is small, e.g. constant. We also showed that the same reasoning allows us to construct a linear algorithm for finding an \(\lambda\)-backbone coloring of \(K_n\) with backbone \(F\) within an additive error of \(\Delta^2(F)\lceil\log{n}\rceil\) from the optimum. Finally, we proved that the bound is asymptotically tight, i.e. there exist a family of trees with \(\Delta(T) = 3\) such that \(BBC_\lambda(K_n, F) = \max\{n, 2 \lambda\} + \Theta(\log{n})\). However, there remain a couple of open problems that stem from our research. First, we can ask if the algorithm from can be improved, i.e. does there exist an algorithm running in polynomial time which gives us a coloring using \(BBC_\lambda(K_n, F) + o(\log{n})\) colors, or even the optimal one for certain values of \(\Delta(F)\). Or maybe it is the case that finding a \(\lambda\)-backbone coloring such that \(BBC_\lambda(K_n, F) + f(n, \Delta(F))\) for some function \(f\) is \(\mathcal{NP}\)-hard. Second, there arises a natural question of how to extend our result to other classes of graphs. An obvious extension would be an analysis for a class of split graphs, i.e. graphs that their vertices can be partitioned into a maximum clique \(C\) (of size \(\omega(G) = \chi(G)\)) and an independent set \(I\). A simple application of gives us that \[\begin{aligned} BBC_\lambda(G, F) & \le \lambda + BBC_\lambda(G[C], F[C]) \\ & \le \lambda + \max\{\chi(G), 2 \lambda\} + \Delta^2(F) \lceil\log{\chi(G)}\rceil, \end{aligned}\] as we can first solve the problem restricted to \(C\), find a \(\lambda\)-backbone coloring using colors from the set \([1, \max\{\chi(G), 2 \lambda\} + \Delta^2(F) \lceil\log{\chi(G)}\rceil]\), and then color all vertices in \(I\) with a color \(\lambda + \max\{\chi(G), 2 \lambda\} + \Delta^2(F) \lceil\log{\chi(G)} \rceil\). However, it was proved before that Although our bound is more general, as it applies to all backbones \(H\) as long as \(H[C]\) is a forest, a simple comparison of both bounds show that for trees (and forests) our bound is worse in all cases, even for small \(\lambda\) and large \(\chi(G)\). This is mainly because we assign a single color to \(I\) naively instead of trying to optimize it. Still, we can pose a question: is there a way to amend our approach to make it suitable also for split graphs and improve the existing bound at least for some subset of graphs?
{'timestamp': '2021-07-14T02:06:26', 'yymm': '2107', 'arxiv_id': '2107.05772', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05772'}
# Introduction {#sec:intro} How many parameters are needed to train a neural network to a specified accuracy? Recent work on two fronts indicates that the answer for a given architecture and dataset pair is often much smaller than the total number of parameters used in modern large-scale neural networks. The first is successfully identifying lottery tickets or sparse trainable subnetworks through iterative training and pruning cycles. Such methods utilize information from training to identify lower-dimensional parameter spaces which can optimize to a similar accuracy as the full model. The second is the observation that constrained training within a random, low-dimension affine subspace, is often successful at reaching a high desired train and test accuracy on a variety of tasks, provided that the training dimension of the subspace is above an empirically-observed threshold training dimension. These results, however, leave open the question of why low-dimensional training is so successful and whether we can theoretically explain the existence of a threshold training dimension. In this work, we provide such an explanation in terms of the high-dimensional geometry of the loss landscape, the initialization, and the desired loss. In particular, we leverage a powerful tool from high-dimensional probability theory, namely Gordon's escape theorem, to show that this threshold training dimension is equal to the dimension of the full parameter space minus the squared Gaussian width of the desired loss sublevel set projected onto the unit sphere around initialization. This theory can then be applied in several ways to enhance our understanding of neural network loss landscapes. For a quadratic well or second-order approximation around a local minimum, we derive an analytic bound on this threshold training dimension in terms of the Hessian spectrum and the distance of the initialization from the minimum. For general models, this relationship can be used in reverse to measure important high dimensional properties of loss landscape geometry. For example, by performing a tomographic exploration of the loss landscape, i.e. training within random subspaces of varying training dimension, we uncover a phase transition in the success probability of hitting a given loss sub-level set. The threshold-training dimension is then the phase boundary in this transition, and our theory explains the dependence of the phase boundary on the desired loss sub-level set and the initialization, in terms of the Gaussian width of the loss sub-level set projected onto a sphere surrounding the initialization. Motivated by lottery tickets, we furthermore consider training not only within random dimensions, but also within optimized subspaces using information from training in the full space. Lottery tickets can be viewed as constructing an optimized, axis-aligned subspace, i.e. where each subspace dimension corresponds to a single parameter. What would constitute an optimized choice for general subspaces? We propose two new methods: burn-in subspaces which optimize the offset of the subspace by taking a few steps along a training trajectory and lottery subspaces determined by the span of gradients along a full training trajectory (Fig. [\[fig:cartoon_cuts\]](#fig:cartoon_cuts){reference-type="ref" reference="fig:cartoon_cuts"}). Burn-in subspaces in particular can be viewed as lowering the threshold training dimension by moving closer to the desired loss sublevel set. For all three methods, we empirically explore the threshold training dimension across a range of datasets and architectures. **Related Work:** An important motivation of our work is the observation that training within a random, low-dimensional affine subspace can suffice to reach high training and test accuracies on a variety of tasks, provided the training dimension exceeds a threshold that was called the *intrinsic dimension* and which we call the threshold training dimension. However provided no theoretical explanation for this threshold and did not explore the dependence of this threshold on the quality of the initialization. Our primary goal is to provide a theoretical explanation for the existence of this threshold in terms of the geometry of the loss landscape and the quality of initialization. Indeed understanding the geometry of high dimensional error landscapes has been a subject of intense interest in deep learning, see e.g., or for a review. But to our knowledge, the Gaussian width of sub-level sets projected onto a sphere surrounding initialization, a key quantity that determines the threshold training dimension, has not been extensively explored in deep learning. Another motivation for our work is contextualizing the efficacy of diverse more sophisticated network pruning methods like lottery tickets. Further work in this area revealed the advantages obtained by pruning networks not at initialization but slightly later in training, highlighting the importance of early stages of training. We find empirically, as well as explain theoretically, that even when training within random subspaces, one can obtain higher accuracies for a given training dimension if one starts from a slightly pre-trained, or burned-in initialization as opposed to a random initialization. # An empirically observed phase transition in training success {#sec:methods} We begin with the empirical observation of a phase transition in the probability of hitting a loss sub-level set when training within a random subspace of a given training dimension, starting from some initialization. Before presenting this phase transition, we first define loss sublevel sets and two different methods for training within a random subspace that differ only in the quality of the initialization. In the next section we develop theory for the nature of this phase transition. #### Loss sublevel sets. Let \(\hat{\V{y}} = f_{\V{w}}(\V{x})\) be a neural network with weights \(\V{w} \in \mathbb{R}^D\) and inputs \(\V{x} \in \mathbb{R}^k\). For a given training set \(\{\V{x}_n, \V{y}_n\}_{n=1}^N\) and loss function \(\ell\), the empirical loss landscape is given by \(\mathcal{L}(\V{w}) = \frac{1}{N} \sum_{n = 1}^N \ell \Big (f_{\V{w}}(\V{x}_n), \V{y}_n \Big).\) Though our theory is general, we focus on classification for our experiments, where \(\V{y} \in \{0,1\}^C\) is a one-hot encoding of \(C\) class labels, \(\hat{\V{y}}\) is a vector of class probabilities, and \(\ell (\hat{\V{y}}, \V{y})\) is the cross-entropy loss. In general, the loss sublevel set \(S(\epsilon)\) at a desired value of loss \(\epsilon\) is the set of all points for which the loss is less than or equal to \(\epsilon\): \[\label{eq:sublevel} S(\epsilon) := \{\V{w} \in \mathbb{R}^D: \mathcal{L}(\V{w}) \leq \epsilon \}.\] #### Random affine subspace. Consider a \(d\) dimensional random affine hyperplane contained in \(D\) dimensional weight space, parameterized by \(\V{\theta} \in \mathbb{R}^d\): \(\V{w}(\V{\theta}) = \Mx{A} \V{\theta} + \V{w}_0.\) Here \(\Mx{A} \in \mathbb{R}^{D \times d}\) is a random Gaussian matrix with columns normalized to \(1\) and \(\V{w}_0 \in \mathbb{R}^D\) a random weight initialization by standard methods. To train within this subspace, we initialize \(\V{\theta} = \V{0}\), which corresponds to randomly initializing the network at \(\V{w}_0\), and we minimize \(\mathcal{L}\big (\V{w}(\V{\theta}) \big)\) with respect to \(\V{\theta}\). #### Burn-in affine subspace. Alternatively, we can initialize the network with parameters \(\V{w}_0\) and train the network in the full space for some number of iterations \(t\), arriving at the parameters \(\V{w}_{\mathrm{t}}\). We can then construct the random burn-in subspace \[\label{eq:burnin} \V{w}(\V{\theta}) = \Mx{A} \V{\theta} + \V{w}_{\mathrm{t}},\] with \(\Mx{A}\) chosen randomly as before, and then subsequently train within this subspace by minimizing \(\mathcal{L} \big (\V{w}(\V{\theta}) \big)\) with respect to \(\V{\theta}\). The random affine subspace is identical to the burn-in affine subspace but with \(t=0\). Exploring the properties of training within burn-in as opposed to random affine subspaces enables us to explore the impact of the quality of the initialization, after burning in some information from the training data, on the success of subsequent restricted training. #### Success probability in hitting a sub-level set. In either training method, achieving \(\mathcal{L}\left (\V{w}(\V{\theta}) \right) = \epsilon\) implies that the intersection between our random or burn-in affine subspace and the loss sub-level set \(S(\epsilon')\) is non-empty for all \(\epsilon' \geq \epsilon\). As both the subspace \(\Mx{A}\) and the initialization \(\V{w}_0\) leading to \(\V{w}_{\mathrm{t}}\) are random, we are interested in the success probability \(P_s(d,\epsilon,t)\) that a burn-in (or random when \(t=0\)) subspace of training dimension \(d\) actually intersects a loss sub-level set \(S(\epsilon)\): \[P_s(d,\epsilon,t) \equiv \mathbb{P} \Big [ S(\epsilon) \cap \big \{ \V{w}_t + \Span(\Mx{A}) \big \} \neq \emptyset \Big ]. \label{eq:ps}\] Here, \(\Span(\Mx{A})\) denotes the column space of \(\Mx{A}\). Note in practice we cannot guarantee that we obtain the minimal loss in the subspace, so we use the best value achieved by `Adam` as an approximation. Thus the probability of achieving a given loss sublevel set via training constitutes an approximate lower bound on the probability in [\[eq:ps\]](#eq:ps){reference-type="eqref" reference="eq:ps"} that the subspace actually intersects the loss sublevel set. #### Threshold training dimension as a phase transition boundary. We will find that for any fixed \(t\), the success probability \(P_s(d,\epsilon,t)\) in the \(\epsilon\) by \(d\) plane undergoes a sharp phase transition. In particular for a desired (not too low) loss \(\epsilon\) it transitions sharply from \(0\) to \(1\) as the training dimension \(d\) increases. To capture this transition we define: For any chosen criterion \(\delta\) (and fixed \(t\)) we will see that the curve \(d^*(\epsilon, t, \delta)\) forms a phase boundary in the \(\epsilon\) by \(d\) plane separating two phases of high and low success probability. This definition also gives an operational procedure to approximately measure the threshold training dimension: run either the random or burn-in affine subspace method repeatedly over a range of training dimensions \(d\) and record the lowest loss value \(\epsilon\) found in the plane when optimizing via \(\texttt{Adam}\). We can then construct the empirical probability across runs of hitting a given sublevel set \(S(\epsilon)\) and the threshold training dimension is lowest value of \(d\) for which this probability crosses \(1-\delta\) (where we employ \(\delta=0.1\)). ## An empirical demonstration of a training phase transition {#sec:exp} In this section, we carry out this operational procedure, comparing random and burn-in affine subspaces across a range of datasets and architectures. We examined \(3\) architectures: 1) `Conv-2` which is a simple 2-layer CNN with 16 and 32 channels, ReLU activations and `maxpool` after each convolution followed by a fully connected layer; 2) `Conv-3` which is a 3-layer CNN with 32, 64, and 64 channels but otherwise identical setup to `Conv-2`; and 3) `ResNet20v1` as described in with on-the-fly batch normalization. We perform experiments on 5 datasets: MNIST, Fashion MNIST, CIFAR-10 and CIFAR-100, and SVHN. Baselines and experiments were run for the same number of epochs for each model and dataset combination; further details on architectures, hyperparameters, and training procedures are provided in the appendix. The code for the experiments was implemented in JAX. shows results on the training loss for 4 datasets for both random and burn-in affine subspaces with a `Conv-2`. We obtain similar results for the two other architectures (see Appendix). exhibits several broad and important trends. First, for each training method within a random subspace, there is indeed a sharp phase transition in the success probability \(P_s(d,\epsilon,t)\) in the \(\epsilon\) (or equivalently accuracy) by \(d\) plane from \(0\) (white regions) to \(1\) (black regions). Second, the threshold training dimension \(d^*(\epsilon, t, \delta)\) (with \(\delta=0.1\)) does indeed track the tight phase boundary separating these two regimes. Third, broadly for each method, to achieve a lower loss, or equivalently higher accuracy, the threshold training dimension is higher; thus one needs more training dimensions to achieve better performance. Fourth, when comparing the threshold training dimension across all \(4\) methods on the same dataset (final column of ) we see that at high accuracy (low loss \(\epsilon\)), *increasing* the amount of burn in *lowers* the threshold training dimension. To see this, pick a high accuracy for each dataset, and follow the horizontal line of constant accuracy from left to right to find the threshold training dimension for that accuracy. The first method encountered with the lowest threshold training dimension is burn-in with \(t=16\). Then burn-in with \(t=8\) has a higher threshold training dimension and so on, with random affine having the highest. Thus the main trend is, for some range of desired accuracies, burning *more* information into the initialization by training on the training data *reduces* the number of subsequent training dimensions required to achieve the desired accuracy. shows the threshold training dimension for each accuracy level for all three models on MNIST, Fashion MNIST and CIFAR-10, not only for training accuracy, but also for test accuracy. The broad trends discussed above hold robustly for both train and test accuracy for all 3 models. # A theory of the phase transition in training success {#sec:theory} Here we aim to give a theoretical explanation for the major trends observed empirically above, namely: (1) there exists a phase transition in the success probability \(P_s(d,\epsilon,t)\) yielding a phase boundary given by a threshold training dimension \(d^*(\epsilon, t, \delta)\); (2) at fixed \(t\) and \(\delta\) this threshold increases as the desired loss \(\epsilon\) decreases (or desired accuracy increases), indicating more dimensions are required to perform better; (3) at fixed \(\epsilon\) and \(\delta\), this threshold decreases as the burn-in time \(t\) increases, indicating *fewer* training dimensions are required to achieve a given performance starting from a *better* burned-in initialization. Our theory will build upon several aspects of high dimensional geometry which we first review. In particular we discuss, in turn, the notion of the Gaussian width of a set, then Gordon's escape theorem, and then introduce a notion of local angular dimension of a set about a point. Our final result, stated informally, will be that the threshold training dimension plus the local angular dimension of a desired loss sub-level set about the initialization must equal the total number of parameters \(D\). As we will see, this succinct statement will conceptually explain the major trends observed empirically. First we start with the definition of Gaussian width: As a simple example, let \(S\) be a solid \(l_2\) ball of radius \(r\) and dimension \(d \ll D\) embedded in \(\mathbb{R}^D\). Then its Gaussian width for large \(D\) is well approximated by \(w(S) = r\sqrt{d}\). #### Gordon's escape theorem. The Gaussian width \(w(S)\) of a set \(S\), at least when that set is contained in a unit sphere around the origin, in turn characterizes the probability that a random subspace intersects that set, through Gordon's escape theorem: A clear explanation of the proof can be found in. Thus, the bound says when \(k > w^2(S)\), the probability of no intersection quickly goes to \(1-\epsilon\) for any \(\epsilon > 0\). Matching lower bounds which state that the intersection occurs with high probability when \(k \leq w(S)^2\) have been proven for spherically convex sets. Thus, this threshold is sharp except for the subtlety that you are only guaranteed to hit the spherical convex hull of the set (defined on the sphere) with high probability. When expressed in terms of the subspace dimension \(d=D-k\), rather than its co-dimension \(k\), these results indicate that a \(d\) dimensional subspace will intersect a closed subset \(S\) of the unit sphere around the origin with high probability if and only if \(d + w(S)^2 \geq D\), with a sharp transition at the threshold \(d^* = D-w(S)^2\). This is a generalization of the result that two random subspaces in \(\mathbb{R}^D\) of dimension \(d\) and \(d_2\) intersect with high probability if and only if \(d + d_2 > D\). Thus we can think of \(w(S)^2\) as playing a role analogous to dimension for sets on the centered unit sphere. ## Intersections of random subspaces with general subsets To explain the training phase transition, we must now adapt Gordon's escape theorem to a general loss sublevel set \(S\) in \(\mathbb{R}^D\), and we must take into account that the initialization \(\V{w}_\mathrm{t}\) is not at the origin in weight space. To do so, we first define the projection of a set \(S\) onto a unit sphere centered at \(\V{w}_\mathrm{t}\): \[\mathrm{proj}_{\V{w}_t}(S) \equiv \{(\V{x}-\V{w}_\mathrm{t}) / ||\V{x}-\V{w}_\mathrm{t}||_2: \V{x} \, \in \, S\}.\] Then we note that any affine subspace \(Y\) of the form in [\[eq:burnin\]](#eq:burnin){reference-type="ref" reference="eq:burnin"} centered at \(\V{w}_\mathrm{t}\) intersects \(S\) if and only if it intersects \(\mathrm{proj}_{\V{w}_t}(S)\). Thus we can apply Gordon's escape theorem to \(\mathrm{proj}_{\V{w}_t}(S)\) to compute the probability of the training subspace in [\[eq:burnin\]](#eq:burnin){reference-type="ref" reference="eq:burnin"} intersecting a sublevel set \(S\). Since the squared Gaussian width of a set in a unit sphere plays a role analogous to dimension, we define: An escape theorem for general sets \(S\) and affine subspaces now depends on the initialization \(\V{w}_\mathrm{t}\) also, and follows from the above considerations and Gordon's original escape theorem: To summarise this result in the context of our application, given an arbitrary loss sub-level set \(S(\epsilon)\), a training subspace of training dimension \(d\) starting from an initialization \(\V{w}_\mathrm{t}\) will hit the (convex hull) of the loss sublevel set with high probability when \(d + d_\mathrm{local}(S(\epsilon), \V{w}_t) > D\), and will miss it (i.e have empty intersection) with high probability when \(d + d_\mathrm{local}(S(\epsilon), \V{w}_t) < D\). This analysis thus establishes the existence of a phase transition in the success probability \(P_s(d,\epsilon,t)\) in [\[eq:ps\]](#eq:ps){reference-type="ref" reference="eq:ps"}, and moreover establishes the threshold training dimension \(d^*(\epsilon, t, \delta)\) for small values of \(\delta\) in [\[def:effDim\]](#def:effDim){reference-type="ref" reference="def:effDim"}: \[d^*(S(\epsilon), \V{w}_t) = D-d_\mathrm{local}(S(\epsilon), \V{w}_t).\] Our theory provides several important insights on the nature of threshold training dimension. Firstly, small threshold training dimensions can only arise if the local angular dimension of the loss sublevel set \(S(\epsilon)\) about the initialization \(\V{w}_\mathrm{t}\) is close to the ambient dimension. Second, as \(\epsilon\) increases, \(S(\epsilon)\) becomes larger, with a larger \(d_\mathrm{local}(S(\epsilon), \V{w}_t)\), and consequently a smaller threshold training dimension. Similarly, if \(\V{w}_\mathrm{t}\) is closer to \(S(\epsilon)\), then \(d_\mathrm{local}(S(\epsilon), \V{w}_t)\) will be larger, and the threshold training dimension will also be lower (see [\[fig:cartoon_sphere_projection\]](#fig:cartoon_sphere_projection){reference-type="ref" reference="fig:cartoon_sphere_projection"}). This observation accounts for the observed decrease in threshold training dimension with increased burn-in time \(t\). Presumably, burning in information into the initialization \(\V{w}_\mathrm{t}\) for a longer time \(t\) brings the initialization closer to the sublevel set \(S(\epsilon)\), making it easier to hit with a random subspace of lower dimension. This effect is akin to staring out into the night sky in a single random direction and asking with what probability we will see the moon; this probability increases the closer we are to the moon. ## A paradigmatic loss landscape example: the quadratic well {#sec:quadratic} To illustrate our theory, we work out the paradigmatic example of a quadratic loss function \(\mathcal{L}(\V{w}) = \frac{1}{2} \V{w}^T \Mx{H} \V{w}\) where \(\V{w} \in \mathbb{R}^d\) and \(\Mx{H} \in \mathbb{R}^{D \times D}\) is a symmetric, positive definite Hessian matrix. A sublevel set \(S(\epsilon)\) of the quadratic well is an ellipsoidal body with principal axes along the eigenvectors \(\hat{\V{e}}_i\) of \(\Mx{H}\). The radius \(r_i\) along principal axis \(\hat{\V{e}}_i\) obeys \(\frac{1}{2} \lambda_i r_i^2 = \epsilon\) where \(\lambda_i\) is the eigenvalue. Thus \(r_i = \sqrt{2 \epsilon/\lambda_i}\), and so a large (small) Hessian eigenvalue leads to a narrow (wide) radius along each principal axis of the ellipsoid. The overall squared Gaussian width of the sublevel set obeys \(w^2(S(\epsilon)) \sim 2 \epsilon \Tr(\Mx{H}^{-1}) = \sum_i r_i^2\), where \(\sim\) denotes bounded above and below by this expression times positive constants. We next consider training within a random subspace of dimension \(d\) starting from some initialization \(\V{w}_0\). To compute the probability the subspace hits the sublevel set \(S(\epsilon)\), as illustrated in Fig. [\[fig:cartoon_sphere_projection\]](#fig:cartoon_sphere_projection){reference-type="ref" reference="fig:cartoon_sphere_projection"}, we must project this ellipsoidal sublevel set onto the surface of the unit sphere centered at \(\V{w}_0\). The Gaussian width of this projection \(\mathrm{proj}_{\V{w}_0}(S(\epsilon))\) depends on the distance \(R \equiv ||\V{w}_0||\) from the initialization to the global minimum at \(\V{w}=\V{0}\) (i.e. it should increase with decreasing \(R\)). We can develop a crude approximation to this width as follows. Assuming \(D \gg 1\), the direction \(\hat{\V{e}}_i\) will be approximately orthogonal to \(\V{w}_0\), so that \(| \hat{\V{e}}_i \cdot \V{x}_0 | \ll R\). The distance between the tip of the ellipsoid at radius \(r_i\) along principal axis \(\V{e}_i\) and the initialization \(\V{w}_0\) is therefore \(\rho_i = \sqrt{R^2 + r_i^2}\). The ellipse's radius \(r_i\) then gets scaled down to approximately \(r_i / \sqrt{R^2 + r_i^2}\) when projected onto the surface of the unit sphere. Note the subtlety in this derivation is that the point actually projected onto the sphere is where a line through the center of the sphere lies tangent to the ellipse rather than the point of fullest extent. As a result, \(r_i / \sqrt{R^2 + r_i^2}\) provides a lower bound to the projected extent on the circle. This is formalized in the appendix along with an explanation as to why this bound becomes looser with decreasing \(R\). Taken together, a lower bound on the local angular dimension of \(S(\epsilon)\) about \(\V{w}_0\) is: \[d_{\mathrm{local}}(\epsilon,R) = w^2\big(\proj_{\V{w}_0}(S(\epsilon))\big) \gtrsim \sum_i \frac{r_i^2}{R^2 + r_i^2} \,, \label{eq:quadratic_analytics}\] where again \(r_i = \sqrt{2 \epsilon/\lambda_i}\). In Fig. [\[fig:toy_model_quadratic_well\]](#fig:toy_model_quadratic_well){reference-type="ref" reference="fig:toy_model_quadratic_well"}, we plot the corresponding upper bound on the threshold training dimension, i.e. \(D-d_{\mathrm{local}}(\epsilon,R)\) alongside simulated results for two different Hessian spectra. # Characterizing and comparing the space of pruning methods {#sec:lottery} Training within random subspaces is primarily a scientific tool to explore loss landscapes. It further has the advantage that we can explain theoretically why the number of degrees of freedom required to train can be far fewer than the number of parameters, as described above. However, there are many other pruning methods of interest. For example, the top row of focuses on pruning to axis aligned subspaces, starting from random weight pruning, to lottery tickets which use information from training to prune weights, and/or choose the initialization if not rewound to init. As one moves from left to right, one achieves better pruning (fewer degrees of freedom for a given accuracy). Our analysis can be viewed as relaxing the axis-aligned constraint to pruning to general subspaces (second row of ), either not using training at all (random affine subspaces), or using information from training to only to choose the init (burn in affine subspaces). This analogy naturally leads to the notion of lottery subspaces described below (an analog of lottery tickets with axis-alignment relaxed to general subspaces) either rewound to init or not (last two entries of ). We compare the methods we have theoretically analyzed (random and burn-in affine subspaces) to popular methods like lottery tickets rewound to init, and our new method of lottery subspaces, in an effort understand the differential efficacy of various choices like axis-alignment, initialization, and the use of full training information to prune. A full investigation of [\[tab:Methods\]](#tab:Methods){reference-type="ref" reference="tab:Methods"} however is the subject of future work. #### Lottery subspaces. We first train the network in the full space starting from an initialization \(\V{w}_0\). We then form the matrix \(\Mx{U}_d \in \mathbb{R}^{D \times d}\) whose \(d\) columns are the top \(d\) principal components of entire the training trajectory \(\V{w}_{0:T}\) (see Appendix for details). We then train within the subspace \(\V{w}(\V{\theta}) = \Mx{U}_d \V{\theta} + \V{w}_t\) starting from a rewound initialization \(\V{w}_t\) (\(t=0\) is rewinding to the original init). Since the subspace is optimized to match the top \(d\) dimensions of the training trajectory, we expect lottery subspaces to achieve much higher accuracies for a given training dimension than random or potentially even burn-in affine subspaces. This expectation is indeed borne out in Fig. [\[fig:MainExperiment\]](#fig:MainExperiment){reference-type="ref" reference="fig:MainExperiment"} (purple lines above all other lines). Intriguingly, *very* few lottery subspace training dimensions (in the range of \(20\) to \(60\) depending on the dataset and architecture) are required to attain full accuracy, and thus lottery subspaces can set a (potentially optimistic) target for what accuracies might be attainable by practical network pruning methods as a function of training dimension. #### Empirical comparison of pruning methods. presents empirical results comparing a subset of the methods in [\[tab:Methods\]](#tab:Methods){reference-type="ref" reference="tab:Methods"}: random affine subspaces, burn-in affine subspaces, lottery subspaces, and lottery tickets plotted against model compression ratio (defined as parameters in full model over parameters, or training dimension, in restricted model). The lottery tickets were constructed by training for 2 epochs, performing magnitude pruning of weights and biases, rewinding to initialization, and then training for the same number of epochs as the other methods. Note that lottery tickets are created by pruning the full model (increasing compression ratio) in contrast to all other methods which are built up from a single dimension (decreasing compression ratio). We observe lottery subspaces significantly outperform random subspaces and lottery tickets at low training dimensions (high compression ratios), and we explore the spectrum of these spaces in more detail in the Appendix. The comparison to lottery tickets at low compression ratios is limited by the fact that it is computationally expensive to project to higher dimensional subspaces and thus the highest training dimension we used was \(4096\). In the regions where the experiments overlap, the lottery tickets do not outperform random affine subspaces, indicating that they are not gaining an advantage from the training information they utilize. A notable exception is `Conv-2` on CIFAR-10 in which the lottery tickets do outperform random affine subspaces. Finally, we note lottery tickets do not perform well at high compression ratios due to the phenomenon of layer collapse, where an entire layer gets pruned. # Conclusion {#sec:conclusion} The surprising ability of pruning methods like lottery tickets to achieve high accuracy with very few well chosen parameters, and even higher accuracy if not rewound to init, but to a later point in training, has garnered great interest in deep learning, but has been hard to analyze. In this paper we focused on gaining theoretical insight into when and why training within a random subspace starting at different inits (or burn-ins) along a full training trajectory can achieve a given low loss \(\epsilon\). We find that this can occur only when the local angular dimension of the loss sublevel set \(S(\epsilon)\) about the init is high, or close to the ambient dimension \(D\). Our theory also explains geometrically why longer burn-in lowers the the number of degrees of freedom required to train to a given accuracy. This is analogous to how rewinding to a later point in training reduces the size of lottery tickets, and indeed may share a similar mechanism. Overall, these theoretical insights and comparisons begin to provide a high dimensional geometric framework to understand and assess the efficacy of a wide range of network pruning methods at or beyond initialization.
{'timestamp': '2022-02-04T02:10:29', 'yymm': '2107', 'arxiv_id': '2107.05802', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05802'}
# Introduction {#sec:introduction} It is conventional in MIR[^1] to *pre-train* models on large labeled datasets for one or more tasks (commonly tagging), and reuse the learned representations for different *downstream* tasks . Such *transfer learning* approaches decrease the amount of labeled data needed to perform well on downstream tasks, which is particularly useful in MIR where labeled data for many important tasks is scarce . Historically-speaking, improvement on downstream tasks is enabled by finding ever-larger sources of labels for pre-training---in chronological order: tags , metadata , and recently, co-listening data . However, it stands to reason that directly modeling music *audio* (as opposed to labels) could yield richer representations. Recently, contrastive learning  has been proposed as an MIR pre-training strategy which learns representations from audio , but this paradigm has yet to exceed the performance of label-based pre-trained models on downstream tasks. Outside of the discriminative MIR landscape, a recent system called Jukebox  demonstrated promising performance for generating music audio. To achieve this result, Jukebox leverages recent architectural developments from natural language processing (NLP) by *codifying* audio---encoding high-rate continuous audio waveforms into lower-rate discrete sequences which can be fed in directly to NLP models. Specifically, Jukebox trains a Transformer  *language model*, an autoregressive generative model, on codified audio from \(1\)M songs. Purely for convenience, we refer to Jukebox's training procedure as *codified audio language modeling* (CALM). While Jukebox already demonstrates that CALM is useful for music *generation*, in this work we demonstrate that CALM is also useful as a pre-training procedure for *discriminative* MIR tasks. To this end, we repurpose Jukebox for MIR by first using it to extract audio feature representations, and then training shallow models (*probes* ) on downstream tasks using these features as input (). Relative to representations from models pre-trained with tagging, we find that representations from Jukebox are \(30\)% more effective on average when used to train probes on four downstream MIR tasks: tagging, genre classification, key detection, and emotion recognition. We also observe that representations from Jukebox are much more useful for key detection than those from models pre-trained on tagging, which suggests that CALM pre-training may be particularly beneficial for tasks which have little to do with tagging. This simple setup of training shallow models on representations from Jukebox is even competitive with purpose-built state-of-the-art methods on several tasks. To facilitate reproducibility and encourage further investigation of these representations and tasks , we release all of our code for this project, alongside images for Docker containers which provide full provenance for our experiments.[^2] We note that, while CALM pre-training at the scale of Jukebox requires substantial computational resources, our post hoc experiments with Jukebox only require a single commodity GPU with \(12\) GB memory. # CALM Pre-training CALM was first proposed by van den Oord et al. and used for unconditional speech generation . As input, CALM takes a collection of raw audio waveforms (and optionally, conditioning metadata), and learns a distribution \(p(\text{audio} \mid \text{metadata})\). To this end, CALM adopts a three-stage approach: (1) *codify* a high-rate continuous audio signal into lower-rate discrete codes, (2) train a *language model* on the resulting codified audio and optional metadata, i.e., learn \(p(\text{codified audio} \mid \text{metadata})\), and (3) decode sequences generated by the language model to raw audio.[^3] The original paper  also proposed a strategy for codifying audio called the vector-quantized variational auto-encoder (VQ-VAE), and the language model was a WaveNet . Within music, CALM was first used by Dieleman et al. for unconditional piano music generation , and subsequently, Dhariwal et al. used CALM to build a music generation system called Jukebox  with conditioning on genre, artist, and optionally, lyrics. Despite promising results on music audio generation, CALM has not yet been explored as a pre-training strategy for discriminative MIR. We suspect that effective music audio generation necessitates intermediate representations that would also contain useful information for MIR. This hypothesis is further motivated by an abundance of previous work in NLP suggesting that generative and self-supervised pre-training can yield powerful representations for discriminative tasks . To explore this potential, we repurpose Jukebox for MIR. While Jukebox was designed only for generation, its internal language model was trained on codified audio from a corpus of \(1.2\)M songs from many genres and artists, making its representations potentially suitable for a multitude of downstream MIR tasks. Jukebox consists of two components---the first is a small (\(2\)M parameters) VQ-VAE model  that learns to codify high-rate (44.1 kHz), continuous audio waveforms into lower-rate (\(\sim\)`<!-- -->`{=html}345 Hz), discrete code sequences with a vocabulary size of \(2048\) (\(11\) bits). The second component is a large (\(5\)B parameters) language model that learns to generate codified audio using a Transformer decoder---an architecture originally designed for modeling natural language . By training on codified audio (as in ) instead of raw audio (as in ), language models are (empirically) able to learn longer-term structure in music, while simultaneously using significantly less memory to model the same amount of audio. Like conventional MIR models which pre-train on tagging and/or metadata, Jukebox also makes use of genre and artist labels during training, providing them as conditioning information to allow for increased user control over the music generation process. Hence, while CALM in general is an unsupervised strategy that does not require labels, transfer learning from Jukebox specifically should *not* be considered an unsupervised approach (especially for downstream tasks like genre detection). However, by modeling the *audio* itself instead of modeling the *labels* (as in conventional MIR pre-training), we hypothesize that Jukebox learns richer representations for MIR tasks than conventional strategies. # Extracting suitable representations from Jukebox Here we describe how we extract audio representations from Jukebox which are suitable as input features for training shallow models. While several pre-trained Jukebox models exist with different sizes and conditioning information, here we use the \(5\)B-parameter model without lyrics conditioning (named "5b"), which is a sparse transformer  containing \(72\) layers. Each layer yields \(4800\)-dimensional activations for each element in the codified audio sequence, i.e., approximately \(345\) times per second. To extract representations from this model for a particular audio waveform, we (1) resample the waveform to \(44.1\)kHz, (2) normalize it, (3) codify it using the Jukebox VQ-VAE model, and (4) input the codified audio into the language model, interpreting its layer-wise activations as representations. Jukebox was trained on \({\sim}24\)-second audio clips (codified audio sequences of length \(8192\))---we feed in this same amount of audio at a time when extracting representations. In addition to the genre and artist conditioning fields mentioned previously, Jukebox expects two additional fields: total song length and clip offset---to ensure that representations only depend on the input audio, we simply pass in "unknown" for artist and genre, one minute for song length, and zero seconds for clip offset.[^4] The Jukebox language model yields an unwieldy amount of data---for every \(24\)-second audio clip, it emits \(24\times345\times72\times4800\) numbers, i.e., over \(10\)GB if stored naively as \(32\)-bit floating point. We reduce the amount of data by mean pooling across time, a common strategy in MIR transfer learning , which aggregates more than \(10\)GB of activations to around \(1\)MB (\(72\times4800\)). ## Layer selection {#sec:layersel} While pooling across time dramatically reduced the dimensionality of Jukebox's outputs, training shallow classifiers on \(72\times4800\) features is still computationally expensive. To further reduce the dimensionality, we use only one of the layers from Jukebox---the middle layer (\(36\))---yielding a total of \(4800\) features per \(24\) second audio clip. Unlike conventional pre-training, where the strongest representations for transfer learning typically lie at the end of the model , the strongest representations from pre-trained language models tend to lie towards the middle of the network . To confirm this observation in our context, we trained linear models using representations from different layers of Jukebox on our downstream MIR tasks---average performance indeed peaked at the middle layers (). In addition to using the middle layer, we experimented with two other layer selection strategies: (1) sub-sampling layers across the network, and (2) selecting relevant layers in a task-specific fashion.[^5] We found that the simplest strategy of using only the middle layer was equally effective and more computationally practical[^6] than the other two layer selection strategies. # Downstream task descriptions {#sec:tasks} We select four downstream MIR tasks to constitute a benchmark for comparing different audio feature representations: (1) tagging, (2) genre classification, (3) key detection, and (4) emotion recognition. A summary of the datasets used for each task appears in . These tasks were selected to cover a wide range of dataset sizes (\(744\) examples for emotion recognition vs. \(26\)k examples for tagging) and subjectivity (emotion recognition is more subjective vs. key detection is more objective). Additionally, each task has an easily-accessible dataset with standard evaluation criteria. We describe each of these tasks and metrics below. ## Tagging Tagging involves determining which tags from a fixed set of tags apply to a particular song. Categories of tags include genre (e.g., jazz), instrumentation (e.g., violin), emotions (e.g., happy), and characteristics (e.g., fast). There are two large datasets for tagging, which both contain human-annotated tags for \(30\)-second clips: MagnaTagATune  (MTT) which contains around \(26\)k clips, and a tagged subset of \(240\)k clips from the Million Song Dataset  (MSD). While both datasets contain a large vocabulary of tags, typical usage involves limiting the vocabulary to the \(50\) most common tags in each. Because it is the largest non-proprietary MIR dataset, MSD is commonly used for pre-training models for transfer learning. To mitigate an unfair advantage of methods which pre-train on MSD, we use MTT instead of MSD to benchmark representations on tagging performance. While both datasets are superficially similar (choosing from \(50\) tags for \(30\)-second clips), their label distributions are quite different: MSD is skewed towards genre tags, while MTT is skewed towards instrumentation tags. We use the standard (\(12\):\(1\):\(3\)) train, validation, and test split for MTT . Additionally, we report both common metrics (both are macro-averaged over tags as is conventional): area under the receiver operating characteristic curve (\(\text{MTT}_{\text{AUC}}\)), and average precision (\(\text{MTT}_{\text{AP}}\)).[^7] We note that inconsistencies in handling unlabeled examples for past work on MTT have been observed ---some work discards examples without top-\(50\) tags during training, evaluation, or both. In this work, we do not discard any examples. ## Genre classification Genre classification involves assigning the most appropriate genre from a fixed list for a given song. For this task, we report accuracy on the GTZAN dataset , which contains \(30\)-second clips from \(10\) distinct genres. We adopt the "fault-filtered" split from which addresses some of the reported issues with this dataset . We note that this task has a high degree of overlap with tagging, as tagging datasets typically have a number of genres within their tag vocabulary. In fact, seven of ten genres in GTZAN are present in the tag list of MSD. ## Key detection Key detection involves predicting both the scale and tonic pitch class for the underlying key of a song. We investigate the Giantsteps-MTG and Giantsteps datasets  which include songs in major and minor scales for all pitch classes, i.e., a \(24\)-way classification task. As in past work , we use the former for training and the latter for testing. Because no standard validation split exists for Giantsteps-MTG, we follow  and create an artist-stratified \(4\):\(1\) split for training and validation, which we include in our codebase for reproducibility. The music in this dataset is all electronic dance music, and the clips are two minutes in length. We report the typical weighted score metric for Giantsteps (GS): an accuracy measure which gives partial credit for reasonable mistakes such as predicting the relative minor key for the major ground truth . ## Emotion recognition {#sec:emomusic} Emotion recognition involves predicting human emotional response to a song. Data is collected by asking humans to report their emotional response on a two dimensional valence-arousal plane , where valence indicates positive versus negative emotional response, and arousal indicates emotional intensity. We use the Emomusic dataset , which contains \(744\) clips of \(45\) seconds in length. We investigate the static version of this task where original time-varying annotations are averaged together to constitute a clip-level annotation. Because this dataset does not have a standard split, it is difficult to directly compare with past work. To simplify comparison going forward, we created an artist-stratified split of Emomusic, which is released in our codebase. We take the highest reported numbers from past work to characterize "state-of-the-art" performance, though we note that these numbers are not directly comparable to our own due to differing splits. We report the coefficient of determination between the model predictions and human annotations for arousal (\(\text{Emo}_{\text{A}}\)) and valence (\(\text{Emo}_{\text{V}}\)). # Probing experiments Here we describe our protocol for probing for information about MIR tasks in representations from Jukebox and other pre-trained models, i.e., measuring performance of shallow models trained on these tasks using different representations as input features. We borrow the term "probing" from analogous investigations in NLP , however such methodology is common in transfer learning for MIR . ## Descriptions of representations In addition to probing representations from Jukebox (an exemplar of CALM pre-training), we probe four additional representations which are emblematic of three other MIR pre-training strategies (). Before pre-training, hand-crafted features were commonplace in MIR---as archetypal examples, we probe constant-Q chromagrams () and Mel-frequency cepstral coefficients (), extracted with librosa  using the default settings. As in , we concatenate the mean and standard deviation across time of both the features and their first-and second-order discrete differences. We also probe two examples of the current conventional paradigm which pre-trains on tagging using MSD: a convolutional model proposed by Choi et al.  (), and a more modern convolutional model from  (). Finally, we compare to a recently-proposed strategy for MIR pre-training called *contrastive learning of musical representations*  (), though we note that the only available pre-trained model from this work was trained on far less audio (a few thousand songs) than the other pre-trained models (, , and ). All of these strategies operate at different frame rates, i.e., they produce a different number of representation vectors for a fixed amount of input audio. To handle this, we follow common practice of mean pooling representations across time . While , , and produce a single canonical representation per frame, we note that the other three produce multiple representations per frame, i.e., the outputs of individual layers in each model. For , we concatenate all layer representations together, which was shown to have strong performance on all downstream tasks in . For , we concatenate together the mean and max pool of three-second windows (before mean pooling across these windows), i.e., the default configuration for that approach. For , we use the middle layer of the network as motivated in . By using a single layer, we also mitigate the potential of a superficial dimensionality advantage for , as this induces a dimensionality similar to that of (\(4800\) and \(4194\) respectively; see ). Unlike other representations which operate on short context windows, and were trained on long windows of \(29\) seconds and \(24\) seconds of audio respectively. Accordingly, for the three datasets with short clips (tagging, genre classification, and emotion recognition all have clips between \(30\) and \(45\) seconds in length), we adopt the policy from  and simply truncate the clips to the first window when computing representations for and . Because clips from the key detection dataset are much longer (two minutes), we split the clips into \(30\)-second windows for all methods and train probes on these shorter windows. At test time, we ensemble window-level predictions into clip-level predictions before computing the score. ## Probing protocol To probe representations for relevant information about downstream MIR tasks, we train shallow supervised models (linear models and one-layer MLPs) on each task using these representations as input features. As some representations may require different hyperparameter configurations for successful training, we run a grid search over the following hyperparameters (\(216\) total configurations) for each representation and task (\(24\) total grid searches), using early stopping based on task-specific metrics computed on the validation set of each task: - Feature standardization: {off, on} - Model: {Linear, one-layer MLP with \(512\) hidden units} - Batch size: {\(64\), \(256\)} - Learning rate: {\(1\mathrm{e}\)-\(5\), \(1\mathrm{e}\)-\(4\), \(1\mathrm{e}\)-\(3\)} - Dropout probability: {\(0.25\), \(0.5\), \(0.75\)} - L\(2\) regularization: {\(0\), \(1\mathrm{e}\)-\(4\), \(1\mathrm{e}\)-\(3\)} While we use this same hyperparameter grid for all tasks, the learning objective varies by task (cross-entropy for genre classification and key detection, independent binary cross-entropy per tag for tagging, and mean squared error for emotion recognition) as does the number of probe outputs (). Some tasks have multiple metrics---we early stop on \(\text{MTT}_{\text{AUC}}\) for tagging as it is a more common metric than \(\text{MTT}_{\text{AP}}\), and on the average of \(\text{Emo}_{\text{A}}\) and \(\text{Emo}_{\text{V}}\) for emotion recognition. We take the model with the best early stopping performance from each grid search and compute its performance on the task-specific test set. # Results and Discussion In , we report performance of all representations on all tasks and metrics, as well as average performance across all tasks. Results are indicative that CALM is a promising paradigm for MIR pre-training. Specifically, we observe that probing the representations from (learned through CALM pre-training) achieves an average of \(69.9\), which is \(30\)% higher relative to the average of the best representation pre-trained with tagging ( achieves an average of \(53.7\)). Performance of on all individual metrics is also higher than that of any other representation. Additionally, achieves an average performance that is \(38\)% higher than that of . Representations from all pre-trained models outperform hand-crafted features ( and ) on average. Note that these results are holistic comparisons across different model architectures, model sizes, and amounts of pre-training data (e.g.,  was trained on far less data than ), and hence not sufficient evidence to claim that CALM is the "best" music pre-training strategy in general. We also observe that contains substantially more information relevant for key detection than other representations. While (spectrogram projected onto musical pitch classes) contains information relevant to key detection by design, all other representations besides yield performance on par with that of a majority classifier (outputting "F minor" for every example scores \(15.0\))---hence, these representations contain almost no information about this task. For models pre-trained with tagging ( and ), intuition suggests that this is because none of the tags in MSD relate to key signature. For , we speculate that the use of transposition as a data augmentation strategy also results in a model that contains little useful information about key signature. While tagging and CLMR were not designed with the intention of supporting transfer to key detection, we argue that it is generally desirable to have a unified music representation which performs well on a multitude of downstream MIR tasks. Hence, we interpret the comparatively stronger performance of on key detection as evidence that CALM pre-training addresses blind spots present in other MIR pre-training paradigms. In the bottom section of , we also report state-of-the-art performance for purpose-built methods on all tasks, which is further broken down by models which use any form of pre-training (including pre-training on additional task-specific data as in ) vs. ones that are trained from scratch. Surprisingly, we observe that probing is competitive with state-of-the-art for all tasks except for key detection, and achieves an average only \(4\)% lower relative to that of state-of-the-art. On tagging, probing achieves similar \(\text{MTT}_{\text{AUC}}\) to a strategy which pre-trains on a proprietary dataset of \(10\)M songs using supervision . We interpret the strong performance of this simple probing setup as evidence that CALM pre-training is a promising path towards models that are useful for many MIR tasks. We believe that CALM pre-training is promising for MIR not just because of the strong performance of an existing pre-trained model (Jukebox), but also because there are numerous avenues which may yield further improvements for those with the data and computational resources to explore them. Firstly, CALM could be scaled up to pre-train even larger models on more data (Jukebox was trained on \(1\)M songs, while Spotify has an estimated \(70\)M songs in its catalog). In , it is observed that increasing model and dataset size yields predictable improvements to cross-entropy for language modeling in NLP, an insight which may also hold for CALM pre-training for MIR. Secondly, we anticipate that fine-tuning a model pre-trained with CALM would outperform our probing setup. Finally, taking a cue from related findings in NLP, we speculate that CALM pre-training with a bidirectional model and masked language modeling (as in BERT ) would outperform the generative setup of Jukebox (that of GPT ). # Related Work Transfer learning has been an active area of study in MIR for over a decade. An early effort seeking to replace hand-crafted features used neural networks to automatically extract context-independent features from unlabeled audio  and used those features for a supervised learning task. Other early efforts focused on learning shared embedding spaces between audio and metadata  or directly using outputs from pre-trained tagging models for music similarity judgements . The predominant strategy for MIR pre-training using large tagging datasets was first proposed by van den Oord et al. 2014 . This work pre-trained deep neural networks on MSD and demonstrated promising performance on other tagging and genre classification tasks. Choi et al. 2017  pre-trained on MSD but using a convolutional neural network and also explored a more diverse array of downstream tasks---we use their pre-trained model as one of our baselines. More recent improvements use the same approach with different architectures , the latest of which is another one of our baselines. Other strategies for MIR transfer learning have been proposed. Some work pre-trains on music metadata (e.g., artist, album) instead of tags . In contrast to the manual annotations required for tagging-based pre-training, metadata is much cheaper to obtain, but performance of pre-training on metadata is comparable to that of pre-training on tagging. Kim et al. 2020  improve over Choi et al. 2017  using a multi-task approach that pre-trains on both tags and metadata. Huang et al.  demonstrate that metadata can be combined with proprietary co-listening data for pre-training on \(10\)M songs to achieve state-of-the-art performance on MTT---probing representations from CALM pre-training on \(1\)M songs achieves comparable performance on MTT (). Finally, contrastive learning  has been proposed as a strategy for MIR pre-training ---we compare to such a model from Spijkervet and Burgoyne 2021 . While CALM has not previously been explored for MIR transfer learning, it has been explored for other purposes. van den Oord et al. 2017  first proposed CALM and used it for unconditional speech generation. Variations of CALM have been used as pre-training for speech recognition  and urban sound classification . CALM has also been explored for music generation . CALM is related to past work on language modeling of raw (i.e., not codified) waveforms , which tends to be less effective for capturing long-term dependencies compared to modeling codified audio. Language models have also been used extensively for modeling symbolic music , including some work on pre-training on large corpora of scores for transfer learning . # Conclusion In this work we demonstrated that CALM is a promising pre-training strategy for MIR. Compared to conventional approaches, CALM learns richer representations by modeling audio instead of labels. Moreover, CALM allows MIR researchers to repurpose NLP methodology---historically, repurposing methodology from another field (computer vision) has provided considerable leverage for MIR. Finally, CALM suggests a direction for MIR research where enormous models pre-trained on large music catalogs break new ground on MIR tasks, analogous to ongoing paradigm shifts in other areas of machine learning.
{'timestamp': '2021-07-14T02:01:36', 'yymm': '2107', 'arxiv_id': '2107.05677', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05677'}
# Introduction Vision is an important sensory modality for humans. Many activities of daily living (ADLs), such as cooking and eating, can be difficult without visual support. Jones et al. revealed that people with visual impairments tend to have poor nutritional status, which is often linked to problems with buying, preparing, and eating healthy food. People with visual impairments may have an aversion to cooking due to difficulty accessing visual information and cues during the cooking process. This has resulted in people with visual impairments more frequently eating outside at restaurants or preparing frozen food that may be calorie-rich. According to the aforementioned Canadian study, eight out of nine participants stated they "disliked or hated cooking" because of the time it takes to cook without vision. Christine Ha, the first blind contestant of MasterChef, won the third season of the show in 2012 and described the importance of cooking to people with visual impairments. To assist visually impaired individuals to cook independently, there have also been training guidelines released from blind communities and cooking related assistive technologies that are commercially available. For example, people with visual impairments could use voice commands to set timers or use a speaking kitchen thermometer to check the temperature of a steak. However, little research has explored the practices of people with visual impairments in cooking and how they leverage different assistive devices for cooking. Furthermore, there has been little to guide HCI researchers on what stages or steps in the cooking process may benefit most from support via technology. In our research, we explore the following research questions: - RQ1: What are current cooking approaches and techniques employed by people with visual impairments? - RQ2: What are the key challenges, concerns, and risks encountered while preparing meals? - RQ3: What are potential opportunities for assistive technologies to support people with visual impairments to cook independently? To first understand the current cooking experiences of people with visual impairments (RQ1), we conducted a content analysis of 122 YouTube videos that feature visually impaired individuals preparing meals. We describe 12 different activities essential to cooking that were summarized from the video analysis. Based on the findings from the video analysis, we then conducted semi-structured interviews with 12 visually impaired people who have experience cooking to better understand RQ2 and RQ3. The interview findings further illuminate challenges encountered before, during, and after cooking including: utilizing tools, information access, touching and feeling, safety and consequence, precision and ambiguity, organizing and tracking, item and quality inspection, and collaborative cooking and communication. We then discuss the potential opportunities to support people with visual impairments while cooking (e.g., zero-touch interactions for cooking, status tracking and safety monitoring, and collaborative cooking). # Background and Related Work ## Eating and Cooking for People with Visual Impairments People with visual impairments' Activities of Daily Living (e.g., eating and mobility) and Instrumental Activities of Daily Living (e.g., preparing and making food) are affected by the loss of vision. Jones et al. conducted a survey study with 101 visually impaired people and found 65% of the participants stated that their visual impairments made cooking difficult. Due to the difficulty of cooking, Bilyk et al. found that people with visual impairments tend to eat outside or prepared food, which affects healthy eating behaviors. To enable efficient preparation of meals, Kostyra et al. further showed that assistive technologies, such as having equipment with a voice editor, devices informing about the cooking process, and sensors supporting pouring fluids, may enable efficient preparation of meals for people with visual impairments. Therefore, it is important to explore existing cooking practices and challenges for people with visual impairments and understand specific cooking processes or steps that certain assistive technologies may help people with visual impairments in cooking. ## Enabling Technology for People with Visual Impairments Cooking usually requires people with visual impairments to interact with different interfaces or devices. The traditional way to enable people with visual impairments to interact with electronic appliances is by adding tactile markers to them. Beyond this traditional method, prior research also explored using computer vision, voice interactions, and 3D printed tactile marking to better support people with visual impairments interacting with different interfaces. For example, VizLens leveraged computer vision and crowdsourcing to enable people with visual impairments to interact with different interfaces, such as a microwave oven. Guo et al. further introduced a crowdsourced fabrication pipeline to help blind people independently make physical interfaces accessible through adding a 3D printed augmentation of tactile buttons overlaying the original panel. Beyond making appliance interfaces accessible, prior research has also explored various approaches to improve the accessibility of mobile devices for people with visual impairments which might help with the cooking process, such as gestural interactions (e.g., ) and screen readers (e.g., ). For example, Talkback, and VoiceOver enable people with visual impairments to explore interface elements on mobile devices through audio feedback. The feasibility of using mobile devices further allows people with visual impairments to interact with other IoT devices. However, it is unknown how people with visual impairments tend to interact with mobile devices during cooking or utilize their mobile devices to interact with different kitchen appliances, and associated challenges and barriers. ## Technology for Cooking In terms of cooking processes, there has been prior research that explored learning procedures of cooking and different cooking techniques. For example, Kato and Hasegawa introduced an interactive sauteed cooking simulator that could visualize different cooking states (e.g., temperature changes, browning from burns). This system could help users to better manage their cooking skills, such as how to cook medium-rare meat. Kusu et al. further proposed a method to calculate a cooking recipe's difficulty level during searching and recommend recipes that match the user's cooking skills. Although prior research has explored how to help people with cooking activities, there lacks research and understanding of what cooking-related learning procedures people with visual impairments have adopted and what the existing challenges are during these learning processes. In our work, we showed cooking practices of 12 different cooking procedures through a YouTube video analysis and uncovered eight themes of cooking challenges through interviews with people with visual impairments. # YouTube Video Analysis: Cooking Practices for People with Visual Impairments To understand existing cooking practices and potential risks for people with visual impairments, we conducted a YouTube video analysis---searching, filtering, and analyzing YouTube videos related to cooking practices by people with visual impairments---inspired by prior research on leveraging the richness of YouTube video contents to understand accessibility needs. Our video analysis consisted of two main steps: 1) searching for YouTube videos related to cooking practices for people with visual impairments; 2) analysis and coding procedures. [\[table:searchterms\]]{#table:searchterms label="table:searchterms"} ## Search Protocol In the video searching process, we looked for videos focused on cooking practices for people with visual impairments. To search for relevant videos, three researchers independently combined visual impairment related keywords (e.g., blind, visually impaired, visual impairment) and cooking related keywords (e.g., cook, cooking, chef, kitchen). To come up with these, our researchers first started with basic searches (e.g., blind cooking) and gradually included other keyword combinations from candidate video titles or descriptions. Because each search may generate hundreds of results, we then followed the same approach as Komkaite et al. by stopping our search for videos after the whole page of results started to be irrelevant. In total, we initially created a video dataset of 136 relevant videos found by March 28th, 2021. We then filtered out videos if: 1) the person who cooked in the video did not have visual impairments; 2) the person only heated frozen food; 3) it has poor audio and video quality or did not show the person cooking; 4) videos were duplicated. We then ended up filtering 14 videos and created the final video dataset of 122 videos (V1-V122). Among the 122 videos in our dataset, most videos were uploaded in 2020 (35), while others were uploaded in 2021 (34), 2019 (11), 2018 (10), 2013 (9), 2014 (7), 2017 (6), 2016 (5), 2015 (3), and 2012 (2). The average length of videos was 698 seconds (ranging from 77 seconds to 2694 seconds). ## Video Content Analysis To code the videos, three researchers first open-coded the videos independently. Then, the coders met and discussed their codes. When there was a conflict, they explained their rationale for their code to each other and discussed to find a resolution. Eventually, they reached a consensus and consolidated the list of codes. Afterward, we performed affinity diagramming to group the codes and identify emerging themes according to the Cooking Guidelines for people with visual impairments. Overall, we established 12 themes and 37 codes. The following section describes the findings based on the 12 themes. [\[table:cookingprocedure\]]{#table:cookingprocedure label="table:cookingprocedure"} ## Results: Cooking Practices of People with Visual Impairments From the YouTube video analysis, we uncovered unique cooking practices and procedures of different people with visual impairments (Table [2](#table:cookingprocedure){reference-type="ref" reference="table:cookingprocedure"}). ### General Safe Cooking Practices {#General Safe Cooking Practices} For general safe cooking tips and practices, we found that people with visual impairments usually **start everything with gentle actions**. This includes using a slow cooker rather than an open grill to avoid fire flare ups (V18), always cooking on low to medium heat to avoid injury (V80), and putting all food and ingredients in a cold pan first before putting the pan on the burner (V4, V6). In V80, the person with visual impairments mentioned in his video: > "\...For people with visual impairments like me, we might have to make different adjustments on the pan with our hands or utensils while cooking, I often start with using my hand to feel the temperature and cook at low to medium temperature on my pan\..." Beyond starting with gentle actions, we found that people with visual impairments tend to **use hearing and hand-feeling to compensate for vision needs during cooking**. In terms of leveraging hands for feeling during cooking, we found that people with visual impairments hold their hands over the pan to gauge temperature (e.g., V11, V23) and use hands to guide food onto utensils (V15). For hearing, we found that people with visual impairments leveraged sound to tell if oil is hot or not (V90, V94). For example, one cook with visual impairments put a small droplet of water into a pan of oil to hear if it was hot (V90). Furthermore, we found that it is important for people with visual impairments to **memorize the environment in the kitchen**, including the kitchen layout (V1, V17, V46) and which knobs correspond to which burner on the stove (V9). ### Cutting and Chopping {#Cutting and Chopping} For cutting and chopping, we learned that many people with visual impairments tried **using alternate ways to avoid knives**, such as using a garlic masher, a vegetable chopper (Fig. [\[fig:cutting\]](#fig:cutting){reference-type="ref" reference="fig:cutting"}(a)), a food processor (e.g., V103, V114), scissors (e.g., V84, V94), or even by buying pre-minced garlic (V9, V13). Moreover, we found that people with visual impairments **sort cut and uncut food into different specific locations on the cutting surface** (V1, V32). In V1, the person commented on her practices in the video: *"For me, I always place the cut food at the top right corner of my cutting board, so I can keep track of the food that I still need to cut."* We also found that people with visual impairments have **different practices of using the knife to cut objects**. For example, we found people perform cutting by 1) having fingers on both sides of the knife to position where to cut (e.g., V23, V28) (Fig. [\[fig:cutting\]](#fig:cutting){reference-type="ref" reference="fig:cutting"}(d)), 2) putting the whole hand on top of the knife (e.g., V20, V27) (Fig. [\[fig:cutting\]](#fig:cutting){reference-type="ref" reference="fig:cutting"}(b)), or 3) tucking the fingertips under and in towards the palm of the hand and cutting with the other hand (e.g., V16, V112) (Fig. [\[fig:cutting\]](#fig:cutting){reference-type="ref" reference="fig:cutting"}(c)). ### Measuring {#Measuring} To measure food, we first found that there is a common practice for people with visual impairments to **use hands to weigh meat and measure spices** (e.g., V12, V35). We further revealed that people with visual impairments highly **rely on using measuring cups with hand assistance to measure liquids** (Fig. [\[fig:measure\]](#fig:measure){reference-type="ref" reference="fig:measure"}). To accurately use measuring cups, people with visual impairments either have to memorize the measurements (V51) or use a braille-labeled set (V10). Finally, visually impaired cooks also **prefer using existing containers or utensils to measure food**, such as using the same can to get a 1:1 ratio of water and soup (V89) and using the broad side of a knife to measure the size of meat (V96). ### Pouring {#Pouring} For pouring, we found that people with visual impairments **use an extra-large bowl to reduce the difficulty of pouring** (V53, V56) and usually pour over the sink to make sure spills do not matter (V10, V26). To know how much people are pouring, we revealed that people tend to **use their finger over the spout and/or in containers to know the exact amount** (e.g., V16, V21). Another common practice we discovered is ***"making sure you poured everything"* to ensure all of the ingredients they want are added to their dish**. More specifically, we found that people first **add water to food processor or bowl to get any leftover ingredients** (V35) and then **wipe bowls with fingers to make sure they are empty after pouring** (e.g., V30, V59). ### Placing Pans on a Burner {#Placing Pans on a Burner} From the video analysis, we recognized that people with visual impairments **prefer using traditional electric stove top than modern glass top or gas top**. The key reason was the ease of placing pans on the stove top. As a practice, we found that people with visual impairments tend to either **use listening or feeling to know whether the pan is on the burner**. For example, V19 showed that visually impaired individuals listen to sizzle to tell whether the pan is on the burner or not after turning on the fire (V19). As another option, we found people either use hand to feel to make sure the pan is at the center of the stove top (V96) or use the back of a spatula to feel if the pan is on the burner (V19). ### Baking {#Baking} In baking, we found that visually impaired people have to **use their hands to feel batter texture, check the batter readiness, and shape dough** (V41, V88). Specifically, we found that visually impaired cooks prefer to fold the dough over parchment paper (V92), use their hands to shape the dough (V121), and create barriers when rolling it out (V82). Furthermore, we revealed **the importance of keeping things clean during baking**. For example, V29 mentioned the importance of wiping edges of the pan before baking to prevent the burning of anything that accidentally got on the edges. Finally, we found people with visual impairments **use caution with the oven when baking**, such as by pulling the oven shelf out slightly to avoid burns (V40). ### Turning Food {#Turning Food} For turning food, we learned that people with visual impairments **have different preferences on choosing tools** to accomplish the task. This includes using a large two-prong fork (V55), using two utensils (V83), and using tongs and spatulas for (V33, V78). While turning food, people with visual impairments have different practices of **keeping track of food locations**. For example, V22 showed that the person always memorizes how much food she put on the grill and roughly where it is. V16 further showed that people with visual impairments use one hand to feel for food locations and then use the other hand to turn the food with a spatula (Fig. [\[fig:turning\]](#fig:turning){reference-type="ref" reference="fig:turning"}). ### Spreading {#Spreading} From the video analysis, we uncovered that **using hands to spread** butter or jam is a common practice for people with visual impairments to make sure everything is evenly distributed (e.g., V43, V63). V88 further showed the practices of using single-use plastic gloves for spreading. Beyond using hands, V45 showed the approach of **using utensils to spread** jam evenly on bread. ### Tools and Small Appliances {#Tools and Small Appliances} In terms of tools and small appliances for cooking, we found that visually impaired individuals often **use a virtual assistant to set timers**. This includes using Siri (e.g., V9, V13), Alexa (V1), Google (V4), and analog timers (V44). In V44, the visually impaired person rotated the analog timer using her hand position to gauge the correct time. Furthermore, we uncovered that **speaking tools are widely used for different purposes**, such as using a barcode reader to know what is in a can (V5), Aira for identifying cans, screen readers to read recipes off of a phone (V29), video magnifiers to read boxes (V17), talking scales (V41) and speaking thermometers (e.g., V42, V115). We further found that people with visual impairments tend to **use a lot of specific tools for specific tasks**. For instance, V36 showed that the cook used an automatic can opener and listened for when it was done. Other examples include using a tea strainer to rinse off rice (V84) and spatula and chopsticks for mixing (V95). ### Testing Food for Doneness {#Testing Food for Doneness} To test whether the food is done, we found that people with visual impairments mostly use five different methods. First, they **feel to check food doneness**, such as feeling food texture with a spoon (e.g., V9, V86), feeling for fried food to float to the top with a utensil (V90), and feeling cooking food with hands (e.g., V16, V39). We also learned that visually impaired people **used measures for checking doneness**. For example, they initiated a timer (e.g., V19, V54) or used a thermometer to check whether the food is done (V19, V121). Moreover, we found people with visual impairments also **used listening to tell when food sounds done** (e.g., V11, V34) and **use smell to check for food doneness** (e.g., V67, V100). For example, V84 mentioned that visually impaired people could use sound to know whether water is boiling. Finally, we found that people who learned cooking before losing their vision **judge food doneness on their intuition and prior memories from when they were sighted** (V91). ### Knowing the Kitchen Space {#Knowing the Kitchen Space} From the YouTube video analysis, we discovered that people with visual impairments put a lot of effort to **organize the kitchen space to reduce cooking barriers**, such as having separate space for cooking and for ingredients (V10), keeping the container of utensils handle side down so they can feel the ends (V25), keeping measuring cups nested (V28) and always placing utensils back to their original places (V3). Furthermore, we realized visually impaired individuals have different practices to **feel the kitchen space**. For example, V22 showed that people use a spatula to feel around a hot grill to get to know the space. ### Tell Things Apart {#Tell Things Apart} To tell ingredients or tools apart, we found a common practice for people with visual impairments is **adding labels on buttons or objects**. For instance, visually impaired individuals add Braille labels on spice jars (V27, V47) or bump dot stickers for recognizing buttons (V50). Another approach to tell things apart is by **recognizing the size or shape of containers**. For example, the person from V72 put each ingredient in a different type of bowls to keep track of different ingredients. Furthermore, people also **rely on smell to tell things apart**, such as smelling to tell the differences between spices (V35, V65). Finally, we found that some people with visual impairments **prefer putting their containers in certain orders**. For example, some people prefer to alphabetically organize spices in their drawers (V50). # Interview Study: Challenges of Cooking for People with Visual Impairments In the YouTube video analysis, we uncovered existing practices for people with visual impairments in different cooking procedures. We then leveraged these findings and conducted semi-structured interviews with visually impaired people who have experience cooking to better understand their existing cooking challenges. [\[table:demographic\]]{#table:demographic label="table:demographic"} ## Method: Semi-structured Interview with People with Visual Impairments To understand perceptions and challenges of cooking for people with visual impairments, we conducted semi-structured interviews with 12 visually impaired people who have experience cooking (Table [3](#table:demographic){reference-type="ref" reference="table:demographic"}). Our participants have an average age of 32, with a range from 19 to 55 years old. Five of them are totally blind, and the rest are legally blind. Furthermore, ten of our participants are congenitally blind and learned cooking after the vision loss, and the other two cooked before losing their vision. Participants were recruited through social platforms (e.g., Reddit, Twitter, Facebook). To participate in our interview, participants needed to 1) be 18 or above; 2) have visual impairments; 3) have experience cooking; 4) be able to communicate in English. The interviews were conducted through Zoom and took around 60-75 minutes for each participant. Participants who completed the interview were compensated by a \$20 Amazon gift card. The entire recruitment and study procedure was approved by the institutional review board (IRB). In the interview, we first asked participants about their demographic information, general reasoning and perceptions about cooking, and any barriers they encountered when they started cooking. Based on our findings of different cooking procedures and practices in the YouTube video analysis, we asked our participants to discuss their perceptions and challenges around different cooking procedures, such as measuring, pouring, and cutting and chopping. Afterward, we asked participants to discuss their experiences and challenges with assistive cooking technologies, cooking with other people, and the modification of kitchen appliances for accessibility purposes. Two researchers independently performed open-coding on the interview transcripts. Then, the coders met and discussed their codes. When there was a conflict, they explained their rationale for their code to each other and discussed to resolve the conflict. Eventually, they reached a consensus and consolidated the list of codes. Afterward, they performed affinity diagramming to group the codes and identify emerging themes. Overall, we established eight themes and 26 codes. The results introduced in the findings are organized based on eight themes. ## Findings In this section, we introduce the challenges of cooking derived from our interviews in eight themes: utilizing tools, information access, touching and feeling, safety and consequences, precision and ambiguity, organizing and tracking, item and quality inspection, and collaborative cooking and communication. ### Utilizing Tools {#Utilizing Tools} From the interviews, we found that people with visual impairments encountered various challenges when utilizing tools (e.g., cooking utensils, appliances). In the video analysis, we found that people with visual impairments rely on either braille markers or bump dots to interact with an interface (Section [3.3.12](#Tell Things Apart){reference-type="ref" reference="Tell Things Apart"}). In the interview, seven participants commented on the concerns of **messing up tools with dirty hands and food during cooking**. For example, P1 commented on the problems of messing up braille tactile markers on kitchen appliances: > "\...It is very common that I might accidentally have something on my hand, especially when I make a dough, then when I touch my Braille markers or bump dots, it just stays on the marker and affects me when I want to read the markers\..." From the video analysis, we learned that people with visual impairments usually utilize many tools for different purposes (Section [3.3.9](#Tools and Small Appliances){reference-type="ref" reference="Tools and Small Appliances"}). In the interview, we found that eight of our participants **struggled with having too many tools for different purposes than are necessary**. For example, P12 mentioned that she had to use a vegetable holder on one hand to hold the vegetable and use another hand to peel it. P4 further commented on his situation of even using syringes for cooking: > "\...I have too many tools or cookware for different purposes. I even used syringes to measure and add soy sauce to my dishes. But having too many things really freak me out, it made me look for things all the time\..." During the interview, five participants mentioned that **existing tools lack confirmation and feedback**, especially for our participants who learned cooking before vision loss and were used to leverage vision for confirmation and feedback. For example, P8 mentioned the challenges of just using his spatula to tell where food is and whether the food is done: > "\...Feel through tools is hard, I cannot just use my spatula to do everything for me, it is really hard for me to use it to tell if the food is ready by using tools to feel the texture. That is why I said feel is difficult without hand, that is why we need more help with adding more sensors at the head of tools to tell me different status, and it can also accomplish basic needs\..." ### Information Access {#Information Access} In the interview, participants overall complained about information access problems with kitchen appliances' guides and recipes. First, three participants mentioned the **lack of details for guide manuals and instructions of kitchen appliances**. For example, P11 commented on the need for more vocal descriptions about the interface layout: > "\...I cannot understand existing manuals and instructions for kitchen appliances like pressure cookers, it definitely needs more vocal descriptions about the position of different parts and the interface layout. Especially that the current pressure cookers or rice cookers have so many buttons\..." Beyond the manuals, we found our participants complained that **recipe content does not correspond to how people with visual impairments cook**. This includes cookbooks that have too many pictures (P9), wording or cooking language varying among different recipes which confused visually impaired cooks (P7), online recipes containing many figures and ads (P1, P3), and the way current recipes explain different steps requiring lots of vision support (P8). P8 continued with his experiences with recipes like a guessing game: > "\...The descriptions in many recipes are very hard to correspond to the ways that I cook now. I was reading a recipe, and it told me to cook the piece of chicken until it turns brown and then flip it over. It does not transfer to people with visual impairments, it is like a guessing game\..." Furthermore, we realized that **existing recipe structures are not friendly to people with visual impairments**. Participants commented that different recipes they found online tend to have different recipe structures, such as the cook's notes, nutrition facts, ingredients and cooking steps. As a consequence, our participants complained that they always have to go back to check the recipe (P1) and do not know where to start the recipe (P1, P3). P6 then further talked about her frustration of starting over from the beginning of the recipe because of the non-standardized recipe structure: > "\...I use voiceover for apple devices, it typically read the whole recipe. However, many recipes do not follow a specific structure which made me easily miss information. Once I lose my place, I have to use voiceover to read from the beginning again\..." Besides the need for better recipe structures, we also found that our participants **had a difficult time interacting with the recipe while cooking**. Challenges include problems interacting with phones or tablets while cooking (P1), irrelevant ads and pictures (P10), and worries of getting both physical recipes and electronic devices dirty while cooking (P10). P10 continued: > "\...I just cannot find a better way to interact with both my braille recipes and electronic recipes by getting them dirty and have a better interactive interface while cooking. Because my hands often have oil or sauce when I am cooking my dishes\..." Therefore, it is necessary for future research to consider how to better support cooking related information access and better interactive methods while cooking. ### Touching and Feeling {#Touch and Feel} In the YouTube video analysis, we mentioned that people with visual impairments leverage their hands' feeling for measuring (Section [3.3.3](#Measuring){reference-type="ref" reference="Measuring"}), placing pans on a burner (Section [3.3.5](#Placing Pans on a Burner){reference-type="ref" reference="Placing Pans on a Burner"}), baking (Section [3.3.6](#Baking){reference-type="ref" reference="Baking"}), and testing food for "doneness\" (Section [3.3.10](#Testing Food for Doneness){reference-type="ref" reference="Testing Food for Doneness"}). From the interview, we found that there exist various challenges and concerns about this from people with visual impairments in cooking. First, we found that **hand feeling is not sufficient to tell all the information about certain cooking procedures**. For example, P12 commented: *"it can be difficult to feel the liquid level if the liquid is room temperature"*. Therefore, P5 complained that he had to put oil in the fridge first and then use a finger to feel the level. P1 further mentioned his difficulties in using his hand to feel the pouring speed of liquid: > "\...When I use my fingers to lead the liquid to pour into a container, I can tell somethings flows over my finger, but I cannot tell how fast that is, and it usually ended up with having too much or too little that got poured, because I do not have another hand to feel the weight of the container, I have to use one hand to pour and use one hand to lead the liquid\..." Another concern from our participants is that **using hand feeling during cooking might not be appropriate or unsafe**. As an explanation, P5 mentioned his experiences of messing up the decoration of a cake by using his hands. Moreover, P9 and P12 mentioned that using hands when cooking might cause them to burn themselves by accidentally touching the hot pan. P12 continued: > "\...Using hands to feel the food on a hot pan is not always easy to do, you have to be very very slow and gentle, especially when you want to feel the doneness of the food and try to flip it. I have burned myself many times\..." Furthermore, we found that visually impaired individuals complained that **using hands to feel objects affects the efficiency of cooking**, that is, the person cannot use their hand, which is used for feeling and touching, to do other things. As an example we mentioned previously, the person has to use one hand to pour and one hand to lead the liquid to the container, which forces them to place the container at a stable position (P10). Therefore, future research should consider how to enable hand and finger sensing to help with knowing more information during different cooking procedures and explore alternative methods to substitute the need for hand touch and feel in cooking. ### Safety and Consequence {#Safety and Consequence} From the interview, we found that all participants showed strong concerns of **getting burned during different cooking procedures**, which need heat detection assistance while cooking. For example, taking things out of the oven puts the visually impaired person in danger (P8), and the plate and dish for baking can be very hot even after taking it out of the oven (P7). P8 explained the danger of exposed heat sources: > "\...A lot of kitchen appliances have exposed heat sources, it can be very dangerous, such as my toaster or the steamer. After I burned myself once, I always pay 200% attention when I am cooking\..." Beyond burning, we found participants reported the **difficulty of handling accidents while cooking**. This includes accidentally knocking things over (P3), it being hard to know if there is an oven fire or not (P10), and accidentally dropping things and making a mess (P5). P5 continued: > "\...I had experiences making scrambled eggs and spilled the egg all over the stovetop. However, I did not notice the mess after cooking, and my partner told me this situation the next day. I need something to alert me or help me to be aware of these things happened\..." Finally, we found that seven participants mentioned that **other people walking by could potentially cause safety concerns**, especially for participants who learned cooking before their vision loss. For example, P8 mentioned: *"you may turn around, and someone might stay behind you, and you hold a knife\...It is a factor that is out of your control with another person while cooking."* Thus, future research should explore how to help people with visual impairments detect heat to prevent burns, track accidents, and people walking by. ### Precision and Ambiguity {#Precision and Ambiguity} In the YouTube video analysis, we introduced the need for measuring (Section [3.3.3](#Measuring){reference-type="ref" reference="Measuring"}) while cooking. From the interview, we found that **making precise steps while cooking can be a huge barrier for people with visual impairments**, such as getting the right amount of baking soda while baking, because using a hand to feel the level in a measuring cup of powders is challenging (P1). P7 further mentioned the problem with always getting more during spreading: > "\...Because it is hard to know how much butter I already spread on my bread, I always ended up with taking more than needed\..." P11 further continued with commenting on the difficulty of decorating the food: > "\...Decorating the cake or dishes is extremely hard for me. It took a lot of practice to get used to frosting or adding decorations. And it is very easy to get messed up\..." To reduce cooking risks, we showed different safe cooking tips in Section [3.3.1](#General Safe Cooking Practices){reference-type="ref" reference="General Safe Cooking Practices"}. However, we found that our participants complained about the **long learning curve of new methods which makes people stick with their familiar way of cooking**. P7 mentioned: *"every person has their own of doing things."* P3 further commented on the hardness of adopting advice from other people: > "\...It is really difficult to get advice from other people when I am already used to doing things in a certain way. I know my current way of cutting and chopping might not be the recommended way by blind cooking guidelines, but I am already used to it, I tried using the recommended method of cutting and chopping, and I cut myself while learning it\..." According to participants' responses, another challenge is **following cooking steps or procedures precisely according to a recipe or instructions**. P10 mentioned that a simple mistake during cooking could end up ruining the dish, such as measuring baking soda and tracking the leavening time during baking. All participants mentioned the correlation between the tedious work of following all cooking steps and procedures and why they do not like to cook. Therefore, future research should explore different tracking and measuring methods to help people with visual impairments follow steps easier and should create various teaching techniques to reduce the learning curve of different safe cooking methods. ### Organizing and Tracking {#Organizing and Tracking} In Section [3.3.11](#Knowing the Kitchen Space){reference-type="ref" reference="Knowing the Kitchen Space"}, we showed that people put a lot of effort into organizing their kitchen space to reduce barriers. From the interviews, we uncovered various challenges in organizing the kitchen and tracking objects. First, we found that participants complained about the challenge of **finding previously used objects or cookware due to the mental load during cooking**. P1 commented: *"It is really easy for me to forget where my used knives are."* P10 also mentioned that it is hard to find previously used ingredients. P3 then commented on the need of having a system that continuously tracks the kitchen environment: > "\...Cooking itself is a very complicated task that requires people to do multi-tasking and keep tracking of different things. For me, I sometimes forgot where my used knives are, and I had to be very conscious about my actions to prevent being cut by touching my used knife. Therefore, I think I need a tracker that can track the positions of different utensils and cookware for convenience and safety\..." Furthermore, we found that cooking is not a simple binary task that will guarantee successful and tasty dishes if you follow the recipe. We also realized people with visual impairments **have a hard time tracking the status of tasks in progress**. Five participants commented that it is hard to know when things are done. They have to constantly check the food. P1 further commented on this problem and tended to overcook the food: > "\...Knowing whether the food is done is such a complicated project for me without any vision. To make sure I do not get diarrhea afterward, I often overcooked the food, such as shrimp. Although I can make sure it is totally cooked, but it affected the texture and the taste of the food\..." We also found that participants **have challenges tracking and organizing parts of the food**, such as organizing the cut and uncut parts of a large volume of food, and memorizing which parts of the food on the pan need to be flipped (P10). Therefore, P1 said that she had to wash her hands a lot and touch everything to check the food. P6 continued with her challenges: > "\...The pan is big. If only a portion of the food on the pan needs to be turned over, it would be very difficult. I usually had to use hand and smell to check if the food at the center of the pan is burned or not\..." Finally, participants mentioned that they often have a hard time **knowing and remembering where to clean while cooking**. Specifically, six participants complained about remembering where they need to clean afterward, or they have to clean things right after use. P4 further commented that it is also very common for him to not know or not be aware of where he has to clean. Overall, future works should explore how to help people with visual impairments to better organize and track things through cooking. ### Item and Quality Inspection {#Item and Quality Inspection} From the interview, we realized that people with visual impairments often have concerns about inspecting an item or food. First of all, we found that participants have a hard time **checking food quality**, such as whether the bread is moldy. P5 commented on the difficulty of checking food quality just with smell and touch, even with computer vision assistance: > "\...Knowing the food quality is hard just by smelling and touch. Such as knowing whether a piece of bread is moldy or whether bananas or pineapples are ripe. I even tried with some apps that could object recognition, but I realized it just told me the object it is\..." Furthermore, we found that our participants complained about the task of **telling whether things got peeled or cleaned thoroughly**. P8 commented on cleaning and peeling non-smooth vegetables: > "\...Different vegetables have different difficulties in cleaning and peeling. Vegetables like carrots are very easy to peel. But non-smooth vegetables are hard to tell if they got peeled or cleaned completely. Ginger is a hard one, also spots on potatoes are hard too\..." In the interviews, nine participants reported having a hard time **inspecting an accidental mix of unwanted things**, such as eggshells and bugs in flour (P1). P1 continued: *"I had many times of having eggshells in my scrambled eggs without noticing, it was disgusting."* Overall, we showed the existing challenges of items and quality inspection. Future research should explore how to bridge the gap of the challenges we introduced to people with visual impairments in cooking. ### Collaborative Cooking and Communication {#Collaborative Cooking and Communication} From interviewing people with visual impairments, we found that ten out of twelve participants mentioned that they do not like cooking with another person because of **continuous communication needs**. *"Cooking with another person needs me to constantly speak out things."* said P4. P3 further complained about collaborative cooking processes: > "\...I have to verbally confirm steps and actions with another person all the time. Sometimes they might just do something in a way that I do not like, and they might not inform me because cooking and talking is not common for any person\..." In the interview, we found that eight participants leveraged apps for remote assistance while cooking, such as Aira or Be My Eyes. However, our participants complained about **making sure the item is in the camera's field of view**. P1 continued: > "\...Remote assistance definitely needs more improvements, I often do not know whether the thing I am talking about is in the camera's field of view. More importantly, my hands are often dirty while cooking, and I always tried not to touch my electronic device. This leads to more concerns about using remote assistance\..." Moreover, we found that our participants complained about **appliance modification barriers in a communal space**. P8 commented on this problem: *"the biggest thing about using a shared kitchen, even the simple one like adding bump dots or braille markers, it is hard for me to just add these markers on different appliances, because they are shared."* Therefore, future research should explore how to improve the social acceptability of adding tactile markers on appliances or other alternative ways for people to interact with different appliances. # Discussion and Future Work From the results of our interviews with people with visual impairments, we uncovered existing challenges and gaps for visually impaired people in cooking. In this section, we further discuss zero-touch interactions for cooking, status tracking and safety monitoring, collaborative cooking, and contextual inquiry and learning process in-depth. ## Zero-touch Interactions for Cooking From the results, we showed that our participants often rely on touching and feeling when cooking (e.g., measuring, checking for food doneness, spreading), and interacting with touch-based electronic devices might be inconvenient because they often have food on their hands. As an input method, prior research has explored speech and mid-air gestures as input options for people with visual impairments. However, many of the existing interaction paradigms still require people to physically touch the interfaces (e.g., ), especially to explore elements on the screen. Although visually impaired individuals can currently leverage voice control to input certain commands (setting a timer), future research should explore how to best integrate zero-touch interactions with electronic devices alongside existing practices utilizing touch to manipulate ingredients and cooking tools. ## Status Tracking and Safety Monitoring From our interviews, we highlighted that people with visual impairments have various difficulties in tracking the status of tasks in progress (Section [4.2.6](#Organizing and Tracking){reference-type="ref" reference="Organizing and Tracking"}), protecting themselves from getting burned during different cooking procedures (Section [4.2.4](#Safety and Consequence){reference-type="ref" reference="Safety and Consequence"}), and handling accidents while cooking (Section [4.2.4](#Safety and Consequence){reference-type="ref" reference="Safety and Consequence"}). Prior work has explored using thermography to detect heat sources for energy auditing (e.g., ). A similar approach could be applied in the kitchen to detect heat hazards. Beyond heat detection, prior research also explored using computer vision approaches to opportunistically capture actions and provide proactive reminders to users with visual impairments. Similar approaches using computer vision or audio could be applied in the kitchen to track object locations or track user's actions and status of cooking steps (e.g., boiling water). ## Collaborative Cooking The majority of our participants complained about cooking with other people because they have to constantly speak about their actions and ask about other people's actions. Cooking while constantly talking might not be a natural behavior for people both with and without visual impairments. However, three participants did mention the benefit of having another person to accomplish tasks that rely on vision, such as checking expiration dates and food doneness (P10). Prior research has explored collaborative behaviors for people with visual impairments for other purposes, such as gaming, use of tangible interfaces, music composition, and creating accessible home environments. Therefore, future research should explore the collaborative cooking behaviors for people with visual impairments and further create guidelines and training methods to reduce safety concerns as well as both mental and physical effort. ## Contextual Inquiry and Learning Process In this paper, we described our research approach using YouTube Video analysis to understand more about the practices of cooking by people with visual impairments. In general, video analyses of this type have the benefit of allowing researchers to gain a broad understanding of the practices of assistive technology use for many different users. This has been exemplified in prior work in HCI and Accessibility (e.g., ). In future research, a contextual inquiry study is well suited to gather a deeper understanding of individual users' practices and challenges (e.g., ), which may then be aggregated to understand themes across those individuals. As it relates to the research opportunities we discussed above, a contextual inquiry study may enable future researchers to deeply explore the practices and challenges of zero-touch interactions, status and safety monitoring systems, and collaborative cooking. For example, conducting a contextual inquiry study at a participant's kitchen could identify more status and safety monitoring concerns that might not be recognized by the participants with visual impairments and are not included in the camera's field of view in YouTube videos. An example of this might be watching a visually impaired cook show how she cuts vegetables in front of the camera while, off-camera, cooking chicken in a pan. In this case, neither the audience nor researchers may recognize any potential safety concerns with the pan or other objects in the surroundings from the video. Beyond only interviewing visually impaired individuals, we realized it would also be beneficial for future research to conduct interviews with teachers or trainers who work at community centers and help people with visual impairments with their activities of daily living and meal preparation. This may generate more common practices of cooking by people with visual impairments. # Limitations All of the participants in our study were either legally blind or totally blind. We think people with low vision may have different cooking strategies and challenges that utilize their visual perceptive abilities. In our study, we focused on understanding the existing practices and challenges of visually impaired people in their cooking. However, we did also find that people with visual impairments have different learning experiences with cooking. Therefore, people might encounter different challenges at different stages of learning to cook. # Conclusion In this paper, we describe the results of content analyses with 122 YouTube videos featuring visually impaired people preparing meals and uncovered unique cooking practices for people with visual impairments (e.g., use hands to weigh meat and measure spices, use sound and smell to test if the food is done). We then present findings from semi-structured interviews with 12 visually impaired participants and highlight existing challenges encountered while cooking from their perspectives (e.g., tracking the status of tasks in progress, telling whether ingredients are peeled or cleaned thoroughly). We then discussed potential opportunities to integrate technology with the existing practices for cooking, status tracking, safety monitoring, and collaborative cooking. Overall, our findings provide guidance for future research exploring various assistive technologies to help people cook without relying on vision.
{'timestamp': '2021-07-14T02:06:53', 'yymm': '2107', 'arxiv_id': '2107.05783', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05783'}
# Introduction Constraints on dark matter (DM) properties can be obtained in different ways. The main methods are direct detection , in which the cross section of DM particles with nuclei or electrons is measured, and indirect detection , in which the decay or annihilation rate of DM particles into Standard Model (SM) particles is measured. An additional method is the production of DM particles at colliders. In that case the signatures are events with missing energy, which is attributed to DM particles being produced and escaping the detectoṙ Direct detection is subject to many sophisticated experiments, using different target nuclei and measurement techniques. Looking for tiny recoils stemming from a DM-nucleus or DM-electron scattering, the constrained parameters are the mass of the DM particle and its cross section with the target particle. Indirect detection is typically performed in a parasitic way in telescopes aiming to perform astrophysical measurements. In this case, the DM annihilation or decay rate in any SM particle is constrained as a function of the DM mass, from looking directly for those SM particles, photons being radiated off them, or their decay products. Inherent to such measurements are astrophysical uncertainties such as the DM density along the line of sight (called \(J\)-factor), or SM processes in the observed complex objects that generate very similar signatures. Objects that are particularly popular in what regards observing them are the galactic center, dwarf galaxies, or the Andromeda galaxy. In this paper, we suggest to search for events where the DM decay or annihilation takes place inside Earth-based detectors. The requirements for such a detector are: the ability to reconstruct the energy deposited by particles (spectroscopy), a large target volume and ideally a very low background. Our study is focused on two-phase liquid xenon experiments and organic scintillation detectors. These technologies provide extremely clean environments, as demonstrated by world-leading direct detection results and background rates by XENON1T  and by the measurements of all solar neutrino components in BorexinoṪhe energy depositions expected in these detectors from DM interactions or solar neutrinos are in the keV or MeV regime, and the experiments are optimized to look for such signals. Therefore, our constraints on DM annihilation and decay will be in this mass range. While it is expected that such laboratory limits on indirect detection rates will be much weaker than the ones from astrophysical observations of whole galaxies, the approach proposed here has several advantages: \(i)\) the experimental conditions are under control so the backgrounds are known; \(ii)\) the signal does not suffer from astrophysical uncertainties such as the \(J\)-factor; \(iii)\) significant improvements in the limits can be foreseen from the upcoming generation of experiments. We consider annihilation processes into \(e^-e^+\) and \(\gamma\gamma\), and decays into \(e^-e^+\), \(\gamma\gamma\) and \(\gamma\nu\). We shall analyze public XENON1T data  and extrapolate the limits to upcoming XENONnT  and DARWIN  data, making different assumptions on the background rates in those experiments. The sensitivity of the upcoming LZ experiment  should be very similar to that of XENONnT. We employ as well the public data from Borexino  to derive results, and make projections for JUNO  and THEIA  using their predicted background spectra. This paper is built up as follows: first, in Sec. [\[sec:signal\]](#sec:signal){reference-type="ref" reference="sec:signal"} we discuss the annihilation and decay processes. In Sec. [\[sec:Response and BG\]](#sec:Response and BG){reference-type="ref" reference="sec:Response and BG"} we describe general features of signal production and the background spectra used for the analysis. In Sec. [\[sec:proc_results\]](#sec:proc_results){reference-type="ref" reference="sec:proc_results"} we derive limits on existing and expected future data for the signatures under study, namely DM annihilation and DM decay. We describe these physics processes in detail and explain the procedure of limit setting. A discussion of our results is presented in Sec. [\[sec:dis\]](#sec:dis){reference-type="ref" reference="sec:dis"}. # [\[sec:signal\]]{#sec:signal label="sec:signal"}Annihilation and decay processes We consider DM annihilation and decay processes that may take place inside terrestrial detectors. Their respective rates (number of events per unit volume and unit time) are given by \[\begin{aligned} \label{eq:anni} \mathcal{R}&=\frac{\langle\sigma v\rangle}{2}\, n_{\rm DM}^2=\frac{\langle\sigma v\rangle}{2m_\chi^2}\, \rho_{0,\rm DM}^2\quad \mathrm{(Annihilation)},\\ \mathcal{R}&=\Gamma_{\rm DM}\, n_{\rm DM}=\frac{\Gamma_{\rm DM}}{m_\chi}\, \rho_{0,\rm DM}\quad \mathrm{(Decay)},\label{eq:decay} \end{aligned}\] where \(\langle\sigma v\rangle\) and \(\Gamma_{\rm DM}\) are respectively the annihilation and decay rates into a given final state, \(m_\chi\) is the mass of the DM particle, and \(\rho_{0,\rm DM}\) is the local DM density, which we take to be \(0.3\) GeV/cm\(^3\)Ȯur goal is then to set limits on \(\langle\sigma v\rangle\) and \(\Gamma_{\rm DM}\) as a function of \(m_\chi\) for all possible final states. Obviously, the smaller the DM mass, the larger is the rate and the stronger the constraint. Given the relatively small volume of typical detectors, meaningful bounds can be derived only for light DM particles (keV to MeV). Notice that, besides the particle physics quantities we are interested in, the event rates depend only on the *local* DM density. Therefore, they are insensitive to the usual large uncertainties associated with the distribution of DM inside astrophysical objects, typically encoded in the so-called \(J\)-factorsṀoreover, unlike direct detection rates, equations ([\[eq:anni\]](#eq:anni){reference-type="ref" reference="eq:anni"}) and ([\[eq:decay\]](#eq:decay){reference-type="ref" reference="eq:decay"}) do not depend on the DM velocity distribution. The experiments considered in this work are sensitive to energy depositions between a few keV and a few MeV. For DM annihilations and decays, the total energy deposition is of the same order as \(m_\chi\), which implies that the range of DM masses where bounds can be derived is \(\mathrm{keV}\lesssim m_\chi\lesssim \mathrm{MeV}\). The possible final states from annihilation or decay are quite limited for DM masses below a few MeV, as the only accessible SM particles are photons, neutrinos, and electrons/positrons. In this analysis, we consider two DM annihilation reactions (into \(\gamma\gamma\) and \(e^-e^+\)) and three decay modes (\(\gamma\gamma\), \(\gamma\nu\), and \(e^-e^+\)). We remain agnostic about the nature of the DM particle, but note that decays into a \(\gamma\nu\) (\(\gamma\gamma\)) final state resemble a keV-scale sterile neutrino, axion or axion-like particle signals. Our results apply to many of the countless DM candidates proposed so far. # [\[sec:Response and BG\]]{#sec:Response and BG label="sec:Response and BG"}Detector response and background spectra Charged particles deposit their energy in liquid xenon producing thereby scintillation and ionization. In dual-phase time-projection chambers, free electrons can be collected and amplified via proportional scintillation in the gas phase on top of the liquid targetṪherefore, both scintillation photons and the ionization signals are read out using photo-sensors. These two signals can be combined  to improve the energy resolution of the detector. In organic liquid scintillators, charged particles deposit their energy similarly exciting the medium. In the de-excitation process, emitted photons propagate towards the walls of the detector where photo-sensors are located. While in liquid xenon detectors, the charge signal can be used to identify multiple scatterings, in organic scintillators this is not possible. Interactions by mono-energetic \(\gamma\)-particles appear in the latter as mono-energetic peaks resulting from their full absorption. In this work, we consider annihilation and decay reactions in which observable electrons, positrons and \(\gamma\)-rays are created. The \(\gamma\)-rays have to interact in the sensitive volume in order to leave a measurable signal. For the energy range considered in this work, they interact either via photo-absorption or via Compton scattering.\ The finite energy resolution of the detectors is taken into account when modeling the signals. We parametrize the energy resolution of the corresponding signals via the equation \[\label{eq:E_res} \frac{\sigma(E\,[\textrm{keV}])}{E} = \frac{a}{\sqrt{E\,[\textrm{keV}]}} + b.\] In XENON1T, the parameters are determined to be \(a = 31.3\) and \(b = 0.17\)Ȧs our annihilation and decay signatures involve \(\gamma\)-rays, we use for those a slightly different parametrization which takes into account the fact that above \(\sim 350\) keV \(\gamma\)-rays undergo multiple scatters. To obtain this slightly different parametrization (with the parameters \(a = 31\) and \(b = 0.19\)), we fit the single scatter points below 350 keV and the multiple scatters above that energy (data from figure 6 in Ref. ). For the organic liquid-scintillation detectors considered here (Borexino, JUNO and THEIA), we parametrize the energy resolution as in equation ([\[eq:E_res\]](#eq:E_res){reference-type="ref" reference="eq:E_res"}) setting \(b=0\). For the Borexino experiment, we fit the mono-energetic peaks produced by \(\gamma\) calibration sources as shown in figure 17 of  with Gaussian functions. We extract the corresponding resolution \(\sigma (E)\) and obtain a fit value for equation ([\[eq:E_res\]](#eq:E_res){reference-type="ref" reference="eq:E_res"}) of \(a=169\). For the upcoming/future detectors, we take the expected resolution values as found in the literature corresponding to \(3\%/\sqrt{E\,[\textrm{MeV}]}\) and \(7\%/\sqrt{E\,[\textrm{MeV}]}\) for JUNO  and THEIA , respectively. Table [\[tab:summ\]](#tab:summ){reference-type="ref" reference="tab:summ"} summarizes the energy resolution for all experiments considered here.\ While for organic scintillators we assume a detector efficiency of 100%, for the xenon-based detectors we take an energy-dependent efficiency to be consistent with the published data (figure 2 of ). The latter has an efficiency loss towards low energies (below \(\sim 4\) keV) and at high energies is flat at the level of 90%. Our analysis derives results based on the 0.65 tonne\(\cdot\)y data of the XENON1T experiment , and gives expected sensitivities for its successor XENONnT  and the future DARWIN experimentṪhe signals in these detectors scale with the exposure, the product of the fiducial mass (mass used for data analysis) and the measuring time. The considered exposures are 20 tonnes\(\cdot\)y and 200 tonnes\(\cdot\)y for XENONnT and DARWIN, respectively. Note however that for DM annihilation or decay inside these detectors, the volume (and not the mass) is relevant, and therefore we divide the exposure by the xenon density (\(\rho = 2.85\) g/cm\(^3\)). To derive results for Borexino, we take an exposure of 1291 days and 71.3 tonnes corresponding to a total of 252 tonne\(\cdot\)yearṄote that for deposited energies above \(\sim 3\) MeV energies, the fiducial volume of these detectors can be enlarged allowing for significantly larger exposuresṪhis is however not considered in our study. For JUNO and THEIA, we assume 100 ktonne\(\,\cdot\,\)year and 300 ktonne\(\,\cdot\,\)year, respectively, in accordance with the expected exposures mentioned in the corresponding publicationsẆhile the density for THEIA is assumed to be 1 g/cm\(^3\), we take for Borexino 0.89 g/cm\(^3\)  and for JUNO 0.86 g/cm\(^3\), as reported inṪable [\[tab:summ\]](#tab:summ){reference-type="ref" reference="tab:summ"} summarizes the parameters employed for each experiment.
{'timestamp': '2021-10-27T02:19:28', 'yymm': '2107', 'arxiv_id': '2107.05685', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05685'}
null
null
null
null
# Introduction End-to-end methods have achieved significant progress in speech to text translation (ST) and even surpassed the traditional pipeline-based methods in some applications . However, the success of end-to-end methods relies on large amounts of training data, which is quite expensive to obtain and relatively small in practice. Building ST systems from pretrained models with multitask learning (MTL) is widely used to overcome the limited training data issue . Nevertheless, little prior work has been devoted to understanding the interactions between different tasks. conduct an empirical study on computer vision tasks for MTL. They find many "assumptions\" for MTL may not be held for specific applications. For example, "similar\" tasks do not necessarily train better together. In this study, we focus on training the ST model along with an auxiliary text to text machine translation (MT) task. We are interested in the task interactions with different modalities and in improving the primary ST task with the help from the auxiliary MT task. The model is initialized with pretrained modules from automatic speech recognition (ASR) and MT. Two types of analysis are conducted on the fine-tuned multitask learned models. The first focuses on the model variation by comparing fine-tuned models with pretrained models for different tasks. The second aims to measure internal representation differences due to different modalities. The analysis leads to three main findings. First, the analysis confirms that MTL tends to generate similar model representations for different input modalities and preserves more information from the pretrained MT modules. Second, we do not observe significant negative transfer effect from the MT task to the corresponding ST task. Sharing more parameters is helpful to transfer knowledge to the primary ST task. Finally, the top layers in the ST decoder are more critical to the translation performance and they are also more sensitive to the modality difference. The model representations from different modalities demonstrate larger difference for the top layers in our analysis. Inspired by these findings, we propose three techniques to enhance the performance of the primary ST task. First, we propose to maximize parameter sharing between the ST and MT tasks, i.e. the entire decoder and the top encoder layers. Those shared parameters are initialized with the corresponding MT models. Second, a cross-attentive regularization is introduced for the encoders. It minimizes the \(L2\) distance between two reconstructed encoder output sequences and encourages the encoder outputs from different modalities to be closer to each other. Finally, an online knowledge distillation learning is introduced for MTL in order to enhance knowledge transfer from the MT to the ST task. Our contributions are summarized as follows: 1. A detailed analysis is conducted on the interaction between the primary ST task and the auxiliary MT task. 2. A parameter sharing and initialization strategy are proposed to encourage information sharing between tasks. 3. Cross-attentive regularization and online knowledge distillation are proposed to reduce the model representation difference between different modalities and enhance the knowledge transfer from the MT task to the ST task. 4. Our system achieves state of the art results on the [MuST-C]{.smallcaps} English-German (EN-DE), English-French (EN-FR) and English-Spanish (EN-ES) language pairs, with 2 or more BLEU gains over strong baselines. # Related Work {#sec:rel_work} **Multitask learning** aims to improve generalization by leveraging domain-specific information contained in the training signals of related tasks . Compared with single task, MTL has many advantages, such as the potential to improve performance by sharing complementary information or acting as a regularizer. Many previous works focus on learning a good model for all tasks. study the gradients from different tasks and conduct task dependent gradient normalization to encourage different tasks to learn at similar speed. introduce task-dependent components to enhance individual task performance. explore different multitask training strategies for ST, and they find the one-to-many strategy, in which an encoder is shared between the ST and ASR tasks, is more effective. further extend it to a triangle structure by concatenating ASR and ST models. compare different multitask strategies for the ST task, and they confirm many-to-one strategy, in which MT and ST are trained together and the decoder is shared between two tasks, is effective if extra bitext data is used. In this work, we carefully study the relation between co-trained tasks in the many-to-one strategy, and the analysis results guide us to propose three techniques to learn more from the auxiliary MT task and enhance the ST performance further. **Model analysis**  propose criticality analysis to measure the importance of different modules from the trained model. Parameters in the selected module or layer are partially rolled back to the initial values, and the module criticality or importance is measured by the performance drop after modification. Larger performance drops indicate a more critical module. Inspired by their work, we extend it to the analysis on the jointly trained models with different pretrained modules and schemes. propose to employ canonical correlation to measure the similarity between different models given the same input. We extend their work to study a model with inputs from different modalities. # Methods {#sec:methods} The proposed ST system is co-trained with the MT task as depicted in . The modules in the primary ST task are connected with dark gray lines and the auxiliary MT task is illustrated with light gray lines. The parameters in the blue modules are shared between the two tasks. During inference with speech input, only modules related to the ST task are used. The model has two encoders, a text encoder and a speech encoder, to take text and speech input respectively. The decoder is shared between the two tasks. To encourage knowledge sharing between the two tasks, the top encoder layers are also shared. The parameters of the shared modules are initialized with a pretrained MT model. A novel cross-attentive regularization is proposed to reduce the distance between encoder outputs from different input modalities. We also introduce a novel online knowledge distillation method where the output from the auxiliary MT task is used to guide the ST model training. The cross-attentive regularization and online knowledge distillation are illustrated as orange modules in and the details are presented in the following two subsections. ## Cross-Attentive Regularization {#sec:car} The cross-attentive regularization (CAR) is proposed to increase the similarity between the text encoder outputs and their corresponding speech encoder outputs. Hence, the performance of the more difficult ST task can be improved by learning from the relatively easier MT task. Encoder output sequences from different modalities can not be compared directly since they have different lengths. In CAR, the two reconstructed sequences are calculated from the text output sequence via self-attention or the speech output sequence via cross attention over the text output sequence. The two reconstructed sequences have the same length and the distance is simply measured as the \(L2\) distance between the two sequences. Formally, we denote a speech to text translation training sample as a triplet \(o=(\mathbf{X^s}, \mathbf{x^t}, \mathbf{y})\). \(\mathbf{X^s}\in\mathcal{R}^{d_s \times N}\), \(\mathbf{x^t}\in\mathcal{R}^{M}\), and \(\mathbf{y}\in\mathcal{R}^{K}\) are the speech feature input, text token input and target text output respectively. \(N\), \(M\) and \(K\) are the corresponding sequence lengths. Assume \(\mathbf{H^s}=(\mathbf{h}^s_1,\mathbf{h}^s_2,\cdot\cdot\cdot,\mathbf{h}^s_N)\) and \(\mathbf{H^t}=(\mathbf{h}^t_1,\mathbf{h}^t_2,\cdot\cdot\cdot,\mathbf{h}^t_M)\), \(\mathbf{h}^s_n, \mathbf{h}^t_m \in \mathcal{R}^{d_h}\) are outputs from the speech encoder and text encoder respectively, where \(d_h\) is the dimension of the output states. A similarity matrix \(\mathbf{S} \in \mathcal{R}^{N\times M}\) is defined as the cosine distance between the tensors in the two sequences: \[s_{i,j} = \frac{(\mathbf{h}^s_i)' \cdot \mathbf{h}^t_j}{ {|| \mathbf{h}^s_i ||}_2 {|| \mathbf{h}^t_j ||}_2}\][\[equ:sim\]]{#equ:sim label="equ:sim"} where \(s_{i,j}\) is the \(i\)th row and \(j\)th column component in \(\mathbf{S}\). The text encoder outputs \(\mathbf{H}^t\) are reconstructed through the speech encoder outputs \(\mathbf{H}^s\) and similarity matrix \(\mathbf{S}\) as below. \[\mathbf{H}^{s\rightarrow t} = \mathbf{H}^s\cdot \mathrm{softmax}(\mathbf{S})\][\[equ:t2s\]]{#equ:t2s label="equ:t2s"} \(\mathbf{H}^{t\to t}\), the reconstruction of \(\mathbf{H}^t\) from itself, can be computed similarly via self-attention. CAR is defined as the \(L2\) distance between the two reconstruction encoder outputs: \[\mathcal{L}_{CAR}(\theta_s)=\frac{1}{M} \left\Vert \mathbf{H}^{s\rightarrow t}-sg[\mathbf{H}^{t\rightarrow t}] \right\Vert_2\] where \(sg[\cdot]\) is the stop-gradient operator and \(\theta_s\) are the ST model parameters. By optimizing the model with CAR, the speech encoder is encouraged to learn from more accurate text encoder and generates similar encoder outputs after reconstruction. CAR is inspired by the attention mechanism between the encoder and decoder where the decoder states are reconstructed through encoder output states via the attention mechanism. ## Online Knowledge Distillation {#sec:kd} Knowledge distillation (KD) is widely used for model compression  where a smaller student network is trained to mimic the original teacher network by minimizing the loss between the student and teacher outputs. The ST task is considerably more difficult than the MT task since the speech input is noisier and more ambiguous than the text input. The accuracy of the MT model is usually much higher than the corresponding ST model. Knowledge distillation from a well trained MT model to a ST model has been proved to be an effective way to improve the ST performance . In this work, we extend knowledge distillation to the MTL framework where both ST and MT are fine-tuned simultaneously with shared parameters. Concretely, we assume an MTL model learns from a data set \(\mathcal{D}\) with target vocabulary size \(|V|\). The training criterion is to minimize negative log likelihood (NLL) for each example \(o=(\mathbf{X^s}, \mathbf{x^t}, \mathbf{y}) \in \mathcal{D}\) from the training data: \[\begin{aligned} \mathcal{L}_{NLL}(\theta_s) &=& -\sum_{o}^{\mathcal{D}} \sum_{k=1}^K \sum_{v=1}^{|V|} \delta(y_k=v) \nonumber \\ && \log p(y_k=v|y_{<k},\mathbf{X}^s,\theta_s) \end{aligned}\] where \(\delta(\cdot)\) is the indicator function and \(p\) the distribution from the ST model (parameterized by \(\theta_s\)). Assume the probability distribution for \(y_k\) given text input \(\mathbf{x}^t\) and MT model \(\theta_t\) is \(q(y_k=v|y_{<k},\mathbf{x}^t,\theta_t)\), the knowledge distillation loss is defined as minimizing the cross-entropy with the MT's probability distribution \[\begin{aligned} \mathcal{L}_{KD}(\theta_s) &=& -\sum_{o}^{\mathcal{D}} \sum_{k=1}^K \sum_{v=1}^{|V|} q(y_k=v|y_{<k},\mathbf{x}^t,\theta_t) \nonumber \\ && \log p(y_k=v|y_{<k},\mathbf{X}^s,\theta_s) \end{aligned}\] The overall loss is the combination of cross-attentive regularization, knowledge distillation loss, negative log likelihood loss for both ST and MT, as follows: \[\begin{aligned} \label{equ:total_cost} \mathcal{L}(\theta_s, \theta_t) &=& \alpha\mathcal{L}_{NLL}(\theta_s) + (1-\alpha)\mathcal{L}_{KD}(\theta_s) \nonumber\\ && + \lambda\mathcal{L}_{CAR}(\theta_s)+ \mathcal{L}_{NLL}(\theta_t) \end{aligned}\] where \(\alpha\) and \(\lambda\) are predefined hyper-parameters. # Experimental Setup {#sec:setup} Experiments are conducted on three [MuST-C]{.smallcaps}  language pairs: EN-DE, EN-ES and EN-FR. The models are developed and analyzed on the dev set and the final results are reported on the tst-COMMON set. We use WMT parallel data from different years, 2013 for Spanish, 2014 for German, and 2016 for French, as extra text training corpus for MTL. Case-sensitive detokenized BLEU is reported by [sacrebleu]{.smallcaps} with default options . We use the "T-Md\" configuration from  in all experiments. The speech encoder has 12 transformer layers while the decoder is with 6 transformer layers. For the MTL model, the text encoder has 6 transformer layers. The transformer layer has an input embedding size of 512 and middle layer dimension 2048. We share parameters of all 6 text encoder transformer layers with the top 6 transformer layers in the speech encoder, hence both encoders use the same modules to generate the encoder outputs. The Adam optimizer  with a learning rate 0.002 is employed in the experiments. Label smoothing and dropout rate are both set to 0.1. We choose \(\alpha = 0.8\) and \(\lambda = 0.02\) in through grid search (\([0.1, 1.0]\) for \(\alpha\) and \([0.01,0.05]\) for \(\lambda\)). Input speech is represented as 80D log mel-filterbank coefficients computed every 10ms with a 25ms window. Global channel mean and variance normalization is applied. The SpecAugment  data augmentation with the LB policy is applied in all experiments. The input text tokens are converted into their corresponding pronunciation form as phoneme sequences . The grapheme to phoneme conversion is done through the "g2p_en" python package . The leading phoneme in a word is appended with an extra "\_\" to mark word boundaries. In total, the vocabulary size for the input phonemes is 134. The target vocabulary consists of 10k "unigram" subword units learned by SentencePiece  with full character coverage of all training text data. All ST or jointly trained models are initialized with pretrained ASR and MT modules. The ASR model is trained on the same English speech training data from [MuST-C]{.smallcaps} with the "T-Md\" configuration too. The pretrained MT models are trained for each language pair with the aforementioned WMT data. The MT encoder and decoder configurations are the same as the text encoder and decoder in the MTL model mentioned above. The models are fine-tuned to 100 epochs using 8 V100 GPUs for approximate one day. The batch size is 10,000 frames for speech to text translation samples and 10,000 tokens for parallel text samples per GPU. The model parameters are updated every \(4\) batches. Speech training samples and text input samples are used to update the model alternatively. The models are trained with [Fairseq]{.smallcaps} . The last 10 checkpoints are averaged for inference with beam size 5. [^1]. # MTL Analysis {#sec:analysis} ## Model Variation We extend 's work to analyze a MTL model. We initialize models with different pretrained modules and fine-tune them for ST and MT tasks within the MTL framework. The pretrained modules come from ASR and MT tasks. Criticality analysis is conducted on the ST model after the MTL fine-tuning step. The parameters in the selected modules are interpolated with corresponding parameters in the pretrained modules. [MuST-C]{.smallcaps} EN-DE dev set is used for BLEU computation. With different interpolation ratios, we obtain different BLEU scores. The BLEU difference comes from two sources. The first one comes from the selected module itself. If the module is important and sensitive, very small perturbation could result in a nontrivial BLEU difference as . Another source of difference is that if the selected module changes significantly to adapt to the ST task, rewinding the parameters back to the initial task may lead to a substantial decrease in BLEU. We attempt to quantify the extent of the degradation from the second source, which can be indicative of the model variation from the pretrained task to the ST task. This is accomplished by comparing the BLEU differences for the same module but using different initialization and training schemes. lists models initialized with different pretrained modules. "ST\" designates a ST model trained with the single ST task, "JT\" corresponds to a ST model trained with the primary ST task and auxiliary MT task together. "JT-S-ASR\" and "JT-S-MT\" are another two jointly trained models but with the top encoder layers shared as described in . The difference between the two models is how we initialized the shared encoder layers, either from the pretrained ASR model for "JT-S-ASR\" or from the pretrained MT model for "JT-S-MT\". **ST**  shows the analysis for the "ST\" model. The x-axis is the interpolation ratio and "1.0\" means the pretrained parameters are used. The y-axis is the relative change in BLEU compared with the well-trained ST model. **It is clear that higher layers are more critical to the performance**. Around 5 BLEU decrease is observed on the top encoder layer (11) and top decoder layer (5) during the criticality tests. The following analysis will compare with and we can separate the aforementioned second source from the first one. **JT**  presents the analysis for the "JT\" model. The jointly trained model shows smaller degradation compared with "ST\" for the decoder layers. **This indicates that training the ST and MT tasks together helps to preserve more information from the original MT decoder and partially remedies the catastrophic forgetting  during the fine-tuning phase.** On the other hand, after rolling parameters back to the initial ASR model, the jointly trained model shows a larger degradation for the encoder layers. This means that the speech encoder in the jointly trained model has deviated far away from the speech encoder in the initial ASR task. We conclude that the shared decoder is subject to more constraints since it is optimized toward both MT and ST tasks while the speech encoder has to undergo larger changes in order to align with the text encoder, although there is no parameter sharing between two encoders. **JT-S-ASR and JT-S-MT**  Results for models with the top encoder layers shared are presented in and [\[fig:imp_jt_mt\]](#fig:imp_jt_mt){reference-type="ref" reference="fig:imp_jt_mt"}. In "JT-S-MT\", the top 6 shared encoder layers are initialized with the pretrained MT encoder. We illustrate their BLEU difference trajectories with dotted lines in (a) so they can be easily distinguished from other layers initialized from the ASR encoder. The BLEU difference for the top encoder layer is down from 20.2 to 17.6 when the parameters are replaced with the ones in the pretrained ASR encoder. It is further reduced to 10.0 if the shared layers are initialized with MT encoder layers. The BLEU differences in the decoder layers are mixed. The performance of "JT-S-ASR\" degrades quickly in the criticality test for the top decoder layer, while "JT-S-MT performs similarly in the test as "JT\" decoder. We argue that the top layers in the fine-tuned ST encoder might be closer to the MT encoder than the ASR encoder. **It preserves more information from the MT task by sharing more parameters between two tasks and initializing them with pretrained MT modules**. This is a desirable property since we want to transfer more knowledge from the text corpus to the ST task. ## Modality Variation The jointly trained model takes input from two modalities, i.e. text or speech, and we are interested in the model internal representation difference for paired inputs. Given text target \(\mathbf{y}\), we extract the decoder hidden state representations for the corresponding text input \(\mathbf{x}_t\) and speech input \(\mathbf{X}_s\). The decoder representation difference solely comes from different input modalities. The difference is quantified by the correlation coefficient over all samples evaluated between two input modalities: \[r^{s,t}(l,d) = \frac{\sigma_{st}(l,d)}{\sigma_s(l,d)\sigma_t(l,d)}\] where \(\sigma_z(l,d), z\in [s,t]\) is the standard deviations of decoder hidden states at layer \(l\) for component \(d\) in all samples, and \(\sigma_{st}(l,d)\) is the corresponding covariance. The layer-wise correlation coefficient is the average of all components: \[r^{s,t}(l) = \frac{1}{D} \sum_d r^{s,t}(l,d)\] depicts the correlation coefficient between speech input and text input for each decoder layer in the model "JT-S-MT\". The x-axis is the number of training epochs and the y-axis represents the correlation coefficient for each layer. There are two observations. First, the correlation coefficients become larger and close to "1.0\" as training converges. Second, the higher the layer, the smaller the correlation coefficient. We hypothesize that the inputs to the lower layers are dominated by the decoder text embeddings, which are the same for both modalities, and the inputs to the higher layers would contain more information from the encoder outputs, which result in the decoder internal representation differences. **The analysis shows a well trained MTL decoder has similar representations for paired text and speech input. However, the top decoder layers still have nontrivial representation differences due to different modalities**. # Experimental Results {#sec:expt_rst} ## Main Results The main ST results are presented in . The first three rows are results from the literature. "ST\" and "JT\" are models initialized as and studied in . The last row ("JT Proposed\") presents results from the proposed system, in which the top encoder layers and decoder are shared, and the models are optimized following . The second column ("\#pars(m)\") lists the number of parameters used during inference. From , our "ST\" baseline is comparable to the previously reported results except , who use a much larger model and additional weakly supervised speech training data. As expected, the vanilla joint training baseline ("JT\") outperforms the "ST\" baseline with the help of extra bitext training data. Finally, the proposed joint training model ("JT Proposed\") achieves 2.0\(\sim\)`<!-- -->`{=html}2.7 BLEU gains over the strong joint training baseline ("JT\"). ## Ablation breaks down the performance gains into individual components/changes. Sharing encoder layers improves the quality for all three language pairs ("JT\" v.s. "JT-S-ASR\"). Initializing the shared encoder layers with pretrained MT modules leads to BLEU increase for two of the three evaluated translation pairs ("JT-S-ASR\" v.s. "JT-S-MT\"). For EN-FR, the degradation is minimal (-0.1 BLEU). Overall, sharing top encoder layers can increase BLEU by 0.2\(\sim\)`<!-- -->`{=html}0.7 ("JT-S-MT\" v.s. "JT\"). CAR further improves the translation by another 0.3\(\sim\)`<!-- -->`{=html}0.9 BLEU. The best results are achieved by applying the shared top encoder layers, CAR and online KD together. They are about 2.9+ BLEU better than the single task based system ("ST\") and achieve 2+ BLEU increase on top of the strong vanilla joint training system("JT\"). demonstrates the model variation for the proposed system on the [MuST-C]{.smallcaps} EN-DE dev set. Compared with , the decoder shows less degradation during the criticality test and it shows CAR and online KD help to preserve more information from the MT task. shows the corresponding correlation coefficients between paired text and speech input from the top decoder layer from different model configurations. It also confirms that the proposed methods, i.e., shared top encoder layers, CAR and online KD, all reduce the modality difference substantially. ## Task Dependent Components In MLT, many works  employ task-dependent components to alleviate the negative transfer effect. In , we compare the "JT-S-MT\" model with two variants using different task-dependent components. The first one ("JT-S-MT + Adapter\")  adds an extra adapter module on the top of the speech encoder. Hence, the speech encoder outputs, which are generated from shared encoder layers, are further processed to reduce the difference between speech input and text input. The adapter module consists of a linear layer and layer normalization layer. The second variant ("JT-S-MT + Dedicated Attention\")  introduces dedicated decoder modules for different tasks. Attention layers between encoder and decoder, and the layer normalization modules are not shared between the ST and MT tasks. It gives the decoder more flexibility to handle information from different modalities. The results show the extra adapter layer doesn't bring gain while the task dependent attention module actually makes the performance worse. It indicates that the negative transfer effect is not significant in this study and adding extra task-dependent components might not be necessary. ## Impact on the MT Task  [\[sec:expt_mt\]]{#sec:expt_mt label="sec:expt_mt"} As shown in , training ST models with an auxiliary MT task improves the translation quality substantially. It may be interesting to examine the impact on the auxiliary task itself. We evaluate the MT model jointly trained with the ST task. Results are shown in . "ST (JT Proposed)\" in the first row corresponds to the best results obtained for the ST task. The detailed experimental setup is described in . For reference, we also include the MT evaluation results from [MuST-C]{.smallcaps}  in the second row. All MT models (in the last 4 rows) take phoneme sequences as input instead of SentencePiece. "MT\" (row 3) shows the results from pretrained MT models on WMT. In the "MT (Tuned)\" row, the MT models pretrained on WMT are fine-tuned on the [MuST-C]{.smallcaps} datasets. The large improvements clearly show a domain mismatch between WMT and [MuST-C]{.smallcaps}. The MT models trained with WMT data are improved after fine-tuning, and they are comparable with the ones reported in  , though the input token is in pronunciation form, which is more ambiguous than the corresponding SentencePiece unit. "MT (JT)\" and "MT (JT Proposed)\" are results from the co-trained MT models in "JT\" and "JT Proposed\" respectively. After fine-tuning using both MuST-C (speech and text) and WMT (text only) training data, the auxiliary MT models perform better than the corresponding ST models. The proposed techniques further improve the co-trained MT models by 0.7\(\sim\)`<!-- -->`{=html}1.6 BLEU. While this is a surprising result, we note that the dedicated MT models may be improved with better hyperparameter tuning. In conclusion, the results show the proposed methods are effective to unify two tasks into one model with minimal negative transfer effect. # Conclusions In this study, we focus on understanding the interactions between the ST and MT tasks under the MTL framework, and on boosting the performance of the primary ST model with the auxiliary MT task. Two types of analysis on model variation and modality variation, are conducted on the MTL models. The analysis demonstrates MTL helps to preserve information from the MT task and generates similar model representations for different modalities. We observe a minimal negative transfer effect between the two tasks. Sharing more parameters can further boost the information transfer from the MT task to the ST model. The analysis also reveals that the model representation difference due to modality difference is nontrivial, especially for the top decoder layers, which are critical for the translation performance. Inspired by the findings, we propose three techniques to increase knowledge transfer from the MT task to the ST task. These techniques include parameter sharing and initialization strategy to improve the information sharing between tasks, CAR and online KD to encourage the ST system to learn more from the auxiliary MT task and then generate similar model representations from different modalities. Our results show that the proposed methods improve translation performance and achieve state-of--the-art results on three [MuST-C]{.smallcaps} language pairs. [^1]: The source code will be released at https://github.com/pytorch/fairseq/tree/master/examples/speech\ \_text_joint_to_text
{'timestamp': '2021-07-14T02:06:51', 'yymm': '2107', 'arxiv_id': '2107.05782', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05782'}
null
null
# Introduction Error-correcting codes are among the most widely used tools and objects of study in information theory and theoretical computer science. The most common model of corruption that is studied in the TCS literature is that of errors or erasures. The model in which each symbol of the transmitted word is either replaced with a different symbol from the alphabet (an error) or with a '?' (an erasure). The theory of such codes began with the seminal work of Shannon,, who studied random errors and erasures and the work of Hamming who studied the adversarial model for errors and erasures. These models are mostly well understood, and today we know efficiently encodable and decodable codes that are optimal for Shannon's model of random errors. For adversarial errors, we have optimal codes over large alphabets and good codes (codes of constant relative rate and relative distance) for every constant sized alphabet. Another important model that has been considered ever since Shannon's work is that of *synchronization* errors. These are errors that affect the length of the received word. The most common model for studying synchronization errors is the insertion-deletion model (insdel for short): an insertion error is when a new symbol is inserted between two symbols of the transmitted word. A deletion is when a symbol is removed from the transmitted word. For example, over the binary alphabet, when \(100110\) is transmitted, we may receive the word \(1101100\), which is obtained from two insertions (\(1\) at the beginning and \(0\) at the end) and one deletion (one of the \(0\)'s at the beginning of the transmitted word). Observe that compared to the more common error model, if an adversary wishes to *change* a symbol, then the cost is that of two operations-first deleting the symbol and then inserting a new one instead. Insdel errors appear in diverse settings such as optical recording, semiconductor devices, integrated circuits, and synchronous digital communication networks. Another important example is the trace reconstruction problem, which has applications in computational biology and DNA-based storage systems. See the surveys for a good picture of the problems and applications of error-correcting codes for the insdel model (insdel codes for short). Reed-Solomon codes are the most widely used family of codes in theory and practice. Indeed, they have found many applications both in theory and in practice (their applications include QR codes, secret sharing schemes, space transmission, encoding data on CDs and more. The ubiquity of these codes can be attributed to their simplicity as well as to their efficient encoding and decoding algorithms. As such, it is an important problem to understand whether they can also decode from insdel errors. This problem received a lot of attention recently, but besides very few constructions (i.e., evaluation points for Reed-Solomon codes), not much was known before our work. We discuss this line of work in more detail in Section [1.2](#sec:prev-results){reference-type="ref" reference="sec:prev-results"}. In this paper, we first prove that there are Reed-Solomon codes that achieve the half-Singleton bound. In other words, there are optimal Reed-Solomon codes also against insdel errors. We also give a set of evaluation points that define a Reed-Solomon code that achieves this bound. As the field size that we get grows very fast, our construction runs in polynomial time only for very small values of \(\delta\). We also explicitly construct \(2\)-dimensional RS codes over a field size smaller than the previous known constructions. Unfortunately, we could not develop efficient decoding algorithms for our Reed-Solomon constructions, and we leave this as an open problem for future research. ## Basic definitions and notation For an integer \(k\), we denote \([k]=\{1,2,\ldots,k\}\). Throughout this paper, \(\log(x)\) refers to the base-\(2\) logarithm. For a prime power \(q\), we denote with \(\mathbb{F}_q\) the field of size \(q\). We denote the \(i\)th symbol of a string \(s\) (or of a vector \(v\)) as \(s_i\) (equivalently \(v_i\)). Throughout this paper, we shall move freely between representations of vectors as strings and vice versa. Namely, we shall view each vector \(v=(v_1, \ldots, v_n)\in \mathbb{F}_q^n\) also as a string by concatenating all the symbols of the vector into one string, i.e., \((v_1, \ldots, v_n) \leftrightarrow v_1 \circ v_2 \circ \ldots \circ v_n\). Thus, if we say that \(s\) is a subsequence of some vector \(v\), we mean that we view \(v\) as a string and \(s\) is a subsequence of that string. An error correcting code of block length \(n\) over an alphabet \(\Sigma\) is a subset \(\mathcal{C}\subseteq \Sigma^n\). The rate of \(\mathcal{C}\) is \(\frac{\log|\mathcal{C}|}{n\log|\Sigma|}\), which captures the amount of information encoded in every symbol of a codeword. A linear code over a field \(\mathbb{F}\) is a linear subspace \(\mathcal{C}\subseteq \mathbb{F}^n\). The rate of a linear code \(\mathcal{C}\) of block length \(n\) is \(\mathcal{R}=\dim(\mathcal{C})/n\). Every linear code of dimension \(k\) can be described as the image of a linear map, which, abusing notation, we also denote with \(\mathcal{C}\), i.e., \(\mathcal{C}: \mathbb{F}^k \rightarrow \mathbb{F}^n\). Equivalently, a linear code \(\mathcal{C}\) can be defined by a *parity check matrix* \(H\) such that \(x\in\mathcal{C}\) if and only if \(Hx=0\). When \(\mathcal{C}\subseteq \mathbb{F}_q^n\) has dimension \(k\) we say that it is an \([n,k]_q\) code. The minimal distance of \(\mathcal{C}\) with respect to a metric \(d(\cdot,\cdot)\) is defined as \(\text{dist}_{\mathcal{C}}:= \min_{v\neq u \in \mathcal{C}}{d(v,u)}\). Naturally, we would like the rate to be as large as possible, but there is an inherent tension between the rate of the code and the minimal distance (or the number of errors that a code can decode from). In this work, we focus on codes against insertions and deletions. The relevant metric for such codes is the edit-distance that we define next. We next define Reed-Solomon codes (RS-codes from now on). In words, a codeword of an \([n,k]_q\) RS-code is the evaluation vector of some polynomial of degree less than \(k\) at \(n\) predetermined distinct points. It is well known (and easy to see) that the rate of \([n,k]_q\) RS-code is \(k/n\) and the minimal distance, with respect to the Hamming metric, is \(n-k+1\). ## Previous results {#sec:prev-results} Linear codes against worst-case insdel errors were recently studied by Cheng, Guruswami, Haeupler, and Li. Correcting an error in a preceding work, they proved that there are good linear codes against insdel errors. The proof of uses the probabilistic method, showing that, with high probability, a random linear map generates such code. Complementing their result, they proved that their construction is almost tight. Specifically, they provided the following upper bound, which they call "half-Singleton bound," that holds over any field. The performance of RS-codes against insdel errors was studied much earlier than the recent work of Cheng et al.. To the best of our knowledge, Safavi-Naini and Wang were the first to study the performance of RS-codes against insdel errors. They gave an algebraic condition that is sufficient for an RS-code to correct from insdel errors, yet they did not provide any construction. In fact, in our work, we consider an almost identical algebraic condition, and by simply using the Schwartz-Zippel-Demillo-Lipton lemma, we prove that there are RS-codes that meet this condition and, in addition, achieve the half-Singleton bound. In particular, RS-codes are optimal for insdel errors (see discussion in ). Wang, McAven, and Safavi-Naini constructed a \([5,2]\) RS-code capable of correcting a single deletion. Then, in, Tonien and Safavi-Naini constructed an \([n,k]\) generalized-RS-codes capable of correcting from \(\log_{k+1} n-1\) insdel errors. Similar to our results, they did not provide an efficient decoding algorithm. In another line of work Duc, Liu, Tjuawinata, and Xing, Liu and Tjuawinata, Chen and Zhang, and Liu and Xing studied the specific case of \(2\)-dimensional RS-codes. In, the authors presented constructions of \([n,2]\) RS-codes that for every \(\varepsilon>0\) can correct from \((1-\varepsilon)\cdot n\) insdel errors, for codes of length \(n=\poly(1/\varepsilon)\) over fields of size \(\Omega(\exp((\log n)^{1/\varepsilon}))\) and \(\Omega(\exp(n^{1/\varepsilon}))\), respectively. In, the authors present constructions of two-dimensional RS-codes that can correct from \(n-3\) insdel errors where the field size is exponential in \(n\). After a draft of this work appeared online, Liu and Xing constructed, using different approach than us, a two dimensional RS-codes over that can correct from \(n-3\) insdel errors, over a field size \(O(n^5)\). Specifically, they prove the following. ## Our results First, we prove that there are RS-codes that achieve the half-Singleton bound. Namely, they are optimal linear codes for insdel errors. Observe that the constructed code achieves the half Singleton bound: its rate is \(\mathcal{R} = k/n = (1-\delta)/2 + o(1)\) and \(\delta=(n-2k + 1)/n\). is an existential result and does not give an explicit construction. Using ideas from number theory and algebra, we construct RS-codes that can decode from \(n-2k+1\) adversarial insdel errors, in particular, they achieve the half-Singleton bound. Specifically, We note that for \(k = \omega(\log(n)/\log\log(n))\) the field size is \(\exp(n^{\omega(1)})\) and in particular, there is no efficient way to represent arbitrary elements of \(\mathbb{F}_q\) in this case. As discussed before, special attention was given in the literature to the case of two dimensional RS-codes. By using Sidon spaces that were constructed in, we explicitly construct a family of \([n,2]_q\) RS-codes that can decode from \(n-3\) insdel errors for \(q=O(n^4)\). Besides improving on all previous constructions in terms of field size, our construction also requires a smaller field size than the one guaranteed by the randomized argument in . Such phenomena, where a deterministic algebraic construction outperforms the parameters obtained by a randomized construction, are scarce in coding theory and combinatorics. Well-known examples are AG codes that outperform the GV-bound and constructions of extremal graphs with "many" edges that do not contain cycles of length \(4\), \(6\) or \(10\) (see ). We also prove a (very) weak lower bound on the field size. While for large values of \(k\), this bound is meaningless, it implies that when \(k=2\), the field size must be \(\Omega(n^3)\). Thus, the construction given in is nearly optimal. The gap between the field size in our construction and the one implied by the lower bound raises an interesting question: what is the minimal field size \(q\) for which an optimal \([n,2]_q\) RS-code exists? ## Proof idea To show that RS-codes can be used against insdel errors, we first prove an algebraic condition that is sufficient for \(n\) evaluation points to define an RS-code that can decode from insdel errors. This condition requires that a certain set of \(n^{O(k)}\) matrices, determined by the evaluation points, must all have full rank. Then, a simple application of the Schwartz-Zippel-DeMilo-Lipton lemma implies the existence of good evaluation points over fields of size \(n^{O(k)}\). To obtain a deterministic construction, we show that by going to much larger field size, one can find evaluation points satisfying the full-rank condition. While the field size needs to be of size roughly \(\Omega(n^{k^k})\), we note that, for not too large values of \(k\), it is of exponential size, and in this case, our construction runs in polynomial time. A key ingredient in the analysis of this construction is our use of the 'abc theorem' for polynomials over finite fields. For the case of \(k=2\), we use a different idea that gives a better field size than the one implied by the probabilistic argument above. We do so by noting that in this case the full-rank condition can be expressed as the requirement that no two different triples of evaluation points \((x_1,x_2,x_3)\) and \((y_1,y_2,y_3)\) satisfy \[\frac{y_1-y_2}{x_1-x_2} = \frac{y_2-y_3}{x_2-x_3} \;.\] This condition is reminiscent of the condition behind the construction of Sidon spaces of, and indeed, we build on their construction of Sidon spaces to define good evaluation points in a field of size \(O(n^4)\). ## Organization The paper is organized as follows. In , we prove . In , we prove . Finally, in , we prove and . is devoted to conclusion and open questions. # Reed-Solomon codes achieving the half-Singleton bound {#sec:rs-insdel} In this section, we prove our results concerning RS-codes. Specifically, we prove that RS-codes achieve the half-Singleton bound and give some explicit constructions. The proofs will follow by standard analysis of the LCS between any two distinct codewords. We begin by reformulating the condition on the maximum length of an LCS as an algebraic condition (invertibility of certain matrices). Then we show that an RS-code that satisfies this condition would have the maximum possible edit distance and hence would be able to decode from the maximum number of insdel errors. We remark that a similar approach already appeared in and we shall repeat some of the details here. ## An algebraic condition [^1]: Note that a longest common subsequence may not be unique as there can be a number of subsequences of maximal length. For example in the strings \(s=(1,0)\) and \(s'=(0,1)\).
{'timestamp': '2022-01-19T02:25:26', 'yymm': '2107', 'arxiv_id': '2107.05699', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05699'}
# Introduction 6G will intensify the handling of AI and ML for use cases from various corners of industry and life. 6G will be a network of \"integrated intelligence\" in which AI/ML algorithms are applied for autonomous networking and where the network will be redesigned to support the AI/ML based applications. The success of AI/ML algorithms requires large volume, updated data sets with similar statistical conditions in the training and testing phases. However, this is not the case for many real scenarios for two main reasons. First, collecting data and providing labeling are not always accessible (e.g., cyber attacks) and may involve high cost. Second, dynamic environments in real scenarios call for updating data sets regularly (e.g., fast and dynamic nature of the wireless channel and uncertainty in the behavior/mobility patterns of end users in intelligent transportation systems (ITS)). Re-collecting data in these scenarios and rebuilding models from scratch impose huge burdens for these use cases. Transfer learning (TL) or knowledge transfer (KT) is a promising approach to handle both of the above-mentioned challenges. In this context, it is possible to transfer lesson-learned parameters (knowledge) among learning algorithms that includes data sets, models, hyper parameters, and optimization approaches. In particular, each learning algorithm can be divided into two parts: 1) a domain containing feature data and its statistics; 2) a task involving models and labels. Typically in TL there are at least one source and one target AI/ML algorithms in TL where the knowledge of domain and/or task of the source is transferred to a target. Experience with TL shows that sharing domains and tasks can improve the speed of convergence and learning accuracy. this case will be refereed to \"a positive TL\". However, when there is not enough similarity and correlation among domains and tasks of the source and the target, TL might have negative effect on the performance of the target. Applications of TL in 6G and its positive potential in future networking has recently drawn a lot of attention, e.g., . In this paper, our goal is to study how we can attain efficient TL in 6G. We begin by looking at the TL categories. Then, we explain how 6G architecture planes can be modified to provide the efficient TL. We discuss the deployment of TL pipe-lines in the infrastructure, novel procedures in management plane to handle TL among sources and targets, new repositories and knowledge extraction modules in a training plane, and modifications in application plane. Based on the network layers, we provide examples about data sets and models that may be saved in repositories of the training plane in 6G. Fortunately, in wireless networks, there exist spatio-temporal and hierarchical correlations among AI/ML algorithms running in different nodes that are conducive to positive and efficient TL. Despite its great potential, TL in 6G introduces various implementation challenges. For example, use cases can impose diverse granularity requirements of TL in 6G involving real time, online/offline, and on-demand TL. And there are concerns about robustness, reliability, security, and privacy of pipe-lines for TL. We will discuss these implementation challenges in 6G and highlight the overheads of TL in 6G. In an evaluation section, we show how quantization approaches can be used with TL to reduce the extra overhead inside of 6G. The organization of this paper is as follows. In Section II, we briefly review TL. In Section III, we show how TL changes the 6G architecture. Section IV contains future research directions. In Section V, a deployment scenario for TL in 6G will be discussed; followed by conclusions in Section VI. # Transfer Learning Preliminaries Consider an AI/ML algorithm \(m\) that has : - *Domain*: consisting of a feature space \(\mathcal{X}_m\) for algorithm \(m\) and a marginal probability distribution \(P_m(\textbf{X}_m)\), where \(\textbf{X}_m = \{x^1_m,\cdots,x^n_m\} \in \mathcal{X}_m\), which constitute the domain \(\mathcal{D}_m=\{\mathcal{X}_m,P_m(\textbf{X}_m)\}\) - *Task*: involving a label space \(\mathcal{Y}_m\) and a predictive function \(f_m(\dot)\) which shows the relation between \(\mathcal{X}_m\) and \(\mathcal{Y}_m\), and the task is denoted by \(\mathcal{T}_m=\{\mathcal{Y}_m, f_m(.)\}\). In supervised learning mode, the data set \(m\) consists of \(\mathfrak{D}_m=\{(x_m^1, y_m^1), \cdots (x_m^n, y_m^n)\}\) and \(f_m(.)\) is found by minimizing the distance between the feature and the label spaces. In unsupervised learning mode, the task changes to \(\mathcal{T}_m=\{ f_m()\}\) since the labels are not available and the best predictive function is matched to the feature space. Traditionally, the domain \(\mathcal{D}_m\) and the task \(\mathcal{T}_m\) are fully disjoint from any other \(\mathcal{D}_n\) and \(\mathcal{T}_n\) for \(m \neq n\). However, in TL, parameters among domains and tasks \(m\) and \(n\) for all \(m\) and \(n\) can be shared, see Fig. [\[TL3\]](#TL3){reference-type="ref" reference="TL3"}. Any shared part of the domains or the tasks can be referred as \"knowledge\", e.g., all or the portion of the feature and the label spaces (data sets), or \(f(.)\) and its hyper-parameters (models). TL aims to improve the performance of \(\mathcal{T}_n\) with \(\mathcal{D}_m\) and \(\mathcal{T}_m\). We consider the following two key performance measures for target \(n\): - *Accuracy, consistency and generalization* of learning in the target domain: \(\eta^{TL}_n=\frac{P^{\text{TL}}_n}{P^{\text{Traditional}}_n}\) where \(P^{\text{TL}}_n\) and \(P^{\text{Traditional}}_n\) are the performance measures of the AI algorithm \(n\) with and without TL, respectively. - Training time in the target domain: \(\tau^{TL}_n=\frac{T^{\text{Traditional}}_n}{T^{\text{TL}}_n}\) where \(T^{\text{TL}}_n\) and \(T^{\text{Traditional}}_n\) are the training times of the AI algorithm \(n\) with and without TL, respectively. Now we can defined positive TL as a case that \(\eta^{TL}_n>1\) and \(\tau^{TL}_n>1\). The above definitions are for one source and one target and it can be extended to any set of sources and targets. From 6G's preservatives, to have successful TL, required bandwidth, delay, the level of security and privacy of passed knowledge between sources and targets should be determined. Also, the granularity of TL algorithm and the iteration number to pass knowledge between source and target should be determined. For instance, we can have following classes of interaction among source and targets: - *Real-time TL* where the knowledge is passed between source and target as soon as a new update is available; - *Non real-time or semi-real time TL* where the knowledge between the sources and the targets are passed according to a schedule; - *On-demand TL* where the knowledge is passed from the source to the target when a request from the target is initiated. These types of interactions together with the end-to-end (E2E) delay determine the required bandwidth between each source-target pair. These parameters can be used to deploy the pipe-line for TL, demonstrated in Fig. [\[TL3\]](#TL3){reference-type="ref" reference="TL3"}. An important point is that the TL pipe-line causes additional overhead and cost for passing knowledge. Below we identify different types of overheads and costs are incurred in TL. One approach to obtaining a single measure for overhead and cost is to use a weighted sum of the components: \[\begin{aligned} \lefteqn{\Theta^{\text{TL}}_{mn}=\alpha_1 f_1(W_{mn})+ \alpha_2 f_2(D_{mn})}\\&& \,\,\,\,\,\,\,\,\,\,\,\, + \alpha_3 g_{mn}(\text{ interaction}) +\alpha_4 h_{mn}(\text{security}), \nonumber \end{aligned}\] where \(\alpha_1, \alpha_2, \alpha_3, \alpha_4\) are regularization weights and functions are defined as: - \(f_1(W_{mn})\) and \(f_2(D_{mn})\) are increasing and decreasing functions of required E2E bandwidth \(W_{mn}\) and delay \(D_{mn}\), respectively; - \(g_{mn}(\text{ interaction})\) shows the cost per interaction class, defined as \[g_{mn}(\text{ interaction}) = \left\{\begin{array}{lr} M_1, & \text{if} \,\, \text{Real-time},\\ M_2, & \text{if } \,\,\text{Non-Real time},\\ M_3 & \,\,\text{Otherwise,} \end{array}\right.\] where \(M_1\), \(M_2\), \(M_3\) are positive values demonstrating the costs related to each class and they can be set as \(M_1\geq M_2 \geq M_3\) by wireless network infrastructure providers. The good policy also can be designed to reduce the cost of overhead, for instance by sending the TL knowledge among the source and the target in non-rush hour time windows. - \(h_{mn}(\text{security})\) is the security related cost function and it is an increasing function with the level of requested by source \(m\) and target \(n\). Clearly, decreasing the overhead while attaining positive performance of the learning AI are major indicators of effectiveness of TL in 6G. There are several categories of TL based on *what* can be transferred among sources and targets and the similarities and differences between their domains and tasks. For example, based on the availability of labels, there are three categories of TL: - Transductive TL where the label data is available only from the source not the target and \(\mathcal{D}_m\neq \mathcal{D}_n\) while \(\mathcal{T}_m = \mathcal{T}_n\) - Inductive TL where label data are available for the source and targets but the tasks are different, i.e., \(\mathcal{T}_m \neq \mathcal{T}_n\) - Unsupervised TL where the label data is not available in neither source or target Based on domains, we have - Heterogeneous TL where \(\mathcal{D}_m \neq\mathcal{D}_n\) - Homogeneous TL where \(\mathcal{D}_m=\mathcal{D}_n\) and based on the solution approach, we have - Instance-based TL where samples of data sets are shared between the source and target - Feature-based TL where original features of the source are matched to target ones, or where for both source and target features, latent features or common features are discovered. - Parameter-based TL which involves transferring the parameters of models - Relational-based TL which transfer the learned rules from source to the target In the following, we will discuss how TL should be processed in 6G and give examples of the above categories of TL in 6G. # Aspects of Efficient TL in 6G In this section, we study effects of TL in 6G and show how 6G should be adapted to serve AI/ML use cases. Many AI/ML use cases in 6G involve learning/control loops containing *monitoring, analysis, policy, execution plus knowledge* steps, denoted as (MAPE-K) loops. A MAPE-K loop provides a unified way to represent these AI/ML based applications. TL can be deployed between ML algorithms that are normally present in the analysis step of MAPE-K loops associated diverse services in OTT, and/or networking applications (NAL). In this paper, for simplicity, we assume there is one MAPE-K loop per each AI/ML algorithm which can be a target or a source of TL. Let's start our discussions with some examples to show how TL can be used in 6G. ## Examples of TL in 6G In 6G, many use cases in networking share the spatio-temporal features or similar information in performing various tasks. Let's focus on resource allocation (RA), energy efficiency (EE), and admission control (AC) of radio access networks (RANs) for one specific area in 6G. There are several access nodes, e.g., ORANs, in a region that provide coverage (see Fig. [\[fig:TL4\]](#fig:TL4){reference-type="ref" reference="fig:TL4"}). All of these tasks utilize the mobility pattern and traffic pattern of end-users. Therefore, the domains are similar but the tasks are different. Any ORAN can share its own domain among its own different tasks. Also, ORAN 1 can share its own task and domain for the resource allocation (RA) with the resource allocation (RA) in ORAN 2; which is an example of to transduction TL where the source is RA in ORAN 1 and the target is RA in ORAN 2. If the resource allocation (RA) in RAN 2 also shares its domain or tasks with the resource allocation (RA) in RAN 1, we have inductive TL. If both RANs do not have labeled data, there is unsupervised learning among them. The resource allocation (RA) in ORAN 1 and ORAN 2 can share their knowledge in real-time, non-real time and on-demand cases. For the last two cases, depending on the amount of available bandwidth, TL among ORAN 1 and ORAN 2 can be scheduled to reduce \(\Theta^{\text{TL}}_{\text{ORAN1}, \, \text{ORAN2}}\). The same is true for the energy efficiency (EE) in both ORAN 1 and ORAN 2. However, there is a chance that the energy efficiency (EE) decision is in contrast with an RA decision. For instance, the resource allocation (RA) requires more resource to guarantee the QoS while the energy efficiency (EE) asks for less power consumption and releasing some resources. These examples demonstrate the importance of interaction and TL management in 6G. These AI/ML algorithms can share the domains and tasks with another part of the RAN in different cities or different locations. In this case, we can have parameter or instance or feature based TL. The resource allocation, admission control, and the energy efficiency in ORANs of one area can share their models and data sets with the core elements to derive more large scale mobility patterns and network user behaviors. In this case, one probable scenario is to share the domain of RANs with the core to increase the size of data sets of core elements without additional cost. The knowledge can be fully or partially shared among AI/ML algorithms in 6G. The mobility pattern of 6G nodes, which arises from NAL applications, can be transferred to ITS, which is an OTT application, or vice versa. Various types of TL can be applied here. The similarity between these two use cases is obvious. However, 6G can encounter more complex scenarios. For example, for cyber-security, 6G may require a behaviour and traffic model of legitimate users of OTT use cases. In this case, the domains and the tasks of both cases are not correlated. Therefore, we have heterogeneous TL here, and any solution based categories of TL can be applied. ## Hierarchy and Spatio-temporal Features of 6G and TL Wireless networks have hierarchical structures. Also, our examples in the previous section show that there is an inherent spatio-temporal feature among different location zones, RANs, and core entities. These features help create positive TL in 6G for clustering and classifications AI/ML algorithms. Therefore, hierarchy and Spatio-temporal features of traffic of users in 6G can be used as the criteria for the clustering AI/ML algorithms for TL. In Figs. [\[fig:TL2\]](#fig:TL2){reference-type="ref" reference="fig:TL2"} (a) and (b), we plot some models of interaction of AI/ML algorithms for TL in 6G which can basically derived from both hierarchy or spatio-temporal feature of 6G. In Fig. [\[fig:TL2\]](#fig:TL2){reference-type="ref" reference="fig:TL2"}, we present three models: - Cascade AI/ML algorithms in (i) which can show the neighboring ORANs transferring their models and data sets for mobility or traffic patterns of users - Hierarchical AI/ML algorithms in (ii) which can represent the interaction between access and core elements in TL - Parallel AI/ML algorithms (iii) belong to the case that the similar nodes (base stations, switches, storage devices) collaborate to learn the similar models based on their local data sets through the concept of federated learning (FL). Also, they can share their public (not very sensitive data sets in terms of privacy) with their peers. This hierarchical structure inside of 6G can help to find the correlation, similarities, and relation among sources and targets. ## 6G Architecture Modifications We see the 6G architecture as including four planes to serve these use cases and to handle their needs associated with TL. We define responsibilities of each plane as follows: - **Application Plane** which represents the MAPE-K loops as chains of functions/services that implement the data collection processing and action pipe-lines that implement the loops, along with their required QoS and QoE. The ML algorithm(s) in each MAPE-K loop can be the source or target for algorithms in other MAPE-K loops. Application plane determines following items for TL: - A list of trustful targets; - A list of trustful sources; - Parts of models and tasks that are allowed to be shared; - Required levels of security and privacy; - TL angularity with any specific source and target; - Privacy and security level; - Required E2E delay for TL with any specific source and target; - Required bandwidth for any allowable TL. The above parameters help to determine the service level agreement (SLA) for any pair of the source and target in TL. These SLAs will be used in 6G to establish appropriate pipe-lines per each MAPE-K loop. - **Infrastructure Plane** which is an E2E cloud-native, multi-tier, programmable structure with virtualized communication and computation resources. This plane inherits the software defined and virtualized structures of 5G and it is responsible to provide TL pipe-lines from sources and targets for both OTT and NAL applications. The request for setting up a TL pipe-line is sent by a management plane to the infrastructure plane. Other pipe-line parameters are derived from SLAs in application plane. - **Management Plane** which is in charge of monitoring all running services and Required admission for new requests of services in fully autonomous manner. In 6G, this plane should include procedures to handle the conflicts that may arise among MAPE-K loops, pertaining to the consistency and coherency of loops, and TL management. These new procedures along with orchestrator and infrastructure management are shown in boxes in Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}. TL manager has following tasks: - Determining who can initiate TL among MAPE-K loops and services in 6G. For instance, among networking applications, TL request can be issued by network elements (decentralized manner) or can be handled by the orchestrator (centralized manner). For the OTT applications, the request can be originate with the OTT applications; - Determining authorized TLs among MAPE-K loops; - Initiating and handling TL for one or multiple service/infrastructure providers and OTT slices for different organizations. The request for setting up TL pipe-line among MAPE-K loops can be initiated from use cases. For example in an OTT, an Intelligent Transportation System (ITS) may send a request for TL to get data about the mobility pattern of users. In a NAL setting, a request for TL can be started by network management plane. In both cases, the orchestartor will handle the setup procedure for providing the TL pipe-line in the infrastructure by monitoring security, reliability, and privacy. In general, all the *coordination* among sources and targets are handled by this plane. This task is more complex when dealing with multi-source multi-task TL and when the sources and targets are in different networks or OTT applications. - **Training Plane** which is a new plane in 6G to integrate AI and ML into the network and to provide sandboxes that mimic the real environment with the goal of training, retraining and examining any AI based use cases in offline, near-online and online manner . To support TL, this plane provides an environment to measure the TL positive effects on the targets' learning procedures. It should learn the similarity and correlations among sources and targets to attain positive TL for both NAL and OTT use cases. It also needs to be equipped with the means to extract the knowledge from domains and tasks of each AI based application. We represent these tasks in four boxes in Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}, defined as:\ 1) *Sandboxes* which are responsible to provide simulation/ emulation environments for TL, clustering and finding the beneficial correlation among sources and targets. These reports should be sent to the second box of the management plane.\ 2) *Knowledge extraction* which can provide parameters from domains and tasks of sources and targets for TL (knowledge). This knowledge is ready to transfer between source-target pairs depending on TL categories.\ 3) *Repositories of data and knowledge* which are storage units to store and retrieve knowledge for TL among sources and targets. In 6G, the training and management plane have tight interaction to attain efficient TL. All actions in boxes in the training plane are sent to the management plane to execute the interaction and knowledge transfer among the MAPE-K loops. In Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}, we show arrows between boxes to highlight the importance of these interfaces. ## Repository of Knowledge of TL in 6G In the repository, the models and data sets of each target-source pair can be stored and used for TL among similar/correlated OTT and networking use cases when permitted. For instance, the following information can be stored in the repository: - End-Users which are smart phones, IoT devices (e.g., smart watches), autonomous vehicles, and sensors. These devices can share the following: - Models and data sets related to UE/Session related parameters, e.g., mobility pattern, spatio-temporal traffic model, wireless channel and coverage model, QoS, and QoE. - Radio-access level devices including base stations, radio remote heads (RRHs), cloud radio access networks (CRAN) or open RANs (ORANs) where they provide coverage for specific area. These entities can share the following: - Models and data sets per each region for spatio-temporal traffic and mobility models of users in that area, network measurements and logs, RAN-related parameters (e.g., channel quality), load, interference, user density. resource condition parameters (e.g., availability of front-haul), reliability and robustness of services. - Core-level devices including switches, firewalls, packet gateways, computing devices, storage devices of the users' information, and clouds inside of the networks, which can share the following: - Models and data sets for processing load and availability of core functions (both virtual and physical), load and availability of computing resources, large scale spatio-temporal traffic and mobility per zone for each type of services and slices, core network measurements and logs, and procedure level task information. - OTT and service applications including traditional data and voice services, smart services for different sectors of industry, and slices which can provide - Models and data sets for slice QoS and QoE, slice isolation, spatio-temporal traffic and mobility per slice, measurements, and logs per slices, - Management level which includes all the OSS and BSS parameters and they can share the following parameters inside of the network or with another network provider: - Models and data sets for fault, configuration, accounting, performance, and security (FCAPS) and the management reports Repository of knowledge in TL can be handled by training plane where seasonal, daily, and weekly patterns of any knowledge, models and data sets can be provided for different MAPE-K loops. However, the management plane takes care of initiating and allowing the TL procedures between any source and target in private and secure manner. # Challenges and Future Works TL will play an important role in simplifying and streamlining the use of AI and ML in 6G networks. One of the major challenges of deploying TL is to deal with the vast number of possible approaches and formulations, so choosing the best TL approach is a major implementation challenge in 6G. Also, TL mechanism should be tuned based on the use case which poses the challenge of finding new procedures to handle TL in more general manner. There exist overlaps between TL and other concepts such as federated learning, semi-supervised learning, multi-view learning, and most importantly, multi-task learning. Having a unified view of TL and highlighting its overlaps with other context can unlock the potential of TL in 6G. Adaptation of TL for reinforcement learning (RL) in dynamic environment is another challenge. Here, to have positive TL, transformation of different parts of the information from the source (e.g., state-space, action-space, reward, and transition dynamics) to the target should be studied. Since there is more spatio-temporal dynamic behavior in the system, TL needs more adaptation of the parameters. Most of the recent works are well-tuned approaches for specific applications of TL in RL. Framework-agnostic TL for RL is of desirable in 6G. Positive TL requires appropriate clustering, correlation, and similarity detection among sources and targets. This can be efficiently handled for homogeneous TL among sources and tasks. However, in heterogeneous scenarios, adapting the source and target domains and tasks are not trivial. Deriving latent variables in data sets of different AI/ML algorithms can also lead to positive TL and attain the better clustering and similarities among tasks. In the most works, TL is used for a pair of one source and one target. However, as mentioned in the examples above, in 6G, there is a set of sources aiming to share their information with a set of targets. Expanding all the existing formulations of one source-target pair TL to multi-source multi-target TL in 6G can be considered as another future research direction. Preserving the required security and privacy and preventing any threat from attackers during the knowledge transfer among AI/ML algorithms are also another important issue for efficient TL in 6G. TL in 6G should be immunized against eavesdropping, GAN attacks (for models and data sets), poisoning, and Sybil attacks. # Deployment Scenario: Quantization to Reduce TL Overhead To overcome TL extra overhead in 6G, in this section, we study how quantization algorithms can compensate this practical challenge. Quantization in this context is a class of techniques for performing computations and storing tensors at less number of bits than floating point case. Consequently, a quantized model executes some or all of the operations on tensors with integers rather than floating point values, leading to a more compact model representation for DNNs. We implement TL pipe-line between two neural networks in which one of them is trained on the CIFAR-10 data set and the neural network model is MobileNetV2 and we apply. Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"} shows the performance of quantized algorithms with the case that the exact values of weights are passed among neural networks, i.e., *Floating point method* which requires 32 bits of data per weights of neural networks. In Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"}, the accuracy of training phase shows the performance of floating point approach versus following quantization algorithms for 8 bits per each weight: - *Default* quantization approach which applies uniform quantization levels between minimum and maximum values of weights - *FBGEMM* where by considering the distribution of the weights, quantization levels is adjusted which leads to better accuracy compared to *Default* quantization approach - *Quantization aware training (QAT)* In the above approaches, quantization is applied at the end of the model training. In this approach, after that, the model is fine-tuned on the quantized weights by training a couple of more iterations to improve the accuracy. In our experiments, this method leads to 1% better accuracy compared to *FBGEMM* from Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"}. Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"} highlights that by 75% decreasing the load of the network (8 bits/32 bits) (\(f_{mn}(\text{interaction})\)), still the accuracy of training phase is in the acceptable range for *QAT*. To demonstrate it figuratively, in Fig. [\[fig:quantization-size\]](#fig:quantization-size){reference-type="ref" reference="fig:quantization-size"}, the size of the quantized model is compared to that of the original model. As shown in this figure, the size of the model is reduced to 75%. This simulation shows that the quantization is an appropriate method to make a trade-off between performance and amount of messages in the AI-aaS based networks. After passing the quantized weights, we can re-tune the final layer of the model in the target to increase the accuracy. We use a Pytorch tutorial of \"Quantized Transfer Learning for Computer Vision\" and its colab version . By re-training the model at the target, the accuracy level will be increased up to the case without quantization. The re-training phase in the target takes \(3\) m and \(16\) sec versus while full training requires \(10\) m and \(16\) sec for convergence. On the other hand, we have \(\tau^{\text{TL}}=3.142\), meaning that TL can improve the energy efficiency with the factor \(\tau^{\text{TL}}\), and consequently, improving sustainability in 6G. # Conclusion In this paper, we address how efficient transfer learning (TL) in 6G can be attained. We introduce metrics to assess efficiency TL from both learning algorithm and networking aspects. We discuss possible modifications in 6G architecture to handle TL and we define new elements in the network management plane. We focus on new activities in training plane and its repositories for TL in 6G. With some examples and looking at spatio-temporal features of wireless networks, we show how classifications and clustering of algorithms in 6G can be attained to reach efficient TL. For positive TL, we require more unified view of TL approaches with security and privacy guarantees discussed in this paper. # Introduction 6G will intensify the handling of AI and ML for use cases from various corners of industry and life. 6G will be a network of \"integrated intelligence\" in which AI/ML algorithms are applied for autonomous networking and where the network will be redesigned to support the AI/ML based applications. The success of AI/ML algorithms requires large volume, updated data sets with similar statistical conditions in the training and testing phases. However, this is not the case for many real scenarios for two main reasons. First, collecting data and providing labeling are not always accessible (e.g., cyber attacks) and may involve high cost. Second, dynamic environments in real scenarios call for updating data sets regularly (e.g., fast and dynamic nature of the wireless channel and uncertainty in the behavior/mobility patterns of end users in intelligent transportation systems (ITS)). Re-collecting data in these scenarios and rebuilding models from scratch impose huge burdens for these use cases. Transfer learning (TL) or knowledge transfer (KT) is a promising approach to handle both of the above-mentioned challenges. In this context, it is possible to transfer lesson-learned parameters (knowledge) among learning algorithms that includes data sets, models, hyper parameters, and optimization approaches. In particular, each learning algorithm can be divided into two parts: 1) a domain containing feature data and its statistics; 2) a task involving models and labels. Typically in TL there are at least one source and one target AI/ML algorithms in TL where the knowledge of domain and/or task of the source is transferred to a target. Experience with TL shows that sharing domains and tasks can improve the speed of convergence and learning accuracy. this case will be refereed to \"a positive TL\". However, when there is not enough similarity and correlation among domains and tasks of the source and the target, TL might have negative effect on the performance of the target. Applications of TL in 6G and its positive potential in future networking has recently drawn a lot of attention, e.g., . In this paper, our goal is to study how we can attain efficient TL in 6G. We begin by looking at the TL categories. Then, we explain how 6G architecture planes can be modified to provide the efficient TL. We discuss the deployment of TL pipe-lines in the infrastructure, novel procedures in management plane to handle TL among sources and targets, new repositories and knowledge extraction modules in a training plane, and modifications in application plane. Based on the network layers, we provide examples about data sets and models that may be saved in repositories of the training plane in 6G. Fortunately, in wireless networks, there exist spatio-temporal and hierarchical correlations among AI/ML algorithms running in different nodes that are conducive to positive and efficient TL. Despite its great potential, TL in 6G introduces various implementation challenges. For example, use cases can impose diverse granularity requirements of TL in 6G involving real time, online/offline, and on-demand TL. And there are concerns about robustness, reliability, security, and privacy of pipe-lines for TL. We will discuss these implementation challenges in 6G and highlight the overheads of TL in 6G. In an evaluation section, we show how quantization approaches can be used with TL to reduce the extra overhead inside of 6G. The organization of this paper is as follows. In Section II, we briefly review TL. In Section III, we show how TL changes the 6G architecture. Section IV contains future research directions. In Section V, a deployment scenario for TL in 6G will be discussed; followed by conclusions in Section VI. # Transfer Learning Preliminaries Consider an AI/ML algorithm \(m\) that has : - *Domain*: consisting of a feature space \(\mathcal{X}_m\) for algorithm \(m\) and a marginal probability distribution \(P_m(\textbf{X}_m)\), where \(\textbf{X}_m = \{x^1_m,\cdots,x^n_m\} \in \mathcal{X}_m\), which constitute the domain \(\mathcal{D}_m=\{\mathcal{X}_m,P_m(\textbf{X}_m)\}\) - *Task*: involving a label space \(\mathcal{Y}_m\) and a predictive function \(f_m(\dot)\) which shows the relation between \(\mathcal{X}_m\) and \(\mathcal{Y}_m\), and the task is denoted by \(\mathcal{T}_m=\{\mathcal{Y}_m, f_m(.)\}\). In supervised learning mode, the data set \(m\) consists of \(\mathfrak{D}_m=\{(x_m^1, y_m^1), \cdots (x_m^n, y_m^n)\}\) and \(f_m(.)\) is found by minimizing the distance between the feature and the label spaces. In unsupervised learning mode, the task changes to \(\mathcal{T}_m=\{ f_m()\}\) since the labels are not available and the best predictive function is matched to the feature space. Traditionally, the domain \(\mathcal{D}_m\) and the task \(\mathcal{T}_m\) are fully disjoint from any other \(\mathcal{D}_n\) and \(\mathcal{T}_n\) for \(m \neq n\). However, in TL, parameters among domains and tasks \(m\) and \(n\) for all \(m\) and \(n\) can be shared, see Fig. [\[TL3\]](#TL3){reference-type="ref" reference="TL3"}. Any shared part of the domains or the tasks can be referred as \"knowledge\", e.g., all or the portion of the feature and the label spaces (data sets), or \(f(.)\) and its hyper-parameters (models). TL aims to improve the performance of \(\mathcal{T}_n\) with \(\mathcal{D}_m\) and \(\mathcal{T}_m\). We consider the following two key performance measures for target \(n\): - *Accuracy, consistency and generalization* of learning in the target domain: \(\eta^{TL}_n=\frac{P^{\text{TL}}_n}{P^{\text{Traditional}}_n}\) where \(P^{\text{TL}}_n\) and \(P^{\text{Traditional}}_n\) are the performance measures of the AI algorithm \(n\) with and without TL, respectively. - Training time in the target domain: \(\tau^{TL}_n=\frac{T^{\text{Traditional}}_n}{T^{\text{TL}}_n}\) where \(T^{\text{TL}}_n\) and \(T^{\text{Traditional}}_n\) are the training times of the AI algorithm \(n\) with and without TL, respectively. Now we can defined positive TL as a case that \(\eta^{TL}_n>1\) and \(\tau^{TL}_n>1\). The above definitions are for one source and one target and it can be extended to any set of sources and targets. From 6G's preservatives, to have successful TL, required bandwidth, delay, the level of security and privacy of passed knowledge between sources and targets should be determined. Also, the granularity of TL algorithm and the iteration number to pass knowledge between source and target should be determined. For instance, we can have following classes of interaction among source and targets: - *Real-time TL* where the knowledge is passed between source and target as soon as a new update is available; - *Non real-time or semi-real time TL* where the knowledge between the sources and the targets are passed according to a schedule; - *On-demand TL* where the knowledge is passed from the source to the target when a request from the target is initiated. These types of interactions together with the end-to-end (E2E) delay determine the required bandwidth between each source-target pair. These parameters can be used to deploy the pipe-line for TL, demonstrated in Fig. [\[TL3\]](#TL3){reference-type="ref" reference="TL3"}. An important point is that the TL pipe-line causes additional overhead and cost for passing knowledge. Below we identify different types of overheads and costs are incurred in TL. One approach to obtaining a single measure for overhead and cost is to use a weighted sum of the components: \[\begin{aligned} \lefteqn{\Theta^{\text{TL}}_{mn}=\alpha_1 f_1(W_{mn})+ \alpha_2 f_2(D_{mn})}\\&& \,\,\,\,\,\,\,\,\,\,\,\, + \alpha_3 g_{mn}(\text{ interaction}) +\alpha_4 h_{mn}(\text{security}), \nonumber \end{aligned}\] where \(\alpha_1, \alpha_2, \alpha_3, \alpha_4\) are regularization weights and functions are defined as: - \(f_1(W_{mn})\) and \(f_2(D_{mn})\) are increasing and decreasing functions of required E2E bandwidth \(W_{mn}\) and delay \(D_{mn}\), respectively; - \(g_{mn}(\text{ interaction})\) shows the cost per interaction class, defined as \[g_{mn}(\text{ interaction}) = \left\{\begin{array}{lr} M_1, & \text{if} \,\, \text{Real-time},\\ M_2, & \text{if } \,\,\text{Non-Real time},\\ M_3 & \,\,\text{Otherwise,} \end{array}\right.\] where \(M_1\), \(M_2\), \(M_3\) are positive values demonstrating the costs related to each class and they can be set as \(M_1\geq M_2 \geq M_3\) by wireless network infrastructure providers. The good policy also can be designed to reduce the cost of overhead, for instance by sending the TL knowledge among the source and the target in non-rush hour time windows. - \(h_{mn}(\text{security})\) is the security related cost function and it is an increasing function with the level of requested by source \(m\) and target \(n\). Clearly, decreasing the overhead while attaining positive performance of the learning AI are major indicators of effectiveness of TL in 6G. There are several categories of TL based on *what* can be transferred among sources and targets and the similarities and differences between their domains and tasks. For example, based on the availability of labels, there are three categories of TL: - Transductive TL where the label data is available only from the source not the target and \(\mathcal{D}_m\neq \mathcal{D}_n\) while \(\mathcal{T}_m = \mathcal{T}_n\) - Inductive TL where label data are available for the source and targets but the tasks are different, i.e., \(\mathcal{T}_m \neq \mathcal{T}_n\) - Unsupervised TL where the label data is not available in neither source or target Based on domains, we have - Heterogeneous TL where \(\mathcal{D}_m \neq\mathcal{D}_n\) - Homogeneous TL where \(\mathcal{D}_m=\mathcal{D}_n\) and based on the solution approach, we have - Instance-based TL where samples of data sets are shared between the source and target - Feature-based TL where original features of the source are matched to target ones, or where for both source and target features, latent features or common features are discovered. - Parameter-based TL which involves transferring the parameters of models - Relational-based TL which transfer the learned rules from source to the target In the following, we will discuss how TL should be processed in 6G and give examples of the above categories of TL in 6G. # Aspects of Efficient TL in 6G In this section, we study effects of TL in 6G and show how 6G should be adapted to serve AI/ML use cases. Many AI/ML use cases in 6G involve learning/control loops containing *monitoring, analysis, policy, execution plus knowledge* steps, denoted as (MAPE-K) loops. A MAPE-K loop provides a unified way to represent these AI/ML based applications. TL can be deployed between ML algorithms that are normally present in the analysis step of MAPE-K loops associated diverse services in OTT, and/or networking applications (NAL). In this paper, for simplicity, we assume there is one MAPE-K loop per each AI/ML algorithm which can be a target or a source of TL. Let's start our discussions with some examples to show how TL can be used in 6G. ## Examples of TL in 6G In 6G, many use cases in networking share the spatio-temporal features or similar information in performing various tasks. Let's focus on resource allocation (RA), energy efficiency (EE), and admission control (AC) of radio access networks (RANs) for one specific area in 6G. There are several access nodes, e.g., ORANs, in a region that provide coverage (see Fig. [\[fig:TL4\]](#fig:TL4){reference-type="ref" reference="fig:TL4"}). All of these tasks utilize the mobility pattern and traffic pattern of end-users. Therefore, the domains are similar but the tasks are different. Any ORAN can share its own domain among its own different tasks. Also, ORAN 1 can share its own task and domain for the resource allocation (RA) with the resource allocation (RA) in ORAN 2; which is an example of to transduction TL where the source is RA in ORAN 1 and the target is RA in ORAN 2. If the resource allocation (RA) in RAN 2 also shares its domain or tasks with the resource allocation (RA) in RAN 1, we have inductive TL. If both RANs do not have labeled data, there is unsupervised learning among them. The resource allocation (RA) in ORAN 1 and ORAN 2 can share their knowledge in real-time, non-real time and on-demand cases. For the last two cases, depending on the amount of available bandwidth, TL among ORAN 1 and ORAN 2 can be scheduled to reduce \(\Theta^{\text{TL}}_{\text{ORAN1}, \, \text{ORAN2}}\). The same is true for the energy efficiency (EE) in both ORAN 1 and ORAN 2. However, there is a chance that the energy efficiency (EE) decision is in contrast with an RA decision. For instance, the resource allocation (RA) requires more resource to guarantee the QoS while the energy efficiency (EE) asks for less power consumption and releasing some resources. These examples demonstrate the importance of interaction and TL management in 6G. These AI/ML algorithms can share the domains and tasks with another part of the RAN in different cities or different locations. In this case, we can have parameter or instance or feature based TL. The resource allocation, admission control, and the energy efficiency in ORANs of one area can share their models and data sets with the core elements to derive more large scale mobility patterns and network user behaviors. In this case, one probable scenario is to share the domain of RANs with the core to increase the size of data sets of core elements without additional cost. The knowledge can be fully or partially shared among AI/ML algorithms in 6G. The mobility pattern of 6G nodes, which arises from NAL applications, can be transferred to ITS, which is an OTT application, or vice versa. Various types of TL can be applied here. The similarity between these two use cases is obvious. However, 6G can encounter more complex scenarios. For example, for cyber-security, 6G may require a behaviour and traffic model of legitimate users of OTT use cases. In this case, the domains and the tasks of both cases are not correlated. Therefore, we have heterogeneous TL here, and any solution based categories of TL can be applied. ## Hierarchy and Spatio-temporal Features of 6G and TL Wireless networks have hierarchical structures. Also, our examples in the previous section show that there is an inherent spatio-temporal feature among different location zones, RANs, and core entities. These features help create positive TL in 6G for clustering and classifications AI/ML algorithms. Therefore, hierarchy and Spatio-temporal features of traffic of users in 6G can be used as the criteria for the clustering AI/ML algorithms for TL. In Figs. [\[fig:TL2\]](#fig:TL2){reference-type="ref" reference="fig:TL2"} (a) and (b), we plot some models of interaction of AI/ML algorithms for TL in 6G which can basically derived from both hierarchy or spatio-temporal feature of 6G. In Fig. [\[fig:TL2\]](#fig:TL2){reference-type="ref" reference="fig:TL2"}, we present three models: - Cascade AI/ML algorithms in (i) which can show the neighboring ORANs transferring their models and data sets for mobility or traffic patterns of users - Hierarchical AI/ML algorithms in (ii) which can represent the interaction between access and core elements in TL - Parallel AI/ML algorithms (iii) belong to the case that the similar nodes (base stations, switches, storage devices) collaborate to learn the similar models based on their local data sets through the concept of federated learning (FL). Also, they can share their public (not very sensitive data sets in terms of privacy) with their peers. This hierarchical structure inside of 6G can help to find the correlation, similarities, and relation among sources and targets. ## 6G Architecture Modifications We see the 6G architecture as including four planes to serve these use cases and to handle their needs associated with TL. We define responsibilities of each plane as follows: - **Application Plane** which represents the MAPE-K loops as chains of functions/services that implement the data collection processing and action pipe-lines that implement the loops, along with their required QoS and QoE. The ML algorithm(s) in each MAPE-K loop can be the source or target for algorithms in other MAPE-K loops. Application plane determines following items for TL: - A list of trustful targets; - A list of trustful sources; - Parts of models and tasks that are allowed to be shared; - Required levels of security and privacy; - TL angularity with any specific source and target; - Privacy and security level; - Required E2E delay for TL with any specific source and target; - Required bandwidth for any allowable TL. The above parameters help to determine the service level agreement (SLA) for any pair of the source and target in TL. These SLAs will be used in 6G to establish appropriate pipe-lines per each MAPE-K loop. - **Infrastructure Plane** which is an E2E cloud-native, multi-tier, programmable structure with virtualized communication and computation resources. This plane inherits the software defined and virtualized structures of 5G and it is responsible to provide TL pipe-lines from sources and targets for both OTT and NAL applications. The request for setting up a TL pipe-line is sent by a management plane to the infrastructure plane. Other pipe-line parameters are derived from SLAs in application plane. - **Management Plane** which is in charge of monitoring all running services and Required admission for new requests of services in fully autonomous manner. In 6G, this plane should include procedures to handle the conflicts that may arise among MAPE-K loops, pertaining to the consistency and coherency of loops, and TL management. These new procedures along with orchestrator and infrastructure management are shown in boxes in Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}. TL manager has following tasks: - Determining who can initiate TL among MAPE-K loops and services in 6G. For instance, among networking applications, TL request can be issued by network elements (decentralized manner) or can be handled by the orchestrator (centralized manner). For the OTT applications, the request can be originate with the OTT applications; - Determining authorized TLs among MAPE-K loops; - Initiating and handling TL for one or multiple service/infrastructure providers and OTT slices for different organizations. The request for setting up TL pipe-line among MAPE-K loops can be initiated from use cases. For example in an OTT, an Intelligent Transportation System (ITS) may send a request for TL to get data about the mobility pattern of users. In a NAL setting, a request for TL can be started by network management plane. In both cases, the orchestartor will handle the setup procedure for providing the TL pipe-line in the infrastructure by monitoring security, reliability, and privacy. In general, all the *coordination* among sources and targets are handled by this plane. This task is more complex when dealing with multi-source multi-task TL and when the sources and targets are in different networks or OTT applications. - **Training Plane** which is a new plane in 6G to integrate AI and ML into the network and to provide sandboxes that mimic the real environment with the goal of training, retraining and examining any AI based use cases in offline, near-online and online manner . To support TL, this plane provides an environment to measure the TL positive effects on the targets' learning procedures. It should learn the similarity and correlations among sources and targets to attain positive TL for both NAL and OTT use cases. It also needs to be equipped with the means to extract the knowledge from domains and tasks of each AI based application. We represent these tasks in four boxes in Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}, defined as:\ 1) *Sandboxes* which are responsible to provide simulation/ emulation environments for TL, clustering and finding the beneficial correlation among sources and targets. These reports should be sent to the second box of the management plane.\ 2) *Knowledge extraction* which can provide parameters from domains and tasks of sources and targets for TL (knowledge). This knowledge is ready to transfer between source-target pairs depending on TL categories.\ 3) *Repositories of data and knowledge* which are storage units to store and retrieve knowledge for TL among sources and targets. In 6G, the training and management plane have tight interaction to attain efficient TL. All actions in boxes in the training plane are sent to the management plane to execute the interaction and knowledge transfer among the MAPE-K loops. In Fig. [\[6Gtrainingmanagement\]](#6Gtrainingmanagement){reference-type="ref" reference="6Gtrainingmanagement"}, we show arrows between boxes to highlight the importance of these interfaces. ## Repository of Knowledge of TL in 6G In the repository, the models and data sets of each target-source pair can be stored and used for TL among similar/correlated OTT and networking use cases when permitted. For instance, the following information can be stored in the repository: - End-Users which are smart phones, IoT devices (e.g., smart watches), autonomous vehicles, and sensors. These devices can share the following: - Models and data sets related to UE/Session related parameters, e.g., mobility pattern, spatio-temporal traffic model, wireless channel and coverage model, QoS, and QoE. - Radio-access level devices including base stations, radio remote heads (RRHs), cloud radio access networks (CRAN) or open RANs (ORANs) where they provide coverage for specific area. These entities can share the following: - Models and data sets per each region for spatio-temporal traffic and mobility models of users in that area, network measurements and logs, RAN-related parameters (e.g., channel quality), load, interference, user density. resource condition parameters (e.g., availability of front-haul), reliability and robustness of services. - Core-level devices including switches, firewalls, packet gateways, computing devices, storage devices of the users' information, and clouds inside of the networks, which can share the following: - Models and data sets for processing load and availability of core functions (both virtual and physical), load and availability of computing resources, large scale spatio-temporal traffic and mobility per zone for each type of services and slices, core network measurements and logs, and procedure level task information. - OTT and service applications including traditional data and voice services, smart services for different sectors of industry, and slices which can provide - Models and data sets for slice QoS and QoE, slice isolation, spatio-temporal traffic and mobility per slice, measurements, and logs per slices, - Management level which includes all the OSS and BSS parameters and they can share the following parameters inside of the network or with another network provider: - Models and data sets for fault, configuration, accounting, performance, and security (FCAPS) and the management reports Repository of knowledge in TL can be handled by training plane where seasonal, daily, and weekly patterns of any knowledge, models and data sets can be provided for different MAPE-K loops. However, the management plane takes care of initiating and allowing the TL procedures between any source and target in private and secure manner. # Challenges and Future Works TL will play an important role in simplifying and streamlining the use of AI and ML in 6G networks. One of the major challenges of deploying TL is to deal with the vast number of possible approaches and formulations, so choosing the best TL approach is a major implementation challenge in 6G. Also, TL mechanism should be tuned based on the use case which poses the challenge of finding new procedures to handle TL in more general manner. There exist overlaps between TL and other concepts such as federated learning, semi-supervised learning, multi-view learning, and most importantly, multi-task learning. Having a unified view of TL and highlighting its overlaps with other context can unlock the potential of TL in 6G. Adaptation of TL for reinforcement learning (RL) in dynamic environment is another challenge. Here, to have positive TL, transformation of different parts of the information from the source (e.g., state-space, action-space, reward, and transition dynamics) to the target should be studied. Since there is more spatio-temporal dynamic behavior in the system, TL needs more adaptation of the parameters. Most of the recent works are well-tuned approaches for specific applications of TL in RL. Framework-agnostic TL for RL is of desirable in 6G. Positive TL requires appropriate clustering, correlation, and similarity detection among sources and targets. This can be efficiently handled for homogeneous TL among sources and tasks. However, in heterogeneous scenarios, adapting the source and target domains and tasks are not trivial. Deriving latent variables in data sets of different AI/ML algorithms can also lead to positive TL and attain the better clustering and similarities among tasks. In the most works, TL is used for a pair of one source and one target. However, as mentioned in the examples above, in 6G, there is a set of sources aiming to share their information with a set of targets. Expanding all the existing formulations of one source-target pair TL to multi-source multi-target TL in 6G can be considered as another future research direction. Preserving the required security and privacy and preventing any threat from attackers during the knowledge transfer among AI/ML algorithms are also another important issue for efficient TL in 6G. TL in 6G should be immunized against eavesdropping, GAN attacks (for models and data sets), poisoning, and Sybil attacks. # Deployment Scenario: Quantization to Reduce TL Overhead To overcome TL extra overhead in 6G, in this section, we study how quantization algorithms can compensate this practical challenge. Quantization in this context is a class of techniques for performing computations and storing tensors at less number of bits than floating point case. Consequently, a quantized model executes some or all of the operations on tensors with integers rather than floating point values, leading to a more compact model representation for DNNs. We implement TL pipe-line between two neural networks in which one of them is trained on the CIFAR-10 data set and the neural network model is MobileNetV2 and we apply. Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"} shows the performance of quantized algorithms with the case that the exact values of weights are passed among neural networks, i.e., *Floating point method* which requires 32 bits of data per weights of neural networks. In Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"}, the accuracy of training phase shows the performance of floating point approach versus following quantization algorithms for 8 bits per each weight: - *Default* quantization approach which applies uniform quantization levels between minimum and maximum values of weights - *FBGEMM* where by considering the distribution of the weights, quantization levels is adjusted which leads to better accuracy compared to *Default* quantization approach - *Quantization aware training (QAT)* In the above approaches, quantization is applied at the end of the model training. In this approach, after that, the model is fine-tuned on the quantized weights by training a couple of more iterations to improve the accuracy. In our experiments, this method leads to 1% better accuracy compared to *FBGEMM* from Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"}. Fig. [\[fig:quantization-acc\]](#fig:quantization-acc){reference-type="ref" reference="fig:quantization-acc"} highlights that by 75% decreasing the load of the network (8 bits/32 bits) (\(f_{mn}(\text{interaction})\)), still the accuracy of training phase is in the acceptable range for *QAT*. To demonstrate it figuratively, in Fig. [\[fig:quantization-size\]](#fig:quantization-size){reference-type="ref" reference="fig:quantization-size"}, the size of the quantized model is compared to that of the original model. As shown in this figure, the size of the model is reduced to 75%. This simulation shows that the quantization is an appropriate method to make a trade-off between performance and amount of messages in the AI-aaS based networks. After passing the quantized weights, we can re-tune the final layer of the model in the target to increase the accuracy. We use a Pytorch tutorial of \"Quantized Transfer Learning for Computer Vision\" and its colab version . By re-training the model at the target, the accuracy level will be increased up to the case without quantization. The re-training phase in the target takes \(3\) m and \(16\) sec versus while full training requires \(10\) m and \(16\) sec for convergence. On the other hand, we have \(\tau^{\text{TL}}=3.142\), meaning that TL can improve the energy efficiency with the factor \(\tau^{\text{TL}}\), and consequently, improving sustainability in 6G. # Conclusion In this paper, we address how efficient transfer learning (TL) in 6G can be attained. We introduce metrics to assess efficiency TL from both learning algorithm and networking aspects. We discuss possible modifications in 6G architecture to handle TL and we define new elements in the network management plane. We focus on new activities in training plane and its repositories for TL in 6G. With some examples and looking at spatio-temporal features of wireless networks, we show how classifications and clustering of algorithms in 6G can be attained to reach efficient TL. For positive TL, we require more unified view of TL approaches with security and privacy guarantees discussed in this paper.
{'timestamp': '2021-07-14T02:04:20', 'yymm': '2107', 'arxiv_id': '2107.05728', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05728'}
null
null
null
null
null
null
null
null
# Introduction Stress describes bodily reactions to perceived physical or psychological threats and is defined as the transition from a calm state to an excited state triggering a cascade of physiological response. In the United States of America, around \(77\%\) people suffer from headaches and insomnia for reasons related to stress, and there has been a steady increase in the number of people suffering from stress-related issues each year. Furthermore, stress plays a critical role in many health problems, such as depression, anxiety, high blood pressure, heart attacks, and stroke. Stress also influences a person's decision-making capability, attention span, learning, and problem-solving capacity. Stress detection and monitoring is an active research area with important implications for the personal, professional, and social health of an individual. Stress detection and monitoring can help prevent dangerous stress-related diseases. Towards this end, in this paper we propose, a novel Convolutional Neural Network (CNN) based framework for stress detection and classification, which uses raw Electrodermal Activity (EDA) sensor data without feature computation. Our approach is competitive with other state-of-the-art methods and does not suffers from many limitations inherent in earlier works. Figure [\[fig:system\]](#fig:system){reference-type="ref" reference="fig:system"} shows the general overview of a stress detection system used for real-time interventions to support the health of an individual. In this paper, we implement the stress classification pipeline, and in the future, we aim to use our classification model for strategic real-time interventions. [\[related_work\]]{#related_work label="related_work"} Usually, for stress detection and classification data from multiple sensor modalities such as heart rate variability (HRV), body acceleration (ACC), skin temperature, electrodermal activity (EDA), blood volume pulse (BVP), respiration rate, and electrocardiogram (ECG) are used to compute a large number of statistical and structural features to train machine learning algorithms. In, the authors computed \(67\) features from \(7\) sensor modalities to train a stress classification model with the best accuracy of \(92.28\%\). Using the same dataset, the authors in used Deep Neural Networks (DNN) and \(40\) statistical features to achieve an accuracy of \(95.21\%\). In the authors used statistical features and representation learned by a deep learning model as features to train the stress classification model with accuracy up to \(92\%\) with just EDA data. Motivated by the results from, the authors in computed \(195\) features in time, frequency, entropy, and wavelet domain from EDA data to train the XGBoost algorithm with the highest accuracy of \(92\%\). Feature selection was used to reduce the number of features to \(9\) for the best possible classification accuracy. Furthermore, some works have also explored ways not to use electrodermal activity for stress classification since most commercial smartwatches and smart health devices don't have sensors to measure galvanic skin response. In, authors used data from the built-in smartphone accelerometer sensor to identify activity that corresponds with stress levels and achieved an accuracy of \(71\%\). Also, in data from a commercial smartwatch was used for binary stress classification with accuracy up to \(83\%\). Using data from multiple sensors and computing a large number of features to train machine learning algorithms for stress classification has several disadvantages. Using numerous sensor modalities makes the system design complicated and expensive and hence unfit to be used in everyday lives. Also, sensors need power to operate, and more sensors draw more power, which is a big issue in battery-powered wearable systems. Computing features require domain knowledge, and extensive testing is needed to find the best set of features for optimal classification performance. Furthermore, computing a large number of complex features makes the classification algorithm less efficient in terms of run-time, energy, and memory. Besides, feature selection is needed to select the most meaningful features and adds an extra processing step to an already complex machine learning pipeline. Motivated by these drawbacks of multi-modal feature-based stress classification algorithms, in this paper, we propose a CNN-based stress detection and classification system which takes raw EDA sensor segments as inputs and learns and select the dominant features automatically during the training process. Our primary objective is to implement a stress detection and classification system using only the EDA data. The secondary goal was to explore the personalization of stress models. Perception and effects of stress are subjective in nature. The same external stimuli can have a varying degree of effect on different individuals in terms of stress and emotional arousal. Hence, we also investigate whether stress detection algorithms need personalization or not. # Methodology ## Dataset The Wearable Stress and Affect Detection (WESAD) dataset is a publicly available dataset with ECG, EDA, BVP, respiration (RESP), skin temperature (TEMP), and motion (Acceleration) (ACC) sensor data obtained from the RespiBan (chest-worn) and Empatica E4 (wrist-worn) devices. The dataset was collected from \(15\) subjects (3 female) in a laboratory setting, and each subject experienced three main affect conditions: baseline or normal (neutral reading), stress (exposed to Tier Social Stress Test (TSST)), and amusement (watching funny videos). In our analysis, we only use the EDA data from the Empatica E4 sampled at \(4\)Hz. Approximately the length of the stressed condition was \(10\) minutes, amusement \(6.5\) minutes, and baseline situation was \(20\) minutes. ## Segmentation and Normalization For each subject, we have approximately \(37\) minutes of EDA data. We segment the EDA data for the three affective states into \(60\) seconds overlapping segments with \(50\%\) overlap between consecutive segments. We settled on the window size of \(60\) seconds because of available literature that has also used \(60\) seconds window size for the WESAD dataset. Before segmentation, we normalize the data for each subject using the min-max normalization to spread the data in the range of \([0, 1]\). After segmentation, we obtain \(564\) samples for the baseline class, \(311\) samples for the stressed class, and \(165\) samples for the amusement class. In our analysis, we have not used any method to deal with class imbalance and machine learning models are trained on the imbalance data for the worst case scenario. ## Convolutional Neural Network Data-driven learning algorithms learn associations between input and outputs directly from the sensor data without feature computation. These methods learn features and classifier simultaneously from the sensor data. A convolutional neural network (CNN) is a data-driven learning algorithm capable of learning local dependency and scale invariance in the input data without feature computation. In CNN, the convolution operation is used between the input and a weight matrix or filters to assemble complex features by successively learning smaller and simpler features. Consequently, CNN is suitable for our approach towards stress detection and classification, and hence we have used \(1D\) CNN as the learning algorithm in our work. We have used a ConvNet architecture composed of two \(1D\) convolutional layers with \(100\) filters each and kernel size of \(5\) and \(10\) respectively. This is followed by a global max-pooling layer and two fully connected layers with \(128\) and \(64\) neurons. We also have drop-out layers after each fully connected layer with drop-out values \(0.3\) and \(0.2\). The output layer has Softmax activation, and all other layers have ReLU activation. Figure [\[fig:methodology\]](#fig:methodology){reference-type="ref" reference="fig:methodology"} shows the graphical representation of the proposed CNN used in this paper. ## Hyperparameters and Training The hyperparameters in our framework were selected after extensive trial and error. The CNN models were trained for \(200\) epochs with a batch size of \(32\) and a fixed learning rate of \(0.001\). Out of \(876\) samples in the dataset, \(657\) or \(75\%\) was included in the training set, and \(219\) or \(25\%\) belonged to the test set. For bi-affective state classification, data from the baseline (not-stress) and stressed classes were used to create the training and test sets. For tri-affective state classification data for all three classes: baseline, stressed, and amusement were used to create the training and test sets. # Results and Observations Due to the lack of space, we have omitted training curves of the CNN models and we want to confirm we observed no overfitting during training. ## Stress Classification First, we present the results for the bi-affective state classification i.e., the binary case of stress Vs. not-stress classification. The trained CNN model achieved the best classification accuracy of \(94.8\%\) on the training set and \(90.9\%\) on the test set. Table [1](#tab:bi-affective){reference-type="ref" reference="tab:bi-affective"}, shows the value of other performance metrics. [\[tab:bi-affective\]]{#tab:bi-affective label="tab:bi-affective"} [\[tab:tri-affective\]]{#tab:tri-affective label="tab:tri-affective"} [\[tab:cv_results\]]{#tab:cv_results label="tab:cv_results"} [\[tab:comp_SOTA\]]{#tab:comp_SOTA label="tab:comp_SOTA"} [\[tab:personalization_samples\]]{#tab:personalization_samples label="tab:personalization_samples"} ::: # Conclusion In this work, we proposed a novel CNN-based stress detection and classification framework that uses raw EDA sensor data without feature computation and selection for affective states (stressed vs. normal vs. amusement) classification. We used the EDA data because EDA is found to be the best indicator of stress. Our approach can be adapted to include other sensor modalities for possible performance improvement also extended to other datasets. We also showed the need for a personalized stress model with our leave one subject analysis. Our approach is competitive with other state-of-the-art methods and does not suffer from many disadvantages such as feature computation and selection, multi-modal input data, and complex system design.
{'timestamp': '2021-07-14T02:01:13', 'yymm': '2107', 'arxiv_id': '2107.05666', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05666'}
# Introduction High mass star-forming regions (HMSFRs) is an ongoing topic of open debate as it relates to mass growth. The timescales of phases associated with this process they state are of the order of 10\(^4\)--10\(^5\) years. Observation of such phases is very difficult. A unique property to HMSFRs is the presence of class II methanol (CH\(_3\)OH) masers in their early formative phases. These class II CH\(_3\)OH masers have proven to be a reliable signpost of the very early stages of high-mass star formation. Recent results of monitoring related infra-red sources and class II methanol (CH\(_3\)OH) masers towards HMSFRs have identified significant accretion events. At present only four accretion events have been detected, they are: S255IR-NIRS3, NGC6334I, G323.46-0.08, and G358.93-0.03. Another important phenomena associated with HMSFRs are periodic methanol masers discovered by . Periodic masers are rare, there are only twenty-five known so far. Only the HMSFR source G323.46-0.08 is periodic and has experienced an accretion event. The HMSFR G188.95+0.89 (also known as S 252 or AFGL 5180) is well studied at multiple wavelengths. reported the parallax distance as 1.76\(\pm\) 0.11 kpc, Perseus spiral arm. The 6.7 GHz CH\(_3\)OH masers of this source were discovered by and reported periodic, \(\tau=\)`<!-- -->`{=html}395\(\pm\)`<!-- -->`{=html}8 d, by. report an associated unresolved UCH11 region. did not detect the continuum radio source, but reported that the masers are projected on a bright mm source with an estimated mass in MM1 of 50\(M_{\sun}\). They also detected the presence of CH\(_{3}\)CN and C\(^{18}\)O towards the G188.95+0.89 methanol maser site indicating that they are within hot molecular cores (HMCs) with a gas density \(\gid\) 10\(^{5}\) cm\(^{-3}\). In this paper, we present the results of ongoing 6.7 GHz CH\(_3\)OH maser monitoring for G188.95+0.89. Significant variations of maser features are analysed. Also high-resolution mm-wavelength dust continuum and molecular line emission observations are presented. # Observations and Data Reduction ## Single-dish Observations The radio observations were made using the 26-m telescope of the Hartebeesthoek Radio Astronomy Observatory (HartRAO[^1]). The 4.5 cm receiver is comprised of dual, cryogenically cooled, RCP and LCP feeds. Each polarisation was calibrated independently relative to Hydra A and 3C123, assuming the flux scale of. All observations employed frequency-switching (FS) and within 2 hr of zenith. Observations completed with a 1 MHz bandwidth and recorded with a 1024-channel per polarisation spectrometer (in FS 512 channels are saved). The velocity resolution achieved is 0.044 km s\(^{-1}\) and the typical 3\(\sigma\) root-mean-square (rms) noise per observation was \(\sim\)`<!-- -->`{=html}1 Jy. This sensitivity is improved when across several channels, e.g. integration over ten channels improves the sensitivity to \(\sim\)`<!-- -->`{=html}0.3 Jy  km s\(^{-1}\). For all the epochs, half-power beam-width pointing correction observations were carried out. The rest frequency was corrected for the Local Standard of Rest (LSR) velocity \(v_\textrm{LSR} =\)+10.0 km s\(^{-1}\). Listed in Table [1](#tab:HartObsparam){reference-type="ref" reference="tab:HartObsparam"} are the parameters of the telescope, receiver, and observation set-up for each epoch. Observations were made between 2003 June 30 to 2021 January 18 with a cadence of between 10 to 20 d; the cadence varied during several flares. No spectroscopic observations were taken between between 2008 September and 2010 December when the 26 m antenna underwent repairs. The position employed at HartRAO is R.A. = 06\(^{h}\) 08\(^{m}\) 53 and Dec. = \(+21\degr\) 38\(\arcmin\) 30 (J2000). ## ALMA Observations We obtained ALMA band 6 archival data on G188.95+0.89 (Project ID:2015.1.01454.S) taken on 2016 April 23 (42 antennas of the 12-m main array), 2016 September 17 (38 antennas of the 12-m main array). Observations of G188.95+0.89 (phase tracking center at R.A.\(_{(J2000)}\) = 06\(^{h}\) 08\(^{m}\) 53 and Dec.\(_{(J2000)}\) = \(+21\degr\) 38\(\arcmin\) 30) were carried out at 1.3 mm (230 GHz) with ALMA band 6 in 2015 using two different configurations. The total time on-source was 19 and 30 minutes respectively, and the projected baselines ranged from 15-2600 m. The ALMA correlator was configured to cover nine spectral windows (spws). The raw visibility data were calibrated using the Common Astronomy Software Applications (CASA 5.4) standard calibration and imaging tasks. Bandpass and flux calibration were conducted using the sources J0510\(-\)`<!-- -->`{=html}1800 and J0750\(-\)`<!-- -->`{=html}1231, respectively. J0603\(-\)`<!-- -->`{=html}21591 was used as the gain calibrator. The calibrated visibility data from the two observation blocks were combined using CASA task \(CONCAT\), and \(CLEAN\) was used to produce the images of the continuum (rms of 2.2 mJy beam\(^{-1}\)). Also images of molecular line emission (typical rms of 2.2 mJy beam\(^{-1}\)) with spectral resolution of 1 km s\(^{-1}\) are produced. In this paper, we will focus on the \(^{12}\)CO (2-1), CH\(_3\)OH (4\(_{(2,2)}\)-3\(_{(1,2)})\), SiO (5-4) and C\(^{18}\)O (2-1). For continuum subtraction, only line-free parts of the spectra were used. We used CASA to do all the calibration and imaging of the data cubes as well as self calibration to remove residual phase and flux calibration errors. The line data were then imaged with a robust weighting of 0.5. # Results ## 6.7 GHz CH\(_3\)OH Masers Variability In Fig. [\[fig:methanol_spectra\]](#fig:methanol_spectra){reference-type="ref" reference="fig:methanol_spectra"} we present selected spectra from the seventeen flare cycles (Fl\(_{n}\) for n\(=\)`<!-- -->`{=html}5 to 21) in the 6.7 GHz methanol maser observations associated with G188.95\(+\)`<!-- -->`{=html}0.89 studied here (the original four are published in ). The spectra presented are the maxima of three of these flare cycles (flare number Fl\(_{n}\) for n\(=\)`<!-- -->`{=html}6, 13, and 20). In this image it can be seen the evolution of the spectral profile over the 18 years of observations presented. This profile is certainly comprised of many line blended masers, in particular for +10 \(< v_{LSR} <\) +11.3 km s\(^{-1}\). A dynamic spectra is the best way to visualise variability of these 6.7 GHz methanol masers associated with G188.95\(+\)`<!-- -->`{=html}0.89, see Fig. [\[fig:dynamic_spectra\]](#fig:dynamic_spectra){reference-type="ref" reference="fig:dynamic_spectra"}. Features have weakened others strengthened, most appear periodic and variations in velocity, velocity drifts, are apparent. For the purpose of analysis of these observations five features, two at \(v_{LSR} =\)+10.44 and +10.70 km s\(^{-1}\) in the heavily line merged velocity regime, and others at \(v_{LSR} =\)+8.42, +9.65, and +11.45 km s\(^{-1}\) are selected. Note, the former two features are likely comprised of multiple masers; the others less likely. Time series plots of the integrated flux density, \(F\mathbf{_{Int_{6.7}}}\), for each selected feature are shown in Fig. [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"}. A time series plot of the total integrated flux density, \(F\mathbf{_{Int_{6.7}}}\)(Total), is also shown. For each feature, in each epoch of observation, the velocity associated with the maximum flux density in the stated velocity extent is determined. Linear regression analysis is applied to each velocity time series to determine the velocity drift, and the results are included in this table. Two of the features have measurable velocity drifts, with \"goodness of fit\" values R\(^{2} >\) 50\(\%\). The apparent drift seen in the \(v_{LSR}=\)+10.70 km s\(^{-1}\) feature (see Fig. [\[fig:methanol_spectra\]](#fig:methanol_spectra){reference-type="ref" reference="fig:methanol_spectra"}) may be the result of variations of heavily line merged masers contributing to the feature. The features at \(v_{LSR}=\)+9.65 and +11.45 km s\(^{-1}\) are best fit by a single Gaussian profile each; both possibly devoid of line merged features. All five features are periodic though it is not obvious for the feature \(v_{LSR} =\)+11.45 km s\(^{-1}\) in Fig. [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"}. The period of each is determined using, firstly the programme Period04 developed by and secondly the Lomb-Scargle (LS) periodigram. The results are listed in Table [\[tab:g188_meth\]](#tab:g188_meth){reference-type="ref" reference="tab:g188_meth"}. The average period for each method is included and are within 3\(\sigma\) standard deviation of each other, \(\tau_{Period04}=\)`<!-- -->`{=html}395\(\pm\)`<!-- -->`{=html}1 d against \(\tau_{LS}=\)`<!-- -->`{=html}397.6\(\pm\)`<!-- -->`{=html}0.7 d. The \(v_{LSR}=\)+8.42 km s\(^{-1}\) feature is decaying between 2003 and 2021 while the feature \(v_{LSR}=\)+10.70 km s\(^{-1}\) is increasing in this period. The \(v_{LSR}=\)+9.65 km s\(^{-1}\) feature appears flat in Fig. [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"}, however its associated flux density of the central velocity channel in the velocity range (not plotted) is rising. When first detected in 1991 the +10.44 km s\(^{-1}\) feature was the brightest feature, here it is second strongest and is decaying until MJD 5000, thereafter it is flat or slightly increasing. The increase is possibly caused by contributions from the +10.70 km s\(^{-1}\) feature. Finally, for \(v_{LSR} =\)+11.45 km s\(^{-1}\), it is possible to fit an exponentially decaying function to the flux density time series, see Fig. [\[fig:fitted\]](#fig:fitted){reference-type="ref" reference="fig:fitted"}. The fitted function is: \[\label{decay} F\mathbf{_{Int_{6.7}}} = a \times e^{MJD/b} + c,\] where \(a=\)`<!-- -->`{=html}150\(\pm\)`<!-- -->`{=html}4 Jy  km s\(^{-1}\), \(b=-\)`<!-- -->`{=html}1380\(\pm\)`<!-- -->`{=html}20, and \(c=\)`<!-- -->`{=html}1.74\(\pm\)`<!-- -->`{=html}0.05 Jy  km s\(^{-1}\). reported this feature reached a maximum on 2001 November 12 (MJD 2225), \(F_{Int}\sim\)`<!-- -->`{=html}45 Jy  km s\(^{-1}\). From Eqn. [\[decay\]](#decay){reference-type="ref" reference="decay"}, on MJD 2225, it is estimated \(F_{Int}\sim\)`<!-- -->`{=html}30 Jy  km s\(^{-1}\). The projected value is significantly lower than the actual value; they are outside estimated errors. The difference in velocity resolution, here it is 0.044 km s\(^{-1}\) while in it is 0.056 km s\(^{-1}\), may account for this difference. Line-merged features may also be a factor. Some other features varied linearly and did not require de-trending for analysis. The complex varying feature \(v_{LSR}=\)+10.70 km s\(^{-1}\) will be analysed more elsewhere. After Eqn. [\[decay\]](#decay){reference-type="ref" reference="decay"} is subtracted from the original time series the remaining residual, also plotted in Fig. [\[fig:fitted\]](#fig:fitted){reference-type="ref" reference="fig:fitted"}, reveals its possible periodic nature. Note the slight increase after MJD 7500; possibly resulting from variations in the \(V_{LSR}=\)+10.70 km s\(^{-1}\) feature. The total integrated flux density plotted in Fig. [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"} is seen first falling prior to MJD 5000 then rising suggesting the features decaying dominate prior to MJD 5000 thereafter brightening of the +10.70 km s\(^{-1}\) feature dominates. The relative amplitude variation of each flare can be determined using R\(_{amp}\): \[\label{flamp} R_{amp}=\frac{F_{max}-F_{min}} {S_{min}}=\frac{F_{max}}{F_{min}}-1,\] where \(F_{min}\) and \(F_{max}\) are the minimum and maximum flux densities for each flare cycle and each feature. The results of R\(_{amp}\) for each velocity feature are included in Table [\[tab:g188_meth\]](#tab:g188_meth){reference-type="ref" reference="tab:g188_meth"}. This value ranges from 0.1 to 2.8 for the five features. Note that R\(_{amp} \sim\)`<!-- -->`{=html}1 for the \(v_{LSR}=\) +11.45 km s\(^{-1}\) feature; the amplitude is deceasing approximately proportionately during the decay. No phase lags between maser features were found. This may infer that the periodic features are located such that when the cause of variations occur, it affects each nearly simultaneously. There may be lags shorter than our cadence that we cannot measure nor speculate about. ## G188.95\(+\)`<!-- -->`{=html}0.89 Continuum Emission In Fig. [\[composite\]](#composite){reference-type="ref" reference="composite"} (top panel), we show the composite image of G188.95\(+\)`<!-- -->`{=html}0.89 in WISE bands 1 (3.4\(\mu\)m: red), 2 (4.6 \(\mu\)m: green) and 3 (12 \(\mu\)m: blue) and ALMA 1.3 mm dust continuum emission. The WISE image show a central infrared source (bright in all 3 bands) corresponding to the 850 \(\mu\)m SCUBA MM1 object, and a green (4.6 \(\mu\)m) dominant object south of the central object corresponding to the 850 \(\mu\)m SCUBA MM2 object. G188.95\(+\)`<!-- -->`{=html}0.89 is resolved into eight 1.3 mm objects (MM1--MM8) with ALMA. MM1--MM4 and MM5--MM8 objects (Fig. [\[composite\]](#composite){reference-type="ref" reference="composite"}, bottom panel) are associated with 850 \(\mu\)m SCUBA MM1 and MM2 objects of, respectively. ALMA 1.3 mm MM1 and MM2 are central objects (Fig. [\[composite\]](#composite){reference-type="ref" reference="composite"} bottom zoom-in) and MM1 (the brightest dust continuum object) is associated with the periodic 6.7 GHz CH\(_3\)OH maser source. Interestingly, a recent ALMA band 7 observations resolved the continuum core in MM1 into a single object but resolved MM2 into 2 continuum cores (gray contours of Fig. [\[composite\]](#composite){reference-type="ref" reference="composite"} bottom zoom-in). Details of the detected continuum sources and their masses are presented in Table [\[tab:cont parameters\]](#tab:cont parameters){reference-type="ref" reference="tab:cont parameters"}. The dust mass \(M_{d}\) in Table [\[tab:cont parameters\]](#tab:cont parameters){reference-type="ref" reference="tab:cont parameters"}, can be estimated by assuming optically thin dust emission using: \[M_{d} = \dfrac{S_{\nu} \, D^{2}}{\kappa_{\nu} \, B_{\nu}(T_{d})} \label{mass equation}\] The dust continuum flux density \(S_{\nu}\) is given in Table [\[tab:cont parameters\]](#tab:cont parameters){reference-type="ref" reference="tab:cont parameters"} at frequency, \(\nu\) with \(D\) the distance to the source which is 1.76 kpc and \(\kappa_{\nu}\) the dust opacity per unit mass, \(\kappa_{\nu}\) \(=\) 0.33 cm\(^{2}\) g\(^{-1}\) for 230 GHz. \(B_{\nu}(T_{d})\) is the Planck function at dust temperature, \(T_{d}\). The temperature used in the dust mass estimations were obtained from, for cores MM1 to MM4 a temperature of 42 K is used and for cores MM5 to MM8, 50 K is used. To obtain the mass of the cores a a gas-to-dust mass ratio 100 was used and the results are given in Table [\[tab:cont parameters\]](#tab:cont parameters){reference-type="ref" reference="tab:cont parameters"} The integrated flux densities for MM5 to MM8, that were also used in the core mass estimates, are not primary beam corrected since MM5--MM8 are located close to the edge of the primary beam and will not be discussed in detail due to limited sensitivity. ## G188.95\(+\)`<!-- -->`{=html}0.89 Millimeter Line Emission A number of thermal molecular lines were detected towards the 8 millimeter continuum objects, however, in this paper we will focus only the CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)), SiO (\(J=2-1\)), \(^{12}\)CO (\(J=2-1\)) and C\(^{18}\)O (\(J=2-1\)).\ \ Emission from the CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)) line was detected towards all 8 cores, see Fig. [\[ch3oh\]](#ch3oh){reference-type="ref" reference="ch3oh"}. The emission is strongest towards the southern MM5--MM8 and weakest towards MM4. The nature of the emission towards MM5--MM8 is contaminated by the effect of the decreased sensitivity towards the edge of the primary beam. Beyond detection or non-detection of an emission, no further discussions will be made for these objects. One interesting feature of the CH\(_3\)OH (4\(_{(2,2)}\)-3\(_{(1,2)})\) emission towards MM2 is the presence of a double peak in the emission at the systemic velocity of MM2. There is CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)) emission associated with MM1. indicated the temperature of the dust of the clump hosting the 1.3 mm ALMA MM1--MM4 sources to be \(\sim\)`<!-- -->`{=html}150 K.\ \ Emission of SiO (\(J=2-1\)) is known to trace shocks especially in star-forming regions. The dominant SiO emission is observed in the north-west region of MM2, see Fig. [\[sio\]](#sio){reference-type="ref" reference="sio"}. The emission has a bow-shock morphology in the channel corresponding to the systemic velocity of MM2. There are SiO emission (in some cases, very faint emission) associated with each of MM3 to MM8, however, no SiO emission is detected towards the MM1 object.\ \ The \(^{12}\)CO (\(J=2-1\)) emission in G188.95\(+\)`<!-- -->`{=html}0.89 is complicated owing to the effect of the strongly self-absorbed features seen in the line emission. The other plausible reason for the observed complex distribution is that all the millimeter objects may be driving outflows. If the strong emission east of MM2 observed in the \(-\)`<!-- -->`{=html}3 km s\(^{-1}\) channel and the emission west of MM2 in the 9 km s\(^{-1}\) channel are both associated with MM2, then they may demarcate an east-west bipolar outflow in MM2, see Fig. [\[c12o\]](#c12o){reference-type="ref" reference="c12o"}. There is also some emission north of MM2 and could signify a second outflow emanating from the object; suggestive of multiple YSOs in MM2. The other mm objects are all associated with \(^{12}\)CO (\(J=2-1\)) emission.\ \ We detected high density tracer, C\(^{18}\)O (\(J=2-1\)), towards all MM1--MM8, see Fig. [\[c18o\]](#c18o){reference-type="ref" reference="c18o"}. MM1 and MM2 are the dominant sources of the C\(^{18}\)O (\(J=2-1\)) emission. Interestingly, the brightest C\(^{18}\)O (\(J=2-1\)) channel (3  km s\(^{-1}\) channel) show a distribution of the C\(^{18}\)O (\(J=2-1\)) emission to lie in the interface between MM1 and MM2 cores. The possible implication of this to the observed variability in the 6.7 GHz CH\(_3\)OH masers will be discussed in Section [4.1](#sec:var){reference-type="ref" reference="sec:var"} # Discussion ## Implications of the variability in the 6.7 GHz CH\(_3\)OH Masers {#sec:var} Originally, reported the period of G188.89+0.89 was 416 d; this was revised in to 395 d. Here, using the longer time series and from two separate methods, the shorter period is confirmed (\(\tau_{Period04}=395\pm1\) d and \(\tau_{LS}=397.6\pm0.7\) d). also confirm, though observing fewer flare cycles, the shorter period, \(\tau=395\pm8\) d. Class II methanol masers are only found associated with high mass star-forming regions. Such regions experience accretion events (identified by flaring masers) such as those reported in S255IR-NIRS3, NGC6334I, G323.46-0.08, and G358.93-0.03. However, three of the features in Table [\[tab:g188_meth\]](#tab:g188_meth){reference-type="ref" reference="tab:g188_meth"} are decaying, in particular the \(v_{LSR}=\)+11.45 km s\(^{-1}\) decays exponentially (Fig. [\[fig:fitted\]](#fig:fitted){reference-type="ref" reference="fig:fitted"}). Interesting, historical observations suggest the originally detected peak flux density feature, \(v_{LSR}\sim\)+10.5 km s\(^{-1}\), has varied markedly since detection, less than 500 Jy before 1993 , greater than 600 Jy before 2009 to \(\sim\)`<!-- -->`{=html}500 Jy on average here. Note at present the peak flux density is found at \(v_{LSR}=\)+10.70 km s\(^{-1}\) and not +10.44 km s\(^{-1}\). reported that the feature \(v_{LSR}=\)+11.2 km s\(^{-1}\) decreased slightly from 1991 (\(\sim\)`<!-- -->`{=html}250 ) to 1993 (\(\sim\)`<!-- -->`{=html}230 Jy). In 1999 August it was only \(\sim\)`<!-- -->`{=html}100 Jy while reaching a maximum, \(\sim\)`<!-- -->`{=html}160 Jy, in 2001 November; thereafter the exponential decay is reported here. Above Eqn. [\[decay\]](#decay){reference-type="ref" reference="decay"} cannot describe these variations, nor does it fit the maximum reported in. It appears a weak flaring event, increasing by a factor of \(\sim\)`<!-- -->`{=html}2.6 in flux density, occurred between 1999 August and 2001 November in the periodic feature at \(v_{LSR}=\)+11.45 km s\(^{-1}\). This decaying periodic feature resembles that shown for decaying periodic maser features in G323.46\(-\)`<!-- -->`{=html}0.08. Further analysis of historical data, and data other transitions (.e.g. 12.2 GHz CH\(_3\)OH and/or 22.2 GHz H\(_2\)O), are required to confirm. Spot maps of the 6.7 GHz methanol masers are shown in; all features reside in a 180\(\times\)`<!-- -->`{=html}180 au box assuming a distance of 1.76 kpc about the bright reference feature (\(v_{LSR}=\)+10.33 km s\(^{-1}\)). The weakening features reside within \(\sim\)`<!-- -->`{=html}50 au radius of the reference feature, \(v_{LSR}=\)+8.42 km s\(^{-1}\) slightly north while +11.45 km s\(^{-1}\) is slightly south of the reference maser. The strengthening feature (+10.70 km s\(^{-1}\)) is found \(\sim\)`<!-- -->`{=html}90 au to the South-East from the reference maser. The non-varying feature, \(v_{LSR}=\)+9.65 km s\(^{-1}\), is further South-East (\(\sim\)`<!-- -->`{=html}140 au). suggest that the masers surrounding the reference maser could be part of an outflow from the disk. It is not clear whether velocity drifts, including those seen here, are caused by variability of spectrally blended masers or by motion of the gas. The accretion disks surrounding massive star-forming regions may experience infalling gas. report a velocity drifting feature in Cepheus A; they suggest it may be an artifact of variable line-merged features or the result of masers located in regions of infalling gas. propose the inner radius of the accretion disk surrounding the protostar of G9.62+0.20E is infalling resulting in systematic velocity drifts of its associated methanol masers. However, they also state it may be caused by masers in a precessing disk. Above in Table [\[tab:g188_meth\]](#tab:g188_meth){reference-type="ref" reference="tab:g188_meth"} it can be seen two features experience measurable velocity drift. The blue-shifted feature, \(v_{LSR}=\)+9.65 km s\(^{-1}\) is blue-shifting (\(-2.38\pm0.03 \times 10^{-5}\) km s\(^{-1}\) d\(^{-1}\)) while the other, \(v_{LSR}=\)+11.45 km s\(^{-1}\), is red-shifting (\(+1.88\pm0.04 \times 10^{-5}\) km s\(^{-1}\) d\(^{-1}\)). The drifts are of the order of those seen in G9.62+0.20E, ranging from \(-\)`<!-- -->`{=html}6 to \(+\)`<!-- -->`{=html}3\(\times 10^{-5}\) km s\(^{-1}\) d\(^{-1}\). However, an insufficient number of features with measurable velocity drift are found thus rendering any comparison to G9.62+0.20E indeterminate. These two features are found well-separated in the spot maps shown in both, by \(\sim\)`<!-- -->`{=html}200 au. Perhaps the central features are influenced by an outflow and this motion may force the features at the edges to experience velocity drift. Even the now brightest feature, at \(v_{LSR}=\)+10.70 km s\(^{-1}\), is blue-shifting though this may be due only to variations of heavily line-merged features. All of these periodic masers are associated with MM1. More observation and analysis is required to explain these variations. ## Binary System in G188.95\(+\)`<!-- -->`{=html}0.89-MM2 There are a number of indicators suggesting the existence of a binary system in MM2. First, the high-resolution ALMA band 7 dust continuum image resolves MM2 into 2 cores separated by 0.1\("\). Second, the CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)) emission is coincident with the systemic velocity and the spectral profile of emission towards MM2 has two pronounced features (see 3 km s\(^{-1}\) channel of Fig. [\[ch3oh\]](#ch3oh){reference-type="ref" reference="ch3oh"}). In Figure [\[c12o_spec\]](#c12o_spec){reference-type="ref" reference="c12o_spec"}, the spectra of \(^{12}\)CO (solid lines) and CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)) (dashed line) taken from MM2 using a 4\("\) ellipse are presented. It is important to note the \(^{12}\)CO emission is optically thick. In the \(^{12}\)CO spectra (at least) self-absorption features are visible, implying the \(^{12}\)CO emission is absorbed by cold foreground material in the region. The three vertical dotted line in Figure [\[c12o_spec\]](#c12o_spec){reference-type="ref" reference="c12o_spec"} indicate the prominent absorption feature (middle line at 3 km s\(^{-1}\)) and two absorption features (\(-\)`<!-- -->`{=html}2 and 7  km s\(^{-1}\)) one on each side of the prominent feature. We noted that missing flux issue can give rise to such spectral feature but in this case the observed absorption feature is real.. The most prominent absorption feature in the \(^{12}\)CO spectra corresponds in \(V_{\mbox{\scriptsize LSR}}\)  with the CH\(_3\)OH (4\(_{(2,2)}-\)`<!-- -->`{=html}3\(_{(1,2)}\)) absorption feature separating the 2 resolved cores in MM2. All these observed features suggest multiple (or at least binary) young stellar objects in MM2. Our suggestion of the presence of at least a binary, or multiple, YSOs in MM2 is supported by the complexity of the orientation of the outflowing gas traced by \(^{12}\)CO, see Fig. [\[c12o\]](#c12o){reference-type="ref" reference="c12o"}. An east-west outflow feature with an axis through the peak position of MM2, as well as a north-west and south-east outflow also intersecting with MM2, can be observed. These support the suggestion at least a binary system is present in MM2. High-resolution continuum and line observations will be required test the multiplicity of YSOs in MM2. # Conclusion We presented results of 1.5 decades of monitoring observations of 6.7 GHz CH\(_3\)OH masers towards G188.95\(+\)`<!-- -->`{=html}0.89 and ALMA band 6 observational results and found the following; 1. G188.95\(+\)`<!-- -->`{=html}0.89 protocluster is resolved into eight 1.3 mm objects (MM1-MM8). MM1 and MM2 are the central objects and MM1 (the brightest dust continuum object) is associated with the periodic 6.7 GHz CH\(_3\)OH maser source. 2. MM2 hosts more than one YSO, likely a binary system. 3. Strong emission of \(^{12}\)CO at the east and west of MM2 point to the presence of an east-west bipolar outflow in MM2. Emissions north of MM2 also suggest a second outflow emanating from the object, which could signal multiplicity of YSOs in MM2. 4. All five features are periodic, suggesting a common background source of seed photon. The light curve shape of the maser features are similar to those of Mira variable stars and could suggest pulsation of the protostar as the possible driver of the periodicity. 5. Two CH\(_3\)OH maser features are reported with measurable velocity drift. 6. Outflows are identified in \(^{12}\)CO (2-1) line emission. While no direct detection of accretion disks was possible with the current observations, the detected outflows suggest the presence of accretion disks in the source. Accretion disk may experience infalling gas and velocity drifts may be due to an artifact of variable line-merged features or by infalling gas.
{'timestamp': '2021-07-14T02:05:29', 'yymm': '2107', 'arxiv_id': '2107.05743', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05743'}
null
null
# Introduction The Richtmyer-Meshkov instability (RMI) is one of the interfacial instabilities induced by shock interaction. When a shock front passes through a spatially corrugated contact discontinuity, the interface is generally subjected to the RMI. The RMI plays an essential role in the propagation of supernova shocks through the inhomogeneous interstellar matters, which could excite interstellar turbulence and enhance ambient magnetic fields. Thus the understanding of magnetohydrodynamical characteristics of the RMI has a quite important meaning to reveal star formation events in the turbulent interstellar medium. At the linear phase of the RMI, the shock acceleration of the interface is impulsive and causes the perturbation amplitude to grow linearly in time. has proposed a simple estimate of the growth rate of the amplitude, which is obtained by a generalization of the Rayleigh-Taylor formula with an impulsive acceleration. Then, observed that the Ricthmyer prescription should be modified using an averaged value between the pre-shocked and post-shocked interface amplitude in order to obtain agreement between the numerical solution and the linear theory. Unfortunately, these empirical prescriptions are likely to fail for high compressions. The more accurate formula for the asymptotic growth velocity is derived by, in which the tangential velocities generated at the interface are the key to determine the evolution of the RMI. The origin of the parallel velocity to the interface is the refracted flow caused by the oblique angle of the transmitted shock and the reflected shock or rarefaction. In this paper, we investigate the suppression of the RMI due to the presence of a strong magnetic field. The stabilization of the RMI could be realized by several situations such as a gradual density transition at the interface and freeze-out. The Lorentz force working on the interface can stabilize the unstable growth of the RMI. The motivation here is to empirically derive a critical condition for the magnetic field strength, which may be helpful to predict the nature of the interstellar turbulence and design plasma experiments for the demonstration. Analytical modeling of the MHD RMI is cumbersome because the unperturbed state is time-dependent. Thus, numerical simulations have been a suitable tool to examine the role of magnetic fields on the RMI, even in the linear phase. Depending on the field direction relative to the incident shock surface, the magnetic field works differently on the fluid motions of the RMI. When the magnetic field is aligned with the shock propagation, the suppression of the instability is caused by changes in the shock refraction process at the contact discontinuity. The role of the magnetic field is to prevent the deposition of circulation on the interface. When the magnetic field is parallel to the shock surface, the instability can be mitigated by the Lorentz force. The magnetic field component perpendicular to both the shock propagation and interface has little influence on the linear growth of the RMI. In the previous works, the cases when an incident shock travels from lighter fluid to heavier one (shock-reflected cases) are intensely discussed. However, the growth of the RMI takes place in the opposite situation, that is, rarefaction-reflected cases. Then, in this work, we perform a systematic survey of the rarefaction-reflected RMI, including an ambient uniform magnetic field. Thanks to the comprehensive survey, it turns out that a robust critical condition is described by the Alfvén number, which is given by a ratio of the linear growth velocity of the RMI and the Alfvén speed. The plan of this paper is as follows. In §2, the numerical setup for the single-mode analysis of the RMI is described. Theoretical models for the linear growth velocity of the RMI are briefly reviewed in §3. We also demonstrate the importance of heavy-to-light configuration for the RMI. In §4, numerical results of MHD evolution of the RMI are explained based on the amplitude of the Alfvén number. Comparisons with the other interfacial instabilities in terms of the role of magnetic fields are discussed in §5. We also discuss more realistic situations introducing a multi-mode surface modulation. Finally, our conclusion is summarized in §6. # Numerical Method ## Numerical Setup Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(a) illustrates the initial configuration for the single-mode analysis of the RMI when a rarefaction wave is reflected. Two fluids with different densities, \(\rho_1\) and \(\rho_2 (< \rho_1)\), are separated by a contact discontinuity at \(y = Y_{\rm cd}\). A planar shock propagating through the heavier fluid "1" (\(y > Y_{\rm cd}\)) hits the interface at a time \(t = 0\). Here the \(x\)-and \(y\)-axis are perpendicular and parallel to the shock surface. The incident shock velocity is \(U_i (< 0)\) and the fluid velocity behind the shock is \(V_1 (< 0)\). The pre-shocked pressure \(P_0\) is uniform in both fluids. The Mach number of the incident shock is defined as \(M = |U_i|/c_{s1}\) where \(c_{s1} = (\gamma P_0/ \rho_1)^{1/2}\) is the sound speed of the fluid "1". The interface has an initial corrugation of a sinusoidal form, \(y = Y_{\rm cd} + \psi_0 \cos (k x)\), where \(\psi_0\) is a corrugation amplitude, \(k = 2 \pi / \lambda\) is the perturbation wavenumber, and \(\lambda\) is the wavelength. The initial geometry of a magnetic field is assumed to be uniform with the size of \(|\bm{B}| = B_0\) in the pre-shocked region (\(y < Y_{\rm is}\)). As for the field direction, we consider the cases of a parallel MHD shock (\(B_y = B_0\)) and a perpendicular shock (\(B_x = B_0\)). A uniform magnetic field parallel to the incident shock velocity is assumed in the entire region for the parallel shock case. While, for the perpendicular shock case, the initial field is calculated from the following vector potential to avoid the presence of the normal field at the interface, \[A_{z} (x, y) = B_{0} y-B_{0} \psi_0 \cos k x \exp [-k | y-Y_{\rm cd} (x) | ] \;,\] using the relation \(\bm{B} = \bm{\nabla} \times \bm{A}\). The physical quantities in the post-shocked region behind the incident shock are calculated from the Rankine-Hugoniot conditions for MHD shocks. Only four non-dimensional parameters characterize the initial configuration depicted by Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(a). The sonic Mach number \(M\) parameterizes the incident shock velocity. The contact discontinuity is expressed by the density jump \(\rho_2/\rho_1\) and the ratio of the corrugation amplitude to the wavelength \(\psi_0/\lambda\). The initial field strength is given by the plasma beta \(\beta_0 = 8 \pi P_0/ B_0^2\), which is the ratio between the gas and magnetic pressures defined at the pre-shocked region. Various situations can be examined only by choosing these four parameters; \(M\), \(\rho_2/\rho_1\), \(\psi_0/\lambda\), and \(\beta_0\). ## Basic Equations and Numerical Scheme The basic equations of ideal MHD are solved to study the interaction between the RMI and a magnetic field; \[\frac{\partial \rho}{\partial t} + {\mbox{\boldmath{\(\nabla\)}}} \cdot \left( \rho {\mbox{\boldmath{\(v\)}}} \right) = 0 \;,\] \[\frac{\partial \rho {\mbox{\boldmath{\(v\)}}}}{\partial t} + {\mbox{\boldmath{\(\nabla\)}}} \cdot \left[ \left( P + \frac{B^2}{8 \pi} \right) {\mbox{\boldmath{\(I\)}}} + \rho {\mbox{\boldmath{\(v\)}}} {\mbox{\boldmath{\(v\)}}}-\frac{ {\mbox{\boldmath{\(B\)}}}{\mbox{\boldmath{\(B\)}}}}{4 \pi} \right] = 0 \;,\] \[\frac{\partial e}{\partial t} + {\mbox{\boldmath{\(\nabla\)}}} \cdot \left[ \left( e + P + \frac{B^2}{8 \pi} \right) {\mbox{\boldmath{\(v\)}}}-\frac{ \left( {\mbox{\boldmath{\(B\)}}} \cdot {\mbox{\boldmath{\(v\)}}} \right) {\mbox{\boldmath{\(B\)}}}}{4 \pi} \right] = 0 \;,\] \[\frac{\partial {\mbox{\boldmath{\(B\)}}}}{\partial t} = {\mbox{\boldmath{\(\nabla\)}}} \times \left( {\mbox{\boldmath{\(v\)}}} \times {\mbox{\boldmath{\(B\)}}} \right) \;,\] where \(\rho\), \(\bm{v}\), and \(\bm{B}\) are the mass density, velocity, and magnetic field, respectively, and \(e\) is the total energy density, \[e = \frac{P}{\gamma-1} + \frac{\rho v^2}2 + \frac{B^2}{8 \pi} \;.\] In our simulations, the equation of state for the ideal gas is adopted with the adiabatic index \(\gamma = 5/3\). We solve the MHD equations by a conservative Godunov-type scheme. The hydrodynamical part of the equations is solved by a second-order Godunov method, using the exact solutions of a simplified MHD Riemann problem. The one-dimensional Riemann solver is simplified by including only the tangential component of a magnetic field. The characteristic velocity is the magnetosonic wave alone, and then the MHD Riemann problem can be solved in a way similar to the hydrodynamical one. The remaining terms, the induction equation and the magnetic tension part in the equation of motion, are solved by the consistent MoC-CT method, guaranteeing \(\nabla \cdot \mbox{\boldmath \)B\(} = 0\) within round-off error throughout the calculation. The numerical scheme includes an additional numerical diffusion in the direction tangential to the shock surface to care for the carbuncle instability. Calculations are carried out in a frame moving with the velocity \(v^{\ast}\) which is the interface velocity after the interaction with the incident shock. For convenience, we define the locus of \(y = 0\) as where the incident shock reaches the contact discontinuity at \(t = 0\). Then the post-shocked interface stays at \(y = 0\) if it is not corrugated initially or stable for the RMI. The simulations start before the incident shock hits the corrugated interface (\(|Y_{\rm is}-Y_{\rm cd}| \gg \psi_0\)). The system of equations is normalized by the initial density and sound speed of the heavier fluid "1", \(\rho_1 = 1\) and \(c_{s1} = 1\), and the wavelength of the density fluctuation \(\lambda = 1\). The sound crossing time is also unity in this unit, \(t_{s1} = \lambda / c_{s1} = 1\). Most of the calculations in this paper use a standard resolution of \(\Delta_x\) = \(\Delta_y\) = \(\lambda / 256\) unless otherwise stated. A periodic boundary condition is used in the \(x\)-direction, and an outflow boundary condition is adopted in the \(y\)-direction. The size of the computational box in the \(x\)-direction is always set to be \(L_x = \lambda\). The \(y\)-length, on the other hand, is taken to be sufficiently wider, \(L_y \geq 10 \lambda\), for the transmitted shock not to reach the edge of the computational domain. # Growth Velocity of RMI Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(b) is a schematic picture around the contact discontinuity after the shock passage. Now, the contact discontinuity moves with the velocity \(v^{\ast}\). The pressure at the interface, \(P^{\ast}\), becomes higher compared to the initial \(P_0\). The incident shock is transmitted into the lighter fluid "2" (\(y < Y_{\rm cd}\)) which moves with the velocity \(U_t (< 0)\), and the density behind the transmitted shock is \(\rho^{\ast}_2\). Similarly, a reflected rarefaction forms with the sound speed at each position and expands the heavier fluid "1" to the density \(\rho_1^{\ast}\) at the interface. If the interface is corrugated, the front surfaces of these two waves are also rippled. Then, refraction of the fluids at the wavefronts occurs as indicated by the arrows in Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(b). Consider fluid motions near the shock surface in a frame moving with the transmitted shock or reflected rarefaction wave. For both waves, the upstream fluid moves along the \(y\)-axis. However, the downstream motion should have the tangential component due to the obliqueness of the wavefront. The tangential shear motion at the contact discontinuity generates non-uniformity of the pressure perturbation across the interface, which will be the driving source of unstable growth for the RMI. The accurate formula for the asymptotic growth velocity of the RMI is derived by. In the Wouchuk-Nishihara (WN) model, the tangential velocities generated at the interface, \(\delta v_1^{\ast}\) and \(\delta v_2^{\ast}\) \[see Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(b)\], are the essential quantities for the linear growth of the RMI. Assuming a sinusoidal modulation of the interface, the tangential velocities at both sides of the interface can be calculated from the initial parameters. Then, the linear growth velocity of the WN model is written as \[v_{\rm lin} = \frac{\rho_{1}^{\ast} \delta v_{1}^{\ast} -\rho_{2}^{\ast} \delta v_{2}^{\ast}} {\rho_{1}^{\ast} + \rho_{2}^{\ast}}- \frac{\rho_{1}^{\ast} F_1-\rho_{2}^{\ast} F_2 } {\rho_{1}^{\ast} + \rho_{2}^{\ast}} \;, \label{eq:dvi}\] where the quantities \(F_1\) and \(F_2\) represent the sonic interaction between the contact surface and the transmitted and reflected waves, respectively, which are proportional to the amount of vorticity left behind the wavefronts in the bulk of each fluid. For the case when a rarefaction is reflected, no vorticity is created in the expanded fluid, i.e., \(F_1=0\). The growth velocity given by Equation ([\[eq:dvi\]](#eq:dvi){reference-type="ref" reference="eq:dvi"}) is exact within the limits of linear theory and inviscid flow. It is valid for any initial configuration, and every element can be analytically calculated from the pre-shocked parameters. The first term of the right-hand side of Equation ([\[eq:dvi\]](#eq:dvi){reference-type="ref" reference="eq:dvi"}) is due to the instantaneous deposition of vorticity at the interface just after the shock interaction. The second term is non-negligible only for stronger shocks or highly compressible fluids and always reduces the growth velocity predicted by the first term. Within the linear regime (\(\psi \ll \lambda\)), the spike and bubble grow with the same velocity \(v_{\rm lin}\). The negative growth velocity stands for the phase reversal that could occur in the rarefaction-reflected cases. Throughout our analysis, the WN formula \(v_{\rm lin}\) is used as the linear growth velocity of the RMI for a given set of the parameters (\(M\), \(\rho_{2} / \rho_{1}\), \(\psi_0 / \lambda\), and \(\gamma\)), since there is no corresponding theoretical linear model for MHD RMI. Based on the impulse-driven linearized initial value problem, the pure hydrodynamic response dictates the initial interface behavior independent of the applied magnetic field. Therefore, the choice of unmagnetized growth velocity would be rather appropriate for the definition of the Alfvén number. ## Importance of Heavy-to-Light Configuration The RMI occurs for any Atwood number or any ratio of the interface densities. When the adiabatic index \(\gamma\) is assumed to be identical in both fluids, the light-to-heavy (heavy-to-light) configuration corresponds to the shock-reflected (rarefaction-reflected) case. In our previous work, the role of the magnetic field on the RMI has been examined intensely only for the shock-reflected cases. However, the RMI can grow when the reflected wave is a rarefaction. Thus we examine the rarefaction-reflected cases in this work and attempt to understand the magnetohydrodynamical evolutions of the RMI comprehensively. In this subsection, we will demonstrate the importance of the rarefaction-reflected cases in a simple system. Let us suppose a situation when a planar shock front passes through a dense layer of the density \(\rho_b\) (\(> \rho_a\)), which is depicted by Figure [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(a). Both sides of the dense layer are subjected to the RMI if it is corrugated. The Mach number of the incident shock, \(M_i = U_i / c_{sa}\), determines the growth velocity of the RMI at the front side, \(v_{\rm lin, F}\), where \(c_{sa}\) is the sound speed outside of the layer. If the decay of the transmitted shock in the dense layer is negligible, the Mach number of the transmitted shock \(M_t = U_t / c_{sb}\) characterizes the growth velocity at the rear surface, \(v_{\rm lin, R}\). Assuming the same corrugation wavelength and amplitude at both sides, the ratio of the growth velocities can be derived as a function of the incident Mach number \(M_i\) and the density ratio \(\rho_b / \rho_a\). Figure [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(b) shows the ratio of the growth velocities at the front and rear sides of the dense layer for a given \(M_i\). For the cases of weaker shock \(M_i \lesssim 2\), the growth velocity at the rear side exceeds that of the front side. In general, when the density jump is small (\(\rho_b / \rho_a \lesssim 10\)), the RMI at the rear side is as fast as that at the front side, which suggests that both of the shock-reflected and rarefaction reflected RMI are important equally. By contrast, the rear side instability becomes relatively unimportant when the density jump is high (\(\rho_b / \rho_a \gtrsim 100\)). In the limit of high Mach number, larger density ratio brings slower growth velocity at the rear side. # Numerical Results ## Rarefaction-reflected cases The unstable motions of the RMI amplify ambient magnetic fields efficiently for the cases when a rarefaction wave is reflected. This feature is almost identical to that seen in the RMI for the shock-reflected cases. The interface is stretched with the magnetic field lines through the growth of the RMI. Figures [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}(a) shows the density distribution at the nonlinear stage of the RMI, which is taken at \(k v_{\rm lin} t = 10\). As for the initial conditions of this fiducial run, the density jump and corrugation amplitude of the interface are \(\rho_2/\rho_1=0.1\) and \(\psi_0/\lambda=0.1\), respectively. The adiabatic index is \(\gamma = 5/3\) in both sides of the fluids. For this case, the injected shock wave evolves into a transmitted shock and a reflected rarefaction after the interaction with the contact discontinuity. The Mach number of the incident shock is assumed to be quite large, \(M=100\). The phase reversal of the surface modulation is a characteristic behavior for the rarefaction-reflected cases of the RMI. Then, the growth of the density spike in this run is towards the opposite direction to the initial pattern. A uniform magnetic field is applied in the \(y\)-direction, and then this is a parallel shock case with \(\bm{B}_0 \parallel \bm{U}_i\). The initial plasma beta is set to be \(\beta_0 = 10^8\). The magnetic field develops passively to the RMI motions because it is not strong enough to alter the plasma flow. The perpendicular shock case (\(\bm{B}_0 \perp \bm{U}_i\)) with the same field strength is also performed, but the density structure formed by the RMI motions is quite similar except for tiny fluctuations associated with the mushroom-shaped spike. The magnetic field lines for the parallel and perpendicular shock cases are shown in Figures [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}(b) and [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}(c). The regions where the magnetic field lines are dense indicate the amplified magnetic field. The strong magnetic fields appear near the interface on the side of the transmitted shock. Small-amplitude fluctuations of the density appear in the lighter fluid, which is associated with reverse and cumulative jets left after the rippled transmitted shock. These motions generate many filamentary structures of locally amplified magnetic fields between the interface and transmitted shock front. This feature can be recognized in both cases, suggesting it is independent of the field direction. The magnetic field is amplified significantly in the timescale of the RMI, \(t_{\rm rm}\). Figures [\[fig4\]](#fig4){reference-type="ref" reference="fig4"}(a) and [\[fig4\]](#fig4){reference-type="ref" reference="fig4"}(b) show the time evolution of the maximum strength of the magnetic field for the parallel-shock cases (\(\bm{B}_0 \parallel \bm{U}_i\)) and for the perpendicular-shock cases (\(\bm{B}_0 \perp \bm{U}_i\)), respectively. The initial parameters except for the magnetic field strength are the same as in the fiducial run shown in Figure [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}. The maximum strength is normalized by the initial strength of \(B_0\) for the parallel-shock case, while it is divided by the post-shocked field strength \(B^{\ast}\) in the fluid "2", which stands for the maximum field strength when the interface is flat. The characteristic behavior of the maximum field strength shows little dependence on the direction of the initial magnetic field. If the ambient magnetic field is weak (\(\beta_0 \gtrsim 10^4\)), the amplification factor reaches two orders of magnitude. However, as the initial field strength increases, the maximum field strength decreases gradually. When the initial beta is \(\beta_0 = 0.01\), no amplification is observed for both cases. These features on the magnetic field amplification are qualitatively similar to the shock-reflected cases. The strong magnetic fields are localized predominantly in thin filamentary structures. Thus the average magnetic energy over the entire region is at most a few times larger than the initial value. The magnetic field amplification is tightly linked to the growth of the RMI. The interface is developed into a mushroom shape with smaller-scale vortical structures on the surface. The width of the mixing layer \(d_{sb}\), which is defined by the distance from the spike top to the bubble bottom, increases with time. If the external magnetic field is large enough, then the growth of the RMI is suppressed significantly. It is known that the critical field strength depends on the Mach number of the incident shock. Figure [\[fig5\]](#fig5){reference-type="ref" reference="fig5"} depicts the time history of the mixing width \(d_{sb}\) to demonstrate the dependence on the external magnetic field. When the field strength is relatively weaker \(\beta_0 \gtrsim 1\), the growth of the RMI is unaffected by the magnetic field. However, if the plasma beta becomes \(\beta_0 \sim 0.01\), the RMI is stabilized completely. Then, the mixing layer shrinks into much smaller than that in the hydrodynamic case. Although this figure includes only the parallel shock cases, the role of the magnetic field on the RMI suppression is independent of the initial field direction. Note that the critical plasma beta for the RMI is not given by unity. ## Critical Alfvén Number The critical value of the field strength varies depending on the model parameters, especially on the Mach number. However, it is found that a single parameter characterizes magnetohydrodynamic evolutions of the RMI, that is, the Alfvén number for the RMI. The Alfvén number is defined here as the ratio of the growth velocity to the Alfvén speed, \[R_{A} \equiv \frac{v_{\rm lin}}{v_A^{\ast}} \;,\] where \(v_A^{\ast} = \min \{v_{A1}^{\ast},v^{\ast}_{A2}\}\) is the minimum of the Alfvén speed at the interface after the shock passage. The slower Alfvén speed determines the criterion for the entire suppression of the fluctuations on both sides. It is turned out that the RMI growth is diminished when the Alfvén number is less than unity, or when the Alfvén speed exceeds the growth velocity in the unmagnetized limit. The suppression condition \(R_{A} \lesssim 1\) is almost the same meaning as that derived by, where the critical magnetic field is obtained by \[\frac{B_{\rm crit}^2} {8 \pi P_0} = \frac{\gamma}2 \alpha^2 \left( \frac{v_{\rm lin}}{c_{s}^{\ast}} \right)^2 \left( \frac{P^{\ast}}{P_0} \right) \;.\] This equation can be simplifed as \(v_{A,{\rm crit}} = \alpha v_{\rm lin}\) where \(\alpha\) is a factor of order unity, so that it is strictly related to the Alfvén number. Through a systematic survey of the broad parameter space in this paper, we find this condition is quite robust and valid for any parameters of the RMI, including the perpendicular shock cases and the parallel shock cases. Figure [\[fig6\]](#fig6){reference-type="ref" reference="fig6"} shows the maximum magnetic field amplified by the RMI as a function of the Alfvén number \(R_A = v_{\rm lin} / v_A^{\ast}\) for various runs. The initial field direction is perpendicular to the interface for all the cases in Figure [\[fig6\]](#fig6){reference-type="ref" reference="fig6"}(a). The maximum field strength is measured at the end of calculations, where the magnetic field evolution is saturated sufficiently. The amplification factor is normalized by \(B_0\). Even though the data include both the shock-reflected cases (filled marks) and rarefaction-reflected cases (open marks), the amplified magnetic field exhibits the same trend. When the Alfvén number is less than unity, the amplification factor is almost unity. No amplification denotes that the magnetic field stabilizes the RMI in this regime. However, as the Alfvén number increases over unity, the maximum strength increases in proportion to \(R_A\). Then the maximum field energy of \(B_{\max}\) becomes comparable to the turbulent kinetic energy of \(v_{\rm lin}\) at the saturated state. The amplification factor follows a relation of \(1 + R_A\) at \(R_A \lesssim 100\). It should be emphasized that the \(R_A\)-dependence is valid for a wide range of parameters; The Mach number is from 1.2 to 10 and the density jump is from 0.1 to 10. When \(R_A \gtrsim 100\), the increase of the maximum strength is weakened obviously. In this parameter range, the amplification factor is broadly scattered depending on the parameters, but it looks like a nearly flat function of \(R_A\). The amplified magnetic field seems to be higher as the incident Mach number increases. However, the maximum field strength in this regime is found to depend on the numerical resolutions. Then, it might be inappropriate to discuss quantitative features of the magnetic field only by our simulations performed in this paper. The Alfvén number is an excellent indicator of MHD RMI for the parallel shock cases too. The amplification factors of the magnetic field are shown in Figure [\[fig6\]](#fig6){reference-type="ref" reference="fig6"}(b) for various cases when the initial ambient field is in the \(x\)-direction. The maximum field strength is made dimensionless by \(B^{\ast}\) for this case. The same trend as in Figure [\[fig6\]](#fig6){reference-type="ref" reference="fig6"}(a) can be seen clearly in a range of \(R_A \lesssim 100\). To summarize, the RMI is suppressed by the tension force of the magnetic field when \(R_A \lesssim 1\). The surface modulations oscillate stably, and the mixing layer does not grow at all. On the other hand, if the Alfvén number exceeds unity, the magnetic field is enhanced through the interface stretching and tends to be toward the equipartition between \(v_{A,\max} \approx v_{\rm lin}\). The saturated level at \(R_A \gtrsim 100\) indicates that the larger density jump causes the larger amplification in the parallel-shock runs. # Discussions ## Comparison with the other interfacial instabilities The linear growth of the RMI is reduced due to the presence of a strong magnetic field. The other similar instabilities, the Rayleigh-Taylor instability (RTI) and Kelvin-Helmholtz instability (KHI), are also stabilized by the magnetic field. Here we compare the dependence of the field strength on the critical wavelength to suppress these interfacial instabilities. We focus on the simplest situation where two uniform fluids are separated by a horizontal boundary and examine the effect of a uniform horizontal magnetic field \(B\). If the gravity is working toward the lighter fluid (\(\rho_2\)) from the heavier one (\(\rho_1\)), it becomes unstable to the RTI. The linear growth rate of the RTI including the horizontal field is derived as \[\sigma_{\rm rt} = \left[ \frac{\rho_1-\rho_2}{\rho_1 + \rho_2} g k-\frac{B^2}{2 \pi (\rho_1 + \rho_2)} k^2 \right]^{1/2} \;,\] where \(g\) is the gravitational acceleration and \(k\) is the horizontal wave number. The first and second terms on the right side are the growth rate for the unmagnetized case and the suppression rate originated from the Lorentz force. The RTI is stabilized by the magnetic field when \[k > \frac{A g}{\bar{v}_A^2} \;, \label{rti}\] where \(A = (\rho_1-\rho_2)/(\rho_1 + \rho_2)\) is the Atwood number, \(\bar{v}_A = B / (4 \pi \bar{\rho})^{1/2}\) is the Alfvén speed, and \(\bar{\rho} = (\rho_1 + \rho_2)/2\) is the average density. Thus, the fluctuations in shorter wavelengths are more easily stabilized in terms of the RTI. The interface is subject to the KHI, if the two fluids have relative horizontal motions (\(v_1 \ne v_2\)). The linear growth rate is derived analytically as \[\sigma_{\rm kh} = \left[ \frac{\rho_1 \rho_2}{\rho_1 + \rho_2} (v_1-v_2)^2 k^2-\frac{B^2}{2 \pi (\rho_1 + \rho_2)} k^2 \right]^{1/2}\]. Here a uniform magnetic field parallel to the interface is assumed. The stabilization by the magnetic field is determined from the balance between the two terms on the right side of \(\sigma_{\rm kh}\). Unlike the case of the RTI, the criterion is independent of the wavelength. The critical field strength is calculated as \[B_{c, {\rm kh}} = \sqrt{2 \pi \rho_1 \rho_2} | v_1-v_2 | \;, \label{khi}\] for all wavelengths of perturbations. The suppression condition for the RMI is obtained empirically by the numerical simulations. The growth of the RMI is dramatically reduced when the Alfvén number is less than unity. The linear growth velocity can be expressed by \(v_{\rm lin} = \zeta k \psi_0 U_i\) using the incident shock velocity \(U_i\). The factor \(\zeta\) is calculated from the pre-shocked quantities and takes roughly of the order of 0.1; \(\zeta = \zeta (M, A, \gamma) \sim O(0.1)\). Then, the RMI is suppressed by the magnetic field, when \(v_{\rm lin} < v_{A}^{\ast}\). This condition is rewritten as \[k < \frac{v_{A}^{\ast}}{\zeta \psi_0 U_i} \;. \label{rmi}\] Therefore, for the RMI, the surface fluctuations with longer wavelengths are preferentially stabilized as oppose to the RTI. The characteristics of the stabilized wavelength are distinctly different for each instability. To be precise, though, this condition should depend on the direction of the magnetic field. Especially, interchange modes are unaffected at all by the restoring force of magnetic fields. However, the relations between the critical wavelength and magnetic field \[Equations ([\[rti\]](#rti){reference-type="ref" reference="rti"}), ([\[khi\]](#khi){reference-type="ref" reference="khi"}), and ([\[rmi\]](#rmi){reference-type="ref" reference="rmi"})\] are beneficial to intuitively understand the role of the magnetic field for each instability. ## Nonlinear evolution of multi-mode RMI Single-mode analysis has the advantage of understanding the nonlinear features of the RMI in a clear picture. However, the actual situations are not always as simple as such a system. The growth process of more complex multi-mode disturbances is briefly touched upon in the last section. The interface modulation for our multi-mode analysis is assumed to be \[y = Y_{\rm cd} + \frac{\psi_0}{\sqrt2 \sigma} \sum_{n=1}^{N} a_n \cos \left[ 2 \pi \left( \frac{x}{\lambda_n} + \phi_n \right) \right] \;, \label{ycd}\] where \(\lambda_n = {\lambda}/{n}\) is the multi-mode wavelength, \(a_n\) and \(\phi_n\) are random coefficients between 0 and 1, \(\sigma\) is the standard deviation of the summation part to normalize the fluctuation to be \(1 / \sqrt2\), and the initial amplitude \(\psi_0\) determines the size of the perturbation. The single-mode analysis corresponds to the case of \(N=1\). The multi-mode corrugation with \(N=10\), for example, consists of ten different wavelengths of \(n = 1\)--10. The magnetic field amplification for the case of multi-mode fluctuations is examined in Figure [\[fig7\]](#fig7){reference-type="ref" reference="fig7"}. The model parameters are mostly the same as the fiducial run of the single-mode case; \(M = 100\) and \(\rho_2 / \rho_1 = 0.1\). The position of the initial interface is given by Equation ([\[ycd\]](#ycd){reference-type="ref" reference="ycd"}) with \(\psi_0 / \lambda = 0.1\) and \(N = 10\). As a result of the RMI growth, the interface shows a complicated shape where various-scale mushroom-structures are growing randomly in all directions. However, the thickness of the mixing layer is comparable to that in the corresponding single-mode case shown by Figure [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}. The initial magnetic field is relatively weak as \(\beta_0 = 10^8\) so that the RMI motions enhance the seed field in this run. The amplified field structure exhibits that a large number of curled filaments fill the entire area between the interface and the transmitted shock front \[see Figure [\[fig7\]](#fig7){reference-type="ref" reference="fig7"}(b)\]. The filamentary feature is caused by the complicated vortex structure left behind the transmitted shock. Figure [\[fig8\]](#fig8){reference-type="ref" reference="fig8"} indicates the probability distribution function of the magnetic field strength for the cases of \(N = 10\), 3, and 1. The parameters for the interface modulation are listed in Table [\[tab1\]](#tab1){reference-type="ref" reference="tab1"}. Here we assume \(a_n = 1\) for a white noise amplitude. The maximum field strength in the multi-mode runs is nearly the same as that in the single-mode. Furthermore, the power-law feature seen in the amplified component is shared by the single-mode and multi-mode runs. The index fitted in a range of \(2 < | \bm{B} | / B_0 < 20\) is about \(-1.7\), which may be the characteristic quantity of the RMI turbulence driven by a shock wave. The power-law features are unaffected by choice of the random numbers for the initial interface shape in Equation ([\[ycd\]](#ycd){reference-type="ref" reference="ycd"}). It should be noticed that a similar power index is obtained in interstellar turbulence simulations by, indicating the RMI motions could contribute to the evolutions of interstellar magnetic fields. However, three-dimensional simulations will be essential for further quantitative comparisons with observations. # Summary We have investigated the role of a magnetic field in the nonlinear evolution of the RMI using two-dimensional MHD simulations. An essential feature of the RMI is that the shock wave can excite the unstable motions when it propagates from the low-density side of the contact discontinuity to the high-density side and vice versa. In this paper, we intensively analyze the MHD RMI in the heavy-to-light configuration. It is found that the characteristic features of MHD RMI are well described by the Alfvén number for the RMI that is the ratio of the linear growth velocity to the Alfvén speed. The critical condition on the Alfvén number is \(R_A \sim 1\), which distinguishes the suppression of the RMI and the field amplification by the RMI. The obtained criterion is applicable universally for the heavy-to-light and light-to-heavy configurations. It is also independent of any initial parameters such as the incident Mach number, density jump, and the magnetic field geometry. The magnetic features amplified by the RMI growth indicate similarities to those seen in the simulations of interstellar turbulence. This fact suggests that the RMI-like behaviors excited by supernova-shock propagation through inhomogeneous density distribution may contribute to the evolution and amplification of the interstellar magnetic fields. Therefore, further deep comparison between the RMI and interstellar turbulence would be a curious subject to be studied in the future.
{'timestamp': '2021-07-14T02:07:28', 'yymm': '2107', 'arxiv_id': '2107.05800', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05800'}
# Introduction To draw conclusions about individual variables of interest in a task, one builds structured probabilistic graphical models to describe statistical relations among all variables and marginalizes out all other unobserved variables. Such exact inference computations are infeasible in general, due to exponential complexity in practice when the latent space is large. Often the latent space to be marginalized is decomposable due to conditional independencies between variables, allowing us to represent the full distribution as a probabilistic graphical model (PGM). This may allow us to perform difficult global calculations using simpler integrations on subsets of variables. Such approaches are used by message-passing algorithms like Belief Propagation (BP) and Expectation Propagation (EP), widely used approaches to computing or approximating marginal probabilities using distributed computation. BP is guaranteed to yield exact results if the graph has a tree structure. However, on general graphs with loops, which are likely to be better descriptors of real data, BP can give approximate posteriors or even fail to converge. Graphical models with pairwise interactions like Hopfield network and Boltzmann machine have provided us with intriguing models for memory and learning, and has developed to layered neural networks which are widely used nowadays. However, sometimes basic pairwise interaction models do not suffice to explain real data patterns like neuronal avalanches, retinal activity patterns when exposing to natural stimuli, and simultaneous silence of cultured hippocampal neurons. Taking one step further, structured third-order interactions have been proposed for general probabilistic models, and have been used to model conditional correlation structure in movies. Including higher-order interactions increases model flexibility, but the number of possible interactions grows combinatorially with the interaction order. This makes exact inference problems intractable with limited computational resources and numbers of data points. Thus prior knowledge like locality or sparsity of interactions must be used, resulting in a structured factor graph. Higher-order factor graph may have more loops compared to a pairwise graph with as many interactions. Local message-passing algorithms like BP suffer in the presence of loops and are thus likely to perform worse on many real-world graphical models. Even when applied to higher-order trees, message updates for BP usually don't have closed-form solutions, so running BP on these graphs becomes impractical. To mitigate these drawbacks of BP and to provide an alternative on loopy graphs even without analytical update formulas, in this work we present a method to learn a recursive message-passing algorithm for fast approximate inference. Our method applies to a large family of higher-order graphical models with a wide range of graph structures and parameter values including very loopy ones. In the spirit of BP, we use a Graph Neural Network (GNN) to perform message-passing on factor graphs. We train this network to compute sufficient statistics of all univariate marginal distributions simultaneously for each instance sampled from a parametrized family of PGMs. To study the performance of our method, we perform experiments on two artificial datasets where we can calculate ground truth, and compare performance to BP: Gaussian Graphical Models (GGM) and a small binary spin-glass system with third-order interactions. GGMs only have pairwise interactions, but the ground truth marginals can easily be computed without message-passing for very large graphs. The graph size is kept under 15 for the binary spin-glass dataset for exact calculation of marginal probabilities by enumeration. In addition, we construct a dataset of continuous PGMs with pairwise and third-order interactions. Since closed-form marginals do not exist for this interesting model class, we train our model to predict univariate statistics calculated by Markov Chain Monte Carlo (MCMC) sampling. Our experiments show that the learnt algorithm has better performance than BP on an in-distribution test dataset, even when excluding those graphs on which BP dynamics don't converge. We also show that our model generalizes reliably out of distribution to probabilistic graphical models of different sizes than the training set. By looking at the error distribution for two graph metrics---average shortest path length and cluster coefficient---we find that our method outperforms BP particularly well on graphs with small average shortest path length and large cluster coefficients, which are the properties of many real world graphs. This suggests there is potential for using our model as an approximation inference method on real-world PGMs with higher-order interactions. # Related Work Previous work has explored learning to pass messages that calculate marginal probabilities in graphical models. Some examined fast and approximate calculation of Belief Propagation or Expectation Propagation updates when analytical integration is not feasible for computing on the level of single factor. Others created message-passing algorithms for inference in probabilistic graphical models, trying to learn an algorithm that is more accurate than Belief Propagation when the underlying graph is loopy. The most related work to ours uses stacked bi-directional GNNs on factor graphs to perform maximum *a posteriori* estimation on binary graphical models. One major difference is that we use a recurrent network instead of a feedforward one, so our method uses far fewer parameters and scales to larger graphs without adding new layers. Another difference is that we incorporate an attentional mechanism to increase model flexibility. Another related study puts a factor graph NN layer within a recurrent algorithm to calculate marginal probabilities in binary graphical models, applying them to low density parity check codes and Ising models. Instead of using a GNN to learn a novel message-passing algorithm from scratch, the authors build their algorithm on top of Belief Propagation and let GNN serve as an error-correction module for loopy BP. Traditional Graph Neural Networks are defined on regular graphs with nodes and edges, and thus best work with models with only pairwise interactions. On the other hand, factor graphs or hypergraphs, which represent higher-order interactions directly, are usually preferred for message-passing algorithms like BP. Factor graphs use two types of nodes: variable nodes (circles) for each variable, and factor nodes (squares) for each subset of directly interacting variables; edges connect factors to their constituent variables. Some work has been done to extend GNNs to such higher-order graphs, including studies aiming to solve graph isomorphism tasks, and others applying GNNs to data living on simplicial complexes. # Methods ## Probabilistic Graphical Models and Factor Graphs Probabilistic graphical models describe the conditional dependence structure among random variables using graphs. We describe higher-order interactions using a factor graph, which expresses the joint probability density as a product of local factors, \(p({\mathbf{x}})\propto \prod_i f_i({\mathbf{x}}_i)\), each involving only a subset of variables \({\mathbf{x}}_i\) Exact inference in tree graphs can be performed by iteratively marginalizing out the leaves of the tree and propagating this information along the graph. This iterative algorithm is called belief propagation (BP), and has been applied with some success even on graphs with loops. Message updates in BP include multivariate integration, and don't always have close-form solutions. (Fully factorized) Expectation Propagation (EP) is an approximation to mitigate this issue by projecting the outgoing message to some user-chosen parametric family. ## Graph Neural Networks Graph Neural Networks (GNN) are artificial neural networks implementing a message-passing operation on a graph. A GNN updates each node's representation based on aggregated messages from its neighbours. Each node \(i\) represents information as a vector \({\mathbf{h}}_i^t\) that evolves over time (or layer) \(t\), and edges are assigned a vector weight \({\mathbf{e}}_{ij}\). The updated representation at time/layer \(t+1\) can be described by: \[{\mathbf{h}}_i^{t+1} = \mathcal{U}\left({\mathbf{h}}_i^t\,, \!\!\!\bigsqcup_{j\in N(i)\backslash\{j\}}\!\!\!\!\!\! \mathcal{M}({\mathbf{h}}_j^t, {\mathbf{h}}_i^t, {\mathbf{e}}_{ij})\right)\] where every message \(\mathcal{M}({\mathbf{h}}_j^t, {\mathbf{h}}_i^t, {\mathbf{e}}_{ij})\) from neighbour \(j\) to node \(i\) along edge \(ij\) is first calculated using a common trainable nonlinear function \(\mathcal{M}\), then messages from all neighbours are aggregated together by a permutation-invariant function \(\bigsqcup\) (e.g. summation), before being used to update each target node through another trainable function \(\mathcal{U}\). We recommend for a review of methods and application of GNNs. ## Factor Graph Neural Network In order to implement a message-passing algorithm on factor graphs, we first define a Graph Neural Network on bipartite graphs, unlike a typical GNN that treats all nodes equally. We thus define two distinct node types for variables and factors, represented by hidden vectors \({\mathbf{h}}_{v,i}^{(t)}\) and \({\mathbf{h}}_{f,i}^{(t)}\), with corresponding message and update functions for each. We also augment our GNN functions with a few extra operations. We reasoned that it would be beneficial if our network could identify loops and re-weight incoming messages accordingly, since Belief Propagation applied to loopy graphs exhibits errors traced back to the assumption of independent neighbors. To this end we use the attention mechanism when aggregating message functions and we update hidden node representations using Gated Recurrent Unit (GRU) with LayerNorm to embue nodes with a long-term memory. In summary, our iterative algorithm is an RNN, with the activation layer being a bi-directional graph neural network with self-attention, as described mathematically below. Our target inferences are over graphical models within the exponential family, a broad class of probability distributions widely used in statistical analysis. The density of such a distribution can be parameterized by a vector of natural parameters \(\boldsymbol{\eta}\): \[p({\mathbf{x}}) = \frac{1}{Z(\boldsymbol{\eta})}\exp(\boldsymbol{\eta}^\top {\mathbf{T}}({\mathbf{x}}))\] where \({\mathbf{T}}({\mathbf{x}})\) is the vector of sufficient statistics and \(Z(\boldsymbol{\eta})\) is a normalization constant. Combined with the factorization of the joint density, each individual factor can also be parametrized with its own vector of natural parameters \(\boldsymbol{\eta}_i\): \[p({\mathbf{x}}) = \frac{1}{Z(\boldsymbol{\eta})} \prod_i \exp(\boldsymbol{\eta}_i^\top {\mathbf{T}}_i({\mathbf{x}}_i))\] A PGM is then represented by sets of factor nodes, variable nodes, edges, and all natural parameters, \(\{\mathcal{F},\mathcal{V},\mathcal{E}, H \}\). The process of marginalization converts the natural parameters to expectation parameters. We use a MultiLayer Perceptron (MLP) to initialize the hidden states for factor nodes based on the natural parameters of the target graphical model. Separate MLPs are used for different types of factors, e.g., pairwise factors and third-order factors. The hidden states for variable nodes are initialized as a zero vector. \[\begin{aligned} &{\mathbf{h}}_{f,i}^{(0)} = \text{Encoder1}(\boldsymbol{\eta}_f) \\ &{\mathbf{h}}_{v,j}^{(0)} = \mathbf{0} \end{aligned}\] After initialization, we then update each node's hidden representation recurrently for \(N\) time steps. In each step, a bi-directional Graph Attention Network (GAT) layer is used to calculate messages and they are aggregated as the activation for a GRU unit to compute the hidden state for the next step. Separate multi-head GAT networks are used for two types of messages: from variable node to factor node, and from factor node to variable node. Likewise, we use different trainable weights for different factor types since they may behave differently. For the factor node updates, we take a similar approach as in and transform the aggregated incoming message from neighboring variables by a factor-specific feature matrix \({\mathbf{F}}_i \in \mathbb{R}^{H\times H}\) as a constant input, which is mapped from its natural parameter \(\boldsymbol{\eta}_i\) by a shared MLP for each type of factors. \[\begin{aligned} {\mathbf{F}}_i = \text{Encoder2}(\boldsymbol{\eta}_i) \end{aligned}\] The following equations show one-step message-passing for factor nodes. The updates for variable nodes are similar except for that there is no variable node feature, so [\[eq:activation\]](#eq:activation){reference-type="ref" reference="eq:activation"} is replaced by \({\mathbf{a}}_{i}^{(t+1)} ={\mathbf{m}}_{i}^{(t+1)}\). [\[eq:message,eq:attention\]](#eq:message,eq:attention){reference-type="ref" reference="eq:message,eq:attention"} reflect only one attention head. For multi-head attention, we simply duplicate \(M_{f\leftarrow v}\) and \(W_{f\leftarrow v}\) modules and the multi-head weighted summation in [\[eq:summ-attention\]](#eq:summ-attention){reference-type="ref" reference="eq:summ-attention"} is averaged over all heads. In our experiments, we use 5 attention heads for smoother learning. \[\begin{aligned} &\text{raw message from variable \(j\) to factor \(i\): } & &{\mathbf{m}}_{f\leftarrow v,ij}^{(t+1)} = M_{f\leftarrow v}({\mathbf{h}}_{f,i}^{(t)}, {\mathbf{h}}_{v,j}^{(t)})\label{eq:message} \\ &\text{attention weight from variable \(j\) to factor \(i\): } & &\alpha_{f\leftarrow v,ij}^{(t+1)} = \frac{W_{f\leftarrow v}({\mathbf{h}}_{f,i}^{(t)}, {\mathbf{h}}_{v,j}^{(t)})}{\sum_{k\in N(i)}W_{f\leftarrow v}({\mathbf{h}}_{f,i}^{(t)}, {\mathbf{h}}_{v,j}^{(t)}) } \label{eq:attention}\\ &\text{weighted summary message from variable \(j\) to factor \(i\): } & &{\mathbf{m}}_{i}^{(t+1)} = \sum_{k\in N(i)} \alpha_{f\leftarrow v,ik}^{(t+1)}{\mathbf{m}}_{f\leftarrow v,ik}^{(t+1)} \label{eq:summ-attention} \\ &\text{incorporate local factor features: } & & {\mathbf{a}}_{i}^{(t+1)} = {\mathbf{F}}_i {\mathbf{m}}_{i}^{(t+1)} \label{eq:activation}\\ &\text{update hidden state of factor \(i\): } & &{\mathbf{h}}_{f,i}^{(t+1)} = \text{GRU}_f({\mathbf{a}}_{i}^{(t+1)},{\mathbf{h}}_{f,i}^{(t)} ) \end{aligned}\] We would like our model to learn an iterative algorithm that converges to the target. So instead of choosing the number of time steps \(N\) to be fixed, which we found often yielded RNN dynamics that passed through the target output without stopping, we randomly sample a readout time \(N\) from a range, so the network cannot rely on any particular readout time. At that point we use a decoder MLP to read out expectation parameters of the univariate marginal distributions for each variable: \[{\mathbf{y}}_j = \text{Decoder}({\mathbf{h}}_{v,j}^{(N)})\] ## Datasets[\[sec:dataset\]]{#sec:dataset label="sec:dataset"} There are two practical use cases for applying our methods to improve on BP. First is to improve inference accuracy on loopy graphs where BP starts to perform poorly, and second is to make fast but approximate inferences on PGMs for which algorithms like BP or even Expectation Propagation become infeasible to run. For tractability, most probabilistic models are based on pairwise interactions. But pairwise models would require many nonlinear auxiliary hidden variables to capture real-world data complexity such as multiplicative lighting, perspective transforms, triple synapses, or especially gating. In contrast, higher-order interactions could capture some of these interactions directly. Gating is a crucial, common operation in machine learning, as seen in LSTMs, GRUs, and attention networks. Third-order multiplicative interactions can be effectively viewed as soft gating operations thus provide more modeling power while remaining interpretable. Thus here we choose continuous graphical models with third-order interactions as a distribution family of high interest. Such distributions fall into the latter category of application where traditional models are infeasible but our GNNs could apply. Firstly, as a proof of concept, we construct two datasets of PGMs with known ground truth marginal distributions and closed-form BP update formulas so that we can compare the performance of our model with Belief Propagation. Second, we build a dataset of continuous PGMs with third-order interactions to test our model on this more complicated and interesting class of PGMs. ### Gaussian Graphical Model[\[dataset:ggm\]]{#dataset:ggm label="dataset:ggm"} As a toy example, we generate a dataset of random Gaussian Graphical Models (GGM). Since both marginalization and BP have closed-form solutions on GGMs, it becomes a convenient test for comparing our method with BP, and to test the generalization performance of our method to much larger out-of-distribution graphs. We use the random graph generator algorithm WS-flex proposed in to generate diverse graph structures parametrized by average shortest path length and cluster coefficient. To generate a random graph, we first sample the average degree \(k\) and rewiring probability \(p\) parameters for the WS-flex algorithm from a uniform distribution over \([2,n-1]\) and \([0,1]\) where \(n\) is the number of variables, and then construct a random graph using these parameters. Each GGM has a precision matrix with non-zero entries randomly sampled by the WS-flex algorithm and eigenvalues uniformly drawn from \([0.1,10.0]\). In order to achieve certain connectivity matrix with desired eigenvalues, we start from a positive-definite diagonal matrix, apply a random orthogonal rotation to make it dense, and then iteratively apply Jacobi rotations to zero out elements according to the connectivity matrix until we achieve the desired structure. We concentrate on inferring the node variances and give all GGMs mean of zero, since the hard part of calculating both marginal means and variances is the inversion of the precision matrix. ### Binary third-order factor graph [\[dataset:3spin\]]{#dataset:3spin label="dataset:3spin"} Our method works with general factor graphs, especially those with higher-order interactions, but GGMs have only pairwise interactions and can also be modeled by regular GNNs. To test our model on graphs with higher-order factors, we construct a dataset composed of binary graphical models with only third-order interactions. For the sake of exact solutions of marginal probabilities, we choose small binary spin glass models whose structures and connectivity strengths are randomly sampled so that exact marginal probabilities can be calculated by brute-force enumeration. The joint probability mass function is expressed as \[\begin{aligned} p(\{{\mathbf{s}}\}) \propto \exp\Big( \beta (\sum_{p=1}^{3}\sum_{i\in \mathds{1}_{\mathcal{V}}} b_{i,p} s_i^p + \sum_{(ijk) \in \mathcal{N}(\mathcal{F})}J_{ijk}s_is_js_k)\Big) \end{aligned}\] \(\mathcal{N}(\mathcal{F})\) is the set of neighbor variable indices for each factor. We generate these random factor graphs using a generalization of the WS-flex generator, parameterized by average variable node degree \(k_3\) and rewiring probability \(p\). Details of the algorithm could be found in the supplementary material. The singleton potential coefficients \(b_i^p\) and 3-way coupling coefficients \(J_{ijk}\) are randomly drawn from a standard Gaussian distribution and the inverse temperature, \(\beta\), is chosen to be \(0.5\). ### Continuous third-order factor graph [\[dataset:3continuous\]]{#dataset:3continuous label="dataset:3continuous"} We are interested in continuous graphical models with third-order interactions, and we propose to use our method as an approximate inference algorithm for this model class. We construct a dataset of random continuous PGMs with third-order interactions and evaluate the accuracy of our message-passing algorithm against an expensive sampling approach. For each inference problem, a factor graph is randomly constructed such that 3-factors are generated using the aforementioned WS-flex variant, and 2-factors are generated using the regular WS-flex algorithm. Each graph structure is parametrized by three numbers: the average outdegree of variable nodes to 2-factor nodes \(k_2\), the average outdegree of variable nodes to 3-factor nodes \(k_3\), and the rewiring probability \(p\). \(k_2\) is uniformly sampled from \([2,n-1]\), \(k_3\) is uniformly sampled from \([2,\floor{(n-1)(n-2)/6}]\), and \(p\) is uniformly sampled from \([0,1]\). An isotropic 4th-order base measure is added to ensure the joint density is normalizable: \[\begin{aligned} p({\mathbf{x}}) \propto \exp\Big[-\beta \Big(\sum_{p=1}^{3}\sum_{i\in \mathds{1}_{\mathcal{V}}} b_{i,p} x_i^p + \sum_{(ij)\in \mathcal{N}(\mathcal{F}_2)}K_{ij}x_ix_j + \sum_{(ijk)\in \mathcal{N}(\mathcal{F}_3)}J_{ijk}x_ix_jx_k + \alpha \lVert {\mathbf{x}} \rVert_{\ell_4}^4 \Big) \Big] \end{aligned}\] Bias parameters \(\{b_{i,p}\}\) and interaction strengths \(\{K_{ij}\},\{J_{ijk}\}\) are sampled from a standard normal distribution \(\mathcal{N}(0,1)\). The strength of the 4th-order term and the inverse temperature were \(\alpha=1.0\) and \(\beta=0.3\). Note that this exponential family of distributions is not closed under marginalization: marginals are not in the same family as the joint. We run an MCMC algorithm, the No-U-Turn Sampler (NUTS), using the Stan software for a large number of steps as an approximate ground truth. Our readout targets are summary statistics computed from those generated samples. For each random structure generated, we run 8 MCMC chains with 10000 warmup steps and 10000 sampling step each for a random set of parameter values and keep drawing new parameters until the potential scale reduction factor (PSRF) falls below \(1.2\), indicating convergence has been reached for the MCMC chains. Here we choose the first four central moments as our targets since the Jensen-Shannon divergence between the empirical sample distribution and corresponding moment-matched maximum-entropy distribution does not decrease substantially when including more moments. [\[fig:marginal\]](#fig:marginal){reference-type="ref" reference="fig:marginal"} shows random examples of sampled univariate marginals, the corresponding singleton distributions obtained by ignoring all multivariate interactions, and their maximum entropy counterparts by matching the first four central moments. ## Training[\[sec:training\]]{#sec:training label="sec:training"} We implement our models[^1] in PyTorch and PyTorch Geometric and perform all experiments on internal clusters equipped with NVIDIA GTX 1080Ti and Titan RTX GPUs. We randomly split eash dataset into a training and a validation set of ratio 4:1. The testing sets are constructed separately for different graph sizes. In every experiment, we use the ADAM optimizer with batch size 100 and initial learning rate \(0.001\). We multiply the learning rate by a factor of \(0.2\) if there is no improvement in 20 epochs, and perform early-stopping if there is no improvement in 40 epochs. We choose the dimension of hidden states for both variable and factor nodes \({\mathbf{h}}_v,{\mathbf{h}}_f\) to be 64, and 5 attention heads are used for all experiments. For the encoder and decoder MLPs, we insert a BatchNorm layer after the input layer and each hidden layer. We use mean-squared error (MSE) as loss on single-variate marginal precision values for the Gaussian dataset and on the first four central moments calculated from MCMC samples for the continuous third-order factor graph dataset respectively. As of the the binary spin-glass dataset, we use binary cross entropy as loss. # Experiments and Results[\[sec:experiment\]]{#sec:experiment label="sec:experiment"} All GNNs are trained on graphs with size 10 solely, but are tested on graphs of various sizes. We uniformly draw the number of recurrent steps \(N\) from \([30,50]\). \(N\) is set as 30 during testing. We repeat all experiments 10 times from different random seeds and report the mean and standard error on a held-out test set in [\[result-table\]](#result-table){reference-type="ref" reference="result-table"}. Additionally, for each dataset, we pick the GNN with the lowest validation error among 10 run, and then compare their in-sample and out-of-sample error against BP in the space of graph metrics. As a baseline to show how strong the interactions are in each dataset, we also train a separate GNN (singleton GNN) that tries to predict the same target, but only sees singleton factors in the graphical model. Singleton GNN would have lower performance on graphs whose marginal distributions are strongly affected by multivariate interactions. Results of BP, full GNN, and singleton GNN are shown in [\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}. Each point along with its error bar represents the bootstrapped mean and 95% confidence interval of the mean calculated from 100 resampling of the corresponding test set. Some error bars may be too small to see. ## Gaussian Graphical Models[\[results:ggm\]]{#results:ggm label="results:ggm"} ### Loopy Graphs[\[results:ggm-all\]]{#results:ggm-all label="results:ggm-all"} In this experiment we tested the performance of our model on Gaussian Graphical Models with zero mean, random precision matrices, and various structures generated as described in [\[dataset:ggm\]](#dataset:ggm){reference-type="ref" reference="dataset:ggm"}. For a single GGM, the inverse variance of each variable's marginal Gaussian distribution is used as target for supervised learning. 10000 random graphs with 10 variables are generated as a training dataset. Additionally, we generate various testing datasets with 10 to 50 variables, each consisting of 2000 random graphs. [\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(b), shows that our model trained on a dataset of GGMs with 10 variables has average KL divergence 6-fold smaller than Belief Propagation on a in-sample test set. When generalizing to larger graphs, our model still has smaller error than BP on graphs up to 30 variables. Other metrics, including \(R^2\) score and MSE (the training objective), are also shown in [\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(a)(c). Since BP doesn't always converge on loopy graphs, all metrics are calculated on the subset of test graphs with convergent BP dynamics, which compose 73.2% to 71.2% of test set as graph size varies from 10 to 50. BP is considered non-convergent if the absolute error of beliefs between two adjacent BP updates still exceeds \(10^{-5}\) after 1000 cycles. It is well known that Belief Propagation becomes non-exact on loopy graphs. Here we empirically investigate how BP and GNN performance depends on the graph structure by examining graph metrics. We choose two independent structural features that quantify the loopiness of a graph: average shortest path length and cluster coefficient. The former quantifies the average loop length between any two nodes, and the latter describes the small-world property of a graph. Graphs in the test set are binned into 10 equal bins according the the graph metric, and for each bin we report the bootstrapped mean and its 95% CI for BP and GNN performance metrics ([\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(d-g)). Many real-world graphs have a small average path length and a large cluster coefficient, and this is the region where our model outperforms BP. BP can be viewed as an algorithm that finds local minima of the Bethe free energy by iteratively update messages until convergence. Similarly, we also define our algorithm to be recursive. However, as comparison, we also constructed a feedforward model with 10 Factor-GNN layers stacked together. [\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(a-g) and [\[result-table\]](#result-table){reference-type="ref" reference="result-table"} shows that although the feedforward model has almost 10 times more parameters, the performance is worse than the recurrent one. ### Tree Graphs[\[results:ggm-tree\]]{#results:ggm-tree label="results:ggm-tree"} BP is exact on tree graphs, so we also trained a model with a dataset of 10000 Gaussian tree graphs with size 10 using the eigenvalue distribution in [\[dataset:ggm\]](#dataset:ggm){reference-type="ref" reference="dataset:ggm"}. A random tree structure is constructed by converting from a random Prüfer sequence, which is sampled uniformly from the symmetry group \(S_{n-2}\) where \(n\) is the number of nodes in the tree. BP is exact on trees with zero error, but our model also achieves excellent generalization performance with an in-distribution \(R^2\) score \(0.9995\pm 0.0001\) and out-of-sample \(R^2\) score \(0.9996\pm 0.0002\) even when generalizing to graphs with size 50. ## Spin systems with third-order interactions[\[result:3spin\]]{#result:3spin label="result:3spin"} For the binary spin systems with only third-order interactions and no pairwise interactions, we train our model on a dataset of size 10 and test on graphs with sizes from 6 to 15. We didn't test on larger graphs because it becomes impractical to enumerate all spin configurations in order to compute exact marginal probabilities. For binary graphical models, unlike in [\[results:ggm\]](#results:ggm){reference-type="ref" reference="results:ggm"}, non-convergent BP dynamics won't diverge, but may oscillate. Thus we take the beliefs from the last cycle if the dynamics does not converge in 1000 cycles. There is no qualitative difference when evaluating model performance using the whole test dataset or just BP-convergent ones, so we report the metrics on BP-convergent graphs to maintain consistency with [\[results:ggm\]](#results:ggm){reference-type="ref" reference="results:ggm"}. Within the range of testing graphs, our model consistently outperforms BP on average([\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(h-j)). In the space of graph structures parametrized by average shortest path length and cluster coefficient, our model performs better than BP in regions with smaller average shortest path length and larger cluster coefficient, which agrees with the result of [\[results:ggm\]](#results:ggm){reference-type="ref" reference="results:ggm"}([\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(k-n)). ## Continuous third-order graphical model[\[result:3cont\]]{#result:3cont label="result:3cont"} For general continuous non-Gaussian graphical models it is not feasible to compare our method with BP because the BP message update neither an explicit formula, nor could be calculated exactly by enumeration. Even the EP message update needs to be approximated. Like these approximation methods, we also train a predictor to calculate approximate marginal distributions. However, instead of approximating the EP message-passing for a specific type of factors within the EP framework, we learn a new message-passing algorithm end-to-end that works with many factor types and doesn't share EP's limitations. This approach is more applicable to loopy graphs where BP and EP struggle. For this experiment we constructed a continuous graphical model with third-order interactions and train our model to predict the first four central moments of every univariate marginal distribution (see Section [\[dataset:3continuous\]](#dataset:3continuous){reference-type="ref" reference="dataset:3continuous"}). Since BP or EP is not feasible for this dataset, we only compare our model with the singleton GNN as our baseline. A model trained on graphs with 10 variables achieves an in-sample \(R^2\) score of \(0.911\pm 0.005\), while the baseline model without interactions has an \(R^2\) of only \(0.654\pm 0.001\). We test the generalization performance of our model with a dataset of graphs of size 20. For the MCMC algorithm to produce convergent chains, we shrink the interaction strengths by a factor of 2 but keep the singleton parameter distribution unchanged so that both input and output values fall in the training ranges. On a test set of 1000 graphs, the full model has an \(R^2\) score of \(0.582\pm 0.021\), while the baseline model has an \(R^2\) score of \(0.495\pm 0.000\). Qualitatively similar to the Gaussian and spin dataset, model performance drops when generalizing to larger graphs ([\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(o-p)), and our model has larger error on loopy graphs ([\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}(q-t)) since these are hard ones. # Discussion[\[sec:discussion\]]{#sec:discussion label="sec:discussion"} In this paper we show that GNN is an alternative to traditional message-passing algorithms like Belief Propagation as an approximate inference engine on graphical models. It outperforms BP on some loopy graphs, and offers a practical way to perform fast inference for continuous non-Gaussian graphical models like those in [\[result:3cont\]](#result:3cont){reference-type="ref" reference="result:3cont"}. In contrast, previous data-driven methods were proposed to approximate the EP message passing for a single factor type, thus still shares the weakness of EP on loopy graphs. Although our method achieves promising results and does generalize to graphs of different sizes, it naturally performs better within its training distribution. However, almost no performance drop on Gaussian tree graphs when generalizing to 5x larger graphs ([\[results:ggm-tree\]](#results:ggm-tree){reference-type="ref" reference="results:ggm-tree"} and promising generalization results on loopy graphs ([\[results:ggm-all\]](#results:ggm-all){reference-type="ref" reference="results:ggm-all"},[\[result:3spin\]](#result:3spin){reference-type="ref" reference="result:3spin"}) suggest the potential usage of our methods for inference on large graphs by training on smaller ones. Compared to a 10-layer stacked GNN [\[fig:ggm-spin\]](#fig:ggm-spin){reference-type="ref" reference="fig:ggm-spin"}, our method achieves better performance with substantially fewer parameters. However, in our experiment we just simply stack the Factor-GNN layers with out any further tricks like skip connection, pooling layer, etc., as in. Despite that, learning a recursive message-passing algorithm has advantages over a feedforward one when generalizing to larger graphs: the number of layers must scale with graph size for a feedforward network in order to distribute information throughout the graph, whereas a recurrent algorithm could run until convergence regardless of the graph size. A limitation of our method is that a separate GNN needs to be learnt from scratch whenever encountering a new parametric family of graphical models. One exciting but speculative possibility is to extend this framework such that whenever a new type of factor is encountered, the model only trains a dedicated new encoder/decoder, and reuses a shared core message-passing module, perhaps implementing a more universal inference engine akin to a shared language model. This can be useful when data is limited, since the difficult message-passing core could be learnt from multiple rich datasets. The general form of Belief Propagation takes this universal form, and have some multifactor extensions like Generalized BP. We hypothesize that Factor Graph Neural Networks could potentially extend this universality while compensating for the challenges of inference in a loopy world. Creation of smarter artificial intelligence would have major impacts on human life, through communication, industry, infrastructure, robotics, and many more aspects of life. Our work aims to refine the theoretical foundations for intelligence. Thoughtless or naive application of these scientific advances could lead to unanticipated consequences and increase social inequality.
{'timestamp': '2021-07-14T02:04:25', 'yymm': '2107', 'arxiv_id': '2107.05729', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05729'}
# Introduction -compatible (RC) error-control codes are a set of codes with the same dimension but various code lengths and accordingly rates, where all symbols of the higher-rate code are a subset of the lower rate code. Combined with RC codes, hybrid automatic repeat request (HARQ) schemes have been used in wireless communication systems to match the code rate to the channel condition by retransmitting incremental redundancy (IR) to the receiver. The rate-matching procedure is crucial to support various requirements and be able to adapt to varying channel conditions. This becomes even more important for modern wireless systems, like the fifth generation (5G) of mobile communications standard that has established a framework to include services with a diverse range of requirements, such as ultra-reliable and low-latency communications (URLLC) and massive machine-type communications (mMTC), in addition to the traditional enhanced mobile broadband (eMBB). The most common way to construct RC codes is to use puncturing. A good low-rate code, referred to as the mother-code, is first constructed, and then some of the coded symbols are discarded to construct higher-rate codes. This approach has been applied to almost all codes and in particular to algebraic codes, convolutional codes, Turbo codes, low-density parity-check (LDPC) codes, and Polar codes. The performance of the resulting code depends mainly on the puncturing pattern. Finding the best puncturing pattern is usually nontrivial and carried out through computer search. Moreover, most puncturing techniques are optimized according to the set of information bits; therefore, these methods cannot be used to design a family of rate-compatible punctured codes for IR-HARQ, which requires the same information set that should be used for all punctured codes from a mother code in the family. Furthermore, if the rate of the mother code is too low, puncturing is not likely to yield good high-rate codes. For example, although Polar codes can achieve the capacity of any specific binary-input symmetric channel, the rate-compatible construction via successive puncturing is generally not capacity-achieving. Extending is another approach to construct RC codes. A good high-rate code is first constructed, then parity-check symbols are successively added to generate lower-rate codes. The construction of lower rate codes is to find new codes with a good minimum Hamming weight. This approach has been used to construct RC-LDPC codes and RC-Polar codes. RC codes constructed using extending do not usually guarantee high minimum Hamming weight at lower rates, as the minimum weight at a particular rate depends on the original code. Protograph-based Raptor-like LDPC (PBRL) codes were proposed in, which are a class of rate-compatible LDPC codes with extensive rate compatibility. The design of PBRL codes at short and long block lengths have been based on optimizing the iterative decoding threshold of the protograph at various design rates. In particular, each additional parity bit in the protograph is explicitly designed to optimize the density evolution threshold. These codes have been standardized for 5G enhanced mobile broadband for the data channel. A more general approach based on extending is to use rateless codes. Also known as Fountain codes, rateless codes can generate a potentially limitless number of coded symbols for a given set of input symbols. The coded symbols are usually produced independently and randomly. The receiver can then recover the original input symbols from any subset of received symbols given the length of the subset is sufficiently large. Luby transform (LT) codes were the first practical realization of Fountain codes, where each output symbol is generated by adding \(d\) randomly chosen input symbols, where \(d\) is obtained from a predefined probability distribution function, referred to as the degree distribution. LT codes suffer from error-floor, which is mainly due to random selection of input symbols when generating coded symbols. Rapid tornado (Raptor) codes solve this problem by adding a high-rate precoder, usually a LDPC code, to an LT code. When the degree distribution is chosen properly, the decoder can recover the original \(k\) input symbols from any \(n\) Raptor coded symbols as long as \(n\) is slightly larger than \(k\). The encoding and decoding complexity of Raptor codes increases linearly with the message length. Raptor codes can be used over noisy channels. Authors in showed that unlike the erasure channel where a universal degree distribution can be optimized for all erasure rates, the optimized degree distributions of Raptor codes over BI-AWGN and binary symmetric channel (BSC) depend on the channel; therefore, non-universal. To address this problem, several approaches based on adaptive degree distribution design were proposed in the literature. The design and analysis are, however, valid only for asymptotically long block lengths. In binary rateless codes, such as Raptor and LT codes, each new coded symbol is generated through a random process. However, this does not guarantee that the minimum Hamming weight of the code is increased by adding a new parity symbol. It is also probable that a redundant coded symbol is being generated. In fact, the code weight spectrum or the minimum Hamming weight have not been the design criteria for these codes, as they were mainly designed for asymptotically long message sizes. It is now recognized that bit-level granularity of the codeword size and code operating rate is desired for 5G and beyond. The actual coding rate used in transmission could not be restricted and optimized for specified ranges. Designing and optimizing short block length codes have been recently attracted for being implemented on memory or power-constrained devices, mainly in the context of the Internet of Things applications and services. Existing RC codes are mainly constructed using puncturing and extending, which are shown to be sub-optimal for short block lengths. Therefore, designing RC codes for short messages that support bit-level granularity of the codeword size and maintain a large minimum Hamming weight at various rates is still open. In this paper, we propose primitive rateless (PR) codes, which are mainly characterized by the message length \(k\) and a primitive polynomial of degree \(k\) over \(\mathbf{GF}(2)\). We show that PR codes can be represented by using 1) a linear-feedback shift-register (LFSR) with connection polynomial \(x^kp(1/x)\) and 2) Boolean functions. In fact, the codewords of a PR code are subsequences of a maximum-length sequence (\(m\)-sequence). We show that any two PR codes of dimension \(k\) and truncated at length \(n\ge 2k\), which are constructed by using two distinct primitive polynomials, do not have any non-zero codeword in common. We also characterize the average Hamming weight distribution of PR codes and develop a lower bound on the minimum Hamming weight which is very close to the Gilbert-Varshamov bound. We show that for any \(k\), there exists at least one PR code that can meet this bound. We further find some good primitive polynomials for PR codes of dimension \(k\le 40\), which can closely approach the Gilbert-Varshamov bound at various rates. Simulation results show that the PR code with a properly chosen primitive polynomial can achieve a similar block error rate (BLER) performance as the extended Bose, Chaudhuri, and Hocquenghem (eBCH) code counterpart. This is because while a PR codes has a lower minimum Hamming weight than the eBCH code, it has a lower number of low-weight codewords. Simulation results show that PR codes in a rateless setting can achieve a very high realized rate over a wide range of SNRs. PR codes can be designed for any message length and arbitrary rate and perform very close to finite block length bounds. They are rate-compatible and have a very simple encoding structure, unlike most rate-compatible codes designed based on puncturing a low-rate mother code, with mostly sub-optimal performance at various rates. The rest of the paper is organized as follows. Section II introduces primitive rateless (PR) codes and discusses some of their important properties. In Section III, we characterize the Hamming weight distribution of the dual of the PR code and then find the average Hamming weight distribution of PR codes. We also characterize the minimum Hamming weight of the PR codes. In Section IV, we explain how to choose the primitive polynomial for PR codes and provide a list of good primitive polynomials for message lengths up to \(40\). Numerical results are presented in Section V. Finally, Section VI concludes the paper. # Construction of the Primitive Rateless Code A primitive rateless (PR) code, denoted by \(\mathrm{PR}(k,p(x))\), is characterized by the information block length \(k\) and a binary primitive polynomial \(p(x)=\sum_{i=0}^{k}p_{i}x^{i}\) of degree \(k\), for \(p_0=p_k=1\), which is the minimal polynomial of a primitive element \(\alpha\) over \(\mathbf{GF}(2^k)\). The generator matrix of a PR code \(\mathrm{PR}(k,p(x))\) truncated at length \(n\), which is denoted by \(\mathrm{PR}(k,n,p(x))\), is constructed as follows: \[\begin{aligned} \mathbf{G}_n=\left[\alpha^0, \alpha^1, \cdots, \alpha^{n-1}\right], \end{aligned}\] where the \(i^{th}\) column is the binary representation of \(\alpha^{i-1}\), for \(1\le i\le n\). Since \(\alpha\) is a primitive element of \(\mathbf{GF}(2^k)\), \(\{0,1,\alpha,\alpha^2,\cdots,\alpha^{2^k-2}\}\) is the entire field \(\mathbf{GF}(2^k)\). The parity check matrix of \(\mathrm{PR}(k,n,p(x))\) is given by: \[\mathbf{H}_n= \begin{bmatrix} p_0&p_1&\cdots&p_{k}&0&0&\cdots\\ 0&p_0&p_1&\cdots&p_{k}&0&\cdots\\ &\ddots&&\ddots&&\ddots&\\ 0&\cdots&0&p_0&p_1&\cdots&p_{k} \end{bmatrix}, \label{pmat}\] where the \(i^{th}\) row is the \((i-1)^{th}\)-order cyclic shift of the first row, for \(2\le i\le n-k\). Since \(\alpha\) is a primitive element and \(\sum_{i=0}^{k-1}p_{i}\alpha^{i}=\alpha^{k}\), it can be easily verified that \(\mathbf{G}_n\mathbf{H}_n^{\top}=\mathbf{0}\), where\(~^\top\) is the matrix transpose operand. It is important to note that since \(\alpha\) is a primitive \((2^k-1)\)-root of unity in \(\mathbf{GF}(2^k)\), i.e., \(\alpha^{2^k-1}=1\), the columns of the generator matrix will be repeating for \(n\ge 2^k-1\). # Hamming Weight Distribution of Primitive Rateless Codes In this section, we will characterize the Hamming weight distribution of PR codes. Authors in introduced an ideal distribution for the Hamming weight of the non-zero \(n\)-tuples of an \(m\)-sequence (equivalent to a PR code) as follows: \[\begin{aligned} \hat{A}_t=\frac{2^k-1}{2^n-1}\dbinom{n}{t}, ~~~ 1\le t\le n, \label{eq:idealdist} \end{aligned}\] where they tried to characterize the deviation of the Hamming weight distribution of the \(n\)-tuples from the ideal distribution. In particular, they found that if the minimum Hamming weight of the shortened Hamming code is greater than \(L\), the deviation from the ideal distribution is lower bounded by \[\begin{aligned} ||A||^2\ge \frac{(1-2^{k-n})(2^{n-k}-1)}{(1-2^{-k})(2^n-1)}\sum_{i=1}^{L}\dbinom{n}{i}, \end{aligned}\] where \(||A||\) is the Euclidean norm of the gap between the Hamming weight distribution and the ideal distribution. The Hamming weight distribution of the \(n\)-tuples was also characterized, which relies on the Hamming weight distribution of the shortened Hamming code and thus cannot be scaled to moderate and large codes. Moreover, according to Remark [\[dualprlfsr\]](#dualprlfsr){reference-type="ref" reference="dualprlfsr"}, a PR code \(\mathrm{PR}(n,k,p(x))\) can be realized as a punctured Simplex code, for which the weight distribution at block lengths \(n>2^{k-1}\) has been studied in. The approach however cannot be extended for an arbitrary \(n\) and in particular for \(2k\le n\le 2^k-1\), which is the primary focus of this work. Authors in provided a bound for the weight of subsequences of a \(m\)-sequence. That is for every \(n\), we have: \[\begin{aligned} \left| w_{\mathrm{H}}(\mathbf{c})-\frac{n}{2}\right|\le\sqrt{k}\left(\frac{\log\left(2^k-1\right)}{\pi}+1\right), \end{aligned}\] and when \(n\) goes large, we have \({w_\mathrm{H}(\mathbf{c})}\approx\frac{n}{2}\), where \({w_\mathrm{H}(\mathbf{c})}\) is the Hamming weight of the subsequnce \(\mathbf{c}\) of length \(n\). This means that for a sufficiently large \(n\), the Hamming weight distribution of PR codes is concentrated around \(n/2\). The following lemma characterises the first and second moments of the Hamming weight distribution of PR codes. Let \(A^{(i)}(z)\) denote the weight enumerator of the PR code \(\mathrm{PR}(n,k,p_i(x))\). As we have \(M_k=\varphi(2^k-1)/k\) of such codes (Lemma [\[lemma:euler\]](#lemma:euler){reference-type="ref" reference="lemma:euler"}), we can define the average weight enumerator of PR codes of dimension \(k\) truncated at length \(n\) as follows: \[\begin{aligned} \Bar{A}(z)=\frac{1}{M_k}\sum_{i=1}^{M_k}\sum_{j=0}^{n}A^{(i)}_jz^j, \end{aligned}\] where for simplicity, we define \(\Bar{A}_j=\frac{1}{M_k}\sum_{i=1}^{M_k}A^{(i)}_j\). By using the MacWilliams identity, we will have \[\begin{aligned} \Bar{A}_j= \frac{1}{M_k}\sum_{i=1}^{M_k}\sum_{t=0}^{n}\frac{B^{(i)}_t}{2^{n-k}}K_j(t) =\frac{1}{2^{n-k}}\sum_{t=0}^{n}\Bar{B}_tK_j(t), \label{eq:mcwilliam} \end{aligned}\] where \(\Bar{B}_t=\frac{1}{M_k}\sum_{i=1}^{M_k}B^{(i)}_t\) and \[\begin{aligned} K_j(t)=\sum_{\ell=0}^{j}(-1)^{\ell}\dbinom{t}{\ell}\dbinom{n-t}{j-\ell} \end{aligned}\] is the Krawtchouk polynomial, where \(t\) is an integer, \(0\le t\le n\). We commonly use the following identities in the rest of the paper : \(K_j(0)=\dbinom{n}{j}\), \(K_n(t)=(-1)^t\), and \(K_j(n)=(-1)^n\dbinom{n}{j}\). We are interested in the *average* Hamming weight distribution of all ensembles of PR codes. For this we consider all possible \(\varphi(2^k-1)/k\) ensembles of PR codes and their dual codes to characterize the average Hamming weight distributions at any desired codeword length. ## Average Weight Distribution of Dual of PR Codes As stated in Remark [\[remarkpoly\]](#remarkpoly){reference-type="ref" reference="remarkpoly"}, the dual of a PR code is a polynomial code with generator polynomial \(p(x)\). In other words, every codeword of the dual code is a product of \(p(x)\). It is then clear that \(\Bar{B}_t\) is equivalent to the expected number of all weight-\(t\) multiples with degree at most \(n-1\) of every primitive polynomial of degree \(k\). The following lemma characterizes \(\Bar{B}_t\). Authors in further approximated \(N_{k,t}\) by \(\dbinom{2^k-2}{t-2}/(t-1)\), which is tight when \(t\ll 2^k\). By using this approximation, we can further simplify ([\[eq:dualweigth\]](#eq:dualweigth){reference-type="ref" reference="eq:dualweigth"}) as follows: \[\begin{aligned} \bar{B}_t\approx\frac{1}{2^k-t}D^{(k)}_{n,t},~~3\le t\le n. \label{eq:dualweigth2} \end{aligned}\] Fig. [\[fig:avgweightdual\]](#fig:avgweightdual){reference-type="ref" reference="fig:avgweightdual"} shows the average Hamming weight distribution of the dual of PR codes when \(k=10\), \(n=25\) and \(k=15\), \(n=31\). It is important to note that there are \(M_{10}=60\) and \(M_{15}=1800\) different PR codes of dimension \(k=10\) and \(k=15\), respectively. Fig. [\[fig:avgweightdual\]](#fig:avgweightdual){reference-type="ref" reference="fig:avgweightdual"} is produced by generating all the dual codes and their weight distributions and taking average to find the average weight distribution. As can be seen in this figure, ([\[eq:dualweigth\]](#eq:dualweigth){reference-type="ref" reference="eq:dualweigth"}) provides a tight approximation for the average weight distribution of duals of PR codes. Fig. [\[fig:weightdual\]](#fig:weightdual){reference-type="ref" reference="fig:weightdual"} shows the Hamming weight distribution of the dual of a PR code at different lengths, when \(k=10\) and \(k=19\), with primitive polynomials \(p(x)=1+x^2+x^4+x^5+x^7+x^9+x^{10}\) and \(p(x)=1+x+x^2+x^5+x^7+x^8+x^{12}+x^{13}+x^{14}+x^{17}+x^{19}\), respectively. As can be seen, ([\[eq:dualweigth\]](#eq:dualweigth){reference-type="ref" reference="eq:dualweigth"}) also provides a very tight approximation of the Hamming weight distribution of duals of PR codes. To better characterize the approximation in ([\[eq:dualweigth2\]](#eq:dualweigth2){reference-type="ref" reference="eq:dualweigth2"}), we use the Kullback-Leibler Divergence (KLD)[^5] to measure the distance between the exact weight distribution of the dual code and the approximations. In particular, when \(k=10\), we have \(\mathrm{KLD}(B_t\parallel\Bar{B}_t)=1.1\times 10^{-5}\) and when \(k=19\), we have \(\mathrm{KLD}(B_t\parallel\Bar{B}_t)=6.7\times 10^{-5}\). ## Average Weight Distribution of PR Codes The following lemma characterises the average Hamming weight distribution of PR codes. Following Lemma [\[lem:WeightEnum\]](#lem:WeightEnum){reference-type="ref" reference="lem:WeightEnum"}, the average weight enumerator of PR codes of dimension \(k\) and truncated at length \(n\) is given by: \[\begin{aligned} \Bar{A}(z)\approx 1-{2^{-n}}\sum_{t=0}^{k}F^{(k)}_{n,t}(1-z)^t(1+z)^{n-t}. \end{aligned}\] Fig. [\[fig:avgWeightPR\]](#fig:avgWeightPR){reference-type="ref" reference="fig:avgWeightPR"} shows the average weight distribution of PR codes of dimension \(k=10\) and \(k=15\) at different lengths. As can be seen, ([\[eq:avgWeightPR\]](#eq:avgWeightPR){reference-type="ref" reference="eq:avgWeightPR"}) provides a tight approximation for the average weight distribution of PR codes. Fig. [\[fig:weightdist39\]](#fig:weightdist39){reference-type="ref" reference="fig:weightdist39"} shows the Hamming weight distribution of a PR code when \(k=39\) and \(p(x)=x^{39} + x^{38} + x^{35} + x^{32} + x^{27} + x^{25} + x^{24} + x^{23} + x^{20} + x^{19} + x^{16} + x^{15} + x^{11} + x^{9} + x^8 + x^4 + x^3 + x^2 + 1\). As can be seen, the wight distribution can be well approximated by ([\[eq:avgWeightPR\]](#eq:avgWeightPR){reference-type="ref" reference="eq:avgWeightPR"}). When \(k=39\) and \(n=49\), we have \(\mathrm{KLD}(A_t\parallel\Bar{A}_{t})=8.6\times 10^{-11}\), when \(n=64\), \(\mathrm{KLD}(A_t\parallel\Bar{A}_{t})=1.4\times 10^{-10}\), and when \(n=128\), \(\mathrm{KLD}(A_t\parallel\Bar{A}_{t})=5.4\times 10^{-10}\). We used MAGMA calculator to obtain the Hamming weight distribution of PR codes. In the following theorem, we prove the existence of a PR code for any \(k\) and \(n\ge 2k\), that has a minimum Hamming weight large than a certain value. This can be verified from \(\Bar{A}_j\) for \(j\ge3\) in ([\[eq:avgWeightPR\]](#eq:avgWeightPR){reference-type="ref" reference="eq:avgWeightPR"}) as follows: \[\begin{aligned} \nonumber\bar{A}_j&=\frac{2^k-1}{2^{n}}K_j(0)-\frac{1}{2^{n}}\sum_{t=1}^k F_{n,t}^{(k)}K_j(t)\\ &\overset{(a)}{=}\frac{1}{2^{n-k}}\dbinom{n}{j}-\frac{1}{2^{n}}\left(\dbinom{n}{j}+\sum_{t=1}^k F_{n,t}^{(k)}K_j(t)\right), \end{aligned}\] where step \((a)\) follows from the fact that \(K_j(0)=\dbinom{n}{j}\). When \(n\) is sufficiently large, we have \[\begin{aligned} x_1^{(j)}=\frac{n}{2}-\sqrt{j(n-j)}+o(n), \end{aligned}\] where \(x_1^{(j)}\) is the smallest root of \(K_j(x)\). For \(n\) sufficiently large and \(j\) sufficiently small, we will have \(K_j(t)\ge0\); therefore, \(\Bar{A}_j\le 2^{k-n}\dbinom{n}{j}\). It is important to note that as can be seen in Fig. [\[fig:avgWeightPR\]](#fig:avgWeightPR){reference-type="ref" reference="fig:avgWeightPR"} and Fig. [\[fig:weightdist39\]](#fig:weightdist39){reference-type="ref" reference="fig:weightdist39"}, the Hamming weight distribution of PR codes can be well approximated by the ideal distribution [\[eq:idealdist\]](#eq:idealdist){reference-type="eqref" reference="eq:idealdist"}, which is similar to the truncated binomial distribution [\[eq:binoapp\]](#eq:binoapp){reference-type="eqref" reference="eq:binoapp"}[^6]. According to Remark [\[rem:gv\]](#rem:gv){reference-type="ref" reference="rem:gv"}, one can conclude that \[\begin{aligned} d_{\min}\ge d_{\mathrm{GV}}, \label{eq:boundgvmin} \end{aligned}\] where \(d_{\mathrm{GV}}\) is the minimum Hamming weight obtained from the Gilbert-Varshamov bound: \[\begin{aligned} d_{\mathrm{GV}}=\max_d\left\{d\left|\sum_{j=0}^{d-1}\dbinom{n}{j}\le 2^{n-k} \right.\right\}. \label{eq:GVdisbound} \end{aligned}\] Fig. [\[fig:mindistbound\]](#fig:mindistbound){reference-type="ref" reference="fig:mindistbound"} shows the minimum Hamming weight for three PR codes of dimension \(k=16\), \(k=20\), and \(k=39\) at different block length. As can be seen in this figure, a PR code with a properly chosen primitive polynomial will have a minimum Hamming weight close to the bound ([\[eq:mindisbound\]](#eq:mindisbound){reference-type="ref" reference="eq:mindisbound"}) at any block length \(n\ge2k\). It is also important to note that the bound obtained in ([\[eq:mindisbound\]](#eq:mindisbound){reference-type="ref" reference="eq:mindisbound"}) and ([\[eq:GVdisbound\]](#eq:GVdisbound){reference-type="ref" reference="eq:GVdisbound"}) are identical for the cases in Fig. [\[fig:mindistbound\]](#fig:mindistbound){reference-type="ref" reference="fig:mindistbound"}. One can search for other primitive polynomials to achieve higher minimum Hamming weight at a given block length. This also shows that a PR code with a properly chosen primitive polynomial can meet the Gilbert-Varshamov bound. In this paper, we use MAGMA to calculate the minimum Hamming weight of PR codes. MAGMA is using an algorithm described in to find the minimum Hamming weight of linear codes. It generates several generator matrices for the same code, such that these codes have disjoint information sets. The algorithm proceeds by enumerating all combinations derived from \(r\) information symbols in all generator matrices, for each successive \(r\). Once the lower and upper bounds on the minimum weight meet, the computation is complete. For PR codes, the codeword with the minimum weight usually corresponds to a low-weight message word; thus, MAGMA easily finds the minimum weight of PR codes. # Selecting Primitive Polynomials for PR codes S. Wainberg and J. K Wolf studied the properties of subsequences of long \(m\)-sequences using the moments of the subsequence weight distribution. The moments were used for selecting good \(m\)-sequences for correlation-detection problem. Authors in showed that for some bad initial vectors, terrible non-randomness continues for extraordinary long time in the sequences generated by the LFSRs with primitive polynomials with three terms. The bad behaviour of primitive trinomials and \(t\)-nomials with small \(t\) was studies in. For PR codes to have the Hamming weight distribution closely approach the binomial distribution and accordingly a minimum Hamming weight lower bounded by [\[eq:boundgvmin\]](#eq:boundgvmin){reference-type="eqref" reference="eq:boundgvmin"}, the subsequences of the LFSR should preserve randomness for almost all initial conditions. Otherwise, the subsequences will have too many zeros or ones. Therefore, the primitive polynomial should be chosen properly to preserve randomness for subsequences of moderate length. Authors in showed (via numerical results) that the probability distribution of the number of ones in \(n\) successive bits of an \(m\)-sequence with primitive polynomial \(p(x)\), which is equivalent to the Hamming weight distribution of the PR code with the same primitive polynomial, can be well approximated by the binomial distribution, when 1) the length \(k\) of the shift-register is sufficiently large, 2) the sequence length \(n\) satisfies \(144\le n\ll 2^k\), and 3) the primitive polynomial should be chosen such that the number of subsequences of length \(n\) with Hamming weight \(\ell\) is small for \(\ell\) near zero and \(\ell\) near \(n\). We however found that in most cases when the primitive polynomial is chosen properly, the Hamming weight distribution closely approaches the binomial distribution for a sufficiently large \(n\). LFSRs with their connection polynomials very sparse are very vulnerable to various known attacks. On the other hands, a very dense primitive polynomial might be a factor of a low density polynomial of moderate degree, which makes the LFSR vulnerable to various attacks, such as the correlation attack. When the primitive polynomial is sparse or has a multiple with only a few non-zero elements, the dual of the PR code will have a relatively low minimum Hamming weight. In particular, as shown in when the primitive polynomial is \(p(x)=1+x^{\ell}+x^k\), with \(k\ge 2\ell\), the initial vector for the characteristic sequence has at most two 1's, where the characteristic sequences satisfies \(x_i=x_{2i}\) for every integer \(i\). This means that the sequence is not completely random; therefore, the Hamming weight distribution of the respective PR code deviates from the binomial distribution. We found some good primitive polynomials for PR codes which can closely achieve the bound [\[eq:mindisbound\]](#eq:mindisbound){reference-type="eqref" reference="eq:mindisbound"} developed in Theorem 1. In particular, first a random irreducible polynomial of degree \(k\) and weight larger than or equal to \(k/2\) is generated. Then, the polynomial will be tested for primitivity. If the polynomial is not primitive, another random irreducible polynomial will be generated. If the polynomial is primitive, then the minimum Hamming weight of the code is calculated at different rates. If the calculated Hamming weights are close to the bound in [\[eq:mindisbound\]](#eq:mindisbound){reference-type="eqref" reference="eq:mindisbound"}, then the polynomial will be considered as good primitive polynomial. Usually, the good polynomial is found after generating up to 5 random irreducible polynomials. When \(k\) increases, the number of primitive polynomials of degree \(k\) also increases, therefore, the search space for finding a better primitive polynomial also scales. Table [\[tab:primpoly\]](#tab:primpoly){reference-type="ref" reference="tab:primpoly"} lists some of good primitive polynomials for PR codes of dimension up to \(k=40\). For most of the primitive polynomials, the density of the primitive polynomial is almost \(0.5\), which means that it has almost \(k/2\) terms. As can be seen in this table, the PR code with these primitive polynomials can closely approach the Gilbert-Varshamov bound [\[eq:GVdisbound\]](#eq:GVdisbound){reference-type="eqref" reference="eq:GVdisbound"} at different rates. It is important to note that one may find other primitive polynomials which can achieve higher minimum Hamming weights at some code rates. Our results show that for sufficiently large \(k\) (\(k\ge20\)) a randomly chosen primitive polynomial of degree \(k\) with almost \(k/2\) terms can generate PR codes with Hamming weight distribution closely approaching the Binomial distribution and accordingly minimum Hamming weights close to the bound [\[eq:mindisbound\]](#eq:mindisbound){reference-type="eqref" reference="eq:mindisbound"}, when \(n\ge 2k\). # Numerical Results In this section, we study the block error rate (BLER) performance of PR codes at fixed block lengths and compare them with eBCH codes with the same dimensions and block lengths. We also provide some results on the rateless performance of PR codes. ## Fixed-rate Performance A message \(\mathbf{b}\) of length \(k\) is encoded by using a PR code \(\mathrm{PR}(k,n,p(x))\) to generate a codeword \(\mathbf{c}\). Each coded symbol \(c_i\), for \(1\le i\le n\), is then modulated to \(x_i=(-1)^{c_i}\) and sent over a binary-input additive white Gaussian noise (BI-AWGN) channel, \(y_i=x_i+w_i\), where \(y_i\) is the \(i^{th}\) channel output and \(w_i\) is the AWGN with variance \(N_0/2\). The channel signal-to-noise ratio (SNR) is then given by \(\gamma=2/N_0\). By using the average weight enumerator of PR codes obtained in [\[eq:avgWeightPR\]](#eq:avgWeightPR){reference-type="eqref" reference="eq:avgWeightPR"}, we can derive a union bound (UB) for the BLER as follows: \[\begin{aligned} \epsilon_{\mathrm{UB}}=\sum_{i=d_{min}}^{n}\frac{i}{n} \Bar{A}_iQ\left(\sqrt{i\gamma}\right), \label{eq:unionbound} \end{aligned}\] where \(Q(.)\) is the standard \(Q\)-function, \(d_{\min}\) is obtained from [\[eq:mindisbound\]](#eq:mindisbound){reference-type="eqref" reference="eq:mindisbound"}, and \(\Bar{A}_i\) is given by [\[eq:avgWeightPR\]](#eq:avgWeightPR){reference-type="eqref" reference="eq:avgWeightPR"}. Fig. [\[fig:bler7\]](#fig:bler7){reference-type="ref" reference="fig:bler7"} shows the BLER performance of PR codes when the message length is \(k\approx7\). The primitive polynomial for PR codes are obtained from Table [\[tab:primpoly\]](#tab:primpoly){reference-type="ref" reference="tab:primpoly"}. We use an order-5 ordered statistic decoding (OSD) algorithm for decoding both PR and eBCH codes. As can be seen in this figure, PR codes achieve almost the same BLER as their eBCH counterparts in different SNRs and code rates. The results in Fig. [\[fig:bler16\]](#fig:bler16){reference-type="ref" reference="fig:bler16"} and Fig. [\[fig:bler24\]](#fig:bler24){reference-type="ref" reference="fig:bler24"} for \(k\approx 16\) and \(k\approx 24\), respectively, also confirm that PR codes with properly chosen primitive polynomials can achieve BLERs close to their eBCH counterparts. It is important to note that while eBCH codes have relatively larger minimum Hamming weights, PR codes achieves almost the same BLER performance, which is mainly due to the fact the Hamming weight distribution of PR codes is very close to the binomial distribution (when the primitive polynomial is chosen properly), which means that the PR code has a small number of codewords with low Hamming weights. This can be clearly seen in Table [\[tab3\]](#tab3){reference-type="ref" reference="tab3"}, that shows the Hamming weight distribution of eBCH and PR codes at different block lengths and rates. ## Rateless Performance We now consider a rateless setting, where we assume that the transmitter wants to deliver a message of length \(k\) symbols at the receiver. We assume that the receiver can estimate the channel SNR accurately, however the transmitter does not have any knowledge of the channel SNR. The transmitter uses a PR code \(\mathrm{PR}(k,p(x))\) to generate a potentially limitless number of PR coded symbols and continuously send to the receiver. The receiver sends an acknowledgement to the sender when it collected a sufficient number of coded symbols. We use the Polyanskiy-Poor-Verdu (PPV) normal approximation to estimate the number of coded symbols to perform a successful decoding at the desired block error rate. Let \(n_s\) denote the number of coded symbols required to perform a successful decoding at the target block error rate \(\epsilon_{\mathrm{th}}\). It can be estimated as follows: \[\begin{aligned} n_s=\min_n\left\{n: \epsilon(k,n,\gamma)\le\epsilon_{\mathrm{th}}\right\}, \label{eq:blppv} \end{aligned}\] where \[\begin{aligned} \epsilon(k,n,\gamma)=Q\left(\sqrt{\frac{1}{nV(\gamma)}}\left(\frac{nC(\gamma)-k}{\log_2(e)}+\frac{\ln(n)}{2}\right)\right), \label{eq:ppvbound} \end{aligned}\] where for a BI-AWGN channel at SNR \(\gamma\), we have \[\begin{aligned} C(\gamma)=1+\frac{H^{(1)}(0)}{\ln(2)}, ~~~V(\gamma)=H^{(2)}(0)-\left(H^{(1)}(0)\right)^2, \end{aligned}\] and \[\begin{aligned} H^{(\ell)}(0)=\frac{1}{\sqrt{2\pi\gamma}}\int_{-\infty}^{-\infty}e^{-\frac{(x-\gamma)^2}{2\gamma}}(-h(x))^\ell dx, \end{aligned}\] and \(h(x)=\ln\left(1+e^{-2x}\right)\). We consider three message lengths, i.e, \(k=8,~15\), and \(24\), and simulate the PR code in a rateless manner and find the block error rates in various SNRs at block lengths obtained by [\[eq:blppv\]](#eq:blppv){reference-type="eqref" reference="eq:blppv"}. Fig. [\[fig:ratelessBLER\]](#fig:ratelessBLER){reference-type="ref" reference="fig:ratelessBLER"} shows the results for the target BLER of \(10^{-2}\) and \(10^{-4}\) when an order-5 OSD decoder was used for \(k=15\) and \(k=24\), while the maximum-likelihood (ML) decoder was used for \(k=8\). As can be seen the proposed PR code performs very close to the normal approximation bound [\[eq:ppvbound\]](#eq:ppvbound){reference-type="eqref" reference="eq:ppvbound"} and achieves the target BLER. It is important to note that the approximation ([\[eq:ppvbound\]](#eq:ppvbound){reference-type="ref" reference="eq:ppvbound"}) looses accuracy at low SNRs, low rates, and very short block lengths; therefore, the estimated number of coded symbols required for a successful decoding may not be accurate. This is the main reason why at high SNRs, there is a large gap between the BLER of PR codes and the target BLER. In particular, when SNR is 5dB, \(n_s\) will be very close to \(k\), which is very short. The bound in [\[eq:ppvbound\]](#eq:ppvbound){reference-type="eqref" reference="eq:ppvbound"} is therefore loose and \(n_s\) will be inaccurate. It is also important to note that for codes operating at low SNRs, a higher order OSD may be required. This is because for a linear block code \(\mathcal{C}(n,k)\) with minimum distance \(d_{\mathrm{H}}\) it has been proven that an OSD with the order of \(m=\lceil (d_{\mathrm{H}}-1)/4\rceil\) is asymptotically optimum, which means that it can achieve the maximum-likelihood performance. For example, when \(\epsilon_{\mathrm{th}}=10^{-4}\), \(k=24\), and SNR\(=-5\)dB, the number of coded symbols obtained by [\[eq:blppv\]](#eq:blppv){reference-type="eqref" reference="eq:blppv"} is \(n_s=323\) and the respective PR code will have a minimum Hamming weight of \(d_{\mathrm{H}}=116\). Therefore, an OSD with an order much larger than 5 is required to have a near optimal performance. The gap at low SNRs for \(k=15\) and \(k=24\) is mainly due to the low order of the OSD decoder. We consider another rateless scenario, where the receiver attempts the first decoding when it collected \(n_1\) symbols and if successful, it sends an acknowledgment to the transmitter to stop the transmission. We assume that the feedback is instantaneous and error-free. However, if the decoding failed, the receiver collects \(\delta>0\) additional symbols and reattempts the decoding using a codeword with \(n_1+\delta\) symbols. In particular, in the \(i^{th}\) decoding attempt, the receiver has already collected \(n_i=n_1+(i-1)\delta\) PR coded symbols and performs the decoding using a codeword of length \(n_i\). The transmitter terminates the transmission upon receiving the acknowledgement or when a predetermined number of symbols are sent. We use a \(k_c\)-bit CRC check to decide whether the decoding in each attempt is successful or not. The throughput or the realize rate of the PR code is then defined as follows: \[\begin{aligned} \mathcal{R}=\frac{(k-k_c)(1-\epsilon)}{\mathbb{E}[n]}, \end{aligned}\] where \(\mathbb{E}\) is the expectation operand, \(n\) is the number of coded symbols collected until the CRC bits are checked, and \(\epsilon\) is the block error rate. It is clear that \(n\) is random and depends on the noise realization. Fig. [\[fig:ratelessCRC\]](#fig:ratelessCRC){reference-type="ref" reference="fig:ratelessCRC"} shows that the PR code with \(k=61\) and 2-bit CRC over the BI-AWGN channel can closely approach the normal approximation bound in a wide range of SNRs at different target BLERs. We also show the performance of the PR code over the Rayleigh block fading channel with QPSK modulation in Fig. [\[fig:ratelessfading\]](#fig:ratelessfading){reference-type="ref" reference="fig:ratelessfading"}. We assumes that the channel state information is available at the receiver, therefore it can determine the initial codeword length \(n_1=n_s\) according to [\[eq:blppv\]](#eq:blppv){reference-type="eqref" reference="eq:blppv"} to start the decoding. We also assume that the channel remains fixed for the entire duration of decoding a message block of length \(k\) bits. As can be seen, the PR code with \(k=61\) and 2-bit CRC can closely approach the normal approximation bound in a wide range of SNRs over the fading channel. The performance can be improved by using a higher order OSD algorithm, which in turns increases the complexity. ## OSD Decoding of PR codes Designing an efficient decoding algorithm for PR codes is of critical importance. While this is out of the scope of this paper, we provide some notes on the use of low-complexity OSD algorithms for decoding PR codes. In OSD, the received coded symbols are first ordered in descending order of their reliability. The generator matrix of the code is accordingly permuted. Next, Gaussian elimination (GE) is performed to obtain the systematic form of the permuted generator matrix. A second permutation may be required during the GE to ensure that the first \(k\) columns are linearly independent. The first \(k\) bit positions are referred to as the most reliable basis (MRB). Then, MRB will be XORed with a set of test error patterns (TEP) with the Hamming weight up to a certain degree, referred to as the order of OSD. Then the vectors obtained by XORing the MRB are re-encoded using the permuted generator matrix to generate candidate codeword estimates. The codeword estimate with the minimum distance from the received signal is selected as the decoding output. OSD is an approximate maximum likelihood (ML) decoder for block codes. More specifically, for a linear block code \((n, k)\) with minimum Hamming weight \(d_{\min}\), it is proven that an OSD with order \(m = \lceil d_{\min}/4-1\rceil\) is asymptotically optimum. OSD is, however, complex and its algorithmic complexity can be up to \(\mathcal{O}(k^m)\) for an order-\(m\) OSD. Several approaches have been recently proposed to reduce the number of TEPs required to be re-encoded to find the best codeword estimate. Authors in characterized the evolution of the distance distribution during the reprocessing stage of the OSD algorithm. They accordingly proposed several decoding rules, namely sufficient and necessary conditions, to reduce the complexity significantly. These are mainly to terminate the decoding early, when a suitable candidate codeword is found, and to discard TEPs, which are less likely to generate promising codeword candidates. Other approaches introduced in can also be used to further reduce the complexity by searching through the TEPs in an optimal manner, which will result in finding the best codeword estimate faster. An efficient implementation in C has shown that the OSD decoding with sufficient and necessary conditions can run an order-5 OSD in a few \(\mu\)s per codeword. For the simulations in this paper, we used the simple probabilistic necessary condition (PNC) proposed in to terminate the decoding when a candidate codeword is found with the distance to the received signal lower than a certain threshold. The threshold value for the \(i^{th}\) reprocessing order is calculated as \(S_i = \sum_{k-1-i}^{k-1}|\bar{y}_i| + \beta(n-k)\), where \(\bar{y}_i\) is the re-ordered received signal. In the \(i^{th}\) reprocessing stage, once a codeword with distance to the received codeword less than \(S_i\) is found, the decoder terminates and skips the remaining orders. For example, when decoding the PR code with \(k=22\) and \(n=128\) (Fig. [\[fig:bler24\]](#fig:bler24){reference-type="ref" reference="fig:bler24"}) using an order-7 OSD with PNC and \(\beta=0.08\), we only need to check on average 1265 TEPs at SNR\(=-1\)dB. This is a significant reduction from 280599 TEPs in the original order-7 OSD, while achieving the same BLER performance. The decoding run-time per codeword is accordingly reduced by two orders of magnitude. Further reductions in the number of TEPs and running time can be achieved by using approaches proposed in. We note that other decoding approaches, such as the Berlekamp--Massey algorithm, can be modified to decode PR codes. This is however out of the scope of this work and will be discussed in future works. # Conclusions and Future Works In this paper, primitive rateless (PR) codes were proposed. A PR code is mainly characterized by the message length \(k\) and a primitive polynomial of degree \(k\), where the \(i^{th}\) columns of the generator matrix is the binary representation of \(\alpha^{i-1}\), where \(\alpha\) is a primitive element of \(\mathbf{GF}(2^k)\) and is the root of \(p(x)\). We showed that a PR code can be also constructed 1) by using a linear-feedback shift-register (LFSR) with connection polynomial \(x^kp(1/x)\) and 2) by using Boolean functions. We proved that any two PR codes of dimension \(k\) and truncated at length \(n\ge 2k\), which are constructed by using two distinct primitive polynomials, do not have any non-zero codeword in common. We characterized the average Hamming weight distribution of PR codes and developed a lower bound on the minimum Hamming weight which is very close to the Gilbert-Varshamov bound. We proved that for any \(k\), there exists at least one PR code that can meet this bound. We further found some good primitive polynomials for PR codes of dimension \(k\le 40\) which can closely approach the Gilbert-Varshamov bound. Simulation results show that the PR code with a properly chosen primitive polynomial can achieve similar block error rate performance as the eBCH code counterpart. We further simulated the PR code in a rateless setting and showed that it can achieve very high realized rates over a wide range of SNRs. PR codes can be designed for any message length and the primitive polynomial can be optimized for any block length. Potential future directions could be finding a framework to optimized the primitive polynomial and devising novel on-the-fly decoding approaches for PR codes. [^1]: In general, every linear code over \(\mathbf{GF}(q)\) with dual distance at least 3 is a punctured code of a Simplex code over \(\mathbf{GF}(q)\). Moreover, every linear code with minimum distance at least 3 is a shortened code of a Hamming code over \(\mathbf{GF}(q)\). [^2]: A more generic construction of a PR code over \(\mathbf{GF}(p)\) where \(p\) is prime, can be explained as follows. Let \(D=\{d_1,d_2,\cdots,d_n\}\subseteq\mathbf{GF}(p^k)\). A PR code of length \(n\) over \(\mathbf{GF}(p)\) is constructed by \(\mathcal{C}_D=\{\left(\mathrm{Tr}(xd_1),\mathrm{Tr}(xd_2),\cdots,\mathrm{Tr}(xd_n)\right):~x\in\mathbf{GF}(p^k)\}\) where \(D\) is called the defining set of the code and \(\mathrm{Tr}\) denotes the trace function from \(\mathbf{GF}(p^k)\) onto \(\mathbf{GF}(p)\). [^3]: The minimal polynomial of sequence \(\mathbf{c}\) is the connection polynomial of the shortest LFSR capable of producing \(\mathbf{c}\). [^4]: Lemma [\[lemma:avgweigth\]](#lemma:avgweigth){reference-type="ref" reference="lemma:avgweigth"} was previously presented in, which stated that the first and second moments of the distribution of the number of 1s in a subsequence of length \(n\) of an \(m\)-sequence with primitive connection polynomial \(p(x)\) of degree \(k\), are \(n/2\) and \(n/4\), respectively. We however provide our proof for the completeness of the discussion. [^5]: For discrete probability distributions \(P\) and \(Q\) defined on the same probability space, \(\mathcal{X}\), the KLD (or relative entropy) from \(Q\) to \(P\) is defined to be \(\mathrm{KLD}(P \parallel Q) = \sum_{x\in\mathcal{X}} p(x) \log\left(p(x)/q(x)\right)\). [^6]: Authors in tried to compare the probability that there are exactly \(t\) ones in \(n\) successive bits of an \(m\)-sequence and the ideal distribution. The approach, however, depends on the primitive polynomial used to generate the \(m\)-sequence and is computationally complex when \(k\) is large.
{'timestamp': '2021-07-14T02:06:37', 'yymm': '2107', 'arxiv_id': '2107.05774', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05774'}
null
null
null
null
null
null
null
null
null
null
null
null
null
null
# Introduction State-of-the-art artificial neural networks (ANNs) achieve impressive results in a variety of machine intelligence tasks. However, they largely rely on mechanisms that diverge from the original inspiration from biological neural networks. As a result, only a small part of this prolific field also contributes to computational neuroscience. In fact, this biological implausibility is also an important issue for machine intelligence. For their impressive performance, ANNs trade off other desired properties, which are present in biological systems. For example, ANN training often demands very large and labelled datasets. When labels are unavailable, self-supervised learning schemes exist, where supervisory error signals generated by the network itself are exploited and backpropagated from the output towards the input to update the network's parameters. However, this global propagation of signals in deep networks introduces another limitation. Namely, it prevents the implementation of efficient distributed computing hardware that would be based on only local signals from neighbouring physical nodes in the network, and is in contrast to the local synaptic plasticity rules that are believed to govern biological learning. Several pieces of work have been addressing parts of the biological implausibility and drawbacks of backpropagation in ANNs. Recently, an approximation to backpropagation that is mostly Hebbian, i.e. relies on mostly pre-and post-synaptic activity of each synapse, has been achieved by reducing the global error requirements to 1-bit information. Two schemes that further localize the signal that is required for a weight update are Equilibrium Propagation and Predictive Coding. Both methods approximate backpropagation through Hebbian-like learning, by delegating the global aspect of the computation, from a global error signal, to a global convergence of the network state to an equilibrium. This equilibrium is reached through several iterative steps of feed-forward and feed-back communication throughout the network, before the ultimate weight update by one training example. The biological plausibility and hardware-efficiency of this added iterative and heavily feedback-dependent process are open questions that begin to be addressed. Moreover, learning through backpropagation, and presumably also its approximations, has another indication of biological implausibility, which also significantly limits ANN applicability. Namely, it produces networks that are confused by small adversarial perturbations of the input, which are imperceptible by humans. It has recently been proposed that a defence strategy of \"deflection\" of adversarial attacks may be the ultimate solution to that problem. Through this strategy, to cause confusion in the network's inferred class, the adversary is forced to generate such a changed input that really belongs to the distribution of a different input class. Intuitively, but also strictly by definition, this deflection is achieved if a human assigns to the perturbed input the same label that the network does. Deflection of adversarial attacks in ANNs has been demonstrated by an elaborate scheme that is based on detecting the attacks. However, the human ability to deflect adversarial perturbations likely does not rely on detecting them, but rather on effectively ignoring them, making the deflecting type of robustness an emergent property of biological computation rather than a defence mechanism. The biological principles that underlie this property of robustness are unclear, but it might emerge from the distinct algorithms that govern learning in the brain. Therefore, what is missing is a biologically plausible model that can learn from fewer data-points, without labels, through local plasticity, and without feedback from distant layers. This model could then be tested for emergent adversarial robustness. A good candidate category of biological networks and learning algorithms is that of competitive learning. Neurons that compete for their activation through lateral inhibition are a common connectivity pattern in the superficial layers of the cerebral cortex. This pattern is described as winner-take-all (WTA), because competition suppresses activity of weakly activated neurons, and emphasizes strong ones. Combined with Hebbian-like plasticity rules, WTA connectivity gives rise to competitive-learning algorithms. These networks and learning schemes have been long studied and a large literature based on simulations and analyses describes their functional properties. A WTA neuronal layer, depending on its specifics, can restore missing input signals, perform decision making i.e. winner selection generate oscillations such as those that underlie brain rhythms. Perhaps more importantly, its neurons can learn to become selective to different input patterns, such as orientation of visual bars in models of the primary visual cortex, MNIST handwritten digits, CIFAR10 objects, spatiotemporal spiking patterns, and can adapt dynamically to model changing objects. The WTA model is indeed biologically plausible, Hebbian plasticity is local, and learning is input-driven, relying on only feed-forward communication of neurons--properties that seem to address several of the limitations of ANNs. However, the model's applicability is limited to simple tasks, because, the theoretical literature related to Hebbian WTA remains surprisingly limiting, despite its long history, and the strong and productive community interest. It remains unclear which specific plasticity rule and structure could optimize a non-spiking WTA for Bayesian inference, how to minimize a common loss function such as cross-entropy despite unsupervised learning, and how a cortical or artificial WTA could represent varying families of probability distributions. In summary, on the theoretical side, an algorithm that is simultaneously normative, based on WTA networks and Hebbian unsupervised plasticity, performs Bayesian inference, and, importantly, is composed of conventional, i.e. non-spiking, ANN elements and is rigorously linked to modern ANN tools such as cross-entropy loss, would be an important advance but has been missing. On the practical side, evidence that Hebbian WTA networks could be useful for presently pertinent issues of modern ANNs such as adversarial robustness, generation of synthetic images, or faster learning, has remained limited. Here we aim to fill these gaps. Recently, when WTA networks were studied in a theoretical framework compatible with conventional machine learning (ML), but in the context of short-term as opposed to long-term Hebbian plasticity, it resulted in surprising practical advantages over supervised ANNs. A similar theoretical approach could also reveal unknown advantages of long-term Hebbian plasticity in WTA networks. In addition, it could provide insights into how a WTA microcircuit could participate in larger-scale computation by deeper cortical or artificial networks. Here we construct \"SoftHebb\", a biologically plausible WTA model that is based on standard rate-based neurons as in ANNs, can accommodate various activation functions, and learns without labels, using local plasticity and only feed-forward communication, i.e. the properties we seek in an ANN. Importantly, it is equipped with a simple normalization of the layer's activations, and an optional temperature-scaling mechanism, producing a soft WTA instead of selecting a single \"hard\" winner neuron. This allows us to prove formally that a SoftHebb layer is a generative mixture model that objectively minimizes its Kullback-Leibler (KL) divergence from the input distribution through Bayesian inference, thus providing a new formal ML-theoretic perspective of these networks. We complement our main results, which are theoretical, with experiments that are small-scale but produce intriguing results. As a generative model, SoftHebb has a broader scope than classification, but we test it in simulations on the tasks of recognizing MNIST handwritten digits and Fashion-MNIST fashion products. First, we confirm that SoftHebb is more accurate than a hard-WTA model. Second, we validate that it minimizes a loss function (cross-entropy) even though it has no access to it or to labels during learning. In addition, likely owing to its Bayesian and generative properties, the unsupervised WTA model outperforms a supervised two-layer perceptron in several aspects: learning speed and accuracy in the first presentation of the training dataset, robustness to noisy data, and increased robustness to one of the strongest white-box adversarial attacks, i.e. projected gradient descent (PGD), and without any explicit defence. Interestingly, the SoftHebb model also exhibits inherent properties of deflection of the adversarial attacks, and generates object interpolations. # Theory The term \"cause\" is used here in the sense of causal inference. It is important to emphasize that the true cause of each input is hidden, i.e. not known. In the case of a labelled dataset, labels may correspond to causes, and the labels are deleted before presenting the training data to the model. We choose a mixture model that corresponds to the data assumptions but is also interpretable in neural terms (Paragraph [\[sec:neuro_exp\]](#sec:neuro_exp){reference-type="ref" reference="sec:neuro_exp"}): The model we have chosen is a reasonable choice because it factorizes similarly to the data of Definition [\[def:data\]](#def:data){reference-type="ref" reference="def:data"}: \[q_k\coloneqq q(\boldsymbol{x}|C_k; \boldsymbol{w}_k)=\prod_{i=1}^{n}q(x_i|C_k;w_{ik})=e^{\sum_{i=1}^{n}w_{ik}\frac{x_i}{||\boldsymbol{x}||}}=e^{u_k}, \label{eq:multinomial}\] where \(u_k=\frac{ \boldsymbol{w}_k\cdot \boldsymbol{x}}{|| \boldsymbol{w}_k||\cdot||\boldsymbol{x}||}\), i.e. the cosine similarity of the two vectors. A similar probabilistic model was used in related previous theoretical work, but for different data assumptions, and with certain further constraints to the model. Namely, considered data that was binary, and created by a population code, while the model was stochastic. These works provide the foundation of our derivation, but here we consider the more generic scenario where data are continuous-valued and input directly into the model, which is deterministic and, as we will show, more compatible with standard ANNs. In, data had particular short-term temporal dependencies, whereas here we consider the distinct case of independent and identically distributed (i.i.d.) input samples. The Bayes-optimal parameters of a model mixture of exponentials can be found analytically as functions of the input distribution's parameters, and the model is equivalent to a soft winner-take-all neural network. After describing this, we will prove here that Hebbian plasticity of synapses combined with local plasticity of the neuronal biases sets the parameters to their optimal values. In other words, the optimal parameter vector of each component \(k\) in this mixture is proportional to the mean of the corresponding component of the input distribution, i.e. it is a centroid of the component. In addition, the optimal parameter of the model's prior \(Q(C_k)\) is the logarithm of the corresponding component's prior probability. The Theorem's proof was provided in the supplementary material of, but for completeness we also provide it in our Appendix. These centroids and priors of the input's component distributions, as well as the method of their estimation, however, are different for different input assumptions, and we will derive a learning rule that provably sets the parameters to their Maximum Likelihood Estimate for the inputs addressed here. The learning rule is a Hebbian type of synaptic plasticity combined with a plasticity for neuronal biases. Before providing the rule and the related proof, we will describe how our mixture model is equivalent to a WTA neural network. ## Equivalence of the probabilistic model to a WTA neural network [\[sec:neuro_exp\]]{#sec:neuro_exp label="sec:neuro_exp"} The cosine similarity between the input vector and each centroid's parameters underpins the model (Eq. [\[eq:multinomial\]](#eq:multinomial){reference-type="ref" reference="eq:multinomial"}). This similarity is precisely computed by a linear neuron that receives normalized inputs \(\boldsymbol{x}^*\coloneqq\frac{\boldsymbol{x}}{||\boldsymbol{x}||}\), and that normalizes its vector of synaptic weights: \(\boldsymbol{w}^*_k\coloneqq\frac{\boldsymbol{w}}{||\boldsymbol{w}||}\). Specifically, the neuron's summed weighted input \(u_k= \boldsymbol{w}^*_k\cdot\boldsymbol{x}^*\) then determines the cosine similarity of an input sample to the weight vector, thus computing the likelihood function of each component of the input mixture (Eq. [\[eq:g_param\]](#eq:g_param){reference-type="ref" reference="eq:g_param"}). The bias term of each neuron can store the parameter \(w_{0k}\) of the prior \(Q(C_k; w_{0k})\). Based on these, it can also be shown that a set of \(K\) such neurons can actually compute the Bayesian posterior, if the neurons are connected in a configuration that implements softmax. Softmax has a biologically-plausible implementation through lateral inhibition (divisive normalization) between neurons. Specifically, based on the model of Definition [\[def:model\]](#def:model){reference-type="ref" reference="def:model"}, the posterior probability is \[Q(C_k|\boldsymbol{x})=\frac{e^{u_k+w_{0k}}}{\sum_{l=1}^{K}e^{u_l+w_{0l}}}. \label{eq:Q_model}\] But in the neural description, \(u_k+w_{0k}\) the activation of the \(k\)-th linear neuron. That is, Eq. [\[eq:Q_model\]](#eq:Q_model){reference-type="ref" reference="eq:Q_model"} shows that the result of Bayesian inference of the hidden cause from the input \(Q(C_k|\boldsymbol{x})\) is found by a softmax operation on the linear neural activations. In this equivalence, we will be using \(y_k\coloneqq Q(C_k|\boldsymbol{x};\boldsymbol{w})\) to symbolize the softmax output of the \(k\)-th neuron, i.e. the output after the WTA operation, interchangeably with \(Q(C_k|\boldsymbol{x})\). It can be seen in Eq. [\[eq:Q_model\]](#eq:Q_model){reference-type="ref" reference="eq:Q_model"} that the probabilistic model has one more, alternative, but equivalent neural interpretation. Specifically, \(Q(C_k|\boldsymbol{x})\) can be described as the output of a neuron with exponential activation function (numerator in Eq. [\[eq:Q_model\]](#eq:Q_model){reference-type="ref" reference="eq:Q_model"}) that is normalized by its layer's total output (denominator). This is equally accurate, and more directly analogous to the biological description. This shows that the exponential activation of each individual neuron \(k\) directly equals the \(k\)-th exponential component distribution of the generative mixture model (Eq. [\[eq:multinomial\]](#eq:multinomial){reference-type="ref" reference="eq:multinomial"}). Therefore the softmax-configured linear neurons, or the equivalent normalized exponential neurons, fully implement the generative model of Definition [\[def:model\]](#def:model){reference-type="ref" reference="def:model"}, and also infer the Bayesian posterior probability given an input and the model parameters. However, the problem of calculating the model's parameters from data samples is a difficult one, if the input distribution's parameters are unknown. In the next sections we will show that this neural network can find these optimal parameters through Bayesian inference, in an unsupervised and on-line manner, based on only local Hebbian plasticity. ## A Hebbian rule that optimizes the weights Several Hebbian-like rules exist and have been combined with WTA networks. For example, in the case of stochastic binary neurons and binary population-coded inputs, it has been shown that weight updates with an exponential weight-dependence find the optimal weights. Oja's rule is another candidate. An individual linear neuron equipped with this learning rule finds the first principal component of the input data. A variation of Oja's rule combined with hard-WTA networks and additional mechanisms has achieved good experimental results performance on classification tasks, but lacks the theoretical underpinning that we aim for. Here we propose a Hebbian-like rule for which we will show it optimizes the soft WTA's generative model. The rule is similar to Oja's rule, but considers, for each neuron \(k\), both its linear weighted summation of the inputs \(u_k\), and its nonlinear output of the WTA \(y_k\): \[\label{eq:synplast} \Delta w_{ik}^{(SoftHebb)}\coloneqq\eta \cdot y_k \cdot \left(x_i-u_kw_{ik}\right),\] where \(w_{ik}\) is the synaptic weight from the \(i\)-th input to the \(k\)-th neuron, and \(\eta\) is the learning rate hyperparameter. By solving the equation \(E[\Delta w_{ik}]=0\) where \(E[]\) is the expected value over the input distribution, we can show that, with this rule, there exists a stable equilibrium value of the weights, and this equilibrium value is an optimal value according to Theorem [\[thm:optimal\]](#thm:optimal){reference-type="ref" reference="thm:optimal"}: The proof is provided in the Appendix. Therefore, our update rule (Eq. [\[eq:synplast\]](#eq:synplast){reference-type="ref" reference="eq:synplast"}) optimizes the weights of the neural network. ## Local learning of neuronal biases as Bayesian priors For the complete optimization of the model, the neuronal biases \(w_{0k}\) must also be optimized to satisfy Eq. [\[eq:G0\]](#eq:G0){reference-type="ref" reference="eq:G0"}, i.e. to optimize the Bayesian prior belief for the probability distribution over the \(K\) input causes. We define the following rate-based rule inspired from the spike-based bias rule of: \[\begin{gathered} \Delta w_{0k}^{SoftHebb}=\eta e^{-w_{0k}}\left(y_k-e^{w_{0k}} \right). \end{gathered}\] With the same technique we used for Theorem [\[thm:equilib\]](#thm:equilib){reference-type="ref" reference="thm:equilib"}, we also provide proof in the Appendix that the equilibrium of the bias with this rule matches the optimal value \(\prescript{}{opt}{}w_{0k}=\ln P(C_k)\) of Theorem [\[thm:optimal\]](#thm:optimal){reference-type="ref" reference="thm:optimal"}: ## Alternate activation functions {#sec:activation_fn} The model of Definition [\[def:model\]](#def:model){reference-type="ref" reference="def:model"} uses for each component \(p(\boldsymbol{x}|C_k)\) an exponential probability distribution with a base of Euler's e, equivalent to a model using similarly exponential neurons (Subsection [\[sec:neuro_exp\]](#sec:neuro_exp){reference-type="ref" reference="sec:neuro_exp"}). Depending on the task, different probability distribution shapes, i.e. different neuronal activation functions, may be better models. This is compatible with our theory (see Appendix B). Firstly, the base of the exponential activation function can be chosen differently, resulting in a softmax function with a different base, such that Eq. [\[eq:Q_model\]](#eq:Q_model){reference-type="ref" reference="eq:Q_model"} becomes more generally \(Q(C_k|\boldsymbol{x})=\frac{b^{u_k+w_{0k}}}{\sum_{l=1}^{K}b^{u_l+w_{0l}}}. \label{eq:Qb_model}\) This is equivalent to Temperature Scaling, a mechanism that also maintains the probabilistic interpretation of the output. It can also be implemented by a normalized layer of exponential neurons, and are compatible with our theoretical derivations and the optimization by the plasticity rule of Eq. [\[eq:synplast\]](#eq:synplast){reference-type="ref" reference="eq:synplast"}. Moreover, we show in the Appendix that soft WTA models can be constructed by rectified linear units (ReLU) or in general by neurons with any non-negative monotonically increasing activation function, and their weights are also optimized by the same plasticity rule. ## Cross-entropy and true causes, as opposed to labels {#sec:causes} It is important to note that, in labelled datasets, the labels that have been assigned by a human supervisor may not correspond exactly to the true causes that generate the data, which SoftHebb infers. For example, consider MNIST. The 10 labels indicating the 10 decimal digits do not correspond exactly to the true cause of each example image. In reality, the cause \(C\) of each MNIST example in the sense implied by causal inference is not the digit cause itself, but a combination of a single digit cause \(D\), which is the MNIST label, with one of many handwriting styles \(S\). That is, the probabilistic model is such that in the Eq. \(P(\boldsymbol{x})=\sum_kP(\boldsymbol{x}|C_k)P(C_k)\) of Definition [\[def:data\]](#def:data){reference-type="ref" reference="def:data"}, the cause \(C\) of each sample is dual, i.e. there exists a digit \(D_d\,(d\in \left[0, 9\right])\) and a style \(S_s\) such that \[\begin{gathered} \label{eq:causes0}P(C_k)\coloneqq P(C=C_k)=P(D_d) P(S_s)\neq P(D_d).\\ \label{eq:causes} \text{and }P(D_d)=\sum_kP(C_k) P(D_d|C_k). \end{gathered}\] This is important for our unsupervised model. To illustrate this point, a network with \(K\) competing neurons trained on MNIST may learn not to specialize to \(K\) digits \(D\), but rather to \(K\) handwriting styles \(S\) of one digit \(D_d\), or in general \(K\) combinations of digits with styles -- combinations, which are the true causes \(C\) that generate the data. This leads in this case to a mismatch between the labels \(D\), and the true causes \(C\) of the data. Therefore, given the labels and not the causes, it is not obvious which number \(K\) should be chosen for the number of neurons. Practically speaking, \(K\) can be chosen using common heuristics from cluster analysis. It is also not obvious how to measure the loss of the WTA network during the learning process, since the ground truth for causes \(C\) is missing. We will now provide the theoretical tools for achieving this loss-evaluation based on the labels. Even though SoftHebb is a generative model, it can be used for discrimination of the input classes \(C_k\), using Bayes' theorem. More formally, the proof of Theorem [\[thm:optimal\]](#thm:optimal){reference-type="ref" reference="thm:optimal"} involved showing that SoftHebb minimizes the KL divergence of the model \(q(\boldsymbol{x})\) from the data \(p(\boldsymbol{x})\). Based on this it can be shown that the algorithm also minimizes its cross-entropy \(H^{causes}_Q\coloneqq H(P(C), Q(C|\boldsymbol{x}))\) of the causes \(Q(C_k|\boldsymbol{x})\) that it infers, from the true causes of the data \(P(C_k)\): \(\boldsymbol{w}^{SoftHebb}= arg \min_{\boldsymbol{w}} H^{causes}_Q.\) An additional consequence is that by minimizing \(H^{causes}\), SoftHebb also minimizes its label-based cross-entropy \(H^{labels}_Q\coloneqq H(P(D_d), Q(D_d))\) between the true labels \(P(D_d)\) and the implicitly inferred labels \(Q(D_d)\): \[\begin{gathered} Q(D_d)\coloneqq\sum_{k}Q(C_k) P(D_d|C_k) \label{eq:causesQ}\\ \boldsymbol{w}^{SoftHebb}=arg \min_{\boldsymbol{w}} H^{causes}_Q= arg \min_{\boldsymbol{w}} H^{labels}_Q. \label{eq:argminHQ} \end{gathered}\] This is because, in Eqs. [\[eq:causes\]](#eq:causes){reference-type="ref" reference="eq:causes"} and [\[eq:causesQ\]](#eq:causesQ){reference-type="ref" reference="eq:causesQ"}, the dependence of the labels on the true causes \(P(D_d|C_k)\) is fixed by the data generation process. To obtain \(Q(D_d|\boldsymbol{x})\) and measure the cross-entropy, the causal structure \(P(D_d|C)\) is missing, but it can be represented by a supervised classifier \(Q_2(D_d|Q(C|\boldsymbol{x}))\) of SoftHebb's outputs, trained using the labels \(D_d\). Therefore, by (a) unsupervised training of SoftHebb, then (b) training a supervised classifier on top, and finally (c1) repeating the training of SoftHebb with the same initial weights and ordering of the training inputs, while (c2) measuring the trained classifier's loss, we can observe the cross-entropy loss \(H^{labels}\) of SoftHebb while it is being minimized, and infer that \(H^{causes}\) is also minimized (Eq. [\[eq:argminHQ\]](#eq:argminHQ){reference-type="ref" reference="eq:argminHQ"}). We call this the post-hoc cross-entropy method, and we have used it in our experiments (Section [3.2](#sec:exp_cross){reference-type="ref" reference="sec:exp_cross"} and Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"} C and D) to evaluate the learning process in a theoretically sound manner. # Experiments ## MNIST accuracy vs hard WTA {#sec:vshardWTA} We implemented the theoretical SoftHebb model in simulations and tested it in the task of learning to classify MNIST handwritten digits. The network received the MNIST frames normalized by their Euclidean norm, and the plasticity rule we derived updated its weights and biases in an unsupervised manner. We used \(K=2000\) neurons. First we trained the network for 100 epochs, i.e. randomly ordered presentations of the 60000 training digits. In our validation testing we found that softmax with a base of 1000 (see Section [2.4](#sec:activation_fn){reference-type="ref" reference="sec:activation_fn"}) performed best. The learning rate \(\eta\) of Eq. [\[eq:synplast\]](#eq:synplast){reference-type="ref" reference="eq:synplast"} decreased linearly from 0.03 to 0 throughout training. Each training experiment we will describe was repeated five times with varying random initializations and input order. We will report the mean and standard deviation of accuracies. Inference of the input labels by the WTA network of 2000 neurons was performed in two different ways. The first approach is single-layer, where after training the network we assigned a label to each of the 2000 neurons, in a standard approach that is used in unsupervised clustering. Namely, for each neuron, we found the label of the training set that makes it win the WTA competition most often. In this single-layer approach, this is the only time when labels were used, and at no point were weights updated using labels. The second approach was two-layer and based on supervised training of a perceptron classifier on top of the WTA layer. The classifier layer was trained with the Adam optimizer and cross-entropy loss for 60 epochs, while the previously-trained WTA parameters were frozen. SoftHebb achieved an accuracy of \((96.18\pm0.06)\%\) and \((96.94\pm0.02)\%\) in its 1-and 2-layer form respectively. To confirm the strength of the soft WTA approach combined with training the priors through biases, which makes the network Bayesian, we also trained the weights of a network with a hard-WTA setup, i.e. where the strongest-activated neuron's output \(y_k\) is 1, and the other neurons are suppressed to 0, for each input. We found that an initial learning rate of 0.05 was best for the hard-WTA network. The SoftHebb model outperformed the hard WTA (Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}A). However, SoftHebb's accuracy is significantly lower than a multi-layer perceptron (MLP) with one hidden layer of also 2000 neurons that is trained end-to-end exhaustively. The MLP achieves a \((98.33\pm0.06)\%\) accuracy (not shown in the figure). This is expected, due to end-to-end training, supervision, and the MLP being a discriminative model as opposed to a generative model merely applied to a classification task, as SoftHebb is. If the Bayesian and generative aspects that follow from our theory were not required, several additional mechanisms exist to enhance the discriminative power of WTA networks, and even a random projection layer instead of a trained WTA performs well. The generative approach however has its own advantages even for a discriminative task, and we will show some of these here. ## Cross-entropy minimization and single-epoch advantage over backpropagation {#sec:exp_cross} First, we show as a validation of the theory that the SoftHebb model minimizes cross-entropy \(H^{causes}_Q\) of its activations from its input's causes, even though no explicit loss is provided. According to our post-hoc cross-entropy method (Section [2.5](#sec:causes){reference-type="ref" reference="sec:causes"}), as a proxy we observed the minimization of \(H^{labels}_Q\) during the first epoch of on-line Hebbian learning. The loss on the training inputs as they appear (running loss), as well as on the whole testing dataset can be seen in Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}C and D respectively (blue curves). The method allows us to observe the discriminative aspect of the generative model, as it is optimized. After this one epoch, the accuracy of the 1-layer form of the SoftHebb model is \((95.44\pm0.14)\%\). The 2-layer form is again obtained by training a supervised classifier output layer for 60 epochs, and its accuracy is \((96.21\pm0.15)\%\) (Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}B, blue bars). We then also train for a single epoch a 2-layer MLP with a hidden-layer of 2000 neurons, with backpropagation of stochastic gradient descent (SGD) and cross-entropy loss. We found, through grid search, the optimal minibatch size and learning rate of the MLP (4 and 0.2 respectively). The MLP achieves an accuracy of \((95.39\pm0.45)\%\) (Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}B, orange bar), if we exclude one run of the experiment which only achieved an accuracy of 86.92%. Surprisingly, it not surpass SoftHebb, not even in its 1-layer form. In addition, the cross-entropy of the SoftHebb model is visibly minimized faster than through SGD (orange curves of Fig. [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}C & D). It is possible that SoftHebb's advantage in terms of loss and accuracy is a side-effect of pre-training the second layer when obtaining SoftHebb's post-hoc cross-entropy, or of that layer's 60-epoch training. To test this possibility, we similarly obtained a trained version of the MLP's output layer alone, and then trained its first layer with backpropagation and the second layer frozen. Meanwhile, we recorded its loss, thus obtaining its own version of post-hoc cross-entropy ([\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}C & D, yellow curve). SoftHebb still showed an advantage in terms of loss minimization speed, and its 2-layer form's accuracy is still not surpassed ([\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}B, blue & yellow bars), despite the fully unsupervised and local learning in the core of the network. Moreover, the figure shows that the minimization of the loss on the general test set by SoftHebb is smoother than the running loss, while SGD's test-set loss is influenced by the specifics of the individual training examples. This may indicate stronger generalization by the SoftHebb model, emerging from its Bayesian and generative nature. If this is true, SoftHebb may be more robust to input perturbations. ## Robustness to noise and adversarial attacks-Generative adversarial properties {#sec:robustness} Indeed, we tested the trained SoftHebb and MLP models for robustness, and found that SoftHebb is significantly more robust than the backprop-trained MLP, both to added Gaussian noise and to PGD adversarial attacks (see Fig. [\[fig:robustness\]](#fig:robustness){reference-type="ref" reference="fig:robustness"}). PGD produces perturbations in a direction that maximizes the loss of each targeted network, and in size controlled by a parameter \(\epsilon\). Strikingly, SoftHebb has a visible tendency to deflect the attacks, i.e. its confusing examples actually belong to a perceptually different class (Fig. [\[fig:robustness\]](#fig:robustness){reference-type="ref" reference="fig:robustness"}B and [\[fig:gan\]](#fig:gan){reference-type="ref" reference="fig:gan"}). This effectively nullifies the attack and was previously shown in elaborate state-of-the-art adversarial-defence models. The pair of the adversarial attacker with the generative SoftHebb model essentially composes a generative adversarial network (GAN), even though the term is usually reserved for pairs *trained* in tandem. As a result, the model could inherit certain properties of GANs. It can be seen that it is able to generate interpolations between input classes (Fig. [\[fig:gan\]](#fig:gan){reference-type="ref" reference="fig:gan"}). The parameter \(\epsilon\) of the adversarial attack can control the balance between the interpolated objects. Similar functionality has existed in the realm of GANs, autoencoders, and other deep neural networks, but was not known for simple biologically-plausible models. ## Generalizability of the algorithm to other datasets: Fashion-MNIST Finally, we trained SoftHebb on a more difficult dataset, namely Fashion-MNIST which contains grey-scale images of clothing products. A supervised MLP of the same size achieved a test accuracy of \((88.7\pm0.34)\%\) on this task. We used the exact same SoftHebb model and hyperparameters that we used on MNIST, without any adjustment for the changed dataset. Still, the model achieved an accuracy of \((75.14\pm 0.17)\%\). In addition, with very small adversarial perturbations, the MLP drops to an accuracy lower than the SoftHebb model despite our generic training, while SoftHebb's robustness is reconfirmed (dashed lines in Fig. [\[fig:robustness\]](#fig:robustness){reference-type="ref" reference="fig:robustness"}) as are its generative interpolations (Fig. [\[fig:gan\]](#fig:gan){reference-type="ref" reference="fig:gan"}B). # Discussion We have described SoftHebb, a biologically plausible model that is unsupervised, local, and requires no error or other feedback from upper layers. The model consists of elements fully compatible with conventional ANNs. We have shown the importance of soft competition in rate-based WTA networks, and derived formally the plasticity that optimizes the network through Bayesian computations and learns a generative model of the input distribution. We also developed a method for quantifying its unsupervised discriminative loss in a theoretically sound manner. Our experiments are small, but they confirm our optimization theory, and show that SoftHebb has significant strengths that emerge from its unsupervised, generative, and Bayesian nature. It is intriguing that, through biological plausibility, emerge properties commonly associated with biological intelligence, such as speed of learning, robustness to noise and adversarial attacks, and deflection of the attacks. In particular, its ability to learn better than even supervised networks when training time is limited is interesting for resource-limited neuromorphic applications. Its robustness to noise and adversarial attacks is impressive, considering that it is intrinsic and was not instilled by specialized defences. SoftHebb tends to not merely be robust to attacks, but actually deflect them. We also showed that these networks can generate image interpolations in the latent space. However, the model is quite limited compared to state of-the-art ML, if classification accuracy, exhaustive training, and unperturbed inputs are the benchmark. To address this, its potential integration into multilayer networks should be explored using our new tools. This could also provide insights into the role of WTA microcircuits in larger networks in cortex. A first approach to such multilayer networks could be by stacking individually-trained layers. The remaining piece to successfully integrate SoftHebb in deep networks is to make the learned representation in each layer distributed, in spite of a WTA approach. SoftHebb is indeed more distributed than a hard WTA, and further-distributed features may be achieved by localized receptive fields similar to area V1 of cortex.
{'timestamp': '2021-10-07T02:25:21', 'yymm': '2107', 'arxiv_id': '2107.05747', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05747'}
null
null
null
null
# Introduction In recent years, great advances have been achieved in the development of technologies based on quantum systems. These quantum technologies aim to provide significant performance improvements compared to their classical counterparts. A contemporary example is quantum computing, where large numbers of two-dimensional quantum systems (qubits) are controlled via canonical sets of operations to solve certain computational tasks more efficiently than classical computers. Several quantum systems, such as trapped ions, superconducting circuits, quantum dots and photonic platforms, among others, have been proposed and tested to encode qubits and implement quantum gates, in order to build quantum simulators and quantum computers. Today, private companies provide cloud-based access to their quantum hardware and software. Currently, the above experimental platforms, among others, have evolved into devices that have been described as noisy intermediate-scale quantum (NISQ) technologies. These are devices that operate with imperfect gates on a number of qubits between 50 and up to a few hundred qubits. These devices are beyond the simulation capabilities of current classical computing devices but are still far from exhibiting a clear enough improvement in useful computing power. In particular, noisy quantum gates and decoherence limit the depth of the circuits and prevent the realization of complex algorithms. Because of the properties of NISQ computers, the design of methods for the characterization, certification, and benchmarking of these quantum devices has become increasingly relevant and difficult. For instance, the characterization of states generated by this class of devices requires measurements on a large set of bases. These are physically implemented by applying sets of universal unitary transformations on the qubits followed by measurements on the computational basis. Typically, an effort to reduce the number of bases lead to a new set of bases that require the application of entangling unitary transformations, such as, for instance, the controlled NOT (CNOT) gate, whose implementation is associated to a large error. Consequently, the estimation of states generated by NISQ devices could be affected by a large build up of inaccuracy in the measurement procedure. Several methods have been proposed to assess the performance of NISQ devices. Randomized benchmarking and direct fidelity estimation are popular tools for this purpose. However, they do not give complete information about the device in question. In contrast, quantum state estimation gives plenty of information about the device since it fully determines the state of the system from a set of suitable chosen measurements. Today, several protocols to perform quantum state estimation of \(d\)-dimensional quantum systems are available. These attempt to estimate the \(d^2-1\) real parameters that characterize density operators. Standard quantum tomography is based upon the measurement of the \(d^2-1\) generalized Gell-Mann matrices. Quantum state estimation based on projections onto the states of \(d+1\) mutually unbiased bases has been suggested to reduce the total number of measurement outcomes. This number can be reduced to a minimum using a symmetric, informationally complete, positive operator-valued measure, which has exactly \(d^2\) measurement outcomes. Despite the progress made in the reduction of the total number of measurement outcomes used by quantum state estimation methods, the exponential increase of this number prevails in the case of multipartite systems. This is known as the *curse of dimensionality*. For example, standard quantum tomography for a \(n\)-qubit system requires the measurement of \(3^n\) local Pauli settings. A solution to overcome this problem is the use of *a priori* information about the state to be determined. Compressed sensing allows a large reduction in the total number of measurement as long as the rank of the state is known. Another alternative is to consider states with special properties, such as, for instance, matrix product states or permutationally invariant states, which also leads to a significant reduction in the total number of measurements. The important case of pure states has also been studied. In this case a set of five bases allows one to estimate with high accuracy all pure quantum states. Recently, a 3-bases-based tomographic scheme has been introduced to estimate a single qudit. The generalization of this method to multiple qubits leads to entangled bases. Adaptivity has also been introduced as a means of increasing the estimation accuracy of tomographic methods [@Mahler; @ADAPTIVE; @STRUCHALIN; @Utreras; @Fernandes] and even reaching fundamental accuracy limits [@Guo; @Zambrano]. Here, we present a method to estimate unknown pure quantum states in \(n\)-qubit Hilbert spaces, as used by NISQ computers, by means of \(mn+1\) local bases (with \(m\) an integer number), which correspond to the tensor product of \(n\) single-qubit bases, or by the computational basis plus \(m\) entangled bases, that is, bases that cannot be decomposed as the tensor product of single-qubit bases. Thereby, the number of bases scales linearly as \(O(mn)\) and \(O(m)\), respectively, with the number \(n\) of qubits. This is a great advantage over standard methods, which are of exponential order. The \(mn+1\) local bases also provide an advantage in the estimation of states generated via NISQ devices, such as current prototypes of quantum processors, because in this case projective measurements can be carried out without the use of typically noisy entangling gates. The computational basis together with \(m=2\) entangled bases also lead to a clear reduction with respect to the 5-bases tomographic method. The method here proposed also improves over the 3-bases method, since this requires to calculate the likelihood function of \(2^{2^n-1}\) states to obtain an estimate. For a large number of qubits, this stage exponentially increases the computational cost of the method. Furthermore, in order to obtain distinguishable values of the likelihood, a large ensemble size is required. Our estimation method does not require such a procedure. The present method estimates pure multi-qubit quantum states using an inductive process. For an arbitrary \(n\)-qubit state \(| \Psi \rangle\) we define \(n\) sets of \(2^{n-j}\) reduced states of dimension \(2^{j}\), with \(j=1, 2..., n\) and with the reduced state of dimension \(2^n\) equal to \(| \Psi \rangle\) except a global phase. We first show how to estimate the reduced states of dimension \(2\) and then show that the knowledge about reduced states of dimension \(2^{j-1}\) together with some measurement outcomes allows one to estimate the reduced states of dimension \(2^{j}\). This points to an inductive estimation method: we first estimate the reduced states of dimension \(2\), and in \(n\) iterations we arrive to the reduced state of dimension \(2^n\), completing the estimation procedure. We show that the set of reduced states can be estimated by projecting the state onto \(mn+1\) local bases or \(m\) entangled bases plus the computational basis. Throughout the proposed estimation method, it is necessary to solve several systems of linear equations that might have vanishing determinants if the number of measurements is insufficient, leading to the failure of the method. However, the presence of noise, such as ,finite statistics, helps to mitigate this problem. We also show that a small increase in the number of local or entangled bases solves this problem and improves the overall fidelity of the estimation. We study the present method through Monte Carlo numerical simulations. We randomly generate, according to a Haar-uniform distribution, a set of unknown pure states and calculate the average estimation fidelity as a function of the number of qubits. Projective measurements on each basis are simulated considering a fixed number of repetitions. We show that \(2n+1\) separable bases achieve an average estimation fidelity of 0.88 for \(n=10\). We improve this figure by considering larger number of bases, that is, \(3n+1\) and \(4n+1\), which lead to an average estimation fidelity of 0.915 and 0.93 for \(n=10\), respectively. If the average estimation fidelity is calculated with respect to the set of separable states, then for the above number of bases we obtain the values \(0.95, 0.955\) and \(0.96\), correspondingly. The use of entangled bases leads to a less favorable picture, where \(2,3\) and \(4\) entangled bases plus the computational basis lead to an average estimation fidelity of 0.2, 0.6 and 0.8 for \(n=6\), respectively. These figures increase when estimating separable states, where we achieve an average estimation fidelity of 0.75, 0.95 and 0.95 for \(2,3\) and \(4\) entangled bases plus the computational base, respectively. The large gap between separable and entangled bases can be explained by recalling that measurements are simulated with a fixed number of repetitions or, equivalently, with a fixed ensemble size. Thereby, the total ensemble size is much smaller in the case of the entangled bases, which decreases the estimation fidelity. We test the proposed method by means of experiments carried out using the quantum processor *ibmq_manhattan* provided by IBM. We consider the estimation of fixed quantum states from 2 to 10 qubits using the local bases, and states up to 4 qubits using the entangled bases. We first estimate two completely separable states. One of these states is such that the matrices to be inverted are ill-conditioned. Nevertheless, the estimation of these states via local bases lead to very similar fidelities above 0.83 for \(n=10\). The estimation via entangled bases leads to fidelities in the interval \([0.1,0.3]\) for \(n=4\). We also consider the estimation of an \(n/2\)-fold tensor product of a Bell state, where local bases for \(n=10\) lead to a fidelity above \(0.67\) and entangled bases lead to a fidelity below 0.5 for \(n=10\). Finally, we test the estimation of a Greenberger-Horne-Zeilinger state for 2, 3 and 4 qubits. The proposed method leads to en estimation fidelity of approximately 0.87 for \(n=4\) via local bases while in the case of entangled bases the fidelity is approximately 0.81, 0.53 and 0.47 for 2, 3 and 4 entangled bases plus the computational base, respectively. The large decrease in the estimation of entangled states by means of entangled bases can be explained by the use of low-accuracy entangling gates in the preparation of the states as well in the projection to the states of the entangled bases. Our simulations and experimental results indicate that the method proposed here allows the efficient and scalable estimation of \(n\)-qubit pure states by means of \(mn+1\) separable bases in NISQ computers, while the \(m\) entangled bases together with the computational base can offer a large advantage in quantum computers based on high accuracy entangling gates. This article is organized as follows: in Section II we present the method and its properties. In Section III we show the results of several Monte Carlo simulations aimed at studying the overall behavior of the fidelity as a function of the number of qubits. In Section IV we present the results of implementing the proposed estimation method in IBM's quantum processors. In Section V we summarize and conclude. # Method Let us consider a \(n\)-qubit system described by the pure state \[\begin{aligned} |\Psi\rangle = \sum_{\alpha=0}^{2^n-1} c_\alpha e^{i\phi_\alpha} |\alpha\rangle_n, \end{aligned}\] where \(c_\alpha\geq0\) and \(|\alpha\rangle_n =|\alpha_{n-1}\rangle\otimes\cdots\otimes|\alpha_0\rangle\) is the \(n\)-qubit computational basis, with \(\alpha = \sum_{k=0}^{n-1}2^k\alpha_k\) the integer associated with the \(n\)-bit binary string \(\alpha_{n-1}\cdots \alpha_0\). Our main aim is to estimate the values of the amplitudes \(\{c_\alpha\}\) and the phases \(\{\phi_\alpha\}\) with a total number of measurements that does not scale exponentially with the number \(n\) of qubits. For this purpose, we employ an iterative algorithm based on estimating reduced states, which are non-normalized \(j\)-qubit vectors defined by \[\begin{aligned} |\Psi_{\beta}^j\rangle =\sum_{\alpha=0}^{2^j-1} {}_{n}\langle 2^{n-j}\beta + \alpha|\Psi\rangle |\alpha\rangle_j, \end{aligned}\] with \(1\leq j \leq n\) and \(0 \leq \beta \leq 2^{n-j}-1\). Thus, for a given state \(| \Psi\rangle\) we have \(n\) sets of \(2^{n-j}\) reduced states, one set for each \(j\) and one reduced state for each \(\beta\). Every reduced state has some partial information about the full state. For instance, if \(j=1\) we have \(2^{n-1}\) reduced states that are given by \[\begin{aligned} |\Psi_{\beta}^1\rangle = c_{2\beta}e^{i\phi_{2\beta}}|0\rangle + c_{2\beta+1}e^{i\phi_{2\beta+1}}|1\rangle. \label{Psi_j1} \end{aligned}\] We can see that the amplitudes and the phases are the same entering in the state \(| \Psi \rangle\). Thereby, we can reduce the problem of estimating the unknown state \(|\Psi\rangle\) to the problem of estimating the set of reduced states. The main obstacle of this approach is that measurements in quantum mechanics do not contain information about global phases, and hence, if we try to find every reduced state in an independent way using the results of some measurements, we can only obtain the reduced states \(|\Psi_{\beta}^j\rangle\) except a global phase, which in this case, would be a relative phase in \(|\Psi \rangle\). Thus, the only reduced state that fully characterizes the system is \(|\Psi_{0}^n\rangle\), which is the same as \(|\Psi \rangle\). Nevertheless, the remaining reduced states will also be useful in the task of reconstructing \(|\Psi \rangle\), because we can find the reduced states \(| \Psi_\beta^{j} \rangle\) (except a global phase) using the reduced states \(| \Psi_\beta^{j-1} \rangle\), as we will show. For a large enough set of identical copies of the state \(|\Psi\rangle\), measurements in the computational base \(\{| \alpha \rangle \}\) gives us a histogram of observations such that we have approximations \(p_\alpha\) to \(|\langle\alpha|\Psi\rangle|^2\). Then the amplitudes can be estimated as \(c_{\alpha} = \sqrt{p_{\alpha}}\). On the other hand, the phases can be determined from projective measurements on the following states \[\begin{aligned} |P_{a\beta}^j\rangle = |\beta\rangle_{n-j}\otimes|+_a\rangle\otimes|-_a\rangle^{\otimes j-1}, \label{ProjTomo} \end{aligned}\] where \(|+_a\rangle = u_{a}|0\rangle + v_{a}e^{i\varphi_a}|1\rangle\) and \(|-_a\rangle = v_{a}|0\rangle-u_{a}e^{i\varphi_a}|1\rangle\) are orthonormal single-qubit states, with \(a = 1,\dots, m\). Here, \(m\) is the number of bases \(\{ |\pm_a\rangle\}\) considered, which must be large enough to carry out the algorithm. In addition, these bases have to be all different from the computational one. To start the algorithm, we set \(j=1\) and the reduced states are given by Eq. [\[Psi_j1\]](#Psi_j1){reference-type="eqref" reference="Psi_j1"}. The probabilities of projecting \(|\Psi\rangle\) onto \(|P^1_{a\beta}\rangle\) are given by \[\begin{aligned} P^1_{a\beta} =& u_{a}^2c_{2\beta}^2 + v_{a}^2c_{2\beta+1}^2 \nonumber \\ & + 2u_{a}v_{a}c_{2\beta}c_{2\beta+1} [ \cos(\varphi_a)\cos(\phi_{2\beta+1}-\phi_{2\beta}) \nonumber \\ & +\sin(\varphi_a)\sin(\phi_{2\beta+1}-\phi_{2\beta}) ]. \label{P1abeta} \end{aligned}\] These generate a set of equations, one equation for each value of \(\beta\), that are linear combinations of the cosine and sine of the relative phase \(\delta\phi_\beta = \phi_{2\beta+1}-\phi_{2\beta}\), with coefficients depending on \(|+_a\rangle\). Thereby, we can form a linear system of equations \(L_\beta \vec{a}_\beta = \vec{b}_\beta\) for trigonometric functions of the relative phase, which is explicitly given by \[\begin{aligned} \begin{bmatrix} \cos\varphi_1 & \sin\varphi_1 \\ \vdots & \vdots \\ \cos\varphi_m & \sin\varphi_m \end{bmatrix} \begin{bmatrix} \cos\delta\phi_\beta\\ \sin\delta\phi_\beta \end{bmatrix} = \begin{bmatrix} \tilde{P}^{1}_{1\beta}\\ \vdots \\ \tilde{P}^{1}_{m\beta} \end{bmatrix},\label{EqSyst1} \end{aligned}\] where we have defined \[\begin{aligned} \tilde{P}_{a\beta}^{1} = \frac{1}{2u_{a}v_{a}c_{2\beta}c_{2\beta+1} }(P_{a\beta}^{1}-u_{a}^2c_{2\beta}^2-v_{a}^2c_{2\beta+1}^2 ). \end{aligned}\] Since we know the projectors \(|P^1_{a\beta}\rangle\) and the coefficients \(c_j\), this system can be solved for \(m\geq 2\) inverting \(L_\beta\) by the Moore-Penrose pseudo-inverse \(A^+=(A^TA)^{-1}A^T\). We can guarantee that the pseudo-inversion is possible by suitably choosing the coefficients \(u_a\), \(v_a\) and the phases \(\varphi_a\) entering in the states \(|P_{a\beta}^1\rangle\). For example, taking the particular case of \(m=2\) the system has a solution \[\begin{aligned} \begin{bmatrix} \cos \delta\phi_\beta\\ \sin \delta\phi_\beta \end{bmatrix} =\frac{1}{\det(L_\beta)} \begin{bmatrix} \sin \varphi_2 &-\sin \varphi_1 \\-\cos \varphi_2 & \cos \varphi_1 \end{bmatrix} \begin{bmatrix} \tilde{P}^{1}_{1\beta}\\ \tilde{P}^{1}_{2\beta} \end{bmatrix} \end{aligned}\] as long as the determinant of \(L_\beta\) does not vanish, that is, \(\det(L_\beta)=\cos(\varphi_1)\sin(\varphi_2)-\sin(\varphi_1)\cos(\varphi_2) \neq 0\). Thereby, taking \(\varphi_1=0\) and \(\varphi_2=\pi/2\), or equivalently \(|\pm_1\rangle=u_1|0\rangle\pm v_1|1\rangle\), \(|\pm_2\rangle=u_2|0\rangle\pm i v_2|1\rangle\), the system of equations can be always solved since \(\det(L_\beta)=1\), and the exponential of the relative phase is given by \(e^{i\delta\phi_\beta} = \tilde{P}^1_{1\beta} + i\tilde{P}^1_{2\beta}\). Therefore, the reduced states \(|\Psi_{\beta}^1\rangle\) can be determined up to a global phase, \[\begin{aligned} |\tilde\Psi_{\beta}^1\rangle = c_{2\beta}|0\rangle + c_{2\beta+1}e^{i\delta\phi_\beta}|1\rangle, \label{Eq:ReducedStatej1} \end{aligned}\] provided we measure the computational basis and at least two projectors \(|P_{a\beta}^1 \rangle\) for every \(\beta\) in \(0, 1..., 2^{n-1}-1\). Nevertheless, when some of the computational basis probabilities \(p_\alpha\) are null, we have to consider a particular rule to obtain the reduced state. If any or both of the coefficients \(c_{2\beta}=\sqrt{p_{2\beta+1}}\) or \(c_{2\beta+1}=\sqrt{p_{2\beta+1}}\) are null, the reduced state is determined only by the computational basis, setting \(|\tilde\Psi_{\beta}^1\rangle = c_{2\beta} | 0 \rangle\), \(|\tilde\Psi_{\beta}^1\rangle = c_{2\beta + 1} | 1 \rangle\) or \(|\tilde\Psi_{\beta}^1\rangle = \vec{0}\) in Eq. [\[Eq:ReducedStatej1\]](#Eq:ReducedStatej1){reference-type="eqref" reference="Eq:ReducedStatej1"}. This means that there may be null reduced states, which will have an impact on the algorithm in posterior iterations. In the following iterations, that is, the case \(j>1\), the reduced states can be expressed as linear combinations of the previous ones, \[\begin{aligned} |\tilde\Psi_{\beta}^j\rangle = |0\rangle\otimes|\tilde\Psi_{2\beta}^{j-1} \rangle + e^{i\delta\phi_\beta^j}|1\rangle\otimes|\tilde\Psi_{2\beta+1}^{j-1} \rangle, \end{aligned}\] with \(|\tilde\Psi_{\beta}^j\rangle = e^{-i\phi_{2^j\beta}}|\Psi_{\beta}^j\rangle\) the corresponding reduced states up to global phase and \(\delta\phi_\beta^j =\phi_{2^{j}(\beta+1/2)}-\phi_{2^{j}\beta}\) relative phases. Thus, assuming that we know the reduced states of the previous iteration (except for a global phase), we can determine the reduced state of the current iteration (except for a global phase) simply by determining the relative phase. Analogously to the first iteration, if any or both of the previous reduced states \(|\tilde\Psi_{2\beta}^{j-1} \rangle\) or \(|\tilde\Psi_{2\beta+1}^{j-1} \rangle\) are null, there is no relative phase to determine and the next reduced state is simply obtained with the choice \(\delta\phi_{\beta}=0\). Otherwise, we have to determine the relative phase from the projections \(|P_\beta^j\rangle\). Considering \(j>1\), the probability of projecting the state \(|\Psi\rangle\) onto the state \(|P^j_{a\beta}\rangle\) is given by \[\begin{aligned} P^j_{a\beta} =& u_{a}^2 |\langle W_a^j | \tilde\Psi_{2\beta}^{j-1} \rangle|^2 +v_{a}^2 |\langle W_a^j | \tilde\Psi_{2\beta+1}^{j-1} \rangle|^2 \nonumber \\ & + 2u_{a}v_{a}\Re[ e^{i(\delta\phi_\beta^j-\varphi_a)} \langle \tilde\Psi_{2\beta}^{j-1} |W_a^j \rangle\langle W_a^j | \tilde\Psi_{2\beta+1}^{j-1} \rangle ], \end{aligned}\] where \(|W_a^j\rangle = |-_a\rangle^{\otimes j-1}\). Defining the quantities \[\begin{aligned} X_{a\beta}^j = e^{-i\varphi_a} \langle \tilde\Psi_{2\beta}^{j-1} |W_a^j \rangle\langle W_a^j | \tilde\Psi_{2\beta+1}^{j-1} \rangle \end{aligned}\] and \[\begin{aligned} \tilde{P}_{a\beta}^j = \frac{1}{2u_{a}v_{a} }\big( P_{a\beta}^j-u_{a}^2 |\langle W_a^j | \tilde\Psi_{2\beta}^{j-1} \rangle|^2-v_{a}^2 |\langle W_a^j | \tilde\Psi_{2\beta+1}^{j-1} \rangle|^2 \big), \end{aligned}\] we obtain the following system of equations for the relative phases \[\begin{aligned} \begin{bmatrix} \Re X_{1\beta}^j &-\Im X _{1\beta}^j\\ \vdots & \vdots \\ \Re X_{m\beta}^j &-\Im X _{m\beta}^j \end{bmatrix} \begin{bmatrix} \cos\delta\phi_\beta^j\\ \sin\delta\phi_\beta^j \end{bmatrix} = \begin{bmatrix} \tilde{P}_{1\beta}^j\\ \vdots \\ \tilde{P}_{m\beta}^j \end{bmatrix}, \label{EqSyst} \end{aligned}\] where \(\Re\) and \(\Im\) stand for real and imaginary part, respectively. Again, the phases can be obtained by solving a linear system of equations \(L_{\beta}^j\vec{a}_{\beta}^j=\vec{b}_{\beta}^j\) given by Eq. [\[EqSyst\]](#EqSyst){reference-type="eqref" reference="EqSyst"} through the Moore-Penrose pseudo-inverse. If for a fixed \(j\), we are able to pseudo-invert the matrices \(L_{\beta}^j\), we can find all the \(|\tilde\Psi_{\beta}^j\rangle\). Then, we continue inductively with \(j+1\) until reaching \(j=n\). In that case, the protocol ends because the reduced state \(|\tilde\Psi_{0}^n\rangle\) is equal to the state \(|\Psi\rangle\) up to a global phase. One might think that, analogously to the case \(j = 1\), the matrix \(L_{\beta}^j\) can be inverted for \(m\geq 2\). Thereby, to completely estimate the unknown state \(|\Psi\rangle\) we would need a minimum of \(2(2^n-1)\) different projections onto states \(|P_{a\beta}^j\rangle\) in [\[ProjTomo\]](#ProjTomo){reference-type="eqref" reference="ProjTomo"}, because there are \(2^n-1\) different reduced states. However, now the matrix \(L_{\beta}^j\) to be pseudo-inverted does not only depends on the projectors \(|P^j_{a\beta}\rangle\), but it also depends on the reduced states of the previous iteration, so that we cannot guarantee that the pseudo-inversion is feasible. For example, taking \(m=2\), the solution of the system of equations [\[EqSyst\]](#EqSyst){reference-type="eqref" reference="EqSyst"} is \[\begin{aligned} \begin{bmatrix} \cos\delta\phi_\beta^j\\ \sin\delta\phi_\beta^j \end{bmatrix} = \frac{1}{\det(L_\beta^j)}\begin{bmatrix}-\Im X _{2\beta}^j& \Im X_{1\beta}^j\\-\Re X_{2\beta}^j & \Re X_{1\beta}^j \end{bmatrix} \begin{bmatrix} \tilde{P}_{1\beta}^j\\ \tilde{P}_{2\beta}^j \end{bmatrix}, \label{EQ-SYS} \end{aligned}\] with \(\det(L_\beta^j)=\Im(X_{1\beta}^j[X_{2\beta}^j]^*)\) the determinant of \(L_\beta^j\). Clearly, this solution is only valid when \(\det(L_\beta^j)\neq 0\). A non-invertible system of equations for a \(|\tilde\Psi_{\beta}^j\rangle\) means that all the equations are linearly dependent and that it is sufficient to consider a single equation \(\Re X_{\beta}^j\cos(\delta\phi_{\beta}^j)-\Im X_{\beta}^j\sin(\delta\phi_{\beta}^j) = \tilde{P}_{\beta}^j\), from which the trigonometric functions of the relative phase cannot be solved. However, using the identity \(\cos^2(\delta\phi_{\beta}^j)+\sin^2(\delta\phi_{\beta}^j)=1\), we can obtain the trigonometric functions except for their corresponding quadrant, that is, we have two possible estimates or ambiguities for the reduced states. Thus, in the worst case, where the matrix \(L_{\beta}^j\) cannot be pseudo-inverted for any reduced state, the algorithm leads to a finite set of \(2^{n-1}\) possible estimates of \(|\Psi\rangle\). This problem can be avoided by increasing the number of \(m\) of bases for given values of \(j\) and \(\beta\) until the systems can be solved. An alternative solution is to consider an extra adaptive measurement to discriminate between the ambiguities. Furthermore, since the probabilities are experimentally estimated by means of a sample of finite size, with high probability the system of equations can be solved due the finite sample noise, although not necessarily with high accuracy since \(L_{\beta}^j\) might have a bad condition number, \(\textrm{cond}(A) = ||A|| \times ||A^+||\), with \(||\cdot||\) a matrix norm. In order to apply our method based on the inductive estimation of reduced states we need to find an efficient implementation of projections onto states \(|P_{a\beta}^j\rangle\). For this purpose we consider the measurement of two different sets of bases. The first set of \(n\times m\) bases are given by \[\mathcal{L}_{ab} = \left\{|\beta\rangle_{n-b}\otimes |\pm_a\rangle \otimes \cdots \otimes |\pm_a \rangle \right\}, \label{local_observables}\] with \(0 \leq \beta \leq 2^{n-b}-1\). These bases can be implement via local gates, as shown in Fig. [\[fig:circuits\]](#fig:circuits){reference-type="ref" reference="fig:circuits"}. These bases define a larger set of projections than required by the method. However, these extra projections can also be used in the algorithm, since \(|\beta\rangle_{n-j}\otimes |\pm_a\rangle \otimes \cdots \otimes |\pm_a \rangle\) form a system of \(2^{j}\) equations at the \(j\)th-iteration. The second set of \(m\) bases are given by \[\mathcal{E}_a = \left\{ |\beta\rangle_{n-j}\otimes |+_a\rangle \otimes |-_a\rangle ^{\otimes j-1}, |-_a\rangle^{\otimes n} \right\}, \label{ent_observables}\] with \(1\leq j \leq n\) and \(0 \leq \beta \leq 2^{n-j}-1\). Despite projections onto members of the bases are local, these observables are entangled since many multi-controlled \(U\) gates are needed to implement them, as shown in Fig. [\[fig:circuits\]](#fig:circuits){reference-type="ref" reference="fig:circuits"}. In a quantum computer, these gates can be decomposed in terms of CNOT gates. As example, let us consider a 2-qubit system in the state \[\begin{aligned} |\Psi\rangle = c_0e^{i\phi_0}|0\rangle_2 + c_1e^{i\phi_1}|1\rangle_2 +c_2e^{i\phi_2}|2\rangle_2 +c_3e^{i\phi_3}|3\rangle_2. \end{aligned}\] Omitting the Kronecker product for compactness, the corresponding reduced states are \[\begin{aligned} |\tilde\Psi^1_0\rangle &= c_0|0\rangle + c_1e^{i(\phi_1-\phi_0)}|1\rangle,\\ |\tilde\Psi^1_1\rangle &= c_2|0\rangle +c_3e^{i(i\phi_3-\phi_2)}|1\rangle,\\ |\tilde\Psi^2_0\rangle &= |0\rangle\big(c_0|0\rangle + c_1e^{i(\phi_1-\phi_0)}|1\rangle \big) \nonumber \\ &\quad + e^{i(\phi_2-\phi_0)} |1\rangle\big( c_2|0\rangle +c_3e^{i(i\phi_3-\phi_2)}|1\rangle \big), \end{aligned}\] and, the bases to be measured are \[\begin{aligned} \mathcal{L}_{a0} =& \{\: |0\rangle|+_a\rangle,\: |0\rangle|-_a\rangle,\: |1\rangle|+_a\rangle,\: |1\rangle|-_a\rangle \: \},\\ \mathcal{L}_{a1} =& \{\: |+_a\rangle|+_a\rangle,\: |+_a\rangle|-_a\rangle, \:|-_a\rangle|+_a\rangle, \:|-_a\rangle|-_a\rangle \: \}, \end{aligned}\] or \[\begin{aligned} \mathcal{E}_a =\{\: |0\rangle|+_a\rangle,\: |1\rangle|+_a\rangle,\: |+_a\rangle|-_a\rangle,\: |-_a\rangle|-_a\rangle\: \}. \end{aligned}\] # Numerical Simulations We are interested in how similar an unknown state and its estimate are. To quantify this we use the fidelity defined by \[\begin{aligned} F = | \langle \Psi | \Psi_{est} \rangle |^2, \end{aligned}\] between an arbitrary state \(| \Psi \rangle\) and its estimate \(|\Psi_{est} \rangle\). A vanishing fidelity indicates that \(|\Psi\rangle\) and \(|\Psi_{est}\rangle\) can be perfectly distinguished. A unitary fidelity indicates that \(|\Psi\rangle\) and \(|\Psi_{est}\rangle\) are equal. Thus, a good pure-state estimation method will be characterized by high values of the fidelity. We are interested in the behavior of the fidelity as a function of the dimension, or equivalently, the number of qubits, and the impact on the fidelity of shot noise or finite-statistics effects. To study the performance of the proposed method we carried out numerical experiments. For each number of qubits \(n=2,3,\dots,10\) we randomly generate a set \(\{|\Psi^{(i)}\rangle\}\) of \(100\) Haar-distributed pure states, which play the role of the unknown state to be estimated. Afterward, we simulate projective measurements on each \(|\Psi^{(i)}\rangle\) using the entangled bases, Eq. [\[ent_observables\]](#ent_observables){reference-type="eqref" reference="ent_observables"}, and the local bases, Eq. [\[local_observables\]](#local_observables){reference-type="eqref" reference="local_observables"}. These measurements are simulated considering \(10^{13}\) repetitions for each base. Thereafter, using the set of estimated probabilities obtained from the simulated measurements we applied our estimation method to each state \(|\Psi^{(i)}\rangle\), which leads to a set \(\{|\Psi_{est}^{(i)} \rangle\}\) of estimates. Finally, we calculate the value of the fidelity between each unknown state and its estimate. Thereby, we obtain a set of fidelity values for each number \(n\) of qubits, the statistics of which we study in the following figures. Figure \(\ref{fig:sim_2_to_10_ent}\) shows the median of the fidelity as a function of the number \(n\) of qubits for three different numbers \(nm + 1\) of local bases with \(m=2, 3\), and \(4\), from bottom to top. For each number of bases, the infidelity decreases as the number of qubits increases. This is a general feature of quantum state estimation methods. Since for each basis the number of repetitions is fixed, the probabilities entering in the systems of linear equations, such as Eq. ([\[EQ-SYS\]](#EQ-SYS){reference-type="ref" reference="EQ-SYS"}), are estimated with a decreasing accuracy as \(n\) increases, which leads to lower fidelity values. Figure \(\ref{fig:sim_2_to_10_ent}\) also shows that the median value of the fidelity can be increased, while keeping the number of repetitions fixed, using a larger number of local bases. The proposed method requires the pseudo-inverse for every matrix in Eq. [\[EqSyst\]](#EqSyst){reference-type="eqref" reference="EqSyst"}. The quality of this inversion can be improved by reducing the condition numbers of the linear equation systems, which can be achieved by increasing the number of bases employed in the estimation. An interesting feature of Fig.  \(\ref{fig:sim_2_to_10_ent}\) is that the interquartile range is very narrow for each basis, which indicates that the estimation method generates very similar fidelity values for all the simulated states. Figure [\[fig:sim_2\_to_6\_ent_ent\]](#fig:sim_2_to_6_ent_ent){reference-type="ref" reference="fig:sim_2_to_6_ent_ent"} exhibits the median of the fidelity as a function of the number \(n\) of qubits for 2, 3 and 4 entangled bases plus the canonical basis. In this case, the estimation method achieves a poor performance in comparison to the use of local bases. The use of 2 entangled bases lead to two equations for every reduced state, which generates an ill-conditioned equation system. Thereby, a poor estimation of the phases of the probability amplitudes is obtained, which propagates through the iterations of the algorithm leading to a low fidelity. However, as Fig. [\[fig:sim_2\_to_6\_ent_ent\]](#fig:sim_2_to_6_ent_ent){reference-type="ref" reference="fig:sim_2_to_6_ent_ent"} shows, the fidelity can be greatly improved by increasing the number of entangled bases for the estimation. Also, the simulation was carried out employing a fixed ensemble size of \(2^{13}\) for each base. This was done to allow a comparison between our simulations and the results of experiments on the IBM's quantum processors. The total ensemble employed with the local and entangled bases scales as \(mn\times2^{13}\) and \(k\times2^{13}\), respectively. Thereby, the total ensemble used with the local bases is much larger than in the case of the entangled bases, which leads to a better estimation via local bases. An increase of the ensemble size used with the entangled bases could lead to an improvement of the fidelity. Nevertheless, the entangled bases are capable of delivering for \(n=6\) a fidelity close to \(0.9\). Figures [\[fig:sim_2\_to_10_sep\]](#fig:sim_2_to_10_sep){reference-type="ref" reference="fig:sim_2_to_10_sep"} and [\[fig:sim_2\_to_6\_sep_ent\]](#fig:sim_2_to_6_sep_ent){reference-type="ref" reference="fig:sim_2_to_6_sep_ent"} also display the fidelity as a function of the number of qubits for local and entangled bases, respectively. However, the simulation has been carried out on the set of completely separable states. In both cases we obtain an increase of the performance of the proposed estimation method, achieving fidelities of around \(0.95\) for \(10\) qubits when employing local bases. This result indicates that the performance of the proposed estimation method on the set of entangled states should be closer to the depicted in Figs. \(\ref{fig:sim_2_to_10_ent}\) and [\[fig:sim_2\_to_6\_ent_ent\]](#fig:sim_2_to_6_ent_ent){reference-type="ref" reference="fig:sim_2_to_6_ent_ent"}. # Experimental Realization We carried out an experimental demonstration of our estimation method using the quantum processor *ibmq_manhattan* developed by IBM. This NISQ device has online access and can be programmed with Qiskit, an open-source development framework for working with quantum computers in Python programming language. To test our estimation method we prepare the following \(n\)-qubit states \[\begin{aligned} |\Phi_1^{n}\rangle = \frac{1}{\sqrt{2^n}} \left( |0\rangle-e^{i\pi/4}|1\rangle \right)^{\otimes n}, \end{aligned}\] \[\begin{aligned} |\Phi_2^{n}\rangle = \frac{1}{\sqrt{2^n}} \left( |0\rangle + e^{i\pi/4}|1\rangle \right)^{\otimes n}, \end{aligned}\] and \[\begin{aligned} |\Phi_3^{n}\rangle = \Bigg\{ \begin{array}{cc} \frac{1}{2^{n/4}} \left( |00\rangle + |11\rangle \right)^{\otimes n/2}, & n \text{ even.} \\ \frac{1}{2^{(n-1)/4} } \left( |00\rangle + |11\rangle \right)^{\otimes (n-1)/2}\otimes|0 \rangle, & n \text{ odd.} \end{array} \end{aligned}\] States \(|\Phi_1^{n}\rangle\) and \(|\Phi_2^{n}\rangle\) are strictly separable and thus they can be prepared efficiently with the use of a single-qubit gate acting on each qubit. The state \(|\Phi_3^{n}\rangle\) has maximal entanglement between pairs of qubits. For \(n\) even (odd), this state can be prepared with \(n/2\) (\((n-1)/2\)) CNOT gates and \(n/2\) (\((n-1)/2\)) single-qubit gates. Thus, states \(|\Phi_1^{n}\rangle\), \(|\Phi_2^{n}\rangle\), and \(|\Phi_3^{n}\rangle\) can be generated by circuits with short depth. However, the state \(|\Phi_3^{n}\rangle\) is generated with a lower preparation fidelity than states \(|\Phi_1^{n}\rangle\) and \(|\Phi_2^{n}\rangle\) due to the fact that control-not gates are implemented with an error much larger than the one achieved in the implementation of single-qubit gates. We also perform the estimation of \(n\)-partite GHZ states, \[\begin{aligned} |\Phi_4^{n}\rangle = \frac{1}{\sqrt{2}}\left( |0\rangle^{\otimes n}+|1\rangle^{\otimes n} \right). \end{aligned}\] These states are implemented by a long-depth circuit which contains \(n-1\) CNOT gates. Consequently, the fidelity achieved in its generation can be very low. Thus, we focus our study in small number of qubits \(n=2,3,4\) for both local and entangled bases. Each basis was measured employing \(10^{13}\) repetitions, that is, the size of the ensemble of equally prepared copies of the unknown quantum state. This is currently the maximal sample size that can be employed in IBM's quantum processors. Figure [\[fig:Experiment\]](#fig:Experiment){reference-type="ref" reference="fig:Experiment"} summarizes the results obtained by implementing our estimation method on IBM's quantum processor, where the fidelity between states \(|\Phi_1^{n}\rangle\), \(|\Phi_2^{n}\rangle\), \(|\Phi_3^{n}\rangle\), \(|\Phi_4^{n}\rangle\) and its corresponding estimates is displayed as a function of the number \(n\) of qubits for the cases of \(mn+1\) local bases (with \(m=2,3\) and 4) and \(m\) entangled bases plus the computational base. Shaded areas correspond to the error in the values of the fidelity obtained by bootstrapping method. The solid blue line is the maximal achievable value of the fidelity of the state preparation stage \(\mathcal{\mathcal{E}}\) considering a white noise model for the device based on the average error per gate \(r\) provided by IBM, \[\begin{aligned} \mathcal{E}_{noise}(|0\rangle^{\otimes n}\rangle) = \left( 1-\frac{2^nr}{2^n-1}\right)\mathcal{E}(|0\rangle^{\otimes n}) + \frac{2^nr}{2^n-1}I. \end{aligned}\] The error model was applied on each gate necessary to prepare the states. We use as average error per gate \(r_1=5\times10^{-4}\) for local gates and \(r_2 =2\times10^{-2}\) for CNOT gates. According to Figs. [\[fig:1.1\]](#fig:1.1){reference-type="ref" reference="fig:1.1"} and [\[fig:1.2\]](#fig:1.2){reference-type="ref" reference="fig:1.2"}, the estimation of local states \(|\Phi_1^{n}\rangle\) and \(|\Phi_2^{n}\rangle\) through local bases leads values that are comparable with the theoretical predictions shown in Figs. [\[fig:sim_2\_to_10_ent\]](#fig:sim_2_to_10_ent){reference-type="ref" reference="fig:sim_2_to_10_ent"} and [\[fig:sim_2\_to_10_sep\]](#fig:sim_2_to_10_sep){reference-type="ref" reference="fig:sim_2_to_10_sep"}, which only consider noise due to finite statistics. For the particular case of \(n=10\) qubits, the theoretical predictions for the estimation fidelity using local bases are within the intervals \([0.88, 0.93]\) for randomly generated states, and \([0.95, 0.96]\) for randomly generated separable states, while the experiment leads to an estimation fidelity in the interval \([0.82, 0.89]\). The estimation of entangled states \(|\Phi_3^{n}\rangle\) and \(|\Phi_4^{n}\rangle\) by local bases, exhibited in Figs. [\[fig:1.3\]](#fig:1.3){reference-type="ref" reference="fig:1.3"} and [\[fig:1.4\]](#fig:1.4){reference-type="ref" reference="fig:1.4"}, respectively, also leads to good fidelities, albeit lower than in the case of states \(|\Phi_1^{n}\rangle\) and \(|\Phi_2^{n}\rangle\). This is to be expected since states \(|\Phi_3^{n}\rangle\) and \(|\Phi_4^{n}\rangle\) exhibit entanglement and thus are generated applying several CNOT gates, which increase the preparation error. Nevertheless, for the state \(|\Phi_3^{n}\rangle\) with \(n=10\) our method provides an estimation fidelity close to \(0.67\), where the maximum achievable value according to the noise model is \(0.9\) (blue solid line in Fig. [\[fig:1.3\]](#fig:1.3){reference-type="ref" reference="fig:1.3"}). A comparison between the estimated fidelity for the bi-local state \(|\Phi_3^{n}\rangle\) and GZH state \(|\Phi_4^{n}\rangle\) for \(n=2,3\) and \(4\) qubits indicates that these entangled states are estimated with similar fidelities. This indicates that the method delivers similar quality estimation for states with different type of entanglement. The experimental realization of our estimation method shows that the use of local bases allows us to estimate pure states of large numbers of qubits. The fidelity of the estimation is meanly constrained by ensemble size and number of local bases. An increase of any of these quantities leads to an improvement in the quality of the estimation. In particular, states of larger number of qubits can be reliably estimated by increasing the number of local bases. As is shown in Figs. [\[fig:1.1\]](#fig:1.1){reference-type="ref" reference="fig:1.1"}, [\[fig:1.2\]](#fig:1.2){reference-type="ref" reference="fig:1.2"}, and [\[fig:1.3\]](#fig:1.3){reference-type="ref" reference="fig:1.3"} the use of \(4n+1\) local bases leads to higher values of the estimation fidelity than the cases of \(2n+1\) and \(3n+1\) local bases. The use of entangled bases shows a different picture, where the physical realization of the method and the particular class of states to be estimated lead to a reduction of the fidelity when compared to the case of local bases. Figs. [\[fig:2.1\]](#fig:2.1){reference-type="ref" reference="fig:2.1"} and [\[fig:2.2\]](#fig:2.2){reference-type="ref" reference="fig:2.2"} exhibit the estimation achieved for states \(|\Phi_1^n\rangle\) and \(|\Phi_2^n\rangle\), respectively. A comparison for \(n=4\) with Figs. [\[fig:1.1\]](#fig:1.1){reference-type="ref" reference="fig:1.1"} and [\[fig:1.2\]](#fig:1.2){reference-type="ref" reference="fig:1.2"} shows an acute decrease of the fidelity from approximately 0.995 to 0.2. A similar decrease can also be observed in the case of states \(|\Phi_3^n\rangle\) and \(|\Phi_4^n\rangle\). The low achieved fidelity finds its origin in the circuits employed to implement the measurements on the entangled bases. For \(n=2,3\), and \(4\), 2 entangled bases require the use of 2, 7 and 27 control-note gates, respectively. This number becomes 3027 for \(n=10\). Since the control-not gate has a high error rate in NISQ-devices, the implemented bases differ significantly from the actual bases \(\mathcal{E}_a\) to be implemented. Besides, this also affects the generated states. Fig. [\[fig:2.2\]](#fig:2.2){reference-type="ref" reference="fig:2.2"} shows that for \(n=3\) the use of \(2\) and \(3\) entangled bases plus the computational base lead to a fidelity value of \(0.1\) much lower than the case of using \(4\) entangled bases plus the computational base. This originates in the state \(|\Phi_2^3\rangle\) to be reconstructed, which for \(2\) and \(3\) entangled bases exhibits ill-conditioned equation systems. This is not present in the case of \(4\) entangled bases, where the fidelity is in the order of \(0.95\). Let us note that this effect does not appear in Fig.  [\[fig:1.2\]](#fig:1.2){reference-type="ref" reference="fig:1.2"}, where the use of \(mn+1\) local bases allow us to obtain well-conditioned equation systems. Ultimately, the combinations of these factors leads to a low estimation fidelity. # Conclusions Estimating states of \(d\)-dimensional quantum systems requires a minimal number of measurement outcomes that scales quadratically with the dimension. In the case of composite systems, such as quantum computers, the scaling becomes exponential in the number of subsystems, which makes the estimation by generic methods unfeasible except for few-component systems. NISQ computers are characterized by low-accuracy entangling gates, which are required for implementing measurements of arbitrary observables, and by a fixed number of repetitions, which constrains the size of statistical samples and decreases the estimation accuracy as the number of qubits increases. Therefore, estimating \(n\)-qubit states of NISQ computers is difficult task. We have proposed a method to estimate pure states of \(n\)-qubit systems that is well suited for NISQ computers. The method is based on the reconstruction of the so-called reduced states \(|\tilde\Psi_{\beta}^j \rangle\), which for an unknown state \(|\Psi \rangle\) are \(n\) sets of \(2^{n-j}\) non-normalized states, one set for each \(j=1, 2,..., n\). If we know the reduced states \(|\tilde\Psi_{\beta}^j \rangle\) for a fixed \(j\), then it is easy to reconstruct the reduced states with \(|\tilde\Psi_{\beta}^{j+1} \rangle\) from the results of well defined set of measurements. The method begins by measuring a set of projectors that allow us to reconstructs all the reduced states for \(j=1\), and iterating, the rest of reduced states until reaching \(|\tilde\Psi_{\beta}^n \rangle\), the estimate of the unknown pure state. The set of measurements employed by the proposed method corresponds to projective measurements onto a set of bases. We have first shown that \(mn+1\) bases, with \(m\) an integer number equal or greater than 2, allow us to estimate most pure states up to a null-measure set. Thereby, a total of \((mn+1)2^n\) measurement outcomes is required. This number compares favorably with other estimation methods. Mutually unbiased bases, SIC-POVM, and compressed sensing require \((2^n+1)2^n\), \(2^{2n}\), and in the order of \(2^{2n}n^2\) measurement outcomes, respectively, to reconstruct pure states. The \(mn+1\) bases are local, that is, they can be cast as the tensor product of \(n\) single-qubit bases. Projective measurements onto the states of these bases are carried out on a NISQ computer by applying local gates onto each qubit followed by a projection onto the computational base. Thus, no entangling gates are necessary. In principle, \(2n+1\) bases are enough. We have shown, by means of numerical simulations, that the use of a larger number of local bases increases the estimation accuracy for larger numbers of qubits. However, if high-accuracy entangling gates are available, then the set of measurements employed by the proposed method can be reduced to projective measurements on \(m\) entangled bases plus the computational base, with \(m\) an integer number equal or greater than 3. In this case, an increase in the number of entangled bases also allows us to increase the estimation accuracy. We tested the proposed estimation method in the IBM's quantum processing units. The estimation of local pure states via local bases up to 10 qubits provides fidelities that agree with the numerical simulations and are above 90%. The estimation of entangled states via local bases was also tested. In this case, the estimation of tensor product of two-qubit Bell states up to \(n=10\) led to fidelities above 70%. In this case, however, the preparation of the state is affected by large errors due to the use of entangling gates. Finally, we tested the estimation of a GHZ state for \(n=2,3\) and 4 qubits obtaining fidelities above 86%. Entangled bases were also tested. Nevertheless, due to the massive use of entangling gates in the preparation and measurement stages very low fidelities were achieved, as expected. The estimation via \(k\) entangled bases plus the computational base, where \(k\) is high-enough but does not scale with the number \(n\) of qubits, can lead to a large fidelity in future fault-tolerating quantum architectures, where a large numbers of qubits and high-accuracy entangling gates are required. Also, it might be possible to increase the estimation fidelity by using alternative implementations of the multi-control NOT gates that employ ancillary qubits. This allows a reduction in the depth of the circuit required to implement measurements on the proposed entangled bases. The main characteristic of our protocol is its scalability, which is a consequence of the *a priori* information about the states to be estimated. This is an approach common among many estimation methods such as, for instance, compressed sensing and matrix product states. The purity assumption is reasonable in systems that are able to prepare high purity states or in systems whose purity can be certified, for instance, through randomized benchmarking. However, this is not necessarily true on NISQ devices. Decoherence and gate errors can reduce the quality of preparing a pure state, so it really becomes a mixed state. In this case our protocol could not be applied. Nevertheless, it has been shown that experimental results can be improved by reducing the error of the raw data employing error-mitigation techniques. Combining scalable error-mitigation methods with our estimation method could extend its applicability to high-noise systems.
{'timestamp': '2021-07-14T02:02:37', 'yymm': '2107', 'arxiv_id': '2107.05691', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05691'}
null
null
# Introduction Deformable atlas building is to create a "mean" or averaged image and register all subjects to a common space. The resulting atlas and group transformations are powerful tools for statistical shape analysis of images , template-based segmentation , or object tracking , just to name a few. A good quality of altas heavily relies on the registration process, which is typically formulated as a regularized optimization to solve . An issue in the current process of registration-based atlas construction is how to regularize model parameters. Having an appropriate regularization is critical to the \"sharpness\" of the atlas, as well as ensuring a set of desirable properties of transformations, i.e., a smooth and invertible smooth mapping between images, also known as diffeomorphisms, to preserve the topology of original images. Current atlas building models either exhaustively search for an optimal regularization in the parameter space, or treat it as unknown variables to estimate from Bayesian models. While ad hoc parameter-tuning may yield satisfactory results, it requires expert domain knowledge to guide the tuning process . Inspired by probabilistic models, several works have proposed Bayesian models of atlas building with automatically estimated regularizations  . These approaches define a posterior distribution that consists of an image matching term between a deformed atlas and each individual as a likelihood, and a regularization as a prior to support the smoothness of transformation fields. The regularization parameter is then jointly estimated with atlas after carefully integrating out the image deformations using Monte Carlo sampling. However, sampling in a high-dimensional transformation space (i.e., on a dense 3D image grid \(128^3\)) is computationally expensive and often leads to a long execution time with high memory consumption. More importantly, the aforementioned methods are limited to regularizations with single-penalty for population studies. This prohibits the model's ability to adaptively search for the best regularization parameter associated with an individual subject, which is critical to images with various degrees of geometric transformations. The typical "one-fits-all" fails in cases where large geometric variations occur, i.e., brain shape changes of Alzheimer's disease group. Allowing the subject-specific (data-driven) regularization can substantially affect the sharpness and quality of the atlas . In this paper, we propose a hierarchical Bayesian model of atlas building with subject-specific regularizations in the context of Large Deformation Diffeomorphic Metric Mapping (LDDMM) algorithm . In contrast to previous approaches treating the regularization of individual subjects as a single-penalty function with adhoc parameters, we develop a data-adaptive algorithm to automatically adjust the model parameters accordingly. To achieve this, we introduce a novel hierarchical prior that features (i) prior distributions with multiple regularization parameters on the group transformations in a low-dimensional bandlimited space; and (ii) a hyperprior to model the regularization parameters as latent variables. We then develop a Monte Carlo Expectation Maximization (MCEM) algorithm, where the expectation step integrates over the regularization parameters using Hamiltonian Monte Carlo (HMC) sampling. The joint estimation of model parameters including atlas, registration, and hyperparameters in the maximization step successfully eliminates a massive burden of multi-parameters tuning. We demonstrate the effectiveness of our algorithm on both 2D synthetic images and 3D real brain MRIs. To the best of our knowledge, we are the first to extend the atlas building to a data-adaptive and parameter-tuning-free framework via hierarchical Bayesian learning. Experimental results show that our model provides an efficient atlas construction of population images, particularly with large variations of geometric transformations. This paves a way for an improved quality of clinical studies where atlas building is required, for example, statistical shape analysis of brain changes for neurodegenerative disease diagnosis , or atlas-based segmentation for in-utero placental disease monitoring . # Background: Atlas Building with Fast LDDMM We first briefly review an unbiased atlas building algorithm  based on Fourier-approximated Lie Algebra for Shooting (FLASH), a fast variant of LDDMM with geodesic shooting . Given a set of images \(I_1,\cdots,I_N\) with \(N\) being the number of images, the problem of atlas building is to find a template image \(I\) and transformations \(\phi_1,\cdots, \phi_N\) that minimize the energy function \[\label{eq:lddmm} E(I, \phi_n) = \sum_{n=1}^{N} \text{Dist} (I \circ \phi_n, I_n) + \text{Reg}(\alpha, \phi_n).\] The \(\text{Dist}(\cdot, \cdot)\) is a distance function that measures the dissimilarity between images, i.e., sum-of-squared differences , normalized cross correlation , and mutual information . The \(\Reg(\cdot)\) is a weighted regularization with parameter \(\alpha\) that guarantees the diffeomorphic properties of transformation fields. #### **Regularization In Tangent Space of Diffeomorphisms.** {#regularization-in-tangent-space-of-diffeomorphisms. .unnumbered} Given an open and bounded \(d\)-dimensional domain \(\Omega \subset \mathbb{R}^d\), we use \(\Diff(\Omega)\) to denote a space of diffeomorphisms and its tangent space \(V=T \Diff(\Omega)\). The regularization of LDDMM is defined as an integral of the Sobolev norm of the time-dependent velocity field \(v(t) \in V (t \in [0, 1])\) in the tangent space, i.e., \[\label{eq:lddmm} \text{Reg}(\alpha, \phi_n) = \int \langle \L(\alpha) v_n(t), \L(\alpha) v_n(t) \rangle \, dt, \, \text{with} \, \, \frac{d\phi_n(t)}{dt} =-D\phi_n(t)\cdot v_n(t).\] Here \(\L\) is a symmetric, positive-definite differential operator, with parameter \(\alpha\) controling the smoothness of transformation fields. In this paper, we use the Laplacian operator \(\L=(-\alpha \Delta + \text{Id})^3\), where \(\text{Id}\) is an identity matrix. The operator \(D\) is a Jacobian matrix and \(\cdot\) denotes an element-wise matrix multiplication. According to the geodesic shooting algorithm , the minimum of LDDMM is uniquely determined by solving a Euler-Poincaré differential equation (EPDiff)  with initial conditions. This inspires a recent model FLASH to reparameterize the regularization of Eq. [\[eq:lddmm\]](#eq:lddmm){reference-type="eqref" reference="eq:lddmm"} in a low-dimensional bandlimited space of initial velocity fields, which dramatically reduces the computational complexity of transformation models with little to no loss of accuracy . #### **Fourier Computation of Diffeomorphisms.** {#fourier-computation-of-diffeomorphisms. .unnumbered} Let \(\widetilde{\Diff}(\Omega)\) and \(\tilde{V}\) denote the space of Fourier representations of diffeomorphisms and velocity fields respectively. Given time-dependent velocity field \(\tilde{v}(t) \in \tilde{V}\), the diffeomorphism \(\tilde{\phi}(t) \in \widetilde{\Diff}(\Omega)\) in the finite-dimensional Fourier domain can be computed as \[\begin{aligned} \label{eq:leftinvariantfft} \tilde{\phi}(t) = \tilde{\text{Id}} + \tilde{u}(t), \quad \frac{d \tilde{u}(t)}{dt} &=-\tilde{v}(t)-\tilde{\mathcal{D}} \tilde{u}(t) \ast \tilde{v}(t), \end{aligned}\] where \(\tilde{\text{Id}}\) is the frequency of an identity element, \(\tilde{\mathcal{D}}\tilde{u}(t)\) is a tensor product \(\tilde{\mathcal{D}} \otimes \tilde{u}(t)\), representing the Fourier frequencies of a Jacobian matrix \(\tilde{\mathcal{D}}\) with central difference approximation, and \(\ast\) is a circular convolution [^1]. The Fourier representation of the geodesic shooting equation (EPDiff) is \[\begin{aligned} \label{eq:epdiffleft} \frac{\partial \tilde{v}(t)}{\partial t} =-\tilde{\K}\left[(\tilde{\mathcal{D}} \tilde{v}(t))^T \star \tilde{\mathcal{\L}}\tilde{v}(t) + \tilde{\nabla} \cdot (\tilde{\mathcal{\L}}\tilde{v}(t) \otimes \tilde{v}(t)) \right], \end{aligned}\] where \(\star\) is the truncated matrix-vector field auto-correlation. The operator \(\tilde{\nabla} \cdot\) is the discrete divergence of a vector field. Here \(\tilde{\K}\) is an inverse operator of \(\tilde{\L}\), which is the Fourier transform of a Laplacian operator in this paper. The regularization in Eq. [\[eq:lddmm\]](#eq:lddmm){reference-type="eqref" reference="eq:lddmm"} can be equivalently formulated as \[\begin{aligned} \text{Reg}(\alpha, \phi_n) = \langle \tilde{{\L}}(\alpha) \tilde{v}_n(0), \tilde{{\L}}(\alpha) \tilde{v}_n(0) \rangle, \quad \text{s.t.} \, \text{Eq.}~\eqref{eq:leftinvariantfft} \& \text{Eq.}~\eqref{eq:epdiffleft}. \end{aligned}\] We will drop off the time index in remaining sections for notational simplicity, e.g., defining \(\tilde{v}_n \triangleq \tilde{v}_n(0)\). # Our Model: Bayesian Atlas Building with Hierarchical Priors This section presents a hierarchical Bayesian model for atlas building that allows subject-specific regularization with no manual effort of parameter-tuning. We introduce a hierarchical prior distribution on the initial velocity fields with adaptive smoothing parameters followed by a likelihood distribution on images. #### **Likelihood.** {#likelihood. .unnumbered} Assuming an independent and identically distributed (i.i.d.) Gaussian noise on image intensities, we formulate the likelihood of each observed image \(I_n\) as \[\begin{aligned} \label{eq:likelihood} p(I_n \, | \, I, \tilde{v}_n, \sigma^2) = \frac{1}{(\sqrt{2 \pi} \sigma ^2 )^{M}} \exp{ \left(-\frac{1}{2\sigma ^2} \lVert I \circ \phi_n-I_n \rVert_2^2 \right)}. \end{aligned}\] Here \(\sigma^2\) denotes a noise variance, \(M\) is the number of image voxels, and \(\phi_n\) is an inverse Fourier transform of \(\tilde{\phi}_n\) at time point \(t=1\). It is worth mentioning that other noise models such as spatially varying noises  can also be applied. #### **Prior.** {#prior. .unnumbered} To ensure the smoothness of transformation fields, we define a prior on each initial velocity field \(\tilde{v}_n\) as a complex multivariate Gaussian distribution \[\begin{aligned} \label{eq:prior} p({\tilde{v}}_n \, | \, \alpha_n ) = \frac{1}{(2 \pi)^{\frac{M}{2}} | {\tilde{\L}_n}^{-1}(\alpha_n) |} \exp\left ({-\frac{1}{2} \langle {\tilde{\L}_n(\alpha_n)} {\tilde{v}}_n, {\tilde{\L}(\alpha_n)} {\tilde{v}}_n \rangle} \right), \end{aligned}\] where \(|\cdot|\) is matrix determinant. The Fourier coefficients of a discrete Laplacian operator is \(\tilde{{\L}}_n( \paragraph*{\bf Hyperprior.} We treat the subject-specific regularization parameter\)\_n\(of the prior distribution~\eqref{eq:prior} as a random variable generated from Gamma distribution, which is a commonly used prior to model positive real numbers~. Other prior such as inverse Wishart distribution~ can also be applied. The hyperprior of our model is formulated as \begin{align} \label{eq:hyperprior} p(\alpha_n \, | \, k, \beta) = \frac{\alpha_n^{k-1} \exp ^{(-\alpha_n / \beta)}}{\Gamma (k) \beta^{k}}, \end{align} with\)k\(and\[being positive numbers for shape and scale parameters respectively. The Gamma function\)(k)=(k-1)!\(for all positive integers of\)k\(. We finally arrive at the log posterior of the diffeomorphic transformation and regularization parameters as \begin{align} E(\tilde{v}_n, \alpha_n, I, \sigma, k, \beta) & \triangleq \ln \prod_{n=1}^N p(I_n \, | \, I, \tilde{v}_n, \sigma^2) \cdot p({\tilde{v}}_n \, | \, \alpha_n ) \cdot p(\alpha_n \, | \, k, \beta) \nonumber \\ &= \sum_{n=1}^{N} \frac{1}{2}\ln\lvert \L_n \rvert-M \ln \sigma-\frac{ \| I \circ \phi_n-I_n \|_2^2}{2\sigma^2}-\frac{1}{2}(\tilde{\L} \tilde{v}_n, \tilde{\L} \tilde{v}_n) \nonumber \\ & \quad (k-1) \ln \alpha_n -\frac{\alpha_n}{\beta}-k \ln \beta-\ln \Gamma(k) +\text{const.} \label{eq:posterior} \end{align} \subsection{Model Inference} We develop an MCEM algorithm to infer the model parameter\], which includes the image atlas\)I\(, the noise variance of image intensities\)\^2\(, the initial velocities of diffeomorphic transformations\)\_n\(, and the hyperparameters\)k\(and\[. We treat the regularization parameter\)\_n\(as latent random variables and integrate them out from the log posterior in Eq.~\eqref{eq:posterior}. Computations of two main steps (expectation and maximization) are illustrated below. \paragraph*{\bf Expectation: HMC.} Since the E-step does not yield a closed-form solution, we employ a powerful Hamiltonian Monte Carlo (HMC) sampling method~ to approximate the expectation function\)Q\(with respect to the latent variables\)\_n\(. For each\)\_n\(, we draw a number of\)S\(samples from the log posterior~\eqref{eq:posterior} by using HMC from the current estimated parameters\]. The Monte Carlo approximation of the expectation\)Q\(is \begin{align} Q(\Theta | \hat{\Theta}) \approx \frac{1}{S} \sum_{n=1}^{N} \sum_{j=1}^{S} \ln p(\alpha_{nj} \, | \, I_n; \hat{\Theta}). \label{eq:expectation} \end{align} To produce samples of\)\_n\(, we first define the potential energy of the Hamiltonian system\)H(\_n,) = U(\_n)+W()\(as\)U(\_n) =-p(\_n \| I_n; )\(. The kinetic energy\)W()\(is a typical normal distribution on an auxiliary variable\[. This gives us Hamilton's equations to integrate \begin{align}\label{eq:hmc} \frac{\alpha_n}{dt} = \frac{\partial H}{\partial \gamma} = \gamma, \quad \frac{d \gamma}{dt} &=-\frac{\partial H}{\partial \alpha_n}=-\nabla_{\alpha_n}U. \end{align} Since\)\_n\(is a Euclidean variable, we use a standard ``leap-frog'' numerical integration scheme, which approximately conserves the Hamiltonian and results in high acceptance rates. The gradient of\)U\(with respect to\)\_n\(is \begin{align} \nabla_{\alpha_{n}}U = \frac{3}{2S}\sum_{j=1}^S[ \sum_{i=1}^d \frac{\tilde{\A}_{i}}{\alpha_{nj} \tilde{A}_i + 1}-\langle 2(\alpha_{nj} \tilde{\A} +1)^{5}\tilde{\A} \tilde{v}_{nj}, \tilde{v}_{nj} \rangle], \label{eq:alphagrad} \end{align} where\)=-2 \_i = 1\^d ((2Starting from the current point \(\alpha_n\) and initial random auxiliary variable \(\gamma\), the Hamiltonian system is integrated forward in time by Eq. [\[eq:hmc\]](#eq:hmc){reference-type="eqref" reference="eq:hmc"} to produce a candidate point \((\hat{\alpha}_n, \hat{\gamma})\). The candidate point \(\hat{\alpha}_n\) is accepted as a new point in the sample with probability \(p(accept) = \min(1,-U(\hat{\alpha}_n)-W(\hat{\gamma}) + U(\alpha_n)+W(\gamma))\). #### **Maximization: Gradient Ascent.** {#maximization-gradient-ascent. .unnumbered} We derive the maximization step to update the parameters \(\Theta=\{I, \tilde{v}_n, \sigma^2, k, \beta \}\) by maximizing the HMC approximation of the expectation \(Q\) in Eq. [\[eq:expectation\]](#eq:expectation){reference-type="eqref" reference="eq:expectation"}. For updating the atlas image \(I\), we set the derivative of the \(Q\) function with respect to \(I\) to zero. The solution for \(I\) gives a closed-form update \]\begin{aligned} I = \frac{\sum_{j=1}^S \sum_{n=1}^N (I_n \circ \phi^{-1}_{nj}) \cdot \lvert D \phi^{-1}_{nj} \rvert }{\sum_{j=1}^S \sum_{n=1}^N \lvert D \phi^{-1}_{nj} \rvert}. \label{eq:atlasupdate} \end{aligned}\[ Similarly, we obtain the closed-form solution for the noise variance \(\sigma^2\) after setting the gradient of \(Q\) w.r.t. \(\sigma^2\) to zero \]\begin{aligned} \sigma^2 = \frac{1}{MNS} \sum_{n=1}^N\sum_{j=1}^S \lVert I \circ \phi_{nj}-I_n \rVert_2^2. \label{eq:sigmaupdate} \end{aligned}\[ The closed-form solutions for hyperparameters \(k\) and \(\beta\) are \]\begin{aligned} k = \psi^{-1}( \frac{1}{NS}\sum_{i=1}^{N} \sum_{j = 1}^{S} \ln \alpha_{nj}-\ln \beta ), \quad \beta = \frac{1}{NS k}\sum_{n=1}^N \sum_{j = 1}^S \alpha_{nj}. \label{eq:betakupdate} \end{aligned}\(\) Here \(\psi\) is a digamma function, which is the logarithmic derivative of the gamma function \(\Gamma (\cdot)\). The inverse of digamma function \(\psi^{-1}\) is computed by using a fixed-point iteration algorithm . As there is no closed-form update for initial velocities, we employ a gradient ascent algorithm to estimate \(\tilde{v}_{nj}\). The gradient \(\nabla_{\tilde{v}_{nj}} Q\) is computed by a forward-backward sweep approach. Details are introduced in the FLASH algorithm . # Experimental Evaluation We compare the proposed model with LDDMM atlas building algorithm that employs single-penalty regularization with manually tuned parameters on 3D brain images . In HMC sampling, we draw \(300\) samples for each subject, with initialized value of \(\alpha = 10\), \(k = 9.0\), \(\sigma=0.05\), and \(\beta = 0.1\). An averaged image of all image intensities is used for atlas initialization. We include \(100\) 3D brain MRI scans with segmentation maps from a public released resource Open Access Series of Imaging Studies (OASIS) for Alzheimer's disease . The dataset covers both healthy and diseased subjects, aged from \(55\) to \(90\). The MRI scans are resampled to \(128^3\) with the voxel size of \(1.25 mm^3\). All MRIs are carefully prepossessed by skull-stripping, intensity normalization, bias field correction, and co-registration with affine transformation. We estimate the atlas of all deformed images by using our method and compare its performance with LDDMM atlas building . Final results of atlases estimated from both our model and the baseline algorithm are reported. We also compare the time and memory consumption of proposed model with the baseline that performs HMC sampling in a full spatial domain . To measure the sharpness of estimated atlas \(I\), we adopt a metric of normalized standard deviation computed from randomly selected 3000 image patches . Given \(N(i)\), a patch around a voxel \(i\) of an atlas \(I\), the local measure of the sharpness at voxel \(i\) is defined as \(\text{sharpness}(I(i)) = \text{sd}_{N(i)}(I)/ \text{avg}_{N(i)}(I)\), where sd and avg denote the standard deviation and the mean of \(N_i\). To further evaluate the quality of estimated transformations, we perform atlas-based segmentation after obtaining transformations from our model. For a fair comparison, we fix the atlas for both methods and examine the registration accuracy by computing the dice similarity coefficient (DSC)  between the propagated segmentation and the manual segmentation on six anatomical brain structures, including cerebellum white matter, thalamus, brain stem, lateral ventricle, putamen, caudate. The significance tests on both dice and sharpness between our method and the baseline are performed. Fig. [\[fig:3datlas\]](#fig:3datlas){reference-type="ref" reference="fig:3datlas"} visualizes a comparison of 3D atlas on real brain MRI scans. The top panel shows that our model substantially improves the quality of atlas with sharper and better details than the baseline with different values of manually set regularization parameters, e.g., \(\alpha=0.1, 3.0, 6.0, 9.0\). Despite the observation of a smaller value of \(\alpha=0.1\) produces sharper atlas, it breaks the smoothness constraints on the transformation fields hence introducing artifacts on anatomical structures (outlined in purple boxes). The mean and standard deviation of our estimated hyperprior parameters \(k\) and \(\beta\) in Eq. [\[eq:hyperprior\]](#eq:hyperprior){reference-type="eqref" reference="eq:hyperprior"} over \(30\) pairwise image registrations are \(47.40/7.22\), and \(0.036/0.005\). The bottom panel quantitatively reports the sharpness metric of all methods. It indicates that our algorithm outperforms the baseline by offering a higher sharpness score while preserving the topological structure of brain anatomy. Fig. [\[fig:dice\]](#fig:dice){reference-type="ref" reference="fig:dice"} reports results of fixed-atlas-based segmentation by performing the baseline with various regularization parameters and our algorithm. It shows the dice comparison on six anatomical brain structures of all image pairs. Our algorithm produces better dice coefficients without the need of parameter tuning. The runtime of our atlas building on \(100\) 3D brain MR images are \(4.4\) hours with \(0.89\)GB memory consumption. The p-values of significance differences test on both dice (\(p=0.002\)) and sharpness (\(p=0.0034\)) reject the null hypothesis that there's no differences between our model estimation and baseline algorithms. # Conclusion This paper presents a novel hierarchical Bayesian model for unbiased diffeomorphic atlas building with subject-specific regularization. We design a new parameter choice rule that allows adaptive regularization to control the smoothness of image transformations. We introduce a hierarchical prior that provides prior information of regularization parameters at multiple levels. The developed MCEM inference algorithm eliminates the need of manual parameter tuning, which can be tedious and infeasible in multi-parameter settings. Experimental results show that our proposed algorithm yields a better registration model as well as an improved quality of atlas. While our algorithm is presented in the setting of LDDMM, the theoretical development is generic to other deformation models, e.g., stationary velocity fields . In addition, this model can be easily extended to multi-atlas building where a much higher degree of variations exist in the population studies. Our future work will focus on conducting subsequent statistical shape analysis in the resulting atlas space. [^1]: To prevent the domain from growing infinity, we truncate the output of the convolution in each dimension to a suitable finite set.
{'timestamp': '2021-07-14T02:03:04', 'yymm': '2107', 'arxiv_id': '2107.05698', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05698'}
null
null
# Introduction Symmetries in Physics play a fundamental role in the analysis and understanding of theories. In this perspective, ultra-relativistic (UR) symmetries, also known as Carroll symmetries, have attracted some interest over recent years. The Carroll symmetries arise in the UR limit, \(c \rightarrow 0\), being \(c\) the speed of light. The Carroll group introduced by Lévy-Leblond emerged as the UR contraction of the Poincaré group, dual to the non-relativistic (NR) contraction (i.e., \(c\rightarrow \infty\)) leading to the Galilean group. Models with Carroll symmetries appear, for instance, in the context of high-energy Physics in the study of tachyon condensation, warped conformal field theories, and tensionless strings. Moreover, further works on Carroll algebras in the context of electrodynamics and brane dynamics can be found for instance in. On the other hand, the exploration of the Carroll limit corresponding to M2-as well as M3-branes propagating over \(D=11\) supergravity backgrounds in M-theory has been considered in. In, flat and Anti-de Sitter (AdS) Carroll spaces were investigated, in the bosonic and in the supersymmetric case, studying the symmetries of a particle moving in such spaces. Models of Carrollian gravity have been developed in. In particular, in, the respective NR and UR limits of the spin-3 Chern-Simons (CS) gravity in three spacetime dimensions were presented. Subsequently, the AdS Carroll CS gravity theory and its supersymmetric extension were discussed in and in, respectively. More recently, the Carrollian version of the Jackiw-Teitelboim gravity was explored in. On the other hand, there has been a growing interest, at the relativistic level, in exploring symmetries in three spacetime dimensions beyond the Poincaré and AdS ones. It is well assumed that a gravitational theory in three spacetime dimensions can be described by a CS action as a gauge theory, providing a useful setup to approach higher-dimensional models. A non-trivial extension of the Poincaré algebra is given by the Maxwell algebra which, in any dimension \(D\), is characterized by the commutator \[= \tilde{Z}_{AB}\.\] The Maxwell algebra has been first introduced in four spacetime dimensions to describe a constant Minskowski spacetime in the presence of an electromagnetic background. In arbitrary spacetime dimensions, the Maxwell algebra and generalizations have been useful to relate General Relativity with CS and Born-Infeld (BI) gravity theories. In three spacetime dimensions, the Maxwell symmetries and extensions to supersymmetry and higher-spin, have been explored using the CS formalism with diverse physical implications.[^1] Interestingly, the inclusion of a cosmological constant to the Maxwell CS gravity theory can be done considering the \(\mathfrak{so}\left(2,2\right)\times\mathfrak{so}\left(2,1\right)\) algebra, also denoted as AdS-Lorentz (AdS-\(\mathcal{L}\)) algebra. Applications of the AdS-\(\mathcal{L}\) algebra and generalizations can be found in, where the higher-dimensional pure Lovelock gravity is recovered as a particular limit of CS gravity theories based on the AdS-\(\mathcal{L}\) symmetries.[^2] Besides, in, deformations of the Maxwell algebra and their dynamics through non-linear realizations were studied. At the NR level, the study of a NR version of the three-dimensional CS Maxwell gravity theory was first considered in. As was discussed in, a finite and non-degenerate NR CS action required to consider the NR limit of a particular \(\rm{U}(1)\) enlargement of the Maxwell symmetry leading to a Maxwellian extended Bargmann (MEB) algebra. Interestingly, such symmetry can alternatively be recovered as a vanishing cosmological limit of an enlarged extended Bargmann (EEB) symmetry and as a semigroup expansion of the Nappi-Witten algebra. The generalization of the MEB symmetry and its supersymmetric extension have been subsequently approached in and, respectively. On the other hand, although the Maxwellian UR gravity theory has been partially studied in, the corresponding CS action is unknown. Motivated by the prominent role of Maxwellian algebras in the context of (super)gravity and by the fact that, to our knowledge, the Maxwellian UR gravity model remains unexplored, we present a Maxwellian generalization of the three-dimensional CS Carroll gravity theory. In particular, we would like to study the effect of including, in the UR regime, a covariantly constant electromagnetic field in the three-dimensional CS gravity, without introducing a cosmological constant. In this work, we first show that the Maxwell Carroll symmetry can be obtained as an UR limit of the Maxwell algebra. However, similarly to the NR case, an extended version of the Maxwell Carroll is required. Such extension is necessary in order for the invariant tensor to be non-degenerate and thus allow the proper construction of a CS action. Subsequently, we include a cosmological constant to the theory by considering an enlarged Carroll symmetry which can be seen as the corresponding UR counterpart of the AdS-\(\mathcal{L}\) symmetry. We show that the model with cosmological constant yielding the Maxwellian extended Carroll CS gravity theory in the limit of vanishing cosmological is based on an enlarged extended version of the Carroll symmetry exhibiting a non-degenerate invariant tensor and therefore allowing the proper construction of a CS gravity theory. The paper is organized as follows: In Section [2](#Maxgrav){reference-type="ref" reference="Maxgrav"} we briefly review the relativistic Maxwell and AdS-\(\mathcal{L}\) CS gravity theories in three spacetime dimensions. Sections [\[MC\]](#MC){reference-type="ref" reference="MC"}, [\[MEC\]](#MEC){reference-type="ref" reference="MEC"} and [\[CS1\]](#CS1){reference-type="ref" reference="CS1"} contain our main results. In Section [\[MC\]](#MC){reference-type="ref" reference="MC"} we derive the Maxwellian Carroll algebra by considering the UR limit of the relativistic Maxwell algebra and we write an UR CS gravity action based on the Maxwellian Carroll algebra. In Section [\[MEC\]](#MEC){reference-type="ref" reference="MEC"} we consider an extended version of the Maxwellian Carroll symmetry which exhibits a non-degenerate invariant bilinear form and therefore allows the proper construction of a CS Maxwellian extended Carroll gravity theory. In Section [\[CS1\]](#CS1){reference-type="ref" reference="CS1"} we show that a cosmological constant can be incorporated to the extended Maxwellian Carroll CS gravity model by considering an enlarged Carroll algebra. We introduce additional bosonic generators to the enlarged Carroll algebra, obtaining an enlarged extended Carroll algebra, in order to have a non-degenerate invariant tensor allowing the proper construction of an UR CS gravity action. In the flat limit, the latter precisely boils down to the Maxwellian extended Carroll CS gravity theory. Section [\[conclusions\]](#conclusions){reference-type="ref" reference="conclusions"} is devoted to some concluding remarks and possible future developments. # Three-dimensional Maxwell and AdS-Lorentz Chern-Simons gravity {#Maxgrav} In this section, we will briefly review the three-dimensional AdS-\(\mathcal{L}\) CS gravity theory, along with the CS gravity theory obtained after considering its flat limit, known as the Maxwell gravity. The AdS-\(\mathcal{L}\) algebra can be seen as a semi-simple enlargement of the Poincaré symmetry, allowing to incorporate a cosmological constant to the Maxwell gravity. Such enlarged algebra is spanned by the set of generators \(\left\{ \tilde{J}_{A},\tilde{P}_{A},\tilde{Z}_{A}\right\}\), which satisfy the non-vanishing commutation relations \[\begin{aligned} \left[ \tilde{J}_{A},\tilde{J}_{B}\right] &=&\epsilon _{ABC}\tilde{J}^{C}\,, \qquad \, \left[ \tilde{J}_{A},\tilde{P}_{B}\right] =\epsilon _{ABC}\tilde{P}^{C}\,, \notag \\ \left[ \tilde{J}_{A},\tilde{Z}_{B}\right] &=&\epsilon _{ABC}\tilde{Z}^{C}\,, \qquad \left[ \tilde{P}_{A},\tilde{P}_{B}\right] =\epsilon _{ABC}\tilde{Z}^{C}\,, \notag \\ \left[ \tilde{Z}_{A},\tilde{Z}_{B}\right] &=&\frac{1}{\ell ^{2}}\epsilon _{ABC}\tilde{Z}^{C}\,, \quad \left[ \tilde{P}_{A},\tilde{Z}_{B}\right] =\frac{1}{\ell ^{2}}\epsilon _{ABC}\tilde{P}^{C}\,, \label{Adslor} \end{aligned}\] [^1]: For other relevant applications of the Maxwell algebras, together with supersymmetric extensions of the latter, we refer the interested reader to, e.g.,. [^2]: The interested reader can also find applications of supersymmetric extensions of the AdS-\(\mathcal{L}\) algebra in four spacetime dimensions in the context of supergravity theories formulated à la MacDowell-Mansouri in.
{'timestamp': '2021-07-14T02:03:39', 'yymm': '2107', 'arxiv_id': '2107.05716', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05716'}
null
null
# Introduction {#sec:intro} V1674 Her (Nova Her 2021) was discovered by Seiji Ueda (Kushiro, Hokkaido, Japan) on 2021 June 12.5484 UT near magnitude 8.4. The object subsequently rose to reach a peak visual brightness of \(V\equsim6\) on 2021 June 12.9 UT according to observations reported to the AAVSO. The nova then faded rapidly, declining by \(\sim\)`<!-- -->`{=html}2 mags in approximately a day. Novae with \(t_2\) times this short are extremely rare, and the object has been monitored at multiple wavelengths since its discovery. The quiescent counterpart has been identified and a recent analysis has revealed an 8.4-min period in the progenitor binary that likely reflects the rotation period of the accreting white dwarf. In addition, recent spectroscopic observations by have revealed strong \[Ne V\] 342.6 nm and the \[Ne III\] pair at 386.9, 396.8 nm, which establish the object as a member of the class of "Neon Novae\". In this *Research Note* we report photometric observations of V1674 Her obtained with unprecedented coverage and temporal resolution using the Evryscope and the All-Sky Camera (ASC) at the Mount Laguna Observatory (MLO). The Evryscope consists of an array of 20 6.1-cm aperture telescopes that monitor \(\sim7400\) square degrees simultaneously and continuously every two minutes. There are two Evryscopes currently in operation: Evryscope South at Cerro Tololo, Chile (CTIO), and Evryscope North at MLO. With a limiting magnitude reaching \(g\sim14\), the Evryscope is a useful instrument to monitor bright transients such as classical novae. In the case of V1674 Her, which just reached naked-eye brightness, the object proved to be too bright for the Evryscope, with all measurements with \(g\lessim9\) being saturated. Fortunately, MLO is equipped with an ASC that is nominally used to monitor the weather during remote observing runs. The MLO-ASC is an Alcor-System OMEA 8M that records FITS images with 10 s integrations followed by \(\sim\)`<!-- -->`{=html}5 s for readout and processing. The ASC detector was cooled to \(-3^{\circ}\) C, but dark current subtraction and flat-fielding have not yet been implemented. However, by stacking raw ASC images into roughly 5-min bins (\(\sim20\) frames), we can mitigate these signals and reach limiting magnitudes of \(\sim9\) mag calibrated to the Gaia band. Thus, the ASC nicely complements our Evryscope observations. # The Light Curve {#sec:lc} Figure [\[fig:lc\]](#fig:lc){reference-type="ref" reference="fig:lc"} shows our combined Evryscope and ASC light curve for V1674 Her. The most striking feature is the plateau seen near \(g=14\) in the pre-maximum light curve. The aperture photometry may include some light from neighboring objects, but no source has been significantly detected at this position in 150 previous nights of Evryscope observations and visual inspection of the images suggest the appearance of a faint source between MJDs 59377.248 and 59377.275. The existence of the plateau is further supported by two photometric points from the All-Sky Automated Survey for Supernovae database--the first on MJD 59377.1956 at \(g=16.2\), and the second on MJD 59377.1968 at \(g=16.4\)--that together with our Evryscope observations constrain the length of the pre-maximum plateau to be less than 3 hr. We are unaware of any additional photometry that would help constrain the evolution of the nova prior to reaching the plateau. We have fit the early rise with a model of the early fireball as a uniformly expanding spherical blackbody of radius \(R(t)\) and (assumed constant) effective temperature, \(T_{\rm eff}\). The time evolution of the observed flux in such a model is given by: \[f(t)=[\theta(t)]^2~\sigma~T_{\rm eff}^4,\] where \(\theta(t)=R(t)/d\) is the angular radius of the expanding photosphere. Assuming that the fireball expands with constant velocity (i.e., \(R\propto~t\)), we see that \(f\propto~t^2\). This simple model, which is shown as the dotted line in Figure [\[fig:lc\]](#fig:lc){reference-type="ref" reference="fig:lc"}, allows us to estimate the time of the initial explosion to be at approximately MJD 59377.1575. We note that this time is \(\sim\)`<!-- -->`{=html}3 hr earlier than one would estimate based on an extrapolation of the later, post-plateau, rise recorded by Evryscope between MJDs 59377.2793 and 59377.3278. The best-fit power-law over this range is \(f\propto~t^{1.2}\) (dashed line in Fig. [\[fig:lc\]](#fig:lc){reference-type="ref" reference="fig:lc"}). To estimate the time and magnitude at peak we have fit a 6th-order polynomial to a combination of the ASC time-series and the AAVSO and CBAT data points. The fit shows that peak brightness reaches \(m\sim6.3\) (pseudo \(V\) magnitude) at MJD 59377.722, and fades by two magnitudes in 1.18 d. This value is comparable with other estimates of \(t_2\), and suggests that V1674 Her is arguably the fastest nova on record \[the recurrent nova U Sco also has a \(t_2\) time reported to be \(\sim\)`<!-- -->`{=html}1.2 d \]. # Concluding Remarks V1674 Her is the first nova where the pre-maximum rise has been observed in great detail thanks to the availability of modern automated sky patrols (e.g., Evryscope and ASAS-SN). Observations made possible by these instruments have allowed us to discover a pre-maximum plateau in the light curve of V1674 Her well below maximum light. The plateau appears to exhibit fluctuations of order 15 min that may be related to the 8.4 m periodicity reported by. The plateau is reminiscent of the pre-maximum halts observed just below peak in some novae, although in V1674 Her the feature occurs relatively early in the eruption and well below maximum light. The physical process or processes causing the plateau is currently unclear, but may be related to radiation from a precursor UV flash or the result of changes in the structure of the convective zone in the nova's expanding photosphere. Further modeling will be required to fully understand the nature of the pre-maximum plateau in V1674 Her.
{'timestamp': '2021-07-14T02:05:53', 'yymm': '2107', 'arxiv_id': '2107.05763', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05763'}
null
null
null
null
null
null
null
null
null
null
null
null
# Protocol characteristics used for fingerprinting {#app:characteristics} - Input/output count: the number of inputs and/or outputs may indicate a wallet software's behavior of creating transactions. While the number of inputs depends on the UTXOs available to the user, some commonly occurring patterns such as peeling chains () have consistent input and output counts. - Version: BIP 68 introduced relative timelocks for transactions, which requires transaction to set the transaction version to `2`. - Locktime: Transactions can set a timelock such that they are valid only after the tip of the chain has passed a specific block height or timestamp. Some clients (e.g., Bitcoin Core) produce timelocked transactions by default to prevent fee-sniping. - Replace-by-fee (RBF): Transactions opting into the replace-by-fee policy can be replaced by a similar transaction paying a higher fee. - SegWit: Segregated witness is a protocol update that enabled storing the inputs' signatures outside of the transaction, thereby increasing available space in blocks. As the upgrade is backwards-comptabile, not all wallets produce SegWit transactions. A wallet might also be able to produce SegWit transaction, but may be required to use non-SegWit serialization if none of the inputs use SegWit. We call this behavior SegWit-conform. - Ordered inputs/outputs: BIP 69 defines non-binding rules (i.e. not enforced by the consensus mechanism) for lexicographically sorting inputs and outputs in a transaction. (A limitation of our implementation is that it does not compare the raw `scriptPubKey` in case the output values are equal, as they are not available in BlockSci). - Zero-conf: Bitcoin user's are encouraged to wait for up to six confirmations (about an hour) before accepting a payment, as there is a risk that funds might be double-spent. A transaction spending inputs without any confirmations indicates willingness to accept the double-spending risk, which could be specific to certain intermediaries. - Transaction fee: Bitcoin users pay transaction fees for their transactions to be included into the blockchain by miners. Some clients may pay the same exact fee (either absolute, or relative to the transaction's size) for every transaction. - Multisignature: Multisignature scripts allow to specify a list of public keys and a threshold \(m\) such that the redeemer must provide valid signatures for \(m\) out of \(n\) of these keys. They aren't typically used by normal end-user wallets. - Address types: Bitcoin Core defines a number of standardized output scripts types including Pay-to-Pubkey-Hash (P2PKH), Pay-to-Script-Hash (P2SH) as well as their respective SegWit variants (P2WPKH and P2WSH). Often, a wallet consistently uses a specific address type. (Compared to the normal address type heuristic, the fingerprint checks for overlap with the address types of all inputs of the spending transaction). # Additional plots and tables {#app:figures-pow10-compressed} # Further insights and technical details ## Filtering the ground truth data set {#app:gt-filtering} Selecting transactions with two outputs, no outputs, where no input address has been directly reused in the outputs and where at least one output is in the same base cluster as the inputs yields a total of 46.791086 million transactions. We first exclude 1.079338 million transactions with unspent outputs, as our subsequent analyses rely upon the spending transactions being known. #### Transactions with two change candidates. Out of the 45.7 million transactions with at least one change candidate, for 0.92 million transactions *both* outputs are in the same base cluster. This can happen when a user transfers funds to an address in their own wallet, an online service restructures their funds, or cluster collapse leads to merging of both outputs' addresses. In a first step, we exclude all transactions with two change candidates. However, it is possible that there are yet unidentified transactions where both outputs do belong to the same entity. This should occur only in rare cases, but there may be specific intermediaries that create such transactions more frequently (e.g., 28.67 % of these transactions originate from only two base clusters). We therefore exclude *all* transactions from base clusters where more than 10 % of transactions exhibit such behavior. This removes an additional 472607 transactions in 8635 base clusters from our ground truth. #### Potential false positives. A risk of using the base clustering to extract ground truth is that the multi-input heuristic could already have produced false positives. For example, if a user Alice makes a payment to merchant Bob and their wallet addresses are incorrectly clustered together, her spend output would appear to be the change. To this end, we first remove 365010 transactions belonging to the Mt. Gox supercluster that resulted from users being able to import their private keys into the service. Next, we spot-check our base clustering against the website WalletExplorer.[^1] For the 100 largest base clusters in our ground truth we select 25 addresses at random and collect the tag (which is either explicitly named or pseudo-random) that WalletExplorer assigns to the address. In five instances, the addresses yield multiple tags. Four of these return only additional pseudo-random tags, which upon manual inspection we believe to be the result of a heuristic to not link addresses in transactions with large numbers of inputs. Only one base cluster contains addresses with two different named tags: "LocalBitcoins.com-old" and "AnxPro.com". This could be a result of cluster collapse, or an instance of mislabeling on the side of WalletExplorer. We remove the 87931 transactions from this base cluster from our ground truth. Overall, this check gives us some confidence that our base clustering does not already include wide-spread cluster collapse. #### Change address reuse. {#sec:filter-freshness} Our initial selection removed transactions where the change address appeared in an input of the transaction. Yet, we find many instances where the change address did not appear in the inputs but had been seen before. For example, a base cluster labeled by WalletExplorer as the gambling service "SatoshiDice", contains 5.767771 million transactions that use only 50 different change addresses. Similarly, there are 1.272048 million transactions from a base cluster tagged as "LuckyB.it" that all use a single change address.[^2] In many of these cases, the change address could have already been revealed (before the transaction took place) through the multi-input heuristic. If the change is known at the time the transaction is created, applying change heuristics is unnecessary. In contrast, whenever a transaction uses a fresh address for change, it cannot possibly be revealed as the change at the time the transaction was created. With this intuition, we remove transactions with change addresses that were not freshly generated if, at the time they were included in the blockchain, the change had already been revealed by the multi-input heuristic. This removes a total of 13.813332 million transactions (92.7982234 % of transactions with reused change addresses). provides an overview of whether the change and spend addresses are fresh in our ground truth data. ## Random forest classifier {#app:rf-tuning} #### Encoding. Due to the large size of the data set, we forgo one-hot encoding and instead use the following ordinal encoding for the heuristics: - the heuristic votes for the output - the heuristic votes neither for nor against the output - the heuristic votes against the output #### Model parameter. Our hyperparameter search returns the following parameters: - Full model - `max_features: 5` - `min_samples_split: 50` - No fingerprinting model - `max_features: 5` - `min_samples_split: 100` # Introduction #### Motivation. Blockchain analysis techniques are essential for understanding how cryptocurrencies like Bitcoin are used in practice. A major challenge in analysing blockchains is grouping transactions belonging to the same user. Because users can create an unlimited amount of addresses, each of which can receive and send coins, their activity may be split among a multitude of such addresses.[^3] Techniques to group activity of individual users are commonly referred to as *address clustering heuristics,* as they focus on identifying the addresses under an individual user's control using heuristic assumptions about how their transactions are created. As the term *heuristic* suggests, address clustering today is more intuitive than rigorous; our overarching goal in this paper is to elevate it to a science. There are at least four applications for which accurate address clustering is important. First, a law enforcement agency may be interested in evaluating the transactions of a specific entity (e.g., a specific exchange, trader or gambling service). They may supplement their own investigation of the entity's behavior with a set of reliable heuristics to identify relevant transactions. Second, and conversely, the ability to accurately determine a user's transactions directly impacts their privacy. This tension between law enforcement needs and everyday users' privacy is inherent to cryptocurrencies due to their transparency and pseudonymity. Advocates from one side push for greater privacy and from the other side for stronger regulation. To better understand this tug-of-war, it is important to quantify how reliable change address heuristics are in practice. Third, accurate grouping of transaction activity is important for aggregate analyses such as studying economic activity over time. This usually requires a full clustering of all addresses on the blockchain. [^1]: <https://walletexplorer.com> [^2]: `1NxaBCFQwejSZbQfWcYNwgqML5wWoE3rK4` [^3]: Cryptocurrencies use digital signature schemes to authorize transactions. Public keys are used as account identifiers (called *addresses*), and the signatures created with the corresponding private key authorize transactions. Users can create and use an unlimited amount of key pairs.
{'timestamp': '2021-07-14T02:05:31', 'yymm': '2107', 'arxiv_id': '2107.05749', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05749'}
null
null
null
null
null
null
# Introduction {#introduction .unnumbered} There is a significant body of literature regarding the \(C^{*}\)-algebras of extensions of groupoids by group bundles. The main goal of this paper is to introduce a pushout construction for extensions of groupoids by abelian group bundles and explore its applications. Specifically, we consider a locally compact Hausdorff groupoid \(\mathcal G\) together with an abelian group bundle \(p_{\A}:\A\to\goo\) where \(p_{\A}\) a continuous, open map. Then we consider unit space fixing extensions \[\label{eq:formal-ext-intro}\tag{\dag} \begin{tikzcd}[column sep=3cm] \A \arrow[r,"\iota"] \arrow[dr,shift left, bend right = 15] \arrow[dr,shift right, bend right = 15]&\Sigma \arrow[r,"p", two heads] \arrow[d,shift left] \arrow[d,shift right]&\mathcal G \arrow[dl,shift left, bend left = 15] \arrow[dl,shift right, bend left = 15] \\ &\goo& \end{tikzcd}\] where \(\Sigma\) is a locally compact Hausdorff groupoid, both \(\iota\) and \(p\) are groupoid homomorphisms, \(p\) is a continuous, open surjection inducing a homeomorphism of \(\go\) and \(\goo\), \(\iota\) is a homeomorphism of \(\A\) onto \(\ker p\). A fundamental class of such examples are \(\mathbf{T}\)-groupoids (also called twists) introduced by the second author in. Then \(\A\) is the trivial bundle \(\goo\times\mathbf{T}\) such that \(\iota(r(\sigma),z)\sigma=\sigma\iota(s(\sigma),z)\) for all \(\sigma\in\Sigma\) and \(z\in\mathbf{T}\). These groupoids and their restricted groupoid \(C^{*}\)-algebras, \(\ensuremath{C^{*}}(\mathcal G;\Sigma)\), have enjoyed considerable scrutiny . As usual, in this context we often write \(\dot\sigma\) in place of \(p(\sigma)\). More recently, we considered more general extensions in and as in [\[eq:formal-ext-intro\]](#eq:formal-ext-intro){reference-type="eqref" reference="eq:formal-ext-intro"} where it is assumed that \(\A\) is endowed with an action of \(\mathcal G\) and that the extension is compatible in the sense that \(\sigma\iota(a)\sigma^{-1}=\iota(\dot\sigma\cdot a)\) for all \(a \in \A\) and \(\sigma \in \Sigma\) such that \(p_{\A}(a) = s(\sigma)\). As a consequence of the main result in, we showed that if \(\Sigma\) has a Haar system, then \(C^*(\Sigma)\) can be realized as the \(C^*\)-algebra of a twist. Specifically, the action of \(\mathcal G\) on \(\A\) induces a natural action of \(\mathcal G\) on \(\hA\) (regarded as a space). We constructed a \(\mathbf{T}\)-groupoid \(\Sigmaw\) of the form \[\label{eq:13a}\tag{\ddag} \begin{tikzcd}[column sep=3cm] \hA\times\mathbf{T} \arrow[r,"i"] \arrow[dr,shift left, bend right = 15] \arrow[dr,shift right, bend right = 15]&\Sigmaw \arrow[r,"j", two heads] \arrow[d,shift left] \arrow[d,shift right]&\hA\rtimes\mathcal G. \arrow[dl,shift left, bend left = 15] \arrow[dl,shift right, bend left = 15] \\ &\hA& \end{tikzcd}\] We proved (\*Theorem 3.4) that \(C^*(\Sigma)\) is isomorphic to the restricted \(C^*\)-algebra \(C^*(\hA \rtimes \mathcal G; \Sigmaw)\) of this \(\mathbf{T}\)-groupoid. (In the \(\mathbf{T}\)-groupoid is denoted \(\widehat{\Sigma}\), but here we use \(\Sigmaw\) to avoid possible confusion in our examples.) The \(\mathbf{T}\)-groupoid \(\Sigmaw\) is at the heart of the Mackey obstruction which appears in the classical "Mackey machine" of. The chief motivation for this article is the observation that the \(\mathbf{T}\)-groupoid \(\Sigmaw\) above---which was based on the construction of \*Proposition 4.3---is derived from a natural and functorial "pushout" construction based on the second author's work in for étale groupoids (there called "sheaf groupoids"). Specifically, suppose we are given and extension as in [\[eq:formal-ext-intro\]](#eq:formal-ext-intro){reference-type="eqref" reference="eq:formal-ext-intro"}, and abelian group bundle \(\mathcal B\) admitting a \(\mathcal G\)-action, and a equivariant groupoid homomorphism \(f:\A\to \mathcal B\). Then there is a similar sort of extension \[\label{eq:-ext-fstar} \begin{tikzcd}[column sep=3cm] \mathcal B \arrow[r,"\iota"] \arrow[dr,shift left, bend right = 15] \arrow[dr,shift right, bend right = 15]&f_{*}\Sigma \arrow[r,"p", two heads] \arrow[d,shift left] \arrow[d,shift right]&\mathcal G \arrow[dl,shift left, bend left = 15] \arrow[dl,shift right, bend left = 15] \\ &\goo& \end{tikzcd}\] inducing the given \(\mathcal G\)-action on \(\mathcal B\). In Theorem [\[thm:functor\]](#thm:functor){reference-type="ref" reference="thm:functor"}, we show that the construction producing \(f_{*}\Sigma\) has good functorial properties that characterize the extension up to a suitable notion of isomorphism. Using these properties, we show in Theorem [\[thm:functoriali\]](#thm:functoriali){reference-type="ref" reference="thm:functoriali"} that the collection \(\Tga\) of isomorphism classes of extensions of \(\A\) by \(\mathcal G\) forms an abelian group (see also \*§5.3). We close by illustrating how the pushout construction clarifies and interacts with our work in and. In Theorem [\[thm:pushout\]](#thm:pushout){reference-type="ref" reference="thm:pushout"} we prove that the extension [\[eq:13a\]](#eq:13a){reference-type="eqref" reference="eq:13a"} employed in arises from our pushout construction. Specifically, the natural pairing \((\chi, a) \mapsto \chi(a)\) from \(\hA * \A\) to \(\mathbf{T}\) yields a groupoid homomorphism \(f: \hA * \A \to \hA\times\mathbf{T}\) given by \(f(\chi, a) = (\chi, \chi(a))\) (see Section [3.1](#sec:t-groupoid){reference-type="ref" reference="sec:t-groupoid"}). There is a natural action of \(\Sigma\) on \(\hA\) (compatible with that of \(\mathcal G\) as above) and we prove that \(\Sigmaw \cong f_*(\hA \rtimes \Sigma)\). This allows us to realise the \(C^*\)-algebra of an extension of a groupoid \(\mathcal G\) by an abelian group bundle \(\A\) as the \(C^*\)-algebra of a \(\mathbf{T}\)-groupoid over the resulting transformation groupoid \(\hA \rtimes \mathcal G\). Several consequences flow from this observation. First suppose that A is an abelian group and that \(\A = \goo \times A\), carrying the action of \(\mathcal G\) that is trivial in the second coordinate, so that \(\Sigma\) is a generalised twist. Each \(\chi \in \hat{A}\) defines a homomorphism \(\fchi: \A \to \mathbf{T} \times \mathcal G^{(0)}\), so we can form the resulting pushout \(\fchiss\). We prove in Proposition [\[prop:bundle\]](#prop:bundle){reference-type="ref" reference="prop:bundle"} that \(C^*(\Sigma)\) is the section algebra of an upper-semicontinuous \(C^*\)-bundle over \(\hat{A}\) with fibres \(C^*(\mathcal G, \fchiss)\). When \(A\) is compact, this yields a direct sum decomposition which remains valid for the corresponding reduced \(\ensuremath{C^{*}}\)-algebras (see Proposition [\[prop:compact-case\]](#prop:compact-case){reference-type="ref" reference="prop:compact-case"}). In Corollary [\[cor:twisted-extensions\]](#cor:twisted-extensions){reference-type="ref" reference="cor:twisted-extensions"} we extend \*Theorem 3.4 to the case that \(\Omega\) is a \(\mathbf{T}\)-groupoid extension of \(\Sigma\) such that its restriction to \(\iota(\A)\) is abelian. When \(\mathcal G\) is étale, this enables us to generalize to this case (see Corollary [\[cor:twisted-cartan\]](#cor:twisted-cartan){reference-type="ref" reference="cor:twisted-cartan"}) thereby providing criteria that guarantee that the natural abelian subalgebra of \(\ensuremath{C^{*}}_r(\Sigma; \Omega)\) is Cartan (see also [@dgnrw:jfa20 Theorem 5.8] and ). In Subsection [3.2](#sec:twists-cocycles){reference-type="ref" reference="sec:twists-cocycles"}, we consider the case where the extension \(\Sigma\) is determined by an \(\A\)-valued 2-cocycle defined on \(\mathcal G\) and show that the pushout construction is compatible with the natural change of coefficients map on cocycles. We describe the explicit construction of \(\Sigmaw\) in terms of \(2\)-cocycles at the beginning of Subsection [3.3](#sec:t-groupoid-2){reference-type="ref" reference="sec:t-groupoid-2"}, and then consider various examples of this construction. # Pushouts of groupoid extensions {#sec:push} We fix a locally compact Hausdorff groupoid \(\mathcal G\). In our applications, \(\mathcal G\) will have a Haar system, but this is not required for the pushout construction itself. However, we do assume that \(\mathcal G\) has open range and source maps. We call a locally compact abelian group bundle \(p_{\A}:\A\to\goo\) a *\(\mathcal G\)-bundle* if \(p_{\A}\) is open and \(\mathcal G\) acts on the left of \(\A\) by automorphisms. For compatibility with---and other examples we have in mind---we will write the group operations in the fibres of such \(\A\) additively. An extension \(\Sigma\) of \(\A\) by \(\mathcal G\) is determined by a diagram [\[eq:formal-ext-intro\]](#eq:formal-ext-intro){reference-type="eqref" reference="eq:formal-ext-intro"} as in the introduction. Recall that \(\Sigma\) is a locally compact Hausdorff groupoid, \(p\) is continuous and open surjection inducing a homeomorphism from \(\go\) onto \(\goo\), and \(\iota\) is a continuous open injective homomorphism onto \(\ker p=\set{\sigma\in\Sigma:p(\sigma)\in\goo}\). We call such an extension *compatible* if the action of \(\mathcal G\) on \(\A\) induced by conjugation is the given \(\mathcal G\)-action on \(\A\); that is, \(\sigma\iota(a)\sigma^{-1} =\iota(\dot\sigma\cdot a)\) Of course, given \(\mathcal G\) and a \(\mathcal G\)-bundle \(\A\), we would like to know that \(\Tga\) is not empty. To provide a basic example, we follow \*Definition 2.1. Assume now that \(\mathcal B\) is another abelian group \(\mathcal G\)-bundle, and that \(f:\A\to\mathcal B\) is a \(\mathcal G\)-equivariant map. Following \*Proposition 2.6, we prove that we can "pushout" \(\Sigma\) in a unique way to an extension of \(\mathcal G\) by \(\mathcal B\). . # The Extension Group \(\Tga\) {#sec:extension-group-tga} As in \*§2, we can use our pushout construction to introduce a binary operation on \(\Tga\). Suppose that \([\Sigma],[\Sigma']\in \Tga\). Define \(\nabla^{\A}:\A*\A\to\A\) by \(\nabla^{\A}(a,a')=a+a'\). Proper isomorphisms \(f: \Sigma \to \Gamma\) and \(f': \Sigma' \to \Gamma'\) of compatible extensions of \(\A\) by \(\mathcal G\) determine a proper isomorphism \(f * f': \Sigma*\Sigma' \to \Gamma*\Gamma'\) of extensions by \(\A * \A\). The uniqueness assertion of Theorem [\[thm:functor\]](#thm:functor){reference-type="ref" reference="thm:functor"} then yields a proper isomorphism \(\nabla^{\A}_{*}(\Sigma*_{\mathcal G}\Sigma') \to \nabla^{\A}_{*}(\Gamma*_{\mathcal G}\Gamma')\). Hence the formula \[\begin{aligned} \label{eq:85} [\Sigma]+[\Sigma'] := [\nabla^{\A}_{*}(\Sigma*_{\mathcal G}\Sigma')] \end{aligned}\] is well defined. In Examples [\[ex-iden\]](#ex-iden){reference-type="ref" reference="ex-iden"}--[\[ex-comm\]](#ex-comm){reference-type="ref" reference="ex-comm"}, we have proved much of the following theorem, which is patterned on \*Theorem 2.7. # Applications and Examples {#sec:appl-cocycl} In this section we consider a unit space fixing extension \(\Sigma\) of \(\mathcal G\) by the group bundle \(\A\) as illustrated in the diagram ([\[eq:formal-ext-intro\]](#eq:formal-ext-intro){reference-type="ref" reference="eq:formal-ext-intro"}) from the introduction. We review the basic details. We assume that all groupoids considered in this section are second-countable locally compact Hausdorff groupoids with Haar systems. The Haar system on \(\Sigma\) is denoted \(\lambda=\sset{\lambda^{u}}_{u\in\go}\) and we further assume that \(p_{\A}:\A\to\go\) is a bundle of abelian groups that is a closed subgroupoid of \(\Sigma\). It is equipped with a Haar system denoted \(\beta=\sset{\beta^{u}}_{u\in\go}\) and the fibers are denoted \(\A(u)\) for \(u\in\go\). The existence of a Haar system on \(\A\) implies that \(p_{\A}\) is open. It follows by \*Lemma 2.6(c) that there is a Haar system \(\alpha=\sset{\alpha_{u}}_{u\in\go}\) on \(\mathcal G\) such that for all \(f\in\cc(\Sigma)\) and \(u\in\go\) we have \[\label{eq:harhar} \int_{\Sigma}f(\sigma)\,d\lambda^{u}(\sigma) = \int_{\mathcal G} \int_{\A} f(\sigma a)\,d\beta^{s(\sigma)}(a)\, d\alpha^{u}(\dot \sigma).\] Moreover, there is a natural action of \(\Sigma\), and therefore \(\mathcal G\), on \(\A\). Note that \(p:\Sigma\to \mathcal G\) is a continuous, open surjection inducing a homeomorphism from \(\go\) onto \(\goo\), and \(\iota:\A\to\Sigma\) is a homeomorphism onto \(\ker p\). (Both \(p\) and \(\iota\) are assumed to be groupoid morphisms). Recall that if \(\Sigma\) is a \(\mathbf{T}\)-groupoid over \(\mathcal G\) then \[C_c(\mathcal G; \Sigma) := \{ f \in C_c(\Sigma): f(t\sigma) = tf(\sigma) \text{ for all } t \in \mathbf{T}, \sigma \in \Sigma \}\] is a \(^*\)-algebra under the operations described in \*§2, and \(\ensuremath{C^{*}}(\mathcal G; \Sigma)\) is its closure in the norm obtained by taking the supremum of the operator norm under all \(*\)-representations. We may also view \(C_c(\mathcal G; \Sigma)\) as compactly supported continuous sections of the one-dimensional Fell line bundle over \(\mathcal G\) associated to \(\Sigma\). One can then construct the associated (right) Hilbert \(C_0(\goo)\)-module (see \*§1.3) as the completion of \(C_c(\mathcal G; \Sigma)\) in the norm arising from the \(C_0(\goo)\)-valued pre-inner product given by \(\langle f, g \rangle := (f^**g)|_{\mathcal G^{(0)}}\) for all \(f, g \in C_c(\mathcal G; \Sigma)\). We denote the Hilbert module by \(\mathcal{H}(\mathcal G; \Sigma)\) and observe that left multiplication induces a natural \(*\)-homomorphism \(\lambda: C_c(\mathcal G; \Sigma) \to \mathcal{L}(\mathcal{H}(\mathcal G; \Sigma))\). We may define the reduced norm of an element \(f \in C_c(\mathcal G; \Sigma)\) to be the operator norm of its image: \(\|f\|_r := \| \lambda(f) \|\). Then \(\ensuremath{C^{*}}_r(\mathcal G; \Sigma)\) is the closure of \(C_c(\mathcal G; \Sigma)\) in the reduced norm. ## The \(\mathbf{T}\)-groupoid of an extension {#sec:t-groupoid} As noted in the introduction, we want to see that the \(\mathbf{T}\)-groupoid constructed in \*§3.1 is an example of the pushout construction of Theorem [\[thm:functor\]](#thm:functor){reference-type="ref" reference="thm:functor"}. The \(C^{*}\)-algebra \(\ensuremath{C^{*}}(\A)\) is abelian and the Gelfand dual of \(\ensuremath{C^{*}}(\A)\) is an abelian group bundle \(\hp:\hA\to\goo=\go\) with fibres \(\hp^{-1}(\sset u)\cong \A(u)^{\wedge}\) (see \*Corollary 3.4). Furthermore, since abelian groups are amenable, it follows from \*Corollary 5.39 and \*Proposition C.10 that \(\hp\) is open. Therefore we can view \(\hA\) as a right \(\mathcal G\)-bundle for the natural right action of \(\mathcal G\) on \(\hA\). Since \(\mathcal G\) and \(\Sigma\) both act on \(\hA\), regarded as a topological space fibered over \(\go\), we can form the transformation groupoids \(\hA\rtimes \mathcal G\) and \(\hA\rtimes \Sigma\). Moreover, \(\hA*\A= \set{(\chi,a):\hp(\chi)=p_{\A}(a)}\) is a \(\hA\rtimes \mathcal G\)-bundle (as well as an \(\hA\rtimes \Sigma\)-bundle). Defining \(\iota_*: \hA * \A \to \hA \rtimes \Sigma\) by \(\iota_*(\chi,a)=(\chi,a)\) and \(p_*: \hA \rtimes \Sigma \to \hA \rtimes \mathcal G\) by \(p_*(\chi,\sigma)=(\chi,\dot\sigma)\), we obtain an extension \[\label{eq:ext1} \begin{tikzcd}[column sep=3cm] \hA* \A \arrow[r,"\iota_*", hook] \arrow[dr,shift left, bend right = 15] \arrow[dr,shift right, bend right = 15]&\hA\rtimes\Sigma \arrow[r,"p_*", two heads] \arrow[d,shift left] \arrow[d,shift right]&\hA\rtimes\mathcal G. \arrow[dl,shift left, bend left = 15] \arrow[dl,shift right, bend left = 15] \\ &\hA& \end{tikzcd}\] We defined a \(\mathbf{T}\)-groupoid \(\Sigmaw\) associated to this extension in \*Proposition 3.2 as follows. Define \[\mathcal D=\set{(\chi,z,\sigma)\in\hA\times\mathbf{T}\times\Sigma: \hp(\chi)=r(\sigma)}\] and let \(H\) be the subgroupoid of \(\mathcal D\) consisting of triples of the form \((\chi,\overline{\chi(a)},a)\) for \(a\in \A(\hp(\chi))\). Then \(H\) is a normal subgroupoid of \(\mathcal D\) and we can form the locally compact Hausdorff groupoid \(\Sigmaw:=\mathcal D/H\) (we use the notation \(\Sigmaw\), rather than the notation \(\widehat\Sigma\) of, to avoid clashing with classical notational conventions when \(\Sigma\) is a group, for example in Remark [\[rem-mackey\]](#rem-mackey){reference-type="ref" reference="rem-mackey"}). It follows immediately that if \(\Sigma\) is properly isomorphic to the semidirect product \(\SD(\A,\mathcal G)\), then \([\hA\rtimes\Sigma] = [\hA\rtimes(\SD(\A,\mathcal G))] =[\SD(\A,(\hA\rtimes\mathcal G))]\) and hence \([\Sigmaw]\) is trivial. Thus \(\ensuremath{C^{*}}(\Sigma) \cong \ensuremath{C^{*}}(\hA\rtimes\mathcal G)\). If \(\chi \in \hat A\), then we get a \(\mathcal G\)-equivariant map \(\fchi: \goo \times A \to \goo \times \mathbf{T}\) given by \(\fchi(u, a)=(u, {\chi(a)})\). Thus we can form the pushout \(\fchiss\) so that \[\label{eq:4} \begin{tikzcd}[column sep= 3cm, row sep=2ex] \goo\times A \arrow[r,"\iota"] \arrow[dd,"\fchi"] &\Sigma \arrow[rd,"p"] \arrow[dd,"\fchi_{*}"] \\ &&\mathcal G \\ \goo\times\mathbf{T} \arrow[r,"\iota'"] & \fchiss \arrow[ru,"p'"] \end{tikzcd}\] commutes. Then \(\ensuremath{C^{*}}(\mathcal G;\fchiss)\) is the completion of \(C_{c}^{\chi}(\Sigma)\) consisting of functions \(g\in C_{c}(\Sigma)\) such that \(g(\iota(r(\sigma),a)\sigma) =\chi(a) g(\sigma)\) with the \(*\)-algebra structure discussed at the beginning of this section. Now suppose that \(\mathcal G=\goo\) so that \(\Sigma = \A\) is itself an abelian group bundle regarded as a groupoid with unit space \(\goo\) and let \(\Twist\) be a \(\mathbf{T}\)-twist over \(\A\). Then since \(\A\) is amenable \(\ensuremath{C^{*}}(\A; \Twist) = \ensuremath{C^{*}}_r(\A; \Twist)\) (see, for example \*Thm 1). We shall say that such a twist is *abelian* if \(\Twist\) is also an abelian group bundle---that is if \(\Twist(u)\) is abelian for each \(u \in \goo\). Then \(\Twist\) is abelian if and only if \(\ensuremath{C^{*}}(\Twist)\) is abelian and in that case \(\ensuremath{C^{*}}(\Twist) \cong C_0(\hat\Twist)\). Arguing as in Example [\[ex:abelian group\]](#ex:abelian group){reference-type="ref" reference="ex:abelian group"}, we see that such extensions must be pointwise trivial but need not be globally trivial. If \(\Twist\) is determined by a continuous \(\mathbf{T}\)-valued 2-cocycle \(c\), then \(\Twist\) is abelian if and only if \(c\) is symmetric (cf., ). Suppose now that \(\Twist\) is abelian. For \(n \in \mathbf{Z}\), let \(V_n := \{ \chi \in \hat\Twist: \chi(z,u) = z^n\,\text{ for all }z\in \mathbf{T}\text{ and }u\in\goo \}\). Then \(\ensuremath{C^{*}}(\Twist) \cong C_0(\hat\Twist)\) decomposes as a direct sum with summands of the form \(C_0(V_n)\). Note that each \(V_n\) is clopen. The projection \(q\) in Remark [\[rmk:t-case\]](#rmk:t-case){reference-type="ref" reference="rmk:t-case"} may then be identified with the characteristic function of \(U_\Twist := V_{1}\) and hence \[\ensuremath{C^{*}}(\A; \Twist) \cong q\ensuremath{C^{*}}(\Twist) \cong C_0(U_\Twist).\] See for a related construction. In the case that \(\Twist \cong \mathbf{T} \times \A\) and thus \(\hat\Twist \cong \mathbf{Z} \times \hat{\A}\), we have \(U_\Twist \cong \{ 1 \} \times \hat{\A} \cong \hat{\A}\). We return now to the more general situation where \(\Sigma\) is a unit space fixing extension of \(\mathcal G\) by the group bundle \(\A\) as in the diagram ([\[eq:formal-ext-intro\]](#eq:formal-ext-intro){reference-type="ref" reference="eq:formal-ext-intro"}) from the introduction. Suppose that, in addition, \(\Omega\) is a \(\mathbf{T}\)-groupoid extension of \(\Sigma\) \[\label{eq:omega-ext}\tag{\star} \begin{tikzcd}[column sep=3cm] \goo \times \mathbf{T} \arrow[r,"\tilde\iota"] \arrow[dr,shift left, bend right = 15] \arrow[dr,shift right, bend right = 15]&\Omega \arrow[r,"\tilde{p}", two heads] \arrow[d,shift left] \arrow[d,shift right]&\Sigma \arrow[dl,shift left, bend left = 15] \arrow[dl,shift right, bend left = 15] \\ &\goo& \end{tikzcd}\] such that \(\Twist_\Omega := \tilde{p}^{-1}(\A)\), its restriction to \(\A\), is an abelian group bundle over \(\goo\). We may thus regard \(\Omega\) as an extension of \(\mathcal G\) by \(\Twist_\Omega\). We assume that \(\A\), \(\Sigma\) and \(\mathcal G\) are endowed with Haar systems that satisfy [\[eq:harhar\]](#eq:harhar){reference-type="eqref" reference="eq:harhar"}, the Haar system in \(\goo \times \mathbf{T}\) is given by the Haar measure on \(\mathbf{T}\), and the Haar system on \(\Omega\) is the one naturally defined by the Haar systems on \(\goo \times \mathbf{T}\) and \(\Sigma\). To declutter notation a little, we write \(\widehat{\Twist}_\Omega\) for the dual bundle \((\Twist_\Omega)^\wedge\). By arguing as in Remark [\[rmk:t-case\]](#rmk:t-case){reference-type="ref" reference="rmk:t-case"} and Corollary [\[cor:ext-abelian-bundle\]](#cor:ext-abelian-bundle){reference-type="ref" reference="cor:ext-abelian-bundle"} we may conclude that \(\ensuremath{C^{*}}(\Sigma; \Omega)\) is isomorphic to the corner associated to the central projection \(q_\Omega\) in \[M(\ensuremath{C^{*}}( \widehat{\Twist}_\Omega\rtimes\mathcal G; f_{*}( \widehat{\Twist}_\Omega \rtimes \Omega)))\] corresponding to the characteristic function of \[U_\Omega := U_{\Twist_\Omega} \subset \widehat{\Twist}_\Omega = ( \widehat{\Twist}_\Omega\rtimes\mathcal G)^{(0)}.\] Observe that \(U_\Omega\) is an invariant clopen set under the action of both \(\mathcal G\) and \(\Omega\) and thus both groupoids act on \(U_\Omega\). Recall that an étale groupoid \(\mathcal G\) is said to be *effective* if the interior of the isotropy groupoid is \(\goo\) and *topologically principal* if the set of points with trivial isotropy is dense in \(\goo\). These notions are equivalent if the étale groupoid \(\mathcal G\) is second countable (see ). The above corollary allows us to generalize  (see also and ). ## Extensions by 2-cocycles {#sec:twists-cocycles} Extensions associated to groupoid \(2\)-cocycles yield some nice applications of the pushout construction. For convenience, we review the basics here. (For more details, see \*Appendix A.) Assume that \(p_{\A}:\A\to\goo\) is a \(\mathcal G\)-bundle. As before we write \(\A(u)\) for \(p_{\A}^{-1}(u)\) for \(u\in\goo\). Assume that \(\phi:\mathcal G^{(2)}\to \A\) is a continuous normalized 2-cocycle. That is, \(\phi(\gamma_1,\gamma_2)\in \A(r(\gamma_1))\) for all \((\gamma_1,\gamma_2)\in \mathcal G^{(2)}\), \(\phi(\gamma_0,\gamma_1)+\phi(\gamma_0\gamma_1,\gamma_2)=\gamma_0\cdot \phi(\gamma_1,\gamma_2)+\phi(\gamma_0,\gamma_1\gamma_2)\) for all \((\gamma_0,\gamma_1),(\gamma_1,\gamma_2)\in\mathcal G^{(2)}\), and \(\phi(\gamma,u)=\phi(u,\gamma)=0_u\) for all \(\gamma\in \A(u)\) and \(u\in\goo\). Then the extension \(\Sigma_\phi\) of \(\mathcal G\) by \(\A\) determined by \(\phi\) is obtained by giving the fibered product \(\A*\mathcal G\) the groupoid structure where \((a_1,\gamma_1)(a_2,\gamma_2)=(a_1 +\gamma_1\cdot a_2+\phi(\gamma_1,\gamma_2),\gamma_1\gamma_2)\) if \((\gamma_1,\gamma_2)\in \mathcal G^{(2)}\) and \((a,\gamma)^{-1}=(-\gamma^{-1}\cdot a-\phi(\gamma^{-1},\gamma),\gamma^{-1})\). We exhibit \(\Sigma_\phi\) as an extension of \(\mathcal G\) by \(\A\) via \(i(a)=(a,p_{\A}(a))\) and \(p(a,\gamma)=\gamma\). Suppose that \(p_{\mathcal B}:\mathcal B\to\goo\) is another abelian \(\mathcal G\)-bundle and that \(f: \A\to \mathcal B\) is an equivariant map such that \(f|_{\A(u)}:\A(u)\to \mathcal B(u)\) is a continuous group homomorphism for all \(u\in \goo\). There is a \(\mathcal B\)-valued 2-cocycle \(f_*(\phi): \mathcal G^{(2)}\to \mathcal B\) given by \(f_*(\phi) (\gamma_1,\gamma_2)=f(\phi(\gamma_1,\gamma_2))\). ## The \(\mathbf{T}\)-groupoid defined by a 2-cocycle {#sec:t-groupoid-2} We continue to assume the setting from Section [3.2](#sec:twists-cocycles){reference-type="ref" reference="sec:twists-cocycles"}: \(\A\) is an abelian \(\mathcal G\)-bundle, \(\phi:\mathcal G^{(2)}\to \A\) is a 2-cocycle, and \(\Sigma_\phi\) is the extension defined by \(\phi\). Then, as in Example [\[ex:transgr\]](#ex:transgr){reference-type="ref" reference="ex:transgr"} there is a 2-cocycle \[\tilde{\phi}:(\hA\rtimes \mathcal G)^{(2)}\to \hA \ast\A\] defined by \[\begin{aligned} \label{eq:phitilde} \tilde{\phi}\bigl( (\chi,\gamma_1),(\chi\cdot \gamma_1,\gamma_2) \bigr)=\bigl(\chi, \phi(\gamma_1,\gamma_2) \bigr) \end{aligned}\] if \((\gamma_1,\gamma_2)\in\mathcal G^{(2)}\). Therefore we can identify \(\hA\rtimes \Sigma_\phi\) with \(\Sigma_{\tilde{\phi}}\), the extension of \(\hA\rtimes\mathcal G\) determined by \(\tilde{\phi}\). Consider the 2-cocycle \(\phiw:=f_*\tilde{\phi}:(\hA\rtimes \mathcal G)^{(2)}\to \hA\times \mathbf{T}\) defined via \[\label{eq:phihat} \phiw\bigl( (\chi,\gamma_1),(\chi,\gamma_2) \bigr)=\bigl( \chi, {\chi(\phi(\gamma_1,\gamma_2))} \bigr).\] Lemma [\[lem:push2coc\]](#lem:push2coc){reference-type="ref" reference="lem:push2coc"} and Theorem [\[thm:pushout\]](#thm:pushout){reference-type="ref" reference="thm:pushout"} imply that \(\Sigmaw_\phi\) is isomorphic to the \(\mathbf{T}\)-groupoid defined by \(\phiw\) and \(C^*(\Sigma_\phi)\) is isomorphic to \(C^*(\hA\rtimes\mathcal G;\Sigma_{\phiw})\).
{'timestamp': '2021-07-14T02:06:41', 'yymm': '2107', 'arxiv_id': '2107.05776', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05776'}
# Introduction {#sec:intro} Currently, general relativity (GR) is the best tested theory of gravity and has passed all the tests with flying colors . But there are tentative alternative theories that could possibly explain the "missing mass" problem in galaxies and the accelerating expansion of our Universe without introducing dark matter or dark energy. In addition, there are theoretical arguments that GR may not be the exactly correct gravity theory in the ultraviolet end, and it is necessary to test GR and alternative theories more precisely. There are many gravity tests in the Solar System and these tests provide very tight restriction on the parameter space of theories beyond GR. Great achievements were made in bounding the parametrized post-Newtonian (PPN) parameters. Because different theories of gravity correspond to different values of PPN parameters in the weak field, bounding PPN parameters can help us test theories of gravity in a systematic way. The Solar System experiments probe gravitation in the weak field regime. However, for some gravity theories, such as the scalar-tensor gravity of, gravity can be reduced to GR in the weak field, while it is very different from GR in the strong field. So testing theories of gravity in the strong field can help us understand gravity theory more comprehensively. Radio pulsars, rotating neutron stars (NSs) with radio emission along their magnetic poles, are ideal astrophysical laboratories for strong-field gravity tests, because of the strong self-gravity of NSs. Binary pulsar systems, in which one or more bodies are NSs, provide us an opportunity to test gravity in the strong field. We can measure the parameters of binary pulsar systems with very high precision, which benefits from an extremely accurate measurement technology, the so-called pulsar timing. Pulsar timing precisely measures the times of arrival (TOAs) of radio signals at the telescope on the Earth and fits an appropriate timing model to these TOAs to get a phase-connected solution. In 1974, discovered the first binary pulsar system, PSR B1913+16, which is a double NS (DNS) system. This system proved the existence of gravitational wave (GW) radiation for the first time, using the fact that the observed orbital period decay rate, \(\dot{P}_{b}^{\rm obs}\), is consistent with the predicted value from GR, \(\dot{P}_{b}^{\rm GR}\). With more and more binary systems discovered, we can use them to test a variety of theories of gravity [see e.g. @Manchester:2015mda; @Kramer:2016kwa; @Shao:2012eg; @Shao:2013eka; @Shao:2013wga; @Shao:2014oha; @Shao:2014bfa; @Miao:2020wph; @Xu:2020vbs; @Xu:2020zxs]. For example, \(\dot{P}_{b}\) of binary pulsar systems can be used to restrict the time variation of the gravitational constant \(G\); it can also be used to bound the mass of graviton in massive graviton theories. At present, more than 300 binary pulsar systems have been discovered[^1], including pulsar-NS (PSR-NS) systems, pulsar-white dwarf (PSR-WD) systems, pulsar-main sequence star (PSR-MS) systems and so on. Among them, PSR-NS systems are ideal to test gravity theory, because most pulsars in these systems are millisecond pulsars (MSPs) which come from the "reversal mechanism" [namely, the so-called "recycled pulsars"; @Tauris_2017]. MSPs are generally more precise timers than normal pulsars, because the timing precision of normal pulsars are usually dominated by red noise, spin irregularities, glitched, etc.. Therefore MSPs can provide more precise gravity tests. Up to now, 19 DNS systems have been discovered from radio telescopes[^2]. One of them is a double pulsar system, PSR J0737\(-\)`<!-- -->`{=html}3039A/B, which provides a wealth of relativistic tests. The DNS system with the shortest orbital period is PSR J1946+2052 with \({P}_{b}=0.078\,{\rm day}\), and this system has the largest periastron advance, \(\dot{\omega}=25.6\pm0.3\,{\rm deg\,yr^{-1}}\). Binary pulsar systems with shorter orbital periods can provide more relativistic gravity tests because of higher relative velocity \(v\). They also can provide smaller fractional uncertainties for some binary orbital parameters. For example, the expected dependence of fractional uncertainty of \(\dot{P}_{b}\) is proportional to \(P_{b}^{3}\). So in most cases shorter orbital period PSR-NS systems can help us test gravity better. But we have not detected DNS systems with orbital periods of several minutes by radio observation yet, because the fast-changing Doppler shift caused by orbital acceleration of the pulsar can smear the pulsar signal in the Fourier domain. Therefore, the selection effect makes the detection of pulsars in very tight binary systems difficult. In addition to radio observations, GW observations from LIGO/Virgo have also detected two DNS systems, GW170817 in the second observing run [O2; @TheLIGOScientific:2017qsa] and GW190425 in the third observing run .[^3] Because of the high frequency range of LIGO and Virgo, we can only detect GWs from DNS systems near their phase of merger. Therefore, the orbital period of the discovered DNSs has a gap between 1.88\(\,\)hr (PSR J1946+2052) and \(\sim 1\,\)ms at the phase of merger. If we can detect a DNS system with an orbital period in this gap, it can help us better understand the population and formation mechanism of DNS systems. On the other hand, these systems with orbital periods of several minutes are highly relativistic, so they can provide complementary gravity tests to what have been done with current pulsar and GW observations. In 2018, proposed a multimessenger strategy, combining the Laser Interferometer Space Antenna (LISA) and the Square Kilometre Array (SKA), to detect radio pulses from Galactic DNSs with a period shorter than 10 minutes. LISA is a future space-based GW detector, and it is sensitive at mHz bands, which makes DNS systems with \({P}_{b}\sim\,\)min a target for detection. SKA (Phase 2) under construction will greatly improve detection sensitivity of radio observation in the future.[^4] According to the schedule, LISA and SKA will perform their missions simultaneously for a duration of time. considered that we can utilize LISA to discover DNS systems, and provide their sky location and binary parameters with a high accuracy. Then one can use SKA to probe whether or not a visible pulsar exists in the DNS system. The sky location information can help SKA locate the DNS, and the information of binary parameters can help recover pulse signals modulated by orbital motion. With the help of LISA, SKA can detect PSR-NS systems with \({P}_{b}\sim\,\)min more easily with affordable computational cost. So to some extent, the multimessenger strategy can help us reduce the difficulty in searches of short-orbital-period PSR-NS systems. As a future high-sensitivity radio instrument, SKA can improve the measurement precision of TOAs of pulse to an unprecedented level, which can help improve the measured accuracy of binary pulsar parameters. The high precision binary parameters can further help us improve gravity tests. The theoretically projected relation between \(P_{b}\) and the fractional error of \(\dot{P}_{b}\) in measurement is \(\delta(\dot{P}_{b})\propto P_{b}^{3}\). So for the short-orbital-period PSR-NS systems, \(\delta(\dot{P}_{b})\) can be well measured. Then we can use the high precision \(\dot{P}_{b}\) to provide tighter bounds on the parameter space of gravity theories beyond GR. In general, short-orbital-period binary pulsars are short lived. Recent literature have estimated the number of DNS systems that can be detected by LISA. Based on different Galaxy DNS merger rates, considered that LISA will detect on average 240 (330) DNS systems in the Galaxy for a 4-yr (8-yr) mission with signal to noise ratio (SNR) above 7. estimated that around 35 DNSs will accumulate SNR\(\,>8\) over a 4-yr LISA mission. Although the estimated number for DNSs to be detected by LISA are different in the above two papers, they all confirm that a certain number of DNS systems are likely to be detected by LISA. Therefore, we expect that the multimessenger strategy can detect short-orbital-period PSR-NS systems in the future. In this work, we assume that in the future some short-orbital-period PSR-NS systems are detected by the multimessenger strategy. Based on this assumption, we simulate the fractional error of parameters of these short-orbital-period PSR-NS systems using the standard pulsar timing software TEMPO2,[^5] and use the simulated precision of the parameter \(\dot{P}_{b}\) to constrain specific theories of gravity, including varying-\(G\) theory, massive gravity and scalar tensor theories. Results of our simulation show significant improvement in the constraints of specific parameters of gravity theories in the strong field. We also provide a simple estimate of orbital periastron advance rate, \(\dot{\omega}_{\rm LT}\), due to the Lense-Thirring effect. Our result suggests that we are able to measure the value of \(\dot{\omega}_{\rm LT}\) in the short-orbital-period PSR-NS systems, which can help us restrict the equations of state (EOSs) of NSs. We need to underline that we have ignored higher order contributions in our simulation, thus our results are indicative, but providing a reasonable estimate of the magnitude of the precision of parameters. The paper is organized as follows. In the next section, we overview the multimessenger strategy and list the estimated number of DNSs which could be detected by LISA from several work. In Sec. [3](#sec:sim){reference-type="ref" reference="sec:sim"}, we simulate the parameters of PSR-NS systems to be detected by the joint observation of LISA and SKA. We give the simulated fractional uncertainty of parameters. In Sec. [4](#sec:test:GR){reference-type="ref" reference="sec:test:GR"}, we use our simulated fractional uncertainty of the parameter \(\dot{P}_{b}\) to constrain parameter spaces of some specific theories of gravity. In Sec. [5](#sec:lense){reference-type="ref" reference="sec:lense"}, we provide an estimate on the order of magnitude of orbital periastron advance rate, \(\dot{\omega}_{\rm LT}\). Finally we give a discussion in Sec. [6](#sec:disc){reference-type="ref" reference="sec:disc"}. # Observing DNSs with LISA and SKA {#sec:lisa:ska} At present, the detected DNS system of the shortest orbital period is PSR J1946+2052 with \(P_{b}=0.078\,{\rm day}\). The merging timescale is provided by, \[T_{\rm merge}=\frac{5}{256}\left(\frac{P_{b}}{2\pi}\right)^{8/3}T_{\odot}^{-5/3}\frac{(m_{p}+m_{c})^{1/3}}{m_{p}m_{c}}G(e)\,, \label{eq:Tmerge}\] where \[G(e)=1-3.6481e^{2}+5.1237e^{4}-3.5427e^{6}+1.3124e^{8}+\cdots\. \label{eq:Ge}\] In Eq. ([\[eq:Tmerge\]](#eq:Tmerge){reference-type="ref" reference="eq:Tmerge"}), \(T_{\odot}\equiv GM_{\odot}/c^{3}\approx4.9254909\,{\rm \mu s}\) where \(M_{\odot}\) is the Solar mass, \(m_{p}\) and \(m_{c}\) are the masses of the pulsar and the companion in Solar units respectively, and \(e\) is the eccentricity of the binary system. By calculating Eq. ([\[eq:Tmerge\]](#eq:Tmerge){reference-type="ref" reference="eq:Tmerge"}), we get the merging timescale of PSR J1946+2052, \(T_{\rm merge}=46\,{\rm Myr}\), which means that this system will take \(46\,{\rm Myr}\) to merge. The GW events from DNS merging suggest that the Galactic merger rate of DNSs is about one in \(10^{4}\,{\rm yr}\). So there must be undetected DNS systems with \(P_{b}<0.078\,{\rm day}\) in the Galaxy. The reason why we have not observed DNS systems with orbital period less than one hour is that we are constrained by our present searching methods. Radio observations contributed mostly to DNS detection, as 19 DNS systems have been detected by radio telescopes. Orbital motion of the short-orbital-period binary systems can lead to a severe Doppler smearing which makes it difficult for radio observation to recover the pulse signals of such systems. In GW observation, LIGO/Virgo detected two DNS systems, GW170817 in O2 and GW190425 in O3. However, LIGO/Virgo are only sensitive to the merger phase. Therefore, constrained by the existing technology and observation, currently it is difficult to detect DNS systems with \(P_{b}\sim{\rm min}\). LISA, a future space-based GW detector, which is expected to be operational in 2030s, is sensitive at mHz bands, so the DNS systems with \({P}_{b}\sim{\rm min}\) are potential targets for LISA. Recently, several works have provided estimates of the number of DNS systems that could be detected by LISA. used the Galaxy DNS merger rate of \(210\,{\rm Myr^{-1}}\), which is derived from, to estimate the number of DNSs that LISA could detect. They showed that LISA will detect on average 240 (330) DNS systems in the Galaxy with \({\rm SNR>7}\) for a 4-yr (8-yr) mission. They also used a conservative DNS merger rate, \(42^{+30}_{-14}\,{\rm Myr^{-1}}\), and estimated that LISA will detect on average 46 (65) DNS systems in the Galaxy for a 4-yr (8-yr) mission with \({\rm SNR>7}\). The smaller merger rate could suffer from a selection effect. At the same time, provided an estimation that around 35 DNSs will accumulate SNR above 8 over a 4-yr LISA mission. They gave a smaller detectable number of DNSs than that in. It is because that used a smaller DNS merger rate, \(33 \,{\rm Myr^{-1}}\). Overall, no matter we use a conservative or an optimistic DNS merger rate, LISA has a high probability of detecting the DNS systems with \(P_{b}\sim{\rm min}\), and there may be PSR-NS systems within them. provided a multimessenger strategy, using LISA and SKA, to detect PSR-NS systems with \(P_{b} \sim 10\,{\rm min}\) in the Galaxy. LISA can detect DNSs with \(P_{b}\sim\,{\rm min}\) and provide information on the location and orbital parameters of DNSs. These information can help SKA locate DNS systems and recover the radio pulse signal which could exist in the system. So the joint observation strategy can significantly reduce the number of trials used to search for DNS systems with radio telescopes alone. estimated the 1-\(\sigma\) statistical errors of parameters when SNR \(\rho=200\) for a 2-yr observation mission, and the uncertainties of parameters can be found in their Eqs. (9-11). With the estimated errors of parameters, showed that LISA can locate DNS within an error range \(\Delta\Omega\approx0.036\,{\rm deg^{2}}\) \[see their Eq. (11)\] and then SKA only needs to take 240 pointings to locate the DNS system precisely by a tied-array beam. So the multimessenger strategy can greatly reduce the number of points that an all-sky survey needs. After locating the DNS system, we can use the orbital frequency and binary parameters provided by LISA to recover possible pulse signal of the pulsar, which also can greatly reduce the number of required trials when using a coherent integration.[^6] We should notice that all-sky survey is not confined to detect PSR-NS systems with \(P_{b}\sim10\,{\rm min}\). It can be used for other radio source searching as well. The multimessenger observation can specifically and efficiently help us detect PSR-NS systems with \(P_{b}\sim10\,{\rm min}\). Based on, offered an extended analysis for the joint detection of LISA and SKA. They considered a 4-yr observation mission of LISA where the SNR can be improved to \(\rho=360\), so the fractional errors of parameters can be further reduced. With the improved precision of parameters, we can use the joint detection to detect short-orbital-period PSR-NS systems more efficiently. In conclusion, with a reasonable merger rate for Galactic DNSs, the joint detection of SKA and LISA can provide an efficient and more targeted way for detecting PSR-NS systems with very short orbital period. # Pulsar-timing simulations {#sec:sim} The multimessenger strategy can offer a specific approach to seek for the short-orbital-period PSR-NS systems. These systems can provide a more relativistic situation to test gravity. In our paper, we assume that we will have detected PSR-NS systems by this way in the future, and then we simulate the precision of orbital parameters of the short-orbital-period PSR-NS systems for the SKA. SKA as the next generation radio telescope will enable the precision of TOAs to reach an unprecedented level. provided approximated measurement precision on TOAs at \(1.4\,{\rm GHz}\) with 10-min integration, which is listed in Table 1 of their work. These results are based on the presumed instrumental sensitivities. In practice, the precision of TOAs depends not only on instrumental sensitivities, but also on interstellar medium evolution, intrinsic pulse shape changes, etc.. Based on various effects, predicted that a TOA precision of a normal-brightness MSP can achieve \(80\)--230\(\,{\rm ns}\) at \(1.4\,{\rm GHz}\) with 10-min integration by the SKA. The timing precision of young pulsars is normally dominated by red noise, spin irregularities and glitches, etc., so the timing precision could not be significantly improved by increasing the system sensitivity of telescopes. Hence we assume that the pulsar in PSR-NS system is recycled, which has stable precision of TOAs in general, and we use a spin period \(P=20\,{\rm ms}\). For simplification, we only consider white noise. In our work, considering the possible contributions of various effects, we use two different measurement precisions of TOAs to perform the simulations, \(\sigma_{\rm TOA}=100\,{\rm ns}\) and \(\sigma_{\rm TOA}=1\,\mu {\rm s}\). LISA is sensitive to DNS systems with \({P}_{b}\sim10\,{\rm min}\), so the target of multimessenger observation strategy is mainly PSR-NS systems with \({P}_{b}\sim10\,{\rm min}\). Meanwhile, radio observation can also provide us opportunity to detect systems with a period around 100 min by "acceleration search" and "jerk search" . So we simulate PSR-NS systems with \(P_{b}\in [8,\,120]\,{\rm min}\). For the masses of the NSs, we choose two sets of parameters, \(m_{p}=1.3\,M_{\odot}\), \(m_{c}=1.7\,M_{\odot}\) and \(m_{p}=1.35\,M_{\odot}\), \(m_{c}=1.44\,M_{\odot}\). used the equations from to show how orbits of the 20 known PSR-NSs[^7] will evolve over the next 10 Gyr as gravitational radiation causes them to circularize and decay. Figure 1 in shows that the orbital eccentricity goes smaller than 0.1 when the orbital period \(P_{b}\) of the 20 PSR-NS systems evolve to 10 min. So in our simulation, we set eccentricity \(e=0.1\) for the simulation of all systems.[^8] We use the FAKE plug-in in TEMPO2 to simulate pulsar timing data. We need to provide a parameter file which contains parameters of the pulsar and binary orbit as input. In this work, we are interested in how the short orbit PSR-NS systems combined with the high-precision measurement of SKA can improve the measurement precision of orbital parameters. Hence, we only consider simulating the time delay of TOAs related to orbital motion. These time delay terms of orbital motion are the R\(\rm{\ddot{o}}\)mer delay caused by the orbital motion of the pulsar, the Einstein delay caused by the gravitational redshift and the second order Doppler effect, and the Shapiro delay, which is due to the gravitational field of the companion star.[^9] For timing model of orbital motion, different models have different orbital parameters to fit. introduced a phenomenological parametrization, which is called the parametrized post-Keplerian (PPK) formalism, to describe the orbital motion of pulsars. The post-Keplerian (PK) parameters are solutions of the first order post-Newtonian (PN) equations of orbital motion and it is generic for fully conservative gravity theories. In our simulation, we choose the Damour-Deruelle (DD) timing model. In the DD timing model, we are mainly able to measure 5 PK parameters---\(\dot{\omega},\,\gamma,\,r,\,s,\,\dot{P}_{b}\)---in binary pulsar systems. In GR, they can be expressed as functions of two component masses , \[\begin{aligned} \dot{\omega} &=3 T_{\odot}^{2 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{-5 / 3} \frac{1}{1-e^{2}}\left(m_{p}+m_{c}\right)^{2 / 3}\,, \label{eq:omegadot}\\ \gamma &=T_{\odot}^{2 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{1 / 3} e \frac{m_{c}\left(m_{p}+2 m_{c}\right)}{\left(m_{p}+m_{c}\right)^{4 / 3}}\,, \label{eq:gamma}\\ r &=T_{\odot} m_{c}\,, \label{eq:r}\\ s &=\sin i=T_{\odot}^{-1 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{-2 / 3} x \frac{\left(m_{p}+m_{c}\right)^{2 / 3}}{m_{c}}\,, \label{eq:s}\\ \dot{P}_{b} &=-\frac{192 \pi}{5} T_{\odot}^{5 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{-5 / 3} f(e) \frac{m_{p} m_{c}}{\left(m_{p}+m_{c}\right)^{1 / 3}}\,, \label{eq:pbdot} \end{aligned}\] with \[f(e) \equiv \frac{1+(73/24)e^{2}+(37/96)e^{4}}{(1-e^{2})^{7/2}}\. \label{eq:fe}\] In above equations, \(x\equiv(a/c)\sin{i}\) is the projected semi-major axis of the pulsar orbit and \(i\) is the orbital inclination; \(\dot{\omega}\) is the relativistic precession of periastron of pulsar; \(\gamma\) is a PK parameter which is related to the Einstein delay; \(r\) and \(s\) are PK parameters which are related to the Shapiro delay; \(\dot{P}_{b}\) is the orbital period decay rate caused by GW quadrupole radiation in GR. For the 5 PK parameters, except that parameters \(r\) and \(s\) do not depend on \(P_{b}\), the expected fractional uncertainty of \(\dot{P}_{b}\) is proportional to \(P_{b}^{3}\), the expected fractional uncertainty of \(\dot{\omega}\) is proportional to \(P_{b}\), and the expected fractional uncertainty of \(\gamma\) is proportional to \(P_{b}^{4/3}\); these dependent relationships are listed in Table II in. So PSR-NS systems with \(P_{b}\sim 10\, {\rm min}\) can provide better measurement precisions for PK parameters \(\dot{P}_{b}\), \(\dot{\omega}\) and \(\gamma\), which can help us improve the ability of gravity test. In principle, there are extra relativistic PK parameters, e.g., \(\delta_\theta\). We have omitted them in this work. As mentioned previously, we should provide the orbital parameters of PSR-NS systems for the parameter file. We use the parameters of example PSR-NSs listed in Table [\[tab:PSR-NSsparameters\]](#tab:PSR-NSsparameters){reference-type="ref" reference="tab:PSR-NSsparameters"} and Eqs. ([\[eq:omegadot\]](#eq:omegadot){reference-type="ref" reference="eq:omegadot"}--[\[eq:pbdot\]](#eq:pbdot){reference-type="ref" reference="eq:pbdot"}) to provide the values of PK parameters. In fact, the PK parameters should be generic, however current measurements of PK parameters in binary pulsars show no significant deviation from the predicted values in GR. In general, we use the error of the observations of PK parameters as a deviation from GR to limit parameter spaces of alternative theories of gravity. Here we assume that GR is correct and predict the bounds on other theories of gravity constrained by these PSR-NS systems. We assume a 4-yr observation and ten TOAs per week for the SKA. Ten TOAs per week means that we need to observe a PSR-NS system for 100 min per week, when each TOA is obtained with a 10-min integration time.[^10] With parameter file and fitting conditions determined, TEMPO2 can generate simulated TOAs and give a phase-connected solution using the FAKE plug-in by weighted least-squares algorithm. The simulation can provide values and measurement uncertainties of parameters, and we can utilize the simulated results to predict how the short-period PSR-NS systems can limit specific theories of gravity. In our simulation, we need to give a value of the longitude of periastron \(\omega_{0}\) at the epoch of periastron passage \(T_{0}\) in parameter file. Figure 3 of shows that the fractional uncertainties of 5 PK parameters vary with the value of \(\omega_{0}\). The reason is that there are some degeneracy between different time delay terms, e.g. Römer delay and Einstein delay, and different values of \(\omega_{0}\) can lead to different degrees of degeneracy. Therefore we simulate the fractional uncertainties of 5 PK parameters for different \(\omega_{0}\)'s. We exhibit results for the "PSR-NS I" system with \(\delta_{\rm TOA}=100\,{\rm ns}\) (see Table [\[tab:PSR-NSsparameters\]](#tab:PSR-NSsparameters){reference-type="ref" reference="tab:PSR-NSsparameters"}) for different \(P_{b}\)'s in Fig. [\[fig:omegachange\]](#fig:omegachange){reference-type="ref" reference="fig:omegachange"}. As \(P_{b}\) increases, different values of \({\omega}_{0}\) can result in a significant difference in the fractional errors of 4 PK parameters, except \(\dot{P}_{b}\). So we take the effect of \(\omega_{0}\) into account in the simulation and calculate the fractional error with \({\omega}_{0}\in\left[0^{\circ},\,360^{\circ}\right)\). Figure [\[fig:simulateresulte\]](#fig:simulateresulte){reference-type="ref" reference="fig:simulateresulte"} shows the fractional uncertainties of 5 PK parameters as functions of \(P_{b}\) for a 4-yr observation. The band of the expected fractional uncertainty is caused by simulating with different \(\omega_{0}\)'s. In the upper panels of Fig. [\[fig:simulateresulte\]](#fig:simulateresulte){reference-type="ref" reference="fig:simulateresulte"}, we present the expected measurement precisions of the 5 PK parameters with \(\sigma_{\rm TOA}=1\,{\rm \mu s}\). In the lower panels of Fig. [\[fig:simulateresulte\]](#fig:simulateresulte){reference-type="ref" reference="fig:simulateresulte"}, we present the results with \(\sigma_{\rm TOA}=100 \,{\rm ns}\). As shown in Fig. [\[fig:simulateresulte\]](#fig:simulateresulte){reference-type="ref" reference="fig:simulateresulte"}, the simulated fractional uncertainties of PK parameters with \(\sigma_{\rm TOA}=100 \,{\rm ns}\) are an order of magnitude smaller than those with \(\sigma_{\rm TOA}=1\,{\rm \mu s}\). SKA can provide a high precision measurement for TOAs of pulsars. The expected sensitivity could be even smaller than 100 ns, so the precision of PK parameters might be even higher for real detection in the future. At the same TOA precision, the simulated results of the PSR-NS I system are slightly better than that of the PSR-NS II system, which could be caused by a more significant mass difference and thus some reduced degeneracy among parameters. Based on a 4-yr observation, we notice that the simulated fractional uncertainty of \(\dot{P}_{b}\) as a function of \(P_{b}\) is largely consistent with what theoretically predicts, namely \(\propto P_{b}^{3}\).[^11] So the predicted fractional uncertainty of \(\dot{P}_{b}\) can offer reasonable predictions of gravity tests. The simulated fractional uncertainties of PK parameters \(r\) and \(s\) are mainly consistent with the theoretical prediction, which are not dependent on \(P_{b}\), except that there is a slight rise in \(P_{b}\in[40,\,60]\,{\rm min}\). We notice that the slope of PK parameter \(\dot{\omega}\) changes significantly in \(P_{b}\in[30,\,60]\,{\rm min}\) for a 4-yr observation, which could be caused by the degeneracy between different time delay terms. For parameter \(\gamma\) in a 4-yr observation, our simulated results decrease with \(P_{b}\) when \(P_{b}<60\,{\rm min}\), and then increase with \(P_{b}\). So the changing trend of \(\delta\left({\gamma}\right)\) is not strictly consistent with the theoretical prediction, \(\propto P_{b}^{4/3}\), when \(P_{b}<60\,{\rm min}\). For DD model, according to Eqs. (2.2b) and (2.2c) in , the Einstein delay is always degenerate with the R\(\ddot{\rm o}\)mer delay, and the degeneracy depends on the change of relativistic advance of periastron. So we think that the trend of \(\delta\left({\gamma}\right)\) could come from the degeneracy between the R\(\ddot{\rm o}\)mer delay and the Einstein delay. For PSR-NS systems with \(P_{b} \sim 10\,{\rm min}\), they have a large \(\dot{\omega}\), and considering a 4-yr observation, their periastrons have precessed several rounds. Hence the periodic change of \(\omega\) can not eliminate degeneracy effectively enough and leads to the trend of \(\delta\left({\gamma}\right)\) different from the theoretical prediction. For binary systems with \(P_{b} > 60\,{\rm min}\), the change of \(\omega\) is less than \(2\pi\), so the trend of \(\delta\left({\gamma}\right)\) varying with \(P_{b}\) is roughly consistent with the theoretical prediction when considering different values of \(\omega_{0}\).[^12] So DD model can not avoid the degeneracy because of the specific form of time delay terms, which makes \(\gamma\) less well measured when \(\Delta{\omega}>2\pi\) in observation. We have showed the expected fractional uncertainties of PK parameters of short-orbital-period PSR-NS systems which could be detected by LISA and SKA in joint observation in the future. But we need to emphasize that, strictly speaking, the DD timing model is not sufficient to describe the orbital motion of PSR-NS systems with a very short orbital period \(P_b\sim\) min, because it only takes into account the leading PN order terms. A PSR-NS system with \({P}_{b}=8\,{\rm min}\) is an extremely relativistic system, so, in principle, we need to take high order effects into account in our simulation. Since we mainly use the fractional error of \(\dot{P}_{b}\) to test gravity in the following, we provide an extended analysis for \(\dot{P}_{b}\). Equation ([\[eq:pbdot\]](#eq:pbdot){reference-type="ref" reference="eq:pbdot"}) gives the 2.5 PN formula for \(\dot{P}_{b}\), \(\dot{P}_{b}^{2.5\,{\rm PN}}\), and we actually have appended it with the 3.5 PN contribution, \[\begin{aligned} \delta \dot{P}_{b}^{3.5\,{\rm PN}}&=\dot{P}_{b}^{2.5\,{\rm PN}}X^{3.5\,{\rm PN}} \,, \end{aligned}\] where \[\begin{aligned} X^{3.5\,{\rm PN}} = & \frac{\left(GmM_{\odot}\right)^{2/3}}{336\left(1-e^{2}\right)c^{2}f(e)}\left(\frac{P_{b}}{2\pi}\right)^{-2/3} \nonumber\\ & \times{\bigg[}1273+\frac{16495}{2} e^{2} +\frac{42231}{8} e^{4}+\frac{3947}{16} e^{6}\nonumber \\ &-\left(924+3381e^{2}+\frac{1659}{4}e^{4}-\frac{259}{4}e^{6}\right)\frac{m_{p}m_{c}}{m^{2}}\nonumber \\ & +\left(3297e^{2}+4221e^{4}+\frac{2331}{8}e^{6}\right)\frac{m_{p}-m_{c}}{m}{\bigg]}\. \end{aligned}\] For a PSR-NS system with \(P_{b}=8\,{\rm min},\,e=0.1\), one has \(X^{3.5\,{\rm PN}} \sim 1\times10^{-4}\). Our simulated fractional error of \(\dot{P}_{b}\) can reach \(10^{-7}\) for \(\sigma_{\rm TOA}=1\,\mu {\rm s}\). So, comparing with the simulated fractional error, the contribution from \(\delta \dot{P}_{b}^{3.5\,{\rm PN}}\) can be significant for an 8-min system. However \(\delta \dot{P}_{b}^{3.5\,{\rm PN}}\) is still a small value relative to \(\dot{P}_{b}^{2.5\,{\rm PN}}\), so we use DD timing model to simulate this situation which can give a correct estimate of magnitude of the expected fractional uncertainties of PK parameters, and it can predict the ability of a highly relativistic binary pulsar to test gravity. We hope that we can provide a more suitable timing model to simulate or process TOAs for short-orbital-period PSR-NS systems in future work. # Radiative tests of gravity {#sec:test:GR} In this section, we utilize the simulated results of \(\dot{P}_{b}\) to do some specific gravity tests. Before we use the fractional error of \(\dot{P}_{b}\) to test gravity, we need to emphasize that we should substract the non-intrinsic contibution in \(\dot{P}_{b}\) and use the intrinsic value \(\dot{P}_{b}^{\rm intr}\) in real gravity test. The value of \(\dot{P}_{b}\) from actual pulsar timing is \(\dot{P}_{b}^{\rm obs}\) which contains the dynamical contributions from the Shklovskii effect and the differential Galactic acceleration between the Solar System barycenter and the pulsar system. So, in general, we need to subtract the contribution of the Shklovskii effect and the Galactic acceleration difference in \(\dot{P}_{b}^{\rm obs}\) first via, \[\label{eq:pbobs_eq} \left(\frac{\dot{P}_{b}}{{P}_{b}}\right)^{\rm intr}=\left(\frac{\dot{P}_{b}}{{P}_{b}}\right)^{\rm obs}-\left(\frac{\dot{P}_{b}}{{P}_{b}}\right)^{\rm Shk}- \left(\frac{\dot{P}_{b}}{{P}_{b}}\right)^{\rm Gal}\.\] The second term of Eq. ([\[eq:pbobs_eq\]](#eq:pbobs_eq){reference-type="ref" reference="eq:pbobs_eq"}) is the contribution from the Shklovskii effect which is due to the transverse motion of the pulsar system, and the specific form is shown by Eq. (19) in. The third term of Eq. ([\[eq:pbobs_eq\]](#eq:pbobs_eq){reference-type="ref" reference="eq:pbobs_eq"}) is the contribution from the Galactic acceleration difference, and the specific form is given by Eq. (16) in. The actual fractional error of \(\dot{P}_{b}^{\rm intr}\) depends on the errors of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\). So, the fractional errors of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) will affect gravity tests. In other words, their fractional errors can determine how tight the PSR-NS system can bound the parameter space of non-GR parameters. For \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), their fractional errors all rely on the precision of \(D\). At present, we use the Very Long Baseline Interferometry (VLBI) or the dispersion measure (DM) to measure the distance of binary pulsars. For the nearby binary pulsar systems, VLBI can provide an accurate measurement for \(D\). Once we have a measured distance with a small error, the errors of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) could contribute little to the total error and the precision of \(\dot{P}_{b}^{\rm intr}\) would largely depend on \(\dot{P}_{b}^{\rm obs}\), such as in the case of PSRs J2222\(-\)`<!-- -->`{=html}0137 and J0737\(-\)`<!-- -->`{=html}3039. In the opposite case, for remote binary pulsar systems, we can not provide an accurate measurement of \(D\) by VLBI or DM. The large uncertainty of \(D\) results in large errors of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), which restrict the precision of \(\dot{P}_{b}^{\rm intr}\); for example, see PSR B1913+16. So the accurate measurement of the distance of a binary pulsar system helps us reduce the error contribution from astrophysical terms in \(\dot P_b\). Based on a specific DNS system, provided an estimated fractional uncertainty of distance for a 2-yr mission of LISA, \[\begin{aligned} \label{eq:deltaD} \frac{\Delta D}{D}=0.01\left(\frac{\rho}{200}\right)^{-1}\. \end{aligned}\] In, considering a 4-yr mission of LISA, the fractional uncertainty of distance can reach \(0.006\) for a specific DNS system with \(\rho=360\). So LISA could improve the accuracy of pulsar distance measurement significantly and then maybe avoid introducing large errors caused by \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) (with a well modelled Galactic potential). Therefore, if LISA can detect a PSR-NS system with a high SNR, it can improve the measure of distance of a PSR-NS system. To simplify the simulation, we did not include the possible error contribution from \(\dot{P}_{b}^{\rm Gal}\) and \(\dot{P}_{b}^{\rm Shk}\), so we may derive *optimistic* results when testing gravity. In Sec. [4.2](#sec:test:GR:constraint){reference-type="ref" reference="sec:test:GR:constraint"}, to be more complete, we provide a simple calculation for the possible error contribution to \(\dot{P}_{b}^{\rm intr}\) from \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), and show the possible impact on gravity tests. We assume LISA can work well in distance measurement, so we use a fractional error of \(\Delta D/{D}=0.01\). Actually, \(D\) may not be measured with such a high precision, so even if the non-intrinsic effects are considered, the results may still be optimistic because \(D\) is assumed to be measured with high precision. ## Theoretical framework {#sec:test:GR:theory} Based on the expected measurement precision of the Five-hundred-meter Aperture Spherical radio Telescope (FAST) and SKA, simulated the timing precision for black hole-pulsar (BH-PSR) binary systems. used the simulated parameter precision of \(\dot{P}_{b}\) from to constrain specific gravity theories. In this section, following, we use the simulated precision of \(\dot{P}_{b}\) of the short-orbital-period PSR-NS systems to constrain alternative theories of gravity. In, the authors gave a generic formalism which provides a mapping between generic non-GR parameters in the orbital decay rate \(\dot{P}_{b}\) and theoretical constants in various alternative theories of gravity. Details can be found in Table I of. A parameterized non-GR modification to \(\dot{P}_{b}\) reads, \[\frac{\dot{P}_{b}}{{P}_{b}}=\frac{\dot{P}_{b}}{{P}_{b}}\bigg|_{\rm GR}\left(1+\Gamma v^{2n}\right)\,,\label{eq:mapping}\] where \(v\) is the relative velocity of two compact objects in a binary system, \(v=\left(\frac{2\pi M}{P_b}\frac{G}{c^{3}}\right)^{1/3}\), and \(M\) is the total mass of binary system. \(\left({\dot{P}_{b}}/{{P}_{b}}\right)\big|_{\rm GR}\) is the quantity evaluated in GR \[cf. Eq. ([\[eq:pbdot\]](#eq:pbdot){reference-type="ref" reference="eq:pbdot"})\]. \(\Gamma\) and \(n\) are the non-GR parameters. \(\Gamma\) gives the overall magnitude of the correction, and \(n\) shows how the correction depends on \(v\). In Eq. ([\[eq:mapping\]](#eq:mapping){reference-type="ref" reference="eq:mapping"}), a correction term proportional to \(v^{2n}\) corresponds to a \(n\)-PN order correction to GR. For different theories of gravity, the non-GR parameter \(\Gamma\) corresponds to different forms, which are listed in Table I of, where a specific non-GR theory can be mapped to a set of \((\Gamma,n)\). In our work, we use the same mapping relation to test gravity. We want to estimate how tightly the short-orbital-period PSR-NS systems can constrain the parameters of non-GR theories in the future. Following Eq. (4) in, we define a fractional error \(\delta\) for the observed \({\dot{P}_{b}}/{{P}_{b}}\), and we can use \(\delta\) to bound \(\Gamma\) by the following equation, \[\left|\Gamma\right|<\frac{\delta}{v^{2n}}\. \label{eq:Gamma}\] In Sec. [3](#sec:sim){reference-type="ref" reference="sec:sim"}, we have simulated a series of fractional errors of \(\dot{P}_{b}\) for different \(P_{b}\)'s, and these fractional errors of \(\dot{P}_{b}\) correspond to the parameter \(\delta\) here. Hence we can use the data to predict the constraints on \(\Gamma\) for different PN orders. We choose a PSR-NS system with an 8-min orbital period. Figure [\[fig:gammabound\]](#fig:gammabound){reference-type="ref" reference="fig:gammabound"} presents the predicted upper bounds on \(\Gamma\) as a function of PN orders. For comparison, we also present the result from a 3-day orbital period PSR-BH system. For a PSR-NS system with an 8-min orbital period, its relative velocity \(v\) approximately equals to \(5.7\times 10^{-3}\) which is 5 times larger than the velocity of a 3-day orbital period PSR-BH system, whose \(v\sim 1\times 10^{-3}\). For negative PN, \(\Gamma\propto v^{|2n|}\), so the larger value of \(n\), a binary system with a larger \(v\) is more disadvantageous for bounding \(\Gamma\). For example, if \(n=-4\), for an 8-min PSR-NS system, its value of \(v^{|2n|}\) is \(4\times10^{5}\) times larger than that of a 3-day PSR-BH system, which greatly reduces the restriction on \(\Gamma\). However, the 8-min orbital period PSR-NS system has a smaller fractional error \(\delta\), that makes it possible to provide a stronger constraint on \(\Gamma\). Combining those two factors, the constraint from an 8-min PSR-NS system is tighter than the constraint from a 3-day PSR-BH system at some negative PN orders, as shown in Fig. [\[fig:gammabound\]](#fig:gammabound){reference-type="ref" reference="fig:gammabound"}. At positive PN orders, a larger \(v\) is more competitive, so an 8-min PSR-NS system can naturally provide a tighter constraint than a 3-day PSR-BH system. Like, we also show the limits from GW observations in Fig. [\[fig:gammabound\]](#fig:gammabound){reference-type="ref" reference="fig:gammabound"}, using GW150914 and GW151226 as examples. Because GWs detected by LIGO/Virgo come from the phase of merger, which indicates a larger relative velocity, it leads to a tighter restriction on \(\Gamma\) at positive PN orders. But due to the small \(\delta\) of the 8-min PSR-NS system, it can give a slightly tighter restriction than GW observations at positive PN order when \(n\lesssim 2\). Overall, the results in Fig. [\[fig:gammabound\]](#fig:gammabound){reference-type="ref" reference="fig:gammabound"} show that the 8-min PSR-NS system can provide a tight bound for the non-GR theories of negative PN orders when \(n \gtrsim-4\). However, when comparing these results in a strict way, one should be aware that the prediction may depend on the details of specific theories. NSs and BHs can behave quite differently in alternative gravity theories. We leave this to a future detailed study. In any case, the system that we considered here will provide very useful and complementary constraints. We underline that here the corrections of different PN orders are relative to GR's quadrupole radiation, not to the equations of motion. ## Projected constraints {#sec:test:GR:constraint} In Fig. [\[fig:gammabound\]](#fig:gammabound){reference-type="ref" reference="fig:gammabound"}, we show the constraint from an 8-min PSR-NS system on parameter \(\Gamma\) as a function of PN orders. In Sec. [4.1](#sec:test:GR:theory){reference-type="ref" reference="sec:test:GR:theory"}, the generic formalism ([\[eq:mapping\]](#eq:mapping){reference-type="ref" reference="eq:mapping"}) offers a mapping between generic non-GR parameters in the orbital decay rate and theoretical parameters in various alternative theories of gravity. We can use this mapping to restrict specific theories of gravity, and then predict how do the short-orbital-period PSR-NS systems constrain these theories. ### Varying-\(G\) theory {#sec:test:GR:constraint:vary_g} In GR, the Newtonian gravitational constant \(G\) does not change with time. But in some alternative theories, the locally measured Newtonian gravitational constant \(G\) may vary with time, because of the evolution of the Universe. The gravitational constant which varies with time violates local position invariance, that leads a violation of strong equivalence principle (SEP). Hence proving whether the gravitational constant varies with time helps us test the SEP. If the gravitational constant is changing with time, it can cause changes in the compactness and Arnowitt-Deser-Misner (ADM) mass of a compact star, which would result in an additional contribution to the orbital period decay rate \(\dot{P}_{b}\). The relation between \(\dot{P}_{b}\) and \(\dot{G}\) is given by, \[\frac{\dot{P}_{b}^{\dot{G}}}{{P}_{b}}=-2\frac{\dot{G}}{G}\left[1-\frac{2m+m_{c}}{2m}s_{p}-\frac{2m+m_{p}}{2m}s_{c}\right]\,, \label{eq:gdot}\] where \(s_{i}\) denotes the "sensitivity" of the NS, which depends on the mass and the EOS of NS, \[s_{i}\equiv-\frac{\partial \ln{M_{i}}}{\partial\ln{G}},\quad\quad (i=p,c)\,,\] where \(M_{i}=m_{i}M_{\odot}\) (notice that in this paper \(m_i\) is the mass in unit of Solar mass). In GR, \(s_{i}=0\). We use the value of \(s_{i}\) as per, [^13] \[s_{i}=0.16\,\left(\frac{M_{i}}{1.33M_{\odot}}\right)\.\] With Eqs. ([\[eq:Gamma\]](#eq:Gamma){reference-type="ref" reference="eq:Gamma"}--[\[eq:gdot\]](#eq:gdot){reference-type="ref" reference="eq:gdot"}), we get the corresponding expression of \(\Gamma\), \[\Gamma=\frac{5}{48}\frac{\dot{G}}{c^{3}}\frac{m^{3}M_{\odot}}{m_{p}m_{c}}\left[1-\frac{2m+m_{c}}{2m}s_{p}-\frac{2m+m_{p}}{2m}s_{c}\right]\frac{1}{f(e)}\,, \label{eq:gammagdot}\] and it is a \(-\)`<!-- -->`{=html}4 PN order correction relative to GR. So combining Eq. ([\[eq:mapping\]](#eq:mapping){reference-type="ref" reference="eq:mapping"}) and Eq. ([\[eq:gammagdot\]](#eq:gammagdot){reference-type="ref" reference="eq:gammagdot"}), we get the upper bound on \(\dot{G}\) by, \[\frac{|\dot{G}|}{G}<-\frac{\delta}{2} \left( \frac{\dot{P_{b}}}{P_{b}} \right)_{\rm GR} {\left(1-\frac{2m+m_{c}}{2m}s_{p}-\frac{2m+m_{p}}{2m}s_{c}\right)^{-1}}\.\] There is an associated dipole radiation of GWs for most gravitational theories that violate SEP. The dipole radiation of GWs can contribute an extra \(\dot{P}_{b}^{\rm dipole}\) which is degenerate with \(\dot{P}_{b}^{\dot{G}}\). The degeneracy indicates that we need to use multiple binary pulsar systems to break the degeneracy. In our work, for the sake of simplicity, we ignore the possible degeneracy and consider only one violation to GR at a time. Figure [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (a) shows the predicted upper limit on \(\dot{G}\) from short-orbital-period PSR-NS systems with \(P_{b}\in[8,\,120]\,{\rm min}\) to be detected by the SKA. The best bound is \(|\dot{G}|/G<4.8\times10^{-14}\,{\rm yr}^{-1}\) which is from the 8-min PSR-NS I system with \(\sigma_{\rm TOA} =100\,{\rm ns}\). The simulated fractional uncertainty of \(\dot{P}_{b}\) varies with \(P_{b}\), that is largely consistent with what is theoretically predicted [namely \(\delta \propto P_{b}^{3}\); @Damour:1991rd; @2004hpa..book.....L]. Because of the degeneracy of some delay terms, there are still slight differences between theoretic prediction and our simulation. In Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (a), the black dotted line is the trend by theoretical prediction, \(\delta \propto P_{b}^{3}\), and we use PSR-BH I system with \(\sigma_{\rm TOA} =100\,{\rm ns}\) to illustrate. Because we show the constraint on \(|\dot{G}|/G\), which is a cumulative effect in one year, so there is a noticeable deviation in \(P_{b}\in[40,\,60]\,{\rm min}\). We do not plot the bounds of a PSR-BH system from, and their results are similar to ours. Although the 8-min orbital period system has a very high precision for \(\dot{P}_{b}\), as mentioned before, the varying \(G\) theory is a \(-\)`<!-- -->`{=html}4 PN order correction relative to GR. A system with a large \(v\) is disadvantageous to provide a tighter bound on \(\dot{G}\), so the two systems (PSR-NS and PSR-BH) have similar results. To provide a more complete analysis, we also consider the fractional error which contains error contributions from \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) to restrict \(\dot{G}\) \[see Eq. ([\[eq:pbobs_eq\]](#eq:pbobs_eq){reference-type="ref" reference="eq:pbobs_eq"})\]. We assume that LISA can help us determine the distance of the PSR-NS system very well. So for the fractional error of \(D\), we take \(0.01\).[^14] Considering the error contributions from \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), we show in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (a) the bound from PSR-NS I systems with \(\delta_{\rm TOA}=100\,{\rm ns}\) on \(\dot{G}\) with the red dotted line. We find that by introducing the errors of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), our results become worse. Although our distance accuracy is high, the precision of other parameters that we adopt from PSR J0737\(-\)`<!-- -->`{=html}3039 are low, which prevent us from limiting the non-GR parameters to high precision. If we, likely with the SKA, further improve the measurement accuracy of these parameters in the future, we will constrain \(\dot{G}\) better. In order to compare, we show the current bounds from the Solar System experiments in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (a). We notice that the estimated bound of an 8-min PSR-NS system is slightly weaker than the Solar System result from NASA Messenger. For now, the best constraint comes from the Solar System experiment, which is from weak field. However, the sensitivity \(s_{i}\) is a body-dependent quantity, so it could lead to an enhance of \(\dot{G}\) for strongly self-gravitating bodies. NSs are strongly self-gravitating bodies, so it provides the constraint on \(\dot{G}\) from a strong field. The constraint on \(\dot{G}\) from PSR-NS systems can provide a complementary constraint compared with the constraint from the Solar System experiment. One point that needs to be emphasized is that we can improve the precision of the parameters through long-term observation. For \(\dot{P}_{b}\), the expected dependence of fractional uncertainty on observing time, \(T_{\rm obs}\), is proportional to \(T_{\rm obs}^{-5/2}\). Therefore, according to the theoretical prediction, compared with a 4-yr observation, the measurement precision of \(\dot{P}_{b}\) will increase by about 10 times for a 10-yr timing. We simulate a 10-yr timing for PSR-NS I system with \(\delta_{\rm TOA}=100\,{\rm ns}\) by using the same cadence, and the result is consistent with the theoretical prediction; that is, the measurement precision is improved by an order of magnitude. Hence, a 10-yr observation could increase the projected limit to \(|\dot{G}|/G<5\times10^{-15}\,{\rm yr}^{-1}\) for an 8-min PSR-NS I system with \(\delta_{\rm TOA}=100\,{\rm ns}\). Thus, an 8-min PSR-NS system has the potential to give tighter bound than the present result from the Solar System for \(\dot{G}\). We also provide the previous upper limit on \(\dot{G}\) from binary pulsar systems, that combined the results from PSRs J0437\(-\)`<!-- -->`{=html}4715, J1738+0333, and J1713+0747 [blue dashed line; @Zhu_2018]. Our simulated results show that the constraint on \(\dot{G}\) in strong field can be improved significantly. ### Fierz--Pauli-like massive gravity {#sec:test:GR:constraint:lv-massive} In GR, gravitation is mediated by a massless spin-2 graviton, and graviton is massless in most theories of gravity. The existence of graviton is not experimentally confirmed yet. There are some theories of gravity where graviton has mass and they cannot be completely ruled out yet. So we can base on different theories to bound graviton mass, and we show some results in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). If graviton is massive, the gravitational potential possesses an exponential Yukawa suppression. In the Solar System, which can be viewed as a static field, the Yukawa potential can cause planets to behave differently from the Newtonian potential which is \(\propto 1/r\). used the planetary ephemeris INPOP19a to constrain graviton mass and provided \(m_{g}<3.62\times10\,{\rm eV}/c^{2}\), shown with a red dashed line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). The constraint on \(m_{g}\) from the Solar System is a bound in weak field; we also provide two constraints from strong field. The first bound comes from GW data. If gravity is propagated by a massive field, the massive graviton can lead to a modified dispersion relation. In other words, the velocity of the graviton depends on the GW frequency. Using the modified dispersion relation, the LIGO/Virgo Collaboration bound the graviton mass to be \(m_{g}<1.8\times10^{-23}\,{\rm eV}/c^{2}\) by combining the data of 31 GW events from the catalog GWTC-2. This result is represented by a blue dashed line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). This bound coming from the direct detection of GWs is an effect of GWs' phase accumulation. The second bound is from binary pulsar systems, which is based on a Fierz--Pauli-like massive gravity. presented a phenomenological term in the Lagrangian for linearized gravity with a mass term \(\sim m_{g}^{2}\left(h_{\mu\nu}^{2}-\frac{1}{2}h^{2}\right)\) which is similar to the Fierz--Pauli mass term \(\sim m_{g}^{2}\left(h_{\mu\nu}^{2}-h^{2}\right)\), but with a different coefficient for \(h^{2}\). The choice of this linear mass term ensures that the theory reduces to GR when \(m_{g}\rightarrow0\) \[avoiding the van Dam-Veltman--Zakharov (vDVZ) discontinuity\] and the derived wave equation takes the standard form, \[\begin{aligned} \left( \square-m_g^2 \right) \bar h_{\mu\nu} + 16\pi T_{\mu\nu} = 0 \,, \label{eq:finnfield} \end{aligned}\] with an \(h\)-independent source \(T_{\mu\nu}\). We have defined \(\bar h_{\mu\nu} \equiv h_{\mu\nu}-\frac{1}{2} \eta_{\mu\nu} h\). worked out the relation between \(m_{g}\) and \(\delta\), \[\begin{aligned} m_{g}^{2} < \frac{24}{5}F(e)\left(\frac{2\pi\hbar}{c^{2}P_{b}}\right)^{2}\delta\,, \label{eq:finnmassbound} \end{aligned}\] where \(F(e)=f(e)\left(1-e^{2}\right)^{1/2}\) \[see Eq. ([\[eq:fe\]](#eq:fe){reference-type="ref" reference="eq:fe"}) for \(f(e)\)\], and \(\hbar\) is the reduced Planck constant. With Eq. ([\[eq:finnmassbound\]](#eq:finnmassbound){reference-type="ref" reference="eq:finnmassbound"}), we can use binary pulsars to restrict \(m_{g}\). provided a method to constrain graviton mass in a dynamic regime. The Fierz--Pauli-like massive gravity gives a \(-\)`<!-- -->`{=html}3 PN order correction relative to GR. By comparison with Eq. ([\[eq:Gamma\]](#eq:Gamma){reference-type="ref" reference="eq:Gamma"}), we can obtain the form of \(\Gamma\), \[\begin{aligned} \Gamma < \frac{5}{24}m^{2}_{g}m^{2}\frac{M_{\odot}^{2}G^{2}}{c^{2}\hbar^{2}}\frac{1}{F(e)}\. \label{eq:gammafinn} \end{aligned}\] used PSRs B1913+16 and B1534+12 to bound \(m_{g}\). Recently, using 9 well-timed binary pulsars and the Bayesian theorem, provided an improved bound, \(m_{g}<5.2\times10^{-21}\, {\rm eV}/c^{2}\), which is shown with a light blue dashed line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). Here, we use the simulated \(\delta\) of \(\dot{P}_{b}\) of the short-orbital-period PSR-NS systems by the SKA, to predict the constraints on graviton mass. The results of bounds are shown in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). The results show that the PSR-NS system with an 8-min short orbital period can give a tighter limit than previous results in by roughly a factor of 4, \(m_{g}<1.2\times10^{-21}\, {\rm eV}/c^{2}\). Although the projected bounds from PSR-NS systems are looser than the bounds from GWs and the Solar System, they reflect a dynamical process of two compact objects and a strong field effect. The constraint from GWs is based on a modified dispersion relation which is an effect of accumulation in GW phases, so it is a kinematic effect from propagation. The constraint from the Solar System reflects an effect from a static weak field. Hence the restrictions from the binary pulsars are complementary to these constraints. For an 8-min PSR-NS I system with \(\delta_{\rm TOA}=100\,{\rm ns}\), simulated results for a 10-yr observation span improve it to \(m_{g}<4.0\times10^{-22}\, {\rm eV}/c^{2}\). Because \(m_{g}\propto\delta^{1/2}\), the increase in precision of \(\dot{P}_{b}\) can not improve the limit on \(m_{g}\) significantly in this case. We also show the trend of theoretical prediction, \(\delta \propto P_{b}^{3}\), by the black dotted line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). Our results do not significantly deviate from the theoretical trend. In addition, we give the restriction on \(m_{g}\) when there is error contribution of \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\), and it is shown with a red dotted line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (b). ### Cubic Galileon massive gravity {#sec:test:GR:constraint:cubicgalileon} If graviton is massive, there may be extra scalar and vector degrees of freedom. The vector degrees of freedom can be ignored, because they usually do not couple to matters in the decoupling limit. The extra scalar degree of freedom can couple to matters which leads to a fifth force, and the fifth force would make theory of massive gravity fail to recover GR when \(m_{g}\rightarrow0\) with the so-called vDVZ discontinuity. However the vDVZ discontinuity can be solved by introducing screening mechanisms, e.g. the Vainshtein mechanism. The scalar degree of freedom becomes strongly-coupled and is strongly suppressed, because of Vainshtein mechanism, so the deviation from GR is suppressed. In other words, the fifth force is suppressed and the metric field propagates the gravitational force. The simplest model used to display Vainshtein mechanism is called the cubic Galileon which is a Lorentz invariant massive gravity model. The massive graviton causes extra GW radiations, and there are not only quadrupole radiation but also monopole and dipole radiations that need to be considered. calculated the contributions of these three radiations, and found that the dipole radiation is orders of magnitude smaller than the other two types and the quadrupole radiation has the largest contribution in the vast majority of cases. In fact, we calculated the contribution of monopole radiation, and found that it can be ignored indeed. So we just consider quadrupole radiation in our work. The extra contribution to \(\dot{P}_{b}\) from the quadrupole radiation power in the cubic Galileon model is, \[\begin{aligned} \dot{P}_{b}^{\rm quad}=-\frac{15}{\sqrt{2}}\lambda^{2}\pi^{3/2}\frac{(GM)^{5/6}}{n_{b}^{1/6}\hbar c^{1/2}}\frac{m_{p}m_{c}\mathcal{Y}^{2}}{m^{2}}m_{g}f_{\rm cg}(e)\,, \label{eq:galileonpbdot} \end{aligned}\] where \(\mathcal{Y} \equiv \big(m_{p}^{1/2}+m_{c}^{1/2}\big){\big/}m^{1/2}\), the constant \(\lambda=0.2125\), and \(f_{\rm cg}(e)=\sum_{n=0}^{\infty}\left|I_{n}^{\rm quad}(e)\right|^{2}\), \[\begin{aligned} I_{n}^{\rm quad}(e)=\frac{\left(1-e^{2}\right)^{3/2}}{2\pi}n^{7/4}\int^{2\pi}_{0}\frac{\exp\left[i(2-n)x\right]}{\left(1+e\cos{x}\right)^{3/2}} {\rm d} x\. \end{aligned}\] We choose \(n=30\) in our calculation, which is enough for \(e=0.1\) . With Eq. ([\[eq:mapping\]](#eq:mapping){reference-type="ref" reference="eq:mapping"}) and Eq. ([\[eq:galileonpbdot\]](#eq:galileonpbdot){reference-type="ref" reference="eq:galileonpbdot"}), we can provide the constraint of \(m_{g}\), \[\begin{aligned} m_{g}<\frac{8}{5\lambda^{2}}\frac{1}{f_{\rm cg}(e)}\frac{m^{1/2}M_{\rm Pl}}{M^{2}_{\rm quad}}\frac{\mathcal{P}_{\rm GR}}{n_{b}^{1/2}(n_{b}a)^{3}}\left(\hbar M_{\odot}\right)^{1/2}\delta\,, \label{eq:galileon_mg} \end{aligned}\] where \(n_{b}=2\pi/P_{b}\) is the orbital angular frequency, \(a\) is the semi-major axis, \(M_{\rm Pl}\equiv \left(\hbar c/8\pi G\right)^{1/2}\) is the reduced Planck mass, \(\mathcal{P}_{\rm GR}\) is the radiation power of GR, \[\begin{aligned} \mathcal{P}_{\rm GR}=\frac{32m}{5}\frac{m^{2}_{p}m^{2}_{c}}{a^{5}}\frac{G^{4}M_{\odot}^{5}}{c^{5}}f(e)\,, \label{eq:grradiation} \end{aligned}\] and, \[\begin{aligned} M_{\rm quad} \equiv \frac{m_{p}m_{c}}{m}\mathcal{Y}M_{\odot}\. \end{aligned}\] The cubic Galileon massive gravity model provides a \(-\frac{11}{4}\) PN order correction relative to GR, and \(\Gamma\) is \[\begin{aligned} \Gamma=\frac{25\lambda^{2}}{2^{8}}\frac{M^{2}_{\rm quad}}{M_{\rm Pl}}\frac{m^{3}m_{g}}{m_{p}^{2}m_{c}^{2}}\left(\frac{G}{\hbar c}\right)^{1/2}\frac{f_{\rm cg}(e)}{f(e)}\frac{1}{M_{\odot}}\. \label{eq:gcgamma} \end{aligned}\] With Eq. ([\[eq:galileon_mg\]](#eq:galileon_mg){reference-type="ref" reference="eq:galileon_mg"}), we show constraints from our simulated results in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (c). The light blue dashed line is the bound from a combination of binary pulsar systems, which gives \(m_{g}<2.0\times10^{-28}\,{\rm eV}/c^{2}\). Compared with it, the short-orbital-period PSR-NS systems can greatly improve the constraint on \(m_{g}\), and a projected bound from an 8-min PSR-NS system is \(m_{g}<1.9\times10^{-31}\,{\rm eV}/c^{2}\). Because \(m_{g}\propto\delta\), the deviation with respect to the trend predicted by theory (black dotted line) is more significant than that of the Fierz--Pauli-like massive gravity. The red dotted line in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (c) is the restriction which considers the possible error contributions from \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\). In Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (c), the best restriction is from the red dashed line, \(m_{g}<10^{-32}\,{\rm eV}/c^{2}\). It is a bound from the lunar laser ranging experiments in the weak field. For a 10-yr observation, an 8-min PSR-NS I system with \(\delta_{\rm TOA}=100\,{\rm ns}\) can provide a bound \(m_{g}<2.0\times10^{-32}\,{\rm eV}/c^{2}\), which is comparable to the lunar laser ranging experiments. So if we can observe these systems for decades, we could provide a tighter constraint than the current result. So the short-orbital-period PSR-NS systems have potential to significantly improve the restriction on \(m_{g}\) in the strong field. ### Scalar-tensor theory {#sec:test:GR:constraint:scalar-tensor} In GR, gravity is mediated only by a long-range, spin-2 tensor field, \(g_{\mu\nu}\), but in alternative theories there can be scalar or vector fields involved in the gravitational interaction. The scalar-tensor gravity, which adds a spin-0 scalar field, \(\varphi\), is the most natural alternative theory. In our work, we take Damour and Esposito-Far\(\grave{\rm e}\)se (DEF) theory as an example. In the weak field, the DEF gravity theory can be reduced to GR, which means that it can pass the Solar System tests. However, in the strong field, DEF theory can be completely different from GR, which is due to a strong field *spontaneous scalarization* phenomenon, so binary pulsar systems provide an ideal laboratory to study the DEF theory. In DEF theory, the GW damping is different from GR. There is an additional contribution of GW radiation from the scalar field, which leads to an extra orbital decay rate \(\dot{P}_{b}^{\rm scalar}\), and it contains monopole, dipole, and quadrupole contributions. We only consider the dipole contribution which is a \(-\)`<!-- -->`{=html}1 PN correction relative to GR, and the expression of \(\dot{P}_{b}^{\rm {dipole}}\) is, \[\begin{aligned} \label{eq:dipole} \dot{P}_{b}^{\rm {dipole }}&=-2 \pi T^{*}_{\odot}d(e)\left(\frac{2 \pi}{P_{b}}\right) \frac{m_{p} m_{c}}{m_{p}+m_{c}}\left(\alpha_{p}-\alpha_{c}\right)^{2}\,, \end{aligned}\] where \(\alpha_{i}\) is the coupling strength between the scalar field and matter, \(d(e) \equiv \left({1+\frac{1}{2}e^{2}}\right){\left(1-e^{2}\right)^{-5/2}}\), \(T^{*}_{\odot}=G^{*}M_{\odot}/c^{3}\), \(G^{*}=G/\left(1+\alpha_{0}^{2}\right)\)[^15], and \(\alpha_{0}\) is the linear coupling of scalar field to matter fields. For simplification, we ignore the difference between \(G^{*}\) and \(G\). Because the current weak-field constraint on \(\alpha_{0}^{2}\) has reached \(10^{-5}\), we set \(G^{*}=G\). The effective scalar couplings \(\alpha_{p}\) and \(\alpha_{c}\) depend on the specific EOS of NSs. In our work, we only use the simulated fractional error to constrain \(\left|\alpha_{p}-\alpha_{c}\right|\), and we do not further analyze \(\alpha_{p}\) by using specific EOSs.[^16] The spontaneous scalarization of DEF theory happens in strong field, so it is conducive to test DEF theory in PSR-NS systems. With Eq. ([\[eq:mapping\]](#eq:mapping){reference-type="ref" reference="eq:mapping"}) and Eq. ([\[eq:dipole\]](#eq:dipole){reference-type="ref" reference="eq:dipole"}), we can provide the constraint of \(\left|\alpha_{p}-\alpha_{c}\right|\), \[\left(\alpha_{p}-\alpha_{c}\right)^{2}=\frac{96}{5}T_{\odot}^{2/3}\left(\frac{P_{b}}{2\pi}\right)^{-2/3}D(e)\left(m_{p}+m_{c}\right)^{2/3}\delta\,,\label{eq:deltalpha}\] where \(D(e) \equiv f(e)/d(e)\). Using Eq. ([\[eq:deltalpha\]](#eq:deltalpha){reference-type="ref" reference="eq:deltalpha"}), we provide the results in Fig. [\[fig:gravitytest\]](#fig:gravitytest){reference-type="ref" reference="fig:gravitytest"} (d). We notice that the best constraint on \(\left|\alpha_{p}-\alpha_{c}\right|\) can reach \(1.6\times10^{-6}\). In the work of, they showed constraints \(\sim10^{-3}\) for several best measured PSR-WD systems where \(\left|\alpha_{p}-\alpha_{c}\right|=\left|\alpha_{p}-\alpha_{0}\right|\) due to the companion being a WD. [^17] The simulated 8-min PSR-NS system seems to provide a tighter bound on \(\left|\alpha_{p}-\alpha_{c}\right|\), but the companion of system is a NS, so \(\alpha_{c}\) could be very close to \(\alpha_{p}\) which makes \(\left|\alpha_{p}-\alpha_{c}\right|\) small for most cases. Our predicted constraints on \(\left|\alpha_{p}-\alpha_{c}\right|\) come from a simplified analysis, and the real situation needs to be discussed with EOS dependence included. In the figure, we also provide the trend of prediction from theory (black dotted line) and the results containing the possible error contributions from \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) (red dotted line). # Lense-Thirring precession {#sec:lense} In Sec. [4](#sec:test:GR){reference-type="ref" reference="sec:test:GR"}, we have only used the PK parameter \(\dot{P}_{b}\) to test gravity theories, but in our simulated results, the fractional error of \(\dot{\omega}\) could reach the highest precision compared with the other 4 PK parameters. So using \(\dot{\omega}\) to test gravity is also powerful. There is another advantage of using \(\dot{\omega}\) to test gravity, that the observed \(\dot{\omega}\) of an isolated binary pulsar system is relatively "clean", because, in general, the non-intrinsic contribution to \(\dot{\omega}\) can be ignored. So our simulated fractional error of \(\dot{\omega}\) is probably more faithful. In this section we provide a possible application of the high precision \(\dot{\omega}\) measurement, just for an illustrative purpose. In relativistic gravity theories, different from Newtonian gravity, a rotating body in a binary system can have an effect on spin and orbital dynamics. For PSR-NS systems, two components all have proper rotation, and in leading order contributions we only consider the effect from the spin-orbital (SO) coupling. The relativistic SO coupling in PSR-NS systems can lead the orbital and the two spins to precess. For the precession of spin, the main effect is a secular changes in the orientation of spin and this effect is due to the space-time curvature and is spin-independent. We generally call this effect geodetic precession and it has been detected in some binary pulsar systems, such as PSR J0737\(-\)`<!-- -->`{=html}3039. On the other hand, the precession of orbit contains two effects which needs to be considered. The first effect is due to the mass-mass interaction. The second effect is due to the Lense-Thirring effect related to the spins of two stars. decomposed the effect of precession of orbit in terms of observable parameters of pulsars and calculated the contribution to periastron advance \(\dot{\omega}_{p}\), \[\begin{aligned} \label{eq:omegalense} \dot{\omega}_{p}=\dot{\omega}_{\rm PN}+\dot{\omega}_{{\rm LT}_{p}}+\dot{\omega}_{{\rm LT}_{c}}\,, \end{aligned}\] where \(\dot{\omega}_{\rm PN}\) is caused by the mass-mass interaction which results from the two bodies of binary system, \(\dot{\omega}_{{\rm LT}_{p}}\) and \(\dot{\omega}_{{\rm LT}_{c}}\) are due to the Lense-Thirring effect of the pulsar and the companion respectively. For the actual observed value of \(\dot{\omega}^{\rm obs}_{p}\), it should include the *Kopeikin term* which is caused by the proper motion of a binary system, but in general, the contribution of *Kopeikin term* is small and can be ignored or subtracted. The expression of the first term in Eq. ([\[eq:omegalense\]](#eq:omegalense){reference-type="ref" reference="eq:omegalense"}) is \[\begin{aligned} \dot{\omega}_{\rm PN}=&3 T_{\odot}^{2 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{-5 / 3} \frac{\left(m_{p}+m_{c}\right)^{2 / 3}}{1-e^{2}}\left(1+f_{\rm O}v^{2}\right)\,,\label{eq:omega2pn_all}\\ f_{\rm O}=&\frac{1}{1-e^{2}}\left(\frac{3}{2}X_{p}^{2}+\frac{3}{2}X_{p}+\frac{27}{4}\right)+\left(\frac{5}{6}X_{p}^{2}-\frac{23}{6}X_{p}-\frac{1}{4}\right)\,, \end{aligned}\] where \(X_{p} \equiv m_{p}/m\). The first term on the right side of Eq. ([\[eq:omega2pn_all\]](#eq:omega2pn_all){reference-type="ref" reference="eq:omega2pn_all"}) is the 1 PN term of \(\dot{\omega}_{\rm PN}\) and is given by Eq. ([\[eq:omegadot\]](#eq:omegadot){reference-type="ref" reference="eq:omegadot"}); the second term is the 2 PN term of \(\dot{\omega}_{\rm PN}\). We calculate the fractional value of the 2 PN term for the 8-min PSR-NS system II and get \(f_{O}v^{2}\approx2\times10^{-4}\), so the contribution from \(\dot{\omega}_{\rm 2PN}\) is four orders of magnitude smaller than \(\dot{\omega}_{\rm 1PN}\). Our simulated fractional error of \(\dot{\omega}_{\rm 1PN}\) can reach \(10^{-8}\) for an 8-min PSR-NS system with \(\sigma_{\rm TOA}=1\,\mu\)s, so the contribution from \(\dot{\omega}_{\rm 2PN}\) should be detectable for an 8-min binary. The expressions of the second and third terms in Eq. ([\[eq:omegalense\]](#eq:omegalense){reference-type="ref" reference="eq:omegalense"}) are, \[\begin{aligned} &\dot{\omega}_{{\rm LT}_{p}}+\dot{\omega}_{ {\rm LT}_{c}}=-3 T_{\odot}^{2 / 3}\left(\frac{P_{b}}{2 \pi}\right)^{-5 / 3} \frac{\left(m_{p}+m_{c}\right)^{2 / 3}}{1-e^{2}}v\nonumber \\ & \hspace{2.5cm} \times\left(g^{\rm s}_{p}\beta^{\rm s}_{p}+g^{\rm s}_{c}\beta_{c}^{\rm s}\right) \,,\\ &\beta^{\rm s}_{p}=\frac{cI_{p}}{GM^{2}_{p}}\frac{2\pi}{P_{p}}\,,\label{eq:betasp}\\ &g^{\rm s}_{p}=\frac{X_{p}\left(4 X_{p}+3 X_{c} \right)}{6 \left( 1-e^{2} \right)^{1/2}\sin^{2}{i}}\left[\left(3\sin^{2}{i}-1\right)\cos{\chi_{p}}+\cos{i}\cos{\lambda_{p}}\right]\,,\label{eq:gsp} \end{aligned}\] where \(I_{p}\) is the moment of inertia of the pulsar and depends on the EOS of NSs, and \(P_{p}\) is the spin period of the pulsar. \(\chi_{p}\) is the angle between \(\mathbf{s}_{p}\) and \(\mathbf{k}\), where \(\mathbf{k}\) is the unit vector along the orbital angular momentum and \(\mathbf{s}_{p}\) is the unit spin vector of the pulsar; \(\lambda_{p}\) is the angle between \(\mathbf{s}_{p}\) and \(\mathbf{h}_{p}\) where \(\mathbf{h}_{p}\) is the unit vector along the line-of-sight. To get \(\beta_{c}^{\rm s}\) and \(g_{c}^{\rm s}\), we just need to interchange the subscript "\(c\)" and "\(p\)". Generally, the pulsar in a PSR-NS system is a recycled pulsar and the companion is a normal pulsar, so the rotation of companion is much slower than the pulsar, and we can ignore the contribution of \(\dot{\omega}_{{\rm LT}_{c}}\), see e.g. PSR J0737\(-\)`<!-- -->`{=html}3039. To estimate the magnitude of \(\dot{\omega}_{{\rm LT}_{p}}\) contributed by the Lense-Thirring effect, we simplify the calculation a little bit. If \(\mathbf{s}_{p}\) is parallel to \(\mathbf{k}\), namely \(\chi_{p}=0\) and \(\lambda_{p}=i\), Eq. ([\[eq:gsp\]](#eq:gsp){reference-type="ref" reference="eq:gsp"}) can be simplified to, \[\begin{aligned} g_{p\,\parallel}^{\rm s}=\frac{\left(\frac{1}{3} X^{2}_{p}+ X_{p} \right)}{ \left( 1-e^{2} \right)^{1/2}}\. \end{aligned}\] With these equations, we can estimate the contribution from \(\dot{\omega}_{{\rm LT}_{p}}\) for periastron advance \(\dot{\omega}_{p}\). For the 8-min PSR-NS system II, \[\begin{aligned} \dot{\omega}_{\rm LT_{p}}=-0.14\,{\rm deg\,yr^{-1}}\left(\frac{I_{p}}{10^{45}\,{\rm g\,cm^{2}}}\right)\left(\frac{20\,{\rm ms}}{P_{p}}\right)\. \end{aligned}\] So if \(I_{p}=10^{45}\,{\rm g\,cm^{2}}\) and \(P_{p}=20\,{\rm ms}\), we have \(\dot{\omega}_{\rm LT_{p}}=-0.14\,{\rm deg\,yr^{-1}}\). For the 8-min PSR-NS system II, \(\left|\dot{\omega}_{\rm LT_{p}}/\dot{\omega}_{\rm 1PN}\right|\approx6.1 \times10^{-5}\). Remember that the fractional error of \(\dot{\omega}\) can reach \(10^{-8}\) with \(\sigma_{\rm TOA}=1\,{\rm \mu s}\) in our simulation. So the contribution of \(\dot{\omega}_{ {\rm LT}_{p}}\) can be significant compared with the error of \(\dot{\omega}^{\rm obs}\), and it means that we are very likely to detect the value of \(\dot{\omega}_{ {\rm LT}_{p}}\) contributed from the Lense-Thirring effect. Notice that the value of \(\dot{\omega}_{ {\rm LT}_{p}}\) depends on the moment of inertia \(I_{p}\), as shown in Eq. ([\[eq:betasp\]](#eq:betasp){reference-type="ref" reference="eq:betasp"}). When \(m_{p}\) and spin are determined, \(I_{p}\) only depends on the EOS. So if we can separate \(\dot{\omega}_{ {\rm LT}_{p}}\), it would help us restrict the EOS. This is another way to restrict the EOS in addition to using the maximum mass of NSs. # Discussions {#sec:disc} In our work, we assume that one can use the LISA and SKA multimessenger strategy to detect short-orbital-period PSR-NS systems with \(P_{b}\sim {\rm min}\) in the future. The short-orbital-period PSR-NS systems can provide extreme gravity tests which may show new information for gravity. We use the plug-in FAKE of TEMPO2 to simulate the TOAs of short-orbital-period PSR-NS systems and fit TOAs to get the fractional errors of 5 PK parameters. Although we do not consider the higher PN order contribution in our simulation, considering that \(v \ll c\), the main contribution from the lowest PN order can provide reliable errors of parameters which can help us constrain gravity theories. As our results show, compared with the previous bounds from binary pulsar systems, short-orbital-period systems can significantly improve the constraints on parameters of some specific gravity theories. The constraints of parameters we predicted are looser than the bound from the Solar System, but highly relativistic PSR-NS systems give constraints from strong field which is a complementary gravity regime. Our simulation is simplified and we expect to provide a more complete simulation in the future, such as to study a more complete timing model. For our simulation, we choose two different groups of masses (see Table [\[tab:PSR-NSsparameters\]](#tab:PSR-NSsparameters){reference-type="ref" reference="tab:PSR-NSsparameters"}). We found that PSR-NS I system (\(m_{p}=1.3\,M_{\odot}\), \(m_{p}=1.7\,M_{\odot}\)) can provide a slightly tighter bound than PSR-NS II system (\(m_{p}=1.35\,M_{\odot}\), \(m_{p}=1.44\,M_{\odot}\)) with a same \(\sigma_{\rm TOA}\). It indicates that PSR-NS systems with larger mass differences are more suitable for limiting these theories of gravity that we discussed, in particular for the dipole radiation in the DEF gravity where the asymmetry of masses will play an important role [see e.g. @Zhao:2021bjw in the context of GWs]. We simulate 5 PK parameters, among them, \(r\) and \(s\) are parameters related to the Shapiro delay. The precisions of \(r\) and \(s\) depend on the orbital inclination \(i\) which we have set \(i=60^{\circ}\) in our simulation. If the PSR-NS system is nearly edge-on (\(i \sim 90^{\circ}\)), the effect of Shapiro delay can be more significant, such as in PSR J0737\(-\)`<!-- -->`{=html}3039, and it can make \(r\) and \(s\) more precise in actual measurement. The higher precisions of \(r\) and \(s\) can help us measure the masses of PSR-NS systems more precisely and test GR more stringently. In the future, TianQin and Taiji  could also join the multimessenger observation strategies. The sensitive frequency of Taiji is slightly lower than LISA, which allows the joint observation of Taiji and SKA to detect more PSR-NS systems with a bit larger \({P}_{b}\). In addition, the mission times of TianQin or Taiji might be different from LISA, so in that case we can have a longer total time to detect short-orbital-period PSR-NS systems by different combinations of joint observation strategies. This may increase the detection numbers. In the astrophysical side, if we can detect short-orbital-period PSR-NS systems in the future, it can fill in the gap in current observations and make us better model the DNS population. Detecting such systems can help us learn the formation of DNSs better, and possibly verify new formation channels of DNSs, such as a fast-merging channel. Furthermore, if LISA and SKA can detect a PSR-NS system, as we discussed earlier, LISA can help SKA to locate and detect PSR-NS systems. Meanwhile, SKA can provide a more accurate measurement of parameters, which in turn, could help us analyse the GW waveforms of PSR-NS systems in the LISA data. We leave these studies to future publication. This work was supported by the National SKA Program of China (2020SKA0120300), the National Natural Science Foundation of China (11975027, 11991053, 11721303), the Young Elite Scientists Sponsorship Program by the China Association for Science and Technology (2018QNRC001), and the Max Planck Partner Group Program funded by the Max Planck Society. It was partially supported by the Strategic Priority Research Program of the Chinese Academy of Sciences (XDB23010200), and the High-Performance Computing Platform of Peking University. [^1]: https://www.atnf.csiro.au/research/pulsar/psrcat/ [^2]: Several companion stars of these systems are not fully identified as NSs. [^3]: The possibility that one or both components of GW190425 are black holes cannot be fully ruled out. For GW170817, a BH--NS merger is also possible, but it is more likely to be a DNS merger. [^4]: https://astronomers.skatelescope.org/ska/ [^5]: https://bitbucket.org/psrsoft/tempo2 [^6]: The specific comparisons are shown in Sec. 3.2 of. [^7]: Their 20 PSR-NSs contain PSR J0514\(-\)`<!-- -->`{=html}4002A whose companion in ATNF is not explicitly identified as a NS. [^8]: The simulated results also depend on the value of eccentricity. If we select \(e=0.5\) to simulate all systems, the results will be further improved by 3 to 10 times for different parameters. Especially for \(\dot{\omega}\), its fractional error becomes smaller nearly by an order of magnitude. Therefore, our results are conservative in this respect. [^9]: The specific forms of those delay terms can be found in Eqs. (2.2b--2.2d) in. [^10]: For PSR-NS systems with \(P_{b}\sim{\rm min}\), we can not use TOAs with integration time \(t_{\rm inte}\sim{\rm min}\), because it can erase the information of orbital motion, so in practice, the simple treatment here should be improved, and we need to reduce the integration time of TOAs and increase the number of TOAs in order to guarantee the equivalent accuracy of timing. [^11]: There is still a slight deviation from the theoretical prediction in interval \(P_{b}\in[40,\,60]\,{\rm min}\), which could be due to slight parameter dependence and the validity of the simplified theoretical prediction. [^12]: To verify the above arguments, we simulate the fractional uncertainties of 5 PK parameters as functions of \(P_{b}\) by setting 1-yr observation and using the same observation cadence. In this situation, the inflection point of trend change appears at 30 min. It can be understood that a short observation time \(T_{\rm obs}\) gets a smaller change for \(\omega\) comparing with a 4-yr observation. In this case we have \(\Delta\omega < 2\pi\) for systems with \(P_{b} > 30\,{\rm min}\), hence the inflection point appears earlier. [^13]: In principle, this relation is based on the Jordan--Fierz--Brans--Dicke gravity and the EOS AP4. However, a slightly different value will not affect our results at the first-order approximation. [^14]: The parameters \(\mu_{\alpha}\), \(\mu_{\delta}\), \(l\), \(b\) and \(D\) in \(\dot{P}_{b}^{\rm Shk}\) and \(\dot{P}_{b}^{\rm Gal}\) come from PSR J0737\(-\)`<!-- -->`{=html}3039. [^15]: The "\(*\)" denotes the Einstein frame. [^16]: The method that uses binary pulsar systems to bound \(\alpha_{p}\) with various EOSs can refer to, e.g.,, , and . [^17]: If the companion is a WD, \(\alpha_{c}\simeq\alpha_{0}\).
{'timestamp': '2021-08-13T02:02:29', 'yymm': '2107', 'arxiv_id': '2107.05812', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05812'}
# Introduction We consider simple, undirected graphs in this paper. The standard graph-theoretical terminology and notations not defined here follow. For a graph \(G\), let \(V(G)\) and \(E(G)\) represent its sets of vertices and edges, respectively. Let \(|E(G)|=m\) be the size of \(G\). The complement of \(G\) is conventionally denoted by \(\overline{G}\). For a vertex \(v\in V(G)\), \(deg_G(v)\) is the degree of \(v\). The maximum and minimum degrees are, respectively, denoted by \(\Delta\) and \(\delta\). Like degrees, distance is a fundamental concept of graph theory. For two vertices \(u,v\in V(G)\) with connected \(G\), the *distance* \(d(u,v)=d_G(u,v)\) between these two vertices is defined as the length of a shortest path connecting them. An excellent survey paper on this subject can be found in. The above classical graph distance has been extended by Chartrand et al. in 1989 to the Steiner distance, which since then has become an essential concept of graph theory. Given a graph \(G(V,E)\) and a vertex set \(S\subseteq V(G)\) containing no less than two vertices, *an \(S\)-Steiner tree* (or *an \(S\)-tree*, *a Steiner tree connecting \(S\)*) is defined as a subgraph \(T(V',E')\) of \(G\) which is a subtree satisfying \(S\subseteq V'\). If \(G\) is connected with order no less than \(2\) and \(S\subseteq V\) is nonempty, the *Steiner distance* \(d(S)\) among the vertices of \(S\) (sometimes simply put as the distance of \(S\)) is the minimum size of connected subgraph whose vertex sets contain the set \(S\). Clearly, for a connected subgraph \(H\subseteq G\) with \(S\subseteq V(H)\) and \(|E(H)|=d(S)\), \(H\) is a tree. When \(T\) is subtree of \(G\), we have \(d(S)=\min\{|E(T)|\,\,,\,S\subseteq V(T)\}\). For \(S=\{u,v\}\), \(d(S)=d(u,v)\) reduces to the classical distance between the two vertices \(u\) and \(v\). Another basic observation is that if \(|S|=k\), \(d(S)\geq k-1\). For more results regarding varied properties of the Steiner distance, we refer to the reader to [@Ali; @Caceresa; @Chartrand; @Dankelmann; @Goddard; @Oellermann]. In, Li et al. generalized the concept of Wiener index through incorporating the Steiner distance. The *Steiner \(k\)-Wiener index* \(\operatorname{SW}_k(G)\) of \(G\) is defined by \[\operatorname{SW}_k(G)=\sum_{\overset{S\subseteq V(G)}{|S|=k}} d(S)\.\] For \(k=2\), it is easy to see the Steiner Wiener index coincides with the ordinary Wiener index. The interesting range of the Steiner \(k\)-Wiener index \(\operatorname{SW}_k\) resides in \(2 \leq k \leq n-1\), and the two trivial cases give \(\operatorname{SW}_1(G)=0\) and \(\operatorname{SW}_n(G)=n-1\). Gutman studied the Steiner degree distance, which is a generalization of ordinary degree distance. Formally, the *\(k\)-center Steiner degree distance* \(\operatorname{SDD}_k(G)\) of \(G\) is given as \[\operatorname{SDD}_k(G)=\sum_{\overset{S\subseteq V(G)}{|S|=k}}\left(\sum_{v\in S}deg_G(v)\right) d_G(S)\.\] [The Gutman index of a connected graph \(G\) is defined as \[\operatorname{Gut}(G)=\sum_{u,v\in V(G)}\,deg_G(u)\,deg_G(v)\,d_G(u,v).\] The Gutman index of graphs attracts attention very recently. For its basic properties and applications, including various lower and upper bounds, see and the references cited therein.]{style="color: red"} Recently, Mao and Das further extended the concept of Gutman index by incorporating Steiner distance and consider the weights as a multiplication of degrees. The *Steiner \(k\)-Gutman index* \(\operatorname{SGut}_k(G)\) of \(G\) is defined by \[\operatorname{SGut}_k(G)=\sum_{\overset{S\subseteq V(G)}{|S|=k}}\left(\prod_{v\in S}deg_G(v)\right) d_G(S)\.\] [Note that this index is a natural generalization of classical Gutman index. In particular, for \(k=2\), \(\operatorname{SGut}_k(G)=Gut(G)\). This is the reason the product of the degrees comes to the definition of Steiner \(k\)-Gutman index.]{style="color: red"} The weighting of multiplication of degree or expected degree has also been extensively explored in, for example, the field of random graphs and proves to be very prolific. For more results on Steiner Wiener index, Steiner degree distance, and Steiner Gutman index, we refer to the reader to [@GutmanSDD; @LMG; @MaoDas; @MWD1; @MWGK; @MWGL]. For a given a graph parameter \(f(G)\) and a positive integer \(n\), the well-known *Nordhaus-Gaddum problem* is to determine sharp bounds for: \((1)\) \(f(G)+f(\overline{G})\) and \((2)\) \(f(G)\cdot f(\overline{G})\) over the class of connected graph \(G\), with order \(n\), \(m\) edges, maximum degree \(\Delta\) and minimum degree \(\delta\) characterizing the extremal graphs. Many Nordhaus-Gaddum type relations have attracted considerable attention in graph theory. Comprehensive results regarding this topic can be found in e.g.. In Section 2, we obtain sharp upper and lower bounds on \({\rm SGut}_k\) of graph \(G\). In Section 3, we obtain sharp upper and lower bounds of \({\rm SGut}_k(G)+{\rm SGut}_k(\overline{G})\) and \({\rm SGut}_k(G)\cdot {\rm SGut}_k(\overline{G})\) for a connected graph \(G\) in terms of \(n\), \(m\), maximum degree \(\Delta\) and minimum degree \(\delta\). # Sharp bounds for Steiner Gutman index In, the following results have been obtained: For connected graph \(G\) of order \(n\) with \(m\) edges, the authors in derived the following upper and lower bounds on \({\rm SGut}_k(G)\). We now give a lower and upper bounds on \({\rm SGut}_k(G)\) in terms of \(n\), \(m\), maximum degree \(\Delta\) and minimum degree \(\delta\): # Nordhaus-Gaddum type results on \({\rm SGut}_k(G)\) We now in a position to give the Nordhaus-Gaddum type results on \({\rm SGut}_k(G)\). The following corollary is immediate from above theorem. The following is the famous inequality by Pólya and Szegö: We now give another lower and upper bounds on \({\rm SGut}_k(G)\cdot {\rm SGut}_k(\overline{G})\) in terms of \(n\), \(\Delta\) and \(\delta\). We now give another lower and upper bounds on \({\rm SGut}_k(G)+ {\rm SGut}_k(\overline{G})\) in terms of \(n\), \(\Delta\) and \(\delta\). [The authors are much grateful to three anonymous referees for their valuable comments on our paper, which have considerably improved the presentation of this paper.]{style="color: red"} Supported by the National Science Foundation of China (Nos. 12061059, 11601254, 11661068, 11551001, 11161037, and 11461054), and UoA Flexible Fund from Northumbria University (201920A1001).
{'timestamp': '2021-07-14T02:05:02', 'yymm': '2107', 'arxiv_id': '2107.05742', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05742'}
# Introduction *Singular knots and links* are four-valent spatial graphs in which the vertices (known as *singular crossings*) have a fixed cyclic ordering. *Pseudoknots* are classical knots in which crossing information for certain crossings, known as *precrossings*, is unknown. The Reidemeister moves for singular knots and pseudoknots are nearly the same--more precisely, replacing the singular crossings with precrossings transforms all of the singular Reidemeister moves into pseudoknot Reidemeister moves, with only one move missing, a Reidemeister I-style move with a precrossing. In, an algebraic structure known as *psyquandle* was introduced and applied to define invariants of singular knots and pseudoknots. A psyquandle is a set with four binary operations satisfying algebraic axioms coming from the Reidemeister moves for pseudoknots and singular knots. Psyquandles can be regarded as classical biquandles enhanced with two additional binary operations whose interactions with each other and the classical biquandle operations encode the pseudoknot and singular Reidemeister moves. In, the quandle counting invariant for classical knots and links was enhanced with a choice of subset of the endomorphism ring of the coloring quandle to define a quiver-valued invariant of knots and links known as the *quandle coloring quiver*. Since comparing isomorphism classes of quivers directly can be inconvenient, a polynomial invariant called the *in-degree polynomial* was defined from the quandle coloring quiver. In this paper we apply the idea of coloring quivers to the cases of biquandles and psyquandles, defining new directed-graph valued invariants of classical knots as well as pseudoknots and singular knots. The in-degree polynomials are also defined for these structures as an application. The paper is organized as follows. In Section [2](#K){reference-type="ref" reference="K"} we provide a brief review of the basics of virtual knots, singular knots and pseudoknots. In Section [3](#PBR){reference-type="ref" reference="PBR"} we review the basics of psyquandles and biquandles. In Section [4](#PCQ){reference-type="ref" reference="PCQ"} we define psyquandle coloring quivers. In Section [5](#BCQ){reference-type="ref" reference="BCQ"} we define a special case of psyquandle coloring quivers, biquandle coloring quivers, for classical and virtual knots and links. In Section [6](#E){reference-type="ref" reference="E"} we provide examples of the new invariants, in particular establishing that the quivers and their associated in-degree polynomials are not determined by the counting invariant in general. We conclude in Section [7](#Q){reference-type="ref" reference="Q"} with some questions for future research. # Virtual Knots, Singular Knots and Pseudoknots {#K} In this section we briefly review the basics of virtual knots, singular knots and pseudoknots. For more details see. *Virtual knots* can be understood as equivalence classes of *signed Gauss codes* under the signed Gauss code versions of Reidemeister moves. Signed Gauss codes are text-based encodings of oriented knot diagrams formed by assigning each crossing a number and crossing sign, then recording the sequence of over-and under-crossing labels with signs as one travels around the knot. Unlike knot diagrams, Gauss codes do not include easily accessible information about which strands of the knot are adjacent in the plane, and hence the Gauss code version of the Reidemeister II move allows for the move to be performed on non-adjacent strands, resulting in knot diagrams which cannot be drawn on the plane but require a supporting surface of nonzero genus. This is equivalent to an earlier idea known as *abstract knot theory* in which abstract knots are Reidemeister equivalence classes of collections of crossings with labels indicating how the strands are connected. Abstract knots can be embedded in orientable supporting surfaces of various genus; such supporting surfaces are defined only up to *stabilization moves* which add or remove handles away from the knot. For the purpose of drawing virtual knots on flat paper, we allow *virtual crossings* which show where handles are flattened into the paper. \[\includegraphics{jc-sn2020-4.pdf}\] These crossings interact with classical crossings via the *detour move* \[\includegraphics{jc-sn2020-5.pdf}\] motivated by the observation that repositioning of a handle before flattening into the plane does not change the virtual knot type. The detour move can be broken down into four cases known as the *virtual Reidemeister moves*. \[\includegraphics{jc-sn2020-6.pdf}\] A *singular knot* has *singular crossings* which are 4-valent vertices with a fixed cyclic ordering, known as *rigid vertices*. Singular crossings interact with classical crossings via the *singular Reidemeister moves*. \[\scalebox{0.85}{\includegraphics{jc-sn2020-7.pdf}}\] Singular knots are similar to 4-valent *spatial graphs*, which may be understood as a quotient of singular knots with an extra move allowing edges at a 4-valent vertex to "swivel": \[\scalebox{0.8}{\includegraphics{jc-sn2020-9.pdf}}\] In this paper we will not allow the swivel move; all of our vertices will be rigid. *Pseudoknots* have *precrossings* which are classical crossings whose crossing sign is unknown. The idea originated in Biology, where pictures of tiny physical knotted structures such as DNA strands enable some but not all crossings to be resolved; see for example. A precrossing may be conceptualized as a probability distribution with the two resolutions as outcomes. Precrossings interact with classical crossings via the *pseudoknot Reidemeister moves*, which are the same as the singular Reidemeister moves with singular crossing replaced with precrossings plus one additional move, the pI move: \[\includegraphics{jc-sn2020-8.pdf}.\] # Psyquandles and Biquandles {#PBR} We begin with a definition from, slightly restated as in. We note that contains a misprint in axiom (i), where both \(y\)s should be \(x\)s. The psyquandle axioms are motivated by the semiarc coloring rules for singular knots and pseudoknots below: \[\raisebox{-0.5in}{\includegraphics{jc-sn2020-2.pdf}}\label{eq1}\] The relationship between the psyquandle operations and their right inverses is illustrated below: \[\raisebox{-0.5in}{\includegraphics{jc-sn2020-3.pdf}}\] Psyquandles are useful for defining invariants of oriented singular knots and links. For every oriented singular or pseudolink diagram \(L\) there is an associated *fundamental psyquandle of \(L\)* denoted by \(\mathcal{P}(L)\) or \(\mathcal{P}_I(L)\) for the *fundamental pI-adequate psyquandle of \(L\)*. The fundamental psyquandle of \(L\) is defined as the quotient of the free psyquandle on the set of semiarcs in the diagram \(L\) by the equivalence relation generated by the relations determined by the crossings in the diagram \(L\). For details of the construction of the fundamental psyquandle, see. Note that each element of \(\mathrm{Hom}(\mathcal{P}(L),X)\) can be thought of as a coloring of \(L\) which associates an element of \(X\) to each semiarc in \(L\) such that the psyquandle operations in \(X\) are compatible with the relations determined by the crossings in \(L\). The invariant defined in Theorem [\[counting\]](#counting){reference-type="ref" reference="counting"} counts the number of \(X\)-colorings of \(L\), therefore, the invariant is commonly known as the *psyquandle counting invariant*. If \(L\) is a diagram of an oriented link there is an associated *fundamental biquandle of \(L\)*, denoted \(\mathcal{BQ}(L)\). Furthermore, the fundamental biquandle of \(L\) can be used to define the following *biquandle counting invariant*, \(\Phi_X^\mathbb{Z}(L) = | \mathrm{Hom}(\mathcal{BQ}(L),X)|\), for any finite biquandle \(X\). # Psyquandle Coloring Quivers {#PCQ} In this section, we define quivers (i.e., directed graphs) associated to a triple \((L,X,S)\) consisting of an oriented singular link (respectively, pseudolink) \(L\), a finite psyquandle (respectively, a pI-adequate psyquandle) \(X\), and subset \(S \subset \text{Hom}(X,X)\) of the ring of endomorphisms of \(X\). This is a generalization of the quandle coloring quivers found in associated to the triple \((L,X,S)\) where \(L\) is an oriented link, \(X\) is a finite quandle and \(S\subset\mathrm{Hom}(X,X)\) is a set of quandle endomorphisms. In the case where \(X\) is a finite pI-adequate psyquandle with \(S\subset \mathrm{Hom}(X,X)\) and \(L\) is an oriented pseudolink, we will still denote the *pI-adequate psyquandle coloring quiver* of \(L\) with respect to \(X\) by \(\mathcal{PQ}_X^S(L)\); we note that for a psyquandle to define invariants for pseudolinks, it must be pI-adequate. # Biquandle Coloring Quivers {#BCQ} We have defined psyquandle coloring quiver invariants for singular knots and links and for pseudoknots in the case of pI-adequate psyquandles. However, these invariants are actually more versatile than they may initially appear: - A classical knot or link can be regarded as a singular knot or link with an empty set of singular crossings. In this case, for any psyquandle \(X\) with \(S \in \textup{Hom}(X,X)\), colorings simply do not use the \(\, \underline{\bullet}\, ,\, \overline{\bullet}\,\) operations and hence we have the *biquandle coloring quiver invariant*, denoted by \(\mathcal{BQ}_X^S\). - A virtual knot or link can similarly be regarded as a virtual singular knot with empty set of singular crossings. By the usual technique of ignoring virtual crossings for coloring purposes, we obtain biquandle coloring quivers for virtual knot and links. - Extending virtual knot theory to the cases of virtual singular knots and virtual pseudoknots respectively by allowing singular crossings and precrossings respectively in the virtual detour move, psyquandle coloring quivers and in-degree polynomials define invariants for these objects as well. Note that in a psyquandle coloring quiver (respectively, biquandle coloring quiver), the number of edges out of a vertex will correspond to the cardinality of \(S\). On the other hand, the number of edges in to a vertex may be different. We will refer to the number of edges in to a vertex as the *in-degree* of the vertex and will denoted by \(\text{deg}^+\). We can use the in-degree of each vertex of a psyquandle coloring quiver (respectively, biquandle coloring quiver) to define the following polynomial invariant of links. By construction, we have # Examples {#E} In this section we collect some additional examples and computations of the new invariants. The examples were computed using our custom `python` code. Lastly, we will end this section with a few examples that illustrate that the in-degree polynomial is also useful for distinguishing classical links as well as virtual links. Note that the in-degree polynomial serves as an effective invariant of virtual knots. ::: # Questions {#Q} We conclude with some questions for future research. - What additional enhancements can be added to these quivers to further strengthen the invariants? - What about the cases of pseudo-singular and virtual pseudo-singular knots, which include classical, singular, pre-and virtual crossings? Including virtual crossings by allowing new crossing types in the detour move does not change the psyquandle structure, but interaction rules for precrossings with singular crossings may require additional axioms. - Adding operations at virtual crossings will likewise require a new algebraic structure, but analogous quiver-valued invariants are surely possible. - What conditions on a psyquandle and set of endomorphisms lead to specific types of quivers? For instance, a constant endomorphism yields a star while an automorphism produces a union of cycles. We are particularly interested in conditions yielding Hasse diagrams of posets.
{'timestamp': '2021-07-14T02:01:15', 'yymm': '2107', 'arxiv_id': '2107.05668', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05668'}
# Introduction Strong evidence has been found in psychology that human vision is able to parse a complex scene into part-whole hierarchies with many different levels from the low-level pixels to the high-level properties (*e.g.* parts, objects, scenes).
{'timestamp': '2022-01-11T02:11:49', 'yymm': '2107', 'arxiv_id': '2107.05790', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05790'}
null
null
# Introduction {#Sec:Intro} The interplay of coherent and incoherent dynamics has a rich and long history in the context of quantum physics. At the basic quantum mechanical level, it is responsible for a plethora of few body effects, of particular relevance to quantum optical systems. Over the last two decades, boosted by impressive progress in both solid state and atomic experiments, this interplay has found vast application in the context of many-body phenomena as well. A particularly successful framework in this respect has been the identification of new phases of matter associated with the non-equilibrium steady states of local Liouville dynamics. Such phases, understood as steady states of time-independent Liouvillians, have highly non-thermal properties and have been shown to often lack an equilibrium counterpart. The boundary between these phases hosts a rich spectrum of dissipative phase transitions (DPT), that capture how the properties of the 'average' state change as a function of a given external parameter. The phases emerging at the onset of a DPT are part of a larger class of out of equilibrium phenomena which can be accessed by suitable non-equilibrium drives, such as those recently reported in various solid state systems. In parallel to these developments, a series of recent works has introduced a new perspective that, instead of focusing on the properties of the average steady state, studies the many-body properties at the level of single quantum trajectories. In this context, it has been shown how the competition between quantum measurements and coherent dynamics (either analog or digitally generated) can give rise to transitions that manifest themselves in specific observables that are not properties of the averaged state-such as von Neumann entropies, negativities, or two-time correlation functions. This second class of transitions is often referred to as "measurement induced" phase transition (MIPT). While both types of transitions are clear footprints of the competition between coherent and incoherent dynamics, the interplay between them has so far received little attention, in part due to the fact that the two are typically formulated within rather different frameworks. In this work, we show that many-body dissipative (Liouville) Floquet dynamics provides a natural, generic framework to simultaneously investigate these types of non-equilibrium phase transitions within the same setting. This framework, that has remained largely unexplored so far, enables us to identify both common and distinct features for DPT and MIPT. In particular, while both are typically equally driven by measurement (as both entanglement and quantum order are generally suppressed by off-axis measurements), they do have very distinctive sensitivity to changes in the coherent dynamics: the unitary evolution can in some cases drive an entanglement transition with no ordered phase, as well as the entire opposite scenario, where a DPT is present while there is no entanglement transition (see Fig. [\[fig:Sketch_diagram\]](#fig:Sketch_diagram){reference-type="ref" reference="fig:Sketch_diagram"}a-b). We illustrate this new framework and our findings utilizing as a concrete model a one dimensional spin system subject to a long-range interacting Hamiltonian evolution interspersed with random quantum measurements [^1]. The periodic dynamics consists of cycles with a unitary evolution followed by quantum measurements, providing the competition needed to observe the transitions. The unitary evolution is governed by a long-range many-body Hamiltonian with an interaction that decays as a power-law with the distance between particles, and by a transverse external field; the measurement layer consists of random generalized measurement operations which independently reset the spins to the down state with a certain probability. This setup is very advantageous for the following reasons. Firstly, it allows us to tune both the range of interactions and the strength of measurements at the same time, enabling us to study an interplay of different phenomena which has not been adequately explored in the literature so far. Secondly, this type of transition can be experimentally investigated in a realistic trapped-ion setting; so far experimental realizations of MIPTs have been elusive because a high degree of control on the quantum system is required for both unitary and non-unitary operations on individual qubits. The model we consider is readily realizable in large system sizes using trapped ions (see Fig. [\[fig:Sketch_diagram\]](#fig:Sketch_diagram){reference-type="ref" reference="fig:Sketch_diagram"}c), where the unitary evolution of the long-range 1D spin model can be simulated, and local resetting and measurement operations on the spins can be naturally implemented with optical pumping   and state dependent fluorescence , respectively. Within our model, we investigate: (i) an order-disorder DPT, observed when the average state of the system develops a spontaneous magnetization or spin correlations; (ii) a MIPT, where the scaling of the entanglement entropy for the conditional state exhibits a change between volume and sub-volume law, observed also in free theories, random circuits and, more recently, in long-range systems. We show that these transitions do not generally coincide, and that depending on the range of the interactions one type of transition may appear while another one is suppressed. More specifically we find that for long-range interactions the ordering transition differs from the entanglement transition. As the range of the interactions decreases, the ordered phase disappears and only the entanglement transition survives. Our findings help shed light on the connection between DPT and MIPT, which have been mostly studied in disjoint settings in the literature so far (we note, however, that changes of order across MIPTs has been discussed in Refs. ). Moreover, our results emphasize the usefulness of dissipative Floquet theory, a so-far little employed theoretical framework even in the context of DPT, which are typically framed within the context of time-independent Liouvillians. In fact, from the methodological side, we observe that such models lend themselves to accurate analytical computations within (cluster-)mean-field approximations, often recovering even quantitative agreement with numerical simulations. The various phases arising from a dissipative Liouvillian dynamics have been studied in several many-body systems, including spin systems and systems of bosons. In particular, spin systems can display the emergence of an ordered ferromagnetic phase depending on the strength of dissipation, in which correlations between spins may play an important role in determining the phase diagram . This paper is organized as follows, in section [2](#Sec:model){reference-type="ref" reference="Sec:model"}, we present a detailed description of the model under consideration. The analytical and numerical methods employed to probe the transitions are detailed in section [3](#Sec:methods){reference-type="ref" reference="Sec:methods"}. In section [4](#Sec:order){reference-type="ref" reference="Sec:order"}, we discuss the order-disorder DPT, followed by an analysis on the purity of the average state; we provide a comparison between the results obtained using mean field and exact diagonalization. The results for the entanglement MIPT are presented in section [\[Sec:entanglement\]](#Sec:entanglement){reference-type="ref" reference="Sec:entanglement"}. In section [\[Sec:mulfrac_ss\]](#Sec:mulfrac_ss){reference-type="ref" reference="Sec:mulfrac_ss"}, the behavior of the participation entropies is discussed as a supporting probe to the different transitions under consideration. Section [\[Sec:Exp\]](#Sec:Exp){reference-type="ref" reference="Sec:Exp"} provides an experimental overview regarding the observation of DPTs and MIPTs, while section [\[Sec:conc\]](#Sec:conc){reference-type="ref" reference="Sec:conc"} presents the concluding remarks of the manuscript. # The model {#Sec:model} We consider a one dimensional system of \(L\) spin-\(1/2\) interacting between them via a long-range Ising interaction and subject to a transverse external field. The unitary evolution and the measurement processes are periodic in time with period \(T\). The dynamics of systems subject to measurements continuous in time can be effectively described by a quantum master equation for the average density matrix \(\rho\). However we consider discrete measurements occurring on a very short timescale at times \(t=nT\), so that the unitary dynamics and the measurements occur sequentially rather than simultaneously. Within this setting, a description of the dissipative dynamics through Lindblad operators is not very practical; instead we will be using a Kraus map to describe the measurement process (see Fig. [\[fig:tevol\]](#fig:tevol){reference-type="ref" reference="fig:tevol"}). ## Hamiltonian evolution {#Sec:modelHam} We first define the Hamiltonian governing the unitary dynamics. For practical reasons that will be explained in detail in Section [3](#Sec:methods){reference-type="ref" reference="Sec:methods"}, we assume that the unitary evolution occurs in a "kicked" fashion: the system is subject only to the Hamiltonian \(H_I\) of the long-range interaction for times \(0<t-nT<T/2\) and then only to the external field Hamiltonian \(H_T\) for times \(T/2<t-nT<T\). Similarly to any Floquet dynamics, we can write the evolution operator \(\mathcal U\) over one cycle \[\begin{gathered} \notag \mathcal U=e^{-iH_T T/2}e^{-iH_IT/2};\\ \label{Eq:IsHam} H_I\equiv-\sum_{i\neq j}J_{ij}\sigma_i^x \sigma_j^x;\qquad H_T\equiv h\sum_i \sigma_i^z, \end{gathered}\] where \(\sigma_i^a\) are the Pauli matrices on site \(i\) and \(h\) is the external field. The long range interaction in \(H_I\) assumes periodic boundary conditions and includes a Kac normalization \[\label{Eq:KacN} \begin{split} J_{ij}=\frac{J}{\mathcal{N}} \left( \frac1{|i-j|^{\alpha}} + \frac1{(L-|i-j|)^{\alpha}} \right), \\ \mathcal{N}\equiv\sum_{r=1 }^{L-1}\left( \frac1{r^{\alpha}}+\frac1{(L-r)^{\alpha}} \right). \end{split}\] The quantity \(\alpha\) parameterizes the range of the interaction. In equilibrium, interactions with \(0<\alpha<1\) are typically considered to be long range, while values \(\alpha\gtrsim2\) yield short range interactions The long-range interactions lead to a sub-linear growth of entanglement entropy after a quench. For all numerical calculations from now on we set \(J=1\) and \(T=1\). ## Quantum measurements {#Sec:modelDis} As already mentioned, the measurement process can be described by a set of Kraus operators \(\{K_{\mu}\}\) which can be related to the Lindblad jump operators. The Kraus operators preserve the global \(\mathbb{Z}_2\) symmetry of the Ising model, i.e. \(K_\mu (U_Z \rho U_Z^\dagger) K_\mu^\dagger=U_Z (K_\mu \rho K_\mu^\dagger) U_Z^\dagger\) with \(U_Z=\prod_i \sigma_i^z\), for every \(\mu\) and every \(\rho\), and satisfy the normalization condition \(\sum_\mu K_\mu^\dagger K_\mu=1\). We consider a resetting measurement process, where spins are independently reset to the down state with probability \(p\). The Kraus operators associated with these generalized measurements \(\mathbb{E}_\mu \equiv K^\dagger_\mu K_\mu\) are labeled by a multi-index \(\mu=(\mu_1,\dots, \mu_L)\), with \(\mu_i=0,1,2\) and are defined as [^2] \[\label{eq:defkrausop} \begin{split} K_\mu&=\prod_i K_{i,\mu_i}\\ K_{i,0} =\sqrt{p} \ket{\downarrow}\bra{\downarrow}_i, &\qquad K_{i,1} =\sqrt{p} \ket{\downarrow}\bra{\uparrow}_i, \\ K_{i,2}&= \sqrt{1-p}\; \mathbf{1}_i. \end{split}\] Depending on the observable we want to investigate, we can limit ourselves to the study of the average state, given by the density matrix \(\rho=\overline{\ket{\psi}\bra{\psi}}\), or we may have to consider single quantum trajectories. At the level of a quantum trajectory, each measurement on a single spin corresponds to a sudden change in the state of the system \(\ket{\psi}\rightarrow\ket{\psi'}\) with \[\label{Eq:trajectory_dis} |\psi'\rangle = \frac{K_{\mu} |\psi\rangle}{\sqrt{\langle \psi|K^\dagger_{\mu} K_{\mu}|\psi\rangle }}.\] The choice of which Kraus operator is applied for each site is given by the Born rule via the probability distribution \(\mathcal{P}(\mu)=\langle \psi|\mathbb E_{\mu}|\psi \rangle=\prod_i \langle \psi|K^\dagger_{i,\mu_i} K_{i,\mu_i}|\psi\rangle\). The action of the dissipative map on the average state can be found by summing over the outcomes of the measurement \[\begin{gathered} \label{Eq:Kraus} \rho' = \sum_\mu K_\mu \rho K_\mu^\dagger;\\ \label{Eq:rho_meas} \rho'= p \ket{\downarrow}\bra{\downarrow}_i\otimes\text{Tr}_i\rho+ (1-p) \rho. \end{gathered}\] where \(\rho\) (\(\rho'\)) is the density matrix of the system before (after) the measurement, and \(\text{Tr}_i\) denotes the partial trace over the degrees of freedom associated to the spin \(i\). Combining Eqs. [\[Eq:Kraus\]](#Eq:Kraus){reference-type="eqref" reference="Eq:Kraus"}-[\[Eq:rho_meas\]](#Eq:rho_meas){reference-type="eqref" reference="Eq:rho_meas"} with the unitary evolution [\[Eq:IsHam\]](#Eq:IsHam){reference-type="eqref" reference="Eq:IsHam"} it is possible to write a quantum master equation for the average state \[\label{Eq:MasterEq} \partial_t\rho=\mathcal{L}(t)[\rho],\] where the Lindblad superoperator \(\mathcal{L}(t)\) is a function of the Hamiltonian and of the Kraus operators and is periodic in time. Master equations of the form [\[Eq:MasterEq\]](#Eq:MasterEq){reference-type="eqref" reference="Eq:MasterEq"} are routinely used to investigate DPTs, but are not very suited to analyze a single trajectory. Crucially, such analysis of the quantum trajectories is needed when studying observables that are non-linear in the state of the system. Examples relevant for this paper are the entanglement entropy or the purity. As we shall see, for these quantities the conditional average over the trajectories is different from the analog one computed on the average state [^3], and for this reason they provide a sensible quantity for the MIPT. After a certain number of cycles (depending on the value of \(p\)) of unitary evolution plus measurement, the system reaches a steady state, in the sense that all the properties of the state (expectation values of observables, entanglement entropy, etc.) averaged over trajectories reach stationary values. We note that these quantities are not necessarily stationary during one cycle since the unitary dynamics and the measurement may still change them, but they are constant when considering two equivalent times in different cycles. For example, the steady state average density matrix is \(\rho_\mathrm{ss}(t)=\lim_{n\rightarrow\infty}\overline{\ket{\psi(t+nT)}\bra{\psi(t+nT)}}\) and satisfies \(\rho_\mathrm{ss}(t+T)=\rho_\mathrm{ss}(t)\). # Methods {#Sec:methods} We aim to characterize the properties of the steady state by studying the magnetization (and the spin correlators), entanglement properties, and purity. To that end, we combine analytical methods with numerical simulations. In this section we give an overview of the methods we employ to investigate the relevant observables, which are reported in Table [1](#tab:my_label){reference-type="ref" reference="tab:my_label"}. ## Mean field approximation {#Sec:methodsMF} The analytical methods we utilize are based on single site mean field and cluster mean field approximations. While those methods cannot be informative about bipartite entanglement properties, they have access to both local order parameters and the purity of the system. Moreover, their simplicity offers several simple insights on the dynamics of the system in a regime where the approximation is very well controlled, as discussed below. This is expected, given the impressive predictive power of similar methods in the context of quantum quench dynamics for spin models with \(\alpha<1\). *Single site mean field approximation*-We can study the evolution of the system in a single site mean field approximation. Within such approximation, each spin is decoupled from the others, i.e. the density matrix factorizes \(\rho=\bigotimes_i\rho_i\). We can write down the evolution equations that determine the unitary dynamics of the average value of the spin vector \(\vec s_i\equiv\overline{\ave{\vec{\sigma}_i}}=\text{Tr}(\vec{\sigma}_i\rho_i)\); \(\overline{\cdot}\) indicates the average over trajectories, while \(\ave{\cdot}\) is the quantum expectation value. Note that the trace over \(\rho\) automatically takes into account the average over all quantum trajectories. The equations of motion are \[\begin{gathered} \label{Eq:MFdyn} \frac{d}{dt}\vec{s}_i=-\vec B_{MF}\times\vec{s}_i;\\ \label{Eq:MFspin_B}\vec B_{MF}\equiv \begin{cases} 4\sum_{k\neq i}J_{ik}s^x_k\hat x, \quad 0<t<T/2\\ -2h\hat z, \quad T/2<t<T \end{cases} \end{gathered}\] where \(\hat{i}\) is the versor in the direction \(i=x,y,z\). Equations [\[Eq:MFdyn\]](#Eq:MFdyn){reference-type="eqref" reference="Eq:MFdyn"}-[\[Eq:MFspin_B\]](#Eq:MFspin_B){reference-type="eqref" reference="Eq:MFspin_B"} are to be solved self consistently since the effective field \(\vec B_{MF}\) depends non linearly on \(\vec s_i\) during the first half of the unitary evolution cycle. From Eq. [\[Eq:rho_meas\]](#Eq:rho_meas){reference-type="eqref" reference="Eq:rho_meas"} we find the action of the dissipative map on the spins: \[\label{Eq:MFKraus} s^{x,y}_i\rightarrow(1-p)s^{x,y}_i; \quad s^z_i\rightarrow(1-p)s^z_i-p.\] *Cluster mean field approximation*-The single site mean field approximation completely neglects any correlation between spins. A simple way to include some degrees of correlations is to consider a cluster mean field approximation, in which the density matrix factorizes as the product of the density matrices of neighboring spins \(\rho=\bigotimes_i\rho_{2i-1,2i}\). We consider the density matrix of the first two sites \(\rho_{12}\). The mean field Hamiltonian reads \[\begin{gathered} \label{Eq:ClusterMFHI} H_I^{MF}=-2J\left(1-\frac1{\mathcal{N}}\right)s^x(\sigma_1^x+\sigma_2^x)-\frac {2J}{\mathcal{N}}\sigma_1^x\sigma_2^x;\\ \label{Eq:ClusterMFHT} H_T^{MF}=h(\sigma_1^z+\sigma_2^z);\\ \label{Eq:ClusterMFsx} s^x=\frac12\langle\sigma_{1}^x+\sigma_2^x\rangle=\frac12\text{Tr}[\rho_{12}(\sigma_{1}^x+\sigma_2^x)]. \end{gathered}\] The action of the dissipative map on the density matrix can be obtained from Eq. [\[Eq:Kraus\]](#Eq:Kraus){reference-type="eqref" reference="Eq:Kraus"} \[\begin{aligned} \notag\rho_{12}\rightarrow&(1-p)^2\rho_{12}+p(1-p)\ket{\downarrow}\bra{\downarrow}_1\text{Tr}_1\rho_{12}+\\ \label{Eq:clusterMFKraus} +&p(1-p)\ket{\downarrow}\bra{\downarrow}_2\text{Tr}_2\rho_{12}+p^2\ket{\downarrow}\bra{\downarrow}_1\ket{\downarrow}\bra{\downarrow}_2. \end{aligned}\] Notice that the terms proportional to \(p(1-p)\) involve resetting of only one of the spins, and that evaluating the partial trace over one of the spins creates a mixed state if the density matrix does not correspond to a pure state with both spins in the down state. The unitary evolution is determined by \[\label{Eq:clusterMFdtrho} \frac{d\rho_{12}}{dt}=-i \begin{cases} [H_I^{MF},\rho_{12}]\, \text{ for } \, 0<t<T/2,\\ [H_T^{MF},\rho_{12}]\, \text{ for } \, T/2<t<T. \end{cases}\] Note that for \(\alpha\le 1\), the two spins of the cluster---whose interaction is contained in Eq. ([\[Eq:ClusterMFHI\]](#Eq:ClusterMFHI){reference-type="ref" reference="Eq:ClusterMFHI"})---are completely decoupled in the thermodynamic limit because \(1/\mathcal{N}\rightarrow 0\). Therefore, cluster mean field coincides with single site mean field for \(\alpha\le 1\) (and we will generically refer to it as "mean field\"), while for \(\alpha>1\) it gives more accurate predictions because it includes nearest-neighbor correlations. ## Exact numerical simulations {#Sec:methods_ED} We also utilize extensive exact simulations that are best suited to tackle entanglement dynamics and provide quantitative predictions for the transition properties. Within our dissipative Floquet setting, it is of pivotal importance to access as large system sizes as possible with full numerical control. For this purpose, we utilize the following numerical procedure. To start, we note that \(\mathcal U\) is a product of operators that are diagonal respectively in the eigenbases of \(\sigma^x_i\) and \(\sigma^z_i\). The multiplication of a vector by a diagonal matrix requires only \(N=2^L\) operations as opposed to \(N^2\) operations for a multiplication by a full matrix. To utilize this fact, we also note that the transformation between the eigenbases of the \(\sigma^x_i\) and \(\sigma^z_i\) operators is given by \(R=\bigotimes_{i=1}^L R_i\), where \(R_i=\frac{1}{\sqrt{2}} \big(\begin{smallmatrix} 1 & 1\\ 1 &-1 \end{smallmatrix}\big)\). The product structure of this transformation allows us to use an approach analogous to fast Fourier transformation, known as the fast Hadamard transform which requires only \(N \log N \sim L 2^L\) operations to transform between eigenbases of \(\sigma^x_i\) and \(\sigma^z_i\) operators. Hence, the multiplication of a vector \(\ket{\psi}\) by the matrix \(\mathcal U\) reduces to two fast Hadamard transforms and two multiplications by the diagonal matrices \(e^{-iH_TT/2}\) and \(e^{-iH_IT/2}\), resulting in a total time complexity \(L 2^L\). Indeed, similar approaches have been employed in studies of the ergodicity of many-body systems. Finally, the measurement [\[Eq:trajectory_dis\]](#Eq:trajectory_dis){reference-type="eqref" reference="Eq:trajectory_dis"} can be represented by the action of sparse operators in the \(\sigma^z_i\) basis. This allows us to simulate exactly the time evolution of systems consisting of up to \(L=24\) spins within reasonable computing times. This procedure shows why it is advantageous to consider a kicked Ising Hamiltonian in comparison to a traditional Ising Hamiltonian that contains both the interaction term and the transverse field term at the same time. ## Exact numerics for \(\alpha=0\) {#Sec:methods_SYMM} The limit \(\alpha=0\) for the average evolution Eq. [\[Eq:Kraus\]](#Eq:Kraus){reference-type="eqref" reference="Eq:Kraus"} can be effectively simulated due to an emerging permutation symmetry. In fact, in this limit the interactions in the Hamiltonian have infinite range: we can use this property to perform our numerical simulations in permutational symmetric subspaces, allowing to study larger system sizes. To explain how this is done, it is convenient to work in the superoperator formalism, transforming the density matrix to a vector with the following mapping \[\label{eq:superoperator} \rho=\sum_{i,j} \rho_{i,j} \ket{i}\bra{j}\; \Longrightarrow\;\ket{\rho}\rangle =\sum_{i,j}\rho_{i,j}\ket{i}\ket{j}.\] The vector \(\ket{\rho}\rangle\) is hence defined on a "doubled\" system, with \(L\) sites associated with the left part (the state \(\ket{i}\) in Eq. ([\[eq:superoperator\]](#eq:superoperator){reference-type="ref" reference="eq:superoperator"})) and \(L\) sites for the right part (the state \(\ket{j}\)). The time evolution of the vector \(\ket{\rho}\rangle\) induced by the unitary dynamics with an Hamiltonian \(H(t)\) and by the measurement of Eq. ([\[Eq:rho_meas\]](#Eq:rho_meas){reference-type="ref" reference="Eq:rho_meas"}) is \[\begin{gathered} \label{Eq:superopEvolution}\dot{\ket{\rho}}\rangle=-i\Big(H(t)\otimes 1-1\otimes H(t)^*\Big)\ket{\rho}\rangle;\\ \label{Eq:superopDissipation}\ket{\rho}\rangle'= \sum_\mu K_\mu \otimes K_\mu^* |\rho\rangle\rangle. \end{gathered}\] By using the explicit form of the Kraus operators in Eq. ([\[Eq:Kraus\]](#Eq:Kraus){reference-type="ref" reference="Eq:Kraus"}) we get \[\label{Eq:superopKraus} \sum_\mu K_\mu \otimes K_\mu^*=\prod_i\sum_{\mu_i=0}^2 K_{i,\mu_i} \otimes K_{i,\mu_i}^* =\exp\left(\sum_i M_i\right),\] where the operator \(M_i\) acts on the left and right spins at position \(i\) and has the form \[\label{Eq:superopKrausM} M_i=-\ln (1-p)\Big( \ket{\downarrow\downarrow}\bra{\downarrow\downarrow}+\ket{\downarrow\downarrow}\bra{\uparrow\uparrow}-\mathbf{1}\otimes \mathbf{1}\Big)_i.\] Note that, while for \(\alpha=0\) the Hamiltonian part is invariant under both the permutations of the \(L\) sites on the left and the permutations of the \(L\) sites on the right (the symmetry is given by the group \(\mathcal{S}_L^{(l)}\times \mathcal{S}_L^{(r)}\)), the measurement is only invariant under permutations of the left and right part simultaneously (the symmetry group is \(\mathcal{S}_{L}^{(l,r)}\)). We define a basis for the invariant subspace under these simultaneous permutations: each state of the basis is labeled by a sequence of four integers \(\{n_i\}_{i=1,\dots,4}\) with \(0\le n_i \le L\) and \(\sum_i n_i=L\), and is defined as \[\label{eq:perm_basis} \ket{\{n_i\}}=\frac{1}{\mathcal{N}_{\{n_i\}}}\sum_{\tau\in \mathcal{S}_L}\mathbb{S}_\tau \ket{\uparrow\uparrow}^{\otimes n_1}\ket{\uparrow\downarrow}^{\otimes n_2}\ket{\downarrow\uparrow}^{\otimes n_3}\ket{\downarrow\downarrow}^{\otimes n_4}\] where \(\mathcal{N}_{\{n_i\}}\) is a normalization constant, the sum runs over all the permutations \(\tau\) of \(L\) elements and \(\mathbb{S}_\tau\) is the operator that applies the permutation \(\tau\) to the \(L\) (doubled) sites of the system. The dimension of this subspace is \(\binom{L+3}{3}\): the slow polynomial scaling in \(L\), compared with the exponential scaling \(2^{2L}\) of the full Hilbert space of the density matrix, allows us to simulate the exact dynamics of systems comprised of few hundreds spins. In Appendix [\[sec:app_perm\]](#sec:app_perm){reference-type="ref" reference="sec:app_perm"} we report the calculation of the matrix elements of the operators associated with \(H_T\), \(H_I\) and of the operator \(M=\sum_i M_i\) in this basis, and the procedure for computing expectation values. We note that similar approaches have been used for various open quantum systems with collective incoherent processes [@Sarkar87; @Chase08; @Baragiola10; @Lee12; @Xu13; @Marduk15; @Gegg16; @Gegg17; @Gegg18; @Shammah18; @Iemini18; @Hama18]. # Order-disorder transition {#Sec:order} In this section we demonstrate that the steady state of the kicked Ising model with random measurement hosts a symmetry breaking transition, similar to ordering transitions in ground states of quantum magnets. The ordering transition is best revealed by order parameters such as the spontaneous magnetization of the spins in the \(x\) direction or suitable correlation functions. We study the average magnetization \(X\) (averaged over trajectories and spins) and the two point correlation function \(X^2(t)\): \[\begin{gathered} \label{eq:X} X(t)=\frac1L\sum_{i=1}^L\overline{\ave{\psi(t)|\sigma^x_i | \psi(t)}};\\ \label{eq:XX} X^2(t)=\frac1{L(L-1)}\sum_{i\neq j}^L\overline{\ave{\psi(t)| \sigma^x_i\sigma^x_j | \psi(t)}}, \end{gathered}\] [^1]: Note that dissipative Floquet dynamics has already been used to discuss MITP in Ref. ; however, in those models, no DPT is expected nor has been observed [^2]: Notice that this is one choice of Kraus operators for the resetting process; other choices are possible and have the same action on the average state of the system. [^3]: Here by conditional average we mean computing first the expectation value of the observable over the state and then taking the average over the trajectories.
{'timestamp': '2022-02-01T02:11:51', 'yymm': '2107', 'arxiv_id': '2107.05669', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05669'}
# Introduction The past decade has seen growing interest in identifying new phases of entangled, out-of-equilibrium quantum matter. A sufficiently generic, isolated quantum system is expected to approach thermal equilibrium under its unitary dynamics, and develop an extensive amount of entanglement entropy . The eigenstates of such systems feature entanglement entropy scaling as a volume law. On the other hand, the presence of disorder or a quasiperiodic potential is capable of drastically changing the dynamical properties of the system, leading to many-body localization (MBL). MBL systems represent a different dynamical phase of matter, in particular characterized by area-law entangled eigenstates. The existence of distinct dynamical phases characterized by qualitatively different scaling of entanglement entropy naturally raises the question of the nature of the so-called MBL phase transition separating the ergodic and MBL phases. While the MBL transition received significant attention , it was later realized to be a particular example of an *entanglement transition*, which separates phases with different entanglement scalings. Beyond MBL, examples of an entanglement transition are provided by measurement-induced entanglement transitions in random unitary circuits under random local measurements , random tensor networks , and Rokshar-Kivelson  (RK) inspired wave functions . While all these phase transitions feature different tuning parameters and phenomenology, they often can be mapped onto classical ordering (spontaneous symmetry-breaking) phase transitions. For instance, the measurement-induced transition, resulting from a competition between local random unitary dynamics and the rate of local projective measurements at random points in space and time, was shown  to be related to a classical ordering transition in a replicated two-dimensional statistical model. Changing the measurement rate tunes the effective temperature of the classical model, driving it from an ordered phase at small measurement rate (corresponding to volume-law entanglement) to a disordered phase at large measurement frequency (area-law). Similar entanglement transitions and mappings also were reported in random tensor networks . A different approach to entanglement transitions was considered in . There, the authors considered a variational Ansatz state inspired by the Rokhsar-Kivelson wave function , in which the weights for the configurations are chosen from the Gibbs weights of a classical spin-glass model. Since states with positive weights can only sustain an area-law worth of entanglement , an additional random sign structure was also considered. The entanglement transition in this scenario was proven to be related to the geometric localization of the wave function due to the classical spin glass transition. Thus, on the one hand, both random tensor networks and measurement-induced entanglement transitions can be understood as an ordering transition in a two-dimensional statistical mechanical model, with the transition being induced by changing the tensor network bond dimension or the measurement rate. On the other hand, the transition observed in the RK-inspired wave function is closely related to a spin glass transition in an all-to-all spin-glass model. This motivates the question if entanglement transitions can be driven by physics beyond classical ordering transitions. The MBL transition as mentioned above could be one example of this. However, investigating the MBL transition is particularly challenging, see  and references therein for recent progress. In this work, we focus on the variational wave function approach. Specifically, in this paper, we consider a neural-network inspired variational Ansatz for the quantum wave function . Machine learning techniques have been proved fruitful to the field of many-body quantum physics . Specifically, exciting progress has been made in identifying quantum phases and transitions among them, either symmetry-broken phases  or topological phases , establishing connections to renormalization group techniques  and perturbation theory . In addition, machine learning ideas have also been used in measuring quantum entanglement and wave function tomography . We focus on a particular neural network variational state, referred to as restricted Boltzmann machines (RBM) quantum states which have been proven  to capture both an area-law as well as volume-law worth of entanglement depending on the locality of the neural network. In addition, recent work  showed that RBM states can also be used to parametrize quantum wave functions with non-Abelian symmetries. Having in mind the representability power of neural network Ansätze, and in particular, of the simple RBM Ansatz, we ask under what conditions it is capable of capturing an entanglement transition while continuously varying some parameters used to define the state. Since our motivation lies in entanglement transitions not driven by classical phase transitions, we consider RBM quantum states where the real part of the wave function is a local function of the spin degrees of freedom. Since no classical phase transition can exist in local one-dimensional statistical models, in this way we exclude any possible entanglement phase transition driven by a classical phase transition in the wave function weights. Our main results and structure of this paper are as follows: After introducing short-range RBM quantum states and discussing their entanglement capabilities in Sec. [2](#sec:Section2){reference-type="ref" reference="sec:Section2"}, we proceed with the study of short-range RMB states with uncorrelated random phases in Sec. [3](#sec:Section3){reference-type="ref" reference="sec:Section3"}. There we demonstrate the volume-law entanglement scaling for all values of the variational parameter \(\beta\) that plays a role of inverse effective temperature, indicating the absence of an entanglement transition. Next, in Sec. [4](#sec:Section4){reference-type="ref" reference="sec:Section4"} we study the phase diagram for short-range RBM quantum states but with power-law correlated phases as a function of inverse temperature \(\beta\) and power-law exponent \(\alpha\). We numerically show the existence of three different scaling regimes of the entanglement entropy and discuss the existence of a possible entanglement transition in the two dimensional phase diagram characterized by \(\alpha\) and \(\beta\). We conclude in Sec. [5](#sec:Section5){reference-type="ref" reference="sec:Section5"} with brief discussions of our results and comments on directions for future work. # Restricted Boltzmann Machines {#sec:Section2} In this section, we introduce restricted Boltzmann machines in the context of their usage as a variational state for many-body quantum physics. Moreover, we discuss the entanglement properties of the resulting wave function which depends on the locality of the RBM Ansatz. ## RMB as a wave function Ansatz A restriction from a Boltzmann machine , the so-called restricted Boltzmann machine (RBM) is one of the simplest cases of an artificial neural network that can learn a distribution over the set of their input. In the context of quantum many-body physics , RBMs are often used to approximate the wave function that is interpreted as a (complex) marginal probability distribution. Assuming that the wave function is defined on the many-body Hilbert space of spin-1/2 degrees of freedom, the spin configurations \(\sigma\in \{-1,1\}\) represent an input referred to as "physical spins". The RBM is defined on a bipartite graph, whose vertices are grouped into two classes: the hidden spins and the physical (visible) spins, see Fig. [\[Fig:cartoon\]](#Fig:cartoon){reference-type="ref" reference="Fig:cartoon"}. Suppose there are \(N\) visible spins and \(M\) hidden spins, and we associate the \(N\) variables \(\sigma\in\{-1,1\}\) and \(M\) variables \(h\in\{-1,1\}\) to the physical and hidden spins respectively. The spins in the hidden layer are connected to those in the physical layer, but there is no connection among spins in the same layer (see Fig. [\[Fig:cartoon\]](#Fig:cartoon){reference-type="ref" reference="Fig:cartoon"} for an illustration). The RBM representation of the amplitudes of a quantum many-body wave function is obtained by tracing out the hidden spins: \[\label{Eq:amplitudes_RBM} \Psi_{\Omega}(\sigma) = \sum_{h_j = \pm 1} e^{\sum^{N}_{i=1} a_i \sigma_i + \sum^M_{j=1} b_j h_j + \sum_{ij}\sigma_i W_{ij} h_j },\] and is fully specified by a set of variational parameters denoted as \(\Omega = \{W, a, b\}\) that can assume complex values. Here non-zero interactions between hidden and physical spins \(W_{ij}\) induce correlations between physical spins, whereas constants \(a_i\) renormalize the wave function amplitudes depending on the state of individual spins and do not induce correlations. The presence of either non-zero \(a_i\) or \(b_i\) leads to a breaking of the \({\mathbb Z}_2\) symmetry associated with flipping all physical spins. The summation over hidden spins in Eq. [\[Eq:amplitudes_RBM\]](#Eq:amplitudes_RBM){reference-type="eqref" reference="Eq:amplitudes_RBM"} can be performed analytically, resulting in \[\label{Eq:Psi-RBM} \Psi_{\Omega}(\sigma)=e^{\sum_{i=1}^{N}a_{i}\sigma_{i}}\prod_{j=1}^{M}2 \cosh \left(b_{j}+\sum_{i=1}^N W_{ij}\sigma_{i} \right).\] Since the quantum many-body wave function typically contains complex parameters, we rewrite each term in the sum in its polar form \(\Psi_{\Omega}(\sigma)=e^{i\phi_\sigma} e^{-E_{\Omega}(\sigma)/2}\), where both \(\phi_\sigma\) and \(E_{\Omega}(\sigma)\) are real, with the latter playing an analogue of an energy in the partition function that determines the norm of the state. More specifically, we introduce the partition function \(Z=\left. \langle \psi_{\Omega} \right| \psi_{\Omega} \rangle =\sum_\sigma e^{-E_\Omega(\sigma)}\), thus corresponding to a statistical model characterized by the energy function \(E_\Omega(\sigma)\). In the remaining of the paper, we will explore the structure of entanglement in this wave function, depending on the different choices of the variational parameters \(\Omega\). ## Entanglement of RBM states As supported by representability theorems , RBM can approximate any many-body quantum state. However, such approximation may require an exponential in system size number of hidden spins and parameters, thus rendering the representation impractical. The interest lies then in finding types of many-body quantum states that can be *efficiently* described by RBM Ansatz with a number of hidden spins and parameters scaling *polynomially* in the number of physical spins \(N\). Throughout this work, we restrict to Ansätze that have the same number of physical and hidden spins, \(N=M\). Entanglement is a crucial feature of the quantum wave function. Hence, to understand the representability power of Ansätze that are polynomial in system size, a study of the entanglement structure of such quantum states is required. The entanglement properties of RBM were first studied in , where it was demonstrated that RBM states with short-range interactions between hidden and visible spins feature an area law of entanglement in any dimension and for arbitrary network geometry. More precisely, it was proven (see Theorem 1 of ) that when wave function ([\[Eq:Psi-RBM\]](#Eq:Psi-RBM){reference-type="ref" reference="Eq:Psi-RBM"}) has \(W_{ij}=0\) if \(|i-j|>\mathcal{R}\), Renyi entropies with an index \(n\) of a region \(A\) are bounded as \(S_{n}(A)\leq (2 \mathcal{R} \log 2) \partial A\) for all values of \(n\). Here \(\partial A\) denotes the surface area of subsystem \(A\) and the Renyi entropy with index \(n\) is defined as \[S_n(\rho_A) = \frac{1}{1-n}\ln \mathop{\rm{Tr}} \rho_A^n,\] where \(\rho_A\) is a density matrix of the region \(A\), obtained by tracing out all complementary degrees of freedom. This bound on all Renyi entropies indicates interesting connections between short-range RBM states and quantum states represented by a matrix-product state (MPS) . In particular, it was shown that all 1D short-range RBM , as well as sufficiently sparse  RBM can be efficiently described in terms of MPS. It is interesting to note that the validity of the inverse statement is to the best of our knowledge unknown, that is, given a generic MPS with a small bond dimension it is unknown whether there exists a representation in terms of a short-range RBM. Moreover, Ref.  demonstrated via an explicit example that long-range RBM states can exhibit volume-law entanglement. This further implies that the corresponding MPS representation of such a state would require an exponential scaling of the bond dimension with the system size. As we discussed above, RBM Ansätze are capable of representing quantum states with both area-and volume-law entanglement. This suggests the natural hypothesis that RBM may provide a potential Ansatz for a variational wave function that exhibits an entanglement transition. Inspired by this hypothesis, in the remainder of this work we explore entanglement structure of the RBM quantum states and its dependence on the variational parameters. # Uncorrelated random phases {#sec:Section3} In this section we motivate and introduce the first family of variational RBM Ansätze with random uncorrelated phases. After that we discuss results for the annealed average of the second Renyi entropy which shows the absence of an entanglement transition in this family of wave functions. ## RBM ansatz wave function In this work, we only consider ansatzes that do not allow for a description of the entanglement transition in terms of a classical phase transition in the wave function weights. Is it then natural to restrict to local RBM quantum states. However, such construction cannot encode volume law entanglement due to result of Ref.  discussed above. Thus we introduce a minimal extension to the short-range RBM ansatz and include an additional contribution coming from independent and identically distributed (i.i.d) random phases. In this aspect, our construction is similar to that of Ref.  that extended the variational wave function of the Rokshar-Kivelson type with random phases. Crucially, here we keep the interactions between spins strictly local. Specifically, we consider the following ansatz state as our starting point: \[\begin{aligned} |\psi_\Omega(\beta)\rangle & =\frac{1}{\sqrt{Z}}\sum_{\sigma}e^{i\phi_{\sigma}}\Psi_\Omega(\sigma,\beta)|\sigma\rangle, \label{eq:sRBM} \end{aligned}\] where each phase \(\phi_{\sigma}\) is i.i.d and drawn from a uniform distribution in the \([-\pi, \pi]\) interval. This wave function is parametrized by the parameter \(\beta\) that plays the role of effective inverse temperature in the RBM-type state \(\Psi_\Omega(\sigma,\beta)\), \[\Psi_\Omega(\sigma,\beta)=\prod_{j}^{N}\cosh\big(\beta(\lambda+\sigma_{j}+\sigma_{j+1})\big).\] This state is a particular example of RBM wave function from Eq. ([\[Eq:Psi-RBM\]](#Eq:Psi-RBM){reference-type="ref" reference="Eq:Psi-RBM"}), where the network geometry includes only nearest neighbor interactions between physical and hidden spins, see Fig. [\[Fig:cartoon\]](#Fig:cartoon){reference-type="ref" reference="Fig:cartoon"}(b). We note that \(\Psi_\Omega(\sigma,\beta)>0\) for all states \(|\sigma\rangle\) in the computational basis, and hence it can be written as \(\Psi_\Omega(\sigma,\beta) =e^{-E_{\Omega}(\beta)/2}\), where \[\label{eq:energy_srbm} E_\Omega(\beta)=-2\sum_{j}\ln\cosh\big(\beta(\lambda+\sigma_{j}+\sigma_{j+1})\big),\] can be interpreted as the energy of some underlying statistical mechanical model. In what follows we fix the value of lambda such that \(\lambda=0.1\). ## Bounding Renyi entropies We are interested in studying average Renyi entropies, \[\langle S_{n}(\rho_{A})\rangle=\frac{1}{1-n}\big(\langle\ln{\rm Tr}\big(\bar{\rho}_{A}\big)^{n}\rangle-n\langle\ln Z\rangle\big),\label{eq:quenched_ent}\] where \(\rho_A=\frac{1}{Z}\bar{\rho}_A\) represent the normalized quantum state of the subsystem \(A\). The averaging is performed over the random phases \(\phi_\sigma\) in Eq. ([\[eq:sRBM\]](#eq:sRBM){reference-type="ref" reference="eq:sRBM"}). However, in general calculating \(\langle\ln\bar{\rho}_{A}^{n}\rangle\) is analytically intractable and hence we resort to computing a lower bound. The lower bound, \(\langle S_{n}(\rho_{A})\rangle \geq\langle S_{n}(\rho_{A})\rangle_{{\rm ann}}\), uses the so-called annealed average of the same Renyi entropy \[\langle S_{n}(\rho_{A})\rangle_{{\rm ann}}=\frac{1}{1-n}\big(\ln\langle{\rm Tr}\big(\bar{\rho}_{A}\big)^{n}\rangle-n\ln \langle Z\rangle\big), \label{eq:anneal_ent}\] where the disorder-averaged density matrix and partition function enter the logarithm. It is possible to show that for any state of the form of Eq. [\[eq:sRBM\]](#eq:sRBM){reference-type="eqref" reference="eq:sRBM"} all annealed Renyi entropies can expressed via modified partition functions depending on the Renyi index \(n\). In particular, focusing on the second Renyi entropy we obtain \[\langle S_{2}(\rho_{A})\rangle_{{\rm ann}}=-\ln\left(\frac{{\rm Tr}_{A}Z^2_A+{\rm Tr}_{B}Z^2_B}{Z^{2}(\beta)}-Y(\beta)\right),\label{eq:lower_sRBM}\] where \(Z_{A,B} = {\rm Tr}_{A,B} e^{-E_\Omega(\beta)}\) are the partition function on region \(A\) and its complement \(B\), and \(Y= Z(2\beta)/Z^2(\beta)\) corresponds to the inverse participation ratio. Such representation of the second Renyi entropy opens the door to analytical calculations of Eq. [\[eq:lower_sRBM\]](#eq:lower_sRBM){reference-type="eqref" reference="eq:lower_sRBM"}. The final results is then an analytical function of the system size \(N\) and the variational parameter \(\beta\). This allows us to obtain the value of \(\langle S_{2}(\beta)\rangle_{{\rm ann}}\) for an arbitrary system sizes \(N\). We relegate the detailed derivation to Appendix [\[App:A\]](#App:A){reference-type="ref" reference="App:A"} and instead discuss results below. ## Absence of entanglement transition In Fig. [\[fig:constant_E\_urandph\]](#fig:constant_E_urandph){reference-type="ref" reference="fig:constant_E_urandph"}(a) we compare the numerical results for the average bipartite second Renyi entropy with the corresponding lower bound. We observe a good agreement between the average second Renyi entropy and its lower bound throughout the full range of considered values of \(\beta\). At low \(\beta\) the bipartite second Renyi entropy scales extensively with system size, \(S_2 \sim N\) which further implies the same scaling for the entanglement entropy. At larger values of \(\beta\) we observe an apparent crossing for curves corresponding to different system sizes. While this may suggest the existence of an entanglement transition tuned by \(\beta\), below we will argue that this crossing originates from strong finite size effects. To explore the fate of the crossing between normalized second Renyi entropy curves as the number of spins is increased, we first compute the difference between the annealed second Renyi entropy for systems consisting of \(N\) and \(N-2\) spins. Figure [\[fig:constant_E\_urandph\]](#fig:constant_E_urandph){reference-type="ref" reference="fig:constant_E_urandph"}(b) shows that the crossing point shifts toward larger values of \(\beta\) when the number of spins \(N\) is increased, suggesting the absence of an entanglement transition in the present case. The absence of transition is further supported by Fig. [\[fig:constant_E\_urandph\]](#fig:constant_E_urandph){reference-type="ref" reference="fig:constant_E_urandph"}(c), that shows a logarithmic increase of the value of \(\beta_\text{cross}^{(\delta,N)}\) defined as the point where crossing occurs between normalized second Renyi entropy for \(N\) and \(N+\delta\) spins. The logarithmic increase with \(N\) holds for \(\beta_\text{cross}^{(\delta,N)}\) irrespective of the separation \(\delta\) between the system sizes considered, giving a strong indication that the crossing shifts to \(\beta=\infty\) in the thermodynamic limit. Summarizing, the above results imply that short-range RBM quantum states with uncorrelated random phases, Eq. [\[eq:sRBM\]](#eq:sRBM){reference-type="eqref" reference="eq:sRBM"}, always display a volume-law entanglement at arbitrary large but finite values of \(\beta\). Therefore this ansatz does not have an entanglement transition as a function of \(\beta\). While the result here was obtained for a simple class of RBM states with only nearest neighbor interactions, we also numerically confirmed it for longer-range local RBM states. Thus we believe that arbitrary local (finite-range) RBM states feature volume-law entanglement for any finite values of \(\beta\), and thus do not have an entanglement transition. # Correlated random phases {#sec:Section4} As we discussed in Sec. [3](#sec:Section3){reference-type="ref" reference="sec:Section3"}, the presence of uncorrelated random phases does not allow for an entanglement transition in the local RBM variational Ansatz. Two natural directions towards an entanglement transition consist in relaxing either the locality of the energy function \(E_{\Omega}(\beta)\) or introducing correlations between random phases in Ansatz ([\[eq:sRBM\]](#eq:sRBM){reference-type="ref" reference="eq:sRBM"}). In order to avoid a spin-glass transition in the classical Hamiltonian, leading to the geometric localization of the wave function, we keep the local structure of RBM and relax the condition of uncorrelated random phases. In particular, below we consider a short-range RBM ansatz with power-law correlated random phases, controlled by a power-law exponent \(\alpha\). ## RBM Ansatz wave function We introduce correlations between random phases using the RBM description of the wave function with complex parameters. Specifically, we consider the Ansatz Eq. ([\[Eq:Psi-RBM\]](#Eq:Psi-RBM){reference-type="ref" reference="Eq:Psi-RBM"}) with \(a_i=0\) and complex values of \(W_{ij}\) written as \(W_{ij} = W^{(1)}_{ij}+ i W^{(2)}_{ij}\). The real part of the couplings is taken to be local with constant nearest neighbors interaction, that is, \(W^{(1)}_{ij}\) is the same as in Eq. [\[eq:sRBM\]](#eq:sRBM){reference-type="eqref" reference="eq:sRBM"}. The imaginary part of couplings, \(W^{(2)}_{ij}\), is a random number that is suppressed with distance between points \(i\) and \(j\), \[\label{Eq:} W_{ij}^{(2)} = \frac{w_{ij}}{|i-j|^{\alpha}}, \text{ with \(w_{ij} \in [-\pi, \pi]\).}\] Here the power-law exponent \(\alpha>0\) controls the decay of correlations in real space. In addition, we consider a longitudinal magnetic field of the form \(b_j=\lambda + i b_j^{(2)}\), with \(b_j^{(2)} \in [-\pi, \pi]\). Translating the above choice of complex \(W_{ij}\) into the wave function and keeping only the local part of the energy function we obtain the following expression: \[\label{eq:cRBM_state} |\psi_\Omega(\beta)\rangle=\frac{1}{\sqrt{Z}}\sum_{\sigma}e^{i\sum_{j=1}^N\arg(z_{j}(\beta))}\prod_{j=1}^N\cosh(\beta X^{(1)}_{j}) |\sigma\rangle.\] where \(z_j\) depends on the complex parameters of the RBM under consideration, \[z_j = \cosh (\beta X^{(1)}_{j}) \cos X^{(2)}_{j}+i\sinh (\beta X^{(1)}_{j}) \sin X^{(2)}_{j},\] with \(X^{(1,2)}_j = b_{j}^{(1,2)}+\sum_{i=1}^N\sigma_{i}W_{ij}^{(1,2)}\). From this representation we see that the presence of non-zero imaginary part of the RBM parameters translates into correlated phases entering in the expression for the RBM wave function, Eq. ([\[eq:cRBM_state\]](#eq:cRBM_state){reference-type="ref" reference="eq:cRBM_state"}). The presence of non-local random phases in this model makes it impossible to find an exact expression for the lower bound of \(\langle S_2(\beta) \rangle\) as done in Section. [3](#sec:Section3){reference-type="ref" reference="sec:Section3"}. Hence, we resort to perturbative expansions in the the high-\(\beta\) regime of the state in Eq. [\[eq:cRBM_state\]](#eq:cRBM_state){reference-type="eqref" reference="eq:cRBM_state"}. ## High-\(\beta\) limit In the limit of large \(\beta\) we expand Eq. ([\[eq:cRBM_state\]](#eq:cRBM_state){reference-type="ref" reference="eq:cRBM_state"}) to first non-trivial order in \(\beta|X^{(1)}_{j}|\), which gives following expression \[\label{eq:high_beta_state_approx} |\psi_\Omega(\beta\gg1)\rangle\approx \frac{1}{\sqrt{Z(\beta)}}\sum_{\sigma}e^{i\phi_{\sigma}}e^{-E_\Omega(\beta)/2}|\sigma\rangle,\] where \(\phi_{\sigma}= \sum_{j=1}^{N}\mathop{\rm sign}[X^{(1)}_{j}]X^{(2)}_{j}\) and \(E_\Omega(\beta)\) is given by Eq. [\[eq:energy_srbm\]](#eq:energy_srbm){reference-type="eqref" reference="eq:energy_srbm"}. We can think of the state Eq. [\[eq:high_beta_state_approx\]](#eq:high_beta_state_approx){reference-type="eqref" reference="eq:high_beta_state_approx"} as the result of time evolving the state \(|\Phi\rangle=\frac{1}{\sqrt{Z}}\sum_{\sigma}e^{-E_\Omega(\beta)/2}|\sigma\rangle\) that has no phases with a Hamiltonian \(H_{Z}\) that is diagonal in the computational basis and has eigenvalues \(\phi_{\sigma}\). Since the state \(|\Phi\rangle\) features an area-law entanglement , the structure of entanglement of the state \(|\psi_\Omega(\beta\gg1)\rangle\) is determined by the phases encoded in \(H_Z\). Below we will consider the structure of \(H_Z\) and use it to understand the entanglement of the resulting state. The explicit form of \(H_{Z}\) depends on the range \(\mathcal{R}\) of the real part of RBM couplings \(W^{(1)}_{ij}\). However, for any finite \(\cal R\) it features long-range power-law interactions between spins determined by the parameter \(\alpha\). As an example, it is possible to show that for the present ansatz \[H_Z =\sum_{ij}\frac{J_{ij}}{|i-j|^\alpha} \sigma^z_i\sigma^z_j + \sum_i h_i \sigma^z_i,\] where \(J_{ij} \propto w^2_{ij}\) and \(h_i\) is a random number uniformly distributed in the \([1/2, 1/2+\pi]\) interval. In order to understand the entanglement created by \(H_Z\), we use results of Ref. . This work obtained an upper bound on the rate of production of entanglement entropy, \(\Gamma = dS_A/dt\). The entanglement rate scales as the area of the boundary's subregion when \(\alpha>2\) (\(\alpha>D+1\) in arbitrary dimensions). Since the initial state \(|\Phi\rangle\) is an area-law state, the aforementioned result guarantees that the state \(|\psi_\Omega(\beta\gg1)\) has an area-law entanglement if \(\alpha>2\). In contrast, for \(\alpha<2\) the results of Ref.  imply that the entangling rate that scales as \(\Gamma \sim N_A^{2-\alpha},\) where \(N_A\) is the size of the subregion \(A\) which here we always take as \(N_A=N/2\) since we focus on the bipartite entanglement. Note that when \(\alpha\in(1,2)\) we get that \(2-\alpha<1\) and hence, the entangling rate scaling is sub-extensive in the system size \(N\). The application of the upper bound from Ref.  results in the high-\(\beta\) phase diagram boundaries shown at the top part of Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a). For \(\alpha>2\) the bound implies area-law scaling of entanglement. For the intermediate values of \(1<\alpha<2\) we expect at most a subextensive amount of entanglement, \(S\propto N_A^{2-\alpha}\). Finally, for the values of \(\alpha<1\) the upper bound has volume-law entanglement and thus is not very useful. ## Phase diagram Although the bound discussed above provides expectations for the phase diagram at high values of \(\beta\), the expansion breaks down at small values of \(\beta\). Therefore, we resort to numerical simulations to determine the phase boundaries at intermediate and small values of \(\beta\). To be consistent with our previous approach, we focus on the second Renyi entropy and perform numerical simulations for systems with up to \(N=20\) physical spins. The results of these simulations are summarized in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}. To begin with, let us explore the region determined by \(\alpha<1\), where according to summary shown in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a) we expect the volume law entanglement. In this region, the analytical bound does not provide any useful information. We compare the numerical results for average second Renyi entropy \(\langle S_2(\alpha, \beta) \rangle\) with fixed \(\alpha<1\) to the analytical result from Eq. [\[eq:lower_sRBM\]](#eq:lower_sRBM){reference-type="eqref" reference="eq:lower_sRBM"} for the annealed average obtained under assumption of i.i.d random phases and the same non-random energy function. Remarkably, we observe a good agreement between both quantities at all values of \(\beta \in [0, 1.5]\) considered in the numerical simulations, see an example in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(b). In particular, we find that for every \(\beta\) in the considered range the difference between the analytical expression and numerically averaged second Renyi entropy is on average \(\sim 10^{-7}\) and assumes the maximal value of \(\sim 10^{-4}\) in the worst case, achieved for small values of \(\beta\). This result suggests that, in this regime, the average second Renyi entropy in the presence of long-range phase correlations nearly coincides to its annealed average value in the case of uncorrelated random phases. This case was considered in Section [3](#sec:Section3){reference-type="ref" reference="sec:Section3"}, where we demonstrated an absence of entanglement transition. Therefore, although the finite size scaling reveals a crossing in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(b), we expect this crossing to shift to larger values of \(\beta\) with increasing system size. This is further supported by Fig. [\[fig:betac_vs_alpha_Rhalf\]](#fig:betac_vs_alpha_Rhalf){reference-type="ref" reference="fig:betac_vs_alpha_Rhalf"}, that shows the increase of the point \(\beta_{\rm cross}\), defined at the point where curves corresponding to different system sizes cross, for \(\alpha<1\). This result is along the line with our expectations of a volume law entanglement at all finite \(\beta\). However, the available range of \(N\) is insufficient to check if \(\beta_\text{c}\) grows logarithmically with \(N\) as we demonstrated in Sec. [3](#sec:Section3){reference-type="ref" reference="sec:Section3"}. Next, we continue with the region \(1 < \alpha <2\). Here the bound suggests the existence of a sub-extensive scaling of the entropy at large \(\beta\), as indicated at the top of Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a). Numerical simulations in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(c) show the presence of crossings for values of \(\alpha\) that are sufficiently close to one, for example \(\alpha=1.15\). For larger values of \(\alpha\), for instance \(\alpha = 1.66\) no crossing is observed and instead we find a good agreement with a sub-extensive \(N^{2-\alpha}\) scaling of the entropy shown in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(d). This result suggests the existence of a critical region separating the volume-law and sub-extensive scaling regimes, as is illustrated by the black line in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a) that shows the position of the crossing. The inset of Fig. [\[fig:betac_vs_alpha_Rhalf\]](#fig:betac_vs_alpha_Rhalf){reference-type="ref" reference="fig:betac_vs_alpha_Rhalf"} shows the scaling collapse for \(\alpha=1.15\) with critical exponents \((\beta_c, \nu) = (0.42, 0.5)\). We observe the crossing and performed scaling collapse for the region of \(1<\alpha<1.53\) that is suggestive of entanglement transition. However, as observed in Fig. [\[fig:betac_vs_alpha_Rhalf\]](#fig:betac_vs_alpha_Rhalf){reference-type="ref" reference="fig:betac_vs_alpha_Rhalf"}, finite size scaling of data shows that in the region \(\alpha>1\) the critical line shifts toward smaller \(\alpha\) when considering larger system sizes. Such finite size drift may again suggest this region might be associate with a crossover rather than an actual entanglement transition, but due to our limited system size points, we cannot rule out any of the two possibilities. Finally, for \(\alpha>2\), numerical simulations in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(e) show the entanglement entropy to be independent of system size for all finite values of \(\beta\), signaling the existence of area-law scaling for the entanglement entropy. This is reflected in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a) by the shaded region for \(\alpha>2\). In summary, the phase diagram proposed in Fig. [\[fig:phase_diag\]](#fig:phase_diag){reference-type="ref" reference="fig:phase_diag"}(a) agrees with our numerical findings for the existence of three different scaling regimes for the entanglement entropy. The possible entanglement transition tuned by parameter \(\beta\) could be realized in this phase diagram for an intermediate range of \(\alpha\), \(1 < \alpha \lesssim 1.53\). However, the example of strong finite-size effects and eventual absence of transition for \(\alpha < 1\) suggests that one has to interpret these findings with care, and additional studies maybe needed to rule out the possibility of this being a crossover rather than a true entanglement transition. # Discussions {#sec:Section5} Motivated by recent studies of entanglement transitions, we considered a neural-network inspired variational Ansatz for the quantum wave function. We used RBM quantum states, which have been proven capable of representing ground states of many-body Hamiltonians with polynomial-size gap and quantum states generated by any polynomial-size quantum circuits . We studied whether such variational states can capture an entanglement transition while continuously varying some parameters used to define the underlying neural network. First, we considered a short-range RBM state with independent random phases parametrized by \(\beta\) that plays the role of an inverse temperature. For this Ansatz we analytically calculated a lower bound on the second Renyi entropy. We found numerically that the averaged second Renyi entropy is very close to the analytic lower bound for all numerically accessible number of spins (up to \(N=20\)). Although both the analytical lower bound and the numerically averaged Renyi entropy display finite size crossings, we demonstrate that they are associated with a crossover rather than an actual entanglement transition. Using the analytical lower bound we observe that the crossing point \(\beta_{\rm{cross}}\) scales very slowly, as \(\ln N\) for large \(N\), a scaling that would be extremely hard to recognize from numerical simulations due to the limited range of accessible number of spins. We conclude that the short-range RBM Ansatz with random phases features a volume law entanglement at all finite values of \(\beta\), thus ruling out the possibility of an entanglement transition. As a more general example, we relaxed the assumption of uncorrelated random phases, and considered random power-law correlated phases controlled by the exponent \(\alpha\). The presence of long-range correlated phases did not allow to apply the analytic approach and we instead resorted to numerical simulations of the second Renyi entropy. Using known bounds on the entangling rate for systems with power-law interactions, we derived a hypothetical phase diagram with three regions of different scaling of entanglement entropy for large values of \(\beta\). For small and intermediate values of \(\beta\), our numerical simulations suggest the existence of a critical curve in the \((\beta, \alpha)\) plane. However, the limited range of number of spins we can access does not allow us to exclude the presence of a crossover rather than an actual phase transition. As a future research direction, it would be interesting to go beyond RBM states. In particular, a recent work  suggested that contemporary deep learning architectures, in the form of deep convolutional and recurrent networks, can also efficiently represent highly entangled quantum systems. Moreover, it was shown that such architectures can support volume-law entanglement scaling, polynomially more efficiently \(\mathcal{O}(N)\) than presently employed RBM, \(\mathcal{O}(N^2)\). Hence, it would then be interesting to carry out the same study we pursued in this work but using these state-of-the-art neural-network base wave functions.
{'timestamp': '2021-07-14T02:04:42', 'yymm': '2107', 'arxiv_id': '2107.05735', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05735'}
# Introduction[\[sec:Introduction\]]{#sec:Introduction label="sec:Introduction"} Geometry has found many applications in various areas of science, especially in physics . An essential element of geometry is the metric tensor, which contains the relevant information to measure distances in an underlying space. Provost and Vallee  endowed the Hilbert space with a metric that is invariant under parameter-dependent phase transformations (gauge invariance), now known as the quantum metric tensor (QMT). It measures the distance in the parameter space of a system and, therefore, encodes the information of how close two quantum states are. The QMT can be obtained from a second-order expansion of the fidelity, which has been used extensively in the study of quantum phase transitions (QPTs) . A QPT is characterized by a change in the ground state function's analytic properties and separates the system into two different regions in parameter space . The pioneering works  showed the relevance of the QMT and its scalar curvature to study QPTs. Further features of the QMT, such as its scaling properties and critical exponents, have been examined . The geometrical aspects of the QMT have also been looked into, like its geodesics and its scalar curvature, as well as their relation to topology . Interestingly, the relation of the QMT to complexity in the context of quantum computing  has also been analyzed. Aside from its theoretical relevance, the QMT can be measured experimentally, providing a direct link to condensed matter systems . A detailed account of the geometry of QPTs can be found in Ref. . For an application of geometrical concepts in the study of QPTs in a different context, see Ref. . The QMT possesses a classical analog first introduced in Ref. . This classical analog, from now on, called the classical metric, measures the distance in the parameter space between two points in phase space infinitesimally separated; it is defined for classical integrable systems and relies on the adiabatic theorem, introducing a torus average over the angle variables to obtain its components. In Ref. , it was proved that the classical metric results from a semiclassical approximation of the QMT under the time-dependent Lagrangian approach introduced in . The classical metric possesses the same properties as its quantum counterpart: it is positive semidefinite, gauge invariant, and it transforms as a rank-two covariant tensor. Given a quantum Hamiltonian, one may try to study its semiclassical version using coherent states. In this case, the QMT can be computed as in Ref. , yielding a parameter space with a flat, spherical, or hyperbolic geometry. Nevertheless, the dependence of the coherent states' coordinates on the Hamiltonian parameters might constitute a noninvertible mapping, which then results in a QMT whose components are zero in one or both phases of the system. Therefore, this semiclassical version of the QMT is useless to characterize the geometry of the parameter space . On the other hand, the classical metric shows its relevance emerging as a tool that, through purely classical functions and a classical torus average, provides a result consistent with the quantum description in many cases. We must mention, however, that some differences between the classical and quantum metrics may appear essentially due to operator-ordering ambiguities, which may result in (i) anomalies that contribute with additional terms , (ii) differences coming from the fact that there might be distinct quantizations for a given classical Hamiltonian. In , some examples that illustrate the use of the classical metric were laid out, and it was shown that the classical metric contains the same or almost the same information about the parameter space as the QMT; however, the need to delve into more geometrical details was manifest. In this sense, it is worth considering the scalar curvature, which is a local invariant of a metric space that quantifies the deviation of this space from being Euclidean . We can mention three essential features of this quantity. First, the value of the scalar curvature at a given point is independent of the parameter space's coordinates, which means that it is a geometric invariant quantity. Thus, it is helpful to detect whether a singularity is real or it is merely an effect of the parameter space's coordinates that are being used . This fact contrasts with the classical and quantum metrics, which depend on the choice of parameters and may contain removable singularities. Second, not all the systems have a Berry curvature and, consequently, a Berry phase. However, even in these cases, there might be a nonvanishing scalar curvature that will help characterize the underlying geometry. Third, the scalar curvature can also be used to obtain global information of the manifold, like the Euler characteristic, which is a topological number used to investigate the nature of the singularities associated with QPTs and provides a characterization of each quantum phase . Naturally, the scalar curvatures coming from the classical and quantum metric tensors for a given system can be computed and compared to see whether the classical treatment yields the same information as its quantum counterpart. A first approach to test the classical methods is to examine quantum many-body systems with a QPT in the thermodynamic limit. Of the variety of models that can appear, two of them have been widely used due to their rich parameter space structure and the effectiveness of a classical treatment: the Dicke model and the Lipkin-Meshkov-Glick (LMG) model. The Dicke model  consists of two-level atoms interacting with one mode of a bosonic field inside a cavity. Its parameter space geometry has been studied in Ref. , where the thermodynamic limit was considered. On the other hand, the LMG model  describes the interaction of spin-half particles interacting with each other and with an external magnetic field. A brief account of the QMT in this model can be found in Refs. . However, further geometrical analysis is lacking. Our goal in this paper is twofold: first, to test the limits of the classical metric for the Dicke and LMG models, and see how it departs from the quantum description; second, to study the scalar curvature of the classical and quantum metrics and its behavior near the QPT to extract valuable information of the critical region. We recall that, in a two-dimensional (parameter) space, which is the case considered here, the scalar curvature characterizes the geometrical structure of the surface. We will find the Dicke model's classical and quantum metrics in the thermodynamic limit under the truncated Holstein-Primakoff approximation, where the system becomes integrable. Although the metrics are not equal, they turn out to be singular at the QPT and diverge in the same manner, whereas their scalar curvatures are not divergent in the critical region. When the resonance condition is considered, both metrics and their scalars show divergence at the QPT. In the case of the LMG model in the thermodynamic limit, the classical and quantum metrics are the equal up to a quantization rule for the action variables, and the scalar curvature diverges at the QPT. In this paper, the classical metric and its scalar curvature are obtained for the Dicke and LMG models, and it is remarkable that they are able to give the same information as their quantum counterparts at the QPT. We also perform a detailed numerical study of the QMT and its scalar curvature for finite sizes of the LMG model, which extends the results of  where only the fidelity susceptibility (i.e., a component of QMT) is analyzed. In this case, we will see the QPT precursors in the peaks of the metric components and the scalar curvature, and an extrapolation of the results to the thermodynamic limit will give a clue as to whether the singularities predicted by the classical metric are genuine or are just a consequence of the choice of parameters. This will shed light on previous works where the scalar curvature's behavior for some models in the critical region was investigated . The structure of the paper is as follows. In Sec. [\[sec:Geometry\]](#sec:Geometry){reference-type="ref" reference="sec:Geometry"}, we begin by reviewing the essential geometric elements that will help us describe the parameter space of a system; we present the QMT following the approach of Ref. , introduce its classical analog , and discuss some features of the scalar curvature in two dimensions. In Sec. [\[sec:Dicke\]](#sec:Dicke){reference-type="ref" reference="sec:Dicke"}, we analyze the classical and quantum metrics for the Dicke model in the thermodynamic limit and compare their corresponding scalar curvatures for the nonresonant and resonant cases. In Sec. [\[sec:Lipkin\]](#sec:Lipkin){reference-type="ref" reference="sec:Lipkin"}, we consider the LMG model and we compute the associated classical and quantum metrics in the thermodynamic limit as well as their scalar curvatures. Then, for finite sizes of the LMG model, we obtain numerically the QMT and its scalar curvature. We also analyze the peaks of these numerical quantities as well as the slope of the scalar curvature at the QPT, and deduce their behavior in the thermodynamic limit. Finally, in Sec. [\[sec:Conclusions\]](#sec:Conclusions){reference-type="ref" reference="sec:Conclusions"}, we present the conclusions and propose some aspects to address for future work. # Geometry of the parameter space[\[sec:Geometry\]]{#sec:Geometry label="sec:Geometry"} Before studying the Dicke and LMG models, we briefly review the main features of the QMT and its classical analog. The QMT is a second-rank covariant symmetric tensor which measures the separation in the parameter space between two quantum states with infinitesimally different parameters . Consider a quantum system in the time interval \(t\in(-\infty,0)\) which is described through the path integral formulation by a Hamiltonian \(H(q(t),p(t);x)\), where \(q=\{q^{a}\}\) and \(p=\{p_{a}\}\), \(a=1...,n\) are the coordinates and momenta, and \(x=\{x^{i}\}\) with \(i=1...,{\cal N}\) is a set of \({\cal N}\) adiabatic parameters. Let us now suppose that at \(t=0\), a perturbation is turned on such that during the time interval \(t\in(0,\infty)\) the system is described by a perturbed Hamiltonian \(H^{\prime}\!=\!H+\mathcal{O}_{i}\delta x^{i}\), where the deformations \(\mathcal{O}_{i}(t)\) are given by \[\mathcal{O}_{i}(t):=\left(\frac{\partial H}{\partial x^{i}}\right)_{q,p}.\label{defo}\] In order to compare the ground states \(|0\rangle\) and \(|0^{\prime}\rangle\) that belong to the systems described by \(H\) and \(H^{\prime}\), respectively, we introduce the fidelity. It is defined as \({\cal F}(x,x+\delta x)=|\langle0^{\prime}|0\rangle|\) and its expansion to second order in \(\delta x^{i}\) yields \({\cal F}(x,x+\delta x)=1-\frac{1}{2}g_{ij}^{(0)}(x)\delta x^{i}\delta x^{j}\), where \(g_{ij}^{(0)}(x)\) is the QMT for the ground state and reads as  \[\begin{aligned} g_{ij}^{(0)}(x)=&-\frac{1}{\hbar^{2}}\intop_{-\infty}^{0}dt_{1}\intop_{0}^{\infty}dt_{2}\,\bigg(\frac{1}{2}\langle\{\hat{{\cal O}}_{i}(t_{1}),\hat{{\cal O}}_{j}(t_{2})\}\rangle_{0} \nonumber \\ &-\langle\hat{{\cal O}}_{i}(t_{1})\rangle_{0}\langle\hat{{\cal O}}_{j}(t_{2})\rangle_{0}\bigg).\label{qmetric} \end{aligned}\] In this expression, \(\hat{{\cal O}}_{i}(t)\) are the Heisenberg operators corresponding to the deformations ([\[defo\]](#defo){reference-type="ref" reference="defo"}), which can be written now as \[\hat{{\cal O}}_{i}(t)=\left(\frac{\partial\hat{H}}{\partial x^{i}}\right)_{\hat{q},\hat{p}},\] and are functions of \(\hat{q}(t)\), \(\hat{p}(t)\) and the parameters \(x\). Also, the symbol \(\{\cdot,\cdot\}\) stands for the anticommutator of two operators, and the expectation values, denoted as \(\langle\cdot\rangle_{0}\), are taken in the ground state of the system with Hamiltonian \(\hat{H}\). It is worth mentioning that this approach to the QMT can be naturally adapted to problems where the ground state is not known and perturbation theory is required . The QMT possesses a classical analog, called the classical metric tensor, which measures the distance in parameter space between the phase space points \((q(x),p(x))\) and \((q(x+\delta x),p(x+\delta x))\). It can be shown to arise from the semiclassical approximation of Eq. ([\[qmetric\]](#qmetric){reference-type="ref" reference="qmetric"}) for integrable systems  and is given by \[\begin{aligned} g_{ij}(x)=&-\intop_{-\infty}^{0}dt_{1}\intop_{0}^{\infty}dt_{2}\,\big(\langle{\cal O}_{i}(t_{1}){\cal O}_{j}(t_{2})\rangle_{\mathrm{cl}} \nonumber \\ &-\langle{\cal O}_{i}(t_{1})\rangle_{\mathrm{cl}}\langle{\cal O}_{j}(t_{2})\rangle_{\mathrm{cl}}\big),\label{classDef} \end{aligned}\] where the \({\cal O}_{i}(t)\) are the classical deformation functions given by \[{\cal O}_{i}(t)=\left(\frac{\partial H}{\partial x^{i}}\right)_{q,p}.\label{fucntionO}\] These functions can be written in terms of the initial conditions \((q_{0},p_{0})\) and time and, subsequently, in terms of the initial action-angle variables \((\phi_{0},I)\) and time; therefore, the deformations ([\[fucntionO\]](#fucntionO){reference-type="ref" reference="fucntionO"}) with their full dependence are \({\cal O}_{i}(t)={\cal O}_{i}(q(\phi_{0},I,t;x),p(\phi_{0},I,t;x);x)\). The notation \(\langle f\rangle_{\mathrm{cl}}\) stands for the classical torus average of the function \(f(\phi_{0},I,t;x)\) over the \(n\) initial angle variables, \[\langle f\rangle_{\mathrm{cl}}=\frac{1}{(2\pi)^{n}}\intop_{0}^{2\pi}d^{n}\phi_{0}\,f(\phi_{0},I,t;x).\label{classAv}\] Notice that this classical average replaces the quantum expectation value that appears in Eq. ([\[qmetric\]](#qmetric){reference-type="ref" reference="qmetric"}). Now that we have endowed our parameter space with a metric structure, we can construct a quantity which in two dimensions contains all the manifold's local information in an invariant way: the scalar curvature, also known as the Ricci scalar. In two dimensions, given the coordinates \((x^{1},x^{2})\), the scalar curvature can be computed as  and \(g\) is the determinant of the metric. Notice that the definition ([\[defscalar\]](#defscalar){reference-type="ref" reference="defscalar"}) differs by a global sign from that used in Ref.  since we are employing the more common contraction \(R:=g^{ij}R^{k}{}_{ikj}\), where \(R^{i}{}_{jkl}\) is the Riemann tensor. Having presented an overview of the parameter space's geometry, we devote the following sections to study the classical metric and its scalar curvature for the Dicke and LMG models and compare them with the results of the quantum analysis. # Dicke model[\[sec:Dicke\]]{#sec:Dicke label="sec:Dicke"} The Dicke model  describes a collection of \(N\) two-level atoms interacting with one mode of a bosonic field inside a cavity. Its quantum and classical dynamics have been explored , and it has been widely studied in the context of quantum and classical chaos , entanglement and fidelity . The Hamiltonian of the Dicke model is \[\hat{H}=\omega_{0}\hat{J}_{z}+\omega\hat{a}^{\dagger}\hat{a}+\frac{\lambda}{\sqrt{N}}(\hat{a}^{\dagger}+\hat{a})(\hat{J}_{+}+\hat{J}_{-}),\label{Dickeoriginal}\] where \(\omega_{0}\) is the splitting of the two levels, \(\omega\) is the frequency of the bosonic mode, \(\lambda\) is the coupling of the dipole interaction between the field and the atoms, \(\hat{a}\) and \(\hat{a}^{\dagger}\) are the creation and annihilation operators of the field, and \(\hat{J}_{z},\hat{J}_{\pm}=\hat{J}_{x}\pm i\hat{J}_{y}\) are the collective spin operators. Also, we have chosen \(\hbar=1\). We see that the operator \(\hat{J}^{2}=\hat{J}_{x}^{2}+\hat{J}_{y}^{2}+\hat{J}_{z}^{2}\) commutes with the Hamiltonian so the total pseudospin is conserved, and we can restrict ourselves, as usual, to the consideration of the maximum pseudospin \(j=N/2\). This has the effect of treating the collection of \(N\) two-level atoms as a single \((N+1)\)-level system with pseudospin \(j=N/2\) . We are interested in the thermodynamic limit \(j\rightarrow\infty\), where the system undergoes a QPT at the critical coupling \(\lambda=\lambda_{c}\equiv\frac{\sqrt{\omega\omega_{0}}}{2}\) that separates the normal phase \(\lambda<\lambda_{c}\) and the superradiant phase \(\lambda>\lambda_{c}\). ## Analysis in the thermodynamic limit ### **Normal phase** To describe the system in the thermodynamic limit, we follow the work of Emary and Brandes . We first use the Holstein-Primakoff transformation  \[\hat{J}_{+}=\hat{b}^{\dagger}\sqrt{2j-\hat{b}^{\dagger}\hat{b}},\,\,\,\,\,\hat{J}_{-}=\left( \sqrt{2j-\hat{b}^{\dagger}\hat{b}}\right) \hat{b},\,\,\,\,\,\hat{J}_{z}=\hat{b}^{\dagger}\hat{b}-j,\] which is a way to associate the bosonic operators, \(\hat{b}\) and \(\hat{b}^{\dagger}\), to the angular momentum operators \(\hat{J}_{z},\hat{J}_{\pm}\). After performing this transformation, the Dicke Hamiltonian takes the form \[\begin{aligned} \hat{H}=-j\omega_{0} & +\omega_{0}\hat{b}^{\dagger}\hat{b}+\omega\hat{a}^{\dagger}\hat{a} \nonumber \\ & +\lambda(\hat{a}^{\dagger}+\hat{a})\left(\hat{b}^{\dagger}\sqrt{1-\frac{\hat{b}^{\dagger}\hat{b}}{2j}}+\sqrt{1-\frac{\hat{b}^{\dagger}\hat{b}}{2j}}\,\hat{b}\right).\label{HEmary} \end{aligned}\] Next, we expand the square roots in Eq. ([\[HEmary\]](#HEmary){reference-type="ref" reference="HEmary"}) and take the limit \(j\rightarrow\infty\), keeping only the zeroth order term in \(1/j\). This leads to the effective Hamiltonian \[\hat{H}_{n}=-j\omega_{0}+\omega_{0}\hat{b}^{\dagger}\hat{b}+\omega\hat{a}^{\dagger}\hat{a}+\lambda(\hat{a}^{\dagger}+\hat{a})(\hat{b}^{\dagger}+\hat{b}),\label{HDickequad}\] which is valid for \(\lambda<\lambda_{c}\), i.e., the normal phase. The term proportional to \(j\), which is dominant as \(j\) increases, is identified as the ground state energy of the system in the normal phase. From Eq. ([\[HDickequad\]](#HDickequad){reference-type="ref" reference="HDickequad"}), we readily recognize that this Hamiltonian corresponds to two coupled harmonic oscillators, as can be explicitly seen by applying the operator transformation which casts it in the position-momentum representation as \[\begin{aligned} \hat{H}_{n}=&-j\omega_{0}-\frac{(\omega+\omega_{0})}{2}+\frac{1}{2}\big(\hat{p}_{1}^{2}+\hat{p}_{2}^{2}+\omega^{2}\hat{q}_{1}^{2}+\omega_{0}^{2}\hat{q}_{2}^{2} \nonumber \\ & +4\lambda\sqrt{\omega\omega_{0}}\,\hat{q}_{1}\hat{q}_{2}\big).\label{Hnormal} \end{aligned}\] We can uncouple the two oscillators by going to the normal coordinates \((\hat{Q}_{1},\hat{Q}_{2})\) through the transformation \[\begin{pmatrix}\hat{q}_{1}\\ \hat{q}_{2} \end{pmatrix}=\begin{pmatrix}\cos\alpha_{n} & \sin\alpha_{n}\\-\sin\alpha_{n} & \cos\alpha_{n} \end{pmatrix}\begin{pmatrix}\hat{Q}_{1}\\ \hat{Q}_{2} \end{pmatrix},\label{transf}\] and similarly for the corresponding conjugate normal momenta \((\hat{P}_{1},\hat{P}_{2})\). The angle \(\alpha_{n}\) is such that \[\tan2\alpha_{n}=\frac{4\lambda\sqrt{\omega\omega_{0}}}{\omega_{0}^{2}-\omega^{2}},\label{anglenormal}\] with \(\alpha_{n}\in\left(-\frac{\pi}{4},\frac{\pi}{4}\right)\), and we assume that \(\omega_{0}\neq\omega\). After performing this transformation, the Hamiltonian acquires the form \[\hat{H}_{n}=-j\omega_{0}-\frac{(\omega+\omega_{0})}{2}+\frac{1}{2}\left(\hat{P}_{1}^{2}+\hat{P}_{2}^{2}+\varepsilon_{1n}^{2}\hat{Q}_{1}^{2}+\varepsilon_{2n}^{2}\hat{Q}_{2}^{2}\right),\] where the two (squared) normal frequencies are We clearly see that at the critical coupling \(\lambda_{c}=\frac{\sqrt{\omega\omega_{0}}}{2}\), the normal frequency \(\varepsilon_{1n}\) vanishes and the system reduces effectively to only one normal mode. ### **Superradiant phase** In the case of the superradiant phase \((\lambda>\lambda_{c})\), one can derive an effective Hamiltonian \(\hat{H}_{s}\) by letting the field and the set of atoms acquire macroscopic occupation numbers; one way to achieve this is by displacing the bosonic operators that appear in ([\[HEmary\]](#HEmary){reference-type="ref" reference="HEmary"}) and demanding that the linear terms in \(\hat{a}\) and \(\hat{a}^{\dagger}\) vanish. After expanding the square roots and changing to the position-momentum representation, we arrive at the Hamiltonian for the superradiant phase, which reads as  \[\begin{aligned} \hat{H}_{s}= &-j\left(\frac{2\lambda^{2}}{\omega}+\frac{\omega_{0}^{2}\omega}{8\lambda^{2}}\right)-\frac{4\lambda^{2}+\omega^{2}}{2\omega}\nonumber \\ & +\frac{1}{2}\left(\hat{p}_{1}^{2}+\hat{p}_{2}^{2}+\omega^{2}\hat{q}_{1}^{2}+\frac{16\lambda^{4}}{\omega^{2}}\hat{q}_{2}^{2}+2\omega\omega_{0}\,\hat{q}_{1}\hat{q}_{2}\right).\label{Hsuper} \end{aligned}\] As in the normal phase, we use the transformation ([\[transf\]](#transf){reference-type="ref" reference="transf"}), which casts the Hamiltonian in the form \[\begin{aligned} \hat{H}_{s}= &-j\left(\frac{2\lambda^{2}}{\omega}+\frac{\omega_{0}^{2}\omega}{8\lambda^{2}}\right)-\frac{4\lambda^{2}+\omega^{2}}{2\omega} \nonumber \\ & +\frac{1}{2}\left(\hat{P}_{1}^{2}+\hat{P}_{2}^{2}+\varepsilon_{1s}^{2}\hat{Q}_{1}^{2}+\varepsilon_{2s}^{2}\hat{Q}_{2}^{2}\right), \end{aligned}\] where now the rotation angle \(\alpha_{s}\) is such that \[\tan2\alpha_{s}=\frac{2\omega^{3}\omega_{0}}{16\lambda^{4}-\omega^{4}},\label{anglesuper}\] and we have assumed that \(\lambda\neq\pm\omega/2\). The two resulting (squared) normal frequencies are Notice, once more, that at the critical coupling \(\lambda=\lambda_{c}\), the frequency \(\varepsilon_{1s}\) vanishes. Indeed, it can be easily verified that \(\hat{H}_{n}(\lambda_{c})=\hat{H}_{s}(\lambda_{c})\). Furthermore, looking at the dominant term of order \(j\) in the Hamiltonians ([\[Hnormal\]](#Hnormal){reference-type="ref" reference="Hnormal"}) and ([\[Hsuper\]](#Hsuper){reference-type="ref" reference="Hsuper"}), we can read off the ground state energy for both phases: \[\frac{E_{g}}{j}=\begin{cases}-\omega_{0}, & \lambda<\lambda_{c}\\-\left(\frac{2\lambda^{2}}{\omega}+\frac{\omega_{0}^{2}\omega}{8\lambda^{2}}\right), & \lambda>\lambda_{c}. \end{cases}\] This normalized ground state energy exhibits a discontinuity in its second derivative at \(\lambda=\lambda_{c}\), which is precisely the hallmark of the QPT in this model. Interestingly, the main features of the QPT were reproduced using only a quadratic approximation coming from the truncated Holstein-Primakoff transformation. This is one of the main virtues of this approach, which was precisely exploited by Emary and Brandes in their remarkable papers . We are also taking advantage of this method as a first step toward understanding the underlying geometry of the parameter space. The interested reader can consult Ref. , where some shortcomings of the truncated Holstein-Primakoff approximation are addressed. ## Classical and quantum metric tensors for the Dicke model[\[subsec:MetricDicke\]]{#subsec:MetricDicke label="subsec:MetricDicke"} Our aim is now to compute the classical and quantum metrics for the normal and superradiant phases and compare them to see how well the classical metric captures the essential information of the quantum system. After that, we will analyze the scalar curvatures of both metrics. We fix \(\omega_{0}={\rm const}\) and take as our adiabatic parameters the frequency \(\omega\) and the strength of the dipole coupling \(\lambda\), which results in a two-dimensional parameter manifold with coordinates \(x=\{x^{i}\}=(\omega,\lambda),\,i=1,2\). ### **Metrics of the normal phase** We begin our computation of the classical metric tensor ([\[classDef\]](#classDef){reference-type="ref" reference="classDef"}) for the normal phase, whose Hamiltonian is the classical counterpart of Eq. ([\[Hnormal\]](#Hnormal){reference-type="ref" reference="Hnormal"}): \[\begin{aligned} \label{Hamno} H_{n,cl}=&-j\omega_{0}-\frac{(\omega+\omega_{0})}{2}+\frac{1}{2}\big(p_{1}^{2}+p_{2}^{2}+\omega^{2}q_{1}^{2}+\omega_{0}^{2}q_{2}^{2} \nonumber \\ & +\!4\lambda\sqrt{\omega\omega_{0}}\,q_{1}q_{2}\!\big). \end{aligned}\] The deformation functions associated to the parameters are where we have ignored the terms that do not depend on \((q_{a},p_{a})\) since they would not contribute to the metric integrands \(\Lambda_{ij}(t_{1},t_{2}):=\langle{\cal O}_{in}(t_{1}){\cal O}_{jn}(t_{2})\rangle_{\mathrm{cl}}-\langle{\cal O}_{in}(t_{1})\rangle_{\mathrm{cl}}\langle{\cal O}_{jn}(t_{2})\rangle_{\mathrm{cl}}\). Actually, we can deal with both deformation functions simultaneously and write them as \[\begin{aligned} {\cal O}_{in}(t)=&\varepsilon_{1n}Q_{1}^{2}(t)\partial_{i}\varepsilon_{1n}+\varepsilon_{2n}Q_{2}^{2}(t)\partial_{i}\varepsilon_{2n} \nonumber \\ & +(\varepsilon_{2n}^{2}-\varepsilon_{1n}^{2})Q_{1}(t)Q_{2}(t)\partial_{i}\alpha_{n},\label{deffunct} \end{aligned}\] where \(\partial_{i}:=\partial/\partial x^{i}\), the \(Q_{a}(t),\,\,(a=1,2)\) are the normal coordinates that uncouple the two harmonic oscillators through the transformation ([\[transf\]](#transf){reference-type="ref" reference="transf"}), and \(\varepsilon_{an}\) are the normal frequencies ([\[norfreq\]](#norfreq){reference-type="ref" reference="norfreq"}). The next step is to write the \(Q_{a}(t)\) as functions of the initial conditions \((Q_{a0},P_{a0})\) and time as \[Q_{a}(t)=Q_{a0}\cos\varepsilon_{an}t+\frac{P_{a0}}{\varepsilon_{an}}\sin\varepsilon_{an}t,\] and then, the initial conditions in terms of initial action-angle variables \((\phi_{a0},I_{a})\) as \[Q_{a0}=\sqrt{\frac{2I_{a}}{\varepsilon_{an}}}\sin\phi_{a0},\,\,\,\,\,\,\,\,\,\,P_{a0}=\sqrt{2I_{a}\varepsilon_{an}}\cos\phi_{a0}.\] Now, we use the classical torus average ([\[classAv\]](#classAv){reference-type="ref" reference="classAv"}) to form the integrands \(\Lambda_{ij}(t_{1},t_{2})\) which turn out to be \[\begin{aligned} \Lambda_{ij}(t_{1},t_{2})=& \frac{1}{2}\partial_{i}\varepsilon_{1n}\partial_{j}\varepsilon_{1n}I_{1}\cos\left(2\varepsilon_{1n}T\right) \nonumber \\ & +\frac{1}{2}\partial_{i}\varepsilon_{2n}\partial_{j}\varepsilon_{2n}I_{2}\cos\left(2\varepsilon_{2n}T\right) \nonumber \\ & +\frac{\partial_{i}\alpha_{n}\partial_{j}\alpha_{n}}{\varepsilon_{1n}\varepsilon_{2n}}\!\left(\!\varepsilon_{1n}^{2}\!-\varepsilon_{2n}^{2}\!\right)^{2}\!\cos\left(2\varepsilon_{1n}T\right)\cos\left(2\varepsilon_{2n}T\right).\label{integrandsDicke} \end{aligned}\] where \(T=t_1-t_2\). Then, we convert the trigonometric functions to complex exponentials, substitute ([\[integrandsDicke\]](#integrandsDicke){reference-type="ref" reference="integrandsDicke"}) into ([\[classDef\]](#classDef){reference-type="ref" reference="classDef"}), and use the standard regularization \[\begin{aligned} \intop_{-\infty}^{0}dt_{1}\intop_{0}^{\infty}dt_{2}\,e^{\pm i\Omega T} & :=\lim_{\delta\rightarrow0^{+}}\intop_{-\infty}^{0}dt_{1}\intop_{0}^{\infty}dt_{2}\,e^{\pm i(\Omega\mp i\delta)T} \nonumber \\ & =-\frac{1}{\Omega^{2}}\label{reg} \end{aligned}\] to finally obtain the classical metric for the normal phase, whose components are \[\begin{aligned} g_{ij}=&\frac{\partial_{i}\varepsilon_{1n}\partial_{j}\varepsilon_{1n}}{8\varepsilon_{1n}^{2}}I_{1}^{2}+\frac{\partial_{i}\varepsilon_{2n}\partial_{j}\varepsilon_{2n}}{8\varepsilon_{2n}^{2}}I_{2}^{2} \nonumber \\ & +\partial_{i}\alpha_{n}\partial_{j}\alpha_{n}\left(\frac{\varepsilon_{1n}}{\varepsilon_{2n}}+\frac{\varepsilon_{2n}}{\varepsilon_{1n}}\right)I_{1}I_{2}.\label{classmetric} \end{aligned}\] It is clear from this expression that the appearance of normal frequency \(\varepsilon_{1n}\) in the denominator causes a divergence in the metric components at \(\lambda_{c}=\frac{\sqrt{\omega\omega_{0}}}{2}\) since \(\varepsilon_{1n}\) vanishes at the critical coupling \[see Eq. ([\[norfreq\]](#norfreq){reference-type="ref" reference="norfreq"})\]; this property of the classical metric signals the QPT in the Dicke model. We now compute the QMT ([\[qmetric\]](#qmetric){reference-type="ref" reference="qmetric"}) for the normal phase. From the Hamiltonian ([\[Hnormal\]](#Hnormal){reference-type="ref" reference="Hnormal"}), we obtain the corresponding deformation operators, which can be written in compact form as \[\begin{aligned} \hat{{\cal O}}_{in}(t)=&\varepsilon_{1n}\hat{Q}_{1}^{2}(t)\partial_{i}\varepsilon_{1n}+\varepsilon_{2n}\hat{Q}_{2}^{2}(t)\partial_{i}\varepsilon_{2n} \nonumber \\ & +(\varepsilon_{2n}^{2}-\varepsilon_{1n}^{2})\hat{Q}_{1}(t)\hat{Q}_{2}(t)\partial_{i}\alpha_{n}, \end{aligned}\] where \(\hat{Q}_{a}(t),\,\,(a=1,2)\) are the operators corresponding to the normal modes of the diagonal Hamiltonian, which can be written in terms of annihilation and creation operators as \[\hat{Q}_{a}(t)=\frac{1}{\sqrt{2\varepsilon_{an}}}\left(\hat{b}_{a0}^{\dagger}e^{i\varepsilon_{an}t}+\hat{b}_{a0}e^{-i\varepsilon_{an}t}\right).\label{QHeis}\] With these operators at hand, we can compute the combination \(\frac{1}{2}\langle\{\hat{{\cal O}}_{in}(t_{1}),\hat{{\cal O}}_{jn}(t_{2})\}\rangle_{0}-\langle\hat{{\cal O}}_{in}(t_{1})\rangle_{0}\langle\hat{{\cal O}}_{jn}(t_{2})\rangle_{0}\) and then use the regularization ([\[reg\]](#reg){reference-type="ref" reference="reg"}) to arrive at the components of the QMT, which turn out to be \[\begin{aligned} g_{ij}^{(0)}=&\frac{\partial_{i}\varepsilon_{1n}\partial_{j}\varepsilon_{1n}}{8\varepsilon_{1n}^{2}}+\frac{\partial_{i}\varepsilon_{2n}\partial_{j}\varepsilon_{2n}}{8\varepsilon_{2n}^{2}} \nonumber \\ & +\partial_{i}\alpha_{n}\partial_{j}\alpha_{n}\left[\frac{1}{4}\left(\frac{\varepsilon_{1n}}{\varepsilon_{2n}}+\frac{\varepsilon_{2n}}{\varepsilon_{1n}}\right)-\frac{1}{2}\right].\label{quantummetric} \end{aligned}\] Notice that, as in the case of the classical metric, the frequency \(\varepsilon_{1n}\) appears in the denominator in Eq. ([\[quantummetric\]](#quantummetric){reference-type="ref" reference="quantummetric"}), causing a divergence when \(\lambda=\lambda_{c}\) and signaling the QPT in the Dicke model. Moreover, with both metrics \[Eqs. ([\[classmetric\]](#classmetric){reference-type="ref" reference="classmetric"}) and ([\[quantummetric\]](#quantummetric){reference-type="ref" reference="quantummetric"})\] at our disposal, we find the relation \[g_{ij}^{(0)}=g_{ij}-\frac{1}{2}\partial_{i}\alpha_{n}\partial_{j}\alpha_{n},\label{relQuantClass}\] where we have made the identifications \(I_{1}=I_{2}=1/2\) and \(I_{1}^{2}=I_{2}^{2}=1\), which will be assumed in the rest of this paper. From ([\[relQuantClass\]](#relQuantClass){reference-type="ref" reference="relQuantClass"}) it is clear that the QMT ([\[quantummetric\]](#quantummetric){reference-type="ref" reference="quantummetric"}) has an extra parameter-dependent term that does not appear in its classical analog ([\[classmetric\]](#classmetric){reference-type="ref" reference="classmetric"}); these type of terms have been related to an anomaly arising from the ordering of the operators in the quantum case (see Ref.  for details). ### **Metrics of the superradiant phase** The treatment of the superradiant phase is analogous to that of the normal phase in both the classical and quantum settings; the difference lies in the explicit expressions of the rotation angle ([\[anglesuper\]](#anglesuper){reference-type="ref" reference="anglesuper"}) and the normal frequencies ([\[freqsuper\]](#freqsuper){reference-type="ref" reference="freqsuper"}) in terms of the parameters. The classical counterpart of the Hamiltonian ([\[Hsuper\]](#Hsuper){reference-type="ref" reference="Hsuper"}) is \[\begin{aligned} H_{s,cl}= &-j\left(\frac{2\lambda^{2}}{\omega}+\frac{\omega_{0}^{2}\omega}{8\lambda^{2}}\right)-\frac{4\lambda^{2}+\omega^{2}}{2\omega} \nonumber \\ & +\frac{1}{2}\left(p_{1}^{2}+p_{2}^{2}+\omega^{2}q_{1}^{2}+\frac{16\lambda^{4}}{\omega^{2}}q_{2}^{2}+2\omega\omega_{0}\,q_{1}q_{2}\right), \end{aligned}\] and its deformation functions are By following the same steps as in the normal phase, we arrive at the classical and quantum metrics, which turn out to be \[\begin{aligned} g_{ij}=&\frac{\partial_{i}\varepsilon_{1s}\partial_{j}\varepsilon_{1s}}{8\varepsilon_{1s}^{2}}I_{1}^{2}+\frac{\partial_{i}\varepsilon_{2s}\partial_{j}\varepsilon_{2s}}{8\varepsilon_{2s}^{2}}I_{2}^{2} \nonumber \\ & +\partial_{i}\alpha_{s}\partial_{j}\alpha_{s}\left(\frac{\varepsilon_{1s}}{\varepsilon_{2s}}+\frac{\varepsilon_{2s}}{\varepsilon_{1s}}\right)I_{1}I_{2}\label{classmetricS} \end{aligned}\] and \[\begin{aligned} g_{ij}^{(0)}=&\frac{\partial_{i}\varepsilon_{1s}\partial_{j}\varepsilon_{1s}}{8\varepsilon_{1s}^{2}}+\frac{\partial_{i}\varepsilon_{2s}\partial_{j}\varepsilon_{2s}}{8\varepsilon_{2s}^{2}} \nonumber \\ & +\partial_{i}\alpha_{s}\partial_{j}\alpha_{s}\left[\frac{1}{4}\left(\frac{\varepsilon_{1s}}{\varepsilon_{2s}}+\frac{\varepsilon_{2s}}{\varepsilon_{1s}}\right)-\frac{1}{2}\right],\label{quantummetricS} \end{aligned}\] respectively. Notice that these metrics have the same form as those of Eqs. ([\[classmetric\]](#classmetric){reference-type="ref" reference="classmetric"}) and ([\[quantummetric\]](#quantummetric){reference-type="ref" reference="quantummetric"}) and hence satisfy the relation ([\[relQuantClass\]](#relQuantClass){reference-type="ref" reference="relQuantClass"}), but with the normal frequencies \(\varepsilon_{1s}\) and \(\varepsilon_{2s}\) and the rotation angle \(\alpha_{s}\), showing a quantum anomaly effect. It is worth mentioning that despite their same appearance, the metrics are entirely different when written explicitly in terms of the Hamiltonian parameters \(x=(\omega,\lambda)\). This fact accounts for their different form when plotted, as can be seen in Fig. [\[FigNo_res\]](#FigNo_res){reference-type="ref" reference="FigNo_res"}. Moreover, due to the presence of \(\varepsilon_{1s}\) in the denominator of ([\[classmetricS\]](#classmetricS){reference-type="ref" reference="classmetricS"}) and ([\[quantummetricS\]](#quantummetricS){reference-type="ref" reference="quantummetricS"}), both metrics exhibit a divergence at \(\lambda=\lambda_{c}\), which reveals the existence of the QPT. Remarkably, this shows once again that the classical metric is sensitive to the presence of the QPT. To gain more insight into this, in Figs. [1(a)--1(c)](#FigNo_res) we show the components of the classical and quantum metrics for both phases and fixed values of \(\omega\) and \(\omega_{0}\). Clearly, we see that both metrics diverge at \(\lambda_{c}\), which signals the QPT. Moreover, these metrics have a very close behavior in the neighborhood of \(\lambda_{c}\). Nevertheless, the component \(g_{22}\) of the classical metric at \(\lambda=0\) shows a different behavior than its quantum counterpart. This can be attributed to the fact that the anomalous extra term that appears in ([\[quantummetricS\]](#quantummetricS){reference-type="ref" reference="quantummetricS"}) produces this notorious difference, making the classical metric more sensitive to the vanishing of the coupling term in the Hamiltonian ([\[Hamno\]](#Hamno){reference-type="ref" reference="Hamno"}). The scalar curvatures, computed using ([\[defscalar\]](#defscalar){reference-type="ref" reference="defscalar"}), for both the classical and quantum metrics are shown in Fig. [1(d)](#FigNo_res). We observe some features from the plots. First, the agreement between them is right in the superradiant phase \((\lambda>\lambda_{c})\). Second, an important difference between them appears in the normal phase (\(\lambda<\lambda_{c}\)): while in the quantum case the scalar curvature takes a constant value very close to \(-4\), in the classical case the scalar curvature possesses a minimum around \(\lambda=0.16\). Such a difference can be related to the behavior of the component \(g_{22}\) at that phase. And third, in the limit \(\lambda\rightarrow\lambda_{c}\) the scalar curvatures approach each other and tend to \(-4\). Notice, however, that for \(\lambda=\lambda_{c}\) they are not defined since the classical and quantum Hamiltonians used to compute the metrics are not valid at that point. The behavior of the scalar curvatures when \(\lambda\rightarrow\lambda_{c}\) implies that the singularity of the classical and quantum metrics at the QPT is merely an artifact of the parameter space's coordinates, i.e., it is a removable singularity. This is why in the next model that we analyze, we carry out a numerical study for finite \(j\) to elucidate the nature of the singularity. It is worth mentioning that the scalar curvature of the quantum metric resembles the one found in Ref. , the only difference being the method used to compute it and the overall sign due to the convention that we explained in Sec. [\[sec:Geometry\]](#sec:Geometry){reference-type="ref" reference="sec:Geometry"}. ### **Metrics under resonance** A special important case of the Dicke model is that of resonance, i.e., when \(\omega=\omega_{0}\). We are unaware of previous geometric analyses in this case. In order to treat it, we take the limits \(\alpha_{n}\rightarrow\pi/4\) and \(\omega_{0}\rightarrow\omega\) in the classical and quantum metrics corresponding to the normal phase \[Eqs. ([\[classmetric\]](#classmetric){reference-type="ref" reference="classmetric"}) and ([\[quantummetric\]](#quantummetric){reference-type="ref" reference="quantummetric"})\], whereas in the superradiant phase we only set \(\omega_{0}\rightarrow\omega\) in the associated metrics \[Eqs. ([\[classmetricS\]](#classmetricS){reference-type="ref" reference="classmetricS"}) and ([\[quantummetricS\]](#quantummetricS){reference-type="ref" reference="quantummetricS"})\]. The resulting metric components in terms of the parameters are greatly simplified, and we find that in the normal phase, the components \(g_{12}\) and \(g_{22}\) of the classical and quantum metrics perfectly match when the identifications of the action variables are used. These components are On the other hand, the \(g_{11}\) and \(g_{11}^{(0)}\) components do not match, as we can see below: At this point, we introduce canonical coordinates for the description of the classical system. It is easy to see that the coordinates \((\phi,J_{z})\) are canonical in the sense that they reproduce the angular momentum algebra \(\{J_{i},J_{j}\}_{(\phi,J_{z})}=\epsilon_{ijk}J_{k}\), where \[\{f,g\}_{(\phi,J_{z})}:=\frac{\partial f}{\partial\phi}\frac{\partial g}{\partial J_{z}}-\frac{\partial f}{\partial J_{z}}\frac{\partial g}{\partial\phi}.\] Then, we perform a canonical transformation and move to the \((Q,P)\) representation, where \[Q=\sqrt{2(j-J_{z})}\cos\phi,\,\,\,\,\,\,\,\,\,\,P=\sqrt{2(j-J_{z})}\sin\phi.\label{transfQPLipkin}\] After this, the resulting classical LMG Hamiltonian is \[H_{cl}=-2hj\!+\!h(P^{2}\!+\!Q^{2})-(\gamma P^{2}\!+\!Q^{2})\left(1\!-\!\frac{P^{2}\!+\!Q^{2}}{4j}\right).\label{LipkinClassQP}\] In Fig. [\[FigPhase\]](#FigPhase){reference-type="ref" reference="FigPhase"}, we show the level curves of the classical Hamiltonian \(H_{cl}\) in terms of the \((Q,P)\) coordinates for the two different phases of the model. Once the mean field Hamiltonian \(H_{cl}\) is constructed with the coherent states, the analysis is purely classical in terms of fixed points and their stability. This highlights the importance of the classical methods for quantum systems. ### **Metrics for the symmetric phase** We first consider the symmetric phase. The quadratic Hamiltonian associated to ([\[LipkinClassQP\]](#LipkinClassQP){reference-type="ref" reference="LipkinClassQP"}) is \[H_{cl}\simeq-2hj+(h-\gamma)P^{2}+(h-1)Q^{2}.\label{Hsymm}\] Notice that when \(Q=P=0\), only the ground state energy of the symmetric phase, \(E_{g}=-2hj\), survives. We need to express the deformation functions ([\[defLipkin\]](#defLipkin){reference-type="ref" reference="defLipkin"}) in terms of initial action-angle variables and time. To do this, we find the solution to the equations of motion of ([\[Hsymm\]](#Hsymm){reference-type="ref" reference="Hsymm"}), which are where we have identified the frequency as \(\omega=~\sqrt{(h-1)(h-\gamma)}\). From here, we readily find the action-angle variables \((\phi_{0},I)\) and write the initial conditions in terms of them as \[Q_{0}=\sqrt{\frac{2I\sqrt{h-\gamma}}{\sqrt{h-1}}}\,\sin\phi_{0},\,\,\,\,\,\,\,P_{0}=\sqrt{\frac{2I\sqrt{h-1}}{\sqrt{h-\gamma}}}\,\cos\phi_{0}.\label{initc}\] We substitute ([\[initc\]](#initc){reference-type="ref" reference="initc"}) in ([\[solLipkin\]](#solLipkin){reference-type="ref" reference="solLipkin"}) and use ([\[classDef\]](#classDef){reference-type="ref" reference="classDef"}) with the deformation functions ([\[defLipkin\]](#defLipkin){reference-type="ref" reference="defLipkin"}) to find the classical metric. The resulting metric components are We see that at the QPT, \(h=1\), the components \(g_{11}\) and \(g_{12}\) diverge. Nevertheless, we can also note that the determinant of the classical metric is zero. Now, to compute the QMT in the thermodynamic limit, we use the Hamiltonian ([\[HLipkin\]](#HLipkin){reference-type="ref" reference="HLipkin"}) which leads to the quantum deformation operators Recall that when \(j\rightarrow\infty\), the truncated Holstein-Primakoff transformation allows us to cast the angular momentum operators in the \((\hat{Q},\hat{P})\) representation, as suggested by Eq. ([\[QyP\]](#QyP){reference-type="ref" reference="QyP"}). Thus, the quantum deformation operators read as We express them in terms of creation and annihilation operators and time, and read off the spectrum from the effective quadratic Hamiltonian ([\[quantQP\]](#quantQP){reference-type="ref" reference="quantQP"}). This information is then substituted into Eq. ([\[qmetric\]](#qmetric){reference-type="ref" reference="qmetric"}), which yields the following metric components of the QMT: This QMT has already been obtained in Ref.  by using another method. Hence, we corroborate it with our approach. We also see that its determinant is zero, which was noted in the same reference and implies that information geometry is ill defined in the symmetric phase of this model. Comparing Eqs. ([\[classMetricSym\]](#classMetricSym){reference-type="ref" reference="classMetricSym"}) and ([\[QuantMetricSym\]](#QuantMetricSym){reference-type="ref" reference="QuantMetricSym"}), it is easy to see that the classical and quantum results have exactly the same parameter dependence and that the classical metric reproduces the singularities of the QMT. Moreover, both metrics match perfectly if the identification \(I^{2}=1\) is made. This is a remarkable result, because through a classical procedure, like the parametrization of the canonical coordinates \((Q,P)\) in terms of action-angle variables \[see Eq. ([\[initc\]](#initc){reference-type="ref" reference="initc"})\] and the classical torus average ([\[classAv\]](#classAv){reference-type="ref" reference="classAv"}), we have been able to obtain the quantum result. ### **Metrics for the broken phase** For the broken phase, the classical Hamiltonian is obtained by taking the expectation value of Eq. ([\[Hbroken\]](#Hbroken){reference-type="ref" reference="Hbroken"}) in spin coherent states \(|z\rangle\), which leads to \[\begin{aligned} H_{cl}^{\prime}= &-j(1+h^{2})+(1-\gamma)P^{2}+(1-h^{2})Q^{2} \nonumber \\ & +\frac{h}{\sqrt{j}}\sqrt{1-h^{2}}Q(P^{2}+Q^{2})\sqrt{1-\frac{P^{2}+Q^{2}}{4j}} \nonumber \\ & +\frac{1}{4j}(P^{2}\!+\!Q^{2})\left[\gamma P^{2}\!+\!h^{2}Q^{2}\!-(1\!-\!h^{2})(P^{2}\!+\!Q^{2})\right].\label{Hclassrot} \end{aligned}\] The quadratic approximation of this Hamiltonian is given by \[H_{cl}^{\prime}\simeq-j(1+h^{2})+(1-\gamma)P^{2}+(1-h^{2})Q^{2}.\] In this case, the evaluation of \(H_{cl}^{\prime}\) at \(Q=P=0\) yields the broken phase ground state \(E_{g}=-j(1+h^{2})\). The deformation functions are the same as those of ([\[defLipkin\]](#defLipkin){reference-type="ref" reference="defLipkin"}); however, they must be expressed in terms of rotated quantities, in which case they take the following form: From here, we move to the position-momentum representation through the transformation ([\[transfQPLipkin\]](#transfQPLipkin){reference-type="ref" reference="transfQPLipkin"}) and find that the deformation functions are Then, we use ([\[solLipkin\]](#solLipkin){reference-type="ref" reference="solLipkin"}) and ([\[initc\]](#initc){reference-type="ref" reference="initc"}), and substitute ([\[defbroken\]](#defbroken){reference-type="ref" reference="defbroken"}) into ([\[classDef\]](#classDef){reference-type="ref" reference="classDef"}), which yields the components of the classical metric As for the QMT in the broken phase, we use the deformation operators ([\[QdefSym\]](#QdefSym){reference-type="ref" reference="QdefSym"}), rewrite them in terms of the rotated angular momenta ([\[rot\]](#rot){reference-type="ref" reference="rot"}), and use the truncated Holstein-Primakoff transformation ([\[QyP\]](#QyP){reference-type="ref" reference="QyP"}) to compute the metric. The resulting QMT is It is remarkable that both classical and quantum metrics have the exactly same parameter structure and perfectly match using the identifications of the action variables. In contrast to the symmetric phase, both metrics are now invertible and have the determinants which at the critical point \(h=1\) diverge. This is a further result since Ref.  did not analyze the broken phase of the model. Thus, we have found that the broken phase has a well-defined metric structure that allows a further geometric characterization with the aid of the scalar curvature. Furthermore, we see once more that the classical metric contains the whole information that can be extracted from the QMT, with the advantage that it is simpler to compute. The scalar curvature for either of these two metrics can be computed with Eq. ([\[defscalar\]](#defscalar){reference-type="ref" reference="defscalar"}), which yields \[R=-4+\frac{7h^{4}-(9\gamma-2)h^{2}-4(1-\gamma)}{j\sqrt{(1-h^{2})(1-\gamma)^{3}}}.\label{RLip}\] From this expression, we observe that for large values of \(j\) (as is expected in the thermodynamic limit), the scalar curvature practically takes on the constant value \(-4\), and that it diverges at \(h=1\), which indicates the presence of the QPT. It is interesting to observe that the metric's singularity is independent of the coordinate system for this phase since it also appears in the scalar curvature which is a geometric invariant . ### **Numerical analysis for finite \(j\)** We now want to address the effects of having a finite \(j\) directly and without resorting to any approximations. This will help us delve into the nature of the singularities of the QMT and the scalar curvature, and deduce whether they are effects of the truncated Holstein-Primakoff transformation or are intrinsic to the system. It is worth mentioning that, to our knowledge, the numerical computation of the scalar curvature for the LMG has not been carried out previously. The Hamiltonian ([\[HLipkin\]](#HLipkin){reference-type="ref" reference="HLipkin"}) can be numerically diagonalized, which will give us in turn the differences between the classical metric \[Eqs. ([\[classMetricSym\]](#classMetricSym){reference-type="ref" reference="classMetricSym"}) and ([\[classMetricBroken\]](#classMetricBroken){reference-type="ref" reference="classMetricBroken"})\] with the QMT for a given value of \(j\). We obtain the numerical results by employing the so-called perturbative form of the QMT, which reads as \[g_{ij}^{(0)}(x)=\sum_{n\neq0}\frac{\langle0|\hat{{\cal O}}_{i}|n\rangle\langle n|\hat{{\cal O}}_{j}|0\rangle}{(E_{n}-E_{0})^{2}}.\label{QMTpert}\] The evaluation of this formula requires time-independent deformation operators, as opposed to Eq. ([\[qmetric\]](#qmetric){reference-type="ref" reference="qmetric"}), but at the cost of summing over all the elements of the eigenspace of \(\hat{H}\) (for details, see ). We begin by comparing, in Figs. [4(a)--4(c)](#FigMetric_vs), the classical (or quantum) metric in the thermodynamic limit[^1] with the exact QMT \[obtained through ([\[QMTpert\]](#QMTpert){reference-type="ref" reference="QMTpert"})\] for \(j=500\) and \(\gamma=-0.5\). We see that the agreement between them is acceptable as long as we are not close to the QPT where the Holstein-Primakoff approximation fails . At the transition, the analytic metric components \(g_{11}\) and \(g_{12}\) show a divergence that is not present in their finite \(j\) counterparts coming from Eq. ([\[QMTpert\]](#QMTpert){reference-type="ref" reference="QMTpert"}). For the scalar curvature, we see in Fig. [4(d)](#FigMetric_vs) that the analytic plot has a divergence at \(h=1\), and that it does not exist in the region \(h>1\), which was expected from Eq. ([\[RLip\]](#RLip){reference-type="ref" reference="RLip"}). In Fig. [\[FigMetric_3D\]](#FigMetric_3D){reference-type="ref" reference="FigMetric_3D"}, we show the three components of the QMT for \(j=100\) and the scalar curvature obtained through numerical differentiation over a mesh in the parameter space. We see the appearance of peaks near \(h=1\), which we identify as the precursors of the QPT. This is most clearly seen in Fig. [\[FigMetric_js\]](#FigMetric_js){reference-type="ref" reference="FigMetric_js"}, where we show the QMT and its determinant for a fixed \(\gamma\) and different values of \(j\). We notice that the peaks of both the metric components and its determinant become narrower and get closer to \(h=1\) as \(j\) increases, which corroborates their identification as the precursors of the QPT. Actually, this suggests that for large values of \(j\) and \(h=1\), the exact QMT components \(g_{11}\) and \(g_{12}\) will have a singularity. On the other hand, \(g_{22}\) does not seem to have such a good agreement with its analytic counterpart near the QPT; this is because \(g_{22}\) \[see Eqs. ([\[classMetricSym\]](#classMetricSym){reference-type="ref" reference="classMetricSym"}) and ([\[classMetricBroken\]](#classMetricBroken){reference-type="ref" reference="classMetricBroken"})\] is not sensitive to the critical value \(h=1\), unlike the other components. Now, Fig. [6(d)](#FigMetric_js) helps us understand the behavior of the scalar curvature (see Fig. [\[FigR_js\]](#FigR_js){reference-type="ref" reference="FigR_js"}) when \(h>1\). The determinant falls rapidly to near-zero values just before the separatrix and maintains these values when \(h>1\). That is why we see in Figs. [\[FigR_js\]](#FigR_js){reference-type="ref" reference="FigR_js"} and [\[FigRder_js\]](#FigRder_js){reference-type="ref" reference="FigRder_js"} that the slope of the descending curve for \(h>1\) gets steeper as \(j\) increases. Thus, we expect that for large values of \(j\) and \(h=1\), the scalar curvature will be an almost vertical line that falls off to large negative values. The exhibited dissimilar behavior between the analytic and numerical results is a consequence of the failure of the Holstein-Primakoff truncation at \(h=1\), which causes the scalar curvature to diverge, in contrast to the smooth numerical curve. In Fig. [\[FigRder_js\]](#FigRder_js){reference-type="ref" reference="FigRder_js"}, we analyze in more detail the behavior of the derivative of \(R\) with respect to \(h\) evaluated at \(h=1\) as a function of \(j\) for \(\gamma=-0.5\). The function that fits the points is \[\frac{\partial R}{\partial h}\bigg{|}_{h=1}=-34.2-0.65 j.\] This equation clearly shows that the derivative of \(R\) goes to \(-\infty\) as \(j\to\infty\), confirming the behavior displayed in Fig. [\[FigR_js\]](#FigR_js){reference-type="ref" reference="FigR_js"}. Therefore, we infer that in the thermodynamic limit, the discontinuity of the scalar curvature (which is \(-4\) in the symmetric phase and does not exist in the broken phase) is the cause of the singularity in the derivative at the QPT. In another work , we explore a modified LMG model that has an invertible metric in both phases and makes this point clearer, showing without doubt that the scalar curvature is discontinuous at the QPT in the thermodynamic limit, which causes the divergence in its derivative there. Having studied the slope of \(R\) at the QPT, we analyze in the next section the behavior of the QMT and its scalar curvature in terms of the maxima and minima that they display. ### **Peak analysis** To better understand the behavior of numerical QMT and its scalar curvature for finite \(j\), we close this section with an analysis of their peaks. In Fig. [\[FigPeaks_h\]](#FigPeaks_h){reference-type="ref" reference="FigPeaks_h"}, we plot the height of the peaks of the exact QMT components as a function of \(h\) while we fix \(\gamma=-0.5\). The curves that interpolate the points have the following form: (i) \(g_{11}\) peak: \[\label{g11peak} g_{11}^{\rm(peak)}=-22.5317+\frac{1.5333}{(h-1)^2}.\] (ii) \(g_{12}\) peaks: \(iii\) \(g_{22}\) peaks: From the functions ([\[g11peak\]](#g11peak){reference-type="ref" reference="g11peak"}) and  ([\[g12peaks\]](#g12peaks){reference-type="ref" reference="g12peaks"}), it is clear that in the limits \(h=1\) and \(j\rightarrow\infty\) the QMT components \(g_{11}\) and \(g_{12}\) exhibit a divergent behavior, which is in accordance with the corresponding classical (or quantum) metric components in the thermodynamic limit. In Fig. [\[FigPeaks_j\]](#FigPeaks_j){reference-type="ref" reference="FigPeaks_j"}, we plot the height of the peaks as a function of \(j\) for \(\gamma=-0.5\). A linear relation between these quantities is evident when using a log-log scale. The function we use to fit the points is \[\ln(g_{ij}^{\rm(peak)})=m \ln(j)+n,\label{logFunction}\] where the parameters \(m\) and \(n\) are shown in Table [1](#Table){reference-type="ref" reference="Table"} for every peak. Notice that we reproduce the value \(m\approx 1.3\) for the metric component \(g_{11}\) that was obtained in . In addition to this, we analyze the other components, finding that the sum of the \(m\) values for the two peaks of \(g_{12}\) is \(1.3142\), which a similar result to that of the \(g_{11}\) component. This is because \(g_{12}\) has mixed information about the parameters \(h\) and \(\gamma\). Accordingly, the \(m\) values of \(g_{22}\) do not relate with those of the other components. whereas for the maxima they are At \(h=1\), where the QPT appears in the thermodynamic limit, the first peak of \(R\) takes the value of \(-4.631\) when \(\gamma=-0.5\) and \(-4.630\) when \(\gamma=-0.1\), whereas the second peak goes to \(-0.370\) when \(\gamma=-0.5\) and to \(-0.371\) when \(\gamma=-0.1\). The value of the first peak in both cases is very close to the one predicted by the truncated Holstein-Primakoff approximation. Also, notice that at \(h=1\), the minima for the two different values of \(\gamma\) are similar, which is also the case for the maxima. This is seen in Fig. [\[FigPeaksR_h\]](#FigPeaksR_h){reference-type="ref" reference="FigPeaksR_h"}, where both lines intersect. If we now analyze the value of the peaks as a function of \(j\), we can fit the data for the minima as follows: For the maxima, the functions take the form We show in Fig. [\[FigPeaksR_j\]](#FigPeaksR_j){reference-type="ref" reference="FigPeaksR_j"} the behavior of the two peaks of \(R\) as a function of \(j\) when \(\gamma=-0.5\) and \(-0.1\). Two main features are seen. First, the minimum (peak 1) grows as \(j\) increases and the maximum (peak 2) decreases with \(j\). Second, the functions ([\[Rpeak1j\]](#Rpeak1j){reference-type="ref" reference="Rpeak1j"}) reveal that the minimum reaches a value around \(-4.6\) when \(j\rightarrow\infty\), whereas the maximum ([\[Rpeak2j\]](#Rpeak2j){reference-type="ref" reference="Rpeak2j"}) goes to \(-0.36\). This means that both peaks persist in the thermodynamic limit, which is also consistent with Eqs. ([\[Rpeak1h\]](#Rpeak1h){reference-type="ref" reference="Rpeak1h"}) and ([\[Rpeak2h\]](#Rpeak2h){reference-type="ref" reference="Rpeak2h"}), since the limits \(h=1\) and \(j\rightarrow\infty\) in both sets of equations predict the same results. Therefore, although the scalar curvature is smooth near the QPT, its peaks serve as precursors of the phase transition for finite \(j\). Furthermore, in contrast to the QMT which is singular at the QPT in the thermodynamic limit, the scalar curvature is discontinuous there. A final comment can be made regarding the change of sign in the maximum of \(R\). Solving the condition \(R^{(\rm peak\,2)}=0\) yields the value of \(j\) for which the maximum is zero. For \(\gamma=-0.5\) this value is \(j=25\), while for \(\gamma=-0.1\) the result is \(j=35\). This indicates a local change in the geometry of the parameter space, i.e., a change in curvature from spherical type to hyperbolic type, although we do not attribute any special interpretation to those values of \(j\). # Conclusions[\[sec:Conclusions\]]{#sec:Conclusions label="sec:Conclusions"} We studied in this paper the classical analog of the QMT and its scalar curvature for the Dicke and LMG models. Our results confirm that the classical torus average reproduces all or almost all the parameters' structure of the QMT. In the Dicke model, we considered the thermodynamic limit under the truncated Holstein-Primakoff approximation and showed that the classical metric and its scalar curvature have similar behavior as their quantum counterparts near the QPT. The classical metric was obtained in this case, and the QMT was corroborated under our time-dependent deformation functions approach. Also, the resonance condition was analyzed, and a divergence in the scalar curvature was found, as opposed to the nonresonant case; here, too, both the classical and quantum scalars diverge in the same manner. In the LMG model, our analysis consisted of two main parts. First, we calculated the classical metric and the QMT in the thermodynamic limit and showed that they are identical, modulo a quantization rule for action variables. Second, we computed the QMT for finite \(j\) and compared it with the analytic counterpart, resulting in a remarkable agreement except near the QPT, where the truncated Holstein-Primakoff transformation is not valid anymore. In Ref. , the authors found the fidelity susceptibility related to the parameter \(h\). However, we contributed by exploring the parameter \(\gamma\) through the other two components of the QMT and closed the geometric study with the analytic and numerical computation of the scalar curvature, which had not been performed for this model. The numerical results showed that both the QMT and the scalar curvature are smooth for finite \(j\). The numerical analysis was further expanded by describing the peaks of the metric components and the scalar curvature near the critical region, which provided us with one last crucial result: the maxima's and minima's dependence on \(h\) and \(j\). This analysis showed that the peaks of the QMT as well as of the scalar curvature are the QPT precursors for finite \(j\). Furthermore, the extrapolation to \(j\rightarrow\infty\) showed that the QMT is singular at the QPT and that *the scalar curvature is discontinuous there*. For the Dicke model, the classical metric's behavior is the same as the quantum one near the QPT, and the scalar curvature has the same value there regardless of the presence of an anomaly. Remarkably, the effect of the anomaly is not that relevant near the QPT. This is worth pointing out since through a renormalization procedure in the critical region, the thermodynamic limit results can provide information regarding the scaling properties for finite \(j\) and help classify the models in universality classes . All these features support our claim that the classical metric can give a preliminary or even a complete idea of the quantum result. The use of the classical metric opens the way to extend our present work. For instance, we could study the quantum Dicke Hamiltonian for finite \(j\) ([\[Dickeoriginal\]](#Dickeoriginal){reference-type="ref" reference="Dickeoriginal"}), and compare the results with those obtained here. Furthermore, we could go deeper into the classical setting and explore the full mean-field Dicke Hamiltonian constructed with coherent states, which is far more involved and may even contain chaotic dynamics (see Refs. ). A first way to proceed would be to carry out a classical perturbative analysis as in Ref.  to find corrections to the quadratic approximation in the thermodynamic limit and compare the results with their quantum counterpart . Besides, the chaotic region could be approached by studying the adiabatic gauge potential (which is deeply related to the QMT) since it has been found recently that it serves as a sensitive measure of quantum chaos . In this regard, the classical metric may also be of interest to study quantum scarring in the Dicke model . A different perspective in the study of quantum systems can also be addressed. We could use the Wigner function formulation of the QMT  to study a variety of many-body systems and see whether it provides a deeper insight not only into the QPTs, which refer to the ground state, but also into excited-state quantum phase transitions (ESQPTs) . Additionally, the Wigner function formalism may shed some light on the semiclassical approximation and help clarify the anomalies' role that accounts for the difference between the classical and quantum results. Furthermore, the full mean-field LMG Hamiltonian ([\[LipkinClassQP\]](#LipkinClassQP){reference-type="ref" reference="LipkinClassQP"}) could be addressed and establish the similarities and differences with the truncated results of the Holstein-Primakoff transformation. Of course, the exploration of the classical metric, the QMT, and their scalar curvature for plenty other models from quantum optics and condensed matter can be carried out, and hopefully, the results will provide us with a geometric picture that will allow a deeper understanding of the dynamics of these systems. Moreover, it will be interesting to compute quantum, and classical metrics in the case of Weyl and Dirac semimetals and observe if the classical metric can detect the chiral anomalies. D. Gutiérrez-Ruiz is supported by a CONACyT Ph.D. Scholarship No. 332577. D. Gonzalez was partially supported by a DGAPA-UNAM postdoctoral fellowship and by Consejo Nacional de Ciencia y Tecnología (CONACyT), México, Grant No. A1-S-7701. This work was partially supported by DGAPA-PAPIIT Grant No. IN103919. [^1]: Recall that the classical and quantum metrics yield the same result in the thermodynamic limit.
{'timestamp': '2021-07-14T02:05:48', 'yymm': '2107', 'arxiv_id': '2107.05758', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05758'}
# Introduction The nightside auroral zone ionosphere has long been a subject of study, being a region of dynamic current structures which interconnect with the inner magnetosphere. During geomagnetically active periods, changing ionospheric currents occur in the auroral zone. Resulting geoelectric fields present a potential hazard: the excitation of geomagnetically induced currents (GIC) in conducting infrastructure such as power transmission networks and pipelines. The relatively low frequency of GIC variations, compared to the operating frequency of the power transmission network, means GIC can produce a quasi-DC voltage bias of transformers. This can saturate the core of the transformer, producing harmonic distortion of the transformer voltage. For auroral zone power infrastructure, substorms, pulsations, and horizontal geomagnetic perturbations constitute major drivers of geomagnetic activity which may cause power system disruption. It is possible that large impulsive magnetic events may act as another source of GIC. If these events were to have a prominent vertical component, Faraday's Law would indicate that the resultant large vertical magnetic flux changes produced from these events should induce similarly large horizontal geoelectric fields. Commonly, when modeling geoelectric fields based on ground magnetometer measurements, \(B_z\) measurements are neglected, using the plane-wave assumption. We present a statistical study including the occurrence of \(B_z\) impulsive events and their relation to GIC. Harmonic distortion (HD) is often used as an indicator of the stress applied to a power transmission network due to GIC. GIC in transformers within a power transmission network have a spectral content with frequencies much lower than the normal 60 Hz operating frequency of the network. Therefore they can be approximated as quasi-DC currents. Transformer cores within a network may become partially saturated due to the introduction of GIC, resulting in distortion of the AC signal. This can be quantified as HD. The Hydro-Québec network has been extensively instrumented to measure HD, which provides a continuous record of space weather impacts to the network. As a result, this study uses HD as an indicator of GIC-driven stress on the power transmission network. Previous statistical studies of impulsive geomagnetic events examined impulses measured on the dayside in the cusp regions. One study considered auroral-zone impulsive events but limited to horizontal geomagnetic perturbations. Some more recent studies have looked at impulsive geomagnetic perturbations on the nightside, but have principally focused on impulsive perturbations in the polar cap or in a storm context. This study seeks to characterize the latitudinal distribution of impulsive magnetic events, their diurnal distribution in magnetic local time (MLT), their amplitude, which component is dominant, and their relation to power network disturbances. We characterize these events in the aggregate and find that most geoeffective events are associated with vertical disturbances. # Materials and Methods ## Source Data We analyze data from two sources: ground-based magnetometers and synchrophasor measurements of voltage distortion at substation transformers. The region of interest for the study is shown in Figure [\[map\]](#map){reference-type="ref" reference="map"}. The fluxgate magnetometers used in this study were of the same design used by Time History of Events and Macroscale Interactions during Substorms (THEMIS) ground-based observatories (GBO). Magnetic field data is from selected stations in the Athabasca University THEMIS UCLA Magnetometer Network eXpansion (AUTUMNX) ranging from subauroral to polar cap regions. AUTUMNX stations in this study were Radisson (RADI, 63.25\(^\circ\) geomagnetic latitude), Kuujjuarapik (KJPK, 64.73\(^\circ\)), Inukjuak (INUK, 67.92\(^\circ\)), and Salluit (SALU, 71.71\(^\circ\)). Corrected Geomagnetic latitudes for these stations were determined by. The magnetometers are located along a longitudinal chain at an MLT where midnight is at 5 UT. Magnetometer data was collected and stored at a 2 Hz cadence, in north (X) west to east (Y), and positive downward vertical (Z) components. Data from the AUTUMNX network has been analyzed from January 1, 2015 through June 30, 2020. Hydro-Québec total harmonic distortion data from June 2014 through May 2017 was collected on a 4 s cadence from automatically selected periods of elevated disturbance identified by Hydro-Québec. This is measured using Hydro-Québec's Système de Mesure de Décalage Angulaire (SMDA) synchrophasor measurement system. Total harmonic distortion is a measure of the voltage distortion at the substation transformer. These are archived when even-harmonic distortion (EHD) of voltages at designated substation transformers throughout the Hydro-Québec network exceeds substation-specific thresholds. This triggers the recording of high-resolution HD data for a period of approximately 30 minutes. The start time of SMDA data collection serves as the event time used. EHD was collected at a 1 Hz cadence, and is defined by Hydro-Québec as: \(V_n\) corresponds to the amplitude of the \(n\)th harmonic of voltage at the fundamental 60 Hz operating frequency, \(V_f\). Odd harmonic distortion information was not used in the analysis due to a lack of availability. While the high-resolution HD data is available only on a limited and activity-triggered basis, lower resolution EHD data is available on a continuous basis. The EHD data is a continuous time series from 2015-2019, collected from the Tilly substation (about 5\(^\circ\) south of Inukjuak) as seen in Figure [\[map\]](#map){reference-type="ref" reference="map"}. ## Geomagnetic Extremum Identification {#extremum} We designed an algorithm to select for geomagnetic perturbations which were short in duration (minutes), large in amplitude (100s of nT), and non-periodic. This led to a set of criteria similar to those used by, as detailed in Figure [\[flowsel\]](#flowsel){reference-type="ref" reference="flowsel"}. While large impulsive magnetic events are associated with large \(dB/dt\), these are distinguished from monotonic decreases or increases in the field by an extremum. \(dB/dt\) calculated from field measurements at the extremum will be small in magnitude, reflecting the flat-topped characteristic of impulsive events. As an initial selection criterion to identify local extrema, a low \(dB/dt\) threshold was used. Subsequent removal of all but the largest and smallest values from five-minute windows in the data set was used to identify the largest magnitude impulsive events in the window. A 200 nT offset of the median values of 4-minute windows on both sides of the extrema was chosen. This selects for large perturbations which may result in the induction of significant GIC. Impulsive events are sorted into positive or negative events by their relation to the median component values in the four minutes preceding and following the extremum. Examples of events which do and do not meet the selection criteria can be found in Annex A. The power spectral density was determined from a two-hour window (14400 points) around the event, which is mean-subtracted with a Hanning (weighted cosine) window applied: \(w(n)\) defines the windowing function which the time-series data is multiplied element-wise by, \(n\) is the index number, and \(M\) is the size of the window. Events with missing data were not used in the analysis. For each event, the power spectrum was calculated using a discrete Fourier transform implemented using a fast Fourier transform algorithm. The power content in the \(<\) 1.5 mHz range was compared to the 1.5-16.7 mHz range, and events where more power was contained in the higher frequency range were discarded. This principally removes pulsation events with periodicities similar to the 8-minute selection window, as well as candidate events which are the result of instrumentation issues. The last step in computer-identification of events was to check that the \(dB/dt\) in the 10 minute window immediately preceding and following the candidate event has the correct magnitude and sign for an impulsive event of its identified polarity. This removes events which may have local component extrema but are not characterized by sudden changes. Finally, candidates are examined by eye to remove any events characteristic of instrumentation faults. This step also removes any events or variations which are insignificant when compared with proximate geomagnetic activity. This step results in a relatively small number of candidate events being rejected: in the case of the Inukjuak magnetometer, only 69 of 996 total events. Similar human interventions have been deemed necessary in previous impulsive event statistical studies. While the selection algorithm takes inspiration from, the selection criteria have been modified so as to select for similar but distinct types of magnetic perturbations. Principal differences include the larger and more selective magnetic component deflection threshold, and the use of spectral power content as a filter. Most notably, our analysis allows for events occurring in a single geomagnetic field component. This broadens our analysis as compared to that of, allowing for comparison of the relative prevalence of horizontal and vertical impulsive events. # Analysis ## Diurnal Variations Patterns in the occurrence of impulsive events were identified by constructing histograms using event magnitude and MLT hourly bins. Diurnal variations and the magnitude distribution of magnetic impulsive events for the field components at Inukjuak, Québec are seen in Figure [\[todplotINUK\]](#todplotINUK){reference-type="ref" reference="todplotINUK"}. This auroral-zone magnetometer shows a distinct peak in occurrence of impulses in all components in the pre-midnight and morning sectors. The rate of occurrence and magnitude of \(B_z\) perturbations are significantly higher than those of other components. The diurnal distribution of impulsive events for magnetometer sites from sub-auroral through polar-cap latitudes can be seen in Figure [\[todplots\]](#todplots){reference-type="ref" reference="todplots"}. The total number of \(B_z\) events for each magnetometer can be seen in gray in panels a-d. High rates of occurrence of impulsive \(B_z\) perturbations are narrowly latitudinally localized. As seen in panel f of Figure [\[todplots\]](#todplots){reference-type="ref" reference="todplots"}, an extended tail of large magnitude impulsive events is evident at Inukjuak, which also experienced by far the most \(B_z\) impulsive events. The magnitude of these impulses is significantly larger than those in similar previous studies. The largest impulsive events see an 8-minute range in excess of 1000 nT in the vertical component. The 8-minute range is defined analogously to the hourly range of one geomagnetic component, for one magnetometer. Perturbations in multiple components were seen for many events, though usually not of a magnitude to qualify as simultaneous impulsive events in multiple components. For example, only 38 of 436 negative \(B_z\) impulsive events at Inukjuak had coincident impulsive events in another component. It is of interest to power network operators to know at what local times heightened levels of HD are prevalent in their networks. The diurnal distribution of heightened HD within a power transmission network may also provide insight into potential drivers of HD and related GIC. Figure [\[SMDA-start\]](#SMDA-start){reference-type="ref" reference="SMDA-start"} shows the local-time distribution of EHD threshold triggered HD events in the Hydro-Québec network, which occur predominantly on the nightside. Peaks are seen around midnight and in the morning sector around 5 MLT. Substorm activity has been previously found to predominantly occur near midnight. The diurnal pattern of heightened HD activity is consistent with both substorm-driven and impulse-driven GIC. It is expected that the diurnal distribution of HD will be somewhat broader in MLT than that in magnetic data from the AUTUMNX meridian alone due to the longitudinal extent of the power network substations whose HD levels were monitored. We now directly compare HD levels occurring around these impulsive events with periods of similar global electrojet activity, as indicated by electrojet indices. ## Superposed Epoch Analysis We now look at the geoeffectiveness of the impulsive vertical events. Some events in Figure [\[todplots\]](#todplots){reference-type="ref" reference="todplots"} appear to be substorm associated, and we would like to minimize the number of this type of event in our comparison analysis. Intensification of the westward auroral electrojet will result in a positive vertical magnetic component perturbation detectable to the north, and a negative perturbation to the south. For an intensified westward electrojet one would expect a downward perturbation to the vertical component to the north, and upward (negative \(B_z\)) to the south. This tendency can be seen in the increased number of positive \(B_z\) perturbations in the pre-midnight sector at Salluit, and negative \(B_z\) perturbations in the pre-midnight sector at Kuujjuarapik. Inukjuak's auroral latitude means that it is more often closer to the latitude of the electrojet. As a result, it should experience less frequent latitudinally offset electrojet enhancements which would produce \(B_z\) perturbations than sites to its north or south. Without introducing additional selection criteria, using Inukjuak geomagnetic field data will minimize the number of substorm-related events we use in our analysis. Further, to select for unusually large impulses we have taken the fifty largest negative \(B_z\) impulsive events at Inukjuak. Superposed epoch analysis for two hour windows around the negative \(B_z\) events selected can be seen in Figure [\[superposed\]](#superposed){reference-type="ref" reference="superposed"}. Median component values in bold black in panels a-c for separate geomagnetic components demonstrate some average variation in the horizontal geomagnetic field (a,b), but vertical perturbations (c) are much larger. Considerable individual event variability in all components can also be seen. Averaged EHD data from the Tilly substation are found in panels e and k of Figure [\[superposed\]](#superposed){reference-type="ref" reference="superposed"}. This EHD data is taken from the continuous EHD record, rather than the event-limited HD data used for Figure [\[SMDA-start\]](#SMDA-start){reference-type="ref" reference="SMDA-start"}. Median EHD response (e) indicates increased geoeffectiveness of negative \(B_z\) impulsive events, though individual events (d) do evidence variability in response. SuperMAG auroral indices SML and SMU (analogous to AL and AU) indicate some strengthening of the westward electrojet prior to the impulsive events, corresponding with a slight median decrease in the SML index. Panels g-l of Figure [\[superposed\]](#superposed){reference-type="ref" reference="superposed"} shows data from randomly selected periods with SME values within 20 nT of the SME level at the impulsive event, for the same magnetometer and substation transformer. No median deviations in EHD response are seen for periods with equivalent SME in panel k. This provides evidence for the locality of these vertical impulsive events. Electrojet indices reflect the development of substorm phenomena, but do not well capture the magnitude of local geomagnetic variability associated with these impulsive events. # Discussion We have presented evidence of regularly occurring auroral-zone impulsive events. These are principally, though not solely, vertical in nature, and almost entirely found on the nightside. They appear to be localized in latitudinal occurrence and are principally negative \(B_z\) perturbations. The locality and latitudes of occurrence indicate that this is an ionospheric auroral electrojet-related phenomenon. The vertical nature of the disturbances is evidence of vortical or anti-parallel directed ionospheric currents, which are also short-lived in duration, due to the impulsive nature of the \(B_z\) perturbations. determined a possible vortical Hall current system driven by field-aligned currents (FAC) that would produce a vertical geomagnetic perturbation. The magnitude of the impulsive events in the present study are larger, with most impulsive \(B_z\) events occurring at auroral zone latitudes, but the proposed ionospheric current system is consistent with our observations. Traveling convection vortices (TCV) have been previously observed in ionosphere. Evidence has also been found of TCVs which are geoeffective. However, TCVs occur near the dayside with stronger periodicities than we select for. Some \(B_z\) impulsive events seen in Figure [\[todplots\]](#todplots){reference-type="ref" reference="todplots"}, particularly those in Salluit and Radisson, are likely signatures of substorm electrojet enhancement rather than ionospheric vorticity, though this is less true of the largest \(B_z\) impulses seen at Inukjuak. It may be surmised through both the auroral latitude and pre-midnight peak occurrence of these impulsive negative \(B_z\) events that they could be associated with the Harang reversal. This location, where equatorward of the eastward electrojet the westward electrojet can be found provides a potential source of current vorticity. However, the largest \(B_z\) impulses are both larger in amplitude and shorter in duration than previous ground-based magnetometer observations of the Harang reversal. An impulsive intensification of eastward and westward convection electrojets could provide a mechanism to intensify the transient \(B_z\) signature associated with the Harang reversal. While reduction of SML (and enhancement of the westward electrojet) is evident in panel f of Figure [\[superposed\]](#superposed){reference-type="ref" reference="superposed"}, the enhancement of the eastward electrojet as indicated by an increase in SMU is relatively small. Counter-clockwise vortices have also been previously associated with strengthening Region 2 upward FAC in the proximity of the Harang reversal, through combined Poker Flat Incoherent Scatter Radar (PFISR) and THEMIS GBO all-sky imager (ASI) observations of substorm events. It is unsurprising that GIC-driven HD events in high latitude sub-auroral power transmission infrastructure would predominantly occur on the nightside around midnight, proximate to the peak of substorm occurrence. However, we have additionally found evidence of median increases in nearby substation transformer HD levels during vertical impulsive events, even when compared with periods with similar SME. The geographic distance between the substation and magnetometer suggests that these impulsive events are localized phenomena, and that their resultant geoelectric fields may be distributed on a scale of 100s of kilometers. That these impulsive events have ground magnetic signatures which are predominantly vertical in nature, regularly occur, exhibit similar diurnal variations to those of geomagnetically-driven HD events, and are found to excite larger median harmonic distortion responses from nearby substation transformers than periods with equivalent electrojet indices. This indicates that these are events of operational interest to power transmission infrastructure operators at auroral and high-latitude sub-auroral latitudes. Additionally, geoelectric field models which neglect vertical geomagnetic perturbations may systematically under-represent the magnitude of GIC which such impulsive events may produce. # Conclusions We present evidence that there are regularly occurring vertical impulsive events in the geomagnetic field at auroral zone latitudes. These events predominantly occur on the nightside in the pre-midnight sector. They exist for minutes in duration and are large in magnitude, with many vertical component perturbations in excess of 1000 nT. A possible driving mechanism of these events is transient ionospheric current vorticity associated with the auroral electrojet. Superposed epoch analysis suggest they occur coincidentally with heightened levels of HD in high-latitude sub-auroral substation transformers, and so present a potential source of space weather disruption in high latitude sub-auroral and auroral zone ground-based infrastructure. The demonstrated presence and geoeffectiveness of these vertical impulsive events presents a space weather hazard to auroral-zone and high-latitude sub-auroral power transmission networks. This emphasizes the need for improved three-dimensional geoelectric field models, as the extent of the space weather hazard posed by vertical impulsive geomagnetic events may not be captured by geoelectric field models which neglect the vertical component of the geomagnetic field.
{'timestamp': '2021-07-14T02:01:08', 'yymm': '2107', 'arxiv_id': '2107.05665', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05665'}
# Introduction Scholarly Knowledge graphs are knowledge bases for representing scholarly knowledge . Faceted search is a method that augments traditional search systems with a faceted exploration system, allowing users to narrow down search results by applying multiple filters based on the classification of the properties . A faceted classification system lists each knowledge component along various dimensions, called facets, facilitating the classifications to be reached and managed in multiple forms. Although faceted search is exceptionally beneficial for knowledge retrieval, search engines have not used it for the scholarly literature. Google Scholar is a well-known example: Despite its vast database, it has facets just on the date and, thus, limited support for refining queries. The next section briefly describes how implementing a faceted search over scholarly knowledge supports granular refinement of search queries. # Approach We implemented our faceted search system on top of Open Research Knowledge Graph (ORKG) Comparisons. The ORKG[^1] is an online service that represents research contributions (papers) in the form of an interconnected knowledge graph  and enables the generation of tabular representations of contributions as comparisons, which is the main focus of our system. The data about each paper is defined in properties that each one has a predefined template. These templates support the dynamic and automated construction of facets for ORKG comparisons. Facets work on different types of data throughout comparisons. For String properties (i.e., properties that have strings for values), a user can select one or more values among all. This is also supported by an auto-complete feature to help find candidate options. For numerical data, users may not only want to filter by a distinct value but also by a range. Hence, different operators can be selected for the filtering process, specifically greater or smaller than a specific amount. Furthermore, a user can exclude values. Similarly, operators can be applied for values of type date. In addition to including or excluding a date, a duration can be selected as a valid filtering criterion. A date picker is activated on date properties so a user can easily select the date on a calendar. For example, papers that used a special method of research and got special value(s) in a specific duration of a particular location and so on, can easily be discovered. Our system is empowered by these dynamic facets, which are inferred automatically from the property type, and the facets that would be different for each comparison, in contrast to other search systems which use just a predefined set of static facets. depicts an example of the faceted search performed on a COVID-19 contribution comparison, which consists of 31 papers. When the filter icon is pressed, a dialogue box containing the relevant values for the property appears, thus enabling the user to choose some of the candidate values. When applying a filter, the colour of the filter icon is highlighted in red, and a tool-tip is displayed when hovering over the mentioned icon with the selected value(s). Additionally, all applied filters are indicated clearly on top of the table. The results are directly reflected on the screen. Furthermore, the system provides the opportunity to save these configurations and the subset of retrieved data as a new comparison to the database, with a permanent URL that can be shared with other researchers and users. We provide a link to the system to enable independent testing and investigation.[^2] # Challenges What made the problem of faceted search challenging are the following points: - Knowledge graphs are heterogeneous by nature. Different KGs have different structure. Thus, they are not compatible with a strict search system. Various schemas and APIs make the exploration of federated systems even harder. - Completeness matters. The more complete the database is, the more data would be discovered. Unfortunately, some well-structured systems suffer from a complete data source . - Specifically concerning the ORKG, each paper is related to one or more research fields. Therefore, Finding the appropriate facet according to the user's search expression is challenging. The code of the system is publicly available and documented on GitLab.[^3] # Conclusion Nowadays, knowledge graphs are central to the successful exploitation of knowledge available in the growing amount of digital data on the Web. Such technologies are essential to upgrade search systems from a keyword match to knowledge retrieval, which is vital for achieving the most relevant answer to a query, especially also in research. Despite remarkable gains by search portals, full-text scholarly search engines have remained ineffective. In this project, we implemented a faceted search system over a scholarly knowledge graph. To ease information retrieval, facets adapt to content. The more the knowledge graph is implemented in details, the search results would be more fine-grained. In future work, we will federate knowledge graphs to further improve dynamic faceted search. For instance, we intend to use GeoNames[^4] to enable spatial filtering on scholarly knowledge. [^1]: <https://gitlab.com/TIBHannover/orkg> [^2]: <https://www.orkg.org/orkg/comparisons> [^3]: <https://gitlab.com/TIBHannover/orkg/orkg-frontend> [^4]: <https://www.geonames.org/>
{'timestamp': '2021-07-14T02:04:47', 'yymm': '2107', 'arxiv_id': '2107.05738', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05738'}
# Abstract {#abstract .unnumbered} **The possibilities for inclusive diffraction in the Electron Ion Collider, EIC, in the US, are analyzed. We find that thanks to the excellent forward proton tagging, the EIC will be able to access a wider kinematical range of longitudinal momentum fraction and momentum transfer of the leading proton than at HERA. This opens up the possibility to measure subleading diffractive exchanges. The extended \(t\)-range would allow the precise extraction of 4-dimensional reduced cross section in diffraction. In addition, the varying beam energy setups at the EIC would allow for precise measurements of the longitudinal diffractive structure function.** # Introduction {#sec:intro} Diffraction in DIS, as observed at HERA, consists a large (\(\sim 10\%\)) fraction of all inclusive events in DIS, see the review and refs. therein. In these events the proton stays intact or dissociates into a state with the proton quantum numbers. The experimental signature of such events is a final proton registered in a far forward detector, and/or the presence of a large rapidity gap (LRG)---the former case corresponds to a coherent diffraction where the proton does not get diffractively excited. The hadronic structure of the \(t\)-channel exchange in these events has been measured at HERA, and parametrized by means of diffractive parton densities. In this presentation we discuss possibilities of measuring inclusive diffraction at EIC . We describe the physical picture behind the performed studies and briefly present the obtained results. For some more plots the reader is advised to consult the slides of the [talk](https://indico.bnl.gov/event/9726/contributions/47426/attachments/33770/54339/Slominski_DIS2021.pdf).
{'timestamp': '2022-03-08T02:13:21', 'yymm': '2107', 'arxiv_id': '2107.05737', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05737'}
# Introduction The recent dramatic growth of various branches of science has led to the necessity of the development of numerical optimization methods in spaces of large and extra-large dimensions. A special place in the modern optimization theory is given to gradient methods. Recently, there was introduced a new direction for the research, associated with the development of gradient-type methods for optimization problems with relatively smooth and relatively strongly convex functionals. Such methods are in high demand and urgent due to numerous theoretical and applied problems. For example, the D-optimal design problem is turned out to be relatively smooth. It is also quite interesting that in recent years there have appeared applications of these approaches (conditions of relative smoothness and strong convexity) to auxiliary problems for tensor methods for convex minimization problems of the second and higher orders. It is worth noting that it is tensor methods that make it possible to obtain optimal estimates of the rate of convergence of high-order methods for convex optimization problems. A few years ago there was introduced a generalization of the Lipschitz condition for nonsmooth problems, namely, relative Lipschitz continuity. The concept of relative Lipschitz continuity essentially generalizes the classical Lipschitz condition and covers quite important applied problems, including the problem of finding the common point of ellipsoids (IEP), as well as the support vector machine (SVM) for the binary classification problem. The concepts of relative smoothness, relative Lipschitz continuity, and relative strong convexity made it possible to significantly expand the limits of applicability of gradient type methods while preserving the optimal convergence rate \(O (\frac{1}{\varepsilon^2})\) for relatively Lipschitz problems and \(O(\frac{1}{\varepsilon})\) for relatively smooth problems (\(\varepsilon\), as usual, denotes the accuracy of the solution). The authors have shown that for the class of relatively smooth problems such an estimate for the rate of convergence cannot be improved in the general case. In this paper we consider the class of \((\alpha, L, \delta)\)-relatively smooth objective functionals (see Definition [\[defalphacont\]](#defalphacont){reference-type="ref" reference="defalphacont"}), which covers both the concept of relative smoothness and relative Lipschitz continuity. For the classical optimization problem \[\label{main} \min\limits_{x\in Q}f(x)\] we propose some analogues of the universal gradient method which automatically adjusts to the \"degree of relative smoothness\" of the \((\alpha, L, \delta)\)-relatively smooth problem (Sect. [12](#sect_univers){reference-type="ref" reference="sect_univers"}). We also consider the problem of minimizing the relatively strongly convex functionals in two directions. The first one is the applicability of the introduced methods and their convergence rate, the second one is the restarted version of the Mirror Descent method for the constrained optimization problem. In addition to the classical optimization problem, we consider the problem of solving Minty variational inequality with (\(M\)-)relatively bounded operator. For a given relatively bounded and monotone operator \(g:Q\rightarrow \mathbb{R}^n\), which satisfies \[\label{Rel_Boud} \langle g(x),x-y\rangle \leqslant M\sqrt{2V(y,x)} \quad \forall x,y \in Q,\] for some \(M>0\) (\(V(y, x)\) is a Bregman divergence, defined in [\[Bregman\]](#Bregman){reference-type="eqref" reference="Bregman"}, Sect. [9](#basic){reference-type="ref" reference="basic"}), and \[\label{monotone_operator} \langle g(y)-g(x),y-x\rangle \geqslant 0 \quad \forall x, y \in Q,\] we need to find a vector \(x_*\), such that \[\label{VI_problem} \langle g(x),x_*-x\rangle \leqslant 0 \quad \forall x\in Q.\] Relative boundedness can be understood as an analogue of relative Lipschitz continuity for variational inequalities. It should be noted that the gradient of a relatively Lipschitz continuous functional satisfies the relative boundedness condition. This fact plays an important role in considering relatively Lipschitz continuous Lagrange saddle point problems and their reduction to corresponding variational inequalities with the relatively bounded operator. Recently, in the authors proposed an adaptive version of the Mirror Prox method (extragradient type method) for variational inequalities with a condition similar to relative smoothness. It should be noted that variational inequalities with relatively smooth operators are applicable to the resource sharing problem. Also, in there were introduced some non-adaptive switching subgradient algorithms for convex programming problems with relatively Lipschitz continuous functionals. Recently, there was proposed a non-adaptive method for solving variational inequalities with the relatively bounded operator. In this paper we propose an adaptive algorithm for the corresponding class of problems. The paper consists of the introduction and 6 main sections. In Sect. [9](#basic){reference-type="ref" reference="basic"} we give some basic notations and definitions. In Sect. [10](#adapt){reference-type="ref" reference="adapt"} we consider the Minty variational inequality with a relatively bounded operator and propose an adaptive algorithm for its solving. Sect. [11](#adapt_univers){reference-type="ref" reference="adapt_univers"} is devoted to adaptive algorithms for relatively smooth optimization problems. In Sect. [12](#sect_univers){reference-type="ref" reference="sect_univers"} we propose some universal algorithms for minimizing relatively smooth and relatively Lipschitz continuous functionals. In Sect. [13](#section_relative_strongly){reference-type="ref" reference="section_relative_strongly"} we analyze how the introduced methods can be used to solve relatively strongly convex optimization problems. Sect. [14](#experiments_Alg5){reference-type="ref" reference="experiments_Alg5"} is devoted to the numerical experiments which demonstrate the effectiveness of the proposed methods. To sum it up, the contributions of the paper can be formulated as follows. - We consider the variational inequality with the relatively bounded operator and propose some adaptive first-order methods to solve such a class of problems with optimal complexity estimates \(O(\frac{1}{\varepsilon^2})\). - We introduce adaptive and universal algorithms for minimizing an\ \((\alpha, L, \delta)\)-relatively smooth functional and provide their theoretical justification. The stopping criteria of the introduced adaptive algorithms are simpler (which is especially important in terms of numerical experiments), but universal algorithms are guaranteed to be applicable to a wider class of problems. The class of \((\alpha, L, \delta)\)-relatively smooth functionals covers both the relative smoothness and relative Lipschitz continuity concepts. Moreover, this approach allows us to minimize the sum of relatively smooth and relatively Lipschitz continuous functions, even though such a sum does not satisfy any of these conditions. Theoretical estimates of the proposed methods are optimal both for convex relatively Lipschitz minimization problems \(O(\frac{1}{\varepsilon^2})\) and convex relatively smooth minimization problems \(O(\frac{1}{\varepsilon})\). - We consider the case of relatively strongly convex functionals, justify the applicability of the proposed algorithms and introduce a restarted version of the Mirror Descent method for such a class of problems. - We provide the numerical experiments for the Intersection of \(m\) Ellipsoids Problem (IEP), the Lagrange saddle point problem for Support Vector Machine (SVM) with functional constraints, experiments for the relatively \(\mu\)-strongly convex function, and a comparison of one of the proposed algorithms with AdaMirr, which was recently proposed in. The experiments demonstrate that the proposed algorithms can work faster than the obtained theoretical estimates in practice. # Basic definitions and notations {#basic} Let us give some basic definitions and notations concerning Bregman divergence and the prox structure, which will be used throughout the paper. Let \((E,\|\cdot\|)\) be some normed finite-dimensional vector space and \(E^*\) be its conjugate space with the norm \[\|y\|_*=\max\limits_x\{\langle y,x\rangle,\|x\| \leqslant 1\},\] where \(\langle y,x\rangle\) is the value of the continuous linear functional \(y\) at \(x \in E\). Assume that \(Q\subset E\) is a closed convex set (for variational inequalities in Sect [10](#adapt){reference-type="ref" reference="adapt"} we consider a convex compact set \(Q\subset E\)). Let \(d: Q \rightarrow \mathbb{R}\) be a distance generating function (d.g.f) which is continuously differentiable and convex. Assume that \(\min\limits_{x\in Q} d(x) = d(0)\) and suppose that there exists a constant \(\Theta_0 >0\), such that \(d(x_{*}) \leqslant \Theta_0^2,\) where \(x_*\) is a solution of the problem [\[main\]](#main){reference-type="eqref" reference="main"} (supposing that the problem [\[main\]](#main){reference-type="eqref" reference="main"} is solvable). Note that if there is a set of optimal points \(X_* \subset Q\), we assume that \(\min\limits_{x_* \in X_*} d(x_*) \leqslant \Theta_0^2\). For all \(x, y\in Q \subset E\), we consider the corresponding Bregman divergence \[\label{Bregman} V(y, x) = d(y)-d(x)-\langle \nabla d(x), y-x \rangle.\] Now we introduce the following concept of \((\alpha, L, \delta)\)-relative smoothness which covers both the concept of relative smoothness and relative Lipschitz continuity. Further we denote by \(\nabla f\) an arbitrary subgradient of \(f\). It is obvious that for \(\alpha = 0\), \(L>0\), and \(\delta = 0\) one gets the well-known relative smoothness condition (often defined as \(L\)-relative smoothness, see for \(\delta = 0\) and for the case of \(\delta >0\)). For \(\alpha = 1\), \(L = \frac{M^2}{\varepsilon}\), and \(\delta = \frac{\varepsilon}{2} >0\) the inequality [\[eqalpha1relsm1\]](#eqalpha1relsm1){reference-type="eqref" reference="eqalpha1relsm1"} follows from the following condition of the relative Lipschitz continuity (also known as relative continuity or \(M\)-relative Lipschitz continuity), proposed recently in \[\langle \nabla f(x), y-x \rangle + M\sqrt{2V(y,x)} \geqslant 0 \quad \forall x, y \in Q.\] In this paper we prove that the relatively Lipschitz continuous function \(f\) satisfies [\[eqalpha1relsm\]](#eqalpha1relsm){reference-type="eqref" reference="eqalpha1relsm"} for large enough \(L > 0\) and \(\delta > 0\) (the proof of Theorem [\[ThmUnivMeth2\]](#ThmUnivMeth2){reference-type="ref" reference="ThmUnivMeth2"} in Appendix E). It is worth mentioning that the sum of relatively smooth functional \(f_1\) and relatively Lipschitz continuous convex functional \(f_2\) satisfies the \((\alpha, L, \delta)\)-relative smoothness condition, if \(f_1(y) \geqslant f_1(x)-rV(y, x)-q\) \(\forall x, y \in Q\), for some fixed \(r, q > 0\), and the corresponding values \(\alpha, L, \delta >0\) (this assumption can be understood as limiting the fast growth of \(f_1\)). Generally, such a sum is neither relatively smooth nor relatively Lipschitz continuous functional. This structure can be used to minimize relatively Lipschitz continuous functional with quadratic penalty function, which satisfies the condition of limited growth due to the penalty parameter. It is obvious, that for \(\alpha = 0\), one gets the well-known \(\delta\)-relative smoothness condition. For \(\alpha = 1\), the inequalities [\[eqalpha1relsm\]](#eqalpha1relsm){reference-type="eqref" reference="eqalpha1relsm"} and [\[eqalpha1relsm1\]](#eqalpha1relsm1){reference-type="eqref" reference="eqalpha1relsm1"} hold for relatively Lipschitz functionals. More precisely, for (\(\sqrt{2\delta L}\))-Lipschitz objective \(f\) and for arbitrary \(x, y \in Q\) the following inequalities hold \[f(y)-f(x) \leqslant \sqrt{2LV(x, y)} \quad \text{and} \quad \langle \nabla f(x), y-x \rangle + \sqrt{2LV(x, y)} \geqslant 0.\] That means, that for arbitrary \(x, y \in Q\), we have \[\begin{aligned} f(y) &\leqslant f(x) + \langle \nabla f(x), y-x \rangle + \sqrt{2LV(x, y)} + \sqrt{2LV(y, x)} \\ & \leqslant f(x) + \langle \nabla f(x), y-x \rangle + L(V(x, y) + V(y, x)) + \frac{\delta}{2}. \end{aligned}\] # Adaptive Method for Variational Inequalities with Relatively Bounded Operators {#adapt} In this section we consider the Minty variational inequality problem [\[VI_problem\]](#VI_problem){reference-type="eqref" reference="VI_problem"} with relatively bounded [\[Rel_Boud\]](#Rel_Boud){reference-type="eqref" reference="Rel_Boud"} and monotone [\[monotone_operator\]](#monotone_operator){reference-type="eqref" reference="monotone_operator"} operator \(g\), \(Q\) is a convex compact set. In order to solve such a class of problems, we propose an adaptive algorithm, listed as Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"}, below. Let us consider the following modification of Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} with adaptation both to the parameters \(L\) and \(\delta\). # Adaptive Algorithms for Relatively Lipschitz Continuous Convex Optimization Problems {#adapt_univers} Now we consider the classical optimization problem [\[main\]](#main){reference-type="eqref" reference="main"} under the assumption of \(M\)-relative Lipschitz continuity of the objective functional \(f\). For solving such a type of problems we propose two adaptive algorithms, listed as Algorithm [\[adaptive_alg4\]](#adaptive_alg4){reference-type="ref" reference="adaptive_alg4"} and Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, below. The optimality of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for the class of convex and \(M\)-relatively Lipschitz continuous problems can be proved similar to Remark [\[remarkoptim\]](#remarkoptim){reference-type="ref" reference="remarkoptim"}. # Universal Algorithms for \((\alpha, L, \delta)\)-Relatively Smooth Convex Optimization Problems {#sect_univers} In this section we introduce some analogues of Algorithms [\[adaptive_alg4\]](#adaptive_alg4){reference-type="ref" reference="adaptive_alg4"} and [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, which adjust to the \"degree of relative smoothness\" of the considered \((\alpha, L, \delta)\)-relatively smooth problem. This approach allows constructing adaptive gradient-type methods that are applicable to both relatively Lipschitz continuous and relatively smooth problems with optimal complexity estimates. The optimality of Algorithm [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"} for the class of convex and \(M\)-relatively Lipschitz continuous problems can be proved similar to Remark [\[remarkoptim\]](#remarkoptim){reference-type="ref" reference="remarkoptim"}. The optimal rate of convergence \(O(\varepsilon^{-1})\) for the class of \(L\)-relatively smooth problems takes place for Algorithm [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"}, as \(L\) does not depend on \(\varepsilon\). Let us now formulate a variant of the universal method for relatively Lipschitz continuous and relatively smooth problems which makes it possible to prove the guaranteed preservation of the optimal complexity estimates. This method is listed as Algorithm [\[universal_alg2\]](#universal_alg2){reference-type="ref" reference="universal_alg2"}, below. # Adaptive Methods for Relatively Strongly Convex Functions {#section_relative_strongly} In this section we consider the problem [\[main\]](#main){reference-type="eqref" reference="main"} of minimizing a relatively strongly convex functional. Let us remind that \(f: Q\rightarrow \mathbb{R}\) is called relatively strongly convex with a parameter \(\mu>0\) if the following inequality holds \[\label{StrongConv} f(x) + \langle\nabla f(x),y-x\rangle +\mu V(y,x)\leqslant f(y) \quad \forall x, y \in Q.\] ## Methods for Relatively Strongly Convex Lipschitz Continuous Functionals In this subsection we consider the possibility of applicability of the proposed universal Algorithms [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"} and [\[universal_alg2\]](#universal_alg2){reference-type="ref" reference="universal_alg2"} for solving the relatively strongly convex optimization problem. An important point of this subsection is the possibility of adaptive adjustment to the \"smoothness degree\" of the considered problem. ## Restarted Procedures For Relatively Strongly Convex Programming Problems In this subsection we consider the following optimization problem with a functional constraint \[\label{probl_constr} \min\limits_{x\in Q}f(x)\;\] \[\label{constr} \text{s.t. } g(x)\leqslant 0,\] under the assumption that \(f\) and \(g\) are relatively strongly convex and \(M_f\), \(M_g-\)relatively Lipschitz continuous functionals and the Slaiter's condition holds for [\[probl_constr\]](#probl_constr){reference-type="eqref" reference="probl_constr"}--[\[constr\]](#constr){reference-type="eqref" reference="constr"}. In order to solve the problem [\[probl_constr\]](#probl_constr){reference-type="eqref" reference="probl_constr"}--[\[constr\]](#constr){reference-type="eqref" reference="constr"} we apply the restarted technique to Mirror Descent algorithm (see Algorithm [\[alg2mod\]](#alg2mod){reference-type="ref" reference="alg2mod"}, below). The proposed restarted version of Algorithm [\[alg2mod\]](#alg2mod){reference-type="ref" reference="alg2mod"} is listed as Algorithm [\[alg2rest\]](#alg2rest){reference-type="ref" reference="alg2rest"}, below. A distinctive feature of this subsection is considering the optimization problem with functional constraint and avoiding a logarithmic factor in the estimation of complexity. # Numerical Experiments {#experiments_Alg5} In this section, in order to demonstrate the performance of the proposed Algorithms, we consider some numerical experiments concerning the Intersection of Ellipsoids Problem (IEP), Support Vector Machine (SVM), and experiments for the relatively \(\mu\)-strongly convex function (see Appendix I). All experiments were implemented in Python 3.4, on a computer fitted with Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz, 1992 Mhz, 4 Core(s), 8 Logical Processor(s). The RAM of the computer is 8 GB. ## The Intersection of Ellipsoids Problem (IEP) {#IEP} For the Intersection of Ellipsoids Problem, we compute a point \(x \in Q \subseteq \mathbb{R}^n\) in the intersection of \(m\) ellipsoids, i.e \[x \in \mathcal{E} = \mathcal{E}_1 \cap \mathcal{E}_2 \cap \ldots \cap \mathcal{E}_m,\] where \(\mathcal{E}_{i}=\left\{x \in Q: \frac{1}{2} x^{T} A_{i} x+b_{i} x+c_{i} \leqslant 0\right\}\), \(A_i \in \mathbb{R}^{n\times n}\) is a given symmetric positive semi-definite matrix, \(b_i \in \mathbb{R}^n, c_i \in \mathbb{R}\) are a given vector and a constant, respectively, \(i =1, \ldots, m\). We note that the Intersection of Ellipsoids Problem is equivalent to the following constrained optimization problem \[\label{objective_IEP} \min\limits_{x\in Q} f(x) := \max\limits_{0\leqslant i\leqslant m} \left\{\frac{1}{2} x^{T} A_{i} x+b_{i} x+c_{i} \right\}.\] The objective function \(f\) in [\[objective_IEP\]](#objective_IEP){reference-type="eqref" reference="objective_IEP"} is both non-differentiable and non-Lipschitz. The goal of this subsection is demonstrating, how the proposed Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} can be applied to solve such a problem. Let \(\sigma:=\max\limits_{1 \leqslant i \leqslant m}\left\|A_{i}\right\|_{2}^{2}\) where \(\left\|A_{i}\right\|_{2}\) is the spectral radius of \(A_i\),\ \(\rho :=\max\limits_{1 \leqslant i \leqslant m}\left\|A_i b_i \right\|_{2}\) and \(\gamma:=\max\limits_{1 \leqslant i \leqslant m}\left\|b_i \right\|_{2}^2\). We run Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for the following prox function \[\label{prox_function_IEP} d(x):=\frac{a_2}{4}\|x\|_{2}^{4}+\frac{a_1}{3}\|x\|_{2}^{3}+\frac{a_0}{2}\|x\|_{2}^{2},\] where \(a_0 = \gamma, a_1 = \rho, a_2 = \sigma\). The objective function \(f\) [\[objective_IEP\]](#objective_IEP){reference-type="eqref" reference="objective_IEP"} is \(1\)-relatively Lipschitz continuous with respect to the prox function \(d(\cdot)\), defined in [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"}. The Bregman divergence \(V(\cdot, \cdot)\) for the corresponding prox function \(d(\cdot)\) is defined as follows \[\label{Bregmann_IEP} V(y,x) = a_0 V_{d_0}(y,x) + a_1 V_{d_1}(y,x) + a_2 V_{d_2}(y,x).\] where \(a_0 = \gamma, a_1 = \rho, a_2 = \sigma, d_i(x) = \frac{1}{i+2}\|x\|_2^{i+2} \; (i=0, 1, 2)\), and \[V_{d_i}(y,x) = \frac{1}{i+2} \left(\|y\|_{2}^{i+2}+(i+1) \|x\|_{2}^{i+2}-(i+2)\|x\|_{2}^{i}\langle x, y\rangle\right)\; (i = 0, 1, 2).\] Note that each iteration of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} requires the capability to solve the subproblem [\[subproblem_alg5\]](#subproblem_alg5){reference-type="eqref" reference="subproblem_alg5"}, which is equivalent to the following linearized problem \[\label{equivalent_subproblem_alg5} x_{k+1} = \arg\min\limits_{x\in Q}\{\langle c_k,x \rangle + d(x)\},\] where \(c_k = \frac{1}{L_{k+1}} \nabla f(x_k)-\nabla d(x_k)\) and \(d(x)\) is given in [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"}. The solution of the problem [\[equivalent_subproblem_alg5\]](#equivalent_subproblem_alg5){reference-type="eqref" reference="equivalent_subproblem_alg5"} can be found explicitly \[\label{sol_subproblem_IEP} x_{k+1} =-\theta_k c_k,\] for some \(\theta_k \geqslant 0\), where \(\theta_k\) is a positive real root of the following cubic equation \[\label{cubic_eq_IEP} \gamma \theta + \rho\|c_k\|_2 \theta^2 + \sigma \|c_k\|_2^2 \theta^3-1 = 0.\] We run Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for different values of \(n\) and \(m\) with prox-function [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"} and the starting point \(\left(\frac{1}{\sqrt{n}}, \ldots, \frac{1}{\sqrt{n}}\right) \in \mathbb{R}^n\). The matrices \(A_i\), the vectors \(b_i\) and the constants \(c_i\), \(i = 1, \ldots, m\), are chosen randomly from the uniform distribution over \([0, 1)\). We generated the random data 5 times and averaged the results. We considered \(L_0 = \frac{\|\nabla f(1,0,\ldots,0)-\nabla f(0,1,0, \ldots, 0)\|_2}{\sqrt{2}}, \delta_0 = 0.5\), \(Q = \{x \in \mathbb{R}^n: \|x\|_2^2 \leqslant 1 \}\), and \(R^2 = 6\sigma + 4\rho + 2 \gamma\) (see ). The results of the work of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for IEP are presented in Table [4](#table_alg5_2){reference-type="ref" reference="table_alg5_2"}, below. These results demonstrate the running time of the algorithm in seconds as a function of the number of iterations of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} and the quality of the solution \"Estimate\", which is in fact the right side of inequality [\[estimate_alg5\]](#estimate_alg5){reference-type="eqref" reference="estimate_alg5"}. Let us note that the quality of the solution of the problem, which is produced by Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, grows sharply at the beginning of the work of the algorithm for \(k=100\) to \(10\,000\). Thus, we get a twice better solution quality on average. Nevertheless, the growth of the quality of the solution slows down significantly with the growth of the number of iterations from \(k=15\,000\) to \(100\,000\). ## Support Vector Machine (SVM) and Functional Constraints The Support Vector Machine (SVM) is an important supervised learning model for binary classification problem. The SVM optimization problem can be formulated as follows \[\label{objective_SVM} \min\limits_{x\in Q}f(x) := \left(\frac{1}{n}\sum_{i=1}^{n}\max\{0, 1-y_i x^\top w_i\}\right) +\frac{\lambda}{2}\|x\|_2^2,\] where \(w_i\) is the input feature vector of sample \(i\) and \(y_i \in \{-1, 1\}\) is the label of sample \(i\). The objective function in [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"} is both non-differentiable and non-Lipschitz, thus, we cannot directly use typical subgradient or gradient schemes to solve the problem [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}. The problem of constrained minimization of convex functionals attracts widespread interest in many areas of modern large-scale optimization and its applications. Therefore, we demonstrate the performance of the proposed Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} for such class of problems. We consider an example of the Lagrange saddle point problem induced by the functional \(f\) in the problem [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}, with some functional constraints. This problem has the following form \[\label{problem_min_for_SPP} \min_{x \in Q} \left\{f(x) \left| \; \varphi_p(x):=\sum_{i=1}^n \alpha_{pi}x_i^2-1 \leqslant 0 \right., \; p=1...,m \right\}.\] The corresponding Lagrange saddle point problem is defined as follows \[\label{lagrangeSVM} \min_{x \in Q} \max_{\boldsymbol{\lambda} = (\lambda_1,\lambda_2,\ldots,\lambda_m)^\top \in \widehat{Q} \subset \mathbb{R}^m_+} L(x,\boldsymbol{\lambda}):=f(x)+\sum\limits_{p=1}^m\lambda_p\varphi_p(x).\] This problem is equivalent to the variational inequality with the following monotone bounded operator \[G(x,\boldsymbol{\lambda})= \begin{pmatrix} \nabla f(x)+\sum\limits_{p=1}^m\lambda_p\nabla\varphi_p(x), \\ (-\varphi_1(x),-\varphi_2(x),\ldots,-\varphi_m(x))^\top \end{pmatrix},\] where \(\nabla f\) and \(\nabla\varphi_p\) are subgradients of \(f\) and \(\varphi_p\). We run Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} for prox function [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"} with \[\label{ai_SVN} a_0 = \frac{1}{n}\sum_{i=1}^{n}\|w_i\|_2^2, \quad a_1 =\frac{2\lambda}{n}\sum_{i=1}^{n}\|w_i\|_2, \quad a_2 = \lambda^2,\] and the following Bregman divergence \[V_{\text{new}}\left( \left(y, \boldsymbol{\lambda} \right), \left(x, \boldsymbol{\lambda}^{\prime}\right) \right) = V(y,x) +\frac{1}{2}\|\boldsymbol{\lambda}-\boldsymbol{\lambda}^{\prime}\|_2^2, \quad \forall y, x \in \mathbb{R}^n, \boldsymbol{\lambda}, \boldsymbol{\lambda}^{\prime} \in \mathbb{R}^m,\] where \(V(y,x)\) is given in [\[Bregmann_IEP\]](#Bregmann_IEP){reference-type="eqref" reference="Bregmann_IEP"} with coefficients defined in [\[ai_SVN\]](#ai_SVN){reference-type="eqref" reference="ai_SVN"}. We take the point \((x_0, \boldsymbol{\lambda}_0) = \frac{1}{\sqrt{m+n}} \textbf{1} \in \mathbb{R}^{n+m}\), where \(\textbf{1}\) is the vector of all ones. The coefficients \(\alpha_{pi}\) in [\[problem_min_for_SPP\]](#problem_min_for_SPP){reference-type="eqref" reference="problem_min_for_SPP"} are chosen randomly from the standard normal distribution. The vectors \(w_i\) for \(i = 1, \ldots, n\), are chosen randomly the from normal (Gaussian) distribution. We consider unit balls \(Q \subset \mathbb{R}^n\) and \(\widehat{Q} \subset \mathbb{R}^m_+\), \(L_0 = \frac{\|G((1,0,\ldots,0), (0,\ldots, 0))-G((0,1,0,\ldots,0), (0,\ldots, 0))\|_2}{\sqrt{2}}, \delta_0 = 0.5,\) and \(\lambda = 0.5\) in [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}. We take the parameter \(R\) which satisfies the following equality:\ \(\left(R-\frac{1}{2}\operatorname{diam}^2(\boldsymbol{\lambda})\right)^2 = 6\lambda^2 + \frac{2\lambda}{n}\sum_{i=1}^{n}\|w_i\|_2 + \frac{2}{n}\sum_{i=1}^{n}\|w_i\|_2^2\), where \(\operatorname{diam}(\boldsymbol{\lambda})\) is the diameter of the feasible set \(\widehat{Q}\). In each iteration of Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} solving the subproblems [\[minVI\]](#minVI){reference-type="eqref" reference="minVI"} and [\[condalg50\]](#condalg50){reference-type="eqref" reference="condalg50"} for [\[problem_min_for_SPP\]](#problem_min_for_SPP){reference-type="eqref" reference="problem_min_for_SPP"} will be similar for IEP in the previous subsection. The results of the work of Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} are presented in Tables [5](#table1_SPP){reference-type="ref" reference="table1_SPP"} and [6](#table2_SPP){reference-type="ref" reference="table2_SPP"}, respectively. The results in Table [5](#table1_SPP){reference-type="ref" reference="table1_SPP"} demonstrate the number of the iterations of Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and the running time, as a function of \(\varepsilon \in \{ \frac{1}{2}, \frac{1}{4}, \frac{1}{8}, \frac{1}{16}, \frac{1}{32} ,\frac{1}{64}\}\), in seconds. The results in Table [6](#table2_SPP){reference-type="ref" reference="table2_SPP"} demonstrate the running time of Algorithm [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} and the estimate of the achieved solution, which is in fact the left side of [\[estimate_alg50\]](#estimate_alg50){reference-type="eqref" reference="estimate_alg50"}. # Conclusions {#conclusions .unnumbered} In this paper we considered \((\alpha, L, \delta)\)-relatively smooth optimization problems which provide for the possibility of minimizing both relatively smooth and relatively Lipschitz continuous functionals. For such a type of problems we introduced some adaptive and universal methods with optimal estimates of the convergence rate. We also considered the problem of solving the variational inequality with a relatively bounded operator. Finally, we presented the results of numerical experiments for the considered algorithms. # Introduction The recent dramatic growth of various branches of science has led to the necessity of the development of numerical optimization methods in spaces of large and extra-large dimensions. A special place in the modern optimization theory is given to gradient methods. Recently, there was introduced a new direction for the research, associated with the development of gradient-type methods for optimization problems with relatively smooth and relatively strongly convex functionals. Such methods are in high demand and urgent due to numerous theoretical and applied problems. For example, the D-optimal design problem is turned out to be relatively smooth. It is also quite interesting that in recent years there have appeared applications of these approaches (conditions of relative smoothness and strong convexity) to auxiliary problems for tensor methods for convex minimization problems of the second and higher orders. It is worth noting that it is tensor methods that make it possible to obtain optimal estimates of the rate of convergence of high-order methods for convex optimization problems. A few years ago there was introduced a generalization of the Lipschitz condition for nonsmooth problems, namely, relative Lipschitz continuity. The concept of relative Lipschitz continuity essentially generalizes the classical Lipschitz condition and covers quite important applied problems, including the problem of finding the common point of ellipsoids (IEP), as well as the support vector machine (SVM) for the binary classification problem. The concepts of relative smoothness, relative Lipschitz continuity, and relative strong convexity made it possible to significantly expand the limits of applicability of gradient type methods while preserving the optimal convergence rate \(O (\frac{1}{\varepsilon^2})\) for relatively Lipschitz problems and \(O(\frac{1}{\varepsilon})\) for relatively smooth problems (\(\varepsilon\), as usual, denotes the accuracy of the solution). The authors have shown that for the class of relatively smooth problems such an estimate for the rate of convergence cannot be improved in the general case. In this paper we consider the class of \((\alpha, L, \delta)\)-relatively smooth objective functionals (see Definition [\[defalphacont\]](#defalphacont){reference-type="ref" reference="defalphacont"}), which covers both the concept of relative smoothness and relative Lipschitz continuity. For the classical optimization problem \[\label{main} \min\limits_{x\in Q}f(x)\] we propose some analogues of the universal gradient method which automatically adjusts to the \"degree of relative smoothness\" of the \((\alpha, L, \delta)\)-relatively smooth problem (Sect. [12](#sect_univers){reference-type="ref" reference="sect_univers"}). We also consider the problem of minimizing the relatively strongly convex functionals in two directions. The first one is the applicability of the introduced methods and their convergence rate, the second one is the restarted version of the Mirror Descent method for the constrained optimization problem. In addition to the classical optimization problem, we consider the problem of solving Minty variational inequality with (\(M\)-)relatively bounded operator. For a given relatively bounded and monotone operator \(g:Q\rightarrow \mathbb{R}^n\), which satisfies \[\label{Rel_Boud} \langle g(x),x-y\rangle \leqslant M\sqrt{2V(y,x)} \quad \forall x,y \in Q,\] for some \(M>0\) (\(V(y, x)\) is a Bregman divergence, defined in [\[Bregman\]](#Bregman){reference-type="eqref" reference="Bregman"}, Sect. [9](#basic){reference-type="ref" reference="basic"}), and \[\label{monotone_operator} \langle g(y)-g(x),y-x\rangle \geqslant 0 \quad \forall x, y \in Q,\] we need to find a vector \(x_*\), such that \[\label{VI_problem} \langle g(x),x_*-x\rangle \leqslant 0 \quad \forall x\in Q.\] Relative boundedness can be understood as an analogue of relative Lipschitz continuity for variational inequalities. It should be noted that the gradient of a relatively Lipschitz continuous functional satisfies the relative boundedness condition. This fact plays an important role in considering relatively Lipschitz continuous Lagrange saddle point problems and their reduction to corresponding variational inequalities with the relatively bounded operator. Recently, in the authors proposed an adaptive version of the Mirror Prox method (extragradient type method) for variational inequalities with a condition similar to relative smoothness. It should be noted that variational inequalities with relatively smooth operators are applicable to the resource sharing problem. Also, in there were introduced some non-adaptive switching subgradient algorithms for convex programming problems with relatively Lipschitz continuous functionals. Recently, there was proposed a non-adaptive method for solving variational inequalities with the relatively bounded operator. In this paper we propose an adaptive algorithm for the corresponding class of problems. The paper consists of the introduction and 6 main sections. In Sect. [9](#basic){reference-type="ref" reference="basic"} we give some basic notations and definitions. In Sect. [10](#adapt){reference-type="ref" reference="adapt"} we consider the Minty variational inequality with a relatively bounded operator and propose an adaptive algorithm for its solving. Sect. [11](#adapt_univers){reference-type="ref" reference="adapt_univers"} is devoted to adaptive algorithms for relatively smooth optimization problems. In Sect. [12](#sect_univers){reference-type="ref" reference="sect_univers"} we propose some universal algorithms for minimizing relatively smooth and relatively Lipschitz continuous functionals. In Sect. [13](#section_relative_strongly){reference-type="ref" reference="section_relative_strongly"} we analyze how the introduced methods can be used to solve relatively strongly convex optimization problems. Sect. [14](#experiments_Alg5){reference-type="ref" reference="experiments_Alg5"} is devoted to the numerical experiments which demonstrate the effectiveness of the proposed methods. To sum it up, the contributions of the paper can be formulated as follows. - We consider the variational inequality with the relatively bounded operator and propose some adaptive first-order methods to solve such a class of problems with optimal complexity estimates \(O(\frac{1}{\varepsilon^2})\). - We introduce adaptive and universal algorithms for minimizing an\ \((\alpha, L, \delta)\)-relatively smooth functional and provide their theoretical justification. The stopping criteria of the introduced adaptive algorithms are simpler (which is especially important in terms of numerical experiments), but universal algorithms are guaranteed to be applicable to a wider class of problems. The class of \((\alpha, L, \delta)\)-relatively smooth functionals covers both the relative smoothness and relative Lipschitz continuity concepts. Moreover, this approach allows us to minimize the sum of relatively smooth and relatively Lipschitz continuous functions, even though such a sum does not satisfy any of these conditions. Theoretical estimates of the proposed methods are optimal both for convex relatively Lipschitz minimization problems \(O(\frac{1}{\varepsilon^2})\) and convex relatively smooth minimization problems \(O(\frac{1}{\varepsilon})\). - We consider the case of relatively strongly convex functionals, justify the applicability of the proposed algorithms and introduce a restarted version of the Mirror Descent method for such a class of problems. - We provide the numerical experiments for the Intersection of \(m\) Ellipsoids Problem (IEP), the Lagrange saddle point problem for Support Vector Machine (SVM) with functional constraints, experiments for the relatively \(\mu\)-strongly convex function, and a comparison of one of the proposed algorithms with AdaMirr, which was recently proposed in. The experiments demonstrate that the proposed algorithms can work faster than the obtained theoretical estimates in practice. # Basic definitions and notations {#basic} Let us give some basic definitions and notations concerning Bregman divergence and the prox structure, which will be used throughout the paper. Let \((E,\|\cdot\|)\) be some normed finite-dimensional vector space and \(E^*\) be its conjugate space with the norm \[\|y\|_*=\max\limits_x\{\langle y,x\rangle,\|x\| \leqslant 1\},\] where \(\langle y,x\rangle\) is the value of the continuous linear functional \(y\) at \(x \in E\). Assume that \(Q\subset E\) is a closed convex set (for variational inequalities in Sect [10](#adapt){reference-type="ref" reference="adapt"} we consider a convex compact set \(Q\subset E\)). Let \(d: Q \rightarrow \mathbb{R}\) be a distance generating function (d.g.f) which is continuously differentiable and convex. Assume that \(\min\limits_{x\in Q} d(x) = d(0)\) and suppose that there exists a constant \(\Theta_0 >0\), such that \(d(x_{*}) \leqslant \Theta_0^2,\) where \(x_*\) is a solution of the problem [\[main\]](#main){reference-type="eqref" reference="main"} (supposing that the problem [\[main\]](#main){reference-type="eqref" reference="main"} is solvable). Note that if there is a set of optimal points \(X_* \subset Q\), we assume that \(\min\limits_{x_* \in X_*} d(x_*) \leqslant \Theta_0^2\). For all \(x, y\in Q \subset E\), we consider the corresponding Bregman divergence \[\label{Bregman} V(y, x) = d(y)-d(x)-\langle \nabla d(x), y-x \rangle.\] Now we introduce the following concept of \((\alpha, L, \delta)\)-relative smoothness which covers both the concept of relative smoothness and relative Lipschitz continuity. Further we denote by \(\nabla f\) an arbitrary subgradient of \(f\). It is obvious that for \(\alpha = 0\), \(L>0\), and \(\delta = 0\) one gets the well-known relative smoothness condition (often defined as \(L\)-relative smoothness, see for \(\delta = 0\) and for the case of \(\delta >0\)). For \(\alpha = 1\), \(L = \frac{M^2}{\varepsilon}\), and \(\delta = \frac{\varepsilon}{2} >0\) the inequality [\[eqalpha1relsm1\]](#eqalpha1relsm1){reference-type="eqref" reference="eqalpha1relsm1"} follows from the following condition of the relative Lipschitz continuity (also known as relative continuity or \(M\)-relative Lipschitz continuity), proposed recently in \[\langle \nabla f(x), y-x \rangle + M\sqrt{2V(y,x)} \geqslant 0 \quad \forall x, y \in Q.\] In this paper we prove that the relatively Lipschitz continuous function \(f\) satisfies [\[eqalpha1relsm\]](#eqalpha1relsm){reference-type="eqref" reference="eqalpha1relsm"} for large enough \(L > 0\) and \(\delta > 0\) (the proof of Theorem [\[ThmUnivMeth2\]](#ThmUnivMeth2){reference-type="ref" reference="ThmUnivMeth2"} in Appendix E). It is worth mentioning that the sum of relatively smooth functional \(f_1\) and relatively Lipschitz continuous convex functional \(f_2\) satisfies the \((\alpha, L, \delta)\)-relative smoothness condition, if \(f_1(y) \geqslant f_1(x)-rV(y, x)-q\) \(\forall x, y \in Q\), for some fixed \(r, q > 0\), and the corresponding values \(\alpha, L, \delta >0\) (this assumption can be understood as limiting the fast growth of \(f_1\)). Generally, such a sum is neither relatively smooth nor relatively Lipschitz continuous functional. This structure can be used to minimize relatively Lipschitz continuous functional with quadratic penalty function, which satisfies the condition of limited growth due to the penalty parameter. It is obvious, that for \(\alpha = 0\), one gets the well-known \(\delta\)-relative smoothness condition. For \(\alpha = 1\), the inequalities [\[eqalpha1relsm\]](#eqalpha1relsm){reference-type="eqref" reference="eqalpha1relsm"} and [\[eqalpha1relsm1\]](#eqalpha1relsm1){reference-type="eqref" reference="eqalpha1relsm1"} hold for relatively Lipschitz functionals. More precisely, for (\(\sqrt{2\delta L}\))-Lipschitz objective \(f\) and for arbitrary \(x, y \in Q\) the following inequalities hold \[f(y)-f(x) \leqslant \sqrt{2LV(x, y)} \quad \text{and} \quad \langle \nabla f(x), y-x \rangle + \sqrt{2LV(x, y)} \geqslant 0.\] That means, that for arbitrary \(x, y \in Q\), we have \[\begin{aligned} f(y) &\leqslant f(x) + \langle \nabla f(x), y-x \rangle + \sqrt{2LV(x, y)} + \sqrt{2LV(y, x)} \\ & \leqslant f(x) + \langle \nabla f(x), y-x \rangle + L(V(x, y) + V(y, x)) + \frac{\delta}{2}. \end{aligned}\] # Adaptive Method for Variational Inequalities with Relatively Bounded Operators {#adapt} In this section we consider the Minty variational inequality problem [\[VI_problem\]](#VI_problem){reference-type="eqref" reference="VI_problem"} with relatively bounded [\[Rel_Boud\]](#Rel_Boud){reference-type="eqref" reference="Rel_Boud"} and monotone [\[monotone_operator\]](#monotone_operator){reference-type="eqref" reference="monotone_operator"} operator \(g\), \(Q\) is a convex compact set. In order to solve such a class of problems, we propose an adaptive algorithm, listed as Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"}, below. Let us consider the following modification of Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} with adaptation both to the parameters \(L\) and \(\delta\). # Adaptive Algorithms for Relatively Lipschitz Continuous Convex Optimization Problems {#adapt_univers} Now we consider the classical optimization problem [\[main\]](#main){reference-type="eqref" reference="main"} under the assumption of \(M\)-relative Lipschitz continuity of the objective functional \(f\). For solving such a type of problems we propose two adaptive algorithms, listed as Algorithm [\[adaptive_alg4\]](#adaptive_alg4){reference-type="ref" reference="adaptive_alg4"} and Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, below. The optimality of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for the class of convex and \(M\)-relatively Lipschitz continuous problems can be proved similar to Remark [\[remarkoptim\]](#remarkoptim){reference-type="ref" reference="remarkoptim"}. # Universal Algorithms for \((\alpha, L, \delta)\)-Relatively Smooth Convex Optimization Problems {#sect_univers} In this section we introduce some analogues of Algorithms [\[adaptive_alg4\]](#adaptive_alg4){reference-type="ref" reference="adaptive_alg4"} and [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, which adjust to the \"degree of relative smoothness\" of the considered \((\alpha, L, \delta)\)-relatively smooth problem. This approach allows constructing adaptive gradient-type methods that are applicable to both relatively Lipschitz continuous and relatively smooth problems with optimal complexity estimates. The optimality of Algorithm [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"} for the class of convex and \(M\)-relatively Lipschitz continuous problems can be proved similar to Remark [\[remarkoptim\]](#remarkoptim){reference-type="ref" reference="remarkoptim"}. The optimal rate of convergence \(O(\varepsilon^{-1})\) for the class of \(L\)-relatively smooth problems takes place for Algorithm [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"}, as \(L\) does not depend on \(\varepsilon\). Let us now formulate a variant of the universal method for relatively Lipschitz continuous and relatively smooth problems which makes it possible to prove the guaranteed preservation of the optimal complexity estimates. This method is listed as Algorithm [\[universal_alg2\]](#universal_alg2){reference-type="ref" reference="universal_alg2"}, below. # Adaptive Methods for Relatively Strongly Convex Functions {#section_relative_strongly} In this section we consider the problem [\[main\]](#main){reference-type="eqref" reference="main"} of minimizing a relatively strongly convex functional. Let us remind that \(f: Q\rightarrow \mathbb{R}\) is called relatively strongly convex with a parameter \(\mu>0\) if the following inequality holds \[\label{StrongConv} f(x) + \langle\nabla f(x),y-x\rangle +\mu V(y,x)\leqslant f(y) \quad \forall x, y \in Q.\] ## Methods for Relatively Strongly Convex Lipschitz Continuous Functionals In this subsection we consider the possibility of applicability of the proposed universal Algorithms [\[Algor2\]](#Algor2){reference-type="ref" reference="Algor2"} and [\[universal_alg2\]](#universal_alg2){reference-type="ref" reference="universal_alg2"} for solving the relatively strongly convex optimization problem. An important point of this subsection is the possibility of adaptive adjustment to the \"smoothness degree\" of the considered problem. ## Restarted Procedures For Relatively Strongly Convex Programming Problems In this subsection we consider the following optimization problem with a functional constraint \[\label{probl_constr} \min\limits_{x\in Q}f(x)\;\] \[\label{constr} \text{s.t. } g(x)\leqslant 0,\] under the assumption that \(f\) and \(g\) are relatively strongly convex and \(M_f\), \(M_g-\)relatively Lipschitz continuous functionals and the Slaiter's condition holds for [\[probl_constr\]](#probl_constr){reference-type="eqref" reference="probl_constr"}--[\[constr\]](#constr){reference-type="eqref" reference="constr"}. In order to solve the problem [\[probl_constr\]](#probl_constr){reference-type="eqref" reference="probl_constr"}--[\[constr\]](#constr){reference-type="eqref" reference="constr"} we apply the restarted technique to Mirror Descent algorithm (see Algorithm [\[alg2mod\]](#alg2mod){reference-type="ref" reference="alg2mod"}, below). The proposed restarted version of Algorithm [\[alg2mod\]](#alg2mod){reference-type="ref" reference="alg2mod"} is listed as Algorithm [\[alg2rest\]](#alg2rest){reference-type="ref" reference="alg2rest"}, below. A distinctive feature of this subsection is considering the optimization problem with functional constraint and avoiding a logarithmic factor in the estimation of complexity. # Numerical Experiments {#experiments_Alg5} In this section, in order to demonstrate the performance of the proposed Algorithms, we consider some numerical experiments concerning the Intersection of Ellipsoids Problem (IEP), Support Vector Machine (SVM), and experiments for the relatively \(\mu\)-strongly convex function (see Appendix I). All experiments were implemented in Python 3.4, on a computer fitted with Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz, 1992 Mhz, 4 Core(s), 8 Logical Processor(s). The RAM of the computer is 8 GB. ## The Intersection of Ellipsoids Problem (IEP) {#IEP} For the Intersection of Ellipsoids Problem, we compute a point \(x \in Q \subseteq \mathbb{R}^n\) in the intersection of \(m\) ellipsoids, i.e \[x \in \mathcal{E} = \mathcal{E}_1 \cap \mathcal{E}_2 \cap \ldots \cap \mathcal{E}_m,\] where \(\mathcal{E}_{i}=\left\{x \in Q: \frac{1}{2} x^{T} A_{i} x+b_{i} x+c_{i} \leqslant 0\right\}\), \(A_i \in \mathbb{R}^{n\times n}\) is a given symmetric positive semi-definite matrix, \(b_i \in \mathbb{R}^n, c_i \in \mathbb{R}\) are a given vector and a constant, respectively, \(i =1, \ldots, m\). We note that the Intersection of Ellipsoids Problem is equivalent to the following constrained optimization problem \[\label{objective_IEP} \min\limits_{x\in Q} f(x) := \max\limits_{0\leqslant i\leqslant m} \left\{\frac{1}{2} x^{T} A_{i} x+b_{i} x+c_{i} \right\}.\] The objective function \(f\) in [\[objective_IEP\]](#objective_IEP){reference-type="eqref" reference="objective_IEP"} is both non-differentiable and non-Lipschitz. The goal of this subsection is demonstrating, how the proposed Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} can be applied to solve such a problem. Let \(\sigma:=\max\limits_{1 \leqslant i \leqslant m}\left\|A_{i}\right\|_{2}^{2}\) where \(\left\|A_{i}\right\|_{2}\) is the spectral radius of \(A_i\),\ \(\rho :=\max\limits_{1 \leqslant i \leqslant m}\left\|A_i b_i \right\|_{2}\) and \(\gamma:=\max\limits_{1 \leqslant i \leqslant m}\left\|b_i \right\|_{2}^2\). We run Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for the following prox function \[\label{prox_function_IEP} d(x):=\frac{a_2}{4}\|x\|_{2}^{4}+\frac{a_1}{3}\|x\|_{2}^{3}+\frac{a_0}{2}\|x\|_{2}^{2},\] where \(a_0 = \gamma, a_1 = \rho, a_2 = \sigma\). The objective function \(f\) [\[objective_IEP\]](#objective_IEP){reference-type="eqref" reference="objective_IEP"} is \(1\)-relatively Lipschitz continuous with respect to the prox function \(d(\cdot)\), defined in [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"}. The Bregman divergence \(V(\cdot, \cdot)\) for the corresponding prox function \(d(\cdot)\) is defined as follows \[\label{Bregmann_IEP} V(y,x) = a_0 V_{d_0}(y,x) + a_1 V_{d_1}(y,x) + a_2 V_{d_2}(y,x).\] where \(a_0 = \gamma, a_1 = \rho, a_2 = \sigma, d_i(x) = \frac{1}{i+2}\|x\|_2^{i+2} \; (i=0, 1, 2)\), and \[V_{d_i}(y,x) = \frac{1}{i+2} \left(\|y\|_{2}^{i+2}+(i+1) \|x\|_{2}^{i+2}-(i+2)\|x\|_{2}^{i}\langle x, y\rangle\right)\; (i = 0, 1, 2).\] Note that each iteration of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} requires the capability to solve the subproblem [\[subproblem_alg5\]](#subproblem_alg5){reference-type="eqref" reference="subproblem_alg5"}, which is equivalent to the following linearized problem \[\label{equivalent_subproblem_alg5} x_{k+1} = \arg\min\limits_{x\in Q}\{\langle c_k,x \rangle + d(x)\},\] where \(c_k = \frac{1}{L_{k+1}} \nabla f(x_k)-\nabla d(x_k)\) and \(d(x)\) is given in [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"}. The solution of the problem [\[equivalent_subproblem_alg5\]](#equivalent_subproblem_alg5){reference-type="eqref" reference="equivalent_subproblem_alg5"} can be found explicitly \[\label{sol_subproblem_IEP} x_{k+1} =-\theta_k c_k,\] for some \(\theta_k \geqslant 0\), where \(\theta_k\) is a positive real root of the following cubic equation \[\label{cubic_eq_IEP} \gamma \theta + \rho\|c_k\|_2 \theta^2 + \sigma \|c_k\|_2^2 \theta^3-1 = 0.\] We run Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for different values of \(n\) and \(m\) with prox-function [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"} and the starting point \(\left(\frac{1}{\sqrt{n}}, \ldots, \frac{1}{\sqrt{n}}\right) \in \mathbb{R}^n\). The matrices \(A_i\), the vectors \(b_i\) and the constants \(c_i\), \(i = 1, \ldots, m\), are chosen randomly from the uniform distribution over \([0, 1)\). We generated the random data 5 times and averaged the results. We considered \(L_0 = \frac{\|\nabla f(1,0,\ldots,0)-\nabla f(0,1,0, \ldots, 0)\|_2}{\sqrt{2}}, \delta_0 = 0.5\), \(Q = \{x \in \mathbb{R}^n: \|x\|_2^2 \leqslant 1 \}\), and \(R^2 = 6\sigma + 4\rho + 2 \gamma\) (see ). The results of the work of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} for IEP are presented in Table [4](#table_alg5_2){reference-type="ref" reference="table_alg5_2"}, below. These results demonstrate the running time of the algorithm in seconds as a function of the number of iterations of Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"} and the quality of the solution \"Estimate\", which is in fact the right side of inequality [\[estimate_alg5\]](#estimate_alg5){reference-type="eqref" reference="estimate_alg5"}. Let us note that the quality of the solution of the problem, which is produced by Algorithm [\[Alg_5\]](#Alg_5){reference-type="ref" reference="Alg_5"}, grows sharply at the beginning of the work of the algorithm for \(k=100\) to \(10\,000\). Thus, we get a twice better solution quality on average. Nevertheless, the growth of the quality of the solution slows down significantly with the growth of the number of iterations from \(k=15\,000\) to \(100\,000\). ## Support Vector Machine (SVM) and Functional Constraints The Support Vector Machine (SVM) is an important supervised learning model for binary classification problem. The SVM optimization problem can be formulated as follows \[\label{objective_SVM} \min\limits_{x\in Q}f(x) := \left(\frac{1}{n}\sum_{i=1}^{n}\max\{0, 1-y_i x^\top w_i\}\right) +\frac{\lambda}{2}\|x\|_2^2,\] where \(w_i\) is the input feature vector of sample \(i\) and \(y_i \in \{-1, 1\}\) is the label of sample \(i\). The objective function in [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"} is both non-differentiable and non-Lipschitz, thus, we cannot directly use typical subgradient or gradient schemes to solve the problem [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}. The problem of constrained minimization of convex functionals attracts widespread interest in many areas of modern large-scale optimization and its applications. Therefore, we demonstrate the performance of the proposed Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} for such class of problems. We consider an example of the Lagrange saddle point problem induced by the functional \(f\) in the problem [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}, with some functional constraints. This problem has the following form \[\label{problem_min_for_SPP} \min_{x \in Q} \left\{f(x) \left| \; \varphi_p(x):=\sum_{i=1}^n \alpha_{pi}x_i^2-1 \leqslant 0 \right., \; p=1...,m \right\}.\] The corresponding Lagrange saddle point problem is defined as follows \[\label{lagrangeSVM} \min_{x \in Q} \max_{\boldsymbol{\lambda} = (\lambda_1,\lambda_2,\ldots,\lambda_m)^\top \in \widehat{Q} \subset \mathbb{R}^m_+} L(x,\boldsymbol{\lambda}):=f(x)+\sum\limits_{p=1}^m\lambda_p\varphi_p(x).\] This problem is equivalent to the variational inequality with the following monotone bounded operator \[G(x,\boldsymbol{\lambda})= \begin{pmatrix} \nabla f(x)+\sum\limits_{p=1}^m\lambda_p\nabla\varphi_p(x), \\ (-\varphi_1(x),-\varphi_2(x),\ldots,-\varphi_m(x))^\top \end{pmatrix},\] where \(\nabla f\) and \(\nabla\varphi_p\) are subgradients of \(f\) and \(\varphi_p\). We run Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} for prox function [\[prox_function_IEP\]](#prox_function_IEP){reference-type="eqref" reference="prox_function_IEP"} with \[\label{ai_SVN} a_0 = \frac{1}{n}\sum_{i=1}^{n}\|w_i\|_2^2, \quad a_1 =\frac{2\lambda}{n}\sum_{i=1}^{n}\|w_i\|_2, \quad a_2 = \lambda^2,\] and the following Bregman divergence \[V_{\text{new}}\left( \left(y, \boldsymbol{\lambda} \right), \left(x, \boldsymbol{\lambda}^{\prime}\right) \right) = V(y,x) +\frac{1}{2}\|\boldsymbol{\lambda}-\boldsymbol{\lambda}^{\prime}\|_2^2, \quad \forall y, x \in \mathbb{R}^n, \boldsymbol{\lambda}, \boldsymbol{\lambda}^{\prime} \in \mathbb{R}^m,\] where \(V(y,x)\) is given in [\[Bregmann_IEP\]](#Bregmann_IEP){reference-type="eqref" reference="Bregmann_IEP"} with coefficients defined in [\[ai_SVN\]](#ai_SVN){reference-type="eqref" reference="ai_SVN"}. We take the point \((x_0, \boldsymbol{\lambda}_0) = \frac{1}{\sqrt{m+n}} \textbf{1} \in \mathbb{R}^{n+m}\), where \(\textbf{1}\) is the vector of all ones. The coefficients \(\alpha_{pi}\) in [\[problem_min_for_SPP\]](#problem_min_for_SPP){reference-type="eqref" reference="problem_min_for_SPP"} are chosen randomly from the standard normal distribution. The vectors \(w_i\) for \(i = 1, \ldots, n\), are chosen randomly the from normal (Gaussian) distribution. We consider unit balls \(Q \subset \mathbb{R}^n\) and \(\widehat{Q} \subset \mathbb{R}^m_+\), \(L_0 = \frac{\|G((1,0,\ldots,0), (0,\ldots, 0))-G((0,1,0,\ldots,0), (0,\ldots, 0))\|_2}{\sqrt{2}}, \delta_0 = 0.5,\) and \(\lambda = 0.5\) in [\[objective_SVM\]](#objective_SVM){reference-type="eqref" reference="objective_SVM"}. We take the parameter \(R\) which satisfies the following equality:\ \(\left(R-\frac{1}{2}\operatorname{diam}^2(\boldsymbol{\lambda})\right)^2 = 6\lambda^2 + \frac{2\lambda}{n}\sum_{i=1}^{n}\|w_i\|_2 + \frac{2}{n}\sum_{i=1}^{n}\|w_i\|_2^2\), where \(\operatorname{diam}(\boldsymbol{\lambda})\) is the diameter of the feasible set \(\widehat{Q}\). In each iteration of Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} solving the subproblems [\[minVI\]](#minVI){reference-type="eqref" reference="minVI"} and [\[condalg50\]](#condalg50){reference-type="eqref" reference="condalg50"} for [\[problem_min_for_SPP\]](#problem_min_for_SPP){reference-type="eqref" reference="problem_min_for_SPP"} will be similar for IEP in the previous subsection. The results of the work of Algorithms [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} are presented in Tables [5](#table1_SPP){reference-type="ref" reference="table1_SPP"} and [6](#table2_SPP){reference-type="ref" reference="table2_SPP"}, respectively. The results in Table [5](#table1_SPP){reference-type="ref" reference="table1_SPP"} demonstrate the number of the iterations of Algorithm [\[adaptive_alg3\]](#adaptive_alg3){reference-type="ref" reference="adaptive_alg3"} and the running time, as a function of \(\varepsilon \in \{ \frac{1}{2}, \frac{1}{4}, \frac{1}{8}, \frac{1}{16}, \frac{1}{32} ,\frac{1}{64}\}\), in seconds. The results in Table [6](#table2_SPP){reference-type="ref" reference="table2_SPP"} demonstrate the running time of Algorithm [\[Alg_50\]](#Alg_50){reference-type="ref" reference="Alg_50"} and the estimate of the achieved solution, which is in fact the left side of [\[estimate_alg50\]](#estimate_alg50){reference-type="eqref" reference="estimate_alg50"}. # Conclusions {#conclusions-1 .unnumbered} In this paper we considered \((\alpha, L, \delta)\)-relatively smooth optimization problems which provide for the possibility of minimizing both relatively smooth and relatively Lipschitz continuous functionals. For such a type of problems we introduced some adaptive and universal methods with optimal estimates of the convergence rate. We also considered the problem of solving the variational inequality with a relatively bounded operator. Finally, we presented the results of numerical experiments for the considered algorithms.
{'timestamp': '2022-02-03T02:17:39', 'yymm': '2107', 'arxiv_id': '2107.05765', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05765'}
# Introduction Intelligence is an emergent phenomenon that requires nothing more than the presence of matter and energy, the physical constraints of our present universe, and time. At the very least we know that the preceding statement is true by an existence proof, one that continues to demonstrate itself in the very act of the reader parsing it. There may be simpler ways to generate intelligence, and there are certainly paths to intelligence that are significantly more complex, but the only path that we have positive proof for so far is the evolution of life by natural selection. Put simply, an algorithm that can be described as "the most likely things to persist will become more likely to persist\" is at least capable of creating intelligence---though the likelihood of this happening is unknown and shrouded in uncertainty [^1]. Consequently the study of intelligence, both natural and artificial, from a viewpoint informed by open-ended complexity is not only an alternative approach to building artificially intelligent systems, but a way to better understand the context of Earth-based intelligence as it fits into the larger universe. One hallmark of modern approaches to artificial intelligence (AI), particularly in a reinforcement learning framework, is the ability of learning agents to exploit unintended loopholes in the way a task is specified. Known as specification gaming or reward hacking, this tendency constitutes the crux of the control problem and places an additional engineering burden of designing an "un-hackable\" reward function, the substantial effort of which may defeat the benefits of end-to-end learning. An attractive alternative to manually specifying robust and un-exploitable rewards is to instead develop methods for intrinsic or learned rewards. For tasks requiring complex exploration such as the "RL-hard\" Atari games Montezuma's Revenge and Pitfall, intrinsic exploration-driven reward systems are often necessary. Games have a long history as a testing and demonstration ground for artificial intelligence. From MENACE, a statistical learning tic-tac-toe engine from the early 1960s, to the world champion level chess play of Deep Blue and the lesser known Chinook's prowess at checkers in the 1990s, to the more recent demonstrations of the AlphaGo lineage and video game players like AlphaStar for StarCraft II and OpenAI Five for Dota 2 to name just a few. Games in general provide an opportunity to develop and demonstrate expert intellectual prowess, and consequently have long been an attractive challenge for AI. While impressive, even mastering several difficult games is but a small sliver of commonplace human and animal intelligence. The following statement may be debatable to some, but mastering the game of Go is not even the most interesting demonstration of intelligence one can accomplish with a Go board. While taking breaks from more serious mathematical work, John H. Conway developed his Game of Life by playing with stones on a game board. The resulting Game demonstrated a system of simple rules that would later be proven to be computationally universal. Conway's Life did not found the field of cellular automata (CA), but it did motivate subsequent generations of research and play and is likely the most well known example of CA. # Life-like cellular automata crash-course The Game of Life was invented by John H. Conway through mathematical play in the late 1960s, and it was introduced to the public in a column in Martin Gardner's "Mathematical Games\" in Scientific American in 1970. The Game was immensely influential and inspired subsequent works in similar systems and cellular automata in general. Conway's Life demonstrated the emergence of complex behavior from simple rules and would later be proven a Turing complete system capable of universal computation. Conway's Life is based on the changing binary states of a 2-dimensional grid. Cell units in the grid change their state based on local information, determined solely by the sum of states of their immediate neighbors. The 3 by 3 grid surrounding each cell (excluding itself) is called a Moore neighborhood (Figure [\[fig:moore\]](#fig:moore){reference-type="ref" reference="fig:moore"}). Each cell's next state is fully determined by its current state and the sum of cell states in its Moore neighborhood. Cellular Automata (CA) based on this update configuration are known as "Life-like\". Different Life-like CA can be described by the rules they follow for transitioning from a state of 0 to a state of 1 ("birth\") and maintaining a state of 1 ("survival\"). Life-like rules can be written in a standard string format, with birth conditions specified by numbers preceded by the letter "B\" and survival conditions by numbers preceded by "S\", and birth and survival conditions separated by a slash. For example, the rules for Conway's Life are B3/S23, specifying the dead cells with 3 live neighbors become alive (state 1) and live cells with 2 or 3 live neighbors remain alive, all other cells will remain or transition to a dead state (state 0). Including Conway's Life (B3/S23), there are \(2^9 * 2^9 = 262,144\) possible rule variations in Life-like CA. Many of these rules support objects reminiscent of machine or biological entities in their behavior. Types of CA objects of particular interest include spaceships, objects that translocate across the CA grid as they repeat several states; puffers, spaceships that leave a path of persistent debris behind them, computational components like logic gates and memory, and many more. The update progression of a glider pattern under B368/S245 rules, also known as Morley or Move, is shown in Figure [\[fig:morley0\]](#fig:morley0){reference-type="ref" reference="fig:morley0"}. An active community continues to build new patterns and demonstrations of universal computation in Life-like CA. # Related Work Carle's Game combines the fields of cellular automata, open-ended machine learning, and evolutionary computation. The growth and dynamics of cellular automata have been extensively studied, and thanks to the characteristics of complexity and universal computation of many CA, CA make a good substrate for modeling physical phenomena. Recent work in differentiable neural CA offer interesting possibilities for modern machine learning. Open-endedness is often a desirable trait in artificial life and evolution simulations. Evolutionary computation applied to generic reinforcement learning (RL) tasks exhibits the same phenomena of specification gaming and reward hacking as seen in conventional RL algorithms. For example, with no costs associated with individual height, evolutionary selection for body plans and policies on the basis of forward travel often discovers the unintended solution of being very tall and falling over. A more open-ended approach can limit the reward function surface that can be exploited, at least in principle, but the challenge of producing interesting results remains substantial. A system can apparently meet all the generally accepted traits of open-ended evolution and still produce uninteresting results. Previous efforts to build artificial worlds include individual machine code programs competing for computational resources, simulated creatures in physics simulators , games, or abstract worlds. I find the open-ended universes based on cellular automata such as SmoothLife, Lenia, and genelife particulary interesting. CA simulations are an attractive substrate for open-ended environments because they are not based on a facsimile of the physics of our own universe, nor are they an ad-hoc or abstract landscape. Instead they have their own internally consistent rules, analagous to physical laws in myriad alternative universes. Unlike experiments in Lenia, SmoothLife, or genelife, in Carle's Game agents interact with a CA universe, but they are not of it. Instead the role of agents is more similar to that of the decades-long exploration of Life-like cellular automata by human experimenters. CARLE also has the ability to simulate any of the 262,144 possible Life-like rules, of which many exhibit interest patterns of growth and decay and/or Turing completeness. Another possible advantage of CARLE comes from the simplicity of CA universes combined with execution on a graphics processing unit (GPU). CARLE is written with PyTorch, and the implementation of CA rules in the matrix multiplication and convolutional operations, operations that have been well-optimized in modern deep learning frameworks, makes hardware acceleration straightforward. Although CARLE does not take advantage of CA-specific speedup strategies like the HashLife algorithm, it uses vectorization and GPU acceleration to achieve in excess of 20,000 updates of a 64 by 64 cell grid per second. Combined with the expressiveness and versatility of Life-like cellular automata, it is my hope that these characteristics will make CARLE an enabling addition to available programs for investigating machine creativity and exploration. # Carle's Game and the Cellular Automata Reinforcement Learning Environment ## What's Included Carle's Game is built on top of CARLE, a flexible simulator for Life-like cellular automata written in Python with Numpy and PyTorch. As CARLE is formulated as a reinforcement learning environment, it returns an observation consisting of the on/off state of the entire CA grid at each time step, and accepts actions that specify which cells to toggle before applying the next Life-like rule updates. The action space is a subset of the observation space and the (square) dimensions of both can be user-specified, with default values of an observation space of 128 by 128 cells and an action space of 64 by 64 cells. Although both are naturally 2D, they are represented as 4-dimensional matrices (PyTorch Tensors), *i.e.* with dimensions \(Nx1xHxW\), or number of CA grids by 1 by height by width. If CARLE receives an action specifying every cell in the action space to be toggled, the environment is reset and all live cells are cleared. In addition to the CA simulation environment, CARLE with Carle's Game includes: - **Reward Wrappers: Growth, Mobiliy, and Exploration Bonuses.** CARLE always returns a reward of 0.0, but several reward wrappers are provided as part of CARLE and Carle's Game to provide motivation for agents to explore and create interesting patterns. Implemented reward wrappers include autoencoder loss and random network distillation exploration bonuses, a glider/spaceship detector, and a reward for occupying specific regions of the CA universe. - **Starter Agents: HARLI, CARLA, and Toggle.** I have included several agent policies as a starting point for developing innovative new policies. These shouldn't be expected to be ideal architectures and experimenters are encouraged to explore. Starter agents include Cellular Automata Reinforcement Learning Agent (CARLA), a policy based on continuous-valued cellular automata rules, and HARLI (Hebbian Automata Reinforcement Learning Improviser), a policy again implemented in continuous-valued neural CA that learns to learn by optimizing a set of Hebbian plasticity rules. Finally, Toggle is an agent policy that optimizes a set of actions directly, which are only applied at the first step of simulation. - **Starter Algorithm: Covariance Matrix Adapataion Evolution Strategy (CMA-ES).** Carle's Game includes an implementation of CMA-ES for optimizing agent policies. - **Human-Directed Evolution.** In addition to reward wrappers that can be applied to CARLE, Carle's Game includes interactive evolution (implemented in a Jupyter notebook) to optimize agent policies with respect to human preferences. ## Performance CARLE utilizes a combination of environment vectorization and GPU acceleration to achieve fast run times. On a consumer desktop with a 24-core processor (AMD 3960x Threadripper) and an Nvidia GTX 1060 GPU, CARLE runs at a speed of more than 22,000 updates per second of a 64 by 64 grid running Game of Life (B3/S23), amounting to about 90 million cell updates per second. Additional performance gains are likely available with lower precision operations with modern (RTX) GPU acceleration. To assess CARLE performance on other systems, I've provided the Jupyter notebook I used to create Figures [\[fig:cpu_performance\]](#fig:cpu_performance){reference-type="ref" reference="fig:cpu_performance"} and [\[fig:cuda_performance\]](#fig:cuda_performance){reference-type="ref" reference="fig:cuda_performance"}, available at <https://github.com/rivesunder/carles_game> ## Reward Wrappers The reward hypothesis, also sometimes known as the reinforcement learning hypothesis, has a somewhat ambiguous attribution, but no matter who described the idea first it can be summarized as follows: intelligent behavior arises from an agent seeking to maximize the rewards it receives from its environment, or at least an agent's goals can be fully described as an effort to maximize cumulative rewards. Whether this is reflective of real-world intelligence is a discussion for another time, but it does mean that open-ended environments returning no nominal reward are a challenge for most RL algorithms. While CARLE is formulated as a reinforcement learning environment and uses the `observation, reward, done, info = env.step(action)` Gym API, the environment always returns a reward value of 0.0. Ultimately Carle's Game uses crowd-sourced voting to evaluate user submissions, and judging machine creativity and exploration is likely to be just as subjective as judging the creative outputs of human artists and explorers. Designing a system of derived rewards, ideally in such a way as to instill an internal sense of reward for exploration, is a principal aspect of the Carle's Game challenge. I have included several examples of potential reward wrappers that intervene between the universe of CARLE and agents interacting with it to add rewards for agents to learn from. These may be used directly and in combination to generate reward proxies or serve as a template and inspiration for custom reward wrappers. Carle's Game includes two implementation of exploration bonus rewards, one based on autoencoder loss and the other on random network distillation. It also includes wrappers designed to reward moving machines such as spaceships and gliders and another that grants a reward for occupying specific cells in the top left corner. The corner bonus wrapper (Figure [\[fig:cornerbonus\]](#fig:cornerbonus){reference-type="ref" reference="fig:cornerbonus"} yields negative reward for live cells in the right hand corners and a positive reward for live cells in top left corner, and along the diagonal of the grid universe between the action space and the top left corner. The speed reward wrapper calculates the change between the center of mass of all live cells between time steps, and while machine exploration and crowd evaluation of submissions are open-ended and subjective, developing agents that can re-discover known patterns-of-interest like spaceships and gliders provides an attractive first step that parallels early human exploration of Conway's Life. An example of the speed-based reward wrapper applied to a Life glider is shown in Figure [\[fig:speeddetector\]](#fig:speeddetector){reference-type="ref" reference="fig:speeddetector"}. This reward system considers cells inside of the action space to all have a central location of (0,0), leading to a large reward spike when an object first leaves the area available to agent manipulation. As CARLE simulates a toroidal CA universe, another reward spike occurs (not shown in Figure [\[fig:speeddetector\]](#fig:speeddetector){reference-type="ref" reference="fig:speeddetector"}) when an object leaves by one edge and returns by another. This boundary crossing advantage was exploited by agents in experiments described in section [5.1.2](#exp){reference-type="ref" reference="exp"}. Autoencoder loss and random network distillation approximate the novelty of a set of observations, as states that are visited less frequently lead to relatively poor performance compared to observations often encountered. These offer slightly different behavior in practice. The autoencoder loss reward wrapper is implemented with a fully convolutional neural network model, and therefore exhibits translation equivariance in its response. Therefore the exploration bonus for a given pattern can be expected to be the same regardless of where on the CA grid the pattern appears. The implementation of random network distillation included with CARLE, on the other hand, includes fully connected neural networks in the final layers of both the random and the prediction network. The fully connected layers do not exhibit the translation equivariance of convolutional layers, so a jump in reward occurs when the Morley puffer leaves via one edge and appears on the opposite side of the grid, visible in Figure [\[fig:rnd\]](#fig:rnd){reference-type="ref" reference="fig:rnd"}. Both examples are demonstrated for the same progression of a common puffer in the Morley/move rule set (B368/S245). # Carle's Game Baselines ## Carle's Game Baselines: Discovering the Morley Glider, Corner-Seeking, and Hacking the Mobility Reward This section briefly presents CMA-ES training of agents using the corner bonus or a combination of the speed and random network distillation reward wrappers. ### Reaching for the Corner The first experiment used CMA-ES to optimize patterns directly using the "Toggle\" agent. The training curves are shown for 5 random seeds in Figure [\[fig:corneragent\]](#fig:corneragent){reference-type="ref" reference="fig:corneragent"}. Of the 5 random seeds, 4 experimental runs found a pattern that achieves a positive cumulative reward, *i.e.* a pattern that for the most part avoids the negative reward corners and occupies at least some of the positive reward cells. This experiment used the B3/S245678 growth set of rules, and an example of a manually designed pattern achieving positive cumulative reward on this task is shown in Figure [\[fig:cornerbonus\]](#fig:cornerbonus){reference-type="ref" reference="fig:cornerbonus"}. ### Rediscovering Gliders {#exp} A second experiment used the combination of random network distillation and a reward based on changing center of mass. This experiment was intended to investigate the ability of agents to learn to create gliders and small spaceships. Patterns were evolved directly using the Toggle agent, as well as dynamic agents CARLA and HARLI. This experiment was conducted using B368/S245 rules. Experiments involving the Toggle agent managed to discover several patterns that produce gliders. It's worth noting that in preliminary experiments optimizing the Toggle agent with the speed bonus directly, evolution runs with small population sizes and no exploration bonuses often got stuck in local optima and failed to find mobile patterns. Figure [\[fig:toggle_glider\]](#fig:toggle_glider){reference-type="ref" reference="fig:toggle_glider"} demonstrates the discovery of a pattern that produces a glider, and another that produces a puffer. Perhaps unsurprisingly, the active agents trained in the speed reward experiment found surprising and unintended strategies to generate high rewards. The three strategies include resetting the environment, generating a "wave\", or maintaining a "chaotic boundary\". The reset strategy generates a high reward by clearing all live cells from the CA grid, effectively moving their center of mass from some finite value to the center of the grid. The wave strategy is often seen in the first few steps, and takes advantage of the "B3\" rule contribution to produce a moving line of live cells visible in Figure [\[fig:carla_glider\]](#fig:carla_glider){reference-type="ref" reference="fig:carla_glider"}a. The chaotic boundary strategy takes advantage of the jump in reward produced when live cells transiently appear just outside of the action space. While HARLI and CARLA agents both exploit similar wave and chaotic boundary strategies, HARLI also is capable of resetting the environnment by setting all toggles to 1. The reset and wave strategy used together generate extremely high average rewards that may be 10 times greater than a common Life glider. An interactive demonstration of the reset-wave strategy at several evolutionary snapshots (trained with 4 different B3/Sxxx rules) can be found at <https://github.com/riveSunder/harli_learning>, and an example of this strategy under B368/S245 rules is presented in the reward plot in Figure [\[fig:harli_exploit\]](#fig:harli_exploit){reference-type="ref" reference="fig:harli_exploit"}. # Concluding Remarks As introduced in this paper, CARLE along with Carle's Game provides a fast and flexible framework for investigating machine creativity in open-ended environments. Optimizing initial patterns directly using the Toggle policy managed to re-discover both the glider and the common puffer in the B368/S245 Morley/Move rules. We also discussed two agents based on continuous-valued CA policies, which both managed to find effective (and frustratingly unintended) strategies for garnering rewards from a center of mass speed reward wrapper. These unintended strategies, which can be described as reward hacking exploits, underscore the challenge of providing motivation to machine learning agents in the face of complexity. The environment CARLE is available at <https://github.com/rivesunder/carle> and the Carle's Game challenge, including the code used to produce the experiments and figures described in this article, is maintained at <https://github.com/rivesunder/carles_game>. I intend to actively maintain these projects at least until the IEEE Conference on Games in August 2021, where Carle's Game is among the competition tracks, and the code is permissively licensed under the MIT License. [^1]: While I've often read that human existence is the result of a "a single run\" of an open-ended process, we have no way to no for certain how many similar "runs\" may have preceded (or will succeed) the experience of our own perspective. This is the anthropic principle in a nutshell
{'timestamp': '2021-07-14T02:06:54', 'yymm': '2107', 'arxiv_id': '2107.05786', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05786'}
null
null
null
null
null
null
null
null
null
null
null
null
# Introduction Supernovae are among the brightest astrophysical objects which can be observed in our Universe, and this has allowed to test the standard cosmological models at redshifts at which few other observations are available, and have provided the first evidence of an accelerating expansion. Beside being useful to determine the background cosmological model parameters, they can also be used to reconstruct the density and peculiar velocity fields, providing a unique tool to probe large scale structure at scales where other astrophysical objects are too dim to be observed. In the context of the luminosity distance the IP has been only solved assuming spherical symmetry, and it consisted of solving complicated systems of differential equations, which required smooth functions as inputs, but observational data is rarely in a smooth form, limiting the accuracy of the results. In this paper we will develop a completely new inversion method, which does not assume any symmetry. The inversion problem is a very general subject of investigation, studied in many different fields such as medical physics or seismic inversion, and recently deep learning has shown to be a promising approach for its solution, taking advantage of the computational advances made possible by the availability of graphical processing units (GPU). The method we adopt is based on creating a database of simulated luminosity distance data obtained by solving the direct problem for a large set or random density and velocity configurations. The simulated data is then used to train a convolutional neural network (CNN) to solve the IP, i.e. to reconstruct the density and velocity fields from the luminosity distance. Since the physics of the direct problem is well understood, there is virtually no limit in the amount of simulated data which can be created to train the CNN, allowing to obtain good results in the learning process, since deep learning performs well when a large and good quality training dataset is available. We first generate random density fields using the nbodykit package, use these as inputs for solving the direct problem, and finally use the results of the direct problem as a training data set for the CNN. This paper is organized as follows: the first section describes how the random density fields are generated, the second section explains how the effects on the luminosity distance are calculated from the density and velocity fields, the third section shows the neural network architecture we adopt, the function which is minimized, and provide details about the training process. In the last section we present the results of the inversion. # Inversion problem The inversion problem we want to solve consists in reconstructing the density contrast and velocity fields from its effects on the luminosity distance using a CNN. In order to train the CNN, \(10^3\) random density and velocity profiles were generated using the nbodykit package . The CNN training set is then obtained by computing the effects of these inhomogeneities on the luminosity distance. Finally the IP is solved by training the CNN to reconstruct the density and velocity fields from the luminosity distance synthetic data obtained in the previous step. # Simulation of cosmic structure We use nbodykit package to generate the density and velocity fields needed as inputs for the calculation of the training set. The mock catalogs are generated using Planck 2018 cosmological parameters. Using nbodykit averaging functions, we obtain the density and velocity fields on a discrete three-dimensional grid defined over a cube of edge length 300 \(Mpc\), consisting of \(11^3\) cubical cells of equal edge length. The mock catalogs obtained in this way have statistical properties in good agreement with the results of N-body simulations. # Effects of cosmic structure on the luminosity Distance We compute the effects of the inhomogeneities on the luminosity distance using the dominating terms in the linear perturbation theory formula \[D_L(z_S)=(1+z_S)(\chi_0-\chi_S)(1-k_v-k_\delta) \,, \label{DL}\] where \(z\) is the red-shift, \(\chi\) is the comoving distance, and \(k_v\) and \(k_\delta\) correspond to the effects of the peculiar velocity and the density contrast \[k_v=\frac{1+z_S}{(\chi_O-\chi_S)H_s}\pmb{v_O}\cdot \pmb{n}+\left[1-\frac{1+z_S}{(\chi_O-\chi_S)H_s}\right]\pmb{v_S}\cdot \pmb{n},\] \[k_\delta=\frac{3}{2}H_0^2 \Omega_m \int_{\chi_S}^{\chi_O} \frac{\chi(\chi_S-\chi)[1+z(\chi)]}{(\eta_O-\eta_S)}\delta \, d\eta\. \label{kd}\] In the above equations subscripts \({}_s\) and \({}_o\) denote quantities evaluated at the source and observer, \(\pmb{n}\) is the unit vector between the source and the observer, and \(H_S=H(z_S)\) is the Hubble parameter at the source, obtained from the Friedmann's equation \[H(z)=H_0\sqrt{\Omega_\Lambda+\Omega_m (1+z)^3}\.\] The red-shift \(z(\chi)\) associated to a given comoving distance is obtained by inverting numerically the relationship \[\chi(z)=\int_0^z \frac{dz^\prime}{H(z^\prime)} \.\] Using eq.([\[DL\]](#DL){reference-type="ref" reference="DL"}) we obtain the luminosity distance for each cell of the grid. For each simulation we generate a density profile grid \(\delta_G\) with \(L^3\) elements, a velocity grid \(v_G\) with \(L^3\) elements, corresponding to the line of sight projection of the source velocity \(\pmb{v_S}\cdot \pmb{n}\), and a luminosity distance grid \(D_G\) with \(L^3\) elements. The solution of the inversion problem can be summarized in this way: - generate random grids for the radial velocity and density fields \(\{\delta_G,v_G\}\) - compute the luminosity distance grid \(D_G = f(\delta_G,v_G)\) for each \(\{\delta_G,v_G\}\) using eq.([\[DL\]](#DL){reference-type="ref" reference="DL"}) - train a CNN to invert the above relationship i.e. to obtain \(\{\delta_G,v_G\} = f^{-1}(D_G)\) where we are denoting symbolically with \(f\) the solution of the direct problem, and with \(f^{-1}\) the solution of the IP. The solution of the IP is in general not unique, since different inhomogeneities could produce the same effects on \(D_L\), especially due to the integrated effect in eq.([\[kd\]](#kd){reference-type="ref" reference="kd"}). We train the CNN in order to minimize the error of the IP, within the limits of the above mentioned intrinsic degeneracy of the IP solution. # Neural network architecture We solve the IP using convolutional neural networks, specifically a modified version of the U-Net architecture. We train separately two CNN, one for the density field \(\delta_G\) and another for the velocity field \(v_G\). The architecture is symmetrical and has two main parts: the left part is the encoder, which consists of 3D convolutional layers, while the right side is the decoder. The latter uses nearest neighbor interpolation to upsample the data which is used to reconstruct the density and velocity fields from their effects on the luminosity distance. The simulated input data used to train the CNN is a four-dimensional array of size \(11*11*11*4\). This is because for each of the \(11^3\) cells of the grid there is the corresponding value \(D_G\), and the three spatial coordinates of the cell. This is necessary in order to provide information about the spatial location of the cells, which is important to determine the effects on the luminosity distance. The output of the CNNs are three-dimensional arrays of size \(11*11*11\), which corresponds to the density and radial component of the source velocity in each of the grid cells. # Loss function We train two different networks, one for \(\delta_G\) and the other for \(v_G\). In both cases we minimize the loss function given by the Mean Absolute Error defined as \[MAE(y,\hat{y})=\frac{1}{m}\sum_{i=1}^m \frac{1}{L^3} \sum_{c=1}^{L^3}|y_{ic}-\hat{y}_{ic}|,\] where \(m\) is the total number of simulations, \(y_{ic}\) and \(\hat{y}_{ic}\) are the inputted and predicted data respectively, for each cell \(c\) in each simulation \(i\). We apply early stopping to select the network parameters that best fit the test set in order to avoid overfitting and have good generalization results. Since both \(\delta_G\) and \(v_G\) can often have very small values, the Mean Average Percentage Error (MAPE) is not a good measure of the goodness of fit because it can often diverge, due to the presence of a small quantity in the denominator. For this reason we have chosen the MAE as loss function and metric to measure the inversion results accuracy. # Results of the inversion of the density field The learning curves for \(\delta\) are shown in fig. ([\[mae_delta\]](#mae_delta){reference-type="ref" reference="mae_delta"}). The probability distribution of the \(\delta\) field of the test set, and the corresponding reconstructed \(\delta\) obtained applying the neural network to the luminosity distance are shown in fig.([\[dist_delta\]](#dist_delta){reference-type="ref" reference="dist_delta"}). As it can be seen the reconstructed \(\delta\) follows approximately the same distribution of the test set, showing that the neural network is able to recover the statistical properties of the test data set. Different cross sections of the test set \(\delta\) and their corresponding reconstructions are shown in fig. ([\[cut_delta\]](#cut_delta){reference-type="ref" reference="cut_delta"}), showing a qualitatively good agreement. The MAE of the reconstructed \(\delta\) is \(0.20\), considerably smaller than the standard deviation \(\sigma_{\delta}=0.55\) of the test set, which can be used as a benchmark to asses the accuracy of the inversion. # Results of the inversion of the peculiar velocity field The mean absolute error of the reconstructed source velocity is shown in fig.([\[mae_vsrc\]](#mae_vsrc){reference-type="ref" reference="mae_vsrc"}). There is no apparent overfit between the training and test curves. The probability distributions of the velocity of the test set and that of the reconstructed velocity plotted in fig. ([\[dist_vsrc\]](#dist_vsrc){reference-type="ref" reference="dist_vsrc"}) are in good agreement, showing that the neural network is able to recover the statistical properties of the test data set. An example of the cross sections the reconstructed tree-dimensional velocity field is shown in fig. ([\[cut_vsrc\]](#cut_vsrc){reference-type="ref" reference="cut_vsrc"}). The MAE of the reconstruction is \(24.33\, km/s\) which is quite smaller than the standard deviation of the velocity of the test set \(\sigma_v=174.82\, km/s\), showing a good performance of the neural network. # Conclusion We have obtained for the first time solutions of the IP problem for arbitrary space-time geometries, based on the use of convolutional neural networks to reconstruct the velocity and density fields from the observed luminosity distance of SNe. The data to train the CNN is obtained by computing the effects on the luminosity distance of numerical simulations of cosmic structure. We trained a modified U-Net architecture which uses residual connections at three different scales. This fully convolutional network has roughly half a million parameters and is made up of 11 convolutional layers, and nearest neighbour interpolation is used to upsample the data in the decoder. The inputs of the encoder are the values of the luminosity distances for each cell in the grid and the coordinates of the cell. We used heldout validation and the network was trained for more than 60 and 80 epochs for the velocity and density field respectively. The CNN is able to reconstruct the test set density and velocity field with a mean average error of respectively \(0.20\) and \(24.33km/s\), compared to a standard deviation of the test set of \(\sigma_{\delta}=0.55\) and \(\sigma_v=174.82\, km/s\). The density field is more difficult to reconstruct due to its integrated effect on the luminosity distance, implying that multiple density configurations along the line of sight can produce the same integrated effect, making the solution of the IP not unique. The probability distributions of the reconstructed density and velocity fields match well the test set distribution. In the future it would be important to increase the resolution of the numerical simulations used to train the network, to increase the accuracy of the results of the inversion, and to apply dropout to the data used as input of the inversion, in order to mimick the sky coverage of the SNe catalogues.
{'timestamp': '2021-11-10T02:23:22', 'yymm': '2107', 'arxiv_id': '2107.05771', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05771'}
# ## ### # # I. Introduction {#Section I.} Antiferromagnetic materials gained attention in contemporary spintronics due to their unique features: The fast terahertz magnetization dynamics of antiferromagnets overcomes the GHz limit of their ferromagnetic counterparts used in present-day microelectronics (e.g. in magnetic random-access memories-MRAMs). Zero net magnetization due to the alternating magnetic moments on neighbouring atoms and the resulting absence of stray fields are advantageous for memory applications requiring high integration density with no cross-talk among adjacent devices. On the other hand, antiferromagnets have low sensitivity to external magnetic fields. This limits the implementation of schemes used for the manipulation of magnetic moments in ferromagnets and has, until recently, hindered the research into practical applications of antiferromagnetic materials. One of the possible methods of controlling the antiferromagnetic order is by Néel spin-orbit torques, which were predicted in materials with specific symmetries. For example, an efficient Néel vector reorientation can be generated by a field-like spin-orbit torque when the antiferromagnetically coupled magnetic atoms occupy inversion-partner lattice sites. A tetragonal collinear antiferromagnet CuMnAs with the Néel temperature \(T_{\mathrm{N}} = 480\) K is an example of a material where this switching mechanism was experimentally demonstrated. In this material, electrical control of the antiferromagnetic moments was also detected by the anisotropic magnetoresistance (AMR). However, the AMR-related signals were rather small, with relative resistance changes limited to tenths of percent. Apart from CuMnAs, the electrical control of magnetic moments was also demonstrated in Mn\(_2\)Au and other antiferromagnetic materials. Recently, we reported switching of CuMnAs into high-resistive states using optical or unipolar electrical pulses with resistive switching signals reaching 20\(\%\) at room temperature and approaching 100\(\%\) at low temperatures. After the writing pulse, the resistive signals relax following a stretched-exponential time-dependence with a characteristic timescale showing a simple exponential dependence on temperature. Unlike the spin-orbit torque reorientation of the Néel vector controlled by the angle or polarity of the switching current, the unipolar switching mechanism is independent of the writing current direction or polarization of the switching laser pulses. Complementary imaging measurements, including X-ray magnetic linear dichroism photoemission electron microscopy (XMLD-PEEM) and magneto-Seebeck microscopy, have shown that the observed large switching signals were accompanied by nano-fragmentation of magnetic domains. This unipolar mechanism, which is principally distinct from the spin-orbit torque reorientation of the Néel vector, was called a quench switching. In addition, recent imaging by differential-phase-contrast scanning transmission electron microscopy (DPC-STEM) has revealed that complex magnetic textures in CuMnAs can even include atomically sharp 180\(^{\circ}\) domain walls. Effects of the applied magnetic field on CuMnAs films and devices have been previously studied by means of magnetotransport measurements, XMLD spectroscopy and XMLD-PEEM. The study demonstrated a spin-flop transition and spin reorientation at the magnetic field of \(\sim 2\) T in CuMnAs thin films with uniaxial and biaxial magnetic anisotropy, respectively. Measurements in the spin-flop (reorientation) fields confirmed that AMR associated with the reorientation of the Néel vector is on the \(\sim 0.1\%\) scale in CuMnAs. In this manuscript, we investigate the quenched high-resistive states of CuMnAs at strong magnetic fields. Magnetoresistance (MR), i.e. the dependence of the material's resistance on the applied magnetic field, is a straightforward method to examine both magnetic and transport characteristics of metallic thin films. This phenomenon can be of multiple origins but the following should be especially taken into consideration for antiferromagnetic CuMnAs: (i) The above-mentioned anisotropic magnetoresistance (AMR), (ii) ordinary metallic MR caused by the Lorentz force, (iii) spin-disorder contribution to the resistance, and (iv) domain wall MR which can substantially affect the device resistance in particular when containing the sharp domain walls of high densities. Our paper is organized as follows: Section II describes employed experimental methods. In Section III, we present the main results: We show the qualitative differences between the MRs of the quenched high-resistive state and the relaxed state (), and the correspondence between the size of the switching signal and the magnitude of the changes detected in the MR (). We also address the anisotropy of the observed effects () and the behaviour at extreme magnetic fields (). In Section IV, we discuss our MR results in the context of the earlier magnetic-texture microscopy studies. Finally, Section V summarizes our results. # II. Experimental methods Tetragonal CuMnAs films of thickness 50 nm and 20 \(\Omega\) sheet resistance were grown by molecular beam epitaxy on GaP(001) substrates and capped with 3 nm of Al to prevent oxidation. Characterization by atomic force and scanning electron microscopy, SQUID magnetometry, x-ray diffraction and transport measurements showed high crystal quality and optimal electrical switching performance of the prepared samples. In particular, SQUID magnetometry data, which are typically dominated by a large negative diamagnetic signal of the GaP substrate, do not show any substantial magnetic moment after subtraction of this linear diamagnetic contribution. Further details about sample growth and characterization were recently described in Ref. . Hall bars (width 10\(\mu\)m, length 50\(\mu\)m) used in experiments were patterned by electron beam lithography and wet etching (see inset of  c for a scanning electron microscopy image of the fabricated device). Magnetoresistance measurements up to 14 T were performed using the electrical transport option (ETO) of the Physical Property Measurement System (PPMS). The system utilizes the digital lock-in technique and is equipped with a rotator for in-plane angular scans. Selected samples were later exposed to the magnetic field pulses with the magnitude of \(\sim 60\) T and the total duration of \(\sim 150\) ms at the Dresden High Magnetic Field Laboratory. Resistance evolution during the magnetic field pulse was recorded by a high-speed digitizer, the obtained data were processed using a lock-in technique. # III. Results ## A. Electrical switching and the magnetotransport measurement protocol {#a.-electrical-switching-and-the-magnetotransport-measurement-protocol .unnumbered} In a, b, c we demonstrate the switching of our CuMnAs Hall bars by unipolar electrical pulses of distinct voltage amplitudes and at different base temperatures. Whereas at 300 K, the resistance after the electrical pulse noticeably decays towards the initial low value (a), a high-resistance state is preserved and negligible relaxation is observed after the pulsing at 200 K (b). Besides this, the resistive signal scales up with the applied pulse voltage as illustrated in c for the switching at 200 K. In Ref. , it was shown that the signal induced by the electrical switching consists of two main components with different relaxation times \(\tau_1\) and \(\tau_2\). Both components follow the stretched exponential function \(\sim \exp(-(t/\tau_{1(2)})^{0.6} )\) and their relaxation times depend exponentially on temperature as \(\tau_{1(2)} = \tau_0 \exp(E_{1(2)}/ k_{ \mathrm{B} } T)\), consistently with relaxation behaviour recognized in many complex systems such as glassy materials. Using the energy parameters \(E_1/k_{\mathrm{B}} = 9240\) K, \(E_2/k_{\mathrm{B}} = 7830\) K and \(1/\tau_0\) in the THz range from Ref. , we get \(\tau_1 \sim\) 10 s for the main switching component and \(\tau_2 \sim\) 10 ms for the minor fast-relaxing component at 300 K, and \(\tau_1 \sim\) 10\(^7\) s and \(\tau_2 \sim\) 10\(^4\) s at 200 K for the two components, respectively. These expressions and parameters explain the observed non-decaying behaviour after cooling and allow us to realize MR measurements in the electrically switched state with virtually infinite relaxation times at low temperatures (\(\sim 2\) K). The design of the main MR experiment is schematically presented in d. At first, the electrical switching is performed at 200 K. Immediately after the switching, the sample is rapidly cooled down to 2 K maintaining the high resistance of the switched state. After temperature stabilization, MR curves for the magnetic field applied along selected crystallographic directions are collected. To recover the low-resistance relaxed state, the sample is heated up and annealed at 300 K for 30 minutes (\(\gg \tau_{1(2)}\)). Subsequently, the sample is again cooled down to 2 K and MR measurements are repeated in the same manner, but this time in the relaxed state. e shows the temperature dependence of the resistance measured on a typical Hall bar device in the relaxed (\(R_{\mathrm{r}}\)) and in the switched (\(R_{\mathrm{s}}\)) state. The relaxed-state resistance exhibits smoothly varying metallic behaviour with a residual resistance ratio \(\approx 6\), obtained from the 300 K and 2 K measurements, indicating high crystal quality of the samples. The switched state is offset by \(\delta R = R_{\mathrm{s}}-R_{\mathrm{r}}\). This difference does not change substantially in the displayed temperature range from 2 to 200 K. ## B. Field-sweep magnetotransport up to 14T {#b.-field-sweep-magnetotransport-up-to-14t .unnumbered} shows main changes in the MR produced by the quench switching. Whereas the relaxed state MR (b) displays essentially identical MRs for both up and down field sweeps, the MR in the high-resistance switched state (a) exhibits pronounced hysteretic effects. Moreover, a distinct response of the switched and relaxed state to the magnetic field is reflected in the change of the high field slope of the MR curves. To highlight the differences between the two states, we subtracted the relaxed-state MR from the switched-state MR, and the result is presented in c. The evolution of the hysteretic magnetization process and its main features are indicated by arrows and numbers: First, the resistance follows the virgin curve during the magnetic field increase (1.). Second, we record a higher resistance trace from 14 T to 0 T and a subsequent drop in the resistance to a lower value after crossing the zero-field point and continuing to \(-14\) T (2.). The MR curve (3.) is then recorded when the field is swept from-14 T to 14 T to complete a butterfly-shaped pattern. Subsequent magnetic field sweeps in the range from-14 T to 14 T can be described by repeating curves of the type (2.) and (3.) with the crossing at the same remanent resistance in the zero field. No considerable erasing of the overall switching signal by the magnetic field can be identified. The MR traces show reproducible hysteretic behaviour with a maximum width of the hysteresis at approximately 4 T. Additional measurements of minor hysteresis loops in the switched state of CuMnAs are presented in Supplementary Fig. S1. To demonstrate the close connection between the electrical switching and the changes observed in the MR, we repeated the magnetotransport measurements for several magnitudes of the switching signal. The obtained difference MR data are presented in a. For small switching signals (\(\lesssim 20\%\)), the switched-state MR roughly follows its relaxed-state counterpart, giving an almost constant difference MR curve. For larger switching signals, we observe the sizeable hysteresis accompanied by the change in the high-field slope (b, c). These two effects are the dominant features emerging in the MR after the switching. Qualitatively similar but quantitatively varying effects were also observed for different mutual current and field configurations (see Supplementary Figs. S2 and S3 for details). In , we explore the anisotropy of the switching-induced changes by measuring the longitudinal resistance during magnetic field rotations. The experimental procedure used here was analogous to that of field-sweep measurements. In tetragonal systems with competing uniaxial and biaxial anisotropies, the longitudinal AMR can be described by the following expression: \[\begin{aligned} \Delta R/\overline{R} & = C_{I} \cos( 2\psi ) + C_{U}\cos( 2\phi) \\ & + C_{C}\cos( 4\phi ) + C_{IC}\cos( 4\phi-2\psi ), \end{aligned} \label{eqAMRxx}\] where \(\psi\) is the angle between the Néel vector and the probing current \(j\), \(\phi\) is the angle between the Néel vector and the \([100]\) crystalline direction of CuMnAs, and the individual terms represent the non-crystalline AMR contribution (\(C_{I}\)), the uniaxial (\(C_{U}\)) and cubic (\(C_{C}\)) crystalline contribution and the mixed crystalline and non-crystalline contribution (\(C_{IC}\)). For both \(j \parallel [\overline{1}00]\) and \(j \parallel [010]\) in the switched and relaxed state (a), the observed AMR shows the presence of twofold and fourfold terms as expected from ,
{'timestamp': '2021-07-14T02:03:59', 'yymm': '2107', 'arxiv_id': '2107.05724', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05724'}
null
null
null
null
null
null
# Introduction {#intro} The reconstruction of the first images of M87\* by Very Long Baseline Interferometry (VLBI) observations performed by the Event Horizon Telescope (EHT) collaboration has represented one of the most sensational breakthroughs in present astrophysics. The observation of a black hole at a resolution sufficient to see its shadow surrounded by a light ring opens the possibility to directly investigate the structure of space-time in strong gravitational fields (see Ref. for a comprehensive and historic review). The current limitations to this technique come from the locations of the antennae on the Earth surface, whose diameter provides the maximum achievable baseline. At a wavelength of \(\lambda=1.3\) mm, this corresponds to a \(25 \mu as\) resolution, which is sufficient to measure the size of the shadow of a supermassive black hole in a nearby galaxy such as M87 or the black hole in our own Milky Way, Sgr A\*. However, there is much more structure that remains hidden to current arrays that would have an extraordinary impact on our knowledge of General Relativity. The size and shape of the shadow depends on the spin of the black hole, or may be used to constrain alternative theories of gravity. The light ring surrounding the shadow can be actually decomposed in an infinite sequence of concentric rings created by photons that perform one or more loops around the black hole before escaping. Such rings are exponentially thinner and dimmer as they approach the shadow border. Nevertheless, they leave an imprint on the complex visibility function, with a characteristic staircase structure. In order to see the first step of this staircase (corresponding to the resolution of the first higher order ring from the dominant outermost one), it would be necessary to build a station on the Moon or perhaps in the Lagrangian point L2. This is a strong motivation to extend the current network of arrays beyond our planet, a goal that seems in our reach in the next decades. Actually, what is traditionally called the "shadow" of the black hole is still brightened by the direct emission of the matter inflow down to the horizon. Depending on the geometry of the accretion flow, we may distinguish an "inner shadow" corresponding to the darkest area inside the "shadow". Another signature of the existence of higher order images created by photons winding around the black hole would come in the time domain, since any variability in the source would be replicated an infinite number of times by higher order images with a fixed delay. This echos would create distinctive peaks in the autocorrelation function that could be searched for in future observations. Polarimetric images of black holes are already employed to constrain the structure of magnetic fields in the accreting matter and could reveal much more with future extensions of the EHT. Finally, the size of the shadows of the black holes in far away galaxies may be regarded as standard rulers and help in the determination of cosmological distances. The existence of relativistic higher order images has been hypothesized by Darwin back in 1959 and recalled several times. Their properties like spacing and magnification are related to the properties of the black hole metric through the coefficients of the expansion of the deflection angle in the strong deflection limit, i.e. starting from the particular trajectory corresponding to the injection of photons in the unstable circular orbit around the black hole. In principle, the observation of such images would allow to distinguish among alternative metrics and theories of gravity. The coefficients of the strong deflection limit expansion depend on the properties of the metric at the level of the unstable circular orbit. Such properties also emerge in other contexts: the connection between strong deflection parameters and quasi-normal modes in the ringdown of gravitational waves has been widely explored. Indeed the best chances for reaching an ultimate proof of the existence of higher order images currently come from interferometric observations at very long baselines. As shown in Ref., higher order light rings around a black hole would generate a cascade of steps in the complex visibility that could be measured by stations in space or on the Moon. Therefore, in this paper, we propose straightforward relations between the basic properties of these steps (width, height and periodicities) and the strong deflection coefficients, thus establishing an immediate connection between such observables and the properties of the black hole metric. We will mainly focus on distant compact sources around spherically symmetric black holes, but the derived formulae can be considered as basic building blocks for more complicated source matter distributions. The paper is organized as follows: Section 2 recalls the basics of the strong deflection limit formalism, including a discussion of extended sources. In Section 3 we calculate the complex visibility for a localized source around the black hole (e.g. a hot cloud or a stellar atmosphere, depending on the observation band) and present a gallery of pictures covering the possible geometries. In Section 4, we derive analytical formulae for the width and height of the steps created by higher order images as functions of the metric. Such formulae can be inverted to provide the coefficients of the strong deflection limit for the metric of the observed object. In Section 5, we present some examples for different metrics (Reissner-Nordström, Janis-Newman-Winicour). The source orbital motion and the time delay between consecutive images are discussed in Section 6. Section 7 contains a discussion on the observational perspectives along with our conclusions. # Generation of higher order images {#Spherically symmetric black holes} Relativistic higher order images arise around any object that is compact enough to be fully contained inside its photon sphere, i.e. the sphere covered by all unstable circular orbits of photons with any possible inclinations. So, in principle, they may exist even around objects larger than their event horizon. For non-spherically symmetric black holes, the unstable photon orbits at fixed radii still exist, but they do not lie on a fixed plane because of precession and their radius is a function of the angular momentum. Since our purpose is to give an analytical description of the interferometric observables in a simple case, in this paper we will focus on spherically symmetric spacetimes only and leave axially symmetric spacetimes to future works. In this framework, the general formalism for the description of gravitational lensing in the strong deflection limit has been developed in Refs., which we will briefly recall in this section. We start from the following ansatz for the line element of a generic spherically symmetric space-time \[ds^2=A(r)dt^2-B(r)dr^2-C(r)\left(d\vartheta^2+\sin^2 \vartheta \ d\phi^2\right) \label{generalsimmetricmetric}\] Without loss of generality, we assume orbits on the equatorial plane \(\vartheta=\pi/2\). Furthermore, we assume that the function \(C(r)/A(r)\) has one minimum at \(r_m>0\), corresponding to the radius of the photon sphere. A null geodesic not ending in the black hole can be characterized through its impact parameter \(u\) or through its closest approach distance \(r_0>r_m\). The two quantities are related by \[u=\sqrt{\frac{C(r_0)}{A(r_0)}}.\] It is convenient to adopt the short notation \(A_m\equiv A(r_m)\) and similarly for all metric functions. In particular, a photon at impact parameter \[u_m=\sqrt{\frac{C_m}{A_m}},\] will asymptotically approach the photon sphere and finally be injected in the unstable circular orbit. Trajectories with a closest approach just slightly higher than the radius of the photon sphere can be described by a simple expansion \[r_0=r_m(1+\delta) \qquad u=u_m(1+\epsilon), \label{parametrizzazione}\] with \[\epsilon =\beta_m \delta^2 +o(\delta^2). \label{epsdelta}\] \[\beta_m=\frac{r_m^2}{4}\left(\frac{C''_m}{C_m}-\frac{A''_m}{A_m} \right).\] For a source at radial coordinate \(r_{S}\) and an observer at \(r_O\), the change in the azimutal angle \(\phi\) (i.e the deflection) is \[\Delta \phi=-a\log \frac{\epsilon}{\eta_O\eta_S}+b+\pi +O(\epsilon), \label{deflection}\] where \[\begin{gathered} \eta_O=1-\frac{r_m}{r_O} \qquad \eta_S=1-\frac{r_m}{r_S} \qquad \eta=1-\frac{r_m}{r}\label{etaS} \\ a=\frac{r_m}{u_m}\sqrt{\frac{B_m}{2A_m \beta_m}} \qquad b=a\log(4\beta_m)+b_O+b_S-\pi\\ \qquad b_O=\int_0^{\eta_O} g_1(\eta) \ d\eta \qquad b_S=\int_0^{\eta_S} g_1(\eta) \ d\eta \\ g_1(\eta)=\left[u_m\sqrt{\frac{B(r(\eta))}{C(r(\eta))}}\left(\frac{C(r(\eta))}{A(r(\eta))}-u^2\right)^{-\frac{1}{2}} \frac{r_m}{(1-\eta)^2}-\sqrt{\frac{B_m}{2\beta_m C_m}} \frac{r_m}{\sqrt{2\delta\eta+\eta^2}}\right] \end{gathered}\] The integrals in \(b_O\) and \(b_S\) are performed on the regular function \(g_1(\eta)\) and can be evaluated numerically, in general, or analytically for some simple metrics. For a source at azimutal coordinate \(\phi_S\) and an observer at \(\phi_O=\pi\), we can easily find the position of the images in the observer frame by inverting Eq. ([\[deflection\]](#deflection){reference-type="ref" reference="deflection"}) with \(\Delta \phi=\phi_O-\phi_S+ 2 n\pi\): \[\epsilon_{n,\pm}=\eta_O \eta_S e^{\frac{b\pm \phi_S-2n\pi}{a}}. \label{imagesposition}\] Here the double sign accounts for images appearing on the same side of the source (positive parity images) and images appearing on the opposite side (negative parity images). The latter are simply obtained by changing the sign in \(\phi_S\). \(n\) denotes the number of loops performed by the photon around the photon sphere before reaching the observer[^1]. With \(n=0\) and positive parity we would have the direct image, which is not described by the strong deflection limit expansion. All higher order images (\(n\geq 1\)) will be accurately described by Eq. ([\[imagesposition\]](#imagesposition){reference-type="ref" reference="imagesposition"}) and Eq. ([\[parametrizzazione\]](#parametrizzazione){reference-type="ref" reference="parametrizzazione"}). The negative parity image of order \(n=0\) is also acceptably described by the strong deflection limit if the source is on the same side of the observer. For an observer in the asymptotic region, which is the most physically interesting case, the angular separation between the direction of arrival of the photon and the direction of the black hole is simply \(\theta=u/r_{O}\). So we have \[\theta_{n,\pm}=\frac{u_m(1+\epsilon_{n,\pm})}{r_{O}}=\theta_m(1+\epsilon_{n,\pm}) \label{angularseparation}\] \(\theta_m=u_m/r_O\) is sometimes called the "angular radius of the shadow of the black hole": since all lensed images (except the direct image) of sources outside the photon sphere reach the observer from angles \(\theta>\theta_m\) and the region within the angular radius \(\theta_m\) should appear as almost empty, save for foreground sources. Of course, the possible appearance of a shadow depends on the shape, orientation and velocity of the infalling distribution of matter. Gravitomagnetic simulations favor an emitting region extending down to the horizon, well below the photon sphere. Such configuration would rather produce an inner shadow surrounded by a light ring with radius \(\theta_m\). For this reason, recent papers prefer to refer to \(\theta_m\) as a "critical curve". However, the wording "critical curve" already has a well-established mathematical meaning in more than sixty years of gravitational lensing literature. In a gravitational lensing problem in which the source moves on a fixed surface, critical curves are the loci in which the Jacobian of the lens map vanishes and where degenerate critical images appear. In our framework, when the source is perfectly aligned behind or in front of the black hole (\(\phi_S=0,\pi\)), the images degenerate in infinite sequences of concentric critical curves (the Einstein rings) asymptotically approaching the shadow border, which is not a critical curve itself, rigorously speaking. Although the circle with radius \(\theta_m\) may coincide with a particular critical curve after an appropriate choice of the source surface (a sphere almost coinciding with the photon sphere), in general, it is not a critical curve according to the traditional gravitational lensing terminology. In the following, for simplicity we will keep referring to \(\theta_m\) as the radius of the shadow, but the reader should be aware that the darkest area (if any) can show up well within this radius in realistic inflows. Coming back to Eq. ([\[angularseparation\]](#angularseparation){reference-type="ref" reference="angularseparation"}), we see that all higher order images will appear exponentially closer to \(\theta_m\) as the number of loops \(n\) is increased. It is also important to note that the strong deflection limit formulae presented here (Eqs. [\[etaS\]](#etaS){reference-type="ref" reference="etaS"}-[\[angularseparation\]](#angularseparation){reference-type="ref" reference="angularseparation"}) hold even for sources inside the photon sphere. In such case, \(\eta_S<0\) and then \(\epsilon<0\), which means that images form close to the shadow border from the inner side. Of course, there is no closest approach distance \(r_0\) for sources inside the photon sphere since light rays only come outward from the source to the observer. Indeed, \(\epsilon<0\) implies a complex \(\delta\) from Eq. ([\[epsdelta\]](#epsdelta){reference-type="ref" reference="epsdelta"}), but otherwise all formulae remain perfectly consistent. Therefore, our treatment also covers sources between the horizon and the photon sphere, provided we exclude the weakly lensed direct image. Relativistic higher order images (\(n\geq 1\)) appear as extremely thin tangentially elongated arcs. The tangential extension of the source remains unaffected by gravitational lensing: so for a source extending by \(\Delta\vartheta_S\) in the meridional direction[^2], each image will have the same extension \(\Delta\vartheta_I=\Delta \vartheta_S\). The radial thickness of the image is obtained by differentiation of Eq. ([\[angularseparation\]](#angularseparation){reference-type="ref" reference="angularseparation"}) \[\Delta\theta_{n,\pm}=\Delta\theta_{0} \; \epsilon_{n,\pm} \label{dthetan}\] \[\Delta\theta_{0}=\frac{\theta_m}{a} \Delta\phi_S +\theta_m \frac{r_m}{r_S^2 } \left(\frac{1}{\eta_S}+\frac{g_1(\eta_S)}{a} \right)\Delta r_S. \label{dtheta0}\] The geometric factor \(\Delta \theta_0\) contains information on the source distance and geometry, while each image is exponentially suppressed by \(\epsilon_{n,\pm}\). As we shall soon see, the size of the source matters in interferometric experiments, since it determines the angular frequencies at which all structures appear. In the following, we will consider a source with azimutal size \(\Delta\phi_S\), polar size \(\Delta \vartheta_S\) and radial extension \(\Delta r_S\) and express our results in terms of \(\Delta\theta_{n,\pm}\), as given by Eq. ([\[dthetan\]](#dthetan){reference-type="ref" reference="dthetan"}). Fig. [\[figimages\]](#figimages){reference-type="ref" reference="figimages"} shows an example of the images generated by a static source around a Schwarzschild black hole \[A(r)=c^2-\frac{2 M G}{ r} \qquad B(r)=\left(1-\frac{2 M G}{c^2 r}\right)^{-1} \qquad C(r)=r^2. \label{Schwarzschild}\] The major image on the right and the negative parity image on the left are the zero order images generated by relatively weak deflection. Higher order images appear right on the shadow border on both sides. The right panel shows a closer view in which the first two orders appear as separated. The strong deflection limit formalism establishes an easy analytical framework to study the higher order images created by black holes or alternative spherically symmetric metrics. As we shall see, this will allow us to derive interesting relations between the properties of the interferometric signal and the coefficients of the metric. # Interferometric signature {#Interferometric signature} Observing stations distributed around the Earth or in space would probe the complex visibility function \(V(\vec{u})\) corresponding to the Fourier transform of the sky image \(I(\vec{x})\). Here and in the following, \(\vec{x}\equiv (x,y)\) represents angular (Bardeen) coordinates in the observer sky, while \(\vec{u}\) is the angular frequency vector, given by the projection of the baseline orthogonal to the line of sight and measured in units of the observation wavelength \(\lambda\). Since we are assuming the spherical symmetry for our spacetime, all images lie on the same line, say the \(x\)-axis. It is important to note that this is strictly true only for perfectly static sources. As the source moves, higher order images will follow with some delay, since they are generated by photons taking longer paths including \(n\) revolutions around the black hole. For this reason, the description we are going to develop in this section applies to distant enough sources, whose orbital motion is negligible compared to the time delay of higher order images. We will come back to this important issue in Section [6](#Sec alignment){reference-type="ref" reference="Sec alignment"}. We assume for simplicity that the source has a Gaussian profile, so that, in a first approximation, all positive parity images have a Gaussian profile with the maximum in \(\vec x = (\theta_{n,+},0)\), radial size \(\Delta\theta_{n,+}\) and tangential extension \(\theta_{n,+} \Delta\vartheta_S\) (the tangential direction would be parallel to the \(y\)-axis in our coordinates, see Fig. [\[figimages\]](#figimages){reference-type="ref" reference="figimages"}). Negative parity images are on the opposite side, with \(\vec x = (-\theta_{n,-},0)\). Thus, the contribution of the higher order images to the sky image can be written in the following way: \[I(x,y)=I_0 \sum_{p=\pm 1} \sum_{n=1}^{+\infty} e^{-\frac{(x-p \theta_{n,p})^2}{2\Delta\theta_{n,p}^2}} e^{-\frac{y^2}{2\theta_{n,p}^2 \Delta\vartheta_S^2}}. \label{skyimage}\] Note that the surface brightness is conserved by gravitational lensing. Therefore, the central brightness \(I_0\) is the same for all images. Since \(\theta_n =\theta_m + O(\epsilon_n)\) while \(\Delta\theta_n = O (\epsilon_n)\), the extension along \(x\) decays very quickly, while the extension along \(y\) rapidly tends to a constant. We can compute the Fourier transform on \(I(x,y)\) to obtain the complex visibility function \[V(u,v)=\int I(x,y) e^{-2\pi \imath (ux+vy)} \ dx \ dy\] Each image is a product of two independent Gaussians (as long as the source is not too large). The integration simply gives \[V(u,v)=2\pi I_0 \sum_{p=\pm 1} \sum_{n=1}^{+\infty} \theta_{n,p} \Delta\vartheta_S \Delta \theta_{n,p} \ e^{-2\pi^2 \Delta\theta_{n,p}^2 u^2} e^{-2\pi^2 \theta_{n,p}^2 \Delta\vartheta_S^2 v^2} e^{-2\pi \imath p\theta_{n,p} u} \label{visibility}\] The visibility function contains a real exponential, giving the decay at high angular frequencies, and a complex exponential. Note that since the zero order images are much more extended than the higher order images, their contribution to the visibility decays on much shorter scales than those described by Eq. ([\[visibility\]](#visibility){reference-type="ref" reference="visibility"}). In practice, while the zero order images become negligible at \(u> r_O/(r_S\Delta \phi_S)\), the first order image decays at \(u>1/\Delta \theta_1 \sim 1/(\theta_m \epsilon_1 \Delta \phi_S)\). In general, \(\theta_m< r_s/r_O\) and \(\epsilon_1 \ll 1\). Therefore, we proceed by neglecting the contribution of zero order images to very high angular frequencies. Similarly, as the contributions due to first order images decay, the second order images stand up and so on. The structure of the visibility function in the \(u\) direction is staircase-like. The complex exponentials do not affect the modulus of the complex visibility if there is only one dominant term. However, as soon as the contribution of a dominant image decays, the complex exponential of the uprising image mixes with the previous one creating oscillations. Eq. ([\[visibility\]](#visibility){reference-type="ref" reference="visibility"}) contains terms of different order in \(\epsilon_n\). In order to be consistent with the strong deflection limit framework, we must only consider the lowest order terms in \(V(u,v)\). With this prescription, we get some further simplification \[V(u,v)=N(v)\sum_{p=\pm 1} \sum_{n=1}^{+\infty} \epsilon_{n,p} \ e^{-2\pi^2 \Delta\theta_{n,p}^2 u^2} e^{-2\pi \imath p \theta_{n,p} u}, \label{visibilitysimple}\] \[N(v)=2\pi I_0 \theta_m \Delta \theta_{0} \Delta\vartheta_S e^{-2\pi^2 \theta_m^2 \Delta\vartheta_S^2 v^2}.\] Once more, we note that the \(v\) dependence orthogonal to the line on which images are formed factors out of the sum, since all images have the same tangential extension. Therefore, we have included this term in a pre-factor \(N(v)\) that is the same for all terms in the sum and depends on the geometry of the source: its size, shape, brightness and position. The \(u\) dependence is much more interesting, since it contains the details of the higher order images through the amplitudes and the scales of the Gaussians. In the complex phase factor we have kept first order terms, since they become important in phase differences. In order to visualize the visibility as a function of the angular frequency \(u\), once more we consider a simple Schwarzschild metric ([\[Schwarzschild\]](#Schwarzschild){reference-type="ref" reference="Schwarzschild"}). For parameters like the mass or the distance between the lens and the observer we refer to \(M87^*\), already studied in Ref.: \(M=6.5*10^9 M_\odot\) and \(r_O=\SI{16.8}{\mega\parsec}\); we take a source at a distance of \(r_S=100\) with a size of \(5\) in units of the Schwarzschild radius \(R_{Sch}=2MG/c^2\). This could be a hot cloud resulting from the disruption of a star, or anything else coming too close to the supermassive black hole. With these values, we get \(\Delta \theta_0=\SI{4.9e-12}{}\). In Fig. [\[VcambiandoPhiS\]](#VcambiandoPhiS){reference-type="ref" reference="VcambiandoPhiS"} we report the contributions to the visibility coming from higher order images. For reference, the contribution of the direct zero order image would be already negligible for \(u>10^{10}\). The visibility has a staircase shape: the highest step (on the left) is due to the \(n=0\) image with negative parity, the second step is the primary image at order \(n=1\), the third step is the secondary image for \(n=1\) and so on. Depending on the source alignment \(\phi_S\), the relative positions of the positive parity and negative parity steps changes. For \(\phi_S=0\) (source perfectly aligned behind the black hole, the two steps coincide (blue curve). For \(\phi_S=90^\circ\), the negative parity steps are half-way between two consecutive positive parity steps. For sources in front of the black hole (\(\phi_S=180^\circ\)), negative parity steps coincide with positive parity steps of the following order. When two contributions are of the same order of magnitude, oscillations caused by the complex exponentials can be seen. In Fig. [\[VcambiandoDTheta0\]](#VcambiandoDTheta0){reference-type="ref" reference="VcambiandoDTheta0"} we see the change in the visibility with the geometric factor \(\Delta\theta_0\), which depends on the source size and distance. Increasing \(\Delta\theta_0\), the steps become shorter. # The inversion problem: from the visibility to the black hole parameters {#Width and height of each step} Eq. ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}) provides a simple guidance for the visibility function generated by a compact source around a black hole or, in general, any objects endowed with a photon sphere. As noted before, the pre-factor \(N(v)\) depends on the characteristics of the source, but we can easy get rid of it by taking ratios of the contributions of images of different order. Fig. [\[VcambiandoPhiS\]](#VcambiandoPhiS){reference-type="ref" reference="VcambiandoPhiS"} shows that the visibility has a staircase structure, with each step dominated by one term in the sum in Eq. ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}). The height of each step is simply given by the amplitude \[h_{n,\pm}=N(v) \epsilon_{n,\pm}. \label{height}\] Independently of the shape of the source, the rate at which the staircase falls down only depends on the source position and the characteristics of the metric contained in \(\epsilon_{n,\pm}\), as given by Eq. ([\[imagesposition\]](#imagesposition){reference-type="ref" reference="imagesposition"}). We can also obtain the intersection point of each step with the following one by equating the contributions of two consecutive terms in Eq. ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}). We must distinguish two cases: intersection between primary and secondary image of the same order (same \(n\)) and intersection between secondary and subsequent primary image. As regard the first case, we can write \[\epsilon_{n,+} e^{-2\pi^2 \Delta\theta_0^2 \epsilon_{n,+}^2 u^2}=\epsilon_{n,-} e^{-2\pi^2 \Delta\theta_0^2 \epsilon_{n,-}^2 u^2}. \label{primariavssecondaria}\] By inspection of Eq. ([\[imagesposition\]](#imagesposition){reference-type="ref" reference="imagesposition"}), we now note that \[\epsilon_{n,-}=\epsilon_{n,+} e^{-\frac{2\phi_S}{a}}.\] Inserting this relation in [\[primariavssecondaria\]](#primariavssecondaria){reference-type="eqref" reference="primariavssecondaria"} we can easily solve for \(u\) and obtain the starting point of the step dominated by the secondary image of order \(n\) with height \(h_{n,-}\): \[u_{n,-}=\frac{1}{\pi \Delta \theta_0 \epsilon_{n,-}} \sqrt{\frac{\frac{\phi_S}{a}}{e^{\frac{4\phi_S}{a}}-1}}. \label{intersezione12}\] Note that this formula converges to a constant as \(\phi_S \rightarrow 0\). However, in the perfect alignment limit the two images merge in an Einstein ring and generate the same step save for the phase factor. For the second case (step between a secondary image and the primary image of the subsequent order), we write \[\epsilon_{n,-} e^{-2\pi^2 \Delta\theta_0^2 \epsilon_{n,-}^2 u^2}=\epsilon_{n+1,+} e^{-2\pi^2 \Delta\theta_0^2 \epsilon_{n+1,+}^2 u^2}. \label{secondariavsprimaria}\] Noting that \[\epsilon_{n+1,+}=\epsilon_{n,-} e^{-\frac{2\pi-2\phi_S}{a}},\] we find the starting point of the step dominated by the positive parity image of order \(n\): \[u_{n,+}=\frac{1}{\pi \Delta \theta_0 \epsilon_{n,+}} \sqrt{\frac{\frac{\pi-\phi_S}{a}}{e^{\frac{4(\pi-\phi_S)}{a}}-1}}. \label{intersezione21}\] The last information we can exploit in Eq. ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}) is stored in the phase factor. When we calculate the visibility amplitude, the phase factors of terms having similar size create interference terms with argument \(2\pi u (\theta_{n,+}+\theta_{n,-})\) or \(2\pi u (\theta_{n,-}+\theta_{n+1,+})\). Such terms arise because the two images contributing at the intersection of two steps are on opposite sides of the black hole at a separation given by \((\theta_{n,+}+\theta_{n,-})\) or \((\theta_{n,-}+\theta_{n+1,+})\) respectively. The corresponding modulations in the visibility have a periodicities given by \[P_{n,+}\equiv \nu_{n,+}^{-1} =\left[\theta_m(2+\epsilon_{n,+}+\epsilon_{n,-})\right]^{-1} \label{Period+}\] \[P_{n,-}\equiv \nu_{n,-}^{-1} =\left[\theta_m(2+\epsilon_{n,-}+\epsilon_{n+1,+})\right]^{-1}. \label{Period-}\] At this point, we can try to combine the available information to extract all possible physical parameters for our lensing problem. Indeed, the easiest quantity to measure is the strong deflection coefficient[^3] \(a\). In fact, taking the ratio of the heights of two steps corresponding to the same parity and consecutive orders, we have \[a=\frac{2\pi}{\ln \left(h_{n,+}/h_{n+1,+} \right)}. \label{aequation}\] In practice, the coefficient \(a\) regulates the decay rate of the visibility function by establishing the ratio of the magnification factor of images of consecutive order. The next variable we can easily extract is the source azimutal position \(\phi_S\): \[\phi_S=\frac{a}{2}{\ln \left(h_{n,+}/h_{n,-} \right)}.\] In fact, the steps corresponding to negative parity images would coincide with positive parity steps for well-aligned sources, while will come half-way between two steps of consecutive order if the source is in quadrature (\(\phi_S=\pi/2\)). In order to extract the other strong deflection coefficient \(b\), we need to resort to the periodicities of the oscillations from Eqs. ([\[Period+\]](#Period+){reference-type="ref" reference="Period+"}) and ([\[Period-\]](#Period-){reference-type="ref" reference="Period-"}). If we are able to measure the periods of the oscillations at two consecutive step crossings, we may substitute Eqs. ([\[angularseparation\]](#angularseparation){reference-type="ref" reference="angularseparation"}) and ([\[imagesposition\]](#imagesposition){reference-type="ref" reference="imagesposition"}), and invert \[\theta_m=\frac{1}{4} \left\{e^{\frac{2\pi}{a}}\left[\nu_{n,-}+ e^{-\frac{2\phi_S}{a}} \left(\nu_{n,-}-\nu_{n,+} \right)\right]-\nu_{n,+} \right\}\left(\coth{\frac{\pi}{a}}-1 \right),\] \[\eta_O\eta_S e^{\frac{b-2n\pi}{a}}= \frac{2(\nu_{n,+}-\nu_{n,-})}{\nu_{n,-}\left( e^{\frac{\phi_S}{a}} + e^{-\frac{\phi_S}{a}}\right)-\nu_{n,+} \left( e^{\frac{\phi_S-2\pi}{a}} + e^{-\frac{\phi_S}{a}}\right)}. \label{bequation}\] These formulae complete the full extraction of all parameters intervening in gravitational lensing in the strong deflection limit from the study of the complex visibility of one compact source around a massive compact object. Interestingly, the radius of the shadow \(\theta_m\) can be obtained from the observation of a compact source, even without the observation of a full ring. The left hand side of Eq. ([\[bequation\]](#bequation){reference-type="ref" reference="bequation"}) actually contains a combination of the coefficient \(b\) with other geometric parameters. Assuming we know which order \(n\) we are measuring, \(\eta_O\) is equal to 1 for every practical observations, since we are at a distance much larger than the Schwarzschild radius. \(\eta_S\) depends on the source distance through Eq. ([\[etaS\]](#etaS){reference-type="ref" reference="etaS"}). As stated before, we are already assuming that the source is distant enough to neglect its orbital motion. Therefore, we can also consider \(\eta_S\simeq 1\). We have not used the intersection points between the steps from Eqs. ([\[intersezione12\]](#intersezione12){reference-type="ref" reference="intersezione12"}), ([\[intersezione21\]](#intersezione21){reference-type="ref" reference="intersezione21"}) to derive the coefficients of the metric. Indeed, \(u_{n,\pm}\) depends on the source size through \(\Delta \theta_0\), so it can be used to investigate the nature of the source rather than the properties of the black hole. Nevertheless, it must be kept in mind that the size of the source is of critical importance to determine the necessary baseline for this kind of investigation, since all the scaling of the staircase structure depends on it: a larger source will require a shorter baseline. # Examples {#Results} Eqs. ([\[aequation\]](#aequation){reference-type="ref" reference="aequation"})-([\[bequation\]](#bequation){reference-type="ref" reference="bequation"}) provide a simple analytical framework to translate the main observable features of the complex visibility in the strong deflection limit parameters, which are connected with the underlying spacetime metric. In this section, we provide two examples that demonstrate how the characteristics of the visibility depend on the deviations from a pure Schwarzschild metric, enabling the possibility to test General Relativity with interferometric observations at an unprecedented level. The first metric we consider is the Reissner-Nordström (RN) metric, representing the spacetime for an electrically charged static black hole \[A(r)=c^2-\frac{2 M G}{ r}+\frac{q^2 G}{4 \pi \epsilon_0 c^2 r^2} \quad B(r)=\left(1-\frac{2 M G}{c^2 r}+\frac{q^2 G}{4 \pi \epsilon_0 c^4 r^2}\right)^{-1} \quad C(r)=r^2.\] The second metric is the Janis-Newman-Winicour (JNW) metric, generated by the interaction of the metric tensor with an additional scalar field \[A(r)=c^2\left(1-\frac{2 M G}{c^2 r}\right)^\gamma \qquad B(r)=\left(1-\frac{2 M G}{c^2 r}\right)^{-\gamma} \qquad C(r)=\left(1-\frac{2 M G}{c^2 r}\right)^{1-\gamma}r^2.\] The RN spacetime reduces to Schwarzschild for vanishing electric charge \(q\). The JNW metric depends on the scalar charge through \(\gamma=M/\sqrt{M^2+q^2}\). We thus have \(0<\gamma \leq 1\), recovering Schwarzschild for \(\gamma=1\). On the other hand, a RN metric with \(q>2M\sqrt{G \epsilon_0 \pi}\) has no event horizon and causality violations appear. Nevertheless, a photon sphere still exists up to \(q=3/\sqrt{2} \; M\sqrt{G \epsilon_0 \pi}\). In JNW we have a photon sphere for \(\gamma>\frac{1}{2}\). Figs. [\[AltezzaRN\]](#AltezzaRN){reference-type="ref" reference="AltezzaRN"} shows the heights of the steps in the visibility function for first order images with positive or negative parity as functions of \(\phi_S\). Different colors are for different values of the electric charge \(q\). As already mentioned, the steps due to positive and negative parity images of the same order coincide for perfectly aligned sources \(\phi_S=0\). As the source moves out of perfect alignment, the positive parity step grows while the negative parity step decreases its height. As we turn the electric charge on, both heights increase and the slope of the lines softens. According to Eq. ([\[aequation\]](#aequation){reference-type="ref" reference="aequation"}), the coefficient \(a\) can be obtained by the ratio \(h_{1,+}/h_{2,+}\). In RN metric, this coefficient slightly increases with the electric charge. The ability to distinguish a Schwarzschild black hole from an electrically charged black hole depends on the precision at which we can measure this ratio. The periods in the oscillations, shown in Fig. [\[PeriodoRN\]](#PeriodoRN){reference-type="ref" reference="PeriodoRN"}, increase with the electric charge, mostly because of the decrease in the radius of the shadow \(\theta_m\). From these periods it is possible to extract the other coefficient \(b\) through Eq. ([\[bequation\]](#bequation){reference-type="ref" reference="bequation"}). Fig. [\[AltezzaJNW\]](#AltezzaJNW){reference-type="ref" reference="AltezzaJNW"} shows a similar behavior for the heights of the steps in the JNW metric. These increase as we move away from the pure Schwarzschild case. The increase in the periods in Fig. [\[PeriodoJNW\]](#PeriodoJNW){reference-type="ref" reference="PeriodoJNW"} looks however quite different from that of RN. So, in principle, it should be possible to use the information stored in the heights and periods of the steps to distinguish between different metrics. # Orbital motion and time delay {#Sec alignment} In the previous sections we have derived the configuration of the images and their complex visibility under the assumption of a static source at fixed coordinates \((r_S,\vartheta_S=\pi/2,\phi_S)\). In this situation, the images seen by the observer lie on the line joining the projections of the source and the lens on the observer sky. Thanks to this alignment, the complex visibility has a non-trivial structure only along the \(u\)-axis and can be described by simple analytical formulae ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}). However, real sources typically orbit around the supermassive black hole at very high speeds, becoming even relativistic in the inner regions of the accretion disk. Different images created by photons emitted by such sources are subject to time delays depending on the lengths of the different paths taken by the photons and on the gravitational fields crossed along their journeys. We may thus ask how slow should a compact source be to generate a staircase pattern as those studied in this paper. To have an idea, we consider a source on a circular orbit with radius \(r_S\) moving along the meridional direction \(\vartheta\), so as to maximize the misalignment of the higher order images. The orbital period of such source, as measured by the observer at infinity, would be \[P_S=2\pi\sqrt{\frac{C'(r_S)}{A'(r_S)}}=2\pi \frac{r_S^{3/2}}{\sqrt{GM}},\] where in the last equality we have specified the functions \(C\) and \(A\) to the Schwarzschild metric and we have thus recovered the third Kepler's law. The time delay between one image of order \(n\) and the next image of order \(n+1\) is essentially given by the time taken by a light ray to complete one turn around the photon sphere \[\Delta T=2\pi\sqrt{\frac{C'(r_m)}{A'(r_m)}}=3\sqrt{3}\pi \frac{GM}{c^3}.\] The angular displacement of these two images of consecutive order coincides with the angular displacement of the source due to its orbital motion in the time \(\Delta T\): \[\Delta \vartheta = \frac{2\pi}{\sin \phi_S} \frac{\Delta T}{P_S}= \frac{2\pi}{\sin \phi_S} \left( \frac{3GM}{c^2 r_S} \right)^{3/2}.\] We can quantify the degree of misalignment of the images by taking the ratio between the angular displacement and the angular extension of the images: \[\mu\equiv \frac{\Delta \vartheta}{\Delta \vartheta_S}.\] If we assume a spherical source, we may set \(\Delta \vartheta_S = \Delta r_S/(r_S \sin \phi_S)\), where \(\Delta r_S\) is the physical size of the source. We would then have \[\mu = \frac{2\pi}{r_S^{1/2} \Delta r_S} \left( \frac{3GM}{c^2} \right)^{3/2}.\] For a gaussian-shaped source, even a misalignment of \(10\%\) would be quite acceptable and the scheme proposed in this paper would work fine. However, if the source has a size of the order of the Schwarzschild radius, the misalignment would anyway scale as \(\left(R_{Sch}/r_S\right)^{1/2}\), which means that we need a source farther than 100 Schwarzschild radii to have a misalignment lower than \(10\%\). Fig. [\[Fig threshold\]](#Fig threshold){reference-type="ref" reference="Fig threshold"} shows the minimum distance for sources of various sizes as a function of the corresponding misalignment. This shows that indeed we may have well-aligned images described by the visibility ([\[visibilitysimple\]](#visibilitysimple){reference-type="ref" reference="visibilitysimple"}), provided the source is far enough. # Discussion and conclusions {#Conclusion} This paper provides a modern follow-up to Refs. and in the light of the EHT observations. The strong deflection limit formalism allows a complete analytical derivation of the shape of the complex visibility function for a compact source at some distance from a black hole or any ultra-compact objects endowed with a photon sphere. We have been able to track the height and width of the steps generated by higher order images, along with the periodicities in the angular frequency, to the coefficients of the strong deflection limit expansion. These formulae establish a direct connection between the features in the visibility and the form of the spacetime metric that shapes the photon sphere. The application of such ideas to a real astrophysical case obviously requires space-based interferometry, with different challenges for different spectral bands. By operating at mm wavelength the EHT is sensitive to non-thermal radiation from accreting matter. A compact source may arise from very energetic flare, i.e. a localized change in the magnetic fields surrounding the black hole triggering the emission of radiation from a relatively small region. The advantage of a compact source is that all higher order images are small and well-separated, allowing an easy disentangling between the properties of the metric and the source details. In fact, we have encoded the source effective size in a single parameter \(\Delta\theta_0\), which is estimated by the steps width. In contrast, the observation of the shadow profile and the light ring features always requires some minimal hypothesis on the nature of the accretion flow and thus retains some model-dependence to some extent. The detection of higher order steps would be possible with stations in the Moon or in the Lagrangian point L2. The \(v\)-axis contains information on the tangential extension of the source and its state of motion. Focusing on the more interesting \(u\)-axis, continuous observations by stations spaced on a single direction should be able to catch signals due to sources aligned along the same direction. A small network of stations on the Moon should be able to estimate the periodicity in the visibility ([\[Period+\]](#Period+){reference-type="ref" reference="Period+"})-([\[Period-\]](#Period-){reference-type="ref" reference="Period-"}). This is important to constrain the spatial distribution of the images, which depends on \(\theta_m\) and the coefficient \(b\). As discussed in Section [6](#Sec alignment){reference-type="ref" reference="Sec alignment"}, our formalism is limited to sources that are slow (distant) enough to have images aligned on the same direction. An extension to faster (closer) sources is certainly possible by incorporating time delay in our formulae. We note that also for rotating black holes the images no longer occur on a straight line and even new images may be generated by extended caustics. In this case, it would be necessary to extend the network over different directions so as to have a full map of the images. In this respect, the study presented in this paper can be the basis for further generalizations to axially symmetric black holes and to fast-orbiting sources down to the event horizon. Interferometry at shorter wavelengths has been suggested in the context of the search for extrasolar planets. In the mid-infrared (MIR), at \(\lambda_{eff}=10 \mu m\), it would be possible to see cool giant stars with expanded atmospheres that might be orbiting the black hole at some distance. Such relatively compact objects would provide ideal sources for the observation of higher order images. At such wavelengths, the baseline needed to see the staircase structure in the visibility is reduced by a factor 100 with respect to mm observations. For example, the resolution reached at \(\lambda=1 mm\) with a station at L2 would be obtained at \(\lambda=10\mu m\) with a baseline just wider than the Earth diameter. Indeed, these projects for space interferometry in MIR will require further studies to overcome the technical challenges. Achieving stability in this band on such long distances is beyond current capabilities, but the existence of multiple interests from different fields will certainly foster new ideas in the next decades. [^1]: Note that papers describing the light ring find more convenient to label images by the number of half-orbits. In our treatment, the number of half-orbits will be given by \(2n\) for positive parity images and \(2n+1\) for negative parity images [^2]: We remind that we have oriented our coordinates in such a way that the source, the observer and the origin lie on the equatorial plane. The tangential extension of the images is then described by the polar angle \(\vartheta\) in the coordinates ([\[generalsimmetricmetric\]](#generalsimmetricmetric){reference-type="ref" reference="generalsimmetricmetric"}). [^3]: This is also identified as the Lyapunov exponent for the instability of null geodesics.
{'timestamp': '2021-09-29T02:12:36', 'yymm': '2107', 'arxiv_id': '2107.05723', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05723'}
null
null
null
null
# Introduction {#sec:introduction} In recent condensed matter physics, topological phases of matter have attracted much attention . So far many researchers have energetically proposed various topological materials, where the wavefunction has nontrivial topology characterized by a topological invariant. A topological invariant is well-defined for a gapped Hamiltonian, i.e., an insulator or a fully gapped superconductor. Over the past decade, theoretical studies have shown that topological numbers can be classified by the symmetry and dimensionality of the system. In the early stages of the studies, classification theory based on *onsite* symmetries, namely time-reversal symmetry (TRS), particle--hole symmetry (PHS), and chiral symmetry (CS), was developed . The three symmetries categorize any system into ten types, which are known as Altland--Zirnbauer (AZ) classes . Based on the categorization, Refs.  have suggested a *topological periodic table*. One can identify, by using the table, a topological number for a (gapped) system of interest, when the AZ class and dimension of the system are determined. On the other hand, more recent studies have intensively investigated a classification problem under *crystal* symmetry as well as onsite symmetry. The first trigger for such studies was a suggestion of topological crystalline insulators by Fu .
{'timestamp': '2021-12-01T02:10:24', 'yymm': '2107', 'arxiv_id': '2107.05801', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05801'}
# Introduction An understanding of the response of organic scintillators to recoil nuclei is important in a wide range of basic and applied physics. In the search for dark matter, nuclear recoils in organic scintillators provide a means to detect hypothetical weakly and strongly interacting massive particles . For neutrino studies, many large-scale (e.g., KamLAND , SNO+ , Borexino ) and benchtop measurements (e.g., CHESS, FlatDot , and MiniCHANDLER ) employ organic scintillators as the detection medium, wherein recoiling alpha particles from radioactive contaminants or protons from fast neutron interactions represent important sources of background . Organic scintillators are also useful for neutron detection in a variety of national security and proliferation detection applications, and the proton light yield represents an important quantity in this regard. For example, the Single-Volume Scatter Camera---a compact scintillating medium designed for fast neutron source search, localization, and imaging---relies upon double-scatter kinematic reconstruction of neutron interactions, where the proton light yield is required to convert the measured scintillation light into proton recoil energy . In both basic science and applications, accurate modeling of the response of organic scintillators requires an understanding of the light yield of recoil particles. While the light output response of organic scintillators to recoil nuclei has been extensively studied, there remains significant disagreement in the literature as to the relationship between the specific luminescence and characteristics of the recoil particle . The extent of ionization quenching depends upon the ionization and excitation density in the scintillating medium, which increases with the stopping power of the recoil particle. As a result, the relationship between particle energy and scintillation light is nonlinear, and the amount of quenching increases with particle charge for a given recoil energy. The canonical Birks Law  (or generalizations thereof ) are often used to describe the specific luminescence, but these models rely upon the knowledge of empirically-derived parameters. Currently, no theoretical formalism exists to accurately predict the ionization quenching effect in organic scintillators. Additional data are needed both to inform theoretical models of scintillator luminescence and characterize the response of commercial organic scintillators commonly used for basic nuclear physics and applications. In this work, the proton and carbon light yield of the EJ-309 and EJ-204 organic scintillators were measured simultaneously over a range of recoil energies. The EJ-309 liquid scintillator has pulse shape discrimination (PSD) properties  and was selected as a standard of reference given the relatively large body of work characterizing the proton light yield of this medium . The EJ-204 plastic scintillator has a rapid temporal response and long attenuation length , and it has been identified as a prime candidate for use in cutting-edge compact neutron imaging systems . In Sec. [2](#exp){reference-type="ref" reference="exp"}, an overview of the experimental setup and electronics configuration is provided. Section [3](#analysis){reference-type="ref" reference="analysis"} consists of a description of the analysis methods used to obtain the proton and carbon light yield relations, including recoil energy determination, light output calibration, data reduction, and uncertainty quantification. In Sec. [4](#results_and_discuss){reference-type="ref" reference="results_and_discuss"}, the measured EJ-309 and EJ-204 proton and carbon light yields are presented and compared to prior works where available. A discussion of the quenching factor, a metric commonly used to characterize the response of recoil nuclei in organic scintillators, is also provided. Concluding remarks are given in Sec. [5](#summary){reference-type="ref" reference="summary"}. # Experimental Methods {#exp} The double time-of-flight (TOF) method of Brown et al. was extended to measure both the proton and carbon light yield of organic scintillators . Proton and carbon recoil energies were inferred via \(np\) and \(n\)C elastic scattering kinematics allowing for event-by-event discrimination between these channels. Each nuclear recoil was associated with the scintillator light output to provide a continuous, simultaneous determination of both light yield relations. Measurements were performed for the EJ-309 liquid scintillator and the EJ-204 plastic scintillator, both from Eljen Technologies. A broad spectrum neutron source was produced by impinging a 33 MeV \(^{2}\)H\(^{+}\) beam from the 88-Inch Cyclotron at Lawrence Berkeley National Laboratory onto a 3-mm-thick Be target in the cyclotron vault . Neutrons were collimated using approximately 1 m of steel and 1.5 m of concrete and sand bags to yield a 20-cm-diameter open-air beam in the experimental area. The target scintillator (either EJ-309 or EJ-204) was placed in the neutron beam 7.5 m from the Be target and surrounded by eleven EJ-309 observation scintillators at angles spanning \(15-165^\circ\) with respect to the incoming neutrons. The experimental setup is shown in Fig. [\[exp-setup\]](#exp-setup){reference-type="ref" reference="exp-setup"} for the EJ-204 scintillator. In the EJ-309 measurement, the target scintillator was oriented horizontally and rotated approximately \(60^\circ\) with respect to the incoming beam. Each observation detector was located approximately \(1.5-1.6\) m from the target. The PSD capability of the observation scintillators allowed for selection of scattered neutrons, reducing false coincidences between neutron interactions in the target scintillator and background events in the observation cells. By measuring the neutron scattering angle, the neutron TOF between the target scintillator and the observation detector, and the neutron TOF between the target scintillator and the Be breakup target, neutron elastic scattering events on proton and carbon nuclei were distinguished using the known reaction kinematics. Each target scintillator was optically coupled to two gain-matched photomultiplier tubes (PMTs) using EJ-550 silicone grease. The EJ-309 target scintillator was a 5.08 cm dia. x 5.08 cm len. right circular cylindrical liquid cell in a dual-window aluminum housing internally coated with EJ-520 titanium dioxide reflective paint . The cell was coupled on each end to Hamamatsu H13795-100 PMTs biased at \(-1750\) V and \(-1800\) V. The EJ-204 target scintillator was a 5.08 cm dia. x 5.08 cm len. right circular cylinder coupled on each base to a Hamamatsu H1949-51 PMT (biased at \(-2350\) V and \(-2280\) V for the upper and lower PMT, respectively). Each EJ-309 observation detector was a right cylindrical cell (5.08 cm dia. x 5.08 cm len.) of thin aluminum housing coupled to a Hamamatsu PMT (either Type 1949-50 or 1949-51) via a borosilicate glass window and EJ-550 silicone grease. All PMTs were negatively biased using either a CAEN R1470ETD or CAEN NDT1470 power supply. Each PMT signal (as well as the cyclotron RF control signal) was connected to a CAEN V1730 500-MS/s, 14-bit digitizer. Data were acquired over a period of 18 h and 20 h with a beam current of approximately 12 nA for the EJ-309 and EJ-204 target scintillators, respectively. Full waveforms with global timestamps were recorded, with a 1.6 \(\mu\)s and 800 ns acquisition window for the signals from the target scintillator and observation detectors, respectively. The data acquisition system triggered on a coincidence between the two target PMTs (allowing for the rejection of uncorrelated dark current) and one of the observation detectors within a 400 ns coincidence window. The scintillator signal timing was determined using the CAEN digital constant fraction discrimination algorithm, with a 75% fraction and a 4 ns delay. The timing pickoff for the cyclotron RF signal was determined using leading-edge discrimination. # Data Analysis {#analysis} The collected waveforms were processed using a custom object-oriented analysis suite leveraging components of the ROOT data analysis framework . Each waveform was baseline-subtracted before being integrated to provide a measure proportional to the total scintillation light. Waveform integration lengths of 400 ns and 200 ns were used for the EJ-309 and EJ-204 target scintillators, respectively, to ensure collection of at least 95% of the scintillation light within the full acquisition window. For the dual-mounted target scintillators, the geometric mean of the individual pulse integrals from the two PMTs provided a measure of the total light output independent of interaction position for each event. The linearity of the response of the target PMTs was evaluated using a custom pulsed-LED circuit in accordance with the method of Friend et al. , and the PMT response was determined to be linear within \(\leq0.6\%\). ## Recoil energy calculation {#subsec:energy} The incoming and outgoing TOF were calibrated using photons arising from deuterons impinging on the Be target. For the incoming TOF, a histogram of time differences between the cyclotron RF pulse and signals in the target scintillator yielded a distinct feature corresponding to photon events. The time calibration constant was then calculated using the speed of light and the flight path between the Be target and the target scintillator. The outgoing TOF calibrations were determined analogously using time differences between \(\gamma\)-ray interactions in the target scintillator and each observation scintillator. This procedure is described in detail in Ref. . The outgoing neutron TOF was used to distinguish between proton and carbon recoils. Figure [\[PhVsCoinTOF\]](#PhVsCoinTOF){reference-type="ref" reference="PhVsCoinTOF"} shows the light yield of the EJ-204 target scintillator as a function of the scattered neutron TOF for two different observation detectors: one at 30\(^\circ\) and the other at 150\(^\circ\) with respect to the incoming beam. For the forward angle detector, three features are present: a narrow distribution centered at around 5 ns corresponding to (\(\gamma\),\(\gamma\)) scatters, a low light feature from approximately 20 to 35 ns corresponding to \(n\)C elastic scattering events, and a large band from 80 to 200 ns corresponding to \(np\) elastic scattering events. For neutrons scattered at \(150^\circ\) with respect to the incoming beam, \(np\) elastic scattering is kinematically forbidden. Only features from (\(\gamma\),\(\gamma\)) and \(n\)C scattering events are present. Coincident TOF and target pulse height gates were established for each observation detector, enabling recoil particle identification on an event-by-event basis. As the scattering angle, incoming TOF, and outgoing TOF are known for a given event, the system is kinematically overconstrained. For each neutron scattering event (identified using the PSD capability of the EJ-309 observation scintillators), the incoming TOF was calculated using the measured outgoing TOF, scattering angle, and known kinematics assuming both \(np\) and \(n\)C elastic scattering reactions. Events were discarded in which the calculated incoming TOF differed from the measured incoming TOF by more than 10\(\%\) of the 111.1 ns cyclotron period. This constraint removed potential ambiguity from frame overlap of the pulsed neutron beam as well as contributions from multiple scattering events in the target scintillator. The proton recoil energy, \(E_p\), was calculated using the known neutron scattering angle, \(\theta\), for a given observation detector and the incoming neutron energy, \(E_n\), as determined using the time difference between events in the target scintillator and the cyclotron RF signal: \[\label{eq:proton} E_p = E_n \sin^2\!{\theta}.\] Similarly, nonrelativistic scattering kinematics provided the carbon recoil energy: \[\label{eq:carbon} E_\text{C} = E_n\left[1-\left(\frac{\cos{\theta} + \sqrt{A^2-\sin^2\!{\theta}}}{A+1}\right)^2\right],\] where \(A = 12\) is the mass number of carbon.[^1] The recoil energy uncertainty was determined via a Geant4 simulation of the experimental setup . For each simulated event, the recoil energy reconstructed with Eqs. ([\[eq:proton\]](#eq:proton){reference-type="ref" reference="eq:proton"}) and ([\[eq:carbon\]](#eq:carbon){reference-type="ref" reference="eq:carbon"}) was compared to the ground-truth simulated recoil energy. This yielded a measure of the energy-dependent ion energy resolution taking into account the angular spread of the scintillator detectors, the temporal uncertainty of the incident neutron TOF (which was dominated by the spatial spreading of the \(^{2}\)H\(^{+}\) beam), and the uncertainty in the incoming neutron flight pathlength. These uncertainty relations were used to determine the recoil energy binning for the proton and carbon light yield data given below. ## Scintillator light output calibration {#LOcalib} The scintillator light output was calibrated using the 59.5 keV \(\gamma\) ray from an \(^{241}\)Am source positioned approximately 5 cm from the target scintillator, as described in Ref. . A representative \(^{241}\)Am light output calibration spectrum is shown for EJ-309 in Fig. [\[lightCalibration\]](#lightCalibration){reference-type="ref" reference="lightCalibration"}. A Geant4 simulation was used to model the energy deposition spectra of recoil electrons arising from monoenergetic 59.5 keV \(\gamma\) rays incident on the target scintillators. The model geometry also considered the surrounding materials, including the PMTs, mounts, and scintillator housing. The energy deposited by each simulated particle track was translated to light output taking into account the electron light nonproportionality, as further discussed below. The accumulated light output spectra were then convolved with a detector resolution function , and the difference between the resulting distribution and the measured spectrum was minimized while varying the calibration parameter (i.e., the scaling factor between the raw integrated channel and light output) and the three parameters of the resolution function. This minimization was executed using the SIMPLEX and MIGRAD algorithms from the ROOT Minuit2 package. Given the lack of EJ-204 and EJ-309 electron light nonproportionality measurements in the literature, data on alternate media were used to convert the simulated energy deposition spectra to light output. In particular, the EJ-200 nonproportionality curve from Payne et al.  was applied to generate the modeled EJ-204 light output spectrum. As EJ-200 and EJ-204 both employ a polyvinyltoluene (PVT) solvent, it is reasonable to assume that these media will have very similar electron light nonproportionality curves given that ionization quenching is a primary process . To generate the modeled EJ-309 light output spectrum, two electron light nonproportionality curves for similar media were implemented and their impact on the calibration parameters was evaluated. Specifically, the "liquid scintillator" and EJ-301 nonproportionality curves from Payne et al.  and Swiderski et al. , respectively, were each applied anchoring the electron light nonproportionality at 59.5 keVee, and the calibration parameters obtained using the two relations agreed within uncertainties. That is, the \(^{241}\)Am calibration for the EJ-309 target was insensitive to the choice of electron light nonproportionality data used to generate the modeled spectrum. To facilitate comparison against previous EJ-309 and EJ-204 proton light yield measurements in which the light output calibration was performed using a \(^{137}\)Cs source , the light unit was defined such that the light output corresponding to the Compton edge of a 662 keV \(\gamma\) ray was set to 1. This is in contrast to an electron-equivalent light unit, commonly employed to describe scintillator light output, which implicitly assumes the proportionality of the scintillator response to electron recoils. This is often an inappropriate assumption particularly at low recoil energies, including in the case of liquid and plastic organic scintillators . For the in-beam measurement, the PMT bias voltages were set with single photon sensitivity to permit detection of the more strongly quenched carbon recoils. As such, the Compton edge of the 662 keV \(\gamma\) ray was off scale given the 14-bit resolution and 2 V dynamic range of the digitizer. Cross-calibration datasets were taken for each scintillating medium in which the PMT bias voltages were set to allow the \(^{241}\)Am and \(^{137}\)Cs calibration points to appear together in the dynamic range. The fits proceeded as described above (for each source spectrum separately), and the ratio between the two points enabled a conversion from the relative light scale established by the light output resulting from a 59.5 keV photoelectron to that defined by a 477 keV electron (corresponding to the Compton edge of a 662 keV \(\gamma\) ray). In the case of EJ-204, the ratio between these two points was consistent with the ratio provided by the EJ-200 electron light nonproportionality curve from Payne et al. . For EJ-309, the measured ratio disagreed with that provided by the "liquid scintillator"  and EJ-301  data by 4.3% and 2.6%, respectively. For the EJ-204 experiment, the PMT response changed significantly between the \(^{241}\)Am calibration measurement and the in-beam neutron measurement. Such a rate-dependent gain variation has been previously observed for PMTs with a linear-focused dynode structure . The magnitude of the effect was evaluated by comparing the response of a single photoelectron pulse in each of the target PMTs for the calibration and runtime settings. Figure [\[singlepe\]](#singlepe){reference-type="ref" reference="singlepe"} shows late-time pulse integral distributions for the EJ-204 calibration and in-beam data, where a 100 ns integral was taken 500 ns following a scintillation pulse to emphasize single and few photoelectron events. A clear, discrete change in the photodetector gain is observed between the calibration and runtime settings. The average charge of a single photoelectron, which is proportional to the PMT gain coefficient, was extracted for each target PMT by fitting the measured distributions using the PMT response function from Bellamy et al.  and a binned-likelihood estimation. The ratio of the geometric average of the mean charge of the single photoelectron response of each target PMT for the in-beam to the calibration setting, determined as \(1.40\pm0.03\), was then subsequently applied to correct for this effect. A comparable study of the EJ-309 data showed no statistically significant discrepancy in the PMT response for the calibration and runtime settings. ## Proton and carbon light yield determination Figure [\[2dplots\]](#2dplots){reference-type="ref" reference="2dplots"} shows a plot of the EJ-204 light output as a function of the reconstructed recoil energy for both protons and carbon ions. To reduce the data to the corresponding light yield relations, the recoil energy axis was binned according to the heteroskedastic energy resolution function described in Sec. [3.1](#subsec:energy){reference-type="ref" reference="subsec:energy"}. That is, the energy bin width varies as a function of energy reflective of the recoil energy uncertainty. Each bin was projected onto the light output axis and fit with a Gaussian distribution using a binned-likelihood estimation to determine the light yield at the corresponding recoil energy. The fit range in each bin was set iteratively. First, the peak centroid and standard deviation were obtained, and then the feature was refit over a range centered about the centroid with a width of \(\pm3\sigma\). Upper and lower range limits were further applied corresponding to effects arising in the dual-PMT target from signal saturation and the detection threshold, respectively. Figure [\[sliceFits\]](#sliceFits){reference-type="ref" reference="sliceFits"} provides several examples of these individual bin fits for both the EJ-204 proton and carbon light yield data. ## Uncertainty quantification The sensitivity of the light yield relation to various analysis parameters was quantified using a Monte Carlo simulation in which each parameter was varied by sampling a normal distribution with the standard deviation given by the parameter uncertainty. These parameters included the TOF calibration constants, the measured detector locations, and the pathlength between the Be target and the terminus of the beam pipe in the experimental area, which served as the origin of the measurement coordinate system. Data reduction was then repeated with each parameter set to evaluate the effect on the light yield. Although each parameter only had a direct effect on the proton or carbon recoil energy, the fixed-bin structure of the energy axis led to changes in the composition of events (and therefore the light yield) in each bin. The systematic uncertainty in the single photoelectron response (determined in both calibration and runtime settings to assess potential gain shift) was taken as the quadrature sum of the standard deviation of the mean single photoelectron charge obtained for each target PMT for various start times in the tail of the scintillation pulse. For the calibration setting, the uncertainty in the single photoelectron response for EJ-309 and EJ-204 was determined to be 2.6% and 1.7%, respectively. For the runtime setting, the stability of the PMT gain was also assessed by partitioning the beam data into subsets and quantifying the single photoelectron response as a function of time. No drift was observed outside of the 4.9% and 1.0% uncertainty of the single photoelectron response determined for the EJ-309 and EJ-204 scintillators, respectively. The \(^{241}\)Am light output calibration carried a 0.7% uncertainty, which was obtained by evaluating the sensitivity of the centroid of the photopeak for 59.5 keV \(\gamma\) rays to the ranges of the calibration fit and the propagation of errors from the cross-calibration. The uncertainty in the determination of the light output calibration, PMT gain instability, and rate-dependent gain shift were added in quadrature with the uncertainty obtained from the Monte Carlo simulation to provide the total uncertainty on the light yield relations. # Results and Discussion {#results_and_discuss} Figure [\[EJ309ResultsPlots\]](#EJ309ResultsPlots){reference-type="ref" reference="EJ309ResultsPlots"} displays the measured EJ-309 proton and carbon light yield relations alongside previous works. The EJ-309 proton light yield is compared to a double TOF measurement from Laplace et al. , and the results are consistent within the estimated uncertainties. The EJ-309 carbon light yield data are compared to a measurement from Norsworthy et al. , which used a mono-energetic neutron source and an indirect technique to provide the carbon light yield relation in electron-equivalent light units. Norsworthy et al. calibrated the light output using the Compton edge of the 662 keV \(\gamma\) ray from a \(^{137}\)Cs source . The light units were converted to that of the present work by setting 477 keVee equivalent to 1 light unit, and the measurements agree within 2\(\sigma\). The consistency of the measured EJ-309 proton and carbon light yield relations with literature measurements lends confidence both to the extension of the double TOF technique and its application towards the generation of novel carbon light yield data. The measured EJ-204 proton and carbon light yield relations are shown in Fig. [\[EJ204ResultsPlots\]](#EJ204ResultsPlots){reference-type="ref" reference="EJ204ResultsPlots"}. The EJ-204 proton light yield is compared to previous measurements from Laplace et al.  that also used a double TOF technique. Again, the results are in agreement within the estimated uncertainties. No prior measurements of the EJ-204 carbon light yield exist. The measured EJ-309 and EJ-204 light yield data along with their associated uncertainties are tabulated in the appendix [\[LYDataPoints\]](#LYDataPoints){reference-type="ref" reference="LYDataPoints"}. The scintillation response to recoil nuclei is often characterized in terms of a quenching factor, defined as the ratio between the light observed from a nuclear recoil relative to an electron of the same energy . In the event that the scintillation light produced is proportional to the electron energy deposited in the medium, the quenching factor provides a means to quantify the reduction in light output due to ionization quenching. However, for electrons with relatively high stopping power, the electron light yield of organic scintillators is nonproportional to the energy deposited. For comparison, the EJ-204 electron light yield is also illustrated in Fig. [\[EJ204ResultsPlots\]](#EJ204ResultsPlots){reference-type="ref" reference="EJ204ResultsPlots"}. The solid line corresponds to a linear approximation of the electron light yield anchored at 477 keV. The dashed line represents the EJ-200 electron light nonproportionality measurement from Payne et al. , which deviates from the linear approximation due to the higher excitation and ionization density produced by slower electrons.[^2] This deviation is manifest via the same mechanism---high ionization and excitation density---that results in the reduced scintillation efficiency observed for recoil nuclei. In this case, the quenching factor determined with respect to electrons no longer provides a measure of ionization quenching, as both the numerator and denominator vary due to the ionization quenching effect. It is worth noting that the electron light nonproportionality has some impact on fast electrons as well. Although it has been historically assumed that the scintillation light produced by fast electrons is proportional to the energy deposited in an organic scintillator , recent measurements demonstrate electron light yield nonproportionality as high as several MeV for plastic and liquid organic scintillators . Even in a proportional regime, fast electrons lose energy along their track by exciting and ionizing the scintillating medium, and the light yield is the *integrated* light output per electron energy deposited. The increased specific energy loss (as the electron slows) contributes nonproportionally to the total light yield, though the relative contribution decreases with increasing electron energy. Thus, electron recoils serve as a poor reference for unquenched ions in organic scintillators. Quenching factors should therefore be defined relative to the light produced by an unquenched, weakly ionizing particle. Figure [\[Batchelor\]](#Batchelor){reference-type="ref" reference="Batchelor"} shows the carbon light yield relations of EJ-309 and EJ-204 measured in this work, along with a functional form provided by Batchelor et al. : \[L=0.017E_{\text{C}},\] where \(L\) is the light output in MeVee and \(E_{\text{C}}\) is the carbon recoil energy in MeV. The electron-equivalent light unit was converted to the relative light unit used in this work by dividing by 0.477. In the Batchelor et al. study, the response of the PSD-capable liquid scintillator, NE-213, was modeled using a Monte Carlo calculation. A linear carbon light yield was assumed with the slope based on calculations using the Birks formula  and an empirically-determined NE-102 quenching parameter. The estimated carbon light yield from Batchelor et al. is in general agreement with the EJ-204 data measured in this work (which shares a common PVT base with NE-102), though differences in the shape suggest disagreement if the data are extrapolated. As shown in Fig. [\[Batchelor\]](#Batchelor){reference-type="ref" reference="Batchelor"}, the relative carbon light yield of EJ-309 is lower than that of EJ-204, and the fractional difference in the light yield of the two materials decreases with increasing carbon recoil energy. That is, the EJ-309 carbon light yield relative to the light produced by a 477 keV electron is lower than that of EJ-204 by approximately \(55\%\) and \(33\%\) at 2 MeV and 4 MeV, respectively. This is in contrast to the behavior observed for the relative proton light yield relations of these materials for proton energies of 2 to 4 MeV, where literature measurements demonstrate a relative proton light yield of EJ-309 greater than that of EJ-204  . In this energy range, excitation densities are over an order of magnitude greater for carbon recoils compared to protons. The difference in proton and carbon quenching in the two materials may be attributed to a number of competing factors. Exciton diffusion is enhanced in liquid scintillators relative to plastics, which increases the probability of bimolecular interactions such as the triplet-triplet annihilation that gives rise to PSD . At the same time, bimolecular quenching increases with increasing excitation density . Future work will involve a study of physics-based models of ionization quenching in organic scintillators taking into account the response of proton and carbon recoil nuclei over a broad energy range. # Summary The EJ-309 and EJ-204 proton and carbon light yield were measured using a double TOF technique over a recoil energy range of approximately 0.3 to 1 MeV and 2 to 5 MeV, respectively for EJ-309 and 0.2 to 0.5 MeV and 1 to 4 MeV, respectively for EJ-204. The proton light yield relations obtained for both media were compared to literature measurements and the results are in good agreement. The EJ-309 carbon light yield compared favorably to a recent measurement from Norsworthy et al. , but was approximately 40% lower than that predicted by the Batchelor formalism . This work extends knowledge of the EJ-309 carbon light yield and provides the first measurement of the light output for carbon recoils in EJ-204 via an experimental setup that enables an in situ benchmark against proton light yield standards of reference. [^1]: As the scintillating media were not isotopically enriched, the carbon recoil energy calculation neglects the stable \(^{13}\)C isotope at 1.1% abundance. [^2]: The EJ-200 and EJ-204 electron light nonproportionality are assumed to be equivalent as both media are comprised of a PVT base and ionization quenching reduces the primary excitation efficiency .
{'timestamp': '2021-07-14T02:05:43', 'yymm': '2107', 'arxiv_id': '2107.05752', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05752'}
null
null
null
null
null
null
# Introduction ## Problem statement An adaptive search problem for a general *search domain* \(\mathcal{S}\) and an arbitrary *adversary* can be formulated as follows. The goal is to design an adaptive algorithm, also called a *strategy*, that finds a *target* that is initially unknown to the algorithm. The process is divided into *steps*: in each step the algorithm performs a *query* and receives an *answer*. The adaptiveness is understood in a way that the subsequent actions of the algorithm depend on the already received answers. Such a query-reply pair provides new information to the algorithm: it learns that some part of the search space \(S\subseteq\mathcal{S}\) does not contain the target while its complement does. It is interesting, both from theoretical and practical point of view, to have error-resilient algorithms for such search process. This is modeled by the presence of noise: each reply can be erroneous with some fixed probability \(0<p<\frac{1}{2}\), independently. The performance of a strategy is measured by the number of the queries performed. In general, the target is fixed prior to the beginning of the game. This selection is either made in the *adversarial model* (i.e., the adversary, knowing the algorithm, picks the target maximizing the strategy length) or in the randomized way, according to a public distribution \(\mu\) of all possible targets (we call it the *distributional model*). The classical choice for the search domain \(\mathcal{S}\) is a sorted array, which leads to the well known binary search algorithm. In such case the natural queries are comparisons, although we point out that other queries, like arbitrary subsets, have also been studied. Interestingly, it is possible to have algorithms for the noisy scenarios that are information-theoretic optimal (up to lower order terms), for the classical binary search see e.g.. A generalization of this search domain is to consider graph structures, which has been introduced first for trees  and then for general graphs . For graphs, each query simply points to some vertex \(v\) of the input graph \(G\), and the answer either states that \(v\) is the target, or provides a neighbor of \(v\) that is closer to the target than \(v\). We remark that the graph setting is a natural generalization of the classical "twenty questions game" (attributed to Rényi  and Ulam ). ## Motivation and earlier techniques Adaptive query algorithms play an important role in theoretical computer science, with classical binary search and its variations being the most fundamental example. They also provide a foundation for more complex computational problems like sorting---see e.g. for a broader discussion. Historically speaking, the classical binary search with erroneous comparisons (or more general queries as well) has received significant attention, also in a simpler noise setting where the number of errors is bounded by a constant that is known a priori to the algorithm. The transition from sorted data (i.e., paths) to graph-like structures is natural both from the theoretical point of view and from the perspective of potential applications, e.g., in automatic software testing or in machine learning. An interesting spectrum of applications of binary search can be found in designing a series of tests in biological experiments . A typical technique for dealing with noisy search is the *multiplicative weights update* (MWU): for each element \(v\) the algorithm keeps a weight \(\omega(v)\) that represents the likelihood that \(v\) is the target. Then \(\omega(v)\) is appropriately scaled depending on the answer to the query. This general tool is quite well understood and for further reading we refer to the survey of Arora et. al.. A special case of this approach is the Bayesian learning, in which initial weights describe the probability distribution of the target (so called *prior distribution*) and later on \(\omega(v)\) is updated according to conditional probabilities of the observed answers. The process continues either until one element accumulates large enough likelihood of being the target, or until a predetermined number of queries has been performed. Thus, the subject of the analysis in that setting is the estimation of the convergence rate of such process; see e.g. for examples of such an analysis for general types of prior distributions. We note that if a search model is not distributional (we do not know the prior probabilities), it often works very well to start with the uniform distribution and perform Bayesian updates anyway. We remark that the authors of  combine such Bayesian learning technique with a random shifting of the input sequence as a tool to actually ensure the uniform initial distribution. We also note that such a random shifting will not work in the graph-theoretic setting due to the complex structure of the search space. Moreover, a closer analysis of  provides a framework that may give a tool for distributional graph search: each query is selected to maximize the amount of information to be learned. Unfortunately, it turns out that this cannot be transferred to graph search, since the algorithm in  strongly relies on the subtlety of the search model, where an incorrect answer, when negated, provides an opposite (correct) answer. This property makes it possible to estimate expected information gain after each query. In the graph search model, for each query there is more than one answer that constitutes an error, which makes such approach impossible. For the graph-theoretic case with noise, the multiplicative weight update proved to work well and we further advance this approach in our work. The distributional noisy model has been considered to date for binary search only , where the above-mentioned approaches are combined in the following way-the core of the method is a decision tree traversal. To make the algorithm resilient to errors, a verification and backtracking mechanisms are added to the traversal. In particular, two verification methods are used, depending on the cases selected for the algorithm: the separate majority vote and an observation that enough past queries had replies consistent with accepting the current one as correct. A disadvantage of applying this technique in our context is that it is already quite complex in this restricted case of binary search. #### Issue of proof correctness in. To motivate our work further, we also point out two flaws in the state-of-the art noisy binary searching. Firstly, the paper bounds the expected number of steps of the algorithm to be the total information needed divided by the *expected* information gain. Such transition works (pushing expectancy to denominators) only through careful application of probabilistic tools, and might result in additional lower order terms. Secondly, more serious issue can be found in the proof of Lemma 2.6 in : it takes all the queries asked by the algorithm, in sorted order of positions, denoted by \(q_1 \le \cdots \le q_t\), and considers for some \(x,y\) the set of queries corresponding to \(q_x \le q_{x+1} \le \cdots \le q_{y-1}\) such that \(q_x > s\), where \(s\) denotes the target. Then, the number of '\(<\)' answers is given by a binomial distribution \(B(y-x, 1-p)\). However, the issue is that while the answers to the particular queries are independent random variables, the *position* of queries depends on the answers to the previous queries. Thus when taking a subset of queries based on their positions, we cannot claim their independence and use binomial distribution. ## Our contribution In an ideal scenario, there always exists a query such that each possible reply subdivides the search space evenly, thus maximizing the information gain to the algorithm. In such a case the Bayesian updates are sufficient to get an optimal search time. However, there are two obstacles that prevent us from a straightforward application of Bayesian updates. First, typically perfect bisection of search space is not possible. This actually occurs both for binary search with comparisons and for graphs since some elements may have large weights. Thus, these problems can be seen more generally as a game of maximizing the information gain while performing queries. Second problem to overcame, particularly in the graph search, is the fact that the adversarial scenario may be seen as one in which the target distribution is not known a priori to the algorithm. In terms of development of the new methods, we introduce some new ideas that considerably simplify the analysis and lead to tight bounds. One of those is our measure of progress: instead of keeping track how the total weight decreases after each query, we are interested how the total weight behaves with some elements excluded. In the graph search it is enough to look at the vertex with the largest current weight and it turns out that for the remaining vertices the required weight drop occurs (cf. Lemma [\[lem:xT\]](#lem:xT){reference-type="ref" reference="lem:xT"}). Thus, only one vertex is excluded at any point from the weight analysis. Interestingly, this vertex may be changing throughout the search. We point out that this approach does not adopt the previously used idea of putting such problematic vertices aside to search through them at some later stage. Instead, all vertices are uniformly treated throughout the entire search. This way of measuring progress allows to conclude that the expected information gain in a single step is precisely the optimal \(I(p) = 1-H(p) = 1 + p \log_2 p + (1-p) \log_2 (1-p)\) (see the proof of Lemma [\[lem:graph-lv-distr\]](#lem:graph-lv-distr){reference-type="ref" reference="lem:graph-lv-distr"}). For binary search having only one excluded element seems to be infeasible. We propose a strategy where the excluded elements accumulate over the search but an analogous bound for the remaining weight can be proved (cf. Equation [\[eq:excluded-binsearch-bound\]](#eq:excluded-binsearch-bound){reference-type="eqref" reference="eq:excluded-binsearch-bound"} and the corresponding Lemma [\[lem:epoch-progress\]](#lem:epoch-progress){reference-type="ref" reference="lem:epoch-progress"}). A simple approach could be to find at each step the element that is the closest to perfect bisection of the weights, then query and exclude it. However, that might lead to too many excluded elements, which the second phase of the algorithm might not be able to handle in a desirable time bound. Thus, we propose the following approach: we process queries in epochs, where at the start of an epoch algorithm selects best possible bisecting element and excludes it. For the duration of the whole epoch the same query is repeated, updating the weights along the way. This limits the number of excluded elements, at the cost of having possibly sub-optimal queries for the duration of the epoch. However, we are able to show bounds on the *expected* weight drop (cf. Lemma [\[lem:epoch-progress\]](#lem:epoch-progress){reference-type="ref" reference="lem:epoch-progress"}). Our results are summarized in Table [\[tab:res\]](#tab:res){reference-type="ref" reference="tab:res"}. For the graph searching we obtain the three following algorithmic results. The algorithms achieving the stated query complexities are provided in subsequent Section [3](#sec:graph-search){reference-type="ref" reference="sec:graph-search"}: Algorithms [\[alg:graph-adversarial\]](#alg:graph-adversarial){reference-type="ref" reference="alg:graph-adversarial"}, [\[alg:graph-las-vegas-distributional\]](#alg:graph-las-vegas-distributional){reference-type="ref" reference="alg:graph-las-vegas-distributional"} and [\[alg:graph-las-vegas-adversarial\]](#alg:graph-las-vegas-adversarial){reference-type="ref" reference="alg:graph-las-vegas-adversarial"} correspond to Theorems [\[thm:graph:worst-case\]](#thm:graph:worst-case){reference-type="ref" reference="thm:graph:worst-case"}, [\[thm:graph:lv-distr\]](#thm:graph:lv-distr){reference-type="ref" reference="thm:graph:lv-distr"} and [\[thm:graph:lv-adversarial\]](#thm:graph:lv-adversarial){reference-type="ref" reference="thm:graph:lv-adversarial"}, respectively. In the statements above, \(H(\mu)\) is the entropy of the distribution defined as \(H(\mu)=\sum_x\mu(x)\log_2\frac{1}{\mu(x)}\), and \(I(p)=1-H(p)\) is the information function. The binary search algorithms referred in the theorems below are in Section [4](#sec:binary-search){reference-type="ref" reference="sec:binary-search"}: Algorithms [\[alg:binary-adversarial\]](#alg:binary-adversarial){reference-type="ref" reference="alg:binary-adversarial"} and [\[alg:las-vegas-distributional\]](#alg:las-vegas-distributional){reference-type="ref" reference="alg:las-vegas-distributional"} correspond to Theorems [\[thm:bin:worst-case\]](#thm:bin:worst-case){reference-type="ref" reference="thm:bin:worst-case"} and [\[thm:bin:las-vegas:distr\]](#thm:bin:las-vegas:distr){reference-type="ref" reference="thm:bin:las-vegas:distr"}. Where in the last statement \(H_2(\mu)=\sum_x\mu(x)\log_2\log_2\frac{1}{\mu(x)}\). Using the random shifts as in, the case when the input distribution is unknown can be turned into the uniform distribution scenario and thus Theorem [\[thm:bin:las-vegas:distr\]](#thm:bin:las-vegas:distr){reference-type="ref" reference="thm:bin:las-vegas:distr"} gives the following. Our contribution can be summarized as follows. In the graph scenario, we argue that the Bayesian updates technique is enough because the fact that no perfect bisection is possible can be handled on the level of the analysis, and is not imprinted in the algorithm. Here the contribution lies in a much simpler analysis than in prior works. Moreover, the analysis carries over to the remaining new results. In particular, the distributional case has not been considered before for graphs, thus Theorem [\[thm:graph:lv-distr\]](#thm:graph:lv-distr){reference-type="ref" reference="thm:graph:lv-distr"} gives a new bound. The algorithm behind this theorem can be directly used to obtain a Las Vegas algorithm for the adversarial case (cf. Theorem [\[thm:graph:lv-adversarial\]](#thm:graph:lv-adversarial){reference-type="ref" reference="thm:graph:lv-adversarial"}). Here the twist lies in adjusting the confidence level appropriately and the details of the differences between these two settings are hidden in the analysis. For the binary search, the Bayesian updates leave the algorithm with several candidates for the target. This seems difficult to avoid and we leave it as our main open question whether a one-phase multiplicative update can be sufficient to find the target. The new result for binary search is Theorem [\[thm:bin:worst-case\]](#thm:bin:worst-case){reference-type="ref" reference="thm:bin:worst-case"} for the adversarial noisy case. For the Las Vegas settings we provide Theorem [\[thm:bin:las-vegas:distr\]](#thm:bin:las-vegas:distr){reference-type="ref" reference="thm:bin:las-vegas:distr"} and its direct Corollary [\[cor:bin:lv-adversarial\]](#cor:bin:lv-adversarial){reference-type="ref" reference="cor:bin:lv-adversarial"} which together give a simpler analysis than in prior works, correcting also some ambiguities present in the analysis in . ## Related work There are many variants of the interactive query games, depending on the structure of queries and the way erroneous replies occur. There is a substantial amount of literature that deals with fixed number of errors for arbitrary membership queries or comparison queries for binary search; we refer the reader to some surveys . Among the most successful tools for tackling binary search with errors, there is the idea of a volume , which exploits the combinatorial structure of a possible distribution of errors. A natural approach of analyzing decision trees has been also successfully applied, see e.g.. See for examples of partitioning strategies into stages, where in each stage the majority of elements is eliminated and only few 'problematic' ones remain. For a different reformulation (and asymptotically optimal search results) of the noisy search see. Although the adversarial and noisy models are most widely studied, some other ones are also considered. As an example, we mention the (linearly) bounded error model in which it is guaranteed that the number of errors is a \(r\)-fraction, \(r<\frac{1}{2}\), of (any initial prefix of) the number of queries, see e.g. . Interestingly, it might be the case that different models are so strongly related that a good bound for one of them provides also tight bounds for the other ones, see e.g. for an example of such analysis. The first results regarding distributional query search with fixed number of errors is due to Shannon  where is has been shown a strategy using up to \(H(\mu)+1\) arbitrary queries on average. The Shannon-Fano-Elias code takes \(H(\mu)+2\) comparison queries on average. The distributional version has been recently re-considered in, where it is also assumed that at most \(k\) answers can be erroneous. Then, an optimal strategy consists of \(H(\mu)+kH_2(\mu)\) comparison queries up to an additive factor of \(\mathcal{O}(k\log_2 k + kH_3(\mu))\), where \(H_3(\mu)=\sum_{x}\mu(x)\log_2\log_2\log_2(1/\mu(x))\). This generalizes the result of Rivest et al. for the uniform distribution , and improves the codes from . In view of the above, it is interesting to see what types of queries can be used for constructing effective strategies? In  is is shown that there exists a 'natural' set of \(\mathcal{O}(rn^{1/r})\) queries allowing for construction of strategies of length \(H(\mu)+r\), and it is also shown that this bound is asymptotically tight. The theory of coding schemes for noisy communication is out of scope of this survey and we point to some recent works. The first steps towards generalizing binary search to graph-theoretic setting are works on searching in partially ordered data. Specifically for the node search that we consider in this work, the first results are due to Onak and Parys for the case of trees  and the recent work of Emamjomeh-Zadeh et al. for general graphs. In the former, an optimal linear-time algorithm for error-less case was given. It has been shown in  how to construct, for the noisy model with an input being an arbitrary graph of order \(n\), a strategy of length at most \(\frac{1}{I(p)}\left(\log_2 n+\mathcal{O}(\frac{1}{C}\log_2 n + C^2 \log_2 \delta^{-1})\right)\), where \(C=\max\left((\frac{1}{2}-p) \sqrt{\log_2 \log_2 n},1\right)\), with the confidence threshold \(\delta\). The strategy has been simplified and the query complexity further improved in to reach an upper bound on the query complexity: \(\frac{1}{I(p)}\left(\log_2 n + \widetilde\mathcal{O}(\sqrt{\log_2 n \log_2 \delta^{-1}}) + \mathcal{O}(\log_2 \delta^{-1})\right)\). It is interesting to note that these strategies, when applied to lines, reach the optimal query complexities (up to lower order terms) for linear orders, thus matching the limits of binary search.[^1] We refer the reader to a description of few interesting potential applications of this graph searching framework in machine learning, particularly for problems like learning a ranking, a clustering or a classifier. Also, some generalizations with non-uniform query times (where the duration of querying each vertex is dictated by its weight) have been also considered . We finally also mention a somewhat related graph-theoretic model in which a walking agent is performing queries. # Preliminaries {#sec:preliminaries} Denote \(p = \frac{1}{2}-\varepsilon\) be the noise parameter. It is useful to denote \(\Gamma = \frac{1-p}{p} \approx 1+4\varepsilon\). Whenever we refer to a *search space*, we mean either an (undirected and unweighted) graph or a linear order. This term will be used for definitions that are common for both. Consequently, by an *element* of a search space we mean a vertex or an integer, respectively. In the following \(n\) is the size of the search space, i.e., either the number of vertices in a graph or the number of integers in a linear order. The strategies will maintain the weights \(\omega(v)\) for the elements \(v\) of a search space \(V\). For an arbitrary \(0\leq c\leq 1\), \(v\) is *\(c\)-heavy* if \(\omega(v)/\omega(V)\geq c\), where for any subset \(U\subseteq V\) we write \(\omega(U)=\sum_{u\in U}\omega(u)\). \(\frac{1}{2}\)-heavy elements will play a special role and we refer to them as *heavy* for brevity. For the graph search, we will adopt a slightly weaker model in which an adaptive algorithm receives less information in some cases. This is done in somewhat artificial way for purely technical reasons, i.e., to simplify several arguments during analysis. In particular, the amount of information will depend on the current weights and the case when the algorithm receives less information than dictated by the graph searching model is when a heavy vertex is queried and the answer says that it is not the target. Note that any algorithmic guarantees for the above model carry over to the generic graph search model. To adopt the above, we will say that a vertex \(v\) is *compatible* with the reply if and only if \(v=q\) in case of a yes-answer, or the neighbor \(u\) given in a no-answer when \(q\) is not heavy lies on a shortest \(q\)-\(v\) path. Thus in particular, in case of a no-answer regarding a heavy \(q\), no vertex is compatible. The weight of an element \(v\) at the end of step \(t\) is denoted by \(\omega_t(v)\), with \(\omega_0(v)\) being the initial value. The initial values are set by an algorithm depending on a particular model. For distributional scenarios, the initial weight of each element equals its probability of being the target, that is, \(\omega_0(v)=\mu(v)\) for each \(v\). For worsts case scenarios, the weights are set uniformly, \(\omega(v)=\frac{1}{n}\) for each \(v\). We recall the Bayesian updates (Algorithm [\[alg:bayesian\]](#alg:bayesian){reference-type="ref" reference="alg:bayesian"}) that are at the core of our strategies. Let \(X_1, X_2, \ldots, X_n\) be a sequence of i.i.d random variables. We say that a random variable \(N\) is a *stopping time* (with respect to \(X_1, X_2, \ldots, X_n\)) if \(\mathbbm{1}_{\{N \leq n\}}\) is a function of \(X_1, X_2, \ldots, X_n\). We will use the following version of Wald's identity. # Graph searching {#sec:graph-search} We first analyze how the weights behave when in each step a median is queried and the Bayesian updates are made. This analysis is independent of the weight initialization and thus is common for all following graph searching algorithms. Essentially we prove that in expectation, that is in an amortized way, the total weight (with heaviest vertex excluded) decreases by half per step. For some steps this can be concluded directly (cf. Lemma [\[lem21\]](#lem21){reference-type="ref" reference="lem21"}). Lemmas [\[lem23\]](#lem23){reference-type="ref" reference="lem23"} and [\[lem22\]](#lem22){reference-type="ref" reference="lem22"} then refer to an interval of queries to the same heavy vertex \(x\). If such an interval has the property that it ended (Lemma [\[lem22\]](#lem22){reference-type="ref" reference="lem22"}), then the required weight drop can be claimed by the end of the interval. For this, informally speaking, the crucial fact is that \(x\) received many no-answers during this interval. If a strategy is at a step that is within such interval, then Lemma [\[lem23\]](#lem23){reference-type="ref" reference="lem23"} is used to make the claim on the total weight with the weight of \(x\) excluded. Hence, at any point of the strategy the weight decreased appropriately as shown in Lemma [\[lem:xT\]](#lem:xT){reference-type="ref" reference="lem:xT"}. The bound in the next lemma immediately follows from Lemmas [\[lem21\]](#lem21){reference-type="ref" reference="lem21"}, [\[lem22\]](#lem22){reference-type="ref" reference="lem22"} and [\[lem23\]](#lem23){reference-type="ref" reference="lem23"}. We say that an element \(v\) is *heaviest* if \(\omega(v)\geq\omega(u)\) for each \(u\in V\). For each step \(i\), we denote by \(x_i\) a heaviest vertex at this step, breaking ties arbitrarily. We note that \(\omega_{\tau}(V \setminus \{x_{\tau}\})\) will be our key measure of progress, despite the fact that the \(x_{\tau}\) may be changing throughout the search, i.e., \(x_{\tau}\) does not have to be the target at some stages of the search. When our strategies complete, however, \(x_{\tau}\) is provably the target within the imposed confidence threshold. ## Proof of Theorem [\[thm:graph:worst-case\]](#thm:graph:worst-case){reference-type="ref" reference="thm:graph:worst-case"} (Worst-case strategy length) {#proof-of-theorem-thmgraphworst-case-worst-case-strategy-length .unnumbered} In this section we prove Theorem [\[thm:graph:worst-case\]](#thm:graph:worst-case){reference-type="ref" reference="thm:graph:worst-case"}. Take \(Q\) to be the smallest positive integer for which \(I(p)Q \ge \log_2 n + \sqrt{\frac{Q}{2} \ln \delta^{-1}} \log_2 \Gamma\). One can verify that \[\label{eq:Q-worst-case} Q = \frac{\log_2 n + \mathcal{O}(\sqrt{\log n \log \delta^{-1}}) + \mathcal{O}(\log \delta^{-1})}{I(p)}.\] The solution is through Lemma [\[quadratic\]](#quadratic){reference-type="ref" reference="quadratic"} and by bounding \(I(p) = \Theta(\varepsilon^2)\) and \(\log_2 \Gamma = \Theta(\varepsilon)\). Such \(Q\) provides a sufficient strategy length in the adversarial scenario---see Algorithm [\[alg:graph-adversarial\]](#alg:graph-adversarial){reference-type="ref" reference="alg:graph-adversarial"}. The following implies Theorem [\[thm:graph:worst-case\]](#thm:graph:worst-case){reference-type="ref" reference="thm:graph:worst-case"}. ## Proof of Theorem [\[thm:graph:lv-distr\]](#thm:graph:lv-distr){reference-type="ref" reference="thm:graph:lv-distr"} (Las Vegas distributional search) {#proof-of-theorem-thmgraphlv-distr-las-vegas-distributional-search .unnumbered} In this scenario the initial weights are set to be the given target distribution \(\mu\), and the stopping condition requires that some vertex accumulates large enough weight---see Algorithm [\[alg:graph-las-vegas-distributional\]](#alg:graph-las-vegas-distributional){reference-type="ref" reference="alg:graph-las-vegas-distributional"}. Lemma [\[lem:graph-lv-distr\]](#lem:graph-lv-distr){reference-type="ref" reference="lem:graph-lv-distr"} implies Theorem [\[thm:graph:lv-distr\]](#thm:graph:lv-distr){reference-type="ref" reference="thm:graph:lv-distr"} by taking expectation over all possible target locations according to the input distribution \(\mu\). ## Proof of Theorem [\[thm:graph:lv-adversarial\]](#thm:graph:lv-adversarial){reference-type="ref" reference="thm:graph:lv-adversarial"} (Las Vegas adversarial search) {#proof-of-theorem-thmgraphlv-adversarial-las-vegas-adversarial-search .unnumbered} The adversarial setting is resolved by taking the uniform initial target distribution and scaling down the threshold as shown in Algorithm [\[alg:graph-las-vegas-adversarial\]](#alg:graph-las-vegas-adversarial){reference-type="ref" reference="alg:graph-las-vegas-adversarial"}. # Binary search {#sec:binary-search} The strategies for binary search setting will be partitioned into epochs. By an *epoch* we mean a sequence of queries to the same element. The lengths of the epochs are fixed in advance and oblivious to responses of the adversary. However, we allow for different epochs to be of different lengths-the length of \(i\)-th epoch is denoted by \(E_i\) (thus the \(i\)-th epoch starts at step \(\sum_{j<i}E_i+1\) and ends at step \(\sum_{j\leq i}E_i\)). After each query we perform Bayesian updates using Algorithm [\[alg:bayesian\]](#alg:bayesian){reference-type="ref" reference="alg:bayesian"}. The element to be queried is selected as follows: at the start of the execution of the algorithm, all elements are *unmarked*, and in the process of execution we gradually mark some elements. Denote the set of *marked* elements in step \(i\) by \(M_i\) (we write \(M\) when the current step is clear from the context). At the start of an epoch, we find an element \(q \not\in M\), which we call *central*, such that \(\omega(\{i<q\}\setminus M)\leq\frac{1}{2}\omega(V\setminus M)\) and \(\omega(\{i>q\}\setminus M)\leq\frac{1}{2}\omega(V\setminus M)\). This element is the one repeatedly queried in the epoch. We fix the length of \(i\)-th epoch, for each \(i\geq 1\), to be \[\label{eq:epoch-lengths} E_i = \max(\frac{1}{16}\varepsilon^{-2} i^{-\frac23}, 1).\] Algorithm [\[alg:epochs\]](#alg:epochs){reference-type="ref" reference="alg:epochs"} shows how the general framework of using epochs in our strategies. The total length of the first \(f\) epochs is then \(E_1+\cdots+E_f = \Theta(\max(f^{\frac13}\varepsilon^{-2}, f))\). So in \(Q\) queries there are \(f= \mathcal{O}(\min(1+\varepsilon^6Q^3,Q))\) epochs. We now bound the expected change of \(W\) in \(Q\) queries, applying Lemma [\[lem:epoch-progress\]](#lem:epoch-progress){reference-type="ref" reference="lem:epoch-progress"} to each epoch: \[\mathbb{E}[W_Q] = \prod_{i=1}^f 2^{-E_i} (1+\mathcal{O}(\varepsilon^4 E_i^2)) \le 2^{-Q} \prod_{i=1}^{\infty} (1+\mathcal{O}(i^{-4/3})) \le C 2^{-Q} \label{eq:C}\] for large enough \(C\). By application of Markov's inequality, we reach a following corollary. ## Theorem [\[thm:bin:worst-case\]](#thm:bin:worst-case){reference-type="ref" reference="thm:bin:worst-case"}: Worst-case strategy length {#sec:bin-search:worst-case .unnumbered} The strategy has a priori determined length \(Q\) of the part comprised of epochs leaving the candidate set of potential targets \(M_Q\): \[\label{eq:bin-adv} Q = \frac{1}{I(p)} \left( \log_2 n + \mathcal{O}(\log \delta^{-1}) + \mathcal{O}(\sqrt{\log \delta^{-1} \log n}) \right).\] Recall that the epochs' lengths are set in [\[eq:epoch-lengths\]](#eq:epoch-lengths){reference-type="eqref" reference="eq:epoch-lengths"}. We argue (cf. Lemma [\[lem:bin-adv\]](#lem:bin-adv){reference-type="ref" reference="lem:bin-adv"}) that after \(Q\) steps the target is in \(M_Q\) with sufficient probability. Since the \(Q\) is chosen so that the size of \(M_Q\) is polylogarithmic in \(n\) and \(\delta^{-1}\), any search algorithm of complexity \(\mathcal{O}(\varepsilon^{-2}(\log n+\log\delta^{-1}))\) is sufficient to finish the search; we use the one in. See Algorithm [\[alg:binary-adversarial\]](#alg:binary-adversarial){reference-type="ref" reference="alg:binary-adversarial"} for a formal statement. ## Theorem [\[thm:bin:las-vegas:distr\]](#thm:bin:las-vegas:distr){reference-type="ref" reference="thm:bin:las-vegas:distr"}: Las Vegas distributional search {#sec:bin-search:las-vegas} The lengths of the epochs remain the same, that is as in [\[eq:epoch-lengths\]](#eq:epoch-lengths){reference-type="eqref" reference="eq:epoch-lengths"}. The stop condition (for the execution of Algorithm [\[alg:epochs\]](#alg:epochs){reference-type="ref" reference="alg:epochs"}) mimics the one for the graph case but takes the entire set of marked elements into account---see Algorithm [\[alg:las-vegas-distributional\]](#alg:las-vegas-distributional){reference-type="ref" reference="alg:las-vegas-distributional"}. [^1]: However one has to have in mind that graph queries applied to linear orders provide *richer* set of replies: \(\{<,>,=\}\), compared to \(\{<,>\}\) in case of a binary search. [^2]: This only makes the algorithms stronger, since it operates in a weaker replies model.
{'timestamp': '2021-07-14T02:05:43', 'yymm': '2107', 'arxiv_id': '2107.05753', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05753'}
null
null
null
null
# [\[sec:introduction\]]{#sec:introduction label="sec:introduction"}Introduction Motivations for developing artificial spiking neural systems include efficient hardware implementations of brain-inspired algorithms and construction of large-scale systems for studying the mechanisms of cognition. While most efforts toward these ends employ semiconductor hardware based on silicon transistors, superconducting electronics have also received considerable attention. Superconducting circuits based on Josephson junctions (JJs, ) have strengths that make them appealing for neural systems, including high speed, low energy consumption per operation, and native thresholding/spiking behaviors. In particular, two-junction superconducting quantum intereference devices (SQUIDs) are ubiquitous in superconducting electronics, and several efforts aim to utilize SQUIDs for various neuromorphic operations. As shown in Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(a), a SQUID has two inputs: a bias current (typically DC) that sets the operating point of the device and a flux input coil. The response of the SQUID to the flux input is peculiar in that it is periodic, as shown in Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(b). One way to use a SQUID as a neuromorphic component is to collect the inputs from many synapses or dendrites and apply them as flux to the SQUID loop. The response then has a threshold that depends on the applied bias current, \(I_b\), and is maximal at an applied flux of \(\Phi_0/2\), where \(\Phi_0 = h/2e \approx 2\) mV\(\cdot\)ps is the magnetic flux quantum. In this work, we consider the ramifications of limiting the maximum applied flux to this value of \(\Phi_0/2\) so the response is monotonic with applied signal. Fan-in has recently been analyzed in superconducting neuromorphic circuits wherein single-flux quanta are used as signals between neurons. However, that work was not concerned with the case in which analog synaptic signals integrated and stored over time could drive a SQUID beyond the first half period of its response function. In the present study, we analyze fan-in in the context of leaky-integrator neuronal circuits that were originally designed for use in large-scale superconducting optoelectronic systems. However, the conclusions of this paper should be applicable to a wide variety of SQUID neurons. In this work, we use the following component definitions. A *synapse* is a circuit that receives a single input from another neuron and produces an electrical current circulating in a storage loop. A *dendrite* is a circuit that receives an input proportional to the electrical output of one or more synapses and/or dendrites, performs a transfer function on the sum of the inputs, and produces an electrical current circulating in a storage loop as the output. A *neuron cell body* (also known as a *soma*) receives input proportional to the electrical output of one or more synapses and/or dendrites, performs a threshold operation on the sum of the inputs, and produces an output pulse if the threshold is exceeded. Outputs from the neuron cell body are routed to many downstream synapses. *Fan-in* is the collection and localization of multiple synaptic or dendritic signals into a dendrite or neuron cell body. # [\[sec:model\]]{#sec:model label="sec:model"}Model We begin by considering the simple SQUID circuit shown in Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(a). The weighted sum of synaptic signals is represented by the applied flux (\(\Phi_\mathrm{a}\)) to the SQUID loop. Upon reaching a threshold value of applied flux (\(\Phi_\mathrm{a}^\mathrm{th}\)), the SQUID produces a train of fluxons. Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(b) shows the relationship between the rate of fluxon production (\(R_\mathrm{fq}\)) and \(\Phi_\mathrm{a}^\mathrm{th}\). \(\Phi_\mathrm{a}^\mathrm{th}\) depends on \(I_b\) and corresponds to the \(x\)-intercepts in the figure. The generated fluxon train can be used in multiple ways depending on the neuromorphic context. For instance, each fluxon produced could be interpreted as an entire action potential, for use in either rate or temporal coding schemes. Alternatively, the rate of fluxon production could be treated as an analog output that triggers another thresholding device (such as an optical transmitter) that drives action potentials downstream. In any of these contexts, however, maintaining a monotonic response is desirable. We will first treat the point-neuron case (synapses are connected directly to the neuron cell body), discuss its limitations, and then investigate how an active dendritic arbor mitigates these concerns. ## [\[sec:point_neuron\]]{#sec:point_neuron label="sec:point_neuron"}Point neurons with a SQUID soma As seen in Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(b), restricting the applied flux to the range \(0 \le \Phi_{\mathrm{a}} \le \Phi_0/2\) would enforce monotonicity. However, restricting the signal requires a large fraction of synapses to be active to reach threshold. The largest signal that can be applied to the SQUID occurs when all \(n\) synapses are active and maximally weighted. Suppose a maximally weighted synapse applies \(\Phi_\mathrm{sy}\) of flux to the SQUID. To ensure monotonicity, we set this maximum possible signal equal to \(\Phi_0/2\): \[n\Phi_\mathrm{sy} = \frac{\Phi_0}{2}.\] To reach threshold, a critical number \(p\) of synaptic inputs must be active. For simplicity, we assume that each active input supplies \(\Phi_\mathrm{sy}\) of flux. If the applied flux necessary to reach threshold is \(\Phi_\mathrm{a}^\mathrm{th}\), then \[\label{eq:delta_phi} \Phi_\mathrm{a}^\mathrm{th} = p\,\Phi_\mathrm{sy} = \frac{p\,\Phi_0}{2n}.\] At threshold, the induced current is equal to the difference between \(I_\mathrm{c}\) and \(I_\mathrm{b}\), where \(I_\mathrm{b}\) is the current through one of the JJs when no flux is applied to the loop. For a SQUID with total inductance \(L_{\mathrm{tot}}^{\mathrm{sq}}\), this implies that \(\Phi_\mathrm{a}^\mathrm{th} = L^{\mathrm{sq}}_{\mathrm{tot}}(I_\mathrm{c}-I_\mathrm{b})\). We can rewrite Eq. [\[eq:delta_phi\]](#eq:delta_phi){reference-type="ref" reference="eq:delta_phi"} in terms of the critical and bias currents and rearrange to find the minimum fraction of synapses that must be active to reach threshold: \[\frac{p}{n} = \frac{2L^{\mathrm{sq}}_{\mathrm{tot}}(I_{\mathrm{c}}-I_{\mathrm{b}})}{\Phi_0}.\] \(L^{\mathrm{sq}}_{\mathrm{tot}}\) is a function of flux in the SQUID through the variable inductance of JJs. For a typical SQUID near threshold, \(L^{\mathrm{sq}}_{\mathrm{tot}} \approx \frac{\Phi_0}{I_{\mathrm{c}}}(\frac{3\pi + 2}{4\pi})\) (see Appendix [\[apx:squid\]](#apx:squid){reference-type="ref" reference="apx:squid"}), resulting in the expression \[\label{eq:fraction_active} \frac{p}{n} = \frac{3\pi + 2}{2\pi} \left( 1-\frac{I_b}{I_c} \right).\] Equation [\[eq:fraction_active\]](#eq:fraction_active){reference-type="ref" reference="eq:fraction_active"} gives the fraction of maximally weighted synapses that must be active to drive the SQUID to threshold. When one limits the total signal that can be applied to a SQUID to \(\Phi_0/2\) to maintain a monotonic response, the threshold activity fraction is dependent only on the ratio \(I_b/I_c\). Noise prohibits biasing with \(I_b\) arbitrarily close to \(I_c\). The effects of noise in superconducting neurons warrant further investigation, but \(I_{\mathrm{b}}/I_{\mathrm{c}} = 0.7\) is typical of digital superconducting systems. This value corresponds to a minimum threshold activity of about 55%. \(I_\mathrm{b}/I_\mathrm{c} = 0.9\) would represent an aggressive operating point, and would require \(p/n \approx 18\%\). Such an activity level is higher than that observed in biology, where 1%-16% of neurons may be active at any time due to power considerations as well as implications of sparse coding. As stated in Ref. , "Sparse coding schemes, in which a small proportion of cells signal at any one time, use little energy for signaling but have high representational capacity, because there are many different ways in which a small number of signals can be distributed among a large number of neurons." We next consider how performing fan-in with an active dendritic tree comprised of SQUIDs alters the calculation. ## [\[sec:dendritic_tree\]]{#sec:dendritic_tree label="sec:dendritic_tree"}Fan-in with an active dendritic tree Biological neurons are not accurately modeled as point neurons. Instead, synaptic inputs are passed through an arbor of active dendrites that performs numerous computations, including intermediate threshold functions between subsets of synapses and the soma and detection of synaptic sequences. Active dendrites can be significant for adaptation and plasticity, can dramatically increase information storage capacity relative to point neurons, and when modulated by inhibitory neurons, the dendritic tree can induce a given neuron to perform distinct computations at different times, enabling a given structural network to dynamically realize myriad functional networks. Discussion of dendrites in superconducting neural hardware is found in Ref. . A schematic of a dendritic tree is shown in Fig. [\[fig:dendritic_tree\]](#fig:dendritic_tree){reference-type="ref" reference="fig:dendritic_tree"}(a). The architecture consists of input synapses (shown in blue), multiple levels of dendritic hierarchy (yellow), and the final cell body (green). These components have been defined in Sec. [\[sec:introduction\]](#sec:introduction){reference-type="ref" reference="sec:introduction"}, and all three can be implemented with SQUID circuits, a self-similarity that facilitates scalable design and fabrication. A specific circuit implementation is given in Sec. [3](#sec:Loops){reference-type="ref" reference="sec:Loops"}. We restrict attention to a homogeneous dendritic tree of the form shown in Fig. [\[fig:dendritic_tree\]](#fig:dendritic_tree){reference-type="ref" reference="fig:dendritic_tree"}(a), wherein all dendrites receive the same number of inputs, \(n\), which we refer to as the *fan-in factor*. The neuron cell body resides at level zero of the dendritic hierarchy, and synapses reside at level \(H\), so the total number of synapses is \(n^H \equiv N\). In Fig. [\[fig:dendritic_tree\]](#fig:dendritic_tree){reference-type="ref" reference="fig:dendritic_tree"}(a) we show a tree with fan-in factor \(n = 2\) and three levels of hierarchy for a total of \(N = 8\) synapses. For a homogeneous dendritic tree, the relationship between number of synapses, fan-in factor, and hierarchy is plotted in Fig. [\[fig:dendritic_tree\]](#fig:dendritic_tree){reference-type="ref" reference="fig:dendritic_tree"}(b). Biological neurons are less uniform and more complex, but homogeneous trees should be a good starting point for artificial systems. Equation [\[eq:fraction_active\]](#eq:fraction_active){reference-type="ref" reference="eq:fraction_active"} is applicable to any dendrite or neuron cell body in the dendritic tree, provided the maximum applied flux is limited to \(\Phi_0/2\). Working backward from the cell body, one can calculate that the minimum number of active synapses required to drive the neuron cell body to threshold is \(P = p^H\), and the fraction of synaptic activity for threshold is at least \[\label{eq:fraction_active__hierarchy} \frac{P}{N} = \left( \frac{p}{n} \right)^H = \left[ \frac{3\pi + 2}{2\pi} \left( 1-\frac{I_b}{I_c} \right) \right]^H.\] Equation [\[eq:fraction_active\]](#eq:fraction_active){reference-type="ref" reference="eq:fraction_active"} is recovered as the special case of \(H = 1\). The exponential dependence of threshold activity fraction on \(H\) implies that dendritic trees can improve fan-in even with limited depth of the tree. This is illustrated in Fig. [\[fig:results\]](#fig:results){reference-type="ref" reference="fig:results"}, where the activity fraction as a function of bias is plotted for dendritic trees of varying depth. We see that the point neuron case (\(H=1\)) requires the highest activity fraction, but that the situation improves quickly with depth of dendritic tree. For instance, with \(H=5\) and a conventional biasing of \(0.7\,I_\mathrm{c}\), only 5% of synapses need be active---an order-of-magnitude improvement over the case of the point neuron. If \(I_b/I_c\) can be pushed to \(0.9\), a tree depth of only \(H = 3\) is required to achieve sub-1% threshold activity fraction. For biologically realistic fan-in of \(10^4\) synapses, this dendritic tree would require dendrite fan-in of \(n \approx 22\) and about 485 intermediate dendrites. Considering that every synapse requires a SQUID, the additional hardware fraction for the dendritic tree is minor and area estimates of such hardware is found in appendix B of Ref.Ṫhese biological values are abjectly impossible for point neurons whose applied flux is limited to the range of monotonic response, providing a physical motivation for the use of dendritic trees in superconducting neurons. In addition to the benefits of the sparse coding model, the lower activity fraction associated with an active dendritic tree also benefits the dynamic range of possible thresholds. Many homeostatic mechanisms involve the tuning of the bias point in response to network activity. Ideally, this bias point could be tuned over a wide range. By allowing lower bias points for the same activity fraction, dendrtic trees allow the threshold of a neuron to be tuned over a wider range than that of a point neuron. The energy consumption of the dendritic arbor itself also deserves consideration. For future superconducting systems, dynamic power should dominate static power consumption. The total fraction of all units (synapses, dendrites, and soma) that must be active to reach threshold is given by \[\label{eq:fraction_active__dendrites} \frac{P_\mathrm{tot}}{N_\mathrm{tot}} = \frac{\sum_{h = 0}^H p^h}{\sum_{h = 0}^H n^h}.\] The energy consumption of synapses and dendrites is unlikely to be the same for most technologies. In the optoelectronic case, for example, synaptic events are likely to cost significantly more power than an active dendrite. Additionally, it can be shown that the total number of active units is likely to be higher in the point neuron case for almost all reasonable bias conditions as the number of added dendrites is compensated for by the greatly reduced number of active synapses. # Loop Neuron Circuits {#sec:Loops} Neuronal circuits based on superconducting loops have been proposed in prior work, particularly with regard to optoelectronic systems. We show here an application of these fan-in considerations to the specific case of loop neurons. A circuit diagram is shown in Fig. [\[fig:circuit\]](#fig:circuit){reference-type="ref" reference="fig:circuit"}. The dendritic integration (DI) loop integrates signals from activity present at that dendrite (or synapse). The saturation current of the DI loop corresponds to the maximally weighted active synapse discussed in the previous section. A mutual inductor (\(M^\mathrm{dc|di}\)) couples this signal into a second loop, called the dendritic collection (DC) loop. This loop is not strictly necessary, but allows for a more standardized design procedure, as discussed below. The DC loop applies flux \(\Phi_\mathrm{a}^\mathrm{dr}\) (the weighted contribution of afferent signals) through \(M^\mathrm{dr|dc}\) to the dendritic receiving (DR) loop. The DR loop forms the active component of the dendrite that has been the subject of our discussion thus far. Its output, a train of fluxons, is then coupled into another DI loop, allowing the chain to continue indefinitely. A schematic layout is provided in Fig. [\[fig:circuit\]](#fig:circuit){reference-type="ref" reference="fig:circuit"} (b) to provide physical intuition about the circuit. Still, the question remains: How do we limit the applied flux \(\Phi_\mathrm{a}^\mathrm{dr}\) to enforce monotocity in practice? For this circuit, a careful choice of inductances is all that is required. The mathematical details are given in Appendices [\[apx:squid\]](#apx:squid){reference-type="ref" reference="apx:squid"} and [\[apx:inductance_constraint\]](#apx:inductance_constraint){reference-type="ref" reference="apx:inductance_constraint"}, but ultimately only a single constraint amongst all of the inductances is necessary (Eq. [\[eq:inductance_constraint\]](#eq:inductance_constraint){reference-type="ref" reference="eq:inductance_constraint"}). Additionally, the intermediate DC loop allows the monotonic condition to be met across a wide range of fan-in factors with only \(L^{\mathrm{di2}}\) being a function \(n\). This means that the SQUID and its input coil need not be redesigned for different choices of \(n\). The consequences of the DC loop are further explored in Appendix [\[apx:alternative_scenarios\]](#apx:alternative_scenarios){reference-type="ref" reference="apx:alternative_scenarios"}. # [\[sec:discussion\]]{#sec:discussion label="sec:discussion"}Discussion We have considered the implications of limiting the maximum flux input to all SQUIDs so the response is monotonically increasing. It is found that limiting the applied flux introduces a constraint on the activity fraction of synapses required to reach threshold, and the addition of a dendritic tree ameliorates the situation. This behavior is independent of most details of the circuit (such as whether or not a collection loop is used). The physical arguments presented here in favor of dendritic trees are derived from this decision to limit the applied flux to handle the ostensible "worst-case" scenario in which all synaptic inputs are fully saturated simultaneously. It is fair to question whether it is necessary to design our circuits around this extreme situation. The monotonicity issue could, for instance, be solved by immediately resetting all post-synaptic potentials to zero upon threshold. This is the standard behavior exhibited by most leaky integrate-and-fire models. However, implementing such a mechanism in superconducting hardware without compromising the speed and efficiency of superconducting neurons appears challenging. Additionally, we have argued elsewhere that SQUID dendrites provide numerous opportunities for active, analog dendritic processing independent of the fan-in benefits described here. In that context, enforcement of monotonicity appears necessary. For these reasons, we contend that the best course of action is to allow synaptic signals to decay naturally without regard to thresholding events (which also preserves information) while limiting the applied flux in the manner described. Still, one could argue we are over-preparing for the worst case scenario. Perhaps we could leave the maximum possible applied flux to each SQUID unrestricted, and instances wherein SQUIDs are driven past a half-period of their response function will be sufficiently rare that we can ignore them in design. For general cognitive activity, we are likely to seek networks balanced at a critical point between excessive synchronization (order) and insufficient correlation (disorder). When cognitive circuits are poised close to this critical point, neuronal avalanches or cell assemblies are observed to be characterized by a power-law or log-normal distribution of sizes. A great deal of contemporary research indicates that operation near this critical point is advantageous for maximizing dynamic range and the number of accessible metastable states while supporting long-range correlations in network activity. With either power-law or log-normal distributions, network activity engaging many neurons is less probable than activity involving few neurons, but periods of activity involving large numbers of neurons are not so improbable as to be neglected and may be crucial episodes for information integration across the network. The probability of large events does not decay exponentially and must therefore be accommodated in hardware. We reiterate that the primary assumption entering the derivation of Eq. [\[eq:fraction_active\]](#eq:fraction_active){reference-type="ref" reference="eq:fraction_active"} is that the maximum applied signal is limited to a certain value. We have considered the ramifications in the specific context of SQUID components, but similar considerations may apply to other hardware. We encourage the reader to consider whether similar arguments may affect their favorite neuromorphic thresholding elements. We also note that limiting the applied flux to \(\Phi_0/2\) may not always be advisable. From the activation function of Fig. [\[fig:squid_response\]](#fig:squid_response){reference-type="ref" reference="fig:squid_response"}(b) it is evident a dendrite with two synapses performs XOR if each synapse couples \(\Phi_0/2\) into the receiving SQUID. When both synapses are active, the device operates outside the monotonic response. We hope this article does not stifle the investigation of the full neural utility of engineered SQUID responses.
{'timestamp': '2021-07-14T02:06:42', 'yymm': '2107', 'arxiv_id': '2107.05777', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05777'}
null
null
null
null
# Introduction One of the challenges of modern astrophysics is to understand what controls the mass distribution of stars at their birth, the so-called initial mass function (IMF). Most of the observational studies since the work of have found the shape of the IMF to be universal, except possibly in young massive clusters. Understanding its origin is crucial for both star formation and galactic evolution. The IMF exhibits a peak at mass \(M{\,\approx\,}\)`<!-- -->`{=html}0.3 \(M_\sun\) and a power-law high-mass end \({\rm d}N/{\rm d}\log(M){\,\propto\,}M^{-1.35}\). Similarities between the slope of the IMF and the slope of the core mass function (CMF), derived from observations of molecular clouds, led to the suggestion that the IMF results from the fragmentation of molecular clouds. Such similarities have also been reported in numerical studies. With the possibility of a relationship between the IMF and the CMF, studies on the origin of the IMF proceeded in two directions: to understand (1) the origin of the CMF and its link with the fragmentation processes of molecular clouds and (2) the connection between the prestellar cores and stars, with a commonly used broad assumption of a one-to-one correspondence between the two types of objects. The assumption means that the gravitational collapse of a prestellar core forms a single star or a close binary, with a certain mass transfer efficiency from the core to the stars. In this picture of star formation, the cores must remain not fragmented during the collapse. It is believed that prestellar cores are the result of gravo-thermal fragmentation in molecular clouds, resulting in an average core mass of \({\sim\,}\)`<!-- -->`{=html}2 \(M_\sun\) and size of \({\sim\,}\)`<!-- -->`{=html}0.2 pc that correspond to the Jeans mass and length for gas with a temperature and mean density of \(T{\,\simeq\,}\)`<!-- -->`{=html}10 K and \(n_\mathrm{H_2}{\,\simeq\,}\)`<!-- -->`{=html}10\(^4\) cm\(^{-3}\), typical of dense regions in molecular clouds. Modern high-resolution and sensitive imaging in the far-infrared and sub-millimetre wavelengths lead to a standard approach to their analysis. In that approach, the single or multi-wavelength images of star-forming regions are analysed using source extraction methods. The extraction tools detect, measure, and catalogue all sources of emissions in the images, that is, all strong intensity peaks that stand out against the local background and noise fluctuations. Despite the importance of the angular resolutions for observational studies of star formation, no detailed systematic study has been done to clarify their effects on the derived properties of the physical objects. We investigate how the sizes and masses of the same sources behave when analysed at different spatial resolutions. We extracted and examined sources at different angular resolutions in the high-mass star-forming region and in the low-mass star-forming region. Because they are physically different and present very different resolutions, these two regions are highly complementary for our analysis. In particular the sources in are likely to be small clumps while the sources of have been described in the literature as candidate pre-and protostellar dense cores. These two sets of observations complement the analysis with a similar approach using numerical simulations that allowed us to reach higher angular resolutions and to assess the impact of the projection effects. In Sect. [2](#s:obs-sim){reference-type="ref" reference="s:obs-sim"}, we present the different observational and numerical data sets that we used. In Sect. [3](#s:analyse){reference-type="ref" reference="s:analyse"}, we show that angular resolution affects the properties of extracted sources, even at scales lower than 0.05 pc where we expect to retrieve candidate prestellar cores. In Sect. [4](#s:disc){reference-type="ref" reference="s:disc"}, we discuss the similarities and differences between observations and simulations and put our study in perspective with recent investigations on the link between the CMF and the IMF. In Sect. [5](#s:concl){reference-type="ref" reference="s:concl"}, we summarise our conclusions. # Observations and numerical simulations {#s:obs-sim} This paper aims to investigate the effect of angular resolution on the properties of sources and resulting source mass function (SMF), from large scale (0.6 pc) where we expect to observe cluster-forming clumps down to small-scales (\(\lesssim\)`<!-- -->`{=html}0.05 pc) where we expect to see individual pre-stellar cores. To that end, we use *Herschel* observations and numerical simulations of both low-and high-mass star-forming regions to understand the effects of angular resolution on the derivation of the physical parameters of the gravitationally bound sources, in the framework of the standard observational approach of source extractions. ## A high-mass star-forming region: NGC 6334 {#ss:ngc} is a complex of giant molecular clouds in the Sagittarius-Carina arm of the Milky Way, with an estimated mass \(M{\,\simeq\,}\)`<!-- -->`{=html}7\({\,\times\,}10^5\) \(M_\sun\), located at a distance \(D{\,\simeq\,}1.75\) kpc from the Sun. This very active high-mass star-forming region hosts more than 2000 young stellar objects (YSOs) identified with *Spitzer*, numerous regions, maser sources, and molecular outflows. In this paper, we use a column density image of , derived from the *Herschel* images at 160, 250, 350, and 500 \(\mu\)m with an effective angular resolution of 18\(^{\prime\prime}\) from the [HOBYS]{.smallcaps} key programme [^1]. We extracted and analysed sources detected in the surface density map at the initial 18\(^{\prime\prime}\) resolution and after degrading the image to the 36 and 72\(^{\prime\prime}\) resolutions (Fig. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"}, Sect. [3.2](#sss:obs){reference-type="ref" reference="sss:obs"}). ## A low-mass star-forming region: Aquila {#ss:aquila} is a complex of molecular clouds at the end of the rift, located at a distance of 435 to 490 pc. In this study we adopt a distance of 460 pc. Using the 2MASS extinction maps, derived its total mass \(M{\,\simeq\,}\)`<!-- -->`{=html}9\({\,\times\,}\)`<!-- -->`{=html}10\(^4\) \(M_\sun\)[^2] and, using the *Herschel* 70 and 160 \(\mu\)m images, they identified about 200 YSOs in . In this work, we use the high-resolution column density map presented in. This map has a native angular resolution of 18\(^{\prime\prime}\). It was built from the *Herschel* images at 160, 250, 350, and 500 \(\mu\)m taken during the *Herschel* Gould Belt Survey. We extracted and analysed sources in the surface density image at the initial 18\(^{\prime\prime}\) resolution and after degrading the image to the 36 and 72\(^{\prime\prime}\) resolutions (Fig. [\[f:aquila\]](#f:aquila){reference-type="ref" reference="f:aquila"}, Sect. [3.2](#sss:obs){reference-type="ref" reference="sss:obs"}). ## Simulations of star-forming regions {#ss:simus} To overcome the limited angular resolution provided by currently available telescopes, we employed several numerical simulations of a 3D turbulent cloud designed to represent an -sized molecular cloud [@ntormousi19 hereafter NH19]. They were produced with the RAMSES code (@teyssier02 [@fromang06]) that solves the magneto-hydrodynamical (MHD) equations on a Cartesian grid with adaptive mesh refinement (AMR). The initial conditions of the simulations resembled a molecular cloud, that was approximated by an ellipsoid with a full extent of 33 pc\(\,\times\,\)13.2 pc\(\,\times\,\)13.2 pc and a mass of \(10^5\) \(M_\sun\), with a volume density profile defined by \[\rho(r) = \rho_{0}\left(1+\frac{(x^2+y^2)}{r_0^2}+\frac{z^2}{z_0^2}\right)^{-1}, \label{mcloud}\] where \(r{\,=\,}(x^2{\,+\,}y^2{\,+\,}z^2)^{1/2}\) is the radial coordinate and (\(z_0, r_0\)) is the point at which the density profile flattens to \(\rho_{0}{\,=\,}1500\) cm\(^{-3}\), the initial peak density in the cloud. The simulations were computed on an adaptive mesh, such that they always resolve the Jeans length with at least ten cells. The coarsest 512\(^{3}\) grid occupied a volume of \(66^{3}\) pc\(^3\). We performed two hydrodynamical simulations (HD, HD\(^\mathrm{h}\)) and one magneto-hydrodynamical simulation (MHD) with a magnetic field that was initially oriented along the *x*-axis. The HD and MHD runs had 7 additional levels of mesh refinement and the high-resolution HD\(^\mathrm{h}\) run used 8 additional refinement levels, corresponding to the maximum resolutions of \({\sim\,}\)`<!-- -->`{=html}400 and 200 au, respectively. The models included sink particles that approximate the evolution of unresolved small scales by an immediate collapse onto a point mass. These sink particles are disconnected from the hydrodynamical evolution and interact with the remaining gas through gravity and accretion only. New sink particles form when the volume density exceeds 10\(^8\) cm\(^{-3}\) (HD, MHD) or 10\(^9\) cm\(^{-3}\) (HD\(^\mathrm{h}\)) and when the gas inside a small volume around the density peak undergoes gravitational collapse. With these formation criteria, the sink particles may be considered as individual protostars. However, the stellar feedback is not included and the models used an isothermal equation of state. The parameters of the simulations are listed in Table [1](#t:model-parameters){reference-type="ref" reference="t:model-parameters"} and a more detailed description of the models is presented in NH19. For a meaningful comparison of the numerical simulations with real observations, it is necessary to convert their numerical output into a form that resembles the observations. We isolated the inner parts of the numerical boxes, limited by \({\pm\,}0.5 x_{\rm max}\), \({\pm\,}0.5 y_{\rm max}\), and \({\pm\,}0.5 z_{\rm max}\), containing most of the dense gas. These boxes were projected onto the grids of 4096 \(\times\) 4096 pixels for the HD and MHD simulations and 8192 \(\times\) 8192 pixels for HD\(^\mathrm{h}\) along the *x*, *y*, and *z* axes, allowing us to investigate the projection effects (Sect. [3.4](#ss:vieweffect){reference-type="ref" reference="ss:vieweffect"}). The pixel units of the resulting surface density maps were converted from pc to arcsec, using the distances of 1750 pc for the H and MHD models and 460 pc for HD\(^\mathrm{h}\), corresponding to and , respectively. A uniform Gaussian noise was added to the resulting surface densities, at the levels corresponding to the first quartile of the image pixel distributions (\({\sim\,}\)`<!-- -->`{=html}10\(^{21}\) cm\(^{-2}\)). The maps were smoothed to the 9, 18, 36, and 72\(^{\prime\prime}\) resolutions for the HD, MHD, and HD\(^\mathrm{h}\) simulations, which cover the angular resolutions of the observed regions. In total, we obtained 36 synthetic surface density images for the H, MHD, and HD\(^\mathrm{h}\) simulations. The surface density maps projected along the *x* axis for HD and HD\(^\mathrm{h}\) are shown in Figs. [\[f:cores-projx\]](#f:cores-projx){reference-type="ref" reference="f:cores-projx"} and [\[f:cores-projx-hr\]](#f:cores-projx-hr){reference-type="ref" reference="f:cores-projx-hr"}, whereas the maps for the other projections and for MHD are presented in Appendix [\[a:plots\]](#a:plots){reference-type="ref" reference="a:plots"}. # Extraction and analysis of sources {#s:analyse} The column density images of the observed and simulated star-forming regions were given as an input to a source extraction algorithm that produced catalogues of sources, from which we selected self-gravitating sources. In the following, we describe the angular resolution effects on the measured sizes and masses of the selected sources and the resulting source mass function (SMF). We present the results obtained for the observed fields, and , and we analyse the results for the HD, MHD, and HD\(^\mathrm{h}\) simulations to follow the resolution effects beyond the angular resolutions accessible in present-day observations. ## Identification and selection of sources {#ss:getsf} To extract sources in the observed and simulated images, we used the new multi-scale source and filament extraction method *getsf*. The method is the successor of *getsources*, *getfilaments*, and *getimages* that have been widely used, primarily in the studies of low-and high-mass star formation with *Herschel*. This method decomposes spatially the image(s) to effectively isolate structures of different widths and shapes. It separates the structural components of sources, filaments, and their backgrounds. Having separated the three components, *getsf* flattens the sources and filaments images to produce the flat detection images with uniform fluctuations over the images. Then it applies thresholding to remove insignificant fluctuations and uses only significant peaks to detect sources. Finally, it measures detected sources in the original images after subtracting their background and after deblending the sources. The *getsf* method only takes one input parameter: the maximum size of sources of interest, that the user determines from the images. The value of this parameter affects marginally the extraction results. The method is publicly available on its website[^3] and fully described in. The column density integrated over the source area at the adopted distance \(D\) gives the source mass \(M_{\rm S}\). We use the half-maximum sizes \(A\) and \(B\) (FWHM) to obtain the equivalent spherical radius \(R_{\rm S}\) of the source with the volume \(\pi A B^2/6\). To determine whether a source may be considered as gravitationally bound (self-gravitating) we followed and computed the ratio \(\alpha_{\rm BE}=\frac{M_{\rm BE, cr}}{M_{\rm S}}\) between the source mass and the critical Bonnor-Ebert mass: \[M_{\rm BE, cr} \simeq \frac{2.4 R_{\rm S} c_{\rm s}^2}{G}, \label{e:BE}\] where \(R_{\rm S}\) is the source radius, \(c_{\rm s}\) the sound speed at \(T\)=20 K, and \(G\) the gravitational constant. The sources with \(\alpha_{\rm BE}{\,<\,}2\) were considered as self-gravitating, hereafter called *bound* sources for brevity. In the analysis below we consider only the bound sources. In all column density maps (Figs. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"}--[\[f:cores-projx-hr\]](#f:cores-projx-hr){reference-type="ref" reference="f:cores-projx-hr"} and [\[f:cores-projy-projz\]](#f:cores-projy-projz){reference-type="ref" reference="f:cores-projy-projz"}--[\[f:cores-mhd\]](#f:cores-mhd){reference-type="ref" reference="f:cores-mhd"}), bound sources are shown by their ellipses, whose major and minor axes are equal to the source sizes \(A\) and \(B\) that are estimated by *getsf* at half-maximum intensity after subtraction of the sources background. The extraction results for all regions (NGC 6334, Aquila, simulations HD, MHD, and HD\(^\mathrm{h}\)) and angular resolutions are summarised in Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}. ## Angular resolution effects in observations {#sss:obs} Figures [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"} and [\[f:aquila\]](#f:aquila){reference-type="ref" reference="f:aquila"} show the surface density maps of and at three angular resolutions, differing by a factor of two. The maps are overlaid with the half-maximum ellipses of the bound sources. In both cases, the coarser the angular resolution, the fewer bound sources are found. Figure [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"} presents the ratio of bound sources from one scale to the next: \(N_B(2O)/N_B(O)\). The fragmentation cascade decreases with increasing spatial resolution for both and . The effect is the strongest in . We argue it is because the physical scales we probe in are larger than those we probe in . Figure [\[f:reseffect-obs\]](#f:reseffect-obs){reference-type="ref" reference="f:reseffect-obs"} demonstrates that degrading angular resolution affects the measured sizes of the sources. As a result of the angular resolution being lower by a factor of two, the average size of sources becomes twice larger. The mean size of the sources is of approximately 1.5 times the beam size for the three angular resolutions investigated. The size distribution is well represented by a lognormal distribution with a standard deviation of \({\sim}\)`<!-- -->`{=html}15% (Fig. [\[f:reseffect-obs\]](#f:reseffect-obs){reference-type="ref" reference="f:reseffect-obs"}), attributable to statistical fluctuations. The changes in angular resolution also affect the masses of sources. If the surface density were uniform, and without blending of sources, twice larger sizes would imply sources four times more massive. In , where decreasing the angular resolution by a factor of two only blends together about 30 % of the sources, this degradation of the resolution leads to sources that are, on average, two times more massive, which suggests that sources are centrally peaked. In , the downgrading of the resolution by a factor of four produces one extremely massive source (\({\gtrsim\,}5{\,\times\,}10^4\) \(M_{\sun}\)) that bias the mean mass estimate. If we ignore this object, then the resolution lowered by successive factors of two corresponds to sources being consecutively three and five times more massive (see Fig. [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"}). This is a joint effect of the inclusion of the background emission into the source emission (see below) and of the blending of sources. The resolution dependence of the measured source mass is reflected in the derived source mass function: Figure [\[f:reseffect-obs\]](#f:reseffect-obs){reference-type="ref" reference="f:reseffect-obs"} shows a clear shift of the SMF towards higher masses for lower resolutions in both star-forming regions, and . The cumulative form of the SMFs (Fig. [\[f:reseffect-obs\]](#f:reseffect-obs){reference-type="ref" reference="f:reseffect-obs"}) exhibits the same shift towards higher mass for lower angular resolutions. Interestingly, the slope of the high-mass tail of the SMF is almost unaffected by the resolution changes: the best fit of the high-mass tail of the cumulative SMFs of is very similar for the three angular resolutions, with \(\alpha{\,\simeq\,}{-}1.06{\,\pm\,}0.05\). The slope is flatter than the \(\alpha{\,=\,}-1.35\) for the canonical IMF, in line with the recent estimates for high-mass star-forming regions, that give flatter slopes than those for the low-mass star-forming regions. The fits to the cumulative CMFs for are also almost invariant with respect to the angular resolution, with an index \(\alpha{\,\simeq\,}{-}1.32{\,\pm\,}0.07\) indistinguishable from the slope of the canonical IMF, as previously reported by. ## Angular resolution effects in simulations {#sss:simu} Figure [\[f:reseffect-simu\]](#f:reseffect-simu){reference-type="ref" reference="f:reseffect-simu"} displays the sizes, masses, and cumulative source mass functions, obtained from the source extractions for the *y* projection of the HD, MHD, and HD\(^\mathrm{h}\) simulations; the *x* and *z* projections are presented in Appendix [\[a:plots\]](#a:plots){reference-type="ref" reference="a:plots"}. Similarly to the observed maps, the number of sources decreases for all simulations when the resolution is degraded by a factor of two. This decrease is all the more pronounced the larger the spatial scales we probe (see table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"} and Fig. [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"}). The simulations show the same behaviour as the observed regions with respect to the measured sizes of the extracted sources. For all angular resolutions, the mean size of sources systematically peaks at approximately 1.5 times the beam size, with a spread that follows a lognormal distribution with a standard deviation of 5% (Fig. [\[f:reseffect-simu\]](#f:reseffect-simu){reference-type="ref" reference="f:reseffect-simu"}). Therefore, the degradation of the angular resolution by a factor of two leads to sources whose average half-maximum sizes are twice larger. This effect leads to an increase in source masses. As in the observed regions, downgrading the angular resolution by a factor of two makes the average mass of the extracted sources larger, by a factor of two at spatial scales smaller than 0.03 pc and up to a factor five a scales greater than 0.3 pc (see Fig. [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"}). The smaller statistics at lower resolutions and the increased masses of the sources strongly affect the peak of the SMF, shifting the latter towards higher masses (Fig. [\[f:reseffect-simu\]](#f:reseffect-simu){reference-type="ref" reference="f:reseffect-simu"}). The high-mass slope of the SMF is almost unaffected by the resolution changes (variations within \({\sim\,}\)`<!-- -->`{=html}10%) and no clear trends as long as the numbers of sources \(N_{\rm S}{\,\gtrsim\,}40\). ## Viewing angle effects in the simulations {#ss:vieweffect} To understand whether the viewing angle at which a 3D molecular cloud is observed affects the numbers, masses, and sizes of the extracted sources, we compared the source extractions for the *x*, *y*, and *z* projections for all simulated regions (HD, MHD, and HD\(^\mathrm{h}\)) and angular resolutions (9, 18, 36, and 72\(^{\prime\prime}\)). For an illustration, we selected the HD simulation at the resolution of 18\(^{\prime\prime}\) in Fig. [\[f:vieweffect_18as\]](#f:vieweffect_18as){reference-type="ref" reference="f:vieweffect_18as"}, well representing the results; the other simulations and projections are presented in Appendix [\[a:plots\]](#a:plots){reference-type="ref" reference="a:plots"}. The half-maximum sizes of the extracted sources show little variations (\({<\,}\)`<!-- -->`{=html}5%) from one projection to another (Fig. [\[f:vieweffect_18as\]](#f:vieweffect_18as){reference-type="ref" reference="f:vieweffect_18as"}), as evidenced by the source size functions (SSFs) in the reference case (HD simulation at 18\(^{\prime\prime}\) resolution). The number of sources and their mean masses vary within \(20{-}25\)% between projections. For the reference case, we extracted an average number of 90\({\,\pm\,}\)`<!-- -->`{=html}24 sources with a median mass of 94\({\,\pm\,}\)`<!-- -->`{=html}25 \(M_{\sun}\). Such variations induce small displacements between the SMFs of the different projections (Fig. [\[f:vieweffect_18as\]](#f:vieweffect_18as){reference-type="ref" reference="f:vieweffect_18as"}). A power-law fit of the high-mass tail of the cumulative form of the SMF (Fig. [\[f:vieweffect_18as\]](#f:vieweffect_18as){reference-type="ref" reference="f:vieweffect_18as"}) yields the mean slope \(\alpha{\,\simeq\,}{-}1.58\) that varies by \({\sim\,}\)`<!-- -->`{=html}20% between the projections. The variations in the numbers of extracted sources and mean masses increase as the resolution degrades. This is a pure statistical effect caused by the disappearance of unresolved sources, diluted by insufficient angular resolutions (Sects. [3.2](#sss:obs){reference-type="ref" reference="sss:obs"} and [3.3](#sss:simu){reference-type="ref" reference="sss:simu"}, and Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}). The differences in the properties of sources from one projection to another are less prominent when considering only the extractions with more than 40 sources. In such extractions, the number of identified bound sources varies by \({\sim}\)`<!-- -->`{=html}15%, their mean mass by \({\sim}\)`<!-- -->`{=html}20%, and the SMF slope by \({\sim}\)`<!-- -->`{=html}10%. It is reasonable to assume that the projection effects are moderate, but not negligible, for statistically significant samples of sources. # Discussion {#s:disc} Below, we discuss the results of our study, compare them with previous works, and analyse the reasons behind the very strong dependence of the properties of extracted sources on angular resolution. ## Comparison between observed and simulated regions {#sss:compa} Apart from one apparent discrepancy (see below) the effect of angular resolution on the derived properties of bound sources is the same in observations and numerical experiments. Among the resolutions common to the observations and simulations (18, 36, and 72\(^{\prime\prime}\)), the number of bound sources and their mean size and mass strongly depend on the resolution at which the sources are extracted. As a consequence, the peak of the source mass function is also resolution-dependent, whereas the slope of the SMF is only marginally affected. Interestingly, in the numerical experiments at the highest angular resolution (9\(^{\prime\prime}\)), exceeding the resolutions probed in the observed regions, we witness the same displacement of the SMFs. The number of extracted sources and their size and mass distributions respond to the increase of angular resolution in exactly the same way as at lower angular resolutions (Sect. [3.3](#sss:simu){reference-type="ref" reference="sss:simu"}). Comparing our results for NGC 6334 with those for HD and MHD at the same angular resolutions, the main difference between the simulated and observed regions is in the source mass. For instance, the median mass of sources in at 18\(^{\prime\prime}\) is 15 \(M_{\sun}\), whereas the median mass in HD and MHD are \({\sim\,}\)`<!-- -->`{=html}95 and \({\sim\,}\)`<!-- -->`{=html}110 \(M_{\sun}\), respectively (Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}). This difference is mainly caused by the dissimilar sizes of the regions: the observed region is roughly 6 times larger and includes a large fraction of low-and intermediate column densities. Restricting the analysis for to its densest region (the red rectangle in Fig. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"}) with the same area as in the numerical experiments, we derive a median source mass of \({\sim\,}\)`<!-- -->`{=html}75 \(M_{\sun}\), compatible with those obtained in the simulations (Fig. [\[f:compa-obs-simu\]](#f:compa-obs-simu){reference-type="ref" reference="f:compa-obs-simu"}). The high-mass slope of the SMF \(\alpha{\,\simeq\,}{-}1\) is estimated in , whereas \(\alpha{\,\simeq\,}{-}1.35\) is found in the simulated regions. The difference is even larger, when we restrict the analysis to the central dense area of , thereby removing a large fraction of the low-and intermediate-mass sources from the sample (Fig. [\[f:compa-obs-simu\]](#f:compa-obs-simu){reference-type="ref" reference="f:compa-obs-simu"}). Statistically, there is an excess of massive sources in with respect to those found in the HD and MHD simulated regions. This discrepancy might expose missing physics in the simulations, because their initial conditions match the properties of (Sects. [2.1](#ss:ngc){reference-type="ref" reference="ss:ngc"} and [2.3](#ss:simus){reference-type="ref" reference="ss:simus"}). This difference is unimportant for this study, that does not aim at reproducing all details of the observed regions with numerical simulations. We systematically investigated how different angular resolutions affect the derived parameters of extracted sources in the observed and simulated regions across similar physical scales. In that aspect, our results demonstrate full consistency between observations and simulations. ## Comparisons with previous source extractions {#ss:d:compa} analysed during the HOBYS project with an effective angular resolution of 18\(^{\prime\prime}\). Their strategy differs from ours: they detected sources with *getsources* using the *Herschel* images from \(160{-}500\) \(\mu\)m plus a column density map to detect sources, and measured the source fluxes from all available data: *Herschel* bands from \(70{-}500\) \(\mu\)m, JCMT, APEX, SEST, *Spitzer*, WISE, and MSX. Then, they built SED spectrum for each of the 4733 sources *getsources* detected, and applied different criteria to refine the source selection. Therefore the source catalogue comparisons given below must be considered as indicative. They classified the 490 most massive sources, with a median mass of 32 \(M_{\sun}\), which is consistent with the 940 sources of our sample with a median mass of 15 \(M_{\sun}\) taking into account the differences in the two approaches. Indeed, considering only the 490 most massive sources of our sample, the median mass becomes about 30 \(M_{\sun}\). investigated based on *Herschel* observations. They applied *getsources* to the *Herschel* images at \(160{-}500\) \(\mu\)m and to a column density image. Several criteria were used to classify the extracted sources between YSOs, starless cores, and protostellar cores. In total, they reported 650 starless cores and 60 protostellar cores in the molecular cloud. To associate the sources with the self-gravitating starless cores, they used the ratio \(\alpha_{\rm BE}\) between the source mass and the critical Bonnor-Ebert mass (see eq. [\[e:BE\]](#e:BE){reference-type="ref" reference="e:BE"}). With their condition \(\alpha_{\rm BE}{\,<\,}2\) they have found 290 prestellar cores, in good agreement with the 255 sources we found. Besides, they have reported a slope of the high-mass tail of the SMF of \(\alpha{\,\simeq\,}{-}1.33\), very similar to the mean slope \(\langle\alpha\rangle{\,=\,}{-}1.32\) that we found between the 72 and 18\(^{\prime\prime}\) resolutions (Sect. [2.2](#ss:aquila){reference-type="ref" reference="ss:aquila"}). We stress, nevertheless, that their detection and measurement strategies differed from ours. They detected the sources using all the individual bands of *Herschel* besides the column density image in the one hand and computed the mass of the sources from SED fitting in the other. Hence the source catalogue comparisons must be considered as indicative only. ## Interpretation of the angular resolution effects {#ss:inter} The results of our systematic investigation of the properties of sources extracted at different angular resolutions may seem surprising, if we do not make a clear distinction between sources of emission, observed with a certain angular resolution, and decoupled core in space that may be contributing to the observed peak. If we follow one of the standard observational practices and equate a bound source whose size is smaller than \(\sim\)`<!-- -->`{=html}0.05 pc with the pre-or proto-stellar core, its mass and size should no longer vary when increasing the telescope resolution. However, a careful analysis of the dependencies found in both observed and simulated regions suggests a coherent and natural interpretation[^4]. Comparing the images from the highest to the lowest resolution, we see that the number of sources drops faster and faster when the resolution is successively degraded by factors of two (cf. Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}). The sources dilute within the larger beams and their emission merges with the background emission (Figs. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"}--[\[f:cores-projx-hr\]](#f:cores-projx-hr){reference-type="ref" reference="f:cores-projx-hr"}, [\[f:cores-projy-projz\]](#f:cores-projy-projz){reference-type="ref" reference="f:cores-projy-projz"}--[\[f:cores-mhd\]](#f:cores-mhd){reference-type="ref" reference="f:cores-mhd"}). Therefore, the sources extracted at 72\(^{\prime\prime}\) resolution in Aquila or in the model HD\(^\mathrm{h}\) contain the emission of their background, and the contribution from the blended clusters of sources identified in the higher-resolution images. Comparing the images from the lowest to the highest resolution, we see that the very large sources disappear or split into several sources and that many new sources appear. The appearance of new sources and the splitting of existing sources span from 72 to 18\(^{\prime\prime}\) in both observations and simulations (Figs. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"}--[\[f:cores-projx-hr\]](#f:cores-projx-hr){reference-type="ref" reference="f:cores-projx-hr"}, [\[f:cores-projy-projz\]](#f:cores-projy-projz){reference-type="ref" reference="f:cores-projy-projz"}--[\[f:cores-mhd\]](#f:cores-mhd){reference-type="ref" reference="f:cores-mhd"}). In the numerical simulations, where we also had 9\(^{\prime\prime}\) synthetic observations, this behaviour continues from the 18 to the 9\(^{\prime\prime}\) angular resolution. Large numbers of filaments in the observed regions and produced by the simulations also experience similar transformations. The filaments are the widest at the 72\(^{\prime\prime}\) resolution and they become increasingly sub-structured into a finer web of narrower filaments at higher angular resolutions. The increasing structural complexity of the filamentary background continues down to the smallest spatial scales we studied: 0.02 pc in the numerical simulations, 0.04 pc in , and 0.15 pc in (see Fig. [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"}). Our results show that the majority of extracted sources appear more extended than the observational beam (by a factor of 1.5). If cores with definite boundaries do exist they must actually be unresolved in all images and for all resolutions, because the average size of the extracted sources closely follows the angular resolution (Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}). If the sources were resolved, their sizes would remain invariant with respect to the increasing resolution. Furthermore, the measured masses of the extracted sources also follow the angular resolution, changing by a factor of 2 even when the number of sources seems to approach convergence (Table [\[t:core-extraction\]](#t:core-extraction){reference-type="ref" reference="t:core-extraction"}). This means that the integrated emission of a source must contain a major contribution of either the dense and variable background, or of an unresolved cluster of smaller objects, or both. The true background under extracted sources is fundamentally unknown: any information about the physical background of an unresolved source is diluted within the observational beam. This leads to major uncertainties in the measurement of source parameters[^5], especially their masses (or integrated fluxes). Self-gravitating prestellar cores form in the dense parts of the molecular clouds that fluctuate on all spatial scales, including the scale of the cores and below. In theory, they are expected to appear in the local density enhancements of the clouds or in dense filaments, hence, the environment of prestellar cores must resemble a hill. Therefore, source extraction tools would underestimate their background, because they interpolate it based on the values just outside the source(see Sect. [4.4](#ss:d:algo){reference-type="ref" reference="ss:d:algo"}). This means that the background-subtracted sources must contain some background contribution that could become quite large for faint unresolved sources. We did not find any clear sign of convergence in the mass values across the entire range of resolutions that we investigated (see Fig. [\[af:ratio\]](#af:ratio){reference-type="ref" reference="af:ratio"}). Therefore, the currently available angular resolutions are probably insufficient to determine the correct mass of isolated prestellar cores, well decoupled from the background. If such decoupled cores exist in cluster-forming molecular clouds, they must be lighter than what we measured for unresolved sources. We created a simple model (Fig. [\[explanation\]](#explanation){reference-type="ref" reference="explanation"}) to verify and illustrate our interpretation. An unresolved round Gaussian source with a half-maximum \(A{\,=\,}\)`<!-- -->`{=html}3\(^{\prime\prime}\), peak value \(N_{\rm H_{2}}{\,=\,}1.2{\,\times\,}10^{24}\) cm\(^{-2}\), and mass \(M_{\rm S}{\,=\,}0.13\,M_{\sun}\) was added to a long filament with a crest density of \(10^{23}\) cm\(^{-2}\) and a relatively shallow, slowly varying radial profile. The exact profile, peak density, and width of the source are unimportant, provided that it raises above the background by a factor of several and remains unresolved at the 9\(^{\prime\prime}\) resolution. The filamentary shape of the background is unimportant: it may also be modelled as a round peak with a similar radial profile. The model image was convolved with Gaussian beams to the angular resolutions of 4.5, 9, 18, 36, 72, and 144\(^{\prime\prime}\). For each image with different angular resolution, the source was background-subtracted with the algorithm used by *getsf* and its half-maximum size and mass were measured. The profiles of the model, of the background, and of the true and background-subtracted source are displayed in Fig. [\[explanation\]](#explanation){reference-type="ref" reference="explanation"}. The sloping background of the model source leads to systematic, resolution-dependent inaccuracies of the derived background, which becomes progressively more underestimated towards lower resolutions (by the factors 1.15, 1.28, 1.52, 1.84, 2.35, and 3.37, respectively). The interpolated surface cuts too deep into the true background and, in effect, transfers substantial mass to the unresolved source and leads to a widening of the extracted sources. In the sequence of decreasing angular resolutions, the source becomes more extended than the original model source convolved to the same resolution, by the factors 1.005, 1.077, 1.13, 1.31, 1.45, and 1.50, respectively. At the lower resolutions (36, 72, and 144\(^{\prime\prime}\)), when the unresolved source becomes more strongly diluted within the beam, the factors become very similar to the factor of approximately 1.5 that we found for the observed and simulated regions. In the same sequence of decreasing resolutions, the extracted source mass becomes 1.007, 1.089, 1.69, 4.14, 14.4, and 59.3 the mass of the source model. From one resolution to the next, it corresponds to a mass increase by the factors 1.08, 1.55, 2.45, 3.48, and 4.12. The results of our simple model resemble those obtained in this work, telling us that the measured masses of unresolved sources, located on bright fluctuating backgrounds, may be very inaccurate. This agreement of the toy-model with the results of this work confirms that our interpretation captures the essence of the resolution effects. However, this simple model cannot be considered as fully realistic in view of the presence of a large variety of complex structures and backgrounds in the observed and simulated images. For instance, it does not include the additional effects of unresolved background fluctuations, or blending of clusters into single sources at lower resolutions. ## Comparison to other extraction algorithms {#ss:d:algo} We solely used *getsf* (see Sect. [3.1](#ss:getsf){reference-type="ref" reference="ss:getsf"}) to conduct the source extractions but various algorithms have been used in star-formation studies: *gaussclumps*, *clumpfind*, *dendrograms*, *cutex*, *csar*, and *fellwalker*. They employ different approaches: *clumpfind* and *dendrograms* analyse isointensity contours in the image; *cutex* analyses second derivative images to identify peaks; *csar* and *fellwalker* associate pixels one by one to local maxima. Two of these algorithms --- *clumpfind* and *fellwalker* --- do not subtract the background from sources. They are therefore irrelevant regarding angular resolution effects and background inclusion into the flux of sources. The individual background of sources is unknown and differs for sources lying in different areas of a molecular cloud. Therefore, the background can only be estimated from the pixels outside the source. *Gaussclumps*, *csar* and *dendrograms*[^6] subtract the value at the border of the source. *Cutex* fits a Gaussian plus an inclined plane to the peak of each source, thereby removing this planar background. *Getsf* interpolates the source background along 4 diagonals linking the pixels just outside the sources, averages the interpolated values and estimates a non-planar background. Background of sources are highly uncertain, progressively more so for fainter sources. The problem is especially serious for embedded sources that are part of a cloud or part of a filament embedded in a cloud. The different methods of background subtraction are accompanied by other differences in the extraction methods, the most important of them being deblending of overlapping sources. Only *cutex* and *getsf* deblend sources, whereas the other methods just partition the image between sources, not allowing them to overlap. These differences would engender dissimilarities in the results, such as the numbers of extracted sources and spurious sources, extraction completeness, inaccuracies in flux and mass measurements. Regarding our problem on how angular resolution affects the sources features, we can separate the algorithms in two families: those fitting the emission peaks (*cutex*, *gaussclumps*, *getsf*), and those progressively associating the emission to local maxima (*csar*, *dendrograms*). For the first family, the smoothing of the map will *i)* artificially increase the sources flux due to the inclusion of background emission (see Sect. [4.3](#ss:inter){reference-type="ref" reference="ss:inter"}) and *ii)* reduce the number of detected sources as they dilute into the background. In the second family, sources extend until they reach a user-defined intensity threshold, or until they meet another source. When the angular resolution degrades, the faint sources will blend into the background. As a consequence, the sources that remain detectable will extend further away. These sources will appear even bigger, and more massive, than with fitting methods. The issue we report, that angular resolution affects source features, is generic, present at the data level, and independent of the source extraction algorithms. ## Implications for the studies of star formation {#ss:d:cons} The results, presented in this paper, imply that the masses of cores, derived for various star-forming regions in the recent years are likely overestimated. There are various consequences of this finding for the standard approach used in the observational studies of star formation. Below, we touch upon some of the important issues. Our study shows that extracted sources must be unresolved even in the nearby star-forming regions, although the measured sizes seem to indicate the contrary. As shown by our results and explained in Sect. [4.3](#ss:inter){reference-type="ref" reference="ss:inter"}, the sources size at 1.5 times the beam is caused by an insufficient angular resolution in the presence of a complex sloping background. This means that the standard practice of determining the sizes of the physical cores by Gaussian beam deconvolution of the measured sizes cannot be applied. For the same reasons, the isolated prestellar cores must have lower masses than those obtained for the extracted sources at a certain angular resolution, if there is no convergence of the physical properties with respect to the angular resolution. The standard practice of equating the observed sources with individual isolated objects is misleading. On the basis of our results, it makes sense to associate with single isolated prestellar cores only those whose measured properties (size, flux, mass) would remain almost invariant with respect to the angular resolution. We propose a practical approach to determine, whether an observed region is affected by angular resolution problems or not, based on a convergence test. Instead of a single extraction of sources in the images, observed with a certain resolution \(O\), it would be necessary to perform a series of extractions with the resolutions \(O\), \(2O\), \(4O\), and maybe \(8O\) (if possible). The extractions would provide the measurements of source sizes and masses at each resolution and enable a conclusive assessment, whether there is a sign of convergence in the distribution of the measured values. With respect to the CMFs measured in various studies in the recent years, our results imply that the true CMF must shift to lower masses. The strong dependence of the masses on the telescope resolution prohibits direct comparisons of unconverged CMF with IMF. When the CMF peak is resolution-dependent, it is impossible to determine the efficiency \(\epsilon\) of the mass conversion from the prestellar cores to the newly born stars. Using an SMF obtained for with an effective resolution of 18\(^{\prime\prime}\) and equating the extracted sources with the prestellar cores, estimated \(\epsilon{\,\simeq\,}\)`<!-- -->`{=html}40%. For comparison, our source extractions done for at 36 and 72\(^{\prime\prime}\) resolutions provided SMFs that would yield \(\epsilon\) of 25 and 10%, respectively (Fig. [\[f:reseffect-obs\]](#f:reseffect-obs){reference-type="ref" reference="f:reseffect-obs"}). Our source extractions for the observed star-forming regions and demonstrate that encapsulated bound sources exist on spatial scales from \({\sim\,}1\) to \(0.02\) pc (see Figs. [\[f:ngc\]](#f:ngc){reference-type="ref" reference="f:ngc"} & [\[f:aquila\]](#f:aquila){reference-type="ref" reference="f:aquila"}). These results show that the concept of an isolated core is very questionable and may point towards possible oversimplification of the core collapse models [see e.g. @padoan97; @PN02; @HC08; @hopkins12], in which the gravo-thermal fragmentation stops near the Jeans length, \({\sim\,}\)`<!-- -->`{=html}0.2 pc for the temperatures \(T{\,\simeq\,}\)`<!-- -->`{=html}10 K and volume densities \(n_{\rm H_2}{\,\simeq\,}\)`<!-- -->`{=html}10\(^4\) cm\(^{-3}\), typical of dense parts of molecular clouds where cores form. The core collapse model was criticised by in their study of the validity of the one-to-one relationship between the CMF and the sink mass function on the basis of numerical models, although they find a statistical relationship between the two mass functions. Similarly, reported a statistical correspondence between the CMF and the sink mass function, but a weak correlation between the mass of the progenitor core and the final stellar mass. Only one-half of the mass of a low-mass star (\({<\,}1\) \(M_{\sun}\)) originated from its progenitor and this fraction dropped to \({\sim}\)`<!-- -->`{=html}10% for the higher-mass stars (\(2\,{\,<\,}M{\,<\,}5\) \(M_{\sun}\)). ## Possible problems {#ss:d:limit} Our analysis is based partly on numerical simulations. An important aspect of these numerical simulations is that they are scale-free, in the sense that they do not produce structures with certain distinct spatial scales. It seems to contradict the numerous observations of the filamentary structures that thread the molecular clouds, reportedly having a width of \({\sim\,}\)`<!-- -->`{=html}0.1 pc. These filamentary structures, in which cores are preferentially found, could host a dominant fraction of the gas of the molecular cloud. If the temperature and density are about homogeneous in filaments, that would create a population of cores dominating in numbers the global population of cores, and create a peak in the prestellar CMF at the typical Jeans mass associated with the physical conditions in marginally critical filaments. To address this issue it is necessary to observe molecular clouds at higher angular resolution, and question observationally the peak of the CMFs reported so far. It may also be necessary to seek for missing physics in the numerical simulations that could explain the formation of the filamentary structures with a mean width of \({\sim\,}\)`<!-- -->`{=html}0.1 pc. We note that, so far, all studies aiming at studying filaments failed to reproduce a width of 0.1 pc over nearly two order of magnitude in column densities. This is pointing either towards a missing physical ingredient or observational biases. # Conclusions {#s:concl} This paper presented a systematic investigation of the relationship between the properties of sources extracted in star-forming regions on one of the most important observational parameters: the angular resolution of the observations. Our analysis of 6 and 36 source extractions in observed and simulated star-forming regions with angular resolutions ranging from 9 to 72\(^{\prime\prime}\) allowed us to establish a clear and coherent pattern in the results. We found that the measured sizes and masses of the sources depend on the resolution, which means that these sources cannot be assigned to individual and well isolated cores --- the objects of interest in the studies of star formation. Our results demonstrate that bound sources are extracted for all adopted resolutions, which correspond to physical scales from 0.6 to 0.02 pc (or 4000 au). The sources remain unresolved in all the regions and at all resolutions; their average half-maximum size closely follows the angular resolution. The average mass of bound sources also scales with angular resolution. It increases by a factor greater than two when the angular resolution doubles when it causes blending of sources. At higher spatial resolution, where the blending of sources is limited, the average mass still increases by a factor of about two when the angular resolution is degraded by a factor of two. We interpret our findings as caused by the underestimated background of unresolved sources observed against the sloping, hill-like backgrounds of the fluctuating molecular clouds. We do not see any sign of convergence of the sizes and masses to their resolution-independent values. Therefore we conclude that isolated prestellar cores, if they exist in cluster-forming molecular clouds, must be significantly less massive and smaller in size than the values obtained in the measurements of the sources extracted at 0.04 pc. As a consequence, the peak of the source mass functions (SMFs) shifts towards lower masses when the angular resolution increases. By contrast, the slope of the high-mass tail of the SMFs remains almost invariant with respect to angular resolution. The near invariance of the high-mass slope of the SMF may be explained by the fact that with varying beams we probe different scales of the same background with the same scale-free properties on all scales. Our systematic study has various implications for studies of star formation. It demonstrates that the implicit assumption that measurements of observed sources give masses of isolated cores is invalid; a clear distinction must be made between sources and objects. In our study, all the sources we probed from 0.6 pc to 0.02 pc seem resolved, with a typical size near 1.5 the beam size, but do not correspond to single and coherent objects. In such configuration, the standard approach determining the sizes of the physical cores by Gaussian beam deconvolution of the measured source sizes cannot apply. Finally, with the resolution dependent CMF peaks, it is impossible to determine a constant efficiency of the mass conversion from prestellar cores to the stars. We propose a convergence test to determine whether an observed region is affected by angular resolution problems. [^1]: See http://hobys-herschel.cea.fr [^2]: We adjusted the mass for a distance of 460 pc, while reported \(\simeq\)`<!-- -->`{=html}3\(\times 10^4\) \(M_\odot\) for a source distant of 260 pc. [^3]: <http://irfu.cea.fr/Pisp/alexander.menshchikov/> [^4]: For brevity, we use the term 'emission', although we mostly discuss surface densities, not intensities. We also use the term 'background' to denote either structureless or filamentary background of sources. [^5]: emphasise the background-related inaccuracies on the basis of the benchmark source extractions with *getsources* and *getsf*. [^6]: *Dendrograms* offers different ways to determine the source flux: either without background subtraction, or subtracting the value at the border of the source (default mode), or extrapolating the source profile down to the zero emission level.
{'timestamp': '2021-07-14T02:08:24', 'yymm': '2107', 'arxiv_id': '2107.05813', 'language': 'en', 'url': 'https://arxiv.org/abs/2107.05813'}
# Introduction The field of boosting has been started from a classic question in learning theory asking whether classifiers that are just slightly better than random guessing can be used to create a classifier with arbitrarily high accuracy when given enough training data. This question was initially asked by Kearns and Valiant and ignited the line of research that eventually lead to the development of AdaBoost , the prototype boosting algorithm to date. AdaBoost carefully combines the predictions of several inaccurate classifiers trained with a focus on different parts of the training data to come up with a voting classifier that performs well everywhere. We quantify the performance of an inaccurate learner by its *advantage* \(\gamma\) over random guessing. Said loosely, a \(\gamma\)*-weak learner* will correctly classify new data points with probability at least \(1/2+\gamma\). In contrast, given \(0< \varepsilon,\delta < 1\) and enough training data a *strong learner* outputs with probability \(1-\delta\) over the choice of the training data and possible random choices of the algorithm a hypothesis that correctly classifies new data points with probability at least \(1-\varepsilon\). The number of samples \(m(\varepsilon,\delta)\) such that the learning algorithm achieves the desired accuracy and confidence levels is called the *sample complexity*. The sample complexity is the key metric for the performance of a strong learner and depends on the weak learner's advantage \(\gamma\), the weak learner's flexibility measured in terms of the VC-dimension, as well as \(\varepsilon\) and \(\delta\). Essentially, a construction with low sample complexity makes the most out of the available training data. AdaBoost  is the classic algorithm for constructing a strong learner from a \(\gamma\)-weak learner. If the weak learner outputs a hypothesis from a base set of hypotheses \(\mathcal{H}\), then AdaBoost constructs a strong learner by taking a weighted majority vote among several hypotheses \(h_1,\dots,h_t\) from \(\mathcal{H}\). Each of these hypotheses is obtained by invoking the \(\gamma\)-weak learning algorithm on differently weighted versions of a set of training samples \(S\). The number of samples required by AdaBoost for strong learning depends both on the advantage \(\gamma\) of the weak learner and the complexity of the hypothesis set \(\mathcal{H}\). If we let \(d\) denote the VC-dimension of \(\mathcal{H}\), i.e. the cardinality of the largest set of data points \(x_1,\dots,x_d\) such that every classification of \(x_1,\dots,x_d\) can be realized by a hypothesis \(h \in \mathcal{H}\), then it is known that AdaBoost is a strong learner, which for error \(\varepsilon\) and failure probability \(\delta\), requires \[\begin{aligned} \label{eq:ada} O\left(\frac{d \ln(1/(\varepsilon \gamma)) \ln(d/(\varepsilon \gamma))}{\varepsilon \gamma^2} + \frac{\ln(1/\delta)}{\varepsilon} \right), \end{aligned}\] samples. This sample complexity is state-of-the-art for producing a strong learner from a \(\gamma\)-weak learner. However, is this the best possible sample complexity? This is the main question we ask and answer in this work. First, we present a new algorithm for constructing a strong learner from a weak learner and prove that it requires only \[\begin{aligned} O\left(\frac{d}{\varepsilon \gamma^2} + \frac{\ln(1/\delta)}{\varepsilon} \right) \end{aligned}\] samples. In addition to improving over AdaBoost by two logarithmic factors, we complement our new algorithm by a lower bound, showing that any algorithm for converting a \(\gamma\)-weak learner to a strong learner requires \[\begin{aligned} \Omega\left(\frac{d}{\varepsilon \gamma^2} + \frac{\ln(1/\delta)}{\varepsilon}\right) \end{aligned}\] samples. Combining these two results, we have a tight bound on the sample complexity of weak to strong learning. In the remainder of the section, we give a more formal introduction to weak and strong learning as well as present our main results and survey previous work. ## Weak and strong learning Consider a binary classification task in which there is an unknown concept \(c: \mathcal{X} \to \{-1,1\}\) assigning labels to a ground set \(\mathcal{X}\). The goal is to learn or approximate \(c\) to high accuracy. Formally, we assume that there is an unknown but fixed data distribution \(\mathcal{D}\) over \(\mathcal{X}\). A learning algorithm then receives a set \(S\) of i.i.d. samples \(x_1,\dots,x_m\) from \(\mathcal{D}\) together with their labels \(c(x_1),\dots,c(x_m)\) and produces a hypothesis \(h\) with \(h \approx c\) based on \(S\) and the labels. To measure how well \(h\) approximates \(c\), it is assumed that a new data point \(x\) is drawn from the same unknown distribution \(\mathcal{D}\), and the goal is to minimize the probability of mispredicting the label of \(x\). We say that a learning algorithm is a weak learner if it satisfies the following: A \(\gamma\)-weak learner thus achieves an advantage of \(\gamma\) over random guessing when given \(m_0\) samples. Note that \(\mathcal{A}\) knows neither the distribution \(\mathcal{D}\), nor the concrete concept \(c \in \mathcal{C}\) but achieves the advantage \(\gamma\) for all \(\mathcal{D}\) and \(c\). In contrast, a strong learner can obtain arbitrarily high accuracy: The definition of a strong learner is essentially identical to the classic notion of \((\varepsilon,\delta)\)-PAC learning in the realizable setting. Unlike the \(\gamma\)-weak learner, we here require the learner to output a classifier with arbitrarily high accuracy (\(\varepsilon\) small) and confidence (\(\delta\) small) when given enough samples \(S\). Kearns and Valiant asked whether one can always obtain a strong learner when given access only to a \(\gamma\)-weak learner for a \(\gamma > 0\). This was answered affirmatively by and is the motivation behind the design of AdaBoost . If we let \(\mathcal{H}\) denote the set of hypotheses that a \(\gamma\)-weak learner may output from, then AdaBoost returns a *voting* classifier \(f(x) = \sign(\sum_{i=1}^t \alpha_i h_i(x))\) where each \(h_i \in \mathcal{H}\) is the output of the \(\gamma\)-weak learner when trained on some carefully weighted version of the training set \(S\) and each \(\alpha_i\) is a real-valued weight. In terms of sample complexity \(m(\varepsilon,\delta)\), AdaBoost can be shown to require the number of samples stated in [\[eq:ada\]](#eq:ada){reference-type="ref" reference="eq:ada"}. There are several ways to prove this. For instance, it can be argued that when given \(m\) samples, AdaBoost combines only \(t = O(\gamma^{-2} \ln m)\) hypotheses \(h_1,\dots,h_t\) from \(\mathcal{H}\) in order to produce an \(f\) that perfectly classifies all the training data \(S\), i.e. \(f(x_i)=c(x_i)\) for all \(x_i \in S\). Using that the class \(\mathcal{H}^t\) can generate at most \(O(\binom{m}{d}^t)\) distinct classifications of \(m\) points (i.e. its growth function is bounded by this), one can intuitively invoke classic generalization bounds for PAC-learning in the realizable case to conclude that the hypothesis \(f\) satisfies \[\begin{aligned} \label{eq:adagen} \mathcal{L}_\mathcal{D}(f) ~\leq~ O\left(\frac{t d \ln(m/d) + \ln(1/\delta)}{m} \right) ~=~ O\left(\frac{d \ln(m/d) \ln m}{\gamma^2 m} + \frac{\ln(1/\delta)}{m}\right) \end{aligned}\] with probability at least \(1-\delta\) over \(S\) (and potentially the randomness of the weak learner). Using \(\mathcal{L}_\mathcal{D}(f) = \varepsilon\) and solving [\[eq:adagen\]](#eq:adagen){reference-type="ref" reference="eq:adagen"} for \(m\) gives the sample complexity stated in [\[eq:ada\]](#eq:ada){reference-type="ref" reference="eq:ada"}. This is the best sample complexity bound of any weak to strong learner prior to this work. Our main upper bound result is a new algorithm with better sample complexity than AdaBoost and other weak to strong learners. It guarantees the following: We remark that it is often required that a strong learner runs in polynomial time given a polynomial-time weak learner. This is indeed the case for our new algorithm. Next, we complement our algorithm from [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"} by the following lower bound: The first statement of [\[thm:lowerintro\]](#thm:lowerintro){reference-type="ref" reference="thm:lowerintro"} says that the concept class \(\mathcal{C}\) can be \(\gamma\)-weakly learned. The second point then states that any learner requires as many samples as our new algorithm. Moreover, the lower bound does not require the algorithm to even use a \(\gamma\)-weak learner, nor does it need to run in polynomial time for the lower bound to apply. Furthermore, the algorithm is even allowed to use the full knowledge of the set \(\mathcal{C}\) and the distribution \(\mathcal{D}\). The only thing it does not know is which concept \(c \in \mathcal{C}\) provides the labels \(c(S)\) to the training samples. In the next section, we present the overall ideas in our new algorithm, as well as a new generalization bound for voting classifiers that is key to our algorithm. Finally, we sketch the main ideas in the lower bound. ## Main ideas and voting classifiers One of the key building blocks in our new algorithm are voting classifiers. To formally introduce voting classifiers, define from a hypothesis set \(\mathcal{H} \subseteq \mathcal{X} \to \{-1,1\}\) the set of all convex combination \(\Delta(\mathcal{H})\) of hypotheses in \(\mathcal{H}\). That is, \(\Delta(\mathcal{H})\) contains all functions \(f\) of the form \(f(x) = \sum_{i=1}^t \alpha_i h_i(x)\) with \(\alpha_i > 0\) and \(\sum_i \alpha_i = 1\). AdaBoost can be thought of as producing a voting classifier \(g(x) =\sign(f(x))\) for an \(f \in \Delta(\mathcal{H})\) by appropriate normalization of the weights it uses. Classic work on understanding the surprisingly high accuracy of AdaBoost introduced the notion of *margins* . For a function \(f \in \Delta(\mathcal{H})\), and a sample \(x\) with label \(y\), the margin of \(f\) on \((x,y)\) is \(yf(x)\). Notice that the margin is positive if and only if \(\sign(f(x))\) correctly predicts the label \(y\) of \(x\). It was empirically observed that AdaBoost produces voting classifiers \(g(x) = \sign(f(x))\) where \(f\) has large margins. This inspired multiple generalization bounds based on the margins of a voting classifier, considering both the minimum and the \(k\)-th margin. The simplest bound when all margins are assumed to be at least \(\gamma\), is Breiman's min margin bound: The resemblance to the generalization performance of AdaBoost in [\[eq:adagen\]](#eq:adagen){reference-type="ref" reference="eq:adagen"} is no coincidence. Indeed, a small twist to AdaBoost, presented in the AdaBoost\(^*_\nu\) algorithm , ensures that the voting classifier produced by AdaBoost\(^*_\nu\) from a \(\gamma\)-weak learner has all margins at least \(\gamma/2\). This gives an alternative way of obtaining the previous best sample complexity in [\[eq:ada\]](#eq:ada){reference-type="ref" reference="eq:ada"}. We remark that more refined generalization bounds based on margins exist, such as the \(k\)-th margin bound by which is known to be near-tight . These bounds take the whole sequence of margins \(c(x_i)f(x_i)\) of all samples \(x_i \in S\) into account, not only the smallest. However, none of these bounds leads to better generalization from a \(\gamma\)-weak learner. We note that the notion of margins has not only been considered in the context of boosting algorithms but also plays a key role in understanding the generalization performance of Support Vector Machines, see e.g. the recent works  giving tight SVM generalization bounds in terms of margins. In our new algorithm, we make use of a voting classifier with good margins as a subroutine. Concretely, we invoke AdaBoost\(^*_\nu\) to obtain margins of at least \(\gamma/2\) on all training samples. At first sight, this seems to incur logarithmic losses, at least if the analysis by Breiman is tight. Moreover, proved a generalization lower bound showing that there are voting classifiers with margins \(\gamma\) on all training samples, but where at least one of the logarithmic factors in the generalization bound must occur. To circumvent this, we first notice that the lower bound only applies when \(m\) is sufficiently larger than \(d \gamma^{-2}\). We carefully exploit this loophole and prove a new generalization bound for voting classifiers: The value \(1/200\) is arbitrary and chosen to match the requirements in the proof of [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"}. Notice how our new generalization bound avoids the logarithmic factors when aiming merely at generalization error \(1/200\). Breiman's bound would only guarantee that \(d \gamma^{-2} \ln(1/\gamma) \ln(d/\gamma)\) samples suffice for such a generalization error. While the focus of previous work on generalization bounds was not on the constant error case, we remark that any obvious approaches to modify the previous proofs could perhaps remove the \(\ln m\) factor but not the \(\ln(m/d)\) factor. The \(\ln(m/d)\) factor turns into \(\Theta(\ln(1/\gamma))\) when solving for \(m\) in \(d \ln(m/d)/(\gamma^{2}m)=1/200\) and is insufficient for our purpose. With the new generalization bound on hand, we can now construct our algorithm for producing a strong learner from a \(\gamma\)-weak learner. Here we use as template the sample optimal algorithm by for PAC learning in the realizable case (which improved over a previous near-tight result by ). Given a training set \(S\), his algorithm carefully constructs a number of sub-samples \(S_1,S_2,\dots,S_k\) of \(S\) and trains a hypothesis \(h_i\) on each \(S_i\) using empirical risk minimization. As the final classifier, he returns the voter \(g(x) = \sign\!\big((1/k)\sum_{i=1}^k h_i(x)\big)\). For our new algorithm, we use Hanneke's approach to construct sub-samples \(S_1,\dots,S_k\) of a training set \(S\). We then run AdaBoost\(^*_\nu\) on each \(S_i\) to produce a voting classifier \(g_i(x) = \sign(f_i(x))\) for an \(f_i \in \Delta(\mathcal{H})\) with margins \(\gamma/2\) on all samples in \(S_i\). We finally return the voter \(h(x) = \sign((1/k)\sum_{i=1}^k g_i(x))\). Our algorithm thus returns a majority of majorities. To prove that our algorithm achieves the desired sample complexity \(m(\varepsilon,\delta)\) claimed in [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"}, we then revisit Hanneke's proof and show that it suffices for his argument that the base learning algorithm (in his case empirical risk minimization, in our case AdaBoost\(^*_\nu\)) achieves an error of at most \(1/200\) when given \(\tau\) samples. If this is the case, then his proof can be modified to show that the final error of the output voter drops to \(O(\tau/m)\). Plugging in the \(\tau = \alpha(d\gamma^{-2} + \ln(1/\delta))\) from our new generalization bound in [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"} completes the proof. Let us remark that a lower bound by shows the existence of a voting classifier with simultaneously large margins and a generalization error with an additional log-factor. It is thus conceivable that a simple majority vote is not sufficient and a majority of majorities is indeed necessary, although the lower bound only guarantees the *existence* of a 'bad' voter with good margins and not that *all* such voters are 'bad'. In the following, we start by proving our new generalization bound ([\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"}) in [2](#sec:constantgen){reference-type="ref" reference="sec:constantgen"}. We then proceed in [3](#sec:hanneke){reference-type="ref" reference="sec:hanneke"} to present our new algorithm and show that it gives the guarantees in [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"}. Finally, in [4](#sec:lowerBound){reference-type="ref" reference="sec:lowerBound"} we give the proof of the lower bound in [\[thm:lowerintro\]](#thm:lowerintro){reference-type="ref" reference="thm:lowerintro"}. # New margin-based generalization bounds for voting classifiers {#sec:constantgen} In this section, we prove the new generalization bound stated in [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"}. For ease of notation, we write that \(\mathcal{D}\) is a distribution over \(\mathcal{X} \times \{-1,1\}\) (and not just a distribution over \(\mathcal{X}\)) and implicitly assume that the label of each \(x \in \mathcal{X}\) is \(c(x)\) for the unknown concept \(c\). Moreover, for a voting classifier \(g(x) = \sign(f(x))\) with \(f \in \Delta(\mathcal{H})\), we simply refer to \(f\) as the voting classifier and just remark that one needs to take the sign to make a prediction. Finally, we think of the sample \(S\) as a set of pairs \((x_i,y_i)\) with \(x_i \in \mathcal{X}\) and \(y_i = c(x_i) \in \{-1,1\}\). The key step in the proof of [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"} is to analyze the generalization performance for a voting classifier obtained by combining randomly drawn hypotheses among the hypotheses \(h_1,\dots,h_t\) making up a voting classifier \(f = \sum_i \alpha_i h_i\) from \(\Delta(\mathcal{H})\). We then relate that to the generalization performance of \(f\) itself. Formally, we define a distribution \(\mathcal{D}_{f\!,t}\) for every \(f\) and look at a random hypothesis from \(\mathcal{D}_{f\!,t}\). We start by defining this distribution. Let \(f(x) = \sum_h \alpha_h h(x) \in \Delta(\mathcal{H})\) be a voting classifier. Let \(\mathcal{D}_f\) be the distribution over \(\mathcal{H}\) (the base hypotheses used in \(f\)) where \(h\) has probability \(\alpha_h\). Consider drawing \(t\) i.i.d. hypotheses \(h'_1,\dots,h'_t\) from \(\mathcal{D}_f\) and then throwing away each \(h'_i\) independently with probability \(1/2\). Let \(t'\) be the number of remaining hypotheses, denote them \(h_1,\dots,h_{t'}\), and let \(g = \frac{1}{t'}\sum_{i=1}^{t'} h_i\). One can think of \(g\) as a sub-sampled version of \(f\) with replacement. Denote by \(\mathcal{D}_{f\!,t}\) the distribution over \(g\). #### Key properties of \(\bm{\mathcal{D}_{\!f\!,\,t}}\). In the following, we analyze how a random \(g\) from \(\mathcal{D}_{f\!,t}\) behaves and show that while it behaves similar to \(f\) it produces with good probability predictions that are big in absolute value (even if \(f(x)\approx 0\)). First, we note that predictions made by a random \(g\) are often close to those made by \(f\). The proof uses a standard concentration bound and is given in supplementary material. Next, \(g\) rarely makes predictions \(g(x)\) that are small in absolute value: [\[lem:smallunlikely\]](#lem:smallunlikely){reference-type="ref" reference="lem:smallunlikely"} states that even if \(f(x) \approx 0\) for an unseen sample, \(g(x)\) will still be large with good probability. Thus we can think of \(g\) as having large margins (perhaps negative) also on unseen data. This is crucial for bounding the generalization error. The proof follows from an invocation of Erdős' improved Littlewood-Offord lemma . As the last property, we look at the out-of-sample and in-sample error of a random \(g\) and start with relating the generalization error of \(f\) to that of a random \(g\). To formalize this, define for any distribution \(\mathcal{D}\), the loss \(\mathcal{L}^t_\mathcal{D}(f) := \Pr_{{(x,y) \sim \mathcal{D}, \,g\sim \mathcal{D}_{f\!,t}}}\big[yg(x) \leq 0\big]\) and when writing \(\mathcal{L}^t_S(f)\) we implicitly assume \(S\) to also denote the uniform distribution over all \((x,y)\in S\). We then have the following lemma which is proven in the supplementary material: Moreover, if \(f\) has margins \(\gamma\) on all training samples \((x,y) \in S\), then \(g\) is correct on most of \(S\) provided that we set \(t\) big enough: The last ingredient for the proof of [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"} is to relate \(\mathcal{L}_S^t(f)\) and \(\mathcal{L}_\mathcal{D}^t(f)\). For the proof we use [\[lem:smallunlikely\]](#lem:smallunlikely){reference-type="ref" reference="lem:smallunlikely"} to infer that with good probability \(\abs{g(x)} = \Omega(\gamma)\), i.e. has large absolute value. We use this to argue that \(\sign(g)\) often belongs to a class with small VC-dimension and then apply a growth-function argument to relate \(\mathcal{L}_S^t(f)\) and \(\mathcal{L}_\mathcal{D}^t(f)\). Formally, we prove the following lemma. Before we prove [\[lem:supf\]](#lem:supf){reference-type="ref" reference="lem:supf"}, we show how to use it to prove [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"}. Since we are only aiming to prove the generalization of voting classifiers \(f\) with \(yf(x) \geq \gamma\) for all samples \((x,y) \in S\), [\[lem:ginsample\]](#lem:ginsample){reference-type="ref" reference="lem:ginsample"} tells us that such \(f\) have small \(\mathcal{L}_S^t(f)\) when \(t \geq 1024 \gamma^{-2}.\) We thus fix \(t = 1024 \gamma^{-2}\) and get that \(\mathcal{L}_S^t(f) \leq 1/1200\) from [\[lem:ginsample\]](#lem:ginsample){reference-type="ref" reference="lem:ginsample"}. By [\[lem:supf\]](#lem:supf){reference-type="ref" reference="lem:supf"}, with probability at least \(1-\alpha\exp(-m/\alpha)\) over the sample \(S\), we have for all \(f \in \Delta(\mathcal{H})\) that \(|\mathcal{L}^t_S(f)-\mathcal{L}^t_\mathcal{D}(f)| \leq 1/1200\) and thus \(\mathcal{L}^t_\mathcal{D}(f) \leq 1/600\). Finally, [\[lem:similarerror\]](#lem:similarerror){reference-type="ref" reference="lem:similarerror"} gives us that \(\mathcal{L}_\mathcal{D}(f) \leq 3 \mathcal{L}^t_\mathcal{D}(f)\) for all \(f \in \Delta(\mathcal{H})\). Together we thus have \(\mathcal{L}_\mathcal{D}^t(f) \leq 1/600 \Rightarrow \mathcal{L}_\mathcal{D}(f) \leq 1/200\) for any \(m \geq \alpha td \geq \alpha'd\gamma^{-2}\) where \(\alpha'>0\) is a universal constant. By observing that \(\alpha\exp(-m/\alpha) < \delta\) for \(m \geq \alpha\ln(\alpha/\delta)\), this completes the proof of [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"}. What remains is thus to prove [\[lem:supf\]](#lem:supf){reference-type="ref" reference="lem:supf"} which we do in the remainder of this section. ## Relating \(\bm{\mathcal{L}_S^t \big(f\big)}\) and \(\bm{\mathcal{L}_\mathcal{D}^t\big(f\big)}\) The last remaining step to show [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"} is thus to relate \(\mathcal{L}_S^t(f)\) to \(\mathcal{L}_\mathcal{D}^t(f)\), i.e. to prove [\[lem:supf\]](#lem:supf){reference-type="ref" reference="lem:supf"}. In the proof, we rely on the classic approach for showing generalization for classes \(\mathcal{H}\) of bounded VC-dimension and introduce a *ghost* set that only exists for the sake of analysis. In addition to the sample \(S\), we thus consider a *ghost* set \(S'\) of another \(m\) i.i.d. samples from \(\mathcal{D}\). This allows us to prove: As the proof is standard, it can be found in the supplementary material. We thus only need to bound \(\Pr_{S,S'}[\sup_{f \in \Delta(\mathcal{H})} |\mathcal{L}^t_S(f)-\mathcal{L}^t_{S'}(f)| > 1/2400]\). To do this, consider drawing a data set \(P\) of \(2m\) i.i.d. samples from \(\mathcal{D}\) and then drawing \(S\) as a set of \(m\) uniform samples from \(P\) without replacement and letting \(S'\) be the remaining samples. Then \(S\) and \(S'\) have the same distribution as if they were drawn as two independent sets of \(m\) i.i.d. samples each. From here on, we thus think of \(S\) and \(S'\) as being sampled via \(P\). Now consider a fixed set \(P\) in the support of \(\mathcal{D}^{2m}\) and define \(\Delta^\mu_\delta(\mathcal{H},P)\) as the set of voting classifiers \(f \in \Delta(\mathcal{H})\) for which \(\Pr_{(x,y) \sim P}[|f(x)| \geq \mu] \geq 1-\delta\). These are the voting classifiers that make predictions of large absolute value on most of *both* \(S\) and \(S'\) (if \(\delta \ll 1/2\)). The crucial point, and the whole reason for introducing \(g\), is that regardless of what \(f\) is, a random \(g \sim \mathcal{D}_{f\!,t}\) often lies in the set \(\Delta^\mu_\delta(\mathcal{H},P)\): If we had just considered \(f\), we had no way of arguing that \(f\) makes predictions of large absolute value on \(S'\), since the only promise we are given is that it does so on \(S\). That \(g\) makes predictions of large absolute value even outside of \(S\) is crucial for bounding the generalization error in the following. Let us now define \(\hat{\Delta}_\delta^\mu(P) = \sign\big(\Delta_\delta^\mu(\mathcal{H},P)\big)\) which means that \(\hat{\Delta}_\delta^\mu(P)\) contains all the hypotheses that are obtained by voting classifiers in \(\Delta_{\delta}^\mu(\mathcal{H},P)\) when taking the sign. Since \(g\) is in \(\Delta_{\delta}^\mu(\mathcal{H},P)\) except with probability \(1/4800\) by [\[lem:inc\]](#lem:inc){reference-type="ref" reference="lem:inc"}, we can prove: Again, the proof of the lemma can be found in the supplementary material. What [\[lem:relategrowth\]](#lem:relategrowth){reference-type="ref" reference="lem:relategrowth"} gives us, is that it relates the generalization error to the growth function \(|\hat{\Delta}_\delta^\mu(P)|\). The key point is that \(\hat{\Delta}_\delta^\mu(P)\) was obtained from voting classifiers with predictions of large absolute value on all but a \(\delta\) fraction of points in \(P\). This implies that we can bound the VC-dimension of \(\hat{\Delta}_\delta^\mu(P)\) when restricted to the point set \(P\) using Rademacher complexity: We remark that it was crucial to introduce the random hypothesis \(g\), since all we are promised about the original hypothesis \(f\) is that it has large margins on \(S\), i.e. on only half the points in \(P\). That case would correspond to \(\delta = 1/2\) in [\[lem:vc\]](#lem:vc){reference-type="ref" reference="lem:vc"} and would mean that we could potentially shatter all of \(P\). In order for the bound to be useful, we thus need \(\delta \ll 1/2\) and thus large margins on much more than half of \(P\) (which we get by using \(g\)). For a \(0 < \delta < 1\) to be determined, let us now fix \(\mu = \delta/(9600 \sqrt{t})\) and assume that the number of samples \(m\) satisfies \(m \geq \max\{ \alpha^2 \mu^{-2} d/\delta,~2400^2\}\) where \(\alpha\) is the constant from [\[lem:vc\]](#lem:vc){reference-type="ref" reference="lem:vc"}. By [\[lem:relategrowth\]](#lem:relategrowth){reference-type="ref" reference="lem:relategrowth"}, we have \[\Pr_{S,S'}\Big[\sup_{f \in \Delta(\mathcal{H})} |\mathcal{L}^t_S(f)-\mathcal{L}^t_{S'}(f)| > \tfrac{1}{2400}\Big] ~\leq~ \sup_P 2 |\hat{\Delta}_\delta^\mu(P)|\, \exp(-2m/9600^2).\] [\[lem:vc\]](#lem:vc){reference-type="ref" reference="lem:vc"} gives us that the largest subset \(P' \subseteq P\) that \(\hat{\Delta}_\delta^\mu(P)\) shatters has size at most \(d' < \max\{2\delta |P|,\, 4\alpha^2 \mu^{-2}d\}\). By our assumption on \(m\), the term \(2 \delta |P| = 4 \delta m\) is at least \(4c^2 \mu^{-2} d\) and thus \(2\delta |P| = 4\delta m\) takes the maximum in the bound on \(d'\). By the Sauer-Shelah lemma, we have that \(|\hat{\Delta}_\delta^\mu(P)| \leq \sum_{i=0}^{4 \delta m-1} \binom{2m}{i}\). For \(\delta \leq 1/4\), this is at most \(\binom{2m}{4 \delta m} \leq (e \delta^{-1}/2)^{4 \delta m} = \exp \brackets{4 \delta m \ln(e\delta^{-1}/2)}\). As conclusion we have: \[\Pr_{S,S'}\Big[\sup_{f \in \Delta(\mathcal{H})} |\mathcal{L}^t_S(f)-\mathcal{L}^t_{S'}(f)| > \tfrac{1}{2400}\Big] ~\leq~ 2 \exp ({4 \delta m \ln(e\delta^{-1}/2)})\exp(-2m/9600^2).\] Let us now fix \(\delta = 10^{-10}\). We then have \[\begin{aligned} &2 \exp\big({4 \delta m \ln(e\delta^{-1}/2)}\big)\exp(-2m/9600^2) \\ ~=~ &2 \exp\big({m(4 \delta \ln(e \delta^{-1}/2)-2/9600^2)}\big) \\ ~\leq~ &2 \exp\big({-m/10^{8}}\big) \end{aligned}\] where the last step is a numerical calculation. By [\[lem:ghost\]](#lem:ghost){reference-type="ref" reference="lem:ghost"}, this in turn implies: \[\Pr_S\Big[\sup_{f \in \Delta(\mathcal{H})} \big|\mathcal{L}^t_S(f)- \mathcal{L}^t_\mathcal{D}(f)\big| > \tfrac{1}{1200}\Big] ~\leq~ 4 \exp(-m/ 10^{8}).\] Since we only required \(m \geq \max\{ \alpha^2 \mu^{-2} d/\delta,2400^2\}\) and we had \(\mu = \delta/(9600 \sqrt{t})\), this is satisfied for \(m \geq \alpha't d\) for a large enough constant \(\alpha'>0\). This completes the proof of [\[lem:supf\]](#lem:supf){reference-type="ref" reference="lem:supf"} and thus also finishes the proof of [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"}. # Weak to strong learning {#sec:hanneke} [\[sec:hannekeFull\]]{#sec:hannekeFull label="sec:hannekeFull"} In this section, we give our algorithm for obtaining a strong learner from a \(\gamma\)-weak learner with optimal sample complexity and prove that it achieves the announced sample complexity. The following theorem is essentially a restatement of [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"} from the introduction. Optimality then follows by combining the theorem with the lower bound that we prove in [\[sec:lowerBoundFull\]](#sec:lowerBoundFull){reference-type="ref" reference="sec:lowerBoundFull"}. [\[thm:finalintro\]](#thm:finalintro){reference-type="ref" reference="thm:finalintro"} follows by setting \(\varepsilon = \mathcal{L}_\mathcal{D}(h_S)\) and solving for \(m\) and letting the label in the distribution \(\mathcal{D}\) be \(c(x)\) for every \(x \in \mathcal{X}\). The algorithm obtaining those guarantees is as follows: Let \(\mathcal{A}^*_{\nu}\) be an algorithm that on a sample \(S\) outputs a classifier \(g = \sign(f)\), where \(f\) is a voting classifier with margins at least \(\gamma/2\) on all samples in \(S\) such as AdaBoost\(_\nu^*\). Given a set \(S\) of \(m\) i.i.d. samples from an unknown distribution \(\mathcal{D}\), we run \(\mathcal{A}^*_{\nu}\) on a number of samples \(C_1,C_2,\ldots,C_k \subset S\) obtaining hypotheses \(h_1,h_2,\dots,h_k\). We then return the (unweighted) majority vote among \(h_1,\dots,h_k\) as our final hypothesis \(h^*\). The subsets \(C_i\) are chosen by the algorithm *Sub-Sample* (shown in [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"}) as in the optimal PAC learning algorithm by. The final algorithm ([\[alg:final\]](#alg:final){reference-type="ref" reference="alg:final"}) calls \(\mathcal{A}^*_{\nu}\) on all subsets returned by [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"} and returns the majority vote. Note that the final hypothesis returned by [\[alg:final\]](#alg:final){reference-type="ref" reference="alg:final"} is a majority of majorities since \(\mathcal{A}^*_{\nu}\) already returns a voting classifier. In the remainder of the section, we prove that [\[alg:final\]](#alg:final){reference-type="ref" reference="alg:final"} has the guarantees of [\[thm:finalSupplement\]](#thm:finalSupplement){reference-type="ref" reference="thm:finalSupplement"}. The proof follows that of pretty much uneventfully, although carefully using that a generalization error of \(1/200\) suffices for each call of \(\mathcal{A}^*_{\nu}\). The key observation is that each of the recursively generated sub-samples in [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"} leaves out a subset \(A_i\) of the training data, whereas the two other recursive calls always include all of \(A_i\) in their sub-samples. If one considers a hypothesis \(h\) trained on the data leaving out \(A_i\), then \(A_i\) serves as an independent sample from \(\mathcal{D}\). This implies that if \(h\) has large error probability over \(\mathcal{D}\), then many of the samples in \(A_i\) will be classified incorrectly by \(h\). Now, since the two other recursive calls always include \(A_i\), any hypothesis \(h'\) trained on a sub-sample from those calls will have margin at least \(\gamma/2\) on all points misclassified by \(h\) in \(A_i\). But the generalization bound in [\[thm:lowerintro\]](#thm:lowerintro){reference-type="ref" reference="thm:lowerintro"} then implies that \(h'\) makes a mistake only with probability \(1/200\) on *the conditional distribution* \(\mathcal{D}(\, \cdot \mid h \textrm{ errs})\). Thus, the probability that they both err at the same time is at most the probability that \(h\) errs, times \(1/200\). Applying this reasoning inductively gives the conclusion that it is very unlikely that the majority of all trained hypotheses err at the same time which then finishes the proof. ## Proof of Optimal Strong Learning For simplicity, we assume \(m\) is a power of \(4\). This can easily be ensured by rounding \(m\) down to the nearest power of \(4\) and ignoring all excess samples. This only affects the generalization bound by a constant factor. With \(m\) being a power of \(4\) we can observe from [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"} that the cardinalities of all recursively generated sets \(A_0\) (which are the input to the next level of the recursion) are also powers of \(4\). Hence we can ignore all roundings. Let \(\mathcal{C} \subseteq \mathcal{X} \to \{-1,1\}\) be a concept class and assume there is a \(\gamma\)-weak learner for \(\mathcal{C}\) using hypothesis set \(\mathcal{H}\) of VC-dimension \(d\). Let \(\mathcal{A}^*_{\nu}\) be an algorithm that on a sample \(S\) consistent with a concept \(c \in \mathcal{C}\), computes a voting classifier \(f \in \Delta(\mathcal{H})\) with \(yf(x) \geq \gamma/2\) for all \((x,y) \in S\) and returns as its output hypothesis \(g(x) = \sign(f(x))\). We could e.g. let \(\mathcal{A}^*_{\nu}\) be AdaBoost\(_\nu^*\). For a sample \(S\), we use the notation \(\mathcal{M}_{\gamma}(S)\) to denote the set of hypotheses \(g(x) = \sign(f(x))\) for an \(f \in \Delta(\mathcal{H})\) satisfying \(yf(x) \geq \gamma\) for all \((x,y) \in S\). The set \(\mathcal{M}_{\gamma}(S)\) is thus the set of all voting classifiers obtained by taking the sign of a voter that has margins at least \(\gamma\) on all samples in \(S\). By definition, the output hypothesis \(g\) of \(\mathcal{A}^*_{\nu}\) on a set of samples \(S\) always lies in \(\mathcal{M}_{\gamma/2}(S)\). Let \(c \in \mathcal{C}\) be an unknown concept in \(\mathcal{C}\) and let \(\mathcal{D}\) be an arbitrary distribution over \(\mathcal{X}\). Let \(S = \{(x_i,c(x_i))\}_{i=1}^m \in (\mathcal{X} \times \{-1,1\})^m\) be a set of \(m\) samples with each \(x_i\) an i.i.d. sample from \(\mathcal{D}\). Let \(S_{1:k}\) denote the first \(k\) samples of \(S\). Let \(c'\geq 4\) be a constant to be determined later. We will prove by induction that for every \(m' \in \mathbb{N}\) that is a power of \(4\), for every \(\delta' \in (0,1)\), and every finite sequence \(B'\) of samples in \(\mathcal{X} \times \{-1,1\}\) with \(y_i = c(x_i)\) for each \((x_i,y_i) \in B'\), with probability at least \(1-\delta'\), the classifier \[\begin{aligned} &\hat{h}_{m',B'} \,=\, \sign\left(\sum_{C_i \in \textit{ Sub-Sample}(S_{1:m'},B')} \!\mathcal{A}^*_{\nu}(C_i)\right) \intertext{satisfies} &\mathcal{L}_\mathcal{D}(\hat{h}_{m',B'}) ~\leq~ \frac{c'}{m'}\left(d\gamma^{-2} + \ln(1/\delta')\right).\addtocounter{equation}{1}\tag{\theequation}{} \label{eq:induc} \end{aligned}\] The conclusion of [\[thm:finalSupplement\]](#thm:finalSupplement){reference-type="ref" reference="thm:finalSupplement"} follows by letting \(B'=\emptyset\) and \(m'=m\) (and recalling that we assume \(m\) is a power of \(4\)). Thus what remains is to give the inductive proof. As the base case, consider any \(m' \in \mathbb{N}\) with \(m' \leq c'\) and \(m'\) a power of \(4\). In this case, the bound \(c'(d \gamma^{-2} + \ln(1/\delta'))/m'\) is at least \(d \gamma^{-2} \geq 1\) and \(\mathcal{L}_\mathcal{D}(\hat{h}_{m',B'}) \leq 1\) obviously holds. For the inductive step, take as inductive hypothesis that, for some \(m \in \mathbb{N}\) with \(m > c'\) and \(m\) a power of \(4\), it holds for all \(m' \in \mathbb{N}\) with \(m' < m\) and \(m'\) a power of \(4\), that for every \(\delta' \in (0,1)\) and every finite sequence \(B'\) of samples in \(\mathcal{X} \times \{-1,1\}\) with \(y_i = c(x_i)\) for each \((x_i,y_i) \in B'\), with probability at least \(1-\delta'\), [\[eq:induc\]](#eq:induc){reference-type="ref" reference="eq:induc"} holds. We need to prove that the inductive hypothesis also holds for \(m'=m\). Fix a \(\delta \in (0,1)\) and any finite sequence \(B\) of points in \(\mathcal{X} \times \{-1,1\}\) with \(y_i = c(x_i)\) for each \((x_i,y_i)\) in \(B\). Since \(m > c' \geq 4\) we have that *Sub-Sample*\((S_{1:m},B)\) returns in Step 5 of [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"}. Let \(A_0,A_1,A_2,A_3\) be as defined in Step 4 of [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"}. Also define \(B_1 = A_2 \cup A_3 \cup B,\) \(B_2 = A_1 \cup A_3 \cup B,~ B_3 = A_1 \cup A_2 \cup B\), and for each \(i \in \{1,2,3\}\), denote \[h_i \,=\, \sign\left( \sum_{C_i \in \textit{ Sub-Sample}(A_0,B_i)} \!\mathcal{A}^*_{\nu}(C_i)\right).\] Note that the \(h_i\)'s correspond to the majority vote classifiers trained on the sub-samples of the three recursive calls in [\[alg:subsample\]](#alg:subsample){reference-type="ref" reference="alg:subsample"}. Moreover, notice that \(h_i = \hat{h}_{m/4, B_i}\). Therefore, the inductive hypothesis may be used on \(h_1,h_2,h_3\) to conclude that for each \(i \in \{1,2,3\}\), there is an event \(E_i\) of probability at least \(1-\delta/9\), on which \[\begin{aligned} \mathcal{L}_\mathcal{D}(h_i) ~\leq~ \frac{c'}{|A_0|}\left(d\gamma^{-2} + \ln(9/\delta)\right) \leq \frac{4c'}{m}\left(d\gamma^{-2} + \ln(1/\delta) + 3\right) \leq \frac{12c'}{m}\left(d\gamma^{-2} + \ln(1/\delta)\right). \label{eq:subi} \end{aligned}\] Here we chose the probability \(1-\delta/9\) in order to perform a union bound in the end of the induction step which is possible since the inductive hypothesis holds for every \(\delta'\). Next, define \(\Err(h_i)\) as the set of points \(x \in \mathcal{X}\) for which \(h_i(x) \neq c(x)\). Now fix an \(i \in \{1,2,3\}\) and denote by \(\{(Z_{i,1},c(Z_{i,1})), \dots, (Z_{i,N_i}, c(Z_{i,N_i})\} = A_i \cap (\Err(h_i) \times \{-1,1\})\), where \(N_i = |A_i \cap (\Err(h_i) \times \{-1,1\})|\). Said in words, the set \(\{(Z_{i,j},c(Z_{i,j})\}_{j=1}^{N_i}\) is the subset of samples in \(A_i\) on which \(h_i\) makes a mistake. Notice that \(h_i\) is not trained on any samples from \(A_i\) (\(B_i\) excludes \(A_i\)), hence \(h_i\) and \(A_i\) are independent. Therefore, given \(h_i\) and \(N_i\), the samples \(Z_{i,1},\dots,Z_{i,N_i}\) are conditionally independent samples with distribution \(\mathcal{D}(\cdot \mid \Err(h_i))\) (provided \(N_i > 0\)). From Theorem 6 in the main paper, we get that there is an event \(E_i'\) of probability at least \(1-\delta/9\), such that if \(N_i \geq c''\big(d\gamma^{-2} + \ln(1/\delta)\big)\), then every \(h \in \mathcal{M}_{\gamma/2}\big(\big\{(Z_{i,j},c(Z_{i,j}))\big\}_{j=1}^{N_i}\big)\) satisfies \[\mathcal{L}_{\mathcal{D}(\cdot \mid \Err(h_i))}(h) ~\leq~ \tfrac{1}{200}.\] Note that this is a key step where our proof differs from Hanneke's original proof since we exploit that a bound of \(\tfrac{1}{200}\) on the generalization error suffices for the rest of the proof. We continue by observing that for each \(j \in \{1,2,3\} \setminus \{i\}\), the set \(B_j\) contains \(A_i\) and this remains the case in all recursive calls of *Sub-Sample*(\(A_0,B_i\)). Thus for \(\{C_1,\dots,C_k\} = \textit{Sub-Sample}( A_0,B_j)\), it holds for all \(C_k\) that \(\mathcal{A}^*_{\nu}(C_k) \in \mathcal{M}_{\gamma/2}(B_j) \Rightarrow \mathcal{A}^*_{\nu}(C_k) \in \mathcal{M}_{\gamma/2}(A_0) \Rightarrow \mathcal{A}^*_{\nu}(C_k) \in \mathcal{M}_{\gamma/2}\big(\{(Z_{i,j},c(Z_{i,j}))\}_{j=1}^{N_i}\big)\). Thus on the event \(E_i'\), if \(N_i > c''\big(d\gamma^{-2} + \ln(1/\delta)\big)\), then it holds for all \(j \in \{1,2,3\}\setminus \{i\}\) and all \(C_k \in \textit{Sub-Sample}(A_0,B_j)\), that the hypothesis \(h = \mathcal{A}^*_{\nu}(C_k)\) satisfies \[\begin{aligned} \Pr_{x \sim \mathcal{D}}\big[h_i(x) \neq c(x) \land h(x) \neq c(x)\big] ~=~ &\mathcal{L}_\mathcal{D}(h_i) \cdot \mathcal{L}_{\mathcal{D}(\cdot \mid \Err(h_i))}(h) \\ \leq~ &\tfrac{1}{200} \mathcal{L}_\mathcal{D}(h_i). \end{aligned}\] Assume now that \(\mathcal{L}_\mathcal{D}(h_i) \geq \big((10/7)c''(d\gamma^{-2} + \ln(1/\delta)) + 23\ln(9/\delta)\big)/(m/4) \geq 23\ln(9/\delta)/|A_i|\). Using that \(h_i\) and \(A_i\) are independent, it follows by a Chernoff bound that \[\begin{aligned} \Pr\big[N_i \geq (7/10) \mathcal{L}_\mathcal{D}(h_i)|A_i|\big] ~\geq~ &1-\exp\big({-}(3/10)^2 \mathcal{L}_\mathcal{D}(h_i)|A_i|/2\big) \\ \geq~ &1-\exp\big({-}(3/10)^2 \cdot 23 \ln(9/\delta)/2\big) \\ >~ &1-\delta/9. \end{aligned}\] Thus there is an event \(E''_i\) of probability at least \(1-\delta/9\), on which, if \(\mathcal{L}_\mathcal{D}(h_i) \geq \big((10/7)c''(d\gamma^{-2} + \ln(1/\delta)) + 23\ln(9/\delta)\big)/(m/4)\) then \[N_i \geq \tfrac{7}{10}\mathcal{L}_\mathcal{D}(h_i)|A_i| ~=~ \tfrac{7}{10}\mathcal{L}_\mathcal{D}(h_i)\cdot m/4 ~\geq~ c''(d\gamma^{-2} + \ln(1/\delta)).\] Combining it all, we have that on the event \(E_i \cap E'_i \cap E''_i\), which occurs with probability at least \(1-\delta/3\), if \(\mathcal{L}_\mathcal{D}(h_i) \geq \big((10/7)c''(d\gamma^{-2} + \ln(1/\delta)) + 23\ln(9/\delta)\big)/(m/4)\), then every \(h = \mathcal{A}^*_{\nu}(C_k)\) for a \(C_k \in \textit{Sub-Sample}(A_0,B_j)\) with \(j \neq i\) has: \[\begin{aligned} \Pr_{x \sim \mathcal{D}}\big[h_i(x) \neq c(x) \wedge h(x) \neq c(x)\big] ~&\leq~ \tfrac{1}{200} \mathcal{L}_\mathcal{D}(h_i)\\ \intertext{By \cref{eq:subi}, this is at most} \Pr_{x \sim \mathcal{D}}\big[h_i(x) \neq c(x) \wedge h(x) \neq c(x)\big] ~&\leq~ \frac{1}{200}\cdot\frac{12c'}{m} \left(d \gamma^{-2} + \ln(1/\delta)\right) \\ &\leq~ \frac{c'}{16m} \left(d \gamma^{-2} + \ln(1/\delta)\right). \intertext{On the other hand, if \(\mathcal{L}_\mathcal{D}(h_i) < \big(c''(d\gamma^{-2} + \ln(1/\delta)) + 23\ln(9/\delta)\big)/(m/4)\), then } \Pr_{x \sim \mathcal{D}}\big[h_i(x) \neq c(x) \wedge h(x) \neq c(x)\big] ~&\leq~ \mathcal{L}_\mathcal{D}(h_i) \\ &\leq~ \big(c''(d\gamma^{-2} + \ln(1/\delta)) + 23\ln(9/\delta)\big)/(m/4) \\ &\leq~ 4c''(d \gamma^{-2} + 24\ln(1/\delta) + 23\ln 9)/m \end{aligned}\] Using that \(23\cdot \ln 9 < 51 \leq 51 d \gamma^{-2}\), the above is at most \(204c''(d \gamma^{-2} + \ln(1/\delta))/m\). Fixing the constant \(c'\) to \(c' \geq (16 \cdot 204)c''\), this is at most \[\begin{aligned} \frac{c'}{16m} \left(d \gamma^{-2} + \ln(1/\delta)\right). \end{aligned}\] We conclude that on the event \(\bigcap_{i=1,2,3} \{E_i \cap E'_i \cap E''_i\}\), which occurs with probability at least \(1-\delta\) by a union bound, it holds for all \(i\) and all \(C_k \in \text{Sub-Sample}(A_0,B_j)\) with \(j \neq i\) that the hypothesis \(h = \mathcal{A}^*_{\nu}(C_k)\) satisfies: \[\begin{aligned} \Pr_{x \sim \mathcal{D}}\big[h_i(x) \neq c(x) \wedge h(x) \neq c(x)\big] ~&\leq~ \frac{c'}{16m} \left(d \gamma^{-2} + \ln(1/\delta)\right). \end{aligned}\] Now consider an \(x\) on which \(\hat{h}_{m,B}\) errs. On such an \(x\), the majority among the classifiers \[\begin{aligned} \bigcup_{C_i \in \textit{ Sub-Sample}(S_{1:m},B)} \big\{\mathcal{A}^*_{\nu}(C_i)\big\} ~=~ \bigcup_{i =1,2,3} ~\bigcup_{C_k \in \textit{ Sub-Sample}(S_{1:m/4},B_i)} \big\{\mathcal{A}^*_{\nu}(C_k)\big\}. \end{aligned}\] errs. For the majority to err, there must be an \(i \in \{1,2,3\}\) for which the majority of \[\begin{aligned} \bigcup_{C_k \in \textit{ Sub-Sample}(S_{1:m/4},B_i)} \big\{\mathcal{A}^*_{\nu}(C_k)\big\}. \end{aligned}\] errs. This is equivalent to \(h_i(x) \neq c(x)\). Furthermore, even when all of the classifiers in \[\begin{aligned} \bigcup_{C_k \in \textit{ Sub-Sample}(S_{1:m/4},B_i)} \big\{\mathcal{A}^*_{\nu}(C_k)\big\}. \end{aligned}\] err, there still must be another \((1/6)\)-fraction of all the classifiers \[\begin{aligned} \bigcup_{i =1,2,3} ~\bigcup_{C_k \in \textit{ Sub-Sample}(S_{1:m/4},B_i)} \big\{\mathcal{A}^*_{\nu}(C_k)\big\}. \end{aligned}\] that err. This follows since each of the three recursive calls in *Sub-Sample* generated equally many classifiers/samples. It follows that if we pick a uniform random \(i \in \{1,2,3\}\) and a uniform random hypothesis \(h\) in \[\begin{aligned} \bigcup_{j \in \{1,2,3\} \setminus \{i\}} ~\bigcup_{C_k \in \textit{ Sub-Sample}(S_{1:m/4},B_j)} \{\mathcal{A}^*_{\nu}(C_k)\}. \end{aligned}\] then with probability at least \((1/3)(1/6)(3/2) = 1/12\), we have that \(h_i(x) \neq c(x) \wedge h(x) \neq c(x)\). It follows by linearity of expectation that on the event \(\bigcap_{i=1,2,3} \{E_i \cap E'_i \cap E''_i\}\), we have: \[\begin{aligned} \mathcal{L}_\mathcal{D}(\hat{h}_{m,B}) ~\leq~ 12 \cdot \frac{c'}{16m}\left(d \gamma^{-2} + \ln(1/\delta)\right) ~<~ \frac{c'}{m}\left(d \gamma^{-2} + \ln(1/\delta)\right). \end{aligned}\] This completes the inductive proof and shows [\[thm:finalSupplement\]](#thm:finalSupplement){reference-type="ref" reference="thm:finalSupplement"}. In total there are \(k = 3^{\lceil\log_4(m)\!\rceil} \approx m^{0.79}\) calls to the weak learner, each with a sub-sample of linear size. Since AdaBoost\(_\nu^*\) runs in polynomial time on its input, given that the weak learner is polynomial, [\[alg:final\]](#alg:final){reference-type="ref" reference="alg:final"} is polynomial under the same condition. Let us also remark that in [\[thm:constantgen\]](#thm:constantgen){reference-type="ref" reference="thm:constantgen"} we have a failure probability \(\delta_0>0\), while the analysis of AdaBoost\(_\nu^*\) assumes \(\delta_0 = 0\), i.e. that the weak learner always achieves an advantage of at least \(\gamma\). If one knows \(\gamma\) in advance, this is not an issue as AdaBoost\(_\nu^*\) only calls the weak learner on distributions over the training data \(S\) and one can thus compute the advantage from the training data. After in expectation \(1/(1-\delta_0)\) invocations of the weak learner, we thus get a hypothesis with advantage \(\gamma\). # Lower bound {#sec:lowerBound} [\[sec:lowerBoundFull\]]{#sec:lowerBoundFull label="sec:lowerBoundFull"} In this section, we prove the following lower bound: [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"} immediately implies [\[thm:lowerintro\]](#thm:lowerintro){reference-type="ref" reference="thm:lowerintro"} by solving the equation in the second statement for \(\varepsilon = \mathcal{L}_\mathcal{D}(\mathcal{A}(S))\). The proof of the term \(\ln(1/\delta)/m\) in the lower bound follows from previous work. In particular, we could let \(\mathcal{C} = \mathcal{H}\) and invoke the tight lower bounds for PAC-learning in the realizable setting. Thus, we let \(\delta=1/3\) and only prove that the loss of \(\mathcal{A}(S)\) is at least \(\alpha d /(\gamma^{2} m)\) with probability \(1/3\) over \(S\) when \(\abs{S}=m\) for some weakly learnable concept class \(\mathcal{C}\). This proof uses a construction from to obtain a hypothesis set \(\mathcal{H}\) over a domain \(\mathcal{X} = \{x_1,\dots,x_u\}\) of cardinality \(u=\alpha d \gamma^{-2}\) such that a constant fraction of all concepts in \(\mathcal{X} \to \{-1,1\}\) can be \(\gamma\)-weakly learned from \(\mathcal{H}\). We then create a distribution \(\mathcal{D}\) where the first point \(x_1\) is sampled with probability \(1-u/(4m)\) and with the remaining probability, we receive a uniform sample among \(x_2,\dots,x_u\). The key point is that we only expect to see \(1 + m \cdot u/(4m) \approx u/4\) distinct points from \(\mathcal{X}\) in a sample \(S\) of cardinality \(m\). Thus, if we consider a random concept that can be \(\gamma\)-weakly learned, the labels it assigns to points not in the sample are almost uniform random and independent. This in turn implies that the best any algorithm \(\mathcal{A}\) can do is to guess the labels of points in \(\mathcal{X} \setminus S\). In that way, \(\mathcal{A}\) fails with constant probability if we condition on receiving a sample other than \(x_1\). This happens with probability \(u/(4m) = 4\alpha d \gamma^{-2}/m\) and the lower bound follows. To formally carry out the intuitive argument, we first argue that for a random concept \(c \in \mathcal{C}\), the Shannon entropy of \(c\) is high, even conditioned on \(S\) and the labels \(c(S)\). Secondly, we argue that if \(\mathcal{A}(S)\) has a small error probability under \(\mathcal{D}\), then it must be the case that the hypothesis \(\mathcal{A}(S)\) reveals a lot of information about \(c\), i.e. the entropy of \(c\) is small conditioned on \(\mathcal{A}(S)\). Since \(\mathcal{A}(S)\) is a function of \(S\) and \(c(S)\), the same holds if we condition on \(S\) and \(c(S)\). This contradicts that \(c\) has high entropy and thus we conclude that \(\mathcal{A}(S)\) cannot have a small error probability. For the proof, we make use of the following lemma by to construct the 'hard' hypothesis set \(\mathcal{H}\) and concept class \(\mathcal{C}\): To prove [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"} for a given \(\gamma \in (0,1/80)\) and \(m,d \in \mathbb{N}\), let \(u=k\) for a \(u\) to be determined. Invoke [\[lem:randH\]](#lem:randH){reference-type="ref" reference="lem:randH"} with \(\delta=1/2\) and \(\gamma'=2\gamma\) to conclude that there exists a hypothesis set \(\mathcal{H}\) such that among all labelings \(\ell \in \{-1,1\}^u\), at least half of them satisfy: \[\exists f \in \Delta(\mathcal{H}): \forall x \!\in\! \mathcal{X}:\, \ell(x)f(x) \geq 2\gamma.\] Moreover, we have \(N = |\mathcal{H}| = \Theta\big(\gamma^{-2} \ln u \ln(\gamma^{-2} \ln u) e^{\Theta(\gamma^2 u)}\big)\). Let the concept class \(\mathcal{C}\) be the set of such labelings. For the given VC-dimension \(d\), we need to bound the VC-dimension of \(\mathcal{H}\) by \(d\). For this, note that the VC-dimension is bounded by \(\lg |\mathcal{H}| = \Theta(\gamma^2 u)\). We thus choose \(u=\Theta(\gamma^{-2} d)\) which implies the claimed VC-dimension of \(\mathcal{H}\). Next, we have to argue that any concept \(c \in \mathcal{C}\) can be \(\gamma\)-weakly learned from \(\mathcal{H}\). That is, the first statement of [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"} holds for \(\mathcal{H}\), \(\mathcal{C}\). To see this, we must show that for every distribution \(\mathcal{D}\) over \(\mathcal{X}\), there is a hypothesis \(h \in \mathcal{H}\) such that \(\Pr_{x \sim \mathcal{D}}[h(x) = c(x)] \geq 1/2 + \gamma\). To argue that this is indeed the case, let \(f \in \Delta(\mathcal{H})\) satisfy \(\forall x\! \in\! \mathcal{X}: \, c(x)f(x) \geq 2\gamma\). Such an \(f\) exists by definition of \(\mathcal{C}\). Then, \(\E_{x \sim \mathcal{D}}[c(x)f(x)] \geq 2\gamma\). Since \(f(x)\) is a convex combination of hypotheses from \(\mathcal{H}\), it follows that there is a hypothesis \(h \in \mathcal{H}\) also satisfying \(\E_{x \sim \mathcal{D}}[c(x)h(x)] \geq 2\gamma\). But \[\begin{aligned} \E_{x \sim \mathcal{D}}[c(x)h(x)] ~&=~ \sum_{x \in \mathcal{X}} \mathcal{D}(x) c(x) h(x) \\ &=~ \sum_{x \in \mathcal{X} \colon c(x)=h(x)} \!\mathcal{D}(x) ~-\sum_{x \in \mathcal{X} \colon c(x) \neq h(x)} \!\mathcal{D}(x)\\ &=~ \Pr_{x \sim \mathcal{D}}[c(x)=h(x)]-\Pr_{x \sim \mathcal{D}}[c(x) \neq h(x)] \\ &=~ \Pr_{x \sim \mathcal{D}}[c(x)=h(x)]-(1-\Pr_{x \sim \mathcal{D}}[c(x)=h(x)] )\\ &=~ 2 \Pr_{x \sim \mathcal{D}}[c(x)=h(x)]-1. \end{aligned}\] Hence, \(2\cdot \Pr_{x \sim \mathcal{D}}[c(x)=h(x)]-1 \geq 2\gamma \implies \Pr_{x \sim \mathcal{D}}[c(x)=h(x)] \geq 1/2 + \gamma\) as claimed. We have thus constructed \(\mathcal{H}\) and \(\mathcal{C}\) satisfying the first statement of [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"}, where \(\mathcal{C}\) contains at least half of all possible labelings of the points \(\mathcal{X} = \{x_1,\dots,x_u\}\) with \(u = \Theta(\gamma^{-2} d)\). For the remainder of the proof, we assume \(u\) is at least some large constant, which is true for \(\gamma\) small enough. What remains is to establish the second statement of [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"}. For this, we first define the hard distribution \(\mathcal{D}\) over \(\mathcal{X}\). The distribution \(\mathcal{D}\) returns the point \(x_1\) with probability \(1-(u-1)/4m\) and with the remaining probability \((u-1)/4m\) it returns a uniform random sample \(x_i\) among \(x_2,\dots,x_u\). Also, let \(c\) be a uniform random concept drawn from \(\mathcal{C}\). Let \(\mathcal{A}\) be any (possibly randomized) learning algorithm that on a set of samples \(S\) from \(\mathcal{X}\) and a labeling \(\ell(S)\) of \(S\) that is consistent with at least one concept \(c \in \mathcal{C}\) (i.e. \(\ell(S)=c(S)\)), outputs a hypothesis \(h_{S,\ell(S)}\) in \(\mathcal{X} \to \{-1,1\}\). The algorithm \(\mathcal{A}\) is not constrained to output a hypothesis from \(\Delta(\mathcal{H})\) or \(\mathcal{H}\), but instead may output any desirable hypothesis in \(\mathcal{X} \to \{-1,1\}\), using the full knowledge of \(\mathcal{C}\), \(\ell(S)\), \(\mathcal{H}\) and the promise that \(c \in \mathcal{C}\). Our goal is to show that \[\begin{aligned} \label{eq:goallower} \E_{c\sim \mathcal{C}}\left[\Pr_{S \sim \mathcal{D}^m}\left[\Pr_{x \sim \mathcal{D}}[h_{S,c(S)}(x) \neq c(x)] \geq \alpha'\frac{d \gamma^{-2}}{m}\right]\right] \geq 1/3 \end{aligned}\] where \(c\sim \mathcal{C}\) denotes the uniform random choice of \(c\). Notice that if this is the case, there must exist a concept \(c\) for which \[\begin{aligned} \Pr_{S \sim \mathcal{D}^m}\left[\Pr_{x \sim \mathcal{D}}[h_{S,c(S)}(x) \neq c(x)] \geq \alpha'\frac{d \gamma^{-2}}{m}\right] \geq 1/3. \end{aligned}\] To establish [\[eq:goallower\]](#eq:goallower){reference-type="ref" reference="eq:goallower"}, we start by observing that for any randomized algorithm \(\mathcal{A}\), there is a deterministic algorithm \(\mathcal{A}'\) obtaining a smaller than or equal value of the left hand side of [\[eq:goallower\]](#eq:goallower){reference-type="ref" reference="eq:goallower"} (by Yao's principle). Thus, we assume from here on that \(\mathcal{A}\) is deterministic. The main idea in our proof is to first show that conditioned on the set \(S\) and label \(c(S)\), the concept \(c\) is still largely unknown. We formally measure this by arguing that the binary Shannon entropy of \(c\) is large conditioned on \(S\) and \(c(S)\). Next, we argue that if a learning algorithm often manages to produce an accurate hypothesis from \(S\) and \(c(S)\), then that reveals a lot of information about \(c\), i.e. the entropy of \(c\) is small conditioned on \(S\) and \(c(S)\). This contradicts the first statement and thus the algorithm cannot produce an accurate hypothesis. We now proceed with the two steps. #### Large conditional entropy. Consider the binary Shannon entropy of the uniform random \(c\) conditioned on \(S\) and \(c(S)\), denoted \(H(c \mid S, c(S))\). We know that \(H(c) = \lg |\mathcal{C}| \geq \lg(2^u/2) = u-1\). The random variable \(c\) is independent of \(S\), hence \(H(c \mid S) = H(c)\). We therefore have \(H(c \mid S,c(S)) \geq H(c \mid S)-H(c(S) \mid S) = u-1-H(c(S) \mid S)\). For a fixed \(s \in \mathcal{X}^m\), let \(p_s = \Pr_{S \sim \mathcal{D}^m}[S=s]\). Then \(H(c(S) \mid S) = \sum_{s \in \mathcal{X}^m} p_s H(c(S) \mid S=s) \leq \sum_{s \in \mathcal{X}^m} p_s |s|\), where the last step follows from the fact that, conditioned on \(s\), the labeling \(c(s)\) consists of \(|s|\) signs. Note that the size of the set \(|s|\) is possibly smaller than \(m\) due to repetitions. Now notice that \(\Pr[|S| > u/3]\) is exponentially small in \(u\) since each of the \(m\) samples from \(\mathcal{D}\) is among \(x_2,\dots,x_u\) with probability only \((u-1)/(4m)\). Therefore, we get \(H(c(S) \mid S) \leq u/3 + \exp(-\Omega(u))u \leq u/2-1\). It follows that \[\begin{aligned} \label{eq:highentropy} H(c \mid S,c(S)) ~\geq~ u-1-(u/2-1) ~=~ u/2. \end{aligned}\] #### Accuracy implies low entropy. Now assume that \(h_{S,c(S)}\) is such that \(\Pr_{x \sim \mathcal{D}}[h_{S,c(S)} \neq c(x)] < \alpha'd\gamma^{-2}/m\) for a sufficiently small constant \(\alpha'\). Any point \(x_i\) where \(c(x_i)\) disagrees with \(h_{S,c(S)}(x_i)\) adds at least \(1/(4m)\) to \(\Pr_{x \sim \mathcal{D}}[h_{S,c(S)} \neq c(x)]\) (the point \(x_1\) would add more), hence \(h_{S,c(S)}\) makes a mistake on at most \(\alpha'd\gamma^{-2}/m \cdot (4m) = 4 \alpha' d \gamma^{-2}\) points. Recalling that \(u = \Theta(d \gamma^{-2})\), we get that for \(\alpha'\) small enough, this is less than \(u/100\). Thus, conditioned on \(\Pr_{x \sim \mathcal{D}}[h_{S,c(S)} \neq c(x)] < \alpha'd\gamma^{-2}/m\), we get that the entropy of \(c(S)\) is no more than \(\lg \left( \sum_{i=0}^{u/100} \binom{u}{i} \right)\) since \(c(S)\) is within a Hamming ball of radius \(u/100\) from \(h_{S,c(S)}\). Now \(\sum_{i=0}^{u/100} \binom{u}{i} \leq 2^{H_b(1/100) u}\), where \(H_b\) is the binary entropy of a Bernoulli random variable with success probability \(1/100\). Numerical calculations give \(H_b(1/100) = (1/100)\lg_2(100) + (99/100)\lg_2(100/99) < 0.09\). Thus \[\begin{aligned} \label{eq:lowentropy} H\Big(\,c\, \Big\arrowvert\, h_{S,c(S)},\, \Pr_{x \sim \mathcal{D}}[h_{S,c(S)} \neq c(x)] < \alpha'd\gamma^{-2}/m\Big) ~\leq~ 0.09 u. \end{aligned}\] Now let \(X_{S,c}\) be an indicator random variable for the event that \(\Pr_{x \sim \mathcal{D}}[h_{S,c(S)} \neq c(x)] < \alpha'd\gamma^{-2}/m\). Then \(H(c \mid S,c(S)) \leq H(c \mid S, c(S), h_{S,c(S)}, X_{S,c}) + H(X_{S,c})\). Here we remark that we add \(h_{S,c(S)}\) in the conditioning for free since it depends only on \(S\) and \(c(S)\). Adding \(X_{S,c}\) costs at most its entropy which satisfies \(H(X_{S,c}) \leq 1\). Since removing variables that we condition on only increases entropy, we get \(H(c \mid S,c(S)) \leq H(c \mid h_{S,c(S)}, X_{S,c}) + 1\). Now observe that \(H(c \mid h_{S,c(S)}, X_{S,c}) = \Pr[X_{S,c}=1] H(c \mid h_{S,c(S)}, X_{S,c}=1) + \Pr[X_{S,c}=0] H(c \mid h_{S,c(S)}, X_{S,c}=0)\). The latter entropy we simply bound by \(u\) and the former is bounded by \(0.09u\) by [\[eq:lowentropy\]](#eq:lowentropy){reference-type="ref" reference="eq:lowentropy"}. Thus \(H(c \mid S,c(S)) \leq 1 + \Pr[X_{S,c}=1]0.09u + (1-\Pr[X_{S,c}=1])u\). #### Combining the bounds. Combining the above with [\[eq:highentropy\]](#eq:highentropy){reference-type="ref" reference="eq:highentropy"} we conclude that \[\begin{aligned} 1 +\Pr[X_{S,c}=1]0.09u + (1-\Pr[X_{S,c}=1])u ~\geq~ u/2. \end{aligned}\] It follows that \(\Pr[X_{S,c}=1] \leq 2/3\). This completes the proof since \[\begin{aligned} \E_{c\sim \mathcal{C}}\left[\Pr_{S \sim \mathcal{D}^m}\left[\Pr_{x \sim \mathcal{D}}[h_{S,c(S)}(x) \neq c(x)] \geq \alpha'\frac{d \gamma^{-2}}{m}\right]\right] ~&=~ \E_{c\sim \mathcal{C}} \big[\E_{S \sim \mathcal{D}^m}[(1-X_{S,c})]\big] ~=~ 1-\Pr[X_{S,c}=1] \end{aligned}\] and thus \[\begin{aligned} \E_{c\sim \mathcal{C}}\left[\Pr_{S \sim \mathcal{D}^m}\left[\Pr_{x \sim \mathcal{D}}[h_{S,c(S)}(x) \neq c(x)] \geq \alpha'\frac{d \gamma^{-2}}{m}\right]\right] ~&\geq~ \frac{1}{3}. \end{aligned}\] This finishes the proof of [\[thm:lower\]](#thm:lower){reference-type="ref" reference="thm:lower"}. # Conclusion Overall, we presented a new weak to strong learner with a sample complexity that removes two logarithmic factors from the best-known bound. By accompanying the algorithm with a matching lower bound, we showed that the achieved sample complexity of our algorithm is indeed optimal. Our algorithm uses the same sub-sampling technique as and computes a voting classifier with large margins for each sample for example with AdaBoost\(_\nu^*\). The analysis of our algorithm uses a new generalization bound for voting classifiers with large margins. Although we determined the exact sample complexity of weak to strong learning (up to multiplicative constants), there are a few connected open problems. Currently, our construction uses \(3^{\log_4(m)} \approx m^{0.79}\) many sub-samples of linear size as input to AdaBoost\(_\nu^*\). For very large datasets, it would be great to reduce the number and size of these calls. Next, the output of our algorithm is a majority vote over majority voters. It is unclear whether a simple voter could achieve the same bounds. Last, it would be intriguing to see what can still be proven for voting classifiers that have margins \(\gamma\) on most, but not all, data points.
{'timestamp': '2022-06-09T02:10:46', 'yymm': '2206', 'arxiv_id': '2206.01563', 'language': 'en', 'url': 'https://arxiv.org/abs/2206.01563'}